content
stringlengths 1
15.9M
|
---|
\section{Approach}\label{sec:approach}
We start this section with a formal definition for duplicate sensitivity, and
then prove the preservation of duplicate sensitivity as a necessary condition
for query equivalence. Next,
we present how to use duplicate sensitivity to guide the creation of equivalent transformations.
At last we give the overall algorithm for testing the DBMS.
\subsection{Duplicate Sensitivity for Query Equivalence}
\textbf{Duplicate Sensitivity}. We start by recapping the property of duplicate sensitivity for a single SQL operator such as
\texttt{SUM} and \texttt{MAX}.
We then extend the notion of duplicate
sensitivity to a whole SQL query.
\smallskip
\begin{definition}[Duplicate Sensitive Operators]{\label{def:sens}} An operator
is duplicate sensitive, if multiplicity of input changes the result, vice versa.
\end{definition}
\begin{example}
For relational operators, we know that \texttt{SELECT}, \texttt{WHERE} and
\texttt{UNION ALL} are duplicate sensitive and \texttt{DISTINCT}, \texttt{GROUP
BY} and \texttt{UNION} are duplicate insensitive. For value operators we know
that \texttt{MIN}, \texttt{MAX} are insensitive, and \texttt{SUM},
\texttt{COUNT}, \texttt{AVG} are duplicate sensitive.
\end{example}
\smallskip
We have also observed that all operators take a relation as input
(\autoref{def:operator}), which is then processed by the next operator. From
this point of view, a SQL query is a series of operators, which can be either
duplicate sensitive or insensitive.
Thus, we generalize the notion of duplicate sensitivity to a SQL query, defined as below.
\smallskip
\begin{definition}[Query Duplicate Sensitivity]
The duplicate sensitivity of a SQL query is the \textit{ordered composition}
of the duplicate sensitivity of its operators.
\end{definition}
Let $g$ and $h$ be two SQL operators, and $g \cdot h$ be
their composition.
We can obtain the duplicate sensitivity of $g \cdot h$ (denoted as ``$DS(g \cdot
h)$'') as the following:
\begin{equation} \label{eqtime}
DS(g \cdot h) = \left\{
\begin{aligned}
\text{sensitive}, & \ \ g: \text{sensitive} \wedge h: \text{sensitive} \\
\text{insensitive}, & \ \ others \\
\end{aligned}
\right.
\end{equation}
Given any SQL query, we can compute the duplicate sensitivity of it using the above rules.
\smallskip
\begin{example}
Suppose we have a query \texttt{SELECT a FROM t0 WHERE a > 1 GROUP BY a}, we
know the sensitivity for each operator in this query: \texttt{SELECT} is
sensitive, \texttt{WHERE} is sensitive and \texttt{GROUP BY} is insensitive. Formally, each operator is a transformation function which is given in
\autoref{fig:dsl}. The ordered composition of these operators is applying
these functions in order.
One possible composition of the query is $\pi \cdot \delta \cdot \sigma$, and the ordered composition of
its operators' sensitivity can be derived by following \autoref{eqtime}, which is insensitive.
\end{example}
\begin{figure}[t]
\begin{align}
\pi : \tau \rightarrow \tau \tag{SELECT} \label{type:pi} \\
\sigma : \tau \rightarrow \tau \tag{WHERE, HAVING} \label{type:sigma} \\
\gamma : \tau \rightarrow \tau_v \tag{Aggregate Function} \\
\delta : \tau_b \rightarrow \tau_s \tag{DISTINCT, GROUP BY}
\end{align}
\caption{Describing SQL clause input and output. $\tau_b$ is a multiset
type, $\tau_s$ is a set type, $\tau_v$ is a value type and
$\tau$ is generic it could be either of the three. A set type is duplicate insensitive
, a multiset type is duplicate sensitive and a value type's sensitivity depends on the
function.}
\label{fig:dsl}
\end{figure}
\smallskip{\textbf{Necessary Condition for Query Equivalence}}. We now prove
that two equivalent queries must have the same duplicate sensitivity by
constructing a contrapositive proof using query equivalence.
\begin{lemma}[Query Equivalence]{\label{def:equiv}} Given two queries $Q_1$ and
$Q_2$. They are equivalent, denoted as $Q_1 \equiv Q_2$ if and only if the
following holds:
$\forall D, R_1(D) \subseteq R_2(D) \bigwedge R_2(D) \subseteq R_1(D)$.
$R_1(D)$ is the result set of $Q_1$ on relation $D$ and $R_2(D)$ is the result set of
$Q_2$ on relation $D$, respectively.
\end{lemma}
\smallskip
\begin{theorem}{\label{thm:dsth}} Given two queries $Q_1$ and $Q_2$, if $Q_1
\equiv Q_2$, then $DS(Q_1) \equiv DS(Q_2)$. Where $DS(Q_1)$ and $DS(Q_2)$ denote
\textit{duplicate-sensitivity} of $Q_1$ and $Q_2$, respectively.
\end{theorem}
\smallskip
\begin{proof}
We construct a contrapositive proof for this theorem. The theorem when formally
written is:
$Q_1 \equiv Q_2 \rightarrow DS(Q_1) \equiv DS(Q_2) $,
which is
logically equivalent to $DS(Q_1) \centernot \equiv DS(Q_2) \rightarrow Q_1
\centernot \equiv Q_2$ (contrapositive form). Given two queries $Q_1$ and $Q_2$,
w.l.o.g., we can assume $R(Q_1)$ is a multiset (duplicate sensitive) and
$R(Q_2)$ is a set (duplicate insensitive). We consider a tuple $t$ with
multiplicity $i$ in $D$, which is contained in both $R(Q_1)$ and $R(Q_2)$:
\textit{Case 1:} $i=1$. $R(Q_1) \subseteq R(Q_2) \bigwedge R(Q_2) \subseteq
R(Q_2)$ on $t$.
\textit{Case 2:} $i>=2$. Because $R(Q_1)$ is a multiset and $R(Q_2)$ is a set,
then $R(Q_1) \centernot \subseteq R(Q_2) \bigwedge R(Q_2) \subseteq R(Q_1)$. This
is because when a tuple appears in the result set, all of its duplicates must also
appear.
Combining both cases, we get $R(Q_1) \centernot \subseteq R(Q_2) \bigwedge
R(Q_2) \subseteq R(Q_1)$, together with the contrapositive form of
\autoref{def:equiv}, we have $Q_1 \centernot \equiv Q_2$. This completes the
proof. $\square$
\end{proof}
\smallskip
We have proved that duplicate sensitivity is a necessary condition for query
equivalence, then we can follow this theorem to guide our transformations to
preserve the sensitivity for the query mutant. Next, we illustrate how the
transformation is done on a concrete query.
\subsection{Sensitivity-guided Transformation Synthesis}
The goal of our approach is to find more transformations on a query, which
guarantees the equivalence between the given query and the mutant. The key
insight is to first generate many candidate mutants with
~\autoref{thm:dsth}. To achieve it, we first convert a query to
an intermediate form, then apply transformations and last convert it back to a
SQL query. To ease our discussion, we use relational algebra symbols to
represent the operators. Conventionally, we have the following relational
algebra: $\pi$ for projection, $\sigma$ for selection, $\gamma$ for aggregate
and $\delta$ for distinct. Next, we use an example to illustrate our approach.
\begin{figure}[t]
\centering
\includegraphics[scale=0.4]{image/fig4.pdf}
\caption{Two operator series of different order have the same execution result.
Execution of the relational algebra expressions starts from right to left.}
\label{fig:trees}
\end{figure}
\begin{table}
\centering
\caption{Remapping from relational algebra to SQL.}
\label{tb:mapping}
\begin{tabular}{l l}
\toprule
\textbf{Operator} & \textbf{SQL Keywords} \\
\midrule
$\sigma$ & HAVING, WHERE \\
$\delta$ & DISTINCT, GROUP BY \\
\bottomrule
\end{tabular}
\end{table}
\subsubsection{A taste}
Let us consider Category 1 in \autoref{fig:motiv} again, viewing the query as a
series of operators. We could obtain an execution order of each query as in
\autoref{fig:trees}.
$Q_A$ performs selection ($\sigma$), de-duplicating ($\delta$) and at last
projection ($\pi$). Among those operations, only the second one changes
multiplicity of every tuple, while the first one keeps or removes all duplicates
and the third one has no impact on the duplicates. However, the problem is how
we can preserve
the duplicate sensitivity while transforming $Q_A$ to $Q_B$. We achieve this by
considering the context of an operator, which means if it is compatible with
both the input and output types of the previous and the next operator.
\subsubsection{In action}
We have three steps to transform a query and to generate a duplicate-sensitivity
preserving mutant. In the first step, we represent $Q_A$ in a relational
algebra expression as $\pi \cdot \delta \cdot \sigma$
(\texttt{SELECT-DISTINCT-WHERE}). In the second step, we apply transformations
on the expression. We have many choices for the transformation, e.g. replace an operator, change
the order of the operators. However, to preserve duplicate sensitivity of the query, we need to
choose the transformation carefully. For instance, if we change an operator from
sensitive to insensitive, it may also alter the sensitivity of the query
(~\autoref{eqtime}). We should always stick to the goal that we should not alter a query's
sensitivity during our transformations.
Considering the existing transformation
rules~\cite{20bookconcept}, we apply associativity to the expression and obtain
two new expressions: $\pi \cdot
(\delta \cdot \sigma)$ or $(\pi \cdot \delta) \cdot \sigma$, which both are still
duplicate sensitive. On the SQL level we can
interpret those expressions differently (\autoref{tb:mapping}. For the first expression, we take out the projection
and we obtain \texttt{SELECT-(DISTINCT-WHERE)} (pull out projection). For the
second expression, we take out the selection and we obtain
\texttt{(SELECT-DISTINCT)-WHERE} (pull out selection). We can also apply
commutativity rules to the expression, then we obtain $\pi \cdot (\sigma \cdot
\delta)$ which we interpret
as \texttt{SELECT-(WHERE-DISTINCT)} on the SQL level. In the last step,
we remap the interpretation to concrete SQL queries. For instance, the
expression \texttt{SELECT-(WHERE-DISTINCT)} is remapped to \texttt{SELECT a FROM
t0 WHERE a>0 GROUP BY a}. We could use \texttt{GROUP BY} instead of
\texttt{DISTINCT} operator because both operator are compatible to the context
following our new definition.
\smallskip
To wrap up, our query transformation approach has three steps as the following:
\begin{enumerate}
\item Convert a SQL query $Q$ to a relational algebra expression $E$;
\item Apply transformation rules such as associativity and commutativity to
$E$ and obtain an duplicate-sensitivity preserving expression $E^\prime$.
The existing rules used for query optimization~\cite{20bookconcept} are also
applicable.
\item Remap $E^\prime$ back to a SQL query by considering duplicate
sensitivity of the SQL operators.
\end{enumerate}
\subsection{Detecting Bugs with Eqsql}
We now could use the duplicate-sensitivity guided transformation to create tests. Following our approach, we designed a tool called Eqsql. We describe
its architecture for bug finding and the query transformation algorithm in this
section. We give more implementation details in \autoref{sec:impl}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.45]{image/fig1.pdf}
\caption{Workflow of guided transformation synthesis}
\label{fig:workflow}
\end{figure}
\smallskip{\textbf{System Overview}}. \autoref{fig:workflow} shows the
architecture of Eqsql. It takes a bunch of seed queries and processes them one
by one. The Mutator takes a seed query and generates an mutated query pair. The
pair is sent to an equivalence checker where it is discarded if they are nonequivalent.
The equivalent query pairs are executed by a database server and the
results are collected. The result checker reports a bug if it finds a difference in the
pair's result set.
\begin{algorithm}[ht]
\caption{Eqsql's main logic}
\label{algo:main}
\KwIn{A set of randomly given seed queries} \KwOut{A bug report or nothing}
\SetKwFunction{TestDB}{test\_db} \SetKwProg{Proc}{Procedure}{}{}
\Proc{\TestDB{$Seeds$}}{\ForEach{$Q \in Seeds$} { \label{algo1:for}
$Q_e \leftarrow \textsf{transform\_query}(Q)$ \;
\label{algo1:transform} $checkRes \leftarrow
\textsf{equal\_checker.check}(Q,Q_e)$ \;
\label{algo1:checkstart} \If{$checkRes$ is False} {continue \;
\label{algo1:checkend}} $R \leftarrow \textsf{db.execute}(Q)$ \;
\label{algo1:result1}
$R_e \leftarrow \textsf{db.execute}(Q_e)$ \;
\label{algo1:result2}
\If{$R$ is not equal to $R_e$} {\label{algo1:check} \text{report
a bug} \; \label{algo1:report}}}}
\end{algorithm}
\smallskip{\textbf{Algorithms}}. \autoref{algo:main} presents the high-level
process of detecting correctness bugs with our approach. It first takes a set of
seed queries $\textit{Seeds}$ and a DMBS under test as input, where the
execution result of a single query is previously unknown during our testing. At
the start of Eqsql's main bug checking logic, we suppose that a bunch of seed
queries are given as input. It iteratively takes a seed query
(\autoref{algo1:for}), and transforms it to get a query mutant
(\autoref{algo:transform}). Next, it sends the query and the mutant to the query
checker where the nonequivalent query pairs are discarded
(\autoref{algo1:checkstart}-\autoref{algo1:checkend}). Then it runs the
equivalent query pairs in the tested DBMS and save the results respectively
(\autoref{algo1:result1}- \autoref{algo1:result2}). At last, it checks if both
queries have the same execution results (\autoref{algo1:check}), if not then it
reports a correctness bug (\autoref{algo1:report}).
\begin{algorithm}[t]
\caption{Transformation synthesis}
\label{algo:transform}
\KwIn{A random seed query $Q$} \KwOut{An EQP $(Q, Q_e)$}
\SetKwFunction{TestDB}{\textsf{transform}\_\textsf{query}}
\SetKwProg{Proc}{Function}{}{} \SetKw{KwGoTo}{go to} \SetKw{Break}{break}
\Proc{\TestDB{$Q$}}{
$t \leftarrow \textsf{parse}(Q)$ \; \label{algo2:parse}
\ForEach{$r \in rules$}{ \label{algo2:rulestart} \If{$r$ is appliable on
$t$} {$t_e \leftarrow \textsf{r}(t)$ \; generate $Q_e$ from $t_e$
\; \label{algo2:ruleend} \Break \; }} \Return
$(Q,Q_e)$ \; \label{algo2:return}}
\end{algorithm}
In \autoref{algo:main} we omit that how the seed query is transformed for
simplicity, now we present the procedure \verb+transformQuery+ in
\autoref{algo:transform}. The procedure first
parses a given query and obtains the corresponding tree representing the algebra
operators (\autoref{algo2:parse}). Then the tree goes through mutants
(\autoref{tb:rules}) to search for an applicable transformation
(\autoref{algo2:rulestart}-\autoref{algo2:ruleend}). At last the procedure
returns the new EQP (\autoref{algo2:return}).
\begin{table*}
\centering
\caption{Example relational algebra transformation rules. One row in the
table describes a rule. The second column is the relational algebra
expression $E$ for a seed query, the third column is a
duplicate-sensitivity preserving expression $E_e$ to the second column, the
fourth column is a candidate mapping from $E_e$ to a SQL query, and the
last column is the name of this rule.}
\label{tb:rules}
\begin{tabular}{l l l l l}
\toprule
\textbf{No.} & \textbf{Expression $E$} & \textbf{Preserving $E_e$} &
\textbf{SQL pattern} & \textbf{Name} \\
\midrule
1 & $\pi \cdot \sigma$ & $\pi \cdot (\sigma)$ & SELECT-(WHERE) & projection
pull up \\
2 & $\sigma_2 \cdot \sigma_1$ & $\sigma_1 \cdot \sigma_2$ & WHERE-(WHERE) &
commutative selections \\
3 & $\pi_1 \cdot \pi_2 \cdots \pi_n$ & $\pi_1$ & SELECT & cascade of projection
\\
4 & $E_1 \cup E_2$ & $E_2 \cup E_1$ & SELECT-UNION-SELECT & commutative set
union \\
\bottomrule
\end{tabular}
\end{table*}
\section{Background}
\section{Conclusion}
In this paper, we presented a fully automated approach to generate equivalent query pairs, namely Eqsql,
which can detect correctness bugs in the DBMS. Eqsql's main contribution is a necessary condition for query
equivalence, which is leveraged to generate many candidate query mutant. To evaluate the efficacy of Eqsql,
we have used it to test several production-level DBMSs including MySQL, TiDB and CynosDB. Our evaluation results
show that Eqsql can detect in total 30 bugs which are all uniquely confirmed .
\section{Discussions}
{\textbf{Findings}}. Except for what we discussed in ~\autoref{sec:eval}, we also
have interesting findings. Firstly, we found one of the detected
bug~\cite{wb-mulbug} in MySQL can be reproduced in MariaDB and TiDB. It is
reasonable that such a bug exists in MariaDB~\cite{wb-mariadb}, which is a fork
of MySQL. However, it is unexpected that the bug exists in TiDB which is an
independently-developed DBMS. We had a brief discussion with a TiDB developer on
this bug. He mentioned that the bug may be introduced when implementing the
MySQL protocol with referencing to the original source code. This implies that
more such bugs can probably exist in TiDB's underlying source code and in other
DBMSs which reference MySQL source code in a similar way. Secondly, our tool
detected a parsing bug~\cite{wb-docbug} in MySQL, which was firstly confirmed by
the MySQL verification team but was classified as not a bug after a few hours.
The reason for this update was because the team has found the bug is claimed as
a documented defect, though the test case has no violation with the SQL
standard. This is an example of how a DBMS's implementation can deviate from the
standard.
\smallskip{\textbf{Extensions}}. Currently, we only implemented two fixed
transformations for MySQL-compatible systems. To run our tool for other DBMSs,
two main components are required, i.e., a connector of the specific server and a
SQL grammar file. A Golang native connector is easier to use with our tool but
many new systems do not provide such support. In this case, our tool can be used
as a seed generator and the output queries could be exported to fit into the
testing process. The grammar file is customizable on any level to the user's
need, however manual efforts are required to understand and write the file.
\section{Evaluation} \label{sec:eval}
We guide our quantitative evaluation by the following three research questions:
\begin{itemize}
\item \textbf{RQ1}: Can Eqsql detect correctness bugs in production level
databases?
\item \textbf{RQ2}: What are the impacts of the detected bugs?
\item \textbf{RQ3}: Can Eqsql improve the code coverage of the input seed queries?
\end{itemize}
\smallskip
\textbf{Results Summary}. We conducted a \textit{two-month} real-world
evaluation of Eqsql's bug finding capability on four MySQL compatible DBMSs: MySQL 5.7, MySQL 8.0, TiDB and CynosDB. The results are highlighted as below:
\begin{itemize}
\item
Eqsql has detected 30 new bugs in the tested DBMSs. They are all unique
and are confirmed by the developers. This emphasizes the effectiveness
and practicability of Eqsql.
\item
Most of the detected bugs have been confirmed in several versions of the
same DBMS, and some of them could be reproduced cross different DBMSs.
\item Almost all the bugs reported in TiDB (12 out of 13) have been fixed. All the
bugs in CynosDB have been planned to be fixed, and several of detect bugs in
MySQL are already patched.
\end{itemize}
\subsection{Evaluation Setup}
\smallskip{\textbf{Environment}}. We performed all experiments on a server
with 80 core Intel(R) Xeon(R) CPU E5-2698 v4 @ 2.20GHz and 256GB physical
memory running Ubuntu-18.04. We ran Eqsql in a single thread process on the server.
\begin{table}[t]
\centering
\caption{The tested DBMSs are highly ranked on the DB-Engine and have received thousands of stars on GitHub.}
\label{tb:db}
\begin{tabular}{l l l l }
\toprule
\textbf{Name} & \textbf{Rank} & \textbf{Stars} & \textbf{Size
(LOC) \tablefootnote{Lines of code.}} \\
\midrule
MySQL 5.7 & 2 & 5.4K & 2,965,321
\\
MySQL 8.0 & 2 & 6.4K & 3,610,003
\\
TiDB & 60 & 27.5K & 701,491
\\
CynosDB & N/A & -
& 3,700,000 \tablefootnote{Provided by the developer. } \\
\bottomrule
\end{tabular}
\end{table}
\smallskip{\textbf{Tested Database Systems}}. Although our approach requires
minimum efforts to be plugged into the existing generators, we still need knowledge
to understand different DBMSs and the corresponding SQL dialects. We
chose MySQL compatible databases as our tested systems, because MySQL is the top
open-source RDBMSs in the DB-Engine Ranking~\cite{wb-rank}. We show information
about the tested systems in \autoref{tb:db}.
\emph{MySQL.} MySQL 5.7 and MySQL 8.0 are considered as different systems in our
evaluation due to that they have distinct differences~\cite{wb-version}. We will
also see that a bug in MySQL 5.7 may not be triggered in MySQL 8.0 and vice
versa. This also gives us the reason to consider them separately. If
there are new releases coming, we shifted to the new release for testing.
\emph{TiDB.} TiDB~\cite{wb-tidb} is a relatively new DBMS developed by PingCAP.
It is a distributed system supporting Hybrid Transactional and Analytical
Processing (HTAP) workloads, and it is compatible with the MySQL protocol. Since
there is a long time duration between its official releases, we continue to test the master
branch of the source repository. We cloned the source code from the official
repository and built the system locally.
\emph{Tencent CynosDB (CDB).} CDB \cite{wb-cdb} is a Tencent Cloud product,
which is a MySQL 100\%-compatible enterprise-level database. It is highly
available and distributed, and it supports more than a million queries per
second. Because CDB is not open-source and it is a cloud product, we set up the
test environment with a Tencent VPS and one CDB instance compatible with MySQL
5.7 and tested the database server on the VPS.
\smallskip{\textbf{Baselines}}. We have to admit that a nuts-and-bolts
comparison among the related tools is hard to achieve. For the early
studies~\cite{slutz1998massive,08adusa,veanes2010qex}, the tools
are not available. More recent tool MutaSQL~\cite{20mutasql} is not
open source. Thus, the only available tool is SQLancer~\cite{Rigger2020PQS, Rigger2020TLP,20norec}.
We omitted comparison with SQLancer for three reasons. Firstly, both tools support SQL grammar in a
different way which makes it hard to compare fairly. More importantly, it doesn't
take seed input and ends in log explosion when executing queries. Additionally, we designed
our evaluation to run on new versions of the tested database systems, which is
manual-extensive and objective to run both tools and compare the bugs. Although
we did not design a separate experiment, we did evaluate both tools on
coverage. Our experiment result showed that both tools achieved almost the same
coverage when running for 12 hours by controlling the available parameters. Generally
speaking, our approach is orthogonal to the existing works. Therefore, we will
mainly discuss the newly detected bugs and report coverage improvement of our tool.
\subsection{RQ1: Efficacy in Detection of Correctness Bugs}
All the confirmed bugs found by our tool is shown in \autoref{tb:bugs} with more
details on the number of detected bugs and the bug types. All of bugs included in the table have been uniquely verified for each
database.
In total, we discovered 30 new and unique bugs, among which 20 are value-based bugs and 10
are error-based. ``Value-based bugs" are the ones that the query is executable
but returns wrong result sets. ``Error-based bugs" occur when the query is
executed and it throws an error instead of a result set. The DBMSs under tests have a thorough bug fixing process and it takes
weeks to months to see a bug patched and fixed in the following releases.
For instance, 12/13 bugs of TiDB have been fixed up to the time we completed
writing this paper. For CynosDB, we contacted the developer and were
notified that these bugs will be fixed soon.
In the following part, we enumerate the bug information for each of the tested DBMSs.
\begin{table}
\caption{Confirmed bugs in the tested DBMSs.}
\centering
\label{tb:bugs}
\begin{tabular}{l c c c c}
\toprule
\textbf{Name} & \textbf{Value} \tablefootnote{Executable query
produces incorrect value.} & \textbf{Error} \tablefootnote{Executable
query throws error.} & \textbf{Total} & \textbf{Fixed}\\
\midrule
MySQL & 12 & 2 & 14 & 0 \\
TiDB & 6 & 7 & 13 & 12 \\
CynosDB & 2 & 1 & 3 & 0 \\
\midrule
\textbf{TOTAL} & \textbf{20} & \textbf{10} & \textbf{30} & \textbf{12}
\\
\bottomrule
\end{tabular}
\end{table}
\textbf{MySQL}. We submitted bugs via the MySQL bug
tacker~\cite{wb-mysqltracker}. Most of our new bug report were usually confirmed
within 3 days. Our submitted bugs are all assigned as \textit{severity S3
(Non-critical)}, which is just less severe than S2 (Serious) and S1 (Critical).
Because we expected to find correctness bugs, it is very reasonable they are
assigned as S3. We totally submitted 14 reports for bugs detected by our tool,
and all of them got confirmed by the developers. This means our approach
achieves 100\% true-positive on testing MySQL. We list all detected bugs in
MySQL in~\autoref{fig:bugsample}.
\textbf{TiDB}. Because it is easy for TiDB to have the same bug as MySQL due to
its high-compatibility with MySQL, which makes it more difficult to filter the
duplicated bugs. Though, we have removed duplicates from the final result as
much as possible. For the counted bugs, most of them are tagged as
\textit{Major} or \textit{Moderate} while a few are as \textit{Critical}. 12
of the 13 confirmed bugs have been fixed while one is verified. We list all
detected and valid bugs in TiDB in~\autoref{fig:bugsampletidb}.
\textbf{CynosDB}. CDB does not have a publicly accessible bug tracker, we
contacted the developer and reported the bugs directly to them. For our bug
report, 3 unique bugs are confirmed while the remaining are bugs caused by the
underlying MySQL source code on which the tested version of CDB is implemented.
Because CDB is a commercial product, we can only access and test the version
that are available on the product website, so we stopped testing this DBMS after
we found the reported bugs.
\begin{table}[t]
\caption{The detected bugs in MySQL are listed here. The column ``Bug ID''
is the corresponding number for the bug in the MySQL Bug Tracker.
}
\label{fig:bugsample}
\centering
\begin{tabular} {l l l l l }
\toprule
\textbf{No.} & \textbf{Bug ID} & \textbf{Type} & \textbf{Status} &
\textbf{Affected Versions} \\
\midrule
1 & 100209 & Value & Verified & 5.7 \\
2 & 100270 & Value & Verified & 5.6.48, 5.7.31 \\
3 & 100301 & Value & Verified & 5.6.48, 5.7.31 \\
4 & 100375 & Error & Verified & 5.6.48, 5.7.31 \\
5 & 100443 & Value & Verified & 5.7, 8.0 \\
6 & 100453 & Value & Verified & 5.7.31 \\
7 & 100489 & Value & Verified & 5.6.48, 5.7.31, 8.0.21 \\
8 & 100670 & Value & Verified & 5.6.48, 5.7.31, 8.0.21 \\
9 & 100750 & Error & Verified & 5.7.31, 8.0.21 \\
10 & 100777 & Value & Verified & 5.7.31, 8.0.21 \\
11 & 100806 & Value & Verified & 5.7.31, 8.0.21 \\
12 & 100807 & Value & Verified & 5.7.31, 8.0.21 \\
13 & 100837 & Value & Verified & 5.6, 5.7, 8.0 \\
14 & 100985 & Value & Verified & 5.6.48, 5.7.31, 8.0.21 \\
\bottomrule
\end{tabular}
\end{table}
\begin{table}[t]
\caption{The detected bugs in TiDB are listed here. The column ``Bug ID'' is
the corresponding issue number of the bug in TiDB's repository on GitHub.
}
\centering
\label{fig:bugsampletidb}
\begin{tabular}{llll}
\toprule
\textbf{No.} & \textbf{Bug ID} & \textbf{Type} & \textbf{Status} \\
\midrule
1 & 18314 & Error & Fixed \\
2 & 18493 & Error & Verified \\
3 & 18525 & Value & Fixed \\
4 & 18652 & Error & Fixed \\
5 & 18653 & Error & Fixed \\
6 & 18674 & Value & Fixed \\
7 & 18700 & Value & Fixed \\
8 & 19986 & Value & Fixed \\
9 & 19992 & Value & Fixed \\
10 & 19999 & Value & Fixed \\
11 & 20001 & Value & Fixed \\
12 & 20003 & Value & Fixed \\
13 & 20295 & Error & Fixed \\
\bottomrule
\end{tabular}
\end{table}
\subsection{RQ2: Significance of the Bugs}
We studied the impact of the correctness bugs found in different releases of
MySQL. We did not perform this experiment on CDB since only a fixed version
of it is accessible in the cloud. \autoref{fig:bugsample} also shows the number
of reproducible bugs on each major release. We use the milestone releases 5.6,
5.7 and 8.0 to represent all the later releases, and we consider each milestone
as an individual version. The affected versions are verified by the developer(s)
who is assigned to process the bug report.
\smallskip
\textbf{Affected Versions}. Our tool detected 14 bugs in total in MySQL. Among
these bugs, 4 of them could be reproduced on all 3 versions, 7 of
them on 2 versions and 3 of them on 1 version. We evaluated our tool by
testing 5.7.31 and 8.0.21 versions separately. The results show the detected
bugs by our tool have unexpected high impacts on in-production MySQL servers.
Those long-latent bugs have been missed by the regularly executed MySQL Test
Framework~\cite{wb-mysqltest}.It highlights the significance of our bug
finding results.
\smallskip
\textbf{Feedback From the Developer}. The developers of the tested DBMSs appreciated
our bug finding efforts and were amazed by the results.
Some of them were even curious and requested to use our tool with comments
like ``how did you find the bugs?'' and ``what method do you use'' because of
Eqsql's good efficacy in bug detection. After we submitted many bug reports to
TiDB and shared our experience in DBMS testing, they expressed their
appreciation for our testing efforts to make TiDB better: \textit{``It is very
significant that your work has helped us find many bugs in TiDB, while most of
the bugs are related to correctness. Since correctness is the most important
thing in the DBMS, it helped us a lot to make TiDB stable and
resilient.''}
\subsection{RQ3: Coverage Improvement}
In this section, we show the effectiveness of our approach in improving source code
coverage. We designed our experiment to examine the overall coverage improvement
of Eqsql during a 12-hour testing. This shows how our tool works in practice
with randomly generated test cases. Among the selected DBMSs, we exclude CDB since
its source code is not available and it is accessible as a cloud
service. For TiDB we have
encountered an issue with the storage which crashes the database server constantly before we
finish our experiment, so we also excluded it from this experiment.
We standardized our experiment with a Dockerfile to automatically set up all
necessary servers and tools. To collect coverage of a running MySQL server, we
compiled and installed MySQL 8.0.21 from source code. The binary is compiled with Gcov
\cite{wb-gcov} support to save runtime and accumulative coverage statistics.
We cleaned all coverage files generated during the installation and the preprocess
phases before we started to run our tool.
We let Eqsql run for 12 hours, then collected the final coverage (Final). Next,
we restarted the server to collect the dry coverage (Dry) with the saved seed
queries. We collected the coverage of criteria line, branch and function.
We report both the coverage by percentage and the absolute increment amount.
\begin{table}[t]
\caption{Coverage by the seed queries and the queries after transformations.}
\label{tb:cov}
\centering
\begin{tabular}{c l l l l}
\toprule
\textbf{Name} & \textbf{Type} & \textbf{Line} & \textbf{Branch} &
\textbf{Function} \\
\midrule
\multirow{4}{*}{MySQL} & Dry & 20.8\% & 11.1\% & 21.8\% \\
& Final & 23.4\% & 12.8\% & 24.8\% \\
& \textbf{$\Delta$} \tablefootnote{Increased
coverage computed by $Final-Dry$.}& +2.6\% &
+1.7\% & +3.0\% \\
&\textbf{$\vert \Delta \vert$}
\tablefootnote{Absolute increased amount.} &
+13,848 & +10,075 & +1,437 \\
\bottomrule
\end{tabular}
\end{table}
\autoref{tb:cov} shows the coverage data for MySQL. We can see that after our
transformation, the coverage has increased for each of the criteria
respectively. On MySQL, our tool achieved a 2.6\% coverage improvement for
executed lines, 1.7\% for branches and 3.0\% for functions. Though the increased
coverage counted in percentage is relatively small, our testing has covered more
than ten thousands of new lines and new branches in the source code and also
executed more than one thousand new functions.
\section{Implementation}
\label{sec:impl}
We implemented the main
logic of Eqsql including transformations of the
input seed query and result equivalence checks with Go~\cite{wb-golang}. We dispatched the
candidate equivalence checks to a formal query equivalence checker
EQUITAS~\cite{zhou2019automated}. We present the important implementation details
in this section.
\smallskip{\textbf{Seed Generation}}. We leverage the existing tool
go-randgen~\cite{wb-randgen} to randomly generate databases and queries as the
input. go-randgen is a general testing tool following the MySQL SQL
dialects. We manually specify the grammar by providing a Bison YY
file~\cite{wb-bisonyy}.
To use Eqsql to test other DMBSa, only minimum effort is required to set up the
input generator (e.g. using PostgreSQL PHP Generator~\cite{wb-php}).
\smallskip{\textbf{Query Filtering}}. Though we try to precisely specify the correct SQL grammar
for testing, it is stil not easy to get all queries executable because SQL
is a Context-Free Language~\cite{2017hollingum}. With the grammar file, only the
syntax is valid, but the semantics is determined at the runtime. To run the queries,
Eqsql firstly loads all the queries and then attempts to execute every and each of them one by one. To
filter the invalid queries, we created a list
of errors to be ignored. When an error from the list is returned by by the tested DBMS, Eqsql discards
the query immediately. For other queries which may throw an unseen error, it is
possible that a bug is associated with the query. In this case, we keep the query and need manual effort to verify it is a real bug. Due to the given
grammar's complexity, we have an average of 10\% of valid queries observed.
\smallskip{\textbf{Selected Oracles}}. Because of the extensibility of our approach to
generating query candidates, we cannot exhaustively implement all the
possible transformations on the seed query. We selected two transformations for our implementation, while the others would be easily added. We chose
to implement for \texttt{WHERE} to be consistent with most of the existing works and
implement for \texttt{GROUP BY} and aggregate functions, which are the magic touch of our
approach.
To obtain the query candidate, a query is first parsed by
sqlparser~\cite{wb-sqlparser} to an Abstract Syntax Tree (AST) which then goes
through transformations. The implementation could be extended to concatenate
different transformations, while our implementation transforms each query only
once.
\smallskip{\textbf{Testing Iteration}}. Each iteration of Eqsql's execution starts by generating the
databases and 2000 queries by default. It first cleans the given database and creates a new one, and then it invokes the main logic to run and verify each of the queries. It saves the query when a bug is discovered. From our experience, such an
iteration takes around 10s to finish when testing against MySQL 8.0.21.
\section{Introduction}
\label{sec:intro}
Database Management Systems (DBMSs) are widely used in modern industries. The
users expect the DBMS to retrieve correct data records and report correct
analysis results on the giving databases. Unexpectedly, researchers could still
find hundreds of queries where the popular and production-level DBMSs return
wrong result sets~\cite{Rigger2020PQS}, though these systems have been
extensively tested during their
development~\cite{wb-howsqlite,wb-mysqltest}.
To validate the correctness of different DBMS components (e.g. the optimizer),
the developers usually manually write test cases and provide the expected
result for a query. However, the quality of test cases is largely limited by
developers' testing skills~\cite{11factors} and the hand-written test cases only
cover a very small part of the possible input query space~\cite{08Microsoft},
leading to insufficient testing of the DBMS. In what follows, we refer to a test
case for the purpose of DBMS correctness testing as a test query and an expected result set.
Recent studies~\cite{08adusa,veanes2010qex,20norec,20mutasql,Rigger2020TLP} have
proposed several approaches to better explore the query space. They all use
automated random query generation to enlarge the explored query space. However, the
key challenge is the test oracle problem, i.e., how to find the expected result
set of a given query. To address the problem, one category of approaches such as
ADUSA~\cite{08adusa} and Qex~\cite{veanes2010qex} convert the query to Satisfiability Modulo Theory (SMT)
constraints and use a constraint solver to deduce the results. However, they
cannot work on special data types (e.g. varchar) in the DBMS and big tables
because of the performance issue of the solver. Another category of approaches
identify a correctness bug by comparing the result set of a pair of equivalent
queries. However, existing approaches can only use limited rules/transformations
to derive the query pairs. For example, TLP~\cite{Rigger2020TLP} first generates
a query $Q$ and then uses a predefined transformation to on $Q$ to obtain a new
equivalent query $Q^\prime$. Next, it checks whether the DBMS generates the same
result under the input of $Q$ and $Q^\prime$. However, since some correctness
bugs can only be exposed under a certain query pair and the predefined
transformation may fail to generate such query pair, these approaches would lose
the chances to detect such bugs. To be more specific, the transformation rule of
the existing studies \cite{Rigger2020PQS,20norec,Rigger2020TLP}
presumes that the generated query pair should explicitly include a ``where"
predicate (e.g. where a != 0) and the bug was triggered by the inconsistent
interpretations of ``where'' predicates. However, as shown in
\autoref{fig:casestudy}, this bug is exposed by two equivalent queries $Q_A$
(Fig 6b) and $Q_B$ (Fig 6c) in which there are no ``where'' predicates.
Essentially, this bug is caused by an inconsistent representation of the
float-point value $0.001$. $Q_A$ and $Q_B$ are expected to return the same value
on the given table t0, but they have a different value for $0.001$ as shown in
the result column.
\
\begin{figure*}[t]
\centering
\includegraphics[scale=0.50]{image/casestudy.pdf}
\caption{$Q_A$ and $Q_B$ is an equivalent query pair, which is expected to
compute the same results. In MySQL they produce different results, which
revealed an inconsistent float representation bug.} \label{fig:casestudy}
\end{figure*}
The key point in identifying such a correctness bug in \autoref{fig:casestudy} is to
compare if a row appears in the result sets of the equivalent query pair.
In this example, \texttt{mysum1} and \texttt{mysum2} do not have a same row,
and then this bug is exposed.
Inspired by this example,
our key idea is to create such a query that a row appears the same number of times
in the result sets of both the original and transformed queries.
To achieve this goal, it is required to describe the property whether duplicated
rows should present in a query's result set,
which we denote as \textit{query duplicate sensitivity}.
This property is generally
available on all SQL queries, which does not require the query to have a
specific component such as the ``where'' predicate. Although we can create
query mutants by preserving this property, it can generate queries which are not
equivalent to the given one because it is a necessary condition. To keep
the valid query mutants only, we leverage the existing query equivalence
checker~\cite{zhou2019automated} to
do the job.
Following our insight, we designed an automated correctness bug detection tool with duplicate-sensitivity
guided query transformations. Eqsql could synthesize many candidate
mutant transformations for a query and it uses the query equivalent solver EQUITAS
~\cite{zhou2019automated} to identify the valid mutants. To evaluate the effectiveness of our approach, we
have implemented it in a tool called Eqsql. We ran Eqsql on several real-world
production-level DBMSs, namely MySQL \cite{wb-mysql}, PingCAP TiDB
\cite{wb-tidb} and Tecent CynosDB \cite{wb-cdb}. During a two month evaluation,
our tool has found 30 confirmed and unique bugs. It detected 14 bugs in
MySQL, 13 bugs in TiDB and 3 bugs in Tencent CynosDB. While we evaluated our
tool on MySQL-compatible database systems, we believe our approach is also
applicable to the other DBMSs.
\definecolor{anti-flashwhite}{rgb}{0.95, 0.95, 0.96}
\definecolor{whitesmoke}{rgb}{0.96, 0.96, 0.96}
\smallskip
In summary, we made the following contributions:
\begin{itemize}
\item We present a workflow for synthesizing equivalent-preserving query
transformations, based on duplicate sensitivity of SQL clauses.
\item We implemented our approach in Eqsql, which is a fully automated
testing tool for detecting correctness bugs in MySQL-compatible database
systems.
\item We detected 30 new and unique bugs in the popular production-level
DBMSs, as a practical evaluation of Eqsql.
\end{itemize}
\section{Illustrative Examples}
In this section, we use two examples to demonstrate how we obtain more
transformations on a given query. Before we look into the examples, we first
need to define some jargon to help use explain concepts in the SQL language.
\begin{itemize}
\item \textbf{SQL Operators}. We consider every SQL clause and function as
a SQL operator. In this section, we introduce the
\texttt{WHERE}, \texttt{HAVING} and \texttt{DISTINCT} operators.
\item \textbf{Duplicate Sensitivity}. Every SQL operator must be either
duplicate sensitive or duplicate insensitive. \texttt{SUM} is duplicate sensitive
and \texttt{MAX} is duplicate
insensitive. Additionally, \texttt{WHERE} and \texttt{HAVING} are duplicate
sensitive and the \texttt{DISTINCT} operator is duplicate insensitive.
\end{itemize}
\smallskip
Due to the limited space, we show how our approach works with two common query
categories: \texttt{SELECT-FROM-WHERE} and \texttt{SELECT-FROM-GROUP BY}. Let us start with the
first category, and then move to the more complex category with aggregations.
\autoref{fig:motiv} shows the categories, the corresponding seed query and the
generated query mutant. The gray color highlights where the transformation takes place.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.46]{image/fig2.pdf}
\caption{Two SQL categories and seed with generated EQP}
\label{fig:motiv}
\end{figure}
\section{Category 1: SELECT-FROM-WHERE}
This category is one of the most frequent queries in the DBMS, which asks
the system to filter out data records not satisfying the ``where" predicate.
These queries will go through complex equivalent transformations during the
optimization phase~\cite{98overview}, potentially resulting in a nonequivalent final
result set due to implementation bugs~\cite{09microsoft,08Microftws}. However,
such bugs are hard to be captured due to the large amount of optimization
combinations~\cite{09microsoft}. Previous work NoREC~\cite{20norec} can only
detect such bugs because it only manipulates the ``where" predicate to
create an unoptimized query mutant.
For queries in this category, there are many candidate transformations to apply.
In this example, our approach inserts additional operators to the seed query. By
adding \texttt{DISTINCT} to \texttt{SELECT a} in (\autoref{fig:motiv}), it generated $Q_A$. And by adding groups
with \texttt{GROUP BY}, it gets $Q_B$. Both inserted operators remove duplicates of an
$a$ value and keep only one copy of each different $a$ value. Because adding
duplicates for an $a$ value or remove some duplicates will not change the result
for \texttt{DISTINCT} and \texttt{GROUP BY}, they are \textit{duplicate insensitive}. The
operators de-duplicate the input tuples and output results with one copy for
each row.
We denote this operation as $\delta$, following the convention
in~\cite{Dayal1982}.
\section{Category 2: SELECT-FROM-GROUP BY}
For this category, we consider a query with grouping and an aggregate function.
Different from the first category, queries of this category always produce an
intermediate result~\cite{Guagliardo2017}, which is a set of distinct groups
formed by the \texttt{GROUP BY} columns. A \texttt{GROUP BY} operator splits
the input records into groups based on the given grouping condition. After a
grouping, normally an aggregate function is used to compute some results on a
group, such as a sum of a numeric column. However, we could not extract the
groups explicitly with any SQL operators, which makes it harder to discover such
bugs only with the final result set.
Given an input query with \texttt{SUM} and \texttt{GROUP BY}, we can add a
filter clauses either by inserting a \texttt{WHERE} operator before the
\texttt{GROUP BY} or by inserting a \texttt{HAVING} after it. \texttt{GROUP BY}
is also a de-duplicating operator, because given one copy of each $a$ value is
sufficient to form the groups in our seed query. When both newly-inserted filter
operators \texttt{WHERE} and \texttt{HAVING} apply to $a$, they do not modify
the intermediate groups. Therefore the query mutant $Q_B$ is still equivalent
after the transformation. We denote the filtering operations as $\sigma$.
\smallskip
In this section, we explain the core concepts intuitively with two concrete
queries. Next, we formally describe the scope of SQL syntax and
the problem background in this paper.
\section{Preliminaries}\label{sec:pre}
In this section, we first define the SQL
syntax, followed by a recap of the fundamental
relational data model for the Relational Database Management Systems (RDBMSs).
We then take special care to describe
aggregation operators due to their different semantic.
Last we describe the key technical challenge addressed in this work.
\subsection{SQL Syntax and Relational Model}
We consider the SQL syntax given in \cite{Guagliardo2017} which supports
aggregate functions and groupings.
\smallskip{\textbf{Notations}}. $n$ is a table name, and $T$ is a set of table
names. $c$ is a column name annotated with the name of the containing table, and
$C$ is a set of column names. A truth value $l$ is an element of the truth
values $L=\{TRUE, FALSE, NULL\}$ in three-valued Logic~\cite{16libkintvl}. $V$
is a set of values which could be assigned to a field. We
use the following symbols:
\begin{enumerate*}
\item $T^\prime$ is a sequence of table names.
\item $C^\prime$ is a sequence of column names.
\item $t$ is a term, where $t \in L \bigcup V \bigcup C$.
\end{enumerate*}
\autoref{def:syntax} presents the syntax. A query $Q$ could have a ``where''
predicate, denoted as $p$. The predicate can be composed of truth values, an
expression of values, and can be recursively constructed with predicates
connected by binary and unary operators. A query could also use aggregate
functions \texttt{A} in the SELECT part. We also defined \textit{where
predicate} and \textit{operator} to ease our references to specific SQL
structures.
\smallskip
\begin{definition}[Where Predicate]
Given a query, we refer to the part, between \texttt{WHERE} and the next
keyword, as the \textit{where predicate}, or simply as the \textit{predicate}
$P$.
\end{definition}
\smallskip
\begin{definition}[Operator]{\label{def:operator}}
An operator operates on inputs with a type of relation or value (single attribute and single tuple relation), and produces a
result corresponding to the input type. The operator has two categories: 1)
relational operators, which are the operators of a SQL query: \texttt{SELECT,
DISTINCT, WHERE, GROUP BY, UNION, UNION ALL}; 2) value operators, which
manipulate a value, such as aggregate functions and logic operators.
\end{definition}
\begin{figure}[t]
\centering
\begin{lstlisting}
Q := SELECT C' FROM T'
| SELECT C' FROM T WHERE p
| SELECT A FROM T'
| SELECT A FROM T' GROUP BY C
\end{lstlisting}
\begin{lstlisting}
p := TRUE | FALSE | NULL
| p op p
| op p
| v
\end{lstlisting}
\caption{SQL syntax discussed in this paper.}
\label{def:syntax}
\end{figure}
\smallskip{{\textbf{Relational Model}}. Modern RDBMSs use SQL, a language
manipulating table containing duplicates. This motivated us to adopt the extended
relational model in~\cite{Dayal1982}, where Dayal proposed the relational model
over multiset, allowing duplicated values to present in the database.
\smallskip
\begin{definition}[Relation Scheme]
A relation scheme $S$ is a set of $k$-attributes $\{A_1, A_2 \cdots A_k\}$. The
cardinality of the set is the $arity$ of the scheme, denoted as $k$. Each
attribute $A_i$ is associated with its domain: $dom(A)$. A relation scheme could
be written as $S(A_1:dom(A_1),A_2:dom(A_2) \cdots A_k:dom(A_k))$.
\end{definition}
\smallskip
\begin{definition}[Multiset Relation]
A multiset relation $R$ over a relation scheme $S$ is a finite set of pairs
$<t,i>$, where $t$ is a $k$-tuple over $S$ and $i$ is the multiplicity of $t$.
When $i=1$ for every $t$ over $S$, $R$ is a (set-)relation.
\end{definition}
\subsection{Aggregations}
We call the classical aggregate function operators: \texttt{COUNT, SUM, MIN,
MAX, AVG} and the operator \texttt{GROUP BY} as \textit{aggregations (aggs)},
and we refer to a SQL query with any aggs as an \textit{agg query}. Similarly, the
SQL query without aggs is called the \textit{non-agg} query. We consider agg
operators to be different because their results can contain tuples that are not
part of the input relation.
\textbf{Group By}. Hella etc.~\cite{hell99logics} pointed out this operator
produces an intermediate result, which is a set of grouped tuples.
As as long as we use the current SQL syntax, we cannot extract this
intermediate result explicitly with a query.
\textbf{Aggregate Function}. These functions always run on a group, which can
be a result of a \texttt{GROUP BY}. They always produce an one-attribute one-tuple
relation as the result for each and every group.
\subsection{Problem Statement}
At high level, our approach tests a DBMS as follows.
Given a seed query $Q$, we first generate many query mutants by performing different transformations on $Q$. We then run the pair formed by $Q$ with one of the mutant on the tested DBMS. If the DBMS does not produce same result set for them, then a correctness bug is detected.
To transform a SQL query,
we can walk over the production rules of the SQL's context-free grammar, as in conventional grammar-based testing.
However, randomly applying the production rules is inefficient in generating both
syntactically and semantically valid queries~\cite{zhong2020squirrel}, and it can produce many nonequivalent query pairs.
Thus, in this work, the key technical challenge we address is as follows:
\mybox{Given a query $Q_A$, automatically find transformations to
generate candidate mutants $Q_B$ etc., such that
$Q_A$, $Q_B$ are equivalent.}
}
The cornerstone of our solution is to use the property of
\textit{duplicate sensitivity} to guide the generation of candidate query mutants.
In the following section, we present the theoretical foundation and the technical detail of our approach.
\section{Related Work}\label{sec:related}
In this section, we discuss the
approach for testing DBMS with an emphasis on correctness bugs. Particularly, we
show how the related works solve the problem of deciding the expected result set
of a query.
\smallskip{\textbf{Constraint Solving}}. A previous common solution to generate
the expected result of a given query is to use constraint solving. ADUSA~\cite{08adusa,abdul2010automated} generates test oracle by translating a
SQL query to an Alloy \cite{wb-alloy} specification, which describes the
constraints in a query. By solving the constraints with an SMT solver, it knows
which concrete values can satisfy the constraint and should be returned by the
original query. It then inserts the value to the DBMS as data and checks if
executing the query will return the same value. However, due to the incomplete
model, ADUSA can only convert query with limited data types to Alloy
specification. For example, it cannot convert a DBMS varchar field into the
Alloy language. Qex ~\cite{veanes2009symbolic,veanes2010qex} is another
symbolic query explorer which models more SQL features, but its practical
adoption is hindered by high overhead in symbolically processing big tables and
complex joins.
More recently, PQS~\cite{Rigger2020PQS} synthesizes queries instead of solving
constraints.
It implements an expression generator, which takes a table row
from the database and generates an expression that is evaluated to true on the
row. Then it runs the query in the DBMS and checks if the row is contained in a
query using the generated expression as the ``where'' condition. Though PQS can
generate the test oracle more practically than the previous work, it can only reveal
bugs with a symptom of missing the picked row. Compared to all the previous
works, our idea is more generally applicable to the DBMS, and it can detect bugs
having different symptoms (e.g., ``order by'' has wrong ordering).
\smallskip{\textbf{Differential Testing}}.
Differential testing is a common approach to decide which result set is
incorrect. RAGS~\cite{slutz1998massive} and SparkFuzz~\cite{ghit2020sparkfuzz}
are in this category. They compare the result sets of one query from several
chosen DBMSs, which are expected to return the same result set. The SQL Server
team proposed a self-differential approach~\cite{09microsoft} for their query
optimization rules, which compares results of the same query with turning on and
off the optimization. However, differential testing cannot be used to test
unique extensions such as PostgreSQL's data type \texttt{path} to save a
geometric path on a plane~\cite{wb-pgtype}.
\smallskip{\textbf{Metamorphic Testing}}. The key idea of metamorphic testing is
to detect output violations of a bunch of related test
cases~\cite{02metamorphic}. In the context of our problem, it means to derive
from the existing queries to obtain query mutants that have known result sets.
Similarly, NoREC~\cite{20norec} constructs a non-optimizing version of a query
and compares the result. However, they are only limited to testing the
optimization, while our approach generally tests the DBMS.
MutaSQL~\cite{20mutasql} takes a given equivalent transformation and construct a
pair of equivalent queries and reports a bug when they return different result
sets. In comparison, our approach use guided synthesis to discover new equivalent
transformations, not relying on developer knowledge to provide them.
\section{Threats to Validity}
Construct validity is concerned with the issue of whether random testing is enough
to demonstrate bug detection capability of our tool. We use a random database
and query generator to test the DBMS, depending on the generator the database
and query may not represent the overall distribution, they should be generated
to maximize features of the DBMS.
The threats to internal validity lie in the online query equivalent checker.
Because we need to filter the invalid candidates during runtime, it depends on
the checker to provide the result. Our query generation speed is largely limited
by the capability and overhead of the checker. To reduce the threats, we
implemented fixed transformations inside our tool.
External validity deals with issues that limit the ability to generalize our
results. In our experiment, we have used MySQL-compatible DBMS for evaluating
the effectiveness of our approach. However, because our approach does not rely
on specific features of the tested DBMS and it is not designed for a specific
DBMS, our approach should still work on other DBMSs. |
\section{Introduction}
At the dawn of the twentieth century, a Young diagram was introduced to represent a partition of a positive integer. It is a basic tool in physics to ``count states''. The harmonic oscillator in quantum mechanics is a salient example in which states can be counted by Young diagrams. In mathematics, it was first used in representation theory, and it gradually became versatile in other fields due to its fundamental nature. From the modern viewpoint, it plays the role of bridges that connect different areas.
The seminal paper \cite{Nekrasov:2002qd} considers 4d and 5d gauge theories with eight supercharges on the $\Omega$-background and employs equivariant localizations on instanton moduli spaces. An exact instanton partition function reproduces non-perturbative dynamics of a 4d $\cN=2$ theory \cite{Seiberg:1994rs,Seiberg:1994aj}. Moreover, for a gauge group of type $A$, fixed points of the equivariant action are classified by ordered sets of Young diagrams and the computation of instanton partition functions significantly simplifies to combinatorics of Young diagrams. Consequently, exact results \cite{Nekrasov:2002qd,Pestun:2007rz} in 4d and 5d theories with eight supercharges connect instantons to \emph{BPS/CFT correspondence} in physics (for instance \cite{Alday:2009aq,Nekrasov:2012xe,NPS,BPS/CFT,Kimura-Pestun}), and \emph{geometric representation theory} in mathematics (for instance \cite{Braverman:2004vv,Schiffmann:2012aa,Maulik:2012wi,Braverman:2014xca}).
A 5d theory on the $\Omega$-background effectively reduces to supersymmetric quantum mechanics on instanton moduli spaces.
For gauge groups of type $BCD$, an instanton moduli space admits an ADHM description \cite{Atiyah:1978ri}, which is a Nakajima quiver variety \cite{nakajima1994instantons} of Jordan type \cite{Benvenuti:2010pq}. Using the ADHM descriptions, instanton partition functions are successfully expressed as Jeffrey-Kirwan contour integrals in outstanding works \cite{Nekrasov-Shadchin,Kim:2012gu}.
Moreover, $\SO(7)$ and $G_2$ instanton partition functions are written by sums over Young diagrams in \cite{Kim:2018gjo}, employing ingenious representation theoretic methods. Nonetheless, unlike gauge groups of type $A$, it has been an open problem for a long time to classify poles and obtain closed-form expressions as residue sums from the ADHM descriptions for gauge groups of type $BCD$. This paper provides a solution for $\SO(n)$ gauge groups and a conjectural expression for $\Sp(N)$ gauge groups to the long-standing problem at the \emph{unrefined} level in \S\ref{sec:ADHM}.
String theory provides other perspectives for instanton partition functions. For a gauge group of type $A$, the topological vertex \cite{AKMV} computes a partition function from a toric Calabi-Yau three-fold thanks to geometric engineering \cite{Katz:1996fh,Katz:1997eq}. Also, the duality \cite{Leung-Vafa} between a toric Calabi-Yau three-fold and a $(p,q)$-fivebrane web allows us to identify it with the partition function of a 5d gauge theory on an intersection of fivebranes where instantons are realized by D1-branes on D5-branes. A 5d gauge theory with a gauge group of type $BCD$ is realized on a stack of $N$ D5-branes on an O5-plane in string theory. Recently, an analog of the topological vertex for an O5-plane is proposed in \cite{Hayashi:2020hhb}, called an \emph{O-vertex}. Using the O-vertex, we obtain a closed-form expression of a partition function of an $\SO(n)$ gauge theory in \S\ref{sec:O}. Remarkably, it coincides with the expression obtained from the ADHM description. At the end of \S\ref{sec:O}, we also show that the O-vertx can provide a closed-form expression of the $G_2$ instanton partition function by using fivebrane web diagrams \cite{G-type,Hayashi:2018lyv}.
This paper aims to present unrefined instanton partition functions for gauge groups of type $BCD$ as concisely as possible. Since Jeffrey-Kirwan contour integrals from the ADHM descriptions are rather complicated, we delegate the pole analysis to Appendix \ref{app:ADHM}. Also, detailed computations for correlation functions involving the O-vertex are given in Appendix \ref{app:M-proof}. In Appendix \ref{app:4d}, we give expressions of 4d unrefined instanton partition functions for gauge groups of type $BCD$. We believe that we use the standard notations in literature. Nevertheless, the reader can refer to Appendix \ref{app:notations} for notations and definitions necessary for this paper.
\section{Instantons from ADHM}\label{sec:ADHM}
\subsection{$\SO(n)$ instanton partition functions}\label{sec:SO-ADHM}
A 5d theory on the $\Omega$-background effectively reduces to supersymmetric quantum mechanics on the instanton moduli spaces. Fortunately, the $k$-instanton moduli space for $\SO(n)$ gauge group admits a standard ADHM formulation. Hence, the supersymmetric quantum mechanics on the $k$-instanton moduli space is described by the $\Sp(k)$ gauge theory with one hypermultiplet in the second rank antisymmetric representation and $n$ hypermultiplets in the fundamental representation \cite{Nekrasov-Shadchin,Benvenuti:2010pq}.
The partition function \cite{Nekrasov-Shadchin} of the supersymmetric quantum mechanics is given by the contour integral
\begin{align}\label{SO-contour}
Z^{k}_{\SO(n)}=&\frac{1}{k!2^k}\oint\prod_{I=1}^k\frac{d\phi_I}{2\pi i}\cdot
\frac{\prod\limits_{I\neq J}2\sinh\frac{\phi_{I}-\phi_{J}}{2}\cdot
\prod\limits_{I,J}2\sinh\frac{2\epsilon_+-\phi_{I}+\phi_{J}}{2}}
{\prod\limits_{I,J}2\sinh\frac{\epsilon_{1,2}+\phi_{I}-\phi_{J}}{2}\prod\limits_{I=1}^k2^\chi \sinh^\chi \frac{\epsilon_{+} \pm \phi_{I}}{2}\prod\limits_{s=1}^N 2\sinh\frac{\epsilon_+\pm\phi_I\pm a_s}{2}}
\cr
&\times\frac{\prod\limits_{I\leq J}2\sinh\frac{\pm(\phi_I+\phi_J)}{2}
\cdot 2\sinh\frac{2\epsilon_+\pm(\phi_I+\phi_J)}{2}}
{\prod\limits_{I<J}2\sinh\frac{\epsilon_{1}\pm(\phi_I+\phi_J)}{2}\cdot 2\sinh\frac{\epsilon_{2}\pm(\phi_I+\phi_J)}{2}}\ .
\end{align}
where $n=2 N+\chi$ with $N=\lfloor \frac{n}{2}\rfloor$, $n \equiv \chi\ (\bmod \ 2)$.
Remarkably, in the unrefined limit $\e_1=-\e_2=\hbar$, the JK-poles are classified by $N$-tuples $\vec{\lambda}$ of Young diagrams with the total number of boxes $\sum_{s=1}^N|\lambda^{(s)}|=k$ as analyzed in Appendix \ref{app:ADHM}.
We specify a pole location associated with a content $(i,j)\in \lambda^{(s)}$ as
\begin{equation}\label{phi(s)}
\phi_{i,j}(s)= a_s+(i-j)\hbar\ .
\end{equation}
By defining a familiar factor \cite{Nekrasov:2002qd}
\begin{equation}\label{Nij}
N_{i,j}(s,t):= a_s- a_t-\hbar(a_{i,j}(\lambda^{(s)})+l_{i,j}(\lambda^{(t)})+1)\ ,
\end{equation}
the residue sum is then expressed as
\begin{align} \label{SO-ADHM}
Z^k_{\SO(n)}= &\sum_{\vec{\lambda}}\prod_{s=1}^N\prod_{(i,j)\in \lambda^{(s)}}
\frac{ 2^{4}\sinh^{4}\phi_{i,j}(s) }
{ {\color{red}{2^{2\chi}\sinh^{2\chi}\frac{\phi_{i,j}(s)}2 }}\prod\limits_{t=1}^N {\color{red}{4\sinh^2\frac{N_{i,j}(s,t)}{2}}}\cdot 4\sinh^2\frac{\phi_{i,j}(s)+ a_t}{2}}\cr
&\times \prod_{s\leq t}^N\prod_{\substack{(i,j)\in \lambda^{(s)},(m,n)\in \lambda^{(t)}\\ (i,j)< (m,n) }}
\frac{16\sinh^4\frac{\phi_{i,j}(s)+\phi_{m,n}(t)}{2}}
{ 4\sinh^2\frac{\phi_{i,j}(s)+\phi_{m,n}(t)\pm\hbar}{2}}~.
\end{align}
Here we define a total ordering on boxes of the Young diagrams:
\be \lambda^{(s)}\ni (i,j)< (m,n)\in \lambda^{(t)} \quad \text{if} \quad \begin{cases}s<t \\ s=t, i<m \\
s=t, i=m, j<n
\end{cases}~.
\ee
The partition function \eqref{SO-ADHM} is invariant under the inverse $A_i \leftrightarrow A_i^{-1}$ of the Coulomb branch parameters.
In the unrefined limit, the set of poles \eqref{phi(s)} are valid even when 5d hypermultiplets in the (anti-)fundamental representation of $\SO(N)$ \cite[(4.14)]{Shadchin:2005mx} are included.
As we will see in \S\ref{sec:O}, the formula admits an interpretation of the extended topological vertex formalism with an O5-plane. In fact, the terms colored by red in (\ref{SO-ADHM}) correspond to the Nekrasov factors \eqref{Nekfactor} that appear in the $\U(N)$ instanton partition functions. On the other hand, the other black part corresponds to the contribution from O5-plane, and we call it the $M$-factor \eqref{product}. Comparing with \eqref{SOeven-TV} and \eqref{SOodd-TV} from the topological vertex, we observe that we can rewrite \eqref{SO-ADHM} as
\begin{align}\label{SO-ADHM2}
&Z^k_{\SO(n)}=\cr= &\sum_{\vec{\lambda}}\prod_{s=1}^N\prod_{(i,j)\in\lambda^{(s)}} \frac{4\sinh^2\frac{2 a_s+\hbar (i-j+(\lambda^\vee)_{j}^{(s)}-\lambda_{i}^{(s)})}{2}}{2^{2\chi}\sinh^{2\chi}\frac{\phi_{i,j}(s)}2 \prod\limits_{t=1}^N 4\sinh^2\frac{N_{i,j}(s,t)}{2}} \\
&\prod_{1\le s< t\le N}\frac{1}{\prod\limits_{(i,j)\in\lambda^{(s)}}4\sinh^2\frac{ a_s+ a_t+\hbar(i+j-1-\lambda^{(s)}_{i}-\lambda^{(t)}_{j})}{2} \prod\limits_{(m,n)\in\lambda^{(t)}}4\sinh^2\frac{ a_s+ a_t+\hbar (1-m-n+(\lambda^{(t)})^\vee_{n}+(\lambda^{(s)})^\vee_{m})}{2}}~.\nonumber
\end{align}
The formulas \eqref{SO-ADHM} and \eqref{SO-ADHM2} allow us to check the Lie algebra theoretic relations among instanton partition functions.
For instance, the isomorphism $\mathfrak{so}(4)\simeq \mathfrak{su}(2)\oplus\mathfrak{su}(2)$ indicates the identity of the partition functions
$$
Z_{\SO(4)}(A_1= Q_1,A_2=Q_1Q_2)=Z_{\SU(2)}(A_1=Q_2)Z_{\SU(2)}(A_1=Q_1Q_2)Z_{\U(1)}~,
$$
where
$$
Z_{\U(1)}=\exp\Bigl(\sum_{k=1}^\infty\frac{\frakq^kq^k}{k(1-q^k)^2}\Bigr)~.
$$
Here $\frakq$ is the instanton counting parameter, and we confirm this identity up to 10-instanton.
The isomorphism $\mathfrak{so}(6)\simeq\mathfrak{su}(4)$ of Lie algebras leads to the equality of the partition functions $$Z_{\SO(6)}(A_1,A_2,A_3)=Z_{\SU(4)}(A_1,A_2,A_3)~,$$ which we verify up to 6-instanton. Furthermore, using an embedding $\SU(4)\subset \SO(7)$, the $\SO(7)$ instanton partition function has been written as a sum over 4-tuples of Young diagrams in \cite[(2.18)]{Kim:2018gjo}. Although the expression \eqref{SO-ADHM} for $\SO(7)$ is written in terms of a sum over 3-tuples of Young diagrams, we check that it agrees with the unrefined limit of \cite[(2.18)]{Kim:2018gjo} up to 6-instanton.
\subsection{$\Sp(N)$ instanton partition functions}\label{sec:Sp-ADHM}
Similarly, the $\Sp(N)$ instanton moduli space can be also described by the ADHM quiver.
Supersymmetric quantum mechanics on the $k$-instanton moduli space is described by the $\OO(k)$ gauge theory with one hypermultiplet in the second rank symmetric representation and $N$ hypermultiplets in the fundamental representation \cite{Nekrasov-Shadchin,Benvenuti:2010pq}. Since $\OO(k)$ has two connected components $\OO(k)_\pm$ ($\det =\pm$), the instanton partition function receives contribution $Z^{k}_\pm$ from each connected component $\OO(k)_\pm$. A choice of taking the sum or difference of $Z^{k}_\pm$ corresponds to the one of the discrete $\theta$-angle that originates from $\pi_4(\Sp(N))=\mathbb{Z}_2$ \cite{Bergman:2013ala}. Thus, the $k$-instanton partition function with trivial $\theta$-angle is given by
\begin{equation}
Z^k_{\theta=0}=\frac{Z^k_++ Z^k_-}{2}\ ,
\end{equation}
whereas that with non-trivial $\mathbb{Z}_2$ element is given by
\begin{equation}
Z^k_{\theta=\pi}=(-1)^k\frac{Z^k_+-Z^k_-}{2}\ .
\end{equation}
Using the description of supersymmetric quantum mechanics on the ADHM description, the contour integral expressions of $\Sp(N)$ instanton partition functions are given in \cite{Kim:2012gu,Kim:2012qf,Hwang:2014uwa}. The formulas are rather involved so that we summarize the integral expressions in Appendix \ref{app:ADHM}. In the unrefined limit, the JK-residues of $Z^{k}_\pm$ are classified by $(N+4)$-tuples of Young diagrams with the total number of boxes $\sum_{s=1}^{N+4}|\lambda^{(s)}|=\ell$. The relation between the instanton number $k$ and the total number $\ell$ of boxes will be given below. More remarkably, they can be expressed by a single universal formula
\begin{align} \label{Sp-ADHM}
\wt Z_{\Sp(N)}^\ell(A_1,\ldots,A_{N+4};q)= &\sum_{\vec{\lambda}}C_{\vec{\lambda},\vec{A}}\prod_{s=1}^{N+4}\prod_{(i,j)\in \lambda^{(s)}}
\frac{2^{4}\sinh^{4}\phi_{i,j}(s)}
{\prod\limits_{t=1}^{N+4} 4\sinh^2\frac{N_{i,j}(s,t)}{2}\cdot 4\sinh^2\frac{\phi_{i,j}(s)+ a_t}{2}}\cr
&\times \prod_{s\leq t}^{N+4}\prod_{\substack{(i,j)\in \lambda^{(s)},(m,n)\in \lambda^{(t)}\\ (i,j)< (m,n) }}
\frac{16\sinh^4\frac{\phi_{i,j}(s)+\phi_{m,n}(t)}{2}}
{ 4\sinh^2\frac{\phi_{i,j}(s)+\phi_{m,n}(t)\pm\hbar}{2}},
\end{align}
where $\phi_{i,j}(s)$ and $N_{i,j}(s,t)$ are given in \eqref{phi(s)} and \eqref{Nij}, and $C_{\vec{\lambda},\vec{A}}$ is a constant
\be\label{weight}
C_{\vec{\lambda},\vec{A}}=\prod_{s=N+1}^{N+4}C_{\lambda^{(s)},A_s}~.
\ee
Each constant is defined as follows: $C_{\lambda^{(s)}=\emptyset,A_s}=1$, and
\begin{align}\label{weight2}
C_{\lambda^{(s)},A_s=\pm1,\pm q^{\frac12}}&=\frac{2^{2m-1}}{\begin{pmatrix}2m-1\\m-1\end{pmatrix}}\qquad \textrm{ where $m$ is the number of rows with $\lambda_j^{(s)}\ge j$}~,\cr
C_{\lambda^{(s)},A_s=\pm q}&=\frac{2^{2m}}{\begin{pmatrix}2m+1\\m\end{pmatrix}}\qquad \textrm{ where $m$ is the number of rows with $\lambda_j^{(s)}\ge j+1$}~.
\end{align}
(See also \eqref{const1} and \eqref{const2} for more illustrative description.)
These constants are in principle determined by the number of poles and the determinant of JK vectors that define a cone, and we \emph{conjecture} \eqref{weight2} by comparing \eqref{Sp-ADHM} and JK-residues of \eqref{Sp-contour}.
The formula \eqref{Sp-ADHM} is a close cousin of that of $\SO(2N)$ instanton partition function \eqref{SO-ADHM}. The difference is that the non-trivial constant \eqref{weight} is involved, and poles of four other types ($s=N+1,\ldots,N+4$) do not involve the Coulomb branch parameters. Note that \eqref{Sp-ADHM} can be written as in the form of \eqref{SO-ADHM2}.
Performing the JK residues as in Appendix \ref{app:ADHM}, $Z^k_\pm$ can be written as
\begin{align}\label{Sp-ADHM-pm}
Z^{k=2\ell}_+=& 2 \wt Z_{\Sp(N)}^{\ell}(A_1,\ldots,A_N,A_{N+1}=q^{\frac12},A_{N+2}=-q^{\frac12},A_{N+3}=1,A_{N+4}=-1;q) \cr
Z^{k=2\ell+1}_+=&\frac{1}{4 \sinh^2 \frac{\hbar}{2} \prod\limits_{i=1}^{N} 4 \sinh^2 \frac{ a_{i}}{2}}\cr
& \wt Z_{\Sp(N)}^{\ell}(A_1,\ldots,A_N,A_{N+1}=q^{\frac12},A_{N+2}=-q^{\frac12},A_{N+3}=q,A_{N+4}=-1;q) \cr
Z^{k=2\ell}_-= &2(-1)^{N}\frac{1}{4 \sinh^2 \frac{\hbar}{2}\cdot 4 \sinh^2 \hbar \prod\limits_{i=1}^{N} 4 \sinh^2\left( a_{i}\right)} \cr
& \wt Z_{\Sp(N)}^{\ell-1}(A_1,\ldots,A_N,A_{N+1}=q^{\frac12},A_{N+2}=-q^{\frac12},A_{N+3}=q,A_{N+4}=-q;q) \cr
Z^{k=2\ell+1}_-=& (-1)^{N}\frac{1}{4 \sinh^2 \frac{\hbar}{2} \prod\limits_{i=1}^{N} 4 \cosh^2 \frac{ a_{i}}{2}} \cr
& \wt Z_{\Sp(N)}^{\ell}(A_1,\ldots,A_N,A_{N+1}=q^{\frac12},A_{N+2}=-q^{\frac12},A_{N+3}=1,A_{N+4}=-q;q)~.
\end{align}
The pole structure will remain as it is even if we include 5d hypermultiplets in the (anti-)fundamental representations \cite[(3.48)--(3.50)]{Hwang:2014uwa}.
Again, we can check the Lie algebra theoretic relations of instanton partition functions.
The isomorphisms $\mathfrak{sp}(1)\simeq\mathfrak{su}(2)$ and $\mathfrak{sp}(2)\simeq\mathfrak{so}(5)$ of Lie algebras lead to the equality of the partition functions
\bea\nonumber
Z_{\Sp(1)}(A_1)_{\theta=0}=&Z_{\SU(2)}(A_1)~,\cr
Z_{\Sp(2)}(A_1=Q_1Q_2,A_2=Q_1)_{\theta=0}=&Z_{\SO(5)}(A_1=Q_1,A_2=Q_1Q_2^2) ~.
\eea
We check the first and second equality up to 17-instanton and 16-instanton, respectively.
We can also use string duality to check the formulas.
The 5d $\Sp(N)$ pure gauge theory can be realized by a stack of $N$ D5-branes with an O7${}^-$-plane. By splitting an O7${}^-$-plane into two $(p,q)$-sevenbranes \cite{Sen:1996vd} and performing Hanany-Witten transitions \cite{Hanany:1996ie}, one can obtain a fivebrane diagram \cite[Figure 14]{Hayashi:2016jak} from which the partition function is computed by the topological vertex. The resulting formula is expressed as a sum over $2N$-tuples of Young diagrams with $k$ the total number of boxes. We verify the agreement up to 5-instanton for $\Sp(N)$ $(N<7)$ with both trivial and non-trivial $\theta$-angle. Thus, the string duality yields the highly non-trivial identities for the $\Sp(N)$ instanton partition function.
\section{Instantons from O-vertex}\label{sec:O}
Topological string theory provides an alternative and powerful way to compute instanton partition functions of 5d $\cN=1$ gauge theories. In the case of quiver gauge theories with gauge groups of type $A$, a chain of string dualities takes the gauge theory to the A-model of topological string theory defined on toric Calabi-Yau manifold \cite{Katz:1996fh,Katz:1997eq,Leung-Vafa}. The topological vertex formalism \cite{AKMV,Awata:2005fa,IKV} expresses partition functions in terms of sums over Young diagrams, which strikingly simplifies the evaluations of the partition functions. Recently, inspired by the work of \cite{Kim-Yagi} and its S-dual configuration \cite{D-type}, an extended version of topological vertex formalism was developed for 5d gauge theories with $\SO(n)$ gauge groups \cite{Hayashi:2020hhb} in which a new topological vertex, called the O-vertex, was introduced for O5${}^-$-plane. In this section, we obtain a closed-form analytic expression of the instanton partition function of the 5d $\SO(n)$ pure gauge theory in terms of Young diagrams from the extended topological vertex formalism. The results are consistent with the expressions obtained from the ADHM descriptions in the previous section.
As a by-product, we also present a closed-form expression of the $G_2$ instanton partition function by using the O-vertex.
\subsection{$\SO(2N)$ instantons}
The brane construction of the 5d $\cN=1$ SO($2N$) pure gauge theory is well-known in string theory: one can put $N$ D5-branes on the top of O5${}^-$ orientifold (see (\ref{o-vert-soeven})).
\begin{align}
\begin{tikzpicture}
\draw [dashed] (-2,0)--(6,0);
\draw (0,0)--(1,0.5);
\draw (1,0.5)--(3,0.5);
\draw (3,0.5)--(4,0);
\draw (1,0.5)--(1.5,1);
\draw (1.5,1)--(2.5,1);
\draw (2.5,1)--(3,0.5);
\draw (1.5,1)--(1.5,1.5);
\draw (1.5,1.5)--(2.5,1.5);
\draw (2.5,1)--(2.5,1.5);
\draw (1.5,1.5)--(1.3,1.7);
\draw (2.5,1.5)--(2.7,1.7);
\draw[dotted] (1,2) -- (0.2,2.8);
\draw[dotted] (3,2) -- (3.8,2.8);
\draw (0,3)--(4,3);
\draw (-2,3.5)--(6,3.5);
\draw (-2,3.5)--(0,3);
\draw (4,3)--(6,3.5);
\draw (6,3.5)--(7,3.6);
\draw (-2,3.5)--(-3,3.6);
\draw[<->,dotted] (-2,0.05)--(-2,0.45);
\node at (-2,0.25) [left] {$Q_1$};
\draw[<->,dotted] (-2,0.55)--(-2,0.95);
\node at (-2,0.75) [left] {$Q_2$};
\draw[<->,dotted] (-2,1.05)--(-2,1.45);
\node at (-2,1.25) [left] {$Q_3$};
\draw[<->,dotted] (1.55,1.1)--(2.45,1.1);
\node at (2,1) [above] {$Q$};
\draw[<->,dotted] (-2,3.05)--(-2,3.45);
\node at (-2,3.25) [left] {$Q_{N}$};
\node at (2,0) [below] {O5${}^-$};
\node at (5,0) [below] {O5${}^+$};
\node at (-1,0) [below] {O5${}^+$};
\end{tikzpicture}
\label{o-vert-soeven}
\end{align}
It is proposed in \cite{Hayashi:2020hhb} that an extended version of the topological vertex can be applied to the above brane web with orientifold. In this proposal, topological vertices $C_{\mu\nu\lambda}$ are assigned to trivalent vertices as usual, while a new type of topological vertex called O-vertex is attached to the intersection point of the orientifold and (2,1)-brane:
\begin{align}
\begin{tikzpicture}
\draw [dashed] (-2,0)--(2,0);
\draw (0,0)--(1,0.5);
\node at (1,0.5) [above] {$\nu$};
\node at (1,0) [below] {O5${}^-$};
\node at (-1,0) [below] {O5${}^+$};
\node at (0,0.5) {$V_\nu$};
\end{tikzpicture}
\label{o-vert}
\end{align}
where $V_\nu$ is defined as the following entry
\ba
V_\nu(-P)^{|\nu|}=\bra{0}\mathbb{O}(P,q)\ket{\nu},
\ea
of the vertex operator,
\begin{equation}\label{Overtex}
\mathbb{O}(P, q)=\exp (\sum_{n=1}^{\infty}-\frac{P^{2 n}(1+q^{n})}{2 n(1-q^{n})} J_{2 n}+\frac{P^{2 n}}{2 n} J_{n} J_{n}).
\end{equation}
Here, we use the vertex-operator formalism of the topological vertex (see Appendix \ref{app:notations}), and $J_n$ are the modes of the free boson.
The intersection point in the following diagram,
\begin{align}
\begin{tikzpicture}[xscale=-1]
\draw [dashed] (-2,0)--(2,0);
\draw (0,0)--(1,0.5);
\node at (1,0.5) [above] {$\nu$};
\node at (0,0.5) {$W_\nu$};
\node at (1,0) [below] {O5${}^-$};
\node at (-1,0) [below] {O5${}^+$};
\end{tikzpicture}
\label{o-vert-w}
\end{align}
is assigned the dual O-vertex,
\ba
W_\nu(-P)^{|\nu|}q^{\frac{\kappa(\nu^\vee)}{2}}=\bra{0}\mathbb{O}(P,q)\ket{\nu^\vee}.
\ea
By applying the extended topological vertex formalism to the web diagram (\ref{o-vert-soeven}), the partition function can be written as
\begin{align}
Z_{\SO(2N)}^{\textrm{top}}
=&\sum_{\vec{\lambda},\vec{\nu},\vec{\mu}} (-Q)^{\sum_{s=1}^N |\lambda^{(s)}|} (-Q_1)^{|\nu^{(1)}|+|\mu^{(1)}|}(-Q_2)^{|\nu^{(2)}|+|\mu^{(2)}|+|2\lambda^{(1)}|} V_{\nu^{(1)}} W_{\mu^{(1)}} \prod_{t=2}^N f_{\nu^{(t)}}^{-1}f_{\mu^{(t)}} \cr
& \times \prod_{r=3}^{N} (-Q_r)^{|\nu^{(r)}|+|\mu^{(r)}|+|2(r-3)\lambda^{(r)}|} \prod_{s=1}^N f_{\lambda^{(s)}}^{5-2s} C_{(\nu^{(s)})^\vee \nu^{(s+1)} (\lambda^{(s)})^\vee } C_{(\mu^{(s)})^\vee \lambda^{(s)} \mu^{(s+1)}},\nonumber
\end{align}
where the summation is performed over $(3N)$-tuples Young diagrams $(\vec{\lambda},\vec{\nu},\vec{\mu})=(\lambda^{(s)},\nu^{(s)},\mu^{(s)})$ ($s=1,\ldots N$) and we set $\nu^{(N+1)}=\emptyset=\mu^{(N+1)}$.
We expect the above partition function to reproduce the 5d partition function with $\SO(2N)$ gauge group; more precisely, we have
\ba
Z_{\SO(2N)}^{\textrm{top}}=Z_{\SO(2N)}^{\textrm{root}}Z_{\SO(2N)}^{\textrm{inst}},
\ea
where
\ba
Z_G^{\textrm{root}}=\textrm{PE}\lt(\frac{2q}{(1-q)^2}\sum_{\alpha\in\Delta_+}e^{-\alpha\cdot a }\rt),
\ea
is the one-loop factor of the 5d gauge theory, and $Z^{\textrm{inst}}_G$ is the instanton partition function investigated in \S\ref{sec:ADHM}. Note that $Z_{\SO(2N)}^{\textrm{root}}$ can be obtained in the extended topological formalism by setting all $\lambda^{(s)}=\emptyset$.
Summations over $\nu^{(s)},\mu^{(s)}$ can be expressed as a correlation function of vertex operators including the O-vertex \eqref{Overtex}
\begin{align}
&\sum_{\nu^{(s)}}V_{\nu^{(1)}} \prod_{s=1}^N Q_s^{|\nu^{(s)}|}s_{\nu^{(s)}/\nu^{(s+1)}}(q^{-\rho-\lambda^{(s)}})=\bra{0}\mathbb{O}(A_1,q)\prod_{s=1}^N V_-(A_sA_1^{-1} q^{-\rho-\lambda^{(s)}})\ket{0}~.
\end{align}
where $V_-$ is the vertex operator \eqref{VO} for the skew Schur function, and the Coulomb branch parameters are written as $$A_{s}:=\prod_{j=1}^{s} Q_{j}~.$$
This simplifies an expression of the 5d instanton partition function
\begin{align}\label{SOeven-TV}
Z_{\SO(2N)}^{\textrm{inst}}=\frac{Z_{\SO(2N)}^{\textrm{top}}}{Z_{\SO(2N)}^{\textrm{root}}}=&\sum_{\vec{\lambda}}Q^{\sum_{s=1}^N |\lambda^{(s)}|} Q_2^{|2\lambda^{(1)}|}\prod_{r=3}^{N} Q_r^{|2(r-3)\lambda^{(r)}|} \prod_{s=1}^N q^{\frac{(5-2s)\kappa(\lambda^{(s)})}{2}} \\
& \qquad \times s_{\lambda^{(s)}}(q^{-\rho})s_{(\lambda^{(s)})^\vee}(q^{-\rho}) M_{\vec{\lambda}}(\vec{A})^2 \prod_{1\le s< t\le N} N_{\lambda^{(s)}\lambda^{(t)}}(A_{t}A_s^{-1},q)^{-2}~,\nonumber
\end{align}
where $N_{\mu\nu}$ is the Nekrasov factor \eqref{Nekfactor} and the $M$-factor is defined by
\be\label{M-factor}
M_{\vec{\lambda}}(\vec{A}):=\frac{\bra{0}\mathbb{O}(A_1,q)\prod_{s=1}^N V_-(A_sA_1^{-1} q^{-\rho-\lambda^{(s)}})\ket{0}}{\bra{0}\mathbb{O}(A_1,q)\prod_{s=1}^N V_-(A_sA_1^{-1} q^{-\rho})\ket{0}}~.
\ee
Thus, the $k$-instanton partition function with $\SO(2N)$ gauge group receives contributions from $\vec{\lambda}=(\lambda^{(1)},\ldots,\lambda^{(N)})$ with $k=\sum_{s=1}^N|\lambda^{(s)}|$.
Applying the Baker-Campbell-Hausdorff formula
\be
e^Xe^Y = e^{Y}e^{X-\lt[Y,X\rt]+\frac{1}{2}\lt[Y,\lt[Y,X\rt]\rt]-\frac{1}{3!}\lt[Y,\lt[Y,\lt[Y,X\rt]\rt]\rt]+\dots},
\ee
the $M$-factor can be written as
\be\label{PE}
M_{\vec{\lambda}}(\vec{A})=\text{PE}\Bigl[\frac{qX}{2(1-q)^2}\Bigr]
\ee
where
\begin{align}
X:=&\Bigl[\sum_{s=1}^N A_s\bigl(q^{\ell(\lambda^{(s)})}+(1-q)\sum_{i=1}^{\ell(\lambda^{(s)})}q^{i-1-\lambda^{(s)}_i}\bigr)\Bigr]^2- \Bigl[\sum_{s=1}^N A_s\Bigr]^2 \cr
&-\Bigl[\sum_{s=1}^N A_s^2\bigl(q^{2\ell(\lambda^{(s)})}-1+(1-q^2)\sum_{i=1}^{\ell(\lambda^{(s)})}q^{2(i-1-\lambda^{(s)}_i)}\bigr)\Bigr]
\end{align}
One can show that this can be written as
\begin{align}\label{product}
&M_{\vec{\lambda}}(\vec{A})=\\=&\frac{\displaystyle\prod_{s=1}^N\prod_{(i,j)\in\lambda^{(s)}}(1-A_{s}^{2}q^{i-j+(\lambda^\vee)_{j}^{(s)}-\lambda_{i}^{(s)})})}
{\displaystyle\prod_{1\le s< t\le N}\prod_{(i,j)\in\lambda^{(s)}}(1-A_{s} A_{t} q^{i+j-1-\lambda^{(s)}_{i}-\lambda^{(t)}_{j}})\prod_{(m,n)\in\lambda^{(t)}}(1-A_{s} A_{t} q^{1-m-n+(\lambda^{(t)})^\vee_{n}+(\lambda^{(s)})^\vee_{m}})}~.\nonumber
\end{align}
The equality between \eqref{PE} and \eqref{product} is given in Appendix \ref{app:M-proof}. Note that the $M$-factor is invariant under the permutation group
$$
M_{\lambda^{(1)},\ldots,\lambda^{(N)}}(A_1,\ldots,A_{N})=M_{\lambda^{(\sigma(1))},\ldots,\lambda^{(\sigma(N))}}(A_{\sigma(1)},\ldots,A_{\sigma(N)})
$$
for $\forall \sigma \in \frakS_N$. Plugging the expression \eqref{product} into \eqref{SOeven-TV}, it is equal to \eqref{SO-ADHM2}.
Let us remark that another approach to the $\SO(2N)$ instanton partition functions was proposed in \cite{Ohmori-Hayashi} by the topological vertex with ``trivalent gluing''. Although the method in \cite{Ohmori-Hayashi} has its own advantage (such as applications to gauge groups of other types), it is computationally expensive for $\SO(2N)$ gauge theories. The vertex-operator formalism of the O-vertex in this section provides a closed-form expression \eqref{SOeven-TV} as a sum over $N$-tuples of Young diagrams. Our formula is computationally efficient so that it would be desirable to find a synergy between our approach and the trivalent gluing in \cite{Ohmori-Hayashi}.
\subsection{$\SO(2N+1)$ instantons}
In string theory, the 5d $\cN=1$ SO($2N+1$) pure gauge theory is realized by $N$ D5-branes with an $\wt{\textrm{O5}}^-$-plane, which is equivalent to an ${\textrm{O5}}^-$-plane with $\frac12$ D5-brane. The ``effective" brane web of 5d $\SO(2N+1)$ theories that can be used in the extended topological vertex is given in \cite{Zafrir:2015ftn,Bertoldi:2002nn,Hayashi:2020hhb}
\begin{align}
\begin{tikzpicture}
\draw [dashed] (-2,0)--(6,0);
\draw (0,0)--(1,0.5);
\draw (1,0.5)--(2.75,0.5);
\draw (1,0.5)--(1.5,1);
\draw (1.5,1)--(2.75,1);
\draw (1.5,1)--(1.5,1.5);
\draw (1.5,1.5)--(3.25,1.5);
\draw (1.5,1.5)--(1.5-.2,1.5+.2);
\draw (2.75,1)--(3.25,1.5);
\draw (3.25,1.5)--(3.25+.3,1.5+.15);
\draw (3,0.25)--(3.5,0);
\draw (3,0.25)--(2.5,0.25);
\draw (3,0.25)--(2.75,0.5);
\draw (2.75,0.5)--(2.75,1);
\draw[dotted] (1.1,2) -- (0.6,2.8);
\draw[dotted] (3.8,2) -- (4.8,2.8);
\draw (0.5,3)--(5,3);
\draw (-1,3.5)--(7,3.5);
\draw (-1,3.5)--(0.5,3);
\draw (5,3)--(7,3.5);
\draw (7,3.5)--(8.5,3.6);
\draw (-1,3.5)--(-2,3.6);
\node at (2.5,0.25) [left] {$\emptyset$};
\draw[<->,dotted] (3.6,0)--(3.6,0.3);
\node at (3.6,0.3) [right] {$Q_0$};
\draw[<->,dotted] (1.6,1.1)--(2.7,1.1);
\node at (2.2,1.1) [above] {$Q$};
\draw[<->,dotted] (-1.5,0.05)--(-1.5,0.45);
\node at (-1.5,0.25) [left] {$Q_1$};
\draw[<->,dotted] (-1.5,0.55)--(-1.5,0.95);
\node at (-1.5,0.75) [left] {$Q_2$};
\draw[<->,dotted] (-1.5,1.05)--(-1.5,1.45);
\node at (-1.5,1.25) [left] {$Q_3$};
\draw[<->,dotted] (-1.5,3.05)--(-1.5,3.45);
\node at (-1.5,3.25) [left] {$Q_{N}$};
\node at (2,0) [below] {O5${}^-$};
\node at (5,0) [below] {O5${}^+$};
\node at (-1,0) [below] {O5${}^+$};
\end{tikzpicture}
\label{o-vert-soodd}
\end{align}
where we need to take $Q_0\rightarrow 1$ limit at the end of the calculation.
Applying the extended topological vertex to the brane web \eqref{o-vert-soodd}, the partition function can be written as
\begin{align}
&Z_{\SO(2N+1)}^{\textrm{top}}\cr
=&\lim_{Q_0\to 1}\sum_{\substack{\vec{\lambda},\vec{\nu},\vec{\mu}\\|\mu^{(0)}| \leq 2|\mu^{(1)}|}} (-Q)^{\sum_{s=1}^N |\lambda^{(s)}|} (-Q_1)^{|\nu^{(1)}|}(-Q_0)^{|\mu^{(0)}|}(-Q_1/Q_0)^{|\mu^{(1)}|}(-Q_2)^{|\nu^{(2)}|+|\mu^{(2)}|+|\lambda^{(1)}|} \cr
&\qquad \times V_{\nu^{(1)}} W_{\mu^{(0)}} C_{(\mu^{(0)})^\vee \mu^{(1)} \emptyset}f_{\mu^{(1)}} \prod_{t=2}^N f_{\nu^{(t)}}^{-1}f_{\mu^{(t)}} \prod_{r=3}^{N} (-Q_r)^{|\nu^{(r)}|+|\mu^{(r)}|+|(2r-5)\lambda^{(r)}|} \cr
&\qquad\times \prod_{s=1}^N f_{\lambda^{(s)}}^{4-2s} C_{(\nu^{(s)})^\vee \nu^{(s+1)} (\lambda^{(s)})^\vee } C_{(\mu^{(s)})^\vee \lambda^{(s)} \mu^{(s+1)}}\nonumber
\end{align}
where the summation is performed over $(3N+1)$-tuples Young diagrams $(\vec{\lambda},\vec{\nu},\vec{\mu})=(\lambda^{(s)},\nu^{(s)},\mu^{(t)})$ ($s=1,\ldots N$, $t=0,\ldots N$) and we set $\nu^{(N+1)}=\emptyset=\mu^{(N+1)}$.
The summations over $\nu^{(s)},\mu^{(t)}$ can be packaged into the $M$-factors \eqref{M-factor}, and the instanton partition function of 5d $\SO(2N+1)$ theory can be extracted out in the same way as
\begin{align}
&Z_{\SO(2N+1)}^{\textrm{inst}}=\frac{Z_{\SO(2N+1)}^{\textrm{top}}}{Z_{\SO(2N+1)}^{\textrm{root}}}\cr
=&\lim_{Q_0 \to 1}\sum_{\vec{\lambda}}(-Q)^{\sum_{s=1}^N |\lambda^{(s)}|} \prod_{s=1}^N q^{(2-s)\kappa(\lambda^{(s)})}s_{\lambda^{(s)}}(q^{-\rho})s_{(\lambda^{(s)})^\vee}(q^{-\rho})N_{\emptyset \lambda^{(s)}}(A_s / Q_0, q)^{-1} \cr
&\times Q_2^{|\lambda^{(1)}|}\prod_{r=3}^{N} Q_r^{|(2r-5)\lambda^{(r)}|}\prod_{1\le s< t\le N} N_{\lambda^{(s)}\lambda^{(t)}}(A_tA_{s}^{-1},q)^{-2}~,\cr
&\times M_{\vec{\lambda}}(\vec{A})M_{\emptyset,\lambda^{(1)},\ldots,\lambda^{(N)}}(Q_0,A_1,\ldots,A_{N})~.\nonumber
\end{align}
It follows from \eqref{product} that the second $M$-factor can be written as
\be\label{M-identity}
M_{\emptyset,\lambda^{(1)},\ldots,\lambda^{(N)}}(Q_0,A_1,\ldots,A_{N})= M_{\lambda^{(1)},\ldots,\lambda^{(N)}}(A_1,\ldots,A_{N})\prod_{s=1}^N N_{\emptyset \lambda^{(s)}}(Q_0 A_s , q)^{-1} ~.
\ee
Thus, we have
\bea\label{SOodd-TV}
Z_{\SO(2N+1)}^{\textrm{inst}}=&\sum_{\vec{\lambda}}(-Q)^{\sum_{s=1}^N |\lambda^{(s)}|} \prod_{s=1}^N q^{(2-s)\kappa(\lambda^{(s)})}s_{\lambda^{(s)}}(q^{-\rho})s_{(\lambda^{(s)})^\vee}(q^{-\rho})N_{\emptyset \lambda^{(s)}}(A_s , q)^{-2} \cr
&\times M_{\vec{\lambda}}(\vec{A})^2 Q_2^{|\lambda^{(1)}|}\prod_{r=3}^{N} Q_r^{|(2r-5)\lambda^{(r)}|}\prod_{1\le s< t\le N} N_{\lambda^{(s)}\lambda^{(t)}}(A_tA_{s}^{-1},q)^{-2}~.
\eea
Using the expression \eqref{product}, it is equal to \eqref{SO-ADHM2}.
\subsection{$G_2$ instantons}
We can also use the extended topological vertex formalism to the 5d $G_2$ pure gauge theory. Indeed,
there are two different ways in the fivebrane web realizations of the 5d $G_2$ pure gauge theory \cite{G-type,Hayashi:2018lyv}. (We take the limit like \eqref{o-vert-soodd} in which the uncolored leg touches the O5-plane in Figure \ref{f:web-G2}.) Applying the extended topological vertex formalism and using the identity \eqref{M-identity} of the $M$-factor, we can show that the two diagrams provide the same formula for the $G_2$ instanton partition function
\bea\label{G2}
Z_{G_2}^{\textrm{inst}}=&\sum_{{\lambda^{(1)}},{\lambda^{(2)}},{\lambda^{(3)}}}(-Q)^{|{\lambda^{(2)}}|+|{\lambda^{(1)}}|}(-QQ_2^2)^{|{\lambda^{(3)}}|}f_{\lambda^{(1)}} f_{\lambda^{(2)}}^{-1}f_{\lambda^{(3)}}^{-2}\prod_{i=1}^3s_{\lambda^{(i)}}(q^{-\rho})s_{{\lambda^{(i)}}^\vee}(q^{-\rho})\cr
&N_{{\lambda^{(1)}}{\lambda^{(2)}}}(Q_1,q)^{-2}N_{{\lambda^{(1)}}{\lambda^{(3)}}}(Q_1Q_2,q)^{-1}N_{{\lambda^{(2)}}{\lambda^{(3)}}}(Q_2,q)^{-1}N_{\emptyset{\lambda^{(1)}}}(Q_2,q)^{-1}\cr
&N_{{\lambda^{(3)}}^\vee\emptyset}(Q_1Q_2^2,q)^{-1}N_{\emptyset{\lambda^{(2)}}}(Q_1Q_2,q)^{-1} N_{{\lambda^{(3)}}^\vee{\lambda^{(1)}}}(Q_1Q_2^3,q)^{-1} N_{{\lambda^{(3)}}^\vee{\lambda^{(2)}}}(Q_1^2Q_2^3,q)^{-1}\cr
&M_{{\lambda^{(1)}},{\lambda^{(2)}},{\lambda^{(3)}}}(Q_2,Q_1Q_2,Q_1Q_2^2)~.
\eea
This expression is equal to \cite[(2.53)]{Kim:2018gjo} with the change of variables $Q_2=e^{-v_1},Q_1Q_2=e^{-v_2},Q_1Q_2^2=e^{v_3}$ if we ignore the matter and take the unrefined limit there.
\begin{figure}[ht]
\begin{center}
\begin{tikzpicture}
\draw [dashed] (-2,-0.5)--(5,-0.5);
\draw (-0.75,-0.5)--(0.75,0.25);
\draw (0.75,0.25)--(2.5,0.25);
\draw[<->,dotted] (0.75,0.25)--(0.75,-0.5);
\node at (0.75,-0.125) [right] {$Q_2$};
\draw[<->,dotted] (0.75,0.25)--(0.75,0.75);
\node at (0.75,0.5) [left] {$Q_1$};
\draw[<->,dotted] (0.75,1.75)--(0.75,0.75);
\node at (0.75,1.25) [left] {$Q_2$};
\draw (0.75,0.25)--(1.25,0.75);
\draw (1.25,0.75)--(3,0.75);
\draw (1.25,0.75)--(1.25,1.75);
\draw (1.25,1.75)--(5,1.75);
\draw (1.25,1.75)--(0.75,2.25);
\draw (2.5,0.25)--(2.5,-0.25);
\draw (2,-0.25)--(2.5,-0.25);
\draw (2.5,0.25)--(3,0.75);
\draw (3,0.75)--(3.5,1);
\node at (2,-0.25) [left] {$\emptyset$};
\draw (2.5,-0.25)--(2.75,-0.5);
\draw (2.75,-0.5)--(5,1.75);
\draw (5.5,2)--(5,1.75);
\node at (3.5,1) [above] {$\emptyset$};
\end{tikzpicture}
\hskip 1cm
\begin{tikzpicture}
\draw[dashed] (-1,0)--(5,0);
\draw (0,0)--(1,0.5);
\draw (1,0.5)--(1.5,0.5);
\draw (1,0.5)--(1.5,1);
\draw (1.5,1)--(1.5,2);
\draw (1.5,2)--(0.5,3);
\draw (0.5,3)--(-0.5,3.5);
\draw (1.5,1)--(3.5,1);
\draw (1.5,2)--(3.5,2);
\draw (3.5,1)--(3.5,2);
\draw (3.5,2)--(3.75,2.25);
\draw (3.5,1)--(4,0.5);
\draw (4,0.5)--(4.5,0.5);
\draw (4,0.5)--(4,0);
\draw (4.1,0)--(4.1,0.45);
\draw (4.1,0.55)--(4.1,3);
\draw (0.5,3)--(4.1,3);
\draw (4.1,3)--(4.6,3.5);
\node at (3.75,2.25) [above] {$\emptyset$};
\node at (1.5,0.5) [right] {$\emptyset$};
\draw[<->,dotted] (0,0.05)--(0,0.95);
\node at (0,0.5) [left] {$Q_2$};
\draw[<->,dotted] (0,1.05)--(0,1.95);
\node at (0,1.5) [left] {$Q_1$};
\draw[<->,dotted] (0,2.05)--(0,2.95);
\node at (0,2.5) [left] {$Q_2$};
\end{tikzpicture}
\end{center}
\caption{Two web diagrams for the 5d $G_2$ pure gauge theory. }
\label{f:web-G2}
\end{figure}
\section{Future directions}
The results in this paper will lead to a variety of natural generalizations. More importantly, we expect that many new research directions will be opened up.
\begin{itemize}
\item \textbf{More general 5d theories:} As briefly mentioned in \S\ref{sec:ADHM}, the partition function with matters in the (anti-)fundamental representation can be naturally obtained. However, more analysis has to be carried out to obtain closed-form expressions of instanton partition functions with matters in higher rank representations or spinor representations of $\SO(n)$ \cite{Hwang:2014uwa,Zafrir:2015ftn,Kim:2018gjo} as well as quiver gauge theories with gauge groups of type $BCD$.
\item \textbf{O-vertex for $\Sp(N)$ instantons:} In \S\ref{sec:O}, we have realized $\SO(n)$ instanton partition functions by applying the extended topological vertex to fivebrane webs with an O5${}^-$-plane in string theory. Although an approach to the $\Sp(N)$ instanton partition functions by the topological vertex has been proposed in \cite{Kim-Yagi}, the forms of the partition functions in \eqref{Sp-ADHM-pm} strongly suggest that there is a formalism of the extended topological vertex analogous to \S\ref{sec:O} for fivebrane webs with an O5${}^+$-plane in string theory.
\item \textbf{Codimension-4 defects and $qq$-characters:} We can also consider instanton partition functions with various defects. In particular, partition functions with codimension-4 defects appear as the $Y$-operator in the $qq$-characters \cite{BPS/CFT,Kim:2016qqs}.
At the refined level, the $qq$-characters for gauge groups of type $BCD$ have infinitely many terms \cite{Haouzi:2020yxy}. However, they truncate to finite terms at the unrefined level. This allows us to study Lie algebra theoretic relations of $qq$-characters, interpretations as quantum Seiberg-Witten curves, and actions of quantum toroidal algebras, which will be addressed in the forthcoming paper \cite{Nawata-Zhu}.
\item \textbf{Relation with blowup equations:} The blowup equation, originally introduced in \cite{Gottsche:2006bm,Nakajima:2009qjc}, provides a powerful tool to compute the instanton partition function recursively. Given the input data such as the one-loop and one-instanton partition function, one can fix the full instanton partition function completely from the blowup equation in principle. It is necessary to show that our expressions for $BCD$ gauge theories satisfy the corresponding blowup equations developed in \cite{Keller:2012da,Kim:2019uqw} as a future work. On the other hand, the relation between the blowup equation and the topological string was revealed in \cite{Huang:2017mis}, and it will be very interesting to explore the role of an orientifold in this context.
\item \textbf{AGT correspondence and $W$-algebras:} The AGT correspondence has been studied exclusively for gauge groups of type $A$ \cite{Alday:2009aq} in the last decade because closed-form expressions of instanton partition functions in terms of Young diagrams were available only for type $A$. The results in this paper need to be examined from the viewpoint of the AGT correspondence and W-algebras \cite{Hollands:2010xa,Hollands:2011zc,Keller:2011ek}.
\item \textbf{Surface defects and isomonodromic deformations:} The discrete Fourier transformations of the unrefined instanton partition functions can be interpreted as the $\tau$-functions of Painleve-type equations \cite{Gamayun:2012ma}. This can be formulated in the framework of the blowup equations with surface defects
\cite{Nekrasov:2020qcq,Jeong:2020uxz}. This program was generalized to arbitrary simple gauge groups in \cite{Bonelli:2021rrg} and the connection with the analytic expression obtained in this paper is to be explored in the future.
\item \textbf{Geometric engineering of O5-plane:} For gauge groups of type $A$, the geometric engineering \cite{Katz:1996fh,Katz:1997eq} connects a 5d gauge theory to a topological string theory of a toric Calabi-Yau three-fold, and a skeleton of the toric Calabi-Yau three-fold is identified with the corresponding fivebrane web \cite{Leung-Vafa}. In this paper, we show that fivebrane webs with an O5${}^-$-plane can be formulated by the extended topological vertex. However, we miss an interpretation of fivebrane webs with an O5${}^-$-plane in terms of a topological string theory of a Calabi-Yau three-fold. In particular, we expect that the instanton partition function obtained in this paper is a generating function of Gopakumar-Vafa invariants \cite{Gopakumar:1998ki} of a certain Calabi-Yau three-fold. It would be intriguing to find a duality between fivebrane webs with an O5-plane and a Calabi-Yau three-fold.
\item \textbf{Open topological string with an O5-plane:} The topological vertex was originally developed from the large $N$ duality between the topological string theory and Chern-Simons theory. It is natural to ask whether the extended topological vertex can be understood as the large $N$ limit of $\SO(N)/\Sp(N)$ Chern-Simons theory. It is expected that open topological string theory with the O-vertex gives ingenious perspectives of Kauffman polynomials \cite{Marino:2009mw}.
\item \textbf{Refinement:} As elucidated in Appendix \ref{app:ADHM}, JK-residues from the ADHM descriptions of type $BCD$ are \emph{not} classified in the conventional way by Young diagrams at the refined level. Nevertheless, it is desirable to obtain closed-form expressions of fully refined instanton partition functions for arbitrary gauge groups like $\SO(7)$ and $G_2$ gauge groups in \cite{Kim:2018gjo}.
\end{itemize}
\acknowledgments
We are grateful to the authors (Sung-Soo and Futoshi) of \cite{Kim-Yagi} and the authors (Hee-Cheol, Joonho, Seok, Ki-Hong, Jaemo) of \cite{Kim:2018gjo} for explanations and clarifications of their papers. We would also like to thank Hirotaka Hayashi, Yuji Tachikawa, and especially Futoshi Yagi for their comments on the draft. S.N. would like to thank Yau Center, Tsinghua University, and R.Z. is grateful to Sun Yat-sen Univ., ITP (Chinese Academy of Sciences), Peng Huanwu Center for Fundamental Theory (USTC), for the warm hospitality where part of the work was carried out and preliminary results were presented. The research of S.N. is supported by the National Science Foundation of China under Grant No.12050410234 and Fudan University Original Project (No. IDH1512092/002).
|
\section{Introduction}
In healthcare, it is highly desirable to
evaluate the current situation of
a patient and
predict his/her disease development.
This evaluation and prediction
provide a basis for treatments
including the medication strategy, non-routine checkup,
early active interventions, etc.
Deep neural networks (DNNs)
have been increasingly applied to
the prediction, prevention, diagnosis and
prognosis of diseases, leading to
a promising capability
for better decision-making \cite{nature}\cite{Medical}.
Although DNNs have proven their merits
in various tasks,
the performance in noise, disturbance and imprecise data
remains a challenge.
Obtaining more stable and robust medical deep learning models
is at the forefront of machine learning in healthcare.
Clinical lab tests play an important role
in healthcare.
From early detection of diseases
to diagnosis to personalized treatment programs,
lab tests guide more than 70\% of medical decisions
and personalized medication \cite{labtesting14}.
However,
due to limitations of equipment, instruments, materials,
test methods, etc.,
data inaccuracy always occurs \cite{CV14}\cite{allowableimp} and has
to be dealt with.
Typically, test results
are within respective tolerable ranges
(or imprecision ranges,
values in this range are acceptable
though imprecise).
In our previous work \cite{ourwork}, we studied
the impact of imprecision on
prediction results
where a pre-trained model is used
to predict future state of hyperthyroidism for patients.
It was demonstrated that small ranges of imprecisions
can cause large ranges of predicted results,
which might cause mis-labeling and
inappropriate actions (treatments or no treatments)
for individual patients.
In this paper,
we study the issue of
building robust models
while taking imprecision into account
with better generalization.
In image classification,
it has long been found that
if one image is visually imperceptibly perturbed,
a prediction label may be different.
To overcome this problem,
a popular solution is
noise injection \cite{noiseinjection}.
The main focus was on
methods to generate useful noisy
or adversarial examples.
By including noise-injected examples in training,
resulting classification models are more sensitive to
discriminate these images.
In healthcare,
adversarial patients have also been studied
in different kinds of classification task \cite{Qayyum}\cite{adverclinical}.
Obviously, samples in imprecision range
are not noise,
since imprecise samples
are also accepted values.
The above approaches need to be extended
to address
imprecision range problem readily.
In existing deep learning methods,
loss functions play a central role
in model learning.
By calculating the local gradient
of a loss function,
the gradient descent (GD) algorithm
updates the model parameters
in each iteration.
Virtually all loss functions assume that the values
in a learning dataset
are the only correct values.
A predicted value based on these is then used
to calculate the loss
for gradient descent.
However, in lab tests for patients,
the values in imprecision range
usually have some probability of true values,
By assuming the lab test results have the only correct values,
the learned model will likely deviate from the real model,
leading to incorrect, inconsistent predictions
when predicting new samples.
In this paper,
``IR loss'' is proposed
and incorporated into LSTM model for
disease progress prediction.
In our method,
each data in imprecision range space
has a certain probability
to be the real value,
participating in the loss calculation.
So the loss is defined
as the integral of the error
of each point
in the impression range space.
Then the sampling method
for imprecision space
is designed.
The continuous imprecision space
is discretized,
and
a sequence of imprecise data sets
are obtained.
Then a heuristic learning algorithm
is proposed to
learn the model parameters
based on the imprecise data sets
sequentially.
Experimental results
on a real dataset show
that the prediction method based on IR loss is more robust,
which can provide more stable and consistent prediction result
when test samples are generated from imprecision range.
The
paper is organized as follows.
Section 2
discusses related work.
Section 3
introduces the proposed loss function
and the corresponding model learning method.
Section 4
presents experimental results.
Section 5 concludes the paper.
\endinput
\section{Related Work}
One area of work
studied the influence of
variety forms of input perturbations
through experimental or theoretical analysis.
In \cite{SensitivityNPL},
an iterative algorithm
was developed for approximately
compute the sensitivity
from neuron to layer,
and finally to the entire CNN network.
Impact of data precision on learning
was first
observed in our earlier paper \cite{ourwork},
which also discussed related work.
This paper continues the study
by developing an effective learning method.
To learning against input perturbations,
a popular method is
noise injection \cite{CoRR}\cite{noiseinjection}.
By adding the noisy or adversarial
samples into training process,
the model is expected to have more distinguish ability
in classification task.
The studies focused more on to generating such samples.
In healthcare field,
adversarial patient
are defined and examined in \cite{adverclinical}.
Different methods \cite{poisoningattack}\cite{advmedical} were provided
to generate adversarial examples
in medical deep learning classifiers.
Obviously, we cannot
treat each samples in imprecision range as noise,
since imprecise samples
could be accepted values.
So the current solution
cannot be used into
imprecision problem readily.
How to use unseen imprecise samples
to build a more robust model
is addressed in this paper.
For discretize the continuous input space,
interval valued data regression method
provides a potential solution.
In \cite{intervallearning},
each interval valued observation was
viewed as a hypercube.
By dividing each side of a $p$-dimensional
hypercube into $m$ equal parts
to discretize the interval data.
However,
the data in this paper
is essentially different
from interval data.
In the interval method,
each data value is an interval
(e.g., cluster data) represented as
a minimal and a maximal value.
In this paper,
a test result is single-valued element,
but its value can be possibly anyone
in imprecision range.
\endinput
\section{Method}
In this paper,
a prediction model $f$
is developed to
predict the progress of hyperthyroidism
two years in advance
based on the blood test data
in the first $k$ months.
That is $y \,{=}\, f(x)$,
where $x$ is the blood test result sequence
in the first $k$ months.
$y$ is the predicted values two years later.
After we obtain the predicted test values,
the disease progress is obtained
by analyzing the ``normal'', ``abnormal'' states
of the test measures.
Since $x$ can be regarded as a time series,
we exploit LSTM
as our basic prediction model.
In the traditional LSTM modeling
and training process,
SGD method are often used to
learn the model parameters
based on an loss function.
The traditional loss
for a training sample $x$
is:
\begin{equation}
L(x) = |y - f(x)|^\alpha
\label{eqn_prevloss}
\end{equation}
where $\alpha$ is 1 or 2,
corresponding to the commonly used
absolute loss function
and square loss function.
In Equation\,(\ref{eqn_prevloss}),
$x$ is the group of
blood test results.
Each test value
has an imprecision range,
any value from this range
is also acceptable.
Obviously,
the loss defined in Equation\,(\ref{eqn_prevloss})
does not consider the samples
in the imprecision range.
It simply assumes
the lab test value
is the only correct one.
The predicted result
based on this value is used to
calculate the loss
and gradient.
If it is not the correct value,
the above calculation may
cause the deviation in parameter learning
and correspondingly the inaccurate, inconsistent
prediction results for the test data.
\begin{figure}
\centering
\includegraphics[width=5cm]{fig/discre.png}
\vspace*{-3mm}
\caption{The discretization example in two dimensional space. }
\label{fig:discre}
\vspace*{-3mm}
\end{figure}
\def\textit{Ipr}{\textit{Ipr}}
To deal with the above problem,
we modify the imprecision range loss.
Let $\textit{Ipr}(x)$ denote the imprecision range for $x$.
Assume data $x'\,{\in}\, \textit{Ipr}(x)$ is the true value
with a certain probability $p(x')$,
then the loss at $x$ could be defined as:
\begin{equation}
L_D(x) = \int_{\textit{Ipr}(x)}\! P(x) L(x)dx
\label{eqn:LD}
\end{equation}
where
$P(x)$ is the probability
of $x$ being the true value such that
$\int_{\textit{Ipr}(x)}\!P(x)dx = 1$.
The
probability $P(x)$
can also be regarded as the weight
to control each samples
in imprecision range
contributed to the total loss of $x$.
When $P(x)\,{=}\, 1$ and $P(x')\,{=}\, 0$
for each $x'$ in $\textit{Ipr}(x)$ and $x' \neq x$,
Equation\,(\ref{eqn:LD}) degenerates to the traditional loss function
$L(x)$
in Equation\,(\ref{eqn_prevloss}).
In this case, $x$ is the only correct value.
The total loss for all training samples is given as:
\begin{equation}
Loss = \sum L_D(x) = \sum_{x \in D} \int_{\textit{Ipr}(x)}\! P(x) L(x)dx,
\end{equation}
The right side of the above equation
is a continuous integral term, and is possibly hard to evaluate.
We consider to simplify it by discretization.
Since each $x$ is a multivariate variable.
Its imprecision ranges form
an imprecision space with infinitely dense points.
We use the points with fixed size steps to discrietize this space.
Let $x^k$ denote a single blood test result,
$r$ denote its maximum acceptable range
as a percentage.
The lower and the upper boundary
are then $x^k \pm r \,{*}\, x^k$.
We uniformly generate the imprecise sample $x^k$
with fixed step $s$.
The sample scale
is defined as $\Delta_j = \Delta_0 + (j{-}1)*s$,
where $\Delta_0 \,{=}\, 0$, $j \,{=}\, \{1, 2, ..., N\}$,
$N$ is the total number of steps.
Obviously, we have $N = r/s$.
For example,
if $r = 10\%, s=0.01$,
we have $N\,{=}\,10$,
and $\Delta = \{0.01, 0.02, ..., 0.1\}$.
This process can be easily
extended to multidimensional input.
Fig.\,1 illustrates an example
in a two-dimensional space.
$l^1, u^1, l^2, u^2$ are the lower and
upper boundaries of the imprecision space for
the two dimensional input value $x=\{x^1, x^2\}$.
The green dot is the generated imprecision sample when $\Delta = 0.04$.
In this way,
the discretized imprecision sample $x_j$
is generated from its imprecision range
as follows:
\begin{equation}
x_j = x \pm \Delta_j * x
\label{eqn:x'}
\end{equation}
For each sample $x$,
we generate
a set of imprecision samples $\{x_1, x_2,$ $..., x_N\}$
from its imprecision space.
Let $x^0$
be the lab returned value $x$.
We further assume samples
by using the same scale $\Delta$ share the same weight.
We discretize the weight vectors $\{w_0, w_1, ..., w_N\}$
from function $P(x)$.
Then the loss could be updated as:
\begin{eqnarray}
Loss = \sum_{x \in D} L_D(x) & = & \sum_{x \in D}\, \sum_{x_i \in\textit{Ipr}(x)} P(x_i) L(x_i) \\
& = &\sum_{x \in D} \sum_{j=0}^{N} w_j L(x_j)
\label{eqn:sum}
\end{eqnarray}
Equation\,(\ref{eqn:sum}) is also rewritten
as $\sum_{x \in D} w_0 L(x) +\sum_{x \in D}\! \sum_{j=1}^{N}\! w_j L(x_j)$.
The term $\sum_{j=1}^{N} w_j L(x_j)$ carries two meanings.
The prediction based on each accepted samples
in the imprecision range
should be as centralized
and close as possible.
At the same time,
all predictions should be
as close as possible to the true value.
It implies that the learning results
should be accurate and stable,
and consequently more trustable.
Further,
the imprecision samples
with the same sample scale $\Delta_j$
are grouped together to form the data set $D_j$.
Then the loss could be rewritten as:
\begin{eqnarray}
Loss\!\! & = & \!\!\!\!\sum_{x_0 \in D_0} w_0 L(x_0)+\! \sum_{x_1 \in D_1} w_1 L(x_1) +\! \ldots + \!\sum_{x_N \in D_N} w_N L(x_N),\nonumber \\
\!\!& = & \!\!\!\! \sum_{j = 0}^{N} Loss_{D_j}
\label{eqn:sumLD}
\end{eqnarray}
where $Loss_{D_j} = \sum_{x_j \in D_j} w_j L(x_j)$.
The goal of model training is to find the optimal model parameters
$\hat{\theta}$ to minimize the loss function defined in Equation\,(\ref{eqn:sumLD}):
\begin{eqnarray}
\hat{\theta} & = & arg min_\theta\,\,\, Loss
\label{eqn:theta}
\end{eqnarray}
To achieve this goal,
we divide the global
optimization problem
into the combination
of optimization problems
on each individual imprecision set $D_i$.
It is reasonable to assume
that the closer
to the center point $x$,
the greater the weight should be.
So we have $w_0 \textgreater w_1 \textgreater w_2 \textgreater \cdots \textgreater w_N$.
The model is trained sequentially
from larger weights to smaller ones.
Specifically,
the model is trained on the first data set $D_0$
to obtain the initial parameters
by minimizing $Loss_{D_j}$.
Then, on the basis of the initial model,
we use $D_1$ for the next training round to get model $f_1$.
The above process is carried out in turn.
The final prediction model $f_N$ is obtained
after $N$ iteration.
The detailed learning process is illustrated
in Algorithm 1.
\begin{table}[htbp]
\centering
\begin{tabular}{p{0.5cm}p{7cm}}
\hline
\multicolumn{2}{l}{\textbf{Algorithm 1: Model learning}}\\
\hline
\multicolumn{2}{l}{\textbf{Input:} training set }\\
\multicolumn{2}{l}{\textbf{Output:} model $\theta$}\\
0.& SGD learning $\hat{\theta}_0$ by minimizing the loss $Loss_{D_0}$; \\
1.& for each $D_i \in \{D_1, D_2, ..., D_N\}$;\\
2.& \hspace*{0.5cm} Initial model parameter using $\theta_{i-1}$;\\
3.& \hspace*{0.5cm} SGD training new $\theta$ to obtain $f_i$;\\
4.& \hspace*{0.5cm} update model $f = f_i$;\\
5.& end for \\
6.& return finial model ${f_N}$ \\
\hline
\end{tabular}
\vspace*{0mm}
\end{table}
\endinput
\section{Experimental Evaluations}
\subsection{Experimental Setup}
There are 2,460 patients in the hyperthyroidism dataset used in our experiments, which
is is generated from Ruijin hospital,
a reputable hospital in Shanghai, China.
The whole dataset is divided into a training set and a test set,
with 1960 patients and 500 patients respectively. For hyperthyroidism disease, the blood test measures FT3, FT4, TSH, and TRAb are used for prediction.
In the LSTM network, there are 2 hidden layers,
each layer containing 128 LSTM cell units.
We employ dropout method to reduce over-fitting and
apply the Adam-Optimizer in training.
Each experiment runs for 10 times and each data given
in the experimental results is the average of the 10 runs.
For the parameter setting, $r$ is set to be $10\%$ and $s=0.1$,
then $\Delta$ is 0.01 $\thicksim$ 0.1 with interval 0.01 to generate $D_1 \thicksim D_{10}$.
\subsection{Evaluation Metrics}
After predicting $f(x)$,
the label $l(f(x))$ for ``normal'', ``abnormal'' description can be obtained by
comparing the value of $f(x)$ with the reference range.
We use $Accuracy$ to measure the label prediction accuracy of the prediction method. Given one label $l$, let $\textit{TP}$
model the positive samples in the test set and
the predictions are correct.
$\textit{TN}$ represents the negative samples and the predictions
are correct. For each test patient $x$, we generate the imprecise sample $x_j, j=\{1, 2, \ldots, N\}$ from its imprecision range. In order to measure the value prediction accuracy, we further define the $Distance$ metric, which is the distance from the predicted value based on imprecision samples to the real value.
$$
\textit{Accuracy} = \frac{|\textit{TP}\,| + |\textit{TN}\,|}{|D_{\textrm{Test}}|}
$$
$$
\textit{Distance} = \sum_{j=1}^N |f(x_j) - y|^{\alpha}
$$
\subsection{Findings}
In experiments,
we compare the performance
of the new Imprecision Range Loss (IR Loss)
with the one
by adopting the traditional Least Square Error loss (LS Loss).
Fig.\,\ref{fig:accuracy} illustrates
the $Accuracy$ comparisons.
We can see that
the average $Accuracy$
and the $Accuracy$ of all the four test measures
based on the proposed method
are higher
than the traditional ones.
Especially for the TRAb measure,
there are 4\% improvements.
From the definition,
the metric $Distance$ describes
the degree of deviation
between the predicted values and
the true values
when $x$ are
sampled from the imprecision range.
According to Fig.\,\ref{fig:loss},
we can see that
the $Distance$ of the proposed method
are all smaller than the traditional method.
It demonstrates that the method
based on the proposed IR loss could provide
more consistent prediction
in the small range.
Our previous work demonstrated
that the performance declines
when test samples
are generated
from its imprecision range \cite{ourwork}.
To see how the proposed IR loss
address this problem,
in Fig.\,\ref{fig:stability},
we provide the results
when the proposed method
applied to imprecise test data
when $Delta$ is set to
be different values.
From the figure,
we can see that
the accuracy of
the proposed IR loss is always higher
than that of traditional loss.
In addition, when $\Delta$ increases,
the decrease rate of $Accuracy$
of the proposed method
is much lower than
that of the traditional method.
This trend is more obvious
when $\Delta$ is large.
Discretization is very important
in the proposed method.
In this experiment,
Discretization parameter $s$
is set to be 0.02, 0.01, 0.005 respectively.
Then three different $\Delta$ sequences obtained.
The prediction performance
in different sampling sequences
is illustrated in Fig.\,\ref{fig:para_s}.
The figure
does not establish that
finer the sampling granularity provides
better results.
When $s=0.01$,
the method achieve the best performance.
Similarly,
it is not clear that
the more imprecise data sets
are introduced,
the better the performance will be.
The increase of $\Delta$ means the number of imprecise data set increases,
the performance does not steadily increase.
\endinput
\section{Conclusions}
The learning method presented in this paper
centers around a refined error function and
input data imprecision range.
This basically addressed the problems observed in our previous study
\cite{ourwork} with a satisfactory solution.
Further improvements
may possibly take into consideration of
output data imprecision range
and
probability distributions
of the imprecise samples.
Also, it remains to be seen if such methods
are effective in other applications
in, e.g., healthcare and engineering. |
\section{Introduction}
Stars are believed to end their lives as compact stars (CSs) that include white dwarfs (WDs), neutron stars (NSs) and
black holes (BHs). Observations indicate that massive stars are predominately born in binary and multiple systems
\citep{sd12,kk14,md17}. It is naturally expected that CS pairs can be formed through isolated binary evolution when both
components have evolved to be CSs.
Very close CS pairs emit gravitational wave (GW) signals that are likely to be identified by future space-based detectors e.g. LISA
\citep{asa17}, TianQin \citep{lj16} and Taiji \citep{rw20}, and/or by ground-based interferometers e.g. LIGO \citep{aa15} and
Virgo \citep{ac15}. Common envelope \citep[CE, see a review by][]{in13} evolution is thought to be a vital stage for the formation
of close CS pairs, during which the binary systems rapidly shrink inside a shared envelope originating from the donor star
and the orbital energy is dissipated to expel the CE \citep{p76,w84,il93}. Usually dynamically unstable mass transfer between
binary components can result in the occurrence of a CE phase, which is critically dependent on the stellar properties
of both the donor and the accretor, and the mass ratios of binary components \citep[e.g.,][]{sp97,ge10,ge20,sl14,pi15,pi17}.
It is generally accepted that a binary system is likely to enter CE evolution if the mass ratio of binary components
is extreme or the donor star has developed a deep convective envelope prior to the mass transfer.
Radio and X-ray observations of Galactic NSs suggest a maximum mass of $ \sim 2M_{\odot} $ \citep{af13,asb18,fc20},
which is consistent with the
maximum stable NS mass inferred from observations of the NS--NS merger GW170817 \citep{mm17,rs18,sz19}.
Meanwhile, Galactic BHs in X-ray binaries are inferred to have a minimal mass of $ \sim 5M_{\odot} $ \citep{bj98,op10,fs11}. This
led to the mass gap ($ \sim 2-5M_{\odot} $) between NSs and BHs. However, recent evidence suggest that the mass gap
is being populated from both electromagnetic \citep{tk19,wm20,js21} and GW observations
\citep[GW190814,][]{ab20a}. Whether there is the mass gap or not can shed light on supernova
mechanisms for the formation of NSs and BHs. Although Gaia astrometry was already claimed to be able to
discover invisible BHs with optical companions \citep[e.g.,][]{gs02,ml17,bcl17,yb18,yk18,bca19,sl19,abc19,wl20},
merging BH--CS binaries that appear as
GW sources are alternatively potential objects to test the mass gap and relevant supernova mechanisms.
There is no BH--WD binary identified so far, although they are proposed to be associated with many kinds of astrophysical
objects, e.g. ultracompact X-ray binaries \citep[UCXBs,][]{vh12}, subluminous type I supernovae \citep{mbd12},
tidal disruption events \citep{fm20}, and long gamma-ray bursts \citep{dg18}. Some X-ray binaries in globular
clusters are suggested to be BH--WD systems \citep{mk07,mj15}, and the formation of such systems
in a dynamical environment has been explored by \citet{ic10}. It is also noted that mass-transferring BH--WD binaries
are potential GW sources that may be identified by LISA in the future \citep{st21}.
Since the discovery of the first GW signal from a BH--BH inspiral \citep{ab16}, the LIGO/Virgo collaboration
has reported the detection of tens of CS pair mergers \citep{ab19,ab20b}. Among them the majority are confirmed to be BH--BH
systems and several are suspected to be BH--NS systems, e.g. GW190814 \citep{hh20,zl20} and GW190425 \citep{ht20,kf20}.
As expected,
searches of the electromagnetic counterparts for BH--BH mergers have yielded negative results \citep[e.g.,][]{ct16,sc16,rb17}.
It is predicted that LISA will detect a number of merging BH--BH binaries in the Milky Way, but that electromagnetic
observations will be challenging \citep{lg18}.
The detection of BH--NS mergers is of great interest as they are expected to emit across a broad electromagnetic spectrum
and have been suggested to produce radio flares \citep{np11,hn16}, kilonovae \citep{lp98,zw20}, short
gamma-ray bursts \citep{p86,gl20}, and so on. A recent quite comprehensive study of BH--NS mergers can be found in \citet{bbn21}.
Before merger, Galactic BH--NS binaries are possibly observed as binary
radio pulsars \citep{sl18}. Close BH--NS systems in the Milky Way may emit GW signals
with frequencies in the LISA band \citep{cs20}.
With the growing population of GW sources, a large number of formation channels for merging CS pairs
have been put forward, especially for the case of BH--BH systems. Until now, it is still impossible to distinguish between various
channels based on GW observations alone. The popular channels involve the formation
through isolated binary evolution
\citep[e.g.,][]{ty93,lp97,vt03,ki14,bh16,es16,sv17,vdh17,km18,mg18,sm19,bc20,zs20,ts21,bf21,ob21}, and dynamical
interactions in globular clusters \citep{db10,rh16,as17,pw19,ky20} or young stellar clusters
\citep{zm14,dgm19,sm20,rm20}. Other channels include the formation from isolated multiple systems
\citep{st17,ll18,hn18,fl19}, the chemically homogeneous
evolution for rapidly rotating stars \citep{md16,dm16,ml16}, as well as the disk of active galactic nuclei \citep{ar16,sm17,mf18}.
In this paper, we investigate the formation of merging BH--CS binaries via isolated binary evolution. Our previous works
have focused on the Galactic populations of detached BH binaries with a normal-star companion \citep{sl19}
and BH X-ray binaries \citep{sl20}, by adopting the rapid \citep{fb12} and the failed supernova mechanisms
\citep{se16,rso18} for NS/BH formation. Here we further incorporate the delayed \citep{fb12} and the stochastic \citep{mm20} recipes
to deal with compact remnant masses and possible natal kicks, and then study the predicted properties of
descendent BH binaries with a CS companion.
For mass-transferring binaries with a BH accretor, \citet{pi17} demonstrated that the process of Roche lobe overflow (RLO) may be
stable over a much wider parameter space than previously thought. Accordingly, \citet{ob21} suggested that sufficiently strong
constraints on mass transfer stability are necessary to draw fully reliable conclusions for the population of double CS mergers.
However, considering that limited binary systems were included by \citet{pi17},
in this work we will evolve a large grid of the initial parameters for BH binaries
with a nondegenerate donor to deal with mass transfer stability and
obtain thorough criteria (or parameter spaces) for the occurrence of CE evolution.
The structure of this paper is organized
as follows. Section 2 describes the method of our binary population synthesis \citep[BPS, see a review by][]{hg20}
and the input physics implemented
in the BPS method, especially supernova mechanisms for NS and BH formation. In Section 3 we obtain the criteria
of mass transfer stability for the BH binaries with detailed binary evolution calculation. Sections 4 and 5 show our BPS
calculation results about the merging BH--CS binaries in the Milky Way and the local Universe, respectively.
Finally we conclude in Section 6.
\section{BPS Method}
To simulate the formation and evolution of BH--CS binaries, we utilize the \textit{BSE} code originally developed by
\citet{h02} and significantly updated by \citet{sl14}. Some further modifications on the code can be found in \citet{sl19}
and \citet{sl20}. We briefly summarize the most important points in the following. When dealing with the process of mass transfer
in the primordial binaries, we use the rotation-dependent mode \citep{sl14} that assumes the accretion rate
of the secondary stars to be dependent on their rotational velocities \citep[see also][]{se09}. With this mode we are able to reproduce
the distributions of known Galactic binaries including BH--Be star systems \citep{sl14,sl20} and
Wolf-Rayet star--O-type star systems \citep{sl16}. Because a large fraction of the transferred mass is lost from the rapidly rotating
secondary star, the maximal mass ratio of the primary to the secondary stars for stable mass transfer can reach up to $ \sim 6 $,
significantly larger than in the conservative mass transfer case \citep{sl14}.
During CE evolution, we employ the
binding energy parameter $ \lambda $ calculated by \citet{xl10} and set the CE ejection efficiency $ \alpha_{\rm CE} $ to be unity.
We follow \citet{bb10} to deal with the wind mass-loss rates for different types of stars, except that for helium stars we decrease
the mass-loss rates of \citet{ham95} by a factor of 2 \citep{kh06}.
For the formation of NSs and BHs, we take into account three supernova models to treat the remnant masses
and natal kicks. These models involve (i) the rapid explosion mechanism \citep{fb12}, (ii) the delayed explosion mechanism \citep{fb12}
and (iii) the stochastic recipe developed by \citet{mm20}. The rapid model predicts a dearth in the remnant
masses between $ \sim 2 M_{\odot} $ and $ \sim 5 M_{\odot} $, while the other two models are able to produce CSs within the mass gap.
For both the rapid and the delayed mechanisms, the remnant masses are determined by the CO core masses at the time of explosions,
and subsequent accretion of the fallback material.
We follow \citet{fb12} to convert between the baryonic and gravitational masses for NSs \citep[see also][]{tww96}
and simply approximate the gravitational mass with $ 90\% $ of the baryonic mass for BHs.
The maximum mass of NSs is set to be $ 2.5M_{\odot} $. We adopt the criterion
of \citet{fb12} to distinguish the NSs originating from core-collapse and electron-capture supernovae.
NSs from core-collapse supernovae are assumed to be subject to a kick with a Maxwellian distribution with
$ \sigma = 265 \rm \,km\,s^{-1} $ \citep{h05}, while NSs from electron-capture supernovae
have a lower kick velocity with $ \sigma = 50 \rm \,km\,s^{-1} $ \citep{db06}. For the natal kicks to newborn BHs,
we use the NS kick velocities reduced by a factor of $ (1-f_{\rm fb} )$, where $ f_{\rm fb} $ is the fraction of the
fallback material. In the stochastic model, the outcome of supernova explosions is expected to be
probabilistic rather than deterministic. The remnant masses and natal kicks are required to satisfy some specific
probability distributions depending on the masses of the CO cores. Meanwhile, the hydrogen shell (if present)
is assumed to be always ejected, and this will cap the BH masses at the helium core masses.
This model allows a significant tail of low kicks
for natal NSs, which can be consistent with the observation of large numbers of NSs in globular clusters \citep{mm20}.
In addition, a large fraction of BHs are expected to receive zero natal kicks.
Following \citet{mm20}, we take the
maximum mass of NSs to be $ 2M_{\odot} $\footnote{The maximum mass of observed NSs is a bit higher, around $ 2.1M_{\odot} $, but
this does not influence our final results.}.
\begin{figure}[hbtp]
\centering
\includegraphics[width=0.45\textwidth]{zams.pdf}
\caption{The remnant mass as a function of the zero-age main sequence mass of the progenitor stars for our adopted three supernova mechanisms.
These results are obtained by using the population synthesis calculations for single stars. The top and bottom panels correspond to the stars
with initial metallicity of 0.02 and 0.0001, respectively.
The gray rectangle in each panel highlights the mass gap.
\label{figure12W}}
\end{figure}
Figure 1 shows the relations between the zero-age main sequence mass and the remnant mass for our adopted
three supernova models. For the models involving the rapid and delayed explosion mechanisms, similar
relations have been reported by many previous works \citep[e.g.,][]{bb10,fb12,gm18,sl19,zs20}.
It is noted that the minimum
mass of the BH's progenitors can reach as low as $ \sim 12M_{\odot} $ in the stochastic model. Since we
follow \citet{mm20} to ignore the correction between the baryonic and gravitational masses,
the stochastic model tends to produce slightly heavier BHs at the high mass end compared with those in the other two models.
In our BPS calculations, we identify mass-gap BHs with masses between $2M_{\odot}$ and $5M_{\odot} $ for all models.
The evolutionary fate of the primordial binaries is determined by their initial parameters: the primary masses $ M_{\rm 1} $,
the secondary masses $ M_{\rm 2} $, the orbital separations $ a $ and the eccentricities. Since the eccentricity
distribution has a minor effect on the BPS results \citep{h02}, we assume that all primordial binaries have circular orbits for simplicity.
In our calculations, we take $ M_{\rm 1} $ in the range of $ 5-100 M_\odot $, $ M_{\rm 2} $
in the range of $ 1-100 M_\odot $, and $ a $ in the range of $ 3-10^4 R_\odot $.
For the secondary stars, only the binaries with $ M_{2} < M_{1} $ are included.
We set each of the initial parameters $ M_{1} $, $ M_{2} $ and $ a $ with the $ n_{\chi} $ grid points of the
parameter $ \chi $ logarithmically spaced, so
\begin{eqnarray}
\delta \ln \chi = \frac{1}{n_{\chi}-1} (\ln \chi_{\rm max} - \ln \chi_{\rm min}).
\end{eqnarray}
Here $ n_{\chi} $ is taken to be 100.
If a specific binary $ i $ evolves across a phase that is identified as a BH--CS system, then the binary
contributes the BH--CS binary population with a rate
\begin{eqnarray}
R_{i} = \left( \frac{f_{\rm bin}}{2} \right) \left( \frac{\rm SFR}{M_{*}} \right) W_{\rm b},
\end{eqnarray}
where $ f_{\rm bin} $ is the binary fraction, $ \rm SFR $ is the star formation rate,
$M_{*} \sim 0.5 M_{\odot}$ is the average mass for all stars, and
$W_{\rm b} = \Phi (\ln M_{1}) \varphi (\ln M_{2})
\Psi (\ln a) \delta \ln M_{1} \delta \ln M_{2} \delta \ln a$
weights the contribution of the specific binary from the primordial binary with
initial parameters of $ M_{1} $, $ M_{2} $ and $ a $ \citep[see more details in][]{h02}.
We assume that all stars are initially in binaries, i.e. $ f_{\rm bin} = 1.0 $.
Since $ \sim (60-90)\% $ of OB stars are observed as members of binary systems \citep{md17},
this assumption may lead to overestimate the population size of merging BH--CS binaries by a factor of less than 2.
The primary masses are assumed to obey the initial mass function \citep{kt93},
\begin{eqnarray}
\xi (M_{1} ) = \left\{
\begin{array}{ll}
0 &\,\, M_{1} \leq 0.1M_\odot \\
a_{1} M_{1}^{-1.3} &\,\, 0.1M_\odot < M_{1} \leq 0.5M_\odot \\
a_{2} M_{1}^{-2.2} &\,\, 0.5M_\odot < M_{1} \leq1.0M_\odot \\
a_{2} M_{1}^{-2.7} &\,\, 1.0M_\odot < M_{1} < \infty.
\end{array} \right.,
\end{eqnarray}
where $ a_{1} = 0.29056$ and $ a_{2} = 0.15571$ are the normalized parameters. Thus
\begin{eqnarray}
\Phi (\ln M_{1}) = M_{1} \xi (M_{1} ).
\end{eqnarray}
The secondary masses are assumed to follow a flat distribution between 0 and $ M_{1}$ \citep{kf07},
then
\begin{eqnarray}
\varphi (\ln M_{2}) = \frac{M_{2}}{M_{1}}.
\end{eqnarray}
The orbital separations are assumed to be uniformly distributed in the logarithm \citep{a83}, thus
\begin{eqnarray}
\Psi (\ln a) = k = \rm const.
\end{eqnarray}
The normalization of this distribution yields $ k = 0.12328 $.
\section{Mass transfer stability}
We use the one-dimensional stellar evolution code \textit{MESA} \citep[version 10398,][]{p11,p13,p15,pb18,pb19} to simulate the detailed
evolution of a large grid of BH binaries with a nondegenerate companion star.
The BH is treated as a point mass and its binary companion is initially a zero-age main sequence star. The evolutionary models
are computed at solar metallicity ($ Z_{\odot} = 0.02$) and two sub-solar metallicities ($ Z = $ 0.001 and 0.0001).
The initial hydrogen mass fraction is assumed
to be $ X= 1-Y-Z $, where $ Y = 0.24+2Z $ is the helium mass fraction \citep{tp96}.
For the initial BH binaries, we take the BH masses distributed
over a range of $ 3-20M_{\odot} $ in logarithmic steps of 0.3, the companion masses over a range of $ 1-100M_{\odot} $
in logarithmic steps of 0.05, and the orbital periods over a range of $ 1-10000 $ days in logarithmic steps of 0.1.
In the \textit{MESA} code, convective mixing is accounted for
by using the mixing-length theory with a default mixing length parameter of $ \alpha = 2 $. Following \citet{bd11},
we include convective core-overshooting with an overshooting parameter of 0.335 pressure scale heights.
Stellar winds are employed using mass-loss rate prescriptions similar to those in the BPS calculation.
The wind mass-loss rates of \citet{vink01} are used for
hot stars and the \citet{nd90} prescription for relatively cool stars with effective temperatures lower than $ 10^{4} $ K. For
hydrogen-envelope stripped stars ($ X < 0.4 $), we use the reduced rates of \citet{ham95} for helium stars.
We linearly interpolate the rates between different prescriptions to ensure a smooth transition as described by \citet{bd11}.
We adopt the scheme of \citet{kr90} to calculate the mass-transfer rates $\dot{M}_{\rm tr}$ via RLO.
Mass accretion onto the BH is limited by the Eddington rate $\dot{M}_{\rm edd}$, and
the excess matter escapes from the binary system carrying away the specific orbital angular momentum
of the BH \citep[see also][]{sl20}.
We simulate the evolution by employing the default timestep options with $ \rm mesh\_delta\_coeff = 1.0 $ and
$ \rm varcontrol\_target = 10^{-4}$. Each binary evolution track is
terminated if carbon is depleted in the companion's core or the time steps exceed 30000.
\begin{figure*}[hbtp]
\centering
\includegraphics[width=1.05\textwidth]{CE.pdf}
\caption{The parameter spaces for stable and unstable mass transfer in the BH binaries with nondegenerate donors with different
metallicities. The left panels show the parameter space outlines distributed in the $ M_{\rm d,i} -P_{\rm orb,i}$ diagram,
while the middle and right panels
correspond to the cases in the $ q - R_{\rm d} $ and $ M_{\rm d} - R_{\rm d} $ diagrams, respectively. The coloured triangles in each
panel represent our calculated boundaries for the binaries with different initial BH masses, and the filled and open ones denote
the upper and lower boundaries, respectively. The orange dashed curves roughly fit
the lower boundaries of the donor radius as a function of the mass ratio, while the orange dotted curves for the upper boundaries
as a function of the donor mass.
\label{figure1}}
\end{figure*}
\citet{pi17} showed that the mass-transferring BH binaries with a massive donor are likely to experience the expansion or
the convective instability, and enter the CE evolution. The
expansion instability occurs when the donor stars are experiencing a period of fast thermal-timescale
expansion,
while the convection instability takes place if the donor stars have developed a sufficiently deep convective envelope. Usually
the former can be triggered in relatively close BH binaries, while the latter in relatively wide systems. It was suggested by \citet{pi17} that
there exist the smallest radius $ R_{\rm U} $ and the maximum radius $ R_{\rm S} $
for which the convection and expansion instabilities can take place respectively. Mass transfer is stable if the donor radius is between $ R_{\rm U} $
and $ R_{\rm S} $. These modified CE criteria
have been applied to the BPS study on the formation of double CS mergers \citep{ob21}, but the limitation is
that the calculated outcomes presented by \citet{pi17} are only from a small sample of binary evolution calculations.
For a BH binary with RLO mass transfer,
the transferred material from the donor star forms an accretion disk around the BH. If the mass transfer proceeds at a very high
rate, the matter will pile up around the BH and presumably form a bloated cloud engulfing a significant
fraction of the accretion disk. Within a specific radius, photons can be trapped in the cloud. This is the so-called trapping radius
that defined by \citet{b79} as
$R_{\rm trap} = (R_{\rm sch}/2) (\dot{M}_{\rm tr}/\dot{M}_{\rm edd})$,
where $ R_{\rm sch} $ is the Schwarzschild radius of the BH. We assume that the BH binary is engulfed in a CE if $ R_{\rm trap} $
is larger than the RL radius $ R_{ L_{\rm BH}} $ of the BH, or the
mass transfer rate exceeds a critical value, $ \dot{M}_{\rm trap} = 2 \dot{M}_{\rm edd} R_{L_{\rm BH}}/R_{\rm sch} $
\citep{kb99,bk08}. In other conditions, RLO via the $ L_{1} $ point might not be rapid enough to remove the donor's expanding
envelope, so the donor star extends far beyond to reach the $ L_{2} $ point. Mass loss
through the $ L_{2} $ point can take away a large amount of angular momentum from the binary system and lead to rapid binary orbit
shrink, probably followed by the CE evolution \citep[e.g.][]{ge20,mf20}. When dealing with the mass transfer stability in
binaries with convective giant donors, \citet{pi15} showed
that the binaries can survive the mass transfer even after $ L_{2} $ overflow without starting a CE phase.
In our simulations, we assume that CE evolution takes place if either of the following conditions is met: (I)
$ \dot{M}_{\rm tr} > \dot{M}_{\rm trap}$; (II) $ \dot{M}_{\rm tr} > 0.02M_{\rm d}/P_{\rm orb}$ \citep{pi15} and
$R_{\rm d} > R_{L_{2}} $ \citep{ge20}. Here $ M_{\rm d} $ is the donor mass, $ P_{\rm orb} $ the orbital
period of the BH binary, $ R_{\rm d}$ the donor radius, and $ R_{L_{2}} $ the volume-equivalent
radius of the $ L_{2} $ lobe. When CE starts, we terminate the calculation and
record the relevant information for further analysis.
In Figure 2, we outline our calculated outcomes by showing the parameter space boundaries of the BH binaries
between stable and unstable mass transfer. The panels from top to bottom correspond to the donor stars
with different metallicities. The left panels show the boundaries for initial binaries in the
orbital period $ P_{\rm orb,i} $ vs. donor mass $ M_{\rm d,i} $ diagrams, while the middle and right panels correspond to the
boundaries for the binaries at the moment of starting RLO in the
mass ratio $ q $ (of the donor to the BH) vs. donor radius $ R_{\rm d} $ and
donor mass $ M_{\rm d} $ vs. donor radius $ R_{\rm d} $ diagrams, respectively. In each diagram, the coloured triangles
represent the upper and lower boundaries for dynamically stable mass transfer with different initial BH masses.
Our results are roughly coincident with those of \citet{pi17}, showing that the binaries with the mass ratios up to $ \sim 10 $
can still proceed on a thermal timescale without entering CE evolution \citep[see also][]{sl18,mp21}. In more detail,
our simulations indicate that mass transfer in BH binaries is always
stable if the mass ratio $ q $ is smaller than the minimal value $ q_{\rm min} $, i.e.
\begin{eqnarray}
q < q_{\rm min} \sim 1.5-2.0,
\end{eqnarray}
and always unstable if the mass ratio $ q $ is larger than the maximal value $ q_{\rm max} $, i.e.
\begin{eqnarray}
q > q_{\rm max} \sim 2.1 + 0.8 M_{\rm BH},
\end{eqnarray}
where $ M_{\rm BH} $ is the BH mass\footnote{We note that Equation (8) can also be applied to the binaries with an NS accretor,
where the maximal mass ratio is $ \sim 3-3.5 $ \citep[e.g.,][]{kd00,t00,prp02,sl12,mf20}.}. For the binaries with mass
ratio between $ q_{\rm min} $ and $ q_{\rm max} $, dynamically unstable mass transfer ensues if the donor radius is either
less than $ R_{\rm S} $, i.e.
\begin{eqnarray}
R_{\rm d} < R_{\rm S} \sim 6.6-26.1 q + 11.4 q^{2} ,
\end{eqnarray}
or larger than $ R_{\rm U} $, i.e.
\begin{eqnarray}
R_{\rm d} > R_{\rm U} \sim -173.8+45.5M_{\rm d} -0.18M_{\rm d}^{2}.
\end{eqnarray}
Here all radii and masses are expressed in solar units. We roughly fit $ R_{\rm S} $ and $R_{\rm U}$ as a function of
$ q $ (the orange dashed curve) and $ M_{\rm d} $ (the orange dotted curve), respectively. When analysing our recorded data,
we find that Equations (9) and (10) correspond to conditions (I) and (II), respectively.
We also find that our obtained parameter spaces for stable mass transfer are not strongly dependent on stellar metallicities,
except for the binaries with donors initially
more massive than $ \sim 40 M_{\odot} $. At solar metallicity, mass transfer in long-period systems with very massive donors are
always stable since the donor stars have experienced extensive wind mass loss prior to mass transfer \citep{kn21}.
As a consequence, we see in the $ Z=0.02 $ case that the green and blue filled triangles do not appear to show the upper boundaries
for the binaries with $ M_{\rm d,i} \gtrsim 40 M_{\odot}$.
Thus, we adopt Equations (7-10)
to determinate whether the BH binaries enter the CE evolution in the BPS calculation. There are two exceptions:
for the BH binaries with helium-star donors, we assume they can always avoid CE evolution \citep{tlp15}; for the
BH binaries with WD donors, we assume mass transfer proceeds stably if the mass ratio of the WD to the BH is less than
0.628 \citep{h02}. When CE evolution is triggered, we allow donors that are crossing the Hertzsprung gap
to survive the CE phase \citep[the ``optimistic" scenario of][]{bk08}.
\begin{table*}
\begin{center}
\caption{Predicted occurrence rates for different types of BH$ - $CS binaries.
\label{tbl-1}}
\begin{tabular}{lcccccc}
\\
\hline
Supernova Model & $ R_{\rm BHWD}$ & $ R_{\rm BHNS}$ & $ R_{\rm BHBH}$ & $\mathcal{R}_{\rm BHWD}$
& $ \mathcal{R}_{\rm BHNS} $ & $ \mathcal{R}_{\rm BHBH}$ \\
& ($\rm Myr^{-1} $) & ($\rm Myr^{-1} $) & ($\rm Myr^{-1} $) & ($\rm Gpc^{-3}yr^{-1} $) & ($\rm Gpc^{-3}yr^{-1} $)
&($\rm Gpc^{-3}yr^{-1} $) \\
\hline
Rapid & 11 (0.0) & 8.0 (2.7) & 36 (7.0) & 0.0 [0.0] & 17.4 [0.0] & 42.6 [0.0] \\
Delayed & 15 (0.29) & 3.6 (1.0) & 19 (6.4) & 6.5 [0.99] & 10.2 [0.68] & 47.2 [0.38] \\
Stochastic & 95 (3.0) & 33 (5.9) & 150 (17) & 58.6 [0.99] & 71.7 [0.75] & 76.1 [0.28]\\
\hline
\end{tabular}
\end{center}
Notes. $ R $ denotes the formation (merger) rate for the BH$ - $CS binaries in the Milky Way. $ \mathcal{R} $ denotes
the merger rate density [the fraction of systems with BHs being in the mass gap] for the BH$ - $CS binaries in the local Universe.
\end{table*}
\section{Populations of merging BH$ - $CS binaries in the Milky Way}
\begin{figure*}[hbtp]
\centering
\includegraphics[width=0.85\textwidth]{WD.pdf}
\caption{The solid curves represent the calculated number distributions of detectable BH$ - $WD binaries by LISA
as a function of the BH mass, the WD mass, the orbital period,
and the eccentricity, assuming continuous star formation rate of $ 3 M_{\odot}\,\rm yr^{-1} $ with solar metallicity over the past 10 Gyr.
The black, red and green curves represent the results using the rapid, delayed and stochastic models, respectively.
The dashed curves correspond to all Galactic BH$ - $WD binaries for comparison.
\label{figure1}}
\end{figure*}
Galactic BH$ - $CS binaries are the high-mass analogues of the systems containing only NSs and/or WDs.
The BH$ - $WD and BH$ - $NS systems
may be discovered through observations of electromagnetic wave signals. On the other hand, close BH$ - $CS binaries
are likely to be observed by future space-based observatories due to the detection of GW signals.
We will evaluate the population properties of close BH$ - $CS binaries that can be identified by LISA.
The angle-averaged signal-to-noise ratio for a BH$ - $CS system that can be detected over an
observation time $ T $ is given by \citep{ok09}
\begin{eqnarray}
\left\langle ({\rm S/N})^{2} \right\rangle = \sum_{n} \int \left[ \frac{h_{c,n}(f_{n})}{h_{N}(f_{n})} \right]^{2} d \ln f_{n},
\end{eqnarray}
where $ n $ labels the harmonics at frequency $ f_{n} \simeq n f_{\rm orb}$,
\begin{eqnarray}
h_{c,n}^{2}= \frac{1}{(\pi d_{\rm L})^{2}}\left( \frac{2 G}{c^{3}} \frac{\dot{E}_{n}}{\dot{f}_{n}}\right)
\end{eqnarray}
is the characteristic strain at the $ n $th harmonic \citep{bc04}, and $ h_{N}(f_{n}) $ is the
characteristic LISA noise, including a contribution from unresolved Galactic binaries, for which we take from \citet{rcl19}.
Here $ T$ is taken to be $ 4\rm\, yr $ for the LISA mission duration, $ f_{\rm orb} $ is the orbital frequency of the binary,
$ d_{\rm L} $ is the luminosity distance to the source,
$ G $ is the constant of gravity, and $ c $ is the speed of light in vacuum. In Equation (12), $ \dot{E}_{n} $ is the
derivative of the energy radiated in GWs at frequency $ f_{n} $, which to lowest order is given as \citep{pm63}
\begin{eqnarray}
\dot{E}_{n} = \frac{32}{5} \frac{G^{7/3}}{c^{5}} (2 \pi f_{\rm orb} M_{\rm chirp})^{10/3} g(n,e),
\end{eqnarray}
where $ M_{\rm chirp} = (M_{\rm BH}M_{\rm CS})^{3/5}(M_{\rm BH}+M_{\rm CS})^{-1/5} $ is the chirp mass, $ M_{\rm BH} $
and $ M_{\rm CS} $ are the component masses of the BH$ - $CS binary, and $g(n,e)$ is a function of the orbital eccentricity $ e $
\citep[from][]{pm63}. To the leading quadrupole order, the term $ \dot{f}_{n} $ is
\begin{eqnarray}
\dot{f}_{n} = n \frac{48}{5 \pi} \frac{(GM_{\rm chirp})^{5/3}}{c^{5}}(2 \pi f_{\rm orb})^{11/3} F(e),
\end{eqnarray}
where $ F(e) = [1+(73/24)e^{2} +(37/96)e^{4}]/(1-e^{2})^{7/2} $.
Note that a source is effectively less detectable the slower the GW frequency changes over the instrumental lifetime.
This effect is taken into account by reducing the characteristic strain $ h_{c,n} $ by a factor of the square root of
$ \min [ 1, \dot{f}_{n}(T/f_{n})] $ \citep[see e.g.,][]{kr19}.
The peak frequency of GW emission for eccentric binaries is given by
\begin{eqnarray}
f_{\rm GW} = n_{p} f_{\rm orb},
\end{eqnarray}
where $ n_{p} \simeq 2 (1+e)^{1.1954}/(1-e^{2})^{1.5}$ \citep{w03}. Obviously, $ n_{p}=2 $ for circular binaries.
Considering that the majority of LISA-visible binaries have mild eccentricities, the GW power is sharply peaked at
the peak frequency \citep{pm63}. We follow \citet{bs20} to simplify the signal-to-noise ratio as
\begin{eqnarray}
\left\langle ({\rm S/N}) \right\rangle \simeq \min \left[ 1, \sqrt{\dot{f}_{n}(T/f_{n})} \right] \frac{h_{c,n}(f_{\rm n})}{h_{N}(f_{\rm n})},
\end{eqnarray}
with $ n = n_{p} $ and $ f_{n} = f_{\rm GW}$.
We assume that a BH$ - $CS binary can be identified by LISA if the signal-to-noise ratio is larger than 5 \citep[e.g.,][]{lg18,bs20}.
To obtain
the $ d_{\rm L} $ distribution of the BH$ - $CS binaries in the Milky Way, we assume that the binaries are
uniformly distributed on a flat disc with a radius 15 kpc\footnote{Although this assumption is simple, it can roughly reflect the spatial
distribution of detectable LISA binaries \citep[see Figure 1 of][]{lmv20}.}
and the Sun with respect to the Galactic Center has the distance of 8 kpc \citep{fw97}.
When synthesizing the BH$ - $CS binary population, we adopt continuous star formation at a rate
$ {\rm SFR} = 3 M_{\odot}\,\rm yr^{-1} $ \citep{sb78,dh06,rw10} with solar metallicity over a period of 10 Gyr.
In Table 1, we present the formation and merger rates of Galactic BH$ - $CS binaries in our adopted three supernova models.
Under all the models, we obtain that Galactic BH$ - $WD, BH$ - $NS and BH$ - $BH binaries have the formation rates
$\sim 11-95 \rm \,Myr^{-1} $, $ 4-33 \rm\, Myr^{-1} $ and
$ 19-150 \rm\, Myr^{-1} $, respectively, and the merger rates
$ \sim 0-3 \rm \,Myr^{-1}$, $ 1-6 \rm \,Myr^{-1}$ and $ 6-17 \rm \,Myr^{-1}$, respectively.
It can be estimated that the total number of Galactic BH$ - $CS binaries formed over the past 10 Gyr is of the
order $ 10^{5}-10^{6} $.
\begin{figure}[hbtp]
\centering
\includegraphics[width=0.5\textwidth]{mf.pdf}
\caption{Predicted number distributions of Galactic BH$ - $WD UCXBs as potential LISA sources in
the $ M_{\rm WD} - f_{\rm GW} $ and $ |\dot{f}_{\rm GW}| M_{\rm BH}^{-2/3} - f_{\rm GW}$ planes under
the stochastic model. The colors in each pixel are scaled according to the numbers of the binary systems.
We fit the data with linear relationships of $ \log M_{\rm WD} = 1.12+0.93\log f_{\rm GW} $ and $\log (|\dot{f}_{\rm GW}| M_{\rm BH}^{-2/3}) = -5.04 + 4.73 \log f_{\rm GW}$, as plotted in the two dashed lines.
\label{figure1}}
\end{figure}
\begin{figure*}[hbtp]
\centering
\includegraphics[width=0.85\textwidth]{NS.pdf}
\caption{Similar to Figure 3, but for BH$ - $NS binaries.
\label{figure1}}
\end{figure*}
\begin{figure*}[hbtp]
\centering
\includegraphics[width=0.85\textwidth]{BH.pdf}
\caption{Similar to Figure 3, but for BH$ - $BH binaries.
\label{figure1}}
\end{figure*}
\subsection{The case of BH$ - $WD systems}
Figure 3 presents the histogram distributions for the calculated number of BH$ - $WD binaries as a function of
the BH mass, the WD mass, the orbital period and the eccentricity under assumption of different models. The solid and
dashed curves correspond to detectable BH$ - $WD binaries by LISA and all the Galactic systems (for comparison), respectively. Compared with
the delayed and the stochastic models, it is clearly seen that there are no close BH$ - $WD binaries formed in the rapid model.
The reason is that the rapid model can only produce BHs massive than $ 5 M_{\odot} $, so mass transfer from an intermediate-mass donor
star is always stable, which causes the resulting BH$ - $WD systems to have orbital periods longer than 30~days.
In comparison, both the delayed and the stochastic models allow the formation
of mass-gap BHs, CE phases can take place during the progenitor evolution involving a $ \sim 2 - 5M_{\odot} $ BH and
a $ \sim 6-10M_{\odot} $ donor (see Section 3), probably resulting in the creation of close BH$ - $WD systems. There are
$ \sim 2 $ and $ \sim 38 $ detectable LISA binaries generated in the delayed and stochastic models, respectively.
We find that all detectable BH$ - $WD binaries by LISA host BHs within the mass gap and the BH mass distribution has
a peak at $ \sim 2-3 M_{\odot} $. According to the distribution of the WD masses, the LISA sources can be classified into
two groups with $ M_{\rm WD} \lesssim 0.1 M_{\odot}$ and $M_{\rm WD} \sim 0.6-1.4M_{\odot} $.
All the BH$ - $WD binaries have circular orbits with periods of $ \lesssim 0.1 $ day.
The LISA systems with $M_{\rm WD} \sim 0.6-1.4M_{\odot} $ are detached binaries.
The orbital shrink due to GW radiation may lead the originally detached binaries to begin RLO, evolving to be
UCXBs. Mass transfer proceeds rapidly
in the binaries with WD donors massive than $ \sim 0.1M_{\odot} $, so such mass-transferring systems have negligible contribution to the
whole LISA binary population. Subsequently, mass transfer may settle into an equilibrium state when the response of the RL radius matches
the one of the WD radius \citep[see also][]{st21}. Besides the detached systems with a $ \sim 0.6-1.4M_{\odot} $ WD,
the LISA sources may also be observed as UCXBs with a $ \lesssim 0.1 M_{\odot} $ WD donor around a BH accretor.
Note that these UCXBs should appear as expanding rather than merging systems since mass transfer tends to widen the binary orbits.
Based on the delayed (stochastic) model, we estimate that there are about $ \sim 1 $ ($ \sim 20 $) BH$ - $WD binaries that may be
observed via both electromagnetic and GW signals.
For the systems with WDs more massive than $ \sim 1 M_{\odot} $, the binary orbits at the onset of RLO are so compact that
the orbital decay due to GW radiation can
overcome the orbital expansion due to mass transfer, finally leading the binaries to merge.
\begin{figure*}[hbtp]
\centering
\includegraphics[width=1.05\textwidth]{hc.pdf}
\caption{Predicted number distributions of observable GW sources for Galactic BH$ - $CS binaries in the LISA frequency band.
The rapid, delayed and stochastic models correspond to the different panels from top to bottom. In each panel, we have labelled the
number of corresponding GW sources and the fraction $ f_{\rm MG} $ of systems hosting (at least) a mass-gap BH. The dashed curve
denotes the LISA sensitivity curve fitted by \citet{rcl19}. The colors in each pixel are scaled according to the corresponding numbers of the
GW sources.
\label{figure1}}
\end{figure*}
Using a semianalytical approach, \citet{st21} identified two universal relationships for mass-transferring BH$ - $WD binaries:
$ M_{\rm WD} $ vs. $ f_{\rm GW} $ and $ \dot{f}_{\rm GW} M_{\rm BH}^{-2/3} $ vs. $ f_{\rm GW}$.
The mass$ - $radius relation of WDs and the condition of
$ M_{\rm WD} \ll M_{\rm BH}$ are implicitly used to derive the above relationships. In Figure~4, we show the number distributions
of Galactic BH$ - $WD UCXBs that are likely to be detected by LISA in the $ M_{\rm WD} - f_{\rm GW} $ (top) and
$ |\dot{f}_{\rm GW}| M_{\rm BH}^{-2/3} - f_{\rm GW}$ (bottom) planes under the stochastic model. Each panel
contains a $ 100\times 100 $ matrix element for the corresponding parameters. The color in each pixel denotes the number of
LISA UCXBs in the matrix element by accumulating the product of their birthrates of the systems passing
through it with the time duration. Our simulated outcomes confirm the relationships
proposed by \citet{st21}. The GW frequency of BH$ - $WD UCXBs can cover the range of $ \sim 1-10 $ mHz. Importantly,
these relationships may be applied to disentangle the component masses of LISA BH$ - $WD UCXBs.
It is possible that they are also suitable for the systems with a WD donor when the accretor is
an NS \citep{ttm18,clw20,wcl21} or even another massive WD \citep{ny04,kbl17}, which is beyond the scope of this paper.
\subsection{The case of BH$ - $NS systems}
In Figure 5 we plot the histogram number distributions of observable BH$ - $NS systems by LISA as a function of the binary
parameters in the rapid (black curves), delayed (red curves) and stochastic (green curves) models. The dashed curves
correspond to all BH$ - $NS binaries in the Milky Way for comparison. The rapid model predicts that the BH
masses of LISA binaries are distributed with a peak at $ \sim 8-9 M_{\odot} $, while the delayed and stochastic models favor
creating the binaries with BHs being in the mass gap. The reason is that the
binaries with light BH progenitors (see Figure~1) tend to have high formation rates due to the initial mass function. Besides, in the rapid model,
the systems are more likely to avoid disruption where BHs are formed via direct collapse without any kick \citep{fb12}.
There is a common feature that quite a fraction of
Galactic BH$ - $NS binaries contain a $ \sim 1.3M_{\odot} $ NS in all models, corresponding to the NSs originating
from electron-capture supernovae. For the LISA sources, it can be seen that the NS masses have a more flat distribution
in each model. All models predict that the orbital periods of Galactic BH$ - $NS binaries are mainly distributed in a broad range of
$ \sim 1-10000 $ days, while
only $ \sim 2-14 $ of systems can appear as the LISA sources with orbital periods
less than $ \sim 0.1 $ day. The rapid and delayed
models tend to produce the BH$ - $NS binaries with relatively large eccentricities, while the stochastic model favor
producing the systems with nearly circular orbits since most NSs are formed with low kicks.
As a consequence of the orbital decay via GW radiation, merging BH$ - $NS binaries that can be observed by LISA have relatively
low eccentricities of $ \lesssim 0.2 $.
NSs are likely to be observed as radio pulsars if they are still active and beamed towards the Earth.
Among all BH$ - $NS binaries, a very small fraction of them are expected to be identified
due to the detection of radio pulsars. Based on the formation rates ($ \sim 4-33 \rm\, Myr^{-1} $) of Galactic BH$ - $NS systems
in our adopted three models, we roughly estimate that there are $ \sim 20-200 $ BH binaries containing a radio pulsar
in the Milky Way, assuming a transformation factor
of $\sim 6 \rm Myr $ between the formation rate and the binary number \citep[see Table 1 of][]{sl18}.
\subsection{The case of BH$ - $BH systems}
In Figure 6 we present similar histogram diagrams for calculated number distributions (solid curves)
of LISA BH$ - $BH systems under
different supernova models. For comparison, the dashed curves denote all Galactic BH$ - $BH binaries.
The primary BHs tend to be heavier than the secondary ones, and have the maximal mass of
$ \sim 18 M_{\odot} $ in LISA BH$ - $BH binaries ($ \sim 22 M_{\odot} $ in all the Galactic binaries).
The rapid model predicts that the secondary BHs of LISA binaries have the mass distribution
in the range of $ \sim 6-13M_{\odot} $ with a
peak $ \sim 8-9M_{\odot} $ which is similar to the case for the BH masses of LISA BH$ - $NS systems, while the
other two models anticipate that a
significant fraction of secondary BHs have masses within the mass gap. As most natal
BHs are imparted by negligible kicks in the rapid and stochastic models,
a large part of Galactic BH$ - $BH binaries have long periods of $ \gtrsim 3000 $ days in nearly circular orbits.
In the delayed model, the orbital periods are mainly distributed in the
range of $ 1-10000 $ days with a peak $ \sim 10 $ days, and the orbital eccentricities have a flat distribution between $ 0-1 $.
Our calculations show that there are $ \sim 12-26 $ BH$ - $BH binaries detectable by LISA. Compared with the LISA
BH binaries with an NS or a WD companion, these BH$ - $BH systems possess longer orbital periods up to $ \sim 0.3 $ day.
Also, LISA BH$ - $BH binaries are expected to have relatively low eccentricities of $ \lesssim 0.2 $.
\subsection{GW detection of BH$ - $CS systems}
Figure 7 shows predicted number distributions of detectable BH$ - $CS binaries by LISA in the $ h_{\rm c}-f_{\rm GW} $
plane for the rapid, delayed and stochastic models (from top to bottom panels). The left, middle and right panels correspond
to the CS companion being a WD, an NS and a BH, respectively. In each panel, we have labelled the predicted number of the
corresponding GW sources and the fraction $ f_{\rm MG} $ of systems hosting BHs within the mass gap.
In the rapid
model, there are no mass-gap BHs produced, so $ f_{\rm MG} $ are always zero for all three types of BH$ - $CS binaries.
Both the delayed and the stochastic models predict that all BH$ - $WD binaries detectable by LISA possess a mass-gap
BH, i.e. $ f_{\rm MG} = 1.0 $, and that $ f_{\rm MG} $ decreases to $ \sim 0.7 $ and $ \sim 0.3 $ for
BH$ - $NS and BH$ - $BH binaries, respectively. In the rapid model, all BH$ - $WD binaries have wide orbits and
do not appear to be LISA sources. In the delayed and the stochastic models, BH$ - $WD systems
cover two regions that correspond to detached systems (with relatively high $ h_{\rm c} $ values) and
UCXBs (with relatively low $ h_{\rm c} $ values).
\begin{figure}[hbtp]
\centering
\includegraphics[width=0.4\textwidth]{mchirp.pdf}
\caption{Calculated number distributions of LISA BH$ - $CS binaries as a function of the chirp mass in all our adopted models.
The top, middle and bottom panels correspond to the CS companions being WDs, NSs and BHs, respectively.
\label{figure1}}
\end{figure}
In Figure 8 we show the calculated number distributions of detectable BH$ - $CS binaries by LISA for all our adopted models, as
a function of the chirp mass. In both the
delayed and the stochastic models, LISA BH$ - $WD binaries can be divided into detached systems with
$ M_{\rm chirp} \sim 0.8-2M_{\odot}$ and UCXBs with $ M_{\rm chirp} \lesssim 0.5M_{\odot}$. For BH$ - $NS binaries,
the chirp mass distributions can cover the range of $ \sim 1.2-4M_{\odot} $,
with an overlap between $\sim 2.2-3M_{\odot} $ between the three models.
LISA BH$ - $BH binaries have chirp masses mainly distributed in the range of $ \sim 3-12M_{\odot} $ for the
delayed and stochastic models, and $ \sim 5-12M_{\odot} $ for the rapid model.
Based on the chirp mass distributions
for different types of BH$ - $CS binaries, LISA may distinguish BH$ - $BH systems
if $ M_{\rm chirp} \gtrsim 4M_{\odot}$ and
BH$ - $WD systems if $ M_{\rm chirp} \lesssim 1M_{\odot}$ from BH$ - $NS binaries. However, the identification of BH$ - $CS
binaries solely from GW observations is difficult since they can be confused with other types of GW sources such as
NS$ - $NS systems and NS$ - $WD systems \citep[see also][for the discussion on the identification of BH--BH binaries]{slp20}.
\section{Populations of BH$ - $CS mergers in the local Universe}
To estimate the merger rate density $ \mathcal{R}_{\rm BHCS} $ of the BH$ - $CS binaries in the local Universe, we have evolved a large number
($2 \times 10^{7} $) of the primordial binaries for each model. The metallicity Z for every primordial binary is randomly taken
in the logarithmic space between 0.0001 and 0.02.
After simulations, we record relevant information for the BH$ - $CS binaries that can merge within
the Hubble time, including the CS types, the component masses and the delay time $ t_{\rm delay} $ (from the formation of the
primordial binaries to the merger of the BH$ - $CS binaries).
For each BH$ - $CS merger, the look back time of the merger can be
estimated as
\begin{eqnarray}
t_{\rm merg} = t_{\rm lb}-t_{\rm delay},
\end{eqnarray}
where $ t_{\rm lb} $ is the look back time for (binary) stars formed at redshift $ z $,
\begin{eqnarray}
t_{\rm lb}(z) = \frac{1}{H_{0}} \int_{0}^{z} \frac{1}{(1+z)[\Omega_{\rm M}(1+z)^{3}+\Omega_{\Lambda}]^{1/2}} \rm{d}z,
\end{eqnarray}
where $ H_{0} $, $ \Omega_{\rm M} $ and $ \Omega_{\Lambda} $ are the cosmological parameters for which we
adopt the values from \citet{planck16}. Following \citet{mg17},
we consider the BH$ - $CS mergers with
$ t_{\rm merg} \geq 0 $, excluding the systems that will merge in the future.
And, we only include the mergers in the local Universe (defined as
$ z\leq 0.1 $) using the condition of $ t_{\rm merg} \leq t_{\rm lb}(z=0.1) $.
We further divide the recorded binaries into 20 logarithmically spaced metallicity bins between $ Z = 0.0001-0.02 $ for each model.
The metallicity for stars at a given redshift is computed as $ \log Z(z)/Z_{\odot} = -0.19z $ if $ z \leq1.5 $ and
$ \log Z(z)/Z_{\odot} = -0.22z $ if $ z > 1.5 $ \citep{rw12}. For $ Z < 0.0001 $ or $ Z > 0.02 $, we instead use the recorded information of
the systems with $ Z = 0.0001 $ or $ Z = 0.02 $. In each metallicity bin, the parameter distribution of the primordial binaries has been
normalized to unity.
Similar to the treatment of \citet{gm18}, we use the following analytic equation to calculate $ \mathcal{R}_{\rm BHCS} $ as \citep[see also][]{sm19}
\begin{equation}
\mathcal{R}_{\rm BHCS} = \frac{1}{t_{\rm lb}(z= 0.1)} \sum^{0.1}_{z=15} t_{\rm lb}(z) \left( \frac{f_{\rm bin}}{2} \right)
\left( \frac{{\mathcal{SFR}}(z)}{M_{*}} \right) W_{\rm b},
\end{equation}
where $ \mathcal{SFR}(z) $ is the cosmic star-formation rate density as a function of
redshift for which we use the fitted formula given by \citet{md14},
\begin{equation}
\mathcal{SFR}(z) = 0.015 \frac{(1+z)^{2.7}}{1+[(1+z)/2.9]^{5.6}} M_{\odot} \rm Mpc^{-3} yr^{-1}.
\end{equation}
\subsection{The BH--CS mergers with(out) mass-gap BHs}
In Table 1, we show the predicted local merger rate densities of different types of BH--CS binaries and
the fraction $ f_{\rm MG} $ of the merging binaries that host mass-gap BHs for all our adopted models.
The delayed and stochastic models predict
$ \mathcal{R}_{\rm BHWD} \sim 6.5 \rm\, Gpc^{-3}yr^{-1}$ and $ 58.6 \rm\, Gpc^{-3}yr^{-1} $, respectively.
The local merger rate densities of BH--NS binaries are
in the range of $ \sim 10.2-71.7 \rm\, Gpc^{-3}yr^{-1} $, consistent with the inferred upper limit of
$ 610 \rm\, Gpc^{-3}yr^{-1}$ from the LIGO/Virgo data\footnote{More recently, \citet{aaa21}
reported the detection of two BH--NS mergers (GW200105 and GW200115) and inferred the merger rate density of
$ 45^{+75}_{-33} \rm\, Gpc^{-3}yr^{-1} $ if assuming they are representative of the BH--NS population.
In this case, our calculated results can still match the observations.} \citep{ab19}. For BH--BH binaries,
the merger rate densities are in the range of $ \sim 42.6-76.1 \rm\, Gpc^{-3}yr^{-1} $,
slightly larger than the one $ 23.9^{+14.3}_{-8.6} \rm\, Gpc^{-3}yr^{-1} $ given by LIGO/Virgo observations
\citep{ab20b}. Our obtained rates are obviously subject to many uncertainties such as the assumptions on
supernova kicks, CE ejection efficiencies, stellar winds, and initial parameter distribution of the primordial binaries.
For example, the calculated $ \mathcal{R}_{\rm BHBH} $ may better match
observations if increasing the magnitude of the kick velocities for BHs.
Compared with BH--CS mergers in the rapid model, we estimate that $ \sim 99\% $ ($ \sim 99\% $)
of BH--WD mergers, $ \sim 68\% $ ($ \sim 75\% $) of BH--NS mergers, and $ \sim 38\% $ ($ \sim 28\% $) of BH--BH mergers
host mass-gap BHs in the delayed (stochastic) model. We can see that these fractions
are very close to those for the corresponding type of LISA binaries in the Milky Way.
\begin{figure}[hbtp]
\centering
\includegraphics[width=0.4\textwidth]{zmerg.pdf}
\caption{The fractions $ f_{\rm MG} $ of the mergers with mass-gap BHs among
all mergers for different types of BH--CS systems as a function of the metallicity. The red and green
curves correspond to the delayed and the stochastic models, respectively. The top, middle
and bottom panels correspond to the CS being a WD, an NS and a BH, respectively.
\label{figure1}}
\end{figure}
Figure 9 shows the fractions $ f_{\rm MG} $ of the BH--CS mergers with mass-gap BHs among all mergers as a function of
the metallicity.
We find that $ f_{\rm MG} $ is not strongly dependent on metallicity.
Both the delayed and the stochastic models predict that
$f_{\rm MG} \sim 0.7-1.0$ for BH--WD mergers, $ f_{\rm MG} \sim 0.5-0.8$ for BH--NS mergers, and
$f_{\rm MG} \sim 0.2-0.4$ for BH--BH mergers.
\begin{figure}[hbtp]
\centering
\includegraphics[width=0.4\textwidth]{mm.pdf}
\caption{Component masses of the BH--CS mergers in the local Universe for our adopted three models. The black, red and
green circles correspond to the CSs being WDs, NSs and BHs, respectively. The position of GW190814 is marked with a blue star.
\label{figure1}}
\end{figure}
Figure~10 shows the component masses of the BH$ - $CS systems merged in the local Universe for all our adopted models. The black, red
and green circles correspond to the CS companions being WDs, NSs and BHs, respectively. The blue star marks the position of
GW190814. We can see that GW190814 cannot form in the rapid model if its less-massive component
is a mass-gap BH. Predictably, some BH--BH binaries can match the component masses of GW190814-like systems in both
the delayed and stochastic models. The formation of GW190814-like sources has been explored by \citet{zs20}, who suggest that
the predicted rate of such mergers is in tension with the empirical LIGO/Virgo rate of other CS pair mergers if only involving isolated
binary evolution channel.
Based on our calculated outcomes, it is possible to form BH$ - $NS systems where the NS forms first in the
delayed and stochastic models (see Figure~10 for the binaries with primary mass $ \sim1-2M_{\odot} $),
but the merger rate of these binaries is $ 1-2 $ orders of magnitude lower than that of the systems
where the BH forms first. In the stochastic model, even a WD can form first in BH$ - $WD systems. Mass transfer efficiency during
the primordial binary evolution is a vital factor to determinate whether the NS/WD can be formed before the BH \citep{spn04}. Since we adopt the
rotation-dependent mass transfer mode in our calculations, the relatively low mass-transfer efficiency makes it difficult to form
the NS/WD before the BH.
\subsection{Formation channels of BH--CS mergers}
From the evolutionary point of view, BH--CS systems form either from stable mass transfer channel or the CE channel.
Considering the evolution of the BH binaries with nondegenerate donors experienced either a stable mass transfer phase or a CE phase, we
identify two channels for the formation of BH$ - $CS systems. Almost
all BH--WD mergers are produced from the CE channel. About $ (10-40)\% $ of BH--NS mergers are formed through the stable mass transfer
channel, with the merger rate densities $ \mathcal{R}_{\rm BHNS} \sim 4.9 \rm\, Gpc^{-3}yr^{-1}$,
$ 4.2 \rm\, Gpc^{-3}yr^{-1} $ and $ 9.9 \rm\, Gpc^{-3}yr^{-1} $ in the rapid, delayed and stochastic model, respectively.
About $ (30-70)\% $ of the BH$ - $BH mergers form from
the stable mass transfer channel,
with $ \mathcal{R}_{\rm BHBH} \sim 29.7 \rm\, Gpc^{-3}yr^{-1}$, $ 36.6 \rm\, Gpc^{-3}yr^{-1} $ and
$ 22.6 \rm\, Gpc^{-3}yr^{-1} $ in the rapid, delayed and stochastic model, respectively.
The contribution of the stable mass transfer channel stems from our revised CE criteria of mass transfer stability for the BH binaries with nondegenerate donors which allow large parameter spaces for stable mass transfer (see Section 3).
In Figure 11, we schematically show the formation history of a BH$ - $BH merger
containing a mass-gap BH through the evolutionary channel without any CE phase. The binary evolution starts from
a primordial system consisting of a $ 30M_{\odot} $ primary star and a $ 22 M_{\odot} $ secondary star in a 10 day orbit.
The metallicity of both stars is initially taken to be 0.001. At the time of 6.6 Myr, the primary star, which has climbed to the
supergiant branch, starts to overflow its RL. After about 0.3 Myr of stable mass transfer, the primary is stripped to
be a $\sim 10.6M_{\odot} $ Wolf-Rayet star and the secondary is rejuvenated by accretion of $ \sim 1.8M_{\odot} $ matter.
The mass transfer efficiency is about 0.1 during this phase, with the rotation-dependent mode.
When the Wolf-Rayet star collapses into a BH, the binary evolves to be an eccentric
($ e \sim0.32 $) system in a $ \sim 39 $ day orbit. At the time of 9.5 Myr, the secondary star overflows its RL and
transfers mass to the BH, causing the binary orbit to shrink rapidly. The post-mass transfer system possesses a
$\sim 6.9M_{\odot} $ BH and a $\sim 8.5M_{\odot} $ Wolf-Rayet star in a nearly circular orbit with a period of 5.2 days.
After 0.3 Myr, a close BH$ - $BH system is formed and the second born BH has a mass of $ \sim 4.4M_{\odot} $. About 9 Gyr later,
this binary will merge to be a single BH.
\begin{figure}[hbtp]
\centering
\includegraphics[width=0.5\textwidth]{form.pdf}
\caption{Schematic plot depicts the formation of a BH$ - $BH merger containing a mass-gap component via
the channel without any CE phase. Acronyms for different stellar
types used in this figure$ - $MS: main sequence; SG: supergiant; WR: Wolf Rayet.
\label{figure1}}
\end{figure}
\begin{figure*}[hbtp]
\centering
\includegraphics[width=0.8\textwidth]{qm.pdf}
\caption{Predicted mass ratio (of the light to the heavy components) and total mass distributions of the BH$ - $CS mergers
in the local Universe for our adopted three models.
\label{figure1}}
\end{figure*}
\subsection{Mass ratios and total masses of BH--CS mergers}
Figure 12 shows the merger rate density distributions of the BH$ - $CS mergers
in the local Universe, as a function of the mass ratio (of the light to the heavy components) and the total mass.
(1)~Since almost all BH$ - $WD mergers possess a mass-gap BH and the WDs have mass $ \sim 1M_{\odot} $,
both the delayed and the stochastic models predict that the mass ratios of such mergers are mainly distributed in the range of $ \sim 0.2-0.5 $.
Meanwhile, their total masses are expected to vary in a narrow range of $ \sim 3-6 M_{\odot} $. (2)~In the rapid model,
the BH$ - $NS mergers have the mass ratio distribution in the range of $ \sim 0.1-0.3 $ with a peak at $ \sim 0.2 $ and the
total mass distribution in the range of $ \sim 6-12M_{\odot} $ with a peak at $ \sim 10-12M_{\odot} $. Compared with the rapid model,
the peak of the mass ratio distribution for BH$ - $NS mergers shifts to larger values of $ \sim 0.5 $ ($ \sim 0.3 $) and the peak of the total
mass distribution to lower mass of $ \sim 4-8 M_{\odot}$ ($ \sim 4-6 M_{\odot}$) in the delayed (stochastic) model. (3)~The
BH$ - $BH mergers in the rapid and stochastic models tend to have large mass ratios whose distribution has a broad peak at $ \sim 0.7-0.9 $
and $ \sim 0.6-0.9 $, respectively, while the delayed model has a relatively flat mass ratio distribution between $ \sim 0.4- 0.9$.
The total masses of the BH$ - $BH mergers in the rapid model are always larger than $ \sim 12M_{\odot} $, but can extend down to
$ \sim 4-6M_{\odot} $ in the delayed and stochastic models. After the detection of GW190412, the percentage of the BH$ - $BH mergers with mass
ratios less than 0.4 has been constrained to constitute $ \gtrsim 10\% $ of the whole BH$ - $BH merger population \citep{ab20c}. We estimate
that the fractions are $ \sim 1\% $, $ \sim 9.8\% $ and $ 6.6\% $ in the rapid, delayed and stochastic models, respectively.
We do not further discuss the distribution shape (a broken power-law function) for the component masses of BH$ - $BH mergers \citep{ab20b},
since one can revise the input physics (e.g. BH natal kicks and CE ejection efficiencies) to match the LIGO/Virgo data \citep[see e.g.,][]{ob21}.
\section{Conclusions}
In this paper, we have investigated the properties of merging BH$ - $CS binary population in the Milky Way and the local Universe,
based on binary evolution calculations with the \textit{BSE} and \textit{MESA} codes. Only the systems formed
through isolated binary evolution are taken into account.
Compared with previous works, the innovations in this work mainly lie in two aspects.
(1) We have revised the criteria for the occurrence of CE evolution in the BH binaries with nondegenerate donors,
by a large grid of detailed binary evolution simulations with the \textit{MESA} code.
As a consequence, we obtain the potential parameter space for dynamically (un)stable mass transfer, and incorporate into
our BPS calculations. (2) We consider various mechanisms for the formation of NSs and BHs. The (non)existence of
the mass gap between NSs and BHs is crucial to constrain the mechanism of supernova explosions.
We adopt three models to deal with the compact remnant masses and natal kicks during supernova explosions,
that is the rapid mechanism \citep{fb12}, the delayed mechanism \citep{fb12} and the stochastic recipe \citep{mm20}.
The delayed and the stochastic models allow the formation of CSs within the mass gap, while the rapid model naturally leads to
the mass gap between NSs and BHs. The fractions $ f_{\rm MG} $ of merging systems with mass-gap BHs among
the whole population for different types of BH$ - $CS systems can be used as an indicator
to examine relevant supernova mechanisms.
In the rapid model, $ f_{\rm MG} = 0$ always holds.
We identify two formation channels for close BH$ - $CS systems that appear as GW sources,
depending on whether the mass transfer in the progenitor BH binaries is stable.
We find that almost all close BH$ - $WD binaries have experienced a CE phase, during which a mass-gap BH
was engulfed by the envelope of a $ \sim 6-10M_{\odot} $ supergiant (the WD's progenitor).
So for merging BH$ - $WD systems, we expect that $ f_{\rm MG} \sim 1$ in both the delayed and the stochastic models.
For merging BH$ - $NS
and BH$ - $BH systems, both the CE and stable mass transfer channels take effect. In both the delayed and stochastic models,
we obtain that $ f_{\rm MG} \sim 0.7$ for merging BH$ - $NS binaries and $ f_{\rm MG} \sim 0.3$ for merging BH$ - $BH binaries.
It seems that our $ f_{\rm MG} $ predictions for merging BH$ - $CS binary population cannot make a clear distinction between the delayed
and the stochastic models. The LIGO/Virgo operation will provide a rapid growing sample of BH$ - $BH merger events.
For BH$ - $BH mergers with total mass $ \lesssim 30M_{\odot} $, the delayed model anticipates a more flat mass-ratio distribution
between $ \sim 0.4-0.9 $ while the stochastic model favors large mass ratios distributed with a broad peak at $ \sim 0.6-0.9 $ (see Figure 12).
We estimate that there are totally dozens of BH$ - $CS systems detectable by LISA in the Milky Way, and
the merger rate density of BH$ - $CS systems varies in the range of $ \sim 60-200 \rm\, Gpc^{-3}yr^{-1}$ in the local Universe.
For merging BH$ - $WD binaries, the delayed and stochastic models predict $ \sim 2 $ and $ \sim 38 $ systems may be
observed by LISA in the Milky Way, respectively. In addition, we expect that local BH$ - $WD merger rate is in the range of
$ \sim 7-59 \rm\, Gpc^{-3}yr^{-1}$ for the delayed and stochastic models.
Our calculations show that $ \sim 2-14 $ BH$ - $NS systems are potential GW sources in the Milky Way and the local
merger rate of BH$ - $NS binaries is in the range of $ \sim 10-80 \rm\, Gpc^{-3}yr^{-1}$. Among all Galactic
BH$ - $BH systems, $ \sim 12-26 $ of them are expected to be the GW sources in the LISA frequency. Our calculated merger
rate of BH$ - $BH binaries in the local Universe varies in the range of $ \sim 40-80 \rm\, Gpc^{-3}yr^{-1}$.
At last we remind that our results are still subject to many uncertainties, including the assumption of binary fraction ($ f_{\rm b} = 1 $),
the treatments of stellar and binary evolutionary processes \citep[see e.g.,][]{ln12}, the options of Galactic and cosmological parameters, and etc.
It is obvious that $ f_{\rm b} \sim 0.6-0.9$ from observations \citep{md17} can lead to the decrease of the LISA-detectable numbers and the
local rates for the merging BH--CS binary populations.
\acknowledgements
We thank the anonymous referee for constructive suggestions
that helped improve this paper. This work was supported by the Natural Science Foundation
of China (Nos.~11973026, 11773015 and 12041301), the Project U1838201
supported by NSFC and CAS, and the National Program on Key Research and
Development Project (Grant No. 2016YFA0400803).
|
\section{Introduction}
Active particles are particles or organisms that convert the stored energy or energy from the surroundings into directed motion \citep{Schweitzer2007}, and a suspension of active particles can be referred to as active matter. We are concerned here with the micron-sized active particles such as biological swimming microorganisms or the synthetic microrobots. Because of the ubiquity of microorganisms in nature, as well as aided by tremendous progress in microfluidic experimental techniques, there has been an enormous amount of research on the motion of active particles in viscous fluids, including developing an understanding of the physics governing microorganism motility \citep{Brennen1977, Berg2004, Fauci2006, Lauga2009, Koch2011, Guasto2012, Elgeti2015, Lauga2016, Lauga2020}.
Active particles typically reside in the gradients of heat, light or chemicals and often react to these fields by reorienting and moving along the gradients; a phenomenon known as \textit{taxis}. By exploiting this tendency, one can sort or control the active matter by imposing external gradients. A relatively unexplored form of taxis is viscotaxis---directed motion in viscosity gradients. Several microorganisms move through viscosity gradients and hence exhibit viscotaxis. For instance \textit{Leptospira} and \textit{Spiroplasma} have been observed to display positive viscotaxis, moving up viscosity gradients \citep{Kaiser1975, Petrino1978, Daniels1980, Takabe2017} while \textit{Escherichia coli} displays negative viscotaxis \citep{Sherman1982}. Green microalgae, \textit{Chlamydomonas reinhardtii}, display complex dynamics in the presence of spatial variations in viscosity. If viscosity gradients are weak, they tend to accumulate in the high viscosity regions due to slower speeds, but in the presence of strong viscosity gradients, they reorient towards the low viscosity regions, displaying negative viscotaxis \citep{Stehnach2020, Coppola2021}. \textit{Helicobacter pylori}, a bacterium commonly found in our guts, also swims through viscosity gradients as it propels by locally lowering the viscosity of the surrounding mucus layer \citep{Montecucco2001, Celli2009}. Hence, a physical description of the fluid dynamics of viscotaxis allows us to understand the consequences on the motility of microorganisms in nature, but also presents a mechanism by which to control active matter, both natural and synthetic.
Several researchers have analyzed the motion of particles, passive or active, in viscosity gradients. Initial research in this field focused on particles moving through a fluid that is otherwise homogeneous in the absence of the particle, but the presence of the particle generates a disturbance (inhomogeneity) in fluid properties such as viscosity. For instance, a particle hotter than the surrounding fluid disturbs the temperature and thus the viscosity, thereby generating the gradients. Research of this sort started with the calculation of the force and torque acting on a hot passive particle \citep{Oppenheimer2016}. It was found that a dipolar temperature distribution on the particle, that causes a similar viscosity distribution in the nearby fluid, induces a coupling between the force (resp. torque) and the angular velocity (resp. translational velocity). Such coupling is absent for non-skew particles (eg: sphere, spheroid, disk etc) in the homogeneous Newtonian fluids \citep{Happel1981}. Later, the motion of an active particle in viscosity gradients caused by variation in the concentration of nearby nutrients was analyzed \citep{Shoele2018}. This work modeled active particles as a spherical squirmer with fixed power and assumed a weak dependence of viscosity on the nutrient concentration. In the squirmer model, an active particle propels due to prescribed slip on its surface, which is ultimately a manifestation of the coordinated beating of cilia on the surface of a ciliated organism or the chemical reactions occurring on the surface of a phoretic particle. It was found that the speed of a swimmer can either increase or decrease depending on the relative importance of the advective to the diffusive transport rate of the viscosity. Recently, the motion of a spheroidal squirmer in the nutrient induced viscosity gradients was also analyzed \citep{Eastham2020}. Accounting for a strong coupling between the nutrient concentration and the viscosity, it was found that nutrient advection and viscosity gradients significantly affect the swimming and feeding performance but not the aspect ratio of the particle.
Recent research explores the motion of active particles in preexisting (or background) viscosity gradients. Such analysis is generally carried out by representing active particles as prototypical model swimmers and often by treating the background viscosity field as linear. Initial research in this field modeled active particles as spheres connected by rods, where each sphere locally sees a constant background viscosity, and is acted on by a fixed active (thrust) force, while hydrodynamic interactions are neglected \citep{Liebchen2018}. Using this approach, it was found that non-chiral (linear) active particles generically move up gradients unless they are uniaxial, in which case they do not exhibit viscotaxis by symmetry. Otherwise, non-linear or chiral swimmers can even move down the gradients. As \textit{Leptospira} and \textit{Spiroplasma} exhibit non-uniaxial shapes while \textit{E. coli} is chiral, this work possibly explains the viscotaxis of these organisms based on their shape and the resulting hydrodynamics. Later, the motion of spherical squirmers in viscosity gradients was analyzed, taking into account locally varying hydrodynamic forces and modifications in the flow due to viscosity differences, and they were found to move down viscosity gradients \citep{Datt2019}. A different model microorganism, Taylor's swimming sheet that propels by passing traveling waves along its surface, moving along or against the viscosity gradients was also analyzed \citep{Dandekar2020}. It was found to speed up in the presence of viscosity gradients irrespective of its direction of propulsion. Recently, the axisymmetric motion of a synthetic helical swimmer crossing a sharp as well as diffuse viscosity interface was analyzed \citep{Lopez2020}. It was found that a head-first (resp. tail first) swimmer moving up the gradients experiences the speed reduction (resp. enhancement) but a swimmer moving down the gradient always undergoes the speed reduction irrespective of its orientation.
A viscosity gradient can arise due to the spatial variation of a scalar like the temperature, salt or nutrient concentration in a fluid that is ultimately coupled to viscosity. However, the introduction of a particle will generally disturb a preexisting viscosity field in order to satisfy boundary conditions for the scalar field on the surface of the particle (because the properties of the particle are different from those of the fluid). For instance, even at steady-state a particle in an otherwise linear temperature field will disturb the background field unless the thermal conductivity of the particle and the fluid are identical. The disturbance generated by the particle tends to vanish far from the particle, however, near the particle, it is the same order of magnitude as that of the preexisting (background) viscosity field. Despite this, most previous work on active particles in viscosity gradients have neglected the disturbance caused by the particle to the ambient viscosity field \citep{Liebchen2018, Datt2019, Stehnach2020, Lopez2020}. In this work we aim to address this gap and investigate the effect of the disturbance of the viscosity induced by the presence of the particle and the consequence on viscotaxis. Furthermore, several previous studies used only the local effects of changes in viscosity not the (non-local) modification of the flow (from that in a homogeneous fluid), in order to study the particle motion in viscosity gradients \citep{Liebchen2018, Lopez2020}. These non-local effects may be as important as the complementary local effects. In fact, the non-local effects have been observed to be more important than the local effects for particles (passive and active) in non-Newtonian fluids \citep{Einarsson2017, Riley2017, Gomez2017, Pietrzyk2019}. In light of this, we perform a quantitative comparison between local and non-local effects for the motion of an active particle in viscosity gradients.
We organize the paper as follows. We provide the mathematical formulation associated with the motion of active particles in viscosity gradients in Sec.~\ref{sec:Prob_Form}, and describe the solution methodology in Sec.~\ref{sec:Sol_Method}. We then discuss the influence of disturbance viscosity in Sec.~\ref{sec:Dist_Visc}, and distinguish between the local and non-local effects, and quantify these effects in Sec.~\ref{sec:LocalNL}. We finally provide few concluding remarks in Sec.~\ref{sec:Conc}.
\section{\label{sec:Prob_Form}Swimming in viscosity gradients}
\begin{figure}
\centering
\includegraphics[scale = 0.55]{figure1.eps}
\caption{A schematic showing the motion of an active particle in linear viscosity fields and the associated coordinate system. The radius of the particle is $a$. It translates and rotates with the velocities ${\bf{U}}$, ${\bf{\Omega }}$, respectively. The ambient viscosity $\eta_0$ increases linearly with $x$.}
\label{fig:schematic}
\end{figure}
We consider the motion of an active particle in an otherwise quiescent Newtonian fluid (see Fig.~\ref{fig:schematic} for a schematic). In the absence of the particle, the fluid viscosity, ${\eta _0}\left( {\bf{x}} \right)$, is nonuniform due to corresponding spatial variations in the temperature, salt or nutrient concentration. The particle disturbs the ambient (or background) viscosity field as its properties (like thermal conductivity) are usually different from those of fluid. We denote this disturbance viscosity by $\eta '\left( {\bf{x}} \right)$ and hence the viscosity in the presence of particle is $\eta \left( {\bf{x}} \right) = {\eta _0}\left( {\bf{x}} \right) + \eta '\left( {\bf{x}} \right)$. We are interested in leading order effects and so simply prescribe a linear variation of the ambient viscosity field, ${\eta _0} = {\eta _\infty } + \eta_{\infty} \frac{x}{L}$, where the variation itself occurs on the macroscopic length scale $L$. Usually, this length scale is much larger than the particle size $a$, i.e., $\epsilon = \frac{a}{L} \ll 1$. This means that in the vicinity of the particle, the ambient viscosity varies weakly, ${\eta _0} = {\eta _\infty } + \frac{{\eta_{\infty} a}}{L}\frac{x}{a} = {\eta _\infty } + \epsilon \eta_{\infty} x/a = {\eta _\infty } + \epsilon {\eta _1}$, where ${\eta _1} = \eta_{\infty} x/a$. Noting the absolute value of the viscosity does not affect the dynamics of an active particle with a prescribed gait \citep{Lauga2009}, we choose an arbitrary point in the fluid as the origin in the lab frame of reference, and we denote the position vector with respect to the origin and the unit vectors in the Cartesian coordinate system, respectively, by ${\bf{x}} = \left( {x,y,z} \right)$, $\left\{ {{{\bf{e}}_x},{{\bf{e}}_y},{{\bf{e}}_z}} \right\}$. In this frame, ${\bf{x}} = {{\bf{x}}_c}$ denotes the center of the particle. Also ${\eta _\infty }$ is some reference viscosity while $\epsilon$ characterizes the deviation from this reference viscosity.
Neglecting fluid inertia, the flow is governed by the incompressible Stokes equations
\begin{align}
\nabla \cdot {\boldsymbol{\sigma }} &= {\bm{0}},\\
\nabla \cdot {\bf{u}} &= 0.
\end{align}
where $\bf{u}$ is the velocity field and $\boldsymbol{\sigma }$ the stress tensor defined as
\begin{equation}
{\bm{\sigma }} = - p{\bf{I}} + {\eta _\infty }{\bm{\dot \gamma }} + {{\bm{\tau }}_{NN}},
\end{equation}
where ${\bm{\dot \gamma }} = \nabla {\bf{u}} + {\left( {\nabla {\bf{u}}} \right)^T}$ and we have defined
\begin{align}
{{\bm{\tau }}_{NN}} = \left( {\eta \left( {\bf{x}} \right) - {\eta _\infty }} \right){\bm{\dot \gamma }},
\end{align}
which captures the difference in stress due to changes in viscosity from the reference value $\eta_\infty$.
The transport of the scalar (e.g., temperature, salt or nutrient concentration) that determines the viscosity is governed by an advection-diffusion equation. For weak variations of the scalar, the change in the viscosity is linearly proportional to the change in the scalar which means that the viscosity transport is also governed by a similar advection-diffusion equation. The relative order of magnitude of the advective to the diffusive transport of viscosity is characterized by the Péclet number, $Pe$. This number is small for small particles moving at slow speeds in comparison to a highly diffusive scalar like temperature. In this case, the viscosity transport is simply governed by a Laplace equation,
\begin{equation}
{\nabla ^2}\eta = 0.
\end{equation}
Far away from the particle, the flow decays to zero while the viscosity approaches the ambient viscosity
\begin{equation}
{\bf{u}} \to {\bm{0}},\,\,\eta \to {\eta _0}\left( {\bf{x}} \right)\,\,{\rm{as}}\,\,r = \left| {\bf{r}} \right| \to \infty,
\end{equation}
where ${\bf{r}} = {\bf{x}} - {{\bf{x}}_c}$. On the particle, the fluid velocity is same as the particle surface velocity as a consequence of the kinematic and no-slip boundary conditions. The particle itself is propelling with a translational velocity ${\bf{U}}$ and an angular velocity ${\bm{\Omega }}$ due to the activity that is embedded in the slip velocity on the particle surface ${{\bf{u}}^s}$. Thus the fluid velocity on the particle is
\begin{equation}
{\bf{u}} = {\bf{U}} + {\boldsymbol{\Omega }} \times {\bf{r}} + {{\bf{u}}^s}\,\,{\rm{on}}\,\,{S_p},
\end{equation}
where $S_p$ denotes the particle surface. We neglect the particle inertia and assume the particle is neutrally buoyant. This implies the hydrodynamic force and torque acting on the particle are zero.
\begin{align}
\bf{F}&=\int_{{S_p}} {{\bf{n}} \cdot {\bm{\sigma }}\,dS} = {\bm{0}},\\
\bf{L}&=\int_{{S_p}} {{\bf{r}} \times \left( {{\bf{n}} \cdot {\bm{\sigma }}} \right)\,dS} = {\bm{0}},
\end{align}
where ${\bf{n}}$ is an unit normal to the surface that points into the fluid.
We model the active particle as a spherical squirmer of radius $a$ that has only the tangential squirming modes \citep{Lighthill1952, Blake1971, Ishikawa2006}. This model is a good representation of the ciliated organisms like \textit{Paramecium} or \textit{Opalina} which generate slip through a synchronous motion of a large number of cilia on their surface. In this model, the slip velocity ${{\bf{u}}^s}$ is given by
\begin{equation}
{{\bf{u}}^s} = - \sum\limits_{n = 1}^\infty {{B_n}{W_n}\left( {{\bf{p}} \cdot {{\bf{e}}_r}} \right){\bf{p}} \cdot \left( {{\bf{I}} - {{\bf{e}}_r}{{\bf{e}}_r}} \right)} ,\quad {W_n}\left( x \right) = \frac{2}{{n\left( {n + 1} \right)}}{P_n}'\left( x \right).
\end{equation}
Here ${\bf{p}}$ is the orientation of the particle, ${{\bf{e}}_r} = {\bf{r}}/r$, ${P_n}$ is the Legendre polynomial of degree $n$ and $B_n$ are the squirming modes. In homogeneous Newtonian fluids, only the $B_1$ mode contributes to the swimming speed while the $B_2$ mode leads to the slowest decaying flow field and hence it determines the far-field representation of the swimmer. The ratio $\alpha = B_2/B_1$ can be used to distinguish the three types of swimmers. So-call pusher swimmers, like \textit{Escherichia coli}, push the fluid along their axis while drawing fluid from their sides. Pullers, like \textit{Chlamydomonas}, do the opposite, in that they pull the fluid along their axis while ejecting fluid from their sides. Neutral swimmers like \textit{Volvox carteri} exhibit the flow signature similar to that of a potential dipole. Puller, pusher and neutral swimmers are characterized by $\alpha > 0$, $< 0$, and $= 0$, respectively.
\section{\label{sec:Sol_Method}Solution Method}
We apply the reciprocal theorem to the unknown flow of the present problem and the auxiliary flow due to a rigid body motion of a spherical particle in a homogeneous fluid of viscosity $\eta_{\infty}$. After making use of the boundary conditions on the particle surface in both problems, we find the swimming velocity of the active particle to be
\begin{equation}
{\bm{\mathsf{U}}} = {{\bm{\mathsf{{{\hat R}}_{FU}^{-1}}}}} \cdot \left[ \int_{{S_p}} {{{\bf{u}}^s} \cdot \left( {{\bf{n}} \cdot {\bm{\mathsf{{\hat T}_U}}}} \right)dS} + {{\bm{\mathsf{F}}}_{NN}^l} + \int {\left( {\nabla \cdot {{\bm{\tau }}_{NN}}} \right) \cdot {\bm{\mathsf{{\hat G}_U}}}\,\,dV}\right].
\label{eqn:recip_theor}
\end{equation}
Here ${\bm{\mathsf{U}}} = {\left[ {{\bf{U}}\,\,{\bf{\Omega }}} \right]^\top}$ is a six-dimensional vector containing the particle's translational and angular velocity while ${{\bm{\mathsf{F}}}_{NN}^l} = {\left[ {{{\bf{F}}_{NN}^l}\,\,{{\bf{L}}_{NN}^l}} \right]^\top}$ is also a six-dimensional vector consisting of the force and torque due to the stress ${{\bm{\tau }}_{NN}}$
\begin{align}
{{\bf{F}}_{NN}^l} &= \int_{S_p} {\bf{n}}\cdot{{\bm{\tau }}_{NN}}\,dS,\\
{{\bf{L}}_{NN}^l} &= \int_{S_p} {\bf{r}}\times({\bf{n}}\cdot{{\bm{\tau }}_{NN}})\,dS.
\end{align}
We note that the variables with caret are associated with the auxiliary flow problem. Specifically, ${{\bm {\mathsf{{{\hat G}}_{U}}}}} \cdot {\bm{\mathsf{\hat U}}}$, ${{\bm{\mathsf{{{\hat T}}_U}}}} \cdot {\bm{\mathsf{\hat U}}}$, respectively, are the flow field, and the stress tensor due to the rigid body motion of a sphere in a homogeneous fluid. The sphere experiences the hydrodynamic force or torque, ${\bm{\mathsf{\hat F}}} = - {{\bm{\mathsf{\hat R}}}_{{\bm{\mathsf{FU}}}}} \cdot {\bm{\mathsf{\hat U}}}$. A detailed derivation may be found elsewhere \citep{Elfring2017}. Equation \eqref{eqn:recip_theor} explicitly divides the dynamics of an active particle in fluid with spatially varying viscosity into three contributions: the first term in the brackets on the right-hand side (when multiplied the the mobility) gives the translational and rotational velocity of the active particle in a homogeneous fluid with constant viscosity; the second term represents the effect on the dynamics due to changes in the force and torque from that in a homogeneous fluid; the final term accounts for changes in the dynamics due to changes in the flow field that arise as a result of differences in the stress tensor from that of a homogeneous fluid with constant viscosity.
Separating the above equation \eqref{eqn:recip_theor} for the translational velocity and the angular velocity we have
\begin{equation}
{\bf{U}} = {\bf{\hat R}}_{FU}^{ - 1} \cdot \left[ {\int_{{S_p}} {{{\bf{u}}^s} \cdot \left( {{\bf{n}} \cdot {{{\bf{\hat T}}}_U}} \right)dS} + \int_{S_p} {\bf{n}}\cdot{{\bm{\tau }}_{NN}}\,dS + \int {\left( {\nabla \cdot {{\bm{\tau }}_{NN}}} \right) \cdot {{{\bf{\hat G}}}_U}\,dV} } \right],
\end{equation}
\begin{equation}
{\bf{\Omega }} = {\bf{\hat R}}_{L\Omega }^{ - 1} \cdot \left[ {\int_{{S_p}} {{{\bf{u}}^s} \cdot \left( {{\bf{n}} \cdot {{{\bf{\hat T}}}_\Omega }} \right)dS} + \int_{S_p} {\bf{r}}\times({\bf{n}}\cdot{{\bm{\tau }}_{NN}})\,dS + \int {\left( {\nabla \cdot {{\bm{\tau }}_{NN}}} \right) \cdot {{{\bf{\hat G}}}_\Omega }\,dV} } \right].
\end{equation}
Here, ${{\bf{\hat G}}_U} \cdot {\bf{\hat U}}$, ${{\bf{\hat T}}_U} \cdot {\bf{\hat U}}$ (resp. ${{\bf{\hat G}}_\Omega } \cdot {\bf{\hat \Omega }}$, ${{\bf{\hat T}}_\Omega } \cdot {\bm{\hat \Omega }}$) are the flow field and the stress tensor due to the translation (resp. rotation) of a sphere in a homogeneous fluid with velocity ${\bf{\hat U}}$ (resp. ${\bf{\hat \Omega }}$). The translating particle experiences the hydrodynamic force ${\bf{\hat F}} = - {{\bf{\hat R}}_{FU}} \cdot {\bf{\hat U}}$ while the rotating particle experiences the hydrodynamic torque ${\bf{\hat L}} = - {{\bf{\hat R}}_{L\Omega }} \cdot {\bf{\hat \Omega }}$. For a sphere, ${{\bf{\hat R}}_{FU}} = 6\pi {\eta _\infty }a{\bf{I}}$ and ${{\bf{\hat R}}_{L\Omega }} = 8\pi {\eta _\infty }{a^3}{\bf{I}}$.
We perform a regular perturbation in $\epsilon$ and expand any variable $f(\epsilon)$ as $f = {f_0} + \epsilon {f_1} + {\epsilon ^2}{f_2} + ...$. As $\eta \left( {\bf{x}} \right) - {\eta _\infty } = \epsilon {\eta _1} + \eta '\sim O\left( \epsilon \right)$, ${{\bm{\tau }}_{NN}} = \left( {\eta \left( {\bf{x}} \right) - {\eta _\infty }} \right){\bm{\dot \gamma }}\sim O\left( \epsilon \right)$, at leading order, we have a swimmer moving through a homogeneous Newtonian fluid of viscosity $\eta_{\infty}$. The velocity of such swimmer is well known:
\begin{equation}
{{\bf{U}}_0} = \frac{1}{{6\pi {\eta _\infty }a}}\int_{{S_p}} {{{\bf{u}}^s} \cdot \left( {{\bf{n}} \cdot {{{\bf{\hat T}}}_U}} \right)dS} = \frac{2}{3}{B_1}{\bf{p}} \equiv {{\bf{U}}_N},
\end{equation}
\begin{equation}
{{\bf{\Omega }}_0} = \frac{1}{{8\pi {\eta _\infty }{a^3}}}\int_{{S_p}} {{{\bf{u}}^s} \cdot \left( {{\bf{n}} \cdot {{{\bf{\hat T}}}_\Omega }} \right)dS} = {\bm{0}}.
\end{equation}
At first order, we have
\begin{equation}
{{\bf{U}}_1} = \frac{1}{{6\pi {\eta _\infty }a}}\int_{{S_p}} {{\bf{n}} \cdot {{\bm{\tau }}_{NN,1}}\,dS} + \frac{1}{{6\pi {\eta _\infty }a}}\int {\left( {\nabla \cdot {{\bm{\tau }}_{NN,1}}} \right) \cdot {{{\bf{\hat G}}}_U}\,dV} ,
\label{eqn:U1}
\end{equation}
\begin{equation}
{{\bf{\Omega }}_1} = \frac{1}{{8\pi {\eta _\infty }{a^3}}}\int_{{S_p}} {{\bf{r}} \times \left( {{\bf{n}} \cdot {{\bm{\tau }}_{NN,1}}} \right)\,dS} + \frac{1}{{8\pi {\eta _\infty }{a^3}}}\int {\left( {\nabla \cdot {{\bm{\tau }}_{NN,1}}} \right) \cdot {{{\bf{\hat G}}}_\Omega }\,dV.}
\label{eqn:Omega1}
\end{equation}
Here $\epsilon {{\bm{\tau }}_{NN,1}} = \left( {\eta \left( {\bf{x}} \right) - {\eta _\infty }} \right){{\bm{\dot \gamma }}_0} = \left( {\epsilon {\eta _1} + \eta '} \right){{\bm{\dot \gamma }}_0}$, where ${{\bm{\dot \gamma }}_0} = \nabla {{\bf{u}}_0} + {\left( {\nabla {{\bf{u}}_0}} \right)^T}$ is the rate of strain tensor associated with the leading order flow ${{\bf{u}}_0}$. We see that the variation of viscosity from the constant reference viscosity $\eta_{\infty}$ changes the traction locally on the surface of the active particle but also modifies the flow from its value in the homogeneous fluid ${{\bf{u}}_0}$. Both these changes alter the swimming velocity from that in the homogeneous fluid ${{\bf{U}}_0}$, ${{\bf{\Omega }}_0}$ represented by an extra velocity ${{\bf{U}}_1}$, ${{\bf{\Omega }}_1}$ (see Eqs.~\eqref{eqn:U1}, \eqref{eqn:Omega1}). The effect of locally modifying the viscosity from that of a constant viscosity $\eta_{\infty}$ to $\epsilon {\eta _1} + \eta '$ alone (without the effect of the associated change in the flow from ${{\bf{u}}_0}$) is referred to as the local effect in line with the literature on the motion of particles in shear-thinning fluids and is given by the surface integral terms in Eqs.~\eqref{eqn:U1}, \eqref{eqn:Omega1}. The complementary effect due to modifying the flow from the homogeneous fluid value ${{\bf{u}}_0}$ (without the associated change in the viscosity on the surface of the particle) is referred to as the non-local effect and this is given by the volume integral terms in Eqs.~\eqref{eqn:U1}, \eqref{eqn:Omega1}.
If the properties of the particle are same as those of the fluid, the particle does not produce any disturbance $\left( \eta' = 0 \right)$ and it propels with the first order velocities \citep{Datt2019}
\begin{equation}
{{\bf{U}}_1} = - \frac{{a{B_2}}}{5}\left( {{\bf{I}} - 3{\bf{pp}}} \right) \cdot \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty}}}} \right),
\label{eqn:U1-ambient}
\end{equation}
\begin{equation}
{{\bf{\Omega }}_1} = - \frac{1}{2}{{\bf{U}}_N} \times \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty}}}} \right).
\label{eqn:Omega1-ambient}
\end{equation}
The effect of the ambient viscosity is to turn the particle to align it against the viscosity gradient (negative viscotaxis). In this steady-state orientation, relative to their speed in the homogeneous fluid, the pushers speed up, the pullers slow down and the neutral swimmers do not experience any speed change. We next demonstrate the significance of the disturbance viscosity.
\section{\label{sec:Dist_Visc}Effect of the disturbance viscosity}
Recall the viscosity field satisfies the Laplace equation and $\eta = {\eta _0} + \eta '$. As the ambient viscosity $\eta_0$ is linear in position, the disturbance viscosity $\eta'$ must also satisfy a Laplace equation
\begin{equation}
\nabla^2 \eta' = 0,
\label{eqn:Lap-dist-visc}
\end{equation}
and also decays to zero far from the particle
\begin{equation}
\eta ' = 0\,\,\,{\rm{as}}\,\,r \to \infty.
\label{eqn:dist-visc-far}
\end{equation}
The general solution of \eqref{eqn:Lap-dist-visc}, satisfying \eqref{eqn:dist-visc-far}, is given by
\begin{equation}
\eta ' = \sum\limits_{k = 0}^\infty {\sum\limits_{m = 0}^k {{r^{ - k - 1}}\left( {{A_{k,m}}\cos m\theta + {B_{k,m}}\sin m\theta } \right)P_k^m\left( {\cos \phi } \right)} ,}
\end{equation}
where $A_{k,m}$, $B_{k,m}$ are the constant coefficients, $\phi$, $\theta$ are the polar and azimuthal angles in the spherical coordinate system located at the center of the particle while $P_k^m$ is the associated Legendre polynomial of degree $k$ and order $m$. Here, the terms proportional to $1/r$, $1/r^2$, respectively, are the source and source-dipole, essentially the Green's functions of the Laplace equation and its derivative. The exact structure of the disturbance viscosity and its influence on the swimming velocities depend on the boundary condition on the particle surface. This surface can be impermeable (resp. insulating) to the nutrient or the salt concentration (resp. to the temperature) that is responsible for the viscosity variations. In this case, a no-flux condition for the viscosity holds on the particle surface, ${\bf{n}} \cdot \nabla \eta = 0$ at $r = a$. Alternatively, the particle surface can be at a constant temperature which translates to a constant viscosity condition on the particle surface, $\eta = {\eta _p} = {\rm{constant}}$ at $r = a$. We hereby analyze these two cases separately.
\subsection{No-flux}
The no-flux condition can be simplified to
\begin{equation}
{\left. {\frac{{\partial \eta '}}{{\partial r}}} \right|_{r = a}} = - \frac{{\epsilon {\eta _\infty }}}{a}\sin \phi \cos \theta.
\end{equation}
The disturbance viscosity that satisfies this constraint is given by
\begin{equation}
\eta ' = \frac{{\epsilon {a^2}{\eta _\infty }}}{{2{r^3}}}\left( {x - {x_c}} \right) = \frac{{\epsilon {a^3}}}{{2{r^3}}}{\eta _1 \left( x - x_c \right)}.
\label{eqn:Dist_Visc_NF}
\end{equation}
The no-flux condition prevents the occurrence of the source term and the solution is a source-dipole. This disturbance viscosity has the same angular dependence as that of the ambient viscosity, however, unlike the ambient viscosity, the disturbance viscosity decays with position (see Fig.~\ref{fig:Visc1}). This leads to a swimming velocity due to the disturbance viscosity of a similar form as that due to the ambient viscosity but with a reduced magnitude. The change in the velocity of the particle due to the disturbance viscosity alone (denoted by a prime) is given by
\begin{equation}
{{\bf{U}}'_1} = - \frac{{a{B_2}}}{{60}}\left( {{\bf{I}} - 3{\bf{pp}}} \right) \cdot \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right),
\label{eqn:U1-no-flux}
\end{equation}
\begin{equation}
{{\bf{\Omega }}'_1} = - \frac{1}{8}{{\bf{U}}_N} \times \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right).
\label{eqn:Omega1-no-flux}
\end{equation}
Combining the contribution of the ambient and the disturbance viscosities, the change in the swimming velocity of a particle with no-flux condition is
\begin{gather}
{{\bf{U}}_1} = - \frac{{13}}{{60}}a{B_2}\left( {{\bf{I}} - 3{\bf{pp}}} \right) \cdot \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right),\\
{{\bf{\Omega }}_1} = - \frac{5}{8}{{\bf{U}}_N} \times \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right).
\end{gather}
We see that the disturbance viscosity does not change the physics predicted by considering only the ambient viscosity, it merely increases the rate at which the particle rotates to align opposite to the viscosity gradients and it also increases the speed change experienced by the pushers and pullers in the steady-state orientation (pushers swim faster and pullers swim slower while neutral swimmers propel at the same speed compared to that in the homogeneous fluid).
\begin{figure}[t!]
\subfloat{\includegraphics[scale = 0.5]{figure2a.eps}\label{fig:Amb_Visc}}
\hfill
\subfloat{\includegraphics[scale = 0.5]{figure2b.eps}\label{fig:Dist_Visc_NF}}
\caption{\label{fig:Visc1}(Color online) (a) The ambient viscosity relative to the reference viscosity and (b) the disturbance viscosity due to the no-flux condition at the instant when the particle's center is at the origin in the lab frame i.e., ${{\bf{x}}_c} = {\bm{0}}$. These viscosity distributions do not depend on the orientation of the particle.}
\end{figure}
\subsection{Constant Viscosity}
The constant viscosity condition simplifies to
\begin{equation}
{\left. {\eta '} \right|_{r = a}} = {\eta _c} - \epsilon {\eta _{\infty}}\sin \phi \cos \theta,
\end{equation}
where ${\eta _c} = {\eta _p} - {\eta _\infty } - \epsilon {\eta _\infty }{x_c}/a$. This constraint has two parts, the first part is constant, $\eta_c$, while the second varies spatially over the particle surface. The constant is enforced through a source term while the spatial variation is satisfied through a source-dipole term. Putting these two together, the disturbance viscosity is
\begin{figure}[t!]
\subfloat{\includegraphics[scale = 0.5]{figure3a.eps}\label{fig:Dist_Visc_CV_S}}
\hfill
\subfloat{\includegraphics[scale = 0.5]{figure3b.eps}\label{fig:Dist_Visc_CV_SD}}
\caption{\label{fig:Visc2}(Color online) (a) The source and (b) the source-dipole part of the disturbance viscosity due to a constant viscosity condition at the instant when the particle center is at the origin in the lab frame i.e., ${{\bf{x}}_c} = {\bm{0}}$. These viscosity distributions do not depend on the orientation of the particle.}
\end{figure}
\begin{equation}
\eta ' = \frac{{{\eta _c}a}}{r} - \frac{{\epsilon {a^2}{\eta _\infty }}}{{{r^3}}}{\left( x - x_c \right)} = \frac{{{\eta _c}a}}{r} - \frac{{\epsilon {a^3}}}{{{r^3}}}{\eta _1 \left( x - x_c \right)}.
\label{eqn:Dist_Visc_CV}
\end{equation}
We see that the source dipole here is a factor $\left( { = - 2} \right)$ times the source dipole due to the no-flux condition in \eqref{eqn:Dist_Visc_NF}, hence the swimming velocity due to the source dipole here should be the same factor times the swimming velocity due to the no-flux condition. The source term is spherically symmetric (see Fig.~\ref{fig:Dist_Visc_CV_S}), so it has no preferred direction. Hence the source term will induce only a translational velocity along $\bf{p}$ and no angular velocity. Overall, the change in the velocity of the particle due to the disturbance viscosity alone (with the constant viscosity boundary condition) is given by
\begin{equation}
{{\bf{U}}'_1} = \frac{1}{{12}}\frac{{{\eta _{c}}}}{{\epsilon {\eta _\infty }}}{{\bf{U}}_N} + \frac{{a{B_2}}}{{30}}\left( {{\bf{I}} - 3{\bf{pp}}} \right) \cdot \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right),
\label{eqn:U1-constant-eta}
\end{equation}
\begin{equation}
{{\bf{\Omega }}'_1} = \frac{1}{4}{{\bf{U}}_N} \times \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right).
\label{eqn:Omega1-constant-eta}
\end{equation}
Again, summing up the contributions of the ambient and the disturbance viscosities, the change in the velocity of a particle with the constant viscosity boundary condition is
\begin{equation}
{{\bf{U}}_1} = \frac{1}{{12}}\frac{{{\eta _c}}}{{\epsilon {\eta _\infty }}}{{\bf{U}}_N} - \frac{{a{B_2}}}{6}\left( {{\bf{I}} - 3{\bf{pp}}} \right) \cdot \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right),
\end{equation}
\begin{equation}
{{\bf{\Omega }}_1} = - \frac{1}{4}{{\bf{U}}_N} \times \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right).
\end{equation}
The disturbance viscosity does not change the reorientation process predicted by considering only the ambient viscosity, it only decreases the rate at which the particle turns to align itself against the viscosity gradients. The disturbance viscosity, however, modifies the speed changes experienced by the swimmer in the steady-state orientation in comparison to those predicted by considering the ambient viscosity alone. A neutral swimmer propels faster than that in the homogeneous fluid if it is cooler than the ambient fluid $\left( \eta_c > 0 \right)$. A pusher or puller swims faster or slower than that in the homogeneous fluid depending on the magnitude of $\alpha = B_2/B_1$ and how hot or cold the particle is relative to the ambient fluid.
\section{\label{sec:LocalNL}Local vs non-local effects}
Instead of analyzing local and non-local effects simultaneously, as we did in the previous section, in this section we look at each term separately and then quantify their relative importance. We do so because (as we show below) local effects are typically easy to predict, but alone may or may not qualitatively capture the dynamics.
Analyzing the results in Tables \ref{tab:table1}, \ref{tab:table2} and \ref{tab:table3} we find by comparing the local effects with the total response that the results are qualitatively similar for a particle imposing the no-flux condition to the viscosity field. However, for an active particle with a constant-viscosity boundary condition it is the non-local effects that are dominant. In fact, the local effects for such particle are identically zero. This is because the viscosity field $\epsilon {\eta _1} + \eta '$ near such particle is a constant $\left( { = {\eta _c}} \right)$ and this reduces the local effects to the force or torque acting on the particle in homogeneous fluid which is identically zero. In the sections below we unpack and parse these results in order to develop a more mechanistic understanding of the results in these tables.
\begin{table*}[t!]
\caption{\label{tab:table1}The first order local, non-local, and total translational velocity of a swimmer due to the $B_1$ squirming mode is given by $c\frac{{{\eta _c}}}{{\epsilon {\eta _\infty }}}{{\bf{U}}_N}$. This table provides the values of $c$ for various viscosity fields.}
\begin{ruledtabular}
\begin{tabular}{ccccc}
&Local&Non-local&Total\\ \hline
\multirow{1}{*}{No-flux}
& 0 & 0 & 0\\ \hline
\multirow{1}{*}{Constant viscosity}
& 0 & $1/12$ & $1/12$\\
\end{tabular}
\end{ruledtabular}
\end{table*}
\begin{table*}[t!]
\caption{\label{tab:table2}The first order local, non-local, and total angular velocity of a swimmer with only $B_1$ squirming mode is given by $ - c{{\bf{U}}_N} \times \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right)$. This table provides the values of the constant coefficient $c$ for various viscosity fields.}
\begin{ruledtabular}
\begin{tabular}{ccccc}
&Local&Non-local&Total\\ \hline
\multirow{1}{*}{No-flux}
& $3/4$ & $-1/8$ & $5/8$\\ \hline
\multirow{1}{*}{Constant viscosity}
& $0$ & $1/4$ & $1/4$\\
\end{tabular}
\end{ruledtabular}
\end{table*}
\begin{table*}[t!]
\caption{\label{tab:table3} The first order local, non-local, and total translational velocity of a swimmer with $B_n$ $\left( {n \ge 2} \right)$ squirming modes is given by $- ca{B_2}\left( {{\bf{I}} - 3{\bf{pp}}} \right) \cdot \nabla \left( {\frac{{{\eta _1}}}{{{\eta _\infty }}}} \right)$. This table provides the values of the constant viscosity coefficient $c$ for various viscosity fields.}
\begin{ruledtabular}
\begin{tabular}{ccccc}
&Local&Non-local&Total\\ \hline
\multirow{1}{*}{No-flux}
& $1/15$ & $3/20$ & $13/60$\\ \hline
\multirow{1}{*}{Constant viscosity}
& $0$ & $1/6$ & $1/6$\\
\end{tabular}
\end{ruledtabular}
\end{table*}
\subsection{Reorientation}
For simplicity, we consider a particle with only $B_1$ squirming mode and oriented orthogonal to the viscosity gradients along the ${\bf{e}}_y$ direction.
\subsubsection{Local effects}
The torque due to local changes in the viscosity is given by
\begin{align}
{{\bf{L}}_{NN}^l}= \frac{{2{B_1}}}{a} \int_{{S_p}}\left( {\eta \left( {\bf{x}} \right) - {\eta _\infty }} \right){\bf{r}}\times{\bf{p}} dS.
\label{eq:local1}
\end{align}
From this we see that the viscosity at the surface of the particle simply acts as a weight on the moment arm, and that an asymmetry in the viscosity at the surface will lead to a reorientation of the particle towards the lower viscosity. The viscosity at the surface has a contribution from both the ambient and the disturbance $ {\eta \left( {\bf{x}} \right) - {\eta _\infty }} = {\epsilon {\eta _1} + \eta '}$. We know from \eqref{eqn:Dist_Visc_CV} that on the surface of the particle $\eta'=-\epsilon\eta_1+const.$ in order to satisfy a constant viscosity boundary condition, and it is clear from \eqref{eq:local1} that a constant viscosity on the surface of the particle clearly produces no net torque. In contrast, \eqref{eqn:Dist_Visc_NF} shows that in order to satisfy the no-flux boundary condition, $\eta'=\frac{1}{2}\epsilon\eta_1+const.$ meaning the asymmetry of the ambient viscosity at the surface of the particle, and thus the torque, is enhanced by a 3/2 factor (see Fig.~\ref{fig:Dist_Visc_NF}). An application of the divergence theorem to \eqref{eq:local1} allows one to simply resolve the torque as
\begin{align}
{\bf{L}}_{NN}^l &= -\frac{9}{2}{\bf{U}}_N\times \int_{V_p} \epsilon\nabla\eta_1 dV = -6\pi a^3{\bf{U}}_N\times\epsilon\nabla {\eta _1},
\end{align}
and multiplication by the mobility leads to the result in Table \ref{tab:table2}.
\subsubsection{Non-local effects}
Recall the non-local effect is given by $\int {\left( {\nabla \cdot {{\bm{\tau }}_{NN,1}}} \right) \cdot {{{\bf{\hat G}}}_\Omega }} \,dV$. We use the expression for ${{\bf{\hat G}}_\Omega }$ to simplify this integral to
\begin{equation}
\int {\left( {\frac{{{a^3}}}{{{r^3}}}} \right){\bf{r}} \times \nabla \cdot \left[ {\left( {\epsilon {\eta _1} + \eta '} \right){{{\bm{\dot \gamma }}}_0}} \right]dV}.
\end{equation}
As the strain-rate tensor due to $B_1$ mode is divergence-free, the non-local effect finally simplifies to
\begin{equation}
\int {\left( {\frac{{{a^3}}}{{{r^3}}}} \right){\bf{r}} \times \nabla \left( {\epsilon {\eta _1} + \eta '} \right) \cdot {{{\bm{\dot \gamma }}}_0}dV}.
\end{equation}
We examine the non-local effect by analyzing the kernel of the integral that represents the non-local effects, $\nabla \left( {\epsilon {\eta _1} + \eta '} \right) \cdot {{\bm{\dot \gamma }}_0}$. The contribution of ambient viscosity to this kernel that is not along the radial direction is
\begin{equation}
\frac{{\epsilon {\eta _\infty }}}{a}\frac{{2{a^3}}}{{{r^5}}}{B_1}\left( {x - {x_c}} \right){{\bf{e}}_y} + \frac{{\epsilon {\eta _\infty }}}{a}\frac{{2{a^3}}}{{{r^5}}}{B_1}\left( {y - {y_c}} \right){{\bf{e}}_x}.
\end{equation}
Half of this kernel (the first term) has left-right mirror symmetry while the other half has front-back mirror symmetry. Each half of this kernel induces an angular velocity of equal magnitude but opposite direction making the net non-local effect due to the ambient viscosity to be zero. The source part of the disturbance viscosity as well as its gradient do not have any directional preference or any asymmetries. Hence, the non-local effect due to the source is zero. The source dipole part of the disturbance viscosity is proportional to $x$ and it decays with the position. So, the gradient of the source dipole has two parts. One is along the gradient of the ambient viscosity and hence, like the ambient viscosity, this part induces zero angular velocity. The other part is in the radially inward direction due to the decay of source-dipole with position and also it is proportional to $x$. The latter characteristic introduces a left-right mirror symmetry to the kernel that consequently induces a non-zero angular velocity. As the disturbance viscosity always has a source-dipole component, its non-local effect is non-zero regardless of the boundary condition on the particle surface. See the third column in Table \ref{tab:table2}.
\subsection{Speed changes in the steady-state orientation}
The steady-state orientation is opposite to the ambient viscosity gradients. For the ambient viscosity, ${\eta _0} = {\eta _\infty } + \epsilon {\eta _\infty }x/a$, this orientation is along $ - {{\bf{e}}_x}$. In this configuration, the flow and the viscosity fields are axisymmetric, the axis of symmetry is along the swimmer's orientation. To understand the speed changes in the steady-state orientation, we consider a swimmer with first two squirming modes as the swimming velocity in viscosity gradients anyways depends on only these two squirming modes.
\subsubsection{Local effects}
The force due to local variation in the viscosity is given by
\begin{equation}
{\bf{F}}_{NN}^l = \int_{{S_p}} {{\bf{n}} \cdot {{\bm{\tau }}_{NN}}dS} = \int_{{S_p}} {\left( {\epsilon {\eta _1} + \eta '} \right){\bf{n}} \cdot {{{\bm{\dot \gamma }}}_0}\,dS} .
\end{equation}
For a particle with constant viscosity condition, the viscosity $\epsilon {\eta _1} + \eta '$ is constant $\left( { = {\eta _c}} \right)$ near the particle and this reduces the local force to the force due to viscous traction in homogeneous Newtonian fluid which is identically zero. In homogeneous fluids, the force due to pressure and viscous traction are both zero so as to enforce the force-free condition on the particle. On the other hand, near a particle with a no-flux boundary condition, the viscosity $\epsilon {\eta _1} + \eta '$ is $\frac{3}{2}\epsilon {\eta _1} + const.$ Here, the ambient viscosity $\eta_1$ is front-back mirror symmetric as ${\eta _1} \propto x$. The flow and hence the shear-rate ${\dot \gamma _{0,rx}}$ due to a particle with only $B_1$ mode in the homogeneous fluid are front-back symmetric. This symmetry together with the mirror-symmetry in the viscosity induce a mirror-symmetry in the traction ${\bf{n}} \cdot {{\bm{\tau }}_{NN,1}}$, which means that for every traction in front of the particle, there is an equal in magnitude but oppositely directed traction on the back of the particle making the net local force to vanish. The flow and the shear-rate ${\dot \gamma _{0,rx}}$ generated by a particle with only $B_2$ mode in the homogeneous fluid are front-back mirror symmetric. This mirror-symmetry along with a similar symmetry in the viscosity makes the traction front-back symmetric, meaning that for every traction in front of the particle, there is an equal traction behind the particle resulting in a finite local force. See the second column in Tables \ref{tab:table1}, \ref{tab:table3}.
\subsubsection{Non-local effects}
We examine the non-local effects by analyzing the kernel of the integral that represents the non-local effects, $\nabla \cdot {{\bm{\tau }}_{NN,1}} \cdot {{\bf{\hat G}}_U}$ or $\nabla \cdot {{\bm{\tau }}_{NN,1}}$. Through a linear decomposition of the first order problem, we can show that the term $\nabla \cdot {{\bm{\tau }}_{NN,1}}$ modifies the flow from that in the homogeneous fluid and therefore, is responsible for the non-local effect \citep{Pietrzyk2019}. If the kernel and hence, the modified flow are front-back mirror symmetric, then the non-local effect being the integral of the kernel vanishes.
A particle with only $B_1$ mode generates a front-back symmetric flow in the homogeneous fluid. Then the ambient viscosity and the source-dipole part of the disturbance viscosity introduce the mirror-symmetry to the kernel diminishing the non-local effect but the source part of the disturbance viscosity does not bring in such symmetry inducing a finite non-local effect. As a particle imposing a constant-viscosity condition generates a source disturbance, the non-local effect is non-zero for such particle but it is zero for a particle with no-flux condition. See the third column in Table \ref{tab:table1}.
In the case of a particle with only $B_2$ mode, the flow in the homogeneous fluid itself is front-back mirror symmetric. The additional mirror symmetry of the ambient viscosity or the source-dipole part of the disturbance viscosity prevents such symmetry in the kernel generating a finite non-local effect. But the kernel due to a source still has this mirror-symmetry yielding a zero non-local effect. These non-local effects due to the ambient or the disturbance viscosity manifest as a finite non-local effects on a particle with any boundary condition. See the third column in Table \ref{tab:table3}.
\section{\label{sec:Conc}Conclusions}
Spatial variations of viscosity in fluids may arise due to changes in temperature, salt or nutrient concentration. Insertion of a particle into the fluid tends to disturb the background viscosity field due to boundary conditions imposed by the particle on the viscosity field. In general we find that active squirmer-type particles reorient down the viscosity gradient (negative viscotaxis) and they propel in the steady-state orientation with a speed different from that in the homogeneous fluid. The specific boundary conditions on the viscosity field at the surface of the particle do not qualitatively affect the reorientation process, only changing the rate at which the steady-state orientation is achieved. On the contrary, the speed changes experienced by the swimmer while propelling along the steady-state orientation are significantly dependant on the boundary conditions on the particle. For active particles that impose a no-flux condition, pushers speed up, the pullers slow down and the neutral swimmers do not change their speed. In contrast the speed changes experienced by a particle that imposes a constant-viscosity boundary condition are more complex. Even the neutral swimmer speeds up if it is cold relative to the ambient fluid while the speed changes of a pusher or a puller depend on how strong the pusher or puller is (the ratio of the squirming modes, $B_2/B_1$) and how hot or cold the particle is relative to the ambient fluid. This suggests the additional degrees of freedom, the particle temperature and the squirming modes, that one can explore in controlling the active matter.
We also quantified the relative importance of the local and non-local effects, where the local effects are a consequence of locally modifying the viscosity but not the flow while the non-local effects are due to changing the flow from that in the homogeneous fluid without altering the viscosity. We found that the local effects are sufficient to determine the motion of a particle imposing a no-flux boundary condition but it is the non-local effects that dominate the (change in) dynamics of a particle imposing a constant-viscosity boundary condition. Hence, one should exercise caution when using a simple local effects based theory to study the motion of active particles in viscosity gradients.
|
\section{Introduction}
It is a well-known empirical phenomenon that natural axiomatic theories are well-ordered by their consistency strength \cite{walsh2021hierarchy}. However, consistency strength does \emph{not} well-order theories \emph{in general}; only the natural systems are well-ordered. This has been called ``one of the great mysteries in the foundations of mathematics'' \cite{friedman2013slow}. In \cite{pakhomov2018reflection}, the authors investigated this phenomenon by studying a related notion of proof-theoretic strength---$\Pi^1_1$-reflection strength---and proved that $\Pi^1_1$-sound extensions of $\mathsf{ACA}_0$ can be \emph{ranked} according to this metric. To state this result, we recall that $\mathsf{RFN}_{\Pi^1_1}(T)$ is a sentence expressing the $\Pi^1_1$-soundness of $T$.
\begin{theorem}\label{reflection-ranks}
The restriction of $\prec_{\Pi^1_1}:=\{(T,U) \mid U \vdash \mathsf{RFN}_{\Pi^1_1}(T)\}$ to the $\Pi^1_1$-sound extensions of $\mathsf{ACA}_0$ is well-founded.
\end{theorem}
Furthermore, the authors proved that---in a large swathe of cases---a theory's rank in this well-founded reflection ordering coincides with its proof-theoretic ordinal, where the \emph{proof-theoretic ordinal} of a theory $T$ is the supremum of the $T$-provably well-founded primitive recursive linear orders. Interest in proof-theoretic ordinals comes from the work of Gentzen, who, using only finitary methods and transfinite induction along $\varepsilon_0$, proved the consistency of $\mathsf{PA}$. By G\"{o}del’s Second Incompleteness Theorem, this implies that $\mathsf{PA}$ does not prove the well-foundedness of $\varepsilon_0$. Yet $\mathsf{PA}$ proves the well-foundedness of ordinals less than $\varepsilon_0$, whence $\varepsilon_0$ is the supremum of the $\mathsf{PA}$-provably well-founded primitive recursive linear orders, i.e., the proof-theoretic ordinal of $\mathsf{PA}$. This engendered one of the largest research programs in proof theory---known as \emph{ordinal analysis}---in which theories' proof-theoretic ordinals are determined.
To state the main result from \cite{pakhomov2018reflection} connecting reflection ranks and proof-theoretic ordinals, recall that $\mathsf{ACA}_0^+$ is theory $\mathsf{ACA}_0+ \forall X(X^{(\omega)}$ exists$)$.
\begin{theorem}\label{main-old}
For $\Pi^1_1$-sound extensions $T$ of $\mathsf{ACA}_0^+$, the $\prec_{\Pi^1_1}$ rank of $T$ equals the proof-theoretic ordinal of $T$.
\end{theorem}
Accordingly, sufficiently sound theories can be ranked according to their proof-theoretic strength, given the right choice of proof-theoretic strength. Moreover, the ranks in this ordering are proof-theoretically familiar values, namely, the proof-theoretic ordinals.
Theorem \ref{main-old} connects two distinct topics in proof theory: iterated reflection and ordinal analysis. In \cite{pakhomov2018reflection}, the focus was on the iterated reflection side; indeed, Theorem \ref{main-old} was derived from a Schmerl-style \cite{schmerl1979fine} conservation theorem for iterated reflection principles. That proof was rather complicated and required the extensive use of techniques from the study of iterated reflection. In this note, we present a simpler proof of Theorem \ref{main-old} that uses more traditional and accessible techniques from ordinal analysis, namely, cut-elimination for infinitary derivations. The cut-elimination proof strengthens the connections between these two complementary areas of proof theory. Moreover, it should make the result more accessible to proof-theorists who are familiar with cut-elimination techniques.
Here is our plan for the rest of the paper. In \textsection \ref{prelim-section} we cover some preliminaries, including our treatment of reflection principles and infinitary derivations. In \textsection \ref{ranks-section} we provide a proof of Theorem \ref{reflection-ranks}. In \textsection \ref{main-section} we provide our new proof of Theorem \ref{main-old}.
\section{Preliminaries}\label{prelim-section}
In this section we cover some preliminary material and definitions. First we give the definitions of $\Pi^1_1$-reflection and its iterations. Next we review the definition of pseudo-$\Pi^1_1$ theories. We then cover our standard treatment of ordinal notations and collect some facts. We then review Schmerl's technique of reflexive induction, which we use in our proofs. Finally, we introduce a formalization of an infinitary proof system in $\mathsf{ACA}_0$ and prove, in $\mathsf{ACA}_0$, that the well-founded cut-free proofs in the system are $\Pi^1_1$-sound.
\subsection{Reflection principles}
$\mathsf{RFN}_{\Pi^1_1}(T)$ is the schema:
$$\forall \vec{x} \Big(\mathsf{Pr}_T\big(\varphi(\vec{x})\big) \to \varphi (\vec{x}) \Big) \text{ for } \varphi\in \Pi^1_1.$$
In fact, since the $\Pi^1_1$ truth-definition is available in $\mathsf{ACA}_0$, this schema follows from a single instance of itself in $\mathsf{ACA}_0$; see \cite{pakhomov2018reflection} for discussion. Hence we may regard this schema as a single sentence.
We define the formula $\mathsf{RFN}^\alpha_{\Pi^1_1}(\mathsf{ACA}_0)$ of $\alpha$-iterated uniform $\Pi^1_1$-reflection over $\mathsf{ACA}_0$ via the fixed point lemma with $\alpha$ as the free variable:
$$\mathsf{ACA}_0 \vdash \mathsf{RFN}_{\Pi^1_1}^\alpha(\mathsf{ACA}_0) \leftrightarrow \forall \beta \prec \alpha \mathsf{RFN}_{\Pi^1_1}\big(\mathsf{ACA}_0+ \mathsf{RFN}_{\Pi^1_1}^\beta(\mathsf{ACA}_0)\big)$$
\begin{remark}
Note that in our previous paper \cite{pakhomov2018reflection} we worked with a different definition of theories axiomatized by iterated reflection wherein limit stages yielded infinitely axiomatized theories. However, in this paper, we are only interested in finitely axiomatized theories, and $\mathsf{RFN}_{\Pi^1_1}^\alpha(\mathsf{ACA}_0)$ is a sentence for any fixed limit $\alpha$.
\end{remark}
\subsection{Pseudo $\Pi^1_1$ theories}
In this paper we will examine theories in two different languages. The first is the language of first-order arithmetic extended with one additional free set variable $X$; we also call this the \emph{pseudo-$\Pi^1_1$ language}. Formulas from this language are known as \emph{pseudo $\Pi^1_1$ formulas.} By a pseudo $\Pi^1_1$ theory we mean a theory axiomatized by pseudo $\Pi^1_1$ formulas. The second is the language is the language of second-order arithmetic. We consider the pseudo-$\Pi^1_1$ language to be a sublanguage of the language of second-order arithmetic by identifying each pseudo-$\Pi^1_1$ sentence $\mathsf{F}$ with the second-order sentence $\forall X \;\mathsf{F}$.
The theory $\mathsf{PA}(X)$ is the pseudo $\Pi^1_1$ pendant of $\mathsf{PA}$. That is, $\mathsf{PA}(X)$ contains (i) the axioms of $\mathsf{PA}$ and (ii) induction axioms for all formulas in the language, including those with free set variables.
The proof theory of $\mathsf{PA}$ is more thoroughly developed than that of $\mathsf{ACA}_0$. Nevertheless, $\mathsf{ACA}_0$ is conservative over $\mathsf{PA}$ for pseudo $\Pi^1_1$ formulas, so it is often possible to work in $\mathsf{PA}$ and transfer results to $\mathsf{ACA}_0$.
It is well-known that $\mathsf{ACA}_0$ is conservative over $\mathsf{PA}$ (see, e.g., \cite{simpson2009subsystems, hirschfeldt2015slicing}). In fact, every extension of $\mathsf{ACA}_0$ by a $\Pi^1_1$ sentence is conservative over a corresponding extension of $\mathsf{PA}(X)$ by pseudo $\Pi^1_1$ formulas. Indeed, this is Lemma 4.10 from \cite{pakhomov2018reflection}:
\begin{lemma}\label{conservativity}
$(\mathsf{ACA}_0)$ Let $\varphi(X), \psi(X)$ be pseudo $\Pi^1_1$. If $\mathsf{ACA}_0+\forall X\;\varphi(X) \vdash \forall X\;\psi(X)$ then $\mathsf{PA}(X) + \{ \varphi[\theta] : \theta \textrm{ is pseudo } \Pi^1_1 \} \vdash \psi(X)$.
\end{lemma}
\subsection{Ordinal notations}
We will formalize results in $\mathsf{ACA}_0$ that involve quantification over all ordinal notations. We refer the reader to \cite{pakhomov2018reflection} to see our treatment of ordinal notations.
Before continuing we record two facts:
\begin{theorem}
\label{preserves} Provably in $\mathsf{ACA}_0$, for any linear order $\mathcal{X}$, if $\mathcal{X}$ is well-ordered then so is $\omega^{\mathcal{X}}$.
\end{theorem}
\begin{theorem}
\label{mm}
Provably in $\mathsf{ACA}_0^+$, for any linear order $\mathcal{X}$, if $\mathcal{X}$ is well-ordered then so is $\varepsilon_{\mathcal{X}}$.
\end{theorem}
For a proof of the first see \cite{girard1987proof}; for a proof of the second see \cite{marcone2011veblen}. These theorems are stated quite generally, in terms of arbitrary linear orderings. They straightforwardly apply to ordinal notation systems, given our treatment of ordinal notation systems.
\subsection{Reflexive induction}\label{reflexive-section}
We often employ Schmerl's technique of \emph{reflexive induction}. Reflexive induction is a way of simulating large amounts of transfinite induction in weak theories. The technique is facilitated by the following theorem' we include the proof, since it is so short.
\begin{theorem}[Schmerl]
Let $T$ be a recursively axiomatized theory containing $\mathsf{EA}$. Suppose $T \vdash \forall \alpha \Big( \mathsf{Pr}_T\big(\forall \beta\prec \alpha \varphi(\beta)\big) \to \varphi(\alpha) \Big).$
Then $T\vdash \forall \alpha \varphi(\alpha)$
\end{theorem}
\begin{proof}
Suppose that $T \vdash \forall \alpha \Big( \mathsf{Pr}_T\big(\forall \beta\prec \alpha \varphi(\beta)\big) \to \varphi(\alpha) \Big).$ We infer that:
$$T \vdash \forall \alpha \mathsf{Pr}_T\big(\forall \beta\prec \alpha \varphi(\beta)\big) \to \forall \alpha \varphi(\alpha).$$
L\"{o}b's Theorem then yields $T\vdash \forall \alpha \varphi(\alpha)$.
\end{proof}
\subsection{Infinitary proofs}
To prove the main theorem we will have to carry out cut-elimination for large fragments of an infinitary proof system from \emph{within} $\mathsf{ACA}_0$. The standard definitions of infinitary proof systems use arithmetical transfinite recursion, which is beyond the scope of $\mathsf{ACA}_0$. Nevertheless, proof theorists have developed many methods for arithmetizing infinitary derivations and their cut-elimination proofs. If we use any of these effective alternatives we can guarantee that all of these steps formalizable in $\mathsf{ACA}_0$ (and much weaker theories).
Thus, we will define, in $\mathsf{ACA}_0$, a notion that \emph{mimics} the typical definition of a complete infinitary proof calculus. We fix a linear order $\langle \mathcal{D}, \prec\rangle$. For $\alpha\in\mathcal{D}$ and $\rho\in\mathbb{N}$, we define ``$p:\vdash^\alpha_\rho\Delta$'', which informally means that $p$ encodes a proof of the sequent $\Delta$, that the proof has height $\alpha$, and that all cuts are on formulas of rank less than or equal to $\rho$ . Recall that the rank $rk(\varphi)$ of a formula $\varphi$ is the number of logical symbols occurring in $\varphi$.
Let $P$ be a (potentially infinite) set of G\"{o}del numbers of sequences of the form $\langle \alpha, \rho, \Delta \rangle$, where $\alpha\in\mathcal{D}$, $\rho\in\mathbb{N}$, and $\Delta$ a finite set of pseudo $\Pi^1_1$ formulas. We think of the sequence $\langle \alpha, \rho, \Delta \rangle$ as encoding the statement that $\vdash^\alpha_\rho \Delta$, so instead of writing ``$\langle \alpha, \rho, \Delta \rangle\in P$'' we merely write ``$\ulcorner \vdash^\alpha_\rho \Delta \urcorner \in P$.'' In the next definition, we characterize proofs as those sets of sequences satisfying certain coherence conditions. After defining what proofs are, we will say what it is for a proof to be a proof \emph{of} a set of formulas.
\begin{definition}
\label{proofdefinition}
Let $diag(\mathbb{N})$ be the atomic diagram of $\mathbb{N}$ in the signature $(0,1,+,\times)$. We say that a set $P$ of indices of the form $\ulcorner \vdash^\alpha_\rho \Delta \urcorner$ is a \emph{proof}, as long as the following conditions are met.
\begin{itemize}
\item If $\ulcorner\vdash^0_0\Delta\urcorner \in P$, then either (i) $\Delta\cap diag(\mathbb{N})\neq\emptyset$ or (ii) for some $t$ and $s$ such that $t^\mathbb{N}=s^\mathbb{N}$, $\Delta$ contains both formulas $s\notin X, t\in X$.
\item If $\ulcorner \vdash^\alpha_\rho \Delta,A_1\wedge A_2 \urcorner \in P$, then $\ulcorner \vdash^{\alpha_i}_\rho \Delta, A_i \urcorner \in P$ and $\alpha_i \prec \alpha$ for $i=1,2$.
\item If $\ulcorner \vdash^\alpha_\rho \Delta,A_1\vee A_2\urcorner \in P$, then $\ulcorner \vdash^{\alpha_0}_\rho \Delta, A_i \urcorner$ for some $\alpha_0\prec\alpha$ and some $i\in\{1,2\}$.
\item If $\ulcorner \vdash^\alpha_\rho \Delta,\forall x A(x)\urcorner \in P$, then, for all $i\in\mathbb{N}$, there is an $\alpha_i\prec\alpha$ such that $\ulcorner \vdash^{\alpha_i}_\rho \Delta, A(i) \urcorner$.
\item If $\ulcorner \vdash^\alpha_\rho \Delta, \exists x A(x)\urcorner \in P$, then for some $\alpha_0\prec \alpha$ and some $i\in\mathbb{N}$, $\ulcorner \vdash^{\alpha_0}_\rho \Delta, A(i)\urcorner \in P$.
\item If $\ulcorner \vdash^\alpha_\rho \Delta\urcorner \in P$ and the previous clauses are not satisfied, then, for some formula $F$, $\ulcorner \vdash^{\alpha_1}_\rho \Delta, F\urcorner \in P$ and $\ulcorner \vdash^{\alpha_2}_\rho \Delta, \neg F\urcorner \in P$ where $\alpha_i\prec\alpha$ for $i\in\{1,2\}$ and $rk(F)<\rho$.
\end{itemize}
\end{definition}
\begin{definition}
We say that a proof $P$ is a proof \emph{of} a set $\Delta$ of pseudo $\Pi^1_1$ formulas if, for some $\alpha$ and $\rho$, $\ulcorner \vdash^\alpha_\rho \Delta \urcorner$ is in $P$. We indicate that $\ulcorner \vdash^\alpha_\rho \Delta \urcorner\in P$ by writing $P: \vdash^\alpha_\rho \Delta$, i.e., that $P$ is a proof of $\Delta$ of height $\alpha$ and cut-rank $\rho$. We write $\vdash^\alpha_\rho\Delta$ to mean that there is a $P$ such that $P:\vdash ^\alpha_\rho\Delta$.
\end{definition}
We will need one lemma concerning infinitary derivations. Given the standard definition of infinitary proof calculi, one can establish the following lemma easily by transfinite induction. We take more care than is typical, carrying out the proof in $\mathsf{ACA}_0$ for the formalization of proofs given in Definition \ref{proofdefinition}.
\begin{lemma}
\label{correctness}
For each formula $\Pi^0_{<\omega}$ formula $\varphi(X,\vec{x})$, the theory $\mathsf{ACA}_0$ proves: If $\vdash^\alpha_0 \varphi(X,\vec{p})$, for some vector of number parameters $\vec{p}$, then $\forall X\;\varphi(X,\vec{p})$.
\end{lemma}
\begin{proof}
We reason in $\mathsf{ACA}_0$. We assume for a contradiction that $\forall X \varphi(X,\vec{p})$ is false and that $\vdash^\alpha_0 \varphi(X,\vec{p})$.
Since $\forall X \varphi(X,\vec{p})$ is false, there is some set $A$ such that $\varphi(A,\vec{p})$.
We consider the set $U$ of all sequents $\vdash^\beta_0\Gamma(X)$ in $P$ such that $\Gamma(X)$ consists of numerical variants of subformulas of $\varphi(X)$ and $\Gamma(A)$ is false. Note that this is a valid construction in $\mathsf{ACA}_0$ since $\varphi(X,\vec{x})$ is fixed and hence the truth of the sequents $\Gamma(A)$ that could appear in $U$ could be expressed in $\mathsf{ACA}_0$. Notice that $\vdash^{\alpha}_0\varphi(X,\vec{p})$ is in $U$ and whenever $\vdash^{\beta}_0\Gamma(X)$ is in $U$ there is some $\vdash^{\beta'}_0\Gamma'(X)$ in $U$ with $\beta'\prec\beta$ \big(we could always choose $\vdash^{\beta'}_0\Gamma'(X)$ to be one the premises used to derive $\vdash^{\beta}_0\Gamma(X)$\big). Thus the set of all $\beta$ that appear in sequents in $U$ is a set of denotations of ordinals without a least element.
\end{proof}
\section{Reflection Ranks}\label{ranks-section}
In this section we recapitulate the short proof of Theorem \ref{reflection-ranks}. The result and proof in this section first appeared in \cite{pakhomov2018reflection}. We examine the ordering $\prec_{\Pi^1_1}$ on r.e. extensions of $\mathsf{ACA}_0$, where
$$T\prec_{\Pi^1_1}U\stackrel{\mbox{\footnotesize \textrm{def}}}{\iff} U\vdash \mathsf{RFN}_{\Pi^1_1}(T).$$
We will show that there are no infinite $\prec_{\Pi^1_1}$ descending sequences of $\Pi^1_1$ sound extensions of $\mathsf{ACA}_0$. We recall that, provably in $\mathsf{ACA}_0$, a theory $T$ is $\Pi^1_1$ sound if and only if $T$ is consistent with any true $\Sigma^1_1$ statement.
\begin{theorem}\label{well-foundedness_reflection}$(\mathsf{ACA}_0)$ The restriction of the order $\prec_{\Pi^1_1}$ to $\Pi^1_1$-sound r.e. extensions of $\mathsf{ACA}_0$ is well-founded.
\end{theorem}
\begin{proof} In order to prove the result in $\mathsf{ACA}_0$ we show the inconsistency of the theory $\mathsf{ACA}_0$ plus the following statement $\mathsf{DS}$, which says that there \emph{is} a descending sequence of $\Pi^1_1$ sound extensions of $\mathsf{ACA}_0$ in the $\prec_{\Pi^1_1}$ ordering:
$$\mathsf{DS}:=\exists E\colon \langle T_i\mid i\in \mathbb{N}\rangle (\mathsf{RFN}_{\Pi^1_1}(T_{0})\land \forall x \;\mathsf{Pr}_{T_x}(\mathsf{RFN}_{\Pi^1_1} (T_{x+1}))\wedge \forall x (T_x \sqsupseteq \mathsf{ACA}_0))$$
Note that $E\colon \langle T_i\mid i\in \mathbb{N}\rangle$ is understood to mean that $E$ is a set encoding a sequence $\langle T_0,T_1,T_2,\ldots \rangle$ of r.e. theories.
If we prove that $\mathsf{ACA}_0+\mathsf{DS}$ proves its own consistency, then the inconsistency of $\mathsf{ACA}_0+\mathsf{DS}$ follows from G\"{o}del's second incompleteness theorem. We reason in $\mathsf{ACA}_0+\mathsf{DS}$ to to prove consistency of $\mathsf{ACA}_0+\mathsf{DS}$.
Let $E\colon \langle T_i\mid i\in \mathbb{N}\rangle $ be a sequence of theories witnessing the truth of $\mathsf{DS}$. Let us consider the sentence $\mathsf{F}$
$$\exists U\colon \langle S_i\mid i\in \mathbb{N}\rangle (S_0=T_1\land \forall x \;\mathsf{Pr}_{S_x}(\mathsf{RFN}_{\Pi^1_1}(S_{x+1})) \wedge\forall x (S_x \sqsupseteq \mathsf{ACA}_0)).$$ The sentence $\mathsf{F}$ is true since we could take $\langle T_{i+1}:i\in\mathbb{N}\rangle$ as $U$. It is easy to observe that $\mathsf{F}$ is $\Sigma^1_1$.
From $\mathsf{RFN}_{\Pi^1_1}(T_{0})$ we get that $T_{0}$ is consistent with any true $\Sigma^1_1$ statement. Thus, we infer that $$\mathsf{Con}(T_{0} + \mathsf{F}).$$ Now using the fact that $\mathsf{Pr}_{T_0} \big(\mathsf{RFN}_{\Pi^1_1}(T_{1})\big)$ and that $T_0\sqsupseteq \mathsf{ACA}_0$ we conclude,
$$\mathsf{Con}( \mathsf{ACA}_0 + \mathsf{RFN}_{\Pi^1_1}(T_{1}) + \mathsf{F}).$$
But it is easy to see that $\mathsf{RFN}_{\Pi^1_1}(T_{1}) + \mathsf{F}$ implies $\mathsf{DS}$ in $\mathsf{ACA}_0$. In particular, we may take $\langle T_1, T_2, ...\rangle$ as our new witness to $\mathsf{DS}$. Thus, we conclude that $\mathsf{Con}(\mathsf{ACA}_0+\mathsf{DS})$.
\end{proof}
\section{The Proof of the Main Theorem}\label{main-section}
Theorem \ref{well-foundedness_reflection} states that the the restriction of $\prec_{\Pi^1_1}:=\{(T,U) \mid U \vdash \mathsf{RFN}_{\Pi^1_1}(T)\}$ to the $\Pi^1_1$-sound extensions of $\mathsf{ACA}_0$ is well-founded. We write $|T|_{\mathsf{ACA}_0}$ to denote the rank of a theory in this ordering. We call $|T|_{\mathsf{ACA}_0}$ the \emph{reflection rank} of $T$.
In this section we consider the relationship between reflection ranks and \emph{proof-theoretic ordinals}. We write $|T|_{\mathsf{WO}}$ to denote the proof-theoretic ordinal of a theory $T$, i.e., the supremum of the $T$-provably well-founded primitive recursive linear orders.
Our main theorem is that for any $\Pi^1_1$ sound extension $T$ of $\mathsf{ACA}_0^+$, $|T|_{\mathsf{ACA}_0}=|T|_{\mathsf{WO}}$. We will derive the main theorem from the following equivalence: for any ordinal notation $\alpha$,
$$\mathsf{ACA}_0+\mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) \equiv \mathsf{ACA}_0+ \mathsf{WO}(\varepsilon_{\alpha}).$$
We prove each inclusion of this equivalence separately, i.e., we first prove that
\begin{equation}
\label{eq:bigcirc}
\tag{$\bigcirc$}
\mathsf{ACA}_0+\mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) \vdash \mathsf{WO}(\varepsilon_{\alpha}),
\end{equation}
and then prove that
\begin{equation}
\label{eq:bigtriangleup}
\tag{$\bigtriangleup$}
\mathsf{ACA}_0+ \mathsf{WO}(\varepsilon_{\alpha}) \vdash \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0).
\end{equation}
We prove both \eqref{eq:bigcirc} and \eqref{eq:bigtriangleup} by Schmerl's \cite{schmerl1979fine} technique of \emph{reflexive induction}; see \textsection \ref{reflexive-section}. In \textsection \ref{easy} we cover the ``easy direction,'' namely, the proof of ($\bigcirc$). In \textsection \ref{cut-lemmas} we will collect some basic facts about infinitary derivations from \cite{pohlers1998subsystems} and use them to prove a key lemma. In \textsection \ref{hard-direction} we use the key lemma to prove the ``hard direction,'' namely, ($\bigtriangleup$). We then easily derive the main theorem from ($\bigcirc$) and ($\bigtriangleup$).
\subsection{The easy direction}\label{easy}
In this section we prove $(\bigcirc)$. We prove the claim in $\mathsf{ACA}_0$ by Schmerl's \cite{schmerl1979fine} technique of \emph{reflexive induction}; see \textsection \ref{reflexive-section}.
\begin{theorem}\label{suggestion}
$\mathsf{ACA}_0\vdash \forall\alpha (\mathsf{ACA}_0+\mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) \textrm{ proves } \mathsf{WO}(\varepsilon_{\alpha})).$
\end{theorem}
\begin{proof}
We let $A(\alpha)$ denote the claim that $\mathsf{ACA}_0+\mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) \vdash \mathsf{WO}(\varepsilon_{\alpha})$. We want to prove that $\mathsf{ACA}_0\vdash \forall\alpha A(\alpha)$. By reflexive induction it suffices to prove that $\mathsf{ACA}_0 \vdash \forall\alpha (\mathsf{Pr}_{\mathsf{ACA}_0}(\forall\gamma<\alpha, A(\gamma)) \rightarrow A(\alpha))$.
\textbf{Reason in} $\mathsf{ACA}_0$. We suppose the \emph{reflexive induction hypothesis}, which is that $\mathsf{Pr}_{\mathsf{ACA}_0}(\forall\gamma<\alpha, A(\gamma))$, i.e.,
$$ \mathsf{Pr}_{\mathsf{ACA}_0}\Big(\forall\gamma<\alpha \big(\mathsf{ACA}_0+\mathsf{RFN}^{1+\gamma}_{\Pi^1_1}(\mathsf{ACA}_0) \textrm{ proves } \mathsf{WO}(\varepsilon_{\gamma})\big)\Big) . $$
We need to show that $A(\alpha)$, i.e., $\mathsf{ACA}_0+\mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) \vdash \mathsf{WO}(\varepsilon_{\alpha})$.
To prove the claim we reason as follows:
\begin{flalign*}
\mathsf{ACA}_0 &\vdash \forall\gamma<\alpha (\mathsf{ACA}_0+\mathsf{RFN}^{1+\gamma}_{\Pi^1_1}(\mathsf{ACA}_0) \textrm{ proves } \mathsf{WO}(\varepsilon_{\gamma}))\\
& \textrm{ by the reflexive induction hypothesis.}\\
\mathsf{ACA}_0 + \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) &\vdash \forall\gamma<\alpha (\mathsf{ACA}_0+\mathsf{RFN}^{1+\gamma}_{\Pi^1_1}(\mathsf{ACA}_0) \textrm{ proves } \mathsf{WO}(\varepsilon_{\gamma}))\\
&\textrm{ by the monotonicity of implication.}\\
\mathsf{ACA}_0 + \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) &\vdash \forall\gamma<\alpha \mathsf{WO}(\varepsilon_{\gamma}) \textrm{ since well-foundedness is $\Pi^1_1$.}
\end{flalign*}
If $\varepsilon_\alpha$ is a limit of $\varepsilon$ numbers, then the claim clearly follows. Otherwise, $\varepsilon_{\alpha}=\varepsilon_{\beta+1}$ for some $\beta$, and we continue reasoning as follows.
\begin{flalign*}
\mathsf{ACA}_0 + \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) &\vdash \forall\gamma<\alpha, \mathsf{WO}(\varepsilon_{\gamma}) \textrm{ as before.}\\
\mathsf{ACA}_0 + \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) &\vdash \mathsf{WO}(\varepsilon_{\beta}) \textrm{ since $\beta<\alpha$.}
\end{flalign*}
Then for every $\delta<\varepsilon_\alpha$, $\mathsf{ACA}_0 + \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0)$ proves the well-foundedness of $\delta$ by (the formalized version of) Theorem \ref{preserves}.
\end{proof}
\subsection{Cut-elimination lemmas}\label{cut-lemmas}
The proof of \eqref{eq:bigtriangleup} requires more work. In particular, we must first prove, within a theory of the form $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\alpha)$, the $\Pi^1_1$-soundness of $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\gamma)$ for all $\gamma<\alpha$. That is, we must prove the following:
\begin{theorem}\label{to be applied}
$\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\alpha)$ proves that for every $\gamma<\alpha$, $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\gamma)$ is $\Pi^1_1$ sound.
\end{theorem}
We do this by carrying out, within $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\alpha)$, ordinal analyses of the theories $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\gamma)$ for all $\gamma<\alpha$. The strategy of the proof is this. We consider a proof of a $\Pi^1_1$ formula $\varphi$ from the axiom system $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\gamma)$. We then embed this proof into a $\Pi^1_1$ complete infinitary proof calculus for $\omega$-logic. We can then infer the truth of $\varphi$ by cut-elimination for $\omega$-logic. Proving cut-elimination for the relevant fragment of $\omega$-logic requires transfinite induction along $\varepsilon_\alpha$.
However, to extract $(\bigtriangleup)$ from Theorem \ref{to be applied}, we will need to make sure that Theorem \ref{to be applied} is provable in $\mathsf{ACA}_0$. This is why we were careful to define infinitary proof systems in such a way that they could be defined and reasoned with in $\mathsf{ACA}_0$.
Before continuing, we collect a number of facts concerning cut-elimination for infinitary derivations from Pohlers' \cite{pohlers1998subsystems}. We fix a sufficiently nice ordinal notation system and note that each of the following is provable in $\mathsf{ACA}_0$.
\begin{definition}
For a pseudo $\Pi^1_1$ formula $F$, the \emph{truth-complexity} of $F$ is the least ordinal $\alpha$ such that $\vdash^\alpha_0 F$. We write $\mathsf{tc}(F)$ to denote the truth-complexity of $F$.
\end{definition}
\begin{remark}
Note that an alternative definition of truth-complexity is given in \cite{pohlers1998subsystems} and that our definition is stated as a theorem.
\end{remark}
\begin{lemma}[Equation (34) after Lemma 2.1.2.4 in \cite{pohlers1998subsystems}]
\label{bound}
For any axiom $A$ of $\mathsf{PA}$, the truth-complexity of $A$ is less than $\omega+5$.
\end{lemma}
For an arithmetically definable relation $\prec$, let $\mathsf{TI}(\prec,X)$ be the formula:
$$\forall x\in \mathsf{field}(\prec)\Big(\forall y(y\prec x \to y \in X)\to x\in X\Big) \to \forall x\in \mathsf{field}(\prec) (x\in X) $$
\begin{theorem}[Theorem 1.3.10 in \cite{pohlers1998subsystems}]
\label{Pohlers}
If $\mathsf{otyp}(\prec)$ is a limit ordinal, then the truth-complexity of $\mathsf{TI}(\prec,X)$ is no greater than $\mathsf{otyp}(\prec)+2$.
\end{theorem}
Attention to the proof of the Theorem \ref{Pohlers} reveals that it actually proves a stronger statement. For an arithmetically definable relation $\prec$ and formula $\varphi$, let $\mathsf{TI}(\prec,\varphi)$ be the formula:
$$\forall x\in \mathsf{field}(\prec)\Big(\forall y\big(y\prec x \to \varphi(y)\big)\to \varphi(x)\Big) \to \forall x\in \mathsf{field}(\prec) \varphi(x) $$
\begin{proposition}
\label{ordinals} For any pseudo $\Pi^1_1$ formula $\varphi$, if $\mathsf{otyp}(\prec)$ is a limit ordinal, then the truth-complexity of $\mathsf{TI}(\prec,\varphi)$ is no greater than $\mathsf{otyp}(\prec)+2$.
\end{proposition}
We now recall the definition of the symmetric sum of ordinals. This is a standard notion (see, e.g., \cite{pohlers1998subsystems}) but we present the definition for convenience.
\begin{definition}
We define the \emph{symmetric sum} of ordinals (in Cantor normal form) $\alpha:= \omega^{\alpha_1}+\dots +\omega^{\alpha_n}$ and $\beta= \omega^{\alpha_{n+1}}+\dots +\omega^{\alpha_m}$ as follows:
$$\alpha \# \beta := \alpha_{\pi(1)}+\dots +\alpha_{\pi(m)}$$
where $\pi$ is a permutation of the numbers $\{1,\dots,m\}$ such that:
$$1\leq i \leq j \leq m \Rightarrow \alpha_{\pi(i)}\geq \alpha_{\pi(j)}.$$
\end{definition}
\begin{remark}
Note that $\alpha\# \beta=\beta\#\alpha$.
\end{remark}
Before stating the final proposition that we need to cite from Pohlers \cite{pohlers1998subsystems}, we recall the definition of the rank of a formula:
\begin{definition}
The rank $\mathsf{rk}(\varphi)$ of a formula $\varphi$ is the number of logical symbols that occur in $\varphi$.
\end{definition}
\begin{proposition}[Lemma 2.1.2.7 in \cite{pohlers1998subsystems}]
\label{embedding} If the sequent $\neg A_1,...,\neg A_n, B$ is provable in pure first-order logic, then $\vdash^{\mathsf{tc}( A_1)\#...\# \mathsf{tc}( A_n)+n}_r B$, where $r:=max\{\mathsf{rk}(A_1),...,\mathsf{rk}(A_n)\}$.
\end{proposition}
\begin{theorem}[Theorem 2.1.2.9 in \cite{pohlers1998subsystems}]
\label{elimination} If $\vdash^{\alpha}_{\rho+1} \Delta$, then $\vdash^{\omega^\alpha}_{\rho} \Delta$.
\end{theorem}
Before presenting the proof of the main lemma for \eqref{eq:bigtriangleup}, we will introduce the following notational convenience: We write $\mathsf{PA}^\alpha$ to denote the pseudo $\Pi^1_1$ pendant of $\mathsf{ACA}_0 +\mathsf{WO}(\alpha)$, i.e.,
$$\mathsf{PA}^\alpha:=\mathsf{PA}(X)+\{ \mathsf{TI}(\alpha,\varphi)\mid \varphi \textrm{ is pseudo $\Pi^1_1$} \}.$$
\begin{lemma}
\label{analysis}
Provably in $\mathsf{ACA}_0$, for any ordinal notation $\alpha$,
$$\mathsf{ACA}_0 + \mathsf{WO}(\varepsilon_\alpha) \vdash \forall\gamma<\alpha (\mathsf{RFN}_{\Pi^1_1}(\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\gamma))).$$
\end{lemma}
\begin{proof}
Recall that $\Pi^1_1$-reflection follows from a single instance of itself in $\mathsf{ACA}_0$. Hence, it suffices to prove in $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\alpha)$ that for $\gamma<\alpha$ and number parameters $\vec{p}$ we have
\begin{equation}
\label{RFN_from_WO_main_claim}
\mathsf{Pr}_{\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\gamma)}(\varphi(\vec{p}))\to \varphi(\vec{p}),\end{equation}
for some fixed $\Pi^1_1$ formula $\varphi(\vec{x})$.
Suppose that $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_\gamma) \vdash \varphi(\vec{p})$ for some $\gamma<\alpha$. By Lemma \ref{conservativity}, we infer that $\mathsf{PA}^{\varepsilon_\gamma}\vdash \varphi^\star(\vec{p})$ for the pseudo $\Pi^1_1$ version $\varphi^\star(\vec{p})$ of $\varphi(\vec{p})$. This is to say that
$$ \mathsf{PA}\vdash \neg \mathsf{TI}(\varepsilon_\gamma, \psi_1)\vee...\vee\neg\mathsf{TI}(\varepsilon_\gamma,\psi_k)\vee\varphi^\star(\vec{p})$$
for some pseudo $\Pi^1_1$ formulas $\psi_1,...,\psi_k$. Then there is a proof in pure first-order logic of the sequent
$$ \neg A_1,...,\neg A_n, \neg\mathsf{TI}(\varepsilon_\gamma, \bigvee_{i\leq k}\psi_i),\varphi^\star(\vec{p})$$
for some axioms $A_1,...,A_n$ of $\mathsf{PA}$.
By Lemma \ref{bound}, for each $A_i$, the truth-complexity of $A_i$ is less than $\omega+5$. By Proposition \ref{ordinals}, the truth-complexity of $\mathsf{TI}(\varepsilon_\gamma, \bigvee_{i\leq k}\psi_i)$ is at most $\varepsilon_\gamma+2$. Thus, by Proposition \ref{embedding}
$$ \vdash^{(\varepsilon_\gamma+2)+(\omega+5)+n}_r \varphi^\star(\vec{p})$$
where $r:=max\Big\{\mathsf{rk}(A_1),...,\mathsf{rk}(A_n),\mathsf{rk}\big(\mathsf{TI}(\varepsilon_\gamma, \bigvee_{i\leq k}\psi_i)\big)\Big\}$. Then by application of Theorem \ref{elimination}, we infer that
$$ \vdash^{\varepsilon_{\gamma+1}}_0 \varphi^\star(\vec{p}).$$ Lemma \ref{correctness} implies $\varphi(\vec{p})$.
\end{proof}
\subsection{The hard direction}\label{hard-direction}
With this lemma on board we are ready for the proof of the theorem. Once again, we use Schmerl's technique of reflexive induction; for an overview of this technique see \textsection \ref{reflexive-section}.
\begin{theorem}
$\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_{\alpha}) \vdash \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0)$.
\end{theorem}
\begin{proof}
We let $A(\alpha)$ denote the claim that $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_{\alpha}) \vdash \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) $. We want to prove that $\mathsf{ACA}_0\vdash \forall\alpha A(\alpha)$. By reflexive induction it suffices to prove that $\mathsf{ACA}_0 \vdash \forall\alpha (\mathsf{Pr}_{\mathsf{ACA}_0}(\forall\gamma<\alpha, A(\gamma)) \rightarrow A(\alpha))$.
\textbf{Reason in} $\mathsf{ACA}_0$. We assume the \emph{reflexive induction hypothesis}, which is that $\mathsf{Pr}_{\mathsf{ACA}_0}(\forall\gamma<\alpha, A(\gamma))$, i.e.,
$$ \mathsf{Pr}_{\mathsf{ACA}_0}\Big(\forall\gamma<\alpha \big(\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_{\gamma})\text{ proves }\mathsf{RFN}^{1+\gamma}_{\Pi^1_1}(\mathsf{ACA}_0)\big)\Big) . $$
We need to show that $A(\alpha)$, i.e., $\mathsf{ACA}_0+\mathsf{WO}(\varepsilon_{\alpha}) \vdash \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) $.
To prove the claim we reason as follows:
\begin{flalign*}
\mathsf{ACA}_0 &\vdash \forall\gamma<\alpha (\mathsf{ACA}_0 + \mathsf{WO}(\varepsilon_{\gamma})\text{ proves } \mathsf{RFN}^{1+\gamma}_{\Pi^1_1}(\mathsf{ACA}_0))\\
& \textrm{ by the reflexive induction hypothesis.}\\
\mathsf{ACA}_0 + \mathsf{WO}(\varepsilon_\alpha) &\vdash \forall\gamma<\alpha (\mathsf{ACA}_0 + \mathsf{WO}(\varepsilon_{\gamma})\text{ proves } \mathsf{RFN}^{1+\gamma}_{\Pi^1_1}(\mathsf{ACA}_0))\\
& \textrm{ by the monotonicity of implication.}\\
\mathsf{ACA}_0 + \mathsf{WO}(\varepsilon_\alpha) &\vdash \forall\gamma<\alpha (\mathsf{RFN}_{\Pi^1_1}(\mathsf{RFN}^{1+\gamma}_{\Pi^1_1}(\mathsf{ACA}_0))) \textrm{ by Lemma \ref{analysis}.}\\
\mathsf{ACA}_0 + \mathsf{WO}(\varepsilon_\alpha) &\vdash \mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) \textrm{ by definition.}\\
\end{flalign*}
This completes the proof of the theorem.
\end{proof}
As an immediate consequence of $(\bigcirc)$ and ($\bigtriangleup$) we derive the following:
\begin{theorem}
\label{iterations}
$\mathsf{ACA}_0+\mathsf{RFN}^{1+\alpha}_{\Pi^1_1}(\mathsf{ACA}_0) \equiv \mathsf{ACA}_0+\mathsf{WO}(\varepsilon_{\alpha}) $.
\end{theorem}
We now combine Theorem \ref{iterations} with Theorem \ref{mm} to derive the main theorem of the paper:
\begin{theorem}
For any $\Pi^1_1$ sound extension $T$ of $\mathsf{ACA}_0^+$, $|T|_{\mathsf{ACA}_0}=|T|_{\mathsf{WO}}$.
\end{theorem}
\begin{proof}
Let $T$ be a $\Pi^1_1$ sound extension of $\mathsf{ACA}_0^+$. It is immediate from Corollary \ref{iterations} that $|T|_{\mathsf{ACA}_0} \leq |T|_{\mathsf{WO}}$. To see that $|T|_{\mathsf{WO}} \leq |T|_{\mathsf{ACA}_0}$ we reason as follows:
\begin{flalign*}
\mathsf{ACA}_0^+ &\vdash \forall \mathcal{X} (\mathsf{WO}(\mathcal{X}) \rightarrow \mathsf{WO}(\varepsilon_\mathcal{X})) \textrm{ by Theorem \ref{mm}.}\\
\mathsf{ACA}_0^+ &\vdash \mathsf{WO}(\alpha) \rightarrow \mathsf{WO}(\varepsilon_\alpha) \textrm{ by instantiation.}\\
\mathsf{ACA}_0^+ &\vdash \mathsf{WO}(\varepsilon_\alpha) \rightarrow \mathsf{RFN}_{\Pi^1_1}^{1+\alpha}(\mathsf{ACA}_0) \textrm{ by Corollary \ref{iterations}.}\\
\mathsf{ACA}_0^+ &\vdash \mathsf{WO}(\alpha) \rightarrow \mathsf{RFN}_{\Pi^1_1}^{1+\alpha}(\mathsf{ACA}_0) \textrm{ from the previous two lines.}
\end{flalign*}
Thus, for any $T$ extending $\mathsf{ACA}_0^+$, if $T \vdash \mathsf{WO}(\alpha)$ then also $T \vdash \mathsf{RFN}_{\Pi^1_1}^{1+\alpha}(\mathsf{ACA}_0)$.
\end{proof}
\bibliographystyle{plain}
|
\section{Introduction}
\IEEEPARstart{T}{he} purpose of diffraction tomography~(DT) is to recover the refractive-index~(RI) map of an object in a noninvasive manner~\cite{wolf1969three}.
The sample is probed with a series of tilted incident waves, while the resulting complex-valued scattered waves are recorded for each illumination~\cite{jin2017tomographic}.
From these measurements, one reconstructs the RI map by solving an inverse-scattering problem.
The quality of the reconstruction depends on the angular diversity and the accuracy of the forward imaging model.
When the illumination is a time-harmonic field, the wave propagation through the sample is governed by the Helmholtz equation under the scalar-diffraction theory.
To simplify the reconstruction problem, pioneering works used a linear model to approximate the physical process.
For instance, the Born~\cite{wolf1969three} and Rytov~\cite{devaney1981inverse} approximations are mainly valid for weakly scattering samples.
Recent studies showed that regularization techniques could improve the quality of reconstruction and counteract the presence of noise and the missing-cone problem~\cite{sung2009optical,lim2015comparative,yang2020deep}.
Moreover,
nonlinear models that are able to properly account for multiple scattering as well as reflections could also improve the quality of reconstruction~\cite{dubois2005retrieval,chaumet2009three,mudry2012electromagnetic,kamilov2015learning,kamilov2016optical,lim2018learning, lim2019high,liu2017seagle,soubies2017efficient,pham2020three,kadu2020high}.
In particular, recent works relied on the Lippmann-Schwinger~(LiS) equation---an integral formulation of the Helmholtz equation---to design an accurate nonlinear forward model~\cite{liu2017seagle,soubies2017efficient,pham2020three}.
A similar model, called the discrete-dipole approximation, can additionally account for polarization~\cite{draine1994discrete,girard2010nanometric,zhang2016far}.
However, when facing particularly strongly scattering samples, we observed that the recent solvers \cite{liu2017seagle,soubies2017efficient,pham2020three} for the LiS model suffer from slow convergence.
Furthermore, the LiS model involves a discrete convolution over a domain larger than the one of interest, which increases the overall computational burden. One may use well-designed preconditioners for the LiS equation \cite{ying2015sparsifying,liu2018sparsify}, but these methods are memory-consuming and need a significant setup time, which hinders their application to inverse-scattering problem.
In this work, we are interested in solving the inverse-scattering problem of strongly scattering objects.
To that end, we introduce a nonlinear imaging model that is based directly on the Helmholtz equation and that relies on a robust and efficient multigrid~(MG) solver.
We show that our method is as accurate as the LiS model while remaining efficient even for strongly scattering samples.
Similarly to the approach developed in \cite{soubies2017efficient}, we also provide an explicit expression of the Jacobian matrix of our model to easily evaluate the gradient in the data-fidelity term.
Our numerical experiments show that the proposed MG solver accurately resolves challenging inverse-scattering problems, while mitigating the prohibitive computational cost of the LiS model.
\subsection{Outline}
The rest of the paper is organized as follows: In \Cref{sec:PhysicalModel}, we introduce the physical model of diffraction tomography and review the LiS model.
In \Cref{sec:MGSolverHelmholtz}, we present the proposed MG-based solver.
In \Cref{sec:RecProblemFormulationandOptimization}, we formulate the inverse-scattering problem and propose an optimization algorithm to solve it.
In \Cref{sec:Exps},
we study the robustness and efficiency of the proposed MG method with numerical experiments on simulated and real data.
\subsection{Notations}
Scalar and continuously defined functions are denoted by italic letter~({$e.g.,$}{} $\eta_\mathrm{b}\in\mathbb{R}_{\geq 0}$, $f \in L_2$). Vectors and matrices are denoted by bold lowercase and uppercase letters, respectively~({$e.g.,$}{}~$\mathbf v\in\mathbb{R}^N,\mathbf A\in\mathbb{C}^{N\times N}$); $\|\mathbf v\|$ stands for the $\ell_2$-norm of $\mathbf v\in\mathbb{R}^N$ and $\langle\mathbf v_1,\mathbf v_2\rangle$ denotes the inner products between the vectors $\mathbf v_1,\mathbf v_2\in\mathbb{R}^N$.
The imaginary unit $\mathrm{j}$ is such that $\mathrm{j}^2=-1$ and the real part of a complex number~$z$ by $\Re(z)$.
The diagonal matrix~$\mathop{\bf diag}(\mathbf v)\in\mathbb{R}^{N\times N}$ is formed out of the entries of~$\mathbf v$.
For a matrix~$\mathbf A\in\mathbb{R}^{N\times N}$, $\mathop{\bf diag}(\mathbf A)\in\mathbb{R}^N$ denotes the diagonal of $\mathbf A$.
The matrix~$\mathbf I_N\in\mathbb{R}^{N\times N}$ is the identity.
\begin{figure
\centering
\def\mathop{\bf dist{}}{1.67}
\def1pt{1pt}
\def45{45}
\def4{4}
\def0.1{0.1}
\def120{120}
\def0.125{0.125}
\def0.35{0.35}
\newcommand{\view}[1]{E_{#1}}
\newcommand{\sensors}[1]{S_{#1}}
\begin{tikzpicture}[scale = 1]
\draw[lightgray] (0,0) circle (\mathop{\bf dist{}});
\foreach \ang in {-120,-119,...,120} {
\draw[red,fill=red] (\ang:\mathop{\bf dist{}}) circle (0.25pt);%
}
\foreach[evaluate = \ang as \i using int(\ang/45 + 5) ] \ang in {-180,-135,...,135} {
\draw[black,fill=darkgreen, shift = {(\ang:\mathop{\bf dist{}})}] ({- 1pt/2},{- 1pt/2}) rectangle ({1pt/2},{1pt/2});
\node[shift = (\ang:7pt)] at (\ang:\mathop{\bf dist{}}) {$\view{\i}$};
}
\foreach \pos in {1,2,...,4} {
\draw[darkgreen] ({-\mathop{\bf dist{}}+0.1*\mathop{\bf dist{}}*\pos},{-0.1*\mathop{\bf dist{}}*\pos*sin(45)}) arc[start angle=-45,end angle=45, radius = 0.1*\mathop{\bf dist{}}*\pos];
rad}
\node[fill=white,circle,inner sep=0pt] at (-0.675*\mathop{\bf dist{}},0) {$\mathbf{u}^\mathrm{in}_1$};
\draw[purple,snake it] ({0.5*\mathop{\bf dist{}}*cos(-120)},{0.5*\mathop{\bf dist{}}*sin(-120)}) arc[start angle = {-120},end angle = {120}, radius = {0.5*\mathop{\bf dist{}}}];
\draw[purple,snake it] ({0.7*\mathop{\bf dist{}}*cos(-120)},{0.7*\mathop{\bf dist{}}*sin(-120)}) arc[start angle = {-120},end angle = {120}, radius = {0.7*\mathop{\bf dist{}}}];
\node[fill=white,circle,inner sep=0pt] at (0.55*\mathop{\bf dist{}},0) {$\mathbf{u}_1$};
\fill [scale = 3,darkblue] (0,0) circle(0.08/1.67*\mathop{\bf dist{}});
\fill [scale = 3,goldenrod] ({(0.08+0.031)/1.67*\mathop{\bf dist{}}},0) circle(0.031/1.67*\mathop{\bf dist{}});
\draw[black] (-3*0.15/1.67*\mathop{\bf dist{}}, -3*0.15/1.67*\mathop{\bf dist{}}) rectangle (3*0.15/1.67*\mathop{\bf dist{}},3*0.15/1.67*\mathop{\bf dist{}});
\node at (-1.83*0.15/1.67*\mathop{\bf dist{}},2.1*0.15/1.67*\mathop{\bf dist{}}) {\footnotesize$\eta_\mathrm{b}$}
\node [align=center,anchor=north,fill=white] at (0,-3*0.15/1.67*\mathop{\bf dist{}}) {$\Omega$};
\end{tikzpicture}
\caption{Acquisition setup of diffraction tomography. The sensors (small round on the circle) collect the illumination from~$E_1$. In this example, $8$~views are acquired.}
\label{fig:ODTRefractive}
\end{figure}
\section{Physical Model} \label{sec:PhysicalModel}
\subsection{Continuous-Domain Formulation}
\label{sec:PhysicalModel:sub:Continuous}
Let us consider an object of RI map $\eta: \Omega \rightarrow \mathbb{R}$ over some spatial domain $\Omega\subset \mathbb{R}^d$ ($d=2,3$).
The object is immersed in a medium of RI $\eta_\mathrm{b}$ and is illuminated by a plane wave (\Cref{fig:ODTRefractive})
\begin{equation}
u^\mathrm{in}(\mathbf x,t)=\Re\left(u_0\mathrm{e}^{\mathrm{j} \langle\mathbf k, \mathbf x\rangle-\mathrm{j} \omega t}\right)
\end{equation}
where~$\mathbf k,\mathbf x\in \mathbb R^d$, $\omega\in\mathbb{R}$, $u_0\in \mathbb C$, and $t\in\mathbb{R}$ denote the wave vector, the spatial coordinates, the angular pulsation, the complex envelope, and the time, respectively.
Since the incident field is a time-harmonic wave,
the time-independent total field~$u(\mathbf x)$ at location~$\mathbf{x}$ is well described by the inhomogeneous Helmholtz equation~\cite{kamilov2016optical,soubies2017efficient}
\begin{equation}
\nabla^2u(\mathbf x)+k_0^2\eta^2(\mathbf x) u(\mathbf x)=0\label{eq:HelmTotal},
\end{equation}
where $k_0=\omega/c$ is the wave number in free space and \mbox{$c\approx 3\times 10^8 \mathrm{m}/\mathrm{s}$} the velocity of light.
Denote by \mbox{$u^\mathrm{in}(\mathbf x) = u_0 \mathrm{e}^{\mathrm{j}\langle\mathbf k, \mathbf x\rangle}$} the incident wave in space and $u^{\mathrm{sc}}(\mathbf x) = (u(\mathbf x) - u^\mathrm{in}(\mathbf x))$ the scattered wave field.
Note that $u^\mathrm{in}(\mathbf x)$ is a solution of the homogeneous Helmholtz equation
\mbox{$\nabla^2 u^\mathrm{in}(\mathbf x)+k_0^2\eta_\mathrm{b}^2u^\mathrm{in}(\mathbf x)=0$}. Then, \eqref{eq:HelmTotal} reads
\begin{equation}
-\nabla^2u^{\mathrm{sc}}(\mathbf x)-k_0^2\eta^2(\mathbf x)u^{\mathrm{sc}}(\mathbf x)=f(\mathbf x)u^\mathrm{in}(\mathbf x)\label{eq:HelmScatterRightIncident},
\end{equation}
where $f(\mathbf x)=k_0^2(\eta^2(\mathbf x)-\eta_\mathrm{b}^2)$ is the scattering potential function, which is the quantity that we wish to recover.
Equivalently, the integral form of \eqref{eq:HelmTotal} is known as the Lippmann-Schwinger equation and describes the wave propagation~\cite{liu2017seagle,soubies2017efficient,pham2020three} as
\begin{equation}
u(\mathbf x)=u^\mathrm{in}(\mathbf x)+\int_\Omega g(\mathbf x-\mathbf z)f(\mathbf z)u(\mathbf z)d\mathbf z\label{eq:LSIntegral}.
\end{equation}
With the assumption of Sommerfeld's radiation condition~\cite{sommerfeld1949partial}, the Green's function $g(\mathbf x):\mathbb{R}^d\rightarrow \mathbb{C}$ in \eqref{eq:LSIntegral} is defined as~\cite{schmalz2010derivation}
\begin{equation}\label{eq:green}
g(\mathbf x)=\left\{
\begin{array}{ll}
\frac{\mathrm{j}}{4}H_0^{(1)}(k_0\eta_\mathrm{b}\|\mathbf x\|), & d = 2 \\
\frac{1}{4\pi}\frac{\mathrm{e}^{\mathrm{j} k_0\eta_\mathrm{b}\|\mathbf x\|}}{\|\mathbf x\|}, & d=3,
\end{array}
\right.
\end{equation}
where $H_0^{(1)}$ is the Hankel function of the first kind.
In DT, the acquisition setup records the (complex-valued) total field at the sensor positions~$\Gamma\subset\mathbb{R}^d$ with~$\Gamma \cap \Omega=\emptyset$.
\subsection{Discrete Forward Model}
\label{sec:PhysicalModel:sub:DiscreteForwMod}
To solve an inverse scattering problem,
recent works propose a two-step forward model based on~\eqref{eq:LSIntegral}~\cite{liu2017seagle,soubies2017efficient}, which we refer to as LiS methods.
The authors first discretize $\Omega$ into $N$ points lying on a uniform grid.
Then, the (nonlinear) forward imaging operator $\mathbf H_\mathrm{LiS}(\mathbf{f}):\mathbb{R}^N\rightarrow\mathbb{C}^M$ returns the scattered field on the sensor~$\Gamma$ as
\begin{align}
\mathbf H_\mathrm{LiS}:\mathbf{f} &\mapsto \tilde{\mathbf G}\mathop{\bf diag}(\mathbf{f})\mathbf{u}_\mathrm{LiS}(\mathbf{f}), \label{eq:DiscreteForward}
\end{align}
where $\mathbf{f}\in\mathbb{R}^N$ and $\mathbf{u}^\mathrm{in}\in\mathbb{C}^N$ are the discrete (and vectorized) counterparts of the scattering potential and the incident field on $\Omega$, respectively.
The matrix~$\tilde{\mathbf G} \in \mathbb{C}^{M\times N}$ encodes the convolution with the Green's function in~\eqref{eq:LSIntegral} in such way that it gets the scattered field on~$\Gamma$.
In~\eqref{eq:DiscreteForward},~$\mathbf{u}_\mathrm{LiS}(\mathbf{f}):\mathbb{R}^N\rightarrow\mathbb{C}^N$ is the discrete total field on~$\Omega$ and is computed from~\eqref{eq:LSIntegral}.
\subsection{Computation of \texorpdfstring{$\mathbf{u}_\mathrm{LiS}(\mathbf{f})$}~~from the LiS Equation
}\label{sec:PhysicalModel:sub:ComputeLiS}
In the LiS methods, $\mathbf{u}_\mathrm{LiS}(\mathbf{f})$ is determined based on the inversion of the discretized form of \eqref{eq:LSIntegral}~\cite{soubies2017efficient,liu2017seagle}
\begin{equation}
\left(\mathbf I_N-\mathbf G\mathop{\bf diag}(\mathbf{f})\right)\mathbf{u}_\mathrm{LiS}(\mathbf{f}) = \mathbf{u}^\mathrm{in},\label{eq:invertLSm}
\end{equation}
where
$\mathbf G\in\mathbb{C}^{N \times N}$ encodes the convolution with the Green's function in~\eqref{eq:LSIntegral}~\cite{pham2020three}.
In \cite{liu2017seagle, soubies2017efficient}, the normal equation of~\eqref{eq:invertLSm} was iteratively solved via Nesterov accelerated gradient descent~(NAGD) or conjugate gradient~(CG) methods.
In~\cite{pham2020three}, \eqref{eq:invertLSm} was directly solved by the biconjugate-gradient stabilized method (Bi-CGSTAB)~\cite{van1992bi}.
Since Bi-CGSTAB solves \eqref{eq:invertLSm} faster than both NAGD and CG~\cite{pham2020three}, we use Bi-CGSTAB in this work.
The Green's function~\eqref{eq:green} is oscillatory and has a singularity at $\mathbf x = \mathbf{0}$, which is challenging to discretize.
In~\cite{pham2020three}, the corresponding convolution operator~$\mathbf G$ is properly discretized through a truncation trick~\cite{vainikko2000fast, vico2016fast} and the main computational burden amounts to four fast Fourier transforms (FFT) per iteration of Bi-CGSTAB. In practice, the FFTs are actually applied to a space $2^d$ times larger than the domain of interest so as to approximate an aperiodic convolution.
The LiS methods then require one to store the Fourier transform of the truncated Green's function ($2^dN$ points), which might lead to memory issues when $N$ is large, for instance in three-dimensional problems.
Our numerical experiments show that the LiS method with Bi-CGSTAB still requires a large number of iterations to converge when the object is strongly scattering.
Now, a slow convergence hinders the efficiency of the LiS methods because the total field needs to be computed repeatedly. Based on those observations, we propose instead to solve the Helmholtz equation~\eqref{eq:HelmScatterRightIncident} directly with an efficient and robust MG solver.
\section{Multigrid Methods}
\label{sec:MGSolverHelmholtz:sub:MGMethods}
Let us assume that we want to solve in terms of~$\mathbf{u}^h\in\mathbb{C}^N$ the system of linear equations
\begin{equation}
\label{eq:genlinprob}
\mathbf A^h\mathbf{u}^h=\mathbf b,
\end{equation}
where~$\mathbf b\in\mathbb C^N$ and where~$\mathbf A^h\in\mathbb{C}^{N\times N}$ is a symmetric positive-definite matrix corresponding to the discretization of some partial differential equation with mesh size~$h$.
To solve~$\eqref{eq:genlinprob}$, there exist
local relaxation methods, also called local smoothers ({$e.g.,$}{} Jacobi, Gauss-Seidel, Kaczmarz).
Their behavior was studied in early works~\cite{brandt1977multi}.
These techniques refine a current estimate of the solution in an iterative manner.
Let ${\mathbf v}^{h}_\nu$ be the estimate of the solution~$\mathbf{u}^h$ of~\eqref{eq:genlinprob} at the $\nu$th iteration.
Then, the Jacobi method with damped factor $\omega_\mathrm{S}\in(0,1]$ sets ${\mathbf v}^{h}_{\nu+1}$ as
\begin{equation}\label{eq:dampedJ}
{\mathbf v}^{h}_{\nu+1} = {\mathbf v}^{h}_\nu-\omega_\mathrm{S} \mathbf D_{\mathbf A^h}^{-1}(\mathbf A^h {\mathbf v}^{h}_\nu-\mathbf b),
\end{equation}
where the diagonal matrix $\mathbf D_{\mathbf A^h}=\mathop{\bf diag}(\mathop{\bf diag}(\mathbf A^h))\in\mathbb C^{{N}\times{N}}$ is formed out of the diagonal of~$\mathbf A^h$.
Let the residual of~\eqref{eq:genlinprob} at the $\nu$th iteration be
\begin{equation}
\label{eq:linsyserr}
\mathbf A^h\mathbf e^h_\nu = \mathbf r^h_\nu,
\end{equation}
where~$\mathbf r^h_\nu = (\mathbf b - \mathbf A^h{\mathbf v}^{h}_\nu) \in \mathbb C^{{N}}$ is the residual and $\mathbf e^h_\nu=(\mathbf{u}^h-{\mathbf v}_\nu^h)$ the current error.
Evidently, ${\mathbf v}^{h}_\nu$ is the solution of \eqref{eq:HelmScatterRightIncident:discrete} if $\mathbf e^h_\nu=\bolds 0$.
Using the eigenvectors of $\mathbf A^h$ as the basis to represent $\mathbf e^h_\nu$, we refer to the eigenvectors corresponding to the large (small, respectively) eigenvalues as the high-frequency (low-frequency, respectively) components of $\mathbf e^h_\nu$.
The local Fourier analysis (LFA)---a rigorous quantitative analysis tool for MG methods~\cite{brandt1994rigorous}---showed that local relaxation methods can efficiently eliminate the high-frequency components in $\mathbf e^h_\nu$. However, LFA also showed that these methods require more iterations to remove the low-frequency components.
To exploit this specificity, MG methods rely on relaxation steps and coarse-grid correction~(CGC).
A relaxation step typically consists in few iterations of a local smoother with low computational cost~({$e.g.,$}{} the Jacobi method) so as to efficiently eliminate the high-frequency components in the error~$\mathbf e^h_\nu$.
The CGC then addresses the remaining error ({$i.e.,$}{} the low-frequency components) by solving the related problem on a coarser grid.
The CGC benefits from two aspects: (a) the coarse problem has fewer variables, thus reducing the computational cost; (b) the low-frequency error on the fine problem is usually well approximated on the coarse problem and looks bumpier, which again can be efficiently eliminated by local smoothers~\cite{brandt1977multi}.
We now introduce two operators. The prolongation operator $\mathbf P$ transfers a vector from a coarse grid to a fine grid. The restriction operator $\mathbf R$ transfers a vector from a fine grid to a coarse grid. We refer the reader to \cite{trottenberg2000multigrid,xu2017algebraic} about the choice of $\mathbf P$ and~$\mathbf R$ for different problems.
The choice of $\mathbf P$ and $\mathbf R$ in this work will be specified in \Cref{sec:MGSolverHelmholtz:sub:ProposedMGMethod}.
The typical formulation of MG methods is the two-grid cycle presented in \Cref{alg:TG}. It first calls $\nu_1\in \mathbb N_{\geq 0}$ pre-relaxation step(s), which provides an approximate solution ${\mathbf v}^h$.
Subsequently, one restricts the residual to $\mathbf r^h = (\mathbf b - \mathbf A^h{\mathbf v}^h)$ to $\mathbf r^{2h} = \mathbf R\mathbf r^h$ and solves the coarse problem
\begin{equation}
\label{eq:linsyserrcoarse}
\mathbf A^{2h}\mathbf e^{2h} = \mathbf r^{2h},
\end{equation}
to obtain the error $\mathbf e^{2h}$. Then, the error $\mathbf e^{2h}$ is prolongated to correct the current estimate~$\mathbf v^h$ on the fine grid.
Finally, $\nu_2\in\mathbb N_{\geq 0}$ post-relaxation steps usually follow and we get the final estimate~$\widehat{\mathbf v}^h$.
The matrix $\mathbf A^{2h}$ can be formulated via a Galerkin formulation ({$i.e.,$}{} $\mathbf A^{2h}=\mathbf R\mathbf A^h\mathbf P$) or via discretizing \eqref{eq:genlinprob} with mesh size $2h$.
\begin{algorithm}[t
\caption{Two-grid cycle}
\label{alg:TG}
\begin{algorithmic}[1]
\REQUIRE $\mathbf A^h\in \mathbb C^{{N} \times {N}},\mathbf b\in \mathbb C^{N},\mathbf v^h\in \mathbb C^{N}$, and $\nu_1,\nu_2 \in \mathbb N_{\geq 0}$.
\lastcon $\widehat{\mathbf v}^h \leftarrow TwoGrid(\mathbf A^h,\mathbf b,\mathbf v^h)$.
\STATE {Call $\nu_1$ times pre-relaxation: $\mathbf v^h\leftarrow Relax(\mathbf A^h,\mathbf b,\mathbf v^h)$.}
\STATE {Compute the residual $\mathbf r^h \leftarrow \mathbf b-\mathbf A^h \mathbf v^h$.}
\STATE {Restrict $\mathbf r^h$ for the coarse problem $\mathbf r^{2h} \leftarrow \mathbf R\mathbf r^h$.}
\STATE {Compute $\mathbf e^{2h}$ by solving $\mathbf A^{2h} \mathbf e^{2h} = \mathbf r^{2h}$.}
\STATE {Prolong $\mathbf e^{2h}$ and apply CGC: $\mathbf v^h\leftarrow \mathbf v^h + \mathbf P \mathbf e^{2h}$.}
\STATE {Apply $\nu_2$ times post-relaxation: $\widehat{\mathbf v}^h = Relax(\mathbf A^h,\mathbf b,\mathbf v^h)$.}
\end{algorithmic}
\end{algorithm}
In practice, \eqref{eq:linsyserrcoarse} will face the same issue as \eqref{eq:linsyserr} if local smoothers are used.
We can then apply an additional two-grid cycle to solve \eqref{eq:linsyserrcoarse}.
Such a recursive procedure can continue until the coarse problem is solved exactly, which yields a so-called MG algorithm.
In~\Cref{alg:MG}, we present two MG schemes, namely V-cycle with $CycleType=1$ and W-cycle with $CycleType=2$.
Note that the numbers~$\nu_1,\nu_2$ of relaxation steps are not necessarily the same at each level, which allows us to balance the speed of convergence with the cost of computation.
We refer the reader to \cite{briggs2000multigrid,trottenberg2000multigrid} and the references therein for more details about MG methods.
In \Cref{fig:typeCycle}, we display a four-level scheme of the V-cycle and W-cycle to highlight their difference.
\begin{algorithm}[t
\caption{Multigrid cycle}
\label{alg:MG}
\begin{algorithmic}[1]
\REQUIRE $\mathbf A^h\in \mathbb C^{{N} \times {N}},\mathbf b\in \mathbb C^{N},\mathbf v^h\in \mathbb C^{N}$,
$CycleType\in\mathbb N_{\geq 1}$,
$h>0$,
$\nu_1,\nu_2 \in \mathbb N_{\geq 0}$.
\lastcon
$\widehat{\mathbf v}^h \leftarrow MGCycle(\mathbf A^h,\mathbf b,\mathbf v^h,CycleType, h)$.
\IF {coarsest level}
\STATE Solve (exactly)
$\mathbf A^{h} \mathbf e^{h} = \mathbf b$.
\RETURN $\mathbf e^h$.
\ENDIF
\STATE {Call $\nu_1$ times pre-relaxation: $\mathbf v^h\leftarrow Relax(\mathbf A^h,\mathbf b,\mathbf v^h)$.}
\STATE {Compute the residual $\mathbf r^h = \mathbf b-\mathbf A^h \mathbf v^h$.}
\STATE {Restrict $\mathbf r^h$ for the coarse problem $\mathbf r^{2h} = \mathbf R\mathbf r^h$.}
\STATE {$CycleCount = 1$.}
\STATE {$\mathbf e^{2h}\leftarrow \bolds 0$.}
\FOR {$CycleCount\leq CycleType$}
\STATE {$\mathbf e^{2h} \leftarrow MGCycle(\mathcal \mathbf A^{2h},\mathbf r^{2h},\mathbf e^{2h},CycleType,2h)$.}
\STATE {$CycleCount\leftarrow CycleCount+1$.}
\ENDFOR
\STATE {Prolong $\mathbf e^{2h}$ and apply CGC: $\mathbf v^h\leftarrow \mathbf v^h + \mathbf P\mathbf e^{2h}$.}
\STATE {Apply $\nu_2$ times post-relaxation: $\widehat{\mathbf v}^h = Relax(\mathcal \mathbf A^h,\mathbf b,\mathbf v^h)$.}
\end{algorithmic}
\end{algorithm}
\begin{figure
\centering
\newcommand{0.05cm}{0.05cm}
\newcommand{2}{1.8}
\newcommand{\szmax/6}{2/6}
\subfigure[V-cycle]{
\begin{tikzpicture}
\pgfsetarrowsstart{Latex}
\node[circle,draw,fill=white,minimum size=0.05cm] (v1) at (0,2) {};
\node[circle,draw, fill=white,minimum size=0.05cm] (v2) at (\szmax/6,2/3*2) {};
\node[circle,draw,fill=white, minimum size=0.05cm] (v3) at (2*\szmax/6,2/3) {};
\node[circle,draw,fill=black, minimum size=0.05cm] (v4) at (3*\szmax/6,0) {};
\node[circle,draw, fill=white,minimum size=0.05cm] (v5) at (4*\szmax/6,2/3) {};
\node[circle,draw, fill=white,minimum size=0.05cm] (v6) at (5*\szmax/6,2/3*2) {};
\node[circle,draw, fill=white,minimum size=0.05cm] (v7) at (6*\szmax/6,2) {};
\draw[-{Latex}] (v1) -- (v2);
\draw[-{Latex}] (v2) -- (v3);
\draw[-{Latex}] (v3) -- (v4);
\draw[-{Latex}] (v4) -- (v5);
\draw[-{Latex}] (v5) -- (v6);
\draw[-{Latex}] (v6) -- (v7);
\end{tikzpicture}
}
\hspace{1cm}
\subfigure[W-cycle]{
\begin{tikzpicture}
\node[circle,draw, fill=white,minimum size=0.05cm] (v1) at (0,2) {};
\node[circle,draw,fill=white, minimum size=0.05cm] (v2) at (\szmax/6,2/3*2) {};
\node[circle,draw, fill=white,minimum size=0.05cm] (v3) at (2*\szmax/6,2/3) {};
\node[circle,draw,fill=black, minimum size=0.05cm] (v4) at (3*\szmax/6,0) {};
\node[circle,draw,fill=white,minimum size=0.05cm] (v5) at (4*\szmax/6,2/3) {};
\node[circle,draw,fill=black, minimum size=0.05cm] (v6) at (5*\szmax/6,0) {};
\node[circle,draw, fill=white,minimum size=0.05cm] (v7) at (6*\szmax/6,2/3) {};
\node[circle,draw,fill=white, minimum size=0.05cm] (v8) at (7*\szmax/6,2/3*2) {};
\node[circle,draw,fill=white, minimum size=0.05cm] (v9) at (8*\szmax/6,2/3) {};
\node[circle,draw,fill=black, minimum size=0.05cm] (v10) at (9*\szmax/6,0) {};
\node[circle,draw, fill=white,minimum size=0.05cm] (v11) at (10*\szmax/6,2/3) {};
\node[circle,draw,fill=black, minimum size=0.05cm] (v12) at (11*\szmax/6,0) {};
\node[circle,draw,fill=white, minimum size=0.05cm] (v13) at (12*\szmax/6,2/3) {};
\node[circle,draw,fill=white, minimum size=0.05cm] (v14) at (13*\szmax/6,2/3*2) {};
\node[circle,draw,fill=white,minimum size=0.05cm] (v15) at (14*\szmax/6,2) {};
\draw[-{Latex}] (v1) -- (v2);
\draw[-{Latex}] (v2) -- (v3);
\draw[-{Latex}] (v3) -- (v4);
\draw[-{Latex}] (v4) -- (v5);
\draw[-{Latex}] (v5) -- (v6);
\draw[-{Latex}] (v6) -- (v7);
\draw[-{Latex}] (v7) -- (v8);
\draw[-{Latex}] (v8) -- (v9);
\draw[-{Latex}] (v9) -- (v10);
\draw[-{Latex}] (v10) -- (v11);
\draw[-{Latex}] (v11) -- (v12);
\draw[-{Latex}] (v12) -- (v13);
\draw[-{Latex}] (v13) -- (v14);
\draw[-{Latex}] (v14) -- (v15);
\end{tikzpicture}
}
\caption{Four-level representation of V-cycle and W-cycle. The symbol~\tikzcircle[fill=white]{3pt} refers to the relaxation procedure; \tikzcircle[fill=black]{3pt} refers to the coarsest level, which is usually solved exactly;
\tikzarr{0}{0}{0.15}{0.3}
refers to the prolongation; \tikzarr{0}{0.3}{0.15}{0.}~refers to the restriction.
}
\label{fig:typeCycle}
\end{figure}
Remarkably, the additional computational cost of such a multilevel approach is low. Here, we take the computational cost of one V-cycle as example.
Let us define the computational cost of one local relaxation on the finest problem as one work-unit (WU) and examine how many WUs are needed for one V-cycle.
In this discussion, we omit the cost of $\mathbf P$ and $\mathbf R$ which amounts to at most $20$\% of the cost of the entire cycle~\cite{briggs2000multigrid}. Moreover,
we also assume that the computational cost on the coarsest problem is negligible.
When the mesh-size of the coarse problem is doubled~({$i.e.,$}{} $2h$), the dimension is reduced to $\frac{1}{2^d}$ of the fine grid.
At each level, the computational cost amounts to $2^{-pd}\text{WU}$, where $p=0,1,\ldots,N_\mathrm{level}$ and $N_\mathrm{level}$ denotes the number of levels.
Overall, the computational cost of one V-cycle is
\begin{equation}
(v_1+v_2) \sum_{p=0}^{N_\mathrm{level}} 2^{-pd} \text{WUs} < \frac{v_1+v_2}{1-2^{-d}}\text{WUs}.
\end{equation}
For $d=2$, we obtain an upper bound $\frac{4(v_1+v_2)}{3}\text{WUs}$ which suggests that, compared with a single level, multilevel does not dramatically increase the computation~\cite{trottenberg2000multigrid}.
\section{Multigrid-Based Solver for the Helmholtz Model}
\label{sec:MGSolverHelmholtz}
We now discuss the computation of the total field from the Helmholtz equation instead of the LiS equation. Moreover, we present MGH as an MG-based solver for the Helmholtz equation, tailored for inverse scattering.
In particular, MGH efficiently computes the total field for strongly scattering objects.
The computations are carried on a domain only slightly larger than the one of interest, which contrasts with the requirements of the LiS method ({$i.e.,$}{} $2^d$ times larger).
In what follows, we first describe the discretization of \eqref{eq:HelmScatterRightIncident}.
We further discuss the challenges of a plain application of MG methods to the Helmholtz equation and present an heuristic way to address these issues.
\subsection{Discretization of the Helmholtz Equation}
\label{sec:MGSolverHelmholtz:sub:Discretization}
We discretize the Helmholtz equation on a domain of interest $\Omega$ with $d=2$ (\Cref{fig:HelmholtzBoundaryCond}).
To avoid artificial reflections near the boundary, we consider an extended domain~$\Omega_\mathrm{e}$ with an additional absorbing boundary layer (ABL)
that gradually damps the outgoing waves.
To that end, we multiply $k_0^2\eta^2(\mathbf x)$ in \eqref{eq:HelmScatterRightIncident} with
\begin{equation}
\alpha(\mathbf x) =
1-\mathrm{j}\beta \frac{\|\mathbf x - \mathcal{P}_\Omega(\mathbf x)\|^2}{L},
\end{equation}
where $\beta\geq 0$ is an arbitrary parameter,
\mbox{$L > 0$} is the thickness of the ABL,
and $\mathcal{P}_\Omega(\mathbf x)$ is the orthogonal projection of~$\mathbf x$ on~$\Omega$.
Without loss of generality, $\Omega_\mathrm{e}$ is normalized to $[0,1]^2$ and $N_\mathrm{e}$ points are used to discretize \eqref{eq:HelmScatterRightIncident} on $\Omega_\mathrm{e}$.
The points lie on a uniform grid with mesh-size $h = \frac{1}{\sqrt{N_\mathrm{e}}-1}$ at the positions \mbox{$\mathbf x = (mh,nh)$} with $m,n = 0,\ldots, (\sqrt{N_\mathrm{e}}-1)$.
Let $\Omega_\mathrm{e}^h$, $\mathbf{u}^{\mathrm{sc},h}(\mathbf{f}^{\,h})\in\mathbb{C}^{{N_\mathrm{e}}}$ and $\mathbf b^h\in\mathbb{C}^{{N_\mathrm{e}}}$ denote the discretized $\Omega_\mathrm{e}$ with mesh-size $h$, the discretized and vectorized versions of~$u^\mathrm{sc}(\mathbf x)$ and $f(\mathbf x)u^\mathrm{in}(\mathbf x)$ on~$\Omega_\mathrm{e}^h$, respectively. The discretization of~\eqref{eq:HelmScatterRightIncident} yields the system of linear equations
\begin{equation}
\mathbf A^h_\mathrm{Hel} \mathbf{u}^{\mathrm{sc},h}(\mathbf{f}^{\,h})=\mathbf b^{h},\label{eq:HelmScatterRightIncident:discrete}
\end{equation}
where $\mathbf A^h_\mathrm{Hel} \in \mathbb{C}^{{N_\mathrm{e}} \times {N_\mathrm{e}}}$ is the discretization of \mbox{$\left(-\nabla^2-k_0^2\eta^2(\mathbf x)\right)$} on $\Omega^h_\mathrm{e}$. Specifically, the second-order finite difference is used to discretize the Laplace operator~$\nabla^2$. The ($n\sqrt{N_\mathrm{e}}+m$)th row of \eqref{eq:HelmScatterRightIncident:discrete}
reads
\begin{align}
\frac{-(u^h_{m-1,n}+u^h_{m+1,n}+u^h_{m,n-1}+u^h_{m,n+1})+ 4u^h_{m,n}}{h^2}&\nonumber\\
-(\eta^h_{m,n})^2u^h_{m,n}=b_{m,n}^h,&\label{eq:discretizedHelm:h}
\end{align}%
where $u_{m,n}$ is the $(n\sqrt{N_\mathrm{e}}+m)$th element of $\mathbf{u}^{\mathrm{sc},h}(\mathbf{f}^{\,h})$ and $\mathit{\eta}_{m,n}^h$ denotes the sample $k_0\eta(mh,nh)$.
Moreover, the first-order Sommerfeld radiation condition is used to avoid a nonphysical solution~\cite{elman2001multigrid}.
At the boundary, this translates into
\begin{align}
u_{m,-1}^h &= (1 + \mathrm{j} h\eta_{m,0})u_{m,0}^h,\nonumber\\
u_{m,\sqrt{N_\mathrm{e}}}^h &= (1 + \mathrm{j} h\eta_{m,\sqrt{N_\mathrm{e}}-1})u_{m,\sqrt{N_\mathrm{e}}-1}^h,\nonumber\\
u_{-1,n}^h &= (1 + \mathrm{j} h\eta_{0,n})u_{0,n}^h,\nonumber\\ u_{\sqrt{N_\mathrm{e}},n}^h &= (1 + \mathrm{j} h\eta_{\sqrt{N_\mathrm{e}}-1,n})u_{\sqrt{N_\mathrm{e}}-1,n}^h.
\end{align}
\noindent {We note that we obtain the scattered field on $\Omega$ by directly truncating $\mathbf{u}^{sc,h}$ from $\Omega_\mathrm{e}$ to $\Omega$ after solving \eqref{eq:HelmScatterRightIncident:discrete}.}
\begin{figure
\centering
\begin{tikzpicture}[square/.style={regular polygon,regular polygon sides=4}]
\node[square,draw,dashdotted,inner sep=1.15cm] (A) at (0,0){};
\node[square,draw,solid,inner sep=0.675cm] (B) at (0,0){{$\Omega$}};
\path [{Latex}-{Latex},draw] (A.west) -- node [midway,above] {{$L$}} (B.west);
\node[below] at (A.north) {$\Omega_\mathrm{e}$};
\node[right] at (A.east) {{$\partial\Omega_\mathrm{e}$}};
\end{tikzpicture}
\caption{A 2D domain with an absorbing boundary layer.}
\label{fig:HelmholtzBoundaryCond}
\end{figure}
\subsection{Multigrid Methods and the Helmholtz Equation}\label{sec:MGSolverHelmholtz:sub:MGMethodsandHelmholtz}
Despite the apparent simplicity of MG methods, their direct application to the Helmholtz equation is not straightforward.
The reasons are two-fold: 1) the commonly used local smoothers ({$e.g.,$}{} pointwise smoothers) \cite{elman2001multigrid} in MG methods will diverge if applied to the Helmholtz equation; 2) the standard CGC will amplify certain components of the error instead of reducing them~\cite{ernst2012difficult}.
To understand these behaviors, we deploy the LFA tool to quantitatively estimate the performance of a two-grid cycle for a partial differential equation with constant coefficients \cite{wienands2004practical}.
To apply LFA, we momentarily assume that the object $k^2= k_0^2\eta^2(\mathbf x) > 0$ is constant and that the boundary condition is periodic. Although such assumptions do not hold for the problem of interest here, we still gain relevant insights.
Let $\mathbf e^h_\nu = \mathbf{u}^h-\mathbf v^h_\nu$ denote the error after calling $\nu$ times \Cref{alg:TG}.
Then, the error $\mathbf e^h_{\nu+1}$ is specified by
\begin{eqnarray}
&\mathbf e^h_{\nu+1}&=(\mathbf{S}^h)^{v_2}\mathbf C_h^{2h}(\mathbf{S}^h)^{v_1}\mathbf e^h_\nu\label{eq:itererror}\nonumber\\
\text{with }& \mathbf{S}^h &= \mathbf I_{N_\mathrm{e}} - \omega_\mathrm{S}\mathbf D_{\mathbf A^h_\mathrm{Hel}}^{-1}\mathbf A^h_\mathrm{Hel}\label{eq:SmoothIteration}\\
\text{and }& \mathbf C_h^{2h}&=\mathbf I_{N_\mathrm{e}} - \mathbf P(\mathbf A^{2h})^{-1}\mathbf R\mathbf A^h_\mathrm{Hel},
\label{eq:TGIterationMatrix}
\end{eqnarray}
where $\mathbf{S}^h\in \mathbb C^{{N_\mathrm{e}}\times {N_\mathrm{e}}}$ represents the iteration matrix of a local smoother at mesh-size~$h$, \eqref{eq:SmoothIteration} denotes the Jacobi method with damped factor $\omega_\mathrm{S}$, and
$\mathbf C_h^{2h}\in \mathbb C^{{N_\mathrm{e}}\times {N_\mathrm{e}}}$~corresponds to the CGC.
Denote by $v^h(\bm \theta,\mathbf x)= \mathrm{e}^{\mathrm{j}\theta_1 x_1/h} \mathrm{e}^{\mathrm{j}\theta_2 x_2/h}$ a grid function and
$\mathbf v^h(\bm \theta)\in\mathbb C^{{N_\mathrm{e}}}$ its discrete and vectorized counterpart
sampled on $\Omega_\mathrm{e}^h$.
The parameters $\bm \theta=(\theta_1,\theta_2)\in [-\pi,\pi)^2$ characterize the frequency of the grid function.
Under the assumption of a constant sample and periodic boundary conditions,
$\mathbf A^h_\mathrm{Hel}$ and $\mathbf{S}^h$ encode a circular convolution, which means that their eigenfunctions are the discrete grid functions.
The eigenvalues (modes) of $\mathbf A^h_\mathrm{Hel}$ and $\mathbf{S}^h$ are then $ {a}^h(\bm \theta)=\frac{4-2(\cos\theta_1+\cos\theta_2)-k^2h^2}{h^2}$ and $ s^h(\bm \theta)=\left(1-\omega_\mathrm{S}+\frac{2\omega_\mathrm{S}}{4-k^2h^2}(\cos\theta_1+\cos\theta_2)\right)$, respectively.
In the following, we briefly discuss two main challenges that hinder a direct application of MG methods to the Helmholtz equation and refer the readers to several works which fully present these issues~\cite{elman2001multigrid,ernst2012difficult}.
\paragraph{Divergence of the Local Smoothers}
For $(4-k^2h^2)>0$, we have that
\begin{equation}
\max_{\bm \theta}| s_h(\bm \theta)| = 1-\omega_\mathrm{S}+\frac{4\omega_\mathrm{S}}{4-k^2h^2},\end{equation}
which is always larger than $1$ when $kh\neq 0$. The Jacobi method will therefore be divergent when applied to the Helmholtz equation.
A similar phenomenon is also observed for other point-wise smoothers, such as Gauss-Seidel and its variants.
\paragraph{Amplification of the Error by the CGC}
The purpose of the CGC is to reduce the low-frequency (smooth) error, but it was observed that this step can amplify certain modes instead~\cite{elman2001multigrid}.
Let us assume that the current error on the fine problem after a pre-relaxation step consists in a smooth component~$\mathbf v^h(\bm \theta)$.
Then, the error after CGC reads \cite{yavneh1998coarse}
\begin{align}
\mathbf e^h &=\left(\mathbf I^h-\mathbf P(\mathbf A^{2h}_\mathrm{Hel})^{-1}\mathbf R\mathbf A^h_\mathrm{Hel}\right)\mathbf v^h(\bm \theta)\nonumber\\
&=\mathbf v^h(\bm \theta) - {a}^h(\bm \theta)\mathbf P(\mathbf A^{2h}_\mathrm{Hel})^{-1}\mathbf R\mathbf v^h(\bm \theta)\nonumber\\
&\approx\left(1 - \frac{{a}^h(\bm \theta)}{{a}^{2h}(2\bm \theta)}\right)\mathbf v^h(\bm \theta),
\end{align}
where ${a}^{2h}(2\bm \theta)$ is the eigenvalue of $\mathbf A^{2h}_\mathrm{Hel}$ corresponding to $2\bm \theta$, assuming that~$\mathbf P\mathbf R\mathbf v^h(\bm \theta) = \mathbf v^h(\bm \theta)$ for $\bm \theta\in(-\frac{\pi}{2},\frac{\pi}{2}]^2$.
Evidently, the CGC will effectively reduce the error if the ratio $\frac{{a}^h(\bm \theta)}{{a}^{2h}(2\bm \theta)}$ is close to but less than $1$ and $\mathbf e^h=\bm0$ if $\frac{{a}^h(\bm \theta)}{{a}^{2h}(2\bm \theta)}=1$. However, for the Helmholtz equation, prior works observed that~$\frac{{a}^h(\bm \theta)}{{a}^{2h}(2\bm \theta)}$ can be negative for certain components, especially on coarser grid~\cite{elman2001multigrid,ernst2012difficult}.
In those cases, the CGC amplifies the error since $\left(1 - \frac{{a}^h(\bm \theta)}{{a}^{2h}(2\bm \theta)}\right)>1$.
{Hence, this phenomenon will happen for more components if many levels are used}.
To overcome the divergence of the local smoothers, Brandt \emph{et al.} \cite{brandt1997wave} suggested to use the Kaczmarz method in the relaxation step.
This local smoother is convergent but converges slowly because it works on the normal equation.
Similarly, Elman \emph{et al.}~\cite{elman2001multigrid} used a convergent Krylov-based method as the local smoother, but their method nevertheless needs to store some previous iterates, thus increasing the memory requirement.
To solve the problem of the CGC, Stolk \emph{et al.}~\cite{stolk2014multigrid} proposed an optimized scheme to discretize the Helmholtz equation at the coarser levels.
Their method decreased the number of modes that lead to divergence, which enables the use of more levels.
However, the optimized schemes are the solutions of constrained minimization problems which must be resolved whenever the scattering potential changes.
Recent works showed that MG methods converge more easily if the lefthand side of~\eqref{eq:HelmScatterRightIncident} is $\left(-\nabla^2 - \kappa k_0^2\eta^2(\mathbf x)\right)$ with $\kappa\in\mathbb C$ instead~\cite{erlangga2006novel}.
Let $\mathbf K_\kappa$ denote the discretization of $\left(-\nabla^2 - \kappa k_0^2\eta^2(\mathbf x)\right)$ on $\Omega^h_\mathrm{e}$.
The solution of~\eqref{eq:HelmScatterRightIncident:discrete} is then computed by using $\mathbf K_\kappa$ as a preconditioner.
This technique, called shifted-Laplacian preconditioner, can help Krylov-based methods to converge faster~\cite{erlangga2006novel}.
We note that we did not find benefit in using the shifted-Laplacian preconditioner for the inverse-scattering problems presented in this paper.
\subsection{Proposed Multigrid-Based Solver}
\label{sec:MGSolverHelmholtz:sub:ProposedMGMethod}
In the spirit of~\cite{elman2001multigrid, erlangga2006novel}, we use Bi-CGSTAB with a preconditioner~\mbox{$\mathbf K_\mathrm{MG} \approx \mathbf A^h_\mathrm{Hel}$}
to solve~\eqref{eq:HelmScatterRightIncident:discrete}~(\Cref{alg:SolverHel}).
The efficiency of our method stems from the way we apply~$\mathbf K_\mathrm{MG}^{-1}$: We deploy a standard MG method~(\Cref{alg:MG})~(see Steps~$9$ and $14$ in \Cref{alg:SolverHel}).
For the relaxation, we still use \eqref{eq:dampedJ} but with few iterations~({$i.e.,$}{} $\nu_{1,2} \leq 2$) to mitigate a possible divergence of the local smoother. By doing so, Bi-CGSTAB would correct any deviation of the MG method~\cite{elman2001multigrid,erlangga2006novel}. Furthermore, we alleviate the issue of the CGC previously mentioned by using few levels.
In~\cite{calandra2013improved}, the best performance is achieved with two levels only, which corroborates what we observed in our experiments.
To mitigate the so-called pollution effect, a rule of thumb is to use at least $10$ points per wavelength for the coarsest level but slightly fewer than $10$ points per wavelength were sufficient in most of our experiments \cite{erlangga2006novel}.
In this work, we solve the coarsest level exactly, but one can also use iterative methods \cite{calandra2013improved,treister2019multigrid}.
For the restriction $\mathbf R$, we use the full-weighting operator.
Specifically, the value of $r^{2h}_{m,n}=(\mathbf R \mathbf r^{h})_{m,n}$ is given by
\begin{align}
r^{2h}_{m,n} = &\frac{1}{16}\left(4r^h_{2m,2n} + 2\left(r^h_{2m-1,2n}+r^h_{2m+1,2n}\right.\right.\nonumber\\
&+ \left.r^h_{2m,2n-1}+r^h_{2m,2n+1}\right)
+ \left(r^h_{2m-1,2n-1}\right.\nonumber\\
&+r^h_{2m-1,2n+1} +\left.\left. r^h_{2m+1,2n-1}+r^h_{2m+1,2n+1}\right)\right),
\end{align}
where $m,n=0,1,\ldots,\frac{\sqrt{N_\mathrm{e}}-1}{2}$ denote the indices on the coarse problem. Note that the value of the points at the boundary is set to $0$. The prolongation $\mathbf P$ is the adjoint of $\mathbf R$ such that $e^{h}_{m,n} = (\mathbf P\mathbf e^{2h})_{m,n}$ is given by
\begin{align}
&e^h_{m,n} =\nonumber\\
&\left\{
\begin{array}{ll}
e^{2h}_{m/2,n/2},& m,n ~\text{even}\\
\frac{1}{2}\left(e^{2h}_{(m-1)/2,n/2}+e^{2h}_{(m+1)/2,n/2}\right),& m~\text{odd},n~\text{even}\\
\frac{1}{2}\left(e^{2h}_{m/2,(n-1)/2}+e^{2h}_{m/2,(n+1)/2}\right),& m~\text{even},n~\text{odd}\\
\frac{1}{4}\left(e^{2h}_{(m-1)/2,(n-1)/2}+e^{2h}_{(m-1)/2,(n+1)/2}\right.\\
+\left.e^{2h}_{(m+1)/2,(n-1)/2}+e^{2h}_{(m+1)/2,(n+1)/2}\right),& m,n~\text{odd},
\end{array}\right.
\end{align}
where $m,n=0,1,\ldots,\sqrt{N_\mathrm{e}}-1$ denote the indices on the fine problem.
For the coarser problems, we directly re-discretize the Laplacian operator with double mesh-size and use the full-weighted transfer to restrict $k_0^2\eta^2(\mathbf x)$. The value of the points near the boundary of $k_0^2\eta^2(\mathbf x)$ is set to $k_0^2\eta_\mathrm{b}^2$.
\begin{algorithm}[t
\caption{Bi-CGSTAB with \Cref{alg:MG} as a preconditioner for solving \eqref{eq:HelmScatterRightIncident:discrete}}
\label{alg:SolverHel}
\begin{algorithmic}[1]
\REQUIRE {Set $\mathbf K \leftarrow -\nabla^2-k_0^2\eta^2(\mathbf x)$ and $CycleType,~h,~N_\mathrm{level}$ for \Cref{alg:MG} and choose tolerance $\varepsilon$.}
\STATE {$\mathbf r_0 = \mathbf b^h-\mathbf A^h_\mathrm{Hel} \mathbf{u}_0^{\mathrm{sc},h}$.}
\STATE {$\hat {\mathbf r}_0= \mathbf r_0$.}
\STATE {$\rho_0= 1,~\alpha=1,~\sigma_0= 1$.}
\STATE {$\mathbf v_0= \bm0,~\mathbf p_0= \bolds 0$.}
\STATE {$\beta=0$, $\mathbf y=\mathbf{0}$, $\mathbf h=\mathbf{0}$,
$\mathbf s=\mathbf{0}$, $\mathbf z=\mathbf{0}$, $\mathbf t=\mathbf{0}$.}
\FOR {$Iter=1,2,\cdots$}
\STATE {$\rho_{Iter}= <\hat{\mathbf r}_0,\mathbf r_{Iter-1}>$}
\STATE {$\beta\leftarrow \left(\rho_{Iter}/\rho_{Iter-1}\right)\left(\alpha /\sigma_{Iter-1}\right)$.}
\STATE {$\mathbf p_{Iter}=\mathbf r_{Iter-1}+\beta(\mathbf p_{Iter-1}-\sigma_{Iter-1}\mathbf v_{Iter-1})$.}
\STATE
{\mybox{$\mathbf y\leftarrow MGCycle(\mathbf K,\mathbf p_{Iter},\bolds 0,CycleType,h,N_\mathrm{level}).$}}
\STATE {$\mathbf v_{Iter}= \mathbf A^h_\mathrm{Hel}\mathbf y$.}
\STATE {$\alpha\leftarrow \rho_{Iter}/\left<\hat{\mathbf r}_0,\mathbf v_{Iter}\right>$.}
\STATE {$\mathbf h \leftarrow \mathbf{u}_{Iter-1}^{\mathrm{sc},h}+\alpha \mathbf y$.}
\STATE {$\mathbf s\leftarrow \mathbf r_{Iter-1}-\alpha \mathbf v_{Iter}$.}
\STATE
{\mybox{$\mathbf z\leftarrow MGCycle(\mathbf K,\mathbf s,\bolds 0,CycleType,h,N_\mathrm{level}).$}\label{alg:SolverHel:PredII}}
\STATE {$\mathbf t\leftarrow \mathbf A^h_\mathrm{Hel}\mathbf z$.}
\STATE {$\sigma_{Iter}= \left<\mathbf t,\mathbf s\right>/\left<\mathbf t,\mathbf t\right>$.}
\STATE {$\mathbf{u}^{\mathrm{sc},h}_{Iter}= \mathbf h+\sigma_{Iter}\mathbf z$.}
\STATE {$\mathbf r_{Iter}= \mathbf s-\sigma_{Iter}\mathbf t$.}
\IF {$\|\mathbf r_{Iter}\|_2\leq \varepsilon$.}
\STATE Return $\mathbf{u}^{\mathrm{sc},h}_{Iter}$.
\ENDIF
\ENDFOR
\end{algorithmic}
\end{algorithm}
\section{Problem Formulation and Optimization}
\label{sec:RecProblemFormulationandOptimization}
We are now equipped with the Helmholtz-based forward model
\begin{align}
\mathbf H_\mathrm{MGH}:\mathbf{f} &\mapsto \tilde{\mathbf G}\mathop{\bf diag}(\mathbf{f})(\mathbf{u}^\mathrm{sc}_{\mathrm{MGH}}(\mathbf{f}) + \mathbf{u}^\mathrm{in}), \label{eq:DiscreteForwardHelm}
\end{align}
where $\mathbf{u}^\mathrm{sc}_{\mathrm{MGH}}(\mathbf{f})$ is computed with \Cref{alg:SolverHel}.
Then, we formulate inverse-scattering as the solution~$\mathbf{f}^\ast$ to a composite problem with nonnegativity constraint
\begin{equation}
\mathbf{f}^{\,*}=\arg\min_{\mathbf{f}\in \mathbb{R}^N_{\geq 0}} \sum_{q=1}^Q\mathfrak D_q(\mathbf H_\mathrm{MGH}^q(\mathbf{f}),\mathbf y^\mathrm{sc}_q) + \tau \mathfrak R(\mathbf{f}),\label{eq:MAPInverse}
\end{equation}
where the data-fidelity term $\mathfrak D_q:\mathbb C^M\times \mathbb C^M \rightarrow \mathbb R$ enforces the consistency with the measurements~$\{\mathbf y^\mathrm{sc}_q\in\mathbb{C}^M\}_{q=1}^Q$,
$\mathfrak R:\mathbb R^N\rightarrow \mathbb R$ regularizes the solution, and $\tau>0$ is a tradeoff parameter to balance these two terms. Note that the forward model~$\mathbf H_\mathrm{MGH}^q(\mathbf{f})$ uses the incident field $\mathbf{u}^\mathrm{in}_q$.
In this work, we set the data-fidelity term as the quadratic error, for $q=1,\ldots,Q$,
\begin{equation}
\mathfrak D_q(\mathbf H_\mathrm{MGH}^q(\mathbf{f}),\mathbf y^\mathrm{sc}_q) =\frac{1}{2}\|\mathbf H_\mathrm{MGH}^q(\mathbf{f})-\mathbf y_q^\mathrm{sc}\|_2^2.\label{eq:DataFidelityExplicit}
\end{equation}
For the regularization term, we choose the isotropic total variation (TV)~\cite{rudin1992nonlinear} but one can adopt other regularizations such as the Hessian Schatten-norm \cite{lefkimmiatis2013hessian}, plug-and-play prior \cite{kamilov2017plug,hong2020solving}, or tailored regularization \cite{pham2020adaptive}.
The accelerated forward-backward splitting (FBS)~\cite{beck2009fast,nesterov2013gradient} is adopted here to solve \eqref{eq:MAPInverse}. The detailed description of FBS is summarized in \Cref{alg:FISTA}, of which we provide now some details.
\begin{itemize}
\item If $Q$ is large enough, then one may use the stochastic version as shown at Line \ref{alg:FISTA:stochasticSelect} so that only a (random) subset of the measurements is chosen to estimate the gradient of the data-fidelity term at each iteration to reduce the computational burden \cite{soubies2017efficient,pham2020three}.
\item At Line~\ref{alg:FISTA:proximal}, $\text{prox}_{\gamma_\nu\tau}(\mathbf w_\nu)$ denotes the proximal operator evaluated as
\begin{align}
\text{prox}_{\gamma_\nu\tau}(\mathbf w_\nu) = \arg\min_{\mathbf w\in\mathbb{R}^N_{\geq 0}}\Bigg(\frac{1}{2}&\|\mathbf w-\mathbf w_\nu\|_2^2 \nonumber\\
+& \left(\gamma_\nu\tau\right)\mathfrak{R}(\mathbf w)\Bigg).\label{eq:proximalOpt}
\end{align}
Since $\mathfrak{R}(\cdot)$ is TV in our case and $\mathbf w$ is nonnegative, there is no closed-form solution for \eqref{eq:proximalOpt}.
We therefore consider \eqref{eq:proximalOpt} with the fast gradient projection on its dual formulation to address the non-smoothness of TV \cite{beck2009fastTV}.
\item We optimize a non-convex problem because the forward model is nonlinear.
To the best of our knowledge, there exists no theoretical proof of the global convergence of the accelerated FBS for non-convex problems.
However, we observed that \Cref{alg:FISTA} behaves well for our problem.
The stepsize is empirically set to a fixed value.
\end{itemize}
\begin{algorithm}[t
\caption{Accelerated FBS to solve \eqref{eq:MAPInverse} \cite{beck2009fast,nesterov2013gradient}}
\label{alg:FISTA}
\begin{algorithmic}[1]
\REQUIRE ~\\
$\mathbf{f}^{\,0}\in\mathbb{R}^N_{\geq 0},$ stepsize $\gamma_\nu>0$, and $\nu$ is the iteration index.
\lastcon $\mathbf{f}^{\,*}$.
\STATE $\mathbf v^{1} = \mathbf{f}^{\,0}.$
\STATE $\alpha_1 = 1.$
\STATE $\nu \leftarrow 1.$
\WHILE{not converged}
\STATE {Select a subset $\tilde{Q}\subseteq [1\ldots Q].$\label{alg:FISTA:stochasticSelect}}
\STATE {$\mathbf d^{\nu}= \sum_{q\in \tilde{Q}} \nabla_{\mathbf{f}}\mathfrak D_q(\bar{\mathbf{f}}^{\nu}).$ \label{alg:FISTA:gradient}}
\STATE {$\mathbf{f}^{\,\nu}= \text{prox}_{\gamma_\nu\tau}(\bar{\mathbf{f}}^{\,\nu} - \gamma_\nu\mathbf d^{\nu}).$\label{alg:FISTA:proximal}}
\STATE $\alpha_{\nu+1}= \frac{1+\sqrt{1+4\alpha_\nu^2}}{2}.$
\STATE $\bar{\mathbf{f}}^{\,\nu}= \mathbf{f}^{\,\nu}+\frac{\alpha_\nu-1}{\alpha_{\nu+1}}\left(\mathbf{f}^{\,\nu}-\mathbf{f}^{\,\nu-1}\right).$
\STATE $\nu\leftarrow \nu+1.$
\ENDWHILE
\STATE $\mathbf{f}^{\,*}= \mathbf{f}^{\,\nu}.$
\end{algorithmic}
\end{algorithm}
The evaluation of the gradient at Line \ref{alg:FISTA:gradient} requires the Jacobian matrix of $\mathbf H_\mathrm{MGH}^q$ which is specified in \Cref{prop:HelmholtzJacobian}. With this formulation, the evaluation of the gradient of the data-fidelity term for the Helmholtz model mainly costs one inversion of the matrix~${\mathbf A^h_\mathrm{Hel}}$, which is again efficiently performed with \Cref{alg:SolverHel}.
\begin{prop}\label{prop:HelmholtzJacobian}
The Jacobian matrix of~$\mathbf H_\mathrm{MGH}^q$
\begin{equation}
\mathbf J_{\mathbf H_\mathrm{MGH}^q}(\mathbf{f})=\left(\mathbf I+\mathop{\bf diag}(\mathbf{f})({\mathbf A^h_\mathrm{Hel}})^{-1}\right)\mathop{\bf diag}\left(\mathbf{u}_q(\mathbf{f})\right).
\end{equation}
\end{prop}
\begin{proof}
Similar to the derivation of the Jacobi matrix of the LiS model in \cite{soubies2017efficient}, the G\^{a}teaux derivative in the direction $\mathbf v\in\mathbb{R}^{N_\mathrm{e}}$ is
\begin{equation}
\begin{array}{rcl}
\mathrm{d}\mathbf H_\mathrm{MGH}^q(\mathbf{f};\mathbf v)&=&\lim\limits_{\epsilon\rightarrow 0}\frac{\mathop{\bf diag}(\mathbf{f}+\epsilon\mathbf v)\mathbf{u}_q(\mathbf{f}+\epsilon\mathbf v)-\mathop{\bf diag}(\mathbf{f})\mathbf{u}_q(\mathbf{f})}{\epsilon}\\
&=&\mathop{\bf diag}(\mathbf{u}_q(\mathbf{f}))\mathbf v \\
&\quad&\quad+\lim\limits_{\epsilon\rightarrow 0}\mathop{\bf diag}(\mathbf{f})\frac{\mathbf{u}_q(\mathbf{f}+\epsilon\mathbf v)-\mathbf{u}_q(\mathbf{f})}{\epsilon}.
\end{array
\end{equation}
Then, for $\mathbf{f}\rightarrow \mathbf{f}+\epsilon\mathbf v$, $k_0^2\eta^2(\mathbf x)$ in \eqref{eq:HelmScatterRightIncident} becomes $k_0^2\eta^2(\mathbf x)+\epsilon\mathop{\bf diag}(\mathbf v)$, which yields
\begin{align}
\mathbf{u}_q(\mathbf{f})&=\mathbf{u}^\mathrm{in}_q+({\mathbf A^h_\mathrm{Hel}})^{-1}\mathop{\bf diag}(\mathbf{f})\mathbf{u}_q^\mathrm{in},\nonumber\\
\mathbf{u}_q(\mathbf{f}+\epsilon\mathbf v)&=\mathbf{u}_q^\mathrm{in}+\left(\mathbf A^h_\mathrm{Hel}-\epsilon\mathop{\bf diag}(\mathbf v)\right)^{-1}
\mathop{\bf diag}(\mathbf{f}+\epsilon\mathbf v)\mathbf{u}_q^\mathrm{in}.
\end{align}
Then, we have that
\begin{equation}
\label{eq:proofdiff}
\mathbf{u}_q(\mathbf{f}+\epsilon\mathbf v)-\mathbf{u}_q(\mathbf{f})=\left(\mathbf A^h_\mathrm{Hel}-\epsilon\mathop{\bf diag}(\mathbf v)\right)^{-1}\mathop{\bf diag}(\epsilon\mathbf v)\mathbf{u}_q(\mathbf{f}).
\end{equation}
Substituting \eqref{eq:proofdiff} into $\mathrm{d}\mathbf H^q_\mathrm{MGH}(\mathbf{f};\mathbf v)$ and taking the limit, we get the desired result
\begin{equation}
\begin{array}{rl}
\mathrm{d}\mathbf H^q_\mathrm{MGH}(\mathbf{f};\mathbf v)=&\mathop{\bf diag}(\mathbf{u}_q(\mathbf{f}))\mathbf v+\mathop{\bf diag}(\mathbf{f})({\mathbf A^h_\mathrm{Hel}})^{-1}\\
&\times\mathop{\bf diag}(\mathbf{u}_q(\mathbf{f}))\mathbf v\\
= & \left(\mathbf I+\mathop{\bf diag}(\mathbf{f})({\mathbf A^h_\mathrm{Hel}})^{-1}\right)\mathop{\bf diag}(\mathbf{u}_q(\mathbf{f})) \mathbf v
\end{array}
\end{equation}
\end{proof}
\section{Numerical Experiments}\label{sec:Exps}
In the first set of experiments, we compare the total fields obtained by the LiS and Helmholtz models.
We choose samples for which analytical solutions exist.
In the second set of experiments, we compare the performance of the LiS and Helmholtz models on an inverse-scattering problem with simulated and real data. Note that Bi-CGSTAB is used to solve~\eqref{eq:invertLSm} (MATLAB built-in function \emph{bicgstab}).
The whole implementation is based on GlobalBioIm~\cite{soubies2019pocket} and was performed on a laptop with Intel Core i$9$ $2.3$GHz.
The algorithm for \eqref{eq:invertLSm} and \eqref{eq:HelmScatterRightIncident:discrete} is said to have converged when the relative error reaches~$10^{-6}$.
Despite that one can take advantage of parallelization~\cite[Chapter $6$]{trottenberg2000multigrid} or GPU acceleration~\cite{knibbe2011gpu} for MG methods,
we have implemented our MG method in MATLAB without parallelization or GPU acceleration.
In return, when several threads are available,
the LiS method takes advantage of the parallelized implementation of the FFT in MATLAB.
Thus, to provide a fair comparison, we run both MG and LiS methods with only one CPU thread.
In our experiments, we run one V-cycle to apply~$\mathbf K_{MG}^{-1}$ and perform one pre- and post-relaxation ($\nu_1=\nu_2=1$). We choose the damped Jacobi relaxation with $\omega_\mathrm{S}=0.8$ as the local smoother. Moreover, additional $\frac{\sqrt{N}}{8}$ points are added at each side as the ABL ({$i.e.,$}{} ${N_\mathrm{e}}=\frac{25N}{16}$) with $\beta=0.15$ for the first set of experiments.
For the inverse-scattering problems, we use $\frac{\sqrt{N}}{16}$ points as the ABL and set $\beta=0$.
\subsection{Robustness and Efficiency}
\label{sec:sub:RobuEffMG}
In this part, we consider a disk with RI $\eta_\mathrm{disk}$ immersed in air~($\eta_\mathrm{b}=1$, \Cref{fig:beadsetting}).
For such objects, there exists an analytic expression of the total field~\cite{devaney2012mathematical},
which allows us to study the accuracy of the total field obtained by the LiS and Helmholtz methods.
\begin{figure
\centering
\begin{tikzpicture}
\newcommand{2}{2}
\newcommand{figs/Exp1_1.00_2.20_rad_1.25}{figs/Exp1_1.00_2.20_rad_1.25}
\newcommand{0.25*\textwidth}{0.25*\textwidth}
\pgfmathsetmacro{\winsz}{5*256/406}
\begin{groupplot}[
group style = {group size = 2 by 2,
vertical sep=2, horizontal sep=2},
xmin = 0,xmax = \winsz, ymin = 0, ymax = \winsz,
enlargelimits=false,
axis equal image,
scale only axis,
width = {0.25*\textwidth},
hide axis,
title style = {anchor=base}
]
\nextgroupplot[
xmin=0, xmax=\winsz, ymin=0, ymax=\winsz,
axis equal image,
hide axis
]
\addplot graphics[xmin=0,xmax=\winsz,ymin=0,ymax=\winsz,includegraphics={trim=0.72cm 0.53cm 1.43cm 0.11cm, clip}] {{figs/Exp1_1.00_2.20_rad_1.25/nBeads.eps}};
\node[anchor=north west,white,text width=6cm] at (axis cs:0.1,1.01*\winsz) {\textbf{Disk}};
\node[white,anchor=north east] at (axis cs:\winsz,1.01*\winsz) {${\eta_\mathrm{b}=1}$};
\node at (axis cs:\winsz/2,\winsz/2) {${\eta_\mathrm{disk}=2.2}$};
\nextgroupplot
\addplot graphics[xmin=0,xmax=\winsz,ymin=0,ymax=\winsz,includegraphics={trim=0.72cm 0.53cm 1.43cm 0.11cm, clip}] {{figs/Exp1_1.00_2.20_rad_1.25/MieBead.eps}};
\node[anchor=north west,white,text width=6cm] at (axis cs:0.1,1.01*\winsz) {\textbf{Ground Truth}};
\fill [white] (axis cs:0.1,0.2) rectangle (axis cs:1.1,0.25);
\draw [white] (axis cs:0.6,0.25) node[anchor=south] {$\lambda$};
\draw [dashed,white,thick] (axis cs:\winsz/2,\winsz/2) circle[radius=1.23152709359606];
\nextgroupplot[enlargelimits=false]
\addplot graphics[xmin=0,xmax=\winsz,ymin=0,ymax=\winsz,includegraphics={trim=0.72cm 0.53cm 1.43cm 0.11cm, clip}] {{figs/Exp1_1.00_2.20_rad_1.25/LSmBead.eps}};
\node[anchor=north west,white,text width=6cm] at (axis cs:0.1,1.01*\winsz) {\textbf{LiS}};
\draw [dashed,white,thick] (axis cs:\winsz/2,\winsz/2) circle[radius=1.23152709359606];
\nextgroupplot[enlargelimits=false]
\addplot graphics[xmin=0,xmax=\winsz,ymin=0,ymax=\winsz,includegraphics={trim=0.72cm 0.53cm 1.43cm 0.11cm, clip}] {{figs/Exp1_1.00_2.20_rad_1.25/HelmBead.eps}};
\node[anchor=north west,white,text width=6cm] at (axis cs:0.1,1.01*\winsz) {\textbf{MGH}};
\draw [dashed,white,thick] (axis cs:\winsz/2,\winsz/2) circle[radius=1.23152709359606];
\end{groupplot}
\end{tikzpicture}
\caption{Total fields of a disk with radius $= 1.25\lambda$ and a RI of $\eta_\mathrm{disk}=2.2$.
The disk is immersed in air~($\eta_\mathrm{b}=1$) and illuminated by a plane wave of wavelength~$\lambda=10$cm.
The displayed fields are in a square area of length~$= 3.2\lambda$
and are obtained through an analytical solution~\cite{devaney2012mathematical}, the LiS, and the Helmholtz methods with $N=256^2,~h=0.125$cm. The corresponding relative error of the LiS and Helmholtz models are $8.1\times 10^{-3}$ and $7.5\times10^{-3}$, respectively.}
\label{fig:beadsetting}
\end{figure}
The disk is illuminated from the top by a plane wave of wavelength~$\lambda = 10$ cm. Our region of interest is a square area of length~$3.2\lambda$~(\Cref{fig:beadsetting}). A total of $N=256^2$ samples are used to discretize the domain~({$i.e.,$}{} $h=0.125$ cm).
Denote by
$$
\epsilon = \frac{\|\mathbf{u}-\mathbf{u}_\mathrm{GT}\|^2}{\|\mathbf{u}_\mathrm{GT}\|^2}
$$
the relative error where $\mathbf{u}$ is the estimated total field and $\mathbf{u}_\mathrm{GT}$ is the ground truth. From \Cref{fig:beadsetting}, one observes that both models yield an accurate total field with low relative error ($8.1\times 10^{-3}$ and $7.5\times 10^{-3}$ for the LiS and Helmholtz models, respectively).
To study the efficiency of the Helmholtz model with the proposed MG method,
we perform a series of experiments similar to the previous one, but with diverse sets of contrasts ($\max(|\mathbf{f}|)/k_0^2\eta_\mathrm{b}^2$) and radii.
We adopt the same square domain, wavelength, RI of the background, and source position as were shown in~\Cref{fig:beadsetting}. Three levels are used for the MG method.
The number of iterations and the computational time to converge is provided in \Cref{fig:showRoubEffMie256}.
We see that the LiS model takes more time to converge when the contrast or the radius of the sample increases, which corresponds to the most challenging cases.
In comparison, the Helmholtz model constantly performs well,
which suggests that the proposed method is robust.
\begin{figure
\centering
\newcommand{2}{2}
\newcommand{1.1e3}{680}
\newcommand{1}{0.1}
\newcommand{360}{25}
\begin{tikzpicture}
\pgfplotsset{every axis legend/.append style={legend pos=north west,
anchor=north west,font=\scriptsize, legend cell align={left}}}
\pgfplotsset{grid style={dotted, gray}}
\begin{groupplot}[enlargelimits=false,group style={group size=2 by 2,horizontal sep = 1em,vertical sep=1.5em},scale only axis,
width=0.2*\textwidth,
every axis/.append style={ymode=log,font=\scriptsize,title style={anchor=base,yshift=-1mm}, x label style={yshift = 0.5em}, y label style={yshift = -.5em},grid = both}]
\nextgroupplot[xlabel = {},ylabel=Iterations,title={Radius $=1.25\lambda$},ymin=2,ymax=1.1e3]
\addplot[dashed,darkblue,line width=1pt] table [search path={figs/Exp1_Contrast},x=ContrastLevel, y=LiSNumIteration, col sep=comma] {ResultsContrast256.csv};
\addplot[solid,red,line width=1pt] table [search path={figs/Exp1_Contrast},x=ContrastLevel, y=HelmholtzIteration, col sep=comma] {ResultsContrast256.csv};
\legend{LiS, MGH}
\nextgroupplot[xlabel = {},ylabel={},title={Contrast $=2$},ymin=2,ymax=1.1e3,yticklabels={,,}]
\addplot[dashed,darkblue,line width=1pt] table [search path={figs/Exp1_Radius},x=RadiusLevel, y=LiSNumIteration, col sep=comma] {ResultsRadius256.csv};
\addplot[solid,red,line width=1pt] table [search path={figs/Exp1_Radius},x=RadiusLevel, y=HelmholtzIteration, col sep=comma] {ResultsRadius256.csv};
\legend{LiS, MGH}
\nextgroupplot[xlabel = Contrast~$\max(|\mathbf{f}|)/k_0^2\eta_\mathrm{b}^2$, ylabel=CPU Time (seconds),title={},legend style={font=\scriptsize},ymin=1,ymax=360]
\addplot[dashed,darkblue,line width=1pt] table [search path={figs/Exp1_Contrast},x=ContrastLevel, y=LiSCPUTime1-thread, col sep=comma] {ResultsContrast256.csv};
\addplot[solid,red,line width=1pt] table [search path={figs/Exp1_Contrast},x=ContrastLevel, y=HelmholtzCPUTime1-thread, col sep=comma] {ResultsContrast256.csv};
\legend{LiS,MGH
\nextgroupplot[xlabel = Radius~($\lambda$), ylabel={},title={},legend style={font=\scriptsize},ymin=1,ymax=360,yticklabels={,,}]
\addplot[dashed,darkblue,line width=1pt] table [search path={figs/Exp1_Radius},x=RadiusLevel, y=LiSCPUTime1-thread, col sep=comma] {ResultsRadius256.csv};
\addplot[solid,red,line width=1pt] table [search path={figs/Exp1_Radius},x=RadiusLevel, y=HelmholtzCPUTime1-thread, col sep=comma] {ResultsRadius256.csv};
\legend{LiS,MGH
\end{groupplot}
\end{tikzpicture}
\caption{Number of iterations (top line) and CPU time (bottom line) \emph{versus} contrast (left column) and radius (right column) for the Lippmann-Schwinger and Helmholtz models.
The domain is discretized with $N=256^2$ points and the mesh-size~$h=0.125$cm.}
\label{fig:showRoubEffMie256}
\end{figure}
Next, we discretize the same domain with $N=1024^2$, which results in a large-scale problem.
From \Cref{fig:showRoubEffMie1024}, we see that Bi-CGSTAB for the LiS method requires more iterations to converge, which is similar to the phenomenon observed in \Cref{fig:showRoubEffMie256}.
Regarding the computational time, the LiS method can be $20$ times slower than for the case $N=256^2$ ({$e.g.,$}{} contrast or radius larger than $3$ or $1.2\lambda$, respectively).
On the contrary, the increase of the computational time of the Helmholtz method is moderate for $N=1024^2$ because we used more levels for the MG method.
Indeed, this feature improves the convergence speed at the price of a slightly increased computational cost, as discussed in \Cref{sec:MGSolverHelmholtz:sub:MGMethods}.
\begin{figure
\centering
\newcommand{2}{2}
\newcommand{1.1e3}{1.1e3}
\newcommand{1}{1}
\newcommand{360}{360}
\begin{tikzpicture}
\pgfplotsset{every axis legend/.append style={legend pos=north west,
anchor=north west,font=\scriptsize, legend cell align={left}}}
\pgfplotsset{grid style={dotted, gray}}
\begin{groupplot}[enlargelimits=false,group style={group size=2 by 2,horizontal sep = 1em,vertical sep=1.5em},
width=0.2*\textwidth,
scale only axis,
every axis/.append style={ymode=log,font=\scriptsize,title style={anchor=base,yshift=-1mm}, x label style={yshift = 0.5em}, y label style={yshift = -.5em}, grid = both }]
\nextgroupplot[xlabel = {},ylabel=Iterations,title={Radius $=1.25\lambda$},ymin=2,ymax=1.1e3]
\addplot[dashed,darkblue,line width=1pt] table [search path={figs/Exp1_Contrast},x=ContrastLevel, y=LiSNumIteration, col sep=comma] {ResultsContrast1024.csv};
\addplot[solid,red,line width=1pt] table [search path={figs/Exp1_Contrast},x=ContrastLevel, y=HelmholtzIteration, col sep=comma] {ResultsContrast1024.csv};
\legend{LiS, MGH}
\nextgroupplot[xlabel = {},ylabel={},title={Contrast $=2$},ymin=2,ymax=1.1e3,yticklabels={,,}]
\addplot[dashed,darkblue,line width=1pt] table [search path={figs/Exp1_Radius},x=RadiusLevel, y=LiSNumIteration, col sep=comma] {ResultsRadius1024.csv};
\addplot[solid,red,line width=1pt] table [search path={figs/Exp1_Radius},x=RadiusLevel, y=HelmholtzIteration, col sep=comma] {ResultsRadius1024.csv};
\legend{LiS, MGH}
\nextgroupplot[xlabel = Contrast $\max(|\mathbf{f}|)/k_0^2\eta_\mathrm{b}^2$, ylabel=CPU Time (seconds),title={},legend style={font=\scriptsize},ymin=1,ymax=360]
\addplot[dashed,darkblue,line width=1pt] table [search path={figs/Exp1_Contrast},x=ContrastLevel, y=LiSCPUTime1-thread, col sep=comma] {ResultsContrast1024.csv};
\addplot[solid,red,line width=1pt] table [search path={figs/Exp1_Contrast},x=ContrastLevel, y=HelmholtzCPUTime1-thread, col sep=comma] {ResultsContrast1024.csv};
\legend{LiS,MGH
\nextgroupplot[xlabel = Radius~($\lambda$), ylabel={},title={},legend style={font=\scriptsize},ymin=1,ymax=360,yticklabels={,,}]
\addplot[dashed,darkblue,line width=1pt] table [search path={figs/Exp1_Radius},x=RadiusLevel, y=LiSCPUTime1-thread, col sep=comma] {ResultsRadius1024.csv};
\addplot[solid,red,line width=1pt] table [search path={figs/Exp1_Radius},x=RadiusLevel, y=HelmholtzCPUTime1-thread, col sep=comma] {ResultsRadius1024.csv};
\legend{LiS,MGH
\end{groupplot}
\end{tikzpicture}
\caption{Number of iterations (top line) and CPU time (bottom line) \emph{versus} contrast (left column) and radius (right column) for the Lippmann-Schwinger and Helmholtz models.
The domain is discretized with $N=1024^2$ points and the mesh-size~$h=0.0312$cm.}
\label{fig:showRoubEffMie1024}
\end{figure}
\subsection{Inverse Scattering with Simulated Data}
\label{sec:Exps:sub:SimulatedData}
In this section, we solve an inverse-scattering problem with simulated data.
We generated a synthetic image (\Cref{fig:SimulatedDataSample}) with contrast $0.355$ and size $4.5\lambda$, immersed in air ($\eta_\mathrm{b}=1$).
We illuminate the sample with plane waves of wavelength $\lambda=3$cm.
Simulations were conducted on a fine grid ($N=1024^2$) with square pixel of length~$4.4\times10^{-3}\lambda$ using the LiS and Helmholtz models.
We simulated $35$ illuminations that were uniformly distributed around the object and placed $360$ detectors around the object at a distance of $25$cm from the center, but recorded only the $120$ detectors that were the farthest from the illumination source. In total, we obtained $35\times 120$ measurements.
\begin{figure
\centering
\includegraphics[scale=0.5]{figs/Exp2Simulated_1.00_1.16_rad_3.00/GroundTruth.pdf}
\caption{RI of the sample in the simulated experiment. The contrast is $35.5\%$.}
\label{fig:SimulatedDataSample}
\end{figure}
For the reconstruction, we considered two different grids: $N=256^2$ with square pixel of length~$1.76\times 10^{-2}\lambda$ and $N=512^2$ with square pixel of length~$8.8\times 10^{-3}\lambda$.
For the reconstructed algorithm, $250$~iterations were performed. The stepsize $\gamma$ and regularization parameter $\tau$ are summarized in \Cref{tab:simulatedParameters}. Moreover, only six measurements were randomly selected to evaluate the gradient at each iteration.
We define the signal-to-noise ratio (SNR) as
\begin{equation}
\mathrm{SNR}(\boldsymbol{\eta}^*,\boldsymbol{\eta}_\mathrm{true}) = 20\log_{10} \frac{\|\boldsymbol{\eta}_\mathrm{true}\|}{\|\boldsymbol{\eta}_\mathrm{true}-\boldsymbol{\eta}^*\|}\mathrm{dB},
\end{equation}
where $\boldsymbol{\eta}^*$ is the reconstructed RI. To compare the reconstruction on different discretizations, we computed the SNR on the finest grid ($N=1024^2$) by upsampling the reconstructed sample.
\begin{table
\caption{Stepsizes and regularization parameter on the simulated data for $N=256^2$ and $512^2$.}
\begin{center}
\begin{tabular}{c|c c|c c}
\hline
\hline
\multirow{2}{*}{$N$}& \multicolumn{2}{c|}{LiS}&\multicolumn{2}{c}{MGH}\\
&$\gamma$&$\tau$&$\gamma$&$\tau$\\
\hline
$256^2$&$8.5\times 10^{-4}$&$3.5\times 10^{-3}$&$9\times 10^{-4}$&$4.5\times 10^{-3}$\\
$512^2$&$4.2\times 10^{-4}$&$7.3\times 10^{-3}$&$3.2\times 10^{-4}$&$9.5\times 10^{-3}$\\
\hline
\hline
\end{tabular}
\end{center}
\label{tab:simulatedParameters}
\end{table}
We present in \Cref{fig:SimulatedDataRecoSNRCPUTime} the SNR and CPU time
for both LiS and Helmholtz models with different grids.
The fine discretization ($N=512^2$) yields an SNR higher than the coarser grid ($N=256^2$) does, which shows the influence of the discretization in the reconstruction.
Moreover, our visual assessment in~\Cref{fig:SimulatedDataReco} corroborates the quantitative comparison.
For the LiS method, Bi-CGSTAB needs only about twenty iterations to converge because the contrast is mildly hard.
We still observe that the Helmholtz method needs less CPU time than the LiS method for $N=256^2$.
For $N=512^2$, we see that the Helmholtz method is faster than the LiS method, which illustrates well the advantage of our method for large $N$.
\begin{figure
\centering
\begin{tikzpicture}[spy using outlines={circle,lens={scale=2}, size=1.5cm, connect spies}]
\pgfplotsset{every axis legend/.append style={legend pos=south east, anchor=south east
legend cell align={left}}}
\pgfplotsset{grid style={dotted, gray}}
\begin{groupplot}[enlargelimits=false,group style={group name=mygroup,group size=1 by 1},
width=0.4*\textwidth,
height=0.15*\textwidth,
every axis/.append style=
title style={anchor=base,yshift=-1mm}, x label style={yshift = 0.5em}, y label style={yshift = .0em}, grid = both },scale only axis,ymax=38]
\nextgroupplot[xlabel = {Iterations},ylabel={SNR (dB)},title={}
\addplot[dashed,very thick,darkblue,line width=1pt] table [search path={figs/Exp2Simulated_1.00_1.16_rad_3.00},x={Iterations}, y=LiS_SNR256GridsBicubic, col sep=comma] {ResultsSimulatedSNR.csv};
\addplot[dashdotted,very thick,darkblue,line width=1pt] table [search path={figs/Exp2Simulated_1.00_1.16_rad_3.00},x={Iterations}, y=LiS_SNR512GridsBicubic, col sep=comma] {ResultsSimulatedSNR.csv};
\addplot[dotted,very thick,red,line width=1pt] table [search path={figs/Exp2Simulated_1.00_1.16_rad_3.00},x={Iterations}, y=Helmholtz_SNR256GridsBicubic, col sep=comma] {ResultsSimulatedSNR.csv};
\addplot[solid,very thick,red,line width=1pt] table [search path={figs/Exp2Simulated_1.00_1.16_rad_3.00},x={Iterations}, y=Helmholtz_SNR512GridsBicubic, col sep=comma] {ResultsSimulatedSNR.csv};
\legend{LiS ($N=256^2$),LiS ($N=512^2$),MGH ($N=256^2$),MGH ($N=512^2$)}
\end{groupplot}
\end{tikzpicture}
\begin{tikzpicture}
\begin{axis}[
xbar,
width=0.475*\textwidth,
height=0.2*\textwidth, enlarge y limits=0.55,
xlabel={CPU Time (seconds)}, xmin=0, xmax = 11500,
symbolic y coords={1}
legend style={at={(0.5,-0.48)},
anchor=north,legend columns=2},
ytick=data,yticklabels={,,}
nodes near coords, nodes near coords align={horizontal},every node near coord/.append style={
/pgf/number format/fixed zerofill,
/pgf/number format/precision=0
}
]
\addplot coordinates {(2556.388156078,1)};
\addplot coordinates {(1883.656180455,1)};
\addplot coordinates {(9701.511226183,1)};
\addplot coordinates {(6895.363631848,1)};
\legend{LiS ($N=256^2$),MGH ($N=256^2$),LiS ($N=512^2$),MGH ($N=512^2$)}
\end{axis}
\end{tikzpicture}
\caption{SNR (top) and CPU time (bottom) with the simulated data for $N=256^2$ and $512^2$.}
\label{fig:SimulatedDataRecoSNRCPUTime}
\end{figure}
\begin{figure
\centering
\subfigure[LiS: $N=256^2$.]{\includegraphics[scale=0.33]{figs/Exp2Simulated_1.00_1.16_rad_3.00/LiSRecBicubic256.pdf}}
\subfigure[MGH: $N=256^2$.]{\includegraphics[scale=0.33]{figs/Exp2Simulated_1.00_1.16_rad_3.00/HelRecBicubic256.pdf}}
\subfigure[LiS: $N=512^2$.]{\includegraphics[scale=0.33]{figs/Exp2Simulated_1.00_1.16_rad_3.00/LiSRecBicubic512.pdf}}
\subfigure[MGH: $N=512^2$.]{\includegraphics[scale=0.33]{figs/Exp2Simulated_1.00_1.16_rad_3.00/HelRecBicubic512.pdf}}
\caption{Reconstructed RIs of the object on $N=256^2$ and $512^2$ grids. All targets are upsampled to a $(1024\times1024)$ grid.}
\label{fig:SimulatedDataReco}
\end{figure}
\subsection{Inverse Scattering with Experimental Data}
\label{sec:Exps:sub:ExpData}
Now, we study the performance of the Helmholtz model to recover the RIs of three real targets (namely \emph{FoamDielExtTM}, \emph{FoamDielintTM}, and \emph{FoamTwinDielTM}) from the public database provided by the Fresnel Institute \cite{geffrin2005free}.
The samples are fully enclosed in a square domain of length $15$cm.
We discretized the domain over a $(256\times 256)$ grid in our reconstruction.
The sensors were placed circularly around the object at a distance of $1.67$m from its center with a total of $360$ sensors.
Eight (eighteen, respectively) sources for \emph{FoamDielExtTM} and \emph{FoamDielintTM} (\emph{FoamTwinDielTM}, respectively) were put uniformly around the object and activated sequentially.
For each activated source, only the $241$ farthest sensors were activated.
In total, $(8\times 241)$ ($(18\times241)$, respectively) measurements for the \emph{FoamDielExtTM} and \emph{FoamDielintTM} (\emph{FoamTwinDielTM}, respectively) targets were obtained.
We used four frequencies of illumination ($3,5,6,8$GHz) to reconstruct the samples, resulting in a total of $(4\times8\times 241)$ measurements~($(4\times18\times 241)$ measurements for \emph{FoamTwinDielTM}).
The expected RIs of the three samples are presented in \Cref{fig:GroundTruthThreeTargets} as reference.
\begin{figure
\centering
\subfigure[\emph{FoamDielExtTM}]{\includegraphics[scale=0.33]{figs/ExpCResultsMultiPlot/GroundTruth_FoamDielExtTM.pdf}}
\subfigure[\emph{FoamDielintTM}]{\includegraphics[scale=0.33]{figs/ExpCResultsMultiPlot/GroundTruth_FoamDielIntTM.pdf}}
\subfigure[\emph{FoamTwinDielTM}]{\includegraphics[scale=0.33]{figs/ExpCResultsMultiPlot/GroundTruth_FoamTwinDielTM.pdf}}
\caption{RIs of three real targets in the Fresnel database.}
\label{fig:GroundTruthThreeTargets}
\end{figure}
For the reconstruction, we randomly selected a fourth of the measurements to evaluate the gradient at each iteration and performed $150$ iterations.
The stepsize and regularization parameter are summarized in \Cref{tab:experimentalParameters}. From \Cref{fig:RealDataRecov_FoamDielExtTM,fig:RealDataRecov_FoamDielintTM,fig:RealDataRecov_FoamTwinDielTM}, we see that both the LiS and Helmholtz models successfully recover the RIs of real targets with similar performance. Moreover, we observe that the Helmholtz model with the proposed MG solver is faster than the LiS model for all three targets, thus demonstrating the efficiency of our method.
\begin{table
\caption{Stepsizes and regularization parameter on the experimental data for $N=256^2$.}
\begin{center}
\begin{adjustbox}{scale=0.95}
\begin{tabular}{c|c c|c c}
\hline
\hline
\multirow{2}{*}{\scriptsize Target}& \multicolumn{2}{c|}{LiS}&\multicolumn{2}{c}{MGH}\\
&$\gamma$&$\tau$&$\gamma$&$\tau$\\
\hline
\emph{\scriptsize FoamDielExtTM}&$4\times 10^{-4}$&$9\times 10^{-3}$&$1.1\times 10^{-3}$&$8.1\times 10^{-3}$\\
\emph{\scriptsize FoamDielintTM}&$4\times 10^{-4}$&$1.9\times 10^{-2}$&$1\times 10^{-3}$&$7\times 10^{-3}$\\
\emph{\scriptsize FoamTwinDielTM}&$3\times 10^{-4}$&$1\times 10^{-2}$&$7\times 10^{-4}$&$7.5\times 10^{-3}$\\
\hline
\hline
\end{tabular}
\end{adjustbox}
\end{center}
\label{tab:experimentalParameters}
\end{table}
\begin{figure
\centering
\subfigure[LiS SNR: $26.95$dB.]{\includegraphics[scale=0.33]{figs/ExpCResultsMultiPlot/RecoLiS_FoamDielExtTM.pdf}}
\subfigure[MGH SNR: $26.72$dB.]{\includegraphics[scale=0.33]{figs/ExpCResultsMultiPlot/RecoHel_FoamDielExtTM.pdf}}\\
\begin{tikzpicture}
\pgfplotsset{every axis legend/.append style={legend pos=south east,anchor=south east,font=\normalsize, legend cell align={left}}}
\pgfplotsset{grid style={dotted, gray}}
\begin{groupplot}[enlargelimits=false,scale only axis, group style={group size=1 by 1,x descriptions at=edge bottom,group name=mygroup},
width=0.42*\textwidth,
height=0.1*\textwidth,
every axis/.append style={font=\normalsize,title style={anchor=base,yshift=-1mm}, x label style={yshift = 0.5em}, y label style={yshift = -.5em}, grid = both},xlabel = {Iterations}, ymax = 27,
]
\nextgroupplot[ylabel={SNR (dB)}]
\addplot[dashed,very thick,darkblue,line width=1pt] table [search path={figs/ExpCResultsMultiPlot},x expr=\coordindex, y=LiSSNR, col sep=comma] {ReconstructionFoamDielExtTMSNR.csv};
\addplot[solid,very thick,red,line width=1pt] table [search path={figs/ExpCResultsMultiPlot},x expr=\coordindex, y=HelmholtzSNR, col sep=comma] {ReconstructionFoamDielExtTMSNR.csv};
\legend{LiS,MGH};
\end{groupplot}%
\end{tikzpicture}
\begin{tikzpicture}
\begin{axis}[
xbar,
width=0.5*\textwidth,
height=0.15*\textwidth,
enlarge y limits=0.5,
xlabel={CPU Time (seconds)},
symbolic y coords={1}
legend style={at={(0.5,-0.85)},
anchor=north, legend columns=2},yticklabels={,,},
ytick=data,
xmin = 0,xmax = 790,
nodes near coords, nodes near coords align={horizontal},
every node near coord/.append style={
/pgf/number format/fixed zerofill,
/pgf/number format/precision=0
}
]
\addplot coordinates {(712.628010174,1)}
\addplot coordinates {(436.8639624,1)}
\legend{LiS ,MGH}
\end{axis}
\end{tikzpicture}
\caption{Reconstruction of the LiS and Helmholtz models for the \emph{FoamDielExtTM} target.}
\label{fig:RealDataRecov_FoamDielExtTM}
\end{figure}
\begin{figure
\centering
\subfigure[LiS SNR: $27.99$dB.]{\includegraphics[scale=0.33]{figs/ExpCResultsMultiPlot/RecoLiS_FoamDielIntTM.pdf}}
\subfigure[MGH SNR: $28.04$dB.]{\includegraphics[scale=0.33]{figs/ExpCResultsMultiPlot/RecoHel_FoamDielIntTM.pdf}}\\
\begin{tikzpicture}
\pgfplotsset{every axis legend/.append style={legend pos=south east,anchor=south east,font=\normalsize, legend cell align={left}}}
\pgfplotsset{grid style={dotted, gray}}
\begin{groupplot}[enlargelimits=false,scale only axis, group style={group size=1 by 1,x descriptions at=edge bottom,group name=mygroup},
width=0.42*\textwidth,
height=0.1*\textwidth,
every axis/.append style={font=\normalsize,title style={anchor=base,yshift=-1mm}, x label style={yshift = 0.5em}, y label style={yshift = -.5em}, grid = both},xlabel = {Iterations}, ymax = 28.2,
]
\nextgroupplot[ylabel={SNR (dB)}]
\addplot[dashed,very thick,darkblue,line width=1pt] table [search path={figs/ExpCResultsMultiPlot},x expr=\coordindex, y=LiSSNR, col sep=comma] {ReconstructionFoamDielIntTMSNR.csv};
\addplot[solid,very thick,red,line width=1pt] table [search path={figs/ExpCResultsMultiPlot},x expr=\coordindex, y=HelmholtzSNR, col sep=comma] {ReconstructionFoamDielIntTMSNR.csv};
\legend{LiS,MGH};
\end{groupplot}%
\end{tikzpicture}
\begin{tikzpicture}
\begin{axis}[
xbar,
width=0.5*\textwidth,
height=0.15*\textwidth,
enlarge y limits=0.5,
xlabel={CPU Time (seconds)},
symbolic y coords={1}
legend style={at={(0.5,-0.85)},
anchor=north, legend columns=2},yticklabels={,,},
ytick=data,
xmin = 0,xmax = 790,
nodes near coords, nodes near coords align={horizontal},
every node near coord/.append style={
/pgf/number format/fixed zerofill,
/pgf/number format/precision=0
}
]
\addplot coordinates {(701.759519128,1)}
\addplot coordinates {(432.046426703,1)}
\legend{LiS ,MGH}
\end{axis}
\end{tikzpicture}
\caption{Reconstruction of the LiS and Helmholtz models for the \emph{FoamDielintTM} target.}
\label{fig:RealDataRecov_FoamDielintTM}
\end{figure}
\begin{figure
\centering
\subfigure[LiS SNR: $22.14$dB.]{\includegraphics[scale=0.33]{figs/ExpCResultsMultiPlot/RecoLiS_FoamTwinDielTM.pdf}}
\subfigure[MGH SNR: $22.3$dB.]{\includegraphics[scale=0.33]{figs/ExpCResultsMultiPlot/RecoHel_FoamTwinDielTM.pdf}}\\
\begin{tikzpicture}
\pgfplotsset{every axis legend/.append style={legend pos=south east,anchor=south east,font=\normalsize, legend cell align={left}}}
\pgfplotsset{grid style={dotted, gray}}
\begin{groupplot}[enlargelimits=false,scale only axis, group style={group size=1 by 1,x descriptions at=edge bottom,group name=mygroup},
width=0.42*\textwidth,
height=0.1*\textwidth,
every axis/.append style={font=\normalsize,title style={anchor=base,yshift=-1mm}, x label style={yshift = 0.5em}, y label style={yshift = -.5em}, grid = both},xlabel = {Iterations}, ymax = 22.5,
]
\nextgroupplot[ylabel={SNR (dB)}]
\addplot[dashed,very thick,darkblue,line width=1pt] table [search path={figs/ExpCResultsMultiPlot},x expr=\coordindex, y=LiSSNR, col sep=comma] {ReconstructionFoamTwinDielTMSNR.csv};
\addplot[solid,very thick,red,line width=1pt] table [search path={figs/ExpCResultsMultiPlot},x expr=\coordindex, y=HelmholtzSNR, col sep=comma] {ReconstructionFoamTwinDielTMSNR.csv};
\legend{LiS,MGH};
\end{groupplot}%
\end{tikzpicture}
\begin{tikzpicture}
\begin{axis}[
xbar,
width=0.5*\textwidth,
height=0.15*\textwidth,
enlarge y limits=0.5,
xlabel={CPU Time (seconds)},
symbolic y coords={1}
legend style={at={(0.5,-0.85)},
anchor=north, legend columns=2},yticklabels={,,},
ytick=data,
xmin = 0,xmax = 1780,
nodes near coords, nodes near coords align={horizontal},
every node near coord/.append style={
/pgf/number format/fixed zerofill,
/pgf/number format/precision=0
}
]
\addplot coordinates {(1540.258306924,1)}
\addplot coordinates {(998.597669278,1)}
\legend{LiS ,MGH}
\end{axis}
\end{tikzpicture}
\caption{Reconstruction of the LiS and Helmholtz models for the \emph{FoamTwinDielTM} target.}
\label{fig:RealDataRecov_FoamTwinDielTM}
\end{figure}
\section{Conclusions}\label{sec:conclusion}
We have proposed an effective and robust multigrid solver for the Helmholtz equation.
We have shown that our method is adequate and efficient for diffraction tomography,
especially for strongly scattering samples.
This contrasts with Lippmann-Schwinger~(LiS) methods which suffer from slow convergence for such challenging cases.
Moreover, the proposed Jacobian matrix for the Helmholtz model is efficiently computed as well.
For future works, we plan to extend the Helmholtz model to the three-dimensional case, which presents some additional challenges as in the case of LiS.
\ifCLASSOPTIONcaptionsoff
\newpage
\fi
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Hallux valgus (HV) is a common forefoot deformity characterized by
a valgus deviation of the great toe and varus deviation of the first metatarsal\cite{AlvarezR1984}.
Its prevalence increases with age, and it afflicts 3.5\%
of adolescents, 23\% of adults aged 18-65 years and 35.7\%
of adults aged 65 years and older\cite{NixS2010,SpahnG2004}.
Patients with HV typically complain of over forefoot pain,
intolerance of shoe wear, impaired gait patterns or falls among the aged\cite{BenvenutiF1995,MenzHB2005,MenzHB2001,KoskiK1996}.
Up to date, there have been more than 100 different operative techniques defined for hallux valgus\cite{WagnerE2016}.
The proper selection of various operative procedures is commonly based on X-ray
angular measurement of the foot before operation, including the hallux valgus angle (HVA), the inter metatarsal angle (IMA),
and the distal metatarsal articular angle (DMAA)\cite{HeinemanN2020}. According to the range of HVA and IMA,
the severity of HV can be classified into three types\cite{Pique-VidalCarlos2019}:
\begin{enumerate}
\item mild(15° $\leq$ HVA $\leq$ 20°, 9° $\leq$ IMA $\leq$ 11°)
\item moderate (21° $\leq$ HVA $\leq$ 39°, 12° $\leq$ IMA $\leq$ 17°)
\item severe (HVA $\geq$ 40°, IMA $\geq$ 18°)
\end{enumerate}
\begin{figure}
\centering
\subfigure[template]{
\includegraphics[height=100pt]{figs/LabelTemplate}
}
\subfigure[samples]{
\includegraphics[height=100pt]{figs/Sample1}
\includegraphics[height=100pt]{figs/Sample2}
\includegraphics[height=100pt]{figs/Sample3}
}
\caption{Samples of Hallux valgus, (a) is a template labeled by doctor;
(b) is several samples of our dataset}
\label{fig:1.1}
\end{figure}
In order to make applicable treatment decisions, angular measurements must be accurate,
reliable, and reproducible. However, traditional X-ray measurements may be inaccurate
because they are influenced by variations in measurement techniques,
and technicians’ level of experience and ability to read X-ray images\cite{LeeKM2012}.
Numerous studies have showed intra observer and inter observer measurement errors\cite{LeeKM2012,CoughlinMJ2001,ChiTD2002,CruzEP2017,vanDerWoudeP2019}.
At present, the common practice of orthopedic surgeons is just like Fig \ref{fig:1.1} (a) shows:
\begin{enumerate}
\item Draw the four auxiliary points of each phalanx.
\item Draw the center lines of each phalanx.
\item Measure the angles of the center lines.
\end{enumerate}
The whole process stays in the manual stage, which is very complicated.
At present, deep learning has made breakthroughs in many related fields,
such as human posture recognition and gesture recognition.
But there is no articles about hallux valgus angle estimation(HVAE) with deep learning.
HVAD has difficulties as follows:
\begin{itemize}
\item To date, there is no publicly available dataset for HVA estimation.
\item The domain of x-ray is different with natural image.
X-ray is grayscale image, while natural image is based on RGB.
So the models pretrained on large open datasets like ImageNet
and COCO can’t be well migrated to an X-Ray scene.
\item The Method based on the key points is not suitable with the scenario.
Once the key points are off by a few pixels, the angle of the whole line will be greatly offset.
A deviation of a few pixels is acceptable for key-point detection but not for angle estimation.
\end{itemize}
our contribution is as follows:
\begin{itemize}
\item We are the first to use artificial intelligence to replace the traditional manual measurement of HVA and IMA.
\item we made a HV dataset which collect from 143 patients and contains 235 preoperative images.
\item We proposed a novel method based on neural network and traditional geometry. Compared to those method based on key points, our method can get more accurate estimation of HVA and IMA.
\end{itemize}
\begin{table*}
\caption{Advantages and Disadvantages of Regression Based Method and Heatmap Based Method}
\begin{tabularx}{\textwidth}{XXX}
\toprule
Framwork & Advantage & Disadvantage\\
\midrule
Direct regression based & Quick and direct, trained with an end-end fashion. Easy to be extended to 3D scenarios. & Difficult to learn mapping. Hard to be appled to multi-person case.\\
Heatmap-based & Easy to be visualized. Robust to complicated case. & Large memory consumption for getting high resolution heat map. Hard to be extended to 3D scenarios.\\
\bottomrule
\end{tabularx}
\label{Tab1}
\end{table*}
\section{Related Works}
Similar to the problem studied in this paper are human pose estimation,
animal pose estimation, face landmark detection, hand pose estimation and so on.
Traditional algorithms to deal with those problems used manual feature extraction
and complex human model to obtain local representation and global pose structure.\cite{DantoneM2013,GkioxariG2013}
After deep learning brought great innovation to this field,
the method can be grouped into two classes: One is based on regression,the other is based on heatmap.
We will introduce the development of both method detaily in section 2.1 and section 2.2.
\subsection{Models based on regression}
The method based on regression attempts to learn the mapping from the image
to the joint coordinates through the end-to-end framework
and generally generates the joint coordinates directly.\cite{ToshevA2014}
However, predicting joint coordinates directly is very difficult with few constraints.
So a more powerful network was introduced and the model structure was improved.Carreira $et al.$ \cite{CarreiraJ2016}
proposed an iterative error feedback network based on GoogLenet,
which recursively processes the combination of input images and output results.
The final results is improved from the initial coarse prediction. Sun $et al.$ \cite{SunX2017}
proposed a structural perceptual regression method based on ResNet-50.
The bone-based representation achieves more stable results by introduce body
structure information than using joint position alone.
\subsection{Models based on heatmap}
\begin{figure}
\centering
\includegraphics[width=0.5\textwidth]{figs/GauProblem.png}
\caption{Inherent problems of Gaussian heatmap. The correct prediction have much bigger loss than incorrect prediction}
\label{fig:2.1}
\end{figure}
Detection-based algorithms are dedicated to predicting the approximate position
of body parts or joints\cite{NewellA2016},
ground truth is usually a series of heatmaps(a two-dimensional Gaussian distribution centered on joint coordinates
to represent a joint position).\cite{WeiSE2016}
Although, obtaining joint coordinates from the heatmap is usually
a non-differentiable process, which hinders the end-to-end training of the network\cite{TompsonJ2014},
the heatmap representation is more robust than the coordinate representation,
most recent studies are based on the heatmap representation.\\
To get more accurate results, Papandreou $et al.$ \cite{PapandreouG2017} proposed
an improved joint position representation, which is a combination
of a binary activation heatmap and the corresponding position offset.
In order to make better use of the input information, the structure
of the neural network is very important. Some methods are mainly based on
classical networks with appropriate improvements, such as multi-scale
input network based on Googlenet \cite{RafiU2016} and deconvolution layer network
based on ResNet \cite{XiaoB2018}. \\
In terms of iterative refinement, Somework has designed a multi-stage network to refine rough prediction results
through end-to-end learning \cite{TompsonJ2015,BulatA2016,NewellA2016,WeiSE2016,YangW2017,BelagiannisV2017}.
Newell $et al.$ \cite{NewellA2016} proposed a layered Hourglass architecture
with residual modules as component units. Wei $et al.$ \cite{WeiSE2016} proposed a multi-stage
prediction framework with input images for each stage. Yang$et al.$ \cite{YangW2017}
designed a Pyramidal Residual Module (PRMS) to replace the Residual Module
of Hourglass Network, and enhanced the cross-scale invariance of DCNN by
learning features on different scales. Belagiannis and Zisserman\cite{BelagiannisV2017} combine
a 7-layer feedforward module with a recursive module to refine the results in an
iterative manner. The model learns to predict joint and limb position heatmaps.
The relationship between the visibility of key points and the real imbalance
of ground distribution is analyzed. In order to maintain a high resolution
representation of features across the entire network, Sun $et al.$ \cite{SunK2019} proposed
a new high resolution network with multi-scale feature fusion (HRNet).\\
As shown in \ref{Tab1}, both of two methods have their own advantages and disadvantages.
Direct regression learning for a single point is a highly nonlinear problem
and lacks robustness, while heatmap learning is supervised by
dense pixel information, so its robustness is better. However, compared with
the original image size, the resolution of the heatmap representation
is much lower due to the pooling operation in CNN, which limits the accuracy
of the joint coordinate estimation. What is worse, as Fig \ref{fig:2.1} shows, Gaussian heatmap can sometimes bias the optimization direction of the network, and get wrong results.
Luckily, our method can effectively avoid the influence of a few deviations on the final prediction results.
\section{Method}
\begin{figure*}
\includegraphics[width=\textwidth]{figs/PipeLine}
\caption{PipeLine of our method, our method is composed by neural network and linear regression.
The neural network predicts three heatmaps from an input image,
then the positions of points whose confidence is greater then 0.5 is picked up. The linear equations is calculated by linear regression on the points.
With the linear equations, we can calculate the angles between the lines and visualize the result.}
\label{fig:3.1}
\end{figure*}
The Pipeline of our method is as Fig \ref{fig:3.1} shows. It's based on deep learning and traditonal geometry.
In total, it can be divided into two parts: neural network and linear regression.
\subsection{Neural Network}
\begin{figure}
\centering
\subfigure[predictions]{
\includegraphics[height=110pt]{figs/KeyPredict116}
\includegraphics[height=110pt]{figs/KeyPredict35}
}
\subfigure[results]{
\includegraphics[height=110pt]{figs/KeyOut116}
\includegraphics[height=110pt]{figs/KeyOut35}
}
\subfigure[labels]{
\includegraphics[height=110pt]{figs/KeyLabel116}
\includegraphics[height=110pt]{figs/KeyLabel35}
}
\subfigure[ground truth]{
\includegraphics[height=110pt]{figs/KeyOrigin116}
\includegraphics[height=110pt]{figs/KeyOrigin35}
}
\caption{The results of keypoints-based mothod. Fig (a) is the predicted heatmaps of keypoint detection model; (b) is the final results; (c) is the labels for keypoints detection model; (d) is the ground truth. }
\label{fig:3.2}
\end{figure}
\begin{figure}
\centering
\subfigure[2]{
\includegraphics[width=0.1\textwidth]{figs/keypoints2}
}
\subfigure[3]{
\includegraphics[width=0.1\textwidth]{figs/keypoints3}
}
\subfigure[4]{
\includegraphics[width=0.1\textwidth]{figs/keypoints4}
}
\subfigure[infinity]{
\includegraphics[width=0.1\textwidth]{figs/infinity}
}
\caption{Different Numbers of Keypoints of a Line Segment}
\label{fig:3.3}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=0.5\textwidth]{figs/MulKeypoints}
\caption{Comparison of Results Based on Different Numbers of Keypoints }
\label{fig:3.4}
\end{figure}
\begin{figure}
\centering
\subfigure[predictions]{
\includegraphics[height=140pt]{figs/LinePredict116}
\includegraphics[height=140pt]{figs/LinePredict35}
}
\subfigure[results]{
\includegraphics[height=140pt]{figs/LineOut116}
\includegraphics[height=140pt]{figs/LineOut35}
}
\subfigure[labels]{
\includegraphics[height=140pt]{figs/LineLabel116}
\includegraphics[height=140pt]{figs/LineLabel35}
}
\subfigure[ground truth]{
\includegraphics[height=140pt]{figs/LineOrigin116}
\includegraphics[height=140pt]{figs/LineOrigin35}
}
\caption{The results of our method. Fig (a) is the predicted heatmaps of neural network; (b) is the final results after linear regression; (c) is the labels for neural network; (d) is the ground truth.}
\label{fig:3.5}
\end{figure}
Our method adopts the classic Hourglass neural network \cite{NewellA2016} in the field of key point
detection. Compared with other known backbones, such as Vgg16, Vgg19, ResNe,
DenseNet, the advantages of HG network lies in its symmetrical decoding
and encoding structure, which will output the heatmap zoom back to a quarter of
the original size, it can effectively improve the accuracy of predicting the keypoints.
When a line only depends on two keypoints, the pixel-level deviation
of keypoints can lead to a large deviation of the inclination of
the whole line, which make the deviation of the results intolerable. Even in the training dataset, the results are not ideal. As Fig \ref{fig:3.2} shows, the predicted heatmaps is closed with the labels in general position, but there is still pixel-level deviation, which lead the red lines on Fig \ref{fig:3.2} (b) deviated a lot compared to ground truth. The deviation of $\alpha$ reach around 7° and 10°.
To improve the situation, the first thing come to our mind is to take more keypoints. As Fig \ref{fig:3.3} shows, we can change numbers of the keypoints to 3, 4 and more. The results are also getting better as Fig \ref{fig:3.4} shows. But what if we take a limit on this case: filling in all the points between the two endpoints. It will certainly change into a line segment as Fig \ref{fig:3.3} (d) shows, and we don't need generate Guassian heatmaps for every points since the number is enough to mitigate the nonlinearity. We can simply place all the points of a line segment on one heatmap as Fig \ref{fig:3.5} (a) and (c) shows.\\
The problem of single Keypoint prediction is changed into the problem of front background segmentation.
Sigmoid activation function is used in the output layer to generate probabilities, the units whose probabilities greater than 0.5 are
the foreground (corresponding to the line segment), while the others is the background.
This method also makes the prediction result robust since the pre-background imbalance is alleviated.\\
More importantly, even if there are several points did not predict prospective, others correctly
predicted can help fit the ideal linear equation by linear regression. As \ref{fig:3.5} shows, although only a little points of red ones are detected by neural network, the final results after linear regression is still very good and the deviations of angles is much smaller.
\subsection{Linear Regression}
\begin{figure}
\centering
\subfigure[raw prediction]{
\includegraphics[width=0.1\textwidth]{figs/RawPrediction}
}
\subfigure[results of L2]{
\includegraphics[width=0.1\textwidth]{figs/L2Reg}
}
\subfigure[results of WELSCH]{
\includegraphics[width=0.1\textwidth]{figs/WelschReg}
}
\subfigure[GT]{
\includegraphics[width=0.1\textwidth]{figs/KeyOrigin51}
}
\caption{Comparison of Regression results of Different Distance Metrics}
\label{fig:3.6}
\end{figure}
In the part of linear regression, we first make a set of coordinates of units whose probabilities are greater than 0.5 through conditional judgment. Then we get the final linear equation by linear regression of the coordinate set. WELSCH loss instead of mean square loss(L2) is used to weaken the influence of several outliers. The commonly used distance metrics in linear regression are L2, L1, L12, FAIR, HUBER, WELSCH. L2 is too sensitive to outliers, L1, L12, FAIR and HUBER are linear or nearlt linear when the distance is far enough. Only WELSCH approaches a constant as the distance gets too far. Fig \ref{fig:3.6} is an example, (a) is the result of the network's predictions scaled and superimposed on the original image. The red ones and green ones are close to ground truth, but there are some outliers in the blue ones. When we take L2 as distance metric, the final result is as (b) shows, whose blue line is totally incorrect, when we take WELSCH insteaed, the results is much better as (c) shows.
\section{Experiments}
\subsection{Dataset}
We collect a HVA dataset which include 230 preoperative images from 143 patients. We labeled two endpoints for every phalanx that needs attention. We draw the center lines and calculated the angles $\alpha$ and $\beta$ for every image like \ref{fig:3.5} (d) shows. Here $a$ is $\alpha$, $b$ is $\beta$. Anyone who wants to make a better model can intuitively see the difference between their predictions and ground truth. In our experiments, we take 150 samples as training dataset, the rest 65 images as test dataset.
\subsection{Evaluation Metrics}
Because there are no ready-made evaluation metrics for our task, we developed a metric by ourselves. For this task, the most important goal is to get accurate and reliable angles. Mean angle errors(MAE) are first come to our mind, but there is an problem, it's very susceptible to outliers. For example, there are 10 samples and two method. For the first method, one of the results deviates by 90 degrees, the others deviates by 1 degree, then MAE becomes 9.9 degrees. For the second method, all of the results deviated by 9.9 degrees, so MAE is also 9.9 degrees. These two methods are indistinguishable under MAE. However, for surgeon, the first method have 9 acceptable results while the second has none. Therefore, we made a metric $acc^t$ which can present the accuracy of predicted angle errors less than some threshold.
The metric is as follows:
\begin{align}
acc^t &= \frac{1}{total}\sum_{i=1}^{total}(P(X[i])-G(X[i])<t)
\end{align}
Where $t$ is an angle threshold, $total$ is the number of samples of dataset, $X$ is the images of dataset, $P(X[i])$ is the predicted angles, $G(X[i])$ is the manually annotated angles.
\subsection{Comparison of Different Line Width}
\begin{figure}
\centering
\subfigure[d=1,GT]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth1}
}
\subfigure[d=1,c=1]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth1Label0}
}
\subfigure[d=1,c=2]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth1Label1}
}
\subfigure[d=1,c=3]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth1Label2}
}
\subfigure[d=2,GT]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth2}
}
\subfigure[d=2,c=1]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth2Label0}
}
\subfigure[d=2,c=2]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth2Label1}
}
\subfigure[d=2,c=3]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth2Label2}
}
\subfigure[d=4,GT]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth4}
}
\subfigure[d=4,c=1]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth4Label0}
}
\subfigure[d=4,c=2]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth4Label1}
}
\subfigure[d=4,c=3]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth4Label2}
}
\subfigure[d=8,GT]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth8}
}
\subfigure[d=8,c=1]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth8Label0}
}
\subfigure[d=8,c=2]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth8Label1}
}
\subfigure[d=8,c=3]{
\includegraphics[width=0.04\textwidth]{figs/LineWidth8Label2}
}
\caption{Ground Truth and Labels of Different Line Width}
\label{fig:4.1}
\end{figure}
\begin{table}
\centering
\caption{Comparison of Different Line Width on Test Dataset (Red is the best)}
\includegraphics[width=0.5\textwidth]{figs/TabLineWidth}
\label{tab:2}
\end{table}
We also take line width into consideration. A larger line width can make the trained network more robust, but at the same time it will also introduce more inherent deviations, especially for line segments with a smaller line length. The ground truth and labels of different line width are shown in \ref{fig:4.1}. Just looking at it with the naked eye, choosing a line width of 4 may be a good choice. To determine which line width is best, we did a comparative experiment. The results are shown in Tab \ref{tab:2}, $acc_{\alpha}^{3^\circ}$ means the accuracy of the prediction error of $\alpha <3^\circ $, the rest is similar. In general, it is indeed the best result when the line width is 4. From the Tab \ref{tab:2}, we can also find that the accuracy of $\beta$ is always higher than $\alpha$. It may because the phalanx corresponding to $\beta$ are more slender which makes them easier to predict.
\subsection{Results}
\begin{figure}
\centering
\subfigure[Result]{
\includegraphics[width=0.1\textwidth]{figs/31l}
}
\subfigure[GT]{
\includegraphics[width=0.1\textwidth]{figs/LineOrigin31l}
}
\subfigure[Result]{
\includegraphics[width=0.1\textwidth]{figs/39r}
}
\subfigure[GT]{
\includegraphics[width=0.1\textwidth]{figs/LineOrigin39r}
}
\caption{Results with $Error_{\alpha} < 3^\circ$}
\label{fig:4.2}
\end{figure}
\begin{figure}
\centering
\subfigure[Result]{
\includegraphics[width=0.1\textwidth]{figs/21l}
}
\subfigure[GT]{
\includegraphics[width=0.1\textwidth]{figs/LineOrigin21l}
}
\subfigure[Result]{
\includegraphics[width=0.1\textwidth]{figs/60l}
}
\subfigure[GT]{
\includegraphics[width=0.1\textwidth]{figs/LineOrigin60l}
}
\caption{Results with $3^\circ < Error_{\alpha} < 5^\circ$}
\label{fig:4.3}
\end{figure}
\begin{figure}
\centering
\subfigure[Raw Prediction]{
\includegraphics[width=0.1\textwidth]{figs/LineRaw30r}
}
\subfigure[Result]{
\includegraphics[width=0.1\textwidth]{figs/30r}
}
\subfigure[GT]{
\includegraphics[width=0.1\textwidth]{figs/LineOrigin30r}
}
\subfigure[Raw Prediction]{
\includegraphics[width=0.1\textwidth]{figs/LineRaw57r}
}
\subfigure[Result]{
\includegraphics[width=0.1\textwidth]{figs/57r}
}
\subfigure[GT]{
\includegraphics[width=0.1\textwidth]{figs/LineOrigin57r}
}
\caption{Results with $Error_{\alpha} > 5^\circ$}
\label{fig:4.4}
\end{figure}
Good results are shown in Fig \ref{fig:4.2}, slightly worse results are shown in Fig \ref{fig:4.3}. Failure cases are shown in \ref{fig:4.4}, it failed because the red ones didn't predicted well. If there are more training samples available, this kind of failure cases will be improved.
\subsection{Impletation Details of our method}
For our neural network, the input size is 1024*512*3 and the output size is 256*128*3. It's worth noting that the original size and aspect ratio of the input images is various.
In order to zoom the image to the same size without distortion, we first scale the image proportionally to a width of 512, then or images with a height greater than 1024, we crop the excess, and for images with a height less than 1024, we fill in black pixels to a height of 1024. The output channels of neural network correspond to three line segments as Fig \ref{fig:3.5} shows.
The optimizer for neural network is RMS, the initial learning rate is 5E-5, the loss function is binary cross entropy, and the activation function of the output layer is sigmoid.
\section{Summary}
To make the HVA measurement more automatic and intelligent, we collect a dataset which include 235 preoperative images from 143 patients. And we designs a two-stage method combined with deep learning and linear regression, which can carry out high-precision prediction of HVA and IMA.
Future work:
\begin{enumerate}
\item Making a large-scale foot bone dataset based on virtual simulation.
\item Based on the transfer learning method, making the large-scale training model in the virtual scene can be well transferred to the real scene.
\item Extending the scene to postoperative HVA measurements and other bone angle measurements based on X-ray images.
\end{enumerate}
\section{Acknowledgement}
This work was supported by the Ningbo Science and Technology Innovation Project [grant number No.2020Z019]; the Huamei Fund [grant number 2019HMKY10]; and the Zhejiang Medical Fund [grant number 2020KY843].
\bibliographystyle{model1-num-names}
|
\section{Introduction}
The characterization of relativistic hot plasmas is an extensive field of investigation which has applications ranging
from nuclear physics to condensed matter and cosmology.
{Within the weak-coupling regime, the presence of a large scale given by the temperature $T$ and a small gauge coupling constant $e$
allows to separate between ``hard" ($\sim T$) and ``soft" $(\sim e T)$ scales. In this regime, perturbative}
thermal field theory is applicable
and allows for well-defined computations of different physical quantities in powers of the gauge coupling constant.
Unfortunately, this requires the resummations of a set of Feynman diagrams, the so called hard thermal loops (HTL) \cite{Pisarski:1988vd,Braaten:1989mz}, which makes
the perturbative approach not so simple to apply. The resummed HTL effective theory is used to compute the soft contribution to every physical observable (see eg. \cite{Laine:2016hma,Ghiglieri:2020dpq} for recent reviews), while the bare theory is used to evaluate the hard contribution.
Recently, a systematic QED calculation has extended the effective HTL Lagrangian by including next-to-leading order corrections. In the photon sector there are two contributions required for this calculation: One originates
from two-loop diagrams \cite{Carignano:2019ofj}, while the other from power corrections to the one-loop HTL result \cite{Manuel:2016wqs,Carignano:2017ovz}. While the first are standard perturbative corrections
proportional to $e^2$, the second provide corrections of order $(\ell/T)^2$ to the HTL result, $\ell$ being the momentum of the photon: for soft momenta, they are thus $ e^2 $ corrections and thus comparable with the two-loop contributions, although they can also become the leading correction
if $\ell$ lies in some intermediate regime between soft and hard scales.
Actually, the power corrections were first computed from
the on-shell effective theory, which takes advantage of the hierarchy of scales of the hard and soft sectors
\cite{Manuel:2016cit,Manuel:2014dza}.
For the fermionic sector, the power corrections have been also computed \cite{Carignano:2017ovz}, while the two-loop diagrams have not been yet evaluated.
A completely different approach to study relativistic plasmas is based on using transport theory \cite{Elze:1989un,Blaizot:2001nr,Litim:2001db}.
It is actually possible to show that the physics of the soft scales can be studied within this framework, reproducing the HTL Feynman diagrams
\cite{Blaizot:1992gn,Blaizot:1993zk,Blaizot:1993be,Kelly:1994ig,Kelly:1994dh}.
This {effective} approach has been used successfully to study numerically {the dynamical evolution} of relativistic plasmas, as lattice techniques are in principle only amenable to study their thermodynamics.
Over the past few years, a renewed interest in the role of quantum effects in transport theory has been motivated by the study of chiral plasmas, characterized
by an imbalance between different species of massless fermions.
In this particular context, quantum corrections
can be incorporated in the kinetic equations
and generate several novel effects, such as the chiral magnetic and vortical effects (see eg. \cite{Stephanov:2012ki,Son:2012zy,Gao:2012ix,Hidaka:2016yjf,Mueller:2017arw,Huang:2018wdl,Carignano:2018gqt,Lin:2019ytz,Weickgenannt:2019dks}).
We will not consider the situation of
chirally imbalanced systems in this manuscript, though.
Instead,
in this work, we aim at showing that the power corrections to the HTL Lagrangian of QED can also be obtained via the transport approach.
While the HTL physics is recovered from the leading term in a gradient expansion of the transport approach, which describes the
classical limit of the theory, the power corrections are obtained by keeping the first non-vanishing correction in a gradient expansion.
Focusing on the photon sector, we will discuss how the connection between the gradient expansion and power corrections naturally emerges.
While we will be working in natural units
and discuss the different approximations in terms of ratios of different energy scales in the system, it is also possible to see that the relevant terms we will use correspond to $\hbar^2$ corrections in the transport approach.
This paper is organized as follows: in Sec.~\ref{sec:transport} we review the derivation of the transport and constraint equations including higher order terms of the gradient expansion. In Sec.~\ref{sec:powKT}
we then show how the power corrections can be derived from the transport equation. We finally discuss our results and outlooks in Sec.~\ref{sec:conclusions}. Some technical details on
the regularization of possible divergencies using dimensional regularization are discussed in the Appendix.
We use natural units $\hbar=c= k_B=1$ and the metric $g^{\mu\nu} = diag(1,-1,-1,-1)$.
\section{Transport and constraint equations for QED }
\label{sec:transport}
As a first step, let us briefly rederive the transport and constraint equations which will be used to recover the power corrections. For more in-depth discussions, we refer to the vast literature on the subject,
see eg. \cite{Vasak:1987um,Blaizot:1992gn,Zhuang:1995pd} or \cite{Gao:2020pfu} for a recent review.
{We consider a relativistic QED plasma at high temperature $T$, and thus
assume that the fermions can be treated as massless. }
Our focus will be on the fermionic Wigner function $W(X,q)$, which amounts to the quantum analogue of the particle distribution function in transport theory, and is defined as the Fourier transform of the ensemble average
of the two-point correlator
\begin{equation}
\label{wigner}
W(X,q)= \int\frac{d^4 s}{(2\pi)^4}
e^{-iq\cdot s} W(x,y)
=
\int\frac{d^4 s}{(2\pi)^4}
e^{-iq\cdot s}
\left\langle \bar\psi(X+\frac{s}{2})U(X+\frac{s}{2},X-\frac{s}{2})
\psi(X-\frac{s}{2})\right\rangle\,,
\end{equation}
where $\psi$ is the fermionic field, $X=(x+y)/2$ and $s=x-y$ are the center-of-mass and relative coordinates, respectively, and $U$ is the link operator ensuring the gauge invariance of the Wigner function,
\begin{equation}
\label{link}
U\left(X+\frac{s}{2},X-\frac{s}{2}\right) =
\exp\left\lbrace {-ie s^\mu\int_0^1 dz \, A_\mu\left(X-\frac{s}{2}+zs\right)}\right\rbrace \,,
\end{equation}
where the path connecting $x$ and $y$ is taken to be a straight line.
Since in the following we will consider self-consistent mean gauge fields \cite{Blaizot:1992gn} in order to reconstruct the HTLs and their power corrections, we need not care about subtleties associated with
the path ordering~\cite{Vasak:1987um}.
Note that we do not include normal ordering in the definition of the Wigner function, as vacuum contributions will play an important role in our derivation of the power corrections.
We now take the Dirac equation for massless fermions and its adjoint acting on $W(x,y)$,
\begin{equation}
\slashed{D}_x W(x,y) = W(x,y) \slashed{D}_y^\dagger = 0 \,, \qquad \; D_x^\mu = \partial_x^\mu + i e A^\mu(x) \,,
\label{eq:eqD}
\end{equation}
and after squaring them,
we can build a sum and a difference equations, which will give us a constraint equation, enforcing the
on-shell condition for the quasiparticles, and the transport equation, respectively \cite{Vasak:1987um,Blaizot:1992gn,Zhuang:1995pd}:
\begin{align}
\label{initial-eqs}
(D_x^2 \mp D_y^{*2}) W(x,y) - \frac{e}{2} \Big[ F_{\mu\nu}(x) \sigma^{\mu\nu} W(x,y) \mp F_{\mu\nu}(y) W(x,y) \sigma^{\mu\nu} \Big] = 0 \,,
\end{align}
with $F_{\mu\nu} = \partial_\mu A_\nu - \partial_\nu A_\mu $ the electromagnetic stress tensor.
\subsection{The transport equation}
Focusing first on the difference equation associated with Eq.~(\ref{initial-eqs}),
we derive the transport equation for a fermion in the plasma, recalling that in order to have a well-defined quasiparticle interpretation,
its momentum $q$ must be hard. We perform
a Wigner transformation and a gradient expansion around $X$.
In principle, this can be worked to all orders \cite{Vasak:1987um}, although for our purposes we will truncate the expansion
at order ${\cal O}(\partial_X^3)$.
We obtain
(in the following, for brevity, we will omit the $X$ on the corresponding derivatives, ie. $\partial \equiv \partial_X$)
\begin{align}
& (q\cdot \partial - e q\cdot F\cdot \partial_q)W(X,q) + \frac{i e}{4}F_{\mu\nu} [\sigma^{\mu\nu}, W] \; - \frac{e}{8} \Delta F_{\mu\nu}(X) \big\lbrace \sigma^{\mu\nu}, W \big\rbrace \nonumber\\
& = -\Big[ \frac{e}{24} q^\mu (\Delta^2 F_{\mu\nu}) \partial_q^\nu + \frac{e}{12}(\Delta F^{\lambda\nu}) \partial^q_\lambda (\partial_\nu - e F_{\nu\beta}\partial_q^\beta) \Big] W
+ \frac{i e}{32} \Delta^2 F_{\mu\nu} [\sigma^{\mu\nu}, W] \,,
\label{eq:transporth2}
\end{align}
where {$\Delta= \partial \cdot \partial_q$, with $\partial$ only acting on $F^{\mu \nu}$}.
In order for the expansion to be well behaved,
we thus demand that the pieces involving the $\Delta$ operator be small. In Fourier modes, if
$\ell$ is the momenta associated with the electromagnetic field, this implies
\begin{equation}
\Delta \ll 1 \ , \qquad \frac{\ell}{q} \ll 1 \,.
\end{equation}
At this point we can also recall that the gradient expansion can also be seen as a quantum expansion in $\hbar$: in this sense, the anti-commutator piece in \Eq{eq:transporth2} is of order $\hbar$,
whereas all the terms {on its right-hand side} are of order $\hbar^2$ \cite{Vasak:1987um}. These latter ones will be the pieces required to obtain the power corrections, as we will show in the following.
Upon inspecting the transport equation, recalling that the Wigner function is a matrix in Dirac space, it is clear that its components can get in principle mixed.
In order to continue, we can perform a decomposition of its Dirac structure and
find individual equations for its components. More specifically, we write \cite{Vasak:1987um}
\begin{equation}
W = {\cal F} + i \gamma^5 {\cal P} + \gamma^\alpha V_\alpha + \gamma^5 \gamma^\alpha A_\alpha + \frac{1}{2} \sigma^{\mu\nu} S_{\mu\nu} \, ,
\label{eq:WFdecomp}
\end{equation}
where ${\cal F}, {\cal P}, V_\alpha, A_\alpha$ and $S_{\mu \nu}$ stand for the scalar, pseudoscalar, vector, axial-vector and tensorial components
of the Wigner function.
Of particular interest for us in the derivation of the hard thermal loops and their power corrections
will be the vectorial component $V^\alpha$, so if we now trace our kinetic equation multiplied by a $\gamma^\alpha$,
pieces proportional to the anticommutator $\{ \sigma^{\mu\nu} , W \} $ drop due to symmetry and
we get to the following equation\footnote{Note that, compared to Eq. (4.28) in \cite{Vasak:1987um}, this equation contains extra $\Delta^2$ pieces which are required to get the full $\hbar^2$ or power corrections.}
\begin{equation}
\Bigg\lbrace \Big[ q\cdot \partial - e q\cdot F\cdot \partial_q \; {{{{+}}}} \; \frac{e}{24} q^\mu (\Delta^2 F_{\mu\nu}) \partial_q^\nu + \frac{e}{12}(\Delta F^{\lambda\nu}) \partial^q_\lambda (\partial_\nu - e F_{\nu\sigma}\partial_q^\sigma) \Big] g^{\alpha\beta} - e \Big(1- \frac{1}{8}\Delta^2\Big) F^{\alpha\beta} \Bigg\rbrace V_\beta = 0 \,.
\label{eq:KEV}
\end{equation}
Unlike for the case of chirally imbalanced plasmas, we can thus see that the first non-vanishing corrections to \Eq{eq:KEV} are ${\cal {O}}(\hbar^2)$, as
${\cal {O}}(\hbar)$ corrections cancel out when summing over the fermion spin, and the axial components of the Wigner function do not play a role in our specific computation.
\subsection{The dispersion relation}
If we now consider the sum equation in Eq.~(\ref{initial-eqs}) we can
we can get a constraint obeyed by the Wigner function, from which one can obtain the fermionic dispersion relation.
After Wigner transforming, and truncating to order $\partial_X^3$, this becomes
\begin{align}
\Big[ & Q^2 - \frac{e}{6} q^\mu \Delta F_{\mu\nu} \partial_q^\nu - \frac{e}{12} \partial^\mu F_{\mu\nu} \partial_q^\nu - \frac{1}{4} \Big(\partial_\mu - e F_{\mu\nu} \partial_q^\nu)^2 \Big] W(X,q) \nonumber\\
& = \frac{e}{4} F_{\mu\nu} \{ \sigma^{\mu\nu} ,W\} - i \frac{e}{8} \Delta F_{\mu\nu} [\sigma^{\mu\nu}, W ] \, ,
\label{eq:disprel}
\end{align}
where $Q^2 = q_\mu q^\mu$,
and after projecting on the vector component, we obtain
\begin{align}
\Big[ & Q^2 - \frac{e}{6} q^\mu \Delta F_{\mu\nu} \partial_q^\nu - \frac{e}{12} \partial^\mu F_{\mu\nu} \partial_q^\nu - \frac{1}{4} \big(\partial_\mu - e F_{\mu\nu} \partial_q^\nu\big)^2 \Big] V^\alpha + \frac{e}{2} \Delta F^{\alpha\beta}V_\beta = 0 \,,
\label{eq:disprelV}
\end{align}
which provides a correction to the simple on-shell relation for massless particles $Q^2 = 0$. As we will argue in the following, however, this does not play a role
in the derivation of the power corrections.
\section{Power corrections to the photon HTL from kinetic theory}
\label{sec:powKT}
In this section we show how,
by making use of the transport equation obtained in the previous section, we can derive the power corrections to the HTL Lagrangian.
For this, we start from the electromagnetic current associated with the fermionic field,
\begin{equation}
j^\mu = 4 e \int \frac{d^4q }{(2\pi)^4} V^\mu \,,
\end{equation}
where $V^\mu$ again is the vector component of the fermionic Wigner function.
We now split $V^\mu$ into
\begin{equation}
V^\mu = V^\mu_{(0)} + e \Big( V^\mu_{{\rm HTL}} + V^\mu_{{\rm pow}} + \dots \Big) + e^2 ( \dots ) \,,
\label{eq:Vsplit}
\end{equation}
where, aside from the leading-order term $V_{(0)}$ we singled out the leading ${\cal {O}}(e)$ contribution, describing the well-known HTL result,
and the first non-vanishing gradient correction to it, which will amount to the power corrections to the HTL, as we will show in what follows.
In terms of explicit factors of the gauge coupling, this is still an ${\cal {O}}(e)$ term,
although in the realm of validity of the gradient expansion, it will be suppressed by $\ell/q \ll 1$ factors, where $\ell$ is the soft photon momentum and $q\sim T$. If we interpret the gradient expansion as an expansion in terms of $\hbar$ \cite{Vasak:1987um,Zhuang:1995pd}, the power corrections
can be seen as an $\hbar^2$ correction to the HTL result.
Since in the computation of the electromagnetic current
when going to higher orders in the gradient expansion we meet with diverging contributions, in the following we will employ dimensional regularization (DR)
and perform all our integrals in $D = d+1 = 4+2\epsilon$ dimensions.
As first step, let us rederive the HTL current.
In thermal equilibrium we have { (see, for example \cite{Blaizot:1992gn})}
\begin{equation}
V_{(0)}^\alpha = q^\alpha \, 2\pi \, sgn(q^0) \, \delta(Q^2) f_F(q^0) \equiv q^\alpha G_0(q) \ ,
\end{equation}
where $f_F = [1+ \exp(q^0/T)]^{-1}$ is the fermionic occupation number, so we get to
%
\begin{equation}
q\cdot \partial V^\alpha_{\rm HTL} = e \Big[ g^{\alpha}_{\;\; \beta} q\cdot F\cdot \partial_q + F^{\alpha}_{\;\; \beta} \Big] V_{(0)}^\beta \,,
\label{eq:KEhtl}
\end{equation}
where we used that we are near equilibrium and $V^{(0)}$ is space-independent. We can now solve for $V_{\rm HTL} $, and plugging our result in the current,
after integrating by parts in order to avoid having
derivatives acting on $G_0$, we get
\begin{equation}
j^\mu_{{\rm HTL} } = - 8\pi e^2 {\int_Q} \, \frac{1}{2q} \Big[ \delta(q^0 - q) - \delta(q^0+q) \Big] f_F(q^0) \Big[ \frac{q_\lambda }{q\cdot \partial} F^{\lambda\mu} - \partial_\nu \frac{q^\mu q_\lambda} {(q\cdot \partial)^2} F^{\lambda\nu} \Big] \,,
\label{eq:intermHTL2}
\end{equation}
with $q = \vert{\bf q}\vert$. Note that
when changing the dimensions of space-time, in order to keep the gauge coupling dimensionless we multiply it by a factor
$ \nu^{3 -d}$, where $\nu$ is a renormalization scale. For brevity, we introduced the shorthand notation
\begin{equation}
\int_Q \equiv \int \frac{dq^0}{2\pi} \int_{\bf {q}} \equiv \nu^{3 -d} \int \frac{dq^0}{2\pi} \int \frac{d^dq }{(2\pi)^d} .
\end{equation}
After employing the delta functions to perform the $q^0$ integration, we recover the particle and antiparticle contributions, $q^\mu = q v^\mu = q(1,{\bf v}) $ and $q^\mu = -q \tilde{v}^\mu = -q(1,-{\bf v})$, ${\bf v}^2 = 1$.
Making use of the symmetries in the angular integration we now send $\tilde{v}^\mu \to v^\mu$, and using
that $f_F(-q) = 1-f_F(q)$ we get
\begin{equation}
j^\mu_{{\rm HTL} } = 2 e^2 {\int_{\q} \, } \frac{1 - 2 f_F(q)}{q} \Big[ \frac{v_\lambda }{v\cdot \partial} F^{\lambda\mu} - \partial_\nu \frac{v^\mu v_\lambda} {(v\cdot \partial)^2} F^{\lambda\nu} \Big] \,,
\label{eq:jHTL}
\end{equation}
and if we now move to momentum space and compute the photon polarization tensor as
\begin{equation}
\Pi^{\mu\nu}_{{\rm HTL} } (\ell) = \frac{\delta j^{\mu}_{\rm HTL}}{\delta A_\nu} = 2 e^2 {\int_{\q} \, } \frac{1 - 2 f_F(q)}{q} \Big[ g^{\mu\nu} - \frac{v^\mu \ell^\nu +v^\nu \ell^\mu }{v\cdot \ell}
+ \frac{v^\mu v^\nu L^2}{(v\cdot \ell)^2} \Big] \, ,
\label{eq:piHTL}
\end{equation}
with $L^2 = \ell^\mu\ell_\mu$, we recover the familiar HTL expression, see for example \cite{Pisarski:1997cp}.
{Note that the expression above contains in principle both thermal and vacuum contributions, the latter however do not contribute here, as DR sets
scale-less integrals to zero. }
We are now ready to compute the power corrections to the HTL polarization tensor. For this, we start from \Eq{eq:KEV} truncated at ${\cal{O}}(e)$ and again split the vector component of the Wigner function as
in \Eq{eq:Vsplit}. Using the fact that
$V^\mu_{HTL}$ satisfies \Eq{eq:KEhtl} to simplify the equation, we are left with
\begin{equation}
q\cdot \partial V_{\rm{pow}}^\alpha + e\Big[
\frac{1}{24} q^\mu (\Delta^2 F_{\mu\nu}) \partial_q^\nu
g^{\alpha\beta}+ \frac{1}{8}\Delta^2 F^{\alpha\beta}\Big] V^{(0)}_\beta = 0 \,,
\label{eq:KEpow}
\end{equation}
where we used that we are near equilibrium and that $V^{(0)}$ is space-independent. Further, we have dropped pieces of order $e^2$ which would
only be needed if we were to reproduce three-point functions.
We can already note at this point that the terms appearing in \Eq{eq:KEpow}
are quadratic in the operator $\Delta$, which will translate in quadratic corrections in powers of $\ell/q$.
This is a consequence of the symmetries of the system, in particular parity $P$ and $CP$, where $C$ is charge conjugation, which enforce that no odd powers of $\ell$ can occur.
Now we can use this result to extract
\begin{align}
j^\mu_{\rm{pow}} & = 4 e {\int_Q} \, V^\mu_{{\rm pow}} = 4 e^2 {\int_Q} \, \Big( \frac{ \partial^4}{4(q\cdot \partial)^2} \Big) \Big[ \frac{q_\lambda }{q\cdot \partial} F^{\lambda\mu} - \partial_\nu \frac{q^\mu q_\lambda} {(q\cdot \partial)^2} F^{\lambda\nu} \Big] G_0(q) \,,
\label{eq:jPOW}
\end{align}
which is exactly the HTL form of \Eq{eq:intermHTL2} multiplied by the factor $- \frac{ \partial^4}{4(q\cdot \partial)^2}$.
At this point, we should check whether the corrections to the on-shell relation \Eq{eq:disprel} from the gradient expansion play a role at this order in the computation.
With the splitting (\ref{eq:Vsplit}) we then see that the constraint equation
for $V_{\rm {pow}}$ is modified by pieces going as $\sim e \Delta G_{(0)}$ stemming from
the gradient expansion. However, this would only introduce
higher order corrections to the electromagnetic current, which we neglect at the order of the computation we
are carrying out. Thus, we can consider the dispersion law of the free massless case for our computations of the power corrections current.
Employing the leading-order on-shell condition for massless particles,
performing again the $q^0$ integrals and going to momentum space, we thus find the expression for the power corrections to the photon polarization tensor,
\begin{equation}
\Pi^{\mu\nu}_{\rm {pow}}(\ell) = \frac{\delta j^{\mu}_{\rm{pow}}}{\delta A_\nu} = 2 e^2 {\int_{\q} \, } \frac{1 - 2 f_F(q)}{q^3} \frac{ L^4}{4(v\cdot \ell)^2} \Big[ g^{\mu\nu} - \frac{v^\mu \ell^\nu +v^\nu \ell^\mu }{v\cdot \ell} + \frac{v^\mu v^\nu L^2}{(v\cdot \ell)^2} \Big] \,,
\label{eq:piPOW}
\end{equation}
and the effective Lagrangian generating it via $j^\alpha_{\rm pow} = \delta {\cal L}_{\rm pow} / \delta A_\alpha$
is
%
\begin{equation}
\label{npc-HTL}
{\cal L}_{\rm pow} = \frac{e^2}{4} {\int_{\q} \, } \frac{ 1- 2 f_F(q) }{q^3} \Bigg \{ F_{\rho \alpha} \frac{v^\alpha v^\beta}
{(v \cdot \partial)^4 } \partial^4 F _{\beta}^{\,\,\rho} \Bigg \} \,,
\end{equation}
which is the same result found using diagrammatic methods in \cite{Manuel:2016wqs,Carignano:2017ovz}.
Let us emphasize (see the Appendix) that the momentum integrals of Eqs.~(\ref{eq:piPOW},\ref{npc-HTL})
are infrared finite, as there is a cancellation of the IR singularity associated with the thermal bath with that of the vacuum.
For this reason, it is important to keep the vacuum contribution. The momentum integrals still contain
a ultraviolet (UV) divergence, associated with the photon wavefunction renormalization. This is cured with the standard QED
counterterm
\begin{equation}
{\cal L}_{\rm c.t.} = - \frac{ Z(\alpha, \epsilon)}{4} F_{\mu \nu} F^{\mu \nu}
\ , \qquad
Z = 1 - \frac{2 \alpha}{ 3 \epsilon \pi} \ ,
\end{equation}
where $\alpha= e^2/4\pi$ is the electromagnetic fine structure constant.
In Ref.~\cite{Carignano:2017ovz} it was pointed out that the polarization tensor for photon momentum $\ell \ll T$ admits an expansion of the
form
\begin{equation}
\left(\frac {L^4}{4 q^2 (v \cdot \ell)^2} \right)^n \ , \qquad n= 1,2, 3 \ldots
\end{equation}
times the integrand of the HTL polarization tensor, Eq.(\ref{eq:piHTL}). Our work suggests that these corrections could also be obtained by
keeping extra terms in the gradient expansion, ie. higher powers of the $\Delta$ operator in the transport approach. Note however that, starting from the next power
correction to the one here computed, the expansion is increasingly IR divergent. These divergencies are most likely cancelled by computing
{ soft loop contributions to the
polarization tensor}, which require the use of resummed pertubation theory, with modified vertices and propagators. We will however not address this issue here.
\section{Conclusions}
\label{sec:conclusions}
{While it is well-known that the HTL effective Lagrangian can be derived from the classical limit of transport theory,
in this work we have shown how the power corrections to the HTL can also be reproduced within this approach, by keeping
next-to-leading order terms of
the gradient expansion. Although we have worked using natural units, it is possible to see that
these correspond to pure quantum corrections $\propto \hbar^2$ \cite{Vasak:1987um}.
In particular, the relevant new contributions discussed in this work}
are given by $(\partial_X\cdot \partial_q)^2 \sim (\ell/q)^2 $ corrections to the HTL, where $\ell$ is the soft photon momentum and $q \sim T$ a hard momentum.
{No odd terms in the photon momentum can appear in the expansion due to the P and CP symmetries of the plasma we considered here, since we didn't allow for any kind of parity-breaking
mechanism \cite{Nieves:1988qz}.}
This is also reflected in the absence of ${\cal {O}}(\hbar)$ corrections, which instead arise when considering chirally imbalanced plasmas.
Let us emphasize again that it is important to keep the vacuum contribution in our framework, as the first gradient expansion correction to the HTL result is only IR finite after including it.
The vacuum is here treated as another
medium, more specifically, as a Dirac sea of antiparticles. We have seen that with our formulation we can reproduce the correct QED
photon wavefunction UV divergence. At first, this result might be puzzling, as it is an UV effect, while
the transport theory is an effective field theory for the long distance physics. However, in the modern formulations of effective field theories, one should not use cutoffs in their definitions, but rather a gauge respectful regulator, such as dimensional regularization. All the momentum scales thus enter in the effective field theory approach.
The scale of the physics that the effective field theory describes results
after performing the different momentum integrals, which are finite if used in dimensional regularization.
Finally, a matching procedure with the full theory at a given scale should be done. This procedure should be applied to the transport framework as well.
It would be interesting to investigate how higher-order power corrections can be derived from the transport equations,
as our work suggests that this should be feasible. However, when the photon momenta $\ell$ is soft ($\sim e T$), the power corrections computed here
turn out to be of the same order as a standard perturbative correction that shows up in two-loop diagrams
\cite{Carignano:2019ofj}.
{It should also be possible to derive these two-loop corrections of the polarization tensor in transport theory,
although it would likely be much more involved.}
While we have centered our analysis in electromagnetic plasmas, it would be very interesting to generalize our approach to the quark-gluon plasma as well. We hope to report on those efforts in the future.
\section*{Acknowledgements}
We have been supported by Ministerio de Ciencia, Investigacion y Universidaddes (Spain) under the project PID2019-110165GB-I00 (MCI/AEI/FEDER, UE), as well as by the Generalitat de
Catalunya by the project 2017-SGR-929 (Catalonia). This work was also supported by the COST Action CA15213 THOR.
|
\section{Introduction}
With the development of correlation attack and algebraic attack, it is becoming the main trend to use the nonlinear feedback shift register
sequences with pseudorandom property as the driving sequences in stream
cipher design. The feedback with carry shift register (FCSR) proposed by \cite{K4} and \cite{K2} is a kind of
generator which can produce nonlinear sequences quickly.
Balanced binary and quaternary sequences with good autocorrelation play important roles in communication and cryptography systems. The $d$-adic complexity $\Phi_d(s)$ measures the smallest length of FCSR which generates the sequence $s$ over $\mathbf{Z}/(d)$. Sequences over $\mathbf{Z}/(d)$ with low $d$-adic complexity are susceptibly decoded by the rational approximation algorithm, see \cite{K4}, [8-9]. Particularly, a quaternary sequence $s$ can be decoded by the rational approximation algorithm with $6\Phi_4(s)+16$ consecutive bits. Hence, the 4-adic complexity $\Phi_4(s)$ of a safe sequence $s$ with period $N$ should exceed $\frac{N-16}{6}$. There are numerous results about the 2-adic complexity of binary sequences with good autocorrelation, see [2-3], [11-14], for example. However, the 4-adic complexity of quaternary sequences with good autocorrelation has not been studied so fully and there are few quaternary sequences with good autocorrelation whose 4-adic complexity is known, see \cite{Q}. This may pose risk to communication and cryptography system.
In this paper, we determine the 4-adic complexity of the balanced quaternary sequences of even period $2p$ and $2(2^n-1)$ with ideal autocorrelation defined in \cite{Kim} and \cite{Jang}, respectively. Our results show that the 4-adic complexity of the quaternary sequences with period $2p$ and $2(2^n-1)$ defined in these two papers is larger than $\frac{2p-16}{6}$ and $\frac{2(2^n-1)-16}{6}$ respectively. Hence they are safe enough to resist the attack of the rational approximation algorithm.
\section{Preliminaries}\label{sec2}
In the application of communication and cryptography, balanced sequences with good autocorrelation property are preferred.
For a sequence $g=(g_0, g_1, \ldots, g_{N-1})$ over $\mathbf{Z}/(d)$ with period $N$, it is said to be balanced if $|A_i-A_j|\leq 1$ for any pair of $i, j$ with $0\leq i\neq j\leq N-1$,where $$A_k=\{t|g_t=k, 0\leq t<N \}, \ k=0, 1,\ldots, d-1.$$
The autocorrelation function of a sequence $s=(s_0, s_1, \ldots, s_{N-1})$ over $\mathbf{Z}/(d)$ with period $N$ is defined by
$$C_s(\tau)=\sum_{i=0}^{N-1}\zeta_d^{s_i-s_{i+\tau}}, \ \ \ 0\leq\tau< N,$$ where $\zeta_d$ is a complex $d$-th primitive root of unity.
The maximal out-of-phase autocorrelation magnitude should be as small as possible and the number of the occurrences of the maximal out-of-phase autocorrelation magnitude should be minimized. A sequence with the possible minimum value of the maximal out-of-phase autocorrelation magnitude and the minimum number of occurrences of the maximal out-of-phase autocorrelation magnitude is said to have the ideal autocorrelation property.
For a binary sequence $s$ with period $N$, it is well known that if
\begin{equation}\label{e111}
C_s(\tau)=-1 \ \ \textrm{for all $0<\tau<N$},
\end{equation} then $s$ is an ideal autocorrelation sequence.
The autocorrelation distribution of a quaternary sequence $s$ of even period $N$ with ideal autocorrelation and balance property is given by
\begin{align*}
C_s(\tau)= \left\{ \begin{array}{ll}
N, & \textrm{1 times},\\
0, & \textrm{$\frac{N}{2}-1$ times},\\
-2, & \textrm{$\frac{N}{2}$ times}.
\end{array} \right.
\end{align*} in \cite{Kim}.
By using the Legendre sequences and the Gray mapping, two classes of balanced quaternary sequences of even period $2p$ with ideal autocorrelation were constructed in \cite{Kim}. Balanced quaternary sequences of period $2(2^n-1)$ with ideal autocorrelation were constructed in \cite{Jang} by using the binary sequences of period $2^n-1$ with ideal autocorrelation and the Gray mapping.
For an odd prime $p$, let $QR$ and $QNR$ be the set of quadratic residues and quadratic non-residues in the set $\mathbf{Z}_p^{\ast}={\mathbf{Z}/(p)}\backslash \{0\}=\{1, 2, \ldots, p-1\}$, respectively. Two classes of Legendre sequences $b$ and $c$ of period $p$ are defined by
\begin{align*}
b_t= \left\{ \begin{array}{ll}
0, & \textrm{for $t=0$}\\
0, & \textrm{for $t\in QR$}\\
1, & \textrm{for $t\in QNR$}
\end{array} \right.
\end{align*}
\begin{align*}
c_t= \left\{ \begin{array}{ll}
1, & \textrm{for $t=0$}\\
0, & \textrm{for $t\in QR$}\\
1, & \textrm{for $t\in QNR$}
\end{array} \right.
\end{align*}
respectively.
The Gray mapping $\phi$ is defined by $$\phi(0,0)=0, ~\phi(0,1)=1,~ \phi(1,1)=2, ~\phi(1,0)=3.$$
According to the definition of the Gray mapping, we can get
\begin{equation}\label{e1}
\phi(a,e)=2a-a(e-1)-(a-1)e
\end{equation} where $0\leq a\leq 1$ and $0\leq e\leq 1$.
The following two classes of quaternary sequences $g^1$ and $g^2$ of even period $2p$ defined by using the Gray mapping and the Legendre sequences were shown to have ideal autocorrelation and balance property in \cite{Kim}.
\begin{definition}\label{d1}(\cite{Kim})
For an odd prime $p$ with $p\equiv 1\pmod 4$, let $s^0$ and $s^1$ be two binary sequences of the same period $2p$ defined by
\begin{align*}
s^0_{t}=\left\{ \begin{array}{ll}
b_t, & \textrm{for $t\equiv 0\bmod 2$}\\
c_t, & \textrm{for $t\equiv 1\bmod 2$}
\end{array} \right.
\end{align*}
\begin{align*}
s^1_{t}=\left\{ \begin{array}{ll}
b_{t}, & \textrm{for $t\equiv 0\bmod 2$}\\
1-c_{t}, & \textrm{for $t\equiv 1\bmod 2$}.
\end{array} \right.
\end{align*}
The quaternary sequence $g^1$ of period $2p$ is defined by $g^1_{t}=\phi(s^0_{t}, s^1_{t})$.
\end{definition}
\begin{definition}\label{d2}(\cite{Kim})
For an odd prime $p$ with $p\equiv 3\pmod 4$, let $s^2$ and $s^3$ be two binary sequences of the same period $2p$ defined by
\begin{align*}
s^2_{t}=\left\{ \begin{array}{ll}
b_{t}, & \textrm{for $0\leq t< p$}\\
b_{t}, & \textrm{for $p\leq t< 2p$}
\end{array} \right.
\end{align*}
\begin{align*}
s^3_{t}=\left\{ \begin{array}{ll}
c_{t}, & \textrm{for $t\equiv 0\bmod 2$}\\
1-c_{t}, & \textrm{for $t\equiv 1\bmod 2$}.
\end{array} \right.
\end{align*}
The quaternary sequence $g^2$ of period $2p$ is defined by $g^2_{t}=\phi(s^2_{t}, s^3_{t})$.
\end{definition}
Let $\mathbf{Z}_{2^n-1}=\mathbf{Z}/(2^n-1)=\{0, 1, 2, \ldots, 2^n-2\}$. Assume that $s$ is a binary sequence of period $2^n-1$ with ideal autocorrelation. Let $D_0$ be the characteristic set of $s$ defined by $$D_0=\{t|s_t=1, 0\leq t\leq 2^n-2\}$$ and $\overline{D}_0=\mathbf{Z}_{2^n-1}\backslash D_0$. By the Chinese remainder theorem, we have the isomorphism
$$\phi: \mathbf{Z}_{2\times(2^n-1)}\simeq \mathbf{Z}_2\times \mathbf{Z}_{2^n-1}, h\mapsto(h\bmod 2, h\bmod {2^n-1}).$$
The following class of quaternary sequences $g^3$ of even period $2(2^n-1)$ defined by using the Gray mapping and the ideal autocorrelation sequences with period $2^n-1$ were shown to have ideal autocorrelation and balance property in \cite{Jang}.
\begin{definition}(\cite{Jang})\label{d3}
Let $s$ be binary sequence of period $2^n-1$ with ideal autocorrelation and $D_0$ a characteristic set of $s$. Let $g^3$ be the quaternary sequence defined by $$g^3_t=\phi(u_t, v_t),$$ where $u$ and $v$ are the binary sequences of period $2^{n+1}-2$ defined by
\begin{align*}
u_{t}=\left\{ \begin{array}{ll}
1, & \textrm{if $t\in\{0,1\}\times D_0$}\\
0, & \textrm{if $t\in\{0,1\}\times \overline{D}_0$}
\end{array} \right.
\end{align*}
\begin{align*}
v_{t}=\left\{ \begin{array}{ll}
1, & \textrm{if $t\in\{0\}\times D_0 \ \bigcup \ \{1\}\times\overline{D}_0$}\\
0, & \textrm{if $t\in\{0\}\times \overline{D}_0\ \bigcup \ \{1\}\times D_0.$}
\end{array} \right.
\end{align*}
\end{definition}
The definition about the $4$-adic complexity of quaternary sequences with period $N$ is defined as follows.
\begin{definition}(\label{d4}\cite{K4,K1})
For a quaternary sequence $s=(s_0, s_1, \ldots, s_{N-1})$ with period $N$, let $S(4)=\sum_{i=0}^{N-1}s_i4^i$.
The 4-adic complexity $\Phi_4(s)$ is defined by $\log_4\frac{4^N-1}{\gcd(4^N-1,\ S(4))},$ where $\gcd(a, b)$ denotes the greatest common divisor of $a $ and $b$. (The exact value of the smallest length of FCSR which generates the quaternary sequence is $\lfloor \log_4{\big((4^N-1)/\gcd(4^N-1, S(4))+1\big)}\rfloor$.
\end{definition}
According to Definition \ref{d4}, determining the $4$-adic complexity of quaternary sequences is equivalent to determining $\gcd(4^N-1, S(4))$.
\section{Main result}
In this section, we study the 4-adic complexity of the quaternary sequences of period $2p$ and $2(2^n-1)$ with ideal autocorrelation in Section \ref{sec2}.
For $i\in \mathbf{Z}_p^{\ast}$, the Legendre symbol $\left(\frac{i}{p}\right)$ is defined by
\begin{align*}
\left(\frac{i}{p}\right)
= \left\{ \begin{array}{ll}
1, & \textrm{if $i\in QR$ }\\
-1, & \textrm{otherwise}.
\end{array} \right.
\end{align*}
The following four lemmas are useful in the sequel.
\begin{lemma}(\cite{G}, Theorem 7.3)\label{lem0}
If $s$ is a periodic binary sequence of odd period $2^n-1$ with ideal autocorrelation, then the number of nonzero bits in one period of $s$ is $2^{n-1}$.
\end{lemma}
The proof of the lemma is similar to that of Lemma 2(1) in \cite{LZ}. For the
completeness of the paper, we give a simple proof.
\begin{lemma}\label{lem1}
Let $p$ be an odd prime. Then $$\left(\sum_{i=1}^{p-1}\left(\frac{i}{p}\right)4^{i}\right)^2\equiv-\left(\frac{-1}{p}\right)\frac{4^p-1}{3}+\left(\frac{-1}{p}\right)p\pmod {4^{p}-1}.$$
\end{lemma}
\begin{proof}
Since
\begin{align*}
\left(\sum_{i=1}^{p-1}\left(\frac{i}{p}\right)4^{i}\right)^2
&=\sum_{i=1}^{p-1}\left(\frac{i}{p}\right)4^{i}\sum_{j=1}^{p-1}\left(\frac{j}{p}\right)4^{j}\\
&=\sum_{i,j=1}^{p-1}\left(\frac{ij}{p}\right)4^{i+j}\ \ (\textrm{let}~ j=ik)\\
&=\sum_{i,k=1}^{p-1}\left(\frac{k}{p}\right)4^{i(k+1)}\\
&=\sum_{k=1}^{p-2}\left(\frac{k}{p}\right)\sum_{i=1}^{p-1}4^{i(k+1)}+\sum_{i=1}^{p-1}4^{ip}\left(\frac{p-1}{p}\right).
\end{align*}
Then from $\sum_{k=1}^{p-2}\left(\frac{k}{p}\right)=-\left(\frac{-1}{p}\right)$ and $$\sum_{i=1}^{p-1}4^{i(k+1)}\equiv\sum_{i=1}^{p-1}4^{i}\pmod{4^p-1}~(1\leq k\leq p-2),$$ we get
\begin{align*}
\left(\sum_{i=1}^{p-1}\left(\frac{i}{p}\right)4^{i}\right)^2
&\equiv -\left(\frac{-1}{p}\right)\bigg(\frac{4^p-1}{3}-1\bigg)+(p-1)\left(\frac{-1}{p}\right)\\
&\equiv -\left(\frac{-1}{p}\right)\frac{4^p-1}{3}+\left(\frac{-1}{p}\right)p\pmod{4^p-1}.
\end{align*}
\end{proof}
\begin{lemma}\label{lem3}
For a prime $p$, if $25|(4^p+1)$, then we have $p=5$.
\end{lemma}
\begin{proof}
Since $4^{10}\equiv 1\pmod{25}$ and $4^i\equiv -1\pmod {25}$ has only one solution $i=5$ in the set $\{i|1\leq i\leq 9\}$, then from $4^p\equiv -1\pmod{25}$, we get $p=5+10k\ (k\in \mathbf{Z})$ which implies $5|p$. Hence we get $p=5$.
\end{proof}
\begin{lemma}\label{lem2}
For an odd prime $p$, we have
$$\sum_{t=1}^{p-1}\left(\frac{2t}{p}\right)4^{2t}+\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}\left(\frac{2t+1}{p}\right)4^{2t+1}
\equiv
\left\{ \begin{array}{ll}
2\sum\limits_{t=1}^{p-1}\left(\frac{t}{p}\right)4^{t}\pmod{4^p-1}\\
0\pmod{4^p+1}
\end{array} \right.$$
\end{lemma}
\begin{proof}
From
$$\sum_{t=1}^{p-1}\left(\frac{2t}{p}\right)4^{2t}\equiv \sum_{t=1}^{p-1}\left(\frac{t}{p}\right)4^{t} \equiv\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}\left(\frac{2t+1}{p}\right)4^{2t+1}\pmod{4^p-1}$$
we get
$$\sum_{t=1}^{p-1}\left(\frac{2t}{p}\right)4^{2t}+\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}\left(\frac{2t+1}{p}\right)4^{2t+1}\equiv
2\sum_{t=1}^{p-1}\left(\frac{t}{p}\right)4^{t}\pmod{4^p-1}.$$
Since
\begin{align*}
\sum_{t=1}^{\frac{p-1}{2}}\left(\frac{2t}{p}\right)4^{2t}\equiv-\sum_{t=\frac{p-3}{2}+2}^{p-1}\left(\frac{2t+1}{p}\right)4^{2t+1}\pmod{4^p+1}
\end{align*}
\begin{align*}
\sum_{t=\frac{p-1}{2}+1}^{p-1}\left(\frac{2t}{p}\right)4^{2t}\equiv-\sum_{t=0}^{\frac{p-3}{2}}\left(\frac{2t+1}{p}\right)4^{2t+1}\pmod{4^p+1}
\end{align*}
then the rest result follows from
\begin{align*}
\sum_{t=1}^{p-1}\left(\frac{2t}{p}\right)4^{2t}&= \sum_{t=1}^{\frac{p-1}{2}}\left(\frac{2t}{p}\right)4^{2t}+ \sum_{t=\frac{p-1}{2}+1}^{p-1}\left(\frac{2t}{p}\right)4^{2t}
\end{align*}
and
$$\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}\left(\frac{2t+1}{p}\right)4^{2t+1}=\sum_{t=0}^{\frac{p-3}{2}}\left(\frac{2t+1}{p}\right)4^{2t+1}
+\sum_{t=\frac{p-3}{2}+2}^{p-1}\left(\frac{2t+1}{p}\right)4^{2t+1}. $$
\end{proof}
Now we study the 4-adic complexity of the quaternary sequence $g^1$ in Definition \ref{d1}.
\begin{theorem}\label{t1}
For the quaternary sequence $g^1$ in Definition \ref{d1}, we have
\begin{align*}
\Phi_4(g^1)
= \left\{ \begin{array}{ll}
\log_4\frac{4^{2p}-1}{15}, & \textrm{if $5|(p+2)$ }\\
\log_4\frac{4^{2p}-1}{3}, & \textrm{else}.
\end{array} \right.
\end{align*}
\end{theorem}
\begin{proof}
(i) Firstly, we prove $$\gcd(g^1(4), 4^{p}-1)=3. $$ Let the symbols be the same as before. Then we get
\begin{align}
g^1(4)&=\sum_{t=0}^{2p-1}\phi(s_t^0, s_t^1)4^t\notag\\& =\sum_{t=0}^{p-1}\phi(b_{2t}, b_{2t})4^{2t}
+\sum_{t=0}^{p-1}\phi(c_{2t+1}, 1-c_{2t+1})4^{2t+1}\notag
\\ &=\sum_{t=0}^{p-1}[2b_{2t}-b_{2t}(b_{2t}-1)-(b_{2t}-1)b_{2t}]4^{2t}+\sum_{t=0}^{p-1}[2c_{2t+1}-c_{2t+1}(-c_{2t+1})\notag
\\ & \ \ -(c_{2t+1}-1)(1-c_{2t+1})]4^{2t+1}\ \ \textrm{(by (\ref{e1}))}\notag
\\ &=\sum_{t=0}^{p-1}[2b_{2t}-{(b_{2t})}^2+b_{2t}-{(b_{2t})}^2+b_{2t}]4^{2t} +\sum_{t=0}^{p-1}[2c_{2t+1}+({c_{2t+1}})^2+1-2c_{2t+1}+({c_{2t+1}})^2]4^{2t+1}\notag
\\ &=\sum_{t=0}^{p-1}2b_{2t}4^{2t}+\sum_{t=0}^{p-1}(2c_{2t+1}+1)4^{2t+1}\ \ \textrm{(since $a^2=a ~(0\leq a\leq 1)$) }\notag
\\ &=2b_{0}4^{0}+\sum_{t=1}^{p-1}2b_{2t}4^{2t}+(2c_p+1)4^p+\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}(2c_{2t+1}+1)4^{2t+1}\notag
\\ &=\sum_{t=1}^{p-1}2b_{2t}4^{2t}+3\cdot 4^p+\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}(2c_{2t+1}+1)4^{2t+1}\ \ \textrm{(since $b_0=0$, $c_0=c_p=1$) }\notag
\\ &=\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}4^{2t+1}+3\cdot 4^p+\sum_{t=1}^{p-1}2b_{2t}4^{2t}+\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}2c_{2t+1}4^{2t+1}\notag
\\ &= 4\sum_{t=0}^{p-1}4^{2t}-4^p+3\cdot4^p
+2\sum_{t=1}^{p-1}\frac{1-\left(\frac{2t}{p}\right)}{2}4^{2t} +2\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}\frac{1-\left(\frac{2t+1}{p}\right)}{2}4^{2t+1}\notag\\
&\equiv\left\{ \begin{array}{ll}
9\sum\limits_{t=0}^{p-1}4^{2t}-2\sum\limits_{t=1}^{p-1}\left(\frac{t}{p}\right)4^{t}\pmod{4^p-1}\\
9\sum\limits_{t=0}^{p-1}4^{2t}-2\pmod{4^p+1}.
\end{array} \right.\ \ \ \ \textrm{(by Lemma \ref{lem2})}
\end{align}\label{e3}
Since $3|(4^p-1$), then from (3) we know
\begin{align*}
g^1(4)\equiv\sum_{t=1}^{p-1}\left(\frac{t}{p}\right)4^t\equiv 0 \pmod 3\ \textrm{\bigg(since $\sum_{t=1}^{p-1}\left(\frac{t}{p}\right)=0$\bigg).}
\end{align*}
It then follows that $3|\gcd(g^1(4), 4^p-1)$. If $9|(4^p-1)$, then from $4^3\equiv 1\pmod 9$ and $4^p\equiv 1\pmod 9$, we get
$p=3$ which contradicts with $p\equiv 1\pmod 4$. Therefore $9\nmid \gcd(g^1(4), 4^p-1)$.
Assume that $d_1$ is a prime divisor of $\gcd(g^1(4), 4^p-1)$ such that $d_1\neq 3$. By (3) we get
\begin{align*}
g^1(4)\equiv-2\sum_{t=1}^{p-1}\left(\frac{t}{p}\right)4^t\pmod{d_1}.
\end{align*}
Then we have $d_1\big|\left(\sum\limits_{t=1}^{p-1}\left(\frac{t}{p}\right)4^t\right)^2$. Combining with Lemma \ref{lem1}, we have $d_1\mid p$ which implies $d_1=p$. Hence, we have $4^p\equiv 1\pmod p$. By Fermat's little Theorem, we get $4^{p-1}\equiv 1\pmod p$. Then we have $p|(p-1)$ which is a contradiction. Hence, we know $d_1=1$.
Therefore we get
\begin{align}
\gcd(g^1(4), 4^{p}-1)=3. \label{e4}
\end{align}
(ii) Next, we prove
\begin{align*}
\gcd(g^1(4), 4^{p}+1)
= \left\{ \begin{array}{ll}
5, & \textrm{if $5|(p+2)$ }\\
1, & \textrm{else}.
\end{array} \right.
\end{align*}
By (3) we have \begin{align*}
g^1(4)\equiv-p-2\pmod 5.
\end{align*}
Then we get $5|\gcd(g^1(4), 4^p+1)$ only when $5|(p+2)$.
Assume that $5|(p+2)$ and $25|(4^p+1)$, then by Lemma \ref{lem3} we get $p=5$ which contradicts with $5|(p+2)$. It then follows that $25\nmid\gcd(g^1(4), 4^p+1)$.
Let $d_2$ be a divisor of $\gcd(g^1(4), 4^p+1)$ such that $5\nmid d_2$. Then from (3) we have
$g^1(4)\equiv -2\pmod{d_2}.$
Thus $d_2\mid2$ which implies $d_2=1.$
Therefore
\begin{align}
\gcd(g^1(4), 4^{p}+1)
= \left\{ \begin{array}{ll}
5, & \textrm{if $5|(p+2)$ }\\
1, & \textrm{else}.
\end{array} \right.
\end{align}
Combining with (4-5) and the definition of the 4-adic complexity, the result is proven.
\end{proof}
The 4-adic complexity of the sequence $g^2$ in Definition 2 is given by the following theorem.
\begin{theorem}\label{t2}
For the quaternary sequence $g^2$ in Definition 2, we have
\begin{align*}
\Phi_4(g^2)
= \left\{ \begin{array}{ll}
\log_4\frac{4^{2p}-1}{5}, & \textrm{if $5|(p-2)$ }\\
\log_4(4^{2p}-1), & \textrm{else}.
\end{array} \right.
\end{align*}
\end{theorem}
\begin{proof}
(i) Firstly, we determine the exact value of
$\gcd(g^2(4), 4^p-1)$.
Assume that the symbols are the same as before. Then we have
\begin{align}
g^2(4)\notag &=\sum_{t=0}^{2p-1}\phi(s_t^2, s_t^3)4^t\notag\\& =\sum_{t=0}^{p-1}\phi(b_{2t}, c_{2t})4^{2t}+\sum_{t=0}^{p-1}\phi(b_{2t+1}, 1-c_{2t+1})4^{2t+1}\notag
\\ &=\sum_{t=0}^{p-1}[2b_{2t}-b_{2t}(c_{2t}-1)-(b_{2t}-1)c_{2t}]4^{2t}+\sum_{t=0}^{p-1}[2b_{2t+1}+b_{2t+1}c_{2t+1}\notag
\\ & \ \ -(b_{2t+1}-1)(1-c_{2t+1})]4^{2t+1}\ \ \textrm{(by (\ref{e1}))}\notag
\\ &=(2\times 0-0\times(1-1)-(0-1)\times1)\times 4^0+\sum_{t=1}^{p-1}[2b_{2t}-b_{2t}c_{2t}+b_{2t}-b_{2t}c_{2t}+c_{2t}]4^{2t}\notag
\\ & \ \ +[2b_p+b_pc_p-(b_p-1)(1-c_p)]4^p+\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}[2b_{2t+1}+b_{2t+1}c_{2t+1}+{(b_{2t+1})}^2+1-2b_{2t+1}]4^{2t+1}\notag
\\ &=1+\sum_{t=1}^{p-1}2b_{2t}4^{2t}+\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}(2b_{2t+1}+1)4^{2t+1} \ \ \textrm{(since $a^2=a ~(0\leq a\leq 1)$) }\notag
\\&=1+\sum_{t=1}^{p-1}2b_{2t}4^{2t}+4\sum_{t=0}^{p-1}4^{2t}-4^{2\cdot\frac{p-1}{2}+1}+\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}2b_{2t+1}4^{2t+1}\notag
\\ &= 2\sum_{t=1}^{p-1}\frac{1-\left(\frac{2t}{p}\right)}{2}4^{2t}+2\sum_{\substack{t=0\\t\neq\frac{p-1}{2}}}^{p-1}\frac{1-\left(\frac{2t+1}{p}\right)}{2}4^{2t+1}
+1-4^p+4\sum_{t=0}^{p-1}4^{2t}\label{e7} \notag\\
&\equiv \left\{ \begin{array}{ll}
9\sum\limits_{t=0}^{p-1}4^{2t}-
2\sum\limits_{t=1}^{p-1}\left(\frac{t}{p}\right)4^t-2\pmod{4^p-1}\\
9\sum\limits_{t=0}^{p-1}4^{2t}+2\pmod{4^p+1}.
\end{array} \right.\textrm{(by Lemma \ref{lem2})}
\end{align}
Since $3|(4^p-1)$, then by (6) we know
$$ g^2(4)\equiv 1\pmod 3.$$
Then we get $3\nmid\gcd(g^2(4), 4^p-1)$.
Let $d_3$ be a prime divisor of $\gcd(g^2(4), 4^p-1)$. From (6) and $d_3\neq 3$ we have
$$g^2(4)\equiv -2(\sum_{t=1}^{p-1}\left(\frac{t}{p}\right)4^t+1)\pmod{d_3}.$$ Then by Lemma \ref{lem1} and $p\equiv 3\pmod 4$, we have $$1\equiv (\sum_{t=1}^{p-1}\left(\frac{t}{p}\right)4^t)^2\equiv -p+\frac{4^p-1}{3}\equiv -p\pmod{d_3}.$$ Hence, we have $d_3|(p+1)$. From $4^{d_3-1}\equiv 1\pmod{d_3}$ and $4^p\equiv 1\pmod{d_3}$ we get $p|(d_3-1)$ which is a contradiction. Therefore
\begin{equation}
\gcd(g^2(4), 4^p-1)=1.
\end{equation}
(ii) Now we determine
$\gcd(g^2(4), 4^p+1)$.
Since $5\mid (4^p+1)$, then by (6) we get
$$g^2(4)\equiv -\sum_{t=0}^{p-1}4^{2t}+2\equiv -p+2\pmod 5.$$
Hence we get $5|\gcd(g^2(4), 4^p+1)$ only when $5|(p-2)$.
Assume that $5|(p-2)$ and $25|(4^p+1)$, then from Lemma \ref{lem3} we have $p=5$ which contradicts with $5|(p-2)$. It then follows that $25\nmid\gcd(g^2(4), 4^p+1)$.
Assume that $d_4$ is a prime divisor of $g^2(4)$ and $4^p+1$ such that $d_4\neq 5$.
Then by (6) we get
\begin{align*}
g^2(4)\equiv 2\pmod{d_4}
\end{align*}
which implies $d_4=1$. Hence we have
\begin{align}
\gcd(g^2(4), 4^p+1)
= \left\{ \begin{array}{ll}
5, & \textrm{if $5|(p-2)$ }\\
1, & \textrm{otherwise}.
\end{array} \right.\label{e10}
\end{align}
Combining with (7-8) and the definition of the 4-adic complexity, the result is proven.
\end{proof}
The 4-adic complexity of the sequence $g^3$ with period $2^{n+1}-2$ in Definition \ref{d3} is given as follows.
\begin{theorem}\label{t3}
For the quaternary sequence $g^3$ with period $2^{n+1}-2$ in Definition \ref{d3}, we have
$$\Phi(g^3)=\log_45\cdot (4^{2^n-1}-1).$$
\begin{proof}
With the symbols the same as before, we have
\begin{align}
g^3(4) &=\sum_{t=0}^{2^{n+1}-3}\phi(u_t, v_t)4^t\notag\\
& =\sum_{\substack{t=0\\t\in \{1\}\times \overline{D}_0}}^{2^{n+1}-3}4^t+\sum_{\substack{t=0\\t\in \{0\}\times D_0}}^{2^{n+1}-3}2\cdot4^t+\sum_{\substack{t=0\\t\in \{1\}\times D_0}}^{2^{n+1}-3}3\cdot4^t\notag\\
& =\sum_{\substack{t=0\\2\nmid t, s_t=0}}^{2^{n+1}-3}4^t+2\cdot\sum_{\substack{t=0\\2|t, s_t=1}}^{2^{n+1}-3}4^t+3\cdot\sum_{\substack{t=0\\2\nmid t, s_t=1}}^{2^{n+1}-3}4^t\notag\\
& =\sum_{\substack{t=0\\2\nmid t}}^{2^{n+1}-3}(1-s_t)4^t+2\cdot\sum_{\substack{t=0\\2|t}}^{2^{n+1}-3}s_t\cdot4^t+3\cdot\sum_{\substack{t=0\\2\nmid t}}^{2^{n+1}-3}s_t\cdot4^t\notag\\
& =\sum_{\substack{t=0\\2\nmid t}}^{2^{n+1}-3}4^t+2\sum_{\substack{t=0}}^{2^{n+1}-3}s_t\cdot4^t\notag\\
& =\sum_{t=0}^{2^n-2}4^{2t+1}+2\sum_{t=0}^{2^n-2}s_t\cdot4^t\cdot(1+4^{2^n-1})\label{e21}\\
& =4\cdot\frac{4^{2^n-1}+1}{5}\cdot\frac{4^{2^n-1}-1}{3}+2\sum_{t=0}^{2^n-2}s_t\cdot4^t\cdot(1+4^{2^n-1}).\label{e11}
\end{align}
(i) Firstly, we determine
$\gcd(g^3(4), 4^{2^n-1}+1)$.
By (\ref{e11}) and $\frac{4^{2^n-1}-1}{3}=\sum\limits_{t=0}^{2^n-2}4^t\equiv 1\pmod 5$, we have $$g^3(4)\equiv 4\cdot \frac{4^{2^n-1}+1}{5}\pmod {4^{2^{n-1}}+1}.$$
It then follows that
\begin{equation}\label{e19}
\gcd(g^3(4), 4^{2^n-1}+1)=\gcd(4\cdot \frac{4^{2^n-1}+1}{5}, 4^{2^{n-1}}+1)=\frac{4^{2^n-1}+1}{5}.
\end{equation}
(ii) Secondly, we determine
$\gcd(g^3(4), 4^{2^n-1}-1)$.
By (\ref{e11}) and $\frac{4^{2^n-1}+1}{5}=\sum\limits_{t=0}^{2^n-2}(-4)^t \equiv 1\pmod 3$, we have
\begin{equation}\label{e12}
g^3(4)\equiv 4\cdot\sum_{t=0}^{2^n-2}s_t4^t +\frac{4^{2^n-1}-1}{3}\pmod {4^{2^{n-1}}-1}.
\end{equation}
Since $s_t\in \{0, 1\}$, we have $s_t=\frac{1-(-1)^{s_t}}{2}$. Then from (\ref{e12}), we get
\begin{align*}
g^3(4)&\equiv 4\cdot \sum_{t=0}^{2^n-2}\frac{1-(-1)^{s_t}}{2}\cdot 4^t+\frac{4^{2^n-1}-1}{3}\\
&\equiv 2\cdot\frac{4^{2^n-1}-1}{3}-2\sum_{t=0}^{2^n-2}(-1)^{s_t}\cdot 4^t+\frac{4^{2^n-1}-1}{3}\\
&\equiv -2\sum_{t=0}^{2^n-2}(-1)^{s_t}\cdot 4^t\pmod {4^{2^{n-1}}-1}.
\end{align*}
Hence, we have
\begin{equation}\label{e13}
\gcd(g^3(4),4^{2^{n-1}}-1)=\gcd(-\sum_{t=0}^{2^n-2}(-1)^{s_t}4^t, 4^{2^n-1}-1).
\end{equation}
Let $r$ be a prime divisor of $\gcd(g^3(4),4^{2^{n}-1}-1)$. Then from (\ref{e13}), we get
$$0\equiv g^3(4)\equiv \sum_{t=0}^{2^n-2}(-1)^{s_t}\cdot 4^t\pmod r.$$
It then follows that
\begin{align}
0 &\equiv \sum_{t=0}^{2^n-2}(-1)^{s_t}\cdot 4^t\sum_{l=0}^{2^n-2}(-1)^{s_l}\cdot 4^{-l}\notag\\
& \equiv\sum_{t, l=0}^{2^n-2}(-1)^{s_t+s_l}4^{t-l}\notag\\
& \equiv\sum_{l=0}^{2^n-2}\sum_{f=0}^{2^n-2}(-1)^{s_{f+l}+s_l}4^f\notag\\
& \equiv\sum_{f=0}^{2^n-2}4^f\sum_{l=0}^{2^n-2}(-1)^{s_{f+l}+s_l}\pmod r\notag
\end{align}
Then from the fact that $s$ is a binary sequence of period $2^n-1$ with ideal autocorrelation and (\ref{e111}), we get
\begin{equation}\label{e116}
0\equiv 2^n-1+\sum_{f=1}^{2^n-2}(-1)4^f\equiv 2^n-\frac{4^{2^n-1}-1}{3}\pmod r.
\end{equation}
By (\ref{e21}), we know $g^3(4)\equiv\sum_{t=0}^{2^n-2}s_t+2^n-1\pmod 3$. Since $s$ is a binary sequence of period $2^n-1$ with ideal autocorrelation, then from Lemma \ref{lem0} we have $\sum_{t=0}^{2^n-2}s_t=2^{n-1}$. It then follows that $g^3(4)\equiv2^{n-1}+2^n-1\equiv 2\pmod 3$.
Therefore we get $3\nmid g^3(4)$. It then follows that $r\neq 3$ which implies $$r\bigg|\frac{4^{2^n-1}-1}{3}.$$ By (\ref{e116}) we get
$0\equiv 2^n\pmod r$ which is a contradiction. Hence, we have
\begin{equation}\label{e18}
\gcd(g^3(4),4^{2^{n-1}}-1)=1.
\end{equation}
Combining with (\ref{e19}), (\ref{e18}) and the definition of the 4-adic complexity, the result is proven.
\end{proof}
\end{theorem}
We give several examples to demonstrates our main results.
\begin{example}
For $p=5\equiv1\pmod 4$, we have $\mathbb{F}_5^{\ast}=\langle2\rangle$ and $b_0=b_5=0, c_0=c_5=1, b_1=b_6=0, c_1=c_6=0, b_2=b_7=1, c_2=c_7=1, b_3=b_8=1, c_3=c_8=1, b_4=b_9=0, c_4=c_9=0$. Then according to the definition of the sequence $g^1$, we get $g^1=(0, 1, 2, 3, 0, 3, 0, 3, 2, 1)$. Then we have
\begin{align*}
&\gcd(g^1(4), 4^{10}-1)\\
=&\gcd(1\times 4+2\times 4^2+3\times4^3+3\times4^5+3\times4^7+2\times4^8+4^9, 4^{10}-1)\\=&3
\end{align*}
which implies $\Phi_4(g^1)=\log_4\frac{4^{10}-1}{3}$. This result is consistent with Theorem \ref{t1}.
\end{example}
\begin{example}
For $p=13\equiv1\pmod 4$, we have $\mathbb{F}_{13}^{\ast}=\langle2\rangle$. According to the definition of the sequence $g^1$, we have $g^1=(0, 1, 2, 1, 0, 3, 2, 3, 2, 1, 0, 3, 0, 3, 0, 3, 0, 1, 2, 3, 2, 3, 0, 1, 2, 1)$. Then we have
\begin{align*}
&\gcd(g^1(4), 4^{26}-1)\\
=&\gcd(1\times 4+2\times 4^2+4^3+3\times4^5+2\times4^6+3\times4^7+2\times4^8+4^9+3\times4^{11}+3\times4^{13}\\
&+3\times4^{15}+4^{17}+2\times4^{18}+3\times4^{19}+2\times4^{20}+3\times4^{21}+4^{23}+2\times4^{24}+4^{25}, 4^{26}-1)\\=&15
\end{align*}
which implies $\Phi_4(g^1)=\log_4\frac{4^{26}-1}{15}$. This result is consistent with Theorem \ref{t1}.
\end{example}
\begin{example}
For $p=3\equiv3\pmod 4$, we have $\mathbb{F}_3^{\ast}=\langle2\rangle$ and $b_0=b_3=0, c_0=c_3=1, b_1=b_4=0, c_1=c_4=0, b_2=b_5=1, c_2=c_5=1$. According to the definition of the sequence $g^2$, we have $g^2=(1, 1, 2, 0, 0, 3)$. Then we get
\begin{align*}
&\gcd(g^2(4), 4^{6}-1)\\
=&\gcd(1+1\times 4+2\times 4^2+3\times4^5, 4^{6}-1)\\=&1
\end{align*}
which implies $\Phi_4(g^2)=\log_4(4^{6}-1)$. This result is consistent with Theorem \ref{t2}.
\end{example}
\begin{example}
For $p=7\equiv 3\pmod 4$, according to the definition of the sequence $g^2$, we have $g^2=(1, 1, 0, 3, 0, 3, 2, 0, 0, 1, 2, 1, 2, 3)$. Then we get
\begin{align*}
&\gcd(g^2(4), 4^{14}-1)\\
=&\gcd(1+1\times 4+3\times 4^3+3\times4^5+2\times4^6+4^9+2\times4^{10}+4^{11}+2\times4^{12}+3\times4^{13}, 4^{14}-1)\\=&5
\end{align*}
which implies $\Phi_4(g^2)=\log_4(\frac{4^{14}-1}{5})$. This result is consistent with Theorem \ref{t2}.
\end{example}
\begin{example}
For $n=4$, we have the binary $m$-sequence $s=(0, 0, 0, 1, 0, 0, 1, 1, 0, 1, 0, 1, 1, 1, 1)$ of period 15,\ according to the definition of the sequence $g^3$, we have $$g^3=(0, 1, 0, 3, 0, 1, 2, 3, 0, 3, 0, 3, 2, 3, 2, 1, 0, 1, 2, 1, 0, 3, 2, 1, 2, 1, 2, 3, 2, 3).$$
Then we get
\begin{align*}
&\gcd(g^3(4), 4^{30}-1)\\
=&\gcd(4+3\times 4^3+4^5+2\times4^6+3\times4^7+3\times4^9+3\times4^{11}+2\times4^{12}+3\times4^{13}
+2\times4^{14}+4^{15}+4^{17}\\&+2\times4^{18}+4^{19}+3\times4^{21}+2\times4^{22}+4^{23}+2\times4^{24}+4^{25}+2\times4^{26}
+3\times4^{27}+2\times4^{28}+3\times4^{29}, 4^{30}-1)\\=&214748365\\=&\frac{4^{15}+1}{5}
\end{align*}
which implies $\Phi_4(g^3)=\log_4(5\times(4^{15}-1))$. This result is consistent with Theorem \ref{t3}.
\end{example}
\begin{remark}
For a sequence $s$ with period $N$, the 4-adic complexity $\Phi_4(s)$ should exceed $\frac{N-16}{6}$ to resist the rational approximation algorithm. Theorems 5-7 show that the 4-adic complexity of the balanced quaternary sequences of period $2p$ and $2(2^n-1)$ with ideal autocorrelation defined in \cite{Kim} and \cite{Jang} is larger than $\frac{2p-16}{6}$ and $\frac{2(2^n-1)-16}{6}$ respectively.
\end{remark}
\section{Conclusion}
In this paper, we study the 4-adic complexity of the balanced quaternary sequences
with ideal autocorrelation constructed in \cite{Kim} and \cite{Jang}, respectively. It
turns out that the balanced quaternary sequences
with ideal autocorrelation constructed in these two papers are safe enough to resist the attack of the rational approximation algorithm. It would be interesting to investigate
the 4-adic complexity of more quaternary sequences with
good autocorrelation and balance property.
|
\section{Introduction}{\label{sec:intro}}
Currently, wireless networks are being developed in three main directions: higher throughputs, bigger numbers of devices served in the Internet of Things scenarios, and lower latency in time-sensitive applications.
The last direction has attracted the attention of the IEEE 802.11 Working Group (WG), which in 2019 created a Real-Time Applications (RTA) Topic Interest Group (TIG).
The RTA TIG has developed a list of scenarios of interest, which include virtual and augmented reality, online gaming, remote control, and industrial automation.
These scenarios are related to applications that are sensitive to delay, which shall be lower than $1$--\SI{10}{\ms}, and to the packet loss rate, which shall not exceed $10^{-8}$--$10^{-5}$ \cite{discussion_target_presentation,usecases_presentation}.
The RTA TIG has proposed many potential solutions \cite{rta_tig} to enable Wi-Fi networks to serve such strict applications. These solutions will be studied and refined during the development of the next main amendment of the Wi-Fi standard: the 802.11be \cite{be_par}, also known as Extremely High Throughput (EHT).
802.11be will introduce many new PHY and MAC layer solutions and will develop the solutions proposed in previous amendments like 802.11ac and 802.11ax.
802.11be will increase the bandwidth to \SI{320}{\MHz}, the number of MIMO spatial streams to 16, will provide solutions for the non-continuous spectrum usage, and will likely add completely new features, such as hybrid adaptive automatic repeat request (HARQ) and coordinated and joint transmissions of multiple access points (APs).
The exhaustive list of the features currently discussed in the context of 802.11be is described in~\cite{wifi7}.
One of the features that will be improved in 802.11be is the orthogonal frequency division multiple access (OFDMA).
It has been introduced in 802.11ax both for downlink and uplink transmissions and is considered as a potential enabler of RTA in Wi-Fi.
Currently, with OFDMA, an AP can divide the frequency band into resource units (RUs) and allocate them either for deterministic transmissions by specific stations (STAs) or for random access (RA).
The latter is useful for uplink transmissions in cases when the AP does not know which STA currently needs channel resources and allows a STA to use shared channel resources to transmit a data frame or to request channel resources for deterministic transmissions.
Purely deterministic transmissions with OFDMA might be an inappropriate solution for RTA when STAs generate irregular uplink traffic, because requesting the channel resources introduces additional latency.
However, the AP can combine the joint usage of random and deterministic transmissions with OFDMA to organize implicit signaling about the STAs' need for channel resources \cite{avdotin2019ofdma}.
We have previously shown \cite{avdotin2019enabling} that such an approach can be further extended in 802.11be if the new amendment improves the OFDMA procedure in Wi-Fi.
Specifically, in 802.11ax one RU cannot be allocated for deterministic transmission by several STAs, but if 802.11be allows such an action, the AP will be able to distribute the channel resources more uniformly between the STAs and thus decrease the probability of collisions that lead to packet losses.
Currently, the existing algorithms for OFDMA resource allocation have been designed for scenarios when transmission attempts can fail only due to the collisions, but Wi-Fi networks can also suffer from the channel noise or interference from neighboring devices.
In this paper, we show that the existing solutions operate poorly in the case of the non-ideal channel and design new algorithms that can provide reliable service for RTA traffic even in the presence of noise or interference.
The rest of the paper is organized in the following way.
Section~\ref{sec:ofdma} provides the basics of OFDMA in Wi-Fi networks.
Section~\ref{sec:litra} reviews the prior arts on RTA in Wi-Fi.
Section~\ref{sec:problem} introduces the studied scenario and states the problem.
In Section~\ref{sec:algorithms}, we describe the developed new algorithms for OFDMA resource allocation in Wi-Fi.
In Section~\ref{sec:results}, we evaluate the efficiency of the developed algorithms.
Section~\ref{sec:conclusion} contains the conclusion.
\section{OFDMA in Wi-Fi}
\label{sec:ofdma}
OFDMA in Wi-Fi has been introduced in the 802.11ax standard amendment for downlink and uplink transmissions and is used together with legacy Wi-Fi channel access.
Let us describe a typical uplink transmission procedure (see Fig. \ref{fig:ofdma}) with OFDMA since, in this paper, we focus on uplink optimization for RTA.
The OFDMA transmissions are controlled by the AP and start with a trigger frame (TF) broadcasted by the AP.
The purpose of the TF is to synchronize the transmissions by many STAs, to deliver the information about the scheduled channel resources, and to inform the surrounding STAs that the channel will be busy during the OFDMA transmission.
The OFDMA transmission by the STAs starts Short Inter-Frame Spacing (SIFS) after the TF.
SIFS after the OFDMA transmissions by the STAs, the AP sends a Multi-Station Block Acknowledgement (MSBA) frame to acknowledge the successful transmissions.
The AP divides the available channel resources into resource units (RU), which define the time-frequency block that can be used for STA transmissions.
Within a single OFDMA transmission, all the allocated RUs have the same duration, which has an upper limit of $\approx \SI{5}{\ms}$ and is determined by the longest transmission.
The frequency width of RUs allocated for different STAs can be different: the smallest RU has a width of 26 OFDM tones which can be aggregated into 52-, 106-, 242-, 484-, and 996-tone RUs (the numbers are not all divisible by 26 because additional guard tones are inserted).
The aggregation of RUs has some limitations related to the simplicity considerations, and the placing of pilot tones, e.g., 26-tone RUs \#1 and \#2 can be aggregated into a 52-tone RU, but RUs \# 2 and \# 3 cannot.
The details are described in \cite{khorov2018tutorial}.
The \SI{20}{\MHz} band corresponds to a 242-tone RU, so OFDMA allows serving 9 STAs at a time.
\begin{figure}[h!]
\centering
\include{ofdma}
\vspace{-1em}
\caption{The uplink OFDMA sequence}
\label{fig:ofdma}
\end{figure}
The RUs can be allocated either for deterministic transmission by specific STAs, or for all the STAs at once to transmit with Uplink OFDMA Random Access (UORA).
In 802.11ax, a single STA can use no more than one RU (but the width of this RU can vary), and several STAs cannot use the same RU for deterministic transmissions.
The situation is different for UORA, which works as follows.
A STA generates a backoff counter $r$ randomly from the interval $\left[0, OCW_{min}\right]$, where $OCW_{min}$ is the contention window.
After receiving every TF, the STA compares $r$ with the number of RUs allocated for UORA and, if $r$ is lower than this number, it transmits its data in a randomly chosen RU.
If this transmission is unsuccessful, e.g., because of a collision caused by some other STA's transmission in the same RU, the STA doubles its contention window and repeats the procedure.
The minimal and maximal contention windows are the parameters specified by the AP.
In the new 802.11be amendment, some restrictions on OFDMA introduced in 802.11ax, such as the limit on one RU allocated to one STA, may be removed.
In \cite{avdotin2019enabling}, we show that allowing several STAs to transmit in the same RU in case of non-saturated traffic can help to equalize the load between many RUs and thus to decrease the collision probability.
In this paper, we show that allowing a STA to use several RUs can also be an efficient solution to cope with noise and interference from hidden STAs.
\section{Related Works}
\label{sec:litra}
Solutions for RTA in Wi-Fi are actively proposed both in the IEEE 802.11 WG and in scientific papers.
Some solutions are rather straightforward, e.g., to introduce a special enhanced distributed channel access (EDCA) access category for time-sensitive traffic \cite{genc2019wi}.
A variant of such a solution is used in the Auto Repetition (AR) mode designed to service low latency flows.
With AR, a STA repeatedly transmits a packet according to some special rules in order to achieve ``zero'' PER in the 802.11 links.
AR requires an additional EDCA queue for the low latency packets, which would have its own backoff counter, which should be should be counted down in a way to enable frame transmission for a given number of times within the latency budget.
An example of such solutions is the usage of multiple links on adjacent physical channels within a band with one PHY \cite{rodriguezmulti}.
The authors propose for each STA to run separate carrier sense functions on different channels and transmit data on one link at a time.
Such a solution can significantly decrease the channel access delay, which is useful for RTA.
Another solution \cite{adhikariproposals} is to semi-persistently allocate narrow bandwidth resources for expedited transmission of low latency data.
Also, it will be useful to enable the sharing of TXOP between Non-AP STAs and their AP and sharing of TXOPs between nodes across multiple BSSs via inter-BSS coordination.
These solutions can reduce the number of channel access attempts and thus decrease delays.
A possible improvement of OFDMA for RTA is the propose the Uplink Persistent Allocation (UPA) \cite{zuouse}.
This mechanism has been proposed for 802.11be to allow the AP to schedule RUs to a STA for a long time.
For that, the AP sends a UPA announcement frame which establishes the channel assignment to a STA.
Afterward, the AP can transmit short TF, which instead of long user info field for each user contains a short UPA indication (1 octet per user instead of 6), thus saving channel resources.
In \cite{avdotin2019ofdma}, we have developed a Cyclic Resource Allocation (CRA) algorithm to allocate OFDMA resources in the 802.11ax network in order to provide low latency with low packet loss ratio (PLR).
This algorithm uses the UORA functionality to detect situations when many STAs require channel resources. When such a situation is detected, it assigns RUs to all RTA STAs one by one.
This solution ensures that in case of necessity, every STA receives an RU, but at the same time, it does not use too many channel resources when the STAs do not need resources.
We have proposed a better algorithm, the Group Resource Allocation (GRA) in \cite{avdotin2019enabling} that requires modifications of the standard OFDMA procedure, which will be possible in the new 802.11be amendment.
When the AP detects a situation when a STA requires resources, it divides the STAs into equal groups and assigns an RU to each group.
We have shown that this algorithm performs better than CRA when the STAs generate non-saturated traffic, which is a typical scenario for RTA.
The CRA and GRA algorithms have a drawback: when assigning RUs to the STAs they do not take into account the possibility of STA data to be lost due to noise or due to the interference from non-OFDMA STAs.
In this paper, we show that these algorithms perform poorly in the case of a noisy channel and design more robust resource allocation algorithms for RTA.
\section{Problem Statement}
\label{sec:problem}
We consider a Wi-Fi network with one AP and $N$ RTA STAs.
The STAs generate a Poisson flow of data packets with intensity $\lambda$, which should be delivered to the AP within a delay budget $D$.
The packets which are not transmitted within the delay budget are lost.
The data packets generated by all STAs have the same length and can be transmitted with a single transmission in a 26-tone RU.
The STAs transmit their data with OFDMA using the RUs scheduled by the AP.
The period of TF transmission (further called \emph{slot}) by the AP equals $T$.
Let the channel width be equal to $F$ 26-tone RUs, out of which a maximum of $k$ 26-tone RUs can be allocated for the RTA STAs.
The STAs use the assigned RUs, which can be allocated either for deterministic transmissions or RA.
If more than one STA tries to transmit a frame in one RU at a time, then a collision happens, and the transmission attempt is unsuccessful.
We also assume that the channel is non-ideal. In essence, even if only one STA tries to transmit a frame in an RU, the transmission can be unsuccessful with probability $p$ due to the random channel noise or due to the interference from hidden STAs.
For such a scenario, we state the problem \emph{to develop an RU scheduling algorithm that can provide the packet loss rate less than $PLR_{max}$ and consume as little channel resources as possible}.
\section{Resource Assignment Algorithms for RTA}
\label{sec:algorithms}
In this section, we develop resource allocation algorithms aimed at minimization of RTA data transmission delay.
Since all these algorithms aim at minimizing delay, we assume that the network uses the minimal and maximal contention window set to zero to let the AP resolve the collisions instead of the STAs.
The main problem that the AP faces while scheduling RUs is that it does not know a priori which STAs currently need channel resources.
To solve this problem, the AP can wait for the STAs to transmit buffer status reports, but their transmission introduces additional delay comparable with the delay budget of several milliseconds.
For such a reason, we propose using an implicit way to determine the traffic.
For all the further presented algorithms, it works as follows.
Initially, the AP operates in the \emph{waiting mode}.
In this mode, it allocates a single RU for RA.
When any STA generates a data frame, it tries to transmit the frame in the allocated RU.
If this STA is the only STA which currently has data to transmit, its transmission will be successful.
Otherwise, there will be a collision in this RU, which is a signal that some STAs have uplink packets for transmission.
The AP should allocate more RUs but does not know to which STAs exactly.
In such a situation, the AP switches to the \emph{collision resolution mode}.
We further present three algorithms which differ in the AP behavior during the collision resolution mode.
\subsection{Noise Resistant Uplink OFDMA Random Access (NUORA)}
The first algorithm is an extension of UORA for noisy channels.
With standard UORA, when a STA makes an unsuccessful transmission, it makes a new transmission attempt in the next slot.
Such repetitions increase the delay.
At the same time, repeating the frame in the frequency direction instead of time does not increase the delay.
With NUORA, the AP allocates $k$ RUs only for RA, and the STA, which has data, sends a copy of its frame in $f$ randomly-chosen RUs, where $f$ is the algorithm parameter.
The AP allocates $k$ RUs for RA as long as there are unsuccessful transmissions in the allocated RUs.
If there are only empty RUs or RUs with successful transmissions during the slot, the AP switches back to the waiting mode and allocates one RU for RA.
An example of NUORA operation is shown in Fig. \ref{fig:uora}, where red hatching shows collision RUs, green hatching shows successful RUs, and numbers mean the STAs that try to transmit in corresponding RUs.
\begin{figure}[h!]
\centering
\include{uora}
\vspace{-1em}
\caption{An example of NUORA operation with parameters $k = 4$, $f = 2$. STAs 1, 2, 3 have data to transmit.}
\label{fig:uora}
\end{figure}
Even though repeating the frames increases the load on the channel and thus the probability of collision, frame repetition can improve the reliability against the noise.
\subsection{Noise Resistant Group Resource Allocation (NGRA)}
The idea of NGRA is to spread the load over the RUs in a more uniform fashion, excluding the situation when most contending STAs choose the same RU, while most of the remaining RUs are left unused.
The GRA algorithm presented in \cite{avdotin2019enabling} solves this problem by dividing the STAs into equal-sized groups and allocating an RU to each group.
We extend this idea in NGRA to make it more robust against noise by making $f$ transmission attempts within one slot.
When the AP switches to the collision resolution mode, it marks all the STAs as requiring resources.
Then the AP for each marked STA assigns $f$ random RUs, but while assigning resources for each STA the AP excludes the RUs assigned to $\lceil\frac{fN}{k}\rceil$ STAs.
The STAs transmit $f$ copies of their data frames in the assigned RUs.
After the slot, the AP marks all the STAs which correspond to RUs that did not contain any unsuccessful transmissions as not requiring resources.
In the next slot, the AP allocates $k - 1$ RUs to the STAs, which are still marked using the procedure described above, and also allocates one RU for RA, which can be used by the unmarked STAs if they suddenly generate more data.
The AP repeats the described procedure, and if there are collisions in the RU allocated for RA, then all the STAs which were previously marked as not needing resources are marked as needing resources again.
When all the RTA STAs are not marked as requiring resources, the AP stops the procedure and switches back to the waiting mode and allocates one RU for RA.
An example of NGRA operation is shown in Fig. \ref{fig:ngra}, where ``DA: x, y'' means that the RU is assigned for deterministic transmissions by STAs x and y.
NGRA allows several STAs to use the same RU, which is a feasible solution in the case of low RTA traffic intensity.
However, if the traffic becomes intense, such a solution may suffer from collisions.
\begin{figure}[h!]
\centering
\include{ngra}
\vspace{-1em}
\caption{An example of NGRA operation with parameters $N = 4$, $k = 4$, $f = 2$. STAs 1, 2, 3 have data to transmit.}
\label{fig:ngra}
\end{figure}
\subsection{Noise Resistant Cyclic Resource Allocation (NCRA)}
Another approach is the improved version of the CRA algorithm presented in \cite{avdotin2019enabling}.
With NCRA, the AP allocates one RU for RA, while the remaining RUs are assigned to no more than one STA cyclically, allowing each STA to transmit $f$ copies of their frames.
Specifically, the AP allocates RU 0 for RA, and then allocates RUs $1...f$ to STA 1, RUs $f+1...2f$ to STA 2, etc., until it reaches the last available RU.
The STAs that have been allocated RUs use these RUs to transmit their frames, while the remaining STAs can use the RU allocated for RA if they have any data.
After the slot, the AP examines the RUs, and assigns RUs again to the STAs, which could not transmit any copy of their data in the assigned RUs.
Then the AP keeps cycling through the remaining STAs, assigning $f$ RUs to each STA.
Such a procedure repeats as long as there are STAs that could not transmit any copy of their frames in the allocated RUs or there is an unsuccessful transmission in RA.
Afterward, the AP switches back to the waiting mode and allocates one RU for RA.
\begin{figure}[h!]
\centering
\include{ax}
\vspace{-1em}
\caption{An example of NCRA operation with parameters $N = 5$, $k = 5$, $f = 2$. STAs 1, 2, 4, 5 have data to transmit.}
\label{fig:ax}
\end{figure}
An example of the NCRA operation in the case of a noiseless channel is shown in Fig. \ref{fig:ngra}.
Such an approach can be more efficient than NGRA in the case when the number of STAs is not very high.
At the same time, cycling through all the available STAs introduces additional delay because a STA has to wait for its turn to transmit.
\section{Numerical Results}
\label{sec:results}
\begin{figure}[htb]
\centering
\subfloat[$p = 0$]{\includegraphics[width=0.39\textwidth]{adaptive-plot-1.pdf}\label{fig:plr0}}\\
\subfloat[$p = 0.1$]{\includegraphics[width=0.39\textwidth]{adaptive-plot-3.pdf}\label{fig:plr1}}\\
\subfloat[$p = 0.2$]{\includegraphics[width=0.39\textwidth]{adaptive-plot-5.pdf}\label{fig:plr2}}
\caption{The dependency of PLR on the packets arrival rate}
\label{fig:plr}
\vspace{-1em}
\end{figure}
\begin{figure}[htb]
\centering
\subfloat[$p = 0$]{\includegraphics[width=0.39\textwidth]{adaptive-plot-2.pdf}\label{fig:goodput0}}\\
\subfloat[$p = 0.1$]{\includegraphics[width=0.39\textwidth]{adaptive-plot-4.pdf}\label{fig:goodput1}}\\
\subfloat[$p = 0.2$]{\includegraphics[width=0.39\textwidth]{adaptive-plot-6.pdf}\label{fig:goodput2}}
\caption{The dependency of the portion of channel resources available for Non-RTA STAs on the packets arrival rate}
\label{fig:goodput}
\vspace{-1em}
\end{figure}
To evaluate the performance of designed algorithms, we simulate the operation of a Wi-Fi network in the scenario described in Section \ref{sec:problem}.
We consider that there are $N = 18$ STAs in the network, and the network uses a \SI{40}{\MHz} channel, so the maximal number of 26-tone RUs is $F = 18$, out of which a maximum of $k = 9$ RUs can be allocated for RTA STAs.
The OFDMA slot duration equals $T \approx \SI{270}{\us}$, and the delay budget is $D = 5 T$, which corresponds to strict RTA scenario.
RTA STAs transmit short packets so that the size of 26-tone RUs is sufficient to transmit a packet at once.
We vary the RTA traffic intensity $\lambda$ and the probability $p$ of transmission in RU to be damaged by interference or noise.
We measure the PLR (see Fig. \ref{fig:plr}), i.e., the portion of packets discarded due to exceeding the delay budget, and the portion of channel resources available for Non-RTA STA transmissions (see Fig. \ref{fig:goodput}).
We consider the algorithms NUORA, NGRA, and NCRA, described in Section \ref{sec:algorithms} and try different values of parameter $f$: the number of frame copies that a STA makes during the contention resolution.
We show only the results for $f = 1, 2, 3$, because $f \geq 4 $ provides higher PLR for the considered range of traffic intensity.
When the parameter $f$ equals $1$, the algorithms NUORA, NGRA, and NCRA become the same as the algorithms UORA, GRA, and CRA presented and studied in \cite{avdotin2019enabling}.
In all scenarios, we see that with equal parameters, NGRA achieves lower PLR than NUORA.
Such a result is explained by the fact that NGRA groups the STAs and thus limits the collision probability.
At the same time, NGRA leaves a greater portion of channel resources for Non-RTA STAs, which means that in case of collisions, NGRA resolves them faster than NUORA.
In the considered scenario, NCRA reaches the lowest PLR because it excludes the collisions during the contention resolution phase.
However, such efficiency comes at the cost of a higher channel resource consumption, because the contention resolution phase for NCRA lasts much longer than for NGRA and NUORA.
In the scenario without noise shown in Figure \ref{fig:plr0}, increasing the number of frame repetitions $f$ for NGRA and NUORA can either decrease or increase the PLR depending on the traffic intensity.
If the traffic rate is not very high, making several transmission attempts in a slot increases the success probability: even if one copy of a frame is destroyed in a collision, another copy can still be delivered.
As a result, with $f = 3$ and low rate traffic NUORA and NGRA can achieve the PLR equal to $10^{-5}$: a typical requirement of RTA scenarios.
At the same time, with higher traffic rates, when more STAs are trying to send their data at a time, increasing the number of repetitions, on the contrary, increases the collision rate and thus the PLR.
In the case of NCRA, in a scenario without noise increasing, the parameter $k$ only increases the PLR and the channel resource consumption, because the repetition of frames increases the time it takes for the AP to cycle through all the STAs.
The situation is different in the case of the noisy channel (or the presence of hidden STAs).
For all the algorithms and the possibility that the frame will be lost due to the noise significantly increases the PLR, and for $f = 1$, none of the algorithms can satisfy the PLR requirement of $10^{-5}$.
Thus the previously presented algorithms CRA and GRA become inefficient for noisy channels.
At the same time, frame repetitions make the algorithms more stable against the noise.
Moreover, the results for NUORA and NGRA $f = 3$ almost do not change with increase of $p$, and even for $p = 0.2$ they can provide PLR lower than $10^{-5}$ for traffic intensity below~$\approx 6$ frames per second.
The results for NCRA are more sensitive to the noise, and generally we can conclure that the best number of repetitions depends on the intensity of noise: for $p = 0.1$, see Fig. \ref{fig:plr1}, it is better to use $f = 2$ repetitions, while for $p = 0.2$, see Fig. \ref{fig:plr2}, it is better to use $f = 3$ repetitions, but for very high traffic rate the PLR of $10^{-5}$ becomes unachievable.
As for the portion of channel resources left for Non-RTA STAs, it does not significantly depend on $p$ for all the algorithms.
It is almost the same for NUORA and NGRA, and it is lower for NCRA.
For NCRA, we can note the relation between the number of consumed channel resources with the PLR: the portion of remaining channel resources approaches to 50\% when the PLR is near $10^{-5}$.
\section{Conclusion}
\label{sec:conclusion}
In this paper, we have studied the problem of RTA service in new generation Wi-Fi networks with the usage of OFDMA.
We consider the scenario when RTA STAs transmit time-sensitive data in the uplink, and the AP solves the problem of OFDMA resource allocation to provide a low delay of $1$--$10$ milliseconds with a probability of packet loss not higher than $10^{-5}$.
The main problem that the AP faces while scheduling the resources is that it does not know which STAs require resources at the moment, and collecting the requests for channel resources from the STAs introduces a delay close to the delay budget of data frames.
To solve this problem, we propose using algorithms based on random access, which use implicit signaling about the requirements for channel resources from the STAs.
Such algorithms have been considered previously in \cite{avdotin2019ofdma, avdotin2019enabling}, but we show that these algorithms perform poorly in non-ideal channels when transmission attempts made by STAs can fail due to the random noise or interference from the hidden STAs.
We significantly extend these algorithms to cope with noise and interference: we propose for each STA to transmit several copies of their frames during one OFDMA transmission in different RUs.
We show that such an approach not only allows providing the low PLR for scenarios with high noise but can significantly reduce the PLR even for noiseless scenarios.
We have proposed three algorithms that implement this approach: NUORA, NGRA, and NCRA, out of which NGRA and NCRA show the best performance.
The algorithms have a configurable parameter $f$: the number of copies of the frame that the STA transmits during an OFDMA transmission.
We have shown that the best value of this parameter depends on the traffic rate and on the probability of frame loss due to noise or interference.
NCRA provides lower PLR than NGRA but consumes more channel resources, so the choice of which algorithm to use should be made according to the scenario requirements: if the traffic is low or the requirement on PLR is not too strict it is better to use NGRA, while for heavy traffic it is better to use NCRA.
As a direction of future work, we plan to develop an adaptive approach to configure the parameters of the proposed algorithms automatically.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
We study the question of whether knowing the exact times a point in an unknown dynamical system enters an open set is enough to determine the system. In this paper, a topological dynamical system is a pair $(X,T)$ where $X$ is a compact metric space with metric $d$ (all metrics will be refered to as $d$ even for different spaces if no ambiguity arises) and $T:X \to X$ is a homeomorphism. Recall that $(X,T)$ is $\textit{minimal}$ if for all $x_0 \in X$ the orbit $T^{\bZ}x_0 = \{T^n x_0 ~|~ n \in \bZ\}$ is dense and is \textit{transitive} if some orbit is dense. If $x_0 \in X$ and $U \subset X$ is an open set then we can define the set of return times $$\mathcal{R}_{(X,T)}(x_0, U) = \{ n \in \bZ ~|~ T^nx_0 \in U \}.$$ Thus our question may now be stated as follows: Given two minimal topological dynamical systems $(X_1, T_1)$ and $(X_2, T_2)$ with $x_1 \in X_1, x_2 \in X_2$ and $U_1 \subset X_1, U_2 \subset X_2$ open such that $\mathcal{R}_{(X_1,T_1)}(x_1, U_1) = \mathcal{R}_{(X_2,T_2)}(x_2, U_2)$, then is it necessarily true that $(X_1, T_1)$ and $(X_2, T_2)$ are isomorphic? If so, is there an isomorphism mapping $x_1$ to $x_2$?
Recall that an isomorphism $\phi:(X_1, T_1) \to (X_2, T_2)$ is a homeomorphism $\phi:X_1 \to X_2$ such that $\phi \circ T_1 = T_2 \circ \phi$. One can contrast this to the Taken's Reconstruction Theorem \cite{TakensOriginal} as well as recent developments \cite{GutmanTakens} where one instead is given a system $(X,T)$ where the $\textit{dimension}$ of $X$ is $d$ and asks whether the delay observation mapping $X \to [0,1]^{2d+1}$ given by $x \mapsto (h(x), h(Tx), \ldots, h(T^{2d+1}x))$ is injective for some \textit{generic} continuous $h:X \to [0,1]$. Thus our question can instead be posed as asking to what extent the mapping $$(X, T, x_0, U) \mapsto \left(\mathds{1}_U(T^n x_0) \right)_{n \in \bZ}$$ is injective up to isomorphism.
\subsection{Reconstructing Kronecker Systems}
Let us now start with some motivating examples where no such isomorphism exists.
\begin{eg} Let $X_1 = X_2 = \bT = \bR/\bZ$ and suppose $\alpha \in \bT$ is irrational. Let $$U_1=U_2 = (-\epsilon, \epsilon) \cup (-\epsilon + \frac{1}{2}, \epsilon + \frac{1}{2}) \subset \bT.$$ Then for each $n \in \bZ$ we have that $n\alpha \in U_1$ if and only if $n(\alpha + \frac{1}{2}) \in U_2$. However, the minimal systems $(\bT, x \mapsto x+\alpha)$ and $(\bT, x \mapsto x + \alpha + \frac{1}{2})$ are not isomorphic.
\end{eg}
\begin{eg}\label{eg: Torus factor} Let $X_1 = \bT$, $X_2 = \bT^2$, $\alpha_1 = \sqrt{2} \in \bT$ and $\alpha_2 = (\sqrt{2}, \sqrt{3}) \in \bT^2$. Let $U_1 \subset \bT$ be any non-empty proper open subset and let $U_2 = U_1 \times \bT$. Then clearly $n \alpha_1 \in U_1$ if and only if $n\alpha_2 \in U_2$. Yet $X_1$ and $X_2$ are not even homeomorphic.
\end{eg}
These two examples highlight that open sets with non-trivial translational symmetries are a source of issues. For a compact abelian metrizable group $(K, +)$ and $A \subset K$ we can define the stabilizer $$\operatorname{Stab}_K(A) = \{k \in K ~|~ A + k = A \}.$$ Note that in our examples above the stabilizers are not trivial; the stabilizer of $(-\epsilon, \epsilon) \cup (-\epsilon + \frac{1}{2}, \epsilon + \frac{1}{2}) $ is $\{0, \frac{1}{2}\}$ while the stabilizer of $U_1 \times \bT$, for $U_1 \subset \bT$ non-empty and proper, is the vertical subgroup $\{0\} \times \bT$.
Our first main result demonstrates that the only way two non-isomorphic Kronecker systems can yield the same set of return times is if the closure of one of the defining open sets has a non-trivial stabilizer.
\begin{thm}\label{thm: Kronecker systems isomorphic} Let $(K_1, +)$ and $(K_2, +)$ be two compact metrizable abelian groups and suppose that $\alpha_1 \in K_1$ and $\alpha_2 \in K_2$ are such that $\overline{\bZ\alpha_i} = K_i$ for $i=1,2$. Suppose that $U_1 \subset K_1$ and $U_2 \subset K_2$ are open sets such that the stabilizers of their closures are trivial, i.e., $\operatorname{Stab}_{K_i}(\overline{U_i}) = \{0\}$. Then if $$\{n \in \bZ ~|~ n\alpha_1 \in U_1\} = \{n \in \bZ ~|~ n\alpha_2 \in U_2\}$$ then there exists an isomorphism of topological groups (so continuous) $K_1 \to K_2$ mapping $\alpha_1$ to $\alpha_2$.\end{thm}
Note that if one removes a point not on the trajectory $\{n\alpha_i ~|~ n \in \bZ\}$ from $U_i$ then $U_i$ remains open and the return times and the closures do not change, so it is indeed natural to study the stabilizer of the closure $\overline{U_i}$ rather than $U_i$.
\subsection{Detecting Kronecker Factors of Minimal Systems}
We now turn our attention to minimal topological systems. As demonstrated in Example~\ref{eg: Torus factor} if a minimal system has a non-trivial factor, then it shares a set of return times with it. Of course, this is also the case if one replaces in that example the rotation $(x,y) \mapsto (x+\sqrt{2},y+\sqrt{3})$ with an ergodic skew product such as $\bT^2 \to \bT^2: (x,y) \mapsto (x+\sqrt{2}, x+y)$. Our next result shows that essentially the only way a minimal system can share a set of return times with a Kronecker system is if the latter is a factor of the former.
\begin{thm}\label{thm: Kronecker factor of minimal system} Let $(X,T)$ be a minimal topological dynamical system and $U \subset X$ be a non-empty open set and $x_0 \in X$. Let $(K, +)$ be a compact metrizable abelian group and $\alpha \in K$ such that $\overline{\bZ \alpha} = K$ and let $U' \subset K$ be a non-empty open set. Suppose that \begin{align}\label{equality of return times} \{ n \in \bZ ~|~ T^nx_0 \in U \} = \{n \in \bZ ~|~ n\alpha \in U'\} \end{align} and that $\operatorname{Stab}_K(\overline{U'}) = \{ 0 \}$. Then the pointed Kronecker system $(K,0 , k \mapsto k+\alpha)$ is a factor of the pointed system $(X, x_0, T)$, i.e., there is a continuous map $\phi: X \to K$ with $\phi(x_0) = 0$ satisfying $$\phi(Tx) = \phi(x) + \alpha \text{ for all } x \in X.$$
\end{thm}
Note that Theorem~\ref{thm: Kronecker factor of minimal system} immediately implies Theorem~\ref{thm: Kronecker systems isomorphic} (apply twice to both Kronecker systems to obtain two factor maps that are inverses) since an isomorphism of Kronecker systems that preserves the zero elements is necessarily a group isomorphism. The following example shows that we cannot replace the minimality assumption with transitivity.
\begin{eg}(Insufficient to assume transitivity instead of minimality) Let $X \subset [-1, 1]$ be the set $X = \{ x_n ~|~ n \in \bZ \cup \{-\infty, \infty \} \}$ where $x_{\pm \infty} = \pm 1$ and for $n\in \bZ$,
$$x_n = \begin{cases}
-1 + \frac{1}{|n|} & n < 0 \\
0 & n = 0 \\
1 - \frac{1}{n} & n >0
\end{cases}$$
Thus $X$ is closed and all $x_n$ with $n \in \bZ$ are isolated points. So we have a homeomorphism $T:X \to X$ mapping $x_n$ to $x_{n+1}$ and fixing $x_{\pm \infty}$. Hence it is transitive (all $x_n$ with $n \in \bZ$ have dense orbits) but not minimal. Now $U = \{x_n ~|~ n \in 2\bZ\}$ is open and the return times set $2\bZ = \{ n \in \bZ ~|~ T^n x_0 \in U\}$ is also equal to $\{n \in \bZ ~|~ n\alpha \in U'\}$ where $U' = \{0\} \subset K = \bZ/2\bZ$ is open and $\alpha = 1 \in K$. But there is no factor $\pi$ from $(X,T)$ to the Kronecker system $(K, k \mapsto k+1)$ as it would yield the contradiction $\pi(x_{\infty}) = \pi(Tx_{\infty}) = \pi(x_{\infty}) + 1$.
\end{eg}
\subsection{Return times along a polynomial sequence}
We recall the following result which follows immediately from the Polynomial Weyl Equidistribution \cite{WeylPolynomial} and the fact that connected compact abelian groups have no non-trivial characters with finite image.
\begin{prop} Let $K$ be a \textbf{connected} compact abelian group and suppose that $P(x) \in \bZ[x]$ is a non-constant polynomial. If $\alpha \in K$ is such that $\overline{\bZ \alpha} = K$ then $P(\bZ)\alpha = \{P(n)\alpha ~|~ n \in \bZ\}$ is dense in $K$.
\end{prop}
Given this, it is natural to ask whether we can extend Theorem~\ref{thm: Kronecker systems isomorphic} to the case where we only know the set of return times inside a polynomial sequence, i.e., the set $\{ n ~|~ P(n)\alpha \in U\}$. The next result shows that this is indeed the case.
\begin{thm}\label{thm: polynomial return times} Let $K_1$ and $K_2$ be compact connected abelian groups and suppose that $\alpha_i \in K_i$ with $\overline{\bZ\alpha_i} = K_i$. Let $P(x) \in \bZ[x]$ be a polynomial with $P(0) = 0$. Let $U_i \subset K_i$ be non-empty open sets and let $\mathcal{R}_i = \{n \in \bZ ~|~ P(n)\alpha_i \in U_i\}$. If $\mathcal{R}_1 = \mathcal{R}_2$ and $\operatorname{Stab}_{K_1}(\overline{U_1}) = \{0 \}$ and $\operatorname{Stab}_{K_2}(\overline{U_2}) = \{0 \}$ then there exists an isomorphism $K_1 \to K_2$ (of topological groups, so continuous) mapping $P(n)\alpha_1$ to $P(n)\alpha_2$ for each $n \in \bZ$. In particular, if $P(\bZ)$ is not contained in any proper subgroup of $\bZ$ then this isomorphism maps $\alpha_1$ to $\alpha_2$. \end{thm}
\begin{eg} Consider the polynomial $P(n) = n^5-n$ and let $\alpha_1 = \sqrt{2} \in \bT$ and $\alpha_2 = \sqrt{2} + \frac{1}{5} \in \bT$. Then for any open set $U \subset \bT$ we have that $\{n \in \bZ ~|~ P(n)\alpha_1 \in U\} = \{n \in \bZ ~|~ P(n)\alpha_2 \in U\} $ and indeed there is an isomorphism (the identity map) mapping $P(n)\alpha_1 $ to $P(n)\alpha_2$ as they are equal, but there is no isomorphism mapping $\alpha_1$ to $\alpha_2$.
\end{eg}
We remark that it seems that there is no obvious way to extend Theorem~\ref{thm: Kronecker factor of minimal system} to polynomial times under the assumption that $X$ is connected since an example of Pavlov \cite{PavlovCounterexamples} shows that there exists a minimal connected system $(X,T)$ such that $\{T^{n^2} x_0 ~|~ n \in \bZ\}$ is not dense for some $x_0 \in X$.
\subsection{Return times sets of nilmanifolds}
It is natural to try to extend Theorem~\ref{thm: Kronecker systems isomorphic} on the return times in Kronecker systems to other homogeneous spaces such as nilmanifolds. The following is a partial result on this which establishes that if a Kronecker system $(K,+)$ and a minimal nilsystem $(G/\Gamma, T)$ share the same return times, with the closures of the defining open sets having trivial stabilizers under translations of $K$ and $G$ respectively, then they must be isomorphic as dynamical systems.
\begin{thm}\label{thm: nilsystem and kronecker} Let $X=G/\Gamma$ be a nilmanifold, where $G$ is a nilpotent Lie group and $\Gamma \leq G$ is a cocompact discrete subgroup. Suppose that $\tau \in G$ is such that $(X,T)$ is minimal, where $T:X \to X$ is given by $Tx = \tau x$ for $x \in X$. Suppose that $U \subset X$ is open and satisfies that $\operatorname{Stab}_G(\overline{U}):= \{g \in G ~|~ g\overline{U} = \overline{U}\}$ consists of only those $g \in G$ such that $gx = x$ for all $x \in X$. Now suppose that $(K,+)$ is a compact abelian group and $\alpha \in K$ is such that $\overline{\bZ \alpha} = K$ and $V \subset K$ is open such that $\operatorname{Stab}_K(\overline{V}) = \{0\}$ and $$\{ n \in \bZ ~|~ T^nx_0 \in U\} = \{n \in \bZ ~|~ n\alpha \in V\}$$ for some $x_0 \in X$. Then the pointed system $(X, x_0, T)$ is isomorphic to the pointed Kronecker system $(K,0 , k \mapsto k+\alpha)$, i.e., there is a homeomorphism $\phi: X \to K$ with $\phi(x_0) = 0$ satisfying $$\phi(Tx) = \alpha + \phi(x) \text{ for all } x \in X.$$
\end{thm}
Note that Theorem~\ref{thm: Kronecker factor of minimal system} shows that such a continuous map $\phi$ exists but does not show that it is a homeomorphism (and indeed it may not be without the assumption on $\operatorname{Stab}_G(\overline{U})$). Thus it suffices to show the existence of an inverse to $\phi$, which will be established in Section~\ref{sec: Nilsystems}.
It is interesting to ask whether the same result holds more generally for two nilsystems rather than a nilsystem and a Kronecker system. Furthermore, one can extend this question to more general homogeneous spaces.
\subsection{An explicit reconstruction for Jordan Measurable sets} One way of stating Theorem~\ref{thm: Kronecker factor of minimal system} is that one can uniquely reconstruct a Kronecker system $(K, x \mapsto x+\alpha)$, where $K$ is a compact group with $\overline{\bZ\alpha} = K$, from the set $\mathcal{R} = \{n ~|~ n\alpha \in U\}$ provided that $U$ is some (unknown) open set with $\operatorname{Stab}_K(\overline{U})$ is trivial. If we further assume that $U$ is Jordan measurable (recall that this means that $m_K(\overline{U}) = m_K(U)$ where $m_K$ is the Haar measure) then the following result shows that there is in fact a rather explicit reconstruction of $(K, \alpha)$ from $\mathcal{R}$. Let $\bU = \{ z \in \bC ~|~ |z|=1\}$ denote the unit complex numbers.
\begin{thm}\label{thm: explicit reconstruction} Let $K$ be a compact abelian group and let $\alpha \in K$ be such that $\overline{\bZ\alpha} = K$ and suppose $U \subset K$ is a Jordan measurable open set such that $\operatorname{Stab}_K(\overline{U})$ is trivial. Let $\mathcal{R} = \{n ~|~ n\alpha \in U\}$ and let $$ \Lambda =
\left\{ \lambda \in \bU ~|~ \frac{1}{N}\sum_{n=1}^N \lambda^n \mathds{1}_{\mathcal{R}}(n) \text{ does not converge to } 0 \text{ as } N \to \infty \right\}.$$ Then $\Lambda = \{ \lambda_1, \lambda_2, \ldots\}$ is countable and there is an injective continuous group homomorphism $K \to \bU^{\bN}$ mapping $\alpha$ to $ \vec{\lambda} = (\lambda_1, \lambda_2, \ldots )$. In particular, $K$ is isomorphic to the closure of the subgroup generated by $\vec{\lambda}$. \end{thm}
Note that this implies Theorem~\ref{thm: Kronecker factor of minimal system} in the case where the open sets are Jordan measurable but it is not difficult to construct examples with $U$ not Jordan measurable where this reconstruction is invalid despite Theorem~\ref{thm: Kronecker factor of minimal system} still guaranteeing the uniqueness of the Kronecker system.
\subsection{Further questions}
We now gather some open questions. Our first question asks about a natural extension of Theorem~\ref{thm: nilsystem and kronecker} to two nilsystems and more general homogeneous spaces.
\begin{question} Let $X_1=G_1/\Gamma_1$ and $X_2=G_2/\Gamma_2$ be homogeneous spaces, where $G_i$ are Polish groups and $\Gamma_i \leq G_i$ are cocompact discrete subgroups. For all $i=1,2$, suppose that $U_i \subset X_i$ is an open set with closure having a trivial stabilizer in the sense that whenever $g\in G$ is such that $g\overline{U_i} = \overline{U_i}$ then $gx=x$ for all $x \in X_i$. Suppose that $\tau_i \in G_i$ are such that $(X_i, x \mapsto \tau_i x)$ are minimal systems and $$\{n \in \bZ ~|~ \tau_1^n x_1 \in U_1\} = \{n \in \bZ ~|~ \tau_2^n x_2 \in U_2\}$$ for some $x_1 \in X_1$ and $x_2 \in X_2$. Then are the systems $(X_1, x \mapsto \tau_1 x)$ and $(X_2, x \mapsto \tau_2 x)$ isomorphic (via a map sending $x_1$ to $x_2$)? If not true in general, is it true if $G_i$ are nilpotent Lie groups?\end{question}
The next question asks whether one can extend our results on minimal dynamical $\bZ$ systems to actions of other groups. It turns out that this seems difficult even without any topology, so we assume full orbits rather than just dense orbits as follows.
\begin{question}\label{question: G sets} Suppose that $G$ is a group acting on sets $X_1$ and $X_2$ transitively. Thus there are $x_1 \in X_1$ and $x_2 \in X_2$ with $Gx_1 = X_1$ and $Gx_2 = X_2$. Suppose that $U_1 \subset X_1$ and $U_2 \subset X_2$ are subsets with trivial setwise stabilizer, i.e., $$\{g \in G ~|~ gU_1 = U_1\} = \{1\} = \{g \in G ~|~ gU_2 = U_2\}.$$ If $\{g \in G ~|~ gx_1 \in U_1\} = \{g \in G ~|~ gx_2 \in U_2\}$ then does it mean that the two actions are isomorphic? That is, does there exist a bijection $\phi:X_1 \to X_2$ such that $\phi(gx) = g\phi(x)$ for all $g \in G$ and $x \in X_1$? Does there exist one mapping $x_1$ to $x_2$? \end{question}
Using the language of \cite{DistinguishableOriginal} and \cite{DistinguishabilityInfiniteGroups} such group actions satisfying the trivial setwise stabilizer hypothesis are called $2$-distinguishable. This question is already interesting for $G$ finite. In fact, we can simplify this to the following interesting question, which again is already interesting for finite sets (we will show this equivalence in Section~\ref{section: equivalence of questions}).
\begin{mydef} Let $G$ be a group acting on a set $X$. We say that $U \subset X$ is \textit{simple} (for this action) if whenever $\pi:X \to X'$ is a factor (i.e., $X'$ is a $G$-set and $\pi:X \to X'$ is a surjective map such that $\pi(gx) = g\pi(x)$ for all $g \in G$, $x \in X$) such that $U = \pi^{-1}(U')$ for some $U' \subset X'$, then $\pi$ is a bijection (isomorphism of $G$-sets). In other words, $U$ is simple if it can not be realised as a preimage of a factor in a non-trivial way (i.e., the factor is not an isomorphism).\end{mydef}
\begin{question}\label{question: stable implies simple} Let $G$ be a group acting transitively on a set $X$ and suppose that $U \subset X$ has trivial setwise stabilizer, i.e., $\{g \in G ~|~ gU = U\}$ consists of only $1 \in G$. Then is it true that $U$ is simple for this $G$-action? In other words, is it true that if $\mathcal{B} \subset 2^X$ is a $G$-invariant partition of $X$ such that $U$ is a union of elements in $\mathcal{B}$, then $\mathcal{B}$ consists of only singletons?
\end{question}
\textbf{Acknowledgements:} The authors were partially supported by the Australian Research Council grant DP210100162. They are grateful to Sean Gasiorek and Robert Marangell for interesting discussions.
\section{Bohr Set Return Times of Minimal Systems (Proof of Theorem~\ref{thm: Kronecker factor of minimal system})}
\begin{proof}[Proof of Theorem~\ref{thm: Kronecker factor of minimal system}] Consider the product system $(Z, S)$ where $Z = X \times K$ and $S:Z \to Z$ is given by $$S(x,k) = (Tx, k+\alpha).$$ Let $\Theta = \overline{S^{\bZ}z_0}$ be the orbit closure of $z_0 = (x_0, 0) \in Z$. Let $\pi_X:\Theta \to X$ and $\pi_K: \Theta \to K$ denote the projection maps, which are surjective by the minimality of $(X,T)$ and $(K, k \mapsto k+\alpha)$. Let $$H = \{ h \in K ~|~ (x_0, h) \in \Theta\}.$$
\textbf{Claim:} $H$ is a closed subgroup of $K$. \\
Note that $(x_0, 0) = z_0 \in \Theta$ so $0 \in H$. Now if $h, h' \in H$ then that means $(x_0, h), (x_0, h') \in \Theta$ and thus there exists a sequence $n_1, n_2, \ldots \in \bZ$ such that $$S^{n_i}z_0 = (T^{n_i} x_0, n_i \alpha) \to (x_0, h)$$ as $i \to \infty$ and another sequence $n'_1, n'_2 \ldots \in \bZ$ such that $(T^{n'_i} x_0, n'_i \alpha) \to (x_0, h')$. Now fix $\epsilon > 0.$ We may choose $J = J(\epsilon) \in \bN$ such that\footnote{By this we mean that we have fixed an invariant metric $d_K$ on $K$ and we write $k \approx_{\epsilon} k'$ if $d_K(k, k') < \epsilon$ for $k,k' \in K$. } $n_J\alpha \approx_{\epsilon} h$ and choose $\delta >0$ such that $$d(T^{n_J}x , x_0) < \epsilon \text{ whenever } d(x,x_0) < \delta.$$ Now take $I$ large enough so that $d(T^{n'_I}x_0, x_0) < \delta$ and $n'_I \alpha \approx_{\epsilon} h'$. Thus $d(T^{n_J + n'_I}x_0, x_0) < \epsilon$ and $(n_J + n'_I)\alpha \approx_{2\epsilon} h + h'$. As $\epsilon>0$ is arbitrary, this means $(x_0, h + h') \in \overline{S^{\bZ}z_0} = \Theta$, thus $h+h' \in H$. Finally, notice that $H$ is closed (as it is $\pi_K(\Theta \cap (\{x_0\} \times K))$) and so it is a closed non-empty sub-semigroup and thus a closed subgroup as $K$ is compact.
Now for $x \in X$ let $H_{x} = \{k \in K ~|~ (x, k) \in \Theta \}$, thus $H = H_{x_0}$.
\textbf{Claim:} For each $x\in X$, we have that $H_{x}$ is a coset of $H$, i.e., $H_x$ and $H_{x'}$ are translates of each other for all $x, x' \in X$. \\
To see this note that by minimality of $(X,T)$, there exists a sequence $n_1, n_2, \ldots \in \bZ$ such that $T^{n_i}x \to x'$ and by compactness we suppose that $n_i\alpha \to \alpha_{x,x'} \in K$. It follows that $H_{x} + \alpha_{x,x'} \subset H_{x'}$. In particular this means that $\alpha_{0, x} + \alpha_{x, 0} \in H$, so $$H + \alpha_{0,x} = H - (\alpha_{0, x} + \alpha_{x, 0}) + \alpha_{0,x} = H - \alpha_{x,0} \supset H_x$$ and thus $H_x = H + \alpha_{0,x}$ is a coset of $H$ as desired.
\textbf{Claim:} $H \subset \operatorname{Stab}_K(\overline{U'})$. \\
To see this suppose that $h \in H$ and $u' \in U'$. Then by the surjectivity of $\pi_K:\Theta \to K$ there exists $x \in X$ such that $(x, u') \in \Theta$. Now we may find a sequence $n_1, n_2, \ldots \in \bZ$ such that $n_i \alpha \to u'$ and $T^{n_i}x_0 \to x$. So for large enough $i$, we have $n_i\alpha \in U'$ and thus by the assumption of the equality of return times (\ref{equality of return times}) we have $T^{n_i}x_0 \in U$. Since $(T^{n_i}x_0, n_i\alpha) \in \Theta$ we must have that $(T^{n_i}x_0, n_i\alpha + h) \in \Theta$ as $H_{T^{n_i}x_0}$ is a coset of $H$. This means that, for each fixed $i$, we may find a sequence $m_1, m_2, \ldots \in \bZ$ such that $S^{m_j}z_0 \to (T^{n_i}x_0, n_i\alpha + h)$. So for large enough $j$ we have that $T^{m_j}x_0$ is so close to $T^{n_i}x_0 \in U$ that $T^{m_j}x_0 \in U$ and so again by the equality of return times we have $m_j\alpha \in U'$. But as $m_j \alpha \to n_i\alpha + h$, we must have that $n_i\alpha + h \in \overline{U'}$. Finally, as $n_i\alpha \to u'$ we must have that $u' + h \in \overline{U'}$. Thus as $u' \in U'$ is arbitrary we must have that $h + U' \subset \overline{U'}$ and by continuity of translation $h+\overline{U'} \subset \overline{U'}$. Thus $h \in \operatorname{Stab}_K(\overline{U'})$ as claimed.
Now by the assumption that this stabilizer is trivial, we get that $H$ is trivial and thus $\pi_X:\Theta \to X$ is injective and hence a homeomorphism. Thus our desired factor is $\pi_K \circ \pi_X^{-1}:X \to K$. \end{proof}
\section{Polynomial return times (proof of Theorem~\ref{thm: polynomial return times})}
\subsection{The case of compact connected abelian Lie groups}
We now embark on proving Theorem~\ref{thm: polynomial return times}. We first prove this for the case where $K_1$ and $K_2$ are compact connected abelian \textbf{Lie} groups, i.e., subgroups of a finite dimensional torus. We leave the more subtle case of non-Lie groups to the next subsection.
\begin{prop}\label{prop: polynomial orbit closure in compact Lie group} Let $K$ be a compact abelian Lie group with $\alpha \in K$ such that $\bZ\alpha$ is dense in $K$. Let $K_0$ be the connected component of the identity, thus $d = |K / K_0|$ is finite (as $K$ is a compact Lie group). Let $P(x) \in \bZ[x]$ be a non-constant polynomial with $P(0) = 0$. Then $$\overline{P(d\bZ) \alpha} = K_0$$ and $$\overline{P(\bZ)\alpha} = \bigcup_{a \in A} \left(K_0 + a \right)$$ for some finite set $A \subset K$.
\end{prop}
\begin{proof} Note that $dk \in K_0$ for all $k \in K$. In particular $\bZ d \alpha \subset K_0$. Let $K'_0 = \overline{\bZ d\alpha}$. Note that $K'_0 \subset K_0$ and it is of finite index in $K$ since $$K = \overline{\bZ\alpha} = \bigcup_{m = 0}^{d-1} \overline{(d\bZ + m)\alpha} = \bigcup_{m = 0}^{d-1} \left(K'_0 + m\alpha \right).$$ Thus $K'_0$ is of finite index in $K_0$ as well. But as $K_0$ is connected, we must have that $K'_0 = K_0$. Now let $Q(x) = \frac{1}{d}P(dx) \in \bZ[x]$ (as $P(0) = 0$). From Weyl equidistribution and connectedness of $K_0$ we see that the sequence $Q(1)d\alpha, Q(2)d\alpha, Q(3) d\alpha \ldots $ equidistributes in $K_0$. As $Q(n)(d\alpha) = P(dn)\alpha$ this implies the first claim that $$\overline{P(d\bZ) \alpha} = K_0.$$
Now for the second claim, we write $$\overline{P(\bZ)\alpha} = \bigcup_{m=0}^{d-1} \overline{P(d\bZ + m)\alpha} = \bigcup_{m=0}^{d-1} \overline{P_m(d\bZ)\alpha + a_m} $$ for some non-constant $P_m(x) \in \bZ[x]$ with $P_m(0) = 0$ and $a_m \in K$. Thus applying the previous claim to the $P_m$ we get that $\overline{P_m(d\bZ)\alpha + a_m}$ is a coset of $K_0$, as required. \end{proof}
\begin{prop} Let $K_1$ and $K_2$ be compact connected abelian Lie groups and suppose that $\alpha_i \in K_i$ with $\overline{\bZ\alpha_i} = K_i$. Let $P(x) \in \bZ[x]$ be a polynomial with $P(0) = 0$ such that $P(\bZ)$ is not contained in any proper subgroup of $\bZ$. Let $U_i \subset K_i$ be non-empty open sets and let $\mathcal{R}_i = \{n \in \bZ ~|~ P(n)\alpha_i \in U_i\}$. If $\mathcal{R}_1 = \mathcal{R}_2$ and $\operatorname{Stab}_{K_1}(\overline{U_1}) = \{0 \}$ and $\operatorname{Stab}_{K_2}(\overline{U_2}) = \{0 \}$ then there exists an isomorphism $K_1 \to K_2$ (of topological groups, so continuous) mapping $\alpha_1$ to $\alpha_2$.
\end{prop}
\begin{proof} Let $\alpha = (\alpha_1, \alpha_2) \in K_1 \times K_2$ and let $K = \overline{\bZ\alpha} \subset K_1 \times K_2$. Let $\Theta = \overline{P(\bZ)\alpha}$. We know that $$\Theta = \bigcup_{a \in A} (K_0 + a)$$ for some finite $A \subset K$ where $K_0$ is the identity connected component of $K$. Let $\pi_i : K \to K_i$ be the projection maps. We know that $\pi_i$ is surjective by the assumption that $\overline{\bZ\alpha_i} = K_i$. In fact, since $K_0$ is finite index in $K$, we have that $\pi_i(K_0)$ of finite index in $K_i$ and thus $\pi_i(K_0) = K_i$ by the assumption that $K_i$ is connected. We now wish to show that $\pi_i$ is injective on $\Theta$. To see this, suppose that $\theta, \theta' \in \Theta$ are such that $\pi_1(\theta) = \pi_1(\theta')$. We know that $\theta \in K_0 + a$ and $\theta' \in K_0 + a'$ for some $a,a' \in A$. We now wish to show that $\pi_2(\theta - \theta') \in \operatorname{Stab}_{K_2}(\overline{U_2})$. To do this, suppose that $u_2 \in U_2$. From $\pi_2(K_0) = K_2$ we get that $\pi_2(K_0 + a') = K_2$, thus there exists $x \in K_1$ such that $(x, u_2) \in K_0 + a'$. Now $$(x, u_2 + \pi_2(\theta - \theta')) = (x, u_2) + \theta - \theta' \in (K_0 + a') + (K_0 + a - a') = K_0 + a,$$ that is $(x, u_2 + \pi_2(\theta - \theta')) \in \Theta$. Now since $(x, u_2) \in \Theta$ this means there exists a sequence $n_1, n_2, \ldots$ of integers such that $P(n_j) \alpha \to (x, u_2)$. In particular, $P(n_j)\alpha_2 \to u_2$ so $P(n_j)\alpha_2 \in U_2$ for sufficiently large $j$. But since $\mathcal{R}_1 = \mathcal{R}_2$ this means that $P(n_j)\alpha_1 \in U_1$. Now since $(x, u_2) \in K_0 + a'$ and $K_0 + a'$ is open in $K$, we must have that $P(n_j)\alpha \in K_0 + a'$ for sufficiently large $j$. Thus $P(n_j)\alpha + (\theta - \theta') \in K_0 + a \subset \Theta$ for sufficiently large $j$. In particular, this means that we may choose an integer $n'_j$ so that $P(n'_j)\alpha$ is so close to $P(n_j)\alpha + (\theta - \theta')$ so that $P(n'_j)\alpha_1$ is sufficiently close to $P(n_j)\alpha_1 \in U_1$ so that $P(n'_j)\alpha_1 \in U_1$ and so that $P(n'_j)\alpha \to (x, u_2 + \pi_2(\theta - \theta'))$. But as $\mathcal{R}_1 = \mathcal{R}_2$ this means that $P(n'_j)\alpha_2 \in U_2$. But $P(n'_j)\alpha_2 \to u_2 +\pi_2(\theta - \theta')$, thus showing that $u_2 +\pi_2(\theta - \theta') \in \overline{U_2}$. So we have shown that if $u_2 \in U_2$ then $u_2 +\pi_2(\theta - \theta') \in \overline{U_2}$, and by continuity of addition this holds more generally for $u_2 \in \overline{U_2}$, thus $\pi_2(\theta - \theta') \in \operatorname{Stab}_{K_2}(\overline{U_2})$. But by the assumption that $\operatorname{Stab}_{K_2}(\overline{U_2}) = \{0\}$ we get that $\pi_2(\theta) = \pi_2(\theta')$, which means that $\theta = \theta'$. Thus we have shown that $\pi_1:\Theta \to K_1$ is injective, and thus a homeomorphism. As $K_1$ is connected this means that $\Theta$ is connected and so in fact $ \Theta = K_0$ (as $P(0)\alpha = (0,0)$). So $\pi_1: K_0 \to K_1$ is in fact an isomorphism of topological groups. By symmetry (using now the assumption that $\operatorname{Stab}_{K_1}(\overline{U_1}) = \{0 \}$) we get that $\pi_2:K_0 \to K_2$ is an isomorphism of topological groups. Thus we have an isomorphism $K_1 \to K_2$ mapping $P(n)\alpha_1$ to $P(n)\alpha_2$ for all $n \in \bZ$. Finally, from the assumption that $P(\bZ)$ is not contained in any proper subgroup, we have that $1 = \sum_{i} a_i P(n_i)$ for some integers $a_i$ and $n_i$. Thus $\alpha_1 = \sum_{i} a_i P(n_i) \alpha_1$ is mapped to $\sum_{i} a_i P(n_i)\alpha_2 = \alpha_2$ under this isomorphism. \end{proof}
\subsection{Infinite dimensional polynomial orbit}
We now remove the assumption that our groups $K_1$ and $K_2$ are Lie groups (i.e., embedded in a finite dimensional torus). Thus let $K_1$ and $K_2$ be compact metrizable connected abelian groups. Note that this means they are closed subgroups of the countable dimensional torus $\bT^{\bN}$ and thus we may approximate them by compact Lie groups as follows.
\begin{mydef} Let $(X, d_X)$ and $(Y, d_Y)$ be metric spaces. For $\delta>0$, we say that a map $\phi:X \to Y$ is a $\delta$-almost isometry if for all $x_1,x_2 \in X$ we have that $$|d_X(x_1, x_2) - d_Y(\phi(x_1), \phi(x_2))| < \delta.$$
\end{mydef}
Thus we have a decreasing sequence $\delta_1 > \delta_2> \ldots$ of positive real numbers converging to $0$ and, for each positive integer $D$, surjective continuous group homomorphisms $\phi^1_D: K_1 \to F^1_D$ and $\phi^2_D: K_2 \to F^2_D$ where $F^1_D$ and $F^2_D$ are closed subgroups of $\bT^D$ and $\phi^1_D$ and $\phi^2_D$ are $\delta_D$ almost isometries (we have fixed an invariant metric on each compact metrizable abelian group $K$, which we shall call $d_K$ or $d$ if clear from the context). For concreteness, we construct these maps conveniently as follows. Equip $\bT^{D}$ with the metric $$d(x, y) = \sum_{i=1}^{D} 2^{-i}\| x_i - y_i\|,$$ where $\| v\|$ is the shortest distance from $v \in \bT$ to $0 \in \bT$, and $\bT^{\bN}$ with the metric $$d(x, y) = \sum_{i=1}^{\infty} 2^{-i}\| x_i - y_i\|,$$ that way $\phi_D^1$ and $\phi_D^2$ are (restrictions to $K_1$ and $K_2$ respectively) the projections onto the first $D$ co-ordinates, which are clearly $O(2^{-D})$-almost isometries. The $F_D^1$ and $F_D^2$ are then defined to be the images of these, thus $\phi^1_D: K_1 \to F^1_D$ and $\phi^2_D: K_2 \to F^2_D$ are surjective.
Now let $P(x) \in \bZ[x]$ be a non-constant polynomial such that $P(0)=0$. We now let $$\Theta = \overline{P(\bZ) \alpha} \subset K_1 \times K_2$$ where $\alpha = (\alpha_1, \alpha_2) \in K_1 \times K_2$ are such that $\overline{\bZ\alpha_i} = K_i$ for $i=1,2$. We let $\phi_D:K_1 \times K_2 \to F_D^1 \times F_D^2$ be the map $\phi_D = \phi_D^1 \times \phi_D^2$. We also let $\Theta_D = \phi_D(\Theta) \subset F_D^1 \times F_D^2$. We equip $K_1 \times K_2$ and $F_D^1 \times F_D^2$ with the metrics $d((x_1, y_1), (x_2, y_2)) = \max\{d(x_1,x_2), d(y_1, y_2)\}$, that way $\phi_D$ is also a $O(2^{-D})$-almost isometry. Observe that $$\Theta_D = \overline{P(\bZ) \phi_D(\alpha)}$$ and thus we may apply Proposition~\ref{prop: polynomial orbit closure in compact Lie group} to obtain that \begin{align}\label{Theta_D a union of cosets} \Theta_D = \bigcup_{a \in A_D} (\Gamma_D + a) \end{align} for some finite $A_D \subset F_D^1 \times F_D^2$ and closed connected subgroup $\Gamma_D \leq F_D^1 \times F_D^2$. Note that $\Gamma_D \subset \Theta_D$ as $0 \in \Theta_D$ since $P(0)=0$.
Let $$\Gamma = \bigcap_{D=1}^{\infty} \phi_D^{-1}(\Gamma_D)$$ and notice that this is a closed subgroup.
\begin{lemma}\label{lemma: Gamma subset of Theta} We have $\Gamma \subset \Theta$. \end{lemma}
\begin{proof} Since $\phi_D$ is a $O(2^{-D})$-almost isometry, we have that if $p \in \phi_D^{-1}(\Gamma_D)$ then $\phi_D(p) \in \Gamma_D \subset \phi_D(\Theta)$ and so $d(p, \Theta) < O(2^{-D})$. But $\Theta$ is closed, so the proof is complete by letting $D \to \infty$. \end{proof}
\begin{lemma}\label{lemma: nested Gamma_D} We have that $\phi_D^{-1}(\Gamma_D) \supset \phi_{D+1}^{-1}(\Gamma_{D+1})$.
\end{lemma}
\begin{proof} The natural projection $F_{D+1}^1 \times F_{D+1}^2 \to F_{D}^1 \times F_{D}^2$ maps $\Theta_{D+1}$ to $\Theta_D$, so in particular maps the connected component $\Gamma_{D+1}$ to the connected component $\Gamma_D$. \end{proof}
We let $\pi_i: K_1 \times K_2 \to K_i$ and $\pi_{i,D}:F_D^1 \times F_D^2 \to F_D^i$ denote the projections.
\begin{lemma}\label{lemma: Gamma maps onto K_i} For $i=1,2$ we have that $\pi_i(\Gamma) = K_i$. \end{lemma}
\begin{proof} Fix $i \in \{1,2\}$. We first show that $\pi_{i,D}(\Gamma_D) = F_D^i$. First notice that $$\pi_{i,D}(\Theta_D) = \overline{P(\bZ)\phi_D(\alpha_i)} = F_D^i$$ where the last equality follows from Weyl equdisitribution, connectendess of $F_{D}^i$ and $\overline{\bZ \phi_D(\alpha_i)} = F_D^i$. But$$\pi_{i,D}(\Theta_D) = \bigcup_{a \in A_D} \left(\pi_{i,D}(\Gamma_D) + \pi_{i,D}(a)\right)$$ is a disjoint union of closed sets, thus by connectedness they must all be the same and equal to $\pi_{i,D}(\Gamma_D)$, so indeed $\pi_{i,D}(\Gamma_D) = F_D^i$. Now let $k \in K_i$. Then by our first claim we have that $\phi_D^i(k) = \pi_{i,D}(\gamma_D)$ for some $\gamma_D \in \Gamma_D$. Now by surjectivity of $\phi_D^i$, we may take $\beta_D \in \phi_D^{-1}(\Gamma_D)$ such that $\phi_D(\beta_D) = \gamma_D$. By compactness, we may pass to a subsequence such that $\beta_{D_j} \to \beta$ for some $\beta \in K_1 \times K_2$. But it now follows from Lemma~\ref{lemma: nested Gamma_D} that $\beta \in \Gamma$. The proof will be complete if we can show that $\pi_{i}(\beta) = k$. To see this, note that $\phi_D^i (\pi_i(\beta)) = \pi_{i,D}(\phi_D(\beta))$ but $\phi_D(\beta)$ can be made arbitrarily close to $\phi_D(\beta_D) = \gamma_D$ for large enough $D$. So $\phi_D^i(\pi_i(\beta))$ can be made arbitrarily close to $\pi_{i,D}(\gamma_D) = \phi_D^i(k)$. It now follows that $\pi_i(\beta)$ is arbitrarily close to $k$ for large enough $D$ (as $\phi_D^i$ is a $O(2^{-D})$-almost isometry), thus they are equal. \end{proof}
\begin{prop}\label{prop: Gamma union of cosets} There exists $A \subset K_1 \times K_2$, with $0 \in A$, such that $$\Theta = \bigcup_{a \in A} (\Gamma + a).$$
\end{prop}
\begin{proof} We already know that $\Gamma \subset \Theta$ by Lemma~\ref{lemma: Gamma subset of Theta}. Thus it remains to show that if $\gamma_0 + a \in \Theta$ for some $\gamma_0 \in \Gamma$ and $a \in K_1 \times K_2$ then for every $\gamma \in \Gamma$ we have that $\gamma + a \in \Theta$. Let $D$ be a positive integer, we thus have that $\phi_D(\gamma_0 + a) \in \Theta_D$ and so (\ref{Theta_D a union of cosets}) and the fact that $\Gamma \subset \phi_D^{-1}(\Gamma_D)$ (by definition) implies that $\Gamma_D + \phi_D(a) \subset \Theta_D$. In particular, this means that $\phi_D(\gamma + a) \in \Theta_D$. Thus there exists a $\beta_D \in \Theta$ such that $\phi_D(\gamma+a) = \phi_D(\beta_D)$. But since $\phi_D$ is a $O(2^{-D})$-almost isometry, we have that $d(\gamma + a, \beta_D) < O(2^{-D})$. Thus $\beta_D \to \gamma+a$ and since $\Theta$ is closed we must have $\gamma+a \in \Theta$. \end{proof}
Now let $U_1 \subset K_1$ and $U_2 \subset K_2$ be open sets. Let $$\mathcal{R}_i = \{n \in \bZ ~|~ P(n)\alpha_i \in U_i \}.$$
\begin{prop}\label{prop: infinite dimensional kernel contained in Stabilizer} If $\mathcal{R}_1 = \mathcal{R}_2$ and $\theta, \theta' \in \Theta$ are such that $\pi_1(\theta_1) = \pi_1(\theta_2)$, then $\pi_2(\theta - \theta') \in \operatorname{Stab}_{K_2}(\overline{U_2})$. \end{prop}
\begin{proof} We have $\theta' - \theta = (0,v)$ for some $v \in K_2$, so we wish to show $v \in \operatorname{Stab}_{K_2}(\overline{U_2})$. By Lemma~\ref{prop: Gamma union of cosets} we have $a,a' \in A$ such that $\theta \in \Gamma + a$ and $\theta' \in \Gamma + a'$. Now let $u_2 \in U_2$. Since $\pi_2(\Gamma) = K_2$ there exists $x \in K_1$ such that $(x, u_2) \in \Gamma + a$. Now fix $\epsilon > 0$ such that the ball of radius $\epsilon$ centred at $u_2$ is contained in $U_2$. Since $\pi_1 \vert_{\Gamma}:\Gamma \to K_1$ is a surjective homomorphism between compact groups, it is an open map and thus there exists a $\delta >0$ such that if $g_1 \in K_1$ with $d(0, g_1) < \delta$ then there exists a $\gamma \in \Gamma$ with $d(0, \gamma) < \epsilon$ and $\pi_1(\gamma) = g_1$. Now since $(x, u_2) \in \Gamma +a \subset \Theta$ there exists a positive integer $n_1$ such that $d(P(n_1)\alpha, (x,u_2)) < \max\{\delta, \epsilon\}$. Writing $P(n_1)\alpha = (x_1, y_1)$ with $x_1 \in K_1, y_1 \in K_2$ we see that $d(y_1, u_2) < \epsilon$ and thus $y_1 \in U_2$ and thus since $n_1 \in \mathcal{R}_2 = \mathcal{R}_1$ we have $x_1 \in U_1$. We set $g_1 = x_1 - x$. Notice that $d(0, g_1) < \delta$ and so there exists a $\gamma \in \Gamma$ with $d(0, \gamma) < \epsilon$ such that $\pi_1(\gamma) = g_1$. Writing $\gamma = (g_1, g_2)$ for some $g_2 \in K_2$ we get that $$(x_1, u_2 + g_2) = (x,u_2) + \gamma \in \Gamma + a + \gamma = \Gamma + a.$$ Thus $\theta'' := (x_1, u_2 + g_2 + v) \in \Gamma + a' \subset \Theta$. This means that there exists $n_2 \in \bZ$ such that $P(n_2)\alpha$ is so close to $\theta''$ that $\pi_1(P(n_2)\alpha)$ is so close to $x_1$ that $\pi_1(P(n_2)\alpha) \in U_1$ and $d(\pi_2(P(n_2)\alpha), u_2 + g_2 + v) < \epsilon$. Thus $n_2 \in \mathcal{R}_1 = \mathcal{R}_2$ and so $\pi_2(P(n_2)\alpha) \in U_2$. This means that $$d(u_2 + v, U_2) \leq d(u_2 + v + g_2, U_2) + \epsilon \leq d(u_2 + v +g_2, \pi_2(P(n_2)\alpha)) + \epsilon < 2\epsilon.$$ As $\epsilon > 0$ was arbitrary and independent of $v$, we may take $\epsilon \to 0$ to get that $d(u_2 + v, U_2) = 0$, and thus $u_2 + v \in \overline{U_2}$. Thus $U_2 + v \subset \overline{U_2}$ and by continuity of addition we have that $\overline{U_2} + v \subset \overline{U_2}$. The reverse inclusion holds by swapping the roles of $\theta$ and $\theta'$, thus $v \in \operatorname{Stab}_{K_2}(\overline{U_2})$. \end{proof}
\begin{prop} If $\mathcal{R}_1 = \mathcal{R}_2$ and $\operatorname{Stab}_{K_1}(\overline{U_1})$ and $\operatorname{Stab}_{K_2}(\overline{U_2})$ are trivial, then there exists an isomorphism of topological groups $K_1 \to K_2$ mapping $P(n)\alpha_1$ to $P(n)\alpha_2$ for all $n \in \bZ$.
\end{prop}
\begin{proof} By Proposition~\ref{prop: infinite dimensional kernel contained in Stabilizer} and the assumption $\operatorname{Stab}_{K_2}(\overline{U_2}) = \{0\}$ we have that the mapping $\pi_1\vert_{\Theta}:\Theta \to K_1$ is injective and thus a homeomorphism. But since $\pi_1(\Gamma) = K_1$ by Lemma~\ref{lemma: Gamma maps onto K_i}, we must have that $\Theta = \Gamma$, so $\pi_1\vert_{\Theta}:\Theta \to K_1$ is also a group homomorpishm. By symmetry (this time using $\operatorname{Stab}_{K_1}(\overline{U_1}) = \{0\}$) we get that $\pi_2\vert_{\Theta}:\Theta \to K_2$ is also an isomorphism of topological groups. Thus $\pi_2\vert_{\Theta} \circ \left(\pi_1\vert_{\Theta}\right)^{-1}:K_1 \to K_2$ is the desired isomorphism. \end{proof}
\section{Return times sets for nilsystems} \label{sec: Nilsystems}
We now prove Theorem~\ref{thm: nilsystem and kronecker}. As noted, Theorem~\ref{thm: Kronecker factor of minimal system} already defines the map $\phi:X \to K$ and so it remains to provide an inverse $\psi:K \to X$, which is established by the following result.
\begin{prop} Let $X=G/\Gamma$ be a nilmanifold, where $G$ is a nilpotent Lie group and $\Gamma \leq G$ is a cocompact discrete subgroup. Suppose that $\tau \in G$ is such that $(X,T)$ is minimal, where $T:X \to X$ is given by $Tx = \tau x$ for $x \in X$. Suppose that $U \subset X$ is open and satisfies that $\operatorname{Stab}_G(\overline{U}):= \{g \in G ~|~ g\overline{U} = \overline{U}\}$ consists of only those $g \in G$ such that $gx = x$ for all $x \in X$. Now suppose that $(K,+)$ is a compact Lie group and $\alpha \in K$ is such that $\overline{\bZ \alpha} = K$ and $V \subset K$ is open such that $$\{ n \in \bZ ~|~ T^nx_0 \in U\} = \{n \in \bZ ~|~ n\alpha \in V\}$$ for some $x_0 \in X$. Then the pointed system $(X, x_0, T)$ is a factor of the pointed Kronecker system $(K,0 , k \mapsto k+\alpha)$, i.e., there is a continuous map $\psi: K \to X$ with $\psi(0) = x_0$ satisfying $$\psi(\alpha + k) = T\psi(x) \text{ for all } k \in K.$$
\end{prop}
\begin{proof} Let $Z = K \times X$ and $z_0 = (0, x_0) \in Z$. Then $Z = (K \oplus G) / (\{0\} \oplus \Gamma)$ is a nilmanifold and thus $(Z,S)$ is a nilsystem where $S:Z \to Z$ is given by $T(k,x) = (k + \alpha, Tx)$. Now let $\Theta = \overline{S^{\bZ}z_0}$ be the closure of the $S$-orbit of $z_0$. Then (see Theorem 9 in Chapter 11 of \cite{NilpotentErgodic}) we have that $$\Theta = Hz_0$$ for some closed subgroup $H$ of $K \oplus G$. Now let $\pi_K:\Theta \to K$ and $\pi_X:\Theta \to X$ denote the projection maps. We wish to show that $\pi_K$ is injective as it would then be a homeomorphism and our desired factor map would be $\pi_X \circ \pi_K^{-1}:K \to X$. Thus suppose that $\theta_1, \theta_2 \in \Theta$ are such that $\pi_K(\theta_1) = \pi_K(\theta_2)$. Thus we can write $\theta_1 = h_1 z_0$ and $\theta_2 = h_2 z_0$ for some $h_1,h_2 \in H$. For $i=1,2$, we may write $h_i = (k_i, g_i)$ where $k_i \in K$ and $g_i \in G$, thus $\theta_i = (k_i, g_i x_0)$. But $k_1 = k_2$ and so we have $h_0 := h_2h_1^{-1} = (0, g_2 g_1^{-1}) \in H$ and we have the relation $h_0 \theta_1 = \theta_2$. Now let $u \in U$ be arbitrary. By surjectivity of $\pi_X:\Theta \to X$ we may find a $h' \in H$ such that $h'z_0 = (k', u) \in \Theta$ for some $k' \in K$. Thus we may find a sequence of integers $n_1, n_2, \ldots$ such that $S^{n_i}z_0 \to h'z_0$. In particular $T^{n_i}x_0 \to u$ and thus $T^{n_i}x_0 \in U$ for large enough $n_i$. This must mean that $n_i \alpha \in V$. Now $h_0 S^{n_i}z_0 = (n_i\alpha, g_2g_1^{-1}T^{n_i}z_0) \in \Theta$ and so, for each fixed $i$, we may find a sequence of integers $m_1, m_2, \ldots $ such that $\lim_{j \to \infty} S^{m_j}z_0 = (n_i\alpha, g_2g_1^{-1}T^{n_i}x_0)$. In particular this means that $m_j\alpha \to n_i\alpha \in V$ and so for large enough $j$ we have $m_j \alpha \in V$ and so $T^{m_j}x_0 \in U$. But $T^{m_j}x_0 \to g_2g_1^{-1}T^{n_i}x_0$ and so $g_2g_1^{-1}T^{n_i}x_0 \in \overline{U}$. Finally taking the limit as $i \to \infty$ and using $T^{n_i}x_0 \to u$ we have that $g_2g_1^{-1} u\in \overline{U}$. As $u \in U$ was arbitrary, this shows that $g_2g_1^{-1} U \subset \overline{U}$ and thus $g_2g_1^{-1} \overline{U} \subset \overline{U}$. The reverse inclusion follows from swapping the roles of $\theta_1$ and $\theta_2$, thus $g_2g_1^{-1} \in \operatorname{Stab}_G(\overline{U})$. Thus $g_2g_1^{-1}$ stabilizes every $x \in X$ thus $g_2x_0 = g_2g_1^{-1}g_1x_0 = g_1x_0$, so in fact $\theta_2 = \theta_1$. Thus $\pi_K$ is injective as desired. \end{proof}
\section{Spectral construction for Jordan Measurable sets (Proof of Theorem~\ref{thm: explicit reconstruction})}
Let $U \subset K$ be a Jordan measurable open subset of a compact abelian group $K$. Let $\alpha \in K$ be an element such that $\bZ \alpha$ is dense in $K$. Let $\Lambda$ denote the set of unit complex numbers $\lambda$ such that
$$\frac{1}{N}\sum_{n=1}^N \lambda^n \mathds{1}_{U}(n\alpha)$$ does not converge to $0$ as $N \to \infty$.
\begin{lemma} We have $\Lambda \subset \{ \chi(\alpha) ~|~ \chi \in \widehat{K} \}.$ In fact, if $$\mathds{1}_U = \sum_{\chi} c_{\chi} \chi$$ is the Fourier decomposition in $L^2(K)$, then $\Lambda$ is the set of those $\chi(\alpha)$ for which $c_{\chi} \neq 0$.
\end{lemma}
\begin{proof} Let $\bU$ be the unit complex numbers. Suppose that $\lambda \in \bU$ but $\lambda \notin \{ \chi(\alpha) ~|~ \chi \in \widehat{K} \}$. Note that for any character $\chi$ on $K$ we have that $$\frac{1}{N}\sum_{n=1}^N \lambda^n \chi(n\alpha) = \frac{1}{N}\sum_{n=1}^N(\lambda\chi(\alpha))^n \to 0.$$ As any continuous function $f:K \to \bC$ can be uniformly approximated by a linear combination of characters, we have that $$\frac{1}{N}\sum_{n=1}^N \lambda^n f(n\alpha) \to 0.$$
Now observe that there exist continuous functions $f_{\epsilon}^+: K \to [0,1]$ such that $$f_{\epsilon}^+ \searrow \mathds{1}_{\overline{U}}, \quad \text{ as } \epsilon \to 0.$$ In particular we choose these functions so that $$m_K(\operatorname{supp}f_{\epsilon}^+ \setminus U) = m_K(\operatorname{supp}f_{\epsilon}^+ \setminus \overline{U}) < \epsilon$$ where $m_K$ denotes the Haar measure on $K$ and in the first equality we used that $\overline{U}$ and $U$ are $m_K$ almost the same (as $U$ is Jordan measurable). Now as $\operatorname{supp}f_{\epsilon}^+ \setminus U$ is a closed set its indicator function can be written as a pointwise decreasing limit of continuous functions, thus we have that $$\limsup_{N \to \infty} \frac{1}{N} |\{ n \in [1,N] ~|~ n\alpha \in \operatorname{supp}f_{\epsilon}^+ \setminus U \}| \leq m_K(\operatorname{supp}f_{\epsilon}^+ \setminus U) < \epsilon.$$ This means that $$\limsup_{N \to \infty} |\frac{1}{N} \sum_{n=1}^N \lambda^n f_{\epsilon}^+ (n\alpha) - \frac{1}{N} \sum_{n=1}^N \lambda^n \mathds{1}_{U}(n\alpha)| < \epsilon.$$ Thus $$\frac{1}{N} \sum_{n=1}^N \lambda^n \mathds{1}_{U}(n\alpha) \to 0$$ and hence we have shown the first claim that $$\Lambda \subset \{ \chi(\alpha) ~|~ \chi \in \widehat{K} \}.$$
Now suppose that $\lambda \in \{ \chi(\alpha) ~|~ \chi \in \widehat{K} \}$. Thus $\lambda = \overline{\chi(\alpha)}$ for some unique (by density of $\bZ\alpha$) character $\chi$ on $K$. But $\overline{\chi} \mathds{1}_U$ is Riemann-integrable thus we have that $$\frac{1}{N} \sum_{n=1}^N \lambda^n\mathds{1}_U(n\alpha) = \frac{1}{N} \sum_{n=1}^N \overline{\chi}\mathds{1}_U(n\alpha) \to \int \overline{\chi}\mathds{1}_U dm_K = c_{\chi}.$$
\end{proof}
Now let $E = \{ \chi(\alpha) ~|~ \chi \in \widehat{K} \}$. Note that the mapping $\widehat{K} \to E$ mapping $\chi$ to $\chi(\alpha)$ is injective (by density of $\bZ \alpha$) and thus bijective. Consequently, let $\Gamma \subset \widehat{K}$ be the set corresponding to $\Lambda$, i.e., $\Lambda = \{ \chi(\alpha) ~|~ \chi \in \Gamma\}$.
Now observe that the mapping $\iota:K \to \bU ^{\widehat{K}}$ given by $\iota(k) = \left( \chi(k) \right)_{\chi \in \widehat{K}}$ is injective and continuous, thus a homeomorphism onto its image. Now let $$\pi: K \to \bU^{\Gamma}$$ be the projection given by $$k \mapsto \left( \chi(k) \right)_{\chi \in \Gamma}.$$
\begin{prop} \label{prop: kernel inside stabilizer, spectral} $\operatorname{ker}(\pi) \subset \operatorname{Stab}_K(\overline{U})$.
\end{prop}
\begin{proof} Suppose that $k \in \operatorname{ker} \pi$. Thus $\chi(k) = 1$ for all $\chi \in \Gamma$. But since $$\mathds{1}_{\overline{U}} = \sum_{\chi \in \Gamma} c_{\chi} \chi$$ we have that $\mathds{1}_{\overline{U}}(x + k ) = \mathds{1}_{\overline{U}}(x)$ for almost all $x \in K$. As $U$ and $\overline{U}$ are $m_K$ almost equal, this means that the open set $(U - k) \setminus \overline{U}$ has zero measure and is thus empty. This means that $u - k \in \overline{U}$ for all $u \in U$ and $k \in \operatorname{ker}(\pi)$. Thus $\operatorname{ker(\pi)} \subset \operatorname{Stab}_K(\overline{U})$. \end{proof}
\begin{proof}[Proof of Theorem~\ref{thm: explicit reconstruction}] The assumption that $\operatorname{Stab}_K(\overline{U})$ is trivial together with Proposition~\ref{prop: kernel inside stabilizer, spectral} implies that $\pi$ is injective and thus an isomorphism onto its image. But the image of $\pi$ is the closed subgroup of $\bU^{\Gamma}$ generated by $$\pi(\alpha) = \left( \chi(\alpha) \right)_{\chi \in \Gamma}.$$ Finally, by applying the natural isomorphism $\bU^{\Gamma} \cong \bU^{\Lambda}$ (i.e., the one induced by the bijection $\chi \mapsto \chi(\alpha)$ from $\Gamma$ to $\Lambda$) we get that $K$ is isomorphic to the closed subgroup of $\bU^{\Lambda}$ generated by $ \left( \lambda \right)_{\lambda \in \Lambda}. $ \end{proof}
\section{Equivalence of Question~\ref{question: G sets} and Question~\ref{question: stable implies simple}}
\label{section: equivalence of questions}
We now show that Question~\ref{question: G sets} and Question~\ref{question: stable implies simple} are equivalent. Recall that a \textit{block system} of a group action $G\curvearrowright X$ is a partition $\mathcal{B} \subset 2^X$ of $X$ (collection of non-empty disjoint sets whose union is $X$) that is $G$-invariant (i.e., if $g \in G$ and $B \in \mathcal{B}$ then $gB \in \mathcal{B}$). Let us define the \textit{block system generated by $U \subset X$} (for this action) to be the smallest (with respect to inclusion) block system such that $U$ is a union of elements of $\mathcal{B}$. More concretely, the the block system generated by $U$ consists of those minimal non-empty sets that can be written as intersections of elements in $\{ gU ~|~ g \in G\} \cup \{ X \setminus gU ~|~ g \in G\}$.
\begin{prop}\label{prop: return times to simple sets} Let $G$ be a group acting transitively on a set $X_1$ and also acting transitively on a set $X_2$ and suppose that $U_1 \subset X_1$ and $U_2 \subset X_2$ are simple for the respective actions. Suppose that $x_1 \in X_1$ and $x_2 \in X_2$ are such that $$\{g \in G ~|~ gx_1 \in U_1\} = \{g \in G ~|~ gx_2 \in U_2\}.$$ Then there is an isomorphism $\phi:X_1 \to X_2$ of $G$-sets mapping $x_1$ to $x_2$, i.e., $\phi(gx) = g\phi(x)$ for all $g \in G$ and $x \in X_1$.
\end{prop}
\begin{proof} Let $\mathcal{B}$ denote the block system generated by $U_1$. Thus there is a well defined map $\pi: X_1 \to \mathcal{B}$ where for $x \in X_1$ we define $\pi(x)$ to be the unique element of $\mathcal{B}$ containing $x \in X_1$. Note that $\pi$ is a morphism of $G$-actions, i.e., $g \pi(x) = \pi(gx)$ for all $g \in G$ and $x \in X_1$. Note that $$U_1 = \pi^{-1}\left( \bigcup_{\{B \in \mathcal{B} ~|~B \subset U_1\}} B \right)$$ since by definition $U_1$ is a union of elements of $\mathcal{B}$. Thus since $U_1$ is simple we must have that $\pi$ is an isomorphism. In particular this means $\{x\} \in \mathcal{B}$ for all $x \in X_1$. Now let $$R(V) = \{g \in G ~|~ gx_1 \in V\}$$ for any $V \subset X_1$. Notice the properties $R(gV)=gR(V)$ and $R(\bigcap_{i \in \mathcal{I}} V_i)= \bigcap_{i \in \mathcal{I}} R(V_i)$ and $R(X_1 \setminus V) = G \setminus R(V)$. Now let $\mathcal{B}_G$ denote the block system generated by $R(U_1)$ for the action of $G \curvearrowright G$ by left multiplication. By the aforementioned properties we have that $\mathcal{B}_G$ consists of those sets of the form $R(B)$ for $B \in \mathcal{B}$ and so we have that $\mathcal{B}_G$ consists of exactly the sets of the form $R(\{x\})$ for $x \in X_1$. Note that $R(\{x_1\}) = \{g \in G ~|~ gx_1 = x_1\} = \operatorname{Stab}(x_1)$ and any other $R(\{x\})$ must be a coset of $\operatorname{Stab}(x_1)$ (by transitivity $x = gx_1$ for some $g \in G$ and so $R(\{x\}) = gR(\{x_1\})$). So in fact $\operatorname{Stab}(x_1)$ may be desribed as member of $\mathcal{B}_G$ that contains $1 \in G$. Since $X_1 \cong G/\operatorname{Stab}(x_1)$, this means that we have an isomorphism of $G$-actions $X_1 \to \mathcal{B}_G$ that maps $x_1$ to the unique element of $\mathcal{B}_G$ containing $1 \in G$ (it maps $x$ to $R(\{x\})$). Notice that $\mathcal{B}_G$ is the same if we replace $X_1,x_1,U_1$ with $X_2, x_2, U_2$ respectively by the assumption that $$\{g \in G ~|~ gx_1 \in U_1\} = \{g \in G ~|~ gx_2 \in U_2\}.$$ Thus indeed we have an isomorphism $X_1 \cong X_2$ of $G$-actions (they are both isomorphic to $G$ acting on $\mathcal{B}_G$). \end{proof}
This demonstrates the equivalence of the two questions as follows. If the answer to Question~\ref{question: stable implies simple} is affirmative, then the two sets in Question~\ref{question: G sets} are simple and thus the Proposition~\ref{prop: return times to simple sets} provides an affirmative answer. Conversely, if $U \subset X$ is a subset in a transitive $G$-set $X$ with a trivial setwise stabilizer, then we have a factor $\pi:X \to \mathcal{B}$, where $\mathcal{B}$ is the block system generated by $U$, mapping $x \in X$ to the unique element of $\mathcal{B}$ containing $x$ (as constructed in the proof of the Propostion~\ref{prop: return times to simple sets}). But $\pi(U)$ also has a trivial setwise stabilizer and $\{g \in G ~|~ gx_0 \in U\} = \{g \in G ~|~ g\pi(x_0) \in \pi(U)\}$ so if the answer to Question~\ref{question: G sets} is affirmative, then $\pi$ must be an isomorphism and so $\mathcal{B}$ consists of singletons.
|
\section{Introduction}
\IEEEPARstart{O}{ptical} flow represents the 2D motion and correspondence relationship between two images at the pixel level, which is a fundamental problem in the field of computer vision. Optical flow has lots of applications in autonomous driving, such as visual odometry \cite{min2020voldor}, target tracking \cite{ke2018real}, moving object detection, and mapping \cite{menze2018object,jiang2021moving}. In addition, the optical flow can be used to analyze the motion attributes of pedestrians and vehicles, so as to realize the dynamic understanding of scenes and decision-making. With the development of deep learning, good performance of optical flow estimation has been achieved by training on synthetic data \cite{dosovitskiy2015flownet,ilg2017flownet}. However, the gap between real data and synthetic data makes the supervised models on synthetic data have limited performance in real data. This spawned a large number of unsupervised studies of optical flow to make the trained optical flow network without the
gap when applied in real applications \cite{jason2016back,ren2017unsupervised,wang2018occlusion,meister2018unflow,alletto2018self,janai2018unsupervised,liu2019ddflow,liu2019selflow,zou2018df,ranjan2019competitive,wang2020unsupervised,jonschkowski2020matters}. Besides, the unsupervised method can utilize a large number of videos on the internet. The common basic idea behind the unsupervised learning of optical flow is based on the consistency between the target image and the reconstructed image. The reconstructed image is obtained by warping the source image utilizing the estimated optical flow field by the neural network model. Then, the neural network model is trained and updated to minimize the difference between the target image and the reconstructed image. This consistency assumption is not satisfied in the occlusion regions of images, so there are many previous works exploiting a lot of how to mask the occlusion regions \cite{wang2018occlusion,zou2018df,janai2018unsupervised,ranjan2019competitive,wang2020unsupervised,jonschkowski2020matters}.
However, there are seldom studies on the constraints of optical flow on non-occlusion regions. The smoothness loss is for all optical flow in an image. The reconstruction loss utilizes the luminosity constraint, not considering the geometry of the optical flow.
In this paper, it is found that there are also some geometric laws for the optical flow in the non-occlusion regions. To our best knowledge, this paper is the first to study the non-occlusion constraints of unsupervised optical flow learning. In this work, we reveal new geometric laws of the optical flow in non-occlusion regions and design two new unsupervised losses for the unsupervised learning of optical flow. Our contributions are as follows:
\begin{itemize}
\item By carefully analyzing the motion of each pixel in real 3D space and 2D projected image, non-occlusion is defined in the 2D image in detail. New geometric laws of optical flow in the non-occlusion regions are revealed.
\item Based on the insight into the geometric laws of optical flow in the non-occlusion regions, two novel loss functions, the optical flow non-intersection loss and the optical flow non-blocking loss, are proposed for the unsupervised learning of optical flow. The non-intersection loss defines that optical flows should not cross each other in non-occlusion regions. The non-blocking loss defines that a pixel should not be surrounded by other nearby pixels during the pixel motion between adjacent frames.
\item We integrate our proposed unsupervised losses into a unified framework of unsupervised optical flow and the experiments demonstrated the effectiveness of our proposed losses. The experiments on real dataset, KITTI 2015 dataset \cite{geiger2012we,menze2015joint}, show the good generalization ability of our model.
\end{itemize}
The rest of this paper is organized as follows. Section II summarizes the related works. Section III analysis the optical flow of each pixel from 3D to 2D and reveals new geometric laws of optical flow in the non-occlusion regions. The architecture of our unsupervised system and two novel loss functions based on the geometric laws are introduced in Section IV. The experiments details and results are in Section V. And Section VI concludes this paper.
\begin{figure*}[t]
\centering
\resizebox{1.00\textwidth}{!}
{
\includegraphics[scale=1.00]{fig1.pdf}}
\vspace{-3mm}
\caption{Optical flow intersection and pixel blocking caused by occlusion. Fig. (a) shows the case of occlusion for rigid objects, while Fig. (b) shows the case of non-occlusion for flexible objects.}
\label{occlusion_visual}
\end{figure*}
\begin{figure}[t]
\centering
\resizebox{1.00\columnwidth}{!}
{
\includegraphics[scale=1.00]{fig2.pdf}}
\vspace{-4mm}
\caption{An extreme situation that there are intersected flows, but there are not occlusion because of the big motion in consecutive frames.}
\label{intersection}
\vspace{-0pt}
\end{figure}
\begin{figure}[t]
\centering
\resizebox{0.80\columnwidth}{!}
{
\includegraphics[scale=1.00]{Fig3-1.pdf}}
\vspace{-0mm}
\caption{An extreme situation that there are blocked pixels, but there are not occlusion because of the big motions of multiple objects in consecutive frames. }
\label{encircling}
\vspace{-0pt}
\end{figure}
\section{Related Work}
Optical flow describes the pixel displacement on a 2D projected image because of the relative 3D motion between objects and the camera for observing \cite{gibson1950perception}.
Traditional methods define optical flow estimation as an energy minimization problem based on brightness consistency and spatial smoothness \cite{horn1981schunck,brox2004high,sun2010secrets}. With the rapid development of deep learning,
optical flow neural network can predict optical flow directly from a pair of images in an end-to-end manner \cite{dosovitskiy2015flownet,ilg2017flownet}. Ranjan et al. \cite{ranjan2017optical} propose the coarse-to-fine pyramid structure to make the network model size much smaller and improve the accuracy. Sun et al. \cite{ranjan2017optical} propose the PWC-Net, which performs warp operations and cost volume calculations for each level of the pyramid, showing the strong performance. Yang et al. \cite{yang2019volumetric} improve the volumetric layer by using the encoder-decoder architectures, to reduce parameters and achieve better performance. These supervised approaches need numerous data with optical flows labels to achieve better performance. However these data are expensive to obtain \cite{butler2012naturalistic,geiger2012we}, and sometimes special methods are even needed to get them, \cite{baker2011database}, which limits the application of these supervised methods.
The unsupervised approach avoids the need for labels through some regularization and has been the focus of recent research \cite{jason2016back,ren2017unsupervised,wang2018occlusion,meister2018unflow,alletto2018self,janai2018unsupervised,liu2019ddflow,liu2019selflow,zou2018df,ranjan2019competitive,wang2020unsupervised,jonschkowski2020matters}. The unsupervised method generates the optical flow by learning a function from the unlabeled dataset. As research goes on, the constraints of unsupervised training continue to increase, which allows neural networks to make more full use of unlabeled data, such as edge-aware smoothness \cite{wang2018occlusion}, photometric consistency loss \cite{wang2004image,sun2010secrets,zou2018df,meister2018unflow,ranjan2019competitive,liu2019ddflow,wang2019unos}, occlusion estimation \cite{wang2018occlusion,zou2018df,janai2018unsupervised,ranjan2019competitive,wang2020unsupervised}, distillation learning based on teacher and student models \cite{liu2019ddflow,liu2019selflow} and so on.
UFlow \cite{jonschkowski2020matters} systematically compares those key components in an unsupervised optical flow model to identify which is most effective and choose the best combination of those components, achieving the better performance in all benchmarks.
Besides those key components of unsupervised optical flow estimation, there are many other improvements. Wang et al. \cite{wang2018occlusion} explicitly model occlusion and propose a new warping approach to solve the problem of large estimation errors caused by large motions. Alletto et al. \cite{alletto2018self} divide the optical flow estimation into two steps: global transformation with homography and refinement by a deeper network, which can make the optical flow estimation more accurate. Janai et al. \cite{janai2018unsupervised} firstly use multi-frame information for occlusion processing in the unsupervised learning of optical flow. SelFlow \cite{liu2019selflow} utilizes temporal information from multiple frames for better flow estimation. Zhong et al. \cite{zhong2019unsupervised} propose Deep Epipolar Flow which incorporates global geometric constraints into network learning. Flow2Stereo \cite{liu2020flow2stereo} trains a network to estimate both flow and stereo, using triangle constraint loss and quadrilateral constraint loss. Df-net \cite{zou2018df} proposes the cross consistency loss of the depth and pose based rigid flow and optical flow in rigid regions. Ranjan et al. \cite{ranjan2019competitive} bring forward the idea of competitive collaboration to achieve unsupervised coordinated training of four tasks: depth, camera motion, optical flow, and motion segmentation. Wang et al. \cite{wang2019unsupervised,wang2020unsupervised} jointly estimate pose, depth, and optical flow in an unsupervised method by dividing an image into three parts: the occluded region, the non-rigid region, and the rigid region.
Many studied have done in these years for unsupervised learning of optical flow, as mentioned above. However, lots of works focus on the occlusion problem as the occlusion regions are not suitable for image reconstruction. There are seldom works on non-occlusion constraints. In this paper, novel unsupervised losses of optical flow are proposed based on geometric constraints in non-occlusion regions. The pixels in the non-occlusion regions are used to calculate these proposed losses: optical flow non-intersection loss and optical flow non-blocking loss, to punish the pixels that do not meet the constraints, which plays a guiding role in the model training.
\section{Geometric Laws of Optical Flow Field in the Non-occlusion Regions}\label{sec:laws}
2D image is a reflection of the real 3D world and the real motion takes place in 3D space. The 2D optical flow can be obtained by projecting the 3D scene flow to the 2D image plane as in Fig. \ref{occlusion_visual}. For the convenience of presentation and explanation, the camera is assumed to be stationary and the occlusion is caused by the motion of observed objects. In Fig. \ref{occlusion_visual}(a), at t frame, the car and the pedestrian can be seen by the camera, while the nearer car will occlude the farther pedestrian at $t+1$ frame. The pixels of cars and pedestrians at $t$ and $t+1$ frames are visualized on the image plane. The occluded pixels of the pedestrian will be surrounded by the pixels of the car. Similarly, the pixels of the car covering the pedestrian is also surrounded by the pixels of the pedestrian. At the same time, the pixels of different objects are intersected when occlusion appears. That is, flow intersection and pixel blocking have a connection with occlusion. Fig. \ref{occlusion_visual}(b) presents a non-occlusion flexible and deformable object. It can be seen that some pixels have a motion away from the camera in 3D space. There is an aggregated optical flow field but the optical flow is not intersected and the pixels are not blocked by surrounding adjacent pixel clusters.
From these observations, we infer the laws that the optical flow will not intersect each other and the pixels will not be blocked by surrounding adjacent pixel clusters in the non-occlusion regions. There are two extreme situations that are not consistent with the laws. It will be found that they happens so rarely in practice that the laws are satisfied in real applications.
As shown in Fig. \ref{intersection}, there is an extreme situation, where the car has a big motion and has intersected optical flows with the pedestrian, but they are not being occluded. They may accomplish the occlusion process in the consecutive frames or the trajectory of the car in the 2D image bypasses the pixels of the pedestrian. As in the consecutive frames, the motions are usually small compared with the size of the objects in the scene, our constraints are suitable in the real scenes.
If the pixels of something (eg. pedestrian in Fig. \ref{occlusion_visual}) are surrounded by the pixels of a nearer continuous body (eg. car in Fig. \ref{occlusion_visual}), the further thing will be occluded. However, if the surrounding four pixels are not from a continuous body, the assumption will not satisfied, as in Fig. \ref{encircling}. But the situation is so extreme that the inserted pedestrian and the two cars move so fast in the consecutive frames, and the pedestrian moves into the gap created by the movement of the cars.
\section{Unsupervised Learning of Optical Flow Based on Non-occlusion Constraints} \label{sec:constraints}
\subsection{The Overview of Our Unsupervised Framework of Optical Flow} \label{sec:overview}
\begin{figure*}[t]
\centering
\resizebox{0.95\textwidth}{!}
{
\includegraphics[scale=1.00]{fig4.pdf}}
\vspace{-0mm}
\caption{The overview of our unsupervised learning pipeline of optical flow. Two images, $X_t$ and $X_{t+1}$, are fed into our network to estimate the optical flow. The forward-backward consistency based on the flow fields is used to estimate occlusion. The census loss compares the warped image $\widehat X_{t}$ to the corresponding original image $X_t$ and expresses their difference. Forward flow $V_t$ and backward flow $V_{t+1}$ are regularized using smoothness loss. Finally, the non-intersection loss and the non-blocking loss based on geometric constraints of optical flow are used to guide the training.}
\label{network}
\vspace{-0pt}
\end{figure*}
The overview of our unsupervised learning pipeline of optical flow is shown in Fig. \ref{network}. There are two adjacent images $X_t \in \mathbb{R}^{H \times W \times 3}$ and $X_{t+1} \in \mathbb{R}^{H \times W \times 3}$. They are input to an optical flow estimation network $f_\theta$ to get the forward optical flow $V_t = f_\theta(X_t,X_{t+1})$ and backward optical flow $V_{t+1} = f_\theta(X_{t+1},X_{t})$. The $V_t \in \mathbb{R}^{H \times W \times 2}$ indicates the 2D flow vector from $X_{t}$ to $X_{t+1}$ for each pixel in $X_t$, while $V_{t+1}$ indicates the optical flow from $X_{t+1}$ to $X_{t}$. Our objective is to obtain perfect parameters $\theta$ of the network from image sequences without the ground truth of optical flow to realize the optimized performance of optical flow. Fig. \ref{network} gives the losses in one direction ($t$ to $t+1$), and the other direction ($t+1$ to $t$) is similar. The consistency of forward and backward optical flow is used to estimate the occlusion regions \cite{wang2018occlusion}. Then, the non-occlusion regions are the other part in an image.
The optical flow connects the images of adjacent frames at the pixel level. The optical flow can be unsupervised trained by measuring the corresponding matching of the pixels between two frames. The idea of measuring pixel matching between adjacent frames is commonly realized through image warping \cite{ranjan2017optical,sun2018pwc}. Firstly, the corresponding coordinates after optical flow are calculated as: $[\hat{i},\hat{j}]^T=[i,j]^T + [u_t,v_t]^T$. Then, the warped image can be obtained by the differentiable bilinear interpolation: $\hat{X}_t(i,j)=\sum_{i\in{\lfloor \hat i \rfloor,\lceil \hat i \rceil},j\in{\lfloor \hat j \rfloor,\lceil \hat j \rceil}}w^{ij}X_t(i,j)$, $\sum_{i,j}w^{ij} = 1$. $\lceil \cdot \rceil$ means rounding up to ceil, and $\lfloor \cdot \rfloor$ means rounding down to floor. Then, census loss \cite{meister2018unflow} is used to enforce the consistency of warped image $\widehat X_{t}$ and original image $X_{t}$ as shown below:
\begin{equation}
\begin{split}
L_{census} =& \sum_{} ( 1 - O_t) \cdot \sigma(\rho(X_t, \hat X_t))\\ + &\sum_{}(1-O_{t+1}) \cdot \sigma(\rho(X_{t+1}, \hat X_{t+1})),
\end{split}
\end{equation}
where $O_t$ and $O_{t+1}$ are forward occlusion mask and backward occlusion mask, respectively. $\sigma\left(x\right) = \left( |x| + \epsilon \right)^q$ is the robust loss function \cite{liu2019ddflow}, where $\epsilon = 0.01$, $q = 0.4$. The brightness constancy $\rho (X_t,\hat X_t)$ is used to measure the difference between warped image and original image.
The smooth loss makes the estimated flow smooth according to the pixel gradient of the image. As with most methods, we use first-order and second-order smooth loss. The formula is shown as below:
\begin{equation}
L_{smooth\left(k\right)}=\frac{1}{N} \sum |\nabla^k V_t| \cdot exp(-\frac{\mu}{3} \sum_{i}|\nabla X_t^i| ),
\end{equation}
where $\mu$ is weight based on the color channel ($i\in\{0,1,2\}$) of $X_t^i$ and $\mu = 150$. $k$ expresses the order of smoothness.
The non-intersection loss $L_{non-inter}$ and non-blocking $L_{non-block}$ loss are proposed in this paper to constraint and regulate optical flow learning inspired by the geometric laws of flow field introduced in Section \ref{sec:laws}. These losses are introduced in Section \ref{sec:intersection} and Section \ref{blocking}. In addition, we also utilize the idea of distillation learning based on teacher and student models \cite{liu2019ddflow, liu2019selflow}. The loss of distillation learning is represented as $L_{dist}$.
In summary, the overall loss function is:
\begin{equation}
\begin{split}
L_{all} =& \alpha_1 L_{census} + \alpha_2 L_{smooth\left(k\right)} + \alpha_3 L_{non-inter} \\+& \alpha_4 L_{non-block} + \alpha_5 L_{dist},
\end{split}
\end{equation}
where $\alpha_1 = 1$, $\alpha_2 = 4$, $\alpha_3 = \alpha_4 = 0.01$. As for the setting of $\alpha_5$, we follow the method of UFlow \cite{jonschkowski2020matters}, which is 0 for the first 50 percent of the training and then increases to a constant.
\subsection{The Non-intersection Loss} \label{sec:intersection}
Because the motion is small, the displacement described by optical flow can be regarded as the actual trajectories of pixel. Usually, an image has a big amount of pixels (eg. $448 \times 1024$ pixels in an image for the Sintel dataset \cite{butler2012naturalistic}), which is massive to calculate the relationship for the optical flow vectors of every two pixels. Inspired by the convolution in 2D, we calculated the results of each local regions and make all local calculation paralleled.
A $3 \times 3$ sliding kernel is used to calculate the loss in each local area, and 1 is as the sliding step. For an image with a size of $H \times W$, there are $(H-2) \times (W-2)$ basic units totally. Fig. \ref{non_intersection} is a schematic diagram of the basic unit extracted by the sliding kernel, and the dashed box represents a basic unit extracted by the sliding kernel. With 1 as the sliding step, the sliding kernel moves one pixel to the right or to the down to extract the next basic unit. Based on this principle, $(H-2) \times (W-2)$ basic units with a size of $3 \times 3$ can be extracted from an image with a size of $H \times W$.
Parallel calculation is used to improve calculation efficiency. The whole image is divided into several basic units, and the optical flow non-intersection loss is calculated between the middle pixel and the 8 adjacent pixels in each basic unit. For the non-occlusion regions of the image $X_t$, as analysed in Section \ref{sec:laws}, the pixels will not intersect with each other, so the loss of optical flow non-intersection is calculated to penalize outliers. Among them, $P_{mid}$ corresponds to the middle pixel of a basic unit, and $P_i$ ($i=1,2,...8$) corresponds to other pixels adjacent to $P_{mid}$ in the basic unit. As shown in Fig. \ref{non_intersection}, the pixel points $P_i^t$ and $P_{mid}^{t}$ are in the first frame, and the corresponding pixels in the second frame are $P_i^{t+1}$ and $P_{mid}^{t+1}$. If the optical flow $\overrightarrow{P_{mid}^t P_{mid}^{t+1}}$ does not intersect the optical flow $\overrightarrow{P_i^{t} P_i^{t+1}}$, then the optical flow non-intersection loss between the pixel points $P_{mid}^t$ and $P_i^t$ is 0; Otherwise, it is considered that occlusion occurs between pixels. The optical flow non-intersection loss is calculated as the following steps.
There are usually different colors on both sides of the object edge, where the occlusion is prone to occur. The interior of the object is not easy to be occluded. Therefore, the loss function has a greater punishment on the interior of the object and less to the edge of the object. Therefore, the weight $w_i$ of optical flow non-intersection loss is calculated based on the degree of color difference between the middle pixel $P_{mid}$ and the surrounding 8 pixel points $P_i$ in each basic unit:
\begin{equation}{w_i} = \exp ( - \frac{1}{3}\sum\limits_{j \in \{ R,G,B\} } {\left| {{P_{i,j}} - {P_{mid,j}}} \right|} ),
\end{equation}
where $P_{mid}$ is the middle pixel of the basic unit, $P_i$ corresponds to other pixels adjacent to $P_{mid}$ in the basic unit ($i=1,2,...,8$). $P_{i,j}$ and $P_{mid,j}$ represent the three channel values of the RGB color space corresponding to the pixel points of $P_i$ and $P_{mid}$.
As shown in Fig. \ref{non_intersection}, the optical flow intersection coefficients $\mu_i$ and $\lambda_i$ represent the ratio of the intersection position to the length of the optical flow vector:
\begin{equation}\begin{gathered}
{\lambda _i} = \frac{1}{\Lambda }\left| {\begin{array}{*{20}{c}}
{{x_i^t} - {x_{mid}^t}}&{ - \Delta {x_i^t}} \\
{{y_i^t} - {y_{mid}^t}}&{ - \Delta {y_i^t}}
\end{array}} \right|, \hfill \\
{\mu _i} = \frac{1}{\Lambda }\left| {\begin{array}{*{20}{c}}
{\Delta {x_{mid}^t}}&{{x_i^t} - {x_{mid}^t}} \\
{\Delta {y_{mid}^t}}&{{y_i^t} - {y_{mid}^t}}
\end{array}} \right|, \hfill \\
\Lambda = - \Delta {x_{mid}^t}\Delta {y_i^t} + \Delta {x_i^t}\Delta {y_{mid}^t},
\end{gathered}
\end{equation}
where $(x_{mid}^t, y_{mid}^t)$ is the coordinate of the intermediate pixel $P_{mid}^t$ in the $t$ frame, and $(x_i^t, y_i^t)$ is the coordinate of adjacent pixel $P_{i}^t$ in the $t$ frame. $\overrightarrow{P_{mid}^t P_{mid}^{t+1}} = (\Delta {x_{mid}^t}, \Delta {y_{mid}^t})$ and $\overrightarrow{P_{i}^t P_{id}^{t+1}} = (\Delta {x_{i}^t}, \Delta {y_{i}^t})$ are the optical flow displacements of the pixel points, $P_{mid}^t$ and $P_{i}^t$ , from the $t$ frame to the $t+1$ frame. When $0<\mu_i,\lambda_i<1$, $\overrightarrow{P_{mid}^t P_{mid}^{t+1}}$ and $\overrightarrow{P_{i}^t P_{id}^{t+1}}$ will intersect.
The optical flow non-intersection loss $L_k$ of the intermediate pixel relative to all 8 adjacent surrounding pixels in the $k$-th basic unit is calculated as follows:
\begin{equation}
{L_k} = \left\{ {\begin{array}{*{20}{l}}
{\frac{1}{8}\sum\limits_{i = 1}^8 {{w_i}\sigma\left(\exp ( - {{\left| {{\lambda _i} - {\mu _i}} \right|}^2})\right)},}&{0 < {\lambda _i},{\mu _i} < 1,} \\
{0,}&{{\text{Others}}.}
\end{array}} \right.
\end{equation}
\begin{figure}[t]
\centering
\resizebox{0.90\columnwidth}{!}
{
\includegraphics[scale=1.00]{fig5.pdf}}
\vspace{-1mm}
\caption{Schematic diagram of the intersection of optical flow $\protect\overrightarrow{P_{mid}^t P_{mid}^{t+1}}$ and optical flow $\protect\overrightarrow{P_6^{t} P_6^{t+1}}$.}
\label{non_intersection}
\vspace{-0pt}
\end{figure}
$L_k$ is calculated in one basic unit and a total of $(H-2)\times(W-2)$ basic units are extracted. Then, $L_{non-inter}$ represents the average non-intersection loss of optical flow for these $(H-2)\times(W-2)$ units:
\begin{equation}
L_{non-inter} = \frac{1}{(H-2)\times(W-2)}\sum\limits_{k = 1}^{(H-2)\times (W-2)} {L_k}. \end{equation}
\subsection{The Non-blocking Loss}\label{blocking}
As analysed in Section \ref{sec:laws}, in the non-occlusion area, there will be no pixel blocking when the object moving. The parallelization technique is also used here similar to Section \ref{sec:intersection}.
Taking $4\times 4$ as the sliding kernel size and 1 as the sliding step size. Fig. \ref{non_blocking} shows the schematic diagram of the pixel blocking for a basic unit extracted by the sliding kernel, and the dashed box represents a basic unit extracted by the sliding kernel. With 1 as the sliding step, the sliding kernel moves one pixel to the right or to the down to extract the next basic unit. Based on this principle, $(H-3) \times (W-3)$ basic units with a size of $4 \times 4$ can be extracted from the image at $t$ frame with a size of $H \times W$. Parallelization is used to calculate the extracted $(H-3) \times (W-3)$ basic units. In each basic unit, the optical flow non-blocking loss of 12 pixels in the periphery is calculated based on the blocking calculation with the 4 pixels in the middle. Our proposed method determines and measures how far the surrounding pixels flow into the inside of the quadrilateral composed of 4 pixels in the middle.
Define a basic unit with 4 pixels ${A,B,C,D}$ in the middle and 12 pixels $P_i$ in the periphery, where $i=1,2,...,12$. The four pixels $A, B, C, D$ in the middle of the basic unit at $t$ frame constitute a quadrilateral $\overline {ABCD}$ at $t+1$ frame, which can be divided into two triangles by a diagonal line. When the quadrilateral $\overline {ABCD}$ at the second frame is a convex quadrilateral, according to the selection of different diagonals $\overline {AC}$ or $\overline {BD}$ for division, there are two cases where the quadrilateral $\overline {ABCD}$ contains two triangles. For any of the two division cases, if the peripheral pixels flow into a triangle, it can be inferred that occlusion occurs. (For the sake of brief expression, we classify the points falling on the boundary of the triangle as being within the triangle, because this will not affect the subsequent distance calculation.) As shown in Fig. \ref{non_blocking}(a), According to the diagonal $\overline {AC}$, the quadrilateral is divided into triangles $\overline {ABC}$ and $\overline {ACD}$. The point $P_i$ flows inside triangle $\overline {ABC}$.
However, if the quadrilateral $\overline {ABCD}$ at the second frame is a concave quadrilateral, the division case with diagonals $\overline {AC}$ as shown in Fig. \ref{non_blocking}(b) is not enough to determine that the pixel $p_5$ falls inside the quadrilateral $\overline {ABCD}$. If $\overline {AC}$ is as the diagonal in the calculation progress, the point $P_5$ is simultaneously inside triangles $\overline {ABC}$ and $\overline {ACD}$. However, the point $P_5$ is not blocked by the quadrilateral $\overline {ABCD}$, but this can be judged by using the diagonal $\overline {BD}$ to divide. According to the diagonal $\overline {BD}$, the quadrilateral $\overline {ABCD}$ is divided to triangles $\overline {ABD}$ and $\overline {BCD}$, and the point $P_5$ is not inside $\overline {ABD}$ or $\overline {BCD}$. Therefore, only the point $P_i$ is inside a triangle both in the two division cases, the pixel blocking occurs for the point $P_i$.
For triangle $\overline {ABC}$ and point $P_i$, when $\overrightarrow{BA} \times \overrightarrow{BP}, \overrightarrow{AC} \times \overrightarrow{AP}, \overrightarrow{CB} \times \overrightarrow{CP}$ are in the same direction, it can be judged that $P_i$ is within $\overline {ABC}$. In the same way, it can be inferred if $P_i$ is within ${\overline{ACD}}$, $\overline{ABD}$ and $\overline{BCD}$. The logic expression is as follows:
\begin{small}\begin{equation}\begin{gathered}
{\Gamma _{\overline {ABC} }} =\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {BA} }}}\!\!\! &\!\! {{x_{\overrightarrow {BP} }}} \\
{{y_{\overrightarrow {BA} }}}\!\!\! &\!\! {{y_{\overrightarrow {BP} }}}
\end{array}} \!\!\!\right| \!\! \geqslant \!\! 0} \right)\!\! \wedge \!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {AC} }}}\!\!\! &\!\! {{x_{\overrightarrow {AP} }}} \\
{{y_{\overrightarrow {AC} }}}\!\!\! &\!\! {{y_{\overrightarrow {AP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \!\!\wedge\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {CB} }}}\!\!\! &\!\! {{x_{\overrightarrow {CP} }}} \\
{{y_{\overrightarrow {CB} }}}\!\!\! &\!\! {{y_{\overrightarrow {CP} }}}
\end{array}} \!\!\! \right| \!\!\geqslant\!\! 0} \right) \hfill \\
{\Gamma _{\overline {ACD} }} =\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {CA} }}}\!\!\! &\!\! {{x_{\overrightarrow {CP} }}} \\
{{y_{\overrightarrow {CA} }}}\!\!\! &\!\! {{y_{\overrightarrow {CP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \!\!\wedge\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {AD} }}}\!\!\! &\!\! {{x_{\overrightarrow {AP} }}} \\
{{y_{\overrightarrow {AD} }}}\!\!\! &\!\! {{y_{\overrightarrow {AP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \!\!\wedge\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {DC} }}}\!\!\! &\!\! {{x_{\overrightarrow {DP} }}} \\
{{y_{\overrightarrow {DC} }}}\!\!\! &\!\! {{y_{\overrightarrow {DP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \hfill \\
{\Gamma _{\overline {ABD} }} =\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {BA} }}}\!\!\! &\!\! {{x_{\overrightarrow {BP} }}} \\
{{y_{\overrightarrow {BA} }}}\!\!\! &\!\! {{y_{\overrightarrow {BP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \!\!\wedge\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {AD} }}}\!\!\! &\!\! {{x_{\overrightarrow {AP} }}} \\
{{y_{\overrightarrow {AD} }}}\!\!\! &\!\! {{y_{\overrightarrow {AP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \!\!\wedge\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {DB} }}}\!\!\! &\!\! {{x_{\overrightarrow {DP} }}} \\
{{y_{\overrightarrow {DB} }}}\!\!\! &\!\! {{y_{\overrightarrow {DP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \hfill \\
{\Gamma _{\overline {BCD} }} =\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {BD} }}}\!\!\! &\!\! {{x_{\overrightarrow {BP} }}} \\
{{y_{\overrightarrow {BD} }}}\!\!\! &\!\! {{y_{\overrightarrow {BP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \!\!\wedge\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {DC} }}}\!\!\! &\!\! {{x_{\overrightarrow {DP} }}} \\
{{y_{\overrightarrow {DC} }}}\!\!\! &\!\! {{y_{\overrightarrow {DP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \!\!\wedge\!\! \left( {\left|\!\!\! {\begin{array}{*{20}{c}}
{{x_{\overrightarrow {CB} }}}\!\!\! &\!\! {{x_{\overrightarrow {CP} }}} \\
{{y_{\overrightarrow {CB} }}}\!\!\! &\!\! {{y_{\overrightarrow {CP} }}}
\end{array}} \!\!\!\right| \!\!\geqslant\!\! 0} \right) \hfill
\end{gathered} \end{equation}\end{small}
where $\Gamma_{\overline {ABC} },\Gamma_{\overline {ACD} },\Gamma_{\overline {ABD} }$, and $\Gamma_{\overline {BCD} }$ represent if $P_i$ is in the triangles $\overline {ABC}, \overline {ACD},\overline {ABD}$, and $\overline {BCD}$, respectively. As analysed above, it is inferred that $P_i$ flows into the quadrilateral $\overline {ABCD}$ when $P_i$ flows at least into a triangle both in the two division cases, that is:
\begin{equation}
{\Gamma _{\overline {ABCD} }}=\left( {{\Gamma _{\overline {ABC} }} \vee {\Gamma _{\overline {ACD} }}} \right) \wedge \left( {{\Gamma _{\overline {ABD} }} \vee {\Gamma _{\overline {BCD} }}} \right).
\end{equation}
\begin{figure}[t]
\centering
\resizebox{0.95\columnwidth}{!}
{
\includegraphics[scale=1.00]{fig6.pdf}}
\vspace{-3mm}
\caption{The geometric relation diagram of peripheral pixels and quadrilateral $\overline {ABCD}$. (a) corresponds to the situation that quadrilateral $\overline {ABCD}$ is convex quadrilateral, and (b) corresponds to the situation that quadrilateral $\overline {ABCD}$ is concave quadrilateral. }
\label{non_blocking}
\vspace{-0pt}
\end{figure}
According to the spatial geometric relationship between the quadrilateral $\overline {ABCD}$ formed by the intermediate four pixels and each peripheral pixel $P_i$ in a basic unit, the optical flow non-blocking loss $E_i$ of the pixel $P_i$ is defined as:
\begin{equation}
{{E_k}} = \left\{ {\begin{array}{*{20}{l}}
{\frac{1}{{12}}\sum\limits_{i = 1}^{12}{e^{ - \frac{1}{{{d_i}}}}},}&{{\Gamma _{\overline {ABCD} }} = True,} \\
{0,}&{{\Gamma _{\overline {ABCD} }} = False,}
\end{array}} \right.\end{equation}
where $d_i$ is the minimum distance of $P_i$ to each side of the quadrilateral $\overline {ABCD}$.
The above is about the loss for a peripheral pixel $P_i$ in a basic unit. There are a total of $(H-3)\times (W-3)$ basic units for the source image, and each unit includes $12$ peripheral pixels. The optical flow non-blocking loss of the entire image is as follows:
\begin{equation}
{L_{{\text{non - blocking }}}} = \frac{1}{{(H - 3)\times(W - 3)}}\sum\limits_{k = 1}^{(H - 3)\times(W - 3)} {{E_k}}.
\end{equation}
\setlength{\tabcolsep}{6mm}
\begin{table*}[t]
\centering
\caption{The experiment results training and testing on synthetic dataset. 'ft' means that the models of optical flow estimation are fine-tuned on specific evaluation datasets after supervising, which is not conducive to practical application. The results in parentheses are not comparable because its training set contains the evaluation set. "()" means that the results are supervised trained on the evaluation set. "\{\}" means that the results are unsupervised trained on the evaluation set, and "[]" means that the results are trained on the dataset related to the evaluation set. The best results under every evaluation set are marked in bold. Unpublished results are marked as '-'.}
\footnotesize
\begin{center}
\begin{tabular}{lccccc}
\toprule
&&\multicolumn{2}{c}{EPE on Sintel Clean\cite{butler2012naturalistic}} &\multicolumn{2}{c}{EPE on Sintel Final\cite{butler2012naturalistic}} \\
\cline{3-6}\noalign{\smallskip}
\multirow{-2}{*}{\begin{tabular}[c]{@{}c@{}} Method\end{tabular}}
&\multirow{-2}{*}{\begin{tabular}[c]{@{}c@{}} Multi-frame\end{tabular}}
& Train & Test & Train & Test \\
\hline
\noalign{\smallskip}
FlowNet2-ft \cite{ilg2017flownet}
&
&(1.45) &4.16
&(2.01) &5.74
\\
PWC-Net-ft \cite{sun2018pwc}
&
&(1.70) &3.86
&(2.21) &5.13
\\
SelFlow-ft \cite{liu2019selflow}
&
&(1.68) &[3.74]
&(1.77) &\{4.26\}
\\
VCN-ft \cite{yang2019volumetric}
&
&(1.66) &2.81
&(2.24) &4.40
\\
\hline
\noalign{\smallskip}
FlowNet2 \cite{ilg2017flownet}
&
&\bf2.02 &\bf3.96
&\bf3.14 &\bf6.02
\\
PWC-Net \cite{sun2018pwc}
&
&2.55 &-
&3.93 &
\\
VCN \cite{yang2019volumetric}
&
&2.21 &-
&3.62 &-
\\
\hline
\noalign{\smallskip}
DSTFlow \cite{ren2017unsupervised}
&
&\{6.16\} &10.41
&\{7.38\} &11.28
\\
OAFlow \cite{wang2018occlusion}
&
&\{4.03\} &7.95
&\{5.95\} &9.15
\\
UnFlow \cite{meister2018unflow}
&
&- &-
&7.91 &10.21
\\
MFOccFlow \cite{janai2018unsupervised}
&$\surd$
&\{3.89\} &7.23
&\{5.52\} &8.81
\\
EPIFlow \cite{zhong2019unsupervised}
&$\surd$
&3.94 &7.00
&5.08 &8.51
\\
DDFlow \cite{liu2019ddflow}
&$\surd$
&\{2.92\}&6.18
&\{3.98\} &7.40
\\
SelFlow \cite{liu2019selflow}
&$\surd$
&[2.88] &[6.56]
&\{3.87\} &\{6.57\}
\\
UFlow-test\cite{jonschkowski2020matters}
&
&3.01 &-
&4.09 &-
\\
UFlow-train\cite{jonschkowski2020matters}
&
&\{2.50\} &5.21
&\{3.39\} &6.50
\\
Our-test
&
&\bf2.94 &-
&\bf3.95 &-
\\
Our-train
&
&\{2.47\} &\bf4.26
&\{3.57\} &\bf6.28
\\
\bottomrule
\end{tabular}
\end{center}
\vspace{-0pt}
\label{sintel}
\end{table*}
\setlength{\tabcolsep}{4.5mm}
\begin{table*}[t]
\centering
\caption{The experiment results training on the synthetic datasets while testing on both synthetic and real datasets. 'MF' means that the method utilizes the information of multiple frames. The best results for each evaluation dataset are marked in bold. }
\footnotesize
\begin{center}
\begin{tabular}{clcccccc}
\toprule
&&\multicolumn{1}{c}{Flying Chairs \cite{dosovitskiy2015flownet}} &\multicolumn{2}{c}{Sintel train \cite{butler2012naturalistic}} &\multicolumn{3}{c}{KITTI-2015 train \cite{menze2015joint}}
\\
\cline{3-8}\noalign{\smallskip}
\multirow{-2}{*}{\begin{tabular}[c]{@{}c@{}} Training Dataset\end{tabular}}
&\multirow{-2}{*}{\begin{tabular}[c]{@{}c@{}} Method \end{tabular}}& Test & Clean & Final & All &Noc &ER\% \\
\hline
\noalign{\smallskip}
\multirow{5.5}{*}{\begin{tabular}[c]{@{}c@{}} Flying Chairs \cite{dosovitskiy2015flownet} \\dataset \end{tabular}}
&PWC-Net \cite{sun2018pwc}
&\bf2.00 &3.33
&4.59 &13.20
&- &41.79
\\
&DDFlow \cite{liu2019ddflow} {(MF)}
&2.97 &4.83
&4.85 &17.26
&- &-
\\
&UFlow-test \cite{jonschkowski2020matters}
&\{2.82\} &4.36
&5.12 &15.68
&7.96 &32.69
\\
&UFlow-train \cite{jonschkowski2020matters}
&2.55 &3.43
&4.17 &11.27
&5.66 &30.31
\\
&Ours-test
&2.72 &4.63
&5.32 &15.43
&7.23 &28.11
\\
&Ours-train
&2.52 &\bf3.23
&\bf4.15 &\bf9.84
&\bf4.65 &\bf26.67
\\
\hline
\noalign{\smallskip}
\multirow{5.5}{*}{\begin{tabular}[c]{@{}c@{}}Sintel \\dataset \cite{butler2012naturalistic}\end{tabular}}
&PWC-Net\cite{sun2018pwc}
&3.69 &\bf(1.86)
&\bf(2.31) &10.52
&- &30.49
\\
&DDFlow \cite{liu2019ddflow} (MF)
&3.46 &\{2.92\}
&\{3.98\} &12.69
&- &-
\\
&UFlow-test \cite{jonschkowski2020matters}
&3.39 &3.01
&4.09 &7.67
&3.77 &\bf17.41
\\
&UFlow-train \cite{jonschkowski2020matters}
&3.25 &\{2.50\}
&\{3.39\} &9.40
&4.53 &20.02
\\
&Ours-test
&2.87 &2.94
&3.95 &\bf7.52
&\bf3.38 &18.63
\\
&Ours-train
&\bf2.82 &\{2.47\}
&\{3.57\} &8.40
&3.60 &20.27
\\
\bottomrule
\end{tabular}
\end{center}
\vspace{-0pt}
\label{KITTI}
\end{table*}
\section{Experiments}
\subsection{Training and Testing Details}\label{detail}
In order to demonstrate the effectiveness of our proposed method, our model is evaluated on the standard optical flow benchmark datasets: Flying Chairs dataset \cite{dosovitskiy2015flownet}, Sintel dataset \cite{butler2012naturalistic}, and KITTI 2015 datasets \cite{geiger2012we,menze2015joint}. Flying Chairs and Sintel are synthetic datasets, and KITTI is a real dataset. The Flying Chairs dataset contains a total of 22,872 pairs of images, of which 22,232 pairs are used as the training set and the remaining 640 pairs are used as the test set. For the Sintel dataset, we divide the training set and test set according to the standard classification criteria, where the training set contains 2082 images and the test set contains 1128 images. The training set and test set in KITTI 2015 dataset both contain 200 pairs of images. For Sintel, it is common to train on the training set, and report the benchmark performance on the test set, which is included in our experiment. We expect to evaluate the generalization ability of our model on different datasets. However, the test set does not have public labels and there is a limit on the number of submissions to the official test set, so to be convenient for our experiments, we also train on the test set and evaluate on the training set. Therefor, there are two trained models for Sintel dataset. One is trained on the training set, the other is trained on the test set. Since the Sintel dataset contains both final and clean parts, they are used both when training the model and separately when evaluating the model, like UFlow \cite{jonschkowski2020matters}. In addition, pretraining is a very common method to improve accuracy in both supervised\cite{dosovitskiy2015flownet,sun2018pwc} and unsupervised\cite{liu2019ddflow,zhong2019unsupervised} optical flow estimation, so we have a pretraining stage in the trainging set of Flying Chairs before our formal training on Sintel. For KITTI, the raw KITTI 2015 dataset is used to verify the generalization ability of our model. We use the training set of KITTI 2015 as our evaluation set because the training set has public ground truth of the optical flow. It is expected that our method can be trained on synthetic datasets and evaluated on real datasets to achieve better generalization performance.
\begin{figure*}[t]
\centering
\resizebox{1.00\textwidth}{!}
{
\includegraphics[scale=1.00]{vision.pdf}}
\vspace{-4mm}
\caption{The visualization of our qualitative results compared with UFlow \cite{jonschkowski2020matters} on Sintel Clean, Sintel Final, and KITTI 2015 datasets respectively. These qualitative results show the effect of our method, with good results for independent moving objects as well as fine details.}
\label{vision}
\vspace{-0pt}
\end{figure*}
As with most previous works, we use EPE (Endpoint Error) and ER (Error Rates) as our evaluation metrics. Our network structure is based on PWC-Net \cite{sun2018pwc}, similar to UFlow \cite{jonschkowski2020matters}. All experiments are performed with 1 as the batch size on a single of RTX 2080Ti. Our experiments are based on TensorFlow 2.2.0. The Adam \cite{kingma2014adam} method is used as the optimizing strategy of training, where $\beta_1 = 0.9$, $\beta_2 = 0.999$. In the pretraining stage, the learning rate is a constant, $10^{-4}$. In the training phase, exponential decay is used. The learning rate decays 0.5 times per 200 epochs from $10^{-4}$ to $10^{-8}$, similar to UFlow \cite{jonschkowski2020matters}.
\subsection{Results}
Two series of experiments are conducted. The first group of experiments are trained and evaluated on the synthetic dataset. The second group of experiments are trained on synthetic dataset and evaluated on real dataset to verify the generalization ability of our method. Experimental methods and details are as Section \ref{detail}.
\subsubsection{Testing on Synthetic Dataset}
The quantitative evaluation results on the synthetic dataset (Sintel dataset) are shown in Table \ref{sintel}, which shows the results of unsupervised and supervised optical flow methods. Compared with MFOccFlow \cite{janai2018unsupervised}, EPIFlow \cite{zhong2019unsupervised}, DDFlow \cite{liu2019ddflow} and SelFlow \cite{liu2019selflow}, our method does not need to use the information of multiple frames but achieves better performance, which depends on our proposed novel constraints in the non-occlusion regions. In addition, SelFlow \cite{liu2019selflow} downloads the raw Sintel movie and extracts about 10,000 images, which makes its training data include both the official training set and the test set, while our method only trains on the official training set or test set. UFlow \cite{jonschkowski2020matters} systematically compares and improves occlusion segmentation methods. On the basis of getting the fine non-occlusion regions, we propose a geometry-based unsupervised constraint method for the optical flow in the non-occlusion regions. Compared with UFlow \cite{jonschkowski2020matters}, we make better use of the details of the non-occlusion regions and achieve better performance.
\subsubsection{Generalization Test on Real Dataset}
We evaluate the generalization of the model on the real dataset, KITTI. To evaluate the generalization of the model broadly, the models trained on different datasets will be evaluated on all datasets, and the results are shown in Table \ref{KITTI}. Specifically, models are trained on synthetic datasets, Flying Chairs and Sintel, and tested on multiple datasets, Flying Chairs, Sintel, and KITTI. Compared with PWC-Net \cite{sun2018pwc}, our unsupervised results are not as good as that of PWC-Net \cite{sun2018pwc} when trained and tested on the Flying Chairs dataset. However, our generalization performance outperforms the supervised approach, PWC-Net \cite{sun2018pwc}, on both the more complex synthetic data, Sintel, as well as the real dataset, KITTI. When trained on Sintel dataset, our generalization performance on both Flying Chairs and KITTI also outperforms PWC-Net \cite{sun2018pwc}. We use the network structure similar to PWC-Net \cite{sun2018pwc}, and our results are not as good as it in the training set, but achieve higher generalization performance in other datasets. It is difficult to obtain the ground truth of optical flow for the real dataset, so our unsupervised method has great practical application ability. DDFlow \cite{liu2019ddflow} is a multi-frame approach, and we only use two adjacent frames to achieve better results. After the UFlow \cite{jonschkowski2020matters} segments the occlusion regions, we implement fine geometric constraints of optical flow in the non-occlusion regions to achieve higher generalization performance, which indicates that better use of the essential information of optical flow in the non-occlusion regions can further improve the unsupervised performance of optical flow.
The qualitative results of our method compared with UFlow \cite{jonschkowski2020matters} on Sintel and KITTI 2015 benchmarks are shown in Fig ~\ref{vision}. It can be seen that our optical flow estimation is more uniform inside each moving objects, such as machetes, moving people, cars, grass, etc. This is because the optical flow cannot move randomly due to the proposed non-intersection and non-blocking losses inside the objects. Thus, the optical flow inside a single object is kept flexibly consistent for its motion, and the overall smoothness of optical flow for each object is ensured. At the same time, the constraints between adjacent objects also make the estimation of optical flow more accurate, such as the car motion estimation in the last two lines of Fig.~\ref{vision}. After the estimation the occlusion mask, the relative movement between adjacent objects can only be towards to cover occlusion regions. Otherwise, the relative movement of the adjacent objects can produce intersection and blocking of the optical flow. So that the relative movements of the adjacent objects are constrained, improving the optical flow estimation of adjacent objects. In addition, our visualized results are also better at detailed movements, such as pedestrian legs and butterfly movements.
\section{Conclusion}
In this paper, the motion regularity of the optical flow in the non-occlusion regions is carefully analyzed, and the geometric constraint laws of the optical flow in the non-occlusion regions are proposed. Two loss functions, non-intersection loss and non-blocking loss, are proposed based on the insight into the motion laws of optical flow in the non-occlusion regions. Their effectiveness has been proved by theoretical analysis and experiments. Optical flow is widely used in visual odometry, target tracking, dynamic segmentation, and other autonomous driving fields. The proposed method has a higher generalization performance on the real dataset, which makes the unsupervised method of optical flow in this paper have good practical application ability. Pixel-level geometric analysis and occlusion analysis are also instructive for depth estimation, visual odometry, depth completion, and scene flow estimation.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Active matter is a term used to describe matter that is composed of a large number of self-propelled active ‘particles’ that individually convert stored or ambient energy into systematic motion \citep{schweitzer07, morozov17}. The interaction of many of these individual active particles can lead to complex collective dynamics \citep{ramaswamy10}. Natural examples include a flock of birds, a school of fish, or a suspension of bacteria \citep{toner05}, but active matter may also be composed of synthetic active particles \citep{bechinger16}. These out-of-equilibrium systems are most often in fluids, and so understanding their dynamics and rheology involves a connection between fluid-body interactions and non-equilibrium statistical physics \citep{marchetti13, saintillan18}.
The study of active matter at small scales is complicated by the fact that the Stokes equations, which govern momentum conservation of Newtonian fluids when inertia is negligible, feature a long-range decay of fluid disturbances \citep{happel65}. Because of this, active particles interact through the fluid over distances long relative to their individual size and to properly capture the effect of the fluid in these systems one may need to sum hydrodynamic interactions between \textit{all} bodies, particularly at higher particle concentrations.
The difficulty of accurately capturing many-body hydrodynamic interactions is well known from the study of suspensions of passive particles, where early efforts to sum hydrodynamic interactions in infinite suspensions were plagued by problems of divergent sums (see for example the long literature on sedimenting particles \citep{davis85}) but eventually overcome by the pioneering work of \citet{batchelor72}, \citet{jeffrey74}, \citet{hinch77}, \citet{obrien79} and others. The Stokesian Dynamics method developed soon after facilitated the efficient dynamic simulation of passive particle suspensions at arbitrary concentrations \citep{brady88}. The essential basis of the Stokesian Dynamics method is a mixed asymptotic approach wherein hydrodynamic forces on particles due to interactions are computed distinctly when the particles are in close proximity versus widely separated. When the particles are widely separated the method sums many-body hydrodynamic reflections between particles through inversion of a truncated grand mobility tensor, whereas when the particles are in close proximity pair-wise additive lubrication forces are used \citep{durlofsky87}. When the suspension is infinite or periodic, a modification of the method introduced by \citet{obrien79} is used to obtain absolutely convergent expressions for the hydrodynamic interactions among all particles, suitable for the numerical simulation of a wide range of problems from sedimentation to rheology \citep{brady88a}. Since its inception the Stokesian Dynamics method has served as a foundational tool for the development of our understanding of suspension mechanics in the last several decades.
Unlike passive suspensions, in active suspensions each active particle in the fluid is endowed with non-trivial boundary conditions due to activity and constantly injects energy into the fluid. Many advances have been made in understanding the dynamics of individual swimming microorganisms (biological and synthetic), from the pioneering work of \citet{taylor51}, through to several detailed reviews of microscale locomotion research \citep{lighthill76, brennen77, lauga09b}. However, in a similar fashion to the early development of the passive suspension literature, the majority of research on collective locomotion of many bodies and active suspensions has emphasized dilute suspensions where swimmer-swimmer interactions are greatly simplified and far-field approximations are still valid \citep{saintillan18}. Interesting phenomena, such as particle clustering (motility-induced phase separation) has been observed for dense suspensions of active particles \citep{bechinger16}, but very often numerical simulation of these suspensions is done with active Brownian particle (ABP) models that neglect hydrodynamic interactions entirely \citep{cates15}. Others have used approaches for active suspensions that only approximate the Stokes equations, such as multiparticle collision dynamics \citep{zottl14} or lattice Boltzmann methods \citep{stenhammar17} that still may not be accurate for very dense concentrations. Results for simplified swimmers in concentrated suspensions display qualitative differences \citep{ishikawa08, evans11, alarcon13, zottl14, matas-navaro14, thutupalli18}. Some argue that hydrodynamic interactions act to suppress phase separation in active matter \citep{matas-navaro14}, while others have shown that hydrodynamic interactions with boundaries can control phase separation \citep{thutupalli18}. A complete understanding of the connection between individual particle activity, the hydrodynamic interactions between many particles that arise as a consequence of this activity, and the role this plays in the macroscopic dynamics of concentrated active suspensions has not been developed.
As we discuss in the following, the Stokesian Dynamics methodology is easily adapted for the dynamic simulation of suspensions of active particles at any concentration and, as with passive suspensions, is particularly well suited for dense concentrations and periodic boundary conditions. The mathematical structure of the dynamical equations remains essentially unchanged between passive and active particles and so any implementation of the Stokesian Dynamics method for passive particles, may be simply and easily modified for use with active particles. Moreover, we believe this mathematical structure provides an ideal formalism for theoretical analysis of hydrodynamic interactions in active matter much as it has for passive suspensions \citep{brady93a,brady93b}.
The Stokesian Dynamics method was first adapted for use with self-propelled active particles by \citet{mehandia08}. In their work, they introduce spheres each with a prescribed virtual propulsive force, that interact through a prescribed stresslet whose magnitude sets the size of the virtual propulsive force, and an induced stresslet caused by particle rigidity in a bulk flow. The dynamics of these active spheres was then solved numerically using the Stokesian Dynamics framework. The authors found that near-field interactions appeared important even at low concentrations, as particles tended to cluster, and they found qualitative differences in the dynamics between low and high volume fractions. Despite the novelty, the authors did not specify how the propulsive force arises from the surface boundary conditions nor how to generalize this approach. Shortly afterwards, \citet{ishikawa08} adapted the Stokesian Dynamics framework for use with spherical particles with a prescribed tangential slip velocity, so-called squirmer particles \citep{ishikawa08}. Using their own previous results for two-body hydrodynamic interaction between squirmer particles \citep{ishikawa06}, \citet{ishikawa08} were able to incorporate both near-field interactions and many-body far-field interactions for the study of dense suspensions of (2-mode) squirmer particles. This framework was then used to study the rheology \citep{ishikawa07}, diffusion \citep{ishikawa07b} and coherent structures \citep{ishikawa08b} of these active suspensions. The Stokesian Dynamics framework was then extended for use with passive and active spherical particles with a fairly general surface velocity field (but were individually immotile) that could be linked together to form complex swimming assemblies \citep{swan11}. That machinery was then used to simulate a number of model swimming microorganisms, from pusher and puller swimmers to helical flagella, by using assemblies of spherical particles \citep{swan11}. Recently, the far-field (but not the near-field) approach taken by Stokesian Dynamics, namely constructing mobility tensors by a moment expansion of the boundary integral equations, was extended to arbitrary squirmers \citep{singh15}. Here we show that this previous literature may all be encapsulated by a fairly general theory for the hydrodynamic interaction of arbitrary active particles that can then be solved efficiently with the Stokesian Dynamics approach, particularly for spherical particles.
We begin by developing a general kinematic description of an arbitrary active particle in section \ref{sec:kinematics}. We then show how the reciprocal theorem can be used to yield the exact dynamics for a suspension of $N$ arbitrary active particles in section \ref{sec:dynamics}. We then show how the Stokesian Dynamics technique is used for the approximation and dynamic simulation of these exact equations in section \ref{sec:stokesiandynamics}.
\section{Kinematics of an active particle}\label{sec:kinematics}
Consider an active particle identified with the region $\mathcal{B}$ as shown in figure \ref{particle}.
\begin{figure}
\center
\includegraphics[width = 0.6\textwidth]{figure1.pdf}
\caption{Schematic of a deforming active particle.}
\label{particle}
\end{figure}
Changes in the spatial configuration of the active particle can be described by a map, $\boldsymbol{\chi}$, from a reference configuration $\mathcal{B}_0$, such that $\mathbf{x}=\boldsymbol{\chi}(\mathbf{X},t)$ for $\mathbf{x}\in\mathcal{B}$ and $\mathbf{X}\in\mathcal{B}_0$. The motion of the body can be decomposed into shape change, $\boldsymbol{\chi}_s$, which represents the swimming gait of the active particle, and rigid-body motion, $\boldsymbol{\chi}_r$, which arises as a consequence of interaction with the fluid, so that
\begin{align}
\boldsymbol{\chi}(\mathbf{X},t) = \mathbf{x}^c(t) + \mathbf{\Theta}(t)\cdot(\boldsymbol{\chi}_s(\mathbf{X},t)-\boldsymbol{\chi}_s(\mathbf{X}_0,t)),
\end{align}
where $\mathbf{x}^c$ is the translation and $\mathbf{\Theta}$ the rotation (about $\boldsymbol{\chi}_s(\mathbf{X}_0,t)$) of the body under the action of $\boldsymbol{\chi}_r$. Upon differentiation, we obtain the velocity of the body
\begin{align}
\mathbf{u}(\mathbf{x}\in \mathcal{B}) = \mathbf{U}+\mathbf{\Omega}\times\mathbf{r}+\mathbf{u}^s,
\label{bcparticle}
\end{align}
where the translational velocity $\mathbf{U} = d\mathbf{x}^c/dt$, while the rotational velocity $\mathbf{\Omega}$ is defined by $d\mathbf{\Theta}/dt = \mathbf{\Omega}\times\mathbf{\Theta}$ and $\mathbf{r} = \mathbf{\Theta}(t)\cdot(\boldsymbol{\chi}_s(\mathbf{X},t)-\boldsymbol{\chi}_s(\mathbf{X}_0,t))$. The deformation velocity due to shape change is
\begin{align}
\mathbf{u}^s=\mathbf{\Theta}\cdot\frac{d(\boldsymbol{\chi}_s(\mathbf{X},t)-\boldsymbol{\chi}_s(\mathbf{X}_0,t))}{dt}.
\end{align}
where the last term is the deformation velocity in the unoriented configuration,
\begin{align}
\frac{d(\boldsymbol{\chi}_s(\mathbf{X},t)-\boldsymbol{\chi}_s(\mathbf{X}_0,t))}{dt}=\mathbf{\Theta}^{-1}\cdot\mathbf{u}^s\equiv\tilde{\bu}^s.
\end{align}
In a purely kinematic description of the activity of the particle we would consider the shape change $\boldsymbol{\chi}_s$, or simply the surface velocity (in the reference orientation) $\tilde{\bu}^s(\mathbf{X} \in \partial \mathcal{B}_0)$, to be prescribed and then solve for the rigid-body translation and rotation of the active particle such that momentum (of the particle and of the fluid) is conserved.
\section{Dynamics of active particles}\label{sec:dynamics}
Consider a suspension of $N$ particles, each labeled $\mathcal{B}_i$ where $i\in[1,N]$, immersed in an arbitrary background flow denoted $\mathbf{u}^\infty$. The disturbance velocity field generated by the particles is
\begin{align}
\mathbf{u}' = \mathbf{u}-\mathbf{u}^\infty.
\end{align}
Neglecting the inertia of the active particles and of the Newtonian fluid in which they are immersed, the rigid-body dynamics of active particles is governed by an instantaneous force balance
\begin{align}
\mathsf{\t F}+\mathsf{\t F}_{ext}=\mathsf{\t 0},
\label{forces}
\end{align}
where $\mathsf{\t F}$ and $\mathsf{\t F}_{ext}$ are respectively $6N-$dimensional vectors of hydrodynamic and external (or interparticle) forces/torques on all $N$ particles.
In general, the hydrodynamic forces may be easily shown, by the reciprocal theorem of low Reynolds number hydrodynamics, to be weighted integrals of the boundary traction during rigid-body motion,
\begin{align}
\mathsf{\t F} &= \sum_i\int_{\partial\mathcal{B}_i}\mathbf{u}'\cdot(\mathbf{n}\cdot\mathsf{\t T}_{\mathsf{\t U}})\,\text{d} S,
\label{hydrodynamicforce}
\end{align}
where $\mathbf{n}$ is the normal to the surface, $\partial \mathcal{B}_i$, pointing into the fluid. The tensor field $\mathsf{\t T}_{\mathsf{\t U}}$ connects the rigid-body motion of $6N$ particles to stress (see Appendix \ref{appendixreciprocal} for a detailed derivation). Substitution of the boundary conditions of each active particle, \eqref{bcparticle}, into \eqref{hydrodynamicforce} yields a decomposition of the hydrodynamic forces into three separate forces due to each aspect of the boundary motion: the hydrodynamic `swim' force (or thrust),
\begin{align}
\mathsf{\t F}_s &= \sum_i\int_{\partial\mathcal{B}_i}\mathbf{u}^s_i\cdot(\mathbf{n}\cdot\mathsf{\t T}_{\mathsf{\t U}})\,\text{d} S,
\label{swimforce}
\end{align}
generated by each active particle as if held fixed in an otherwise quiescent fluid; the hydrodynamic drag force on each particle
\begin{align}
\mathsf{\t F}_\infty &= -\sum_i\int_{\partial\mathcal{B}_i}\mathbf{u}^\infty\cdot(\mathbf{n}\cdot\mathsf{\t T}_{\mathsf{\t U}})\,\text{d} S,
\label{flowforce}
\end{align}
as if inactive and held fixed in a background flow; and the hydrodynamic drag due to the rigid-body motion of each particle,
\begin{align}
\mathsf{\t F}_d=\sum_i\int_{\partial\mathcal{B}_i}(\mathbf{U}_i+\mathbf{\Omega}_i\times\mathbf{r}_i)\cdot(\mathbf{n}\cdot\mathsf{\t T}_{\mathsf{\t U}})\,\text{d} S=-\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}\cdot\mathsf{\t U},
\end{align}
as if inactive (passive) in an otherwise quiescent fluid. The latter is written in terms of a ($6N\times6N$) resistance tensor, which is the linear operator that gives hydrodynamic forces due to rigid-body translational/rotational velocities $\mathsf{\t U}$ (another $6N$-dimensional vector).
Substitution of these forces into \eqref{forces} and inversion of the resistance tensor gives
\begin{align}
\mathsf{\t U}=\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{-1}\cdot\left[\mathsf{\t F}_{ext}+\mathsf{\t F}_s+\mathsf{\t F}_\infty\right].
\label{mobility}
\end{align}
This relationship simply states that the rigid-body motion of active particles is linearly related to the forces exerted by or on those particles. The deterministic formula in \eqref{mobility} is exact and completely general; it governs the dynamics of a suspension of active (and passive) particles of arbitrary shape and activity in a general background flow. A stochastic Brownian force may also be included in the above force balance, with the associated thermal drift term that arises upon elimination of inertial degrees of freedom,
\begin{align}
\mathsf{\t U}=\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{-1}\cdot\left[\mathsf{\t F}_{ext}+\mathsf{\t F}_s+\mathsf{\t F}_\infty+\mathsf{\t F}_B \right]+k_B T\boldsymbol{\nabla}\cdot\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{-1}.
\label{mobility-s}
\end{align}
The vector $\mathsf{\t U}$ now represents discrete changes in position and orientation over an interval $\Delta t$ and the Brownian force, $\mathsf{\t F}_B = \sqrt{2k_BT/\Delta t}\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{1/2}\cdot\mathbf{m}{\Psi}$, where $k_B$ is the Boltzmann constant, $T$ is the fluid temperature and $\mathbf{m}{\Psi}$ is a vector of standard Gaussian random variables.
Although \eqref{mobility} and \eqref{mobility-s} are exact, to compute the dynamics the tensor field $\mathsf{\t T}_{\mathsf{\t U}}$ would need to be found at each instant and this is prohibitively expensive for suspensions of large numbers of particles (and more so if they are changing shape). Instead, an approximate approach used in Stokesian Dynamics is to evaluate a truncated set of moments of the traction operator $\mathbf{n}\cdot\mathsf{\t T}_{\mathsf{\t U}}$ on the surfaces of the particles $\partial\mathcal{B}_i$. We outline this approach for spherical active bodies below, where the approach is particularly elegant and simplified, but the methodology can certainly be extended to anisotropic bodies \citep{claeys93a,claeys93b,claeys93c,nasouri18}.
\subsection{Spherical moments}
In order to facilitate computation we use the fact that one may write an arbitrary function on a sphere in terms of an expansion in irreducible tensors of the unit normal $\mathbf{n}$ (dimensionless tensorial spherical harmonics) \citep{hess15}. In this way the deformation velocity of each active particle may be written as
\begin{align}
\mathbf{u}^s(\mathbf{x} \in \partial \mathcal{B}_i)&=\mathbf{C}^{(1)}_i+\mathbf{n}\cdot\mathbf{C}^{(2)}_i+\overbracket{\mathbf{n}\bn}:\mathbf{C}^{(3)}_i+\ldots,
\label{eqsurface}
\end{align}
where in this shorthand notation the superscript indicates the tensor order of the coefficients and the overbracket means the irreducible (or fully symmetric and traceless) part of the tensor (see the Appendix \ref{appendixtensors} for further details).
The coefficient tensors $\mathbf{C}^{(n)}$ may be easily obtained by appealing to the orthogonality of the tensorial spherical harmonics
\begin{align}
\mathbf{C}_i^{(n+1)} = \frac{1}{4\pi a^2}\int_{\partial\mathcal{B}_i} w_n \overbracket{\mathbf{n}^n}\mathbf{u}^s\,\text{d} S,
\end{align}
where the weight $w_n = (2n+1)!!/n!$. Hence we see the coefficient tensors are (weighted) irreducible moments of $\mathbf{u}^s$. We can recast these coefficients in more familiar terms by separating symmetric and antisymmetric parts of $\mathbf{C}_i^{(2)}$,
\begin{align}
\mathbf{U}^s_i &=\frac{1}{4\pi a_i^2}\int_{\partial\mathcal{B}_i}\mathbf{u}^s\,\text{d} S,\label{moments1}\\
\mathbf{\Omega}^s_i &= \frac{3}{8\pi a_i^4}\int_{\partial\mathcal{B}_i}\mathbf{r}_i\times\mathbf{u}^s\,\text{d} S,\label{moments2}\\
\mathbf{E}^s_i &= \frac{3}{4\pi a_i^4}\int_{\partial\mathcal{B}_i} \left[\frac{1}{2}(\mathbf{r}_i\mathbf{u}^s+\mathbf{u}^s\mathbf{r}_i)\right]\,\text{d} S,\label{moments3}
\end{align}
to rewrite the surface velocity in familiar form \citep{swan11}
\begin{align}
\mathbf{u}^s(\mathbf{x} \in \partial \mathcal{B}_i)&=\mathbf{U}^s_i+\mathbf{\Omega}_i^s\times\mathbf{r}_i+\mathbf{r}_i\cdot\mathbf{E}_i^s+\ldots
\end{align}
We can likewise express the background flow in terms of a moment expansion and in this way write in a consistent fashion for the disturbance field
\begin{align}
\mathbf{u}'(\mathbf{x} \in \partial \mathcal{B}_i)&=\mathbf{U}_i+\mathbf{U}_i^s-\mathbf{U}_i^\infty+(\mathbf{\Omega}_i+\mathbf{\Omega}_i^s-\mathbf{\Omega}_i^\infty)\times\mathbf{r}_i+\mathbf{r}_i\cdot(\mathbf{E}_i^s-\mathbf{E}_i^\infty)+\ldots
\label{velexpansion}
\end{align}
where $\mathbf{U}_i^\infty$, $\mathbf{\Omega}_i^\infty$ and $\mathbf{E}_i^\infty$ are defined as in (\ref{moments1}--\ref{moments3}) in terms of moments of the background flow $\mathbf{u}^\infty$. If the background flow is linear, then $\mathbf{\Omega}_i^\infty=\mathbf{\Omega}^\infty$ and $\mathbf{E}_i^\infty=\mathbf{E}^\infty$ are constants everywhere in the flow (but still may be arbitrary functions of time).
Using the expansion \eqref{velexpansion} in \eqref{hydrodynamicforce} one may write the hydrodynamic forces in terms of a set of moments of the traction operator $\mathbf{n}\cdot\mathsf{\t T}_{\mathsf{\t U}}$ on the surfaces of the particles $\partial\mathcal{B}_i$ (forming resistance tensors),
\begin{align}
\mathsf{\t F} &=-\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}\cdot(\mathsf{\t U}+\mathsf{\t U}^s-\mathsf{\t U}^\infty)-\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}:(\mathsf{\t E}^s-\mathsf{\t E}^\infty)+\ldots
\end{align}
Now using the above expression for the hydrodynamic forces, together with Newton's second law \eqref{forces}, we obtain the translational and rotational velocities of the spherical active particles
\begin{align}
\mathsf{\t U}&=-\mathsf{\t U}^s+\mathsf{\t U}^\infty+\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{-1}\cdot\left[\mathsf{\t F}_{ext}-\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}:(\mathsf{\t E}^s-\mathsf{\t E}^\infty)+\ldots\right].
\label{mobility2}
\end{align}
These equations have the same functional form as the governing equations of motion for passive particles except with active particles one takes the \textit{difference} in moments of the background flow to surface velocity, e.g. $\mathsf{\t E}^\infty \rightarrow \mathsf{\t E}^\infty-\mathsf{\t E}^s$. If the particles are passive, $\mathbf{u}^s=\mathbf{0}$, then we recover equations of motion for passive particles in a background flow \citep{brady88}; however, computing the far-field hydrodynamic interactions of active spherical particles is no more difficult than for passive spherical particles, assuming the velocities on the boundaries of the active particle, $\mathbf{u}^s_i$, are prescribed.
If hydrodynamic interactions are completely neglected, the particles all move with their respective single particle velocities, $\mathsf{\t U} =-\mathsf{\t U}^s+\mathsf{\t U}^\infty$ (higher-order moments do not contribute to self propulsion for isolated spherical particles by symmetry), and we recover the classic result for single active spheres \citep{anderson91, stone96, elfring15}. It is technically possible to devise a perfect stealth swimmer that does not disturb the surrounding fluid by setting $\mathbf{u}^s = \mathbf{U}^s$, for example by the jetting mechanism proposed by \citet{spagnolie10b}, but this is a pathological case, and in general higher-order moments lead to hydrodynamic interactions. We emphasize that hydrodynamic interactions due to moments of the particle activity enter in \textit{exactly} equivalent form to interactions due to moments of the background flow. For example, the leading-order change in the dynamics of the particles due to hydrodynamic interactions is given by $\mathsf{\t U}+\mathsf{\t U}^s-\mathsf{\t U}^\infty=-\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{-1}\cdot\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}:(\mathsf{\t E}^s-\mathsf{\t E}^\infty)$ where the resistance tensors $\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{-1}\cdot\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}$ act to couple the particles in precisely the same fashion for active particles as passive particles. In appendix \ref{app:dilute} we given the leading order hydrodynamic interactions (a dilute approximation) in the mobility formulation more commonly employed in the literature.
We see that the leading order hydrodynamic interactions due to activity are given by the symmetric first moment of activity, $\mathbf{E}^s_i$, of each active particle. This is not a surprise as the term $\mathbf{E}^s$ sets the active component of the stresslet $\mathbf{S}$ \citep{ishikawa06,nasouri18} of individual spherical active particles where
\begin{align}
\mathbf{S} = \frac{1}{2}\int_{\partial\mathcal{B}}[\mathbf{r}\boldsymbol{\sigma}\cdot\mathbf{n}+\boldsymbol{\sigma}\cdot\mathbf{n}\mathbf{r} -2\eta(\mathbf{u}\mathbf{n}+\mathbf{n}\mathbf{u}) ] \,\text{d} S = \frac{20\pi\eta a^3}{3}\left(\mathbf{E}^\infty-\mathbf{E}^s\right).
\end{align}
The `active strain-rate', $\mathbf{E}^s$, can be zero, but then the leading-order term will generally arise at the second-moment level for self-motile active particles (that is, ones with non-zero surface averaged velocity). This is the case for so-called neutral squirmers (see section \ref{sec:squirmers} below) or symmetric phoretic particles \citep{michelin14}.
These equations, above all, simply reflect the linear relationship between velocity and force moments. Using still more compact notation for all disturbance velocity moments $\mathcal{U}' = [\mathsf{\t U}+\mathsf{\t U}^s-\mathsf{\t U}^\infty, \mathsf{\t E}^s-\mathsf{\t E}^\infty,\ldots]^\top$ and hydrodynamic force moments $\mathcal{F} = [\mathsf{\t F}, \mathsf{\t S},\ldots]^\top$ we may write, more generally, the linear relationship
\begin{align}
\mathcal{F}=-\mathcal{R}\cdot\mathcal{U}',
\label{grandmoments}
\end{align}
where $\mathcal{R}$ is the grand resistance tensor, an (unbounded) linear operator that maps velocity moments to force moments. In this notation the hydrodynamic force is compactly written as
\begin{align}
\mathsf{\t F} = -\mathcal{R}_{\mathsf{\t F}\mathcal{U}}\cdot\mathcal{U}'.
\end{align}
In order to capture the dynamics of active particles, we seek an effective and efficient way to form $\mathcal{R}_{\mathsf{\t F}\mathcal{U}}$. The grand resistance tensor is a purely geometric operator, depending only on the position (and orientation if they were anisotropic) of each active particle \citep{happel65}. Perhaps less obvious, is that the grand resistance tensor does not depend on the prescribed surface activity of the particles, and is thus identical to the case when they are passive. This also applies to particles in a bounded geometry---$\mathcal{R}$ is a function of geometry only \citep{swan07,swan10}. We have assumed here that the surface activity of the particles is prescribed; however, in reality the surface activity may depend on the traction on the boundary, as it would, for example, for biological particles that have power-limited surface actuation, but the linear relationship between force moments and velocity moments makes it straightforward to alternatively prescribe force moments \citep{swan11}.
We focus here on spherical particles as is common in the literature for colloidal suspensions; however, the method described above can be readily generalized to other geometries. We formed moments of forces and velocities by projection onto tensorial spherical harmonics, but for other geometries a more suitable basis for the vector fields on the particle surfaces, $\partial\mathcal{B}_i$, would be used. Alternatively, and more generally, one may perform Taylor series expansion of the boundary integral equations about the center of each particle, which naturally projects tractions onto force moments for particles of arbitrary geometry (see recent work by \citet{swan11} and \citet{nasouri18} for details of this method applied to active particles). A problem with this approach is that the particle activity $\mathbf{u}^s$ might only be defined on the particle surfaces (in the form of surface slip as in section \ref{sec:squirmers}) but this difficulty can be ameliorated by lifting $\mathbf{u}^s$ to a suitably continuous function defined in $\mathbb{R}^3$. Despite this complication, fundamentally, the linear relationship between velocity and force moments remains, regardless of geometry.
\subsection{Squirmers}\label{sec:squirmers}
A squirmer is a spherical particle whose surface slip velocity is tangential to the surface \citep{pedley16}. Most often the slip velocity is taken to be axisymmetric such that $\mathbf{u}^s = f(\phi)\mathbf{e}_\phi+g(\phi)\mathbf{e}_\theta$, where $\phi$ is the (polar) angle between the axis of symmetry of the particle $\mathbf{p}$ and the surface normal $\mathbf{n}$, while the azimuthal direction $\mathbf{e}_\theta = \mathbf{n}\times\mathbf{e}_\phi$. A purely tangential slip velocity is of course an idealization, but one that arises quite naturally, for example in the limit of small amplitude deformations that are projected onto a time-averaged spherical manifold \citep{lighthill52,blake71}, or as the outer solution of phoretic flow due to chemical concentrations confined to a thin layer near the sphere surface \citep{anderson89, golestanian05}. The slip velocity is typically written as an expansion in Legendre polynomials
\begin{align}
\mathbf{u}^s &= -\sum_n B_n \frac{2}{n(n+1)}P_n^1 (\mathbf{p}\cdot\mathbf{n})\mathbf{e}_\phi -\sum_n C_n \frac{2}{n(n+1)}P_n^1 (\mathbf{p}\cdot\mathbf{n})\mathbf{e}_\theta
\end{align}
where $P_n^1$ is the first associated Legendre polynomial of degree $n$ \citep{pak14} ($C_n\rightarrow C_n \frac{n(n+1)}{2a^{n+1}}$ for their coefficients). The polar slip coefficients, $B_n$, are often called `squirming' modes while the azimuthal slip is not often considered but can lead to particle spin for instance \citep{pak14}. Recasting the slip velocity in terms of irreducible tensors of the surface normal such that
\begin{align}
\mathbf{u}^s(\mathbf{x} \in \partial \mathcal{B})&=\mathbf{U}^s+\mathbf{\Omega}^s\times\mathbf{r}+\mathbf{r}\cdot\mathbf{E}^s+\overbracket{\mathbf{r}^2}:\mathbf{B}^s+\overbracket{\mathbf{r}^3}\odot\mathbf{C}^s+\ldots \ ,
\label{velocitymoments}
\end{align}
we obtain
\begin{align}
\mathbf{U}^s &= -\frac{2}{3}B_1 \mathbf{p}, \\
\mathbf{\Omega}^s &= \frac{1}{a^3}C_1\mathbf{p},\\
a\mathbf{E}^s &= -\frac{3}{5}B_2 \overbracket{\mathbf{p}\bp},\\
a^2\mathbf{B}^s &= B_1\mathbf{\Delta}^{2}\cdot\mathbf{p}-\frac{5}{7}B_3\overbracket{\mathbf{p}\bp\mathbf{p}}-C_2(\mathbf{\Delta}^2\cdot\mathbf{p})\times\mathbf{p},\\
a^3\mathbf{C}^s &= B_2\mathbf{\Delta}^{3}:\overbracket{\mathbf{p}\bp}-\frac{35}{36}B_4\overbracket{\mathbf{p}\bp\mathbf{p}\bp}-\frac{5}{4}C_3(\mathbf{\Delta}^3:\overbracket{\mathbf{p}\bp})\times\mathbf{p},
\end{align}
where $\mathbf{\Delta}^{n}$ is an isotropic $2n$ order tensor that when applied on a tensor of rank $n$, projects onto the symmetric traceless part of that tensor (see Appendix \ref{appendixtensors} for further details). By symmetry each coefficient is necessarily composed only of products of the particle director $\mathbf{p}$. We see that the swimming speed is given by the first squirming mode $B_1$, $\mathbf{U}=-\mathbf{U}^s=(2/3)B_1\mathbf{p}$ for an isolated squirmer, but note that the first mode also contributes a higher-order term to hydrodynamic interactions between particles embedded in $\mathbf{B}^s$. The stresslet due to surface activity of a particle is given by the second squirming mode, $\mathbf{S} = 4\pi \eta a^2 B_2\overbracket{\mathbf{p}\bp}$. This determines if a squirmer is a pusher or a puller, but can easily be zero---a so-called neutral squirmer---and in that case the leading-order term contributing to hydrodynamic interactions is necessarily given by $B_1$ (and $B_3$ if nonzero). Azimuthal slip naturally leads to rotation given by the $C_1$ mode, $\mathbf{\Omega}=-\mathbf{\Omega}^s = -(C_1/a^3)\mathbf{p}$ for an isolated squirmer, while the $C_2$ mode leads to a rotlet dipole contribution in the far-field \citep{pak14}.
As an example of the framework developed here, consider an active squirmer particle, labeled $\mathcal{B}_1$, in the presence of a freely suspended passive sphere, labeled $\mathcal{B}_2$, as shown in figure \ref{fig:2particle_traj}.
\begin{figure}
\center
\includegraphics[width = 0.35\textwidth]{figure2.pdf}
\caption{Trajectory of a (pusher) active particle (labeled $\mathcal{B}_1$), in the presence of a passive particle (labeled $\mathcal{B}_2$).}
\label{fig:2particle_traj}
\end{figure}
Using \eqref{mobility2} we obtain the velocities of the two particles in terms of moments of the surface activity of the active particle
\begin{align}
\mathsf{\t U}_1 &= -\mathsf{\t U}_1^s - (\mathsf{\t M}_{\mathsf{\t U}\mathsf{\t F}}^{11}\cdot\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}^{11}+ \mathsf{\t M}_{\mathsf{\t U}\mathsf{\t F}}^{12}\cdot\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}^{21}):\mathbf{E}_1^s+\ldots \label{2particle1}\\
\mathsf{\t U}_2 &= - (\mathsf{\t M}_{\mathsf{\t U}\mathsf{\t F}}^{21}\cdot\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}^{11} + \mathsf{\t M}_{\mathsf{\t U}\mathsf{\t F}}^{22}\cdot\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}^{21}):\mathbf{E}_1^s+\ldots \label{2particle2}
\end{align}
where the superscripts, for example $\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}^{\alpha\beta}$, indicate the linear relationship between particle $\alpha$ and particle $\beta$, while $\mathsf{\t M}_{\mathsf{\t U}\mathsf{\t F}} = \mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{-1}$. The first term on the right-hand side of \eqref{2particle1} represents the self-propulsion of the active particle while the second term represents the change in the velocity due to hydrodynamic interactions induced by the surface strain-rate of the active particle $\mathbf{E}^s_1$ (and higher-order moments). Hydrodynamic interactions also induce the motion of the passive particle. In essence, the moments of $\mathbf{u}^s$ on the active particle result in a `swim' force on \textit{both} particles which must be then balanced by drag due to rigid-body motion. The trajectories of both active and passive particles are illustrated in figure \ref{fig:2particle_traj}.
\subsection{Assemblies}
As detailed by \citet{swan11}, assemblies of active (or passive) particles can easily be dealt with within the Stokesian Dynamics framework, and in what follows we outline the presentation given in that work.
A set of particles may be constrained to move as a rigid body, namely particle $\alpha$ in a rigid assembly $A$, will move as
\begin{align}
\mathbf{U}_{\alpha} &= \mathbf{U}_A+\mathbf{\Omega}_A\times(\mathbf{x}_\alpha-\mathbf{x}_A),\\
\mathbf{\Omega}_{\alpha} &= \mathbf{\Omega}_A.
\end{align}
where $\mathbf{x}_A$ is a convenient point on the assembly. Following the notation in \citet{swan11}, this may be compactly written in terms of $6-$dimensional vectors, $\mathsf{\t U}_\alpha = \boldsymbol{\Sigma}_{\alpha A}^{\top}\cdot\mathsf{\t U}_A$, where $\boldsymbol{\Sigma}_{\alpha A}^{\top}$ projects the translational and rotational velocity of the assembly onto particle $\alpha$. The rigid-body translational and rotational velocities of all $N$ particles in an assembly may then be written in terms of $6N-$dimensional vectors and tensors as
\begin{align}
\mathsf{\t U} = \boldsymbol{\Sigma}_{A}^{\top}\cdot\mathsf{\t U}_A.
\label{assembly}
\end{align}
The forces and torques that enforce the rigid constraints on the assembly, $\mathsf{\t F}_c$, must be included in the sum of forces on the particles,
\begin{align}
\mathsf{\t F}+\mathsf{\t F}_c+\mathsf{\t F}_{ext}=\mathsf{\t 0}.
\end{align}
These constraint forces are internal forces, and as such exert no net force or torque on the assembly. This may be written as
\begin{align}
\boldsymbol{\Sigma}_{A}\cdot\mathsf{\t F}_c = \mathsf{\t 0},
\end{align}
where the operator $\boldsymbol{\Sigma}_{A}$, the transpose of the projection above, sums forces and torques (about $\mathbf{x}_A$) on the assembly. In this way the force balance on the assembly is
\begin{align}
\boldsymbol{\Sigma}_{A}\cdot\mathsf{\t F}+\boldsymbol{\Sigma}_{A}\cdot\mathsf{\t F}_{ext}=\mathsf{\t 0}.
\end{align}
Substitution of the relevant hydrodynamic forces and the kinematic constraint in \eqref{assembly} into this force balance leads to the rigid-body motion of the assembly given by
\begin{align}
\mathsf{\t U}_A=\left[\boldsymbol{\Sigma}_{A}\cdot\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}\cdot\boldsymbol{\Sigma}_A^\top\right]^{-1}\cdot\boldsymbol{\Sigma}_{A}\cdot\left(\mathsf{\t F}_{ext}+\mathsf{\t F}_s+\mathsf{\t F}_\infty\right),
\label{assembly2}
\end{align}
where $\boldsymbol{\Sigma}_{A}\cdot\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}\cdot\boldsymbol{\Sigma}_A^\top=\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^A$ is the hydrodynamic resistance of the assembly. Equation \eqref{assembly2} is an exact description of the dynamics of an assembly of active or passive particles, no approximation has yet been made. In particular, we note that while \eqref{assembly2} yields the instantaneous rigid-body motion of the assembly, it does not mean the assembly cannot deform. Indeed, through the prescription of the activity of each particle, by way of $\mathbf{u}^s$, we may construct an assembly of virtually any shape and kinematics. This approach is also straightforwardly extended to multiple assemblies through an extended operator $\boldsymbol{\Sigma}$ that sums forces on each assembly as shown by \citet{swan11}. As discussed above, a natural method of solution is to use Stokesian Dynamics to resolve hydrodynamic forces as a truncated set of moments.
As an illustrative example of a deforming assembly, consider a simple reciprocal two-sphere (or dumbbell) swimmer (see figure \ref{fig:2particle}a). In this model swimmer, two spheres labeled $\mathcal{B}_1$ and $\mathcal{B}_2$ ($\mathcal{B}_A = \mathcal{B}_1\cup\mathcal{B}_2$), of radius $a$ and $\lambda a$ respectively, have a prescribed distance between their centers, $L(t)$, that periodically changes in time.
\begin{figure}
\center
\includegraphics[width = 0.5\textwidth]{figure3.pdf}
\caption{a) Schematic of a reciprocal dumbbell swimmer. b) Schematic of a dumbbell squirmer swimmer.}
\label{fig:2particle}
\end{figure}
We describe the shape change of this swimmer as motion of sphere $\mathcal{B}_1$ relative to sphere $\mathcal{B}_2$, in this way $\mathbf{u}^s$ is nonzero only on $\mathcal{B}_1$. Written in terms of an expansion in moments as in \eqref{velocitymoments}, $\mathbf{u}^s(\mathbf{x}\in\mathcal{B}_1)=\mathbf{U}_1^s=\dot{L}\mathbf{p}$ with all other terms exactly zero, while $\mathbf{u}^s(\mathbf{x}\in\mathcal{B}_2)=\mathbf{0}$. The total velocity of $\mathcal{B}_2$ is then due solely to the rigid-body motion of the assembly $\mathbf{u}(\mathbf{x}\in\mathcal{B}_2)=\mathbf{U}_A$, while $\mathcal{B}_1$ has an additional component due to shape change $\mathbf{u}(\mathbf{x}\in\mathcal{B}_1)=\mathbf{U}_A+\mathbf{U}_1^s$. By symmetry this swimmer does not rotate, $\mathbf{\Omega}_A=\mathbf{0}$. The choice of reference is not unique and affects what is delineated as rigid-body motion versus shape change at any particular instant; however, typically we are concerned with the time-averaged motion of the body which is invariant to the choice of reference for periodic gaits, and the flexibility allows one take advantage of simplifications implied by a particular choice.
Due to the lack or rotation or torque, only the force-velocity resistance tensor of the assembly, $\mathbf{R}_{FU}^A$, and the linear operator that gives stress due to translation, $\mathsf{\t T}_U$, are required. Substitution of the swim force \eqref{swimforce}, into \eqref{assembly2} and simplification leads to
\begin{align}
\mathbf{U}_A &= -(\mathbf{R}_{FU}^{A})^{-1}\cdot\left(\mathbf{R}_{FU}^{11}+\mathbf{R}_{FU}^{21}\right)\cdot\mathbf{U}_1^s,
\end{align}
where the resistance tensors, $\mathbf{R}_{FU}^{11}+\mathbf{R}_{FU}^{21}$ and $\mathbf{R}_{FU}^{A}=\mathbf{R}_{FU}^{11}+\mathbf{R}_{FU}^{12}+\mathbf{R}_{FU}^{21}+\mathbf{R}_{FU}^{22}$, are functions of the length, $L(t)$, and hence depend on time. We may further simplify by noting that the propulsive force and velocity will be collinear with the axis of symmetry and so only a scalar coefficient for each resistance is required. A symmetric swimmer with $\lambda=1$ has $\mathbf{U}_A =-\frac{1}{2}\mathbf{U}_1^s= -\frac{1}{2}\dot{L}\,\mathbf{p}$, so the dumbbell moves oppositely of the deformation with half the speed, as expected. This reciprocal motion clearly leads to zero net displacement over a period when $L(t)$ is periodic. Less obvious, but also true, is that this holds for any $\lambda$, by the scallop theorem \citep{purcell77}.
The previous example was particularly straightforward because $\mathbf{u}^s$ was uniform hence only the zeroth moment, $\mathbf{U}^s$, was nonzero. In contrast, consider a dumbbell swimmer with a fixed length, $L=const.$, but where sphere $\mathcal{B}_1$ is a squirmer particle (see figure \ref{fig:2particle}b), namely $\mathbf{u}^s(\mathbf{x}\in\mathcal{B}_1) = \mathbf{U}^s_1+\mathbf{r}\cdot\mathbf{E}_1^s+\ldots$, with the moments of the surface velocity given by the squirming modes. In this case, the velocity of the assembly is given by
\begin{align}
\mathbf{U}_A &= -(\mathbf{R}_{FU}^{A})^{-1}\cdot\left[\left(\mathbf{R}_{FU}^{11}+\mathbf{R}_{FU}^{21}\right)\cdot\mathbf{U}_1^s+\left(\mathbf{R}_{FE}^{11}+\mathbf{R}_{FE}^{21}\right):\mathbf{E}_1^s\ldots\right],
\end{align}
and when the spheres are equal in size, $\lambda = 1$, we have simply $\mathbf{U}_A = -\frac{1}{2}\mathbf{U}_1^s-(\mathbf{R}_{FU}^{A})^{-1}\cdot\left[\mathbf{R}_{FE}^{1}:\mathbf{E}_1^s+\ldots\right]$. Note that this swimmer can self propel even when $\mathbf{U}_1^s=\mathbf{0}$ due to hydrodynamic interactions with the second sphere.
\section{Stokesian Dynamics}\label{sec:stokesiandynamics}
The configuration dependent $N$-body resistance tensors may be formed indirectly by first constructing the grand mobility tensor, $\mathcal{M}=\mathcal{R}^{-1}$. In this approach, one takes irreducible moments of the velocity field, as given by the boundary integral equation, over the surfaces of all the particles yielding Fax\'en's laws for the velocity moments of the active particles \citep{batchelor72}. If the boundary integral equations are also expanded in irreducible moments \citep{durlofsky87}, we obtain a linear relationship between force and velocity moments
\begin{align}
\mathcal{U}' = -\mathcal{M}\cdot\mathcal{F}.
\end{align}
For active particles, the force moments contain contributions from the double-layer kernel due to the surface activity (see appendix for details). The grand mobility tensor is then inverted to obtain the grand resistance tensor $\mathcal{R}=\mathcal{M}^{-1}$ thereby summing many-body hydrodynamic interactions among the particles \citep{durlofsky87}. In principle, to capture near-field lubrication effects, the entire unbounded set of moments would need to be computed, and in practice this is unfeasible. The coupling between the $m^{\text{th}}$-moment of velocity and $n^{\text{th}}$-moment of force scales as $r^{-(1+m+n)}$ , and so higher-order moments decay quite quickly with separation distance $r$ between two particles and a reasonable and common far-field approximation of the mobility is to truncate at the first moment level and we label this truncated mobility $\mathcal{M}^{ff}$ \citep{swan11}. This level of approximation is inappropriate for particles that are nearly touching and the compromise used within Stokesian Dynamics is to use a mixed asymptotic approach wherein close interactions are separately computed using pairwise exact solutions \citep{durlofsky87}. In this manner, the hydrodynamic forces on the particles are decomposed,
\begin{align}
\mathsf{\t F} = \mathsf{\t F}^{ff}+\mathsf{\t F}^{2B,exact}-\mathsf{\t F}^{2B,ff},
\end{align}
into far-field interactions between many bodies, $\mathsf{\t F}^{ff}$ and two-body interactions computed exactly for nearby bodies, $\mathsf{\t F}^{2B,exact}$. Note that the last term arises because the far-field interactions must be removed between any two bodies where the interactions are computed exactly to avoid double counting.
To render exact solutions for active two-body hydrodynamic interactions one needs to obtain the tensor field $\mathsf{\t T}_{\mathsf{\t U}}$ from the two particle rigid-body motion problem. The general passive two-sphere problem for arbitrary separations may be constructed from a basis of four simplified two-sphere problems that have all be solved in the literature and are nicely summarized by \citet{sharifi-mood16} and \citet{papavassiliou17} in the context of two-body interactions between diffusiophoretic Janus particles and spherical squirmers respectively. Asymptotic solutions for lubrication interactions, which are valid strictly only when the particles are very close, may alternatively be used and are given by \citet{ishikawa06} for spherical squirmers.
It is important to note that, unlike passive particles in a linear background flow, active particles can have higher-order velocity moments due to surface activity. In section \ref{sec:squirmers}, we showed that even two-mode squirmer particles contribute third and fourth order velocity moments. For far-field interactions, these higher-order moments may not be significant due to the decay of the associated flow disturbances. However, for near-field interactions there is no rationale, other than the convergence of the series of tensorial spherical harmonics, to discard the contributions of higher-order velocity moments in the swim force for near-field interactions. If higher-order moments are nonetheless discarded then the approach for active particles is virtually identical to that of passive particles in Stokesian Dynamics; the dynamics are given by \eqref{mobility2} and the resistance tensor used is modified to include both exact two-body interactions $\mathcal{R}^{2B,exact}$, and a truncation of the moment expansion valid for far-field interactions, $(\mathcal{M}^{ff})^{-1}$, such that
\begin{align}
\mathcal{R} = (\mathcal{M}^{ff})^{-1}+\mathcal{R}^{2B,exact}-\mathcal{R}^{2B,ff},
\label{totalresistance}
\end{align}
where the two-body interactions that are captured by the near-field approach must be subtracted off in the far-field solution to avoid double counting \citep{swan11}.
More accurately, the exact two-body swim force contributions may be computed entirely separately, as done by \cite{ishikawa06}, by integrating \eqref{swimforce} directly. In this way \eqref{mobility} is written
\begin{align}
\mathsf{\t U}&=\mathsf{\t U}^\infty+\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{-1}\cdot\left[\mathsf{\t F}_{ext}+\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t E}}:\mathsf{\t E}^\infty+\ldots\right]\nonumber\\
&\quad+\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}^{-1}\cdot\left[\mathsf{\t F}_{s}^{2B,exact}-\mathsf{\t R}'_{\mathsf{\t F}\mathsf{\t U}}:\mathsf{\t U}^s-\mathsf{\t R}'_{\mathsf{\t F}\mathsf{\t E}}:\mathsf{\t E}^s+\ldots\right].
\label{mobility3}
\end{align}
Here the terms on the first line represent the dynamics of passive spheres exactly as in conventional Stokesian Dynamics, while the second line accounts for the contribution of activity, separated into two-body and far-field contributions. The primed resistance tensors only contribute far-field interactions
\begin{align}
\mathcal{R}' = (\mathcal{M}^{ff})^{-1}-\mathcal{R}^{2B,ff}.
\end{align}
If Brownian motion is included then it is $\mathsf{\t R}_{\mathsf{\t F}\mathsf{\t U}}$ from the total resistance \eqref{totalresistance} that sets the magnitude of the Brownian force.
\subsection{Infinite suspensions}
The method described above was for a finite system of $N$ active particles for which the fluid can be assumed to decay in the far field. For an infinite or periodic suspension of particles (active or passive) no such assumption can be made and indeed naively extending $N\rightarrow\infty$ leads to divergent integrals, a problem that plagued the earlier suspension literature \citep{batchelor72}. \citet{brady88a} adapted the method of \citet{obrien79} wherein the fluid domain for a set of particles is bounded by a large macroscopic surface over which suspension averages can be performed. Specifically, $\mathbf{U}^\infty$, $\mathbf{\Omega}^\infty$, and $\mathbf{E}^\infty$ become the average values of the suspension --- particle plus fluid. Individual particle motion is then relative to the volume averaged quantities. Suspension-averaged terms serve to regularize the formulas leading to absolutely convergent expressions for fluid and particle velocities. Periodic boundary conditions may then be easily employed and as \citet{brady88a} showed, the far-field mobility matrix, $\mathcal{M}^{ff}$, may be simply replaced by the appropriated Ewald-summed mobility matrix, $\mathcal{M}^{ff*}$. As discussed above, the mobility matrix is unchanged if particles are active or passive, only the force and velocity moments are altered by activity, and mobility is unchanged whether or not the suspension averaged quantities are nonzero. Therefore, the Ewald-summed mobility matrix used for periodic passive suspensions is unchanged for active suspensions \citep{ishikawa08}. It is important to note that for self propulsion there is no net volume displacement of material as the body moves: as the body advances, an equal volume of fluid moves in the opposite direction. In contrast, a body moving in response to an external force drags fluid along with it, and to have no net flux of mass, an external pressure gradient must be imposed.
\subsection{Accelerated methods}
Since the original development of the Stokesian Dynamics method \citep{durlofsky87,brady88a}, which naively requires $O(N^3)$ computations due to the inversion of the far-field mobility matrix, there have been several numerical implementations that have improved the algorithmic efficiency of the method. These include an $O(N \ln N)$ deterministic Accelerated Stokesian Dynamics method \citep{sierou01}, an $O(N^{1.25} \ln N)$ Brownian Accelerated Stokesian Dynamics method \citep{banchio03}, an $O(N \ln N)$ Spectral Ewald Accelerated Stokesian Dynamics method \citep{wang16}, and recently an $O(N)$ Fast Stokesian Dynamics method \citep{fiore19}. In principle, because the structure of the Stokesian Dynamics framework remains unchanged between passive and active particles, any of these approaches may be used to simulate active suspensions with minor modification. Indeed, the recent Fast Stokesian Dynamics method utilizes an imposed Brownian `slip' velocity in order to obtain the stochastic rigid-body motion of passive Brownian particles \citep{fiore19}.
\section{Conclusions}
In this work, we have given a detailed exact theoretical description of the dynamics suspensions of active particles in fluids in the absence of inertia, including full hydrodynamic interactions among particles. We argue that, as is done for passive particles, hydrodynamic interactions are ideally separated into near-field forces and far-field forces, with the latter expanded in a truncated set of moments. The resulting mathematical structure of the dynamical equations remains virtually unchanged between passive and active particles save for the addition of velocity moments due to particle activity. Because of this, any implementation of the Stokesian Dynamics method for passive particles, may be simply and easily modified for use with active particles. Moreover, we believe this mathematical structure provides an ideal formalism for theoretical analysis of hydrodynamic interactions in active matter much as it has for passive suspensions.
\acknowledgements
Gwynn Elfring acknowledges the hospitality of the Division of Chemistry and Chemical Engineering at the California Institute of Technology during a sabbatical stay, supported by a UBC Killam Research Fellowship, that served as a formative period of this work.
|
\section{Introduction}
With the increasing complexity and evolutionary frequency of software projects, the importance of program comprehension is also increasing. A recent study by Xia et al.~\cite{xia2017measuring} showed developers spend 59\% of their time on program comprehension on average during software development and maintenance.
Therefore, high-quality code comments are critical to improving the efficiency of developers' program comprehension~\cite{he2019understanding}.
However, developers often write low-quality code comments or do not write code comments due to the limited project development budget, lack of programming experience, or insufficient attention to writing code comments.
Although some tools (such as JavaDoc~\cite{kramer1999api} and Doxygen\footnote{http://www.doxygen.org}) can assist in generating code comment templates, these tools still unable to automatically generate content related to the functionality and purpose of the focused code.
If developers manually write code comments, it will be time-consuming and difficult to guarantee the quality of the written comments. Moreover, existing code comments should be updated automatically with the evolution of the related code~\cite{kramer1999api}. Therefore, it is of great significance to design novel methods that can automatically generate high-quality comments after analyzing the focused code.
Code comment generation\footnote{This challenging research problem is also called source code summarization in some previous studies~\cite{wan2018improving}\cite{leclair2019neural}} is an active research topic in the current program comprehension research domain.
Research achievements in this research problem can also improve other software engineering tasks (such as software maintenance, code search, and code categorization).
In the early phase,
most of the studies~\cite{haiduc2010supporting}\cite{haiduc2010use}\cite{sridhara2010towards}\cite{sridhara2011automatically} on code comment generation were based on template-based methods or information retrieval-based methods.
Recently, most of the studies~\cite{iyer2016summarizing}\cite{hu2018deep}\cite{hu2018summarizing} started to follow an encoder-decoder framework and achieved promising results.
In this study, we propose a novel method {\tool} via Transformer~\cite{vaswani2017attention} and fusion method-based hybrid code representation.
Our method considers Transformer since this deep learning model can achieve better performance than traditional sequence to sequence models in classical natural language processing (NLP) tasks (such as neural machine translation~\cite{vaswani2018tensor2tensor}\cite{raganato2018analysis} and software engineering~\cite{cao2021automated}).
Moreover, our method also utilizes the hybrid code representation to effectively learn the semantic of the code since this representation can extract both lexical-level and syntactic-level information from the code, respectively. In the hybrid code representation, we not only consider sequential tokens of source code (i.e., lexical level of code) but also utilize AST (abstract syntax tree) information by our proposed Sim\_SBT method (i.e., syntactic level of code). Moreover, we also consider three different methods to fuse this information. Finally, to alleviate the OOV (out-of-vocabulary) problem, we utilize the byte-level Byte-Pair-Encoding algorithm (Byte-BPE)~\cite{wang2020neural} to split identifiers.
To evaluate the effectiveness of our proposed method {\tool}, we conduct experimental studies on a large-scale code corpus, which contains 485,812 pairs. Each pair includes a Java method and corresponding code comment. This corpus was gathered by
Hu et al. ~\cite{hu2020deep}. They performed a set of data cleaning steps to ensure the high quality of this corpus. Until now, this corpus has been widely used as the experimental subject in previous code comment generation studies~\cite{hu2020deep}\cite{hu2018deep}\cite{kang2019assessing}\cite{wang2020reinforcement}\cite{zhang2020retrieval}\cite{wei2019code}.
We design empirical studies and perform human studies to verify the effectiveness of our proposed method.
We first compare {\tool} with four state-of-the-art baselines from code comment generation (i.e., DeepCom~\cite{hu2018deep}, Hybrid-DeepCom~\cite{hu2020deep}, Transformer~\cite{ahmad2020transformer}, CodePtr~\cite{2021NIU}) and three baselines from neural machine translation (i.e., seq2seq models~\cite{sutskever2014sequence} with/without attention mechanism~\cite{bahdanau2015neural} and GPT-2~\cite{radford2019language}) in terms of three performance measures (i.e., BLEU, METEOR, and ROUGE-L), which are classical measures in previous code comment generation studies. Empirical results show {\tool} can improve the performance when compared with these state-of-the-art baseline methods.
Second, after comparing three fusion methods (i.e., Jointly Encoder, Shared Encoder, and Single Encoder) to combine code lexical information and AST syntactic information, we find {\tool} with Single Encoder can achieve the best performance.
Third, We perform a human study to verify the effectiveness of {\tool}. In our human study, we compare the comments generated by {\tool} with the comments generated by Hybrid-DeepCom~\cite{hu2020deep}, which has the best performance among the chosen baselines. The results of our human study also show the competitiveness of {\tool}.
To our best knowledge, the main contributions of our study can be summarized as follows:
\begin{itemize}
\item We propose a novel code comment generation method {\tool} based on the Transformer and the fusion method-based hybrid code representation. Instead of the copy mechanism, we mitigate the OOV problem through the Byte-BPE algorithm and vocabulary sharing. Then we propose a simplification version of the SBT algorithm (i.e., Sim\_SBT) to traverse the structural information of the AST, which can speed up model training. Finally, we consider three different methods for fusing lexical and
syntactical information of the code.
\item We evaluate the performance of our proposed method {\tool} on a large-scale code corpus, which contains 485,812 Java methods and corresponding code comments. The experimental results show that {\tool} is more effective than seven state-of-the-art baselines from both the code comment generation domain and the neural machine translation domain in terms of three performance measures. Moreover, we further conduct a human study to verify the effectiveness of {\tool}.
\item We share our source code, trained models, and used code corpus in the GitHub repository\footnote{\url{https://github.com/NTDXYG/ComFormer}}, which can facilitate the replication of {\tool} and encourage other researchers to make a comparison with {\tool}.
\end{itemize}
\noindent\textbf{Paper organization.} The rest of the paper is organized as follows.
Section~\ref{sec:ground} presents the background and related work of our study.
Section~\ref{sec:method} shows the framework of our proposed method {\tool} and details of key components in {\tool}.
Section~\ref{sec:setup} shows the experiment setup.
Section~\ref{sec:results} analyzes our empirical results.
Section~\ref{sec:discussion} performs a discussion on our proposed method {\tool}.
Section~\ref{sec:threats} discusses potential threats to the validity of our empirical study.
Finally, Section~\ref{sec:conclusion} concludes this paper and shows potential future directions for our study.
\section{Related Work}
\label{sec:ground}
In the early phase, most studies~\cite{sridhara2010towards,sridhara2011generating,sridhara2011automatically,wang2017automatically,mcburney2015automatic,moreno2013automatic,abid2015using,haiduc2010use,haiduc2010supporting,eddy2013evaluating,rodeghero2014improving,rodeghero2015eye,wong2015clocom} used template-based or information retrieval-based methods to generate code comments.
Recently, most of the studies followed deep learning-based methods (i.e., encoder-decoder framework) and achieved promising results.
Iyer et al.~\cite{iyer2016summarizing} first proposed a method code-NN via an attention-based neural network.
Allamanis et al.~\cite{allamanis2016convolutional} proposed a model in which the encoder uses CNN and attention mechanisms, and the decoder uses GRU. The use of convolution operations helps to detect local time-invariant features and long-range topical attention features.
Zheng et al.~\cite{zheng2017code} proposed a new attention module called Code Attention, which can utilize the domain features (such as symbols and identifiers) of code segments.
Liang and Zhu~\cite{liang2018automatic} used Code-RNN to encode the source code into the vectors, and then they used Code-GRU to decode the vectors to code comments.
Hu et al.~\cite{hu2018deep} proposed a method DeepCom by analyzing abstract syntax trees (ASTs). To better present the structure of ASTs, they proposed a new structure-based traversal (SBT) method.
Later, Hu et al.~\cite{hu2020deep} further proposed the method Hybrid-DeepCom. This method mainly made some improvements. For example, the identifiers satisfying the camel casing naming convention are split into multiple words.
Recently, Kang et al.~\cite{kang2019assessing} analyzed whether using the pre-trained word embedding can improve the model performance. They surprisingly found that using the pre-trained word embedding based on code2vec~\cite{alon2019code2vec} or Glove~\cite{pennington2014glove} does not necessarily improve the performance.
Leclair et al.~\cite{leclair2019neural} proposed a method ast-attendgru, which combines words from code and code structure.
Leclair et al.~\cite{leclair2020improved} then used a Graph neural network (GNN), which can effectively analyze the AST structure to generate code comments.
Wan et al.~\cite{wan2018improving} proposed the method Hybrid-DRL to alleviate the exposure bias problem.
They input an AST structure and sequential content of code segments into a deep reinforcement learning framework (i.e., actor-critic network).
Then, Wang et al.~\cite{wang2020reinforcement} extended the method Hybrid-DRL.
They used a hierarchical attention network by considering multiple code features, such as type-augmented ASTs and program control flows.
Ahmad et al.~\cite{ahmad2020transformer} used the Transformer model to generate code comments. The Transformer model is a kind of sequence to sequence model based on multi-head self-attention, which can effectively capture long-range dependencies. Specifically, they proposed to combine self-attention and copy attention as the attention mechanism of the model and analyzed the influence of absolute position and pairwise relationship on the performance of the code comment generation.
Chen et al.~\cite{chen2018neural} proposed a neural framework, which allows bidirectional mapping between a code retrieval task and a code comment generation task. Their proposed framework BVAE has two Variational AutoEncoders (VAEs): C-VAE for source code and L-VAE for natural language.
Ye et al.~\cite{ye2020leveraging} exploited the probabilistic correlation between code comment generation task and code generation task via dual learning.
Wei et al.~\cite{wei2019code} also utilized the correlation between code comment generation task and code generation task and proposed a dual training framework.
On the other hand, Hu et al.~\cite{hu2018summarizing} proposed a method TL-CodeSum, which can utilize API knowledge learned in a related task to improve the quality of code comments.
Zhang et al.~\cite{zhang2020retrieval} proposed a retrieval-based neural code comment generation method. This method enhances the model with the most similar code segments retrieved from the training set from syntax and semantics aspects.
Liu et al.~\cite{liu2019neural} utilized the knowledge of the call dependency between the source code and the dependency of codes.
Zhou et al.~\cite{zhou2019augmenting} proposed a method ContextCC, which uses the program analysis to extract context information (i.e., the methods and their dependency).
Haque et al.~\cite{haque2020improved} modeled the file context (i.e., other methods in the same file) of methods, then they used an attention mechanism to find words and concepts to generate comments.
Different from the previous studies, {\tool} is designed based on Transformer and fusion method-based hybrid code presentation. In this study, we investigate three different methods to fuse lexical-level and syntactic-level code information.
Moreover, we utilize the Byte-BPE algorithm to alleviate the OOV problem and use the Sim\_SBT method to reduce the size of the sequence
generated by the original SBT method~\cite{hu2018deep}, which can speed up model training.
\section{Our Proposed Method {\tool}}
\label{sec:method}
Fig.~\ref{fig:approach} shows the framework of {\tool}. In this figure, we can find that {\tool} consists of three parts: data process part, model part, and comment generation part.
Then we show the details of these three parts.
\begin{figure*}[htbp]
\centering
\vspace{-1mm}
\includegraphics[width=0.8\textwidth]{images/comformer.png}
\caption{The framework of our proposed method {\tool}}
\vspace{-1mm}
\label{fig:approach}
\end{figure*}
\subsection{Data Process Part}
In {\tool}, we consider a hybrid representation of code. For this representation, we not only consider sequential tokens of source code (i.e., lexical level of code) but also utilize AST structure information (i.e., syntactical level of code).
\subsubsection{Constructing Source Code Sequence.}
We first convert the tokens of code into the sequences.
However, many tokens are identifiers (such as the class name, the method name, the variable name).
These identifiers are named according to Java's naming convention (i.e., camel casing naming convention). Therefore, most of the identifiers are OOV tokens.
In our study, we first split these identifiers into multiple words, which helps to alleviate the OOV problem and keep more code information.
For example, the variable name ``SegmentCopy" can be split into two words: "segment" and "copy". The method name ``onDataChanged" can be split into three words: ``on", ``data" and ``changed". The class name ``SecureRandom" can be split into two words: ``secure" and ``random". After splitting the identifiers into multiple words, we then convert all the tokens into lowercase. Finally, we replace the specific numbers and strings with ``$<$num\_$>$" and ``$<$str\_$>$" tags, respectively.
Second, after performing a more detailed manual analysis on the training set, we find that after splitting the words based only on the camel casing naming convention, there are still a large number of OOV words in the testing set. Most of the current studies~\cite{2021NIU,ahmad2020transformer} alleviated this problem through the copy mechanism by using the pointer network. In our study, we use the Byte-BPE algorithm~\cite{wang2020neural} to further divide the token of the code into sub-tokens, then combine the vocabulary sharing to solve the OOV problem.
For example, we find the word "forgo" exists in the comments of the test set, which does not appear in the comments of the training set, nor the corresponding source code. In this case, neither the camel casing naming split nor the copy mechanism can solve the problem. However, in the Byte-BPE algorithm, the word ``forgotten" is split into ``for", ``go", ``t", ``ten", so that in The Decoder, it can decode the comments to produce the correct word ``forgo".
\subsubsection{Constructing AST Sequence}
We first use the javalang tool\footnote{\url{https://pypi.org/project/javalang/}} to convert the Java code into the corresponding AST. Then we use our proposed Sim\_SBT method to generate the traversal sequence of the AST.
Since the sequences generated by the SBT method~\cite{hu2018deep} may contain redundant information (i.e., many parentheses between type nodes), the sequences generated by SBT traversal are sometimes longer than the source code sequences, which makes it more difficult for the model to learn syntactic information. To alleviate this problem, we propose a new method Sim\_SBT, which can better present the structure of ASTs and keep the sequences unambiguous.
The AST traversal results of the methods SBT and Sim\_SBT are shown in Fig.~\ref{fig:SimSBT}.
In this example, the sequence generated by the original SBT method is too long. Our proposed method Sim\_SBT adopts a prior order traversal in a tree, which has the advantage of reducing the length of the sequence. We use a code example to show the generated sequence by using our proposed method Sim\_SBT in Fig.~\ref{fig:ast}.
In this figure, the source code token of the same color corresponds to the token of the AST syntax type. We can find the AST sequence generated by Sim\_SBT is slightly shorter than the source code length, which can effectively reduce the time of model training.
\begin{figure}[htbp]
\centering
\vspace{-1mm}
\includegraphics[width=0.5\textwidth]{images/SimSBT.png}
\caption{The AST traversal results of the methods SBT and Sim\_SBT}
\vspace{-1mm}
\label{fig:SimSBT}
\end{figure}
\begin{figure}[htbp]
\centering
\vspace{-1mm}
\includegraphics[width=0.5\textwidth]{images/ast.png}
\caption{An example of convert an AST to a sequence by using our proposed method Sim\_SBT.}
\vspace{-1mm}
\label{fig:ast}
\end{figure}
\subsection{Model Part}
{\tool} follows the Transformer architecture (i.e., the encoder and the decoder are built using the self-attentive mechanism). Moreover, {\tool} considers three methods for fusing lexical and
syntactical information of the code at the Encoder.
\subsubsection{Encoder Layer}
In this section, we first introduce Transformer's Encoder and then illustrate three different fusion methods at the Encoder.
The Encoder of Transformer does not attempt to compress the entire source sentence $X = (x_1, \cdots ,x_n)$ into a single context vector $z$.
Instead it produces a sequence of context vectors $Z = (z_1, \cdots, z_n)$.
First, the tokens of the input are passed through a standard embedding layer.
Next, as the model has no recurrent, it has no idea about the tokens' order in the sequence.
This problem is solved by using another embedding layer (i.e., positional embedding layer).
The positional embedding layer's input is not the token itself but the token position in the sequence.
Notice the input starts with $<$SOS$>$ (i.e., start of the sequence) token, which is the first token in position 0.
The original implementation of Transformer~\cite{vaswani2017attention} uses fixed static embeddings and does not learn positional embeddings.
Recently, positional embeddings have been widely used in modern Transformer architectures (such as Bert~\cite{devlin2018bert}). Therefore, our study also uses this positional embedding layer.
The encoded word embeddings are then used as the input to the encoder, which consists of $N$ layers. Each layer contains two sub-layers: (a) a multi-head attention mechanism and (b) a feed-forward network.
A multi-head attention mechanism builds upon scaled dot-product attention, which operates on a
query $Q$, a key $K$, and a value $V$. The original attention calculation uses scaled dot-product for each representation:
\begin{equation}
\text { Attention}(Q, K, V)=\operatorname{softmax}\left(\frac{Q K^{T}}{\sqrt{d_{k}}}\right) V
\end{equation}
Multi-head attention mechanisms obtain $h$ different representations of ($Q$, $K$, $V$). Then concatenate the results, and project the concatenation with a feed-forward layer:
\begin{equation}
\text { head}_{i}=\text { Attention }\left(Q W_{i}^{Q}, K W_{i}^{K}, V W_{i}^{V}\right)
\end{equation}
\begin{equation}
\text { MultiHead}(Q, K, V)=\text {Concat}_{i}\left(\text {head}_{i}\right) W^{O}
\end{equation}
where $W_{i}$ and $W^{O}$ are parameter projection matrices that are learned, and $h$ denotes the number
of heads in the multi-head attention.
The second component of each layer of the Transformer network is a feed-forward network.
\begin{equation}
\mathrm{FFN}(x)=\max \left(0, x W_{1}+b_{1}\right) W_{2}+b_{2}
\end{equation}
Next, we illustrate three different methods (i.e., Jointly Encoder, Shared Encoder, and Single Encoder), which can fuse
lexical and syntactical information of the code at the
Encoder. The structure of these fusing methods can be found in Fig.~\ref{fig:encoder}. Specifically,
\textbf{Jointly Encoder} assumes that AST and source code are two different levels of the input.
Therefore, this method sets up an encoder for the source code sequence (i.e., Code Encoder) and an encoder for the AST Sequence (i.e., AST Encoder), respectively. The Linear layer is activated by the Tanh function to obtain the final matrix of contextual information.
\textbf{Shared Encoders} considers the effect of having two encoders on the model parameters. This method encodes the source code sequence and the AST Sequence by weight sharing (i.e., using one encoder). Then it switches the two output matrices together, adds a Linear layer, and activates it with the Tanh function to obtain the final matrix of contextual information.
\textbf{Single Encoder} first splices the source code sequence and the AST sequence. Then, this method proceeds through the word embedding in the encoder afterward, which relies entirely on the positional information encoded in the model for learning lexical and syntactical information.
\begin{figure}[htbp]
\centering
\vspace{-1mm}
\includegraphics[width=0.4\textwidth]{images/Encoder.png}
\caption{Structure of three different fusion methods in the Encoder}
\vspace{-1mm}
\label{fig:encoder}
\end{figure}
\subsubsection{Decoder Layer}
According to the structure of the Transformer, it can be found that the Decoder is the same as the Encoder. In the beginning, a position vector Positional Encoding was added first, which is the same as the method used in the Encoder.
Next is the masked multi-head attention,
the mask represents a mask, which masks certain values so that it has no effect when the parameters are updated. The decoder implements the autoregressive model by means of Mask.
The sequence mask is to make the decoder unable to see future information. That is, for a sequence, at the moment time step is $t$, our decoded output should only depend on the output before time $t$, not the output after $t$. So we need to generate an upper triangular matrix, the values of the upper triangle are all 0. By applying this matrix to each sequence, the information after $t$ can be hidden.
Finally, The combined embeddings are passed through the $N$ decoder layers, along with the encoded source, and the source and target masks. Notice the rest of the layer structure is the same as the Encoder in our method.
\subsection{Comment Generation Part}
Previous studies~\cite{hu2018deep}\cite{hu2018summarizing} showed that generating the text through the maximum probability distribution of the neural networks often yields a low-quality result.
Recently, most studies~\cite{freitag2017beam}\cite{wiseman2016sequence} resorted to Beam Search~\cite{freitag2017beam}, which can achieve high performance on text generation tasks.
Therefore, {\tool} uses the Beam Search algorithm to generate code comments.
\section{Experimental Setup}
\label{sec:setup}
In our empirical study, we want to answer the following three research questions (RQs):
\noindent\textbf{RQ1: Can our proposed method {\tool} outperform state-of-the-art baselines for code comment generation in terms of neural machine translation-based measures?}
\noindent\textbf{Motivation.} In this RQ, we want to compare the performance of {\tool} with the state-of-the-art baselines from both the code comment generation domain and neural machine translation domain in an automated manner. The main challenge is how to measure the similarity between the comments written by developers and the comments generated by {\tool} and baselines. In this RQ, we consider three performance measures, which have been used in the previous studies on neural machine translation~\cite{lin2004automatic}\cite{guo2018hierarchical} and code comment generation~\cite{hu2018summarizing}\cite{wan2018improving}\cite{hu2020deep}.
\noindent\textbf{RQ2: Can hybrid code representation improve the performance of our proposed method {\tool}?}
\noindent\textbf{Motivation.} In this RQ, we want to show the effectiveness of fusion Method-based hybrid code representation. Therefore, we want to compare this code representation method with the methods, which only consider code lexical information.
Moreover, we want to compare the performance of different methods for fusing code lexical information and code syntactical information. Then we can select the best fusion method in this study.
\noindent\textbf{RQ3: Can our proposed method {\tool} outperform state-of-the-art baselines for code comment generation via human study?}
\noindent\textbf{Motivation.} Evaluating the effectiveness of our proposed method in terms of performance measures has the following disadvantages. First, the quality of the comments written by developers can not be guaranteed in some cases. Second, sometimes evaluation based on word similarity is not accurate since two semantic similar code comments may contain different words.
Therefore, it is necessary to evaluate the effectiveness of our proposed method via human study in a manual way.
\subsection{Code Corpus}
In our empirical study, we choose code corpus\footnote{This corpus can be downloaded from \url{https://github.com/xing-hu/EMSE-DeepCom}} gathered by Hu et al.~\cite{hu2020deep} as our empirical subjects,
since this code corpus have been widely used in previous studies for code comment generation~\cite{hu2020deep}\cite{hu2018deep}\cite{kang2019assessing}\cite{wang2020reinforcement}\cite{zhang2020retrieval}\cite{wei2019code}.
Table~\ref{tab:statistics} shows the statistical information for code length, SBT length, and comment length. For the above code corpus, 20,000 pairs are selected to construct the testing set and the validation set. Then the remaining 445,812 pairs are used to construct the training set. This setting is consistent with the experimental setting in the previous studies (such as Hybrid-DeepCom~\cite{hu2020deep}), which can guarantee a fair comparison with the baselines.
\begin{table}[htbp]
\caption{Statistics of code corpus used in our empirical study}
\label{tab:statistics}
\begin{center}
\begin{tabular}{cccccc}
\toprule
\multicolumn{6}{c}{
\textbf{Statistics for Code Length}} \\
\midrule
Avg & Mode & Median & $<100$ & $<150$ & $<200$ \\
55.79 & 11 & 36 & $82.75\%$ & $92.11\%$ & $97.10\%$ \\
\midrule
\bottomrule
\multicolumn{6}{c}{
\textbf{Statistics for Comment Length}} \\
\midrule
Avg & Mode & Median & $<20$ & $<30$ & $<50$ \\
10.25 & 8 & 9 & $95.69\%$ & $99.99\%$ & $100\%$ \\
\bottomrule
\end{tabular}
\end{center}
\end{table}
\subsection{Performance Measures}
In our study, we use the performance measures from neural machine translation research to automatically evaluate the quality between the candidate comments (generated by code comment generation methods) and the reference comments (generated by developers).
The chosen performance measures include BLEU, METEOR, and ROUGE-L. These performance measures have been widely used in previous studies for code comment generation~\cite{hu2018summarizing}\cite{wan2018improving}\cite{hu2020deep}. The details of these performance measures can be found as follows.
\noindent\textbf{BLEU.}
BLEU (Bilingual Evaluation Understudy)~\cite{papineni2002bleu} is the earliest measure used to evaluate the performance of the neural machine translation models. It is used to compare the degree of coincidence of $n$-grams in the candidate text and the reference text.
In practice, $N$=1$\sim$4 is usually taken, and then the weighted average is performed.
Unigram ($N$ =2) is used to measure word translation accuracy, and high-order $n$-gram is used to measure the fluency of sentence translation.
\noindent\textbf{METEOR.}
METEOR (Metric for Evaluation of Translation with Explicit Ordering)~\cite{banerjee2005meteor} is based on $\mathit{BLEU}$ with some improvements. METEOR is based on the single-precision weighted harmonic mean and the single word recall rate, and its purpose is to solve some inherent defects in the BLEU standard.
\noindent\textbf{ROUGE-L.}
ROUGE-L (Recall-Oriented Understudy for Gisting Evaluation)~\cite{lin2004rouge} calculates the length of the longest common subsequence between the candidate text and the reference text. The longer the length, the higher the score.
We utilize the implementations provided by nlg-eval library\footnote{\url{https://github.com/Maluuba/nlg-eval}}, which can ensure the implementation correctness of these performance measures.
\subsection{Experimental Settings}
Our proposed method {\tool} is implemented with PyTorch 1.6.0.
In our study, we choose AdamW as the optimizer and use cross Entropy as the loss function. We set the learning rate to 0.0005 and set the value of epoch to 30.
All the experiments run on a computer with an Inter(R) Xeon(R) Silver 4210 CPU and a GeForce RTX3090 GPU with 24 GB memory. The running OS platform is Windows OS.
\section{Result Analysis}
\label{sec:results}
\subsection{Result Analysis for RQ1}
\noindent\textbf{RQ1: Can our proposed method {\tool} outperform state-of-the-art baselines for code comment generation in terms of neural machine translation-based measures?}
\noindent\textbf{Method.}
In this RQ, we first want to compare our proposed method {\tool} with Hybrid-DeepCom~\cite{hu2020deep}.
Hybrid-DeepCom used the AST traversal method to represent the code structure information. Then they used the seq2seq model with the attention mechanism to construct the model.
Then, we also choose other four state-of-the-art code comment generation methods (i.e., DeepCom~\cite{hu2018deep},
CodePtr~\cite{2021NIU}, and Transformer~\cite{ahmad2020transformer}) as our baselines.
Later, we choose three baselines from deep learning-based machine translation models.
The first two baselines are traditional seq2seq models~\cite{sutskever2014sequence} with/without attention mechanism~\cite{bahdanau2015neural}. The last baseline is GPT-2~\cite{radford2019language}). GPT2 only uses the decoder in the Transformer by large-scale anticipatory learning on tasks (such as machine translation and text summarization).
Finally, to show the competitiveness of our fusion method, we also consider a baseline (i.e., {\tool} without AST), in which the Encoder only considers the code lexical information.
Notice, in this RQ, {\tool} (i.e., {\tool} with AST) considers the Single Encoder as the fusion method.
For these chosen baselines, we re-use the experimental results of three methods (i.e., DeepCom, Hybrid-DeepCom, and CodePtr) due to the same dataset split setting and re-implement the remaining baselines.
\noindent\textbf{Results.}
The comparison results between {\tool} and the baselines can be found in Table~\ref{tab:RQ1}.
Based on Table~\ref{tab:RQ1}, we can find that
our proposed method {\tool} can outperform all of the baselines.
In terms of $\mathit{BLEU}$\_1/2/3/4, {\tool} can at least improve its performance by 6.18\%, 9.86\%, 12.76\%, 14.85\% respectively.
In terms of $\mathit{METEOR}$, {\tool} can improve its performance by 8.20\% at least.
In terms of $\mathit{ROUGE}$-$\mathit{L}$, {\tool} can improve its performance by 4.87\% at least.
Therefore, {\tool} can achieve better performance than the baselines in terms of these performance measures.
\begin{table*}[htbp]
\caption{The comparison results between our proposed method {\tool} and baseline methods in terms of BLEU, METEOR and Rouge\_L}
\begin{center}
\setlength{\tabcolsep}{1mm}{
\resizebox{0.87\textwidth}{!}{
\begin{tabular}{ccccccc}
\toprule
\textbf{METHOD} & \textbf{BLEU\_1(\%)} & \textbf{BLEU\_2(\%)} & \textbf{BLEU\_3(\%)} & \textbf{BLEU\_4(\%)} & \textbf{METEOR(\%)} & \textbf{ROUGE\_L(\%)} \\
\midrule
DeepCom & 49.023 & 44.140 & 38.265 & 35.216 & 25.183 & 52.175\\
Hybrid-DeepCom & 54.056 & 45.046 & 40.336 & 37.397 & 27.383 & 54.331\\
Transformer & 55.624 & 46.295 & 41.574 & 38.692 & 29.056 & 55.263 \\
CodePtr & 59.506 & 51.107 & 46.386 & 43.371 & 31.382 & 62.761\\
Seq2Seq & 45.016 & 40.625 & 36.162 & 34.024 & 23.695 & 50.462\\
Seq2Seq with atten & 46.526 & 41.526 & 37.812 & 35.041 & 24.534 & 51.842\\
GPT-2 & 47.915 & 41.253 & 37.593 & 35.301 & 26.887 & 53.398\\
\midrule
{\tool} without AST & 59.090 & 51.027 & 46.613 & 43.801 & 31.711 & 60.539 \\
{\tool} with AST & \textbf{62.790} & \textbf{55.283} & \textbf{51.127} & \textbf{48.437} & \textbf{34.182} & \textbf{63.249} \\
\bottomrule
\end{tabular} } }
\end{center}
\label{tab:RQ1}
\end{table*}
In addition, four code examples with different lengths are selected from the testing set to compare the results generated by {\tool} and baselines.
The comparison results can be found in Table~\ref{tab: samples of summarizations}. In Case 1, the use of a network of pointers in CodePtr and the use of BPE splitting with vocabulary sharing in {\tool} both generate "cache" words in the comment, which can demonstrate the effectiveness of our method in alleviating the OOV problem. We further verify the competitive nature of our method in Case 2, where the word ``insectwordcategory" does not appear in the source code and {\tool} still generates the comment correctly, while Hybrid-DeepCom and CodePtr only generate $\langle$UNK$\rangle$. As we can find from Case 3 and Case 4, although the comments generated by the baselines are consistent, the comments generated by {\tool} are better after manual analysis. For example, the comment generated in Case 3 explains the reason for doing this separate step, and the comment generated in Case 4 emphasizes the meaning of the if statement.
\begin{table*}[htbp]
\centering
\caption{Examples of generated comments by {\tool} and other baselines. These examples cover both long and short code snippets.}
\label{tab: samples of summarizations}
\begin{tabular}{c|lp{10cm}}
\toprule
Case ID &Example \\
\midrule
\multirow{4}{*}{1} &
\begin{lstlisting}
private void addCachedLegionMemberEx(LegionMemberEx legionMemberEx) {
this.allCachedLegionMembers.addMemberEx(legionMemberEx);
}
\end{lstlisting}\\
&\textbf{Hybrid-DeepCom:} this method will add a new legion to this container \\
&\textbf{Codeptr:} convenience method to add new member to cache\\
&\textbf{ComFormer without AST:} add legion member to cache\\
&\textbf{ComFormer with AST:} this method will add a new legion member to the cache \\
&\textbf{Human Written:} this method will add a new legion member to the cache \\\midrule
\multirow{4}{*}{2} &
\begin{lstlisting}
public SimpleTextCategory(String sName) {
super();
Dictionary = new Dictionary(sName, NUM_);
Dictionary.AddSubStrings = BOOL_;
Dictionary.RemoveSubStrings = BOOL_;
DocumentCount = NUM_;
Name = sName;
}
\end{lstlisting} \\
&\textbf{Hybrid-DeepCom:} creates a new instance of $\langle$UNK$\rangle$ \\
&\textbf{Codeptr:} creates a new instance of $\langle$UNK$\rangle$\\
&\textbf{ComFormer without AST:} creates a new instance of insectcategory given a category name .\\
&\textbf{ComFormer with AST:} creates a new instance of insectwordcategory \\
&\textbf{Human Written:} creates a new instance of insectwordcategory \\\midrule
\multirow{4}{*}{3} &
\begin{lstlisting}
public void insertNewAddresses(Dao<AddressBook, Integer> addressBookDao,
Dao<AddressItem, Integer> addressItemDao) throws SQLException {
if (this.nonDaoAddresses == null) {
return;
}
addressBookDao.assignEmptyForeignCollection(this, STR_);
for (AddressItem addressItem : nonDaoAddresses) {
addressItem.setAddressBook(this);
addressItemDao.create(addressItem);
addresses.add(addressItem);
}
}
\end{lstlisting}\\
&\textbf{Hybrid-DeepCom:} we need to insert a new contacts into the book.\\
&\textbf{Codeptr:} we have separate ormlite doesn t automatically insert ormlite doesn doesn t automatically insert ormlite doesn doesn t automatically .\\
&\textbf{ComFormer without AST:} insert new contact to database \\
&\textbf{ComFormer with AST:} we have to do this separate step because ormlite doesn t automatically insert children\\
&\textbf{Human Written:} we have to do this separate step because ormlite doesn t automatically insert children \\\midrule
\multirow{4}{*}{4} &
\begin{lstlisting}
public static Class<?> findCommonElementType(Collection collection) {
if (isEmpty(collection)) {
return null;
}
Class<?> candidate = null;
for (Object val : collection) {
if (val != null) {
if (candidate == null) {
candidate = val.getClass();
} else if (candidate != val.getClass()) {
return null;
}
}
}
return candidate;
}
\end{lstlisting} \\
&\textbf{Hybrid-DeepCom:} finds the common element type for a given collection. \\
&\textbf{Codeptr:} find the common element of the given collection.\\
&\textbf{ComFormer without AST:} find the common element type of the given collection.\\
&\textbf{ComFormer with AST:} find the common element type of the given collection if any. \\
&\textbf{Human Written:} find the common element type of the given collection if any. \\
\bottomrule
\end{tabular}
\end{table*}
\vspace{0.6cm}
\begin{tcolorbox}[width=1.0\linewidth, title={}]
\textbf{Summary for RQ1:}
Our proposed method {\tool} can outperform state-of-the-art baselines both from the code comment generation domain and neural machine translation domain in terms of three performance measures. Besides, the comments generated by {\tool} can have better quality after analyzing some cases.
\end{tcolorbox}
\subsection{Result Analysis for RQ2}
\noindent\textbf{RQ2: Can hybrid code representation improve the performance of our proposed method {\tool}?}
\noindent\textbf{Method.}
As shown in Fig~\ref{fig:encoder}, we consider three different fusion methods (i.e., Jointly Encoder, Shared Encoder, and Single Encoder) to combine code lexical information and AST syntactical information.
\noindent\textbf{Reults.}
The comparison results are shown in Table~\ref{tab:RQ2}.
First, we can find that using these three fusion methods can achieve better performance than {\tool} without AST. This means considering syntactical information from AST can further improve the performance of {\tool}.
Second, among these three fusion methods, Single Encoder can achieve the best performance. This means Single Encoder is best suited for this task.
\vspace{0.6cm}
\begin{tcolorbox}[width=1.0\linewidth, title={}]
\textbf{Summary for RQ2:}
Hybrid code representation can improve the performance of our proposed method {\tool}, while Single Encoder can achieve the best performance.
\end{tcolorbox}
\begin{table}[htbp]
\caption{The comparison results between three different fusion methods }
\renewcommand\arraystretch{1}
\begin{center}
\setlength{\tabcolsep}{1mm}{
\resizebox{0.5\textwidth}{!}{
\begin{tabular}{cccc}
\toprule
\textbf{METHOD} & \textbf{BLEU\_4(\%)} & \textbf{METEOR(\%)} & \textbf{ROUGE\_L(\%)} \\
\midrule
{\tool} without AST & 43.801& 31.711&60.539 \\
Jointly Encoder & 46.301 & 32.925 & 63.012 \\
Shared Encoder & 44.512 & 32.052 & 62.105 \\
Single Encoder & \textbf{48.437} & \textbf{34.182} & \textbf{63.249} \\
\bottomrule
\end{tabular} } }
\end{center}
\label{tab:RQ2}
\end{table}
\subsection{Result Analysis for RQ3}
\noindent\textbf{RQ3: Can our proposed method {\tool} outperform
state-of-the-art baselines for code comment generation via human study?}
\noindent\textbf{Method.}
In RQ1, the performance comparison is automatically performed in terms of neural machine translation-based performance measures.
To verify the effectiveness of our proposed methods, we further conduct a human study.
We recruit two master students majoring in computer science, to perform manual analysis.
Since both of these two master students have rich project development experience, the quality of our human studies can be guaranteed.
Due to the high cost of manually analyzing all the Java methods in the testing set, we use a common sampling method~\cite{singh2013elements} to randomly select at least $MIN$ Java methods and the generated comments from the testing sets. The value of $MIN$ can be determined by the following formula:
\begin{equation}
MIN=\frac{n_{0}}{1+\frac{n_{0}-1}{size}}
\end{equation}
where $n_0$ depends on the selected confidence level and
the desired error margin $n_{0}\left(=\frac{Z^{2} \times 0.25}{e^{2}}\right)$. $Z$ is a confidence
level $z$ score and $e$ is the error margin. $size$ is the number of samples in the testing set.
For the final manual
analysis, we select $MIN$ examples for the relevant data for the
error margin $e$ = 0.05 at 95\% confidence level (i.e., $MIN =
377$).
For the 377 selected samples, we show the corresponding source code, the comments generated by {\tool}, and the comments generated by the method Hybrid-DeepCom to master students.
Notice, these two
master students do not know which method the comment
is generated by, which can guarantee a fair comparison.
Three scores are defined as follows.
\begin{itemize}
\item 1 means that there is no connection between the comment and the code, i.e., the comment does not describe the function and meaning of the corresponding code. We use Low to denote this result.
\item 2 means that the comment is partially related to the code, i.e., it describes part of the function and meaning of the corresponding code. We use Medium to denote this result.
\item 3 means that there is a strong connection between the comment and the code, i.e., the comment correctly describes the function and meaning of the corresponding code. We use High to denote this result.
\end{itemize}
\noindent\textbf{Results.}
After our human study, we analyze the scoring results of these two master students. The final results are shown in Table~\ref{tab:RQ3}.
First, we can find {\tool} can generate a significantly higher proportion of high-quality comments than Hybrid-DeepCom. Then, {\tool} can generate a much lower proportion of low-quality comments than Hybrid-DeepCom. Finally, {\tool} can achieve a higher score than Hybrid-DeepCom. These results indicate that {\tool} can significantly outperform the baseline Hybrid-DeepCom.
\vspace{0.6cm}
\begin{tcolorbox}[width=1.0\linewidth, title={}]
\textbf{Summary for RQ3:}
Our proposed {\tool} also works better than the baseline method on human study.
\end{tcolorbox}
\begin{table*}[htbp]
\caption{Manual analysis results on comments generated by {\tool} and Hybrid-DeepCom via human study}
\label{tab:RQ3}
\renewcommand\arraystretch{1.5}
\resizebox{1\textwidth}{!}{
\begin{tabular}{ccccc}
\hline
Student &
\multicolumn{1}{c}{\begin{tabular}[c]{@{}c@{}}Low\\ {\tool} Hybrid-DeepCom\end{tabular}} &
\multicolumn{1}{c}{\begin{tabular}[c]{@{}c@{}}Medium\\ {\tool} Hybrid-DeepCom\end{tabular}} &
\multicolumn{1}{c}{\begin{tabular}[c]{@{}c@{}}High\\ {\tool} Hybrid-DeepCom\end{tabular}} &
\multicolumn{1}{c}{\begin{tabular}[c]{@{}c@{}}Mean\\ {\tool} Hybrid-DeepCom\end{tabular}} \\ \hline
1 &
2.39\% \quad\quad\quad 12.20\% &
28.12\% \quad\quad\quad 35.28\% &
69.49\% \quad\quad\quad 52.52\% &
2.67 \quad\quad\quad 2.40 \\
2 &
4.51\% \quad\quad\quad 10.34\% &
29.90\% \quad\quad\quad 35.01\% &
65.59\% \quad\quad\quad 54.65\% &
2.61 \quad\quad\quad 2.46 \\ \hline
\end{tabular}
}
\end{table*}
\section{Discussions}
\label{sec:discussion}
In this section, we aim to analyze the impact of codes' length on the performance of {\tool} and Hybrid-DeepCom. The final results in terms of two performance measures can be found in Fig.~\ref{fig:LEHGTH}.
As shown in Fig.~\ref{fig:LEHGTH}, the longer the source code length, the lower the average score of METEOR and Rouge\_L. These two methods obtain higher performance when the coding length is between 15$\sim$50.
When the source code length is short, These two methods can learn the full semantics of the source code more easily.
We found that the performance fluctuates significantly when the number of tokens in the source code exceeded 125. Because there are fewer source codes in the corpus, whose length is over 125 and this limits {\tool}'s ability to learn this kind of code.
Overall,
{\tool} outperformed Hybrid-DeepCom regardless of code length.
\begin{figure}
\centering
\subfigure[METEOR scores for different Code lengths]{%
\includegraphics[width=0.5\textwidth]{images/Meteor.png}%
}%
\hfill
\subfigure[ROUGE\_L scores for different Code lengths]{%
\includegraphics[width=0.5\textwidth]{images/Rouge.png}%
}%
\vspace{-1mm}
\caption{Performance comparison between {\tool} and Hybrid-DeepCom by considering different code length in terms of two performance measures, here blue line denotes {\tool} and yellow line denotes Hybrid-DeepCom.}
\label{fig:LEHGTH}
\vspace{-1mm}
\end{figure}
\section{Threats to Validity}
\label{sec:threats}
In this section, we mainly discuss potential threats to the validity of our empirical study.
\noindent\textbf{Internal threats.}
The mainly first internal threat is the potential defects in the implementation of our proposed method. To alleviate this threat, we first check code carefully and use mature libraries, such as PyTorch and Transformers\footnote{\url{https://github.com/huggingface/transformers}}.
The second internal threat is the implementation correctness of our chosen baseline methods. To alleviate this threat, we try our best to re-implement their approach according to the original description of these baselines, and our implementation can achieve similar performance reported in their empirical study.
\noindent\textbf{External threats.}
The first external threat is the choice of the corpus. To alleviate this threat, we select a corpus, which was provided by Hu et al.~\cite{hu2020deep}. The reasons can be summarized as follows.
First, Java is the most popular programming language, and most of the projects are developed by using Java.
Second, the quality of this code corpus has been improved by Hu et al. by performing data preprocessing. Therefore, this code corpus has also been used in previous studies on code comment generation ~\cite{hu2020deep}\cite{hu2018deep}\cite{kang2019assessing}\cite{wang2020reinforcement}\cite{zhang2020retrieval}\cite{wei2019code}.
In the future, we want to verify the effectiveness of our proposed method for the corpus of other programming languages (such as Python, C\#)~\cite{iyer2016summarizing}.
\noindent\textbf{Construct threats.}
The construct threat in this study is the performance measures used to evaluate our proposed method's performance.
To alleviate these threats, we choose three popular performance measures from the neural machine translation domain. These measures have also been widely used in previous code comment generation studies~\cite{hu2018summarizing}\cite{wan2018improving}\cite{hu2020deep}.
Moreover, we also perform a human study to show the competitiveness of our proposed method.
\noindent\textbf{Conclusion threats.}
The conclusion threat in our study is we do not perform cross-validation in our research.
In our study, the data split on the corpus is consistent with the experimental setting in the previous study for DeepCom~\cite{hu2020deep}.
This can guarantee a fair comparison with the baselines DeepCom, Hybrid-DeepCom, and CodePtr (i.e., the model construction and application on the same training set, validation set, and testing set).
Using cross-validation can comprehensively evaluate our proposed method, since different splits may result in a diverse training set, validation set, and testing set. However,
this model evaluation method has not been commonly used for neural machine translation experiments due to the high training computational cost.
\section{Conclusion and Future Work}
\label{sec:conclusion}
High-quality code comments are the key to improve the program comprehension efficiency of developers.
Inspired by the latest research advancements in the field of deep learning and program semantic learning,
we propose a novel method {\tool} via Transformer and fusion Method-based hybrid code representation for code comment generation.
In particular, we consider the Transformer to automatically translate the target code to code comment. Moreover, we also use a hybrid code representation (i.e., capture both lexical information and syntactic information) to learn the code semantic effectively. Both empirical studies and human studies verify the effectiveness of our proposed method {\tool}.
In the future,
we first want to evaluate the effectiveness of our proposed method {\tool} by considering other corpus gathered from other programming languages, such as Python, C\#, and SQL query.
Second, we want to use state-of-the-art deep learning methods to improve the performance of our proposed method.
Finally, we also want to design more reasonable performance metrics to better evaluate the quality of code comments generated by {\tool}.
\section*{Acknowledgment}
This work is supported in part by National Natural Science Foundation of
China (Grant nos. 61702041 and 61202006 ), The Open Project of Key Laboratory of Safety-Critical Software for Nanjing University of Aeronautics and Astronautics, Ministry of Industry and Information Technology (Grant No. NJ2020022).
\normalem
\bibliographystyle{IEEEtran}
|
\section{Proposed Architecture}
The proposed architecture consists of two major sections. One is a minimal version of the iris image process: its algorithms in this section stems from University of Salzburg Iris-Toolkit v3.0\cite{USIT3}, comprising image segmentation, localization, feature extraction in Fig.\ref{fig1}. The other section is based on the previous section and it mainly contains QC-LDPC decoders.
\subsection{Minimal Iris Image Processing Units Establishment}
The proposed implementable optimization for iris recognition is based on conventional iris image processing units. In order to present the following sections, these units should be specified briefly.
Generally, an iris image are supposed to be acquired, boundary-detected, segmented, localized and feature-extracted. The minimal iris image processing units collect images from CASIA-Internal V4.0 database. Then Canny Edge Detection, Contrast-adjusted Hough Transform is adopted in segmentation process. The next process is normalization using Doughman rubber sheet model. At last, 1D LogGabor~\cite{rathgeb2012iris,kahlil2010generation}, as a method of feature extraction, will be performed before iris codes are pop out. The iris codes, in the proposed design, subsequently are fed into QC-LDPC encoders or decoders. As they are developed based on OpenCV Library, they are kept in an ARM-based Linux depicted in the top-left of Fig.\ref{fig1}.
\subsection{Error Correction Procedure}
A thorough procedure of iris recognition should be twofold. One is called enrolment phase, during which a reference iris image is recorded in the system. The other is probe or verification phase, during which new irises are acquired and compared to the previous one. Under a known threshold, the final result would be either match or not match. Our proposed QC-LDPC-code-related modules are involved in both two fundamental phases. Basic blocks denoted as major modules are depicted in Fig. \ref{fig1} which consists of 7 stages. The system starts with the image processing stage, including segmentation, localization, feature extraction, DPR-based QC-LDPC code selection, QC-LDPC encoding, QC-LDPC decoding and template matching.
\begin{figure*}[htbp]
\centering
\includegraphics[width=1\textwidth]{Arch.png}
\caption{Block Diagram For Proposed Design}
\label{fig1}
\end{figure*}
\begin{enumerate}
\item Enrolment Phase
\begin{enumerate}
\item A new block of iris codes from Iris Image Processing in Fig. \ref{fig1} will be decided as binary digits. The new block is denoted as $X0$.
\item The QC-LDPC encoder produces a new block of codeword by encoding the compressed $X0'$ and output parity bits $P0'$ (the length of $P0'$ is $n$).
\item $P0'$ would be stored in an external storage, like RAM or FLASH.
\end{enumerate}
\item Verification Phase
\begin{enumerate}
\item Another iris image from an intruder or genuine person is captured and processed until $X1$ is produced.
\item Same procedures will be done again to generate $X2$ and its length is $n$. Subsequently, $X1$ and $X2$ are both sent to Arithmetic Mean module.
\item Arithmetic Mean is added to increase the acceptance rate. $X1$ and $X2$ come from the same iris but are captured in different time slots. The output of Arithmetic Mean, as known as $X3$, is a new vector of iris codes with the same number of elements as $X1$ and $X2$, where each element is the average of the elements in the same location of $X1$ and $X2$. The output of Arithmetic Mean module will be transferred to the QC-LDPC decoder or Matching Module directly.
\item Concatenated with bit-extended $P0'$, this new group of coded data($[X3,P0']$) will be fed into the QC-LDPC decoding module. Please be noted that a unsigned-to-signed operation (subtracting 128) will be done before QC-LDPC decoding starts.
\item The decoded vector $X1'$, as the output of QC-LDPC decoder will be sent back to ARM-side followed by $X0'$ for matching.
\item In the matching module, the main purpose is to find the minimum value, know as Hamming Distance(HD). Two iris samples, presented as iris binary codes, are input data of matching modules. After comparing one's HD to the other, a decision is given based on current matching threshold.
\end{enumerate}
\end{enumerate}
While Fig. \ref{fig1} demonstrates the proposed design module by module, Fig. \ref{fig40} presents the detailed flow chart of proposed system, listing where iris data should go and be processed in order.
Fig. \ref{fig100} shows the overall process of the proposed QC-LDPC error-correcting method. Briefly speaking, parity bits of the reference iris are used to correct the pre-verified irises which are multiple-sampled and then averaged. After LDPC decoding, the outputs are the hard-decision values and the highlighted value has been error-corrected.
\begin{figure*}[htbp]
\centering
\includegraphics[width=1\textwidth]{Method.png}
\caption{Proposed LDPC-related error-correcting method}
\label{fig100}
\end{figure*}
\subsection{Log Likelihood Ratio Soft-decision QC-LDPC Decoder}
A previous piece of work~\cite{seetharaman2012novel} adopts an LDPC scheme rather than QC-LDPC and it feeds LDPC decoders with hard decision. Some information may lose when multi-bit data are compressed into binaries. In this paper, quantized iris code will be maintained to feed the QC-LDPC decoder during probe phase. One of the advantages is that a soft-decision decoder has been known to typically perform better than a hard-decision decoder~\cite{haykin1988digital} and can provide
1–2 dB of additional net coding gain. Not like hard-decision decoders, which need a series of binaries, the inputs to a soft-decision decoder may take on a whole range of values in-between.
The architecture of QC-LDPC decoder in this paper origins in \cite{6419075}. As for QC-LDPC decoding architecture, a layered decoding structure\cite{8587568} is adopted to improve parallelism. The number of Check Node Processors and Variable Node Processors is adjusted based on QC-LDPC H matrix in IEEE 802.16.
\subsection{FPGA Dynamic Partial Reconfiguration and Multiple Decoders}
FPGA Dynamic Partial Reconfiguration derives from \cite{8906146}. It provides a circuit-level real-time flexible decoder architecture. Those one-LDPC-code-supportive QC-LDPC decoders, using DPR, can be time-multiplexed and integrated, acting as a multiple QC-LDPC codes decoder. The merit of this technology is that it can hold other circuits in the FPGA untouched. When the new circuit programmed by the corresponding bit file, the whole FPGA will continue running its logic. The dynamic partition of circuit of FPGA must be specified, otherwise, a tradition configuration need to be do, cause everything in the FPGA reset.
The reason why the proposed system adopts DPR is one class of QC-LDPC codes in IEEE 802.16 sometime is not enough to fulfill all scenarios. For example, when LDPC decoder algorithm is changed from floating-point version(simulation version) to fix-point version(implementation), Algorithm with few quantization bits usually consumes less power, less complex, but perform less accuracy. This configuration may be not good in simulation, but feasible in some resource-constraint devices. Moreover, the difference in QC-LDPC codes may also influence the system. If DPR is adopted, a real-time configuration can happen in a ten-millisecond level.
\begin{figure*}[htbp]
\centerline{\includegraphics[width=1\textwidth]{ISICAS-DPR.png}}
\caption{The implementation of the proposed iris recognition system using multiple QC-LDPC codes}
\label{fig4}
\end{figure*}
Fig.\ref{fig4} demonstrates the DPR-related components and relationship with ARM cores which include iris recognition processing units. It is an implementation on the basis of Fig. \ref{fig1}.
Basically, iris codes are sent from ARM cores to a QC-LDPC decoder and the results will be delivered to ARM cores for follow-up process through AXI buses. Around the decoder, FIFOs and Rate Matches acting like buffers to receive data temporarily before move data to AXI buses. The DPR controller module can change the circuit in the DPR Partition on the fly and that part of circuit represents one selected QC-LDPC decoder. As soon as they confirm a request from ARM cores to change a QC-LDPC decoder, they will shut down the partition (where a decoder locates) and then read a bitstream file from external memory, like DDR SDRAM or FLASH. Finally, the circuit would be updated according to the bitstream followed by a ready signal which can be read by ARM cores.
\section{Experimental Preparation and Results}
The whole design is deployed onto a Xilinx ZCU106 MPSoC development kit(Zynq UltraScale+ XCZU7EV-2FFVC1156). All programs concerning image processing and QC-LDPC encoders are supposed to run in the High Performance System (HPS) which is one of major components in this kit, including ARM Cortex A15. The QC-LDPC decoders stay at programming logic (PL, the FPGA part) of ZCU106. Please be noted that encoders are too smaller compared to decoders and therefore, they will not be considered and only realized by software. Both parts are interconnected via AMBA AXI bus and encapsulated in one single chip. Fig. \ref{fig4} is also an experiment platform. It also employs the data collection and scoreboard for comparison.
Two comparison experiments should be conducted in order to select the best QC-LDPC code and analyze those QC-LDPC codes in performance, complexity and power consumption. At last, DPR overhead and strength need to be tested. It is noted that a duplicated design based on \cite{USIT3} participates and there is error-correcting code remained.
\begin{table*}[htbp]
\centering
\caption{The Details of Each Simulated System in the Experiment(1)}
\label{table:Specs}
\begin{tabular}{cccccc}
\toprule
LDPC Type & Without LDPC \cite{USIT3} & (1920,1280) & (2016,1680) & (1920,1600) & (2016,1344) \\
\midrule
Image Processing Algorithm & V3 & V3 & V3 & V3 & V3\\
Decoder's Algorithm & N/A & Min-Sum & Min-Sum&Min-Sum&Min-Sum\\
Decoder's Code Rate & N/A & 2/3A & 2/3A & 2/3A & 2/3A \\
Iteration & N/A & 50 & 50 & 50 & 50 \\
\bottomrule
\end{tabular}
\end{table*}
\begin{table*}[htbp]
\centering
\caption{The Details of Each Simulated System in the Experiment(2)}
\label{table:Specs2}
\begin{tabular}{cccc}
\toprule
LDPC Type & non-V3 (960,640) 2blk & (960,640) 2blk & (960,800) 2blk \\
\midrule
Image Processing Algorithm & V1 & V3 & V3\\
Decoder's Algorithm & Min-Sum & Min-Sum & Min-Sum\\
Decoder's Code Rate & 2/3A & 2/3A & 2/3A \\
Iteration & 50 & 50 & 50 \\
\bottomrule
\end{tabular}
\end{table*}
The iris database used in this paper is CASIA-IrisV4\cite{WB:2002}. We choose a sub-database CASIA-IrisV4-Internal which includes 249 persons' right and left eye images. All eyes are captured for more than 3 times. We create 62,391 inner-comparison groups to get the True Acceptance Rate (TAR). False Acceptance Rate (FAR) derives from 141,913 inter-comparison groups.
In our experiment, we choose performance indexes as below to demonstrate how QC-LDPC codes influence the iris recognition system.
\begin{itemize}
\item FAR: False Acceptance Rate is the measure of the likelihood that the biometric security system will incorrectly accept an access attempt by an unauthorized user.
\item TAR: True Acceptance Rate is the percentage of times a system (correctly) verifies a true claim of identity.
\end{itemize}
\subsection{QC-LDPC Selection}
Considering of the latency of QC-LDPC decoding process and complexity of the proposed system, an ideal class of QC-LDPC codes should fit the size of iris codes generated by the module "Iris Image Processing", which means one block of data includes only one iris image of codes. Two blocks long decoding scheme during one probe phase is also presented for comparison. Compressing 1280 grey-scale pixels, which is the output of iris image processing units, to 1280 black and white pixels is also need to be done. These 1280 pixels, also as known as bits, will be delivered to a QC-LDPC encoder if enrolment phase emergence or a QC-LDPC decoder if probe phase comes.
\begin{figure}[htbp]
\centerline{\includegraphics[width=0.55\textwidth]{ROC_Simulation.png}}
\caption{QC-LDPC codes simulation comparison}
\label{fig10}
\end{figure}
In this experiment, we choose 7 types QC-LDPC codes shown in Table \ref{table:Specs} and Table \ref{table:Specs2}. One type of codes, such as (1920,1280), (2016,1680), (1920,1600) and (2016,1344), are selected because the data to be encoded in these groups are equal or close to 1280 bits which contain iris information and Longer QC-LDPC codes would cause inefficient resource as some dummy ``0" need to be padded.. Another type of codes, like (960,640), are chosen to test whether multiple blocks of encoding and decoding may impact accuracy. Another purpose is to test the parallelism. ``(960,640) 2blk" in Table \ref{table:Specs2} means 1280-bit long input data, if encoded in (960,640), takes two times of operation of this encoder. It takes the same times of operation for the decoder if decoding is needed.
Fig. \ref{fig10} shows the relationship between FAR and TAR of various objects in the simulation. It can be seen that (1920,1680) outperforms other in most of time, followed by (960,640) 2blk. Increasing the length of QC-LDPC codes, no matter one block or two blocks, doesn't make any improvement. What's worse, The increase in code length causes a performance loss. In terms of image processing algorithm version, the older version, V1 is not as good as V3, comparing non-V3 (960,640) 2blk and (960,640) 2blk.
\subsection{Resource Analysis}
On top of the experiment above, an in-depth study of (1920,1280) and (960,640) 2blk and their implementation should be performed. Table \ref{table:utilization_0} shows the extra Programmable Logic cost, latency and power consumption when a QC-LDPC decoder is implemented. In this table, (960,640) are designed in parallel and serial. The former design includes two decoders operating simultaneously and therefore takes more resources and less processing time. The latter design has to process block by block, take more processing time, but less complex.
With 8-bit quantization Min-Sum decoding algorithm, Q8 consumes the most hardware resource of all. 18K Block RAM increases linearly as the quantization change from Q2 to Q8 is linear and most large scale of data are stored in 18K Block RAMs. The increase of LUT and FF does not resemble 18K BRAM. They grow slowly since most of control logic is built with them and they are not heavily impacted when quantization bits change. 4-bit quantization seems to be a power-saving option if the accuracy rate result in Fig. \ref{fig20} is considered when some device is power-constraint.
Note that in Fig. \ref{fig20}, paralleled and serial design for (960,640) decoders have the same accuracy rate, so there is no need to discuss separately.
\begin{table}[htbp]
\centering
\caption{Characters of Synthesized QC-LDPC decoders(1)}
\label{table:utilization_0}
\begin{tabular}{cccc}
\toprule
& (1920,1280) & (1920,1280) & (960,640) PARL\\
\midrule
Q bits & 8 & 4 & 8 \\
BRAM 18K & 27 & 14 & 21 \\
FF & 2422 & 1767 & 4362 \\
LUT & 10578 & 9500 & 6565 \\
Latency(ns) & 726839 & 726839 & 368442 \\
Power(mW) & 35 & 13 & 84 \\
\bottomrule
\end{tabular}
\end{table}
\begin{table}[htbp]
\centering
\caption{Characters of Synthesized QC-LDPC decoders(2)}
\label{table:utilization_1}
\begin{tabular}{cccc}
\toprule
& (960,640) SER & (960,640) PARL & (960,640) SER\\
\midrule
Q bits & 8 & 4 & 4\\
BRAM 18K & 11 & 11 & 5\\
FF & 2169 & 2895 & 1430 \\
LUT & 1430 & 4128 & 2032\\
Latency(ns) & 737518 & 367441 & 735518\\
Power(mW) & 40 & 38 & 17\\
\bottomrule
\end{tabular}
\end{table}
\begin{figure}[htbp]
\centerline{\includegraphics[width=0.55\textwidth]{ROC_Implementation.png}}
\caption{QC-LDPC codes implementation comparison}
\label{fig20}
\end{figure}
\subsection{Dynamic Partial Reconfiguration}
According to the experiment above, we define three different modes, namely fast mode, low-power mode and accuracy mode. Each of the three modes is mapped to a QC-LDPC decoder. Using DPR, the logic resource won't increase linearly as the number of QC-LDPC decoders increases. The QC-LDPC decoders are selected as below:
\begin{itemize}
\item Fast mode: (960,640) in-parallel design with 4-bit quantization spending around 50\% of time compared to others.
\item Low-Power mode: (1920,1680) with 4-bit quantization only consuming 13mW while others consumes more, sometimes even double or triple quantity.
\item Accuracy mode: (1920,1680) with 8-bit quantization having the best improvement compared to non-LDPC.
\end{itemize}
We implement three QC-LDPC decoders onto one partition of Programmable Logic instead of three partitions. The method is based on \cite{8906146}.In terms of real-time switching, the upload size of QC-LDPC decoder bitstream file is 375KB and it takes 1.75ms to change the whole partition of circuit in order to switch different QC-LDPC decoders.
\section{Conclusions}
In this paper, a multi-QC-LDPC error-correcting iris recognition system is implemented onto n SoC-FPGA platform. Using DPR, resource usage is under reasonable control. Three modes are defined for different scenarios. Such application can meet many requirements of various scenarios, like prompt-respond, high-security, low-power.
With regard to practicability, both image-processing-related modules and LDPC-related modules under our proposed design are implemented in one single chip. We allocate QC-LDPC decoders in a programmable logic section that is much easier for those decoders to be operated in parallel and partially reconfigured. We simulate and find the best QC-LDPC codes and implement them based on the FPGA instead of a traditional program to improve the biometric system running in an embedded device. The whole architecture proves that implementing QC-LDPC codes scheme onto a biometric recognition system is feasible.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Numerous researches have been conducted on affective analysis for years and aim to automatically comprehend human feelings, emotions, and behaviors. Affection analysis contributes to many applications, such as psychological therapy and marketing analysis.
We participate in the 2nd Workshop and Competition on Affective Behavior Analysis in-the-wild (ABAW).\cite{kollias2021analysing}\cite{kollias2019deep}\cite{kollias2019expression}\cite{kollias2019face}\cite{kollias2020analysing}\cite{kollias2021affect}\cite{kollias2021distribution}\cite{zafeiriou2017aff} And there are three challenges in affective analysis: valence-arousal, seven basic expression and action unit prediction. Valence-arousal value is a description of human expression, and there are positive and negative for valence and high and low in arousal. Seven basic expressions\cite{kollias2021analysing} are defined as Anger, Disgust, Fear, Happiness, Sadness, Surprise, and Neutral here. All facial movement can be categorized in different action units in terms of the Facial Action Coding System (FACS) model\cite{Ekman1978FacialAC}.
The model we propose is named feature pyramid networks for multi-task affective analysis. It is an image-based method and can solve the three tasks above at the same time. And we use Feature Pyramid Network\cite{Lin2017FeaturePN} for the backbone and the connection between feature layers can bring feature fusion merits. And we will cover this in section \ref{sec/fpn}.
We use the cropped and aligned images from Aff-Wild2 dataset provided by ABAW2 as the training and validation set. There are a great number of missing labels in the provided AffWild2 dataset. Many samples only have labels for one or two tasks. So we augment the dataset with ExpW(Expression-in-the-Wild)\cite{Zhang2017FromFE} and AffectNet\cite{Mollahosseini2019AffectNetAD} and follow the method in semi-supervised learning and propose a teacher-student training procedure to train a multi-task model. We will get into details in section \ref{sec/teacher}.
\begin{figure}[!t]
\centering
\includegraphics[width=0.45\textwidth]{img/architecture.png}
\caption{Multi-task Feature Pyramid Network. We use the backbone of feature pyramid network followed by three classification heads as our model. The features extracted in each FPN layer are concatenated and fed to the classifier. The human image is from ExpW.\cite{Zhang2017FromFE}}
\label{img/architecture}
\end{figure}
Finally, our contributions can be concluded as follows:
1. We propose a novel model using the feature pyramid network for multi-task affective analysis. It exploits the entanglement and hierarchical relation of these three facial attributes.
2. We apply a teacher-student training procedure to learn from missing labels. This allows the multi-task model to learn from all labels in the Aff-Wild2 dataset at the same time.
3. We achieve an excellent result on the Aff-Wild2 validation set over the official baseline\cite{kollias2021analysing} and other models.
\section{Related Works}
Typically, according to the type of extracted features, FER algorithms can be categorized into hand-crafted feature-based and deep learning-based methods. Hand-crafted features can be further divided into texture-based features, geometry-based features, and hybrid features. The texture-based features mainly contain Gabor \cite{2002Gabor}, SIFT \cite{2003SIFT}, HOG \cite{2005Histograms}, LBP \cite{2011}, NMF \cite{2011Graph}, etc. The geometry-based features are primarily based on facial landmark points. Hybrid features refer to the combination of the two above-mentioned features. In the past few years, large-scale facial expression datasets, such as RAF-DB \cite{2017Reliable} and AffectNet \cite{Mollahosseini2019AffectNetAD}, greatly facilitate deep FER research. Very Recently, Zeng \textit{et al.} \cite{DBLP:conf/eccv/ZengSC18} first considered the inconsistent annotation problem in FER research. Wang \textit{et al.} \cite{DBLP:conf/cvpr/WangPYL020} suppressed the uncertainties and improved the FER performance. Li \textit{et al.} \cite{DBLP:journals/tip/LiWDYG21} considered the long-tail distribution and high similarity in FER datasets and achieved leading performance.
The task of facial action unit detection is to recognize active action units. Generally, action units detection methods can be described into two groups: patch-based methods and structure-based methods. Patch-based methods target to extract local features from important facial regions. Zhao \textit{et al.} \cite{DBLP:conf/cvpr/ZhaoCZ16} proposed a region layer to induce important facial regions for
extracting local features. In \cite{DBLP:conf/fgr/LiAZY17}\cite{DBLP:journals/pami/LiAZY18}, Li defined regions of interest (ROI) according to facial landmark points and designed individual convolutional layers to learn deeper features for each facial region. Shao \textit{et al.} \cite{DBLP:conf/eccv/ShaoLCM18} applied multi-scale region learning to extract AU-related local features. Recently, structure-based methods \cite{DBLP:conf/cvpr/NiuHYHS19}\cite{DBLP:conf/aaai/FanLL20}\cite{DBLP:conf/aaai/SongCZJ21} tend to use CNNs and GCNs to extract the local information and capture the relationship between AUs respectively.
Multi-task learning in computer vision is aimed at improving the generalization ability of network on related tasks, e.g. surface normal estimation and edge labels \cite{DBLP:conf/cvpr/WangFG15}, camera pose estimation and wide baseline matching\cite{DBLP:conf/eccv/ZamirWAWMS16}, person attribute classification\cite{DBLP:conf/cvpr/LuKZCJF17} etc. MTL networks can also be divided into two categories. The methods of first category target to find which part of the baseline should be shared and which part should be task-specific \cite{2015Learning}\cite{DBLP:conf/iclr/MeyersonM18}\cite{DBLP:conf/cvpr/MisraSGH16}\cite{DBLP:conf/aaai/RuderBAS19}\cite{DBLP:conf/iccv/BragmanTOAC19}, while the methods of second category make task grouping by taking task-similarity into account \cite{DBLP:journals/jmlr/XueLCK07}\cite{DBLP:conf/nips/JacobBV08}\cite{DBLP:conf/icml/KangGS11}\cite{DBLP:conf/cvpr/LuKZCJF17}\cite{DBLP:conf/cvpr/MejjatiCK18}.
\section{Multi-task Feature Pyramid Network}
\label{sec/fpn}
Valence-arousal, expression, and facial action units are not all about extracted top features. The low-level features which contain local information can also help with classification. So we exploit the pyramid network to predict affective labels.
Since the three tasks all describe affective behaviors, they are closely related. Specifically, expression categories and valence-arousal describe affective behaviors globally, while action units reflect the local facial movements. For example, the occurrence of AU6 and AU12 is a sign of happiness \cite{1983EMFACS}, while happy images always have high valence scores\cite{Mollahosseini2019AffectNetAD}.
There are a few earlier works concerning the use of feature pyramid in facial expression recognition\cite{Yang2021ACF}\cite{Su2021FacialER}. However, they only focus on a single task and we show that the feature pyramid also works for multi-task affective analysis.
\subsection{Network Architecture}
Our network architecture can be displayed as figure \ref{img/architecture}. We follow the implementation of Feature Pyramid Networks to build our model\cite{Lin2017FeaturePN}. The input image is feed into the ResNet \cite{He2016DeepRL} backbone first and extract conv2, conv3, conv4, and conv5 output. Then the top-down feature fusion is applied. The up-layer features are scaled by 2 and added to the down-layer. We do average pooling in all four layers to get $1\times 1$ output per layer. Finally, features from all layers are concatenated to form a vector used for classification.
\subsection{Multi-task learning}
We use three different classification heads for the three tasks respectively. For the valence-arousal task, we use a linear layer and mean squared error(MSE) loss function. The valence-arousal task is a regression task and it is expected to predict values between -1 and 1 for valence and arousal intensity. Compared to mean absolute error(MAE), MSE has more tolerance for small deviation which is good for being not overfitting. The loss can be calculated as:
\begin{equation}
L_{VA}(x,y) = (x_v - y_v)^2 + (x_a - y_a)^2
\end{equation}
in which $x_v$ and $y_v$ stand for the prediction and ground truth of valence and $x_a$ and $y_a$ stand for the prediction and ground truth of arousal.
For the expression task, we use the cross-entropy loss function for this multi-class prediction. And for the facial action unit task, we use binary cross-entropy loss function for this multi-label prediction. It is a typical solution for expression classification. The CE and BCE loss can be calculated as:
\begin{equation}
L_{EXPR}(x,y) = -x[y] + \log(\sum_j\exp(x[j]))
\end{equation}
\begin{align}
&L_{AU}(x,y) =\\ \nonumber
&- \sum_j(y_j\log(\sigma(x_j))+(1-y_j)\log(\sigma(1-x_j)))
\end{align}
In cross-entropy loss, $y$ is the class number and in binary cross-entropy loss, $y$ is the 0-1 binary vector.
Our total loss function for the multi-task model can be shown as:
\begin{equation}
L_{Multi} = \alpha L_{VA} + \beta L_{EXPR} + \gamma L_{AU}
\end{equation}
And we finally choose $ \alpha=\beta=\gamma=1$ for training. All three classification heads only have one linear layer and share the same backbone. We expect the backbone network to learn unified distinguishable features of expression. And three heads get features from all four layers in FPN.
\section{Learning from Missing and Unbalanced Labels}
\label{sec/teacher}
\subsection{Data Augmentation}
Aff-Wild2, the dataset we mainly use for the ABAW2 Competition, is annotated for three affective behavior analysis tasks: valence-arousal estimation, basic expression classification, and facial action unit detection.
For expression classification, we can observe a severe imbalance distribution in figure \ref{fig:expr_dist}. Re-balancing is a frequently-used strategy to deal with long-tail distribution, but it will cause under-fitting to the head or over-fitting to the tail. So we just merge samples of Aff-Wild2, ExpW \cite{Zhang2017FromFE} and AffectNet \cite{Mollahosseini2019AffectNetAD} without re-sampling. The distributions of seven emotion categories in the Aff-wild2 dataset, the ExpW dataset, the AffectNet dataset, and the merged dataset are shown in figure \ref{fig:expr_dist}.
For valence-arousal estimation, we import the AffectNet dataset which contains 280,000 images annotated with valence-arousal scores in [-1, 1]. Cause we regard it as a regression problem, we do not apply any re-balancing strategies.
\begin{figure}[!t]
\centering
\includegraphics[width=\columnwidth]{img/expr_dist.PDF}
\caption{Comparison of different basic expression distributions. It shows the label distribution of the three datasets.}
\label{fig:expr_dist}
\end{figure}
\begin{figure}[!t]
\centering
\includegraphics[width=0.3\textwidth]{img/training.png}
\caption{Teacher-student Training Strategy. The teacher model is a single task model and the student model is a multi-task model. In this situation, the VA label is missing and our single-task model provides the soft label for the multi-task model. So the multi-task model can learn from all three labels simultaneously.}
\label{img/training}
\end{figure}
\begin{table*}[ht]
\centering
\caption{Experiments on AffWild2 Validation Set. VA, EXPR, and AU mean the score for each task. CCC, F1, Acc, and score follow the rule that the higher the better. For different input data, Single is the origin AffWild2 dataset. Mixed is our augmented dataset. And Multi is the AffWild2 dataset with our generated soft labels.}
\begin{tabular}{@{}l|l|lll|lll|lll@{}}
\toprule
Model & Data & CCC-A & CCC-V & VA & Acc & F1 & EXPR & Acc & F1 & AU \\ \midrule
Baseline\cite{kollias2021analysing} & Single & 0.23 & 0.21 & 0.22 & 0.50 & 0.30 & 0.36 & 0.22 & 0.4 & 0.31 \\ \midrule
MobileNet & Single & 0.34 & 0.12 & 0.23 & 0.50 & 0.29 & 0.36 & 0.87 & 0.39 & 0.63 \\
ResNet & Single & 0.29 & 0.14 & 0.22 & 0.52 & 0.30 & 0.38 & 0.86 & 0.41 & 0.64 \\
F3R(Ours) & Single & 0.27 & 0.22 & 0.24 & 0.55 & 0.31 & 0.39 & 0.87 & 0.43 & 0.65 \\ \midrule
MobileNet & Mixed & 0.31 & 0.27 & 0.29 & 0.58 & 0.36 & 0.43 & 0.87 & 0.37 & 0.62 \\
ResNet & Mixed & 0.28 & 0.23 & 0.26 & 0.57 & 0.36 & 0.43 & 0.87 & 0.41 & 0.64 \\
F3R(Ours) & Mixed & 0.34 & 0.31 & 0.32 & 0.59 & 0.37 & 0.44 & 0.87 & 0.37 & 0.64 \\ \midrule
F3R(Ours) & Multi & 0.44 & 0.28 & 0.36 & 0.61 & 0.40 & 0.47 & 0.88 & 0.40 & 0.64 \\ \bottomrule
\end{tabular}
\label{tab/result}
\end{table*}
\subsection{Training Strategies}
We use teacher-student network to fix missing labels. The similar work is \cite{Shin2020SemisupervisedLW}, and we also use multi-teacher-single-student(MTSS) strategy but in a simpler way. The
process can be displayed as figure \ref{img/training}. The teacher model is a single-task model and student model is a multi-task model. We don't match the feature space but just use the single-task teacher model to predict the missing label. The multi-task student network shares the same structure of the teacher model but has several classification/regression heads to learn general features for all three expression recognition at the same time. And the process can also be showed as the following algorithm:
\begin{algorithm}
\caption{Teacher-student Training Strategy}
\label{alg:teacher}
\begin{algorithmic}
\STATE run preprocessing scripts for mixing AffWild2, ExpW and AffectNet datasets. The dataset $D_{mixed}$ is different for each task.
\FOR{data type $t \in \{VA,EXPR,AU\}$ }
\STATE train single teacher model $\phi_t$ for each task.
\STATE predict label $L_t$ for every image in AffWild2 dataset.
\ENDFOR
\STATE build unified AffWild2 dataset $D_{multi}$ from predicted labels $L_t , t \in \{VA,EXPR,AU\}$.
\STATE train student multi-task model $\phi_{multi}$ in $D_{multi}$.
\RETURN $\phi_{multi}$
\end{algorithmic}
\end{algorithm}
We limit the batch of each epoch to 25\% to avoid overfitting. As the AffWild2 dataset is combined with video frames, there are a lot of redundant labels for each task. The differences between frames are not obvious enough to provide more information to train the model. So we reduce the steps of each epoch to 25\% of the whole training set. That is to say in each epoch we randomly get 25\% samples of the training set. And that makes the training process more smooth and robust.
The model network is trained on an NVIDIA RTX2080 GPU. For a single-task model, the network is trained for 40 limited epochs and it cost 3 hours. And for the multi-task model, it cost 1 day for training 20 full epochs. We use
Adam optimizer\cite{Kingma2015AdamAM} at a learning rate of 1e-3. And the batch size is set to 128.
\section{Experiment}
We have done extensive experiments on the validation set of the AffWild2\cite{kollias2021analysing}\cite{kollias2019deep}\cite{kollias2019expression}\cite{kollias2019face}\cite{kollias2020analysing}\cite{kollias2021affect}\cite{kollias2021distribution}\cite{zafeiriou2017aff} . We have compared our model with typical classification models such as MobileNet\cite{Howard2017MobileNetsEC} and ResNet \cite{He2016DeepRL}. We use pretrained model of MobileNet and ResNet and FPN for both student model and teacher model. We also refer to the official baseline on the top, which is taken from the paper\cite{kollias2021analysing} .
We have also tested on different data settings. Firstly, we only train on the original dataset and then on our augmented dataset. At last, we use the teacher-student training strategy to train a multi-task model. The quantitative results can be found in table \ref{tab/result}.
\subsection{Metrics}
For evaluation, we follow the settings in the baseline paper \cite{kollias2021analysing}. The metrics are CCC, F1, and TAcc. The Concordance Correlation Coefficient(CCC) evaluates the agreement between two time series by scaling their correlation coefficient with their mean square difference. We use CCC to evaluate the prediction of the valence-arousal task. The CCC can be calculated as:
\begin{equation}
CCC = \frac{2s_{xy}}{s_x^2+s_y^2+(\overline{x}-\overline{y})^2}
\end{equation}
in which $s_{xy}$ is the covariance of prediction and ground truth and $s_x$ and $s_y$ are the separated variance.
The $F_1$ score is a weighted average of the recall (i.e., the ability of the classifier to find all the positive samples) and precision (i.e., the ability of the classifier not to label as positive a sample that is negative).$F_1$ score is used to evaluate the prediction of seven basic expression task.
\begin{equation}
F_1 = \frac{2\times precision \times recall}{precision + recall}
\end{equation}
And the average $F_1$ is denoted as $AF_1$, which means the average of all label predictions. And $AF_1$ is used to evaluate the task of action unit prediction.
Total accuracy (denoted as TAcc) is another metric for classification and it is defined on all test samples and is the fraction of predictions that the model got right. This is also used for expression and action unit tasks.
\begin{equation}
TAcc = \frac{Correct\ Predictions}{All\ Predictions}
\end{equation}
The three tasks scores are calculated as follows, and they are the weighted sum of above metrics.
\begin{align}
&S_{VA} = 0.5\times CCC_{V} + 0.5\times CCC_{A} \\
&S_{EXPR} = 0.67\times F_1 + 0.33\times TAcc \\
&S_{VA} = 0.5\times AF_1 + 0.5\times TAcc
\end{align}
\begin{figure}[!t]
\centering
\includegraphics[width=\columnwidth]{img/index.png}
\caption{Feature selection visualization of classification head. The layer 0 to 4 is extracted from our multitask FPN network and the features are layer0 are low level features while the features in layer4 are high level features. This figure show how these layers contribute to the classification.}
\label{fig:index}
\end{figure}
\subsection{Results}
From the table \ref{tab/result} we can see that data augmentation helps with almost every model. Firstly, we have done experiments on the bare AffWild2 dataset with our models. The result was mediocre. Then we supplemented the dataset with ExpW\cite{Zhang2017FromFE} and AffectNet\cite{Mollahosseini2019AffectNetAD} to make up for its lack of diversity. The data augmentation improved valence-arousal and expression prediction scores by approximately 10\%.
And we used the best single-task model to generate a unified AffWild2 dataset for multi-task training. We applied a teacher-student training strategy to train these models and all of them(Multi) are better than the single-task one(Single) in the bare AffWild2 dataset.
Compared to other models like MobileNet\cite{Howard2017MobileNetsEC} and ResNet \cite{He2016DeepRL}, our feature pyramid networks for multi-task affective analysis model outperforms by 2\% to 10\%. Though the improvement is not as significant as manipulating the data, it is still better than ResNet which has the same amount of parameters.
We also visualize the contribution of each layer to the classification in our multitask model as figure \ref{fig:index}. We sum all the absolute weight in the classification head connected to the specific layer and multiply it with the relative size of the input tensor. The figure shows that every task has a preference on feature selection, e.g. VA relies on layer1 and AU relies on the last two layers. Our backbone provides the hierarchical features and the classification head learns to choose critical features.
\section{Conclusion}
We propose a novel model using the feature pyramid network for multi-task affective analysis. The model exploits the hierarchical features in the backbone network and makes predictions for three different tasks. This model outperforms other classification models and the official baseline.
We also use a teacher-student training strategy to learn from missing labels in the dataset. It allows the model to learn from all three labels simultaneously. Without this strategy, multi-task learning won't take effect.
Though the model has an excellent result, the mechanism behind is not quite studied. The feature selection in the classification head is not clear and needs further researches. And this model is not robust for side faces and occluded faces. More facial prior should be added to have a full understanding of the human face.
{\small
\bibliographystyle{ieee_fullname}
|
\section{Introduction}
\label{sec:intro}
In 1994 I was a Ph.D. student at Flinders University in Adelaide, Australia. I was lucky enough to receive a Fellowship to travel to the US so I could present my research at the 14th International Conference on Few-body Problems in Physics. The meeting was in Williamsburg, VA, and included an excursion to Colonial Williamsburg and a tour of the soon-to-be-completed Continuous Electron Beam Accelerator Facility. I remember several plenary talks from that conference, but only one parallel-session talk---other than my own. A huge crowd gathered for the talk of some bloke who had just finished his Ph.D. at the University of Texas at Austin. His name was Bira van Kolck and he was discussing how to calculate the three-nucleon force from chiral perturbation theory~\cite{vanKolck:1994uv}.
Looking back, this was the time when three-nucleon forces came into focus. It had recently been shown that (local) NN potentials that reproduced NN data with a $\chi^2/{\rm d.o.f.} \approx 1$ fell short of the triton binding energy by 10\%~\cite{Friar:1993kk}. But it was not immediately clear how to extend the meson phenomenology employed to construct precise NN potentials to the 3N system---especially because ``purely meson theoretic" NN potentials couldn't achieve $\chi^2/{\rm d.o.f.} \approx 1$ to the NN database. The leading 3NFs of the time---Tucson-Melbourne~\cite{Ellis:1984jh}, Urbana-IX~\cite{Carlson:1983kq}---seemed, at least to a young Ph.D. student, a little {\it ad hoc} in their construction. van Kolck's talk caused excitement precisely because it fixed that. It explained why three-nucleon forces were a small, but important, component of the nuclear force. It showed how to construct them in a manner consistent with the NN force. And it pointed out the inevitable presence in the three-nucleon force of short-distance parameters that need to be fit to data. van Kolck's own contribution to this volume contains more of this story~\cite{vanKolck:2021rqu}.
The rest, as they say, is history. The approach championed by van Kolck was, of course, building on the papers of his Ph.D. advisor, Steven Weinberg, that this volume celebrates, It came to be known as ``Chiral Effective Field Theory" ($\chi$EFT) and has become the dominant paradigm in the construction of nuclear forces. Its ascendancy is
partly because of its ability to enforce the construction of consistent NN and 3N forces, and partly because it provides a hierarchy of mechanisms in the nuclear force. These benefits, together with the development of {\it ab initio} methods to tackle the quantum many-body problem have revolutionized approaches to nuclear structure. Jim Friar's closing talk at FB14~\cite{Friar:1994if} included a shout-out for Brian Pudliner's groundbreaking GFMC calulations of $A \leq 6$ systems~\cite{Pudliner:1995wk}. Today {\it ab initio} methods employ $\chi$EFT potentials to predict the properties of nuclei all the way up to Iron~\cite{Stroberg:2019bch} and in some cases even beyond~\cite{Jiang:2020the,Miyagi:2021pdc}.
Elsewhere in this volume others tell the history of that impressive progress better than I could~\cite{Drischler:2021kqh}. In this contribution I instead perversely focus on three aspects of Weinberg's seminal papers that either don't involve nuclear forces or don't really have much to do with Chiral Lagrangians. In Section~\ref{sec:probes} I describe how I came to believe that the Weinberg-van Kolck approach would be tremendously useful for electromagnetic and pionic reactions on few-nucleon systems. Such calculations provided early demonstrations that the approach worked for reactions in which it had no free parameters and so was more than ``just fitting"~\cite{Phillips:1999am,Park:1998cu}. In Section~\ref{sec:whyiterate} I return to Weinberg's original papers to amplify a concern he expressed there: why should we iterate the NN potential, i.e., solve a Schr\"odinger equation containing the NN potential derived in $\chi$EFT? I argue that the original sin of the Nuclear Forces from Chiral Lagrangians program was a failure to properly work through this issue: ``compute the potential and just stick it in the Schr\"odinger equation" was, and perhaps remains, the attitude of much of the community. So I review what Weinberg's argument in favor of iteration does and does not establish, and briefly summarize subsequent attempts to justify iteration of the NN potential. This brings me to my third topic, which is a ``toy model" that Weinberg used to explicate some features of what happens when one solves the Schr\"odinger equation with a singular potential. This toy model became ``pionless EFT": a huge contribution to the field of few-body physics. Work on the three-body problem in pionless EFT stimulated tremendous interest in Efimov physics and systems near
unitarity~\cite{Bedaque:1998kg,Bedaque:1999ve,Braaten:2004rn,Hammer:2010kp}. It is also the basis for the ``Halo EFT" that permits rigorous examination of several systems near the driplines~\cite{Hammer:2017tjm}. Pionless EFT has nothing to do with chiral symmetry, but it remains the only EFT for nuclear physics in which renormalization has been completely and carefully carried out in the two-, three-, and four-nucleon systems. As such it presents a path through some of the issues that have bedeviled the program to systematically obtain Nuclear Forces from Chiral Lagrangians. I conclude with some comments about what makes $\chi$EFT (and pionless EFT) better approaches to few-nucleon systems than the ones that were in use pre-Weinberg.
I want to be clear that this paper contains no new research, and probably nothing I haven't said before somewhere. But I am grateful to the Editors of this Volume for giving me a chance to reflect on the intellectual influence of Weinberg's papers, to reminisce about my own small part in this story, and to articulate what I see as some of the unfinished business of Weinberg's work.
\section{Electromagnetic and pionic reactions on deuterium}
\label{sec:probes}
My favorite ``$\chi$PT for nuclear physics" paper by Weinberg is not thirty until next year. It's ``Three-body interactions among nucleons and pions", the oft-overlooked third of the trio of nuclear-physics-transformational papers he wrote between 1990 and 1992~\cite{Weinberg:1990,Weinberg:1991,Weinberg:1992}. This paper has ``only" 497 citations on INSPIRE as I write this sentence (compared to the massive 1,370 and 1,302 citations for the two ``Nuclear forces from chiral Lagrangians" papers). In Ref.~\cite{Weinberg:1992} Weinberg does two very interesting things. First, he establishes that the nominally leading (these days we would say ``NLO" or $\mathcal{O}(Q^2)$)~\footnote{Throughout I denote the $\chi$EFT expansion parameter by $Q$, and intend it to be the standard $Q \equiv \frac{(p,m_\pi)}{\Lambda_b}$ where $\Lambda_b$ is the $\chi$EFT breakdown scale, assumed to be of order $m_\rho$.} contribution to the $\chi$PT three-nucleon force vanishes, something that was worked out in more detail by van Kolck in Ref.~\cite{vanKolck:1994yi}. But Weinberg then decides that this makes pion-nucleon-nucleon interactions more interesting. So he calculates the leading $\chi$PT diagrams for those and uses them to obtain a prediction for the pion-deuteron scattering length.
It was probably partly that pion-deuteron scattering was my Ph.D. project, but this paper made a big impression on me. It helped that $\chi$EFT works remarkably well for the pion-deuteron scattering length. Compared to the complicated formalism I was using to try and analyze the problem~\cite{Phillips:1995da,Phillips:1996ed} the simplicity and efficacy of the $\chi$PT approach was a revelation. Weinberg's prediction was $-0.05$ $m_\pi^{-1}$, which is certainly consistent with the experimental number (at the time) of $-0.056 \pm 0.009$ $m_\pi^{-1}$.
The success turns out to be a bit of a cheat, because it's driven by the large contribution from the second-order term in the multiple-scattering series, which gives almost the full answer~\cite{EricsonWeise}. But for me the striking thing was that $\chi$PT provides a systematic approach to the pion-deuteron scattering length. Writing
\begin{equation}
a_{\pi d}=\langle \psi_d|t_{\pi N} + t_{\pi NN}|\psi_d \rangle.
\label{eq:3B}
\end{equation}
and computing the $\chi$PT order of the two-body ($t_{\pi N}$) and three-body ($t_{\pi NN}$) pieces of the result, provides an organized expansion for $a_{\pi d}$.
In particular Eq.~(\ref{eq:3B}) is a controlled way to calculate the ``nuclear" corrections to the first term, whose matrix element evaluates to the isoscalar pion-nucleon scattering length, i.e., $\chi$EFT provides an improvable approach to $t_{\pi NN}$.
When I visited Seattle in 1996 Bira van Kolck and I spent some time trying to work out how to extend the $\pi$d scattering calculation above threshold. In the end, we didn't pursue that avenue. But I ended up in a collaboration that computed next-order corrections to Weinberg's calculation, facilitating tests of $\chi$PT results for the isoscalar pion-nucleon scattering length~\cite{Beane:2002wk}. It turns out that there are several wrinkles to power counting for this process~\cite{Baru:2010xn,Baru:2011bw,Baru:2012iv}, but what Ref.~\cite{Weinberg:1992} did---at least for me---was make it clear that EFT arguments can organize processes on deuterium---and by extension processes on other light nuclei.
Then there is Compton scattering from deuterium. Because it involves two photons the model calculations of it that had been done by the mid-90s were quite complicated~\cite{Weyrauch:1983zft,Levchuk:1999zy}. Weinberg's ``Three-body interactions" paper provided a way out of the thicket . Once again we write:
\begin{equation}
T_{\pi d}=\langle \psi_d|t_{\gamma N} + t_{\gamma NN}|\psi_d \rangle,
\label{eq:Compton}
\end{equation}
where $t_{\gamma NN}$ includes mechanisms in which the photon interacts with two nucleons. Moreover, the presence of a momentum conserving delta function on the spectator nucleon, i.e., the fact that $t_{\gamma N}$ is really $t_{\gamma N} \otimes \mathbb{I}$ when embedded in the $\gamma NN$ Hilbert space, means that $t_{\gamma N}$ dominates over $t_{\gamma NN}$. This observation, made in Ref.~\cite{Friar:1996zw}, specifies the size of corrections to an impulse approximation (i.e. single-nucleon interactions only) treatment of reactions with external probes.
In $\gamma$d scattering those corrections due to $t_{\gamma NN}$ come at next-to-leading order in the $\chi$EFT expansion. There are nine diagrams that enter $t_{\gamma NN}$ at that order (the five in the upper row of Fig.~\ref{fig:Compton} plus diagrams with initial- and final-state photons interchanged). They are the two-nucleon analogs of the diagrams that generate the dominant contributions to the dipole electric and magnetic polarizabilities of the nucleon~\cite{Beane:1999uq}. But organizing the problem according to Eq.~(\ref{eq:Compton}) only makes sense if the diagram is irreducible in the Weinbergian sense. In my Ph.D. I had learnt a topographical notion of irreducibility~\cite{Phillips:1993gg}. I had to unlearn it when I started working on $\gamma$d scattering and realize that for Weinberg the diagrams is irreducible if it has no low-energy NN state in it. Because my collaborators and I only considered a $t_{\gamma NN}$ that was irreducible in this sense the calculations of $\gamma$d scattering we produced in between 1999 and 2005~\cite{Beane:1999uq,Beane:2004ra,Hildebrandt:2004hh} are only valid for photon energies that put the intermediate NN-state far enough off shell that the standard $\chi$PT counting rules apply to the diagrams in $t_{\gamma NN}$, i.e., they are valid for $\omega \sim m_\pi$. As the photon energy goes to zero---or more precisely as it becomes of order $m_\pi^2/M_N$---diagrams such as those in the lower row of Fig.~\ref{fig:Compton} become reducible and one must face the vexed question of how to organize them in the EFT~\cite{Griesshammer:2012we}. Weinberg's answer to that question is the subject of the next section.
\begin{figure}[h]
\centering
\includegraphics[width=0.7\linewidth]{LODeuteronCompton.png}\\
\includegraphics[width=0.7\linewidth]{DeuteronNLOCompton.png}
\caption{Diagrams that contribute to $\gamma$d scattering at next-to-leading order (top row) and next-to-next-to-leading order (bottom row) in $\chi$EFT. The shaded semi-circles are deuteron wave functions. The red horizontal lines represent nucleon propagators whose power counting changes depending on whether they carry photon energy $\omega$ of order $m_\pi$ or of order $m_\pi^2/M_N$. Figure adapted from Ref.~\cite{Griesshammer:2012we}.}
\label{fig:Compton}
\end{figure}
\section{Why iterate?}
\label{sec:whyiterate}
The leading-order (LO) NN potential in $\chi$PT is an operator whose naive chiral order is $Q^0$:
\begin{eqnarray}
\langle {\bf p}'|V^{(0)}|{\bf p} \rangle&=&C^{{}^3{\rm S}_1} P_{{}^3S_1} + C^{{}^1S_0} P_{{}^1S_0} + V_{1 \pi}({\bf p}'-{\bf p}); \label{eq:V0}\\
V_{1 \pi}({\bf q})&=&-\tau_1^a \tau_2^a \frac{g_A^2}{4 f_\pi^2}\frac{\sigma_1 \cdot {\bf q} \sigma_2 \cdot {\bf q}}{{\bf q}^2 + m_\pi^2}. \label{eq:VOPE}
\end{eqnarray}
Here $V_{1 \pi}$ is the one-pion-exchange potential, $P_a$ is a projector onto the NN partial wave $a$, and $C^a$ is a low-energy constant (LEC) appearing in the NN chiral Lagrangian. This justifies the dominance of one-pion exchange in nuclear forces; it also predicts the presence of short-distance operators---although only in S-waves.
Weinberg's papers~\cite{Weinberg:1990,Weinberg:1991} organize $V$ so that the order of corrections to $V^{(0)}$ is determined by naive dimensional analysis (NDA) with respect
to the light scales $(p,m_\pi)$. The leading correction is then $\mathcal{O}(Q^2)$, and at that order a number of short-distance operators $\propto {\bf p}^2$ enter, together with several two-pion-exchange diagrams. This counting for $V$ and the progress it has enabled are discussed in other papers in this volume~\cite{Machleidt:2021ggx} as well as in reviews such as Ref.~\cite{Epelbaum:2019kcf}. The use of NDA to organize contributions to the NN potential is not controversial
for momenta of order $m_\pi$. Once the particle content of the theory is fixed the relative size of the various two-pion, three-pion, etc. mechanisms is dictated by the $\chi$PT power counting. This gives us control over the long-distance ($r \sim 1/m_\pi$) pieces of the potential.
But the counting of the short-distance (contact) pieces of $V$ is controversial. It is tied to the unresolved question of whether
the resulting potential should be used as a ``typical NN potential", i.e., inserted into the Schr\"odinger equation and used to solve for the NN wave function. Such a solution is equivalent to iterating the potential to all orders, i.e., summing the Born series generated by $V$. But, at a formal level, there is no immediate reason to think the Born series needs to be summed.
In the single-nucleon and meson sectors $\chi$PT works because pion-nucleon and pion-pion interactions are weak at low energies: that's why they can be treated in a perturbative expansion. And indeed naive analysis of powers of momenta tells us that the nuclear potential begins at $\mathcal{O}(Q^0)$, while the (one-body) kinetic-energy operator, $K$, is $\mathcal{O}(Q^{-1})$, and so suggests the nuclear force is perturbative, since $V < K$.
But if we lived in a universe where nuclear interactions were perturbative then there would be no nuclei, no nuclear physics, and no nuclear physicists who spend twenty-five years arguing about whether $\chi$EFT potentials should be iterated or not.
Weinberg justified the insertion of the potential (\ref{eq:V0}) in the Schr\"odinger equation by noting that diagrams with a low-energy NN state, such as Fig.~\ref{fig:iterate}, produce a singularity if they are treated using the standard heavy-baryon $\chi$PT propagator. If we take the propagator for a single nucleon of energy $p_0$ to be $i/p_0$ then the propagator for an NN state of energy $E$ is $i/E$, and as $E \rightarrow 0$ this blows up. The solution to the problem of this $1/E$ singularity was articulated in the context of non-relativistic QED in the 1980s~\cite{Caswell:1985ui}: if $p_0 \rightarrow 0$ then the standard heavy-baryon approximation that $p_0 \gg \frac{{\bf p}^2}{2 M_N}$ no longer applies, and the single-nucleon propagator becomes $\frac{i}{p_0 - {\bf p}^2/(2 M_N)}$. Doing the integral over the relative energy of the two nucleons yields a two-nucleon propagator that is the standard non-relativistic Schr\"odinger equation Green's function, i.e.,
\begin{equation}
\langle {\bf p}'|G_0(E)|{\bf p} \rangle=\frac{i}{E^+ - \frac{{\bf p}^2}{M_N}} \delta^{(3)}(p-p').
\label{eq:propagator}
\end{equation}
The ``pinch singularity" that Weinberg used to justify iteration is thus ameliorated by the nucleon kinetic energies: reducible diagrams---diagrams with low-energy NN intermediate states---do not actually diverge.
\begin{figure}[h]
\begin{center}
\includegraphics[width=0.6\linewidth]{OPEiterate.png}
\end{center}
\caption{A reducible diagram, involving iteration of the one-pion-exchange potential, see Eq.~(\ref{eq:Titerate}). External lines are labeled with the three-momentum that they carry.}
\label{fig:iterate}
\end{figure}
They are enhanced though: for $E \sim m_\pi^2/M_N$ and $|{\bf p}| \sim m_\pi$ the propagator (\ref{eq:propagator}) is of order $M_N/m_\pi^2$, and so is markedly larger than the typical HB$\chi$PT propagator $i/q_0$ that we take to be $\sim 1/m_\pi$. But the kinematic situation is also different: in a single-nucleon HB$\chi$PT diagram the heavy particle is usually off shell by an amount of order $m_\pi$, but here we are dealing with nearly-on-shell nucleons.
Inserting the propagators for non-relativistic nucleons and doing the integral over the NN relative energy converts the diagram in Fig.~\ref{fig:iterate} to the expression
\begin{equation}
-i \langle {\bf p}'|T_{\rm iterate}(E)|{\bf p} \rangle=\int \frac{d^3 p''}{(2 \pi)^3} (-i) V_{1 \pi}({\bf p}''-{\bf p}') \frac{i}{E^+ - \frac{{{\bf p}''}^2}{M_N}} (-i) V_{1 \pi}({\bf p}''-{\bf p}),
\label{eq:Titerate}
\end{equation}
where $V_{1 \pi}$ is the one-pion-exchange potential of Eq.~(\ref{eq:VOPE}).
Assuming that we are dealing with energies of order $m_\pi^2/M_N$ we expect that the integral will be dominated by momenta of order $m_\pi$. The (naive) chiral order of the diagram is then $Q^3 \times Q^0 \times M_N/Q^2 \times Q^0$. Keeping factors of $\pi$ we find $T_{\rm iterate} \sim \frac{M_N}{4 \pi} Q$, with the dimensions are made up by the factors of $1/f_\pi^2$ in $V_{1 \pi}$. The nominal order of $T_{\rm iterate}$ is thus $Q^1$, while that of $V_{OPE}$ is $Q^0$. So, once again, we are faced with the dilemma that $\chi$PT implies that nuclear reactions should be able to be computed in perturbation theory---a prediction that is in clear contradiction with reality. $V^{(0)}$ is called ``the strong force" for a reason, after all.
Weinberg's route out of the dilemma, which has also been adopted by Epelbaum and collaborators (see, e.g., Ref.~\cite{Epelbaum:2004fk}), is to count $M_N \sim \Lambda_b/Q$, i.e., say that the scale $M_N$ is larger than the natural breakdown scale of $\chi$PT and so iterates of one-pion exchange---or any other nuclear potential---have additional enhancements which make them as big as their Born-approximation counterparts. I have always found this to be rather unsatisfactory. $M_N$ falls nicely in between $m_\rho$ and $4 \pi f_\pi$, so the scale assignment $M_N \sim \Lambda_b$ employed in the single-baryon sector seems reasonable. Indeed, taking $Q \approx m_\pi/\Lambda_b$ Weinberg's scaling would seem to require an $M_N$ of order a few GeV. In the single-nucleon sector taking $M_N \sim \Lambda_b$ is not only numerologically satisfying but seems to provide phenomenological success. Changing the assignment to make $M_N$ larger by a factor of $1/Q$ means that all $\chi$PT amplitudes computed in the single-nucleon sector should, in principle, be re-organized before being employed in a few-nucleon calculation. Over the last five years the Bochum group has been carrying out this reorganization, thereby restoring the original $\chi$EFT promise of a consistent treatment of chiral single-nucleon and multi-nucleon amplitudes~\cite{Siemens:2016jwj,Filin:2020tcs}. But this leaves me wondering what the counting of $M_N$ for amplitudes in the single-baryon sector really should be. Reassigning the counting of the nucleon mass to justify iteration says that inside nuclei the nucleon kinetic energy---indeed any nucleon motion---is smaller than anticipated: the reassignment pushes the kinetic-energy operator $K$ to higher order in the $\chi$EFT expansion. What if there's a different---and better---reason to iterate; one that involves acknowledging $V$ is larger than naive chiral counting suggests?
In 1998 Kaplan, Savage, and Wise took the argument that iterates of one-pion exchange are smaller than $V_{OPE}$ itself to its logical and ostensibly absurd conclusion~\cite{Kaplan:1998tg,Kaplan:1998we}. They attempted a formulation of nuclear physics in which one-pion exchange was perturbative. In particular, they identified a scale
\begin{equation}
\Lambda_{NN} \equiv \frac{16 \pi f_\pi^2}{g_A^2 M_N} \approx 300~{\rm MeV}
\end{equation}
below which one-pion exchange can be treated in perturbation theory and above which it must be iterated. This analysis was later confirmed by Birse, using renormalization-group methods~\cite{Birse:2005um}. Qualitatively $\Lambda_{NN}$ is the momentum at which one-pion exchange becomes strong. It's important to note that $\Lambda_{NN}$ varies only weakly with quark mass, so one can't force it to low or high values by considering the chiral limit when $m_q \rightarrow 0$. Instead, it's numerical value is a result of the interplay of certain hadronic matrix elements.
In certain hadronic molecules where one-pion exchange is also present the corresponding hadron matrix elements are small enough that $\Lambda_{NN}$ is a high scale and one-pion exchange is perturbative~\cite{Fleming:2007rp,Valderrama:2012jv}.
But in the NN system $\Lambda_{NN}$ presents a finite scale that's well below $\Lambda_b$ even when one considers the chiral limit.
Indeed Long and Yang have pointed out that numerical pre-factors can render $\Lambda_{NN}$ lower in some channels, e.g., in the ${}^3$P$_0$ channel of NN scattering it is of order 150 MeV, i.e., $\Lambda_{NN} \sim m_\pi$~\cite{Long:2011qx}. This means that, at least there, one-pion exchange should be iterated already for momenta of order $m_\pi$. And one could argue that $\Lambda_{NN}$ is close enough to $m_\pi$ even in the ${}^3$S$_1$-${}^3$D$_1$ channel that iteration is justified.
To incorporate the fact that pion-exchange is a strong force we identify $\Lambda_{NN}$ as a low scale in the EFT. $V_{OPE}$ then formally becomes $\mathcal{O}(Q^{-1})$. Now we are relying on a scale hierarchy
\begin{equation}
m_\pi \sim p \mathrel{\rlap{\lower4pt\hbox{\hskip1pt$\sim$} \Lambda_{NN} \ll \Lambda_\chi \mathrel{\rlap{\lower4pt\hbox{\hskip1pt$\sim$} M_N.
\label{eq:hierarchy}
\end{equation}
For summaries of the consequences of this for the organization of the NN potential see Refs.~\cite{Birse:2009my,Phillips:2013fia}.
Equation~(\ref{eq:hierarchy}) is quite a few scales, and that's before we discuss the need to integrate out ``radiation pions" that are associated with the scale $\sqrt{M_N m_\pi}$~\cite{Fleming:1999ee,Mondejar:2006yu}. Not to mention the fact that two low-lying hadronic resonances, the $\sigma$ and the $\Delta$, also play a significant role in the NN force.
I think we probably live in an unfortunate~\footnote{Or maybe fortunate? If the NN force was not this complicated perhaps we wouldn't be here?} universe where these scales are really too close together for there to be a straightforward EFT that can be constructed for nuclear forces. There's a reason the nuclear-force problem occupied so many person-hours between 1932~\cite{Bethe:1953}, when Chadwick discovered the neutron, and 1990, when Weinberg wrote Ref.~\cite{Weinberg:1990}. Weinberg's simplification of that problem launched $\chi$EFT and revolutionized the study of nuclear forces, but it did so partly by eliding the many scales that play a role in nuclear forces and making the problem as simple as it would be if we lived in a world where $m_\pi$ and $\Lambda_{NN}$ were much smaller than all other relevant momentum scales.
\section{Weinberg's toy model begets a cross-sub-field research program}
\label{sec:pionless}
All of us who have sat down and numerically solved a regulated version of the Schr\"odinger equation with the potential given by Eq.~(\ref{eq:V0}) know that the value obtained for the low-energy constants $C_{{}^3S_1}$ and $C_{{}^1S_0}$ depends on the scale of regularization and the renormalization scheme adopted, see Refs.~\cite{Phillips:1999am,Beane:2001bc,PavonValderrama:2004nb,PavonValderrama:2005gu,Yang:2007hb} for explicit examples. The renormalization group describes the evolution of these LECs as the renormalization scale, $\mu$ is changed~\cite{Birse:2005um}. Suppose, then, that we evolve the renormalization scale down to a value $\mu \mathrel{\rlap{\lower4pt\hbox{\hskip1pt$\sim$} m_\pi$. At this resolution scale pions are integrated out of the theory; all the physics of s-wave NN interactions resides in the two contact interactions~\footnote{Contact interactions in higher partial waves are also induced~\cite{Nogga:2005hy,Eiras:2001hu}.}. At resolution scales $\mu < m_\pi$ the Lagrangian has little to do with chiral symmetry, since the connection to the $m_q \rightarrow 0$ limit is lost for values of $\mu$ this low. With one-pion exchange integrated out what we have left is the leading-order Lagrangian of ``pionless EFT".
That Lagrangian, which includes only the two contact interactions present in Eq.~(\ref{eq:V0}), was written down by Weinberg in his seminal papers. The NN contact interactions are of chiral order 0, which makes an interesting contrast with pion-nucleon interactions. The pseudo-Nambu-Goldstone boson nature of the pion means that pion-nucleon interactions always involve a power of the pion momentum or the quark mass. All pion interactions have a chiral order of at least 1. Nucleon-nucleon interactions are not protected by chiral symmetry in this way: the NN amplitude has no Adler zeros. Chiral symmetry predicts that NN interactions are stronger then $\pi$N or $\pi \pi$ interactions.
But, as already discussed, an interaction of chiral order 0 is not enough to justify iteration. In the case of contact interactions the argument is even more straightforward than the one given in the previous section. Let's consider an RG scale $\mu$ of order $m_\pi$. If $C$ is natural with respect to $\mu$ and $m_\pi$, we have:
\begin{equation}
C \sim \frac{4 \pi}{M_N m_\pi},
\end{equation}
where the factor of $M_N$ in the denominator is a generic feature of LEC scalings in non-relativistic EFTs~\cite{Luke:1996hj}. Meanwhile, computing the diagram in Fig.~\ref{fig:bubble} yields
\begin{equation}
T_{\rm iterate~contact}(E)=C^2 \int d^3 p \frac{1}{E^+ - \frac{p^2}{M}}.
\label{eq:iteratecontact1}
\end{equation}
The integral is linearly divergent. If evaluated using dimensional regularization and minimal subtraction (DR + MS) one obtains a finite result~\cite{Kaplan:1996xu}:
\begin{equation}
T_{\rm iterate~contact}(E)=-C^2 \frac{i M k}{4 \pi} \Rightarrow |T_{\rm iterate~contact}| \sim C \frac{k}{m_\pi}
\label{eq:iteratecontact}
\end{equation}
where $k=\sqrt{M E}$. This evaluation obscures the presence of the divergence, since the use of DR + MS assumes that all power-law divergences are renormalized by the LECs present at that order and does not keep track of them. What DR + MS makes clear is that the (renormalized) one-loop diagram will be suppressed compared to $C$ itself for momenta $k < m_\pi$, i.e., the momenta for which the EFT is valid.
\begin{figure}[h]
\begin{center}
\includegraphics[width=0.5\linewidth]{bubble.png}
\end{center}
\caption{The diagram in which a NN contact interaction is iterated, see expression (\ref{eq:iteratecontact1}).}
\label{fig:bubble}
\end{figure}
Weinberg did two very smart things in Ref.~\cite{Weinberg:1991}. One was to iterate first and worry about what justifies iteration afterwards. He realized that loop graphs involving the contact interaction form a geometric series. If we continue to use DR + MS to evaluate them, then the NN amplitude obtained after summing the series is:
\begin{equation}
\langle {\bf p}|T(E)|{\bf p}' \rangle=\left(\frac{1}{C} + \frac{i M k}{4 \pi}\right)^{-1}.
\end{equation}
The corresponding $S$-matrix is unitary. By matching to the leading-order effective-range expansion we obtain the renormalization condition for $C$:
\begin{equation}
C_{\rm DR + MS}=\frac{4 \pi a}{M}
\label{eq:CorCR}
\end{equation}
where $a$ is the NN scattering length. This brings me to the second smart thing Weinberg did. Or, more correctly, to something he did {\it not} do. He did {\it not} use DR + MS to evaluate the integral. Instead he only computed the ``renormalized" value of $C$, $C_R$, i.e., the value one gets after absorbing into $1/C$ the divergent part of the integral in Eq.~(\ref{eq:iteratecontact1})~\footnote{I thank Jambul Gegelia for correcting my initial text on this point.}. Because that linear divergence is zero in DR + MS $C_{\rm DR + MS}=C_R$.
Regardless of whether Eq.~(\ref{eq:CorCR}) is for $C_R$ or $C$ the value on the right-hand side is not natural, since the NN scattering lengths of 5.4 fm in the ${}^3$S$_1$ channel and $-23$ fm in the ${}^1$S$_0$ channel are markedly larger than $1/m_\pi$. Indeed, $C \rightarrow \infty$ as $\frac{1}{a} \rightarrow 0$, i.e., as we approach the unitarity limit where $T \sim 1/p$ and no length scales are left in the problem. The fact that $C$ is directly related to an unnaturally large physical scale when DR + MS is employed leads immediately to difficulties organizing higher-order terms in the EFT expansion~\cite{Kaplan:1996xu,Phillips:1997xu}. Weinberg knew to quit when he was ahead; he never did explain how to extend his scheme for computing the NN amplitude with contact interactions to the case of contact interactions with derivatives.
The pathway out of this difficulty was worked out in the late '90s, some 5-10 years after Weinberg's initial papers. Two-body systems with large scattering lengths correspond to bound states (or anti-bound states) with shallow binding. In this case the kinetic energy $p^2/M$ and the potential energy can both be sizable, but they cancel almost completely to yield an overall energy of the quantum state that is close to zero. Minimal Subtraction obliterates this fine tuning between kinetic and potential energy since the integral that corresponds to the effects of the (virtual) kinetic energy of particles inside the quantum potential has its real part set to zero. If a cutoff regulator is used to compute the integral in Eq.~(\ref{eq:iteratecontact}) the fine tuning is preserved~\cite{Cohen:1996my}. But power counting at the level of the potential/Lagrangian is then unclear~\cite{Beane:1997pk}.
Kaplan, Savage, and Wise's elegant Power-law Divergence Subtraction (PDS) scheme builds in the cancellation of kinetic and potential energy but emphasizes their scheme-dependence and non-observability, since both become dependent on the PDS scale $\mu$~\cite{Kaplan:1998tg,Kaplan:1998we}. In PDS
\begin{equation}
T_{\rm iterate~contact}(E)=-C^2 \frac{M}{4 \pi} (\mu + i k),
\end{equation}
and
\begin{equation}
C=\frac{4 \pi}{M}\left(\frac{1}{a} - \mu\right)^{-1}.
\label{eq:CPDS}
\end{equation}
Power counting at the level of the LECs can now be accomplished, provided $\mu$ is chosen to be of order $k$. In that case $C_2(\mu) p^2$ is smaller than $C(\mu)$ by an amount $\sim k/m_\pi$.
In fact, Eq.~(\ref{eq:CPDS}) is anticipated in Eq.~(23) of Ref.~\cite{Weinberg:1991}, where Weinberg discusses choosing a renormalization point corresponding to $E=-\mu^2/M_N$, Such use of ``subtractive renormalization'' for NN EFT was then championed by Gegelia in Ref.~\cite{Gegelia:1998gn} and several subsequent works.
Weinberg did point out that (his version of) Eq.~(\ref{eq:CPDS}) and the large values of $a$ in the NN problem imply that the NN system is close to an infra-red fixed point. PDS ``works" because it organizes the EFT as an expansion around that fixed point~\cite{vanKolck:1998bw,Birse:1998dk}. Denoting $R \sim 1/m_\pi$ as the range of the nuclear force the NN amplitude $T$ is simultaneously expanded in $k R$ and $R/a$. That is particularly clear in PDS, but, in fact, $T$ can be expanded in these two small parameters without the need to choose any particular subtraction scheme~\cite{vanKolck:1998bw,Birse:1998dk}. Provided all counterterms needed for renormalization at a particular order in the expansion are present any subtraction scheme gives the same answer for $T$ up to that order~\cite{vanKolck:1998bw}. All subtraction schemes give the same physical amplitude. But some subtraction schemes give more physical amplitudes than others.
These efforts of the late 1990s to consistently formulate pionless EFT produced a theory whose renormalization and convergence pattern are very well understood. Computations to high-order in the NN system followed rapidly~\cite{Chen:1999tn,Rupak:1999rk,Butler:2001jj}. A lasting consequence of this effort was the realization that the contact interaction $C$ has to be enhanced over its naive chiral order of 0 in order to justify iteration. If $1/a$ is a light scale and $\mu \sim k$ is also a light scale then the $C$ of Eq.~(\ref{eq:CPDS}) is $\mathcal{O}(Q^{-1})$. Together with the counting of loops as $\mathcal{O}(Q)$ this justifies iteration of the potential. Considering $\Lambda_{NN}$ as a light scale can be similarly regarded as promoting one-pion exchange to $\mathcal{O}(Q^{-1})$~\cite{Birse:2005um}.
Because pionless EFT is not specific to nuclear physics it can, in fact, be used to compute any quantum few-body problem with large scattering lengths, e.g., ${}^4$He dimers, trimers, and tetramers.. Of course, calling it ``pionless EFT" is a bit odd in such a circumstance: perhaps ``Short-Range EFT" (SREFT) is better, since ultimately the EFT is based on the scale hierarchy $R \ll |a|$, i.e., it's built for systems where the two-body scattering length is large compared to the range of the inter-particle potential, $R$.
When the SREFT Lagrangian was applied to the three-nucleon system it was found that a three-body force was required at leading order in the EFT in order to prevent the three-nucleon system collapsing (``Thomas collapse")~\cite{Bedaque:1998kg,Bedaque:1999ve}. This seems to destroy a selling point of chiral EFT, that three-body forces are suppressed compared to two-body forces, and it took some people, myself included, a while to get used to the idea of leading-order three-body forces. But from a renormalization-group perspective it is not shocking that the size of three-body forces depends on the resolution scale. In systems where $|a| \gg R$ they become a leading-order effect for $\mu \mathrel{\rlap{\lower4pt\hbox{\hskip1pt$\sim$} 1/R$.
The presence of a three-body force at leading order is related to pionless EFT's realization of famous few-body phenomena such as the Efimov effect~\cite{Efimov:1971zz} and the Phillips line~\cite{Phillips:1968zze}. The latter is a correlation between the doublet nd scattering length and the triton binding energy. It had been observed in three-body calculations with different NN potentials~\cite{Phillips:1968zze,Thomas:1975qfg}. Bedaque, Hammer, and van Kolck showed that this correlation is a straightforward consequence of the need for a three-body force at leading order in pionless EFT. Later work established that the Tjon line---the correlation between three- and four-body binding energies---can also be understood in this way~\cite{Platter:2004zs}. This shows that these famous few-nucleon correlations have nothing to do with QCD. They don't even stem from the one-pion-exchange piece of the nuclear force. Instead, they are driven solely by the proximity of the NN system to the unitarity limit in which $|a| \rightarrow \infty$. And the systematic character of pionless EFT means that we can predict the order at which the correlation will be broken: $\mathcal{O}(R^2/a^2)$ for the Phillips line~\cite{Bedaque:2002yg,Ji:2012nj} and $\mathcal{O}(R/a)$ for the Tjon line~\cite{Bazak:2018qnu}.
These insights opened up new connections between nuclear physics and other quantum few-body problems.
SREFT was very profitably applied to cold atomic gases near a Feshbach resonance, where it facilitated the diagnosis of the Efimov effect in systems of ${}^{133}$Cs atoms. In Ref.~\cite{Kraemer:2006} the location of a loss feature as a function of two-body scattering length was predicted based on a universal correlation derived in SREFT~\cite{Bedaque:2000ft,Braaten:2004rn}. Subsequently Hammer and Platter predicted that, in the unitarity limit, each Efimov trimer is associated with two Efimov tetramers, and they predicted the binding energies of those tetramers based on a SREFT calculation~\cite{Hammer:2006ct}. This prediction was confirmed in subsequent experiments in Innsbruck~\cite{Ferlaino:2009zz}.
Two-body bound states in which $R \ll |a|$ only exist because of quantum tunneling, since the particles spend much of their time outside the potential, i.e., beyond the classical regime. This is an alternative way to understand the regime in which SREFT is applicable: it's the EFT of states for which tunneling is essential to their existence. Particles spend most of their time outside the potential, so its details don't affect them very much. Halo nuclei, in which one or more neutrons or protons have a significant fraction of their wave function outside the mean-field potential generated by the bulk of the nucleons in the nucleus, are an example of this phenomenon. SREFT has found rich applications in those systems~\cite{Hammer:2017tjm}, where it has revealed several universal correlations between observables. The search is on for more of these universal correlations and for manifestations of the Efimov effect in the nuclear context. Further discussion of Halo EFT can be found in the contribution of Capel to this volume~\cite{Capel:2021ejr}.
\section{Weinberg's nuclear-physics legacies: universality, chiral forces, error bars, and a more virtuous explanation of few-nucleon physics}
I find it amusing that a calculation in the second of Weinberg's papers that seems to be there mainly as an example of how to solve the Schr\"odinger equation with a singular potential generated such research activity. It's a great example of the law of unintended consequences of research. That particular (and unintended?) legacy of Weinberg's work ultimately has had wider applicability across few-body physics than the chiral Lagrangians he wrote down and organized to understand the nuclear force.
But that work on chiral Lagrangians launched literally a 1000 subsequent investigations. For most nuclear physicists the legacy of the papers this volume celebrates is that they transformed the way nuclear potentials were computed. In tandem with advances in scientific computing power and the development of powerful new many-body techniques nuclear potentials derived in $\chi$EFT revolutionized the study of nuclear structure. As a result we are now in the situation where {\it ab initio} calculations with potentials that are the descendants of the ones Weinberg wrote down are carried out for a wide variety of nuclei and a number of different processes. Nuclear forces derived from chiral Lagrangians provide a good description of a tremendous amount of three-nucleon data~\cite{Kalantar-Nayestanaki:2011rzs,Epelbaum:2019zqc}, reproduce properties of nuclei containing more than 100 nucleons~\cite{Jiang:2020the,Miyagi:2021pdc}, and---when combined with consistently calculated currents---describe electroweak observables in light nuclei with high precision~\cite{Filin:2020tcs,Phillips:2016mov,Ekstrom:2014iya,King:2020pza,Baroni:2021vrc}
But why did the Weinberg way win? After all, the {\it ab initio} calculations I mentioned in the previous paragraph could be (and sometimes are) carried out with with the non-$\chi$EFT AV18~\cite{Wiringa:1994wb} or CD-Bonn potentials~\cite{Machleidt:2000ge}---or with suitably evolved and softened versions thereof~\cite{Bogner:2003wn,Bogner:2006pc}. Perhaps the biggest influence of Weinberg's papers on nuclear physics is that they became part of a change in the philosophy of nuclear theorists. Many of us were discontented with calculations whose sole justification was "Well, that's what my model says''. $\chi$EFT gave us a better way to calculate.
In $\chi$EFT you don't guess the mechanisms you think will be important, you organize them according to power counting in $Q$. This makes $\chi$EFT predictive in a way that few-nucleon calculations before 1990 were not. Prediction in those models sometimes worked, if it was done with models that were carefully calibrated to the relevant data, see, e.g., the lovely work on pp fusion of Schiavilla, Stoks, and collaborators~\cite{Schiavilla:1998je}. But sometimes it didn't, with my favorite example being the deuteron quadrupole moment~\cite{Phillips:2003jz,Phillips:2006im}. Fitting on-shell NN data gets you some things very well, but not others. In $\chi$EFT that's not a surprise, because ``everything that is not forbidden is allowed": eventually, at some order in $Q$, all mechanisms not forbidden by symmetries enter the amplitude. This means that two-body currents and higher-body forces---mechanisms not constrained by NN data or current conservation---eventually show up any time you calculate something other than NN scattering. But, if using your NN force model and a one-body operator to calculate something doesn't put you on top of the data you no longer get to just shrug your shoulders and say ``I guess my potential doesn't work for that quantity". $\chi$EFT tells you {\it when} those other mechanisms show up and it tells you {\it how} they are related to other processes. And then it tells you what the residual uncertainty in your calculation is, because you know if you stopped at order $Q^k$ your amplitude is missing stuff that is $\mathcal{O}(Q^{k+1})$. I still remember Rob Timmermans saying, during one of the many heated exchanges at the Trento nuclear-forces workshop in 1999~\cite{Timmermans:1999}: ``Real theorists have error bars". $\chi$EFT gave nuclear theorists the chance to get themselves some error bars. And we are getting better and better at producing realistic error bars for nuclear-physics calculations~\cite{Furnstahl:2014xsa,Zhang:2015ajn,Premarathna:2019tup,Filin:2019eoe,Phillips:2020dmw,Maris:2020qne,Wesolowski:2021cni}.
Philosophers of science talk about a set of ``Explanatory Virtues". If one theory has more Explanatory Virtues than Theory B it's a better explanation. Matthew van Cleave~\cite{vanCleave} lists the virtues as:
\begin{enumerate}
\item ``Explanatoriness: Explanations must explain all the observed facts.
\item Depth: Explanations should not raise more questions than they answer.
\item Power: Explanations should apply in a range of similar contexts, not just the current situation in which the explanation is being offered.
\item Falsifiability: Explanations should be falsifiable---it must be possible for there to be evidence that would show that the explanation is incorrect.
\item Modesty: Explanations should not claim any more than is needed to explain the observed facts. Any details in the explanation must relate to explaining one of the observed facts.
\item Simplicity: Explanations that posit fewer entities or processes are preferable to explanations that posit more entities or processes. All other things being equal, the simplest explanation is the best. (Occam's Razor.)
\item Conservativeness: Explanations that force us to give up fewer well-established beliefs are better than explanations that force us to give up more well-established beliefs."
\end{enumerate}
Weinberg's papers gave us a way to understand few-nucleon systems that was Explanatory, Deep, Powerful, Falsifiable, and Simple. No wonder that in the late '90s several young post-docs and students, as well as a number of more established scientists, voted with their feet and chose to work on $\chi$EFT.
As I've tried to emphasize here, a number of rather foundational questions regarding the computation of nuclear forces from chiral Lagrangians remain open. But the clear legacy of Weinberg's papers is that they produced dramatic shifts in the technical direction and epistemological orientation of theoretical work on few- and many-nucleon systems. Nuclear physics hasn't been the same since---and that's a good thing.
\section*{Acknowledgments}
I thank Dick Furnstahl and Bira van Kolck, who read a draft of this manuscript and suggested different and thankfully not contradictory improvements. I also thank Martin Hoferichter and Jambul Gegelia for their insightful comments on an earlier version of my text. I am very grateful to all my collaborators over the past twenty-five years who have helped me wrestle with what it means to treat nuclear physics using EFT. Some of you may recognize our conversations in this manuscript. Even if you don't, please know that every one of you helped hone the views I've expressed here. This research was supported by the US Department of Energy under contract no. DE-FG02-93ER40756.
|
\section*{Introduction}
Spray modeling in CFD has long been dominated by Lagrangian-Eulerian methods. The stochastic nature of the Lagrangian-Eulerian model has permitted the efficient sampling of a sub-set of the actual drops
\cite{schmidt2018} while avoiding the frustrations of numerical diffusion \cite{dukowicz1980}. The basic building block of these simulations has been the parcel, a statistically-weighted representation of a single droplet.
The predicted behavior of the spray depended on the droplet breakup models, drag models, collision models, and turbulent dispersion models. Partial consideration could be made for the presence of neighboring drops in dense sprays \cite{balachandar2019}, but the essential nature of the spray model was drop-oriented. It was hoped that if the individual droplet phenomena were modeled correctly, then accurate predictions of spray behavior would follow. Under many situations this \textit{modus operandi} was successful, and for this reason, Lagrangian-Eulerian modeling remains a mainstay of applied CFD.
Lagrangian-Eulerian modeling has not proved to be ultimately satisfactory, especially for the high ambient density environments found in diesel engines. The decline of this droplet-oriented view was precipitated by two problems. The first was that the predictive power of Lagrangian-Eulerian spray modeling was found to be unsatisfactory without the adjustment of numerous model parameters \cite{precise2011}. In fact, if model parameters must be frequently adjusted and cannot be \textit{a priori} known, then the model is not truly predictive. Second, the predictive power is further compromised by the challenges in achieving grid-convergent solutions. The computational requirements of observing convergence, as measured by mesh requirements \cite{senecal2014} and parcel count \cite{schmidt2018}, mean that most Lagrangian spray calculations are grossly under-resolved.
The second was the successful mixing-limited model of Siebers \cite{siebers1999}. Siebers found that spray evolution correlated with global parameters such as spray angle and that under engine-relevant conditions, interfacial details played no observable role in spray evolution. Apparently, the interfacial area was so great that the mixing of ambient gas into the spray was the limiting factor in interfacial momentum and mass exchange. With this realization, the droplet-oriented Lagrangian-Eulerian approach seemed less appropriate. Instead, spray evolution resembled turbulent mixing between the liquid and the ambient gas. In the absence of interfacial details, which Siebers showed were not germane, the view of the spray was more of a continuum, such as would occur in the turbulent mixing of a high density gas jet.
The natural framework for modeling the mixing of two continuous fluids would be Eulerian-Eulerian modeling. Because of the very high Weber number and minimal impact of interfacial details, interface tracking and capturing methods have proven very expensive for modeling diesel sprays. Instead, Eulerian paradigms that model the turbulent mixing of the two phases have emerged as pragmatic approaches to capturing the mixing-limited behavior of sprays \cite{xue2014} \cite{blokkeel2003} \cite{garcia2013}.
These Eulerian models provide close coupling between the phases without incurring the expense of resolving interfacial features. In fact, the interfacial modeling of many Eulerian models is an appendage, where the interfacial details do not feed back into the flow field evolution \cite{xue2014}. This construction is predicated on the assumption of mixing-limited flow. Thermal evolution models, such as Garcia-Oliver\cite{garcia2013}, make the locally homogeneous flow (LHF) assumption advocated by Faeth \cite{faeth1983} with great success.
Other advantages of the Eulerian diffuse-interface treatments is a lesser tendency for mesh dependency than Lagrangian-Eulerian modeling \cite{xue2014}. While Lagrangian-Eulerian spray models do converge, they are only conditionally convergent--the user must employ a surprisingly large number of computational parcels in order to observe convergence \cite{schmidt2018}. The Eulerian models also account for the volume occupied by the spray, which is typically neglected in Lagrangian-Eulerian simulations \cite{pakseresht2018}.
Ultimately, however, direct injection engine simulations require a cost-efficient spray model for in-cylinder computations. While Eulerian-Eulerian models have had many impressive successes in predicting near-field spray behavior \cite{iyer2005}\cite{luret2010}\cite{blokkeel2003}\cite{lebas2005}\cite{desantes2016}, these constructions are quite expensive to use for in-cylinder calculations. The multi-scale nature of engine simulations becomes a severe problem because one must mesh a volume as large as the cylinder with resolution much smaller than the injector orifices \cite{xue2014}. Some simplification is required in order to embed a mixing-limited spray model into an internal combustion engine (ICE) simulation.
\begin{figure}[ht]
\centering
\includegraphics[width=0.7\textwidth]{MKcv.png}
\caption{The Eulerian control volumes used in the Musculus-Kattke model. Taken from Musculus-Kattke(2009)}
\label{fig:MKcv}
\end{figure}
Simplified, one-dimensional, mixing-limited models have demonstrated substantial success with a greatly-reduced cost and complexity when compared to CFD. A sketch of a one-dimensional Eulerian spray control volume is shown in Fig.\ \ref{fig:MKcv}. Seminal examples include Naber and Siebers \cite{naber1996}, Musculus and Kattke \cite{musculus2009}, and Desantes et al. \cite{desantes2007, desantes20091d}. These models all had several features in common. First, they were essentially one-dimensional Eulerian calculations. The work of Musculus et al.\ and Desantes et al.\ both included a simplified assumption of a radial profile within the spray. The works of Musculus et al. and Desantes et al. were both transient, allowing investigation of the start and end of injection. The work of Desantes et al.\ considered vaporization and heat transfer, including details such as fugacity for calculation of liquid-vapor equilibrium.
Ultimately, however, these models are not easily included into a multi-dimensional CFD computation. There are at least three outstanding issues:
\begin{enumerate}
\item How does one calculate the two-way coupling between the CFD solution and the spray evolution? The reduced order models such as Musculus and Kattke assume a zero velocity ambient, but a CFD solution will produce a resolved gas velocity field that should be employed in the spray evolution. A large part of this challenge is that the overlap of spray control volumes in a one-dimensional model with the underlying CFD mesh produces a complex interpolation problem. Foremost of the difficulties becomes how to calculate the intersection between spray control volumes shaped like cone frustra and the underlying CFD mesh. This intersection calculation would have to be repeated every time the spray control volumes or CFD mesh change.
\item What if the spray bends? This is usually less of a concern for diesel sprays, but if the model were applied to gasoline direct injection (GDI) sprays, the entrained momentum of the ambient gas would likely steer neighboring sprays together \cite{manin2015}. However, if the spray is allowed to bend, then one does not \textit{a priori} know the location of the spray control volumes.
\item In actuality, the spray angle is not a constant, as assumed by all the reduced order models above, but rather varies in time. Spray angle tends to be higher at very low needle lifts \cite{moon2015}. In an Eulerian treatment of the spray model, this variation in spray angle would create control volumes that vary in time, greatly complicating the required numerical methods.
\end{enumerate}
Implementations of reduced-order Eulerian mixing-limited spray models into CFD codes have shown considerable promise \cite{abani2008}\cite{wan1999}\cite{versaevel2000}\cite{yue2017}\cite{yue2019}\cite{abraham1999virtual}. However, these demonstrations have largely dodged the difficulties enumerated above. In each case, their implementations assumed a constant spray angle and constrained the mass and momentum exchange to be mostly pre-determined. As an area of improvement, we aspire to develop a fully-coupled model that is well-suited to time-varying spray angle.
A further goal is to investigate the effectiveness of a mixing-limited model beyond the traditional diesel engine conditions studied by Siebers \cite{siebers1999}. This article will not only describe the implementation of the model, but test it under the much lower density and temperature environment found in gasoline direct injection (GDI) engines. The actual region of applicability of the mixing-limited model is currently an open topic of study, hence there is no Weber number or Reynolds number map that can inform us when the model is applicable. With empirical testing of the model, we may learn more about where it may be applied.
\section*{Features of the ELMO Model}
We propose a new model, the Eulerian-Lagrangian Mixing-Oriented (ELMO) Model. This model represents similar physics to the work of Musculus and Kattke \cite{musculus2009} and Desantes et al. \cite{desantes2007} but is implemented in a CFD code with two-way coupling. Thus, the predictions of the spray will adapt to the cylinder gas conditions in a more general way than prior implementations of mixing-limited models.
The foremost advance of the ELMO model is a predication on the mixing-limited physics. The model is well suited for diesel sprays in the dense core, where Lagrangian-Eulerian models struggle. The model may also show promise for gasoline sprays, at least where the mixing-limited hypothesis holds true. Validation studies against diesel and gasoline measurements will indicate the applicability of this new model.
The next advance of the ELMO model is the use of Lagrangian ``capsules'' that start out as liquid, but entrain ambient gas in order to become two-phase constructs. The capsule is a moving, deforming control volume that follows a discrete mass of fuel. Similar ideas were proposed by B{\'e}ard et al. (2000) \cite{beard2000} in their CLE model, with the idea of avoiding mesh dependency. In a later development, full coupling has been included in the VSB2 spray model by K{\"o}sters and Karlsson \cite{kosters2016}. Their model utilized two-phase Lagrangian entities with some similarities to the model proposed here. The main difference between the VSB2 model and the present work is that the former emphasizes droplet size and a finite relaxation time to thermodynamic equilibrium. In contrast, the present work is mixing limited, without reliance on interfacial details. Rather than a finite relaxation time, the present model assumes instantaneous equilibrium, as in Pastor et al. \cite{pastor2012}.
Here, the ELMO model is, at its heart, a translation of the Musculus-Kattke model to a Lagrangian reference frame with an addition of equilibrium evaporative physics from Desantes et al. The ELMO model is built on assumptions of inertial and thermal equilibrium, limited only by the entrainment rate of surrounding gas.
Another important distinction between ELMO and the past efforts that employed a two-phase control volume, such as the work of B{\'e}ard et al. (2000) \cite{beard2000} and K{\"o}sters and Karlsson \cite{kosters2016}, is that the geometry of the ELMO model's control volumes are based on the spray angle. The spray angle is the dominant parameter for controlling the entrainment rate and provides a natural means to specify the breadth of the control volume based on the physical insights of Siebers \cite{siebers1999}.
An ELMO capsule has the following attributes:
\begin{enumerate}
\item A capsule is a cone frustum representing a moving quasi one-dimensional control volume. It has a finite extent and overlaps several gas phase cells, with which it exchanges mass, momentum, and energy.
\item The mass of fuel in a capsule remains constant.
\item A capsule contains both gas and liquid. The gas is a combination of entrained gasses and evaporated fuel.
\item The capsule has a cone angle that was determined at the time of the capsule's birth. As a capsule moves downstream and grows, the cone angle is retained. The capsule's cone angle is not necessarily the same as the current injection cone angle, which may be a function of time.
\item A capsule has a velocity that is calculated from conservation of momentum. As slow-moving air is entrained, the velocity of the capsule diminishes.
\item A capsule is in thermodynamic equilibrium, with an assumption of locally homogeneous flow. The liquid and gas are at the same temperature.
\item The axial velocity and liquid volume fraction in the capsule follow a radial profile that evolves in the near-nozzle region. This profile, used by the Musculus-Kattke model, is illustrated in Fig.\ \ref{fig:MKcv}
\end{enumerate}
A sketch of the ELMO concept is shown in Fig.\ \ref{fig:elmo}. The curved arrows show entrained cylinder gas, which brings new enthalpy for vaporization and mass, which tends to diminish the velocity of the capsule. A new capsule is generated every time step, so that they emerge from the injector in series.
\begin{figure}
\centering
\includegraphics[width=0.7\textwidth]{ElmoCapsulesFigureRev1.png}
\caption{A conceptual sketch of the ELMO model. One capsule per time step is created at each injector orifice and approximately follows the formerly created capsule. The arrows show gas entrainment into the capsules as they move from left to right. The capsule axial length grows increasingly shorter as it advects away from the injector tip, and the shortening of the length is compensated by the elongated radial extent, which follows the dispersion angle at capsule birth. }
\label{fig:elmo}
\end{figure}
The decision to use a Lagrangian reference frame has several benefits. The first, is that one need not construct a spray mesh that overlays the gas phase mesh. If the spray angle varies as a function of time or the spray bends, such a spray mesh would need to move and deform. Instead, we dynamically calculate overlap between capsules and the underlying mesh by using stochastically distributed points within the capsule.
A second benefit is the ability to re-use some of the computational infrastructure that was developed for Lagrangian-Eulerian spray modeling. For example, the stochastically distributed points mentioned above are located in the gas phase mesh using the same software functionality developed for locating parcels.
Because the number of capsules is low compared to the number of parcels used in a typical Lagrangian-Eulerian spray calculation, the ELMO model imposes a very small computational burden. There is one capsule generated per orifice per time step. Each existing capsule is updated for the time step without sub-stepping, until the capsule contains so little liquid that it transitions to a very sparse assortment of Lagrangian parcels.
Most importantly, the ELMO model has few arbitrary physical constants, providing little temptation to tune the model. This makes the predictions reproducible and predictive. The ELMO model is equally applicable to RANS models and LES closures.
The next sections describe the governing equations and the method of implementing the ELMO model. The ELMO model was incorporated into the CONVERGE 2.4 CFD code for application to spray simulations. The details of the CONVERGE code are described elsewhere \cite{senecal2014} \cite{converge_manual} and so the emphasis of the following text is on the spray modeling.
\section*{Governing Equations}
The governing equations are derived using a control volume analysis. Each capsule is a cone frustum, with a front side that extends a distance $z'_{fs}$ from the virtual origin and a distance of $z'_{bs}$ from the virtual origin (see Fig.\ \ref{fig:MKcv}). The control volume encompasses the entire capsule: liquid fuel, vapor fuel, and non-condensible gas. The total mass and volume of the capsule represent the sum of the three components. The liquid, vapor, and non-condensible gas are represented by the subscripts $l$, $v$, and $a$, respectively.
\begin{equation}
\label{eq:mass}
m = m_l + m_v + m_a
\end{equation}
\begin{equation}
\label{eq:volume}
V = V_l + V_v + V_a
\end{equation}
The inclusion of gaseous species in the control volume means that the capsule control volume overlaps with the Eulerian CFD control volumes. A separate mathematical analysis is thus required for calculating the phase interactions.
Underlying all of these equations are assumptions of equilibrium. Specifically, the phases all move at the same velocity and experience equal pressure. All phases are in thermal equilibrium as well.
The mass of a capsule continuously increases due to the entrainment of air. Each timestep, a capsule's mass, $m$, increases by the entrained mass.
\begin{equation}
\label{eq:MassConsv}
m^{n+1} = m^{n} + \Delta m
\end{equation}
This entrained gas, may include some momentum, $M$, due to the velocity of the entrained gas, $u_{gas}$.
\begin{equation}
\label{eq:MomConsv}
M^{n+1} = M^{n} + u_{gas} \Delta m
\end{equation}
In the present implementation, this entrained momentum is neglected, as in the work of Musculus and Kattke \cite{musculus2009}. This assumption results in a constant capsule momentum. Like the implementation of Musculus and Kattke, the consideration of a radial velocity and density profile is included here, which has implications for momentum. As shown in Eqn.\ \ref{eq:ubar}, the correlation of the distribution of mass and momentum results in a parameter $\beta$ in the expression for momentum. This parameter, calculated from the root of a fourth-order polynomial following Musculus-Kattke \cite{musculus2009}, arises from the fact that the velocity is higher near the spray axis, where most of the mass is concentrated.
\begin{equation}
\label{eq:ubar}
M = \beta m \bar{u}
\end{equation}
As the capsule advances each time step, the center of mass $z$ is updated according to a simple explicit Euler time integration. Again, the correlation parameter $\beta$ appears due to the correlation between mass and velocity distribution.
\begin{equation}
z^{t+\Delta t} = z^t + \beta \bar{u} \Delta t
\end{equation}
The capsule changes shape as it evolves, with an increasing radial extent and a diminishing axial extent. The reduction in axial extent is due to the reduction in velocity with increasing distance from the injector orifice. This same reduction in velocity represents a deceleration of the center of mass of each capsule. The derivation of the front side ($fs$) and back side ($bs$) location of each capsule begins with the assumptions that these capsule boundaries lie halfway between the centroid $z$ of a capsule at its current position and next position for the front side or halfway between the current centroid location and previous location for the back side. Expressing this mathematically:
\begin{equation}
{fs}^t = mean\left( {z}^t , {z}_{est}^{t+\Delta t} \right)
\end{equation}
\begin{equation}
{bs}^t = mean\left( {z}^t , {z}_{est}^{t-\Delta t} \right)
\end{equation}
Here, the subscript ${est}$ indicates an estimate described below. Because of the expected $1/x$ decay of velocity with distance from the injector, a harmonic mean is employed in the model instead of an arithmatic mean. These constraints provide a nearly contiguous arrangement of capsules, as illustrated conceptually in Fig.\ \ref{fig:elmo}.
The extent of the capsule is determined using the concept of a fictitious train of identical capsules. The centroid positions at the previous and next capsules are estimated using a first-term Taylor series expansion, for example, in Eqns.\ \ref{eq:TaylorSeries} and \ref{eq:TaylorSeries2}. Note that $\Delta t^0$ is not the current time step, but rather the time step at the capsule's birth because these estimates of a capsule's extent are based on the size of the capsule, which is a quantity that evolves continuously from its creation and is independent of the current time step.
\begin{equation}
{z}_{est}^{t+\Delta t} = z^t + \Delta t^0 \frac{\partial z}{\partial t} = z^t + \Delta t^0 \beta \bar{u}
\label{eq:TaylorSeries}
\end{equation}
\begin{equation}
{z}_{est}^{t-\Delta t} = z^t - \Delta t^0 \frac{\partial z}{\partial t} = z^t - \Delta t^0 \beta \bar{u}
\label{eq:TaylorSeries2}
\end{equation}
Once the location of the front and back sides are updated, the geometry of the capsule is fully determined and the kinematics of the advection process is complete. Next, the thermodynamics are calculated. Here, we largely follow the thermodynamic analysis of Desantes et al. \cite{desantes2007} who calculated the vaporization of single component fuels under mixing-limited assumptions. In the present case, there are some additional constraints that require iterative solution of the equations below.
The vaporization is driven by the rate of entrainment of ambient gas at a temperature of $T_{\infty}$ and a pressure of $p_{\infty}$. All ambient quantities seen by the capsules are evaluated at these conditions. All gas species are treated as ideal gasses for the sake of simplicity, though we acknowledge that these assumptions are not defensible at high pressures. As will be shown below, we can reproduce the results of Desantes et al, suggesting that the consequent error may be acceptable.
First, we calculate the vapor pressure, including the Poynting correction for an ideal gas at high pressure \cite{desantes2007}. In the equations below, the mass fraction of fuel, $Y_f$ is defined as the mass of fuel divided by the total mass of the capsule. The mass fraction of fuel vapor, $Y_{fv}$, is defined as the mass of fuel vapor divided by the capsule mass. The uncorrected vapor pressure is denoted as $p^0_{vap}$.
\begin{equation}
\label{eq:Poynting}
p_{vap} = p^0_{vap} * exp \left[ v_{liq} \frac{p_\infty - p^0_{vap} }{R_{gas} T_\infty} \right]
\end{equation}
The partial pressures for a mixture of ideal gasses is proportional to mole fractions, allowing the derivation of Eqn. \ref{eq:Yfv}. Here $MW_{fuel}$ is the molecular weight of the fuel species and $MW_\infty$ is the molecular weight of the entrained gas.
\begin{equation}
\label{eq:Yfv}
Y_{fv} = \left( 1 - Y_f \right) \frac{MW_{fuel}}{MW_\infty}
\frac{1}{\frac{p_\infty}{p_{vap}} - 1}
\end{equation}
By assuming that the evolution of species concentration and enthalpy due to entrainment evolves in an analogous fashion, per the unity Lewis number assumption, Desantes et al. derived the following relationship between fuel vapor fraction and fuel fraction. Here, $h_a$ represents the enthalpy of the ambient gas, either at $T_{\infty}$ or the temperature of the capsule, $T$. The denominator of the right side, $h_{fg}$ is the enthalpy of vaporization.
\begin{equation}
\label{eq:analogy}
\frac{Y_{fv}}{1-Y_f} = \frac{h_{a}(T_{\infty}) - h_a(T)- \frac{Y_f}{1-Y_f}\left(h_f(T) - h_f(T_{inj}) \right) }
{h_{fg}}
\end{equation}
Though the local gas conditions are known, the far-field conditions, such as $T_{\infty}$, are not readily available in a CFD context. As described in a later section, surface Monte-Carlo points are used for estimation of the surrounding conditions by sampling thermodynamic variables at the periphery of the capsule frustrum.
With the inclusion of Eqn. \ref{eq:analogy} the equilibrium state of the capsule is fully determined. However, the goal of the ELMO model is not just to predict the evolution of the spray, but to provide the source terms required for the gas phase Navier-Stokes solver. The intellectual challenge presented by the ELMO model is that the capsule is a two-phase entity. Hence, the gas portion of the capsule control volume overlaps with the control volumes of the gas phase solver--the gaseous species are represented in both.
In order to construct disjoint control volumes, to avoid this conceptual difficulty, we consider only the liquid phase portion of the capsule. Then, the gain of the gas phase is simply the loss of the liquid phase. For example, consider the mass source due to vaporization, where the evaporated vapor mass during one time step is represented $\Delta m_{evap}$. Here, $\Delta m_{evap}$ is positive for mass leaving the liquid.
\begin{equation}
\label{eq:massLiq}
S_m = - \left( m_l^{n+1} - m_l^n \right) = \Delta m_{evap}
\end{equation}
The source term gained by the gas phase conservation of mass equation is simply $\Delta m_{evap}$. Similarly, the momentum gained by the gas phase is the momentum lost by the liquid phase.
\begin{equation}
\label{eq:momLiq}
S_M = -\left( M_l^{n+1} - M_l^{n} \right) = m_l^n \beta ^n \bar{u}^n - m_l^{n+1} \beta^{n+1} \bar{u}^{n+1}
\end{equation}
Note that the source term in Eqn.\ \ref{eq:momLiq} represents only the axial component of the momentum source. Some contribution of radial momentum is also appropriate for locations off of the spray axis. The model constructs a unit vector that points from the virtual origin to the location where the source term is being deposited. A radial component is computed such that the momentum source vector is co-linear with this unit vector.
Like mass and momentum, the energy lost by the continuous phase is equal to the energy gain from the liquid phase. However, because CONVERGE solves an energy equation that only tracks the sensible portion of energy, the actual implementation is given by Eqn. \ref{eq:enthSource}. The first term on the right side of the equation represents sensible heat transfer absorbed from the surroundings by temperature change, the second term the enthalpy of vaporization, and the third counts for the energy automatically gained by the addition of vapor mass at the continuous phase temperature.
\begin{equation}
\label{eq:enthSource}
S_e = m_l^n c_{p,l} \left(T^n - T^{n+1} \right)
-\Delta m_{evap} h_{fl}
-\Delta m_{evap} e_g
\end{equation}
\section*{Algorithm}
An explicit Euler time-marching approach is employed for the kinematic variables using the same time step as the overall CFD solver. Equations \ref{eq:MassConsv} through Eqn.\ \ref{eq:TaylorSeries} are updated and the new front side and back side positions are calculated. These new positions determine the volume of each capsule. The new mass, however, is not known until the entrained gas mass is calculated. Some of the increase in volume will be filled with non-condensible gas and some will be filled by newly evaporated fuel vapor.
The calculation of the thermodynamic state, however, poses greater difficulties, due to the coupling of the state variables and the non-linearity of the equations. Equations \ref{eq:Poynting} through Eqn.\ \ref{eq:analogy} are solved iteratively, while maintaining the constraint of Eqn.\ \ref{eq:volume} according to Amagat's law.
The coupling terms identified in Eqns.\ \ref{eq:massLiq} through \ref{eq:enthSource} must be distributed to the appropriate gas phase cells. Depending on the mesh resolution and the size of the capsule, each capsule volume may overlap numerous gas phase cell volumes. The intersection of these volumes are, in general, complex non-convex three-dimensional shapes. Though geometric intersection algorithms do exist \cite{menon2011}, they are complex and time consuming. Instead, a Monte-Carlo integration is used to distribute the mass, momentum, and energy to each gas phase cell. Monte-Carlo integration provides a probabilistic integration of the source terms of the gas phase equations and is also used for interpolating from the gas phase to provide average gas properties in the capsule evolution equations. This integration is illustrated in Fig.\ \ref{fig:capsule_MC}.
\begin{figure}
\centering
\includegraphics[width=0.4\textwidth]{Capsule.png}
\caption{ELMO Capsule overlap with Eulerian mesh and associated Monte-Carlo points. The actual implementation uses a thousand points distributed through the capsule volume. Here, only 31 points are shown for clarity. The blue numerals represent cell identification numbers and the black dimensions show the cone frustra extent.}
\label{fig:capsule_MC}
\end{figure}
This distribution process has two major steps, the creation of Monte-Carlo points and the assignment of weights for source terms. A third step, the transition from capsules to a more traditional Lagrangian-Eulerian framework is often employed near the end of a capsule's useful life.
\subsection*{Creation of Monte Carlo points}
A large number of points are created within each capsule using an acceptance/rejection algorithm. The probability distribution within space is non-uniform, with greater weighting towards the center, per the assumption of a radial profile of mass and velocity distribution. Because of the mathematical challenge of distributing points at random within a conical frustum, we distribute the points within a cylinder that encloses the frustum. The diameter of this cylinder is equal to the diameter of the front side of the capsule. Any points that fall outside of the frustum are rejected and discarded.
\subsection*{Calculation of Weights}
Each point is located in the mesh using the same algorithm used to find the cell in which a Lagrangian parcel might reside. Then, the algorithm loops over all of the $N$ points that were accepted in the above step. For each of these Monte Carlo points, a fraction of $1/N$ of the source term is deposited into the cell which contains the point.
This algorithm will, in a stochastic sense, distribute the source terms according to the volume fraction of the capsule represented by a gas phase cell. For example, if a gas phase cell overlaps with nine percent of the capsule's volume, then approximately nine percent of the Monte Carlo points are expected to land within that gas phase cell. The cell will receive, on average, nine percent of each source term. For example, in Fig.\ \ref{fig:capsule_MC} three of the thirty-one red points fall in cell 11, indicating that a fraction equaling 3/31 of any source should be distributed to this cell. This stochastic approach obviates the need for calculating intersections.
These interior points are used only for distributing source terms. A separate set of points that are scattered on the surface of the capsule are employed for calculating the conditions of ambient gas. These surface points are used to produce a weighted average of the ambient temperature and fuel vapor mass fraction.
\subsection*{Transition}
At some point, the capsule approach is no longer needed. The spray becomes sufficiently dilute, such that treating the spray as a collection of individual droplets is fully sufficient. At this point, it becomes convenient to transition the capsules to traditional Lagrangian droplets. Though the transition may not always be necessary, it has several advantages. First, if the spray might impinge on a surface, the ELMO concept would not have a natural connection to existing spray impingement models. Converting the spray to Lagrangian parcels enables the use of existing functionality to capture parcel impact on walls.
Second, the assumption of the spray angle remaining constant far downstream of the point of injection is questionable. At some point, the spray will deviate from a simple conical shape. The transition relaxes this assumption and allows natural aerodynamic drag to control the shape of the spray tip.
Third, the current implementation does not allow the velocity direction of the capsule to deviate from the injector hole axis. However, in Lagrangian particle tracking there is no such limitation. Consequently, the transition to Lagrangian points allows the model to capture spray bending, which is expected in some multi-hole injectors and in the presence of strong cross-flow.
The conversion from capsule to Lagrangian parcels occur when any of the following criteria are met:
\begin{enumerate}
\item The liquid volume fraction of the capsule is below 0.5 percent
\item More than 95 percent of the fuel is in vapor form
\item The capsule velocity has diminished below 10 $[m/s]$
\end{enumerate}
These thresholds are admittedly arbitrary. The first is based on the fact that once the liquid volume fraction is very low, the spray is well-represented by droplets evolving in relative isolation, making the typical assumptions of the Lagrangian models apropos. By assuming a single drop size and a uniform lattice arrangement of droplets in three-dimensional space, one can translate liquid volume fraction (LVF) into inter-drop spacing. At an LVF of 0.005, the center-to-center distance between droplets is approximately six diameters. Past direct numerical simulations of neighboring droplet interactions indicate that at such distances, the droplets evolve in a largely independent fashion \cite{quan2011}. Hence, at a LVF of less than 0.5 percent, Lagrangian particle tracking is expected to perform satisfactorily.
The second conversion criterion is based on the idea that if 95\% of the mass has evaporated, the ELMO model's responsibilities are largely complete. The last transition criterion, based on velocity, is intended to avoid applying the model at such low velocities that the mixing-limited hypothesis would be absurd. In the test cases found later in this paper, the LVF criterion was usually the operative factor. The velocity criterion did not come into play.
At the point of transition, the liquid mass is divided evenly among an arbitrarily large number of parcels who are located at random points within the capsule. The velocity is randomly selected from within the cone angle of the capsule with a magnitude equal to that of the capsule.
The initial droplet size of the parcels presents a challenge, since droplet size has no role in mixing-limited models and does not exist within the capsule concept. Instead, we hypothesize that the droplets are the largest expected radius based on a critical Weber number of 6, as observed by Pilch and Erdman for a wide range of Ohnesorge number \cite{pilch1987}. Consistent with the locally homogeneous flow assumption, the gas and liquid are expected to be moving at roughly the same velocity, such that the velocity scale in the Weber number calculation is based instead on the expected turbulent fluctuations. This value is calculated based on the observation by Kobashi et al. that, in numerous sprays and gas jets, both in the literature and their own experiments, the turbulence intensity is roughly 0.2 \cite{kobashi2018} near the centerline. The 20\% turbulence intensity is a robust feature, persistent over a wide range of downstream pressures and injection pressures. While this estimate of droplet size is perhaps speculative, Lagrangian particle tracking is only invoked once the spray has transferred the large majority of its mass, momentum, and energy to the gas.
Once the transition to Lagrangian parcels is complete, primary atomization is presumed complete, and the parcels evolve with typical spray models appropriate for secondary atomization of dilute sprays. For all of the tests in the current work, the secondary spray models were the TAB breakup model \cite{orourke1987}, the No Time Counter (NTC) droplet collision model \cite{schmidt2000}, and the Frossling evaporation model \cite{frossling1938}.
\section*{Results}
The results presented here comprise two categories: verification and validation. Verification provides evidence that the equations are being solved correctly and validation provides evidence that the model represents actual sprays. Verification results are presented first, beginning with comparison to the Musculus-Kattke model. This comparison is intended to show that the inertial portion of the ELMO model is being solved correctly. The test case is based on the Engine Combustion Network (ECN) Spray A test case \cite{ECNweb}. The conditions are given in Table \ref{table:sprayAexp}. Note that the Musculus-Kattke model does not account for vaporization, but is only sensitive to ambient gas density. The ELMO model, in contrast, includes vaporization effects. So the temperature of the Spray A condition is divided by three and the pressure is multiplied by a factor of three in order to maintain the correct gas density while avoiding the issue of vaporization. This allows testing of the model without changing the code. The verification is shown in Fig.\ \ref{fig:MK_Ver}.
\begin{figure}[h!]
\centering
\includegraphics[width=0.65\textwidth]{MK_Ver.png}
\caption{ Fuel jet penetration compared to Musculus-Kattke model \cite{musculus2009}.}
\label{fig:MK_Ver}
\end{figure}
The thermodynamic implementation was tested as a verification measure to ensure that it was faithful to the thermodynamics of Desantes et al. \cite{desantes2007}. In their zero-dimensional model, there is no moving gas and no spatial variation of the surroundings, so the coupling of the ELMO model was temporarily disabled in order to reproduce the conditions of the Desantes et al. calculations. To make a fair comparison with the work of Desantes et al., the ELMO code must see a uniform ambient condition undisturbed by the spray. The results are shown in Fig.\ \ref{fig:DesantesComparison}. As a capsule advects and grows, it entrains the surrounding gas. This entrainment reduces the mass fraction of fuel from unity, at injection. As the entrainment proceeds, the mass fraction of fuel in vapor form increases, until at a value slightly less than 0.4, for these particular conditions, the fuel is completely vaporized.
\begin{figure}[h]
\centering
\includegraphics[width=0.65\textwidth]{Desantes_Verif.png}
\caption{With a static, undisturbed flowfield, the current implementation reproduces the results of Desantes et al. The abscissa represents the mass fraction of fuel and the ordinate is the fraction of fuel in the vapor phase.}
\label{fig:DesantesComparison}
\end{figure}
\begin{table}[h]
\centering
\begin{tabular}{|l|l| }
\hline
Numerical setup & \\
\hline
CFD code & CONVERGE V2.4 \\
Type grid & AMR and fixed embedding \\
Base grid & 2 mm \\
Embedding level for AMR and fixed embedding & 3 (on velocity gradient) \\
Maximum grid resolution & 0.25 mm \\
\hline
Models & \\
\hline
Turbulence & RNG $k-\epsilon$ \\
Breakup model & Taylor Analogy Breakup (TAB) \cite{orourke1987}\\
Droplet collision & No Time Counter (NTC) \cite{schmidt2000}\\
Vaporization & Frössling \cite{frossling1938} \\
\hline
\end{tabular}
\caption{Common numerical setup features for all three test cases. Note that the droplet models are only invoked after transition.}
\label{table:num_setup}
\end{table}
For validation, three Engine Combustion Network (ECN) cases were considered: Spray A, Spray H, and Spray G \cite{kastengren2012} \cite{duke2017} \cite{kosters2016}. Because of the mixing-limited nature of the model, the validation did not include consideration of drop sizes, but instead focused on global spray quantities, such as vapor penetration, radial fuel distribution, and gas motion. Drop size is not supposed to be a significant spray characteristic in mixing-limited sprays. The ELMO model was employed, without any adjustment to model parameters, in all validation cases. The common features of the simulations are shown in Table \ref{table:num_setup}.
\begin{table}[h]
\centering
\begin{tabular}{|l|l| }
\hline
Parameter &Value \\
\hline
Fuel & dodecane \\
Diameter & 90 [$\mu$m] \\
Duration of Injection & 1.54 [ms] \\
Mass Injected & 3.46 [mg] \\
Ambient Pressure & 6 [MPa] \\
Ambient Temperature & 900 [K] \\
Plume Cone Angle & 21.5 [degrees] \\
Fuel Temperature & 373 [K] \\
Coefficient of Area & 0.98 \\
Initial turbulent kinetic energy & $5.02 \cdot 10^{-4} m^2/s^2$ \\
Initial turbulent dissipation & 0.0187 $m^2/s^3$\\
\hline
\end{tabular}
\caption{Spray A experimental parameters \cite{pickett2011}}
\label{table:sprayAexp}
\end{table}
The first case, Spray A, is a single axial hole injector with a rounded inlet. This is a highly evaporating non-combusting case where the conditions are representative of diesel fuel injection. The injection parameters are summarized in Table \ref{table:sprayAexp}. For this case, a variable rate of injection profile was employed. The three-dimensional simulation used a mesh with an initially uniform cell size of 2 $mm$ that is refined using fixed embedding around the spray. A cylindrical area is set by the nozzle with a radius of 2 $mm$ and length of 7 $mm$ for embedded refinement, while the embedding scale is set to 3. Additionally, the grid is automatically refined by the CONVERGE code based on the magnitude of gas velocity. The initial turbulent kinetic energy and dissipation are estimated from the experimental data \cite{pickett2011}, combined with an assumption that the turbulence length scale is equal to the nozzle diameter.
\begin{figure}[h]
\centering
\includegraphics[width=13 cm]{SprayALiquidAndGasTemperature.png}
\caption{Spray A at 1 $ms$ after the start of injection. The capsules are rendered as a sub-sample of the Monte-Carlo points. Parcels and capsules are rendered on the same temperature scale.}
\label{fig:sprayAsnap}
\end{figure}
A snapshot at 1 $ms$ after the start of injection is shown in Fig.\ \ref{fig:sprayAsnap}. For visualizing sprays simulated with ELMO, a sub-sample of the Monte-Carlo points are selected for post-processing. The figure shows a discontinuity in the spray angle at the transition point. Since capsules are cone frustra, simulating the entire spray with ELMO would force a strictly conical shape on the spray, whereas transition provides a more natural treatment of the tip region. The location of transition varies, but by the end of injection, the distance is 1.9 $mm$ from the injector orifice. The disadvantage, however, of the transition process is that the drag on the liquid changes abruptly from the stipulated drag of the Musculus-Kattke model to the drag calculated by the CFD solver, resulting in the discontinuous shape. Similarly, the governing equations for liquid temperature abruptly shift at the point of transition producing a rapid change in liquid temperature.
For validation, the predictions of the ELMO model were compared to experimental data from Pickett et al \cite{pickett2011}. Fig.\ \ref{fig:SpA} shows the spray vapor penetration versus time (a), the transverse distribution of mass at 20 $mm$ downstream of injection at the end of injection (b), and spray liquid length (c). Without model adjustment, the penetration is predicted by the ELMO model.
For comparison, a Lagrangian-Eulerian simulation result is also included in Fig. \ \ref{fig:SpA}. The model inputs were specified as a part of an example case that comes with CONVERGE 2.4. This case employs a dynamic droplet drag model \cite{liu1993}, the Fr{\"o}ssling evaporation model \cite{frossling1938}, the KH-RT atomization model \cite{beale1999}, and the NTC droplet collision model \cite{hou2006}. These models were used, without adjustment of parameters, for this case and for subsequent cases shown later in this paper.
\begin{figure}[H]
\centering
\subfloat[]{{\includegraphics[width=9.5cm]{sprayA_VapPen.pdf} }}%
\qquad
\subfloat[]{{\includegraphics[width=10cm]{sprayA_MixFrac.pdf} }}%
\qquad
\subfloat[]{{\includegraphics[width=9.5cm]{sprayA_LL.png} }}%
\caption{Spray A simulation compared against experimental result of Pickett et al \cite{pickett2011}. a) vapor penetration, b) transverse mixture fraction distribution c) liquid length. Because the experiment has imperfect symmetry, the experimental data for transverse mixing fraction have been shifted horizontally to align with the simulation. }%
\label{fig:SpA}%
\end{figure}
The transverse profiles shown in Fig.\ \ref{fig:SpA} (b) permit comparison of the fuel dispersion in the radial direction. Comparison to the liquid length indicates that the fuel is entirely vaporized well before these measurement locations. Due to slight asymmetries in the fabrication of the Spray A nozzle, the experimental profiles are not perfectly symmetrical nor are they centered on a radial distance of zero. Small amounts of asymmetry occur in the ELMO results due to the stochastic nature of the spray models. At 20 $mm$ ELMO predicts the bell-shaped distribution with the approximate width and height of the experimental measurements. Fig.\ \ref{fig:SpA} (c) shows the spray liquid length predicted by LE, ELMO, and experiments of Sandia national lab. The liquid length has been computed based on projected liquid volume fraction using a $0.2\cdot 10^{-3} mm^3$ liquid volume per $mm^2$ area threshold, like the experiments. ELMO shows a good prediction compared to LE and experimental data.
The next test case is the ECN Spray H injection measurements \cite{idicheria2007}. The Spray H injector is a single axial hole injector with a sharp entrance, more likely to cavitate than Spray A. Indicative of this sharper nozzle entrance, the value of the coefficient of area is lower than Spray A. The injected fuel is n-heptane, which is more volatile than dodecane, making Spray H a substantially different target than Spray A. The conditions used in the simulation are given in Table \ref{table:sprayHexp}. The rate of injection was described by an idealized profile, rather than assumed constant. Like the previous simulation, a uniform 2 $mm$ mesh initial resolution was used, and then adaptive mesh resolution took control as the spray developed.
The most critical single quantity amongst the parameters in Table \ref{table:sprayHexp} is the spray angle. The value of 23 degrees was recommended by Pickett et al. \cite{pickett2011} as appropriate for modeling, though their high-sensitivity experiments indicated an angle of 24 degrees. The latter value was chosen for the present simulations.
\begin{table}[h]
\centering
\begin{tabular}{|l|l| }
\hline
Parameter &Value \\
\hline
Fuel & n-heptane \\
Diameter & 100 [$\mu$m] \\
Duration of Injection & 6.8 [ms] \\
Mass Injected & 17.8 [mg] \\
Ambient Pressure & 4.33 [MPa] \\
Ambient Temperature & 1000 [K] \\
Plume Cone Angle & 24 [degrees] \\
Fuel Temperature & 373 [K] \\
Coefficient of Area & 0.86 \\
Initial turbulent kinetic energy & $5.02 \cdot 10^{-4} m^2/s^2$ \\
Initial turbulent dissipation & 0.0176 $m^2/s^3$\\
\hline
\end{tabular}
\caption{Spray H Experimental Parameters \cite{pickett2011}}
\label{table:sprayHexp}
\end{table}
Figure \ref{fig:SpH} shows (a) the penetration versus time and (b) transverse mass distributions at 1.13 ms after start of injection. The accuracy of the fuel mixing results is comparable to those of Spray A. Like Spray A, these experimental data are located far beyond the point where ELMO capsules are terminated, and so the turbulence model also plays a role in these predictions. Because Spray H is more volatile and the gas temperature so high, the capsules vaporize quickly and the transition to parcels occurs only at very early times, near the location of injection. For the large majority of the simulation, the fuel vaporizes directly and completely from the capsules.
\begin{figure}[H]
\centering
\subfloat[]{{\includegraphics[width=10cm]{sprayH_VapPen.pdf} }}%
\qquad
\subfloat[]{{\includegraphics[width=10cm]{sprayH_MixFrac.pdf} }}%
\caption{Spray H simulation compared against experimental result of Sandia lab. a) vapor penetration, b) transverse mixture fraction distribution. Because the experiment has imperfect symmetry, the experimental data for transverse mixing fraction have been shifted horizontally to align with the simulation.}%
\label{fig:SpH}%
\end{figure}
The final test for the ELMO model is the gasoline Spray G condition. This eight-hole gasoline direct injection uses iso-octane under non-flashing conditions. This test case is fundamentally different than the two previous, not only because this is a multi-hole injector, but because of the far lower ambient density.
These gasoline direct injection conditions do not correspond to the diesel-relevant conditions under which Siebers composed the mixing-limited hypothesis. There are no existing theoretical boundaries that define when the mixing-limited hypothesis is applicable and when it is not, so this test case provides empirical illumination of the model applicability. In addition, this condition provides a platform to evaluate the suitability of ELMO for multi-hole nozzles where there can be significant interaction between plumes, despite the imposition of conical growth rate at the defined plume angle oriented at the prescribed hole drill angle.
\begin{table}[h]
\centering
\begin{tabular}{|l|l| }
\hline
Parameter &Value \\
\hline
Fuel & iso-octane \\
Diameter & 165 [$\mu$m] \\
Duration of Injection & 0.78 [ms] \\
Mass Injected & 1.25 [mg] \\
Ambient Pressure& 0.6 [MPa] \\
Ambient Temperature & 573 [K] \\
Plume Cone Angle & 20 [degrees] \\
Nozzle Angle & 34 [degrees] \\
Fuel Temperature & 363 [K] \\
Coefficient of Area & 0.68 \\
Initial turbulent kinetic energy & $6.4 \cdot 10^{-3} m^2/s^2$ \\
Initial turbulent dissipation & 0.486 $m^2/s^3$\\
\hline
\end{tabular}
\caption{Spray G experimental parameters \cite{moulai2015} \cite{payri2019}}
\label{table:sprayGexp}
\end{table}
The conditions used in the simulation are reported in Table \ref{table:sprayGexp}. The two most critical values are the spray angle, taken from the work of Payri et al.\cite{payri2019} and the coefficient of area, from Moulai et al.\cite{moulai2015}. For spray angle, Payri et al. performed CFD simulations that included the internal flow. Depending on their choices of model, the range of spray angle was from 20 to 23 degrees. The plume angle definition used in their work was based on the minimum observable mass fraction. In the present work, both values of spray angle were simulated with little effect on the results, and the lower value is arbitrarily chosen for generating the figures below. The rate of injection was given as a transient profile as prescribed by the Engine Combustion Network.
\begin{figure}[H]
\centering
\includegraphics[width=7.1cm]{SprayGwithLengthScale0_35ms.png}
\caption{A snapshot of the Spray G fuel injection at 0.35 $ms$ after the start of injection, as modeled by ELMO. The points with a radius of 1 $mm$ represent points within the capsules whereas the smaller radius points represent parcels. The filled contours indicate mass fraction of iso-octane.}
\label{fig:sprayGsnap}
\end{figure}
The eight hole injection was reduced to a one-eighth sector as illustrated in Fig.\ \ref{fig:sprayGsnap}. This figure also shows that the capsules, indicated by red points, represent a far lower fraction of the liquid fuel lifetime than in the previous diesel cases because less liquid is vaporized at lower ambient temperature and density but the liquid volume fraction decreases by dilution. Here, the maximum extent of the capsules is about 3 $mm$, at which point the capsules transition to parcels, which further evolve.
Gasoline direct injection sprays tend to bend inwards, a tendency evident in Fig.\ \ref{fig:sprayGsnap} after the transition to parcels. The fuel vapor is similarly advected inwards towards the injector axis, indicating entrainment of air towards the centerline of the injector. The imposed cone angle of the capsules does not prevent the inwards bending experienced by gasoline sprays. Even though ELMO imposes an initial cone angle, the entrainment that it enforces realistically creates a low pressure zone between plumes. This low pressure zone then deflects the plumes towards the centerline.
\begin{figure}[H]
\centering
\subfloat[]{{\includegraphics[width=10cm]{sprayG_VapPen.pdf} }}%
\qquad
\subfloat[]{{\includegraphics[width=10cm]{sprayG_AxiVel.pdf} }}%
\caption{Spray G simulation compared against experimental result of Sandia lab. a) vapor penetration measured in the direction of the injector axis, b) Axial gas velocity at the centerline located at a downstream position of z = 15 $mm$. Positive values indicate motion away from the injector and negative values indicate motion towards the injector.}%
\label{fig:SpG}%
\end{figure}
For validation, we use penetration data from the Engine Combustion Network and measured gas velocity data from Sphicas et al. \cite{sphicas2017}. The penetration data are measured in the direction of the injector axis, not the hole axis, as a function of time. The gas velocity data comes from transient, non-intrusive measurements made between plumes at a point 15 $mm $ below the injector tip.
Figure \ref{fig:SpG} provides experimental validation for the predicted penetration and the axial gas velocity at a point on the axis of the injector. The axial velocity validation is based on the observation that the downward spray motion induces temporarily, an upward motion of air along the injector axis. These velocity data show that shortly after the start of injection, the ambient gas begins moving towards the injector. The strength of this upward motion is indicative of the momentum exchange between the sprays and the surrounding gas.
The axial velocity shown in Fig.\ \ref{fig:SpG} has historically been a difficult quantity to predict with Lagrangian spray models. Sphicas et al. \cite{sphicas2017} simulated Spray G using the same commercial code as is used in the present work (CONVERGE), but with LES turbulence modeling. As a tunable parameter, they investigated a range of plume cone angles, from 25 to 40 degrees. They also tried using internal flow simulations to directly map the flow at the exit of the injector orifice to the spray boundary condition. The strength of the ELMO model is that, without adjustment, it can predict the upward gas flow as shown in Fig.\ \ref{fig:SpG}. As this flow is driven by interfacial drag, this result is confirmation of the spray model's inertial behavior.
\begin{figure}[H]
\centering
\includegraphics[width=0.85\linewidth]{sprayGpressureWithLines.png}
\caption{A snapshot of the Spray G pressure field at 0.75 $ms$ after the start of injection, as modeled by Lagrangian Eulerian (left) and ELMO (right). The two lines, placed at the same angle and position, allow comparison of the spray deflection.}
\label{fig:sprayG_press}
\end{figure}
Because multi-hole injectors have the potential for spray-to-spray interactions, we also chose to look at the pressure field around one of the sprays. The creation of low pressure regions in the vicinity of the spray plumes is a potential factor in spray bending or spray collapse. Fig. \ref{fig:sprayG_press} shows the pressure field for both the traditional Lagrangian-Eulerian and ELMO simulations of Spray G. The green lines, which are intended to make spray deflection more obvious, show that ELMO predicts greater plume deflection than the standard Lagrangian model. Note that this is a significant result because the model construct for an ELMO capsule has fixed inputs for plume direction and growth, and therefore, there is no bend of the capsule itself. However, the Eulerian solution overlaid to the capsule produces expected results. A low pressure zone is established at the injector axis that is more prominent for ELMO.
In these three non-combusting cases, the cost of the CFD calculation was dominated by the gas phase solution. The cost of both the ELMO model and the traditional Lagrangian-Eulerian spray model were both a small fraction of the overall cost. In these non-combusting cases, the spray represented roughly eight percent or less of the total computational cost. When applied to combustion cases in engines, it is anticipated that the computational cost of the spray model would be an even smaller fraction of the total computational time.
\FloatBarrier
\section*{Conclusions}
A mixing-oriented spray model has been conceived, implemented, and tested. This new model, ELMO, is based on ideas of thermodynamic and inertial equilibrium in the dense spray core, resulting in an approach that targets mixing-limited conditions. ELMO, as demonstrated by the results generated here, can be applied to diesel sprays and gasoline sprays without adjustment. The computational cost of the model was roughly equivalent to traditional Lagrangian/Eulerian simulation.
The ELMO model's ability to predict behavior of gasoline direct injection sprays suggests that, at least within the first several millimeters, gasoline sprays may also be mixing-limited. This conclusion is only based on the observation of a single gasoline spray case and so must be strongly qualified until further cases can be examined. Because there is currently no theory that successfully delineates the bounds of the mixing-limited regime, such empirical observations must suffice for the present.
Observed limitations of the model's capabilities indicate areas for future work and development. The transition from the ELMO capsules to the parcel-based tracking represents an abrupt change in aerodynamic drag. Consequently, an artificial change in spray angle occurs at that point. A more graceful transition process would help produce more realistic downstream spray shapes. Analogous improvements for the rate of heat transfer are warranted.
The present work represents an initial foray into making a fully-coupled, mixing-limited, CFD computation. Unlike prior mixing-limited models in the literature, the ELMO model has more degrees of freedom since the model is two-way coupled. The comparison to Lagrangian-Eulerian spray modeling is a particular challenge; given the relative maturity of the Lagrangian-Eulerian modeling approach, one expects fairly good experimental agreement from the Lagrangian-Eulerian results. The fact that the ELMO model produces comparable accuracy in this initial effort is encouraging.
\section*{Acknowledgements}
Funding for the project was provided by the Spray Combustion Consortium of automotive industry sponsors, including Convergent Science Inc.\, Cummins Inc.\, Ford Motor Co.\, Hino Motors Ltd., Isuzu Motors Ltd., Groupe Renault, and Toyota Motor Co.. Experiments were performed at Combustion Research Facility, Sandia National Laboratory with support from the U.S. DOE Office of Vehicle Technologies. Sandia National Laboratories is a multi-mission laboratory managed and operated by National Technology and Engineering Solutions for Sandia LLC, a wholly owned subsidiary of Honeywell International, Inc.\, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-NA0003525. The authors also thank
Dr. Yajuvendra Shekhawat of Convergent Science Inc.\ for his help in using the CONVERGE code's full capabilities.
\FloatBarrier
\section*{References Cited}
\bibliographystyle{plain}
|
\section{Introduction}
\bigskip Let $\mathcal{H}$ denote the class of complex-valued harmonic
functions $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}$ defined in the
open unit disk $\mathcal{U}=\left \{ z\in \mathbb{C}:\left \vert
z\right
\vert <1\right \} ,$ and normalized by $\mathfrak{f}(0)=\mathfrak{f}%
_{z}(0)-1=0$. Also, let $\mathcal{H}^{0}=\left \{ \mathfrak{f}\in \mathcal{H}%
:\mathfrak{f}_{\overline{z}}(0)=0\right \} $. Each function $\mathfrak{f}\in
\mathcal{H}^{0}$ can be expressed as $\mathfrak{f}=\mathfrak{s}+\overline{%
\mathfrak{t}},$ where%
\begin{equation}
\mathfrak{s}(z)=z+\overset{\infty }{\underset{m=2}{\sum }}a_{m}z^{m},\text{
\ \ \ }\mathfrak{t}(z)=\overset{\infty }{\underset{m=2}{\sum }}b_{m}z^{m}
\label{eqH}
\end{equation}%
are analytic in $\mathcal{U}$. A necessary and sufficient condition for $%
\mathfrak{f}$ to be locally univalent and sense-preserving in $\mathcal{U}$
is that $\left \vert \mathfrak{s}^{\prime }(z)\right \vert >\left \vert
\mathfrak{t}^{\prime }(z)\right \vert $ in $\mathcal{U}$. See \cite%
{Clunie,Durenharm}.
Denote by $\mathcal{S}_{H}$ the class of functions $\mathfrak{f}=\mathfrak{s}%
+\overline{\mathfrak{t}}$ that are harmonic, univalent and sense-preserving
in the unit disk $\mathcal{U}$. Further, let $\mathcal{S}_{H}^{0}=\left \{
\mathfrak{f}\in \mathcal{S}_{H}:\mathfrak{f}_{\overline{z}}(0)=0\right \} .$
Note that, with $\mathfrak{t}(z)=0,$ the classical family $\mathcal{S}$ of
analytic univalent and normalized functions in $\mathcal{U}$ is a subclass
of $\mathcal{S}_{H}^{0}$ $,$ just as the family $\mathcal{A}$ of analytic
and normalized functions in $\mathcal{U}$ is a subclass of $\mathcal{H}^{0}.$
A simply connected subdomain of $\mathbb{C}$ is said to be close-to-convex
if its complement in $\mathbb{C}$ can be written as the union of
non-crossing half-lines.
Let $\mathcal{K},\mathcal{S}^{\ast }$ and $\mathcal{C}$ be the subclasses of
$\mathcal{S}$ mapping $\mathcal{U}$ onto convex, starlike and
close-to-convex domains, respectively, just as $\mathcal{K}_{H}^{0},$ $%
\mathcal{S}_{H}^{\ast ,0}$ and $\mathcal{C}_{H}^{0}$ are the subclasses of $%
\mathcal{S}_{H}^{0}$ mapping $\mathcal{U}$ onto their respective domains.
In \cite{Hernandez}, Hernandez and Martin introduced the notion of stable
harmonic mappings. A sense-preserving harmonic mapping $\mathfrak{f}=%
\mathfrak{s}+\overline{\mathfrak{t}}$ is said to be stable harmonic
univalent (resp. stable harmonic convex, stable harmonic starlike, or stable
harmonic close-to-convex) in $\mathcal{U}$, if all functions $\mathfrak{f}%
_{\epsilon }=\mathfrak{s}+\epsilon \overline{\mathfrak{t}}$ with $|\epsilon
|=1$ are univalent (resp. convex, starlike, or close-to-convex) in $\mathcal{%
U}$. It is proved that $\mathfrak{f=s+}\overline{t}$ is stable harmonic
univalent (resp. convex, starlike, or close-to-convex) if and only if $%
F_{\epsilon }\mathfrak{=s+\epsilon t}$ are univalent (resp. convex,
starlike, or close-to-convex) in $\mathcal{U}$ for each $|\epsilon |=1.$
Recall that, convexity and starlikeness are hereditary properties for
conformal mappings and they do not extend to harmonic functions \cite{Duren}%
. The failure of hereditary properties leads to the notion of fully starlike
and fully convex functions which introduced by Chuaqui, Duren and Osgood
\cite{Chuaqui}. A harmonic function $\mathfrak{f}$ of the unit disk is said
to be fully convex, if it maps every circle $\left \vert z\right \vert =r<1$
in a one-to-one manner onto a convex curve. Such a harmonic mapping $%
\mathfrak{f}$ with $\mathfrak{f}(0)=0$ is fully starlike if it maps every
circle $\left \vert z\right \vert =r<1$ in a one-to-one manner onto a curve
that bounds a domain starlike with respect to the origin. Denote by $%
\mathcal{FK}_{H}^{0}$ and $\mathcal{FS}_{H}^{\ast ,0}$ the subclasses of $%
\mathcal{K}_{H}^{0}$ and $\mathcal{S}_{H}^{\ast ,0}$ consisting of fully
convex and fully starlike functions, respectively. In \cite{Hernandez,
Nagpal-fully, Nagpaljkms}, it is proved that stable harmonic convex (or
stable harmonic starlike) mappings in $\mathcal{U}$ are fully convex (or
fully starlike) in $\mathcal{U}.$
In 2014, Nagpal and Ravichandran \cite{Nagpaljkms} studied a class $%
W_{H}^{0} $ of functions $\mathfrak{f}\in \mathcal{H}^{0}$ satisfying the
condition ${\text{Re}}\left[ \mathfrak{s}^{\prime }(z)+z\mathfrak{s}^{\prime
\prime }(z)\right] >\left \vert \mathfrak{t}^{\prime }(z)+z\mathfrak{t}%
^{\prime \prime }(z)\right \vert $ for $z\in \mathcal{U}$ which is harmonic
analogue of the class $W$ defined by Chichra \cite{Chichra} consisting of
functions $\mathfrak{f}\in \mathcal{A}$ satisfying the condition ${\text{Re}}%
\left[ \mathfrak{f}^{\prime }(z)+z\mathfrak{f}^{\prime \prime }(z)\right] >0$
for $z\in \mathcal{U}$ . It is stated that $W_{H}^{0}\subset \mathcal{S}%
_{H}^{\ast ,0}$ and in particular, the members of the class are fully
starlike in $\mathcal{U}.$
Ghosh and Vasudevarao \cite{Ghosh} investigated radius of convexity for the
partial sums of members of the class $W_{H}^{0}\left( \delta \right) $ of
functions $\mathfrak{f}\in \mathcal{H}^{0}$ satisfying the condition \newline
${\text{Re}}\left[ \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}^{\prime
\prime }(z)\right] >\left \vert \mathfrak{t}^{\prime }(z)+\delta z\mathfrak{t%
}^{\prime \prime }(z)\right \vert $ for $\delta \geq 0,$ and $z\in \mathcal{U%
}. $
Further, Rajbala and Prajapat \cite{Rajbala} studied the class $%
W_{H}^{0}\left( \delta ,\lambda \right) $ of functions $\mathfrak{f}\in
\mathcal{H}^{0}$ satisfying the condition ${\text{Re}}\left[ \mathfrak{s}%
^{\prime }(z)+\delta z\mathfrak{s}^{\prime \prime }(z)-\lambda \right]
>\left \vert \mathfrak{t}^{\prime }(z)+\delta z\mathfrak{t}^{\prime \prime
}(z)\right \vert $ for $\delta \geq 0,$ $0\leq \lambda <1,$ and $z\in
\mathcal{U}.$ They constructed harmonic polynomials involving Gaussian
hypergeometric function which belong to the class $W_{H}^{0}\left( \delta
,\lambda \right) .$
Very recently, Ya\c{s}ar and Yal\c{c}\i n \cite{yasar} introduced the class $%
R_{H}^{0}\left( \delta ,\gamma \right) $ of functions $\mathfrak{f}\in
\mathcal{H}^{0}$ satisfying the condition
\begin{equation*}
{\text{Re}}\left[ \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}^{\prime
\prime }(z)+\gamma z^{2}\mathfrak{s}^{\prime \prime \prime }\left( z\right) %
\right] >\left \vert \mathfrak{t}^{\prime }(z)+\delta z\mathfrak{t}^{\prime
\prime }(z)+\gamma z^{2}\mathfrak{t}^{\prime \prime \prime }\left( z\right)
\right \vert
\end{equation*}%
for $\delta \geq \gamma \geq 0,$ $z\in \mathcal{U}.$
In all studies mentioned above \cite{Nagpaljkms, Ghosh, Rajbala, yasar}, it
is proved that the functions in corresponding classes are close-to-convex.
Also, coefficient bounds, growth estimates, and convolution properties of
the classes are obtained.
\bigskip Denote by $\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda ),$ the
class of functions $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in
\mathcal{H}^{0}$ and satisfy%
\begin{equation}
{\text{Re}}\left[ \gamma \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}%
^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{s%
}^{\prime \prime \prime }\left( z\right) -\lambda \right] >\left \vert
\gamma \mathfrak{t}^{\prime }(z)+\delta z\mathfrak{t}^{\prime \prime
}(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{t}^{\prime
\prime \prime }\left( z\right) \right \vert \label{BH}
\end{equation}%
where $0\leq \lambda <\gamma \leq \delta .$
It is evident that $W_{H}^{0}\equiv W_{H}^{0}\left( 1\right) \equiv \mathcal{%
R}_{H}^{0}(1,1,0),$ $W_{H}^{0}\left( 1,\lambda \right) \equiv \mathcal{R}%
_{H}^{0}(1,1,\lambda ),$ $R_{H}^{0}\left( \delta ,\frac{\delta -1}{2}\right)
\equiv \mathcal{R}_{H}^{0}(1,\delta ,0).$
Let $\mathcal{R}(\gamma ,\delta ,\lambda )$ denote a class of functions $%
\mathfrak{f}\in \mathcal{A}$ such that%
\begin{equation}
{\text{Re}}\left \{ \gamma \mathfrak{f}^{\prime }(z)+\delta z\mathfrak{f}%
^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{f%
}^{\prime \prime \prime }\left( z\right) \right \} >\lambda \text{ \ \ }%
\left( 0\leq \lambda <\gamma \leq \delta \right) .
\end{equation}%
The class $\mathcal{R}(\gamma ,\delta ,\lambda )$ is a particular case of
the class which is studied by Al-Refai \cite{Refai}. The starlikeness and
convexity of the class $\mathcal{R}(1,\delta ,\lambda )$ are studied in \cite%
{Rosihan2011, Rosihan2018}.
In this paper, we mainly deal with the functions $\mathfrak{f}=\mathfrak{s}+%
\overline{\mathfrak{t}}$ $\in \mathcal{H}^{0}$ of the class $\mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda )$ which is defined by the third-order
differential inequality (\ref{BH}). In the second section, we prove that the
members of the class $\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$ are
close-to-convex. We also obtain coefficient bounds, growth estimates, and
sufficient coefficient condition of this class. In the third section, we
prove that this class is closed under convex combination and convolution of
its members. In the last section, we investigate the radii of fully
starlikeness and fully convexity of the class $\mathcal{R}_{H}^{0}(\gamma
,\delta ,\lambda ),$ and we give a result due to the class $\mathcal{R}%
_{H}^{0}(1,\delta ,\lambda )$ using previous works \cite{Rosihan2018} and
\cite{Nagpaljkms}.
\section{Close-to-convexity, coefficient bounds, growth estimates}
First, we give a result of Clunie and Sheil-Small \cite{Clunie} which
derives a sufficient condition for $\mathfrak{f}\in \mathcal{H}$ to be
close-to-convex.
\begin{lemma}
Suppose $\mathfrak{s}$ and $\mathfrak{t}$ are analytic in $\mathcal{U}$ with
$\left \vert \mathfrak{t}^{\prime }(0)\right \vert <\left \vert \mathfrak{s}%
^{\prime }(0)\right \vert $ and $F_{\epsilon }=\mathfrak{s}+\epsilon
\mathfrak{t}$ is close-to-convex for each $\epsilon $ $\left( \left \vert
\epsilon \right \vert =1\right) ,$ then $\mathfrak{f}=\mathfrak{s}+\overline{%
\mathfrak{t}}$ is close-to-convex in $\mathcal{U}.$
\end{lemma}
\begin{theorem}
The harmonic mapping $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in
\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$ if and only if$\ F_{\epsilon
}=\mathfrak{s}+\epsilon \mathfrak{t}\in \mathcal{R}(\gamma ,\delta ,\lambda
) $ for each $\epsilon \left( \left \vert \epsilon \right \vert =1\right) .$
\end{theorem}
\begin{proof}
Suppose $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}$ $\in \mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda ).$ For each $\left \vert \epsilon
\right
\vert =1,$
\begin{align*}
& {\text{Re}}\left \{ \gamma F_{\epsilon }^{\prime }(z)+\delta zF_{\epsilon
}^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right)
z^{2}F_{\epsilon }^{\prime \prime \prime }(z)\right \} \\
& ={\text{Re}}\left \{ \gamma \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}%
^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{s%
}^{\prime \prime \prime }\left( z\right) \right. \\
& +\left. \epsilon \left( \gamma \mathfrak{t}^{\prime }(z)+\delta z\mathfrak{%
t}^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}%
\mathfrak{t}^{\prime \prime \prime }\left( z\right) \right) \right \} \\
& >{\text{Re}}\left \{ \gamma \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}%
^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{s%
}^{\prime \prime \prime }\left( z\right) \right \} \\
& -\left \vert \gamma \mathfrak{t}^{\prime }(z)+\delta z\mathfrak{t}^{\prime
\prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{t}%
^{\prime \prime \prime }\left( z\right) \right \vert \\
& >\lambda \text{ \ \ \ \ }\left( z\in \mathcal{U}\right) .
\end{align*}%
Thus, $F_{\epsilon }\in \mathcal{R}(\gamma ,\delta ,\lambda )$ for each $%
\epsilon \left( \left \vert \epsilon \right \vert =1\right) .$ Conversely,
let $F_{\epsilon }=\mathfrak{s}+\epsilon \mathfrak{t}\in \mathcal{R}(\gamma
,\delta ,\lambda )$ then%
\begin{eqnarray*}
&&{\text{Re}}\left \{ \gamma \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}%
^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{s%
}^{\prime \prime \prime }\left( z\right) \right \} \\
&>&{\text{Re}}\left \{ -\epsilon \left( \gamma \mathfrak{t}^{\prime
}(z)+\delta z\mathfrak{t}^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2%
}\right) z^{2}\mathfrak{t}^{\prime \prime \prime }\left( z\right) \right)
\right \} +\lambda \text{ }\left( z\in \mathcal{U}\right) .
\end{eqnarray*}%
With appropriate choice of $\epsilon \left( \left \vert \epsilon
\right
\vert =1\right) ,$ it follows that%
\begin{eqnarray*}
&&{\text{Re}}\left \{ \gamma \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}%
^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{s%
}^{\prime \prime \prime }\left( z\right) -\lambda \right \} \\
&>&\left \vert \gamma \mathfrak{t}^{\prime }(z)+\delta z\mathfrak{t}^{\prime
\prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{t}%
^{\prime \prime \prime }\left( z\right) \right \vert \text{ }\left( z\in
\mathcal{U}\right) ,
\end{eqnarray*}%
and hence $\mathfrak{f}\in \mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda ).$
\end{proof}
\begin{lemma}
(Jack-Miller-Mocanu Lemma \cite{Jack-Miller lemma, Miller}) Let $w$ defined
by $w(z)=c_{n}z^{n}+c_{n+1}z^{n+1}+...$ be analytic in $\mathcal{U},$ with $%
c_{n}\neq 0,$ and let $z_{0}\neq 0,~z_{0}=r_{0}e^{i\theta _{0}}(0<r_{0}<1)$
be a point of $\mathcal{U}$ such that
\begin{equation*}
|w(z_{0})|=\max_{|z|\leq |z_{0}|}|w(z)|
\end{equation*}%
then there is a real number $k,$ $k\geq n\geq 1,$ such that
\begin{equation*}
\frac{z_{0}w^{\prime }(z_{0})}{w(z_{0})}=k\text{ \ and \ }{\text{Re}}\left
\{ 1+\frac{z_{0}w^{\prime \prime }(z_{0})}{w^{\prime }(z_{0})}\right \} \geq
k.
\end{equation*}
\end{lemma}
\begin{lemma}
If $F\in \mathcal{R}(\gamma ,\delta ,\lambda )$ then ${\text{Re}}\{F^{\prime
}(z)\}>0,$ and hence $F$ is close-to-convex in $\mathcal{U}.$
\end{lemma}
\begin{proof}
Suppose $F\in \mathcal{R}(\gamma ,\delta ,\lambda )$ and $\frac{2\gamma
F^{\prime }(z)+2\delta zF^{\prime \prime }(z)+\left( \delta -\gamma \right)
z^{2}F^{\prime \prime \prime }(z)-2\lambda }{2\left( \gamma -\lambda \right)
}=:\Psi (z).$ Then ${\text{Re}}\{ \Psi (z)\}>0$ for $z\in \mathcal{U}.$
Consider an analytic function $w$ in $\mathcal{U}$ with $w(0)=0$ and%
\begin{equation*}
F^{\prime }(z)=\frac{1+w(z)}{1-w(z)},~\ w(z)\neq 1.
\end{equation*}%
We need to prove that $|w(z)|<1$ for all $z\in \mathcal{U}.$ Then we have%
\begin{eqnarray*}
\Psi (z) &=&\frac{2\gamma F^{\prime }(z)+2\delta zF^{\prime \prime
}(z)+\left( \delta -\gamma \right) z^{2}F^{\prime \prime \prime
}(z)-2\lambda }{2\left( \gamma -\lambda \right) } \\
&=&\frac{\gamma }{\gamma -\lambda }\frac{1+w(z)}{1-w(z)}+\frac{2\delta }{%
\gamma -\lambda }\frac{zw^{\prime }(z)}{(1-w(z))^{2}} \\
&&+\frac{\delta -\gamma }{\gamma -\lambda }\frac{z^{2}\left[ w^{\prime
\prime }\left( z\right) \left( 1-w(z)\right) +2\left( w^{\prime }\left(
z\right) \right) ^{2}\right] }{(1-w(z))^{3}}-\frac{\lambda }{\gamma -\lambda
} \\
&=&\frac{1}{\gamma -\lambda }\left( \gamma \frac{1+w(z)}{1-w(z)}+2\delta
\frac{zw^{\prime }(z)}{(1-w(z))^{2}}\right. \\
&&\left. +\left( \delta -\gamma \right) \frac{zw^{\prime }(z)}{(1-w(z))^{2}}%
\frac{zw^{\prime \prime }\left( z\right) }{w^{\prime }(z)}+2\left( \delta
-\gamma \right) \frac{\left( zw^{\prime }(z)\right) ^{2}}{(1-w(z))^{3}}%
-\lambda \right) .
\end{eqnarray*}%
Since $w$ is analytic in $\mathcal{U}$ and $w(0)=0,$ if there are $z_{0}\in
\mathcal{U}$ such that
\begin{equation*}
\max_{|z|\leq |z_{0}|}|w(z)|=|w(z_{0})|=1,
\end{equation*}%
then by Lemma 3, we can write
\begin{equation*}
w(z_{0})=e^{i\theta },\quad z_{0}w^{\prime }(z_{0})=kw(z_{0})=ke^{i\theta
},\quad (k\geq 1,\text{ }0<\theta <2\pi ).
\end{equation*}%
and%
\begin{equation*}
\text{Re}\left \{ \frac{z_{0}w^{\prime \prime }(z_{0})}{w^{\prime }(z_{0})}%
\right \} \geq k-1.
\end{equation*}%
For such a point $z_{0}\in \mathcal{U}$, we obtain%
\begin{eqnarray*}
{\text{Re}}\{ \Psi (z_{0})\} &=&\frac{1}{\gamma -\lambda }\text{Re}\left(
\gamma \frac{1+w(z_{0})}{1-w(z_{0})}+2\delta \frac{z_{0}w^{\prime }(z_{0})}{%
(1-w(z_{0}))^{2}}\right. \\
&&\left. +\left( \delta -\gamma \right) \frac{z_{0}w^{\prime }(z_{0})}{%
(1-w(z_{0}))^{2}}\frac{z_{0}w^{\prime \prime }\left( z_{0}\right) }{%
w^{\prime }(z_{0})}+2\left( \delta -\gamma \right) \frac{\left(
z_{0}w^{\prime }(z_{0})\right) ^{2}}{(1-w(z_{0}))^{3}}-\lambda \right) \\
&=&\frac{1}{\gamma -\lambda }\left[ -\frac{\delta k}{1-\cos \theta }-\frac{%
\left( \delta -\gamma \right) k}{2\left( 1-\cos \theta \right) }\text{Re}%
\left \{ \frac{zw^{\prime \prime }\left( z_{0}\right) }{w^{\prime }(z_{0})}%
\right \} +\frac{\left( \delta -\gamma \right) k^{2}}{2\left( 1-\cos \theta
\right) }-\lambda \right] \\
&\leq &\frac{1}{\gamma -\lambda }\left[ -\frac{\delta k}{1-\cos \theta }+%
\frac{\left( \delta -\gamma \right) k}{2\left( 1-\cos \theta \right) }\left(
1-k\right) +\frac{\left( \delta -\gamma \right) k^{2}}{2\left( 1-\cos \theta
\right) }-\lambda \right] \\
&=&-\frac{1}{\gamma -\lambda }\left[ \frac{\left( \delta +\gamma \right) k}{%
2\left( 1-\cos \theta \right) }+\lambda \right] <0,
\end{eqnarray*}%
which contradicts our assumption. Hence, there is no $z_{0}\in \mathcal{U}$
such that $|w(z_{0})|=1,$ which means that $|w(z)|<1$ for all $z\in \mathcal{%
U}.$ Therefore, we obtain that ${\text{Re}}\{F^{\prime }(z)\}>0.$
\end{proof}
\begin{theorem}
The functions in the class $\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$
are close-to-convex in $\mathcal{U}.$
\end{theorem}
\begin{proof}
Referring to Lemma 4, we derive that functions $F_{\epsilon }=\mathfrak{s}%
+\epsilon \mathfrak{t}\in \mathcal{R}(\gamma ,\delta ,\lambda )$ are
close-to-convex in $\mathcal{U}$ for each $\epsilon (|\epsilon |=1).$ Now in
view of Lemma 1 and Theorem 2, we obtain that functions in $\mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda )$ are close-to-convex in $\mathcal{U}.$
\end{proof}
\begin{theorem}
Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda )$ then for $m\geq 2,$%
\begin{equation}
\left \vert b_{m}\right \vert \leq \frac{2\left( \gamma -\lambda \right) }{%
m^{2}\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)\right] }.
\label{boundbn}
\end{equation}%
The result is sharp and equality holds for the function $\mathfrak{f}(z)=z+%
\frac{2\left( \gamma -\lambda \right) }{m^{2}\left[ 2\gamma +\left( \delta
-\gamma \right) (m-1)\right] }\bar{z}^{m}.$
\end{theorem}
\begin{proof}
Suppose that $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{R%
}_{H}^{0}(\gamma ,\delta ,\lambda ).$ Using the series representation of $%
\mathfrak{t}(z),$ we derive%
\begin{eqnarray*}
&&r^{m-1}m^{2}\left[ \gamma +\frac{\delta -\gamma }{2}(m-1)\right] \left
\vert b_{m}\right \vert \\
&\leq &\frac{1}{2\pi }\int \limits_{0}^{2\pi }\left \vert \gamma \mathfrak{t}%
^{\prime }(re^{i\theta })+\delta re^{i\theta }\mathfrak{t}^{\prime \prime
}(re^{i\theta })+\left( \frac{\delta -\gamma }{2}\right) r^{2}e^{2i\theta }%
\mathfrak{t}^{\prime \prime \prime }(re^{i\theta })\right \vert d\theta \\
&<&\frac{1}{2\pi }\int \limits_{0}^{2\pi }{\text{Re}}\left \{ \gamma
\mathfrak{s}^{\prime }(re^{i\theta })+\delta re^{i\theta }\mathfrak{s}%
^{\prime \prime }(re^{i\theta })+\left( \frac{\delta -\gamma }{2}\right)
r^{2}e^{2i\theta }\mathfrak{s}^{\prime \prime \prime }(re^{i\theta
})-\lambda \right \} d\theta \\
&=&\frac{1}{2\pi }\int \limits_{0}^{2\pi }{\text{Re}}\left \{ \gamma
-\lambda +\sum \limits_{m=2}^{\infty }m^{2}\left[ \gamma +\frac{\delta
-\gamma }{2}(m-1)\right] a_{m}r^{m-1}e^{i(m-1)\theta }\right \} d\theta \\
&=&\gamma -\lambda .
\end{eqnarray*}%
Allowing $r\rightarrow 1^{-}$ gives the desired bound. Moreover, it is easy
to verify that the equality holds for the function $\mathfrak{f}(z)=z+\frac{%
2\left( \gamma -\lambda \right) }{m^{2}\left[ 2\gamma +\left( \delta -\gamma
\right) (m-1)\right] }\bar{z}^{m}.$
\end{proof}
\begin{theorem}
Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda )$. Then for $m\geq 2,$ we have%
\begin{align*}
\text{ \ \ \ \ \ \ \ }(i)\text{ }\left \vert a_{m}\right \vert +\left \vert
b_{m}\right \vert & \leq \frac{4\left( \gamma -\lambda \right) }{m^{2}\left[
2\gamma +\left( \delta -\gamma \right) (m-1)\right] }, \\
\text{ \ \ \ \ \ \ }(ii)\text{ }\left \vert \left \vert a_{m}\right \vert
-\left \vert b_{m}\right \vert \right \vert & \leq \frac{4\left( \gamma
-\lambda \right) }{m^{2}\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)%
\right] }, \\
(iii)\text{ }\left \vert a_{m}\right \vert & \leq \frac{4\left( \gamma
-\lambda \right) }{m^{2}\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)%
\right] }.
\end{align*}%
All these results are sharp and all equalities hold for the function $%
\mathfrak{f}(z)=z+\sum \limits_{m=2}^{\infty }\frac{4\left( \gamma -\lambda
\right) }{m^{2}\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)\right] }%
z^{m}.$
\end{theorem}
\begin{proof}
$(i)$ Suppose that $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in
\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda ),$ then from Theorem 2, $%
F_{\epsilon }=\mathfrak{s}+\epsilon \mathfrak{t}\in \mathcal{R}(\gamma
,\delta ,\lambda )\ $for $\epsilon $ $\left( \left \vert \epsilon
\right
\vert =1\right) .$ Thus for each $\left \vert \epsilon \right \vert
=1,$ we have
\begin{equation*}
\text{Re}\left \{ \gamma (\mathfrak{s}+\epsilon \mathfrak{t})^{\prime
}+\delta z(\mathfrak{s}+\epsilon \mathfrak{t})^{\prime \prime }+\left( \frac{%
\delta -\gamma }{2}\right) z^{2}(\mathfrak{s}+\epsilon \mathfrak{t})^{\prime
\prime \prime }\right \} >\lambda
\end{equation*}%
for $z\in \mathcal{U}.$ This implies that there exists an analytic function $%
p$ of the form $p(z)=1+\underset{m=1}{\overset{\infty }{\sum }}p_{m}z^{m},$
with Re$\left[ p(z)\right] >0$ in $\mathcal{U}$ such that
\begin{align}
& \gamma \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}^{\prime \prime
}(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{s}^{\prime
\prime \prime }\left( z\right) +\epsilon \left( \gamma \mathfrak{t}^{\prime
}(z)+\delta z\mathfrak{t}^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2%
}\right) z^{2}\mathfrak{t}^{\prime \prime \prime }\left( z\right) \right)
\notag \\
& =\lambda +\left( \gamma -\lambda \right) p(z). \label{eqp}
\end{align}%
Comparing coefficients on both sides of (\ref{eqp}) we have%
\begin{equation*}
m^{2}\left[ \gamma +\frac{\delta -\gamma }{2}(m-1)\right] (a_{m}+\epsilon
b_{m})=\left( \gamma -\lambda \right) p_{m-1}\text{ for }m\geq 2.
\end{equation*}%
Since $\left \vert p_{m}\right \vert \leq 2$ for $m\geq 1,$ and $\epsilon
\left( \left \vert \epsilon \right \vert =1\right) $ is arbitrary, proof of
(i) is complete. Proofs of (ii) and (iii) follows from (i). The function $%
\mathfrak{f}(z)=z+$ $\sum \limits_{m=2}^{\infty }\frac{4\left( \gamma
-\lambda \right) }{m^{2}\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)%
\right] }z^{m}$, shows that all inequalities are sharp.
\end{proof}
The following result gives a sufficient condition for a function to be in
the class $\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda ).$
\begin{theorem}
Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{H}^{0}$
with
\begin{equation}
\sum \limits_{m=2}^{\infty }m^{2}\left[ 2\gamma +\left( \delta -\gamma
\right) (m-1)\right] \left( \left \vert a_{m}\right \vert +\left \vert
b_{m}\right \vert \right) \leq 2\left( \gamma -\lambda \right) ,
\label{coeffcond}
\end{equation}%
then $\mathfrak{f}\in \mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda ).$
\end{theorem}
\begin{proof}
Suppose that $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{H%
}^{0}.$ Then using (\ref{coeffcond}),
\begin{eqnarray*}
&&{\text{Re}}\left \{ \gamma \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}%
^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{s%
}^{\prime \prime \prime }\left( z\right) -\lambda \right \} \\
&=&{\text{Re}}\left \{ \gamma -\lambda +\sum \limits_{m=2}^{\infty }m^{2}%
\left[ \gamma +\frac{\delta -\gamma }{2}(m-1)\right] a_{m}z^{m-1}\right \} \\
&>&\gamma -\lambda -\sum \limits_{m=2}^{\infty }m^{2}\left[ \gamma +\frac{%
\delta -\gamma }{2}(m-1)\right] \left \vert a_{m}\right \vert \\
&\geq &\sum \limits_{m=2}^{\infty }m^{2}\left[ \gamma +\frac{\delta -\gamma
}{2}(m-1)\right] \left \vert b_{m}\right \vert \\
&>&\left \vert \sum \limits_{m=2}^{\infty }m^{2}\left[ \gamma +\frac{\delta
-\gamma }{2}(m-1)\right] b_{m}z^{m-1}\right \vert \\
&=&\left \vert \gamma \mathfrak{t}^{\prime }(z)+\delta z\mathfrak{t}^{\prime
\prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{t}%
^{\prime \prime \prime }\left( z\right) \right \vert .
\end{eqnarray*}%
Hence, $\mathfrak{f}\in \mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda ).$
\end{proof}
\begin{corollary}
Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{H}^{0}$
satisfies the inequality (\ref{coeffcond}), then f is stable harmonic
close-to-convex in $\mathcal{U}$.
\end{corollary}
\begin{theorem}
\label{theodist} Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}$ $%
\in \mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda ).$ Then%
\begin{equation*}
\left \vert z\right \vert +4\left( \gamma -\lambda \right) \sum
\limits_{m=2}^{\infty }\frac{(-1)^{m-1}\left \vert z\right \vert ^{m}}{m^{2}%
\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)\right] }\leq \left \vert
\mathfrak{f}(z)\right \vert ,
\end{equation*}%
\begin{equation*}
\left \vert \mathfrak{f}(z)\right \vert \leq \left \vert z\right \vert
+4\left( \gamma -\lambda \right) \sum \limits_{m=2}^{\infty }\frac{\left
\vert z\right \vert ^{m}}{m^{2}\left[ 2\gamma +\left( \delta -\gamma \right)
(m-1)\right] }.
\end{equation*}%
Inequalities are sharp for the function $f(z)=z+\sum \limits_{m=2}^{\infty }%
\frac{4\left( \gamma -\lambda \right) }{m^{2}\left[ 2\gamma +\left( \delta
-\gamma \right) (m-1)\right] }\overline{z}^{m}.$
\end{theorem}
\begin{proof}
Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}$ $\in \mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda ).$ Then using Theorem 2\textbf{,} $%
F_{\epsilon }\in \mathcal{R}(\gamma ,\delta ,\lambda )\ $and for each $%
\left
\vert \epsilon \right \vert =1$ we have $\text{Re}\left \{ \psi
(z)\right \} >\lambda $ where%
\begin{equation*}
\psi (z)=\gamma F_{\epsilon }^{\prime }(z)+\delta zF_{\epsilon }^{\prime
\prime }(z)+\frac{\delta -\gamma }{2}z^{2}F_{\epsilon }^{\prime \prime
\prime }(z).
\end{equation*}%
Then, we have
\begin{eqnarray*}
\psi (z) &=&\left( \frac{\delta -\gamma }{2}\right) \left[ \frac{2\gamma }{%
\delta -\gamma }F_{\epsilon }^{\prime }(z)+\left( \frac{2\gamma }{\delta
-\gamma }+2\right) zF_{\epsilon }^{\prime \prime }(z)+z^{2}F_{\epsilon
}^{\prime \prime \prime }(z)\right] \\
&=&\left( \frac{\delta -\gamma }{2}\right) \left[ \frac{2\gamma }{\delta
-\gamma }\left( zF_{\epsilon }^{\prime }(z)\right) ^{\prime }+\left(
z^{2}F_{\epsilon }^{\prime \prime }(z)\right) ^{\prime }\right] \\
&=&\left( \frac{\delta -\gamma }{2}\right) \left[ \frac{2\gamma }{\delta
-\gamma }\left( zF_{\epsilon }^{\prime }(z)\right) +\left( z^{2}F_{\epsilon
}^{\prime \prime }(z)\right) \right] ^{\prime } \\
&=&\left( \frac{\delta -\gamma }{2}\right) \left[ z^{2-\frac{2\gamma }{%
\delta -\gamma }}\left( z^{\frac{2\gamma }{\delta -\gamma }}F_{\epsilon
}^{\prime }(z)\right) ^{\prime }\right] ^{\prime }.
\end{eqnarray*}%
Then integrating from $0$ to $z$ gives%
\begin{equation*}
\left( \frac{2}{\delta -\gamma }\right) z^{\frac{2\gamma }{\delta -\gamma }%
-2}\int \limits_{0}^{z}\psi (\omega )d\omega =\left( z^{\frac{2\gamma }{%
\delta -\gamma }}F_{\epsilon }^{\prime }(z)\right) ^{\prime }.
\end{equation*}%
Making the substitution $\omega =r^{\frac{\delta -\gamma }{2}}z$ in the
above integral and integrating again, change of variables gives%
\begin{equation}
F_{\epsilon }^{\prime }(z)=\frac{1}{\gamma }\int \limits_{0}^{1}\int
\limits_{0}^{1}\psi (v^{\frac{\delta -\gamma }{2\gamma }}uz)dudv.
\label{doubleint}
\end{equation}%
On the other hand, since Re$\left \{ \frac{\psi (z)-\lambda }{\gamma
-\lambda }\right \} >0$ then $\psi (z)\prec $ $\frac{\gamma +\left( \gamma
-2\lambda \right) z}{1-z}$ where $\prec $ denotes the subordination \cite%
{Duren}. Let
\begin{equation*}
\phi (z)=\int \limits_{0}^{1}\int \limits_{0}^{1}\frac{dudv}{1-uv^{\frac{%
\delta -\gamma }{2\gamma }}z}=1+\sum \limits_{m=1}^{\infty }\frac{z^{m}}{%
(1+m)\left( 1+\frac{\delta -\gamma }{2\gamma }m\right) }
\end{equation*}%
and
\begin{equation*}
h(z)=\frac{1}{\gamma }\left( \frac{\gamma +\left( \gamma -2\lambda \right) z%
}{1-z}\right) =1+\sum \limits_{m=1}^{\infty }\frac{2\left( \gamma -\lambda
\right) }{\gamma }z^{m}.
\end{equation*}%
Then, from (\ref{doubleint}) we have
\begin{eqnarray*}
F_{\epsilon }^{\prime }(z) &\prec &(\phi \ast h)(z) \\
&=&\left( 1+\sum \limits_{m=1}^{\infty }\frac{z^{m}}{(1+m)\left( 1+\frac{%
\delta -\gamma }{2\gamma }m\right) }\right) \ast \left( 1+\sum
\limits_{m=1}^{\infty }\frac{2\left( \gamma -\lambda \right) }{\gamma }%
z^{m}\right) \\
&=&1+\sum \limits_{m=1}^{\infty }\frac{4\left( \gamma -\lambda \right) }{%
m^{2}\left( \delta -\gamma \right) +m\left( \delta +\gamma \right) +2\gamma }%
z^{m}.
\end{eqnarray*}%
Since
\begin{eqnarray*}
\left \vert F_{\epsilon }^{\prime }(z)\right \vert &=&\left \vert \mathfrak{s%
}^{\prime }(z)+\epsilon \mathfrak{t}^{\prime }(z)\right \vert \\
&\leq &1+4\left( \gamma -\lambda \right) \sum \limits_{m=1}^{\infty }\frac{%
\left \vert z\right \vert ^{m}}{m^{2}\left( \delta -\gamma \right) +m\left(
\delta +\gamma \right) +2\gamma }
\end{eqnarray*}%
and%
\begin{eqnarray*}
\left \vert F_{\epsilon }^{\prime }(z)\right \vert &=&\left \vert \mathfrak{s%
}^{\prime }(z)+\epsilon \mathfrak{t}^{\prime }(z)\right \vert \\
&\geq &1+4\left( \gamma -\lambda \right) \sum \limits_{m=1}^{\infty }\frac{%
(-1)^{m}\left \vert z\right \vert ^{m}}{m^{2}\left( \delta -\gamma \right)
+m\left( \delta +\gamma \right) +2\gamma },
\end{eqnarray*}%
in particular we have
\begin{equation*}
\left \vert \mathfrak{s}^{\prime }(z)\right \vert +\left \vert \mathfrak{t}%
^{\prime }(z)\right \vert \leq 1+4\left( \gamma -\lambda \right) \sum
\limits_{m=1}^{\infty }\frac{\left \vert z\right \vert ^{m}}{m^{2}\left(
\delta -\gamma \right) +m\left( \delta +\gamma \right) +2\gamma }
\end{equation*}%
and%
\begin{equation*}
\left \vert \mathfrak{s}^{\prime }(z)\right \vert -\left \vert \mathfrak{t}%
^{\prime }(z)\right \vert \geq 1+4\left( \gamma -\lambda \right) \sum
\limits_{m=1}^{\infty }\frac{(-1)^{m}\left \vert z\right \vert ^{m}}{%
m^{2}\left( \delta -\gamma \right) +m\left( \delta +\gamma \right) +2\gamma }%
.
\end{equation*}%
Let $\Gamma $ be the radial segment from $0$ to $z,$ then%
\begin{eqnarray*}
\left \vert \mathfrak{f}(z)\right \vert &=&\left \vert \int \limits_{\Gamma }%
\frac{\partial \mathfrak{f}}{\partial \zeta }d\zeta +\frac{\partial
\mathfrak{f}}{\partial \bar{\zeta}}d\bar{\zeta}\right \vert \leq \int
\limits_{\Gamma }\left( \left \vert \mathfrak{s}^{\prime }(\zeta )\right
\vert +\left \vert \mathfrak{t}^{\prime }(\zeta )\right \vert \right) \left
\vert d\zeta \right \vert \\
&\leq &\int \limits_{0}^{\left \vert z\right \vert }\left( 1+4\left( \gamma
-\lambda \right) \sum \limits_{m=1}^{\infty }\frac{\left \vert \tau \right
\vert ^{m}}{m^{2}\left( \delta -\gamma \right) +m\left( \delta +\gamma
\right) +2\gamma }\right) d\tau \\
&=&\left \vert z\right \vert +4\left( \gamma -\lambda \right) \sum
\limits_{m=1}^{\infty }\frac{\left \vert z\right \vert ^{m+1}}{(m+1)\left[
m^{2}\left( \delta -\gamma \right) +m\left( \delta +\gamma \right) +2\gamma %
\right] } \\
&=&\left \vert z\right \vert +4\left( \gamma -\lambda \right) \sum
\limits_{m=2}^{\infty }\frac{\left \vert z\right \vert ^{m}}{m\left[ \left(
m-1\right) ^{2}\left( \delta -\gamma \right) +\left( m-1\right) \left(
\delta +\gamma \right) +2\gamma \right] } \\
&=&\left \vert z\right \vert +4\left( \gamma -\lambda \right) \sum
\limits_{m=2}^{\infty }\frac{\left \vert z\right \vert ^{m}}{m^{2}\left[
2\gamma +\left( \delta -\gamma \right) \left( m-1\right) \right] }
\end{eqnarray*}%
and
\begin{eqnarray*}
\left \vert \mathfrak{f}(z)\right \vert &\geq &\int \limits_{\Gamma }\left(
\left \vert \mathfrak{s}^{\prime }(\zeta )\right \vert -\left \vert
\mathfrak{t}^{\prime }(\zeta )\right \vert \right) \left \vert d\zeta \right
\vert \\
&\geq &\int \limits_{0}^{\left \vert z\right \vert }\left( 1+4\left( \gamma
-\lambda \right) \sum \limits_{m=1}^{\infty }\frac{(-1)^{m}\left \vert \tau
\right \vert ^{m}}{m^{2}\left( \delta -\gamma \right) +m\left( \delta
+\gamma \right) +2\gamma }\right) d\tau \\
&=&\left \vert z\right \vert +4\left( \gamma -\lambda \right) \sum
\limits_{m=2}^{\infty }\frac{(-1)^{m-1}\left \vert z\right \vert ^{m}}{m^{2}%
\left[ 2\gamma +\left( \delta -\gamma \right) \left( m-1\right) \right] }.
\end{eqnarray*}
\end{proof}
\section{Convex Combinations and Convolutions}
In this section, we prove that the class $\mathcal{R}_{H}^{0}(\gamma ,\delta
,\lambda )$ is closed under convex combinations and convolutions of its
members.
\begin{theorem}
The class $\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$ is closed under
convex combinations.
\end{theorem}
\begin{proof}
Suppose $\mathfrak{f}_{i}=\mathfrak{s}_{i}+\overline{\mathfrak{t}_{i}}\in
\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$ for $i=1,2,...,n$ and $\sum
\limits_{i=1}^{n}\varrho _{i}=1$ $(0\leq \varrho _{i}\leq 1).$ The convex
combination of functions $\mathfrak{f}_{i}$ $\left( i=1,2,...,n\right) $ may
be written as%
\begin{equation*}
\mathfrak{f}(z)=\sum \limits_{i=1}^{n}\varrho _{i}\mathfrak{f}_{i}(z)=%
\mathfrak{s}(z)+\overline{\mathfrak{t}(z)},
\end{equation*}%
where
\begin{equation*}
\mathfrak{s}(z)=\sum \limits_{i=1}^{n}\varrho _{i}\mathfrak{s}_{i}\left(
z\right) \text{ \ and \ }\mathfrak{t}(z)=\sum \limits_{i=1}^{n}\varrho _{i}%
\mathfrak{t}_{i}\left( z\right) .
\end{equation*}%
Then both $\mathfrak{s}$ and $\mathfrak{t}$ are analytic in $\mathcal{U}$
with $\mathfrak{s}(0)=\mathfrak{t}(0)=\mathfrak{s}^{\prime }(0)-1=\mathfrak{t%
}^{\prime }(0)=0$ and%
\begin{eqnarray*}
&&{\text{Re}}\{ \gamma \mathfrak{s}^{\prime }(z)+\delta z\mathfrak{s}%
^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{s%
}^{\prime \prime \prime }\left( z\right) -\lambda \} \\
&=&{\text{Re}}\left \{ \sum \limits_{i=1}^{n}\varrho _{i}\left( \gamma
\mathfrak{s}_{i}^{\prime }(z)+\delta z\mathfrak{s}_{i}^{\prime \prime
}(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{s}_{i}^{\prime
\prime \prime }\left( z\right) -\lambda \right) \right \} \\
&>&\sum \limits_{i=1}^{n}\varrho _{i}\left \vert \gamma \mathfrak{t}%
_{i}^{\prime }(z)+\delta z\mathfrak{t}_{i}^{\prime \prime }(z)+\left( \frac{%
\delta -\gamma }{2}\right) z^{2}\mathfrak{t}_{i}^{\prime \prime \prime
}\left( z\right) \right \vert \\
&\geq &\left \vert \gamma \mathfrak{t}^{\prime }(z)+\delta z\mathfrak{t}%
^{\prime \prime }(z)+\left( \frac{\delta -\gamma }{2}\right) z^{2}\mathfrak{t%
}^{\prime \prime \prime }\left( z\right) \right \vert
\end{eqnarray*}%
showing that $\mathfrak{f}\in \mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$.
\end{proof}
A sequence $\{c_{m}\}_{m=0}^{\infty }$ of non-negative real numbers is said
to be a convex null sequence, if $c_{m}\rightarrow 0$ as $m\rightarrow
\infty $, and $c_{0}-c_{1}\geq c_{1}-c_{2}\geq c_{2}-c_{3}\geq ...\geq
c_{m-1}-c_{m}\geq ...\geq 0.$ To prove results for convolution, we shall
need the following Lemma 12 and Lemma 13.
\begin{lemma}
\cite{Fejer} If $\{c_{m}\}_{m=0}^{\infty }$ be a convex null sequence, then
function
\begin{equation*}
q(z)=\dfrac{c_{0}}{2}+\sum_{m=1}^{\infty }c_{m}z^{m}
\end{equation*}%
is analytic and ${\text{Re}}\{q(z)\}>0$ in $\mathcal{U}.$
\end{lemma}
\begin{lemma}
\cite{Singh} Let the function $p$ be analytic in $\mathcal{U}$ with $p(0)=1$
and ${\text{Re}}\{p(z)\}>1/2$ in $\mathcal{U}.$ Then for any analytic
function $F$ in $\mathcal{U},$ the function $p\ast F$ takes values in the
convex hull of the image of $\mathcal{U}$ under $F.$
\end{lemma}
\begin{lemma}
Let $F\in \mathcal{R}(\gamma ,\delta ,\lambda ),$ then ${\text{Re}}\left \{
\dfrac{F(z)}{z}\right \} >\dfrac{1}{2}.$
\end{lemma}
\begin{proof}
Suppose $F\in \mathcal{R}(\gamma ,\delta ,\lambda )$ be given by $%
F(z)=z+\sum_{m=2}^{\infty }A_{m}z^{m},$ then%
\begin{equation*}
{\text{Re}}\left \{ \gamma +\sum_{m=2}^{\infty }m^{2}\left[ \gamma +\frac{%
\delta -\gamma }{2}(m-1)\right] A_{m}z^{m-1}\right \} >\lambda \quad (z\in
\mathcal{U}),
\end{equation*}%
which is equivalent to ${\text{Re}}\{p(z)\}>\frac{1}{2}$ in $\mathcal{U},$
where
\begin{equation*}
p(z)=1+\frac{1}{4\left( \gamma -\lambda \right) }\sum_{m=2}^{\infty }m^{2}%
\left[ 2\gamma +\left( \delta -\gamma \right) \left( m-1\right) \right]
A_{m}z^{m-1}.
\end{equation*}%
Now consider a sequence $\{c_{m}\}_{m=0}^{\infty }$ defined by
\begin{equation*}
c_{0}=1\text{ and }c_{m-1}=\dfrac{4\left( \gamma -\lambda \right) }{m^{2}%
\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)\right] }\text{ \ for \ }%
m\geq 2.
\end{equation*}%
It can be easily seen that the sequence $\{c_{m}\}_{m=0}^{\infty }$ is a
convex null sequence. Using Lemma 12, this implies that the function
\begin{equation*}
q(z)=\frac{1}{2}+\sum_{m=2}^{\infty }\dfrac{4\left( \gamma -\lambda \right)
}{m^{2}\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)\right] }z^{m-1}
\end{equation*}%
is analytic and ${\text{Re}}\{q(z)\}>0$ in $\mathcal{U}.$ Writing%
\begin{equation*}
\frac{F(z)}{z}=p(z)\ast \left( 1+\sum_{m=2}^{\infty }\dfrac{4\left( \gamma
-\lambda \right) }{m^{2}\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)%
\right] }z^{m-1}\right) ,
\end{equation*}%
and making use of Lemma 13 gives that ${\text{Re}}\left \{ \dfrac{F(z)}{z}%
\right \} >\dfrac{1}{2}$ for $z\in \mathcal{U}.$
\end{proof}
\begin{lemma}
Let $F_{i}\in \mathcal{R}(\gamma ,\delta ,\lambda )$ for $i=1,2.$ Then $%
F_{1}\ast F_{2}$ $\in $ $\mathcal{R}(\gamma ,\delta ,\lambda ).$
\end{lemma}
\begin{proof}
Suppose $F_{1}(z)=z+\sum_{m=2}^{\infty }A_{m}z^{m}$ \ and \ $%
F_{2}(z)=z+\sum_{m=2}^{\infty }B_{m}z^{m}.$ Then the convolution of $%
F_{1}(z) $ and $F_{2}(z)$ is defined by%
\begin{equation*}
F(z)=(F_{1}\ast F_{2})(z)=z+\sum_{m=2}^{\infty }A_{m}B_{m}z^{m}.
\end{equation*}%
Since $F^{\prime }(z)=F_{1}^{\prime }(z)\ast \frac{F_{2}(z)}{z}$, $%
zF^{\prime \prime }(z)=zF_{1}^{\prime \prime }(z)\ast \frac{F_{2}(z)}{z}$\
and $zF^{\prime \prime \prime }(z)=zF_{1}^{\prime \prime \prime }(z)\ast
\frac{F_{2}(z)}{z}$ then we have%
\begin{eqnarray}
&&\frac{2\gamma F^{\prime }(z)+2\delta zF^{\prime \prime }(z)+\left( \delta
-\gamma \right) z^{2}F^{\prime \prime \prime }\left( z\right) -2\lambda }{%
2\left( \gamma -\lambda \right) } \notag \\
&=&\left( \frac{2\gamma F_{1}^{\prime }(z)+2\delta zF_{1}^{\prime \prime
}(z)+\left( \delta -\gamma \right) z^{2}F_{1}^{\prime \prime \prime }\left(
z\right) -2\lambda }{2\left( \gamma -\lambda \right) }\right) \ast \dfrac{%
F_{2}(z)}{z}. \label{eqconv}
\end{eqnarray}%
Since $F_{1}\in $ $\mathcal{R}(\gamma ,\delta ,\lambda ),$
\begin{equation*}
{\text{Re}}\left \{ \frac{2\gamma F_{1}^{\prime }(z)+2\delta zF_{1}^{\prime
\prime }(z)+\left( \delta -\gamma \right) z^{2}F_{1}^{\prime \prime \prime
}\left( z\right) -2\lambda }{2\left( \gamma -\lambda \right) }\right \} >0%
\text{ }\left( z\in \mathcal{U}\right)
\end{equation*}%
and using Lemma 14, ${\text{Re}}\left \{ \dfrac{F_{2}(z)}{z}\right \} >%
\dfrac{1}{2}$ \ in $\mathcal{U}.$ Now applying Lemma 13 to (\ref{eqconv})
yields ${\text{Re}}\left( \frac{2\gamma F^{\prime }(z)+2\delta zF^{\prime
\prime }(z)+\left( \delta -\gamma \right) z^{2}F^{\prime \prime \prime
}\left( z\right) -2\lambda }{2\left( \gamma -\lambda \right) }\right) >0$ in
$\mathcal{U}.$ Thus, $F=F_{1}\ast F_{2}$ $\in $ $\mathcal{R}(\gamma ,\delta
,\lambda ).$
\end{proof}
Now using Lemma 15, we prove that the class $\mathcal{R}_{H}^{0}(\gamma
,\delta ,\lambda )$ is closed under convolutions of its members. We make use
of the techniques and methodology introduced by Dorff \cite{Dorff} for
convolution.
\begin{theorem}
Let $\mathfrak{f}_{i}\in \mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$ for $%
i=1,2.$ Then $\mathfrak{f}_{1}\ast \mathfrak{f}_{2}$ $\in $ $\mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda ).$
\end{theorem}
\begin{proof}
Suppose $\mathfrak{f}_{i}=\mathfrak{s}_{i}+\overline{\mathfrak{t}_{i}}\in
\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$ $(i=1,2)$. Then the
convolution of $\mathfrak{f}_{1}$ and $\mathfrak{f}_{2}$ is defined as $%
\mathfrak{f}_{1}\ast \mathfrak{f}_{2}=\mathfrak{s}_{1}\ast \mathfrak{s}_{2}+%
\overline{\mathfrak{t}_{1}\ast \mathfrak{t}_{2}}.$ In order to prove that $%
\mathfrak{f}_{1}\ast \mathfrak{f}_{2}$ $\in $ $\mathcal{R}_{H}^{0}(\gamma
,\delta ,\lambda ),$ we need to prove that $F_{\epsilon }=\mathfrak{s}%
_{1}\ast \mathfrak{s}_{2}+\epsilon (\mathfrak{t}_{1}\ast \mathfrak{t}%
_{2})\in \mathcal{R}(\gamma ,\delta ,\lambda )$ for each $\epsilon
(|\epsilon |=1).$ By Lemma 15, the class $\mathcal{R}(\gamma ,\delta
,\lambda )$ is closed under convolutions for each $\epsilon (|\epsilon |=1),$
$\mathfrak{s}_{i}+\epsilon \mathfrak{t}_{i}\in \mathcal{R}(\gamma ,\delta
,\lambda )$ for $i=1,2.$ Then both $F_{1}$ and $~F_{2}$ given by%
\begin{equation*}
F_{1}=(\mathfrak{s}_{1}-\mathfrak{t}_{1})\ast (\mathfrak{s}_{2}-\epsilon
\mathfrak{t}_{2})\text{ \ and \ }F_{2}=(\mathfrak{s}_{1}+\mathfrak{t}%
_{1})\ast (\mathfrak{s}_{2}+\epsilon \mathfrak{t}_{2}),
\end{equation*}%
belong to $\mathcal{R}(\gamma ,\delta ,\lambda )$. Since $\mathcal{R}(\gamma
,\delta ,\lambda )$ is closed under convex combinations, then the function%
\begin{equation*}
F_{\epsilon }=\frac{1}{2}(F_{1}+F_{2})=\mathfrak{s}_{1}\ast \mathfrak{s}%
_{2}+\epsilon (\mathfrak{t}_{1}\ast \mathfrak{t}_{2})
\end{equation*}%
belongs to $\mathcal{R}(\gamma ,\delta ,\lambda )$. Hence $\mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda )$ is closed under convolution.
\end{proof}
Now we consider the Hadamard product of a harmonic function with an analytic
function which is defined by Goodloe \cite{Goodloe} as
\begin{equation*}
\mathfrak{f}\widetilde{\ast }\varphi =\mathfrak{s}\ast \varphi +\overline{%
\mathfrak{t}\ast \varphi },
\end{equation*}%
where $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}$ is harmonic
function and $\varphi $ is an analytic function in $\mathcal{U}.$
\begin{theorem}
Let $\mathfrak{f}\in $ $\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$ and $%
\varphi \in \mathcal{A}$ be such that ${\text{Re}}\left( \dfrac{\varphi (z)}{%
z}\right) >\dfrac{1}{2}$ for $z\in \mathcal{U},$ then $\mathfrak{f}%
\widetilde{\ast }\varphi $ $\in $ $\mathcal{R}_{H}^{0}(\gamma ,\delta
,\lambda ).$
\end{theorem}
\begin{proof}
Suppose that $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in $ $%
\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda ),$ then $F_{\epsilon }=%
\mathfrak{s}+\epsilon \mathfrak{t}\in $ $\mathcal{R}(\gamma ,\delta ,\lambda
)$ for each $\epsilon (|\epsilon |=1).$ By Theorem 2, in order to show that $%
\mathfrak{f}\widetilde{\ast }\varphi $ $\in $ $\mathcal{R}_{H}^{0}(\gamma
,\delta ,\lambda ),$ we need to show that $G=\mathfrak{s}\ast \varphi
+\epsilon (\mathfrak{t}\ast \varphi )$ $\in $ $\mathcal{R}(\gamma ,\delta
,\lambda )$ for each $\epsilon (|\epsilon |=1).$ Write $G$ as $G=F_{\epsilon
}\ast \varphi ,$ and
\begin{eqnarray*}
&&\frac{1}{2\left( \gamma -\lambda \right) }\left( 2\gamma G^{\prime
}(z)+2\delta zG^{\prime \prime }(z)+\left( \delta -\gamma \right)
z^{2}G^{\prime \prime \prime }\left( z\right) -2\lambda \right) \\
&=&\frac{1}{2\left( \gamma -\lambda \right) }\left( 2\gamma F_{\epsilon
}^{\prime }(z)+2\delta zF_{\epsilon }^{\prime \prime }(z)+\left( \delta
-\gamma \right) z^{2}F_{\epsilon }^{\prime \prime \prime }\left( z\right)
-2\lambda \right) \ast \dfrac{\varphi (z)}{z}.
\end{eqnarray*}%
Since ${\text{Re}}\left( \dfrac{\varphi (z)}{z}\right) >\dfrac{1}{2}$ \ and
\ ${\text{Re}}\{2\gamma F_{\epsilon }^{\prime }(z)+2\delta zF_{\epsilon
}^{\prime \prime }(z)+\left( \delta -\gamma \right) z^{2}F_{\epsilon
}^{\prime \prime \prime }\left( z\right) -2\lambda \}>0$ in $\mathcal{U},$
Lemma 13 proves that $G\in \mathcal{R}(\gamma ,\delta ,\lambda )$.
\end{proof}
\begin{corollary}
Let $\mathfrak{f}\in $ $\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$ and $%
\varphi \in \mathcal{K},$ then $f\widetilde{\ast }\varphi $ $\in $ $\mathcal{%
R}_{H}^{0}(\gamma ,\delta ,\lambda ).$
\end{corollary}
\begin{proof}
Suppose $\varphi \in \mathcal{K},$ then ${\text{Re}}\left( \dfrac{\varphi (z)%
}{z}\right) >\dfrac{1}{2}$ for $z\in \mathcal{U}.$ As a corollary of Theorem
17, $f\widetilde{\ast }\varphi $ $\in $ $\mathcal{R}_{H}^{0}(\gamma ,\delta
,\lambda ).$
\end{proof}
\section{Radii of fully convexity, starlikeness, uniformly convexity and
uniformly starlikeness}
In this section, we obtain the radii of fully convexity and starlikeness of
the class $\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda ).$ Estimates on $%
\lambda $ are also given that would ensure functions in $\mathcal{R}%
_{H}^{0}(1,\delta ,\lambda )$ is fully convex.
The proof of the theorems follow from the proof of the results from \cite%
{Ghosh-fully, Nagpal-fully}. First, we state the following lemmas give
sufficient conditions for functions $\mathfrak{f}$ in $\mathcal{H}^{0}$ to
belong to $\mathcal{FK}_{H}^{0}$ and $\mathcal{FS}_{H}^{\ast ,0}$
respectively.
\begin{lemma}
Let $\mathfrak{f=s+}\overline{\mathfrak{t}}$, where $\mathfrak{s}$ and $%
\mathfrak{t}$ are given by (\ref{eqH}). Further, let%
\begin{equation}
\sum \limits_{m=2}^{\infty }m^{2}\left[ \left \vert a_{m}\right \vert +\left
\vert b_{m}\right \vert \right] \leq 1. \label{FKH}
\end{equation}%
Then $\mathfrak{f}$ is harmonic univalent in $\mathcal{U}$, and $\mathfrak{f}%
\in $ $\mathcal{FK}_{H}^{0}$.
\end{lemma}
\begin{lemma}
Let $\mathfrak{f=s+}\overline{\mathfrak{t}}$, where $\mathfrak{s}$ and $%
\mathfrak{t}$ are given by (\ref{eqH}). Further, let%
\begin{equation}
\sum \limits_{m=2}^{\infty }m\left[ \left \vert a_{m}\right \vert +\left
\vert b_{m}\right \vert \right] \leq 1. \label{FSH}
\end{equation}%
Then $\mathfrak{f}$ is harmonic univalent in $\mathcal{U}$, and $\mathfrak{f}%
\in $ $\mathcal{FS}_{H}^{\ast ,0}$.
\end{lemma}
The following identities are useful in the proof of the theorems:
\begin{eqnarray}
(i)\text{ }\sum \limits_{m=2}^{\infty }mr^{m-1} &=&\frac{r\left( 2-r\right)
}{\left( 1-r\right) ^{2}}, \label{id1} \\
(ii)\text{ }\sum \limits_{m=2}^{\infty }m^{2}r^{m-1} &=&\frac{r\left(
4-3r+r^{2}\right) }{\left( 1-r\right) ^{3}}. \label{id3}
\end{eqnarray}
\begin{theorem}
Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda ).$ Then $\mathfrak{f}$ is fully convex in $%
\left \vert z\right \vert <r_{c},$ where $r_{c}$ is the unique real root of $%
pc(r)=0$ in $(0,1),$ and where
\begin{equation*}
pc(r)=\left( -\delta -2\gamma +\lambda \right) r^{3}+\left( 3\delta +6\gamma
-3\lambda \right) r^{2}+\left( -3\delta -7\gamma +4\lambda \right) r+\delta
+\gamma .
\end{equation*}
\end{theorem}
\begin{proof}
Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda )$ where $\mathfrak{s}\left( z\right)
=z+\sum \limits_{m=2}^{\infty }a_{m}z^{m}$ and $\mathfrak{t}\left( z\right)
=\sum \limits_{m=2}^{\infty }b_{m}z^{m}.$ For $r\in (0,1)$, it is sufficient
to show that $\mathfrak{f}_{r}\in \mathcal{FK}_{H}^{0}$ where%
\begin{equation*}
\mathfrak{f}_{r}\left( z\right) =\frac{\mathfrak{f}\left( rz\right) }{r}%
=z+\sum \limits_{m=2}^{\infty }a_{m}r^{m-1}z^{m}+\overline{\sum
\limits_{m=2}^{\infty }b_{m}r^{m-1}z^{m}}.
\end{equation*}%
Consider this time, the sum%
\begin{equation}
S=\sum \limits_{m=2}^{\infty }m^{2}\left( \left \vert a_{m}\right \vert
+\left \vert b_{m}\right \vert \right) r^{m-1}. \label{a}
\end{equation}%
In view of Theorem 7 (i) and (\ref{id3}), (\ref{a}) gives
\begin{eqnarray*}
S &\leq &\sum \limits_{m=2}^{\infty }m^{2}\left( \frac{4\left( \gamma
-\lambda \right) }{m^{2}\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)%
\right] }\right) r^{m-1} \\
&\leq &\frac{\gamma -\lambda }{\delta +\gamma }\sum \limits_{m=2}^{\infty
}m^{2}r^{m-1} \\
&=&\frac{\gamma -\lambda }{\delta +\gamma }\frac{r\left( 4-3r+r^{2}\right) }{%
\left( 1-r\right) ^{3}}=:X_{1.}
\end{eqnarray*}%
Lemma 19 implies that in order to show that $\mathfrak{f}_{r}\in \mathcal{FK}%
_{H}^{0}$, it is sufficient to show that $X_{1}\leq 1.$ Thus, we need to
prove that $\left( -\delta -2\gamma +\lambda \right) r^{3}+\left( 3\delta
+6\gamma -3\lambda \right) r^{2}+\left( -3\delta -7\gamma +4\lambda \right)
r+\delta +\gamma \geq 0.$
Suppose $pc(r):=\left( -\delta -2\gamma +\lambda \right) r^{3}+\left(
3\delta +6\gamma -3\lambda \right) r^{2}+\left( -3\delta -7\gamma +4\lambda
\right) r+\delta +\gamma ,$ so that $X_{1}\leq 1$ whenever $pc(r)\geq 0.$ It
is easy to observe that $pc(0)=\delta +\gamma >0$ and $pc(1)=2\left( \lambda
-\gamma \right) <0$, and hence $pc(r)$ has at least one root in $\left(
0,1\right) .$
To show that $pc(r)$ has exactly one root in $\left( 0,1\right) ,$ it is
sufficient to prove that $pc(r)$ is monotonic function on $\left( 0,1\right)
.$ A simple computation shows that
\begin{eqnarray*}
pc^{\prime }(r) &=&\left( -6\gamma +3\lambda -3\delta \right) r^{2}+\left(
12\gamma -6\lambda +6\delta \right) r-3\delta -7\gamma +4\lambda \\
pc^{\prime }(0) &=&-3\delta -7\gamma +4\lambda =-3\left( \gamma +\delta
\right) -4\left( \gamma -\lambda \right) <0 \\
pc^{\prime }(1) &=&\lambda -\gamma <0 \\
pc^{\prime \prime }(r) &=&\left( -6\delta -12\gamma +6\lambda \right)
r+6\delta +12\gamma -6\lambda \\
&=&\left[ -6\left( \gamma +\delta \right) -6\left( \delta -\lambda \right) %
\right] r-\left[ -6\left( \gamma +\delta \right) -6\left( \delta -\lambda
\right) \right] \\
&=&\left[ -6\left( \gamma +\delta \right) -6\left( \delta -\lambda \right) %
\right] \left( r-1\right) >0\text{ \ for }r\in \left( 0,1\right) .
\end{eqnarray*}%
Hence $pc^{\prime }(r)$ is a strictly monotonic increasing function on $%
\left( 0,1\right) $. Since $pc^{\prime }(1)<0$, we conclude that $pc^{\prime
}(r)<0$ on $\left( 0,1\right) $. This shows that $pc(r)$ is strictly
monotonically decreasing on $\left( 0,1\right) $. Thus $pc(r)=0$ has exactly
one root in $\left( 0,1\right) $. Since $pc(r)$ is strictly monotonically
decreasing on $\left( 0,1\right) $ with $pc(0)>0$ and $pc(r_{c})=0,$ it is
easy to see that $pc(r)\geq 0$ for $0<r\leq r_{c}$. Hence $\mathfrak{f}$ is
fully convex in $\left \vert z\right \vert <r_{c}$.
\end{proof}
\begin{theorem}
Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda )$. Then $\mathfrak{f}$ is fully starlike
in $\left \vert z\right \vert <r_{s},$ where $r_{s}$ is the unique real root
of $ps(r)=0$ in $(0,1),$ and where
\begin{equation*}
ps(r)=\left( \delta +2\gamma -\lambda \right) r^{2}+\left( -2\delta -4\gamma
+2\lambda \right) r+\delta +\gamma .
\end{equation*}
\end{theorem}
\begin{proof}
Let $\mathfrak{f}=\mathfrak{s}+\overline{\mathfrak{t}}\in \mathcal{R}%
_{H}^{0}(\gamma ,\delta ,\lambda ).$ For $r\in (0,1)$, let%
\begin{equation*}
\mathfrak{f}_{r}\left( z\right) =\frac{\mathfrak{f}\left( rz\right) }{r}%
=z+\sum \limits_{m=2}^{\infty }a_{m}r^{m-1}z^{m}+\overline{\sum
\limits_{m=2}^{\infty }b_{m}r^{m-1}z^{m}}
\end{equation*}%
Consider the sum%
\begin{equation}
S=\sum \limits_{m=2}^{\infty }m\left( \left \vert a_{m}\right \vert +\left
\vert b_{m}\right \vert \right) r^{m-1} \label{b}
\end{equation}%
Using Theorem 7(i) and (\ref{id1}), (\ref{b}) gives
\begin{eqnarray*}
S &\leq &\sum \limits_{m=2}^{\infty }m\left( \frac{4\left( \gamma -\lambda
\right) }{m^{2}\left[ 2\gamma +\left( \delta -\gamma \right) (m-1)\right] }%
\right) r^{m-1} \\
&\leq &\frac{\gamma -\lambda }{\delta +\gamma }\sum \limits_{m=2}^{\infty
}mr^{m-1} \\
&=&\frac{\gamma -\lambda }{\delta +\gamma }\frac{r\left( 2-r\right) }{\left(
1-r\right) ^{2}}=:X_{2.}
\end{eqnarray*}%
In view of Lemma 19 in order to prove that $\mathfrak{f}_{r}\in \mathcal{FSH}%
^{\ast ,0}$, it is sufficient to show that $X_{2}\leq 1$. This implies that
it suffices to show $\left( \delta +2\gamma -\lambda \right) r^{2}+\left(
-2\delta -4\gamma +2\lambda \right) r+\delta +\gamma \geq 0.$
Suppose $ps(r)=\left( \delta +2\gamma -\lambda \right) r^{2}+\left( -2\delta
-4\gamma +2\lambda \right) r+\delta +\gamma ,$ so that $X_{2}\leq 1$
whenever $ps(r)\geq 0.$ It is easy to observe that $ps(0)=\delta +\gamma >0$
and $ps(1)=\lambda -\gamma <0$, and hence $ps(r)$ has a real root in $\left(
0,1\right) .$
To show that $ps(r)$ has exactly one root in $\left( 0,1\right) ,$ it is
sufficient to prove that $ps(r)$ is monotonic function on $\left( 0,1\right)
.$ A simple computation shows that
\begin{eqnarray*}
ps^{\prime }(r) &=&2\left( \delta +2\gamma -\lambda \right) \left(
r-1\right) <0,\text{\ \ for }r\in \left( 0,1\right) \\
ps^{\prime }(0) &=&2\left( \lambda -\delta -2\gamma \right) , \\
ps^{\prime }(1) &=&0, \\
ps^{\prime \prime }(r) &=&2\left( \delta +2\gamma -\lambda \right) >0.
\end{eqnarray*}%
Hence $ps^{\prime }(r)$ is a strictly monotonically increasing function on $%
\left( 0,1\right) $. Since $ps^{\prime }(1)=0$, we conclude that $ps^{\prime
}(r)<0$ on $\left( 0,1\right) $. This shows that $ps(r)$ is strictly
monotonically decreasing on $\left( 0,1\right) $. Thus $ps(r)$ has exactly
one root in $\left( 0,1\right) $. Since $ps(r)$ is strictly monotonically
decreasing on $\left( 0,1\right) $ with $ps(0)>0$ and $ps(r_{s})=0$, it is
easy to see that $ps(r)\geq 0$ for $0<r\leq r_{s}$. Hence $\mathfrak{f}$ is
fully starlike in $\left \vert z\right \vert <r_{s}$.
\end{proof}
\begin{lemma}
\cite[Corollary 3.2]{Rosihan2018} Let $\lambda <1,$ $\delta \geq 1,$ and $%
\mathfrak{f}\in \mathcal{R}(1,\delta ,\lambda )$. If $\lambda $ satisfies
\begin{equation}
7-3\delta =4\lambda +4(1-\lambda )\sum \limits_{m=1}^{\infty }\frac{%
2m(3-\delta )+\left( \delta -5\right) }{\left( m+1\right) \left( m\left(
\delta -1\right) +2\right) }, \label{eqconvexRosihan}
\end{equation}%
then $\mathfrak{f}$ is convex in $\mathcal{U}.$
\end{lemma}
\begin{theorem}
Suppose $\mathfrak{f}\in \mathcal{R}_{H}^{0}(1,\delta ,\lambda )$ with $%
\lambda <1,$ $\delta \geq 1.$ If $\lambda $ satisfies $\left( \ref%
{eqconvexRosihan}\right) $, then $\mathfrak{f}$ is fully convex in $\mathcal{%
U}.$
\end{theorem}
\begin{proof}
Let $\lambda <1,$ $\delta \geq 1$ and $\mathfrak{f}\in \mathcal{R}%
_{H}^{0}(1,\delta ,\lambda ).$ Then $F_{\epsilon }=\mathfrak{s}+\epsilon
\mathfrak{t}\in \mathcal{R}(1,\delta ,\lambda )$ for each $\epsilon \left(
\left \vert \epsilon \right \vert =1\right) .$ If $\lambda $ satisfies (\ref%
{eqconvexRosihan}), then $F_{\epsilon }$ is convex in $\mathcal{U}.$ In view
of \cite[Corollary 2.4]{Nagpaljkms}, it follows that $\mathfrak{f}$ is fully
convex in $\mathcal{U}.$
\end{proof}
\begin{problem}
Find $\gamma $, $\delta $ and $\lambda $ so that functions $\mathfrak{f}\in
\mathcal{R}_{H}^{0}(\gamma ,\delta ,\lambda )$ are fully convex in $\mathcal{%
U}$.
\end{problem}
|
\section{Introduction}
The braid groups of the $2$-disc, or Artin braid groups, were introduced by Artin in 1925 and further studied in 1947~\cite{A1,A2}. Surface braid groups were initially studied by Zariski~\cite{Z}, and were later generalised by Fox and Neuwirth to braid groups of arbitrary topological spaces using configuration spaces as follows~\cite{FoN}. Let $M$ be a compact, connected surface, and let $n\in \mathbb N$. The \textit{$n$th ordered configuration space of $M$}, denoted by $F_{n}(M)$, is defined by:
\begin{equation*}
F_n(M)=\left\{(x_{1},\ldots,x_{n})\in M^{n}\,|\,x_{i}\neq x_{j}\,\, \text{if}\,\, i\neq j,\,i,j=1,\ldots,n\right\}.
\end{equation*}
The \textit{$n$-string pure braid group $P_n(M)$ of $M$} is defined by $P_n(M)=\pi_1(F_n(M))$. The symmetric group $S_{n}$ on $n$ letters acts freely on $F_{n}(M)$ by permuting coordinates, and the \textit{$n$-string braid group $B_n(M)$ of $M$} is defined by $B_n(M)=\pi_1(F_n(M)/S_{n})$. This gives rise to the following short exact sequence:
\begin{equation}\label{eq:ses}
1 \to P_{n}(M) \to B_{n}(M) \stackrel{\sigma}{\longrightarrow}S_{n} \to 1.
\end{equation}
The map $\map{\sigma}{B_{n}(M)}[S_{n}]$ is the standard homomorphism that associates a permutation to each element of $S_{n}$.
In~\cite{GGO,GGO2,GGO3}, three of the authors of this paper studied the quotient $B_n/\Gamma_{2}(P_n)$, where $B_{n}$ is the $n$-string Artin braid group, $P_{n}$ is the subgroup of $B_{n}$ of pure braids, and $\Gamma_{2}(P_n)$ is the commutator subgroup of $P_n$. In~\cite{GGO}, it was proved that this quotient is a crystallographic group. Crystallographic groups play an important r\^{o}le in the study of the groups of isometries of Euclidean spaces (see Section~\ref{sec:2} for precise definitions, as well as~\cite{Charlap,Dekimpe,Wolf} for more details). Using different techniques, Marin extended the results of~\cite{GGO} to generalised braid groups associated to arbitrary complex reflection groups~\cite{Ma}. Beck and Marin showed that other finite non-Abelian groups, not covered by~\cite{GGO2,Ma}, embed in $B_n/\Gamma_{2}(P_n)$~\cite{BM}.
In this paper, we study the quotient $B_n(M)/\Gamma_2(P_n(M))$ of $B_n(M)$, where $\Gamma_2(P_n(M))$ is the commutator subgroup of $P_n(M)$, one of our aims being to decide whether it is crystallographic or not. The group extension~\reqref{ses} gives rise to the following short exact sequence:
\begin{equation}\label{eq:sestorus1}
1\to P_n(M)/\Gamma_2(P_n(M))\to B_n(M)/\Gamma_2(P_n(M))\stackrel{\overline{\sigma}}{\longrightarrow} S_n\to 1.
\end{equation}
Note that if $M$ is an orientable, compact surface of genus $g\geq 1$ without boundary and $n=1$ then $B_1(M)/[P_1(M), P_1(M)]$ is the Abelianisation of $\pi_{1}(M)$, and is isomorphic to $\mathbb{Z}^{2g}$, so it is clearly a crystallographic group.
In Section~\ref{sec:2}, we recall some definitions and facts about crystallographic groups, and if $M$ is an orientable, compact, connected surface of genus $g\geq 1$ without boundary, we prove that $B_n(M)/\Gamma_2(P_n(M))$ is crystallographic.
\begin{prop}\label{prop:toruscryst}
Let $M$ be an orientable, compact, connected surface of genus $g\geq 1$ without boundary, and let $n\geq 2$. Then there exists a split extension of the form:
\begin{equation}\label{eq:sestorus}
1\to \mathbb{Z}^{2ng}\to B_n(M)/\Gamma_2(P_n(M)) \stackrel{\overline{\sigma}}{\longrightarrow} S_n\to 1,
\end{equation}
where the holonomy representation $\map{\varphi}{S_{n}}[\operatorname{\text{Aut}}(\mathbb{Z}^{2ng})]$ is faithful and where the action is defined by~\reqref{action}. In particular, the quotient $B_n(M)/\Gamma_2(P_n(M))$ is a crystallographic group of dimension $2ng$ and whose holonomy group is $S_n$.
\end{prop}
As for $B_{n}/[P_{n},P_{n}]$, some natural questions arise for $B_n(M)/\Gamma_2(P_n(M))$, such as the existence of torsion, the realisation of elements of finite order and that of finite subgroups, their conjugacy classes, as well as properties of some Bieberbach subgroups of $B_n(M)/\Gamma_2(P_n(M))$. In \reth{ordk0}, we characterise the finite-order elements of $B_{n}(M)/\Gamma_2(P_n(M))$ and their conjugacy classes, from which we see that the conjugacy classes of finite-order elements of $B_{n}(M)/\Gamma_2(P_n(M))$ are in one-to-one correspondence with the conjugacy classes of elements of the symmetric group $S_n$.
\begin{thm}\label{th:ordk0}
Let $n\geq 2$, and let $M$ be an orientable surface of genus $g\geq 1$ without boundary.
\begin{enumerate}[(a)]
\item\label{it:ordk0a} Let $e_1$ and $e_2$ be finite-order elements of $B_{n}(M)/\Gamma_2(P_n(M))$. Then $e_1$ and $e_2$ are conjugate if and only if their permutations $\overline{\sigma}(e_1)$ and $\overline{\sigma}(e_2)$ have the same cycle type. Thus two finite cyclic subgroups $H_1$ and $H_2$ of $B_{n}(M)/\Gamma_2(P_n(M))$ are conjugate if and only if the generators of $\overline{\sigma}(H_1)$ and $\overline{\sigma}(H_2)$ have the same cycle type.
\item\label{it:ordk0b} If $H_1$ and $H_2$ are subgroups of $B_{n}(M)/\Gamma_2(P_n(M))$ that are isomorphic to $S_n$ then they are conjugate.
\end{enumerate}
\end{thm}
The results of \reth{ordk0} lead to the following question: if $H_{1}$ and $H_{2}$ are finite subgroups of $B_{n}(M)/\Gamma_2(P_n(M))$ such that $\overline{\sigma}(H_1)$ and $\overline{\sigma}(H_2)$ are conjugate in $S_{n}$, then are $H_{1}$ and $H_{2}$ conjugate? For each odd prime $p$, we shall consider the corresponding Frobenius group, which is the semi-direct product $\mathbb{Z}_p\rtimes \mathbb{Z}_{(p-1)/2}$, the action being given by an automorphism of $\mathbb{Z}_p$ of order $(p-1)/2$. In \repr{embedd} we show that the conclusion of \reth{ordk0} holds for subgroups of $B_5(M)/\Gamma_{2}(P_5(M))$ that are isomorphic to the Frobenius group $\mathbb{Z}_5\rtimes \mathbb{Z}_2$.
In \resec{3}, we study some Bieberbach subgroups of $B_{n}(M)/\Gamma_2(P_n(M))$ whose construction is suggested by that of the Bieberbach subgroups of $B_{n}/\Gamma_2(P_n)$ given in~\cite{Oc}.
\begin{thm}\label{th:bieberbach}
Let $n\geq 2$, and let $M$ be an orientable surface of genus $g\geq 1$ without boundary. Let $G_{n}$ be the cyclic subgroup $\ang{(n,n-1,\ldots,2,1)}$ of $S_n$. Then
there exists a subgroup $\widetilde{G}_{n,g}$ of $\sigma^{-1}(G_n)/\Gamma_2(P_n(M))\subset B_{n}(M)/\Gamma_2(P_n(M))$ that is a Bieberbach group of dimension $2ng$ whose holonomy group is $G_{n}$. Further, the centre $Z(\widetilde{G}_{n,g})$ of $\widetilde{G}_{n,g}$ is a free Abelian group of rank $2g$.
\end{thm}
The conclusion of the first part of the statement of \reth{bieberbach} probably does not remain valid if we replace the finite cyclic group $G_{n}$ by other finite groups. In this direction, if $p$ is an odd prime, in \repr{frob}, we prove that there is no Bieberbach subgroup $H$ of $B_p(M)/[P_p(M), P_p(M)]$ for which $\overline{\sigma}(H)$ is the Frobenius group $\mathbb{Z}_p\rtimes \mathbb{Z}_{(p-1)/2}$.
It follows from the definition that crystallographic groups act properly discontinuously and cocompactly on Euclidean space, and that the action is free if the groups are Bieberbach. Thus there exists a flat manifold ${\mathcal X}_{n,g}$ whose fundamental group is the subgroup $\widetilde{G}_{n,g}$ of \reth{bieberbach}. Motivated by results about the holonomy representation of Bieberbach subgroups of the Artin braid group quotient $B_{n}/[P_{n}, P_{n}]$ whose holonomy group is a $2$-group obtained in~\cite{OR}, in \resec{3}, we make use of the holonomy representation of $\widetilde{G}_{n,g}$ given in~\reqref{actmatrix} to prove some dynamical and geometric properties of ${\mathcal X}_{n,g}$. To describe these results, we recall some definitions.
If $\map{f}{M}$ is a self-map of a Riemannian manifold, $M$ is said to have a hyperbolic structure with respect to $f$ if there exists a splitting of the tangent bundle $T(M)$ of the form $T(M)=E^{s} \oplus E^{u}$ such that $\map{\mathrm{D}f}{E^{s}}$ (resp.\ $\map{\mathrm{D}f}{E^{u}}$) is contracting (resp.\ expanding). Further, the map $f$ is called \textit{Anosov} if it is a diffeomorphism and $M$ has hyperbolic structure with respect to $f$. The classification of compact manifolds that admit Anosov diffeomorphisms is a problem first proposed by Smale~\cite{Sm}. Anosov diffeomorphisms play an important r\^ole in the theory of dynamical systems since their behaviour is generic in some sense. Porteous gave a criterion for the existence of Anosov diffeomorphisms of flat manifolds in terms of the holonomy representation~\cite[Theorems~6.1 and~7.1]{Po} that we shall use in the proof of \reth{anosov}.
We recall that a K\"ahler manifold is a $2n$-real manifold endowed with a Riemannian metric, a complex structure, and a symplectic structure that is compatible at every point. For more about such manifolds, see~\cite[Chapter 7]{Sz}. A finitely-presented group is said to be a K\"ahler group if it is the fundamental group of a closed K\"ahler manifold. We may now state \reth{anosov}.
\begin{thm}\label{th:anosov}
Let $n\geq 2$, and let ${\mathcal X}_{n,g}$ be a $2ng$-dimensional flat manifold whose fundamental group is the Bieberbach group $\widetilde{G}_{n,g}$ of \reth{bieberbach}. Then ${\mathcal X}_{n,g}$ is an orientable K\"ahler manifold with first Betti number $2g$ that admits Anosov diffeomorphisms.
\end{thm}
The proof of \reth{anosov} depends mainly on the holonomy representation of the Bieberbach group $\widetilde{G}_{n,g}$, and makes use of the eigenvalues of the matrix representation and the decomposition of the holonomy representation in irreducible representations using character theory.
Finally, in \resec{4}, we prove in \repr{nonorientable} that the conclusion of \repr{toruscryst} no longer holds if $M$ is the sphere $\mathbb{S}^{2}$ or a compact, non-orientable surface without boundary. More precisely, if $n\geq 1$ then $B_n(M)/\Gamma_2(P_n(M))$ is not a crystallographic group.
\section{Crystallographic groups and quotients of surface braid groups}\label{sec:2}
In this section, we start by recalling some definitions and facts about crystallographic groups. If $M$ is a compact, orientable surface without boundary of genus $g\geq 1$, in \repr{toruscryst}, we prove that the quotient $B_{n}(M)/\Gamma_2(P_n(M))$ is a crystallographic group that is isomorphic to $\mathbb{Z}^{2ng} \rtimes_{\varphi} S_n$. We also determine the conjugacy classes of the finite-order elements of $B_n(M)/\Gamma_2(P_n(M))$ in \reth{ordk0}.
\subsection{Crystallographic groups}\label{sec:cryst}
In this section, we recall briefly the definitions of crystallographic and Bieberbach groups, and the characterisation of crystallographic groups in terms of a representation that arises in certain group extensions whose kernel is a free Abelian group of finite rank and whose quotient is finite. We also recall some results concerning Bieberbach groups and the fundamental groups of flat Riemannian manifolds. For more details, see~\cite[Section~I.1.1]{Charlap},~\cite[Section~2.1]{Dekimpe} or~\cite[Chapter~3]{Wolf}.
Let $G$ be a Hausdorff topological group. A subgroup $H$ of $G$ is said to be \emph{discrete} if it is a discrete subset. If $H$ is a closed subgroup of $G$ then the quotient space $G/H$ admits the quotient
topology for the canonical projection $\map{\pi}{G}[G/H]$, and we say that $H$ is \emph{uniform} if $G/H$ is compact. From now on, we identify $\operatorname{\text{Aut}}(\mathbb{Z}^m)$ with $\operatorname{\text{GL}}(m,\mathbb{Z})$. A discrete, uniform subgroup $\Pi$ of $\ensuremath{\mathbb R}^m\rtimes \operatorname{\text{O}}(m,\ensuremath{\mathbb R})\subseteq \operatorname{\text{Aff}}(\ensuremath{\mathbb R}^m)$ is said to be a \textit{crystallographic group} of dimension $m$. If in addition $\Pi$ is torsion free then $\Pi$ is called a \textit{Bieberbach group} of dimension $m$.
If $\Phi$ is a group, an \emph{integral representation of rank $m$ of $\Phi$} is defined to be a homomorphism $\map{\Theta}{\Phi}[\operatorname{\text{Aut}}(\mathbb{Z}^m)]$. Two such representations are said to be \emph{equivalent} if their images are conjugate in $\operatorname{\text{Aut}}(\mathbb{Z}^m)$. We say that $\Theta$ is a \emph{faithful representation} if it is injective. We recall the following characterisation of crystallographic groups.
\begin{lem}[{\cite[Lemma~8]{GGO}}]\label{lem:cryst}
Let $\Pi$ be a group. Then $\Pi$ is a crystallographic group if and only if there exists an integer $m\in \mathbb N$, a finite group $\Phi$ and a short exact sequence of the form:
\begin{equation}\label{eq:SeqCrist2}
0\to \mathbb{Z}^m \to \Pi \stackrel{\zeta}{\longrightarrow} \Phi \to 1,
\end{equation}
such that the integral representation $\map{\Theta}{\Phi}[\operatorname{\text{Aut}}(\mathbb{Z}^m)]$ induced by conjugation on $\mathbb{Z}^m$ and defined by $\Theta(\phi)(x)=\pi x \pi^{-1}$ for all $x\in \mathbb{Z}^{m}$ and $\phi\in \Phi$, where $\pi\in \Pi$ is such that $\zeta(\pi)=\phi$, is faithful.
\end{lem}
If $\Pi$ is a crystallographic group, the integer $m$, the finite group $\Phi$ and the integral representation $\map{\Theta}{\Phi}[\operatorname{\text{Aut}}(\mathbb{Z}^{m})]$ appearing in the statement of~\relem{cryst} are called the \emph{dimension}, the \emph{holonomy group} and the \emph{holonomy representation} of $\Pi$ respectively.
We now recall the connection between Bieberbach groups and manifolds. A Riemannian manifold $M$ is called \emph{flat} if it has zero curvature at every point. By the first Bieberbach Theorem, there is a correspondence between Bieberbach groups and fundamental groups of flat Riemannian manifolds without boundary (see~\cite[Theorem~2.1.1]{Dekimpe} and the paragraph that follows it). By~\cite[Corollary~3.4.6]{Wolf}, the holonomy group of a flat manifold $M$ is isomorphic to the group $\Phi$. In 1957, Auslander and Kuranishi proved that every finite group is the holonomy group of some flat manifold~(see~{\cite[Theorem~3.4.8]{Wolf} and~\cite[Theorem~III.5.2]{Charlap}}). It is well known that a flat manifold determined by a Bieberbach group $\Pi$ is orientable if and only if the integral representation $\map{\Theta}{\Phi}[\operatorname{\text{GL}}(m,\mathbb{Z})]$ satisfies $\operatorname{\text{Im}}(\Theta) \subseteq \operatorname{\text{SL}}(m,\mathbb{Z})$~\cite[Theorem~6.4.6 and Remark~6.4.7]{Dekimpe}. This being the case, $\Pi$ is said to be an \emph{orientable Bieberbach group}.
\subsection{The group $B_n(M)/\Gamma_2(P_n(M))$}
Let $M$ be a compact, orientable surface without boundary of genus $g\geq 1$. Besides showing that the group $B_n(M)/\Gamma_2(P_n(M))$ is crystallographic, we shall also be interested in the conjugacy classes of its elements by elements of $P_n(M)/\Gamma_2(P_n(M))$, as well as the conjugacy classes of its finite subgroups. In order to study these questions, it is useful to have an algebraic description of this quotient at our disposal. We will make use of the presentations of the (pure) braid groups of $M$ given in~\cite[Theorems~2.1 and~4.2]{GM}, where for all $1\leq i<j\leq n$, $1\leq r\leq 2g$ and $1\leq k\leq n$, the elements $a_{k,r}$ and $T_{i,j}$ in $B_n(M)$ are described in~\cite[Figure~9]{GM}, and for all $1\leq i\leq n-1$, the elements $\sigma_i$ are the classical generators of the Artin braid group that satisfy the \emph{Artin relations}:
\begin{equation}\label{eq:artin}
\begin{cases}
\sigma_{i}\sigma_{j}=\sigma_{j}\sigma_{i} & \text{for all $1\leq i,j\leq n-1$, $\left\lvert i-j\right\rvert \geq 2$}\\
\sigma_{i}\sigma_{i+1}\sigma_{i}=\sigma_{i+1}\sigma_{i}\sigma_{i+1} & \text{for all $1\leq i\leq n-2$.}
\end{cases}
\end{equation}
We recall that the full twist braid of $B_n(M)$, denoted by $\Delta_{n}^{2}$, is defined by:
\begin{equation}\label{eq:deffulltwist}
\Delta_{n}^{2}=(\sigma_{1}\cdots\sigma_{n-1})^{n},
\end{equation}
and is equal to:
\begin{equation}\label{eq:fulltwist}
\Delta^{2}_{n}=A_{1,2}(A_{1,3}A_{2,3})\cdots(A_{1,n}A_{2,n}\cdots A_{n-1,n}),
\end{equation}
where for $1\leq i<j\leq n$, the elements $A_{i,j}$ are the usual Artin generators of $P_{n}$ defined by $A_{i,j}=\sigma_{j-1}\cdots\sigma_{i+1}\sigma^{2}_{i}\sigma^{-1}_{i+1}\cdots\sigma^{-1}_{j-1}$. By abuse of notation, in what follows, if $\alpha\in B_{n}(M)$, we also denote its $B_n(M)/\Gamma_2(P_n(M))$-coset by $\alpha$. The following proposition gives some relations in $B_n(M)$ that will be relevant to our study of $B_n(M)/\Gamma_2(P_n(M))$.
\begin{prop}\label{prop:subs}
Let $M$ be a compact, orientable surface without boundary of genus
$g\geq 1$, let $1\leq i\leq n-1$, $1\leq j\leq n$ and $1\leq r\leq
2g$, and let $\widetilde{A}_{j,r}=a_{j,1}\cdots
a_{j,r-1}a^{-1}_{j,r+1}\cdots a^{-1}_{j,2g}$. The following relations
hold in $B_{n}(M)$:
\begin{enumerate}[(a)]
\item\label{it:subsa}\label{subs:1} $\sigma_{i}a_{j,r}\sigma^{-1}_{i}=
\begin{cases}
a_{i+1,r}\sigma^{-2}_{i} & \text{if $j=i$ and $r$ is even}\\
\sigma^{2}_{i}a_{i+1,r} & \text{if $j=i$ and $r$ is odd}\\
\sigma^{2}_{i}a_{i} & \text{if $j=i+1$ and $r$ is even}\\
a_{i,r}\sigma^{-2}_{i} & \text{if $j=i+1$ and $r$ is odd}\\
a_{j,r} & \text{if $j\neq i, i+1$.}
\end{cases}$
\item\label{subs:3}
$T_{i,j}=\sigma_{i}\sigma_{i+1}\cdots\sigma_{j-2}\sigma^{2}_{j-1}\sigma_{j-2}\cdots\sigma_{i}$ where $1\leq i,j\leq n$ and $i+1<j$, and $T_{i,i+1}=\sigma_{i}^2$ for all $1\leq i\leq n-1$.
\item\label{subs:4} $T_{i,j}= [a_{i,1}\cdots
a_{i,r},\widetilde{A}_{j,r}]\, T_{i,j-1}$, for all $1\leq i <j \leq n$
and $1\leq r \leq 2g$.
\item\label{subs:5} For all $1\leq i \leq j \leq n$, $T_{i,j}$ and $\Delta^{2}_{n}$ belong to $\Gamma_{2}(P_{n}(M))$.
\end{enumerate}
\end{prop}
\begin{proof}
Part~(\ref{subs:1}) is a consequence of relations~(R7) and~(R8) of \cite[Theorem~4.2, step~3]{GM}, with the exception of the case $j\neq i, i+1$, which is clear. Part~(\ref{subs:3}) is relation~(R9) of \cite[Theorem~4.2, step~3]{GM}, and part~(\ref{subs:4}) is relation~(PR3) of \cite[Theorem 4.2, presentation~1]{GM}. By~\cite[page~439]{GM}, $T_{j-1,j-1}=1$ for all $1<j\leq n+1$, and it follows from part~(\ref{subs:4}) that $T_{j-1,j} \in \Gamma_{2}(P_{n}(M))$ for all $2\leq j\leq n$, and then by induction on $j-i$ that $T_{i,j}\in\Gamma_2(P_n(M))$ for all $1\leq i \leq j \leq n$. Using the Artin relations~\reqref{artin} and part~(\ref{subs:3}), we have $A_{i,j}=T^{-1}_{i,j-1}T_{i,j}$ for all $1\leq i< j \leq n$, so $A_{i,j}$ also belongs to $\Gamma_{2}(P_{n}(M))$ by part~(\ref{subs:4}), and thus $\Delta_{n}^{2}\in \Gamma_{2}(P_{n}(M))$ by~\reqref{fulltwist}.
\end{proof}
This allows us to compute the Abelianisation of $P_n(M)$.
\begin{cor}\label{cor:abel}
Let $M$ be a compact, orientable surface without boundary of genus $g\geq 1$, and let $n\geq 1$. Then the Abelianisation of $P_n(M)$ is a free Abelian group of rank $2ng$, for which $\{ a_{i,r} \,\mid\, \text{$i=1,\ldots,n$ and $r=1,\ldots, 2g$}\}$ is a basis.
\end{cor}
\begin{proof}
The result follows from the presentation of $P_{n}(M)$ given in~\cite[Theorem~4.2]{GM} and the fact that for all $1\leq i< j \leq n$, $T_{i,j}\in \Gamma_{2}(P_{n}(M))$ by \repr{subs}(\ref{subs:5}).
\end{proof}
For all $1\leq i\leq n-1$, we have $\overline{\sigma}(\sigma_{i})=\tau_{i}$, where $\tau_{i}$ denotes the transposition $(i,i+1)$ in $S_{n}$. Using \repr{subs}(\ref{it:subsa}), and identifying $\mathbb{Z}^{2ng}$ with $P_n(M)/\Gamma_2(P_n(M))$ via \reco{abel}, we obtain the induced action $\map{\varphi}{S_n}[\operatorname{\text{Aut}}(\mathbb{Z}^{2ng})]$, that for all $1\leq i\leq n-1$, $1\leq j\leq n$ and $1\leq r\leq 2g$, is defined by:
\begin{equation}\label{eq:action}
\phi(\tau_{i})(a_{j,r})=\sigma_{i}a_{j,r}\sigma^{-1}_{i}= a_{\tau_{i}(j),r}.
\end{equation}
The following result is the analogue of~\cite[Proposition~12]{GGO} for braid groups of orientable surfaces.
\begin{prop}\label{prop:action}
Let $M$ be a compact, orientable surface without boundary of genus $g\geq 1$, and let $n\geq 1$. Let $\alpha \in B_n(M)/\Gamma_2(P_n(M))$, and let $\pi =\overline{\sigma}(\alpha^{-1})$. Then $\alpha a_{i,r}\alpha^{-1}=a_{\pi(i),r}$ in $B_n(M)/\Gamma_2(P_n(M))$ for all $1\leq i\leq n$ and $1\leq r\leq 2g$.
\end{prop}
\begin{proof}
The proof is similar to that of~\cite[Proposition~12]{GGO}, and makes use of~\reqref{action}. The details are left to the reader.
\end{proof}
We now give a presentation of $B_n(M)/\Gamma_2(P_n(M))$.
\begin{prop}\label{prop:pres_quo}
Let $M$ be a compact, orientable surface without boundary of genus $g\geq 1$, and let $n\geq 1$. The quotient group $B_n(M)/\Gamma_2(P_n(M))$ has the following presentation:
\noindent
Generators: $\sigma_{1},\ldots, \sigma_{n-1}, a_{i,r},\,1\leq i \leq n,\, 1\leq r \leq 2g$.
\noindent
Relations:
\begin{enumerate}[(a)]
\item\label{it:pq1} the Artin relations~\reqref{artin}.
\item\label{it:pq2} $\sigma^{2}_{i}=1$, for all $i=1,\ldots, n-1$.
\item\label{it:pq3} $[a_{i,r},a_{j,s}]=1$, for all $i,j=1,\ldots,n$ and $r,s=1,\ldots, 2g$.
\item\label{it:pq4} $\sigma_{i}a_{j,r}\sigma^{-1}_{i}= a_{\tau_{i}(j),r}$ for all $1\leq i\leq n-1$, $1\leq j\leq n$ and $1\leq r\leq 2g$.
\end{enumerate}
\end{prop}
\begin{proof}
The given presentation of $B_n(M)/\Gamma_2(P_n(M))$ may be obtained by applying the standard method for obtaining a presentation of a group extension~\cite[Proposition~1, p.~139]{Johnson} to the short exact sequence~\reqref{sestorus1} for $M$ satisfying the hypothesis, and using \reco{abel}, the equality $\overline{\sigma}(\sigma_{i})=\tau_{i}$ for all $i=1,\ldots,n-1$, and the fact that the relations~(\ref{it:pq1}) and~(\ref{it:pq2}) constitute a presentation of $S_{n}$ for the generating set $\{ \tau_{1},\ldots, \tau_{n-1}\}$.
\end{proof}
We may now prove \repr{toruscryst}.
\begin{proof}[Proof of \repr{toruscryst}]
Assume that $n\geq 2$. The short exact sequence~\reqref{sestorus} is obtained from~\reqref{sestorus1} using \reco{abel}. To prove that the short exact sequence~\reqref{sestorus} splits, let $\map{\psi}{S_n}[B_n(M)/\Gamma_2(P_n(M))]$ be the map defined on the generating set $\{ \tau_{1},\ldots, \tau_{n-1}\}$ of $S_{n}$ by $\psi(\tau_{i})=\sigma_i$ for all $i=1,\ldots, n-1$. Relations~(\ref{it:pq1}) and~(\ref{it:pq2}) of \repr{pres_quo} imply that $\psi$ is a homomorphism.
Consider the action $\map{\varphi}{S_n}[\operatorname{\text{Aut}}(\mathbb{Z}^{2ng})]$ defined by~\reqref{action}. By \repr{action}, $\varphi(\theta)$ is the identity automorphism if and only if $\theta$ is the trivial permutation, from which it follows that $\varphi$ is injective.
The rest of the statement of \repr{toruscryst} is a consequence of \relem{cryst}.
\end{proof}
\begin{cor}\label{cor:subgroup}
Let $M$ be a compact, orientable surface without boundary of genus $g\geq 1$, let $n\geq 2$, and let $H$ be a subgroup of $S_n$. Then the group ${\sigma}^{-1}(H)/\Gamma_2(P_n(M))$ is a crystallographic group of dimension $2ng$ whose holonomy group is $H$.
\end{cor}
\begin{proof}
The result is an immediate consequence of \repr{toruscryst} and \cite[Corollary~10]{GGO}.
\end{proof}
We now turn to the proof of \reth{ordk0}. For this, we will require the following lemma.
\begin{lem}\label{lem:coeftjr}
Let $M$ be a compact, orientable surface without boundary of genus $g\geq 1$, and let $n\geq 1$. Let $z\in B_{n}(M)/\Gamma_2(P_n(M))$. Let $z=\omega\prod^{n}_{i=1}\prod^{2g}_{r=1}a^{s_{i,r}}_{i,r}\in B_{n}(M)/\Gamma_2(P_n(M))$, where $\omega=\psi(\overline{\sigma}(z))$, and $s_{i,r}\in \ensuremath{\mathbb{Z}}$ for all $1\leq i\leq n$ and $1\leq r\leq 2g$. Suppose that $\overline{\sigma}(z)$ is the $m$-cycle $(l_1,\ldots,l_m)$, where $m\geq 2$, and let $k\in \ensuremath{\mathbb N}$ be such that $m$ divides $k$. Then $z^k=\prod^{n}_{i=1}\prod^{2g}_{r=1}a_{i,r}^{t_{i,r}}$ where for all $1\leq i\leq n$ and $1\leq r\leq 2g$, $t_{i,r}\in \ensuremath{\mathbb{Z}}$ is given by:
\begin{equation}\label{eq:deftij}
t_{i,r}=\begin{cases}ks_{i,r} & \text{if $i\notin \{l_1,\ldots,l_m\}$}\\
\frac{k}{m}\Sigma_{j=1}^{m} s_{l_j,r}& \text{if $i=l_{j}$, where $1\leq j\leq m$.}
\end{cases}
\end{equation}
\end{lem}
\begin{proof}
Let $z\in B_{n}(M)/\Gamma_2(P_n(M))$ be as in the statement, let $\overline{\sigma}(z)=(l_1,\ldots,l_m)$, where $m\geq 2$, and let $\omega=\psi(\overline{\sigma}(z))$. By \repr{toruscryst}, $\omega$ is of order $m$, and the decomposition $z=\omega\prod^{n}_{i=1}\prod^{2g}_{r=1}a^{s_{i,r}}_{i,r}$ arises from~\reqref{sestorus}. By \reco{abel} and \repr{action} and using the fact that $\omega^{k}=1$, we obtain:
\begin{align}
z^{k}&= \left( \omega\prod^{n}_{i=1}\prod^{2g}_{r=1}a^{s_{i,r}}_{i,r}\right)^{k}= \omega^{k} \left[ \prod_{j=1}^{k} \omega^{j-k} \left( \prod^{n}_{i=1} \prod^{2g}_{r=1}a^{s_{i,r}}_{i,r} \right)\omega^{k-j} \right]= \prod_{j=1}^{k} \prod^{n}_{i=1}\prod^{2g}_{r=1}a^{s_{i,r}}_{\overline{\sigma}(\omega^{k-j})(i),r}\notag\\
&= \prod^{n}_{i=1}\prod^{2g}_{r=1} \prod_{j=1}^{k} a^{s_{\overline{\sigma}(\omega^{j-k})(i),r}}_{i,r}= \prod^{n}_{i=1}\prod^{2g}_{r=1} a^{t_{i,r}}_{i,r},\label{eq:thetak}
\end{align}
where $t_{i,r}= \sum_{j=1}^{k} s_{\overline{\sigma}(\omega^{j-k})(i),r}$ for all $1\leq i\leq n$ and $1\leq r\leq 2g$. Equation~\reqref{deftij} then follows, using the fact that $\overline{\sigma}(\omega^{-u})(l_i)=l_{i-u}$ for all $u\in \ensuremath{\mathbb{Z}}$, where the index $i-u$ is taken modulo $m$.
\end{proof}
We now prove \reth{ordk0}.
\begin{proof}[Proof of \reth{ordk0}]\mbox{}
\begin{enumerate}[(a)]
\item Let $\map{\psi}{S_n}[B_n(M)/\Gamma_2(P_n(M))]$ be the section for the short exact sequence~\reqref{sestorus} given in the proof of Proposition \ref{prop:toruscryst}, and let $e_{1}$ and $e_{2}$ be finite-order elements of $B_n(M)/\Gamma_2(P_n(M))$. If $e_{1}$ and $e_{2}$ are conjugate in $B_n(M)/\Gamma_2(P_n(M))$ then $\overline{\sigma}(e_1)$ and $\overline{\sigma}(e_2)$ are conjugate in $S_{n}$, and so have the same cycle type. Conversely, suppose that the permutations $\overline{\sigma}(e_1)$ and $\overline{\sigma}(e_2)$ have the same cycle type. Then they are conjugate in $S_{n}$, so there exists $\xi\in S_{n}$ such that $\overline{\sigma}(e_1)=\xi \overline{\sigma}(e_2) \xi^{-1}$, and up to substituting $e_{2}$ by $\psi(\xi^{-1}) e_{2} \psi(\xi)$ if necessary, we may assume that $\overline{\sigma}(e_1)=\overline{\sigma}(e_2)$. We claim that if $\theta$ is any finite-order element of $B_n(M)/\Gamma_2(P_n(M))$ then $\theta$ and $\psi(\overline{\sigma}(\theta))$ are conjugate in $B_n(M)/\Gamma_2(P_n(M))$. This being the case, for $i=1,2$, $e_{i}$ is conjugate to $\psi(\overline{\sigma}(e_{i}))$, but since $\psi(\overline{\sigma}(e_{1}))=\psi(\overline{\sigma}(e_{2}))$, it follows that $e_{1}$ and $e_{2}$ are conjugate as required, which proves the first part of the statement. To prove the claim, set $\theta=\omega\prod^{n}_{i=1}\prod^{2g}_{r=1}a^{s_{i,r}}_{i,r}\in B_{n}(M)/\Gamma_2(P_n(M))$ as in the proof of \relem{coeftjr}, where $\omega= \psi(\overline{\sigma}(\theta))$. It thus suffices to prove that $\theta$ and $\omega$ are conjugate in $B_n(M)/\Gamma_2(P_n(M))$. Let $\overline{\sigma}(\theta)= \tau_{1}\cdots \tau_{d}$ be the cycle decomposition of $\overline{\sigma}(\theta)$, where for $i=1,\ldots,d$, $\tau_{i}=(l_{i,1},\ldots,l_{i,m_{i}})$ is an $m_{i}$-cycle, and $m_{i}\geq 2$, and let $k=\operatorname{\text{lcm}}(m_{1},\ldots,m_{d})$ be the order of $\overline{\sigma}(\theta)$, which is also the order of $\theta$ and of $\omega$. For $t=1,\ldots,n$ and $r=1,\ldots, 2g$, we define $p_{t,r}\in \ensuremath{\mathbb{Z}}$ as follows. If $t$ does not belong to the support $\operatorname{\text{Supp}}(\overline{\sigma}(\theta))$ of $\overline{\sigma}(\theta)$, let $p_{t,r}=0$. If $t\in \operatorname{\text{Supp}}(\overline{\sigma}(\theta))$ then $t=l_{i,q}$ for some $1\leq i\leq d$ and $1\leq q \leq m_{i}$, and we define $p_{t,r}= -\sum_{j=1}^{q} s_{l_{i,j},r}$. It follows from~\relem{coeftjr} and the fact that $\theta$ is of order $k$ that $p_{l_{i,m_{i}},r}=0$, for all $i=1,\ldots,d$. Then for all $1\leq i\leq d$, $2\leq q\leq m_{i}$ and $1\leq r\leq 2g$, we have:
\begin{equation}\label{eq:diffp}
\text{$p_{l_{i,q-1},r}-p_{l_{i,q},r}=s_{l_{i,q},r}$ and $p_{l_{i,m_{i}},r}-p_{l_{i,1},r}=-p_{l_{i,1},r}=s_{l_{i,1},r}$.}
\end{equation}
Let $\alpha=\prod^{n}_{i=1}\prod^{2g}_{r=1}a^{p_{i,r}}_{i,r}\in P_{n}(M)/\Gamma_2(P_n(M))$. By \reco{abel} and \repr{action}, we have:
\begin{align*}
\alpha \omega \alpha^{-1} &= \omega\ldotp \omega^{-1} \left(\prod^{n}_{i=1}\prod^{2g}_{r=1}a^{p_{i,r}}_{i,r} \right)\omega \ldotp \prod^{n}_{i=1}\prod^{2g}_{r=1}a^{-p_{i,r}}_{i,r} = \omega \left( \prod^{n}_{i=1}\prod^{2g}_{r=1}a^{p_{\overline{\sigma}(\omega^{-1})(i),r}}_{i,r} \right) \ldotp \prod^{n}_{i=1}\prod^{2g}_{r=1}a^{-p_{i,r}}_{i,r}\\
&= \omega\prod^{n}_{i=1}\prod^{2g}_{r=1}a^{p_{\overline{\sigma}(\omega^{-1})(i),r}-p_{i,r}}_{i,r}=\omega \prod^{n}_{i=1}\prod^{2g}_{r=1}a^{s_{i,r}}_{i,r}=\theta,
\end{align*}
where we have also made use of~\reqref{diffp}. Thus $\theta$ is conjugate to $\omega$, which proves the claim, and thus the first part of the statement.
\item We start by showing that if $H\subset B_n(M)/\Gamma_2(P_n(M))$ is isomorphic to $S_n$ then $H$ and $\psi(\overline{\sigma}(H))$ are conjugate. This being the case, it follows that each of the subgroups $H_1, H_2$ is conjugate to $\psi(\overline{\sigma}(H))$, and the result follows. Suppose that $H$ is a group isomorphic to $S_{n}$ that embeds in $(\mathbb{Z}^n \oplus\cdots\oplus \mathbb{Z}^n)\rtimes S_n$. Using the $\mathbb{Z}[S_n]$-module structure of $\mathbb{Z}^{2ng}$ given above, it follows that $H$ embeds in $\mathbb{Z}^{n}\rtimes S_n$, for any one of $2g$ summands of $\mathbb{Z}^{n}$. Let us first prove that the result holds for such an embedding. Let $\map{s}{H}[\mathbb{Z}^{n}\rtimes S_n]$ be an embedding, let $\map{\pi}{\mathbb{Z}^{n}\rtimes S_n}[S_{n}]$ be projection onto the second factor, and let $\map{\psi}{S_{n}}[\mathbb{Z}^{n}\rtimes S_n]$ be inclusion into the second factor. Since $\ker{\pi}=\ensuremath{\mathbb{Z}}^{n}$ is torsion free, the restriction of $\pi$ to $s(H)$ is injective, and so $\map{\pi\circ s}{H}[S_{n}]$ is an isomorphism. Let us prove that the subgroups $s(H)$ and $S_{n}$ of $\mathbb{Z}^{n}\rtimes S_n$ are conjugate. Let $\brak{\tau_1,\ldots,\tau_{n-1}}$ be the generating set of $S_{n}$ defined previously, and for $i=1,\ldots,n-1$, let $\alpha_{i}$ be the unique element of $H$ for which $\pi\circ s(\alpha_{i})=\tau_{i}$. Then $H$ is generated by $\brak{\alpha_1,\ldots,\alpha_{n-1}}$, subject to the Artin relations and $\alpha_{i}^{2}=1$ for all $i=1,\ldots,n-1$. There exist $a_{i,j}\in \ensuremath{\mathbb{Z}}$, where $1\leq i\leq n-1$ and $1\leq j\leq n$, such that $s(\alpha_{i})=(a_{i,1},\ldots,a_{i,n})\tau_{i}$ in $\mathbb{Z}^{n}\rtimes S_n$. Using the action of $S_{n}$ on $\ensuremath{\mathbb{Z}}^{n}$ and the fact that $\alpha_{i}^{2}=1$, it follows that $a_{i,j}=0$ for all $j\neq i,i+1$, and $a_{i,i+1}=-a_{i,i}$. Then $s(\alpha_{i})=(0,\ldots,0,a_i,-a_i,0,\ldots,0)\tau_i$ for all $1\leq i\leq n-1$, where $a_i=a_{i,i}$, and the element $a_{i}$ is in the $i$th position. One may check easily that these elements also satisfy the Artin relations in $\mathbb{Z}^{n}\rtimes S_n$. Let $x_{1}\in \ensuremath{\mathbb{Z}}$, and for $i=2,\ldots, n$, let $x_{i}= x_{1}-\sum_{j=1}^{i-1}a_j$. Thus $x_{i}-x_{i+1}=a_{i}$ for all $i=1,\ldots, n-1$, and so $(x_1,x_2,\ldots, x_{i},x_{i+1},\ldots, x_n)\tau_i(-x_1,-x_2,\ldots,-x_{i},-x_{i+1},\ldots-x_n)= (0,\ldots,0,a_i,-a_i,0, \ldots,0) \tau_i= s(\alpha_{i})$. We conclude that the subgroups $s(H)$ and $S_{n}$ of $\mathbb{Z}^{n}\rtimes S_n$ are conjugate.
Returning to the general case where $H$ embeds in $(\mathbb{Z}^n \oplus\cdots\oplus \mathbb{Z}^n)\rtimes S_n$, the previous paragraph shows that the embedding of $H$ into each $\mathbb{Z}^{n}\rtimes S_n$ is conjugate by an element of the same factor $\mathbb{Z}^{n}$ to the factor $S_{n}$. The result follows by conjugating by the element of $\mathbb{Z}^n \oplus\cdots\oplus \mathbb{Z}^n$ whose $i$th factor is the conjugating element associated to the $i$th copy of $\mathbb{Z}^{n}\rtimes S_n$ for all $i=1,\ldots,2g$.\qedhere
\end{enumerate}
\end{proof}
With the statement of \reth{ordk0} in mind, one may ask whether the result of the claim extends to other finite subgroups. More precisely, if $G$ is a finite subgroup of $B_n(M)/\Gamma_2(P_n(M))$, are $G$ and $\psi(\overline{\sigma}(G))$ conjugate? We have a positive answer in the following case.
\begin{prop}\label{prop:embedd}
Let $M$ be a compact, orientable surface without boundary of genus $g\geq 1$. If $H_1$ and $H_2$ are subgroups of $B_{5}(M)/\Gamma_2(P_5(M))$ that are isomorphic to the Frobenius group $\mathbb{Z}_5\rtimes \mathbb{Z}_{2}$ then they are conjugate.
\end{prop}
\begin{proof}
Using \repr{toruscryst}, we identify $B_5(M)/\Gamma_2(P_5(M))$ with $\mathbb{Z}^{10g}\rtimes S_5$. As in the proof of \reth{ordk0}(\ref{it:ordk0b}), we decompose the first factor as a direct sum $\mathbb{Z}^{10g}=\mathbb{Z}^5 \oplus\cdots\oplus \mathbb{Z}^5$ of $2g$ copies of $\mathbb{Z}^5$, which we interpret as a $\mathbb{Z}[S_5]$-module, the module structure being given by \repr{action}.
Let $H$ be a group isomorphic to a subgroup of $S_{5}$ that embeds in $(\mathbb{Z}^5 \oplus\cdots\oplus \mathbb{Z}^5)\rtimes S_5\cong B_5(M)/\Gamma_2(P_5(M))$. Using the $\mathbb{Z}[S_5]$-module structure of $\mathbb{Z}^{10g}$ given above, it follows that $H$ embeds in $\mathbb{Z}^{5}\rtimes S_5$, for any one of the $2g$ summands of $\mathbb{Z}^{5}$. We will first prove the statement for the embedding of the Frobenius group $\mathbb{Z}_5\rtimes \mathbb{Z}_{2}$ in $\mathbb{Z}^{5}\rtimes S_5$, and then deduce the result in the general case. Let $H$ be this Frobenius group, let $\map{s}{H}[\mathbb{Z}^{5}\rtimes S_5]$ be an embedding, let $\map{\pi}{\mathbb{Z}^{5}\rtimes S_5}[S_{5}]$ be projection onto the first factor, and let $\map{\psi}{S_{5}}[\mathbb{Z}^{5}\rtimes S_5]$ be inclusion into the second factor. Since $\ker{\pi}=\ensuremath{\mathbb{Z}}^{5}$ is torsion free, the restriction of $\pi$ to $s(H)$ is injective, and so $\map{\pi\circ s}{H}[S_{5}]$ is an embedding of $H$ into $S_{5}$. Let us prove that the subgroups $s(H)$ and $\psi\circ \pi\circ s(H)$ of $\mathbb{Z}^{5}\rtimes S_5$ are conjugate. First observe that the Frobenius group $\mathbb{Z}_5\rtimes \mathbb{Z}_2$ embeds in $S_{5}$ by sending a generator $\iota_5$ of $ \mathbb{Z}_5$ to the permutation $w_1=(1,2,3,4,5)$ and the generator $\iota_2$ of $\mathbb{Z}_2$ to $w_2=(1,4) (2,3)$. The group $S_{5}$ contains six cyclic subgroups of order $5$ that are conjugate to $\ang{w_{1}}$, from which we deduce the existence of six pairwise conjugate subgroups of $S_{5}$ isomorphic to $\mathbb{Z}_5\rtimes \mathbb{Z}_2$, each of which contains one of the cyclic subgroups of order $5$. We claim that these are exactly the subgroups of $S_{5}$ isomorphic to $\mathbb{Z}_5\rtimes \mathbb{Z}_2$. To see this, let $K$ be such a subgroup. Then the action of an element $k$ of $K$ of order $2$ on a $5$-cycle $(a_{1},\ldots,a_{5})$ of $K$ inverts the order of the elements $a_{1},\ldots,a_{5}$, and this can only happen if $k$ is a product of two disjoint transpositions.
Further, there are exactly five products of two disjoint transpositions whose action by conjugation on $(a_{1},\ldots,a_{5})$ inverts the order of the elements $a_{1},\ldots,a_{5}$, and these are precisely the elements of $K$ of order $2$. In particular, each cyclic subgroup of $S_{5}$ of order $5$ is contained in exactly one subgroup of $S_{5}$ isomorphic to $\mathbb{Z}_5\rtimes \mathbb{Z}_2$. This proves the claim. So up to composing $\pi$ by an inner automorphism of $S_{5}$ if necessary, we may assume that $\pi\circ s(H)=\ang{w_1,w_2}$. Applying methods similar to those of the proof of \relem{coeftjr}, the relations $\iota_5^5=1$ and $\iota_2^2=1$ imply that there exist $a_1,\ldots,a_5 ,x, y\in \ensuremath{\mathbb{Z}}$ such that:
\begin{equation}\label{eq:imsw}
\text{$s(w_1)=(a_1, a_2, a_3, a_4, -a_1-a_2-a_3-a_4)w_1$ and $s(w_2)=(x, y, -y, -x, 0)w_2$.}
\end{equation}
Taking the image of the relation $w_2w_1w_2^{-1}=w_1^{-1}$ by $s$, using~\reqref{imsw} and simplifying the resulting expression, we obtain:
\begin{equation}\label{eq:eqxy}
\text{$x=-a_2-a_3-a_4$ and $y=-a_3$.}
\end{equation}
Any map $\map{s}{H}[\mathbb{Z}^{5}\rtimes S_5]$ of the form~\reqref{imsw} for which the relations~\reqref{eqxy} hold gives rise to an embedding of $H$ in $\mathbb{Z}^{5}\rtimes S_5$. We claim that the image of the embedding is conjugate to the group $\ang{w_{1},w_{2}}$ (viewed as a subgroup of the second factor of $\mathbb{Z}^{5}\rtimes S_5$). To do so, let $\map{s}{H}[\mathbb{Z}^{5}\rtimes S_5]$ of the form~\reqref{imsw} for which the relations~\reqref{eqxy} hold. We will show that there exists $a\in \mathbb{Z}^5$ such that $aw_{i}a^{-1}=s(w_{i})$ for $i=1,2$. Let $\lambda_{5}\in \ensuremath{\mathbb{Z}}$, and for $i=1,\ldots,4$, let $\lambda_{i}=\lambda_{5}+\sum_{j=1}^{i} a_{i}$, and let $a=(\lambda_1,\lambda_2, \lambda_3, \lambda_4, \lambda_5)\in \mathbb{Z}^5$. Then in $\mathbb{Z}^{5}\rtimes S_5$, using~\reqref{imsw} and~\reqref{eqxy}, we have:
\begin{align*}
aw_{1}a^{-1}&= (\lambda_1,\lambda_2, \lambda_3, \lambda_4, \lambda_5) w_{1} (-\lambda_1, -\lambda_2, -\lambda_3, -\lambda_4, -\lambda_5)\\
&= (\lambda_1,\lambda_2, \lambda_3, \lambda_4, \lambda_5) \ldotp (-\lambda_5,-\lambda_1, -\lambda_2, -\lambda_3, -\lambda_4)w_{1}\\
&= (\lambda_1-\lambda_5,\lambda_2-\lambda_1, \lambda_3-\lambda_2, \lambda_4-\lambda_3, \lambda_5-\lambda_4)w_{1}\\
&=(a_{1},a_{2},a_{3},a_{4},-a_1-a_2-a_3-a_4) w_{1}=s(w_{1}),
\end{align*}
and
\begin{align*}
aw_{2}a^{-1}&=(\lambda_1,\lambda_2, \lambda_3, \lambda_4, \lambda_5) w_{2} (-\lambda_1, -\lambda_2, -\lambda_3, -\lambda_4, -\lambda_5)\\
&= (\lambda_1,\lambda_2, \lambda_3, \lambda_4, \lambda_5) \ldotp (-\lambda_4, -\lambda_3, -\lambda_2, -\lambda_1, -\lambda_5)w_{2}\\
&= (\lambda_1-\lambda_4, \lambda_2-\lambda_3, \lambda_3-\lambda_2, \lambda_4-\lambda_1, 0) w_{2}\\
&= (-a_2-a_3-a_4, -a_{3},a_{3}, a_2+a_3+a_4,0)w_{2}=(x,y,-y,-x,0)w_{2}=s(w_{2}).
\end{align*}
It follows that the subgroups $s(H)$ and $\ang{w_{1},w_{2}}$ are conjugate in $\mathbb{Z}^{5}\rtimes S_5$.
As in the proof of \reth{ordk0}(\ref{it:ordk0b}), returning to the general case where $H$ embeds in $(\mathbb{Z}^5 \oplus\cdots\oplus \mathbb{Z}^5)\rtimes S_5$, the previous paragraph shows that the embedding of $H$ into each $\mathbb{Z}^{5}\rtimes S_5$ is conjugate by an element of the same factor $\mathbb{Z}^{5}$ to the factor $S_{5}$. The result follows by conjugating by the element of $\mathbb{Z}^5 \oplus\cdots\oplus \mathbb{Z}^5$ whose $i$th factor is the conjugating element associated to the $i$th copy of $\mathbb{Z}^{5}\rtimes S_5$ for all $i=1,\ldots,2g$.
\end{proof}
\section{Some Bieberbach subgroups of $B_n(M)/\Gamma_2(P_n(M))$ and K\"ahler flat manifolds}\label{sec:3}
By \reco{subgroup}, for any subgroup $H$ of $S_n$, the quotient group $\sigma^{-1}(H)/\Gamma_2(P_n(M))$ is a crystallographic group that is not Bieberbach since it has torsion elements. We start by proving \reth{bieberbach}, which states that $B_n(M)/\Gamma_2(P_n(M))$ admits Bieberbach subgroups. More precisely, for all $n\geq 2$, we will consider the cyclic subgroup $G_{n}=\ang{(n,n-1,\ldots,2,1)}$ of $S_n$, and we show that $\sigma^{-1}(G_n)/\Gamma_2(P_n(M))$ admits a Bieberbach subgroup $\widetilde{G}_{n,g}$ of dimension $2ng$ whose holonomy group is $G_n$. The group $\widetilde{G}_{n,g}$ is thus the fundamental group of a flat manifold. In \reth{anosov}, we will prove that this flat manifold is orientable and admits a K\"ahler structure as well as Anosov diffeomorphisms.
\begin{proof}[Proof of \reth{bieberbach}]
Let $\alpha_{n-1}=\sigma_1\cdots \sigma_{n-1} \in B_n(M)/\Gamma_2(P_n(M))$. By~\req{sestorus}, $\overline{\sigma}(\alpha_{n-1})$ generates the subgroup $G_n$ of $S_{n}$. Further, the full twist of $B_n(M)$ is a coset representative of $\alpha_{n-1}^n$ by~\reqref{deffulltwist}, hence $\alpha_{n-1}^n=1$ in $B_n(M)/\Gamma_2(P_n(M))$ using \repr{subs}(\ref{subs:5}). By \repr{action}, the action by conjugation of $\alpha_{n-1}$ on the elements of the basis $\{ a_{i,r} \,\mid\, \text{$i=1,\ldots,n$ and $r=1,\ldots, 2g$}\}$ of $P_n(M)/\Gamma_2(P_n(M))$ given by \reco{abel} is as follows:
\begin{equation}\label{eq:actalpha}
\alpha_{n-1}:\,
\text{$a_{1,r}\mapsto a_{2,r}\mapsto \cdots \mapsto a_{n-1,r}\mapsto a_{n,r}\mapsto a_{1,r}$ for all $r=1,\ldots, 2g$.}
\end{equation}
Using~\reqref{actalpha} and the fact that $\alpha_{n-1}^n=1$ in $B_n(M)/\Gamma_2(P_n(M))$, we have:
\begin{equation}\label{eq:alphan}
(a_{1,1}\alpha_{n-1})^{n} = a_{1,1} a_{2,1} \cdots a_{n,1} ( \alpha_{n-1} )^n = a_{1,1} a_{2,1} \cdots a_{n,1} \Delta_n^2 = \prod_{i=1}^na_{i,1}.
\end{equation}
Let $X=\{ a_{1,1}\alpha_{n-1},\, a_{i,r}^n\,\vert\, \text{$1\leq i\leq n$ and $1\leq r\leq 2g$} \}$, let $Y=\{\, \prod_{i=1}^na_{i,1},\, a_{i,r}^n\,\vert\, \text{$1\leq i\leq n$ and $1\leq r\leq 2g$} \}$, and let $\widetilde{G}_{n,g}$ (resp.\ $L$) be the subgroup of $\sigma^{-1}(G_n)/\Gamma_2(P_n(M))$ generated by $X$ (resp.\ $Y$). Then the restriction $\map{\overline{\sigma}\bigl\lvert_{\widetilde{G}_{n,g}}\bigr.}{\widetilde{G}_{n,g}}[G_{n}]$ is surjective, and using~\reqref{alphan}, we see that $L$ is a subgroup of $\widetilde{G}_{n,g}$. We claim that $L=\ensuremath{\operatorname{\text{Ker}}}\bigl(\overline{\sigma}\bigl\lvert_{\widetilde{G}_{n,g}}\bigr.\bigr)$. Clearly, $L \subset\ensuremath{\operatorname{\text{Ker}}}\bigl(\overline{\sigma}\bigl\lvert_{\widetilde{G}_{n,g}}\bigr.\bigr)$. Conversely, let $w\in \ensuremath{\operatorname{\text{Ker}}}\bigl(\overline{\sigma}\bigl\lvert_{\widetilde{G}_{n,g}}\bigr.\bigr)$. Writing $w$ in terms of the generating set $X$ of $\widetilde{G}_{n,g}$ and using~\reqref{actalpha} and \reco{abel}, it follows that $\displaystyle w=(a_{1,1}\alpha_{n-1})^{m} \prod_{\substack{1\leq i\leq n\\ 1\leq r\leq 2g}} a_{i,r}^{n\delta_{i,r}}$, where $m\in \ensuremath{\mathbb{Z}}$ and $\delta_{i,r}\in \ensuremath{\mathbb{Z}}$ for all $1\leq i\leq n$ and $1\leq r\leq 2g$. The fact that $w\in \ensuremath{\operatorname{\text{Ker}}}\bigl(\overline{\sigma}\bigl\lvert_{\widetilde{G}_{n,g}}\bigr.\bigr)$ implies that $n$ divides $m$, and so $\displaystyle w=((a_{1,1}\alpha_{n-1})^{n})^{m/n} \prod_{\substack{1\leq i\leq n\\ 1\leq r\leq 2g}} a_{i,r}^{n\delta_{i,r}} \in L$, which proves the claim. Thus the following extension:
\begin{equation}\label{eq:sesGng}
1\to L \to \widetilde{G}_{n,g} \stackrel{\overline{\sigma}\bigl\lvert_{\widetilde{G}_{n,g}}\bigr.}{\to} G_{n} \to 1,
\end{equation}
is short exact. Now $L$ is also a subgroup of $P_{n}(M)/\Gamma_{2}(P_{n}(M))$, which is free Abelian of rank $2ng$ by \reco{abel}. Since $\{ a_{i,r} \,\mid\, \text{$i=1,\ldots,n$ and $r=1,\ldots, 2g$}\}$ is a basis of $P_{n}(M)/\Gamma_{2}(P_{n}(M))$, it follows from analysing $Y$ that $Y'=\{\, \prod_{i=1}^na_{i,1},\, a_{i,1}^n, a_{j,r}^n\,\vert\, \text{$2\leq i\leq n$, $1\leq j\leq n$ and $2\leq r\leq 2g$} \}$ is a basis of $L$. In particular $L$ is free Abelian of rank $2ng$. In terms of the basis $Y'$, the holonomy representation $\map{\rho}{G_n}[\operatorname{\text{Aut}}(L)]$ associated with the short exact sequence~\reqref{sesGng} is given by the block diagonal matrix:
\begin{equation}\label{eq:actmatrix}
\rho((1,n,n-1,\ldots,2))=\left( \begin{smallmatrix}
M_{1} & & &\\
& M_{2} & &\\
& & \ddots &\\
& & & M_{2g}
\end{smallmatrix}
\right),
\end{equation}
where $M_{1},\ldots,M_{2g}$ are the $n$-by-$n$ matrices satisfying:
\begin{equation*}
\text{$M_{1}=\left(
\begin{smallmatrix}
1 & 0 & 0 & \cdots & 0 & 0 & n\\
0 & 0 & 0 & \cdots & 0 & 0 & -1\\
0 & 1 & 0 & \cdots & 0 & 0 & -1\\
0 & 0 & 1 & \cdots & 0 & 0 & -1\\
\vdots & \vdots & \vdots & \ddots & \vdots & \vdots & \vdots\\
0 & 0 & 0 & \cdots & 1 & 0 & -1\\
0 & 0 & 0 & \cdots & 0 & 1 & -1
\end{smallmatrix}\right)$ and $M_{2}=\cdots=M_{2g}=
\left(
\begin{smallmatrix}
0 & 0 & 0 & \cdots & 0 & 0 & 1\\
1 & 0 & 0 & \cdots & 0 & 0 & 0\\
0 & 1 & 0 & \cdots & 0 & 0 & 0\\
0 & 0 & 1 & \cdots & 0 & 0 & 0\\
\vdots & \vdots & \vdots & \ddots & \vdots & \vdots & \vdots\\
0 & 0 & 0 & \cdots & 1 & 0 & 0\\
0 & 0 & 0 & \cdots & 0 & 1 & 0
\end{smallmatrix}
\right)$,}
\end{equation*}
where we have used the relation $a_{1,1}^n= (\prod_{i=1}^na_{i,1})^n\cdot \prod_{i=2}^n(a_{i,1}^n)^{-1}$. It follows from this description that $\rho$ is injective, and from \relem{cryst} and~\reqref{sesGng} that $\widetilde{G}_{n,g}$ is a crystallographic group of dimension $2ng$ and whose holonomy group is $\mathbb{Z}_n$.
Now we prove that $\widetilde{G}_{n,g}$ is torsion free. Let $\omega\in \widetilde{G}_{n,g}$ be an element of finite order. Since $L$ is torsion free, the order of $\omega$ is equal to that of $\overline{\sigma}(\omega)$ in the cyclic group $G_{n}$, in particular $\omega^n=1$. Using~\reqref{actalpha} and~\reqref{alphan}, as well as the fact that $L$ is torsion free, there exist $\theta\in L$ and $j\in \{ 0,1,2,\ldots,n-1 \}$ such that $\omega=\theta(a_{1,1}\alpha_{n-1})^j$. Making use of the basis $Y'$ of $L$,
\begin{equation}\label{eq:thetadev}
\theta=\biggl(\prod_{i=1}^na_{i,1}\biggr)^{\lambda_{1,1}}\ldotp \prod_{i=2}^na_{i,1}^{n\lambda_{i,1}} \ldotp \prod^{2g}_{r=2}\prod_{i=1}^na_{i,r}^{n\lambda_{i,r}},
\end{equation}
where $\lambda_{i,r}\in \mathbb{Z}$ for all $i=1,\ldots,n$ and $r=1,\ldots,2g$. On the other hand:
\begin{equation}\label{eq:omegan}
1=\omega^{n}= \biggl(\,\prod_{k=0}^{n-1} (a_{1,1}\alpha_{n-1})^{jk} \theta (a_{1,1}\alpha_{n-1})^{-jk}\biggr) (a_{1,1}\alpha_{n-1})^{nj}.
\end{equation}
By~\reqref{alphan}, $(a_{1,1}\alpha_{n-1})^{nj}=\prod_{i=1}^na_{i,1}^{j}$, and thus the right-hand side of~\reqref{omegan} belongs to $P_n(M)/\Gamma_2(P_n(M))$. We now compute the coefficient of $a_{1,1}$ in~\reqref{omegan} considered as one of the elements of the basis of $P_n(M)/\Gamma_2(P_n(M))$ given by \reco{abel}. From~\reqref{actalpha}, the terms appearing in the product $\prod^{2g}_{r=2}\prod_{i=1}^na_{i,r}^{n\lambda_{i,r}}$ of~\reqref{thetadev} do not contribute to this coefficient. Since conjugation by $a_{1,1}\alpha_{n-1}$ permutes cyclically the elements $a_{1,1},a_{2,1},\ldots,a_{n,1}$ by~\reqref{actalpha}, it follows that conjugation by $a_{1,1}\alpha_{n-1}$ leaves the first term $\prod_{i=1}^na_{i,1}^{\lambda_{1,1}}$ of~\reqref{thetadev} invariant, and so with respect to~\reqref{omegan}, it contributes $n\lambda_{1,1}$ to the coefficient of $a_{1,1}$. In a similar manner, with respect to~\reqref{omegan}, the second term of~\reqref{thetadev} contributes $n(\lambda_{2,1}+\cdots+\lambda_{n,1})$ to the coefficient of $a_{1,1}$. Putting together all of this information, the computation of the coefficient of $a_{1,1}$ in~\reqref{omegan} yields the relation $n(\lambda_{1,1}+\lambda_{2,1}+\cdots+\lambda_{n,1}) + j = 0$. We conclude that $j=0$, so $\omega=\theta=1$ because $L$ is torsion free, which using the first part of the statement, shows that $\widetilde{G}_{n,g}$ is a Bieberbach group.
To prove the last part of the statement, using~\cite[Lemma~5.2(3)]{Sz} and the fact that $G_{n}$ is cyclic,
the centre $Z(\widetilde{G}_{n,g})$ of $\widetilde{G}_{n,g}$ is given by:
\begin{align}
Z(\widetilde{G}_{n,g}) &=\{ \theta\in L \,\vert\, \text{$\rho(g)(\theta)=\theta$ for all $g\in G_{n}$}\}= \{ \theta\in L \,\vert\, \text{$\rho((1,n,\ldots, 2))(\theta)=\theta$}\}.\label{eq:zGng}
\end{align}
To compute $Z(\widetilde{G}_{n,g})$, let $\theta\in L$. Writing $\theta$ with respect to the basis $Y'$ of $L$ as a vector $\left( \begin{smallmatrix}
\beta_{1}\\
\vdots\\
\beta_{2g}
\end{smallmatrix}
\right)$, where for all $i=1,\ldots,2g$, $\beta_{i}$ is a column vector with $n$ elements, and using the description of the action $\rho$ given by~\reqref{actmatrix}, it follows that $\theta\in Z(\widetilde{G}_{n,g})$ if and only if $\beta_{i}$ belongs to the eigenspace of $M_{i}$ with respect to the eigenvalue $1$ for all $i=1,\ldots,2g$. It is straightforward to see that these eigenspaces are of dimension $1$, and are generated by $\left( \begin{smallmatrix}
1\\
0\\
\vdots\\
0
\end{smallmatrix}
\right)$ if $i=1$ and by $\left( \begin{smallmatrix}
1\\
\vdots\\
1
\end{smallmatrix}
\right)$ if $i=2,\ldots,2g$. We conclude using~\reqref{zGng} that $Z(\widetilde{G}_{n,g})$ is the free Abelian group generated by $\{ \prod_{i=1}^na_{i,1}, \prod_{i=1}^na_{i,r}^n \,\vert\, 2\leq r\leq 2g\}$. This generating set may be seen to be a basis of $Z(\widetilde{G}_{n,g})$, in particular, $Z(\widetilde{G}_{n,g})$ is free Abelian of rank $2g$.
\end{proof}
We do not know whether $B_n(M)/\Gamma_2(P_n(M))$ admits a Bieberbach
subgroup of maximal rank whose holonomy group is non Abelian. The
following proposition shows that a certain Frobenius group cannot be the holonomy of any Bieberbach subgroup of $B_n(M)/\Gamma_2(P_n(M))$.
\begin{prop}\label{prop:frob}
Let $p$ be an odd prime, and let $M$ be a compact, orientable surface without boundary of genus $g\geq 1$. In $B_p(M)/\Gamma_{2}(P_p(M))$ there is no Bieberbach subgroup $H$ such that $\overline{\sigma}(H)$ is isomorphic to the Frobenius group $\mathbb{Z}_p\rtimes_{\theta}\mathbb{Z}_{(p-1)/2}$, where the automorphism $\theta(\iota_{(p-1)/2})$ is of order $(p-1)/2$, $\iota_{(p-1)/2}$ being a generator of $\mathbb{Z}_{(p-1)/2}$.
\end{prop}
\begin{proof}
Let $H$ be a subgroup of $B_p(M)/\Gamma_{2}(P_p(M))$ such that $\overline{\sigma}(H)$ is isomorphic to the Frobenius group $\mathbb{Z}_p\rtimes_{\theta}\mathbb{Z}_{(p-1)/2}$. Let us show that $H$ has non-trivial elements of finite order. Using \repr{toruscryst}, we also identify $B_p(M)/\Gamma_{2}(P_p(M))$ with $\ensuremath{\mathbb{Z}}^{2gp}\rtimes S_{p}$. Each element $B_p(M)/\Gamma_{2}(P_p(M))$ may thus be written as $x\ldotp \psi(w)$ where $x\in P_p(M)/\Gamma_{2}(P_p(M))$ and $w\in S_p$, which we refer to as its normal form. As in the proofs of \reth{ordk0}(\ref{it:ordk0b}) and~\repr{embedd}, $P_p(M)/\Gamma_{2}(P_p(M))$ splits as a direct sum $\oplus_1^{2g}\mathbb{Z}^p$ that we interpret as a $\mathbb{Z}[S_p]$-module, the module structure being given by \repr{action}. If $z\in P_p(M)/\Gamma_{2}(P_p(M))$ then for $j=1,\ldots,2g$, let $z_j$ denote its projection onto the $j$th summand of $\oplus_1^{2g}\mathbb{Z}^p$, and
for $(z,\tau)\in \mathbb{Z}^{2gp}\rtimes S_p$, let $(z,\tau)_j=(z_j,\tau)\in \mathbb{Z}^p\rtimes S_p$. Let $\map{\epsilon}{\mathbb{Z}^{p}}[\mathbb{Z}]$ denote the augmentation homomorphism. We extend $\epsilon$ to a map from $\mathbb{Z}^p\rtimes S_p$ to $\ensuremath{\mathbb{Z}}$, also denoted by $\epsilon$, by setting $\epsilon(z,\tau)=\epsilon(z)$ for all $(z,\tau)\in \mathbb{Z}^p\rtimes S_p$. Using the $\mathbb{Z}[S_p]$-module structure, observe that:
\begin{equation}\label{eq:epsz}
\text{$\epsilon((\lambda z\lambda^{-1})_j)=\epsilon(z_j)$ for all $\lambda\in B_p(M)/\Gamma_{2}(P_p(M))$ and $z\in P_p(M)/\Gamma_{2}(P_p(M))$.}
\end{equation}
Hence for all $(z,\tau),(z',\tau') \in \mathbb{Z}^p\rtimes S_p$:
\begin{equation*}
\epsilon(z\tau \ldotp z' \tau')= \epsilon(z\tau z' \tau^{-1}\ldotp \tau \tau')= \epsilon(z\ldotp \tau z' \tau^{-1})=\epsilon(z) \ldotp \epsilon(\tau z' \tau^{-1})= \epsilon(z) +\epsilon(z')=\epsilon(z,\tau)+ \epsilon(z',\tau'),
\end{equation*}
and thus $\map{\epsilon}{\mathbb{Z}^p\rtimes S_p}[\ensuremath{\mathbb{Z}}]$ is a homomorphism. Identifying $\overline{\sigma}(H)$ with the Frobenius group $\mathbb{Z}_p\rtimes_{\theta}\mathbb{Z}_{(p-1)/2}$, let $w_1, w_2\in S_p$ be generators of $\mathbb{Z}_p$ and $\mathbb{Z}_{(p-1)/2}$ respectively. For $i=1,2$, let $v_{i}\in H$ be such that $\overline{\sigma}(v_{i})=w_{i}$, and let $a_{i}\in P_p(M)/\Gamma_{2}(P_p(M))$ be such that $v_{i}=a_{i} \psi(w_{i})$, where $\map{\psi}{S_p}[B_p(M)/\Gamma_2(P_p(M))]$ is the section for $\overline{\sigma}$ given in the proof of \repr{toruscryst}. Using the relation $w_2w_1w_2^{-1}=w_1^l$ in the Frobenius group, where $l$ is an element of the multiplicative group $\mathbb{Z}_p^{\ast}$ of order $(p-1)/2$, we have $v_2v_1v_2^{-1}v_1^{-l}\in H\cap P_p(M)/\Gamma_{2}(P_p(M))$. Further:
\begin{align*}
v_2v_1v_2^{-1}v_1^{-l} =& a_{2} \psi(w_{2}) a_{1} \psi(w_{1}) \psi(w_{2})^{-1}a_{2}^{-1} (a_{1} \psi(w_{1}))^{-l}\\
=& a_{2} \psi(w_{2}) a_{1} \psi(w_{2})^{-1}a_{2}^{-1} \ldotp a_{2} \ldotp \psi(w_2w_1w_2^{-1}) a_{2}^{-1} \psi(w_2w_1w_2^{-1})^{-1}\ldotp \psi(w_2w_1w_2^{-1}w_1^{-l})\ldotp\\
& \prod_{k=1}^{l}(\psi(w_{1})^{l-k} a_{1}^{-1} \psi(w_{1})^{k-l}),
\end{align*}
and applying~\reqref{epsz} and using the relation $w_2w_1w_2^{-1}=w_1^l$, it follows that:
\begin{equation}\label{eq:epsv1v2}
\epsilon((v_2v_1v_2^{-1}v_1^{-l})_i)= (1-l) \epsilon((a_{1})_{i})
\end{equation}
for all $1\leq i\leq 2g$. Let $v=v_2v_1v_2^{-1}v_1^{-l}v_1^{l-1}$. The element $v_1^{l-1}$ also belongs to $H$, so $v \in H$, and since $v_1^{l-1}=(a_{1} \psi(w_{1}))^{l-1}=\bigl(\prod_{k=0}^{l-2}(\psi(w_{1})^{k} a_{1} \psi(w_{1})^{-k})\bigr) \psi(w_{1})^{l-1}$, for all $1\leq i\leq 2g$, it follows that $(v)_{i}=\beta_{i} \psi(w_{1})^{l-1}$, where $\beta_{i}\in \ensuremath{\mathbb{Z}}^{p}$ is given by:
\begin{equation}\label{eq:beta}
\beta_{i}= (v_2v_1v_2^{-1}v_1^{-l})_i \ldotp \biggl(\prod_{k=0}^{l-2}(\psi(w_{1})^{k} a_{1} \psi(w_{1})^{-k})\biggr)_{i}.
\end{equation}
Using~\reqref{epsz},~\reqref{epsv1v2} and~\reqref{beta}, we see that:
\begin{equation}\label{eq:epsbeta}
\epsilon(\beta_{i})= \epsilon((v_2v_1v_2^{-1}v_1^{-l})_i)+\epsilon \biggl(\biggl( \prod_{k=0}^{l-2}(\psi(w_{1})^{k} a_{1} \psi(w_{1})^{-k})\biggr)_{i}\biggr)=(1-l) \epsilon((a_{1})_{i})+ (l-1) \epsilon((a_{1})_{i})=0
\end{equation}
for all $1\leq i\leq 2g$. Now in normal form, $v$ may be written $v=(\beta_{1},\ldots, \beta_{2g}) \psi(w_{1})^{l-1}$. Since $w_1^{l-1}$ is non trivial, it follows that $v$ is non trivial. Taking $z=v$ and $k=p$ in \relem{coeftjr} and using~\reqref{epsbeta} it follows that $v$ is of order $p$, and hence $H$ has non-trivial torsion elements. In particular, $H$ is not a Bieberbach group.
\end{proof}
It seems to be an interesting question to classify the subgroups of $S_n$ which can be the holonomy of a Bieberbach subgroup of $B_n(M)/\Gamma_2(P_n(M))$ of maximal rank. In the case where the subgroup is a semi-direct product, the argument given in the proof of \repr{frob} may be helpful in the study of the problem.
Using the holonomy representation of the Bieberbach group $\widetilde{G}_{n,g}$ of \reth{bieberbach}, given in \req{actmatrix}, we now prove some dynamical and geometric properties of the flat manifold ${\mathcal X}_{n,g}$ whose fundamental group is $\widetilde{G}_{n,g}$.
\begin{proof}[Proof of \reth{anosov}]
Let $n\geq 2$, let $g\geq 1$, let ${\mathcal X}_{n,g}$ be a Riemannian
compact flat manifold ${\mathcal X}_{n,g}$ whose fundamental group is $\widetilde{G}_{n,g}$, the Bieberbach group given in the statement of \reth{bieberbach}, and let $G_n$ be the cyclic group of that theorem. Let $1$ denote the generator $(1,n,n-1,\ldots,2)$ of $G_n$, and consider the holonomy representation $\map{\rho}{\mathbb{Z}_n} [\operatorname{\text{Aut}}(\mathbb{Z}^{2ng})]$ of $\widetilde{G}_{n,g}$ given in the proof of \reth{bieberbach}. By~\reqref{actmatrix}, if the characteristic polynomial of $\rho(1)$ is equal to $(x^n-1)^{2g}$, where $\map{\rho}{\mathbb{Z}_n} [\operatorname{\text{Aut}}(\mathbb{Z}^{2ng})]$ is the holonomy representation of $\widetilde{G}_{n,g}$. To see this, if $2\leq i\leq 2g$ then $M_{i}$ is the companion matrix of the polynomial $x^n-1$, and if we remove the first row and column of $M_{1}$, we obtain the companion matrix of the polynomial $1+x+x^2+\cdots +x^{n-1}$, so the characteristic polynomial of $M_{1}$ is also equal to $(x-1)(1+x+x^2+\cdots +x^{n-1})=x^n-1$. In particular, $\det(\rho(1))=1$, from which it follows from the end of~Section~\ref{sec:cryst} that ${\mathcal X}_{n,g}$ is orientable.
Further, the eigenvalues of $\rho(1)$ are the $n$th roots of unity each with multiplicity $2g$, and we conclude from \cite[Theorem~7.1]{Po} that ${\mathcal X}_{n,g}$ admits Anosov diffeomorphisms. By \cite[Theorems~6.4.12 and~6.4.13]{Dekimpe}, the first Betti number of $\mathcal{X}_{n,g}$ is given by:
\begin{align*}
\beta_{1}({\mathcal X}_{n,g})&=2ng - \operatorname{\text{rank}}(\rho(1)- I_{2ng})= 2ng - 2g(n-1)= 2g.
\end{align*}
It remains to show that ${\mathcal X}_{n,g}$ admits a K\"ahler structure. In order to do this, we make use of the following result from~\cite[Theorem~3.1 and Proposition~3.2]{JR} (see also \cite[Theorem~1.1 and Proposition~1.2]{DHS}) that a Bieberbach group $\Gamma$ of dimension $m$ is the fundamental group of a K\"ahler flat manifold with holonomy group $H$ if and only if $m$ is even, and each $\ensuremath{\mathbb R}$-irreducible summand of the holonomy representation $\map{\psi}{H}[\operatorname{\text{GL}}(m,\ensuremath{\mathbb R})]$ of $\Gamma$, which is also $\mathbb{C}$-irreducible, occurs with even multiplicity. Since $\dim({\mathcal X}_{n,g})=2ng$ and the character vector of the representation $\rho$ is equal to $\left(\begin{smallmatrix}
2ng \\
0\\
\vdots\\
0
\end{smallmatrix}\right)$, it follows that each real irreducible representation of $\rho$ appears $2g$ times in its decomposition, and hence that ${\mathcal X}_{n,g}$ admits a K\"ahler structure.
\end{proof}
The Betti numbers of the K\"ahler manifold ${\mathcal X}_{n,g}$ may be computed using the formula $\beta_i({\mathcal X}_{n,g})=\textrm{dim}(\Lambda^i(\ensuremath{\mathbb R}^{2n}))^{G_{n}}$ of~\cite[Page~370]{DHS}. For real dimensions $4$ and $6$, we may identify the fundamental group of ${\mathcal X}_{n,g}$ in the CARAT classification~\cite{Carat} and~\cite[Tables, pp.~368 and~370]{DHS}. More precisely, the
CARAT symbol of the $4$-dimensional Bieberbach group $\widetilde{G}_{2,1}$ (resp.\ the $6$-dimensional Bieberbach group $\widetilde{G}_{3,1}$) is 18.1 (resp.\ 291.1).
\section{The cases of the sphere and non-orientable surfaces without boundary}\label{sec:4}
Let $M$ be a compact, connected surface without boundary. In this section, we describe the quotient group $B_n(M)/\Gamma_2(P_n(M))$ for the cases not covered by \repr{toruscryst}, namely $M$ is either the $2$-sphere $\St$ or a compact, non-orientable surface of genus $g\geq 1$ without boundary, which we denote by $N_{g}$. If $g=1$ then $N_{1}$ is the projective plane $\ensuremath{\mathbb{R}P^2}$.
\begin{lem}\label{lem:torsion3}
Let $M$ be either the $2$-sphere $\St$ or a compact, non-orientable surface of genus $g\geq 1$ without boundary, and let $n\in \ensuremath{\mathbb N}$. The group $P_n(M)/\Gamma_2(P_n(M))$ is isomorphic to:
\begin{enumerate}[(a)]
\item\label{it:torsion3a} $\mathbb{Z}_2\oplus \mathbb{Z}^{n(n-3)/2}$ if $M=\St$ and $n\geq 3$. Further, the $\Gamma_2(P_n(M))$-coset of the full twist $\Delta_{n}^{2}$ is the generator of the summand $\mathbb{Z}_2$.
\item\label{it:torsion3b} $\mathbb{Z}_2^n \oplus\mathbb{Z}^{(g-1)n}$ if $M=N_g$.
\end{enumerate}
\end{lem}
\begin{proof}
Part~(\ref{it:torsion3a}) follows from~\cite[page~674]{GGzeit}. For part~(\ref{it:torsion3b}), if $g=1$ then $M=\ensuremath{\mathbb{R}P^2}$, and the result is a consequence of~\cite[Proposition~8]{GG}. So suppose that $g\geq 2$. We make use of~\cite[Theorem~5.1, Presentation~3]{GM}. Since $T_{i,i}=1$ for all $1\leq i\leq n$~\cite[page~439]{GM} then by relation~(Pr3) of that presentation, $T_{i,j}=T_{i,j-1}$ in $P_n(M)/\Gamma_2(P_n(M))$ for all $1\leq i<j\leq n$, and it follows by induction on $j-i$ that $T_{i,j}=1$. We conclude from the presentation that $P_n(M)/\Gamma_2(P_n(M))$ is generated by $\brak{a_{j,r} \,\mid\, \text{$1\leq j\leq n$ and $1\leq r\leq g$}}$, subject to the relations $a^{2}_{j,1}a^{2}_{j,2}\cdots a^{2}_{j,g}=1$ for all $1\leq j\leq n$, from which we obtain the given isomorphism.
\end{proof}
\begin{prop}\label{prop:sdp1}
Let $M=N_{g}$, where $g\geq 1$. In terms of the presentation of $B_{n}(M)$ given by~\cite[Theorem~2.2]{GM}, the map $\map{\psi}{S_n}[B_n(M)/\Gamma_2(P_n(M))]$ defined on the generating set $\{ \tau_{i} \,\vert\, i=1,\ldots, n-1\}$ of $S_{n}$ by $\psi(\tau_{i})=\sigma_i$ for all $1\leq i\leq n-1$ is an injective homomorphism. Consequently, the short exact sequence~\reqref{sestorus1} splits, and $B_n(M)/\Gamma_2(P_n(M)) \cong (\mathbb{Z}_2^n \oplus\mathbb{Z}^{n(g-1)}) \rtimes S_n$
\end{prop}
\begin{proof}
Since $\tau_{1},\ldots,\tau_{n-1}$ and $\sigma_{1},\ldots,\sigma_{n-1}$ satisfy the Artin relations, and using~\reqref{sestorus1}, it suffices to show that $\sigma_i^2=1$ in $B_n(M)/\Gamma_2(P_n(M))$ for all $i=1,\ldots,n-1$. We now prove that this is the case. If $g=1$ (resp.\ $g\geq 2$), with the notation of~\cite[Theorem~7]{GG} (resp.~\cite[Theorem~2.2]{GM}), $\sigma_i^2=A_{i,i+1}$ (resp.\ $\sigma_i^2 =T_{i,i+1}$) in $P_{n}(M)$ for all $1\leq i\leq n-1$, so $\sigma_i^2$ belongs to $\Gamma_{2}(P_{n}(M))$ by~\cite[Proposition~8]{GG} (resp.\ by the proof of \relem{torsion3}), and thus its $\Gamma_{2}(P_{n}(M))$-coset is trivial in $B_n(M)/\Gamma_2(P_n(M))$ as required.
\end{proof}
By \relem{torsion3}, if $M=\St$ or $N_{g}$, where $g\geq 1$, $P_n(M)/\Gamma_2(P_n(M))$ has torsion, and we cannot use the methods of the proof of \repr{toruscryst} . But in fact, in these cases, the group $B_n(M)/\Gamma_2(P_n(M))$ is not crystallographic. To see this, we first prove the following lemma.
\begin{lem}\label{lem:crystnot}
Let $\Pi$ be a group, and suppose that there exists a group extension of the form:
\begin{equation*}
1\to T\times H \to \Pi \to \Phi \to 1,
\end{equation*}
where $H$ is torsion free, and $T$ is finite and non-trivial. Then $\Pi$ is not a crystallographic group.
\end{lem}
\begin{proof}
To prove that $\Pi$ is not crystallographic, by~\cite[page~34]{Dekimpe}, it suffices to show that it possesses a non-trivial, normal finite subgroup. Let us show that $T$ is such a subgroup. By the hypotheses, it suffices to prove that $T$ is normal. To see this,
we view the kernel $T\times H$ as a subgroup of $\Pi$. Any inner automorphism of $\Pi$ thus restricts to an automorphism of $T \times H$. Since the image by such an automorphism of any element of $T$ is also a torsion element, it follows from the fact that $H$ is torsion free that $T$ is indeed normal in $\Pi$.
\end{proof}
\begin{prop}\label{prop:nonorientable}
Let $M=\St$ or $N_{g}$, where $g\geq 1$. Then for all $n\geq 1$, the quotient $B_n(M)/\Gamma_2(P_n(M))$ is not a crystallographic group.
\end{prop}
\begin{proof}
The result follows from~\reqref{sestorus1} and Lemmas~\ref{lem:torsion3} and~\ref{lem:crystnot}.
\end{proof}
\begin{rem}
If $M=\St$ (resp.\ $M=N_{g}$, where $g\geq 2$), the subgroup $T$ is that generated by the class of the full twist braid (resp.\ by $\left\{a_{j,1}a_{j,2}\cdots a_{j,g} \mid j=1,\ldots,n\right\}$ using the notation of~\cite[Theorem~5.1]{GM}). If $M=\ensuremath{\mathbb{R}P^2}$ then $T=P_n(\ensuremath{\mathbb{R}P^2})/\Gamma_2(P_n(\ensuremath{\mathbb{R}P^2}))$.
\end{rem}
|
\section{Introduction}
The behavior of granular media in a silo is a ubiquitous problem arising in various industrial applications \citep{degennes99}. When a silo opening is large compared to the grain size, the material flows out continuously and the quasi-steady movement inside the silo appears to be relatively well-captured by local constitutive theories, particularly the $\mu(I)$-rheology, which relates the ratio of shear stress and pressure, $\mu$, to the dimensionless shear rate, $I$ \citep{jop06,staron12,kamrin10,dunatunga15}. However, contrary to local constitutive theories, which lack an intrinsic size scale, it is well-known that silos can arrest even when the opening is still a finite size \citep{beverloo61,zuriguel03,choi05,sheldon10,thomas13}. This behavior occurs when the opening size is a small multiple of the grain size, and is characterized by the formation of an arch-shaped bridge of grains that spans the opening. While the phenomenon of silo clogging can be modeled well using grain-by-grain Discrete Element Method (DEM) simulations (e.g. \cite{martin2009jamming,hidalgo13}), this approach becomes computationally expensive for large systems. Upscaled relations that have been proposed to capture silo arrest include the well-known Beverloo correlation, an empirical formula that models the outflow rate from a silo directly in terms of the difference between the opening size and a multiple of the grain size \citep{beverloo61}. A blockage criterion is obtained by setting the Beverloo outflow to zero. Another theory for silo clogging reconciles the effect as due to the opening being too small for a finite-sized `spot' of localized motion to pass through \citep{Rycroft2006,bazant2006spot}. While hybridized DEM-continuum simulations can produce flow stoppage as long as the material near the opening is treated with DEM \citep{yue06}, to our knowledge, no fully continuum constitutive model has been shown capable of capturing the stoppage behavior of silos.
It is the goal of the current work to present such an analysis. The particular model we shall consider is the Nonlocal Granular Fluidity (NGF) model, which has been shown to capture a variety of nonlocal effects in granular media \citep{kamrin12,henann14,kamrin2019non,kamrin2020quantitative}. Importantly, NGF has been shown to accurately predict size-dependent flow thresholds in a range of quasi-1D geometries \citep{kamrin15,liu2018size}, which encourages its usage for predicting opening-size dependence in silo arrest. As long as our study is restricted to simple granular media (i.e. spherical particles), we also know a priori the model calibration, which enables a more stringent test. The methodology shown herein extends on the initial work on continuum silo modeling using NGF in the author's thesis \citep{dunatunga17}.
It is worth noting that quantifying silo clogging (and flow thresholds in general) is nontrivial. As the opening size is reduced, flow intermittency occurs, which can cause one silo realization to clog even though other realizations may continue to flow \citep{sheldon10,thomas13,thomas16}. Many studies have been conducted to quantify the statistics and scalings of particle release events in the intermittent range \citep{to01,zuriguel05}. Interestingly, it was shown in \citet{thomas13} that while a silo may first clog at one opening size, the critical opening size at which all silos clog is often much smaller and corresponds well with the apparent flow cutoff obtained from extrapolating the Beverloo correlation. In comparing to a continuum model, our belief is that the continuum solution should predict when the ensemble-averaged flow rate vanishes, which corresponds to this critical size just described.
\section{Nonlocal Granular Fluidity model}
The Nonlocal Granular Fluidity (NGF) model was originally developed as a means to include a length-scale within an otherwise local rheology for steady granular flow. A local rheology is taken to be a constitutive relation in which the local flow state is directly obtainable from the local stress state (and any locally evolving state fields). The NGF model was initially proposed as a means to reconcile observed departures from the $\mu(I)$ relation in inhomogeneous steady flow geometries, such as annular shear flows and vertical chute flows. It was later observed that the dynamic form of the NGF model is also able to determine grain-size dependent flow threshold criteria, i.e. when flow in a geometry ceases due to a certain feature of the geometry becoming a small multiple of the mean grain size. In this regard, the NGF model quantitatively predicts the threshold for flow stoppage of spherical grains down inclined chutes \citep{kamrin15} known as the $H_{stop}$ effect \citep{pouliquen99,midi04}. Similarly, NGF predicts flow arrest in 2D cases of disks under annular shear loading, gravity-driven vertical chute flow, and shear load combined with gravity \citep{liu2018size}.
The dynamic (primitive) form of the NGF model can be expressed as an evolution rule for a phase field, $g(x)$, referred to as the `granular fluidity':
\begin{equation}
t_0\dot{g}=A^2d^2\nabla ^2g-\Delta \mu \left( \frac{\mu_s-\mu}{\mu_2-\mu} \right)g -b\sqrt{\frac{\rho_s d^2}{p}}\mu g^2
\label{g_pde}
\end{equation}
where $d$ is the mean grain size, $\rho_s$ is the solid grain density, $t_0$ is a time-scale, $\mu_s$ and $\mu_2$ are the lower and upper bounds taken by the stress ratio $\tau/p\equiv\mu$ during flow, and $\Delta \mu=\mu_2-\mu_s$. The constitutive relation then calls upon the $g$ field to relate stress and strain-rate via
\begin{equation}\label{gmu}
\dot{\gamma}=g\mu.
\end{equation}
The $A^2d^2\nabla ^2g$ term in the evolution of $g$ implies that the spatial diffusion of the fluidity field is influenced directly by the mean particle size. Hence, flow at a point is not given solely by stress at that point, but rather is influenced by nearby events through the $g$ field. At steady state, the nonlocal amplitude $A$ is the only new material parameter affecting the flow solution beyond those of the inertial rheology. If $A$ is set to $0$, the steady solutions of the system reduce identically to the inertial $\mu(I)$ rheology. $A$ is dimensionless and order one; $A\approx0.5$ for glass beads and $\approx 0.9$ for stiff DEM disks \citep{henann13,kamrin14surffric}. Provided boundary conditions on the fluidity and the velocity, the above becomes a complete constitutive relation. The model can be extended directly to 3D by defining $\mu$ and $\dot{\gamma}$ based on tensorial invariants \citep{henann13}.
\section{Grain-size dependent flow thresholds from nonlocal rheology}
To explain how size-dependent thresholds arise in NGF, it is instructive to consider first a paradigmical case, which will be used later for code validation. In recent years, the size-dependence of the flow threshold for flow down an inclined chute has come to be a famous example of nonlocality in granular flow \citep{pouliquen99}. In brief, while local models would predict a thickness-independent repose angle, many experiments show \citep{midi04} that the angle at which a flowing layer arrests grows as the thickness of the layer reduces, and the critical thickness as a function of tilt is known as $H_{\text{stop}}(\theta)$. See \cref{fig:hstop-phase-and-flow} for geometry details. One can show from symmetry and quasi-static balance that in the inclined chute, $\mu=\tan\theta$ and $p=zg\cos\theta$ where $z$ measures depth orthogonal to the free surface. Also, from previous data \citep{silbert03}, we can infer that the boundary conditions for the $g$ field are approximately $\partial_n g = 0$ at $z=0$ (the free surface) and $g(z=H)=0$ (the base).
Unlike local models, the NGF model predicts an $H_{\text{stop}}$ curve for this geometry \citep{kamrin15}, which arises due to Eq \eqref{g_pde} developing a bifurcation that causes the $g=0$ solution to lose stability. That is, while $g=0$, i.e. no flow, is always a solution to the NGF PDE, it is not always a stable solution. A linear stability analysis of the PDE in the case of an inclined chute reveals that the stability of the global $g=0$ solution is lost when
\begin{equation}\label{stop}
\frac{H}{d}>\frac{\pi A }{2} \sqrt{\frac{\mu_2-\tan\theta}{\Delta\mu(\tan\theta-\mu_s)}}\equiv H_{\text{stop}}(\theta)\, .\end{equation}
We see the right-hand side defines the $H_{\text{stop}}(\theta)$ function\footnote{{\small Or more precisely $H_{\text{start}}(\theta)$ but these two functions are the same in NGF since it does not include effects of hysteresis.}}. Experiments with glass beads produce an $H_{\text{stop}}$ curve that is close to the solution above when calibrated to the (known) NGF parameters for glass beads. Outside of tilted chutes, the ability of NGF to capture size-dependent flow thresholds was validated in a number of 2D geometries as well, where, just as in the inclined flow case, an analytical solution for the stoppage criterion was found in each case, which predicted the DEM stoppage data to a quantitative level \citep{liu2018size}.
Jamming of a silo opening shares many similarities with the size-dependent stoppage effect described above. Most saliently, it is a phenomenon that occurs when the width of the flow domain --- i.e. the silo opening --- competes on the scale of the grain size. The fact that the grain size is the key length scale implies any continuum treatment would need to be nonlocal to represent this effect. As such, we seek to determine if the NGF model is capable of predicting silo jamming.
\section{Modeling details for implementing general flow cases}
The NGF equation shown in \cref{g_pde} is intended for dense granular flows. To use NGF in the silo configuration, the model must be augmented in order to represent separated material. This disconnected granular phase occurs in the stream of grains that exits a silo when it is flowing, or the material that falls out underneath the arch that bridges the opening when a silo jams. Without adding a representation of the disconnected phase, determining if a silo jams for a given opening size would be difficult. One would have to guess an arch shape first and then check if the configuration stays static by seeing if an initially perturbed $g$ field evolves to approach zero everywhere. Even if the vanishing $g$ solution were stable, it would be unclear if the chosen arch shape were correct --- would the system have found the same arch naturally upon opening a full silo? Indeed, the arch that forms when a silo clogs should be an emergent geometric outcome and not an input.
In order to properly simulate the formation, or lack thereof, of a stable arch, we extend the NGF model to permit a disconnected phase using a framework similar to that used in \citet{dunatunga15}, which conjoined a separation rule with the local inertial rheology. As in that work, we consider for simplicity that the disconnected phase is stress-free and defined by when the density, $\rho$, is less than some critical value, $\rho_c$. The dense phase, which abides by the NGF equation, is approximated to be plastically incompressible and defined by $\rho=\rho_c$. The density field is obtained by enforcing mass conservation throughout the domain.
On the interface between dense and disconnected phases, the $g$ field requires a boundary condition. We enforce the Neumann condition $\partial_n g=0$ on these interfaces, guided by our previous observations and prior usage of the Neumann condition along granular free surfaces \citep{kamrin15,silbert03}. In the event that a zone of granular media reconsolidates from a previously disconnected state, an uncommon event in a silo flow, we want a physically consistent way to re-initialize the $g$ variable. This resembles the `Stefan free-boundary problem,' frequently encountered in the modeling of solid/liquid fronts in a melting or freezing material specimen. While the classical Stefan problem involves setting multiple boundary conditions for the temperature on a phase front defined by the temperature itself, in our case the question is slightly different in that we must decide boundary conditions for $g$ on consolidation interfaces, which are themselves defined by $\rho$. In the results below, we choose to set $g=0$ in newly reconsolidated material, which is the value of $g$ the steady inertial rheology would assume if a finite stress state is uniformly scaled down to zero. Another option for reinitializing $g$ was used in \cite{dunatunga17} but we noticed it did not make a significant difference in our reported results when we tried it.
\subsection{Generalizing to an elasto-plastic framework}
To accurately implement a model with the components described --- allowing for the possibility of stopped material with an apparent yield stress, dense flow obeying a nonlocal rheology, and separation/reconsolidation of material --- is a \emph{very} challenging task. We have chosen to address these challenges by representing the model in an elasto-plastic framework, with details provided next. This approach, which we have used previously for a purely local material model \citep{dunatunga15}, essentially turns our proposed rheology into a complex Maxwell fluid by putting the flow rule in series with an elastic element (a `spring') whose stiffness vanishes when the material density drops below $\rho_c$. As long as the spring is stiff in the dense (positive pressure) regime, its effect on the flow is negligible. However, its presence not only assists in implementing the separation/reconsolidation rule, but allows us to model the onset of a true yield stress without the need for viscous regularization.
\subsection{Summary of equations}
We use the standard notation for continuum mechanics as defined in \citet{gurtin10}.
The trace of a tensor $\mathbf{A}$ is given by $\tr \mathbf{A}$, the transpose by $\mathbf{A}^T$, the inverse by $\mathbf{A}^{-1}$, and the deviator by $\mathbf{A}_0 = \mathbf{A} - \frac{1}{3} (\tr \mathbf{A}) \mathbf{I}$ in 3D.
Scalars are represented by lowercase text, points and vectors by lowercase bold text, and tensors are represented by uppercase bold text (except the Cauchy stress is $\boldsymbol{\sigma}$).
The dot product over vectors is represented with a single centered dot, and simply multiplies the vectors together componentwise and takes the sum, resulting in a scalar (e.g. $\mathbf{a} \cdot \mathbf{b} = \sum_{i} a_i b_i$).
Tensorial contraction is represented with a colon, and multiplies tensors together componentwise and takes the sum, also resulting in a scalar (e.g. $\mathbf{A} \colon \mathbf{B} = \sum_{i,j} A_{ij} B_{ij}$).
The spatial gradient and spatial divergence operators are given by $\nabla$ and $\nabla \cdot$ respectively.
Define the strain-rate tensor $\mathbf{D}=(\nabla\mathbf{v}+\nabla\mathbf{v}^T)/2$ and the spin tensor $\mathbf{W}=(\nabla\mathbf{v}-\nabla\mathbf{v}^T)/2$ from the velocity field $\mathbf{v}$. From the stress tensor, define the equivalent shear stress $\bar{\tau}=\sqrt{\sum_{i,j}\sigma_{0\, ij}\sigma_{0\, ij}/2}$ and hydrostatic pressure $p=-(1/3)\sum_i\sigma_{ii}$, which are used to define the stress ratio $\mu=\bar{\tau}/p$. Let the specific body force (here from gravity) be denoted $\mathbf{b}$, the plastic part of the strain-rate be denoted $\mathbf{D}^p$ (and elastic part $\mathbf{D}^e\equiv \mathbf{D}-\mathbf{D}^p$), and the shear and bulk elastic moduli be denoted $G$ and $K$.
With these definitions in hand, let $\Omega$ be the material domain, let $\Omega_d$ represent the subdomain where material is dense ($\rho>\rho_c$), and let $\Omega_s$ represent the subdomain where material is separated ($\rho<\rho_c$). The continuum system we solve is summarized as follows:\\ \\
\underline{For all $\mathbf{x}\in\Omega$:}\\
\begin{itemize}
\item \emph{Balance of linear momentum, angular momentum, and mass}:
\begin{align*}
\nabla \cdot \boldsymbol{\sigma} + \rho \mathbf{b} = \rho \dot{\mathbf{v}},\ \ \ \ \ \boldsymbol{\sigma} = \boldsymbol{\sigma}^T, \ \ \ \ \ \dot{\rho}=-\rho\nabla \cdot \mathbf{v}\, .
\end{align*}
\end{itemize}
\noindent \underline{For all $\mathbf{x}\in\Omega_d$:}\\
\begin{itemize}
\item \emph{Elasticity relation}:
$$\dot{\boldsymbol{\sigma}}-\mathbf{W}\boldsymbol{\sigma}+\boldsymbol{\sigma}\mathbf{W} =K \tr (\mathbf{D}-\mathbf{D}^p)\,\mathbf{1}+2G\, (\mathbf{D}-\mathbf{D}^p)_0\, .$$
\item \emph{Plastic flow rule}:
$$ \dot{\bar{\gamma}}^p\equiv \sqrt{\sum_{i,j}2D_{ij}^pD_{ij}^p}=g\mu,\ \ \ \ \mathbf{D}^p=\dot{\bar{\gamma}}^p\frac{\boldsymbol{\sigma}_0}{2\tau}\, .$$
\item \emph{Nonlocal fluidity PDE}:
$$
t_0\dot{g}=A^2d^2\nabla ^2g-\Delta \mu \left( \frac{\mu_s-\mu}{\mu_2-\mu} \right)g -b\sqrt{\frac{\rho_s d^2}{p}}\mu g^2\, .$$
\end{itemize}
\noindent \underline{For all $\mathbf{x}\in\Omega_s$:}\\
\begin{itemize}
\item \emph{Open material condition}: $$\boldsymbol{\sigma}=\mathbf{0}\, .$$
\end{itemize}
The above equations are solved simultaneously with the aforementioned (re)consolidation rule for material passing through $\rho=\rho_c$ and appropriate boundary conditions for $g$, tractions, and velocities on walls and free surfaces. Note that although the mathematical model is fully three dimensional, our simulations employ 2D plane-strain assumptions (that is, $D_{zz} = 0$, but $\sigma_{zz} \ne 0$) in our implementation to reduce unnecessary computations.
\input{numerical_implementation.include}
\section{Validation: Inclined Chutes}
As an initial validation of our numerical approach, we apply it to the case of wide inclined chutes, cf. Fig \ref{fig:hstop-phase-and-flow}(a). This geometry is informative because, as previously described, the NGF model has an analytical solution in this case for the thickness-dependent stoppage threshold, which we can use to validate the code's predictions for nonlocally-influenced stoppage. Moreover, the NGF model has analytical velocity field solutions in the limiting cases of $H\sim H_{\text{stop}}$ and $H\gg H_{\text{stop}}$, which we can also use to check the code.
In our simulations, which are implemented as 2D plane strain, we use a single column of elements with $\Delta x = \Delta y = \SI{1}{\milli\meter}$. We represented the body with a uniformly spaced 4$\times$4 arrangement of material points (16 total) per element. Periodic boundary conditions are applied to simulate an infinite chute by using the same node for both the left and right sides, effectively converting this into a one-dimensional problem along the vertical (although material points are still free to move in both dimensions). Recall that for $g$, the bottom boundary uses a Dirichlet $g = 0$ condition while all other sides use a Neumann $\partial_n g = 0$ along the normal to the boundary. We take the grains to be glued to the bottom boundary (via a Dirichlet $\mathbf{u} = 0$ no-slip condition). Common to all included chute simulations, the grain size is given by $d = \SI{5}{\milli\meter}$ and the solid density of grains is $\rho_s = \SI{2450}{\kilo\gram\per\meter\cubed}$. Values for $A$, $\mu_s$, and $\mu_2$ vary as indicated in \cref{fig:hstop-phase-and-flow}. The specific body force is gravity, $\mathbf{G}$, with $|\mathbf{G}|=9.81$m$/$s$^2$.
Common to all nonlocal simulations, we need to provide initial conditions for $g$, but we require a trick to do this due to a feature of the NGF evolution equation. Note that $g = 0$ is always a solution to the PDE, corresponding to a no-flow state, however it may not always be the \emph{stable} solution. In reality, infinitesimal fluctuations are ever-present and serve to ``seed'' $g$, allowing non-zero $g$ solutions to arise. However, we can exactly represent the zero state during computation, and during a normal update there is no automatic numerical seeding process.
In order to allow a flowing solution to develop at all, we instead use the local $\mu(I)$ model for a short period of time to obtain a flow field, and initialize the value of $g$ based on this local flow. This nonzero value of $g$ is then evolved to the steady state solution via the NGF equation. Currently, experimental values of $t_0$ are unknown, so for our purposes we choose a small $t_0$ in order to reach steady-state quickly without adversely affecting the time step size. The results are insensitive to details of this choice -- $t_0$ can get an order of magnitude smaller or larger without much issue aside from computational time -- but for completeness, we used $t_0 = \SI{1}{\milli\second}$ with an initialization time of $10 t_0$ through all simulations in this work. Simulations were run out to $t_f = \SI{20}{\second}$ to get a close approximation to the steady-state behavior, and the time spent in the local state is only a tiny fraction of the total run time.
Each simulation uses a time step size of $\Delta t = \SI{3e-6}{\second}$ and took between 20-30 minutes of wall time on an Intel Silver 4112. Substepping is not used for the presented results (that is $\Delta t_{\mathrm{substep}} = \Delta t$) as the total wall time was low, however we checked that setting $\Delta t_{\mathrm{substep}} = \Delta t / 15$ did not change the outputs.
\begin{figure}
\begin{flushleft}
\begin{tabular}{@{}c@{} @{}c@{}}
(a) \includegraphics[width=2.4in]{incline.pdf} &
(b) \includegraphics[width=2.5in]{hstop_phase_diagram.pdf} \\
(c) \includegraphics[width=2.5in]{hstop_flow_profiles.pdf} &
(d) \includegraphics[width=2.4in]{compare_mu_relations.pdf} \\
\end{tabular}
\end{flushleft}
\caption{Comparing numerical solutions to analytical NGF solutions in the inclined chute. (a) Configuration of the inclined chute geometry. (b) Phase diagram shows the analytically predicted phase boundary (solid black) and MPM simulation results -- each blue dot is a simulation that appears to flow, while each gray rectangle is a simulation that appears to stop after initial flow. (c) Flow profiles from MPM simulations are taken at an incline of 27 degrees with layer thickness varying through $H/H_{\mathrm{stop}}$ values of 1.9, 2.9, 4.8, 6.8, and 19 (from bottom to top). (d) Analytical solutions for the fit of the $H_{\mathrm{stop}}$ curve showing the difference between using a common limiting stress ratio of $\mu_2$ (solid blue) and assuming no limiting value (dotted red). For comparison, experimental data on glass beads is shown (from \citet{pouliquen99}). Material parameters: (b)-(c) use $A = 0.25$, $\mu_s = 0.3819$, and $\mu_2 = 1.5$, $\rho_s = \SI{2450}{\kilo\gram\per\meter\cubed}$, $d = \SI{5}{\milli\meter}$ and (d) uses inputs for glass beads (from \cite{kamrin15}) $A = 0.48$, $\mu_s = 0.3819$, and $\mu_2 = 0.6435$.}
\label{fig:hstop-phase-and-flow}
\end{figure}
Figure \ref{fig:hstop-phase-and-flow}(b) shows the analytical solution for $H_{\text{stop}}$ from Eq \ref{stop} together with an array of data points obtained from distinct numerical simulations of our MPM code. Determining if a simulation is truly stopped numerically is difficult, but for our purposes we look simply at the mass-averaged kinetic energy of all the material points in the simulation and compare it to a threshold. We chose \SI{1e-10}{\joule\per\kilo\gram}, but the results are largely insensitive to the specific value. Similarly, other criteria such as average velocity or total momentum result in identical or nearly-identical phase diagrams. It can be clearly seen that our code matches the analytical solution with regard to the placement of the flow/no-flow phase boundary. Also, when a chute does flow, the NGF model has an analytical velocity solution in certain cases, see \citet{kamrin15} for details. For shallow layers near $H_{\text{stop}}$, the last term in the NGF PDE \eqref{g_pde} is negligible, leaving a linear system whose solution, upon applying the given boundary conditions, is $v\propto 1-\cos(\pi z/2H)$. On the other hand, for very tall layers, the nonlocal effect is negligible, and the NGF equations give a velocity field approaching the classical Bagnold solution, $v\propto (z/H)^{3/2}$. Figure \ref{fig:hstop-phase-and-flow}(c) compares these limiting solutions to output solutions of the MPM code for a wide variety of filling heights. It can be seen that the MPM solutions capture these limiting cases and indicate how the solution's concavity changes as $H$ increases, a well known effect observed in experiments \citep{midi04,silbert03}.
Regarding flow thresholds, in view of Eq \eqref{stop}, we see that NGF predicts $H_{\text{stop}}$ vanishes when $\tan\theta=\mu_2$; above this tilt angle, the model predicts all chutes flow regardless of filling height \citep{pouliquen99}. This feature is common among many experimental fits for $H_{\text{stop}}$ \citep{midi04}, and leads correspondingly to fits of $\mu(I)$ that also depend on a threshold $\mu_2$ \citep{jop05}. However, there is debate in the experimental literature on the value of $\mu_2$, with some even suggesting it may be infinite \citep{holyoake12}. In fact, a linear $\mu(I)$ fit function is commonly used in practice \citep{dacruz05}, which amounts to setting $\mu_2=\infty$. If one tries to infer $\mu_2$ from $H_{\text{stop}}$ data by observing the tilt at which all chutes flow, complications may arise since this point is not always easy to identify, as it requires measuring $H_{\text{stop}}$ when its value is $\lesssim 1d$. In fact, even if one chooses $\mu_2=\infty$ in the NGF solution form, the $H_{\text{stop}}$ curve changes only very little. For example, in \cref{fig:hstop-phase-and-flow}(d) it can be seen that the stopping curves under NGF for a common value of $\mu_2$ and for $\mu_2=\infty$ differ only at the tail and both seem adequate to fit experimental data. The ambiguity in the choice of $\mu_2$ with respect to inclined flow arrest will come to use in the upcoming section on silo jamming, where certain constraints on the size of $\mu_2$ exist a priori.
\section{Silos}
\subsection{Silo geometry and numerical parameters}
Our implementation is in 2D plane strain, corresponding to a thick silo in the out-of-plane direction. When choosing the geometry of the mesh, note that the silo needs to have enough elements across the orifice to initiate and resolve the flow (in a flowing case), but to reduce computation time we would like to keep this number manageable. We chose 8 units across the orifice, with each unit being a \SI{0.00175}{\meter} by \SI{0.00175}{\meter} square. Although the background mesh is ephemeral in MPM, since we solve the equations of motion over this mesh it does have an influence on the space of possible solutions on the material points. As with the inclined chutes, each square unit contained 16 material points (four per spatial dimension). In order to reasonably match the geometry of an arch, each unit consists of two triangular elements with the diagonal going from bottom left to top right for the left half of the silo and vice-versa for the right half (see panel (b) of \cref{fig:silo-geometry-setup}). We show later that results are insensitive to the exact number of elements as long as there are enough to resolve flow features around the orifice. A full convergence study is not attempted in the present work, as the computational time and space required quickly becomes prohibitive due to the explicit parts of the scheme and the number of auxiliary variables respectively.
Material parameters are presented in \cref{tab:common-material-parameters}, which are largely consistent with values commonly used for a 3D packing of glass beads. Of note however is the large value of $\mu_2$, explained as follows. At a jammed arch in a plane-strain silo, the stress state must be compressive along the arch, but vanish normal to it because it is a free surface. Thus, the stress state at the arch must attain $\mu = 1$; this fact is true regardless of the constitutive model. To properly capture this stress state, it follows that $\mu_2$, the feasible upper limit for $\mu$ in models like ours that extend the $\mu(I)$ rheology, cannot be less than $1$. The constraint is slightly weaker for fully-3D silos with a hole orifice, where $\mu_2$ must exceed $\sqrt{3}/2\approx 0.866$ to admit a jammed state. Both these values are higher than, for example, $\mu_2=0.6453$ reported in \cite{jop05}, but recall from the section on inclined chutes that there is ambiguity on the value of the upper limit of $\mu_2$ and little experimental data in that regime. We observed in our simulations that above $\mu_2\sim 10$, the solution becomes insensitive to the value of $\mu_2$ so we simply set $\mu_2$ to an asymptotically high limit, giving effectively a linear $\mu(I)$ fit in the local limit.
\begin{table}
\centering
\begin{tabular}{c | c}
Parameter & Value \\
\hline
$E$ & \SI{1}{\mega\pascal} \\
$\nu$ & 0.45 \\
$\mu_s$ & 0.3819 \\
$\mu_2$ & 50.0 \\
$t_0$ & \SI{1e-3}{\second} \\
$\rho_s$ & \SI{2450}{\kilo\gram\per\meter\cubed} \\
$\rho_c$ & \SI{1500}{\kilo\gram\per\meter\cubed} \\
$b = \Delta \mu / I_0$ & 1.0 \\
\end{tabular}
\caption{Common material parameters used for the silo simulations. Our simulations vary $A$, hence it is not present in this table, but instead will be specified on a case-by-case basis.}
\label{tab:common-material-parameters}
\end{table}
Each simulation is run with the same orifice size $W$, given by \SI{0.014}{\meter} (measured from fixed-node to fixed-node), but the grain diameter $d$ is varied via the material properties to set the ratio $W / d$. The total width of the silo $L$ is fixed at \SI{0.595}{\meter} (34 units), and, importantly, the same background mesh and material point density is used for all simulations so as to control the possible influence of numerical length scales. The initial fill height $H$ is also fixed at \SI{0.595}{\meter}.
\begin{figure}
\begin{flushleft}
(a) \includegraphics[width=2.3in]{diagram.pdf} \ \ \ \
(b) \ \begin{minipage}[b]{2.2in}
\includegraphics[width=1.8in]{mesh-crop}
\vspace{0.4in}
\end{minipage}
\end{flushleft}
\caption{The geometry of the silo is shown in the left panel (a). We kept the height H, width L, and orifice width W consistent throughout the simulations and changed the material parameters, mainly grain size $d$ and nonlocal amplitude $A$. The background mesh used by the MPM scheme for coarse cases is shown in (b) to aid in understanding the apparent shape of the arch in static cases.}
\label{fig:silo-geometry-setup}
\end{figure}
Initially the material point configuration is assigned a lithostatic pressure; the density of each material point is set to be commiserate with this pressure by computing $\rho = \rho_c K / (K - p)$, where $K$ is the bulk modulus and $p$ is the pressure of that material point. The density is initially set by changing the mass of the material point -- all material points have the same initial volume in these simulations. However, as in \citet{dunatunga15}, the true volume of material points evolves over time (though the numerical extent they are integrated over does not, see Appendix B).
Similar to the inclined chutes, we set the bottom of the silo to have Dirichlet $g = 0$ and $\mathbf{u} = \mathbf{0}$ (no-slip) boundary conditions -- note these are only applied along the solid portion of the boundary (i.e. they do \emph{not} apply directly over the orifice, which instead allows the granular material to act as a free surface with $\partial_n g = 0$ and a traction-free condition). The sidewalls allow friction-free sliding (perfect-slip), but do not allow material points to go through the boundary; that is $v_n = 0$ while the transverse direction is unhindered, and $\partial_n g = 0$.
No motion is imparted to the material points as an initial condition. Instead, the retaining wall at the orifice is removed upon the first step of the simulation and flow is allowed to develop ``naturally''. Recall from the section on inclined chutes that we initialize $g$ by running the local model for a short period of time. As the local model will always produce a flow field regardless of the ratio of orifice to grain size, this procedure will always result in a nonzero $g$ field.
After initializing with the local model, the numerical procedure detailed above for the nonlocal model is used to determine if the solution decays towards a stable $g = 0$ state corresponding to a jammed silo or evolves to obtain some other steady flowing state.
We found the results largely insensitive to the specifics of how the seeding procedure was performed; changing from a local model $\mu(I)$ to a simple rate-independent Drucker-Prager material only slightly affected transient states after switching to the nonlocal procedure, and decreasing or increasing the local model run time similarly had almost no discernible effect on the final state. There were two notable exceptions to this. First, if the material points deviate too much from their initial positions, finding a non-flowing solution became difficult, at least at the spatial and temporal sampling parameters we had used. This is likely because a strong arch of material points needs to develop simultaneously without any holes, and as points move further from their initially ideal placement, numerical noise in MPM makes this unlikely. Refinement would likely mitigate this issue, as the crossing noise can be reduced and the additional material points are more likely to sample a good configuration for numerical purposes, but we did not explore this further. Secondly, if the initialization process were done too quickly, the flow field (and therefore $g$) may not have enough time to establish through the system and ends up too small in magnitude to seed the simulation in light of numerical damping.
Outside of initialization, elastic waves through the system may serve to jostle a clogged silo away from that state. While some of these effects are physical, real systems also include elastic-wave damping effects not included in our model; moreover, we are most interested in the elastically rigid limit where elastic waves would not occur anyway. Adding bulk viscosity could mitigate this issue but we felt this would interfere too much with the solution. Instead, we implemented an elastic-wave absorbing boundary by zeroing-out the speed of any material point moving \emph{upward} that is located at y-position \SI{0.49}{\meter} (28 units) or higher. Upward motion is entirely caused by elastic waves in this problem since gravity points down. This absorbing condition is located sufficiently far from the orifice that we believe it should not affect any true dynamics near the opening when the system clogs or in flowing cases while serving to remove unwanted elastic waves. Results were largely insensitive to the position or strength of the penalty (e.g. moving the dividing line down by \SI{8}{\centi\meter} did not change the results of our analysis, nor did implementing the penalty as a halving of upward velocity instead of zeroing).
\subsection{Silo jamming phase diagram}
Even if it may be obvious to the eye, determining a precise criterion for when a silo configuration is jammed in a numerical simulation is a nontrivial exercise. It can be comparable to studying avalanche effects and the presence of open/falling material can trick kinetic-energy-based criteria for solidification \citep{aranson01,martin2009jamming}.
Instead, we use a heuristic to mark states as ``likely static'',
``likely flowing'' and ``unsure''.
\begin{figure}
\begin{flushleft}
(a)\includegraphics[width=2.3in]{pd.pdf} \
(b)\ \ \ \includegraphics[width=2.4in]{silo_jamming.pdf}
\end{flushleft}
\caption{ (a) Silo phase diagram varying nonlocal amplitude $A$ and the relative opening size $W/d$. A blue circle means the simulation flows, a gray square means the simulation attains a static configuration, and an orange triangle indicates that we were unsure how to classify the simulation -- see the main text for details on the classification criteria. Note that the geometric properties of the simulation were held constant and that only the indicated material properties (that is, the grain size $d$ and $A$) were varied here. Other material properties were held constant for these tests. Note that the diagram can be partitioned into the three regions with only two lines which go through the origin. (b) Still frames of the arch formation process for the $A = 1.0$, $W/d = 1.0$ case, which is a static simulation in our classification.}
\label{fig:silo-phase-diagrams}
\end{figure}
If the average velocity of the \emph{dense} material is small and at most exhibits decaying oscillatory waves, we suspect that the material is in a static
configuration. Additionally, if only a very small number of grains are leaving per unit time,
we can be more sure that the configuration is static. Conversely, if the
average velocity points downward, is large, and does not change size much, we suspect that
the material is flowing; we can be even more sure if a large number of grains are
leaving per unit time. To make this more precise, in our simulations we check if the most recent zero
crossing of the vertical component of velocity happened within the last ten
percent of the simulation; if so, we give a point in favor of a static
configuration. If the last zero crossing happened earlier than halfway through
the simulation, we give a point to the flowing state; in between, we are
unsure. We then check the number of material points leaving between each saved
frame of the simulation; if this is less than or equal to one on average in the
last tenth of the simulation, that is a point in favor of a static
configuration. If this is greater than ten per frame on average, that is a
point in favor of a flowing simulation; in between, we are unsure. Both tests
must agree (i.e. two points are required for us to mark the simulation as
static or flowing) -- any other state is marked as unsure. Visual inspection of the last few frames of a selection of simulations was also done for confirmation.
Simulations took approximately 2 hours on an Intel Silver 4112, with faster-flowing simulations finishing earlier as they had fewer material points over time. In all silo simulations, we used a substepping time of $\Delta t_{\mathrm{substep}} = \Delta t / 150$, which we estimate from smaller cases reduced the wall time by a factor of two.
Using the criteria outlined above, we plotted this data on a lattice with simulations having varying $A$ and $W/d$ ratios (as $W$ is fixed, we simply changed the material grain size $d$ to achieve the desired ratios). The value of $A$ is either $0.1$, $0.5$, $1.0$, $1.5$, $2.0$, $2.5$, or $3.0$ while $W/d$ must be either $1$, $2$, $3$, $4$ or $5$. The results are shown in \cref{fig:silo-phase-diagrams}(a). Note that we see a separation into three regions (flowing, static, and unsure) which can be well-described simply by two lines of different slope; the ratio of $W/d$ to $A$ seems sufficient to predict if a simulation will flow or reach a static state.
This is not too surprising if we consider the form of the NGF PDE and the setup we used. Note that the term $d$ almost always appears with $A$ -- it only shows up alone in the $g^2$ term for describing the local rheology, which we believe only has a minor effect on the stability of the solution. Since $W$ is fixed in these simulations, lines of constant $Ad$ should therefore exhibit very nearly the same stability behavior, as the only difference would appear in the $g^2$ term. In our graph, starting at the origin, we can fan out to form these lines of constant $Ad$, and we do see a physically-reasonable boundary between flowing and non-flowing cases. As a benchmark against experimental data, note that at $A = 0.5$ (an approximate value for {3D beads}) the flowing/static boundary occurs somewhere between $W/d = 1$ and $W/d = 1.5$. This corresponds well with experimentally observed values for the critical $W/d$. In the flat-bottomed quasi-2D silo, which we are attempting to model, $W/d\approx 1.0$ was obtained for beads in \cite{choi05}. This is similar to the range of $1.0-1.16$ that was obtained in \cite{Mankoc2007} for beads, albeit for a circular orifice. As before, we note that since we have a continuum solver, we achieve the static configuration when the ensemble average behavior would be to form a static arch. In a single experiment, it may be possible to observe orifice openings of larger size that nevertheless still can find a static configuration, but these become rare as the ratio $W/d$ increases. %
Figure \ref{fig:silo-phase-diagrams}(b) shows an example of an arch forming in one of our continuum simulations (where $\Delta t_f = \SI{1/240}{\second}$) when the silo opening is sub-critical, with material points below the arch falling out leaving the rest of the silo material intact as the fluidity decays to zero. The numerical procedure models the outline of the material domain from edges of the background mesh geometry, which leads to a `polygonal' arch shape; as the mesh refines more, a rounder arch shape emerges (see Sec \ref{refine} and Supplemental Movie).
\begin{figure}
\begin{center}
\begin{tabular}{@{}c@{} @{}c@{} @{}c@{}}
\includegraphics{pressure_1a1_3col.pdf} &
\includegraphics{pressure_2a1_3col.pdf} &
\includegraphics{pressure_5a1_3col.pdf} \\
\end{tabular}
\end{center}
\begin{center}
(a) \includegraphics{pressure_colorbar.pdf}
\end{center}
\begin{center}
(b) \includegraphics{pline_355.pdf}
\end{center}
\caption{(a) Visualization of pressure in silos with $A = 1$ and $W/d = 1, 2$ and $5$ (left, center, and right respectively). These correspond to data points in the $A=1$ column of \cref{fig:silo-phase-diagrams}(a). The pressure shown here is a temporal average projected onto the mesh over several neighboring frames from the view of grid elements (from $350 \Delta t_f$ to $360 \Delta t_f$ inclusive)
White corresponds to a completely empty element
(b) Plots of the pressure along the centerline for silos with $A=1.0$ and $W/d$ ratios of 1.0, 2.0 and 5.0 (pink, green, and blue respectively). While the pressure decreases drastically directly above the orifice in the clogged configurations, it does not reach zero.
In contrast, the flowing case has much lower pressure and is actually zero in the region above the opening.
}
\label{fig:silo-pressures}
\end{figure}
Next, in the top panel of \cref{fig:silo-pressures}, we observe the pressure distributions in the silos for three configurations $W/d = 1$, $2$, and $5$ with a common $A = 1$. The fields are plotted near the end of the simulation and use a spatial and temporal average over frames from $350 \Delta t_f$ to $360 \Delta t_f$. The spatial smoothing was done as in \citep{andersen09} to project point-wise pressure data onto the background mesh -- note that this is a purely visual post-processing technique and does not affect the fidelity of the simulation itself. In the jammed configurations ($W/d = 1$ and $2$), we see that the pressure immediately above the arch is low, but does not go to zero. The simulation which is closer to the static/flowing boundary ($W/d=2$) experiences a lower pressure in the region immediately above the arch, although some distance away from the opening the pressure looks essentially the same as the other static case. In contrast, the flowing simulation ($W/d = 5$) contains many materials points in the region above the orifice where material points are in free-fall, and the pressure indeed goes to zero when approaching this region since the material points are stress-free. The peak pressure is also smaller, although the fill height has already decreased substantially by the time this snapshot was taken due to the flow. The bottom panel of \cref{fig:silo-pressures} uses the same data, but shows the pressure along the vertical centerline of the silos, confirming our observations from the patch plots.
\begin{figure}
\centering
\begin{tabular}{c c}
\ \ \ \ \ $A = 0.1$ & $A = 1.0$ \\
\ \ \ \ \ \includegraphics{velocities/speedc_70.pdf} &
\includegraphics{velocities/speedc_86.pdf} \\
\end{tabular}
\ \ \ \ \ \includegraphics{velocities/speed_colorbar.pdf}
\begin{tabular}{c c}
\includegraphics{velocities/line_70.pdf} &
\includegraphics{velocities/line_86.pdf}
\end{tabular}
\caption{Two silos with the same parameters and initial conditions except for the value of $A$. Both simulations have nearly the same amount of mass remaining in the silo when imaged ($70 \Delta t_f$ left, $86 \Delta t_f$ right). The velocity cuts off more sharply in the low $A$-value case as expected. Iso-speed lines (drawn at 0.05, 0.10, 0.15, 0.20, 0.25, 0.30, and 0.35 \si{\meter\per\second}) are drawn over a scatterplot of the speed confirm that the velocity is diffusing more when $A=1.0$ compared to when $A=0.1$. Vertical velocity profiles are drawn at the heights indicated as horizontal lines in the first row of images located at heights $1.5W, 2.0W,$ and $2.5W$ above the orifice.
The grain size is given by $d = \SI{0.028}{\meter}$, and the orifice size is $W = \SI{0.14}{\meter}$ resulting in $W/d = 5$.}
\label{tab:low-A-vs-high-A-silo}
\end{figure}
Now we will turn our attention more towards the flowing simulations. In \cref{tab:low-A-vs-high-A-silo} we compare two silo flows which have the same material parameters but have different values of $A$. Snapshots are taken at slightly different times to account for the difference in outflow rates and were chosen to keep a similar amount of mass remaining in the silo; the snapshot for the $A = 0.1$ case is taken at $70 \Delta t_f$ and for the $A = 1.0$ case is taken at $86 \Delta t_f$, where again $\Delta t_f = \SI{1/240}{\second}$. In the top half of \cref{tab:low-A-vs-high-A-silo}, we see the velocity fields plotted over material points and velocity contours. The spacing of the contour lines indicates that shear zones in the $A = 0.1$ case (left) are thinner than in the $A = 1.0$ case (right). This is confirmed by plotting the vertical velocity across horizontal slices at heights $1.5W$, $2.0W$ and $2.5W$ in the lower half of the figure -- the flow is more plug-like in the low $A$ case, and is noticeably similar to a local $\mu(I)$ model solution, which would predict plug flow down the center with a thin shear band before dropping to zero vertical velocity close to the sidewalls where $\mu < \mu_s$ \citep{staron12,staron14,kamrin10}. In contrast, the higher $A$ value results in a spreading of the velocity field as expected due to the nonlocal effect, which will imply a length scale for shear bands. As both cases do actually have non-zero $A$, we do observe a small amount of flow even where $\mu < \mu_s$ as expected, and less flow under $\mu_s$ is observed for the smaller $A$. The decay length scale depends on the size of $A$, and we find that larger $A$ diffuses out the velocity more readily, also as expected.
\begin{figure}
\centering
\includegraphics[width=3.3in]{velocities/gaussian_355.pdf}
\caption{Cross-sections of vertical velocity taken at horizontal slices at height $1.5W$, $2.0W$, and $2.5W$ (pink, green, and blue colors respectively) in a silo with the same parameters as \cref{tab:low-A-vs-high-A-silo} except $A = 0.5$ (chosen to match experimental material). Simulation data is plotted with dots, while a diffusing Gaussian fit (with offsets) is plotted as the lines. The value of $B$, which controls the Gaussian's width at each height, is given by $0.6d$ ($d$ grain diameter).
}
\label{fig:gaussian}
\end{figure}
We also look at the form of the vertical velocity profiles obtained. In order to compare to existing data, which uses glass beads primarily, we choose $A = 0.5$ and set $W/d = 5$. We waited for steady-state flow, and then looked at vertical velocity slices at the same three heights as before ($1.5W$, $2.0W$ and $2.5W$); results are plotted in \cref{fig:gaussian}. Many have noticed in experiments that the downward velocity profile, in a region not too far from the opening, appears to spread diffusively but with height playing the role of `time' --- that is, the downward velocity appears Gaussian with $v_y=C \exp{\frac{-x^2}{4By}}$ where $B$ controls the width of the Gaussian and $y$ is the height above the orifice \citep{choi05,Rycroft2006,bazant2006spot,zuriguel14,tuzun1979experimental,samadani1999size,medina1998velocity}. The apparently diffusive character of the flow field was central to some of first silo flow models \citep{mullins1972stochastic,nedderman1979kinematic}. Interestingly, data from our simulations our also matches this observation, see \cref{fig:gaussian}, with two caveats. First, we have an additive constant at each height due to our walls having no friction (and thus allowing downward motion at the walls); in experiments, wall friction ensures velocity decays to zero at the side walls. Secondly, the width parameter that we obtain, $B = 0.6d$, is a smaller than the typical values observed in the literature ($1d-5d$ in \citet{kamrin07}). We believe this is due to the relatively large orifice size we used compared to the geometry of our system (unlike the experiments which used a much smaller opening relative to the silo width) as well as the aforementioned lack of sidewall friction.
\begin{figure}
\centering
\begin{tabular}{c c c}
\includegraphics{xag_5a01.pdf} &
\includegraphics{xag_5a05.pdf} &
\includegraphics{xag_5a10.pdf} \\
\end{tabular}
\includegraphics{xlog_g_colorbar.pdf}
\caption{Plots of $g$ (logarithmic scale) of a silo with $W/d = 5$ and the same material parameters as previously used except in the value of $A$, going from $0.1$ to $0.5$ to $1.0$ from left to right. Our averaging procedure assigns the value of $g = 0$ to open material; the region immediately above the orifice appears to have low $g$ value, though it may be more correct to say there is \emph{no} value of $g$ at those points. All plots are taken over an average of frames from $280 \Delta t_f$ to $300 \Delta t_f$ and use the same mesh-wise projection technique as was used to display the pressure in \cref{fig:silo-pressures}. Note that the lower values of $A$ result in less spreading of the $g$ field as anticipated.}
\label{fig:log-g-configuration}
\end{figure}
Finally, we plot the $g$ field in these same simulations, shown in \cref{fig:log-g-configuration}. The plots show averages over both elements and temporal frames ($280 \Delta t_f$ to $300 \Delta t_f$) to understand what the numerical scheme regularly observes when computing the spatial gradients. Note that the lower values of $A$ show less spreading of the $g$ field and a slightly larger flow-rate compared to higher values of $A$ (indicated by the height of the free surface) as expected. Considering $g$ as a surrogate for equivalent plastic shear strain rate, we can also observe the distinctive ``arms'' of high-shearing emanating from the orifice. The region just above the orifice where grains are in free-fall is also clearly visible in these plots, indicated by a dark brown color ($g$ is set to zero in the disconnected state, but those material points do not contribute to the solution of the NGF equation).
\subsection{Convergence test and caveats}\label{refine}
Convergence testing is difficult due to the amount of wall time each simulation takes and the total amount of data generated. Performing a (linearized) Von Neumann stability analysis on the scheme used for evolving the NGF PDE shows that the stable $\Delta t$ is proportional to $\Delta x^2$ due to the Laplacian term \citep{dunatunga17}. While the substepping is designed to mitigate the impact of this harsh CFL condition, running a refined simulation still takes substantially more CPU and wall time than a coarse one.
To at least show qualitative agreement, we performed another set of simulations at twice the spatial resolution of the previous cases (and correspondingly a timestep of one quarter the original size). As with the other simulations, the mesh consists of triangles stacked to create squares, and which diagonal used depends on which half of the domain the element is in. Numerical parameters are summarized in \cref{tab:refinement-parameters}. We choose $A = 1$ and other material parameters are given as before in \cref{tab:common-material-parameters}.
\begin{table}
\centering
\begin{tabular}{c | c | c}
Parameter & Coarse Value & Refined Value \\
\hline
$\Delta x$ & \SI{0.0175}{\meter} & \SI{0.00875}{\meter} \\
$\Delta t$ & \SI{1e-4}{\second} & \SI{2.5e-5}{\second} \\
$t_\mathrm{end}$ & \SI{1.5}{\second} & \SI{1.5}{\second} \\
$W$ & \SI{0.14}{\meter} & \SI{0.14}{\meter} \\
$L$ & \SI{0.595}{\meter} & \SI{0.595}{\meter} \\
$H$ & \SI{0.595}{\meter} & \SI{0.595}{\meter} \\
\end{tabular}
\caption{Numerical parameters used for the refined and coarse simulation cases used in the convergence study. The only differences are that the element size is halved and the refined timestep size is correspondingly cut down to a quarter of the coarse value. The material properties are given in \cref{tab:common-material-parameters}.}
\label{tab:refinement-parameters}
\end{table}
Refined simulations took approximately 30 hours to complete on an Intel Silver 4112; both simulations were run at the same time, with the only difference between them being the grain diameter $d = \SI{0.014}{\meter}$ and $d = \SI{0.0028}{\meter}$ (resulting in $W/d$ = 1 and 5). See Supplemental Movie for side-by-side video of these simulations. The flowing simulation (with a smaller grain diameter) finished slightly earlier, as removed material points do not require much computational work to handle. As with the coarse silos, we used substepping with $\Delta t_{\mathrm{substep}} = \Delta t / 150$.
\begin{figure}
\centering
\begin{tabular}{c c}
$W/d = 1$ & $W/d = 5$ \\
\includegraphics{velocities/cd1_speed_350.pdf} &
\includegraphics{velocities/cd5_speed_105.pdf} \\
\includegraphics{velocities/rd1_speed_350.pdf} &
\includegraphics{velocities/rd5_speed_105.pdf}
\end{tabular}
\includegraphics{velocities/speed_colorbar.pdf}
\caption{
Velocity scatterplots of coarse simulations (top) and refined simulations (bottom). The $W/d = 1$ cases are taken at time $350 \Delta t_f$ and the $W/d = 5$ cases at $105 \Delta t_f$ (recall $\Delta t_f = \SI{1/240}{\second}$).
The refinement allows a more accurate representation of the orifice size across all simulations and the arch formed in the $W/d = 1$ case.
Velocities are plotted as given on each material point.}
\label{fig:refined-velocity}
\end{figure}
We compared the velocity profile in this refined case to the coarse cases run previously with the results displayed in \cref{fig:refined-velocity}. Both the static configuration at $W/d = 1$ (snapshots taken at $350 \Delta t_f$, where $\Delta t_f = \SI{1/240}{\second}$ as before) and the flowing configuration at $W/d = 5$ (snapshots taken at $105 \Delta t_f$) show good agreement when refined. The increased resolution allows the arch to form with a slightly more natural circular geometry in the static case. In the flowing case, the refined simulation has a slightly higher velocity throughout the bulk, however this is expected and is also due to geometric refinement; as we measure the orifice size between the fixed points, decreasing the element size allows a larger fraction of material to leave without sensing the orifice edge. This is a minor effect, but does serve to increase the flow rate a little as observed. We expect subsequent refinements to show increasingly smaller differences in velocity fields since the affected elements will get smaller.
Similarly, we compared the pressure throughout both sets of silos in \cref{fig:refined-pressure}. As before, good agreement is shown between the refined and coarse cases. The static case shows a few differences due to the more circular geometry of the arch, however the key features of small-but-nonzero pressure above the arch and a largely lithostatic pressure distribution away from the orifice remain. In the flowing case, the refined simulation has a noticeably smoother pressure field and resolves the free surface with more fidelity as expected, but otherwise qualitatively looks similar to the coarse case. We can clearly see the free-fall region above the orifice in both cases, where the pressure of the material points goes to zero as they enter the disconnected state.
\begin{figure}
\centering
\begin{tabular}{c c}
$W/d = 1$ & $W/d = 5$ \\
\includegraphics{pressure_1a1.pdf} &
\includegraphics{pressure_5a1.pdf} \\
\includegraphics{rpressure_1a1.pdf} &
\includegraphics{rpressure_5a1.pdf}
\end{tabular}
\includegraphics{pressure_colorbar.pdf}
\caption{
Pressure distributions of coarse simulations (top) and refined simulations (bottom). All plots are taken over a three-frame average centered at $350 \Delta t_f$.
As with the previous pressure plots, the technique presented in \citet{andersen09} for visualization is used.
}
\label{fig:refined-pressure}
\end{figure}
Since entire elements contribute to the $g$ field and are not considered at a sub-grid scale, this in turn restricts the shapes that the boundary can take; the effect is most apparent in simulations such as a jammed silo since the arch formed must conform to the background mesh geometry. Sufficient mismatch between the true solution and the one forced by the grid geometry might result in flow where none was expected or vice-versa. We only observed this in boundary cases (e.g. in the silo, ones in which we were unsure were flowing or static), but the underlying mechanism may persist in pathological grid topologies. We also note that computing the solution is noticeably more expensive in time than a local version of the model -- the extra operations performed do contribute to this, but the increase in number of synchronization points also should not be underestimated. Naively coding the algorithm presented can easily result in a method which is tens to hundreds of times slower than the local-only, $\mu(I)$ model; while none of our implementations have been heavily optimized, many of the simulations in this work took approximately two to five times longer than our implementation in \cite{dunatunga15} of a local-only model implementing the \textbf{$\mu(I)$} rheology from \citet{jop06} (caching the results where possible during substepping results in significant time savings).
\section{Conclusion}
We have presented and numerically implemented a trans-phase (disconnection-permitting) extension of the NGF model. Using our implementation, we have shown that NGF, a \emph{continuum} model, is able to predict the clogging of a silo due to small opening size. This result is analogous to the same model's previously shown capability to capture the strengthening of layers on inclines as they get thinner. We find that when the model's parameters are set close to the known values for spherical beads, the critical opening size obtained is close to the reported experimentally observed range and corresponds to the Beverloo cutoff size. We have also verified by constructing a phase diagram that the criterion for silo clogging in NGF takes the form $W_{\text{crit}}\propto A d$ showing the dependence on the model's nonlocal amplitude, $A$, to be a straightforward linear prefactor, and the relevant length-scale being the mean grain size, as expected. By including a separated phase within the rheology, the model is able to capture the process of a stable arch forming when a silo clogs, with material under the arch falling out freely. When the opening is large enough to admit a steady flow, we find the value of $A$ for a given $d$ influences how much the flow spreads spatially, with low values of $A$ emulating the purely local response with sharp flow peak in the silo center that rapidly decays toward the walls, and larger $A$ values causing a shallower peak and smoother tapering off toward the walls. Lower $A$ values correlate with higher overall outflow rates, which is to be expected since nonlocality acts as a flow penalty for sharply varying fields. When the parameters are set to those of spherical beads, we find, similar to previous observations for glass beads in slab silos, that the downward velocity profile along horizontal cross-sections looks similar to a Gaussian spreading diffusively in height.
The versatility of our numerical approach, combining MPM with a simple finite-difference grid, allowed us to numerically solve the NGF model in multiple of inhomogeneous flow geometries. As a validation check, the method reproduced the analytically known velocity profiles and $H_{\text{stop}}(\theta)$ curves in the case of the inclined chute.
Throughout our study, when comparing silos of different $W/d$, we were careful to use the same grid and initial material point distribution so as to ensure the numerical scheme does not bias the critical opening size in any suite of tests. Finally we showed that refining the silo geometry discretization results in qualitatively very similar behavior with only minor differences due to increased spatial resolution.
This study leaves at least two interesting theoretical questions. The first is in reference to the value of $\mu_2$ and whether this parameter, which carries over from the local $\mu(I)$ model, should in fact be bounded. Secondly, the value of the fluidity-diffusion time-scale $t_0$ has not been previously quantified in experiments, hence our study has chosen it to be sufficiently small compared to all other time scales so as to deliver $g$ distributions that are essentially quasi-steady-state throughout. More study would be needed to correctly characterize this material parameter for more transient applications.\\
\\
\noindent\textbf{Declaration of Interests.} The authors report no conflict of interest.
|
\section{Introduction}
\label{sec:intro}
\IEEEPARstart{W}{hile} the theory of characteristic modes (CMs) can be applied rigorously in certain theoretical cases, it has long been associated with computational methods allowing for the analysis of arbitrarily shaped systems. The method of moments (MoM) \cite{Harrington_FieldComputationByMoM} in particular is closely tied to the analysis of CMs due to its direct transformation of the continuous impedance operator into a finite-dimensional impedance matrix \cite{Harrington_1971b}. Simple MoM implementations are commonly taught in graduate-level coursework on computational electromagnetics \cite{Makarov_AntennaAndEMModelingWithMatlab,jin2011theory, Harrington_FieldComputationByMoM}, and many commercial software packages allow for the generation and exporting of MoM-related data \cite{atom,feko}. Contemporary computing power allows for the solution of moderately sized MoM problems (on the order of a few thousand unknowns) without the necessity of employing sophisticated algorithms and expensive high-performance hardware. This availability of MoM codes and their close connection to modal analyses has enabled many researchers to explore different aspects of CM theory without excessive overhead spent in the development of specialized computational tools. As such, many studies in the literature implicitly assume MoM numerical tools as the basis for the theory of CMs, rather than the continuous operator theory underpinning its original formulations~\cite{Garbacz_TCMdissertation}. While this is not entirely accurate, it does reflect the prevalence of numerical tools in the study of CMs and motivates the present second part of this review series on computational aspects of characteristic mode analysis (CMA).
The intent of this review is to highlight key challenges and techniques in the numerical implementation of CMA, with focus placed on methods preserving the favorable properties associated with purely analytical formulations. This part follows general overview (Paper 1 of this series) and precedes a review on canonical antenna design with the help of CMs~(Paper 3 of this series).
\section{Characteristic Modes}
CM decomposition is motivated by the desire for a modal basis with properties convenient for electromagnetic scattering analyses. Most often, these types of decomposition are based on the diagonalization of specific operators arising from frequency domain integral equations. Beginning in the 1940's, decompositions of fields scattered by obstacles were independently introduced using the scattering matrix~\cite{1948_Montgomery_Principles_of_Microwave_Circuits}, the transition matrix \cite{Garbacz_TCMdissertation}, and the impedance matrix \cite{Harrington_1971a}. An important property of the CM decomposition is that the external (radiating) problem is treated, making it possible to orthogonalize modal radiation patterns.
Contemporary work on CMs is concentrated on formulations based on impedance operators relating current distributions on a specified object to the fields they scatter, see Box~1. In this case, CMs are commonly defined as those current distributions diagonalizing both the impedance and radiation operators. Modifications of the CM decomposition exist, see Section~\ref{sec:reltech}, though these techniques often come at the cost of certain properties which make the impedance / radiation formulation favorable~\cite{Harrington_1972b}.
CMs represent a basis of continuous current distributions and are defined independently of any computational method. However, outside of select canonical problems, \eg{}, \cite{SarkarMokoleSalazarPalma_AnExposeOnInternalResonancesCM,Bernabeu_Jimenez_2017a,Huang_StudyontheRelationshipsbetweenEigenmodesNaturalModesandCharacteristicModes}, solutions to the CM eigenvalue problem can only be obtained through the use of numerical tools.
\section{Matrix Representation of CMs}
\label{sec:arbshapes}
Computational implementation of the theory of CMs relies on the conversion of fields and operators defined over continuous domains into vectors and matrices corresponding to a basis with discrete elements~\cite{Harrington_1971b}. By approximating currents on arbitrarily shaped conducting surfaces through an appropriate basis (\eg{}, RWG basis functions~\cite{RaoWiltonGlisson_ElectromagneticScatteringBySurfacesOfArbitraryShape}, see top insets in Box~\ref{A:Box1}) the electric field integral equation (EFIE) may be transformed into a system of equations via application of MoM~\cite{Harrington_FieldComputationByMoM}. This conversion, in turn, leads to a discrete representation of the CM eigenvalue problem, see Box~1 and bottom insets therein.
When the impedance matrix is transpose symmetric, \eg{}, when Galerkin method~\cite{Harrington_FieldComputationByMoM} is used within the MoM~to model reciprocal systems, CMs are equiphase and diagonalize the impedance operator, leading to orthogonality in both the radiation and reactance operator. Normalization of CMs is arbitrary, though normalizations forcing each modal current to radiate equal power are by far the most common, see Box~2.
In some cases, computation of the impedance matrix may be accelerated via non-Galerkin procedures or asymmetric integrations \cite{Makarov_AntennaAndEMModelingWithMatlab},~leading to asymmetric impedance matrices. In such cases care must be taken to either be aware of reduced orthogonality or to artificially \Quot{symmetrize} appropriate matrix operators. Orthogonality in the matrix $\M{R}$, by Poynting's theorem, also leads to orthogonality in modal far-fields when integrated over the entire far-field sphere, see Box~2. Note that this orthogonality property is not, in general, present for lossy structures unless modifications to the generating eigenvalue problem are altered, necessarily impacting other orthogonality properties in the process~\cite{Harrington_1972b,Chang_1977a, Yla_Oijala_2019a, Yla_Oijala_2019b}. Additionally, modal currents are not, in general, orthogonal in an unweighted inner product, \ie{}, $\M{I}^\T{H}_m\M{I}_n \neq c_{mn}\delta_{mn}$, and their orthogonality is reserved only for so-called separable coordinate systems~\cite{morse1953methods} for which analytical solutions to the problem~\eqref{eq:MR3} may typically be found~\cite{Stratton_ElectromagneticTheory, Garbacz_TCMdissertation, SarkarMokoleSalazarPalma_AnExposeOnInternalResonancesCM, Amendola1997, Capek_2017b}.
The orthogonality relations in \eqref{eq:NM1} and \eqref{eq:NM2} imply modal orthogonality in reactive energy, \ie{}, the difference between stored magnetic and electric energies. While the reactance operator~$\M{X}$ can be decomposed into electric and magnetic energy operators \cite{Vandenbosch_ReactiveEnergiesImpedanceAndQFactorOfRadiatingStructures, GustafssonTayliEhrenborgEtAl_AntennaCurrentOptimizationUsingMatlabAndCVX}, orthogonality of modes does not, in general, extend to these individual operators or their summation which represents stored electromagnetic energy.
Due to their relative excess of magnetic (electric) energy, modes with positive (negative) eigenvalues are referred to as inductive (capacitive), \cf{} \eqref{eq:NM2} in Box~2. A balance of modal electric and magnetic energies leads external resonance \footnote{Here \emph{external resonance} denotes the condition $\lambda_n = 0$ whereas \emph{internal resonances} are typically associated with non-radiating currents.} at $\lambda = 0$. The spectrum of eigenvalues spans all positive and negative real numbers, with accumulation at $\pm\infty$. As such, eigenvalues are frequently reported in terms of log magnitude or characteristic angle~\cite{Newman_SmallAntennaLocationSynthesisUsingCharacteristicModes} $\alpha_n = \pi - \arctan \lambda_n$, the latter being restricted to the interval $[\pi/2,3\pi/2]$. Similarly the quantity \mbox{$0\leq|1+\T{j}\lambda_n|^{-1}\leq 1$} is frequently used as a metric of modal significance due to its predictable range and appearance in many CM expansion formulae.
\begin{CMAbox}[label={A:Box1}]{{EFIE Formulation and Its Matrix Representation}}
{\centering
\includegraphics[width=\textwidth]{figures/Fig1a_PlateRepresentation.pdf}\vspace{0.25cm}\par}
\noindent
The electric field integral equation (EFIE) relates a scattered field~$\V{E}_\T{s} (\V{r})$ and its sources~$\V{J}(\V{r}')$ as~\cite{Harrington_TimeHarmonicElmagField}
\begin{equation}
\V{E}_\T{s} (\V{r}) = - \J \omega \MUE \int\limits_\srcRegion \M{G} (\V{r},\V{r}') \cdot \V{J}(\V{r}') \D{\V{r}'}
\label{eq:MR1}
\end{equation}
with $\M{G} (\V{r},\V{r}')$ being the dyadic Green's function.
The above relation can be use to define an impedance operator~\mbox{$\OP{Z}(\V{J}) = \OP{R}(\V{J}) + \J \OP{X}(\V{J}) = \UV{n} \times \UV{n} \times \V{E}_\T{s} (\V{J})$} from which a CM eigenvalue problem is constructed as~\cite{Harrington_1971a}
\begin{equation}
\OP{Z} ( \V{J}_n) = \left( 1 + \J \lambda_n \right) \OP{R} ( \V{J}_n).
\label{eq:MR3}
\end{equation}
The generalized eigenvalue problem~\eqref{eq:MR3} demands a solution to the integral equation, which can be analytically found in exceptional cases only. For this reason, the continuous quantities are represented in a suitable basis~$\left\{\basisFcn_m(\V{r}')\right\}$,~\cite{PetersonRayMittra_ComputationalMethodsForElectromagnetics}
\begin{equation}
\V{J} (\V{r}') \approx \sum_{n=1}^N I_n \basisFcn_n (\V{r}'), \quad \V{r}' \in \srcRegion_T,
\label{eq:MR4}
\end{equation}
which yields a matrix representation of the impedance operator $\M{Z} = \M{R} + \J \M{X} \equiv [Z_{pq}]$ with elements given by
\begin{equation}
Z_{pq} = \J \omega \MUE \int\limits_{\srcRegion_T} \int\limits_{\srcRegion_T} \basisFcn_p(\V{r}) \cdot \M{G} (\V{r},\V{r}') \cdot \basisFcn_q(\V{r}') \D{\V{r'}} \D{\V{r}}.
\label{eq:MR5}
\end{equation}
From this representation, a matrix form of the CM decomposition~\cite{Harrington_1971b}
\begin{equation}
\M{Z} \Ivec_n = \left( 1 + \J \lambda_n \right) \M{R} \Ivec_n\quad\leftrightarrow\quad\M{X}\Ivec_n = \lambda_n\M{R}\Ivec_n,
\label{eq:MR6}
\end{equation}
may be constructed. It should be noted that the choice of basis~\eqref{eq:MR4} is arbitrary, \ie{}, it can be composed of entire-domain (\eg{}, spherical waves) or piece-wise defined (\eg{}, RWG) basis functions. While the transition from analytical~\eqref{eq:MR3} to numerical~\eqref{eq:MR6} representation of the CM problem significantly broadens the scope of its practical use, it also restricts the inherent precision and may lead to numerical issues, discussed further in Section~\ref{sec:dr}.
{\vspace{0.25cm}\centering
\includegraphics[width=\textwidth]{figures/Fig1b_CharModeRepresentation.pdf}\par}
\end{CMAbox}
\begin{CMAbox}[label={A:Box2}]{{Current Normalization}}
\noindent
Transpose symmetry of the impedance matrix~$\M{Z}$ leads to CM current distributions which are orthogonal in both the radiation and reactance operators. The orthogonality in the radiation operator implies orthogonal far fields (see the inset below). The choice of normalization, however, is arbitrary and provides an opportunity to re-scale eigenvectors~$\V{J}_n(\V{r}')$ and~$\Ivec_n$ at will. The most commonly adopted normalization ensures real-valued current vectors radiating equal amounts of power, \ie{},
\begin{multline}
P_{\T{r},n} = \dfrac{1}{2 Z_0} \int_{4\pi} \V{F}_m^\ast (\UV{r}) \cdot \V{F}_n (\UV{r}) \D{\varOmega} \\ = \dfrac{1}{2} \langle \V{J}_m, \OP{R} (\V{J}_n) \rangle \approx \dfrac{1}{2} \Ivec_m^\herm \M{R} \Ivec_n = \delta_{mn}.
\label{eq:NM1}
\end{multline}
This choice of normalization also equates modal reactive power with the CM as
\begin{multline} 2\omega\left(W_{\T{m},n}-W_{\T{e},n}\right) = \dfrac{1}{2} \langle \V{J}_m, \OP{X} (\V{J}_n) \rangle\\ \approx \dfrac{1}{2} \Ivec_m^\herm \M{X} \Ivec_n = \lambda_n \delta_{mn},
\label{eq:NM2}
\end{multline}
where~$W_{\T{m},n}$ and~$W_{\T{e},n}$ are the modal magnetic and electric stored energies~\cite{2018_Schab_Wsto}.
As an example, the radiation pattern cuts of the first four characteristic modes of a perfectly electric conducting plate from Box~\ref{A:Box1} are depicted for~$ka = 1$. When~\eqref{eq:NM1} is applied, their size is changed dramatically.
{\vspace{0.25cm}\centering
\includegraphics[width=\textwidth]{figures/Fig2b_RadPatterns.pdf}\par}
\end{CMAbox}
\section{Accuracy, Dynamic Range, and Convergence}
\label{sec:dr}
Solutions to the discrete eigenvalue problem in \eqref{eq:MR6} may be found using a variety of numerical methods. The choice of numerical method, however, along with the properties of the underlying impedance matrix data, may lead to noticeable differences in modal solutions. In this section, we discuss key numerical aspects of obtaining CM data.
\subsection{Solving Generalized Eigenvalue Problems}
When it comes to the numerical evaluation of~\eqref{eq:MR6}, two algorithms are typically employed: generalized Schur decomposition (GSD) and the implicitly restarted Arnoldi method (IRAM)~\cite{golub2013matrix}. For example, in MATLAB~\cite{matlab}, their LAPACK and ARPACK implementations are accessible via \texttt{eig()} and \texttt{eigs()} functions, respectively, and similarly for other high-level programming languages. The most notable difference is their algorithmic complexity. The GSD method achieves higher numerical stability and produces a full set of eigenmodes, however, the cost is $\OP{O}(N^3)$, where~$N$ is the number of degrees of freedom, \cf{}, \eqref{eq:MR3}. The IRAM method is capable of efficiently finding only the first~$M$ modes with complexity~$\OP{O}(M N^2)$. When the eigenvalue problem is solved, the CMs are typically then normalized, see Box~2, and tracking is performed, see Box~3.
\subsection{Modal Dynamic Range}
For a system with~$N$ degrees of freedom, the generalized eigenvalue problem~\eqref{eq:MR6} defines a set of~$N$ CMs. However, issues related to numerical precision (specifically in the representation of weakly radiating currents with complex spatial dependence) typically limit meaningful results to those \mbox{$M\ll N$} modes with eigenvalue magnitudes below an empirically observed threshold. Conveniently, \Quot{low-order} modes with eigenvalues at or near resonance are those most commonly studied \cite{Antonino_Daviu_2006a,Adams_2011a,Ghosal_2020a}. The numerical threshold determining the number of available modes depends on many factors, particularly singularity treatment and numerical precision \cite{Capek_2017b}, but also the operational frequency and object complexity.
\begin{figure}
\centering
\includegraphics[]{figures/Fig_Sphere.pdf}
\caption{CM decomposition of a spherical shell of radius $a$ discretized into $216$ (left) and $2400$ (right) triangles, leading to $324$ and $3600$ basis functions, respectively. Electrical size of the spherical shell is $ka=1$. Analytical results~\cite{Capek_2017b} (black dots) are compared with two numerical methods based on the decomposition of the impedance matrix~$\M{Z}$ (red circles)~\eqref{eq:MR6} and transition matrix~$\M{T}$ (blue $\times$)~\cite{Garbacz_TCMdissertation}. See~\cite{Capek_2017b} for comparison with commercial software.}
\label{fig:sphere}
\end{figure}
An important issue significantly affecting the numerical dynamics of the CM generalized eigenvalue problem (CMGEP) is the null-space of the $\M{R}$ matrix~\cite{Harrington_1971b}. This null-space can be extracted, which greatly extends the dynamic range of available modes and reduces computational time~\cite{Tayli_2018a}. An ultimate solution in this direction is to evaluate the transition matrix~$\M{T}$ from the impedance matrix~$\M{Z}$ as described in~\cite{Losenicky_etal_MoMandThybrid} and perform decomposition in a basis of outgoing spherical waves. This leads to the improved performance shown in Fig.~\ref{fig:sphere}. Another problem is low-frequency instability which is addressed in~\cite{Dai_2017a}.
Figure~\ref{fig:dipole-modes} demonstrates the limited number of CMs by plotting modal current distributions (top) and eigenvalue magnitude (bottom left) for a straight dipole antenna. There it is clear that for modes with eigenvalue magnitudes less than $\sim10^{16}$, modal current distributions are smooth functions resembling a Fourier basis in one dimension, whereas modes with eigenvalues saturated above this level have current distributions that are effectively numerical noise.
\subsection{Convergence in Modal Superposition}
Diagonalization of the impedance operator leads to a simple form of expansion coefficients for the current induced by an incident field represented by the vector~$\M{V}$,
\begin{equation}
\M{I} = \sum_n \alpha_n \M{I}_n,\quad \alpha_n = \frac{\M{I}^\T{H}_n\M{V}}{2 P_{\T{r},n}\left(1+\T{j}\lambda_n\right)},
\end{equation}
where~$\alpha_n$ is commonly referred to as a modal weighting coefficient. The explicit form of the modal weighting coefficients suggests that modal contributions to the total current distribution depend both on the alignment (inner product) of modal currents with the excitation ($\M{I}_n^\T{H}\M{V}$) as well as the reactive nature of each mode (via $|1+\T{j}\lambda_n|^{-1}$). These two terms are commonly called the modal excitation coefficient and modal significance, respectively. Note that highly reactive currents with~$|\lambda_n|\gg 1$ may make a non-trivial contribution to the above sum due to large current magnitudes induced by the chosen normalization enforcing all currents to radiate unit power. This is particularly true for the common, but poorly converging, case of antennas driven by delta gap sources~\cite{yee1973self}, as illustrated by the example data in the bottom right panel of Fig.~\ref{fig:dipole-modes} showing relative errors in driven input conductance ($\epsilon_G$) and susceptance ($\epsilon_B$) as a function of increasingly higher number of modes used to reconstruct the driven current distribution of a center fed dipole. In synthesizing equivalent circuit models of driven antennas, excess reactance due to modes far away from resonance are frequently modeled using empirically determined reactive components, \eg{}, \cite{adams2013broadband}.
\begin{figure}
\centering
\includegraphics[width=3.15in]{figures/dipole-modes-processed.pdf}
\caption{CM properties of a wire dipole. Modes are ordered by increasing eigenvalue magnitude. Modal current distributions (top) and eigenvalue magnitudes (bottom left) are shown with blue and red markers representing modes below and above the numerical threshold, respectively. Normalized residual input conductance and susceptance (bottom right) indicates poor convergence.}
\label{fig:dipole-modes}
\end{figure}
\section{Tracking}
\label{sec:tracking}
\begin{CMAbox}[label={A:Box3}]{{Crossings and Crossing Avoidances}}
{\vspace{0.25cm}\centering
\includegraphics[width=\textwidth]{figures/Fig5a_Objects.pdf}\par}
\vspace{0.2cm}
\noindent
The von Neumann-Wigner theorem~\cite{vonNeumannWigner_UberDasVerhaltenEigenvertwen} gives rise to several important results related to modal tracking and symmetry.
In greatly simplified terms, this theorem states that there can be no eigentrace crossings so long as an object under study has no point-group symmetries (see the ``asymmetric'' shape~$\srcRegion_1$ above and the left inset below), \ie{}, the impedance matrix is in its irreducible form~\cite{Knorr_1973_TCM_symmetry}. On the contrary, when an object possesses point-group symmetries (\eg{}, mirror or rotational symmetry, see shape~$\srcRegion_2$ above), its impedance matrix is reducible into a block-diagonal matrix and eigentraces from different blocks (associated with irreducible representations) may cross each other, see the right inset below. The importance of this result extends far beyond CMs as it applies to any eigenvalue problem, \eg{} those encountered in quantum mechanics~\cite[Figs. 30, 31]{landau2013quantum}. See~\cite{Schab_2017a} and~\cite{Masek_2020a} for further details.
{\vspace{0.25cm}\centering
\includegraphics[]{figures/Fig5b_C_vs_CA.pdf}\par}
\end{CMAbox}
The operators involved in the CMGEP are naturally parameterized by frequency~$\omega$, leading to frequency dependent modal quantities. The concept of associating modal quantities across frequencies (particularly over a set of discrete frequencies at which the CMGEP is solved) is known as \emph{modal tracking}. Modal data represented by characteristic angles~$\alpha_n$ are shown schematically in Fig.~\ref{fig:tracking}, where untracked data at discrete data frequency points are tracked to create smooth eigentraces.
Based on hypotheses of various metrics of modal similarity, many heuristic tracking algorithms have been proposed, such as leveraging vector correlation \cite{Raines_2012a, Safin_2016a}, eigenvalue proximity \cite{Chen_2021a}, far-field correlation \cite{Miers_2015a}, and hybrid methods \cite{LudickJakobusVogel_AtrackingAlgorithmForTheEigenvectorsCalculatedWithCM}. Complicating the process of modal tracking are degeneracies and crossing avoidances (associated with modal coupling) \cite{KingAJ_PhDThesis, Schab_2016a, Lin_2017a, Ghosal_2020b} near frequencies where multiple eigenvalues approach the same value. Though a system’s symmetry \cite{Knorr_1973_TCM_symmetry, Vescovo_1989a, Vescovo_1990a} may be employed to analytically distinguish degeneracies and crossing avoidances \cite{Schab_2017a} and enable smooth tracking of complex modal systems \cite{Masek_2020a}, the sensitivity of these phenomena to vanishingly small symmetry-destroying perturbations raises questions regarding the physical relevance of tracking modes across frequency. Regardless of physical interpretation, one special case stands out among results related to symmetry-based tracking: modal eigenvalues of completely asymmetric ($C_1$ symmetry) structures are infinitely unlikely to cross \cite{vonNeumannWigner_UberDasVerhaltenEigenvertwen, Schab_2017a}. Additionally, modal symmetry has factored into the design of MIMO systems with orthogonal radiation channels~\cite{Peitzmeier_2019a,Masek_2020a}.
Several misconceptions regarding modal tracking are prevalent in the literature. First, it is not generally appropriate to assume \Quot{slowly changing} modal currents as functions of frequency. As observed in other branches of physics involving coupled modes \cite{haus1991coupled}, modal eigenvectors may change rapidly in the vicinity of crossing avoidances \cite{Schab_2016a}. Second, though useful for interpretation and visualization, the premise of modal tracking is primarily one of human convenience, rather than physical truth. Symmetry-based tracking rules demonstrate that infinitesimal perturbations to a system lead to differing tracking results \cite{Masek_2020a}.
\begin{figure}
\centering
\includegraphics[width=3.5in]{figures/tracking-processed.pdf}
\caption{Untracked (dots, left) and tracked (lines, right) modal eigenvalues using analytic symmetry-based tracking rules for a structure with $C_1$ symmetry (no modal crossings allowed).}
\label{fig:tracking}
\end{figure}
\section{Extended Techniques}
\label{sec:reltech}
So far in this review only the specific generalized eigenvalue problem in \eqref{eq:MR3}, formulated for the study of lossless scatterers in free space, has been considered. However, many variations on this problem exist, allowing for CMs to be applied in a number of alternate settings.
\subsection{Electrically Large Problems}
\label{sec:ellarge}
As the electrical size of a structure increases, so does the number of degrees of freedom required to accurately model induced currents. This increase, in turn, leads to rapidly growing computational cost in populating, storing, and manipulating an impedance matrix generated by EFIE-based MoM, limiting the practical feasiblity of carrying out CM analyses. Fast multipole methods have been applied to remedy this issue, greatly reducing the computational cost involved in obtaining dominant CMs from large structures \cite{Dai_2016a,Wu_2018a,Zhang_2020b}. Nevertheless, it is important to point out that the number of significant modes increases rapidly with electrical size~$ka$, see Fig.~\ref{fig:numOfModes}.
\begin{figure}
\centering
\includegraphics[scale=0.84]{figures/NumberOfModes_Sphere.pdf}
\includegraphics[scale=0.84]{figures/NumberOfModes_Plate.pdf}
\caption{Number of significant modes for a spherical shell (left) and a rectangular plate (right) depending on electrical size~$ka$. The fits for the rectangular plate are found for a second-degree polynomial and depicted by the dashed lines. Explicitly, the fits are $N(ka) \approx 0.26 (ka)^2 + 1.7 ka$ (blue markers) and $N(ka) \approx 0.28 (ka)^2 + 4.6 ka$ (red markers).}
\label{fig:numOfModes}
\end{figure}
\subsection{Dual and Substructure Problems}
Dual formulations involving Babinet’s principle may be employed to represent apertures and slot structures on infinite ground planes as magnetic currents, see \cite{Kabalan_2001a,Liang_2018b} and references therein. Numerical Green’s functions may be employed to generalize the impedance operator to non-free-space settings, most commonly in the analysis of embedded antennas located on or near conducting platforms \cite{chalas2012efficient,Ethier_2012a,Ethier_2014a, Alroughani_2015a,Alakhras_2020a}. When all objects in such a system are of finite extent, calculation of the numerical Green’s function is closely related to the partitioning of an impedance matrix representing the entire system, see Fig.~\ref{fig:substructure}, while problems involving infinite ground planes may be approached through the use of image theory \cite{Angiulli_2000a, Borchardt_2019a}.
\begin{figure}
\centering
\includegraphics[width=3.5in]{figures/substructure-pifa.pdf}
\caption{The problem of an antenna near a scattering object~$\srcRegion$ cast in three forms: (left) the entire structure represented as one impedance matrix system, (middle) the structure partitioned into antenna ($\srcRegion_\T{a}$) and scatterer ($\srcRegion_\T{b}$) regions, and (right) the antenna region alone represented by a compressed impedance matrix eliminating dependent scatterer currents. Note that this example assumes no direct excitation on the scatterer, which is common in embedded and platform-based antenna designs.}
\label{fig:substructure}
\end{figure}
\subsection{Arrays and Network Modes}
The finite basis impedance matrix is equivalent to that encountered in the analysis of $N$-port networks, leading directly to the concept of network CMs \cite{HarringtonMautz_PatternSynthesisForLoadedNportScatterers, Obeidat_2010b, Jaafar_2017a}. For array problems, the scattering problem may be reduced to an~$N$-port network or whole domain basis functions may be employed to approximate currents over each element to reduce computational overhead~\cite{Tzanidis_2012a, KingAJ_PhDThesis, Lonskyetal_CMofDipoleArrays,Guan_2019a}. More involved approaches have been developed for similar analysis of finite arrays through the use of modal properties of single array elements \cite{Cheng_2019a}. Numerical analysis of infinite uniform arrays has also been carried out through the use of problem-specific Green's functions, closely resembling the approaches taken in the analysis of objects above infinite ground planes \cite{Angiulli_2000a,maalik2016characteristic, Haykir_2019a}.
\subsection{Related Modal Methods}
Variations on the CM eigenvalue problem involving weighted far-field integration (as opposed to the implicit uniform weighting present in the classical CMGEP) give rise to Inagaki modes \cite{InagakiGarbacz_EigenfunctionsOfCompositeHermitianOperatorsWithApplicationToDiscreteAndContunuousRadiatingSystems} and generalized CMs \cite{Liu_SomeRelationshipsBetweenCharacteristicModesAndInagakiModesForUseInScatteringAndRadiationProblems}, both of which have been applied to bounds and synthesis problems involving pattern specification (\eg{}, directivity, pattern orthogonality) \cite{pozar1984antenna,LiuGarbaczPozar_AntennaSynthesisAndOptimizationUsingGeneralizedCharacteristicModes,Ethier_2009a}. Other modal problems may be constructed using various combinations of the total energy (rather than the reactance), Ohmic (thermal) losses, far-field, and radiation operators \cite{SchabBernhard_RadiationAndEnergyStorageCurrentModesOnConductingStructures, GustafssonTayliEhrenborgEtAl_AntennaCurrentOptimizationUsingMatlabAndCVX}, each with advantages and disadvantages leading themselves to specific problems, particularly in the study of bounds on antenna performance, \eg{},~\cite{jelinek2016optimal,EhrenborgGustafsson_FundamentalBoundsOnMIMOAntennas,Li_2019a}. Similar in name to CMs, characteristic basis functions serve as a convenient method for reducing the computational cost of solving large systems by partitioning and expanding currents in terms of subdomain basis functions obtained for particular excitation \cite{prakash2003characteristic, Haykir2020}.
The diagonalization properties of CMs make them attractive for accelerating optimization problems containing objectives or constraints involving the impedance matrix, such as those encountered in determining physical bounds on extinction and scattering cross sections \cite{2020_Gustafsson_NJP}.
\section{Conclusion}
\label{sec:conclu}
For most of its history, CMA has been closely tied to numerical methods, particularly EFIE-based MoM for perfectly conducting structures, and since the publication of seminal work in the 1970's, continued research on CM decomposition has led to many findings in areas related to its computational implementation. In this review, we touch on several of these areas, ranging from improved numerical techniques to new theoretical formulations. Just as the field has progressed enormously in the last 50 years, we expect research in CMs to continue in directions yet-unknown for many years to come.
Perhaps just as impactful as CMA itself is the increased awareness and interest in source-based theoretical methods it has provided the antennas and propagation community. The use of modal currents and fields as a basis for exploring the feasibility of electromagnetic devices is by no means unique to characteristic modes, though modern computing power has greatly accelerated progress in its application to the development of fast solution techniques, the calculation of physical bounds, and the discovery of further intuitions for practical antenna design. Nevertheless, with every ``new finding'' in the 21$^\T{st}$ century, it seems the community also gains an increased appreciation for early pioneers of the field, \eg{}, the authors of work on numerical methods \cite{waterman1965matrix,Harrington_FieldComputationByMoM}, scattering decompositions \cite{1948_Montgomery_Principles_of_Microwave_Circuits, Garbacz_TCMdissertation} and source-based optimization \cite{lapaz1943optimum, uzsoky1956theory, chu1948physical, lo1966optimization,harrington1965antenna}; whose insights set the stage for modern work in CMA.
\bibliographystyle{IEEEtran}
|
\section*{Contents}
\noindent \S\ref{s:intro}. Introduction
\noindent \S\ref{s:D}. The period domain $D$
\ref{ss:1} Definition of the period domain $D$
\ref{ss:1.2} Relation to \cite{De0} Section 5 and \cite{De} 1.5--1.8 of Deligne
\ref{realanstrD} The real analytic structure of $D$
\ref{ss:cxanastrD} The complex analytic structure of $D$
\ref{ss:pol} Polarizability
\ref{ss:Dold} Relations with usual period domains and Mumford--Tate domains
\noindent \S\ref{s:DBS}. The space of Borel--Serre orbits
\ref{ss:cL} Real analytic manifolds with corners
\ref{ss:BSli} Borel--Serre liftings
\ref{ss:BS1} Review of Borel--Serre theory
\ref{ss:DBS} The set $D_{{\rm {BS}}}$
\ref{ss:BSan} The real analytic structure of $D_{{\rm {BS}}}$
\ref{ss:BSproperty} Global properties of $D_{{\rm {BS}}}$
\noindent \S\ref{s:DSL}. The space of SL(2)-orbits
\ref{ss:red} The set $D_{{\rm{SL}}(2)}$ when $G$ is reductive
\ref{ss:DSL} The sets $D_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2)}$
\ref{SL2an0} Weight filtrations associated to ${\rm{SL}}(2)$-orbits
\ref{SL2an} The real analytic structures of $D_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2)}$
\ref{pfan} Proofs for Section \ref{SL2an}
\ref{Fan} The fan of parabolic subgroups
\ref{s:star_to_BS} Relation of $D^{\star}_{{\rm{SL}}(2)}$ and $D_{{\rm {BS}}}$
\ref{s:Shim} Case of Shimura varieties
\ref{ss:star_to_II} Relation of $D^{\star}_{{\rm{SL}}(2)}$ and $D^{II}_{{\rm{SL}}(2)}$
\ref{ss:val1} Valuative spaces, I
\ref{ss:SL2gl} Global properties of $D^I_{{\rm{SL}}(2)}$, $D^{II}_{{\rm{SL}}(2)}$, $D^{\star}_{{\rm{SL}}(2)}$ etc.
\noindent \S\ref{s:DSig}. The space of nilpotent orbits
\ref{ss:setDSig} The sets $D_{\Sigma}$ and $D_{\Sigma}^{\sharp}$
\ref{ss:Esig} $E_{{\sigma}}$ and the spaces of nilpotent orbits
\ref{ss:ratio} The space of ratios
\ref{ss:val2} Valuative spaces, II
\ref{ss:CKS} Nilpotent orbits and ${\rm{SL}}(2)$-orbits
\ref{ss:property} Properties of the spaces of nilpotent orbits
\ref{ss:val3} Valuative spaces, III
\ref{ss:mild} Mild degeneration
\ref{ss:fund} The fundamental diagram in examples
\ref{ss:functoriality} Functoriality in $G$
\ref{ss:GLMH} $G$-log mixed Hodge structures
\ref{ss:mGLMH} Moduli of $G$-log mixed Hodge structures and period maps
\ref{ss:inf} Infinitesimal study
\ref{ss:gen1} Generalizations, I
\ref{ss:gen2} Generalizations, II
A Appendix
Correction to \cite{KNU2} Part IV
Correction to \cite{KNU3}
List of notation
References
\renewcommand{\thefootnote}{\arabic{footnote}}
\setcounter{section}{-1}
\section{Introduction}\label{s:intro}
In this paper, we generalize the theories of Mumford--Tate domains (see Green--Griffiths--Kerr's book \cite{GGK})
and their toroidal partial compactifications by Kerr--Pearlstein (\cite{KP}) to mixed Hodge theory. We also construct the corresponding Borel--Serre spaces and the spaces of ${\rm{SL}}(2)$-orbits.
In \cite{KNU3}, we described this generalization briefly with an application to construct the toroidal partial compactifications of higher Albanese manifolds. In this paper, we give the details.
In Section \ref{s:D}, for a linear algebraic group $G$, we define the period domain $D$ as a space of $G$-mixed Hodge structures. Here a $G$-mixed Hodge structure means an exact $\otimes$-functor from the category of linear representations of $G$ endowed with weight filtrations
to the category of mixed Hodge structures.
In the case where $G$ is reductive, our period domain $D$ is essentially the Mumford--Tate domain studied in \cite{GGK}.
In Sections \ref{s:DBS}, \ref{s:DSL}, and \ref{s:DSig},
we construct the extended
period domains $D_{{\rm {BS}}}$, $D_{{\rm{SL}}(2)}$, and $\Gamma \operatorname{\backslash} D_{\Sigma}$, the space of Borel--Serre orbits, the space of ${\rm{SL}}(2)$-orbits, and the space of nilpotent orbits, respectively.
In the case where $G$ is reductive,
$\Gamma \operatorname{\backslash} D_{\Sigma}$ is essentially the space of Kerr--Pearlstein (\cite{KP}).
Our method to construct $D_{{\rm {BS}}}$, $D_{{\rm{SL}}(2)}$, and $\Gamma \operatorname{\backslash} D_{\Sigma}$ is similar to that for the usual period domain developed in \cite{KU2} and in the
preceding parts of this series of papers \cite{KNU2}.
Actually, the present paper is regarded as a generalization of our pervious works in Parts I--IV of \cite{KNU2}.
We prove similar results (the Hausdorffness etc.) for these spaces to what we have proved so far for the corresponding spaces in the case of usual period domain. We obtain a fundamental diagram
\medskip
\newline
\setbox0=\vbox{\parindent=0pt
$
{
\begin{matrix}
&&&&&&&&&& D^{\star}_{{\rm{SL}}(2),\val}&&\overset {\eta^{\star}}
\longrightarrow &&D_{{\rm {BS}},\val}\\
&&&&&&&&&\swarrow&\downarrow &\searrow&&& \downarrow\\
&&&&D^{\sharp}_{\Sigma,{[\val]}}&\overset{\psi}\to & D^I_{{\rm{SL}}(2),\val}&\to& D^{II}_{{\rm{SL}}(2),\val}&&D^{\star,+}_{{\rm{SL}}(2)}&&D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}&\to&D_{{\rm {BS}}}\\
&&&&\downarrow &&\downarrow&&\downarrow&\swarrow&&\searrow&\downarrow&&\\
\Gamma \operatorname{\backslash} D_{\Sigma,\val}& \leftarrow & D_{\Sigma,\val}^{\sharp}&\to &D^{\sharp}_{\Sigma,[:]} & \overset {\psi} \to &D^I_{{\rm{SL}}(2)}&\to& D^{II}_{{\rm{SL}}(2)}&&&&D^{\star}_{{\rm{SL}}(2)}&&\\
\downarrow &&&&\downarrow&&&&&&&&&&\\
\Gamma \operatorname{\backslash} D_{\Sigma}&&\longleftarrow &&D_{\Sigma}^{\sharp}&&&&&&&&&&
\end{matrix}
}
$}
\noindent\scalebox{.85}[.85]{\box0}
\medskip
\newline
of the same style as the fundamental diagram in Part IV of \cite{KNU2}, which is commutative and in which the maps respect the structures of the spaces.
The good properties of these spaces are proved starting from the spaces on the right-hand-side and then moving to the left-hand-side, similarly as in \cite{KU2} and \cite{KNU2}.
\medskip
The authors thank Teruhisa Koshikawa for helpful discussions.
The authors thank Katsutoshi Shinohara for a help to complete Example 2 in Remark \ref{r:actonD}.
K.\ Kato was
partially supported by NFS grants DMS 1001729, DMS 1303421, DMS 1601861, and DMS 2001182.
C.\ Nakayama was
partially supported by JSPS Grants-in-Aid for Scientific Research (C) 22540011, (B) 23340008, (C) 16K05093, and (C) 21K03199.
S.\ Usui was
partially supported by JSPS Grants-in-Aid for Scientific Research (B) 23340008 and (C) 17K05200.
\medskip
\section{The period domain $D$}\label{s:D}
Let $G$ be a linear algebraic group over ${\mathbb{Q}}$.
Let $G_u$ be the unipotent radical of $G$, and let $G_{{{\rm red}}}=G/G_u$ be the reductive quotient of $G$.
Let $\mathrm{Rep}(G)$ be the category of
finite-dimensional linear representations of $G$ over ${\mathbb{Q}}$.
\subsection{Definition of the period domain $D$}\label{ss:1}
\begin{sbpara}
In this Section \ref{ss:1}, we give the definition of our period domain $D$ considered in this paper. As we will see in Section 1.2, this is the period domain $D$ in our previous work \cite{KNU3}. In this Section 1.1, we introduce $D$ from the following point of view: We want to have a period domain endowed with an action of $G$. More precisely, we want to have a complex analytic period domain $D$ for ${\mathbb{Q}}$-mixed Hodge structures which is endowed with a real analytic action of the subgroup $G({\mathbb{R}})G_u({\mathbb{C}})$ of $G({\mathbb{C}})$. Then we naturally come to the definition of our $D$.
\end{sbpara}
\begin{sbpara}\label{GMHS}
For a subfield $E$ of ${\mathbb{R}}$, let $(E{\rm {MHS}})$ be the category of $E$-mixed Hodge structures.
By a {\it $G$-mixed Hodge structure} ($G$-MHS for short), we mean an exact $\otimes$-functor (\cite{De3} 2.7) $H:{\operatorname{Rep}}(G) \to ({\mathbb{Q}}{\rm {MHS}});V\mapsto(H(V)_{\mathbb{Q}},W,F)$. (This definition of $G$-MHS is slightly different from the definition in our previous work \cite{KNU3}.)
\end{sbpara}
\begin{sbpara}
\label{movact} Let $D_{{\rm {all}}}(G)$ be the set of all isomorphism classes of $G$-MHS $H:{\operatorname{Rep}}(G)\to({\mathbb{Q}}{\rm {MHS}})$ which preserves the underlying ${\mathbb{Q}}$-vector spaces (that is, for any $V\in {\operatorname{Rep}}(G)$, $H(V)_{\mathbb{Q}}=V$ as a ${\mathbb{Q}}$-vector space) and
which satisfy the following conditions (i) and (ii).
(i) For every $V\in {\operatorname{Rep}}(G)$, the weight filtration $W$ of $H(V)$ is stabilized by the action of $G$ on $V$.
(ii) For every $V\in {\operatorname{Rep}}(G)$, $G_u$ acts trivially on $\gr^WV$.
Then the subgroup $G({\mathbb{R}})G_u({\mathbb{C}})$ of $G({\mathbb{C}})$ acts on $D_{{\rm {all}}}(G)$:
For $H\in D_{{\rm {all}}}(G)$ and $g\in G({\mathbb{R}})G_u({\mathbb{C}})$, $gH\in D_{{\rm {all}}}(G)$ is defined as follows. For $V\in {\operatorname{Rep}}(G)$, $(gH(V))_{\mathbb{Q}}=V$, the weight filtration $W$ of $gH(V)$ is that of $H(V)$, and the Hodge filtration $F$ of $gH(V)$ is given by $F^p(gH(V)):= gF^pH(V)\subset V_{\mathbb{C}}:={\mathbb{C}}\otimes_{\mathbb{Q}} V$, where $F^pH(V)$ is the Hodge filtration of $H(V)$.
\end{sbpara}
\begin{sbpara}\label{perd} By a {\it period domain of $G$-MHS}, we mean a $G({\mathbb{R}})G_u({\mathbb{C}})$-orbit in $D_{{\rm {all}}}(G)$.
This is the definition of the period domain of this paper, which we denote by $D$.
\end{sbpara}
\begin{sbpara}
As will be shown in \ref{Dalltop}, for a reasonable topology on $D_{{\rm {all}}}(G)$, each period domain is open and closed in $D_{{\rm {all}}}(G)$ and hence as a topological space, $D_{{\rm {all}}}(G)$ is a disjoint union of all period domains in $D_{{\rm {all}}}(G)$.
\end{sbpara}
\begin{sbrem} We think this definition of $D$ is a natural way to have a period domain for ${\mathbb{Q}}$-MHS with an action of $G({\mathbb{R}})G_u({\mathbb{C}})$.
To consider a $G$-MHS is a natural way to have an action of $G$ on the period domain because each $V\in {\operatorname{Rep}}(G)$ has an action of $G$.
The group $G({\mathbb{R}})$ acts on $D_{{\rm {all}}}(G)$ by the condition (i) in \ref{movact}. We remark how this condition (i) is important. Note that if $(V, W, F)$ is a ${\mathbb{Q}}$-MHS with $V\in {\operatorname{Rep}}(G)$, $W$ the weight filtration, and $F$ the Hodge filtration, then for $g\in G({\mathbb{R}})$, we have an ${\mathbb{R}}$-MHS $(V_{\mathbb{R}}, gW_{\mathbb{R}}, gF)$. But if $gW_{\mathbb{R}}$ is rational for all $g\in G({\mathbb{R}})$ (we need this to have the action of $G({\mathbb{R}})$ on the set of ${\mathbb{Q}}$-MHS), $W$ must be stabilized by the connected component of $G({\mathbb{R}})$ containing $1$. (That is, rational weight filtrations can not move continuously.) Hence it is natural to put the condition that $G$ stabilizes $W$.
We have the action of $G_u({\mathbb{C}})$ on $D_{{\rm {all}}}(G)$ by the condition (ii) in \ref{movact}.
\end{sbrem}
\begin{sbrem} The condition $G$ stabilizes $W$ may be natural also for the following reason. In the definition of a period domain of mixed Hodge structures, it is natural to fix the weight filtration and move the Hodge filtration. This is because
in a variation of mixed Hodge structure, the weight filtration is put on the local system and the Hodge filtration is put on the vector bundle, and hence the weight filtration is constant locally and Hodge filtration varies continuously.
\end{sbrem}
\begin{sbpara}\label{GHS}
For a subfield $E$ of ${\mathbb{R}}$,
by an $E$-HS, we will mean an $E$-MHS which is a direct sum of pure $E$-Hodge structures. (They are also called {\it split} $E$-mixed Hodge structure.) Let $(E{\rm {HS}})$ be the category of $E$-HS.
By $G$-HS, we mean a $G$-MHS which has values in (${\mathbb{Q}}$HS)$\subset$ (${\mathbb{Q}}{\rm {MHS}}$).
\end{sbpara}
\begin{sbprop}\label{movred}
Assume that $G$ is reductive and let $H\in D_{{\rm {all}}}(G)$. Then $H$ is a $G$-HS. For $V\in {\operatorname{Rep}}(G)$ and for $w\in {\mathbb{Z}}$, if $V_w$ denotes the underlying ${\mathbb{Q}}$-vector space of the part of $H(V)$ of weight $w$, $V_w$ is $G$-stable in $V$.
\end{sbprop}
\begin{pf}
Since any representation of a reductive group is semisimple, the weight filtration on $V$ has a splitting which is compatible with the action of $G$. Hence there is a decomposition $V=\bigoplus_w V_w$ such that $V_w$ is $G$-stable and $W_wV_w=V_w$, $W_{w-1}V_w=0$. We have $H(V)=\bigoplus_w H(V_w)$ and $H(V_w)$ is a pure Hodge structure of weight $w$.
\end{pf}
\subsection{Relation to \cite{De0} Section 5 and \cite{De} 1.5--1.8 of Deligne}\label{ss:1.2}
\begin{sbpara} \label{SCR0}
Let $S_{{\mathbb{C}}/{\mathbb{R}}}$ be the Weil restriction of ${\mathbb G}_m$ from ${\mathbb{C}}$ to ${\mathbb{R}}$.
It represents the functor $A\mapsto ({\mathbb{C}}\otimes_{\mathbb{R}} A)^\times$ for commutative rings $A$ over ${\mathbb{R}}$.
We have $S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})={\mathbb{C}}^\times$, which is understood as ${\mathbb{C}}^\times$ regarded as an algebraic group over ${\mathbb{R}}$.
Let $w: {\mathbb G}_{m,{\mathbb{R}}}\to S_{{\mathbb{C}}/{\mathbb{R}}}$ be the homomorphism induced from the natural maps $A^\times\to ({\mathbb{C}}\otimes_{\mathbb{R}} A)^\times$
for commutative rings $A$ over ${\mathbb{R}}$.
In \cite{De0} and \cite{De}, Deligne related $S_{{\mathbb{C}}/{\mathbb{R}}}$ to the theory of Hodge structures as follows.
\end{sbpara}
\begin{sbpara}\label{SCR1} The following (1) and (2) are identified.
(1) An ${\mathbb{R}}$-HS.
(2) A (finite-dimensional) linear representation of $S_{{\mathbb{C}}/{\mathbb{R}}}$ over ${\mathbb{R}}$.
In fact, a linear representation of $S_{{\mathbb{C}}/{\mathbb{R}}}$ over ${\mathbb{R}}$ is equivalent to a finite-dimensional ${\mathbb{R}}$-vector space $V$ endowed with a decomposition
$$V_{\mathbb{C}}:={\mathbb{C}}\otimes_{\mathbb{R}} V=\bigoplus_{p,q\in {\mathbb{Z}}} \; V_{\mathbb{C}}^{p,q}$$
such that for any $p,q$, $V_{\mathbb{C}}^{q,p}$ coincides with the complex conjugate of $V_{{\mathbb{C}}}^{p,q}$ (that is, the image of $V_{\mathbb{C}}^{p,q}$ under ${\mathbb{C}}\otimes_{\mathbb{R}} V\to {\mathbb{C}}\otimes_{\mathbb{R}} V\;;\;z\otimes v\mapsto {\bar z}\otimes v$). For a linear representation $V$ of $S_{{\mathbb{C}}/{\mathbb{R}}}$, the corresponding decomposition is defined by
$$V_{\mathbb{C}}^{p,q}=\{v\in V_{\mathbb{C}}\;|\; [z] v= z^p{\bar z}^qv\;\text{for}\;z\in {\mathbb{C}}^\times\}.$$
Here $[z]$ denotes $z$ regarded as an element of $S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})$. By taking $V_{\mathbb{C}}^{p,q}$ as the $(p,q)$-Hodge component of $V_{\mathbb{C}}$, this is understood as an ${\mathbb{R}}$-HS with underlying ${\mathbb{R}}$-vector space $V$.
The weight $m$-part of this ${\mathbb{R}}$-HS is the part on which $z\in {\mathbb{R}}^\times={\mathbb G}_{m,{\mathbb{R}}}({\mathbb{R}})$ acts as multiplication by $z^m$ via $w: {\mathbb G}_{m,{\mathbb{R}}} \to S_{{\mathbb{C}}/{\mathbb{R}}}$.
\end{sbpara}
\begin{sbpara}\label{SCR2}
(1) The following (1.1) and (1.2) are identified.
(1.1) An exact $\otimes$-functor $H:{\operatorname{Rep}}(G) \to ({\mathbb{R}}{\rm {HS}})$
with the underlying ${\mathbb{R}}$-vector space $H(V)_{\mathbb{R}}={\mathbb{R}} \otimes_{\mathbb{Q}} V$ ($V\in {\operatorname{Rep}}(G)$).
(1.2) A homomorphism $h: S_{{\mathbb{C}}/{\mathbb{R}}} \to G_{\mathbb{R}}$.
\medskip
(2) The following (2.1) and (2.2) are identified.
(2.1)
A $G$-HS $H:{\operatorname{Rep}}(G) \to ({\mathbb{Q}}{\rm {HS}})$ (\ref{GHS}) preserving the underlying ${\mathbb{Q}}$-vector spaces.
(2.2) A homomorphism $h:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$
such that $h\circ w:{\mathbb G}_{m,{\mathbb{R}}}\to G_{\mathbb{R}}$ is defined over ${\mathbb{Q}}$.
We explain (1).
If we are given a homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ in (1.2), for any $V\in {\operatorname{Rep}}(G)$, $H(V)_{\mathbb{R}}={\mathbb{R}} \otimes_{{\mathbb{Q}}} V$ has an action of $S_{{\mathbb{C}}/{\mathbb{R}}}$ and is regarded as an ${\mathbb{R}}$-HS.
Conversely, if we have a functor $H:{\operatorname{Rep}}(G) \to ({\mathbb{R}}{\rm {HS}})$ having the property in (1.1), then by \ref{SCR1} and by the theory of Tannakian categories, we have a homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$. This shows (1).
Taking account of ${\mathbb{Q}}$-structures, we get (2) from (1).
\end{sbpara}
\begin{sbpara}\label{hatDa}
Let ${\hat D}_{{\rm {all}}}(G)$ be the set of all isomorphism classes of exact $\otimes$-functors $H:{\operatorname{Rep}}(G) \to ({\mathbb{R}} {\rm {MHS}})$ with the underlying ${\mathbb{R}}$-vector space $H(V)_{\mathbb{R}}={\mathbb{R}} \otimes_{\mathbb{Q}} V$ ($V\in {\operatorname{Rep}}(G)$) such that for every $V \in {\operatorname{Rep}}(G)$, the action of $G$ on $V$ stabilizes the weight filtration $W$ on $V_{\mathbb{R}}={\mathbb{R}}\otimes_{\mathbb{Q}} V$ and the action of $G_u$ on $\gr^WV_{\mathbb{R}}$ is trivial.
(Note that $D_{{\rm {all}}}(G)$ in \ref{movact} is identified with the set of those functors whose weight filtrations are ${\mathbb{Q}}$-rational.)
Let ${\hat D}'_{{\rm {all}}}(G)$ be the set of all pairs $(h, \delta)$, where $h$ is a homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ and $\delta$ is an element of
${\rm {Lie}}\,(G)_{\mathbb{R}}$ satisfying the following condition (i). Consider the adjoint action of $G$ on ${\rm {Lie}}\,(G)$ and the induced action of $S_{{\mathbb{C}}/{\mathbb{R}}}$ on ${\rm {Lie}}\,(G)_{{\mathbb{R}}}$ via $h$. By this, ${\rm {Lie}}\,(G)_{{\mathbb{R}}}$ becomes an ${\mathbb{R}}$-HS. For $m,n\in {\mathbb{Z}}$, let $H^{m,n}$ be the Hodge $(m,n)$-component of the weight $(m+n)$-part of ${\rm {Lie}}\,(G)_{{\mathbb{C}}}$.
(i) $\delta \in \bigoplus_{m<0,n<0} H^{m,n}$.
\end{sbpara}
\begin{sbprop}\label{SCR4} We have a bijection
$${\hat D}'_{{\rm {all}}}(G)\to {\hat D}_{{\rm {all}}}(G)\;;\;(h,\delta)\mapsto e^{i\delta}H,$$ where $H$ is the functor ${\operatorname{Rep}}(G) \to ({\mathbb{R}}{\rm {HS}})$ corresponding to $h$ in $\ref{SCR2}$ $(1)$.
\end{sbprop}
\begin{pf}
This follows from \cite{CKS} Proposition (2.20).
\end{pf}
\begin{sblem}\label{Lie}
Let $H\in {\hat D}_{{\rm {all}}}(G)$ ($\ref{hatDa}$). Consider the adjoint action of $G$ on ${\rm {Lie}}\,(G)$ and consider the weight filtration of ${\rm {Lie}}\,(G)_{{\mathbb{R}}}$ and the Hodge filtration of ${\rm {Lie}}\,(G)_{{\mathbb{C}}}$ defined by $H$.
$(1)$ Let $\ell\in {\rm {Lie}}\,(G)_{{\mathbb{R}}}$ and $w\in {\mathbb{Z}}$. Then $\ell\in W_w{\rm {Lie}}\,(G)_{{\mathbb{R}}}$ if and only if, for any $V\in {\operatorname{Rep}}(G)$ and any $k\in {\mathbb{Z}}$, the Lie action ${\rm {Lie}}\,(G)_{{\mathbb{R}}} \times V_{\mathbb{R}} \to V_{\mathbb{R}}$ satisfies $\ell W_kV_{\mathbb{R}}\subset W_{k+w}V_{\mathbb{R}}$.
$(2)$ Let $\ell\in {\rm {Lie}}\,(G)_{{\mathbb{C}}}$ and $p\in {\mathbb{Z}}$. Then $\ell\in F^p{\rm {Lie}}\,(G)_{{\mathbb{C}}}$ if and only if, for any $V\in {\operatorname{Rep}}(G)$ and any $r\in {\mathbb{Z}}$, the Lie action ${\rm {Lie}}\,(G)_{{\mathbb{C}}} \times V_{\mathbb{C}} \to V_{\mathbb{C}}$ satisfies $\ell F^rV_{\mathbb{C}}\subset F^{r+p}V_{\mathbb{C}}$.
\end{sblem}
\begin{pf}
The only if parts are clear.
Take a $V\in {\operatorname{Rep}}(G)$ such that the map ${\rm {Lie}}\,(G) \to {\rm {End}}(V)$ induced by the Lie action is injective.
Then since this is a homomorphism of ${\mathbb{R}}$-MHS, we have $W_w{\rm {Lie}}\,(G)_{{\mathbb{R}}} = {\rm {Lie}}\,(G)_{{\mathbb{R}}} \cap W_w{\rm {End}}(V_{\mathbb{R}}) = \{h\in{\rm {Lie}}\,(G)_{{\mathbb{R}}}\;|\; hW_kV_{\mathbb{R}}\subset W_{k+w}V_{\mathbb{R}}$ for any $k\in {\mathbb{Z}}\}$, and a similar relation of Hodge filtrations. This proves the if parts.
\end{pf}
\begin{sbpara}\label{kandh} (1) Let $\Psi_W(G)$ be the set of all homomorphisms $k: {\mathbb{G}}_m \to G_{{{\rm red}}}$ satisfying the following conditions (i) and (ii).
(i) The image of $k$ is contained in the center of $G_{{{\rm red}}}$.
(ii) For some homomorphism (and hence for any homomorphism) $\tilde k : {\mathbb{G}}_m\to G$ which lifts $k$, the adjoint action of ${\mathbb{G}}_m$ on ${\rm {Lie}}\,(G_u)$ via $\tilde k$ is of weight $\le-1$.
\medskip
Note that in the case where $G$ is reductive, the condition (ii) is automatically satisfied.
\medskip
(2) Let $\Psi_H(G)$ be the set of all homomorphisms $h: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ satisfying the following condition: There exists $k\in \Psi_W(G)$ such that $h\circ w: {\mathbb{G}}_{m,{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ comes from $k$ (see \ref{SCR0} for $w$).
We have a canonical map $\Psi_H(G) \to \Psi_W(G)\;;\;h\mapsto k$.
\end{sbpara}
\begin{sbpara}
\label{wt}
Let $k\in \Psi_W(G)$.
Then, for any $V \in {\operatorname{Rep}}(G)$, the action of ${\mathbb G}_m$ on $V$ via a lifting $\tilde k$ of $k$ defines
a rational increasing filtration $W$ on $V$ called the {\it weight filtration}, which is independent of the lifting. For any $V\in {\operatorname{Rep}}(G)$, $W_wV$ is $G$-stable for any $w\in {\mathbb{Z}}$ and the action of $G_u$ in $\gr^WV$ is trivial.
\end{sbpara}
\begin{sbprop}
\label{DPsi1}
$(1)$ Let $H\in {\hat D}_{{\rm {all}}}(G)$ ($\ref{hatDa}$).
Then the following conditions {\rm (i)} and {\rm (ii)} are equivalent.
{\rm (i)} $H\in D_{{\rm {all}}}(G)$ ($\ref{movact}$).
{\rm (ii)} The restriction of $H$ to ${\operatorname{Rep}}(G_{{{\rm red}}})$ is a $G$-HS ($\ref{GHS}$), and the corresponding homomorphism $h: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}}, {\mathbb{R}}}$ ($\ref{SCR2}$ $(2)$) belongs to $\Psi_H(G)$ ($\ref{kandh}$ $(2)$).
$(2)$ Let $H\in {\hat D}_{{\rm {all}}}(G)$ ($\ref{hatDa}$).
If the equivalent conditions in $(1)$ are satisfied, the weight filtrations of $H$ are given by the image $k$ of $h$ in $\Psi_W(G)$ as in $\ref{wt}$.
$(3)$ If $G$ is reductive, the map $D_{{\rm {all}}}(G) \to \Psi_H(G)\;;\;H\mapsto h$ is bijective.
\end{sbprop}
\begin{pf}
In the case where $G$ is reductive, (1) follows from Proposition \ref{movred}.
(3) follows from the case of (1) where $G$ is reductive.
We prove (1) and (2).
Assume (i).
Then, by Proposition \ref{movred}, the restriction is a $G$-HS.
Further, the induced homomorphism $h\circ w: {\mathbb{G}}_{m,{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ is defined over ${\mathbb{Q}}$ and its image is in the center of $G_{{{\rm red}},{\mathbb{R}}}$. We prove that ${\rm {Lie}}\,(G_u)$ is of weight $\leq -1$, which implies (ii).
Since $G_u$ acts on $\gr^WV$ trivially for any $V\in {\operatorname{Rep}}(G)$, the Lie action of ${\rm {Lie}}\,(G_u)$ on $V$
induces the zero action on $\gr^WV$. By Lemma \ref{Lie}, this proves that ${\rm {Lie}}\,(G_u)$ has weights $\leq -1$.
Assume (ii). Since $H$ comes from ${\hat D}'_{{\rm {all}}}(G)$ (Proposition \ref{SCR4}), the weight filtration $W$ of $H$ is given by the image $k$ of $h$ in $\Psi_W(G)$ as in \ref{wt}. Hence the weight filtration of $H$ is rational, that is, $H\in D_{{\rm {all}}}(G)$.
Thus we have proved (1) and (2).
\end{pf}
By Proposition \ref{DPsi1} (1), we have a map $$D_{{\rm {all}}}(G)\to \Psi_H(G)\;;\; H \mapsto h.$$
\begin{sbcor}\label{ucom}
If $D_{{\rm {all}}}(G)$ is not empty, $G_u$ is contained in the commutator subgroup of $G$.
\end{sbcor}
\begin{pf} If $D_{{\rm {all}}}(G)$ is not empty, via the maps $D_{{\rm {all}}}(G)\to \Psi_H(G) \to \Psi_W(G)$, we see that $\Psi_W(G)$ is not empty. For a lifting $\tilde k :{\mathbb{G}}_m \to G$ of an element $k:{\mathbb{G}}_m \to G_{{{\rm red}}}$ of $\Psi_W(G)$, since ${\rm {Lie}}\,(G_u)$ is of weight $\le -1$ for $\tilde k$, we have $G_u=[\tilde k({\mathbb{G}}_m), G_u]$.
\end{pf}
\begin{sbprop}
\label{DPsi}
Consider the maps $D_{{\rm {all}}}(G)\to \Psi_H(G)\to \Psi_W(G)$.
$(1)$ Let $H\in D_{{\rm {all}}}(G)$ and let $h$ be the image of $H$ in $\Psi_H(G)$. Then
for $g_1\in G({\mathbb{R}})$ and $g_2\in G_u({\mathbb{C}})$, the image of $g_1g_2H\in D_{{\rm {all}}}(G)$ in $\Psi_H(G)$ is $g_{1,{{\rm red}}}hg_{1,{{\rm red}}}^{-1}: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$.
Here $g_{1,{{\rm red}}}$ is the image of $g_1$ in $G_{{{\rm red}}}({\mathbb{R}})$.
$(2)$ Let $h\in \Psi_H(G)$ and let $k$ be the image of $h$ in $\Psi_W(G)$. Then for $g\in G_{{{\rm red}}}({\mathbb{R}})$, the image of $ghg^{-1}$ in $\Psi_W(G)$ is $k$.
$(3)$ The map $D_{{\rm {all}}}(G) \to \Psi_H(G)$ is surjective. The action of $G_u({\mathbb{C}})$ on each fiber of this map is transitive.
\end{sbprop}
\begin{pf}
(1) and (2) are straightforwards.
We prove
(3).
Let $h\in \Psi_H(G)$.
By Proposition \ref{SCR4}, the fiber of $h$ in $D_{{\rm {all}}}(G)$ consists of the images $e^{i \delta}H$ of $(\tilde h, \delta)\in {\hat D}'_{{\rm {all}}}(G)$ in ${\hat D}_{{\rm {all}}}(G)$, where $\tilde h: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ are liftings of $h$ and $H$ denotes the functor ${\operatorname{Rep}}(G) \to ({\mathbb{R}}{\rm {HS}})$ corresponding to $\tilde h$. The fiber is not empty because a lifting $\tilde h$ of $h$ exists.
Let $(\tilde h, \delta), (\tilde h', \delta')\in {\hat D}'_{{\rm {all}}}(G)$, where $\tilde h, \tilde h'$ are liftings of $h$ and let $H$ and $H'$ be the functors corresponding to $\tilde h$ and $\tilde h'$, respectively. For $V\in {\operatorname{Rep}}(G)$, the weight filtration $W$ on $V$ given by $e^{i\delta}H$ and that given by $e^{i\delta'}H'$ coincide because they are given by the image of $h$ in $\Psi_W(G)$ as in \ref{wt}. Let $s_V: \gr^WV_{\mathbb{R}} \to V_{\mathbb{R}}$ and $s'_V: \gr^WV_{\mathbb{R}} \to V_{\mathbb{R}}$ be the splittings of $W$ over ${\mathbb{R}}$ defined by $\tilde h\circ w$ and $\tilde h' \circ w$, respectively. Then $(s'_V \circ s_V^{-1}: V \to V)_V$ comes from an element $u$ of $G_u({\mathbb{R}})$ and $\tilde h'= u\tilde h u^{-1}$. We have $H'=uH$ and hence $e^{i\delta'}H'=ge^{i\delta}H$, where $g= e^{i\delta'}ue^{-i\delta}\in G_u({\mathbb{C}})$.
\end{pf}
We will prove a more precise result on the fibers in Theorem \ref{fiber} below.
\begin{sbpara}\label{kDall}
Fix $k\in \Psi_W(G)$. Then the inverse image of $k$ in $D_{{\rm {all}}}(G)$ under $D_{{\rm {all}}}(G)\to \Psi_W(G)$ is identified with the set of all $G$-MHS which preserve the underlying ${\mathbb{Q}}$-vector spaces and whose weight filtrations are given by $k$ as in \ref{wt}.
\end{sbpara}
\begin{sbpara}\label{D} Fix a homomorphism $$h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$$
which belongs to $\Psi_H(G)$ (\ref{kandh}).
Then, by Proposition \ref{DPsi}, there is a unique $G({\mathbb{R}})G_u({\mathbb{C}})$-orbit $D(G, h_0)$ in $D_{{\rm {all}}}(G)$ whose image in $\Psi_H(G)$ is the set of all $G({\mathbb{R}})$-conjugates of $h_0$. We call this period domain of $G$-MHS (\ref{perd}) the
{\it period domain associated to $h_0$}. By \ref{kDall}, $D(G, h_0)$ coincides with the period domain associated to $h_0$ defined in our previous paper \cite{KNU3}.
In the case where $G$ is reductive, $D(G, h_0)$ is identified with the set of all $G({\mathbb{R}})$-conjugates of $h_0$ (Proposition \ref{DPsi1} (3)).
In this case, the definition of the period domain $D(G, h_0)$ as the set of $G({\mathbb{R}})$-conjugates of $h_0$ appears in Section 5 of \cite{De0} and
1.5 of \cite{De} of Deligne. We borrow the notation $h_0$ from \cite{De}.
\end{sbpara}
\begin{sbpara}\label{D2} If $G$ is reductive and $h_0$ in \ref{D} satisfies the Shimura data in 1.5 of \cite{De}, then as in 1.8 of ibid.,
\medskip
(1) $G({\mathbb{Q}}) \operatorname{\backslash} (D(G, h_0) \times G({\bf A}_{\mathbb{Q}}^{\infty}))/K$, where ${\bf A}_{\mathbb{Q}}^{\infty}$ is the adele ring of ${\mathbb{Q}}$ without $\infty$-component and $K$ is an open compact subgroup of $G({\bf A}^{\infty}_{\mathbb{Q}})$,
\medskip
\noindent
is a {\it Shimura variety over ${\mathbb{C}}$ associated to $h_0$}.
We expect that the set (1) in general (it is a complex analytic space as in Section \ref{ss:cxanastrD} below) is also important in number theory. \cite{Ka} is a trial of the study in this direction.
\end{sbpara}
We show that each period domain is isolated in $D_{{\rm {all}}}(G)$.
\begin{sbprop}\label{Dalltop}
$(1)$ If $G$ is reductive, each $G({\mathbb{R}})$-orbit is open in $D_{{\rm {all}}}(G)$, where we endow $D_{{\rm {all}}}(G)$ with the topology induced by the compact-open topology of $\Hom_{\mathrm{cont}}({\mathbb{C}}^\times, G({\mathbb{R}}))$ via the injection $D_{{\rm {all}}}(G)\simeq \Psi_H(G)\to \Hom_{\mathrm{cont}}({\mathbb{C}}^\times, G({\mathbb{R}}))$.
$(2)$ For a general $G$, for any topology of $D_{{\rm {all}}}(G)$ such that the map $D_{{\rm {all}}}(G) \to D_{{\rm {all}}}(G_{{{\rm red}}})$ is continuous for the above topology of $D_{{\rm {all}}}(G_{{{\rm red}}})$, each $G({\mathbb{R}})G_u({\mathbb{C}})$-orbit is open in $D_{{\rm {all}}}(G)$. That is, as a topological space, $D_{{\rm {all}}}(G)$ is the disjoint union of period domains.
\end{sbprop}
\begin{pf} (1) The set of homomorphisms from ${\mathbb{G}}_{m,{\mathbb{R}}}$ to the center of $G_{\mathbb{R}}$ is discrete for the topology induced by the compact-open topology of $\Hom_{\text{cont}}({\mathbb{R}}^\times, G({\mathbb{R}}))$. Hence we are reduced to proving that for $S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}:= \text{Ker}(\text{norm}: S_{{\mathbb{C}}/{\mathbb{R}}}\to {\mathbb{G}}_{m, {\mathbb{R}}})$, every $G({\mathbb{R}})$-conjugacy class in $\Hom(S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}, G_{\mathbb{R}})$ is open for the topology induced by the compact-open topology of $\Hom_{\text{cont}}(S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}}), G({\mathbb{R}}))$. But this follows from the case $K=S_{{\mathbb{C}}/{\mathbb{R}}}^{(1)}({\mathbb{R}})=\{z\in {\mathbb{C}}^\times\;|\;|z|=1\}$ and $L= G({\mathbb{R}})$ of the result of Lee and Wu \cite{LW} that for a compact group $K$ and for a locally compact group $L$, each $L$-conjugacy class in $\Hom_{\text{cont}}(K, L)$ is open for the compact-open topology.
(2) follows from (1) because $D$ is the inverse image of its image $D_{{{\rm red}}}$ in $D_{{\rm {all}}}(G_{{{\rm red}}})$ and $D_{{{\rm red}}}$ is open in $D_{{\rm {all}}}(G_{{{\rm red}}})$ by (1).
\end{pf}
\begin{sbpara} We compare the above period domain with the Griffiths period domain \cite{Gr} and its generalization \cite{U} to MHS. (A more precise comparison is given in Section \ref{ss:Dold}.)
The period domain in \cite{U} classifies MHS with a fixed weight filtration and fixed Hodge numbers of each $\gr^W_w$, and there the Hodge filtrations move.
In the definition of the period domain of $G$-MHS in the present paper, fixing $W$ in ibid.\ corresponds to fixing $k_0\in \Psi_W(G)$ as in \ref{wt}, and fixing Hodge numbers of each $\gr^W_w$ in ibid.\ corresponds to the fact that we fix the $G_{{{\rm red}}}({\mathbb{C}})$-conjugacy class of the composition ${\mathbb{G}}_{m,{\mathbb{C}}}\to {\mathbb{G}}_{m,{\mathbb{C}}}\times {\mathbb{G}}_{m,{\mathbb{C}}}=S_{{\mathbb{C}}/{\mathbb{R}}, {\mathbb{C}}} \overset{h_0}\to G_{{{\rm red}},{\mathbb{C}}}$, where the first arrow is $z\mapsto (z,1)$. Moving the Hodge filtration in ibid.\ corresponds to moving $H\in D$ by $G({\mathbb{R}})G_u({\mathbb{C}})$.
\end{sbpara}
\subsection{The real analytic structure of $D$}
\label{realanstrD}
Let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ be as in \ref{D} and let $D=D(G, h_0)$ be the associated period domain (\ref{D}). We consider the real analytic structure of $D$.
\begin{sbpara}\label{ranD}
$D$ is regarded as $(G({\mathbb{R}})G_u({\mathbb{C}}))/I_x$ for the isotropy subgroup $I_x$ of $G({\mathbb{R}})G_u({\mathbb{C}})$ at $x\in D$.
Furthermore, $I_x$ is a real algebraic subgroup of $G({\mathbb{R}})G_u({\mathbb{C}})$. This gives a real analytic structure on $D$, and it is independent of the choice of $x\in D$.
\end{sbpara}
\begin{sbpara}\label{splW0}
The image of the composite map $D\to \Psi_H(G) \to \Psi_W(G)$ is a one point $k_0\in \Psi_W(G)$. Hence the weight filtration $W$ on $V\in {\operatorname{Rep}}(G)$ given by $x\in D$ is independent of $x$ and it is defined by $k_0$ as in \ref{wt}.
Let ${\rm{spl}}(W)$ be the set of all isomorphisms of $\otimes$-functors from ${\operatorname{Rep}}(G)$ to the category of ${\mathbb{R}}$-vector spaces
$$(V\mapsto \gr^WV_{\mathbb{R}}) \overset{\sim}\to (V \mapsto V_{\mathbb{R}})\quad\text{preserving the weight filtrations}.$$
(The notation ${\rm{spl}}(W_{\mathbb{R}})$ may be better because we are considering splittings over ${\mathbb{R}}$, but we use the notation ${\rm{spl}}(W)$ for simplicity and for the compatibility with our notation in \cite{KNU2} Parts I--IV.) Then ${\rm{spl}}(W)$ is a $G_u({\mathbb{R}})$-torsor. Hence it is regarded as a real analytic manifold.
\end{sbpara}
\begin{sbpara}\label{Dred}
Let $D_{{{\rm red}}}=D(G_{{{\rm red}}}, h_0)$. This set is identified with the set of all $G({\mathbb{R}})$-conjugates of $h_0$ in $\Hom(S_{{\mathbb{C}}/{\mathbb{R}}}, G_{{{\rm red}},{\mathbb{R}}})$.
We have a canonical surjective projection $D\to D_{{{\rm red}}}$.
For $x\in D$, let $x_{{{\rm red}}}$ be the image of $x$ in $D_{{{\rm red}}}$.
\end{sbpara}
\begin{sbpara}\label{CKSdelta}
Let ${\cal {L}}=\bigoplus_{w\leq -2} \gr^W_w{\rm {Lie}}\,(G)_{\mathbb{R}}$.
Consider the adjoint action of $G$ on ${\rm {Lie}}\,(G)$.
Since the weight filtration is stable under the action of $G$ and since $G_u$ acts trivially on
$\gr^W{\rm {Lie}}\,(G)$ (\ref{wt}), $G_{{{\rm red}}}$ acts on $\gr^W{\rm {Lie}}\,(G)$.
For $p\in D_{{\rm red}}$, define ${\cal {L}}(p)= \gr^W{\rm {Lie}}\,(G)_{{\mathbb{R}}} \cap (\bigoplus_{m<0, n<0} H^{m,n})\subset {\cal {L}}$, where $H^{m,n}$ denotes the Hodge $(m,n)$-component of $\gr^W_{m+n} {\rm {Lie}}\,(G)_{{\mathbb{C}}}$ with respect to $p$.
By Proposition \ref{SCR4}, any element $x$ of $D$ is written uniquely as $$x=s(e^{i\delta}p): V\mapsto s(e^{i\delta}p(\gr^W(V))),$$ where $p\in D_{{{\rm red}}}$, $s\in {\rm{spl}}(W)$, $\delta\in {\cal {L}}(p)$. In fact, this is the understanding of $x$ as the image of $(\tilde h, s\delta s^{-1})\in {\hat D}'_{{\rm {all}}}(G)$ in ${\hat D}_{{\rm {all}}}(G)$, where $\tilde h: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ is the lifting of the homomorphism $h:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$, corresponding to $p$, defined as $\tilde h(z)= sh(z)s^{-1}$ ($z\in S_{{\mathbb{C}}/{\mathbb{R}}}$).
We denote this $\delta\in {\cal {L}}(p)$ by $\delta(x)$.
\end{sbpara}
\begin{sbpara}\label{splW}
We have a canonical real analytic map
$${\rm{spl}}_W:D\to{\rm{spl}}(W)\;;\;x\mapsto{\rm{spl}}_W(x)$$ which is a modification ${\rm{spl}}_W(x)=s\circ\exp(\zeta)$
of the real analytic map $D\to {\rm{spl}}(W)\;;\;x\mapsto s$ in \ref{CKSdelta}
by an element $\zeta\in {\cal {L}}(p)$ explained below.
This splitting ${\rm{spl}}_W(x)$ is called the {\it canonical splitting of $W$ at $x$}.
We explain $\zeta\in{\cal {L}}(p)$.
For each $V\in {\operatorname{Rep}}(G)$, $\zeta_V\in {\cal {L}}_{p(V)}$ is defined as a universal Lie polynomial of the Hodge $(j,k)$-components $\delta_{V, j, k}$ of $\delta_V$ (\cite{CKS} (3.28), (6.60); see also \cite{KNU1} 1.4, Appendix, \cite{KNU2} Part II 1.2).
We can show $\zeta_{V \otimes V'}= \zeta_V \otimes \text{id}_{V'}+\text{id}_V \otimes \zeta_{V'}$, and we have $\zeta\in {\cal {L}}(p)$.
\end{sbpara}
\begin{sbprop}\label{Dandgr}
We have a canonical isomorphism of real analytic manifolds
$$D\overset{\sim}\to \{(p, s, \delta)\in D_{{{\rm red}}} \times {\rm{spl}}(W)\times {\cal {L}}\;|\; \delta\in {\cal {L}}(p)\}$$
given by $x\mapsto (x_{{{\rm red}}}, {\rm{spl}}_W(x), \delta(x))$.
\end{sbprop}
We have an isomorphism of the same form even if we replace the map ${\rm{spl}}_W: D\to {\rm{spl}}(W)$ by the map $D\to {\rm{spl}}(W)\;;\;x\mapsto s$ of \ref{CKSdelta}, but the isomorphism in Proposition \ref{Dandgr} behaves better in degeneration (see Remark \ref{splrem1} below).
\begin{sbpara}\label{Lp=Lp'}
If $p, p'\in D_{{{\rm red}}}$, $p'=gp$ for some $g\in G_{{{\rm red}}}({\mathbb{R}})$, and we have ${\cal {L}}(p')= {\rm{Ad}}(g){\cal {L}}(p)$. Hence all ${\cal {L}}(p)$ ($p\in D_{{{\rm red}}}$) are isomorphic as graded ${\mathbb{R}}$-vector spaces.
Let $L={\cal {L}}(p)$ for some $p\in D_{{{\rm red}}}$.
By Proposition \ref{Dandgr}, we have
\end{sbpara}
\begin{sbcor}
$D$ is an $L$-bundle over $D_{{{\rm red}}}\times {\rm{spl}}(W)$.
\end{sbcor}
\begin{sbpara}\label{Dspl}
Let $D_{{\rm{spl}}}$ be the part of $D$ consisting of exact $\otimes$-functors ${\operatorname{Rep}}(G)\to({\mathbb{Q}}{\rm {MHS}})$ such that the image of the composition ${\operatorname{Rep}}(G) \to({\mathbb{Q}}{\rm {MHS}})\to({\mathbb{R}}{\rm {MHS}})$ is contained in $({\mathbb{R}}{\rm {HS}})$ (that is, such that the images are ${\mathbb{R}}$-split mixed Hodge structures). Then $$D_{{\rm{spl}}}= \{s(p)\;|\; s\in {\rm{spl}}(W), p\in D_{{{\rm red}}}\}=\{x\in D\;|\; \delta(x)=0\}$$
and $D_{{\rm{spl}}}$ is a closed real analytic submanifold of $D$.
Here $s(p): {\operatorname{Rep}}(G) \to ({\mathbb{Q}}{\rm {MHS}})$ sends a $V \in {\operatorname{Rep}}(G)$ to the ${\mathbb{Q}}$-MHS on the underlying ${\mathbb{Q}}$-vector space of $V$ which is induced by $p(\gr^WV)$ and $s(V)\colon \gr^WV_{{\mathbb{R}}} \simeq V_{{\mathbb{R}}}$.
Let $D_{{{\rm nspl}}}= D\smallsetminus D_{{\rm{spl}}}$.
\end{sbpara}
In the rest of this Section \ref{realanstrD}, we explain how ${\rm{spl}}_W: D\to {\rm{spl}}(W)$ is important and why we prefer this map to the map $D\to {\rm{spl}}(W)\;;\;x \mapsto s$ in \ref{CKSdelta}.
\begin{sbrem}\label{splrem1}
When we consider degeneration along a nilpotent orbit, the canonical splitting ${\rm{spl}}_W:D\to{\rm{spl}}(W)$ behaves better than the splitting $D\to{\rm{spl}}(W)$ in \ref{CKSdelta}.
We explain this.
Assume that $(N_1,\dots,N_n,F)$ generates a nilpotent orbit as in \ref{nilp2} below.
For $y=(y_j)_{1\le j\le n}\in{\mathbb{R}}^n$ with $y_j$ are sufficiently large for all $j$, let ${\rm{spl}}_W(y)$ and $s(y)$ be the above splittings associated to the mixed Hodge structure $(W,\exp(\sum_{j=1}^{n}iy_jN_j)F)$.
Then, ${\rm{spl}}_W(y)$ converges in ${\rm{spl}}(W)$ when $y_j/y_{j+1}\to\infty$ ($1\le j\le n$, $y_{n+1}$ denotes $1$) (\cite{KNU1} Theorem 0.5 (1), \cite{KNU2} Part II 2.4.2 (i)), whereas $s(y)$ can diverge.
For this convergence, the term $\zeta$ in the canonical splitting ${\rm{spl}}_W(y)$ plays a crucial role (\cite{KNU1} Example 13.3).
\end{sbrem}
The canonical splitting of $W$ of MHS has a special importance and a characterization related to the theory of ${\rm{SL}}(2)$-orbits
as in Remark \ref{splrem2} and Remark \ref{splrem3} below (\cite{KNU1} 8.7).
\begin{sbrem}\label{splrem2} Assume that we are given a nilpotent orbit $(H_{\mathbb{R}}, \langle \cdot,\cdot\rangle, N, F)$ of weight $w$ as in \cite{KU2} 5.4.1.
Let $W'$ be the $-w$ twist of the monodromy filtration $M$ of $N$. (That is, $W'$ is the twist of $M$ such that the central graded quotient
of $W'$ is of weight $w$ whereas the central graded quotient of $M$ is of weight $0$.) Then $(W', F)$ is a MHS. The canonical splitting of $W'$ of this MHS is explained as follows.
For $y\gg 0$, $(H_{\mathbb{R}}, \langle \cdot,\cdot\rangle, \exp(iyN)F)$ is a polarized Hodge structure. Let $s_{{\rm {BS}}}(y)$ be the unique splitting of $W'$ such that $s_{{\rm {BS}}}(y)(\gr^{W'}_w)$ and $s_{{\rm {BS}}}(y)(\gr^{W'}_{w'})$ with $w\neq w'$ are orthogonal with respect to the Hodge metric of
$(H_{\mathbb{R}}, \langle \cdot,\cdot\rangle, \exp(iyN)F)$. (This splitting of $W'$ is treated in the theory of Borel--Serre lifting. See \ref{orth} below.) As is proved in \cite{KNU1}, when $y\to \infty$, $s_{{\rm {BS}}}(y)$ converges to the canonical splitting ${\rm{spl}}_{W'}(F)$ of $W'$ associated to the MHS $(W', F)$.
In the theory of ${\rm{SL}}(2)$-orbits, we have a homomorphism of algebraic groups $\rho:{\rm{SL}}(2)_{\mathbb{R}}\to {\rm {Aut}}_{\mathbb{R}}(H_{\mathbb{R}})$ over ${\mathbb{R}}$ associated to $(N, F)$. It is the unique homomorphism such that $\rho\begin{pmatrix} 1/t & 0\\ 0&t\end{pmatrix}$ acts on the part of $H_{\mathbb{R}}$ of weight $j$ for ${\rm{spl}}_{W'}(F)$ as $t^{j-w}$ and such that the Lie algebra homomorphism ${\rm {Lie}}\,(\rho) : {\frak {sl}}(2)_{\mathbb{R}}\to {\rm {End}}_{\mathbb{R}}(H_{\mathbb{R}})$ sends the matrix $\begin{pmatrix} 0& 1 \\ 0&0 \end{pmatrix}$ to $N$. That is, the action of the diagonal part of ${\rm{SL}}(2)$ in the theory of ${\rm{SL}}(2)$-orbits gives the canonical splitting ${\rm{spl}}_{W'}(F)$.
This ${\rm{spl}}_{W'}(F)$ is denoted as ${\rm{spl}}_{W'}^{{\rm {BS}}}(F)$ in \ref{BSspl}.
\end{sbrem}
\begin{sbrem}\label{splrem3} The canonical splitting of the weight filtration is functorial for MHS. Any MHS $F'$ is embedded in a MHS $F$ which appears in Remark \ref{splrem2} (\cite{KNU1}). Hence Remark \ref{splrem2} characterizes the canonical splitting.
\end{sbrem}
\subsection{The complex analytic structure of $D$}
\label{ss:cxanastrD}
We consider the complex analytic structure of $D$.
Fix a homomorphism $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ as in \ref{D}.
\begin{sbpara}\label{Y}
Let $Y$ be the set of all isomorphism classes of exact $\otimes$-functors from ${\operatorname{Rep}}(G)$ to the following category $\cC$ preserving the underlying vector spaces and the weight
filtrations.
$\cC$ is the category of triples $(V, W, F)$, where $V$ is a finite-dimensional ${\mathbb{Q}}$-vector space, $W$ is an increasing filtration on $V$
(called the weight filtration), and $F$ is a decreasing filtration on $V_{\mathbb{C}}$ (called the Hodge filtration).
Then $G({\mathbb{C}})$ acts on $Y$ by changing the Hodge filtration $F$. We have $D\subset Y$ and $D$ is stable in $Y$ under the action of $G({\mathbb{R}})G_u({\mathbb{C}})$.
Let $$\Dc:=G({\mathbb{C}})D \subset Y.$$ Since the action of $G({\mathbb{C}})$ on $\Dc$ is transitive and the isotropy group of each point of $\Dc$ is an algebraic subgroup of $G({\mathbb{C}})$, $\Dc$ has a natural structure of a complex analytic manifold as a $G({\mathbb{C}})$-homogeneous space.
\end{sbpara}
\begin{sbprop}\label{tan} For $x\in \Dc$, the tangent space of $\Dc$ at $x$ is canonically isomorphic to ${\rm {Lie}}\,(G)_{{\mathbb{C}}}/F(x)^0{\rm {Lie}}\,(G)_{{\mathbb{C}}}$, where $F(x)$ denotes the Hodge filtration of $x$ on ${\rm {Lie}}\,(G)_{{\mathbb{C}}}$ defined by the adjoint action of $G$ on ${\rm {Lie}}\,(G)$.
The tangent bundle of $\Dc$ is canonically isomorphic to ${\rm {Lie}}\,(G)_{\cO}/F^0{\rm {Lie}}\,(G)_{\cO}$, where ${\rm {Lie}}\,(G)_{\cO}:=\cO\otimes{\rm {Lie}}\,(G)$ with $\cO=\cO_{\Dc}$ the sheaf of holomorphic functions on $\Dc$.
\end{sbprop}
\begin{pf}
By definition of $F(x)$, $F(x)^0{\rm {Lie}}\,(G)_{{\mathbb{C}}}$ is the Lie algebra of the isotropy subgroup of $G({\mathbb{C}})$ at $x$ under the action of $G({\mathbb{C}})$ on $\check D$ in \ref{Y}.
The assertions of this proposition follow.
\end{pf}
\begin{sbprop}\label{open}
$D$ is open in $\Dc$.
\end{sbprop}
\begin{pf} Let $x\in D$.
Since the Hodge filtration $F(x)^{\bullet}{\rm {Lie}}\,(G_{{{\rm red}}})_{{\mathbb{C}}}$ is pure of weight $0$, the
map ${\rm {Lie}}\,(G_{{{\rm red}}})_{\mathbb{R}} \to {\rm {Lie}}\,(G_{{{\rm red}}})_{{\mathbb{C}}}/F(x)^0{\rm {Lie}}\,(G_{{{\rm red}}})_{\mathbb{C}}$ is surjective. Hence the map ${\rm {Lie}}\,(G)_{{\mathbb{R}}}+{\rm {Lie}}\,(G_u)_{\mathbb{C}}\to {\rm {Lie}}\,(G)_{{\mathbb{C}}}/F(x)^0{\rm {Lie}}\,(G)_{{\mathbb{C}}}$ is surjective.
Since
${\rm {Lie}}\,(G)_{{\mathbb{C}}}/F(x)^0{\rm {Lie}}\,(G)_{{\mathbb{C}}}$ is the tangent space of $\Dc$ at $x$ (Proposition \ref{tan}), the last surjectivity shows that $G({\mathbb{R}})G_u({\mathbb{C}}) x $ is a neighborhood of $x$ in $\Dc$.
\end{pf}
\begin{sbcor}
$D$ is a complex analytic manifold.
\end{sbcor}
\begin{sbrem}This Proposition \ref{open} is Proposition 3.2.7 of \cite{KNU3}. The proof of it given there is wrong.
\end{sbrem}
The real analytic structure of $D$ given in \ref{ranD} coincides with the one induced by this complex analytic structure.
\begin{sbthm}\label{fiber} The map $D\to D_{{{\rm red}}}$ is smooth and surjective. For $x\in D$, the fiber over $x_{{{\rm red}}}\in D_{{{\rm red}}}$ ($\ref{Dred}$) in $D$ is isomorphic to $G_u({\mathbb{C}})/F(x)^0G_u({\mathbb{C}})$. Here $F(x)^0G_u({\mathbb{C}})$ is the ${\mathbb{C}}$-valued points of the algebraic subgroup of $G_{u,{\mathbb{C}}}$ whose Lie algebra is $F(x)^0{\rm {Lie}}\,(G_u)_{{\mathbb{C}}})$.
\end{sbthm}
\begin{pf} The smoothness follows from the smoothness of $D$ and $D_{{{\rm red}}}$ and the surjectivity of the map $T_xD\to T_{x_{{{\rm red}}}}(D_{{{\rm red}}})$ of tangent spaces which follows, by Proposition \ref{tan}, from the surjectivity of ${\rm {Lie}}\,(G)\to {\rm {Lie}}\,(G_{{{\rm red}}})$. Consider the action of $G_u({\mathbb{C}})$ on the fiber. The action is transitive by Proposition \ref{DPsi} (3). We prove that the isotropy subgroup of $G_u({\mathbb{C}})$ at $x$ is $F(x)^0G_u({\mathbb{C}})$. Let $g\in G_u({\mathbb{C}})$. Then $g\in F(x)^0G_u({\mathbb{C}})$ if and only if $\log(g) \in F(x)^0{\rm {Lie}}\,(G_u)_{{\mathbb{C}}})$,
that is, if and only if $\log(g) \in F(x)^0{\rm {Lie}}\,(G)_{{\mathbb{C}}}$.
By Lemma \ref{Lie} (2), the last condition is equivalent to the condition that $\log(g)F(x)^pV_{\mathbb{C}}\subset F(x)^pV_{\mathbb{C}}$ for any $V\in {\operatorname{Rep}}(G)$
for the Lie action. This condition is equivalent to the condition that $g F(x)^pV_{\mathbb{C}} = F(x)^pV_{\mathbb{C}}$ for any $V\in {\operatorname{Rep}}(G)$,
that is, $g$ fixes $x$.
\end{pf}
\begin{sbpara}\label{faith}
In this paper, we will often use the following fact (see \cite{Mi2} Theorem 4.14): If $\cG$ is a linear algebraic group over a field $E$ and if $V_1$ is a finite-dimensional faithful representation of $\cG$, $V_1$ generates the $\otimes$-category ${\operatorname{Rep}}_k(\cG)$ of all finite-dimensional representations of $\cG$ over $E$. That is,
all $V\in {\operatorname{Rep}}_k(\cG)$ can be constructed from $V_1$ by taking $\otimes$, $\oplus$, the dual, and subquotients.
\end{sbpara}
\begin{sblem}\label{DV}
For $V\in{\operatorname{Rep}}(G)$, define $D(V)$ (resp.\ $\Dc(V)$) as the set $\{FH(V)\;|\; H\in D\}$ (resp.\ $\{FH(V)\;|\; H\in \Dc\}$) of decreasing filtrations on $V_{\mathbb{C}}$.
Assume that $V\in {\operatorname{Rep}}(G)$ is faithful. Then the map $D\to D(V)$ (resp.\ $\Dc\to \Dc(V)$)$; H\mapsto FH(V)$ is a bijection.
If $H\in D$ (resp.\ $\Dc$), $D(V)$ (resp.\ $\Dc(V)$) coincides with the $G({\mathbb{R}})G_u({\mathbb{C}})$-orbit (resp.\ $G({\mathbb{C}})$-orbit) in the set of decreasing filtrations on $V_{\mathbb{C}}$ containing $FH(V)$.
\end{sblem}
\begin{pf} Since $V$ is faithful, the map $D\to D(V)$ (resp.\ $\Dc\to \Dc(V)$)$; H\mapsto FH(V)$ is injective by \ref{faith}, and hence bijective by definition of $D(V)$ (resp.\ $\Dc(V)$).
The action of $G({\mathbb{R}})G_u({\mathbb{C}})$ (resp.\ $G({\mathbb{C}})$) on $D$ (resp.\ $\Dc$) is transitive.
The second assertion follows.
\end{pf}
\subsection{Polarizability} \label{ss:pol}
For a linear algebraic group $G$, let $G':=[G,G]$ be the commutator algebraic subgroup.
Note that $G_u\subset G'$ if $D_{{\rm {all}}}(G)$ is non-empty (\ref{ucom}).
\begin{sbpara}\label{defpol}
There are two formulations of polarization of a Hodge structure:
the \lq\lq classical formulation'' (\cite{Gr} I 2)
and the formulation by Deligne (\cite{De}).
We adopted the former in Part I--Part IV of this series of papers \cite{KNU2}.
Let $H$ be a ${\mathbb{Q}}$-Hodge structure of weight $w$. Then a polarization in the \lq\lq classical sense'' is a ${\mathbb{Q}}$-bilinear form
$\langle \cdot,\cdot\rangle: H_{\mathbb{Q}}\times H_{\mathbb{Q}}\to {\mathbb{Q}}$ which is symmetric if $w$ is even and anti-symmetric if $w$ is odd, satisfying
$\langle F^p, F^{w+1-p}\rangle =0$ for any $p$,
where $F$ is the Hodge filtration, and the condition that the Hermitian form $(\cdot, \cdot): H_{\mathbb{C}}\times H_{\mathbb{C}}\to {\mathbb{C}}$ defined by $(x, y)=\langle x, i^{p-q}\bar y\rangle$ for $x\in H_{\mathbb{C}}$ and $y\in H^{p,q}_{\mathbb{C}}$ is positive definite. (This positive definite Hermitian form $(\cdot,\cdot)$ is called the {\it Hodge metric} of the polarization. Note that the restriction of the Hodge metric $(\cdot,\cdot)$ of the polarization to $H_{\mathbb{R}}\times H_{\mathbb{R}}$ is a positive definite symmetric bilinear form $H_{\mathbb{R}}\times H_{\mathbb{R}}\to {\mathbb{R}}$ and it is written as $(x, y)\mapsto \langle x, h(i)y\rangle$ for the action $h$ of $S_{{\mathbb{C}}/{\mathbb{R}}}$ on $H_{\mathbb{R}}$ (\ref{SCR2}).)
On the other hand, a polarization in the sense of Deligne is a homomorphism $p: H_{\mathbb{Q}}\otimes H_{\mathbb{Q}}\to {\mathbb{Q}}(-w)={\mathbb{Q}} \cdot (2\pi i)^{-w}$ of Hodge structures of weight $2w$ such that the induced ${\mathbb{Q}}$-bilinear form $H_{\mathbb{Q}}\times H_{\mathbb{Q}} \to {\mathbb{Q}}\;;\;
(x, y)\mapsto (2\pi i)^wp(x\otimes y)$ is a polarization in the above classical sense.
To keep the consistency with Parts I--IV of this series of papers, we adopt in this Part V the formulation of polarization in the classical sense. When we use the formulation of Deligne, we will say that it is a polarization in the sense of Deligne.
We formulate polarizations of ${\mathbb{R}}$-Hodge structures in the same way.
\end{sbpara}
\begin{sbpara}\label{pol}
Let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ be as in \ref{D}.
Let $C:=h_0(i)$ (Weil operator) be the image of $i\in {\mathbb{C}}^\times = S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})$ by $h_0$ in $G_{{{\rm red}}}({\mathbb{R}})$.
We say that $h_0$ is {\it ${\mathbb{R}}$-polarizable} if
$\{a\in (G_{{{\rm red}}})'({\mathbb{R}})\;|\; Ca=aC\}$ is a maximal compact subgroup of $(G_{{{\rm red}}})'({\mathbb{R}})$.
That is, $h_0$ is ${\mathbb{R}}$-polarizable if and only if ${\rm{Ad}}(C)$ on ${\rm {Lie}}\,(G'_{{{\rm red}}})_{{\mathbb{R}}})$ is a Cartan involution.
\end{sbpara}
In the following lemma, which is a variant of \cite{De2} Section 2,
we compare several polarizabilities (the above ${\mathbb{R}}$-polarizability is put as the condition (4.0)).
\begin{sblem}\label{pol2} Let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ be as in $\ref{D}$. Then, for $a=1, 2, 3$, the following conditions $(a.1)$ and $(a.2)$ are equivalent. Furthermore, the conditions $(4.0)$, $(4.1)$, and $(4.2)$ are equivalent. For the conditions $(a):=(a.1)\Leftrightarrow (a.2)$
($a=1,2,3$), and the condition $(4):= (4.0)\Leftrightarrow (4.1) \Leftrightarrow (4.2)$, we have the implications $(1) \Rightarrow (2) \Rightarrow (4)$ and $(1) \Rightarrow (3) \Rightarrow (4)$.
$(1.1)$ (resp.\ $(1.2)$). There is a homomorphism $t: G_{{{\rm red}}}\to {\mathbb{G}}_m$ such that $t(h_0(w(x)))=x^{-2}$ ($x\in {\mathbb{G}}_m$). Furthermore, if we consider the action of $G$ on ${\mathbb{Q}}\cdot (2\pi i)^r$ ($r\in {\mathbb{Z}}$) via $t^r: G_{{{\rm red}}}\to {\mathbb{G}}_m$ and identify $H({\mathbb{Q}}\cdot (2\pi i)^r)$ for $H\in D=D(G,h_0)$ with the Hodge structure ${\mathbb{Q}}(r)$, then, for every $H\in D$ and every $V\in {\operatorname{Rep}}(G)$ (resp.\ for some $H\in D$ and some faithful representation $V\in {\operatorname{Rep}}(G)$) and for each $w\in {\mathbb{Z}}$, there exists a homomorphism $\gr^W_w(V)\otimes \gr^W_w(V) \to {\mathbb{Q}}\cdot (2\pi i)^{-w}$ in ${\operatorname{Rep}}(G)$ which polarizes the Hodge structure $\gr^W_wH(V)$ of weight $w$ in the sense of Deligne.
$(2.1)$ (resp.\ $(2.2)$). There is a homomorphism $t: G_{{{\rm red}},{\mathbb{R}}}\to {\mathbb{G}}_{m,{\mathbb{R}}}$ such that $t(h_0(w(x)))=x^{-2}$ ($x\in {\mathbb{G}}_{m,{\mathbb{R}}}$) and such that, for every $H\in D$ and every $V\in {\operatorname{Rep}}(G)$ (resp.\ for some $H\in D$ and some faithful representation $V\in {\operatorname{Rep}}(G)$) and for each $w\in {\mathbb{Z}}$, there exists an ${\mathbb{R}}$-bilinear form $\langle \cdot,\cdot\rangle: \gr^W_w(V)_{\mathbb{R}}\times \gr^W_w(V)_{\mathbb{R}} \to {\mathbb{R}}$ satisfying $\langle gx, gy\rangle= t(g)^{-w}\langle x, y\rangle$ ($g\in G_{{{\rm red}},{\mathbb{R}}}$) which polarizes the ${\mathbb{R}}$-Hodge structure $\gr^W_wH(V)_{\mathbb{R}}$ of weight $w$.
$(3.1)$ (resp.\ $(3.2)$). For every $H\in D$ and every $V\in {\operatorname{Rep}}(G)$ (resp.\ For some $H\in D$ and some faithful representation $V\in {\operatorname{Rep}}(G)$) and for each $w\in {\mathbb{Z}}$, there exists a ${\mathbb{Q}}$-bilinear form $\langle \cdot,\cdot\rangle: \gr^W_w(V)\times \gr^W_w(V) \to {\mathbb{Q}}$ satisfying $\langle gx, gy\rangle= \langle x, y\rangle$ for $g\in G'_{{{\rm red}}}$ which polarizes the Hodge structure $\gr^W_wH(V)$ of weight $w$.
$(4.0)$ The homomorphism $h_0:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ is ${\mathbb{R}}$-polarizable in the sense of $\ref{pol}$.
$(4.1)$ (resp.\ $(4.2)$). For every $H\in D$ and every $V\in {\operatorname{Rep}}(G)$ (resp.\ For some $H\in D$ and some faithful representation $V\in {\operatorname{Rep}}(G)$) and for each $w\in {\mathbb{Z}}$, there exists an ${\mathbb{R}}$-bilinear form $\langle \cdot,\cdot\rangle: \gr^W_w(V)_{\mathbb{R}}\times \gr^W_w(V)_{\mathbb{R}} \to {\mathbb{R}}$ satisfying $\langle gx, gy\rangle= \langle x, y\rangle$ for $g\in G'_{{{\rm red}},{\mathbb{R}}}$ which polarizes the ${\mathbb{R}}$-Hodge structure $\gr^W_wH(V)_{\mathbb{R}}$ of weight $w$.
\end{sblem}
\begin{pf} For $a=1,2,3,4$, the implication ($a.1$) $\Rightarrow$ ($a.2$) is clear and the implication ($a.2$) $\Rightarrow$ ($a.1$) follows from \ref{faith}.
For $b=1, 2$, the implications ($1.b$) $\Rightarrow$ ($2.b$) $\Rightarrow$ ($4.b$) and the implications ($1.b$) $\Rightarrow$ ($3.b$) $\Rightarrow$ ($4.b$) are clear.
We prove the equivalence of (4.0) and (4.2).
To see the equivalence, by taking $\gr^{W}$, we may assume that $G$ is reductive.
Then the equivalence is an analogue of \cite{De2} lemme 2.8, and proved as follows.
We assume that $G$ is reductive.
Assume (4.0). We prove that (4.2) is satisfied.
Let $K:=\{a \in G'({\mathbb{R}})\,|\,Ca=aC\}$.
Let $S_{{\mathbb{C}}/{\mathbb{R}}}^{(1)}$ be the kernel of the norm map $S_{{\mathbb{C}}/{\mathbb{R}}}\to {\mathbb{G}}_{m,{\mathbb{R}}}$ and let $K_1\subset G({\mathbb{R}})$ be the image of $S_{{\mathbb{C}}/{\mathbb{R}}}^{(1)}({\mathbb{R}})=\{z\in {\mathbb{C}}^\times\;|\;|z|=1\}$ under $h_0$.
We first show that there is a compact subgroup $K_2$ of $G({\mathbb{R}})$ which contains
both $K$ and $K_1$. Let $J= \{a\in G_{\mathbb{R}}\;|\; Ca=aC\}$ and let $K_2$ be a maximal compact subgroup of $J({\mathbb{R}})$ which contains $K_1$. Then, since $K_2$ contains some conjugate of $K$ in $J({\mathbb{R}})$ and since $K$ is normal in $J({\mathbb{R}})$, we have $K\subset K_2$.
By \cite{Mo}, there is a finite-dimensional faithful representation $V$ of $G_{{\mathbb{R}}}$ and a positive definite symmetric ${\mathbb{R}}$-bilinear form $(\cdot, \cdot): V\times V\to {\mathbb{R}}$ which is fixed by $K_2$ such that $G_{\mathbb{R}}$ is stable in $\text{Aut}_{\mathbb{R}}(V)$ under the transpose $g\mapsto {}^tg$ with respect to $(\cdot,\cdot)$.
Note that the last condition implies that $G'_{{\mathbb{R}}}$ is also stable under the transpose.
\smallskip
\noindent
{\bf Claim 1.} The Cartan involution $\theta_K: G'_{\mathbb{R}} \to G'_{\mathbb{R}}$ associated to $K$ is $g \mapsto {}^t g^{-1}$.
\smallskip
Note that this claim is also used in \cite{BS}.
\noindent
{\it Proof of Claim 1.} This is an algebraic homomorphism and its set of fixed points is compact and contains $K$. Since $K$ is a maximal compact subgroup of $G'({\mathbb{R}})$ by the assumption, $K$ coincides with the set of fixed points of $\theta_K$.
This proves Claim 1.
\smallskip
On the other hand, we know that $g \mapsto C^{-1}gC$ is the Cartan involution of $G'_{\mathbb{R}}$ associated to $K$.
Hence, by Claim 1, we have $C^{-1}gC= {}^t g^{-1}$.
Put $\langle x, y \rangle := (x, C^{-1}y)$.
We show that it is $G'_{\mathbb{R}}$-invariant.
Let $g$ be in $G'_{\mathbb{R}}$.
Then we have $\langle gx,gy \rangle=(gx, C^{-1}gy)=(gx,{}^tg^{-1}C^{-1}y)
= (g^{-1}gx, C^{-1}y) = (x, C^{-1}y)=\langle x, y \rangle$.
Let $V_w$ for $w\in {\mathbb{Z}}$ be the part of $V$ of weight $w$ with respect to $h_0$.
Let $c\in {\mathbb{R}}^\times\subset {\mathbb{C}}^\times=S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})$. We prove that ${}^th_0(c)v=c^wv$ for $v\in V_w$. Since ${}^t h_0(c)$ belongs to $G({\mathbb{R}})$ in $\text{Aut}_{\mathbb{R}}(V)$, we have ${}^th_0(c)V_w=V_w$. For every $v'\in V_w$, we have $({}^th_0(c)v, v')= (v, h_0(c)v')= (v, c^wv')=(c^wv, v')$. Since $(\cdot, \cdot): V_w\times V_w\to {\mathbb{R}}$ is non-degenerate, we have ${}^th_0(c)v=c^wv$.
We prove $\langle V_w, V_{w'}\rangle=0$ unless $w=w'$.
For $v\in V_w$ and $v'\in V_{w'}$, $c^w(v, v')= (h_0(c)v, v')= (v, {}^th_0(c)v')= (v, c^{w'}v')=c^{w'}(v, v')$. Hence if $w\neq w'$, then $(V_w, V_{w'})=0$ and hence $\langle V_w, V_{w'}\rangle=0$.
Let $\langle\cdot,\cdot\rangle_w: V_{w,{\mathbb{R}}}\times V_{w,{\mathbb{R}}}\to {\mathbb{R}}$ be the pairing induced by $\langle \cdot,\cdot\rangle$.
We prove that $\langle\cdot, \cdot\rangle_w$ is a polarization on $V_w$. Let $(\cdot,\cdot)_w: V_{w, {\mathbb{C}}}\times V_{w, {\mathbb{C}}} \to {\mathbb{C}}$ be the positive definite Hermitian form induced by $(\cdot,\cdot)$. Let $H_w^{p,q}$ ($p+q=w$) be the $(p,q)$-Hodge component of $V_{w, {\mathbb{C}}}$ with respect to $h_0$. It is sufficient to show that $(H_w^{p,q}, H_w^{p',q'})=0$ unless $p=p'$. Let $u\in K_1=S_{{\mathbb{C}}/{\mathbb{R}}}^{(1)}({\mathbb{R}})$. Then, since $(\cdot, \cdot)_w$ is $K_1$-invariant, we have, for $v\in H_w^{p,q}$ and $v'\in H_w^{p',q'}$, $(v, v')= ([u]v, [u]v')= u^{p-q}u^{q'-p'}(v,v')= u^{2(p-p')}(v,v')$. Hence $p=p'$. This proves that the condition (4.2) is satisfied.
Assume (4.2).
We prove that (4.0) is satisfied. Take a faithful representation $V\in {\operatorname{Rep}}(G)$. By our assumption,
there is a $G'_{\mathbb{R}}$-invariant bilinear form $\langle\cdot,\cdot\rangle$ on $V_{\mathbb{R}}$ such that $(x,y):=
\langle x, Cy\rangle$ is positive definite and symmetric.
\smallskip
\noindent
{\bf Claim 2.} For $g\in G'_{\mathbb{R}}$, we have $C^{-1}gC ={}^t g^{-1}$, where the transpose is with respect to $(\cdot,\cdot)$.
\smallskip
\noindent {\it Proof.} This follows from the fact that $\langle\cdot, \cdot\rangle$ is $G'_{\mathbb{R}}$-stable.
The following Claim 3 is well-known.
\smallskip
\noindent
{\bf Claim 3.} Let $U$ be a finite-dimensional ${\mathbb{R}}$-vector space endowed with a positive definite symmetric bilinear form $(\cdot, \cdot)$. Let $\cG$ be an algebraic subgroup of $\operatorname{GL}_U$ which is stable under $g\mapsto {}^tg$, where the transpose is with respect to $(\cdot, \cdot)$. Then $\{g\in \cG({\mathbb{R}})\;|\; {}^tg=g^{-1}\}$ is a maximal compact subgroup of $\cG({\mathbb{R}})$.
By Claim 2 and Claim 3, $\{g \in G'({\mathbb{R}})\,|\, C^{-1}gC=g\}$ is a maximal compact subgroup of $G'({\mathbb{R}})$.
Thus (4.2) implies (4.0).
\end{pf}
\begin{sbpara}\label{example} The conditions (1)--(4) in Lemma \ref{pol2}
are different from each other as the following examples show.
{\it Example} 1. Let $E$ be a cubic extension field of ${\mathbb{Q}}$ having one real place and one complex place and let $G=E^\times$ regarded as a torus over ${\mathbb{Q}}$ of dimension $3$. Let $h_0 :S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ be the homomorphism such that the induced map $S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})={\mathbb{C}}^\times \to G({\mathbb{R}})= (E\otimes_{\mathbb{Q}} {\mathbb{R}})^\times= {\mathbb{R}}^\times \times {\mathbb{C}}^\times$ sends $z\in {\mathbb{C}}^\times$ to $(z\bar z, z^2)$. This example satisfies the conditions (2) and (4), but does not satisfy the conditions (1), (3). In fact, (2) is satisfied because we have $t: G_{\mathbb{R}}\to {\mathbb{G}}_{m,{\mathbb{R}}}$ which sends $(r,z)\in G({\mathbb{R}})= {\mathbb{R}}^\times\times {\mathbb{C}}^\times$ to $r(z\bar z)^{-1}$, and for $V=E\in {\operatorname{Rep}}(G)$, we have an ${\mathbb{R}}$-bilinear form on $E_{\mathbb{R}}= {\mathbb{R}}\times {\mathbb{C}}$ with values in ${\mathbb{R}}\cdot (2\pi i)^{-2}={\mathbb{R}}$
given by $((x_1, y_1), (x_2, y_2))\mapsto x_1x_2 - y_1\bar y_2-\bar y_1 y_2$ ($x_j\in {\mathbb{R}}$, $y_j\in {\mathbb{C}}$) which polarizes the Hodge structure of $E$ of weight $2$ associated to $h_0$.
But the condition (3) is not satisfied because there is no bilinear form on the ${\mathbb{Q}}$-vector space $E$ which polarizes the Hodge structure associated to $h_0$.
{\it Example} 2. Let $E$ be an imaginary quadratic field over ${\mathbb{Q}}$ and let $G=E^\times$ regarded as a torus over ${\mathbb{Q}}$ of dimension $2$. Let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ be the homomorphism such that the induced map $S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})={\mathbb{C}}^\times \to G({\mathbb{R}})= (E\otimes_{\mathbb{Q}} {\mathbb{R}})^\times= {\mathbb{C}}^\times$ sends $z\in {\mathbb{C}}^\times$ to $z/\bar z$. This example satisfies the conditions (3) and (4), but does not satisfy the conditions (1), (2). In fact, there is no homomorphism $t:G_{\mathbb{R}}\to {\mathbb{G}}_{m,{\mathbb{R}}}$ such that $t(h_0(w(x)))=x^{-2}$. The condition (3) is satisfied because $E\times E\to {\mathbb{Q}}\;;\; (x_1,x_2)\mapsto -x_1\bar x_2-\bar x_1 x_2$ ($x_j\in E$) is the polarization of the Hodge structure of $E$ of weight $0$ associated to $h_0$.
\end{sbpara}
We thank Teruhisa Koshikawa for his advice on ${\mathbb{R}}$-polarizability and for showing the above Example 1 to us.
\begin{sbpara} \label{X}
Let $\cG$ be a semisimple algebraic group over ${\mathbb{R}}$.
Let $\frak X$ be the set of all maximal compact subgroups of $\cG({\mathbb{R}})$. Then $\frak X$ is not empty. The group $\cG({\mathbb{R}})$ acts on $\frak X$ by conjugation, and this action is transitive. See \cite{Mo} Theorem 3.1, \cite{BH} Proposition 1.12. For $K\in \frak X$, we have a bijection $\cG({\mathbb{R}})/K\to \frak X\;;\;g\mapsto gKg^{-1}$. Via this bijection, we regard $\frak X$ as a real analytic manifold. This real analytic structure is independent of the choice of $K$.
This $\frak X$ is called the {\it symmetric space associated to $\cG$}.
\end{sbpara}
\begin{sbpara}\label{DtoX}
Consider the commutator subgroup $G'_{{{\rm red}}}=[G_{{{\rm red}}},G_{{{\rm red}}}]$
of $G_{{{\rm red}}}=G/G_u$. This is a semisimple algebraic group.
Let $\frak X$ be the symmetric space associated to $G'_{{{\rm red}},{\mathbb{R}}}$.
Let $h_0:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ be ${\mathbb{R}}$-polarizable as in \ref{pol}.
From $D_{{{\rm red}}}=D(G_{{{\rm red}}},h_0)$ (\ref{Dred}), we have a canonical map
$$D_{{{\rm red}}}\to \frak X$$
which sends $h\in D_{{{\rm red}}}\subset \Hom(S_{{\mathbb{C}}/{\mathbb{R}}}, G_{{{\rm red}},{\mathbb{R}}})$ to a maximal compact subgroup $K=\{g\in G'_{{{\rm red}}}({\mathbb{R}})\;|\; gh(i)=h(i)g\}$ of $G'_{{{\rm red}}}({\mathbb{R}})$ associated to the Weil operator $h(i)$.
\end{sbpara}
\begin{sbpara}\label{Gamma} Let $\Gamma$ be a subgroup of $G({\mathbb{Q}})$.
We call $\Gamma$ an {\it arithmetic subgroup} (resp.\ {\it semi-arithmetic subgroup}) of $G({\mathbb{Q}})$ if the following condition $(A)$ (resp.\ $(SA)$) is satisfied.
$(A)$ There are $n\geq 1$ and an injective homomorphism $\rho: G\to\operatorname{GL}(n)$ such that $\Gamma$ is a subgroup of $\{g \in G({\mathbb{Q}})\;|\; \rho(g)\in \operatorname{GL}(n,{\mathbb{Z}})\}$ of finite index.
$(SA)$ There are $n\geq 1$ and an injective homomorphism $\rho: G\to\operatorname{GL}(n)$ such that $\rho(\Gamma)\subset \operatorname{GL}(n,{\mathbb{Z}})$.
That is, there is a faithful representation $V \in {\operatorname{Rep}}(G)$ and a ${\mathbb{Z}}$-lattice $L$ in $V$ such that $L$ is stable under the action of $\Gamma$.
The terminology arithmetic subgroup is used by many people. We hope the terminology semi-arithmetic group is acceptable.
\end{sbpara}
The next two lemmas are straightforward.
\begin{sblem}\label{Gamma2}
$(1)$ The condition $(A)$ is equivalent to the following condition $('A)$.
$('A)$ For every $n\geq 1$ and every homomorphism $\rho: G\to \operatorname{GL}(n)$, $\rho(\Gamma) \cap \operatorname{GL}(n,{\mathbb{Z}})$ is of finite index in $\rho(\Gamma)$ and in $\rho(G({\mathbb{Q}})) \cap \operatorname{GL}(n,{\mathbb{Z}})$.
$(2)$ The condition $(SA)$ is equivalent to the following condition $('SA)$.
$('SA)$ For every $n\geq 1$ and every homomorphism $\rho: G\to \operatorname{GL}(n)$, $\rho(\Gamma) \cap \operatorname{GL}(n,{\mathbb{Z}})$ is of finite index in $\rho(\Gamma)$.
\end{sblem}
\begin{sblem}\label{redss2general}
Let $f: G_1\to G_2$ be a homomorphism of linear algebraic groups over ${\mathbb{Q}}$, let $\Gamma_1$ be a subgroup of $G_1({\mathbb{Q}})$ and let $\Gamma_2$ be
the image of $\Gamma_1$ in $G_2({\mathbb{Q}})$.
$(1)$ If $\Gamma_1$ is a semi-arithmetic subgroup of $G_1({\mathbb{Q}})$, $\Gamma_2$ is a semi-arithmetic subgroup of $G_2({\mathbb{Q}})$.
$(2)$ If $\Gamma_1$ is an arithmetic subgroup of $G_1({\mathbb{Q}})$ and if $f$ is surjective, $\Gamma_2$ is an arithmetic subgroup of $G_2({\mathbb{Q}})$.
\end{sblem}
\begin{sbrem}
If $\Gamma$ is a semi-arithmetic subgroup of $G({\mathbb{Q}})$, $\Gamma$ is discrete in $G({\mathbb{R}})$. (The converse is not valid: A subgroup of $G({\mathbb{Q}})$ which is discrete in $G({\mathbb{R}})$ need not be semi-arithmetic. For example, let $G={\rm{SL}}(2)$, and let $\Gamma$ be the subgroup of $G({\mathbb{Q}})$ consisting of diagonal matrices with diagonal entries $(2^n, 2^{-n})$ ($n\in {\mathbb{Z}}$). Then $\Gamma$ is discrete in $G({\mathbb{R}})={\rm{SL}}(2,{\mathbb{R}})$ but $\Gamma$ is not semi-arithmetic. Another example is $G={\mathbb{G}}_m}%{\mathbb{G}_m$ and $\Gamma=\{2^n\,|\,n \in {\mathbb{Z}}\}$.)
\end{sbrem}
\begin{sbprop}\label{actonD}
Let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ be as in $\ref{D}$.
Assume that $h_0$ is ${\mathbb{R}}$-polarizable ($\ref{pol}$).
Let $\Gamma$ be a semi-arithmetic subgroup of $G'({\mathbb{Q}})$ ($\ref{Gamma}$).
Then the following holds.
$(1)$ The action of $\Gamma$ on $D$ is proper and the quotient space $\Gamma \operatorname{\backslash} D$ is Hausdorff.
$(2)$ If $\Gamma$ is torsion-free, the action of $\Gamma$ on $D$ is free (that is, if $\gamma\in \Gamma$ and if $\gamma p=p$ for some $p\in D$, then $\gamma=1$), and
the projection $D\to \Gamma \operatorname{\backslash} D$ is a local homeomorphism.
\end{sbprop}
This Proposition \ref{actonD} follows from its stronger version Theorem \ref{BSgl}. (We will not use this \ref{actonD} before we prove \ref{BSgl}.)
\begin{sbrem}
\label{r:actonD}
Proposition \ref{actonD} for a semi-arithmetic subgroup of $G({\mathbb{Q}})$ need not be true as is shown in the following examples.
{\it Example} 1. Let $E$ be a number field (a finite extension of ${\mathbb{Q}}$), and let $G$ be the algebraic group $E^\times$ over ${\mathbb{Q}}$ (that is, $G(R)=(E\otimes_{\mathbb{Q}} R)^\times$ for any commutative ring $R$ over ${\mathbb{Q}}$). Then the unit group $O_E^\times$ of $O_E$ is an arithmetic subgroup of $G({\mathbb{Q}})$. Take any homomorphism $h_0 : S_{{\mathbb{C}}/{\mathbb{R}}} \to G_{\mathbb{R}}$ (for example, the trivial homomorphism). Then $h_0$ is ${\mathbb{R}}$-polarizable and $D$ consists of one point. The action of $\Gamma:=O_E^\times$ on the one-point set $D$ is proper if and only if $\Gamma$ is finite. But $O_E^\times$ need not be finite, e.g., for a real quadratic extension field $E$ over ${\mathbb{Q}}$.
{\it Example} 2. Let $E$ be a real quadratic field, and
let $G$ be the algebraic group
$$\left\{\left.
\begin{pmatrix}
a & b \\
0 & 1
\end{pmatrix}
\right|a \in E^\times,\, b \in E\right\}
$$ over ${\mathbb{Q}}$ (that is, $G(R)=
\left\{\left.
\left(
\begin{matrix}
a & b \\
0 & 1
\end{matrix}
\right)
\right|a \in (E\otimes_{\mathbb{Q}} R)^{\times},\, b \in E\otimes_{\mathbb{Q}} R\right\}$
for any commutative ring $R$ over ${\mathbb{Q}}$).
Then the group
$\Gamma:=\left\{\left.
\left(
\begin{matrix}
a & b \\
0 & 1
\end{matrix}
\right)
\right|a \in O_E^\times,\, b \in O_E\right\}$ is an arithmetic subgroup of $G({\mathbb{Q}})$.
Let $h_0 : S_{{\mathbb{C}}/{\mathbb{R}}} \to G_{{{\rm red}},{\mathbb{R}}}$ be the composite
$S_{{\mathbb{C}}/{\mathbb{R}}} \to {\mathbb{G}}_{m,{\mathbb{R}}} \to E^{\times}_{{\mathbb{R}}} = G_{{{\rm red}},{\mathbb{R}}}$,
where the first homomorphism is the norm inverse and the second is the natural inclusion, that is, the one such that the induced map $S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})={\mathbb{C}}^\times \to (E\otimes {\mathbb{R}})^{\times} = G_{{{\rm red}}}({\mathbb{R}})$
sends $z\in {\mathbb{C}}^\times$ to
$|z|^{-2}$.
Then $h_0$ is ${\mathbb{R}}$-polarizable (simply because $(G_{{{\rm red}}})'$ is trivial). Let $H\in D$ be the element corresponding to the composition $S_{{\mathbb{C}}/{\mathbb{R}}}\overset{h_0}\to E_{\mathbb{R}}^\times \subset G_{\mathbb{R}}$. By Theorem \ref{fiber}, or by \ref{DV} applied to $V=E^2$,
we have $D=G_u({\mathbb{C}})=E \otimes_{{\mathbb{Q}}}{\mathbb{C}}$, where $g\in G_u({\mathbb{C}})$ is identified with $gH\in D$.
Via this identification,
the action of $\Gamma$ on $D$ comes from the adjoint action of $G$ on $G_u$, and described as
$$\left(\begin{matrix}
a & b \\
0 & 1
\end{matrix}\right)\cdot
(x \otimes w)=(ax+b) \otimes w\qquad (a \in O_E^{\times},\, b \in O_E,\, x \in E,\, w \in {\mathbb{C}}).$$
The subspace $\Gamma \operatorname{\backslash} (E \otimes_{{\mathbb{Q}}} {\mathbb{R}})$ of the quotient $\Gamma \operatorname{\backslash} D$ is not Hausdorff because it is homeomorphic to
the quotient of the real torus $O_E \operatorname{\backslash} (E \otimes_{{\mathbb{Q}}} {\mathbb{R}})$ by the action of $O_E^{\times}$, and the last action has a dense orbit (\cite{R}).
Hence, $\Gamma \operatorname{\backslash} D$ is also not Hausdorff.
\end{sbrem}
\begin{sbprop}\label{A=A*}
Assume that the condition $(1)$ of Lemma $\ref{pol2}$ is satisfied. Then for a semi-arithmetic subgroup $\Gamma$ of $G({\mathbb{Q}})$, $\Gamma \cap G'({\mathbb{Q}})$ is of finite index in $\Gamma$.
\end{sbprop}
\begin{pf}
By $G_u\subset G'$ (\ref{ucom}), we have $G/G'\overset{\sim}\to G_{{{\rm red}}}/G'_{{{\rm red}}}$. Hence by replacing $\Gamma$ by the image of $\Gamma$ in $G_{{{\rm red}}}({\mathbb{Q}})$, we are reduced to the case $G$ is reductive.
Assume that $G$ is reductive. Let $\Gamma_0=\Gamma \cap Z(G)({\mathbb{Q}})$ and $\Gamma_1=\Gamma \cap G'({\mathbb{Q}})$. Since $Z(G) \times G'\to G$ is an isogeny, the image of $\Gamma_0\times \Gamma_1 \to \Gamma$ is of finite index. Hence it is sufficient to prove that $\Gamma_0$ is finite. We prove this.
The image of $\Gamma$ under $t: G({\mathbb{Q}})\to {\bf G}_m({\mathbb{Q}})={\mathbb{Q}}^\times$ is contained in $\{\pm 1\}$.
Hence in the faithful representation $V$ of $G$ in (1.2) in Lemma \ref{pol2}, for $H\in D(G, h_0)$, the action of some subgroup of $\Gamma_0$ of finite index preserves the Hodge filtration and the polarization of $H(\gr^W_wV)$ and hence preserves the Hodge metric for every $w$. The elements of $G({\mathbb{R}})$ which preserve these Hodge metrics for all $w$ form a compact subgroup and $\Gamma_0$ is discrete, and hence $\Gamma_0$ is finite.
\end{pf}
\subsection{Relations with usual period domains and Mumford--Tate domains}\label{ss:Dold}
In this section, in \ref{Dusual}--\ref{clEx}, we explain that the classical Griffiths domains \cite{Gr} and their mixed Hodge generalization in \cite{U} are
essentially regarded as
special cases of the period domains in this paper.
In this case, our partial compactifications essentially coincide with those in \cite{KNU2} Part III. Next in \ref{relMT}, we explain that the Mumford--Tate domains studied in \cite{GGK} are regarded as important cases of our period domains for reductive $G$. For Mumford--Tate domains, our toroidal partial compactifications essentially coincide with those in \cite{KP}.
\begin{sbpara}\label{Dusual}
Let $\Lambda=(H_{0, {\mathbb{Q}}}, W, (\langle \cdot,\cdot\rangle_w)_w, (h^{p,q})_{p,q})$ be as in \cite{KNU2} Part III 2.1.1. That is, $H_{0,{\mathbb{Q}}}$ is a finite-dimensional ${\mathbb{Q}}$-vector space, $W$ is a finite increasing filtration on $H_{0, {\mathbb{Q}}}$, $\langle\cdot,\cdot\rangle_w$ for each $w\in {\mathbb{Z}}$ is a non-degenerate ${\mathbb{Q}}$-bilinear form $\gr^W_w\times \gr^W_w\to {\mathbb{Q}}$ which is symmetric if $w$ is even and anti-symmetric if $w$ is odd, $h^{p,q}$ are non-negative integers given for each $(p,q)\in {\mathbb{Z}}^2$ such that $\sum_{p,q} h^{p,q}=\dim_{\mathbb{Q}} H_{0,{\mathbb{Q}}}$, $\sum_{p+q=w} h^{p,q}= \dim_{\mathbb{Q}} \gr^W_w$ for every $w\in {\mathbb{Z}}$, and $h^{p,q}=h^{q,p}$ for all $(p,q)$.
Let $G$ be the subgroup of ${\rm {Aut}}(H_{0,{\mathbb{Q}}}, W)\times {\bf G}_m$ consisting of all elements $(g,t)$ such that
$\langle gx,gy\rangle_w=t^w\langle x,y\rangle_w$ for all $w$ and for all $x,y\in \gr^W_wH_{0,{\mathbb{Q}}}$.
Let $D(\Lambda)$ be the period domain of \cite{U}.
As a set, it is the set of all decreasing filtrations $F$ on $H_{0,{\mathbb{C}}}={\mathbb{C}}\otimes_{\mathbb{Q}} H_{0,{\mathbb{Q}}}$ such that $\dim_{\mathbb{C}}(\gr^p_F(\gr^W_wH_{0,{\mathbb{C}}}))=h^{p,w-p}$ for all $w,p\in {\mathbb{Z}}$ and such that $(\gr^W_w, F(\gr^W_w), \langle\cdot,\cdot\rangle_w)$ is a polarized Hodge structure for any $w\in {\mathbb{Z}}$.
Let $D^{\pm}({\Lambda})$ be the set of all decreasing filtrations on $H_{0,{\mathbb{C}}}$ such that $\dim_{\mathbb{C}}(\gr^p_F(\gr^W_w))=h^{p,w-p}$ for all $w,p\in {\mathbb{Z}}$ and such that either $(\gr^W_w, F(\gr^W_w), \langle\cdot,\cdot\rangle_w)$ is a polarized Hodge structure for any $w\in {\mathbb{Z}}$ or $(\gr^W_w, F(\gr^W_w), (-1)^w\langle\cdot,\cdot\rangle_w)$ is a polarized Hodge structure for any $w\in {\mathbb{Z}}$. Then $D^{\pm}({\Lambda})=D({\Lambda})$ if and only if $\gr^W_wH_0=0$ for all odd $w$. If $\gr^W_w\neq 0$ for some odd $w$, there is a $(g,t)\in G({\mathbb{Q}})$ such that $t<0$ and that $D^{\pm}({\Lambda})= D({\Lambda}) \coprod gD({\Lambda})$.
\end{sbpara}
\begin{sbpara}
Assume that $D({\Lambda})$ is not empty and fix an ${{\bold r}}\in D(\Lambda)$.
Then the Hodge decomposition of ${{\bold r}}(\gr^W)$ induces a homomorphism
$h_0: S_{{\mathbb{C}}/{\mathbb{R}}} \to G_{{{\rm red}},{\mathbb{R}}}$. We have
$\langle h_0(z)x, h_0(z)y\rangle_w= |z|^{2w}\langle x, y\rangle_w$ for $z\in {\mathbb{C}}^\times=S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})$ and $x,y\in\gr^W_w$. The condition (1) of Lemma \ref{pol2} is satisfied.
\end{sbpara}
\begin{sbprop} We have an isomorphism $$D\overset{\sim}\to D^{\pm}({\Lambda})\;;\;H\mapsto H(H_{0,{\mathbb{Q}}}),$$ where $D=D(G,h_0)$ is the period domain of the present paper.
\end{sbprop}
\begin{pf}
This is seen by Lemma \ref{DV}.
\end{pf}
\begin{sbpara}
In the above situation, the extended period domains $D_{{\rm {BS}}}$, $D_{{\rm{SL}}(2)}$, and $\Gamma \operatorname{\backslash} D_{\Sigma}$ in this paper generalize those in \cite{KNU2} Part I--Part IV.
\end{sbpara}
\begin{sbpara}\label{clEx}
(Classical) {\it Example}. Take ${\Lambda}$ in \ref{Dusual} as follows. $H_{0,{\mathbb{Q}}}={\mathbb{Q}}^2={\mathbb{Q}} e_1+{\mathbb{Q}} e_2$, $W_1=H_{0,{\mathbb{Q}}}$, $W_0=0$, $\langle \;,\;\rangle_1$ is the anti-symmetric form characterized by $\langle e_2, e_1\rangle_1=1$, $h^{1,0}=h^{0,1}=1$, and other $h^{p,q}$ are $0$.
Identify $\operatorname{GL}(2)$ with the subgroup $G$ in \ref{Dusual} by $g\mapsto(g,\det g)$.
Let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ be the homomorphism whose homomorphism of ${\mathbb{R}}$-valued points is ${\mathbb{C}}^\times \to \operatorname{GL}(2,{\mathbb{R}})\;;\;z\mapsto \langle z\rangle$, where
$$\langle z\rangle= \begin{pmatrix} a & -b\\ b & a\end{pmatrix} \quad \text{for} \; z=a+bi \; (a, b\in {\mathbb{R}}, (a,b) \neq (0,0)).$$
Then we have unique isomorphisms $$%
\frak H^{\pm} \simeq D:=D(G,h_0), \quad {\mathbb{P}}^1({\mathbb{C}}) \simeq \Dc,$$
which send $i\in \frak H\subset \frak H^{\pm}$ to $h_0$ such that the former is %
$\operatorname{GL}(2,{\mathbb{R}})$-equivariant and the latter is %
$\operatorname{GL}(2,{\mathbb{C}})$-equivariant.
Here $%
\frak H^{\pm}$ denotes %
the disjoint union of the upper half plain and the lower half plain, which are interchanged by
$\begin{pmatrix}0&1\\1&0\end{pmatrix}$.
In fact, consider the natural action of $G=\operatorname{GL}(2)$ on $V={\mathbb{Q}}^2$.
The eigenvalues of %
$h_0(z)$ are $z$, $\bar z$, and the eigenspace decomposition is $V_{\mathbb{C}}={\mathbb{C}}\begin{pmatrix}i\\1\end{pmatrix}\oplus{\mathbb{C}}\begin{pmatrix}-i\\1\end{pmatrix}$, which yields the Hodge decomposition corresponding to $i\in\frak H$.
\end{sbpara}
\begin{sbpara}\label{relMT} Let $H$ be a polarized ${\mathbb{Q}}$-Hodge structure.
Let $\cC$ be the Tannakian category of ${\mathbb{Q}}$-Hodge structures generated by $H$ and ${\mathbb{Q}}(1)$. Let $M$ be the Tannakian group of $\cC$. This means that $\cC$ is identified with the Tannakian category ${\operatorname{Rep}}(M)$. This $M$ is reductive. Let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to M_{\mathbb{R}}$ be the associated homomorphism. Then our period domain $D(M, h_0)$ coincides with the Mumford--Tate domain in \cite{GGK} associated to $H$.
Take ${\Lambda}=(H_{0,{\mathbb{Q}}}, W, (\langle\cdot,\cdot\rangle_w)_w, (h^{p,q})_{p,q})$ in \ref{Dusual} as follows. $H_{0,{\mathbb{Q}}}$ is the ${\mathbb{Q}}$-structure $H_{\mathbb{Q}}$ of $H$.
$W$ is the weight filtration on $H_{\mathbb{Q}}$ (that is, if $w_0$ denotes the weight of $H_{\mathbb{Q}}$, $W_w=H_{\mathbb{Q}}$ if $w\geq w_0$ and $W_w=0$ if $w<w_0$). $\langle \cdot,\cdot \rangle_{w_0}$ is the polarization of $H$ (times $(2\pi i)^{w_0}$). $h^{p,q}$ is the dimension of the $(p,q)$-Hodge component of $H$. Let $L$ be the algebraic group $G$ in \ref{Dusual}. Then $M$ is identified with the smallest algebraic closed subgroup $M$ of $L$ defined over ${\mathbb{Q}}$ such that $M_{\mathbb{R}}$ contains the image of the homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}}\to L_{\mathbb{R}}$ associated to $H$. The Mumford--Tate domain $D(M, h_0)$ is identified with the $M({\mathbb{R}})$-orbit in $D({\Lambda})$ containing the class of $H$.
This $h_0$ satisfies the condition (1) in Lemma \ref{pol2}.
The period domain $D(M/Z, \bar h_0)$, where $Z$ is the center of $M$ and $\bar h_0$ denotes the composition $S_{{\mathbb{C}}/{\mathbb{R}}}\overset{h_0}\to M_{\mathbb{R}}\to (M/Z)_{\mathbb{R}}$, for the semisimple algebraic group $M/Z$ is also considered as a Mumford--Tate domain, for example, as in \cite{KP}. The period domain $D(M, h_0)$ is identified with an open and closed subspace of the period domain $D(M/Z, \bar h_0)$ (Proposition \ref{redss3}).
\end{sbpara}
\section{The space of Borel--Serre orbits}\label{s:DBS}
We define and study the space $D_{{\rm {BS}}}\supset D$ of Borel--Serre orbits. This is the $G$-MHS version of the space $D({\Lambda})_{{\rm {BS}}}\supset D({\Lambda})$ for the classical period domain $D({\Lambda})$ (\ref{ss:Dold}) defined and studied in \cite{KU1} (in the pure case) \cite{KNU2} Part I (in the mixed case).
For an algebraic group $G$, $G^{\circ}$ denotes the connected component of $G$ as an algebraic group which contains $1\in G$.
A parabolic subgroup $P$ of $G$ is a closed algebraic subgroup $P\subset G^{\circ}$ such that $G/P$ is a projective variety (see e.g.\ \cite{B2} IV (11.2)).
The organization of this Section 2 is as follows.
After preliminaries in Sections \ref{ss:cL} and \ref{ss:BSli} and a review of Borel--Serre space $\frak X_{{\rm {BS}}}$ in Section \ref{ss:BS1}, we define our space $D_{{\rm {BS}}}$ as a set in Section \ref{ss:DBS}, which we endow with a real analytic structure (precisely speaking, a structure of a real analytic manifold with corners) in Section \ref{ss:BSan}. In Section \ref{ss:BSproperty}, we prove the nice properties
of $D_{{\rm {BS}}}$ (e.g.\ Hausdorffness of the quotient by a semi-arithmetic subgroup of $G'({\mathbb{Q}})$).
\subsection{Real analytic manifolds with corners}\label{ss:cL}
As will be explained in Section \ref{ss:BSan}, our space $D_{{\rm {BS}}}$ is a real analytic manifold with corners.
In this Section \ref{ss:cL}, we review this notion real analytic manifold with corners (\cite{BS} Appendix by A.\ Douady and L.\ Herault) and consider spherical compactifications as examples
of real analytic manifolds with corners.
\begin{sbpara}
Let $m,n\geq 0$ and consider the topological space $S={\mathbb{R}}^m \times {\mathbb{R}}^n_{\geq 0}$ which is endowed with the inverse image $\cO_S$ of the sheaf of (${\mathbb{R}}$-valued) real analytic functions on ${\mathbb{R}}^{m+n}$. That is, $\cO_S$ is the sheaf of functions which are locally extendable to real analytic functions on an open subset of ${\mathbb{R}}^m \times {\mathbb{R}}^n$.
A {\it real analytic manifold with corners} is a locally ringed space over ${\mathbb{R}}$ which has an open covering whose each member is isomorphic to an open set of the above $S={\mathbb{R}}^m \times {\mathbb{R}}^n_{\geq 0}$ with the restriction of $\cO_S$ for some $m,n\geq 0$.
\end{sbpara}
\begin{sbpara}\label{cgv}
Consider
a finite-dimensional graded real vector space $V=\bigoplus_{w\le-1}V_w$. In the rest of this Section \ref{ss:cL},
we review the compactification $\overline V$ of $V$ defined as a real analytic manifold with corners in \cite{KNU2} Part I Section 7. We call it the {\it spherical compactification} of $V$ because as a topological space, it coincides with the spherical compactification of $V$ in \cite{BeS} Definition 2.1. We will use this $\overline V$ in Section \ref{ss:DBS}.
As in \cite{KU2} and \cite{KNU2}, the property compact includes Hausdorff in our terminology.
\end{sbpara}
\begin{sbpara}\label{cgv1}
Consider the action of the multiplicative group ${\mathbb{R}}_{>0}$ on $V$ given by $t\circ (\sum_w v_w):=\sum_w t^wv_w$ ($t\in {\mathbb{R}}_{>0}$, $v_w\in V_w$).
Let $$\overline V:=V\times^{{\mathbb{R}}_{>0}} {\mathbb{R}}_{\geq 0} \smallsetminus \{(0,0)\},$$ which we endow with the natural topology.
Recall that for a group $H$, for a set $X$ on which $H$ acts from the right, and for a set $Y$ on which $H$ acts from the left, $X\times^H Y$ denotes the quotient of $X\times Y$ by the equivalence relation $(xh,y)\sim (x, hy)$ ($x\in X$, $y\in Y$, $h\in H$). When we use the notation $X\times^H Y$ in this paper, $H$ is a commutative group (as above) and hence right or left in the action doesn't matter.
Embed $V$ into $\overline V$ by $v\mapsto \text{class}(v,1)$ ($v\in V$).
We have $\overline{V}\smallsetminus V=\{\text{class}(v,0)\;|\;v\in V \smallsetminus \{0\}\}$, and for $v\in V\smallsetminus \{0\}$, when $t\in {\mathbb{R}}_{>0}$ converges to $0$, $t\circ v=\text{class}(tv,1)=\text{class}(v,t)$ converges to $\text{class}(v,0)$. This space $\overline{V}$ is covered by the two open sets, $V$ and the complement $\overline{V}\smallsetminus \{0\}$ of $0\in V\subset\overline{V}$.
\end{sbpara}
\begin{sbpara}\label{cgv2}
We regard $\overline V$ as a real analytic manifold with corners as follows.
There is a real analytic map $f: V\smallsetminus \{0\} \to {\mathbb{R}}_{>0}$ such that
\smallskip
(1) $f(t\circ v)= tf(v)$ for any $t\in {\mathbb{R}}_{>0}$ and $v\in V\smallsetminus \{0\}$.
\smallskip
For example,
taking a base $(e_{w,j})_j$ of $V_w$ for each $w$ and taking an integer $m<0$ satisfying $m/w\in 2{\mathbb{Z}}$ for any $w$ such that $V_w\neq 0$, let $f(\sum_{w,j} x_{w,j}e_{w,j}):= (\sum_{w,j} x_{w,j}^{m/w})^{1/m}$.
Then, this $f$ satisfies the condition (1).
Let $f: V\smallsetminus \{0\}\to {\mathbb{R}}_{>0}$ be a real analytic map satisfying (1). Let $V^{(1)}=f^{-1}(1)$. Then $V^{(1)}\times {\mathbb{R}}_{>0}\overset{\sim}\to V\smallsetminus \{0\}\;;\;(v, t)\mapsto t\circ v$.
The inverse map is $v\mapsto(f(v)^{-1}\circ v,f(v))$.
We have a canonical homeomorphism $V^{(1)}\times {\mathbb{R}}_{\geq 0} \to \overline V \smallsetminus \{0\}$. We endow $\overline V \smallsetminus \{0\}$ with the structure of a real analytic manifold with corners via this homeomorphism. This structure is independent of the choice of $f$. This is because if $f': V\smallsetminus \{0\}\to {\mathbb{R}}_{>0}$ is also a real analytic map satisfying (1) and if $V^{(1)'}:=(f')^{-1}(1)$, the isomorphism $V^{(1)}\times {\mathbb{R}}_{\geq 0} \overset{\sim}\to V^{(1)'}\times {\mathbb{R}}_{\geq 0}\;;\;(v, t) \mapsto (f'(v)^{-1}\circ v, tf'(v))$ of real analytic manifolds with corners is compatible with the homeomorphisms to $\bar V \smallsetminus \{0\}$.
Furthermore, the restriction of this structure to $V\smallsetminus \{0\}$ coincides with the natural structure of it as a real analytic manifold. Hence there is a unique structure on $\overline V$ of a real analytic manifold with corners whose restriction to $\overline V \smallsetminus \{0\}$ is the structure which we just defined and whose restriction to $V$ is the natural structure of $V$ as a real analytic manifold.
\end{sbpara}
\begin{sbpara}\label{cgv4}
The map $V^{(1)}\times {\mathbb{R}}_{\geq 0} \to \overline V\smallsetminus \{0\}$ in \ref{cgv2} extends to a surjective continuous map $V^{(1)}\times[0,\infty]\to\overline V$ which sends all points $(v,\infty)$ ($v\in V^{(1)}$) to $0\in\overline V$. Via this map, $\overline V$ is homeomorphic to the quotient of the compact space $V^{(1)}\times [0, \infty]$ obtained by identifying all $(v, \infty)$ ($v \in V^{(1)}$). Hence $\overline V$ is compact.
\end{sbpara}
\subsection{Borel--Serre liftings}\label{ss:BSli}
\begin{sbpara} {\it Borel--Serre lifting.}\label{BSli}
Let $\cG$ be a semisimple algebraic group over ${\mathbb{R}}$. Let ${\Cal {P}}$ be a parabolic subgroup of $\cG$, and let
$\cS_{{\Cal {P}}}$ be the largest ${\mathbb{R}}$-split torus in ${\Cal {P}}_{{{\rm red}}}={\Cal {P}}/{\Cal {P}}_u$, where ${\Cal {P}}_u$ is the unipotent radical of ${\Cal {P}}$. Let
$K$ be a maximal compact subgroup of $\cG({\mathbb{R}})$.
Then we have a unique homomorphism $\cS_{{\Cal {P}}}\to {\Cal {P}}\;;\; a\mapsto a_K$ which lifts the inclusion map $\cS_{{\Cal {P}}}\hookrightarrow {\Cal {P}}_{{{\rm red}}}$ and which satisfies $\theta_K(a_K)=a_K^{-1}$ for any $a\in \cS_{{\Cal {P}}}({\mathbb{R}})$, where $\theta_K$ is the Cartan involution of $\cG({\mathbb{R}})$ associated to $K$ (\cite{BS} Proposition 1.6).
We call this $a_{K}$ the {\it Borel--Serre lifting of $a\in \cS_{{\Cal {P}}}$ at $K$}.
\end{sbpara}
\begin{sbrem}\label{orth} We remark that the Borel--Serre lifting is understood as the splitting of a filtration by taking the orthogonal complements.
By \cite{Mo} (see also \cite{BH} Section 1), there is a finite-dimensional faithful representation $V$ of $\cG$ and a positive definite symmetric ${\mathbb{R}}$-bilinear form $(\cdot, \cdot): V\times V\to {\mathbb{R}}$ which is fixed by $K$ such that $\cG$ is stable under the transpose $g\mapsto {}^tg$ for $(\cdot,\cdot)$. Furthermore, there are ${\mathbb{R}}$-subspaces of $V$ such that $0=V_0\subset V_1 \subset \dots \subset V_m=V$ which are stable under ${\Cal {P}}$ satisfying $(g-1)V_j\subset V_{j-1}$ for all $g\in {\Cal {P}}_u$ and $1\leq j\leq m$. For example, we can take $V_j= \{v\in V\;|\; (g_1-1)\cdots (g_j-1)
v=0\;\text{for all}\;g_1,\dots, g_j\in {\Cal {P}}_u\; \}$ (then $V_j$ are ${\Cal {P}}$-stable and $V_m=V$ for some $m$).
We have a commutative diagram
$$\begin{matrix} \cS_{{\Cal {P}}}({\mathbb{R}}) & \subset & {\Cal {P}}_{{{\rm red}}}& \to & \prod_{j=1}^m \text{Aut}_{\mathbb{R}}(V_j/V_{j-1})\\
\downarrow &&&& \downarrow\\
{\Cal {P}}({\mathbb{R}}) &&\overset{\subset}\longrightarrow && \text{Aut}_{\mathbb{R}}(V),\end{matrix}$$
where the left vertical arrow is the Borel--Serre lifting at $K$ and the right vertical arrow is given by the orthogonal decomposition of the filtration $(V_j)_j$. That is, we have a unique decomposition $V=\bigoplus_{j=1}^m V_{[j]}$ such that $V_j=\bigoplus_{k\leq j} V_{[k]}$ for all $j$ and such that $V_{[j]}$ and $V_{[k]}$ are orthogonal for $(\cdot,\cdot)$ if $j\neq k$. The right vertical arrow is given by $V_j/V_{j-1}\simeq V_{[j]}$.
We prove that the above diagram is commutative, that is, $a_K$ for $a\in \cS_{{\Cal {P}}}({\mathbb{R}})$ preserves $V_{[j]}$. Note that the Cartan involution of $\cG({\mathbb{R}})$ associated to $K$ is given by $\theta_K(g)=({}^tg)^{-1}$ for $g\in \cG({\mathbb{R}})$. Hence ${}^t(a_K)=\theta_K(a_K)^{-1}=a_K$. Since $V_{[j]}= (\bigoplus_{k \geq j} V_{[k]})\cap V_j$ and $a_K$ preserves $V_j$, it is sufficient to prove that $a_K$ preserves $\bigoplus_{k\geq j} V_{[k]}$. Note that $\bigoplus_{k\geq j} V_{[k]}$ is the
%
annihilator of $V_{j-1}$ for $(\cdot,\cdot)$. For $x\in \bigoplus_{k\geq j} V_{[k]}$ and $y\in V_{j-1}$, we have $(a_Kx, y)= (x, {}^t(a_K)y)= (x, a_Ky) =0$.
Hence $a_Kx\in \bigoplus_{k\geq j} V_{[k]}$.
\end{sbrem}
\subsection{Review of Borel--Serre theory}\label{ss:BS1}
Let $G$ be a semisimple algebraic group over ${\mathbb{Q}}$.
Let $\frak X$ be the associated symmetric space as in \ref{X}.
In this Section \ref{ss:BS1}, we review how the Borel--Serre space $\frak X_{{\rm {BS}}}\supset \frak X$ is constructed in the paper of Borel--Serre \cite{BS}.
\begin{sbpara} \label{Xrt}
Let $P$ be a parabolic subgroup of $G$. Let $S_P$ be the largest ${\mathbb{Q}}$-split torus in the center of $P_{{{\rm red}}}:=P/P_u$.
Let $X(S_P)$ be the character group of $S_P$. Let $X(S_P)^+$ be the submonoid of $X(S_P)$ generated by roots. Here a {\it root} means an element $\chi\in X(S_P)$ such that for some (equivalently, for any) lifting $s: S_P\to P$ of the embedding $S_P\hookrightarrow P_{{{\rm red}}}$, there is a non-zero element $v$ of ${\rm {Lie}}\,(P_u)$ such that ${\rm{Ad}}(s(t))v= \chi(t)^{-1}v$ for $t\in S_P$. Then $X(S_P)^+$ is a free
monoid, that is, $X(S_P)^+\simeq {\mathbb{N}}^n$ for some $n\geq 0$. The basis $\Delta(P)$ of the monoid $X(S_P)^+$ is called the set of {\it fundamental roots} (or, of {\it simple roots}).
Let $$A_P:=\Hom(X(S_P)^+, {\mathbb{R}}^{\mult}_{>0})={\mathbb{R}}_{>0}^{\Delta(P)}\subset \bar A_P:=\Hom(X(S_P)^+, {\mathbb{R}}^{\mult}_{\geq 0})= {\mathbb{R}}_{\geq 0}^{\Delta(P)}.$$
Since $X(S_P)^+$ generates a subgroup of $X(S_P)$ of finite index, the identification $S_P({\mathbb{R}})=\Hom(X(S_P), {\mathbb{R}}^\times)$ induces an isomorphism $S_P({\mathbb{R}})^{\circ}\overset{\sim}\to A_P$, where $S_P({\mathbb{R}})^{\circ}$ denotes the connected component of the topological group $S_P({\mathbb{R}})$ containing $1$.
\end{sbpara}
\begin{sbpara} {\it Borel--Serre action} ({\it geodesic action}, in the terminology of \cite{BS} 3.3). Let $P$ be as in \ref{Xrt}. We have the action $\circ$ of the group $A_P$ on $\frak X$, which we call the Borel--Serre action, defined as follows.
For $K\in \frak X$ and $a\in A_P$, let $a_K\in P({\mathbb{R}})$ be the Borel--Serre lifting of $a$ at $K$ obtained by applying \ref{BSli} to
$\cG=G_{\mathbb{R}}$, ${\Cal {P}}=P_{\mathbb{R}}$ and $\cS_{{\Cal {P}}}\supset S_{P,{\mathbb{R}}}$.
Define $$a\circ K= a_K K a_K^{-1}.$$
\end{sbpara}
\begin{sbpara}\label{XBSs}
As a set, the Borel--Serre space $\frak X_{{\rm {BS}}}$ is defined by
$\frak X_{{\rm {BS}}}:= \{(P, Z)\}$,
where $P$ runs over parabolic subgroups of $G$ and $Z$ is an $A_P$-orbit for the Borel--Serre action.
\end{sbpara}
\begin{sbpara}\label{XBSp}
For a parabolic subgroup $P$ of $G$, let
$$
\frak X_{{\rm {BS}}}(P):=\{(Q,Z)\in\frak X_{{\rm {BS}}}\,|\,Q\supset P \}.
$$
Then we have a bijection
$$
\frak X_{{\rm {BS}}}(P)\simeq\frak X\times^{A_P} \bar A_P,\quad (Q,Z)\leftrightarrow(K,a),
$$
defined as follows.
Let $Q$ be a parabolic subgroup of $G$ such that $Q\supset P$.
Then, $\Delta(Q)$ is regarded as a subset of $\Delta(P)$, $A_Q$ is regarded as a subgroup of $A_P$, and $Q\mapsto \Delta(Q)$ is a bijection from the set of all parabolic subgroups of $G$ such that $Q\supset P$ to the set of all subsets of $\Delta(P)$.
For $(Q,Z)\in\frak X_{{\rm {BS}}}(P)$, $K$ is any element of $Z$ and $a\in\bar A_P$ is defined by $a(\chi)=0$ if $\chi\in\Delta(Q)$ and $a(\chi)=1$ if $\chi\notin\Delta(Q)$.
For $(K,a)\in\frak X \times \bar A_P$, $Q$ is the parabolic subgroup of $G$ containing $P$ such that $\Delta(Q)=\{\chi\in\Delta(P)\,|\,a(\chi)=0\}$ and $Z:=\{a'\circ K\,|\,a'\in A_P, \chi(a')=a(\chi)\;\text{for any}\;\chi\in\Delta(P)-\Delta(Q)\}$.
Note that, when $Q\supset P$, at a common $K$, the Borel--Serre action of $A_Q$ for $Q$ coincides with its action for $P$ regarding $A_Q$ as a subgroup of $A_P$.
\end{sbpara}
\begin{sbpara}\label{XBSr}
The set $\frak X_{{\rm {BS}}}$ has a structure of a real analytic manifold with corners defined as follows.
\medskip
For a parabolic subgroup $P$ of $G$, there exists a real analytic map $f: \frak X\to A_P$ satisfying
\medskip
(1) $f(a\circ K)=af(K)$ for all $a\in A_P$ and all $K\in\frak X$.
\medskip
We sketch the proof of this assertion.
Let ${}^\circ P:=\bigcap_\chi\Ker(\chi^2:P\to{\mathbb G}_m)$, where $\chi$ runs over all homomorphisms $P\to{\mathbb{R}}^\times$ of algebraic groups over ${\mathbb{Q}}$.
Then, $P_u{\subset}\,{}^\circ P$ and the composition $A_P\to P({\mathbb{R}})/P_u({\mathbb{R}})\to P({\mathbb{R}})/{}^\circ P({\mathbb{R}})$ is an isomorphism by \cite{BS} 1.2, which we use by taking $P_{{{\rm red}}}$ as $G$ there.
Let $\pi:P({\mathbb{R}})\to P({\mathbb{R}})/{}^\circ P({\mathbb{R}})\simeq A_P$.
Fix $K\in\frak X$.
Since $G({\mathbb{R}})=P({\mathbb{R}})K$ (see \cite{B1} \S11) and since $\pi$ kills the compact subgroup $P({\mathbb{R}})\cap K$, there exists a unique map $G({\mathbb{R}})\to A_P$ sending $pk$ to $\pi(p)$ $(p\in P({\mathbb{R}}), k\in K)$, which factors through $f:\frak X\simeq G({\mathbb{R}})/K\to A_P$.
Since the action of $a\in A_P$ on $G({\mathbb{R}})$ is $a\circ pk=pa_Kk$, $f$ satisfies the property $f(a\circ K)=af(K)$.
\medskip
The set $\frak X_{{\rm {BS}}}(P)$ is regarded as a real analytic manifold with corners as follows.
Let $\frak X^{(1)}:=f^{-1}(1)$.
Then we have
\medskip
(2) $\frak X^{(1)}\times A_P \overset{\sim}\to \frak X\;;\; (K, a) \mapsto a \circ K$, an isomorphism of real analytic manifolds,
\medskip
(3) $\frak X^{(1)}\times \bar A_P \to \frak X\times^{A_P} \bar A_P = \frak X_{{\rm {BS}}}(P)$, a bijection of sets.
\medskip
We regard $\frak X_{{\rm {BS}}}(P)$ as a real analytic manifold with corners via the bijection (3). This structure of $\frak X_{{\rm {BS}}}(P)$ does not depend on the choice of $f$ because if $f': \frak X\to A_P$ satisfies the same condition as $f$ and if $Y:= \frak X^{(1)}=f^{-1}(1)$ and $Y':= (f')^{-1}(1)$, the map (3) and the map $Y'\times \bar A_P\to \frak X_{{\rm {BS}}}(P)$ are compatible with the isomorphism $Y\times \bar A_P\overset{\sim}\to Y'\times \bar A_P\;;\; (K, a)\mapsto (f'(K)^{-1}\circ K, f'(K)a)$ whose inverse is $(K, a)\mapsto (f(K)^{-1}K, f(K)a)$.
$\frak X_{{\rm {BS}}}$ has a unique structure of a real analytic manifold with corners such that for any parabolic subgroup $P$ of $G$, $\frak X_{{\rm {BS}}}(P)$ is open in $\frak X_{{\rm {BS}}}$ and the structure of $\frak X_{{\rm {BS}}}(P)$ as a real analytic manifold with corners defined above coincides with the restriction of that of $\frak X_{{\rm {BS}}}$.
This follows from the following (4) and (5).
\medskip
(4) Let $Q$ be a parabolic subgroup of $G$ such that $Q\supset P$. Then $\frak X_{{\rm {BS}}}(Q)$ is an open subset of $\frak X_{{\rm {BS}}}(P)$ and the structure of $\frak X_{{\rm {BS}}}(Q)$ as a real analytic manifold with corners coincide with the restriction of that of $\frak X_{{\rm {BS}}}(P)$.
\medskip
(4) is shown as follows. Let $f: \frak X\to A_P$ be a real analytic map satisfying (1) and let $Y=f^{-1}(1)$. Let $p$ be the projection $A_P\to A_Q$. Then $f':= h \circ f: \frak X\to A_Q$ satisfies the condition on $f$ with $Q$ replacing $P$. Let $Y'=(f')^{-1}(1)$. Let $T$ be the kernel of $p$. Then the map (3) and the map $Y' \times \bar A_Q\to \frak X_{{\rm {BS}}}(Q)$ are compatible with the open immersion $Y' \times \bar A_Q \simeq Y \times T \times A_Q \overset{\subset}\to Y\times \bar A_P$, where the first isomorphism is induced by $Y\times T\overset{\sim}\to Y'\;;\; (K, a) \mapsto a \circ K$ and the second map is induced by $T\times \bar A_Q\to \bar A_P\;;\;(t, a) \mapsto ta$.
(5) For parabolic subgroups $P$ and $Q$ of $G$, $\frak X_{{\rm {BS}}}(P)\cap \frak X_{{\rm {BS}}}(Q)=\frak X_{{\rm {BS}}}(P*Q)$.
Here $P*Q$ is the algebraic subgroup of $G$ generated by $P$ and $Q$, which is a parabolic subgroup of $G$.
\end{sbpara}
\begin{sbpara}\label{proper} We will often use the following basic things about proper actions. Let $H$ be a Hausdorff topological group.
(1) If $H$ acts properly on a topological space $X$, the quotient space $H\operatorname{\backslash} X$ is Hausdorff.
(2) If $H$ is discrete and if $H$ acts properly on a Hausdorff space $X$, and if this action is free (that is, $hx=x$ with $h\in H$ and $x\in X$ implies $h=1$), the projection $X \to H\operatorname{\backslash} X$ is a local homeomorphism.
(3) Assume that $H$ acts on topological spaces $X$ and $Y$, and let $f:X\to Y$ be an equivariant continuous map.
(3.1) If $H$ acts properly on $Y$ and if $X$ is Hausdorff, then $H$ acts properly on $X$.
(3.2) If $H$ acts on $X$ properly and if the map $f$ is proper and surjective, then $H$ acts properly on $Y$.
Here in (3.2) and throughout this paper, as in \cite{KU2} and \cite{KNU2}, for a continuous map $f: X\to Y$ of topological spaces, $f$ is proper means that it satisfies the following (a) and (b). (a) For any topological space $Z$, the induced map $X\times_Y Z \to Z$ is a closed map. (b) The map $X \to X\times_Y X$ is a closed map.
(4) Let $H_1$ be a closed normal subgroup of $H$ and let $H_2:= H/H_1$. Assume that $H$ (resp.\ $H_2$) acts on a topological space $X_1$ (resp.\ $X_2$) continuously. Assume that for $j=1,2$, the action of $H_j$ on $X_j$ is proper and free. Assume that there are a neighborhood $U$ of $1$ in $H_2$ and a continuous map $U\to H$ which lifts the inclusion map $U\to H_2$. Then the diagonal action of $H$ on $X_1\times X_2$ is proper and free.
(5) Let $H_1$ be a closed subgroup of $H$ of finite index. Assume that $H$ acts on a topological space $X$ continuously. If the action of $H_1$ on $X$ is proper, then the action of $H$ on $X$ is proper.
\medskip
For proofs of (1), (2), (3), see \cite{Bou} Ch.3 \S4 no.2 Proposition 3, ibid.\ Ch.3 \S4 no.4 Corollary, ibid.\ Ch.3 \S4 no.2 Proposition 5, respectively. The proof of (4) is given in \cite{KNU2} Part III Definition 4.2.4. (5) is proved in an elementary manner.
\end{sbpara}
\begin{sbpara}
\label{onXBS}
Let $\Gamma$ be a semi-arithmetic subgroup of $G({\mathbb{Q}})$(\ref{Gamma}). Then:
$(1)$ The action of $\Gamma$ on $\frak X_{{\rm {BS}}}$ is proper, and the quotient space $\Gamma\operatorname{\backslash} \frak X_{{\rm {BS}}}$ is Hausdorff.
$(2)$ If $\Gamma$ is torsion-free, the action of $\Gamma$ on $\frak X_{{\rm {BS}}}$ is free, and the map $\frak X_{{\rm {BS}}}\to \Gamma\operatorname{\backslash} \frak X_{{\rm {BS}}}$ is a local homeomorphism.
$(3)$ If $\Gamma$ is an arithmetic subgroup of $G({\mathbb{Q}})$, $\Gamma\operatorname{\backslash} \frak X_{{\rm {BS}}}$ is compact.
\medskip
These are given in \cite{BS} 9.3 Theorem and 9.5 for arithmetic subgroups $\Gamma$ of $G({\mathbb{Q}})$. Since a semi-arithmetic subgroup of $G({\mathbb{Q}})$ is a subgroup of an arithmetic subgroup of $G({\mathbb{Q}})$, the properness in (1) is reduced to the case of an arithmetic subgroup. The Hausdorffness in (1) follows from the properness in (1) (\ref{proper} (1)). We prove (2). We may assume that $\Gamma$ has a subgroup $\Gamma_1$ of finite index which is a subgroup of a torsion-free arithmetic subgroup. Assume that $\gamma \in \Gamma$ fixes some point of $\frak X_{{\rm {BS}}}$. Take $n\geq 1$ such that $\gamma^n\in \Gamma_1$. By the result for an arithmetic subgroup, we have $\gamma^n=1$. Since $\Gamma$ is torsion-free, we have $\gamma=1$. The rest of (2) follows from the properness in (1) and from this free property (\ref{proper} (2)).
\end{sbpara}
\subsection{The set $D_{{\rm {BS}}}$}\label{ss:DBS}
Let $G$ be a linear algebraic group over ${\mathbb{Q}}$ and let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ be a homomorphism as in \ref{D} which is ${\mathbb{R}}$-polarizable.
\begin{sbpara} \label{para}
Let $G'_{{{\rm red}}}=[G_{{{\rm red}}},G_{{{\rm red}}}]$ be the commutator subgroup of $G_{{{\rm red}}}=G/G_u$. This is a semisimple algebraic group.
We have bijections between the sets
$$(\text{parabolic subgroups of} \; G)\leftrightarrow(\text{parabolic subgroups of}\; G_{{{\rm red}}})\leftrightarrow(\text{parabolic subgroups of}\;G'_{{{\rm red}}})$$
given as follows. The bijection from the second set to the first set is to take the inverse image in $G$. The bijection from the second set to the third set is to take the intersection with $G'_{{{\rm red}}}$.
\end{sbpara}
\begin{sbpara}\label{Drt}
Let $P$ be a parabolic subgroup of $G_{{{\rm red}}}$.
Let $P':= P\cap G'_{{{\rm red}}}$. Then $P'$ is a parabolic subgroup of $G'_{{{\rm red}}}$. We will denote $A_{P'}$ by $A_P$. This $A_P$ is also described as follows.
Let $S_P$ be the largest ${\mathbb{Q}}$-split torus in the center of $P_{{{\rm red}}}$. Let $X(S_P)^+$ be the submonoid of the character group $X(S_P)$ generated by the inverses of characters which appear in the adjoint action on ${\rm {Lie}}\,(P_u)$ of a lifting of $S_P$ in $P$ (see \ref{Xrt}). Then the canonical map $X(S_P)\to X(S_{P'})$ induces an isomorphism $X(S_P)^+\overset{\sim}\to X(S_{P'})^+$ and
a bijection $\Delta(P)\to \Delta(P')$ between the bases. Hence we can write
$$A_P = \Hom(X(S_P)^+,{\mathbb{R}}^{\mult}_{>0})= {\mathbb{R}}_{>0}^{\Delta(P)} \subset \bar A_P=\Hom(X(S_P)^+, {\mathbb{R}}^{\mult}_{\geq 0})= {\mathbb{R}}_{\geq 0}^{\Delta(P)}.$$
\end{sbpara}
\begin{sbpara} \label{Aact}
We define the {\it Borel--Serre action of $A_P$ on $D$} as follows. Let $a\in A_P$ and $x\in D$. Let $(p, s, \delta)\in D_{{{\rm red}}}\times {\rm{spl}}(W) \times {\cal {L}}$, with $\delta \in {\cal {L}}(p)$, be the element corresponding to $x$ (Proposition \ref{Dandgr}).
Let $K(p)\in \frak X$ be the image of $p$ under $D_{{{\rm red}}}\to \frak X$ (\ref{DtoX}). We have the Borel--Serre lifting $A_P\to P'({\mathbb{R}})\;;\; a\mapsto a_{K(p)}$ associated to $K(p)$. Then $a \circ x$ is defined to be the element of $D$ whose image in $D_{{{\rm red}}}\times {\rm{spl}}(W)\times {\cal {L}}$ is $(a_{K(p)}p, s, {\rm{Ad}}(a_{K(p)})\delta)$.
\end{sbpara}
\begin{sbpara}\label{Bact}
Let $B_P= {\mathbb{R}}_{>0} \times A_P$. Then we define the action of $B_P$ on $D_{{{\rm nspl}}}$ (see \ref{Dspl}) as follows. Let $b=(t,a)\in {\mathbb{R}}_{>0}\times A_P$. Then, for $x\in D_{{{\rm nspl}}}$, $b\circ x:= a \circ (t \circ x)$, where $t\circ x\in D$ corresponds to the element $(p, s, t \circ \delta)$ of $D_{{{\rm red}}}\times {\rm{spl}}(W) \times {\cal {L}}$ (see \ref{cgv1}).
Here $(p,s,t)$ is the element corresponding to $x$ by Proposition \ref{Dandgr}.
\end{sbpara}
\begin{sbpara}\label{DBSs}
Let $D_{{\rm {BS}}}$ be the set of all pairs $(P, Z)$, where $P$ is a parabolic subgroup of $G_{{{\rm red}}}$ and $Z$ is either an $A_P$-orbit in $D$ or a $B_P$-orbit in $D_{{{\rm nspl}}}$ for the Borel--Serre action.
We denote by $D^{{{\rm{mild}}}}_{{\rm {BS}}}$ the part of $D_{{\rm {BS}}}$ consisting of $A_P$-orbits and by $D_{{{\rm nspl}},{\rm {BS}}}$ the subset of $D_{{\rm {BS}}}$ consisting of all elements of the form $(P,Z)$ such that $Z\subset D_{{{\rm nspl}}}$.
($D^{{{\rm{mild}}}}_{{\rm {BS}}}$ and $D_{{{\rm nspl}},{\rm {BS}}}$ correspond to $D^{(A)}_{{\rm {BS}}}$ and $D^{(B)}_{{\rm {BS}}}$ in the notation of \cite{KNU2} Part I 8.1, respectively.)
\end{sbpara}
\subsection{The real analytic structure of $D_{{\rm {BS}}}$}\label{ss:BSan}
We are in the same setting as in \ref{ss:DBS}.
We endow $D_{{\rm {BS}}}$ with a structure of a real analytic manifold with corners.
\begin{sblem}\label{BSf1} Let $P$ be a parabolic subgroup of $G$.
Then there is a real analytic map $f: D\to A_P$ such that $f(a \circ x)= af(x)$ for any $a\in A_P$ and $x\in D$.
\end{sblem}
\begin{pf} Take a real analytic map $f_{\frak X}: \frak X\to A_P$ such that $f_{\frak X}(a\circ K)=af_{\frak X}(K)$ for any $a\in A_P$ and $K\in \frak X$ (\ref{XBSr}), and define $f$ to be the composite map $D\to D_{{{\rm red}}}\to \frak X\overset{f_{\frak X}}\to A_P$, where the second arrow is as in \ref{DtoX}.
\end{pf}
\begin{sblem}\label{BSf2} Let $P$ be a parabolic subgroup of $G$. Then there is a real analytic map $f: D_{{{\rm nspl}}} \to B_P$ such that $f(b \circ x)=bf(x)$ for any $b\in B_P$ and $x\in D_{{{\rm nspl}}}$.
\end{sblem}
\begin{pf}
By Lemma \ref{BSf1}, there is a real analytic map $f_D: D_{{{\rm red}}}\to A_P$ such that $f_D(a\circ p)=af_D(p)$ for any $a\in A_P$ and any $p\in D_{{{\rm red}}}$.
Let ${\cal {L}}=W_{-2}\gr^W{\rm {Lie}}\,(G)_{{\mathbb{R}}}$ be as in \ref{CKSdelta}. It is a graded ${\mathbb{R}}$-vector space with weights $\le-2$. By \ref{cgv2}, there is a real analytic map
$f_{{\cal {L}}}:{\cal {L}}\smallsetminus\{0\}\to{\mathbb{R}}_{>0}$ such that $f_{{\cal {L}}}(t \circ \delta)= tf_{{\cal {L}}}(\delta)$ for any $t\in{\mathbb{R}}_{>0}$ and $\delta\in {\cal {L}}\smallsetminus \{0\}$.
Define $f:D_{{{\rm nspl}}}\subset D_{{{\rm red}}}\times {\rm{spl}}(W) \times ({\cal {L}}\smallsetminus \{0\})\to B_P=A_P\times {\mathbb{R}}_{>0}$ by
$f(p, s,\delta) = (f_D(p), f_{{\cal {L}}}(\mathrm{Ad}(f_D(p)_p)^{-1}\delta))$ $(p\in D_{{{\rm red}}}, s \in {\rm{spl}}(W), \delta\in {\cal {L}}(p))$,
where $f_D(p)_p$ is the Borel--Serre lifting of $ f_D(p) \in A_P$ at $p$.
This $ f $ satisfies $f(b \circ x)= bf(x)$.
\end{pf}
\begin{sbpara}\label{DBSr}
Let $P$ be a parabolic subgroup of $G$.
Let $D_{{\rm {BS}}}(P):=\{(Q,Z)\in D_{{\rm {BS}}}\,|\,Q\supset P\}$.
Let $D_{{\rm {BS}}}^{{{\rm{mild}}}}(P):=D_{{\rm {BS}}}(P)\cap D_{{\rm {BS}}}^{{{\rm{mild}}}}$ and $D_{{{\rm nspl}},{\rm {BS}}}(P):=D_{{\rm {BS}}}(P)\cap D_{{{\rm nspl}},{\rm {BS}}}$.
Then, in the same way as in the case of $\frak X_{{\rm {BS}}}(P)$, we have
$$
D_{{\rm {BS}}}^{{{\rm{mild}}}}(P)=D\times^{A_P} \bar A_P,\quad D_{{{\rm nspl}}, {\rm {BS}}}(P)= D\times^{B_P} \bar B_P.
$$
We endow $D_{{\rm {BS}}}(P)$ with the structure of a real analytic manifold in the following way.
First, the set $U_1:=D^{{{\rm{mild}}}}_{{\rm {BS}}}(P)$ is regarded as a real analytic manifold with corners as follows.
By Lemma \ref{BSf1}, there is a real analytic map $f_A: D\to A_P$ satisfying
\medskip
(1) $f_A(a\circ x)=af_A(x)$ for all $a\in A_P$ and all $x\in D$.
\medskip
\noindent
Let $D_A^{(1)}=f_A^{-1}(1)$. Then
\medskip
(2) $D_A^{(1)} \times A_P \overset{\sim}\to D\;;\; (x, a) \mapsto a \circ x$.
\medskip
\noindent
This map (2) induces a bijection
\medskip
(3) $D_A^{(1)}\times \bar A_P \to D\times^{A_P} \bar A_P = D^{{{\rm{mild}}}}_{{\rm {BS}}}(P)$.
\medskip
\noindent
We regard $U_1=D^{{{\rm{mild}}}}_{{\rm {BS}}}(P)$ as a real analytic manifold with corners via the bijection (3). This structure of $D_{{\rm {BS}}}^{{{\rm{mild}}}}(P)$ does not depend on the choice of $f_A$.
Next, the set $U_2:= D_{{{\rm nspl}},{\rm {BS}}}(P)$ is regarded as a real analytic manifold with corners as follows. By Lemma \ref{BSf2}, there is a real analytic map $f_B: D_{{{\rm nspl}}}\to B_P$ satisfying
\medskip
(4) $f_B(b\circ x)=bf_B(x)$ for all $b\in B_P$ and all $x\in D_{{{\rm nspl}}}$.
\medskip
\noindent
Let $D_B^{(1)}=f_B^{-1}(1)$. Then
\medskip
(5) $D_B^{(1)}\times B_P \overset{\sim}\to D_{{{\rm nspl}}}\;;\; (x, b) \mapsto b \circ x$.
\medskip
\noindent
This map (5) induces a bijection
\medskip
(6) $D_B^{(1)}\times \bar B_P \to D\times^{B_P} \bar B_P = D_{{{\rm nspl}}, {\rm {BS}}}(P)$.
\medskip
\noindent
We regard $U_2:=D_{{{\rm nspl}}, {\rm {BS}}}(P)$ as a real analytic manifold with corners via the bijection (6). This structure of $D_{{{\rm nspl}},{\rm {BS}}}(P)$ does not depend on the choice of $f_B$.
It is easy to prove that for $j=1,2$ and for the structure of a real analytic manifold with corners on $U_j$, the intersection $U_1\cap U_2$ is an open set of $U_j$ and that the restriction of the structure of the real analytic manifold with corners of $U_1$ to $U_1\cap U_2$ coincides with that of $U_2$. Hence there is a unique structure of a real analytic manifold with corners on $U_1\cup U_2=D_{{\rm {BS}}}(P)$ for which $U_1$ and $U_2$ are open sets and whose restriction to $U_j$ coincides with that of $U_j$ for $j=1,2$.
\end{sbpara}
\begin{sbprop}\label{DBSr2} The set $D_{{\rm {BS}}}$ has a unique structure of a real analytic manifold with corners for which $D_{{\rm {BS}}}(P)$ is an open set and whose restriction to $D_{{\rm {BS}}}(P)$ coincides with that of $D_{{\rm {BS}}}(P)$ defined in $\ref{DBSr}$ for any parabolic subgroup $P$ of $G$.
\end{sbprop}
\begin{pf} It is easy to see that for parabolic subgroups $P$ and $Q$ of $G$ such that $Q\supset P$, $D_{{\rm {BS}}}(Q)$ is an open set of $D_{{\rm {BS}}}(P)$ and the restriction of the structure of $D_{{\rm {BS}}}(P)$ as a real analytic manifold with corners to $D_{{\rm {BS}}}(Q)$ coincides with that of $D_{{\rm {BS}}}(Q)$. Furthermore, $D_{{\rm {BS}}}(P)\cap D_{{\rm {BS}}}(Q) = D_{{\rm {BS}}}(P*Q)$. This proves Proposition \ref{DBSr2}.
\end{pf}
\begin{sbrem}\label{ZBJ0}
When $G$ is semisimple, the Borel--Serre partial compactification $\overline{G({\mathbb{R}})}_{{\rm {BS}}}$ in \cite{BJ2} Proposition 6.3 coincides with our $D(G,h_0)_{{\rm {BS}}}$ in Proposition \ref{DBSr2} as real analytic manifolds with corners.
\end{sbrem}
\begin{sbpara} We have a morphism $$D_{{\rm {BS}}}\to \frak X_{{\rm {BS}}}$$ of real analytic manifolds with corners induced by $D_{{{\rm red}},{\rm {BS}}}\to \frak X_{{\rm {BS}}}\;;\; (P, Z) \mapsto (P, Z')$, where $Z'$ is the image of $Z\subset D_{{{\rm red}}}$ under $D_{{{\rm red}}}\to \frak X$ (\ref{DtoX}).
\end{sbpara}
\begin{sbprop}\label{DXBS1} If $G$ is reductive, the map $D_{{\rm {BS}}}\to \frak X_{{\rm {BS}}}$ is proper.
\end{sbprop}
\begin{pf}
Since $G$ is reductive, we have $D_{\rm {BS}}(P)=D_{\rm {BS}}^{{\rm{mild}}}(P)$.
Hence it is sufficient to prove that $D_{{\rm {BS}}}(P)\to \frak X_{{\rm {BS}}}(P)$ is proper.
Since $D_{{\rm {BS}}}(P)=D_A^{(1)}\times \bar A_P$ (\ref{DBSr} (3)) and $\frak X_{{\rm {BS}}}(P)= \frak X^{(1)}\times \bar A_P$ (\ref{XBSr} (3)), the properness of $D_{{\rm {BS}}}(P)\to \frak X_{{\rm {BS}}}(P)$ is reduced to that of $D_A^{(1)}\to \frak X^{(1)}$.
The latter is reduced to the properness of $D\to \frak X$ by \ref{DBSr} (2) and \ref{XBSr} (2).
Take a point $p\in D$, let $K'$ be the isotropic subgroup of $G({\mathbb{R}})$ at $p$, and let $K$ be the isotropic subgroup of $G({\mathbb{R}})$ at the image of $p$ in ${\cal {X}}$.
Then $K$ is a maximal compact subgroup of $G({\mathbb{R}})$ and $K'{\subset} K$ is a compact subgroup.
Hence $D=G({\mathbb{R}})/K'\to\frak X=G({\mathbb{R}})/K$ is proper.
\end{pf}
\begin{sbpara}\label{BSpsd}
Let $P$ be a parabolic subgroup of $G$. Fix $f: D_{{{\rm red}}}\to A_P$, which is induced from Lemma \ref{BSf1}, let $Y=f^{-1}(1)\subset D_{{{\rm red}}}$ and let $b_f$ be the composition $D_{{{\rm red}},{\rm {BS}}}(P)=Y \times \bar A_P\to Y\subset D_{{\rm red}}$ (see \ref{para}). Consider the isomorphism of real analytic manifolds $$D \overset{\sim}\to \{(p, s, \delta)\in D_{{{\rm red}}}\times {\rm{spl}}(W) \times {\cal {L}}\;|\; \delta\in {\cal {L}}(b_f(p))\}\;;\;x\mapsto (p, {\rm{spl}}_W(x), {\rm{Ad}}(f(p)_p)^{-1} \delta(x)),$$ where $p=x_{{{\rm red}}}$ and $f(p)_p$ is the Borel--Serre lifting of $f(p)$ to $P$ at $p$.
\begin{sbprop} This isomorphism extends uniquely to an isomorphism of real analytic manifolds with corners
$$D_{{\rm {BS}}}(P)\overset{\sim}\to \{(p, s, \delta)\in D_{{{\rm red}},{\rm {BS}}}(P)\times {\rm{spl}}(W) \times \overline{{\cal {L}}}\;|\;\delta\in \overline{{\cal {L}}}(b_f(p))\}.$$
\end{sbprop}
This map sends $x=(Q,Z)$ to $(p, s, \delta)$ defined as follows.
$p=(Q, Z_{{{\rm red}}})$. $s={\rm{spl}}_W(y)$ for any $y\in Z$, which is independent of the choice of $y$. $\delta= {\rm{Ad}}(f(z)_z)^{-1}(\delta(y))$, where $y\in Z$ and $z=y_{{{\rm red}}}$, which is independent of the choice of $y$.
By this map, the image of $x\in D_{{\rm {BS}}}(P)$ in $\overline{{\cal {L}}}$ belongs to ${\cal {L}}$ if and only if $x$ is an $A_P$-orbit.
\end{sbpara}
\begin{sbprop}\label{BSbarL}
The map $D_{{\rm {BS}}}\to D_{{{\rm red}}, {\rm {BS}}}\times {\rm{spl}}(W)$ is proper. It is an $\bar L$-bundle.
Note that $\bar L$ here is $\overline{{\cal {L}}}(p)$ for any $p$.
\end{sbprop}
We hope that our notation $D_{{{\rm red}}, {\rm {BS}}}$ is not confusing with the reductive Borel--Serre space in \cite{Z}.
\subsection{Global properties of $D_{{\rm {BS}}}$}
\label{ss:BSproperty}
We are still in the setting in Section \ref{ss:DBS}.
\begin{sbthm}\label{BSgl} Let $\Gamma$ be a semi-arithmetic subgroup of $G'({\mathbb{Q}})$ ($\ref{Gamma}$).
$(1)$ The action of $\Gamma$ on $D_{{\rm {BS}}}$ is proper and the quotient space $\Gamma\operatorname{\backslash} D_{{\rm {BS}}}$ is Hausdorff.
$(2)$ If $\Gamma$ is torsion-free, the action of $\Gamma$ on $D_{{\rm {BS}}}$ is free and the map $D_{{\rm {BS}}}\to \Gamma\operatorname{\backslash} D_{{\rm {BS}}}$ is a local homeomorphism.
$(3)$ If $\Gamma$ is an arithmetic subgroup of $G'({\mathbb{Q}})$, $\Gamma\operatorname{\backslash} D_{{\rm {BS}}}$ is compact.
\end{sbthm}
\begin{sbpara}\label{p:DBSHaus} We first prove
that $D_{{\rm {BS}}}$ is Hausdorff, that is, the case $\Gamma=\{1\}$ of \ref{BSgl} (1).
The map $D_{{\rm {BS}}}\to \frak X \times {\rm{spl}}(W)$ is proper by Propositions \ref{DXBS1} and \ref{BSbarL}. Since $\frak X$ is Hausdorff (\ref{onXBS}) as well as ${\rm{spl}}(W)$ which is isomorphic to $G_u({\mathbb{R}})$, we have that $D_{{\rm {BS}}}$ is Hausdorff.
\end{sbpara}
\begin{sbpara}\label{neat}
We say that a subgroup $\Gamma$ of $G({\mathbb{Q}})$ is {\it neat} if it satisfies the following condition (1).
(1) There is a faithful representation $V\in {\operatorname{Rep}}(G)$ such that for every element $\gamma\in \Gamma$, the subgroup of ${\mathbb{C}}^\times$ generated by all the eigenvalues of the action of $\gamma$ on $V_{\mathbb{C}}$ is torsion-free.
By \ref{faith}, the condition (1) is equivalent to the following condition (1$^{\prime}$).
(1$^{\prime}$) For every $\gamma\in \Gamma$, every $n \geq 1$, and every homomorphism $\rho: G\to \operatorname{GL}(n)$, the subgroup of ${\mathbb{C}}^\times$ generated by all the eigenvalues of $\rho(\gamma)$ is torsion-free.
A neat subgroup of $G({\mathbb{Q}})$ is torsion-free.
Every semi-arithmetic subgroup $\Gamma$ (\ref{Gamma}) has a neat subgroup of finite index (\cite{B1} 17.4).
\end{sbpara}
\begin{sbpara}\label{pfBSgl}
We prove Theorem \ref{BSgl}.
Let $\Gamma$ be a semi-arithmetic subgroup of $G'({\mathbb{Q}})$ (\ref{Gamma}).
The proof is similar to that of \cite{KNU2} Part I Theorem 9.1.
By \ref{proper} (5), the properness in (1) is reduced to the case where $\Gamma$ is neat. We prove the properness in (1) and the free property in (2) assuming $\Gamma$ is neat. We apply \ref{proper} (4) to $H=\Gamma$, $H_1=\Gamma_u:= \Gamma\cap G_u({\mathbb{Q}})$, $X_1= {\rm{spl}}(W)$, $X_2=\frak X$. The action of $\Gamma/\Gamma_u$ on $\frak X$ is proper and free by (1) and (2) of \ref{onXBS}, and the action of $\Gamma_u$ on ${\rm{spl}}(W)$ is proper and free because ${\rm{spl}}(W)\simeq G_u({\mathbb{R}})$ on which $\Gamma_u$ acts through the inclusion $\Gamma_u\to G_u({\mathbb{R}})$. Hence the action of $\Gamma$ on ${\rm{spl}}(W) \times \frak X$ is proper and free. By using the canonical continuous equivariant map $D_{{\rm {BS}}}\to {\rm{spl}}(W) \times \frak X$, we have that the action of $\Gamma$ on $D_{{\rm {BS}}}$ is proper and free by \ref{p:DBSHaus} and \ref{proper} (3.1).
The Hausdorffness in (1) follows from the properness in (1) (\ref{proper} (1)) and the
local homeomorphism property in (2) follows from it and from the properness in (1) (\ref{proper} (2)).
(3) follows from the compactness of $(\Gamma/\Gamma_u)\operatorname{\backslash} \frak X_{{\rm {BS}}}$, where $\Gamma_u=\Gamma\cap G_u({\mathbb{Q}})$, the compactness of $\Gamma_u\operatorname{\backslash} G_u({\mathbb{R}})$, and Proposition \ref{BSbarL}.
\end{sbpara}
In Theorem \ref{BSgl}, we can use an arithmetic subgroup and a semi-arithmetic subgroup of $G({\mathbb{Q}})$ (not of $G'({\mathbb{Q}})$)
in the following situations in Remark \ref{BSSA1} and Proposition \ref{BSSA2}.
\begin{sbrem}\label{BSSA1}
If either $G$ is semisimple or the condition (1) in Lemma \ref{pol2} is satisfied, \ref{BSgl} holds for a semi-arithmetic subgroup $\Gamma$ of $G({\mathbb{Q}})$. In fact, $\Gamma \cap G'({\mathbb{Q}})$ is of finite index (cf. Proposition \ref{A=A*} for the latter case). Hence by \ref{proper} (5), we can replace $\Gamma$ by the semi-arithmetic subgroup $\Gamma\cap G'({\mathbb{Q}})$ of $G'({\mathbb{Q}})$.
\end{sbrem}
\begin{sbprop}\label{BSSA2}
Assume that $G$ is reductive. Let $\Gamma$ be a subgroup of $G({\mathbb{Q}})$. Then$:$
$(1)$ If $\Gamma$ is a semi-arithmetic subgroup of $G({\mathbb{Q}})$, $\Gamma \operatorname{\backslash} D_{{\rm {BS}}}$ is Hausdorff.
$(2)$ Let $Z$ be the center of $G$. If $\Gamma$ is a semi-arithmetic subgroup of $G({\mathbb{Q}})$ and the image of $\Gamma$ in $(G/Z)({\mathbb{Q}})$ is torsion-free, then the map $D_{{\rm {BS}}}\to \Gamma\operatorname{\backslash} D_{{\rm {BS}}}$ is a local homeomorphism.
$(3)$ If $\Gamma$ is an arithmetic subgroup of $G({\mathbb{Q}})$, $\Gamma \operatorname{\backslash} D_{{\rm {BS}}}$ is compact.
\end{sbprop}
See \ref{redpf} for the proof.
\section{The space of SL(2)-orbits}\label{s:DSL}
Let $G$ be a linear algebraic group defined over ${\mathbb{Q}}$.
We define and study the extended period domains $D_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2)}$ of ${\rm{SL}}(2)$-orbits which contain $D$. This $D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$) is the $G$-MHS version of the space $D({\Lambda})_{{\rm{SL}}(2)}$
(resp.\ $D({\Lambda})^{\star}_{{\rm{SL}}(2)}$)
for the classical period domain $D({\Lambda})$ (\ref{ss:Dold}) defined and studied in \cite{KU1} (in the pure case) and \cite{KNU2} Part II (in the mixed case) (resp.\ in \cite{KNU2} Part IV).
Assume that we are given an element $h_0:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$ of $\Psi_H(G)$ (\ref{kandh}). We assume the ${\mathbb{R}}$-polarizability (\ref{pol}).
We denote by $k_0 \in \Psi_W(G)$ the homomorphism ${\mathbb{G}}_m\to G_{{{\rm red}}}$ (defined over ${\mathbb{Q}}$) which induces $h_0\circ w: {\mathbb{G}}_{m,{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}$.
\subsection{The set $D_{{\rm{SL}}(2)}$ when $G$ is reductive}
\label{ss:red}
In this Section \ref{ss:red}, we assume that $G$ is reductive.
\begin{sbpara}\label{red1} Let $n\geq 0$. By an {\it ${\rm{SL}}(2)$-orbit in $n$ variables}, we mean a pair $(\rho, \varphi)$ $$\rho: {\rm{SL}}(2)_{\mathbb{R}}^n\to G_{\mathbb{R}}, \quad \varphi: {\mathbb{P}}^1({\mathbb{C}})^n\to \check D,$$
where $\rho$ is a homomorphism of algebraic groups over ${\mathbb{R}}$ and $\varphi$ is a holomorphic map satisfying the following conditions (i)--(iii).
(i) $\varphi(gz)= \rho(g)\varphi(z)$ \; ($g\in {\rm{SL}}_2({\mathbb{C}})^n, \; z\in {\mathbb{P}}^1({\mathbb{C}})^n$).
(ii) $\varphi(\frak H^n){\subset} D$.
(iii) For $z\in \frak H^n$, the homomorphism ${\rm {Lie}}\,(\rho): \frak{sl}(2,{\mathbb{R}})^n \to {\rm {Lie}}\,(G_{\mathbb{R}})={\rm {Lie}}\,(G)_{\mathbb{R}}$ of Lie algebras induced by $\rho$ is a homomorphism of ${\mathbb{R}}$-Hodge structures if we endow $\frak{sl}(2,{\mathbb{Q}})^n$ with the ${\mathbb{Q}}$-Hodge structure of weight $0$ associated to $z$ (see below) and endow ${\rm {Lie}}\,(G)$ with the ${\mathbb{Q}}$-Hodge structure of weight $0$ associated to $\varphi(z)\in D$ and the adjoint action of $G$ on ${\rm {Lie}}\,(G)$.
Here the ${\mathbb{Q}}$-Hodge structure of $\frak{sl}(2,{\mathbb{Q}})^n$ associated to $z=(z_j)_{1\leq j\leq n}$ is the direct sum of the ${\mathbb{Q}}$-Hodge structure of the $j$-th $\frak{sl}(2,{\mathbb{Q}})$
induced by the ${\mathbb{Q}}$-Hodge structure of $V_{\mathbb{C}}={\mathbb{C}}^2$ corresponding to $z_j$
(e.g.\ \cite{KU2} 1.2.3) and the adjoint action of $\operatorname{GL}(2)_{{\mathbb{Q}}}$ on $\frak{sl}(2,{\mathbb{Q}})$.
\end{sbpara}
\begin{sbpara}\label{clEx2} (Classical) {\it Example}.
Assume $G=\operatorname{GL}(2)$ and let $h_0$ be the homomorphism $z\mapsto \langle z\rangle$ in \ref{clEx}. Let $\rho: {\rm{SL}}(2)_{\mathbb{R}}\to G_{\mathbb{R}}$ be the inclusion map and let $\varphi: {\mathbb{P}}^1({\mathbb{C}})\to \Dc$ be the identity map in \ref{clEx}. Then $(\rho, \varphi)$ is an ${\rm{SL}}(2)$-orbit in one variable.
\end{sbpara}
\begin{sblem}\label{redp1} Let $n\geq 0$. Then the following sets {\rm (i)}, {\rm (ii)}, {\rm (iii)}, {\rm (iii)}${}'$, and {\rm (iv)} can be identified.
{\rm (i)} The set of all ${\rm{SL}}(2)$-orbits $(\rho, \varphi)$ in $n$ variables.
{\rm (ii)} The set of all pairs $(\rho, \varphi)$, where $\rho$ is a homomorphism ${\rm{SL}}(2)_{\mathbb{R}}^n \to G_{\mathbb{R}}$ of algebraic groups over ${\mathbb{R}}$ and $\varphi$ is a holomorphic map $\frak H^n \to D$ satisfying the condition {\rm (i)} in $\ref{red1}$ for $g\in {\rm{SL}}_2({\mathbb{R}})^n$ and $z \in \frak H^n$ and satisfying
the condition {\rm (iii)} in $\ref{red1}$.
{\rm (iii)} The set of all pairs $(\rho, {{\bold r}})$, where $\rho$ is a homomorphism ${\rm{SL}}(2)_{\mathbb{R}}^n \to G_{\mathbb{R}}$ of algebraic groups over ${\mathbb{R}}$ and ${{\bold r}}\in D$ satisfying the following condition.
The homomorphism ${\rm {Lie}}\, (\rho) : \frak{sl}(2, {\mathbb{R}})^n\to {\rm {Lie}}\, (G_{\mathbb{R}})$ is a homomorphism of ${\mathbb{R}}$-Hodge structures with respect to the Hodge structure of $\frak{sl}(2, {\mathbb{R}})^n$ associated to ${\rm {\mathbb i}}$ and the Hodge structure of ${\rm {Lie}}\,(G_{\mathbb{R}})$ associated to ${{\bold r}}$.
{\rm (iii)}${}'$ The set of all pairs $(\rho, {{\bold r}})$, where $\rho$ is a homomorphism ${\rm{SL}}(2)_{\mathbb{R}}^n \to G_{\mathbb{R}}$ of algebraic groups over ${\mathbb{R}}$ and ${{\bold r}}\in D$ satisfying the following condition.
Let $S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}$ be the kernel of norm $S_{{\mathbb{C}}/{\mathbb{R}}} \to {\mathbb{G}}_{m,{\mathbb{R}}}; z\mapsto z\bar z$. Let $\xi_1: S_{{\mathbb{C}}/{\mathbb{R}}}^{(1)}\to G_{\mathbb{R}}$ be the homomorphism defined by
$$\xi_1(u):= {{\bold r}}(u)\rho(\langle u\rangle, \dots, \langle u\rangle)^{-1},$$
where we regard ${{\bold r}}$ as a homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ and $\langle u\rangle\in \mathrm{SO}(2)_{{\mathbb{R}}}$ is as in $\ref{clEx}$.
Then $\xi_1(u)\rho(g)=\rho(g)\xi_1(u)$ for any $u\in S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}$ and $g\in {\rm{SL}}(2)_{\mathbb{R}}^n$.
{\rm (iv)} The set of all homomorphisms ${\rm{SL}}(2)_{\mathbb{R}}^n \times S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ satisfying the following conditions {\rm (iv.1)} and {\rm (iv.2)}. Let $\rho$ (resp.\ $\xi_1$) be the restriction of this homomorphism to
${\rm{SL}}(2)_{\mathbb{R}}^n$ (resp.\ $S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}$).
{\rm (iv.1)} $k_0(-1)= \xi_1(-1)\rho(-1,\dots, -1)$. Here $-1$ inside $\rho(-)$ denotes the scaler matrix $-1$ in ${\rm{SL}}(2)_{\mathbb{R}}$.
{\rm (iv.2)} Define the homomorphism ${{\bold r}}: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ by
${{\bold r}}(t u):= k_0(t) \xi_1(u)\rho(\langle u\rangle, \dots, \langle u\rangle)$,
where $t\in {\mathbb{G}}_{m,{\mathbb{R}}}\subset S_{{\mathbb{C}}/{\mathbb{R}}}$ and $u\in S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}$. Then ${{\bold r}} \in D$.
\end{sblem}
\begin{pf}
We will prove that the first three sets are identified.
In fact, the bijectivities of the evident maps (i) $\to$ (ii) $\to $ (iii) are well-known
(for their 1-variable cases, see \cite{Sc}, \cite{U2} Remark (2.2), and \cite{Satake}), but we give a proof here.
To prove that (i)$\to$ (ii) $\to $ (iii) are bijective,
since they are injective,
it is sufficient to prove that (i) $\to$ (iii) is surjective. Let $(\rho, {{\bold r}})$ be an element of the set (iii). We prove that if $g\in H:=\{g\in{\rm{SL}}(2,{\mathbb{C}})^n\;|\; g{\rm {\mathbb i}} = {\rm {\mathbb i}}\}$, then $\rho(g){{\bold r}}={{\bold r}}$. This will imply that we have a map $\varphi: {\mathbb{P}}^1({\mathbb{C}})^n \to \check{D}\;;\; g{\rm {\mathbb i}} \mapsto \rho(g){{\bold r}}$ having the desired properties.
Since $H$ is connected, it is sufficient to prove that for $X\in {\rm {Lie}}\,(H)=F^0_{{\rm {\mathbb i}}}{\frak {sl}}(2, {\mathbb{C}})^n$, ${\rm {Lie}}\,(\rho)(X)$ respects the Hodge filtration of ${{\bold r}}$. But this follows from ${\rm {Lie}}\,(\rho)(X)\in F^0_{{{\bold r}}} {\rm {Lie}}\,(G)_{{\mathbb{C}}}$.
We prove (iii) $=$ (iii)${}'$. Since the Hodge structures on the Lie algebras in the condition in the definition of (iii) are of weight $0$,
the condition in (iii) is equivalent to the condition that for $u\in S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})$, the action ${\rm{Ad}}(\langle u\rangle,\dots, \langle u\rangle)$ on $\frak{sl}(2,{\mathbb{R}})^n$ and the adjoint action of ${{\bold r}}(u)$ on ${\rm {Lie}}\,(G_{\mathbb{R}})$ are compatible via ${\rm {Lie}}\,(\rho)$. This is equivalent to the condition that the action ${\rm{Ad}}(\xi_1(u))$ on ${\rm {Lie}}\,(\rho)(\frak{sl}(2,{\mathbb{R}})^n)$ is trivial for every $u$ and hence to the condition that
$\xi_1(u)$ and $\rho(g)$ commute for every $u$ and $g\in {\rm{SL}}(2)^n_{\mathbb{R}}$.
The evident map (iii)${}'$ $\to$ (iv) is bijective because the inverse map is given as in (iv.2).
Thus we can identify the sets (i), (ii), (iii), (iii)${}'$, and (iv).
\end{pf}
\begin{sbprop}\label{redp2} Let $(\rho, \varphi)$ be an ${\rm{SL}}(2)$-orbit in $n$ variables and let ${{\bold r}}=\varphi({\rm {\mathbb i}}): S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ and $\xi_1:S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ be as in Lemma $\ref{redp1}$.
Define a homomorphism $\xi: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ of algebraic groups over ${\mathbb{R}}$
by $$\xi(t):=k_0(t) \rho(\mathrm{diag}(1/t, t), \dots, \mathrm{diag}(1/t, t))\quad\text{for}\; t\in {\mathbb{G}}_{m,{\mathbb{R}}}\subset S_{{\mathbb{C}}/{\mathbb{R}}},$$
$$\xi(u):=\xi_1(u)\quad \text{for}\; u\in S_{{\mathbb{C}}/{\mathbb{R}}}^{(1)},$$
where $\xi_1$ is as in Lemma $\ref{redp1}$ {\rm (iv)}. Then the Hodge filtration of $\xi$ is $\varphi({\rm {\mathbb 0}})$, where ${\rm {\mathbb 0}}=(0, \dots, 0)\in {\mathbb{P}}^1({\mathbb{C}})^n$.
\end{sbprop}
\begin{pf}
To relate $\xi$ and ${{\bold r}}$, we use the Cayley element
$$
{\rm {\mathbb c}}:=\frac{1}{\sqrt{2}}\begin{pmatrix}1&i\\i&1\end{pmatrix}\in{\rm{SL}}(2,{\mathbb{C}}).
$$
We use the following properties (i) and (ii) of ${\rm {\mathbb c}}$.
(i) By the action of ${\rm{SL}}_2({\mathbb{C}})$ on ${\mathbb{P}}^1({\mathbb{C}})$, ${\rm {\mathbb c}}$ sends $0\in {\mathbb{P}}^1({\mathbb{C}})$ to $i\in {\mathbb{P}}^1({\mathbb{C}})$.
(ii) $\langle u\rangle = {\rm {\mathbb c}}\, \text{diag}(u^{-1},u)\,{\rm {\mathbb c}}^{-1}$ for $u\in S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}$.
Let $V\in {\operatorname{Rep}}(G)$, let $V_{{\mathbb{C}},\xi}$ (resp.\ $V_{{\mathbb{C}},{{\bold r}}}$) be $V_{\mathbb{C}}$ endowed with the action of $S_{{\mathbb{C}}/{\mathbb{R}}}$ via $\xi$ (resp.\ ${{\bold r}}$), and let $V_{{\mathbb{C}},\xi}^{p,q}$ (resp.\ $V_{{\mathbb{C}},{{\bold r}}}^{p,q}$) be the Hodge $(p,q)$-component of $V_{{\mathbb{C}}, \xi}$ (resp.\ %
$V_{{\mathbb{C}},{{\bold r}}}$).
\smallskip
{\bf Claim.} $\rho({\rm {\mathbb c}}, \dots, {\rm {\mathbb c}})(\bigoplus_q V_{{\mathbb{C}}, \xi}^{p,q})= \bigoplus_q V_{{\mathbb{C}}, {{\bold r}}}^{p,q}$ in $V_{\mathbb{C}}$.
\smallskip
We prove Claim. For $(a,b,c)\in {\mathbb{Z}}^3$, let $V_{\mathbb{C}}^{(a,b, c)}$ be the part of $V_{\mathbb{C}}$ on which $k_0(t)$ for $t\in {\mathbb{C}}^\times$ acts as %
$t^a$, $\xi_1(u)$ for $u\in S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}$ acts as
$u^b$, and $\rho(\text{diag}(1/t, t), \dots, \text{diag}(1/t, t))$ for $t\in {\mathbb{C}}^\times$ acts as $t^c$.
Then $V_{\mathbb{C}}$ is the direct sum of these $V_{\mathbb{C}}^{(a,b,c)}$. On $V_{\mathbb{C}}^{(a,b,c)}$, $\xi(tu)$ ($t\in {\mathbb{G}}_{m,{\mathbb{R}}}\subset S_{{\mathbb{C}}/{\mathbb{R}}}$, $u\in S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}$) acts as $t^{a+c}u^b$ and hence $V_{\mathbb{C}}^{(a,b,c)}$ has the Hodge type $((a+b+c)/2, (a-b+c)/2)$. On the other hand, by the above property (ii) of ${\rm {\mathbb c}}$, ${{\bold r}}(tu)$ acts on $\rho({\rm {\mathbb c}}, \dots, {\rm {\mathbb c}})V_{\mathbb{C}}^{(a,b,c)}$ as $t^au^{b+c}$ and hence $\rho({\rm {\mathbb c}}, \dots, {\rm {\mathbb c}})V_{\mathbb{C}}^{(a,b,c)}$ has the Hodge type $((a+b+c)/2, (a-b-c)/2)$. This proves Claim.
Since $\varphi({\rm {\mathbb 0}})= \rho({\rm {\mathbb c}}, \dots, {\rm {\mathbb c}})^{-1}\varphi({\rm {\mathbb i}})$ by the property %
(i) of ${\rm {\mathbb c}}$, Claim shows that $\xi$ gives $\varphi({\rm {\mathbb 0}})$.
\end{pf}
The fact that the Cayley element relates $\varphi({\rm {\mathbb 0}})$ and $\varphi({\rm {\mathbb i}})$ was used also in \cite{U2}.
\begin{sbpara}\label{redas}
Let $(\rho, \varphi)$ be an ${\rm{SL}}(2)$-orbit in $n$ variables. Then the {\it rank} of $(\rho, \varphi)$ is defined to be the number of $j$ ($1\leq j\leq n$) such that the $j$-th component $\rho_j :{\rm{SL}}(2)_{\mathbb{R}}\to G_{\mathbb{R}}$ of $\rho$ is a non-trivial homomorphism.
Let $r$ be the rank of $(\rho, \varphi)$ and let $(\rho', \varphi')$ be the ${\rm{SL}}(2)$-orbit in $r$ variables defined as follows. Let $\{s(1), \dots, s(r)\}$ ($s(1)< \dots <s(r)$) be the set of all $j$ ($1\leq j\leq n$) such that $\rho_j$ is non-trivial. Define $\rho': {\rm{SL}}(2)_{\mathbb{R}}^r \to G_{\mathbb{R}}$ to be the unique homomorphism satisfying $\rho(g_1, \dots, g_n)= \rho'(g_{s(1)}, \dots, g_{s(r)})$ and let $\varphi'$ be the unique map ${\mathbb{P}}^1({\mathbb{C}})^r \to \Dc$ such that $\varphi(z_1, \dots, z_n)= \varphi'(z_{s(1)}, \dots, z_{s(r)})$.
We call $(\rho', \varphi')$ the ${\rm{SL}}(2)$-orbit in $r$ variables of rank $r$ {\it associated to $(\rho, \varphi)$}.
\end{sbpara}
\begin{sbpara}\label{redW}
Let $(\rho, \varphi)$ be an ${\rm{SL}}(2)$-orbit in $n$ variables of rank $n$. For $1\leq j\leq n$, define homomorphisms $\tau_j^{\star}, \tau_j: {\mathbb{G}}_{m,{\mathbb{R}}}\to G_{\mathbb{R}}$ as follows.
$$\tau^{\star}_j(t)=\rho(g_1, \dots, g_n) \quad (t \in {\mathbb{R}}^{\times}), \quad \text{where}$$
$$g_k= \begin{pmatrix} 1/t & 0\\ 0 & t\end{pmatrix} \;\text{if} \; 1\leq k\leq j, \quad g_k= 1 \;\text{if} \; j< k\leq n.$$
$$\tau_j(t):= \tau_j^{\star}(t)k_0(t)\quad (t \in {\mathbb{R}}^{\times}),$$
where $k_0\in\Psi_W(G)$ is as in the beginning of Section \ref{s:DSL}.
\end{sbpara}
\begin{sbpara}\label{redeq} We define the equivalence relation between ${\rm{SL}}(2)$-orbits.
An ${\rm{SL}}(2)$-orbit in $n$ variables and an ${\rm{SL}}(2)$-orbits in $n'$-variables are equivalent if and
only if they have the same rank $r$ and their associated ${\rm{SL}}(2)$-orbits of rank $r$ are equivalent in the
following sense.
For ${\rm{SL}}(2)$-orbits in $n$ variables of rank $n$, the equivalence relation is given as follows: $(\rho, \varphi) \sim (\rho', \varphi')$ if and only if there is a $t=(t_j)_{1\leq j \leq n}\in {\mathbb{R}}_{>0}^n$ such that
$$\rho'(g)=\tau(t)\rho(g)\tau(t)^{-1}, \quad \varphi'(z)=\tau(t)\varphi(z)$$
for any $g\in {\rm{SL}}(2)^n_{\mathbb{R}}$ and $z\in \frak H^n$, where $\tau(t)$ denotes $ \prod_{j=1}^n \tau_j(t_j)$ associated to $(\rho, \varphi)$.
\medskip
In terms of Lemma \ref{redp1} (iv), $(\rho, \xi_1)\sim (\rho', \xi'_1)$ if and only if there is a $t=(t_j)_{1\leq j \leq n}\in {\mathbb{R}}_{>0}^n$ such that
$\rho'(g)=\tau(t)\rho(g)\tau(t)^{-1}$
for every $g\in {\rm{SL}}(2)^n_{\mathbb{R}}$ and $\xi_1=\xi'_1$.
\end{sbpara}
\begin{sbrem}
We have the same equivalence relation $\sim$ even if we replace $\tau_j$ by $\tau^{\star}_j$. This is because $\tau(t)\rho(g)\tau(t)^{-1}= \tau^{\star}(t)\rho(g)\tau^{\star}(t)^{-1}$ and the actions of $\tau(t)$ and $\tau^{\star}(t)$ on $D$ are the same. Here $\tau^{\star}(t)= \prod_j \tau^{\star}_j(t_j)$ which is associated to $(\rho, \varphi)$.
\end{sbrem}
\begin{sbpara} Let $(\rho, \varphi)$ be an ${\rm{SL}}(2)$-orbit in $n$ variables.
Let $1\leq j\leq n$.
For $V\in {\operatorname{Rep}}(G)$, let $W^{(j)}_{\bullet}V_{\mathbb{R}}$ be the increasing filtration on $V_{\mathbb{R}}$ defined by the action of ${\mathbb{G}}_{m,{\mathbb{R}}}$ via $\tau_j$. That is, for $w\in {\mathbb{Z}}$, $W^{(j)}_wV_{\mathbb{R}}$ is the part of $V_{\mathbb{R}}$ on which the action of ${\mathbb{G}}_{m,{\mathbb{R}}}$ via $\tau_j$ is of weights $\leq w$.
For $1\leq j\leq n$, define $N_j\in {\rm {Lie}}\,(G_{\mathbb{R}})$ by
$$N_j= {\rm {Lie}}\,(\rho) (g_1, \dots, g_n) \quad \text{with}\; g_j= \begin{pmatrix} 0 & 1 \\ 0& 0\end{pmatrix}, \; g_k=0 \;\text{for}\; k\neq j,$$
where ${\rm {Lie}}\,(\rho)$ is the homomorphism ${\frak{sl}}(2,{\mathbb{R}})^n \to {\rm {Lie}}\,(G_{\mathbb{R}})$ induced by $\rho$. Let $W^{(0)}=W$.
Then for $0\leq j \leq k \leq n$ and for any $a_l\in {\mathbb{R}}_{>0}$ ($j< l \leq k$) and any $V\in {\operatorname{Rep}}(G)$, the filtration $W^{(k)}_{\bullet}V_{\mathbb{R}}$ is the relative weight filtration of the nilpotent operator $\sum_{j<l\leq k} a_lN_l:V_{\mathbb{R}}\to V_{\mathbb{R}}$ with respect to $W^{(j)}_{\bullet}V_{\mathbb{R}}$.
For $1\leq j\leq n$, the following conditions (i)--(iv) are equivalent. (i) $\rho_j$ is trivial. (ii) $\tau_j$ is trivial. (iii) $W^{(j)}=W^{(j-1)}$. (iv) $N_j=0$.
We say that the weight filtrations of $(\rho, \varphi)$ are {\it rational} if the weight filtrations $W^{(j)}$ ($1\leq j\leq n$) of the associated ${\rm{SL}}(2)$-orbit in $n$ variables of rank $n$ has the following property:
For any $V\in {\operatorname{Rep}}(G)$,
the filtrations $W^{(j)}_{\bullet}V_{\mathbb{R}}$ ($1\leq j\leq n$) on $V_{\mathbb{R}}$
are ${\mathbb{Q}}$-rational. This rationality depends only on the equivalence class of $(\rho, \varphi)$.
\end{sbpara}
\begin{sbpara}\label{redSL}
We define the set $D_{{\rm{SL}}(2)}$ as the set of all equivalence classes of ${\rm{SL}}(2)$-orbits whose weight filtrations are rational.
\end{sbpara}
\begin{sbrem} The rationality condition on the weight filtrations will become important to have the good properties (Hausdorff property etc.) of the quotient space $\Gamma \operatorname{\backslash} D_{{\rm{SL}}(2)}$ for a semi-arithmetic subgroup $\Gamma$ of $G'({\mathbb{Q}})$ (cf.\ Section \ref{ss:gen1}).
\end{sbrem}
\begin{sbpara}\label{red2}
Let $p\in D_{{\rm{SL}}(2)}$.
Let $(\rho, \varphi)$ be the ${\rm{SL}}(2)$-orbit in $n$ variables of rank $n$ whose class is $p$.
Let $$\tau_p, \tau_p^{\star}: {\mathbb{G}}_{m,{\mathbb{R}}}^n \to G_{\mathbb{R}}$$ be the homomorphisms $\tau$ and $\tau^{\star}$ associated to $(\rho, \varphi)$ as in \ref{redeq}, respectively.
Let $\tau_{p,j}$ and $\tau^{\star}_{p, j}$ ($1\leq j\leq n$) be the $j$-th component ${\mathbb{G}}_{m,{\mathbb{R}}} \to G_{\mathbb{R}}$ of $\tau_p$ (resp.\ $\tau^{\star}_p$).
We will call $$\{\varphi(iy_1, \dots, iy_n)\in D\;|\; y_j\in {\mathbb{R}}_{>0} \;(1\leq j\leq n)\}= \tau_p({\mathbb{R}}_{>0}^n) \varphi({\rm {\mathbb i}})=\tau^{\star}_p({\mathbb{R}}_{>0}^n)\varphi({\rm {\mathbb i}})$$ the {\it torus orbit} associated to $p$.
\end{sbpara}
\subsection{The sets $D_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2)}$}\label{ss:DSL}
When we do not assume that $G$ is reductive, unlike the case where $G$ is reductive, there are several sets of ${\rm{SL}}(2)$-orbits. Here we define the most important two sets $D_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2)}$. Other sets of ${\rm{SL}}(2)$-orbits $D^{\star,+}_{{\rm{SL}}(2)}$, $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$ will be defined later.
\begin{sbpara}\label{DSL}
Let $D_{{{\rm red}}}=D(G_{{{\rm red}}},h_0)$ be as in \ref{Dred}.
Let $D_{{{\rm red}}, {\rm{SL}}(2)}=D(G_{{{\rm red}}}, h_0)_{{\rm{SL}}(2)}$ be $D_{{\rm{SL}}(2)}$ for $(G_{{{\rm red}}}, h_0)$ in \ref{redSL}.
This $D_{{{\rm red}}, {\rm{SL}}(2)}$ is a $G$-MHS version of the space $D_{{\rm{SL}}(2)}(\gr^W)^{\sim}$ in \cite{KNU2} Part II 3.5.1.
For $p\in D_{{{\rm red}}, {\rm{SL}}(2)}$ and let
$\tau_p, \tau^{\star}_p:{\mathbb{G}}_{m,{\mathbb{R}}}^n \to G_{{{\rm red}},{\mathbb{R}}}$ be the homomorphism in \ref{red2} associated to $p$, where
$n$ is the rank of $p$.
Let $D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$) be the set of pairs $(p, Z)$, where $p$ is an element of $D_{{{\rm red}}, {\rm{SL}}(2)}$ and $Z$ is a subset of $D$ whose image in $D_{{{\rm red}}}$ coincides with the torus orbit (\ref{red2}) of $p$, satisfying one of the following conditions (A) and (B) for every (equivalently, for all) $z\in Z$. Let $s= {\rm{spl}}_W(z)$.
(A) Let $h: {\bf G}_{m,{\mathbb{R}}}^n \to G_{\mathbb{R}}$ be the homomorphism defined by
$$h(t):= s\tau_p(t)s^{-1} \quad (\text{resp.}\; s\tau^{\star}_p(t)s^{-1}).$$
Then $Z$ is a $h({\mathbb{R}}_{>0}^n)$-orbit.
(B) Let $h: {\bf G}_m\times {\bf G}_{m,{\mathbb{R}}}^n\to G$ be the homomorphism defined by
$$h(t_0, (t_j)_{1\leq j\leq n}):= s( k_0(t_0) \prod_{j=1}^n \tau_p(t_j))s^{-1}\quad (\text{resp.}\; s( k_0(t_0) \prod_{j=1}^n \tau^{\star}_p(t_j))s^{-1}).$$
Then $Z$ is an $h({\mathbb{R}}_{>0}\times {\mathbb{R}}_{>0}^n)$-orbit contained in $D_{{{\rm nspl}}}$.
\end{sbpara}
\begin{sbpara}\label{SL2AB} Let $x=(p, Z)\in D_{{\rm{SL}}(2)}$
(resp.\ $D^{\star}_{{\rm{SL}}(2)}$).
We call $x$ an $A$-orbit in the case (A), and a $B$-orbit in the case (B).
We define the {\it mild part of $D^{\star}_{{\rm{SL}}(2)}$} as the part consisting of all $A$-orbits and denote it by $D^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2)}$.
We denote by $D_{{\rm{SL}}(2),{\rm{spl}}}$ the subset of $D_{{\rm{SL}}(2)}$ consisting of $(p,Z)$ whose $Z$ is contained in $D_{{\rm{spl}}}$, and by $D_{{\rm{SL}}(2),{{\rm nspl}}}$ its complement.
\end{sbpara}
\begin{sbpara}\label{taux0} For $x=(p, Z)\in D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$), the homomorphism $h$ in \ref{DSL} is independent of the choice of $z\in Z$. In the case $x\in D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$), we denote this homomorphism $h$ by $\tau_x$ (resp.\ $\tau^{\star}_x$).
\end{sbpara}
\subsection{Weight filtrations associated to ${\rm{SL}}(2)$-orbits}\label{SL2an0}
In this Section \ref{SL2an0}, we give preliminary definitions which are used in Section \ref{SL2an}.
\begin{sbpara}\label{Wlem} Let $E$ be a field of characteristic $0$ and let $\cG$ be a linear algebraic group over $E$. Let ${\operatorname{Rep}}_E(\cG)$ be the category of finite-dimensional representations of $\cG$ over $E$. Let $W'$ be an increasing filtration on the functor $V\mapsto V$ from ${\operatorname{Rep}}_E(\cG)$ to the category of finite-dimensional $E$-vector spaces. Then, by \cite{SR} Chap.\ IV 2.4, the following two conditions (i) and (ii) are equivalent.
(i) There is a homomorphism $a: {\mathbb{G}}_{m,E} \to \cG$ which defines $W'$. That is, for $V\in {\operatorname{Rep}}_E(\cG)$, $W'_wV$ is the part of $V$ on which the action of ${\mathbb{G}}_{m,E}$ via $a$ is of weights $\leq w$.
(ii) $W'$ is an exact $\otimes$-filtration
in the sense of \cite{SR} Chapter IV 2.1. That is, %
$\gr^{W'}_w$ is an exact functor for every $w\in {\mathbb{Z}}$, and %
$W'_w(V_1\otimes V_2)= \sum_{j+k=w} \;W'_jV_1 \otimes_E W'_kV_2$ for every $V, V_2\in {\operatorname{Rep}}_E(\cG)$ and $w\in {\mathbb{Z}}$.
We denote by $\frak W(\cG)$ the set of all $W'$ satisfying the above equivalent conditions (i) and (ii).
If $E\subset E'$, via the injection $\frak W(\cG)\to \frak W(\cG_{E'})$
induced by the homomorphism $\Hom({\mathbb{G}}_{m,E},\cG) \to \Hom({\mathbb{G}}_{m,E'},\cG_{E'})$, we often regard $\frak W(\cG)$ as a subset of $\frak W(\cG_{E'})$.
Actually only the cases $E={\mathbb{Q}}$ and $E={\mathbb{R}}$ are important to us.
\end{sbpara}
\begin{sbpara}\label{taux} Let $x=(p, Z)\in D_{{\rm{SL}}(2)}$ and let $n$ be the rank of $p=x_{{{\rm red}}}$. In the case where $x$ is an $A$ (resp.\ $B$)-orbit, we defined in \ref{taux0} a homomorphism $$\tau_x: {\mathbb{G}}_{m,{\mathbb{R}}}^n={\mathbb{G}}_{m,{\mathbb{R}}}^{\{1,\dots,n\}} \to G_{\mathbb{R}} \quad \; (\text{resp.}\; {\mathbb{G}}_{m,{\mathbb{R}}}\times {\mathbb{G}}^n_{m,{\mathbb{R}}}={\mathbb{G}}_{m,{\mathbb{R}}}^{\{0,\dots, n\}}\to G_{\mathbb{R}}).$$
For $1\leq j\leq n$ (resp.\ $0\leq j \leq n$), let
$W_x^{(j)}$ be the increasing filtration
on the functor $V\mapsto V_{\mathbb{R}}={\mathbb{R}}\otimes_{\mathbb{Q}} V$
given by $\tau_{x,j}:{\bf G}_{m,{\mathbb{R}}}\to G$. For $1\leq j\leq n$, we have $W_x^{(j)}= s(W_p^{(j)})$. That is, for $V\in {\operatorname{Rep}}(G)$, $W_{x,w}^{(j)}V_{\mathbb{R}}= \bigoplus_{k\in {\mathbb{Z}}} \; s(W^{(j)}_{p,w}\gr^W_k V_{\mathbb{R}})$. In the case where $x$ is a $B$-orbit, $W^{(0)}_x=W$. These $W_x^{(j)}$ ($1\leq j\leq n$) (resp.\ ($0\leq j\leq n$)) are called the {\it weight filtrations associated to $x$}.
For $x\in D_{{\rm{SL}}(2)}$, let $$\Phi(x)\subset \frak W(G_{\mathbb{R}})$$ be the set of weight filtrations associated to $x$.
We have $W\in \Phi(x)$ if and only if $x$ is a $B$-orbit. If $G$ is reductive, $W\notin \Phi(x)$ and we have $\Phi(x)\subset \frak W(G)$.
\end{sbpara}
\begin{sbprop}\label{PhiZ} $(p,Z)\in D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$) is determined by $(\Phi(p), Z)$.
\end{sbprop}
\begin{pf}
When $G$ is reductive, the proof of \cite{KU1} Lemma 3.10 for ${\mathbb{Q}}$-polarization works for ${\mathbb{R}}$-polarization.
The general non-reductive case follows easily from this.
%
\end{pf}
This will be used in the proof of the injectivity in Propositions \ref{emb1} (2), \ref{emb2} (2), \ref{emb3} (2) in Section \ref{SL2an}.
\begin{sbprop}\label{variance}
Let $x\in D_{{\rm{SL}}(2)}$ and let $n$ be the rank of $x_{{{\rm red}}}\in D_{{{\rm red}},{\rm{SL}}(2)}$. Let $V\in {\operatorname{Rep}}(G)$, $V\neq 0$. Let $0\leq j\leq n$. Let $W_x^{(0)}:=W$ also in the case where $x$ is an $A$-orbit. Define the mean value $\mu_j\in {\mathbb{Q}}$
%
and the variance ${\sigma}_j^2\in {\mathbb{Q}}$ of $W_x^{(j)}$ by
$$\mu_j := \sum_{w\in {\mathbb{Z}}} \dim_{\mathbb{R}}(\gr^{W_x^{(j)}}_wV_{\mathbb{R}})w/\dim_{\mathbb{R}}(V_{\mathbb{R}}), \quad {\sigma}^2_j:= \sum_{w\in {\mathbb{Z}}} \dim_{\mathbb{R}}(\gr^{W_x^{(j)}}_wV_{\mathbb{R}})(w-\mu_j)^2/\dim_{\mathbb{R}}(V_{\mathbb{R}}).$$
Then $\mu_j$ is independent of $j$ and ${\sigma}_j^2\leq {\sigma}_k^2$ if $j\leq k$. Furthermore, if $V$ is a faithful representation of $G$, then ${\sigma}^2_j<{\sigma}^2_k$ for $0\leq j<k\leq n$.
\end{sbprop}
\begin{pf}
This follows from \cite{KNU2} Part II Proposition 2.1.12.
\end{pf}
\begin{sbpara}\label{cW(G)}
We denote by ${\cal {W}}(G)$ the set of all subsets $\Phi$ of $\frak W(G_{\mathbb{R}})$ such that $\Phi=\Phi(x)$ for some $x\in D_{{\rm{SL}}(2)}$.
For $\Phi\in {\cal {W}}(G)$, let $\Phi_{{{\rm red}}}\in {\cal {W}}(G_{{{\rm red}}})$ be $\{\gr^W(W')\;|\; W'\in \Phi, \;W'\neq W\}$. If $x=(p, Z)\in D_{{\rm{SL}}(2)}$, then $\Phi(x)_{{{\rm red}}}=\Phi(p)$.
Let $\Phi\in {\cal {W}}(G)$ and let $n$ be the order of $\Phi_{{{\rm red}}}$. In the case $W\notin \Phi$ (resp.\ $W\in \Phi$), we often identify $\Phi$ with
the set $\{1,\dots, n\}$ (resp.\
$\{0, 1, \dots, n\}$)
in the unique way that if $W', W''\in \Phi$ correspond to $i, j\in \{1, \dots, n\}$ (resp.\ $\{0, 1, \dots, n\}$), respectively, then
$i\leq j$ if and only if the variance of $W'$ $\leq $ the variance of $W''$ (\ref{variance}).
\end{sbpara}
\begin{sbpara}
For $\Phi\in {\cal {W}}(G_{{{\rm red}}})$, let $D_{{\rm{SL}}(2)}(\Phi)$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}(\Phi)$) be the set of all points $(p, Z)$ of $D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$) such that $\Phi(p)\subset \Phi$.
For $\Phi\in {\cal {W}}(G)$, let $D_{{\rm{SL}}(2)}(\Phi)=\{x\in D_{{\rm{SL}}(2)}\;|\; \Phi(x)\subset \Phi\}$.
Then, in the next Section \ref{SL2an},
$$D^{\star}_{{\rm{SL}}(2)}= \bigcup_{\Phi\in {\cal {W}}(G_{{{\rm red}}})} \; D^{\star}_{{\rm{SL}}(2)}(\Phi)$$
will be an important open covering of %
$D^{\star}_{{\rm{SL}}(2)}$,
$$D_{{\rm{SL}}(2)}= \bigcup_{\Phi\in {\cal {W}}(G_{{{\rm red}}})}\; D_{{\rm{SL}}(2)}(\Phi)$$
will be an important open covering of $D^{II}_{{\rm{SL}}(2)}$, and
$$D_{{\rm{SL}}(2)}= \bigcup_{\Phi\in {\cal {W}}(G)} \; D_{{\rm{SL}}(2)}(\Phi)=\Bigl(\bigcup_{\Phi\in {\cal {W}}(G), W\notin \Phi} \; D_{{\rm{SL}}(2)}(\Phi)\Bigr)\cup \Bigl(\bigcup_{\Phi\in {\cal {W}}(G), W\in \Phi} \; D_{{\rm{SL}}(2),{{\rm nspl}}}(\Phi)\Bigr)$$
(here $D_{{\rm{SL}}(2),{{\rm nspl}}}(\Phi):= D_{{\rm{SL}}(2),{{\rm nspl}}}\cap D_{{\rm{SL}}(2)}(\Phi)$) will be an important open covering of $D^I_{{\rm{SL}}(2)}$.
\end{sbpara}
\begin{sbpara}
\label{P_is_para} Let the notation be as in \ref{Wlem}.
Assume that $\cG$ is reductive and let $W'\in \frak W(\cG)$. Then, by \cite{SR} Chap.\ IV 2.2.5,
the stabilizer $P=\cG^{\circ}_{W'}\subset \cG^{\circ}$ of $W'$ in $\cG^{\circ}$ is a parabolic subgroup of $\cG$.
We thus have a map
$$\Hom({\mathbb{G}}_{m,E},\cG)\to \{\text{parabolic subgroup of $\cG$}\}.$$
This map is surjective (cf.\ \cite{Mi2} Theorem 25.1, \cite{Sp} 15.1.2 (ii)).
Let $W'\in \frak W(\cG)$ and let $P$ be the associated parabolic subgroup of $\cG$.
If a homomorphism $a:{\mathbb{G}}_{m,E} \to \cG$ defines $W'$, then the image of $a$ in $\cG$ is contained in $P$. The composition ${\mathbb{G}}_{m,E} \overset{a}\to P \to P_{{{\rm red}}}$ is independent of the choice of $a$ and has the image in the center of $P_{{{\rm red}}}$. The adjoint action of ${\mathbb{G}}_{m,E}$ on ${\rm {Lie}}\,(P_u)$ via $a$ is of weights $\leq -1$.
Let ${\rm{spl}}(W')$ be the set of all isomorphisms of $\otimes$-functors from ${\operatorname{Rep}}_E(\cG)$ to the category of $E$-vector spaces
$$(V\mapsto \gr^{W'}V) \overset{\sim}\to (V \mapsto V)\quad\text{preserving the increasing filtrations defined by $W'$}.$$
Then ${\rm{spl}}(W')$ is a $P_u(E)$-torsor.
We have a natural bijection from the set of all homomorphisms ${\mathbb{G}}_{m,E}\to \cG$ which define $W'$ to ${\rm{spl}}(W')$.
\end{sbpara}
\begin{sbpara}\label{BSspl}
Assume that $G$ is reductive.
Let ${\frak W}_0(G_{\mathbb{R}})$ be
the set of all $W'\in {\frak W}(G_{\mathbb{R}})$ satisfying the following condition.
($\ast$) For some (equivalently, for every) homomorphism $a: {\mathbb{G}}_{m,{\mathbb{R}}}\to G_{\mathbb{R}}$ which defines $W'$, the image of the homomorphism $a^{\star}: {\mathbb{G}}_{m,{\mathbb{R}}}\to G_{\mathbb{R}}\;;\;t\mapsto a(t)k_0(t)^{-1}$ belongs to the commutator subgroup $G'$ of $G$, where $k_0$ is as in the beginning of this Section \ref{s:DSL}.
For a point $p\in D_{{\rm{SL}}(2)}$, we have $\Phi(p) \subset \frak W(G)\cap \frak W_0(G_{\mathbb{R}})$.
In fact, the condition ($\ast$) is satisfied by $W'\in \Phi(p)$ because ${\rm{SL}}(2)^n$ coincides with its commutator subgroup and hence for any linear algebraic group $H$, the image of any homomorphism ${\rm{SL}}(2)^n \to H$ is contained in the commutator subgroup $H'$.
Let $W'\in \frak W_0(G_{\mathbb{R}})$.
We have a canonical real analytic map $${\rm{spl}}^{{\rm {BS}}}_{W'}: D\to {\rm{spl}}(W'):={\rm{spl}}_{\mathbb{R}}(W')$$
defined as follows. Let $\iota: {\mathbb{G}}_m \to G^{\circ}_{W',{{\rm red}}}$ be the canonical homomorphism in \ref{P_is_para}.
Let $x\in D$. We have a Borel--Serre lifting $a^{\star}: {\mathbb{G}}_{m,{\mathbb{R}}} \to (G')^{\circ}_{W',{\mathbb{R}}}$ of ${\mathbb{G}}_m \to (G')^{\circ}_{W',{{\rm red}}}\;;\;t\mapsto \iota(t)k_0(t)^{-1}$ associated to the image of $x$ under $D\to \frak X$. We define ${\rm{spl}}^{{\rm {BS}}}_{W'}(x)$ to be the ${\mathbb{R}}$-splitting of $W'$ associated to ${\mathbb{G}}_{m,{\mathbb{R}}} \to G^{\circ}_{W'}\;;\;t\mapsto a^{\star}(t)k_0(t)$.
Note that this splitting ${\rm{spl}}^{{\rm {BS}}}_{W'}(x)$ is also defined as follows.
Let $V \in {\operatorname{Rep}}(G)$. Then for $H=x$, $V=H(V)=\bigoplus_w V_w$ where $V_w$ is the part of $V$ of weight $w$, and we have a polarization $\langle\;,\;\rangle_w$ on $V_{w,{\mathbb{R}}}=H(V_w)_{\mathbb{R}}$ in the condition (4.1) in Lemma \ref{pol2}.
Then
the splitting ${\rm{spl}}^{{\rm {BS}}}_{W'}(x)$ of $W'_{\bullet}V_{\mathbb{R}}$ is the direct sum for $w\in {\mathbb{Z}}$ of the orthogonal decomposition of $W'_{\bullet}V_{w,{\mathbb{R}}}$ with respect to the Hodge metric associated to $\langle\;,\;\rangle_w$.
See \ref{orth}.
An important fact is that,
for $p \in D_{{\rm{SL}}(2)}$ of rank $n$, if ${{\bold r}}$ is an element of the torus orbit of $p$ and $1\leq j\leq n$, the splitting of $W^{(j)}_p$ given by $\tau_{p,j}:{\mathbb{G}}_{m,{\mathbb{R}}}\to G_{\mathbb{R}}$ coincides with ${\rm{spl}}_{W_p^{(j)}}^{{\rm {BS}}}({{\bold r}})$. See \cite{KU1} Lemma 3.9. This fact is in the basis of the relation
of ${\rm{SL}}(2)$-orbits and Borel--Serre orbits considered in this paper and in our former papers \cite{KU2}, \cite{KNU2}.
\end{sbpara}
\begin{sbpara}\label{sPhi} Let $\Phi\in {\cal {W}}_{\mathbb{R}}(G)$. Let $G_{{\mathbb{R}}, \Phi}=\bigcap_{W'\in \Phi} G_{{\mathbb{R}}, W'}$, where
$G_{{\mathbb{R}},W'}$ denotes the stabilizer subgroup of $W'$ in $G_{\mathbb{R}}$.
By a {\it splitting} of $\Phi$, we mean a homomorphism $$\alpha: {\mathbb{G}}_{m, {\mathbb{R}}}^{\Phi}\to G_{\Phi, {\mathbb{R}}}$$ such that for each $W'\in \Phi$, the $W'$-component ${\mathbb{G}}_{m,{\mathbb{R}}}\to G_{{\mathbb{R}}}$ of $\alpha$ is a splitting of $W'$.
A splitting of $\Phi$ exists. In fact, if $\Phi=\Phi(x)$ for $x\in D_{{\rm{SL}}(2)}$, $\tau_x$ (\ref{taux}) is a splitting of $\Phi$.
In the case $W\notin \Phi$ (resp.\ $W\in \Phi$), by a {\it distance to $\Phi$-boundary}, we mean a real analytic map $$\beta: D\to {\mathbb{R}}_{>0}^{\Phi} \quad (\text{resp.} \; D_{{{\rm nspl}}}\to {\mathbb{R}}^{\Phi}_{>0}) $$ such that $\beta(\alpha(t)x)= t\beta(x)$ for all splittings $\alpha$ of $\Phi$, all $t\in {\mathbb{R}}^{\Phi}_{>0}$, and all $x\in D$ (resp.\ $x\in D_{{{\rm nspl}}}$).
\end{sbpara}
\begin{sbprop}\label{emb30}
A distance to $\Phi$-boundary exists.
\end{sbprop}
This is a $G$-MHS version of \cite{KNU2} Part II 3.2.5. The proof given below is similar to that of loc.\ cit.
\begin{pf} We first prove the case where $G$ is reductive of \ref{emb30}.
Take a submonoid $V$ of $X({\mathbb{G}}_m^{\Phi})$ such that $V\cup V^{-1}= X({\mathbb{G}}_m^{\Phi})$, $V \supset X({\mathbb{G}}_m^{\Phi})_+$ and such that $V^\times \cap X({\mathbb{G}}_m^{\Phi})_+=\{1\}$. Let $P=P_V$ be the parabolic subgroup of $G'$ associated to $V$. Then $(G')^{\circ}_{\Phi}\subset P$ %
and, for every splitting $\alpha$ of $\Phi$, the map ${\mathbb{G}}_{m,{\mathbb{R}}}^{\Phi}\to P_{{{\rm red}},{\mathbb{R}}}$ is injective and independent of the choice of $\alpha$, and the image of this homomorphism is contained in $S_P$. Let ${\mathbb{R}}_{>0}^{\Phi}\to A_P$ be the induced injective map. Take a homomorphism of Lie groups $h: A_P\to {\mathbb{R}}_{>0}^{\Phi}$ which splits the last injection. Let $\pi: P({\mathbb{R}}) \to A_P$ be the canonical map defined in \ref{XBSr}, and let $f:\frak X\to A_P$ be the map there induced by $\pi$ by fixing $K\in \frak X$. Then the composition $D\to \frak X \overset{f}\to A_P\overset{h}\to {\mathbb{R}}_{>0}^{\Phi}$ is a distance to $\Phi$-boundary.
Now we consider the general case. Let $n$ be the order of $\Phi_{{{\rm red}}}$.
Let $\beta_{{{\rm red}}}: D_{{{\rm red}}}\to {\mathbb{R}}^n_{>0}$ be a distance to the $\Phi_{{{\rm red}}}$-boundary.
In the case $W\notin \Phi$, the composition $D\to D_{{{\rm red}}} \overset{\beta_{{{\rm red}}}}\longrightarrow {\mathbb{R}}^n_{>0}$ is a distance to $\Phi$-boundary.
Next we prove the case $W\in \Phi$ of \ref{emb30}.
Fix $p_0\in D_{{{\rm red}}}$. Let $Z$ be the center of $G_{{{\rm red}}}({\mathbb{R}})$. By the ${\mathbb{R}}$-polarizability, $K=\{g\in G_{{{\rm red}}}({\mathbb{R}})/Z\; |\;gp_0=p_0\}$ is compact. For each integer $w\leq -2$, take a $K$-invariant positive symmetric ${\mathbb{R}}$-bilinear form $(\cdot, \cdot)_w$ on the part $L_w$ of $L:={\cal {L}}(p_0)$.
Define a map $f :L\smallsetminus \{0\} \to {\mathbb{R}}_{>0}$ by
$f(\delta):=(\sum_{w\leq -2}\; (\delta_w,\delta_w)^{-1/w})^{-1/2}$,
where $\delta_w$ denotes the
component of $\delta$ of weight $w$. For $p \in D_{{{\rm red}}}$, if $g$ is an element of $G_{{{\rm red}}}({\mathbb{R}})$
such that $p = gp_0$, then we have an isomorphism ${\rm{Ad}}(g) : L={\cal {L}}(p_0) \overset{\sim}\to {\cal {L}}(p)$. The map
$f_p :{\cal {L}}(p)\smallsetminus \{0\}\to {\mathbb{R}}_{>0}, \delta \mapsto f({\rm{Ad}}(g)^{-1}\delta)$ is independent of the choice of $g$. This
is because $(g')^{-1}g\in K$ if $g,g'\in G_{{{\rm red}}}({\mathbb{R}})$ and $gp_0=g'p_0$. Define $\gamma' :D_{{{\rm nspl}}} \to
{\mathbb{R}}_{>0}$ by sending an element corresponding to $(p,s,\delta)$ ($p\in D_{{{\rm red}}}$, $s\in {\rm{spl}}(W)$, $\delta\in {\cal {L}}(p)\smallsetminus \{0\}$) to $ f_p (\delta)$. For $x\in D_{{{\rm nspl}}}$, define $\gamma(x)=\gamma'(x)\dot \prod_{j=1}^n \beta_{{{\rm red}},j}(x_{{{\rm red}}})^{-1}$.
Then $(\gamma,\beta_{{{\rm red}}}): D_{{{\rm nspl}}}\to {\mathbb{R}}_{>0}\times {\mathbb{R}}^n_{>0}$ is a distance to $\Phi$-boundary.
\end{pf}
\subsection{The real analytic structures of $D_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2)}$}
\label{SL2an}
In this Section \ref{SL2an}, we endow $D_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2)}$ with the sheaves of real analytic functions and with the log structures with sign. In fact, like in Part II of \cite{KNU2}, $D_{{\rm{SL}}(2)}$ is endowed with two kinds of such structures, $D^I_{{\rm{SL}}(2)}$ and $D^{II}_{{\rm{SL}}(2)}$.
A basic property of these structures is that in the case where $G$ is reductive, if $(\rho, \varphi)$ is an ${\rm{SL}}(2)$-orbit in $n$ variables with class $p$ in $D_{{\rm{SL}}(2)}$, $\varphi(iy_1, \dots, iy_n)$ converges to $p$ when $y_j/y_{j+1}\to \infty$ for $1\leq j\leq n$ ($y_{n+1}$ denotes $1$).
We first review the category ${\cal {B}}'_{\mathbb{R}}(\log)$ in \ref{BR1}--\ref{BR3}. The above spaces with the above structures become objects of ${\cal {B}}'_{\mathbb{R}}(\log)$
\begin{sbpara}\label{BR1} The categories ${\cal {B}}'_{\mathbb{R}}$ and ${\cal {B}}'_{\mathbb{R}}(\log)$ (see \cite{KNU2} Part IV 1.3).
Let ${\cal {B}}'_{\mathbb{R}}$ be the category of locally ringed spaces $S$ over ${\mathbb{R}}$ satisfying the following
condition (i) locally on $S$. Endow ${\mathbb{R}}^n$ with the sheaf $\cO_{{\mathbb{R}}^n}$ of real analytic functions.
(i) There are $n \geq 0$ and a morphism $\iota : S \to {\mathbb{R}}^n$ of locally ringed spaces over ${\mathbb{R}}$ such that $\iota$ is injective, the topology of $S$ coincides with the topology induced from that of ${\mathbb{R}}^n$, and the map $\iota^{-1}(\cO_{{\mathbb{R}}^n})\to \cO_S$ is surjective.
For an object $S$ of ${\cal {B}}'_{\mathbb{R}}$ , we often call the structural sheaf $\cO_S$ the {\it sheaf of real analytic functions} on $S$ (though $S$ need not be a real analytic space).
For an object $S$ of ${\cal {B}}'_{\mathbb{R}}$, a {\it log structure with sign} on $S$ means a log structure $M$ on $S$ endowed with
a submonoid sheaf $M_{>0}$ of $M$ satisfying the following (i) and (ii).
(i) $M_{>0}\supset \cO^\times_{S,>0}$ . Here $\cO^\times_{S,>0}$ denotes the subgroup sheaf of $\cO^\times_S$ consisting of all local
sections whose values are $> 0$.
(ii) The map $M_{>0} \times \{\pm 1\}\to M \;;\; (f,\epsilon) \mapsto \epsilon f$ is an isomorphism of sheaves. Here we
regard $\{\pm 1\} \subset \cO_S^\times \subset M$.
Let ${\cal {B}}'_{\mathbb{R}}(\log)$ be the category of objects of ${\cal {B}}'_{\mathbb{R}}$ endowed with an fs log structure with sign.
Real analytic manifolds with corners are regarded as objects of ${\cal {B}}'_{\mathbb{R}}(\log)$ (\cite{KNU2} Part IV 1.3.8 (2)).
The category ${\cal {B}}'_{\mathbb{R}}(\log)$ has fiber products (ibid.\ Proposition 1.3.11 (1)).
\end{sbpara}
\begin{sbpara}\label{BR2} For an object $X$ of ${\cal {B}}'_{\mathbb{R}}(\log)$, for an object $Y$ of ${\cal {B}}'_{\mathbb{R}}$ and for a morphism $Y\to X$ in ${\cal {B}}'_{\mathbb{R}}$, we have an fs log structure with sign $(M_Y, M_{Y,>0})$ on $Y$, called the {\it inverse image} of the log structure with sign $(M_X, M_{X,>0})$ of $X$, defined as follows. The log structure $M_Y$ is the inverse image of the log structure $M_X$, that is, $M_Y$ is the push-out of $\cO_Y^\times \leftarrow f^{-1}(\cO_X^\times) \to
f^{-1}(M_X)$ in the category of sheaves of commutative monoids on $Y$, and $M_{Y,>0}$ is the push-out of $\cO^\times_{Y,>0}\leftarrow f^{-1}(\cO^\times_{X,>0})\to f^{-1}(M_{X,>0})$ in the category of sheaves of commutative monoids on $Y$.
\end{sbpara}
\begin{sbpara} \label{BR3} (\cite{KNU2} Part IV 1.3.16.) Let $X$ be an object of ${\cal {B}}'_{\mathbb{R}}(\log)$ satisfying the following condition (C).
\smallskip
(C) The canonical map from $\cO_X$ to the sheaf of ${\mathbb{R}}$-valued functions on $X$ is injective.
\smallskip
Let $Y$ be a subset of $X$.
Then $Y$ has a structure of an object of ${\cal {B}}'_{\mathbb{R}}(\log)$ satisfying (C) such that for any object $S$ of ${\cal {B}}'_{\mathbb{R}}(\log)$ satisfying (C), $\text{Mor}_{{\cal {B}}'_{\mathbb{R}}(\log)}(S,Y)$ is identified with $\{f\in \text{Mor}_{{\cal {B}}'_{\mathbb{R}}(\log)}(S, X)\;|\;f(S)\subset Y\}$. This structure on $Y$ is defined as follows. The topology is the one as a subspace of $X$. $\cO_Y$ is the image of the canonical map from the pullback of $\cO_X$ on $Y$ to the sheaf of ${\mathbb{R}}$-valued functions on $Y$. The log structure with sign of $Y$ is the inverse image of that of $X$ (\ref{BR2}).
We will say this is the {\it structure of $Y$ as an object of ${\cal {B}}'_{\mathbb{R}}(\log)$ induced by the injection $Y\to X$} (or by the embedding of $Y$ in $X$).
\end{sbpara}
In the rest of this Section \ref{SL2an}, we state definitions and properties of the structures $D_{{\rm{SL}}(2)}^I$ and $D^{II}_{{\rm{SL}}(2)}$ of $D_{{\rm{SL}}(2)}$ and the structure of $D^{\star}_{{\rm{SL}}(2)}$ as objects of ${\cal {B}}'_{\mathbb{R}}(\log)$. The almost all proofs will be given in Section \ref{pfan}.
We first consider the case where $G$ is reductive. In this case, $D^I_{{\rm{SL}}(2)}=D^{II}_{{\rm{SL}}(2)}= D^{\star}_{{\rm{SL}}(2)}$.
\begin{sbprop}\label{emb1} Assume that $G$ is reductive. Let $\Phi\in {\cal {W}}(G)$ ($\ref{cW(G)}$). Take a splitting $\alpha$ of $\Phi$ and a distance $\beta$ to $\Phi$-boundary ($\ref{sPhi}$).
$(1)$ There is a unique map
$$\nu_{\alpha, \beta}: D_{{\rm{SL}}(2)}(\Phi) \to {\mathbb{R}}^{\Phi}_{\geq 0} \times D \times \prod_{W'\in \Phi} {\rm{spl}}(W')$$
satisfying the following conditions {\rm (i)} and {\rm (ii)}.
{\rm (i)} For $p\in D$, $\nu_{\alpha,\beta}(p)= (\beta(p), \alpha\beta(p)^{-1}p, ({\rm{spl}}^{{\rm {BS}}}_{W'}(p))_{W'\in \Phi})\in {\mathbb{R}}^{\Phi}_{> 0}\times D \times \prod_{W'\in \Phi} {\rm{spl}}(W')$.
{\rm (ii)} For $p\in D_{{\rm{SL}}(2)}(\Phi)$, $\nu_{\alpha,\beta}(p)$ is the limit of $\nu_{\alpha,\beta}(\tau_p(t)r)$ for a fixed point $r$ of the torus orbit ($\ref{red2}$) of $p$ and for $t\in {\mathbb{R}}_{>0}^{\Phi(p)}$ which tends to $(0,\dots,0)\in{\mathbb{R}}_{\geq 0}^{\Phi(p)}$.
$(2)$ This map $ \nu_{\alpha, \beta}$ is injective.
$(3)$ The structure of $D_{{\rm{SL}}(2)}(\Phi)$ as an object of ${\cal {B}}'_{\mathbb{R}}(\log)$ induced via the injection $\nu_{\alpha, \beta}$ (\ref{BR3}) is independent of the choice of $(\alpha,\beta)$.
\end{sbprop}
We will denote this map $\nu_{\alpha,\beta}$ as $p\mapsto (\beta(p), b_{\alpha,\beta}(p), ({\rm{spl}}_{W'}(p))_{W'})$.
Next we consider $D^{II}_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2)}$ for a general linear algebraic group $G$ over ${\mathbb{Q}}$.
\begin{sbprop}\label{emb2}
Let $\Phi\in {\cal {W}}(G_{{{\rm red}}})$. Let $D_{{\rm{SL}}(2)}(\Phi)$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}(\Phi)$) be the inverse image of $D_{{{\rm red}}, {\rm{SL}}(2)}(\Phi)$ in $D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$).
Let $\alpha$ be a splitting of $\Phi$ and let $\beta$ be a distance to $\Phi$-boundary ({\rm \ref{sPhi}}).
$(1)$ There is a unique map
$$\nu_{\alpha, \beta}: D_{{\rm{SL}}(2)}(\Phi)\to D_{{{\rm red}},{\rm{SL}}(2)}(\Phi)\times {\rm{spl}}(W) \times \overline{{\cal {L}}}$$
$$\text{(resp.}\;\; \nu^{\star}_{\alpha, \beta}: D^{\star}_{{\rm{SL}}(2)}(\Phi)\to D_{{{\rm red}},{\rm{SL}}(2)}(\Phi)\times {\rm{spl}}(W)\times \overline{{\cal {L}}}\text{)}$$
satisfying the following conditions {\rm (i)} and {\rm (ii)}.
{\rm (i)} For $x\in D$, set $p=x_{{{\rm red}}}$.
Then, $$\nu_{\alpha,\beta}(x)=(p, {\rm{spl}}_W(x), {\rm{Ad}}(\alpha\beta(p))^{-1}\delta(x))$$
$${\text (resp.\ }
\nu^{\star}_{\alpha, \beta}(x)=(p, {\rm{spl}}_W(x), {\rm{Ad}}(\alpha^\star\beta(p))^{-1}\delta(x)){\text ).}$$
{\rm (ii)} Let $x=(p,Z)\in D_{{\rm{SL}}(2)}(\Phi)$ (resp.\ $D^\star_{{\rm{SL}}(2)}(\Phi)$) ($\ref{DSL}$). Then I$\nu_{\alpha,\beta}(x)$ (resp.\ $\nu^{\star}_{\alpha, \beta}(x)$) is the limit of $\nu_{\alpha,\beta}(\tau_x(t)r)$ (resp.\ $\nu^{\star}_{\alpha, \beta}(\tau_x^{\star}(t)r)$) for a fixed point $r$ of $Z$, where $t\in {\mathbb{R}}_{>0}^{\Phi(x)}$ and $t\to (0, \dots,0)\in {\mathbb{R}}^{\Phi(x)}_{\geq 0}$.
$(2)$ This map $\nu_{\alpha,\beta}$ (resp.\ $\nu^{\star}_{\alpha, \beta}$) induces the bijection
$$D_{{\rm{SL}}(2)}(\Phi)\overset{\sim}\to \{(p, s, \delta)\in D_{{{\rm red}},{\rm{SL}}(2)}(\Phi)\times {\rm{spl}}(W) \times \overline{{\cal {L}}}\;|\;\delta\in \overline{{\cal {L}}}(b_{\alpha,\beta}(p))\}$$
$$(\text{resp.}\;\; D^{\star}_{{\rm{SL}}(2)}(\Phi)\overset{\sim}\to \{(p, s, \delta)\in D_{{{\rm red}},{\rm{SL}}(2)}(\Phi)\times {\rm{spl}}(W) \times \overline{{\cal {L}}}\;|\;\delta\in \overline{{\cal {L}}}(b_{\alpha,\beta}(p))\}).$$
Here $b_{\alpha,\beta}(p)$ is as after Proposition $\ref{emb1}$.
The ones for $\nu_{\alpha,\beta}$ and for $\nu^\star_{\alpha,\beta}$ coincide. %
$(3)$ The structure of $D_{{\rm{SL}}(2)}(\Phi)$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}(\Phi)$) as an object of ${\cal {B}}'_{\mathbb{R}}(\log)$ induced via the bijection $\nu_{\alpha, \beta}$ (resp.\ $\nu^{\star}_{\alpha, \beta}$) is independent of the choice of $(\alpha, \beta)$.
\end{sbprop}
In the bijection in the above (2), the image of $x\in D_{{\rm{SL}}(2)}(\Phi)$ (resp.\
$x\in D^{\star}_{{\rm{SL}}(2)}(\Phi)$) belongs to ${\cal {L}}$ if and only if $x$ is an $A$-orbit.
For $D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$), this Proposition \ref{emb2} is a $G$-MHS version of \cite{KNU2} Part II Proposition 3.2.6 (ii), Proposition 3.2.7 (ii), and the situation (c) of \cite{KNU2} Part IV Proposition 2.3.9 (resp.\ of the situation (a) of \cite{KNU2} Part IV Proposition 2.3.9) which treated the extended period domain $D_{{\rm{SL}}(2)}\supset D({\Lambda})$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}\supset D({\Lambda})$) for a classical period domain $D({\Lambda})$ (\ref{ss:Dold}).
\begin{sbrem}
This is a remark on the description of a related part of \cite{KNU2}.
There are fourteen \lq\lq resp.,''s in \cite{KNU2} Part IV 2.3.8, which are divided into two groups, and correspond only to the ones belonging to the same group.
Precisely, the fourth, the fifth, the seventh, and the last
\lq\lq resp.,''s correspond, and the other ten \lq\lq resp.,''s correspond.
But four and ten do not correspond.
\end{sbrem}
\begin{sbprop}\label{str2} $D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$) has a unique structure of an object of ${\cal {B}}'_{\mathbb{R}}(\log)$ such that for every $\Phi\in {\cal {W}}(G_{{{\rm red}}})$, $D_{{\rm{SL}}(2)}(\Phi)$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}(\Phi)$) is open in $D_{{\rm{SL}}(2)}$ and the induced structure on it coincides with the structure in Proposition $\ref{emb2}$ $(3)$.
\end{sbprop}
The $D_{{\rm{SL}}(2)}$ as an object ${\cal {B}}'_{\mathbb{R}}(\log)$ with the above structure is denoted by $D_{{\rm{SL}}(2)}^{II}$.
\medskip
For $D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$), this is the $G$-MHS version of the situation (c) (resp.\ (a)) of \cite{KNU2} Part IV Proposition 2.3.10 for $D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$) extending the classical period domain. For $D_{{\rm{SL}}(2)}$ of ibid., \cite{KNU2} Part II Theorem 3.2.10 also gives the same structure of $D^{II}_{{\rm{SL}}(2)}$.
\begin{sbprop} \label{SLbdl}
$(1)$ The map $D^{II}_{{\rm{SL}}(2)}\to D_{{{\rm red}}, {\rm{SL}}(2)}\times {\rm{spl}}(W)$ is proper.
It is an $\bar L$-bundle.
$(2)$ The map $D^{\star}_{{\rm{SL}}(2)}\to D_{{{\rm red}},{\rm{SL}}(2)}\times {\rm{spl}}(W)$ is proper. It is an $\bar L$-bundle.
\end{sbprop}
For $D^{II}_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$), this is a $G$-MHS version of \cite{KNU2} Part II Theorem 3.5.15 (resp.\ the situation (a) of
\cite{KNU2} Part IV Proposition 2.3.16).
We give a proof of Proposition \ref{SLbdl} assuming Proposition \ref{str2}. Let $p\in D_{{{\rm red}}, {\rm{SL}}(2)}(\Phi)$, $r:=b_{\alpha, \beta}(p)\in D_{{{\rm red}}}$. Take an open neighborhood $V$ of $r$ in $D_{{{\rm red}}}$ and a real analytic map $g: V\to G_{{{\rm red}}}({\mathbb{R}})$ such that $g(r)=1$ and such that $v=g(v)r$ for all $v\in V$. Let $U\subset D_{{{\rm red}}, {\rm{SL}}(2)}(\Phi)$ be the inverse of $V$ under $b_{\alpha, \beta}: D_{{{\rm red}},{\rm{SL}}(2)}(\Phi)\to D_{{{\rm red}}}$ and let $\tilde U$ be the inverse image of $U$ under the projection $D_{{\rm{SL}}(2)}(\Phi) \to D_{{{\rm red}}, {\rm{SL}}(2)}(\Phi)$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}(\Phi)\to D_{{{\rm red}},{\rm{SL}}(2)}(\Phi)$). Then we have an isomorphism $$\tilde U \overset{\sim}\to U \times {\rm{spl}}(W) \times \overline{{\cal {L}}}(r)\;;\; x \mapsto (x_{{{\rm red}}}, {\rm{spl}}_W(x), {\rm{Ad}}(g(b_{\alpha, \beta}(x_{{{\rm red}}})))^{-1}\delta(b_{\alpha, \beta}(x_{{{\rm red}}}))).$$
We next consider the structure $D_{{\rm{SL}}(2)}^I$ of $D_{{\rm{SL}}(2)}$.
\begin{sbprop}\label{emb3}
Let $\Phi\in {\cal {W}}(G)$.
$(1)$ Let $\alpha$ be a splitting of $\Phi$ and let $\beta$ be a distance to $\Phi$-boundary.
If $W\notin \Phi$ (resp.\ $W\in \Phi$),there is a unique map
$$\mu_{\alpha, \beta}: D_{{\rm{SL}}(2)}(\Phi)\to D \quad (\text{resp.} \; D_{{\rm{SL}}(2),{{\rm nspl}}}(\Phi) \to D)$$
satisfying the following conditions {\rm (i)} and {\rm (ii)}.
{\rm (i)} If $x\in D$ (resp.\ $x\in D_{{{\rm nspl}}}$),
$$\mu_{\alpha,\beta}(x)=\alpha(\beta(x))^{-1}x.$$
{\rm (ii)} Assume $W\notin \Phi$ (resp.\ $W\in \Phi$) and let $x=(p, Z)$ be an element of $D_{{\rm{SL}}(2)}(\Phi)$ (resp.\ $D_{{\rm{SL}}(2),{{\rm nspl}}}(\Phi)$).
Let $z\in Z$. Then
$\mu_{\alpha,\beta}(x)$ is the limit of $\mu_{\alpha,\beta}(\tau_x(t)z)$ where $t\in {\mathbb{R}}_{>0}^{\Phi(x)}$ and $t\to (0,\dots,0)\in {\mathbb{R}}_{\geq 0}^{\Phi}$.
$(2)$ If $W\notin \Phi$ (resp.\ $W\in \Phi$), the structure of $D_{{\rm{SL}}(2)}(\Phi)$ (resp.\ $D_{{\rm{SL}}(2), {{\rm nspl}}}(\Phi)$) as an object of ${\cal {B}}'_{\mathbb{R}}(\log)$ induced by the injection $$D_{{\rm{SL}}(2)}(\Phi) \;(\text{resp.} \; D_{{\rm{SL}}(2),{{\rm nspl}}}(\Phi))\to D^{II}_{{\rm{SL}}(2)}\times D\;;\; x\mapsto (x, \mu_{\alpha,\beta}(x))$$
($\ref{BR3}$) is independent of the choice of $(\alpha, \beta)$.
\end{sbprop}
This is a $G$-MHS version of
\cite{KNU2} Part II Proposition 3.2.6 (i), Proposition 3.2.7 (i).
\begin{sbprop}\label{str3} $D_{{\rm{SL}}(2)}$ has a unique structure %
of an object of ${\cal {B}}'_{\mathbb{R}}(\log)$ such that for every $\Phi\in {\cal {W}}(G)$ such that $W\notin \Phi$ (resp.\ $W\in \Phi$), $D_{{\rm{SL}}(2)}(\Phi)$ (resp.\ $D_{{\rm{SL}}(2),{{\rm nspl}}}(\Phi)$) is open in $D_{{\rm{SL}}(2)}$ and the induced structure on this coincides with that in Proposition $\ref{emb3}$ $(2)$.
\end{sbprop}
This generalizes \cite{KNU2} Part II Theorem 3.2.10 (i).
The structure of $D_{{\rm{SL}}(2)}$ in Proposition \ref{str3} as an object of ${\cal {B}}'_{\mathbb{R}}(\log)$ is denoted by $D_{{\rm{SL}}(2)}^I$.
The identity map of $D_{{\rm{SL}}(2)}$ is a morphism $D^I_{{\rm{SL}}(2)}\to D^{II}_{{\rm{SL}}(2)}$ of ${\cal {B}}'_{\mathbb{R}}(\log)$. The log structure with sign of
$D^I_{{\rm{SL}}(2)}$ is the inverse image of that of $D^{II}_{{\rm{SL}}(2)}$.
To prove the existence of the global structures Propositions \ref{str2} and \ref{str3}, we need the following Proposition \ref{U(p)} and the local descriptions in Theorems \ref{SL2loc}, \ref{SL2loc2}, and \ref{SL2loc3} which are proved by using Proposition \ref{U(p)}.
\begin{sbpara}\label{U(p)def}
Assume that $G$ is reductive.
Let $p \in D_{{\rm{SL}}(2)}$.
We define the subset $U(p)$ of $D_{{\rm{SL}}(2)}$ in the same way as in \cite{KU2} Section 10.2, as follows.
Let $(\rho,\varphi)$ be an ${\rm{SL}}(2)$-orbit belonging to $p$.
For each $J \subset \Phi(p)=\{1,\dots, n\}$, we define $p_J \in D_{{\rm{SL}}(2)}$ as the class of the ${\rm{SL}}(2)$-orbit $(\rho_J, \varphi_J)$ in $m$-variables, where $m$ is the cardinality of $J$, defined as follows.
$\rho_J(g_1,...,g_m) := \rho(h_1,...,h_n)$, $\varphi_J(z_1,...,z_m) := \varphi(w_1,...,w_n)$,
where $h_j$ and $w_j$ ($1\leq j\leq n$) are as follows. Write $J= \{s_1, \dots, s_m\}\subset \{1, \dots,n\}$, $s_1<\dots <s_m$. If $j \leq s_k$ for some $k$, define $h_j :=g_k$ and $w_j := z_k$ for the smallest integer $k$ with $j \leq s_k$. Otherwise, $h_j := 1$ and $w_j := i$.
We have $\Phi(p_J)=J$.
Let
$$U(p):=\bigcup_{J \subset \Phi(p)} G'_J({\mathbb{R}})\cdot p_J \subset
D_{{\rm{SL}}(2)}(\Phi(p)),$$
where $G'_J$ is the stabilizer of the weight filtrations $W^{(j)}$ $(j\in J)$
in $G'$.
\end{sbpara}
The following proposition is a generalization of \cite{KU2} Theorem 10.2.2.
\begin{sbprop}\label{U(p)}
The set $U(p)$ is open in $D_{{\rm{SL}}(2)}$.
\end{sbprop}
In the case $p\in D$, Proposition \ref{U(p)} follows from the case where $G$ is reductive of (1) of the following Lemma \ref{lemopen1}.
\begin{sblem}\label{lemopen1}
$(1)$ $D$ is a finite disjoint union of $G'({\mathbb{R}})G_u({\mathbb{C}})$-orbits which are open and closed.
$(2)$ $\Dc$ is a finite disjoint union of $G'({\mathbb{C}})$-orbits which are open and closed.
\end{sblem}
\begin{pf} These are reduced to the case where $G$ is reductive.
Assuming that $G$ is reductive, let $Z$ be the center of $G$.
Then these are reduced to the facts that
$G'({\mathbb{R}})Z({\mathbb{R}})$ is an open (and hence closed) subgroup of $G({\mathbb{R}})$ of finite index and $G'({\mathbb{C}})Z({\mathbb{C}})$ is an open (and hence closed) subgroup of $G({\mathbb{C}})$ of finite index.
\end{pf}
\begin{sbpara}\label{preloc}
Assume that $G$ is reductive. Let $p\in D_{{\rm{SL}}(2)}$, let $n$ be the rank of $p$, and take a representative $(\rho, \varphi)$ of $p$. Let ${{\bold r}}=\varphi({\rm {\mathbb i}})\in D$.
We have ${\rm {Lie}}\,(G'_{\mathbb{R}})= \bigoplus_{m\in {\mathbb{Z}}^n} \; {\rm {Lie}}\,(G'_{\mathbb{R}})_m$, where $${\rm {Lie}}\,(G'_{\mathbb{R}})_m=\{x\in {\rm {Lie}}\,(G'_{\mathbb{R}})\;|\; {\rm{Ad}}(\tau_p(t))x=\prod_{j=1}^n t_j^{m(j)}x \;\text{for all}\; t\in {\mathbb{R}}_{>0}^{\Phi}\}.$$
For $x\in {\rm {Lie}}\,(G'_{\mathbb{R}})$, let $x_m\in {\rm {Lie}}\,(G'_{\mathbb{R}})_m$ be the $m$-component of $x$.
Let $K_{{{\bold r}}}$ be the maximal compact subgroup of $G'({\mathbb{R}})$ associated to ${{\bold r}}$. Let $'K_{{{\bold r}}}$ be the stabilizer of ${{\bold r}}$ in $K_{{{\bold r}}}$.
Take ${\mathbb{R}}$-subspaces $R \subset {\rm {Lie}}\,(G'_{{\mathbb{R}}})$ and $S \subset {\rm {Lie}}\,(K_{{{\bold r}}})$
such that
$${\rm {Lie}}\,(G'_{\mathbb{R}})={\rm {Lie}}\,({\mathbb{R}}_{>0}^n) \oplus {\rm {Lie}}\,(K_{{{\bold r}}})\oplus R, \quad {\rm {Lie}}\,(K_{{{\bold r}}})={\rm {Lie}}\,('K_{{{\bold r}}})\oplus S,$$
where ${\mathbb{R}}^n_{>0}$ is embedded in $G'({\mathbb{R}})$ via $\tau_p$, and such that
$$R=\sum_{m\in {\mathbb{Z}}^{\Phi}} \; R\cap ({\rm {Lie}}\,(G'_{\mathbb{R}})_m \oplus {\rm {Lie}}\,(G'_{\mathbb{R}})_{-m}). $$
Such $R$ and $S$ exist.
Let $Y$ be the subset of ${\mathbb{R}}^n_{\geq 0}\times {\rm {Lie}}\,(G'_{\mathbb{R}}) \times {\rm {Lie}}\,(G'_{\mathbb{R}}) \times {\rm {Lie}}\,(G'_{\mathbb{R}}) \times S$
consisting of all elements $(t, f, g, h, k)$ satisfying the following conditions
(i)--(iv). Let $J=\{j\;|\; t_j=0\}\subset \{1,\dots,n\}$.
(i) Let $m\in {\mathbb{Z}}^{\Phi}$. Then: $g_m=0$ unless $m(j)=0$ for all $j\in J$. $f_m=0$ unless $m(j)\leq 0$ for all $j\in J$. $h_m=0$ unless $m(j)\geq 0$ for all $j\in J$.
(ii) Let $t'$ be any element of ${\mathbb{R}}^n_{>0}$ such that $t'_j =t_j$ for all $j\in \{1,\dots,n\}\smallsetminus J$. If $m\in {\mathbb{Z}}^n$ and $m(j)=0$ for all $j\in J$, then $f_m=(\prod_{j=1}^n (t'_j)^{m(j)})g_m$ and $h_m =(\prod_{j=1}^n (t'_j)^{m(j)})^{-1}g_m$.
(iii) We have $g\in R$ and we have $f_m+h_{-m}\in R$ for all $m\in {\mathbb{Z}}^n$.
(iv) $\exp(k){{\bold r}}\in G'_J({\mathbb{R}})\cdot{{\bold r}}$.
\medskip
Let $Y_0= \{(t,f,g,h, k)\in Y\;|\; t\in {\mathbb{R}}^n_{>0}\}$. Then $$Y_0 \overset{\sim}\to {\mathbb{R}}^n_{>0}\times R\times S\;;\; (t,f,g,h, k) \mapsto (t,g,k).$$ Hence by Lemma \ref{lemopen1}, the map
$$Y_0 \to D\;;\; (t,f,g,h,k)\mapsto \tau_p(t)\exp(g)\exp(k){{\bold r}} = \exp(f)\tau_p(t)\exp(k){{\bold r}}$$
is an open map.
\end{sbpara}
The following Theorems \ref{SL2loc} and \ref{SL2loc2} are variants of \cite{KNU2} Part II Theorem 3.4.4 and \cite{KNU2} Part IV Theorem 2.3.14.
\begin{sbthm}\label{SL2loc} Assume that $G$ is reductive. Let the notation be as in $\ref{preloc}$. Then there exists an open neighborhood $U$ of $(0, \dots, 0)$ in $Y$ and an open immersion $U\to D_{{\rm{SL}}(2)}$ which sends $(0,\dots, 0)$ to $p$ such that
if $U_0$ denotes the subset of $U$ consisting of $(t, f,g,h,k)$ such that $t\in {\mathbb{R}}^n_{>0}$, then it sends $(t,f,g,h,k)\in U_0$ to $\tau_p(t)\exp(g)\exp(k){{\bold r}}$.
\end{sbthm}
We return to the general $G$ not necessarily reductive, that is, in the next theorem, $G$ is a (general) algebraic linear group over ${\mathbb{Q}}$.
\begin{sbthm}\label{SL2loc2}
Let $x\in D_{{\rm{SL}}(2)}$ (resp.\ $D^{\star}_{{\rm{SL}}(2)}$) and let $p$ be the image of $x$ in $D_{{{\rm red}},{\rm{SL}}(2)}$. Take the spaces $Y$, $U$, $U_0$ in
Theorem $\ref{SL2loc}$ for $G_{{{\rm red}}}$ and $p$, and denote them by $Y_{{{\rm red}}}$, $U_{{{\rm red}}}$, and $U_{{{\rm red}},0}$, respectively. Let $V_{{{\rm red}}}$ be the image of the open
immersion $U_{{{\rm red}}}\to D_{{{\rm red}},{\rm{SL}}(2)}$ in Theorem $\ref{SL2loc}$. Let $L={\cal {L}}({{\bold r}})$. Let $V$ be the inverse image of $V_{{{\rm red}}}$ in $D^{II}_{{\rm{SL}}(2)}$
(resp.\ $D^{\star}_{{\rm{SL}}(2)}$). Then there is an open immersion $U:=U_{{{\rm red}}} \times {\rm{spl}}(W) \times \bar L \to V$ which sends
$(t, f, g, h, k, s, \delta)\in U_{{{\rm red}},0} \times {\rm{spl}}(W) \times L$ to the element of $D$ whose image
in $D_{{{\rm red}}}\times {\rm{spl}}(W) \times {\cal {L}}$ is $$(\tau_p(t)\exp(g)\exp(k){{\bold r}},\ s, \ {\rm{Ad}}(\tau_p(t)\exp(g)\exp(k))\delta)$$
$$ \text{(resp}. \;(\tau^{\star}_p(t)\exp(g)\exp(k){{\bold r}}, \ s, \ {\rm{Ad}}(\tau^{\star}_p(t)\exp(g)\exp(k))\delta)\text{)}$$
such that the diagram
$$\begin{matrix} U & \to & V\\
\downarrow &&\downarrow \\
U_{{{\rm red}}}&\to & V_{{{\rm red}}}\end{matrix}$$
is cartesian.
\end{sbthm}
\begin{sbpara} We next consider the local property of $D^I_{{\rm{SL}}(2)}$.
Let $x=(p, Z)\in D_{{\rm{SL}}(2)}$.
Take $z\in Z$ and let $s_0={\rm{spl}}_W(z)\in {\rm{spl}}(W)$. Then $s_0$ is independent of the choice of $z$.. Let ${{\bold r}}=z_{{{\rm red}}}\in D_{{{\rm red}}}$. Let $\delta_0= \delta_W(z)\in L:={\cal {L}}({{\bold r}})$. Let $n$ be the rank of $p$.
Let $E=L$ in the case where $x$ is an $A$-orbit, and let $E=\bar L\smallsetminus \{0\}$ in the case where $x$ is a $B$-orbit.
Take the space $Y$ in
Theorem $\ref{preloc}$ for $G_{{{\rm red}}}$ and $p$, and denote it by $Y_{{{\rm red}}}$ here. In the case where $x$ is a $B$-orbit, take a real analytic map $\beta_0: L\smallsetminus \{0\}\to {\mathbb{R}}_{>0}$ such that $\beta_0(c\circ \delta)= c\beta_0(\delta)$ for all $c\in {\mathbb{R}}_{>0}$ and $\delta\in L\smallsetminus \{0\}$. We define a subset $X$ of $Y_{{{\rm red}}}\times {\rm {Lie}}\,(G_{{\mathbb{R}}, u})\times {\rm {Lie}}\,(G_{{\mathbb{R}}.u})\times E$ as the set of
$(t,f,g,h,k, u, v, \delta)$ ($(t,f,g,h,k)\in Y_{{{\rm red}}}$, $u,v\in {\rm {Lie}}\,(G_{{\mathbb{R}},u})$, $\delta\in E$) satisfying the following conditions (i)--(iv). Let $n$ be the rank of $p$ and let $J:=\{j\;|\;1\leq j\leq n, t_j=0\}$, $m\in {\mathbb{Z}}^n$.
(i) $u_m=0$ unless $m(j)\leq 0$ for all $j\in J$.
(ii) $v_m=0$ unless $m(j)=0$ for all $j\in J$.
(iii) If $\delta\in \bar L\smallsetminus L$ (this happens only in the case where $x$ is a $B$-orbit), then $v=0$.
(iv) Assume $m(j)=0$ for all $j\in J$. Let $t'$ be an element of ${\mathbb{R}}^n_{>0}$ such that $t'_j=t_j$ if $j\in \{1,\dots, n\}\smallsetminus J$. Then if $x$ is an $A$-orbit, we have
$v_m = \sum_{j=1}^n (t'_j)^{-m(j)}u_m$. If $x$ is a $B$-orbit and $\delta\in L\smallsetminus \{0\}$, we have $v_m ={\rm{Ad}}(\tau_{x,0}(\beta_0(\delta)))^{-1}\prod_{j=1}^n (t'_j)^{-m(j)}u_m$.
The following Theorem \ref{SL2loc3} is a variant of \cite{KNU2} Part II Theorem 3.4.6.
\end{sbpara}
\begin{sbthm}\label{SL2loc3}
There are an open neighborhood $V$ of $(0, \dots, 0)$ in $Y \times {\rm {Lie}}\,(G_{{\mathbb{R}},u})\times {\rm {Lie}}\,(G_{{\mathbb{R}}, u})$ and an open immersion $U\to D^I_{{\rm{SL}}(2)}$, where $U$ is the inverse image of $V$ in $X$, which sends $(0, \dots, \delta_0)$ (resp.\ $(0, \dots, 0, 0\circ \delta)$) to $x$
such that if $U_0$ denotes the subset of $U$ consisting of all $(t,f,g,h,k, u,v,\delta)$ such that $t\in {\mathbb{R}}^{\Phi}_{>0}$ and $\delta\in L$, it sends
$(t,f,g,h,k,u,v,\delta)\in U_0$ to the element of $D$ whose image in $D_{{{\rm red}}}\times {\rm{spl}}(W) \times {\cal {L}}$ is
$$(\tau_p(t)\exp(g)\exp(k){{\bold r}},\ \exp(u)s_0, \ {\rm{Ad}}(\tau_p(t) \exp(g)\exp(k))\delta).$$
\end{sbthm}
\begin{sbrem}
In \cite{KNU2} Part II 3.4.5, in the definition of the space $Y^I(p, {{\bold r}}, R, S)$, the last sentence \lq\lq If $t_0=0$, ...'' in the condition (6${}'$) should be deleted.
After this modification, Part II Theorem 3.4.6 becomes correct.
In our series of papers \cite{KNU2}, Part II Theorem 3.4.6 is used in Part IV 2.7.16, but Part IV
2.7.16 is correct with the modified Part II Theorem 3.4.6.
Another remark concerning Part II 3.4.5 is that
the presentation of (5${}'$) can be simplified: The condition \lq\lq$\exp(v)s_{{{\bold r}}}=s_{{{\bold r}}}$'' there is equivalent to a simpler one \lq\lq$v=0$''.
\end{sbrem}
\begin{sbpara}
We can show that our ${\rm{SL}}(2)$-spaces belong to the category ${\cal {B}}'_{\mathbb{R}}(\log)^+$ of nice objects in ${\cal {B}}'_{\mathbb{R}}(\log)$ as in \cite{KNU2} Part IV Section 2.7, though the details are omitted.
\end{sbpara}
\subsection{Proofs for Section \ref{SL2an}}\label{pfan}
We give proofs of the statements in Section \ref{SL2an} that have not yet proved.
\begin{sbpara}\label{plot1}
The proofs of Proposition \ref{emb1} for $\Phi\in{\cal {W}}(G)$, Proposition \ref{emb2} for $\Phi\in{\cal {W}}(G_{{{\rm red}}})$, and Proposition \ref{emb3} for $\Phi\in{\cal {W}}(G)$ are similar to the corresponding parts in \cite{KNU2} Part II and Part IV, which are indicated after each proposition.
\end{sbpara}
\begin{sbpara}\label{plot2} The proofs for the remaining results in Section \ref{SL2an} are also parallel to the corresponding parts in \cite{KNU2} Part II and Part IV.
That is, by Propositions \ref{emb1}, \ref{emb2}, and \ref{emb3} for respective $\Phi$ already proved, we first endow the $\Phi$-parts of each sets $D_{{\rm{SL}}(2)}$ and $D_{{\rm{SL}}(2)}^{\star}$ with the space structures. Then we %
consider the following version of Proposition \ref{U(p)} for $\Phi$-part:
\medskip
(1)
$U(p)$ in \ref{U(p)def} is open in $D_{{\rm{SL}}(2)}(\Phi)$ if $\Phi(p)\subset \Phi$.
\medskip
We prove this (1) in \ref{U(p)pf} after preparations \ref{U(p)pr} and Lemma \ref{U(p)pr2}.
\end{sbpara}
\begin{sbpara}\label{U(p)pr} %
Let $\Phi\in {\cal {W}}(G)$. Fix a splitting $\alpha: {\mathbb{G}}_{m,{\mathbb{R}}}^{\Phi}\to G_{\Phi,{\mathbb{R}}}$ of $\Phi$ and a distance to
$\Phi$-boundary $\beta: D\to {\mathbb{R}}^{\Phi}_{>0}$. Let $J$ be a subset of $\Phi$. Let $n$ be the order of $\Phi$ and let $m$ be the order of $J$. Let $\alpha_J:{\mathbb{G}}_{m,{\mathbb{R}}}^J\to G_{J,{\mathbb{R}}}$ be the splitting of $J$ defined as follows. If we write the inclusion map $J\to \Phi$ between totally ordered sets as an injective increasing map $\theta:\{1, \dots, m\}\to \{1,\dots, n\}$, then $\alpha_J(t_1, \dots, t_m)= \alpha(t'_1, \dots, t'_n)$, where:
If $j \leq \theta(k)$ for some $k$, define $t'_j :=t_{\theta(k)}$ for the smallest integer $k$ such that $j \leq \theta(k)$. Otherwise, $t'_j := 1$.
Let $P$ be the subset of $D_{{\rm{SL}}(2)}$ consisting of all elements $p$ such that $\Phi(p)=J$ and $\tau_p=\alpha_J$.
Let $Q$ be the set of ${\rm{SL}}(2)$-orbits in $m$ variables whose classes belong to $P$.
We define a map
$$\theta_{\alpha, \beta}: P\to Q$$
as follows. (There is an evident projection $Q\to P$, but the composition $P\overset{\theta_{\alpha,\beta}}\longrightarrow Q\to P$ need not be the identity map.)
Let $p\in P$. Take an ${\rm{SL}}(2)$-orbit $(\rho, \varphi)$ with class $p$. Then $\theta_{\alpha, \beta}(p)$ is the ${\rm{SL}}(2)$-orbit $(\rho', \varphi')$ whose class $p'$ satisfies $\tau_{p'}=\tau_p=\alpha_J$ such that the $N_j$ of $\rho'$ (denote it by $N'_j$) for $1\leq j\leq m$ is defined by using $N_j:= (N_j$ of $\rho)$ as $N_j':={\rm{Ad}}(\alpha(\beta({{\bold r}})))^{-1}(N_j)$, where ${{\bold r}}=\varphi({\rm {\mathbb i}})$, and such that $\varphi'$ is defined as $\varphi'(z)= \alpha(\beta({{\bold r}}))^{-1}\varphi(z)$. Then $(\rho', \varphi')$ depends only on $p$ and is independent of the choice of $(\rho, \varphi)$.
\end{sbpara}
\begin{sblem}\label{U(p)pr2}
Let $E$ be a field of characteristic $0$ and let $V$ be a finite-dimensional vector space over $E$ on which the Lie algebra $\frak{sl}(2,E)^m$ acts. Denote the action of $X\in \frak{sl}(2,E)^m$ on $V$ by $[X, \cdot]$.
For $1\leq j\leq m$, let $N_j\in \frak{sl}(2, E)^m$ be the element whose $j$-th component is $\begin{pmatrix}0&1\\0&0\end{pmatrix}$ and whose $k$-th components are $0$ for all $k\neq j$, and let $Y_j\in \frak{sl}(2,E)^m$ be the element whose $j$-th component is $\begin{pmatrix} -1&0\\0&1\end{pmatrix}$ and whose $k$-th components are $0$ for all $k\neq j$. Let $B_j$ be the set of all elements $v$ of $V$ such that $[Y_j, v]=-2v$, $[Y_k, v]=0$ for all $k\neq j$, and $[N_k, v]=0$ for all $k\neq j$.
Let $S_j\in B_j$ for $1\leq j\leq m$. Then there is an element $v\in V$ such that $[Y_j, v]=0$ for all $j$ and such that $[N_j, v]=S_j$ for all $j$.
\end{sblem}
\begin{pf} Let $A_j$ be the set of all elements $v$ of $V$ such that $[Y_k, v]=0$ for all $k$ and $[N_k, v]=0$ for all $k\neq j$. For a finite-dimensional $E$-vector space $V'$ on which the Lie algebra $\frak{sl}(2,E)$ acts, if we define $N, Y\in \frak{sl}(2,E)$ in the similar way to the above and we define $V'_a=\{v\in V'\;|\; [Y, v]=av\}$ for $a\in {\mathbb{Z}}$, the map $V'_0\to V'_ {-2}\;;\;v\mapsto [N, v]$ is surjective as is well known.
By applying this to $V'=\{v\in V\; |\; [Y_k, v]= [N_k,v]=0 \; \text{for all} \; k\neq j\}$, we have that the map $A_j \to B_j \;;\; v \mapsto [N_j, v]$ is surjective. Take $v_j\in A_j$ such that $[N_j, v_j]=S_j$. Let $v=\sum_j v_j$. Then $[N_j, v]=S_j$ for all $j$.
\end{pf}
\begin{sbpara}\label{U(p)pf}
Assume that $G$ is reductive.
We prove %
\ref{plot2} (1).
To do so, it is enough to show the following (1).
(1) If $p' \in U(p)$ and if $p'_{{\lambda}}\in D_{{\rm{SL}}(2)}(\Phi)$ converges to $p'$, then $p'_{{\lambda}}\in U(p)$ for all sufficiently large ${\lambda}$. (Here $(p'_{{\lambda}})_{{\lambda}}$ denotes a directed family.)
Since $U(p') \subset U(p)$, by replacing $p'$ by $p$, we can reduce (1) to the following:
(2) If $p_{{\lambda}} \in D_{{\rm{SL}}(2)}(\Phi)$ converges to $p$, then $p_{{\lambda}} \in U(p)$ for all sufficiently large ${\lambda}$.
Dividing the sequence $(p_{{\lambda}})_{{\lambda}}$ into subsequences, we may assume that, for a fixed $J \subset \Phi=\{1, . . . , n\}$, the family of weight filtrations associated to $p_{{\lambda}}$ is $J$ for every ${\lambda}$. Since $D_{{\rm{SL}}(2)}(\Phi(p))$ is open in $D_{{\rm{SL}}(2)}(\Phi)$ (in fact, the former is the inverse image of the open set of ${\mathbb{R}}^{\Phi}_{\geq 0}$ consisting of elements whose $\Phi\smallsetminus \Phi(p)$-components are non-zero), we may assume $J\subset \Phi(p)$. Assume $J\subset \Phi(p)$. Let $m$ be the order of $J$.
Fix a splitting $\alpha$ of $\Phi$. Let $\alpha_{\Phi(p)}: {\mathbb{G}}_{m,{\mathbb{R}}}^{\Phi(p)} \to G_{\Phi,{\mathbb{R}}}$ (resp.\ $\alpha_J:{\mathbb{G}}_{m,{\mathbb{R}}}^J\to G_{J,{\mathbb{R}}}$) be the splitting of $\Phi(p)$ (resp.\ $J$) induced by $\alpha$ defined as in \ref{U(p)pr}.
We prove the following.
(3) We may assume $\tau_p= \alpha_{\Phi(p)}$ (\ref{U(p)pr}) and $\tau_{p_{\lambda}}=\tau_{p_J}=\alpha_J$ for all ${\lambda}$.
We prove (3).
There exists a unique $u\in (G_{\Phi(p)})_u({\mathbb{R}})=(G'_{\Phi(p)})_u({\mathbb{R}})$ such that $\tau_p(t)= u\alpha_{\Phi(p)}(t)u^{-1}$ ($t\in {\mathbb{R}}^{\Phi(p)}_{>0}$) and there exists a
unique $u_{{\lambda}}\in (G_J)_u({\mathbb{R}})=(G'_J)_u({\mathbb{R}})$ such that $\tau_{p_{{\lambda}}}(t) = u_{{\lambda}}\alpha_J(t)u^{-1}_{{\lambda}}$ ($t\in {\mathbb{R}}^J_{>0}$) . Then $\tau_{p_J}(t)= u\alpha_J(t)u^{-1}$ ($t\in {\mathbb{R}}^J_{>0}$).
For $j\in J$, we have the convergence ${\rm{spl}}_j^{{\rm {BS}}}(p_{{\lambda}})\to {\rm{spl}}_j^{{\rm {BS}}}(p) ={\rm{spl}}_j^{{\rm {BS}}}(p_J)$. Since $\tau_{p_{{\lambda}}}$ gives $({\rm{spl}}_j^{{\rm {BS}}}(p_{{\lambda}}))_{j\in J}$ and $\tau_{p_J}$ gives $({\rm{spl}}_j^{{\rm {BS}}}(p_J))_{j\in J}$,
$u_{{\lambda}}$ converges to $u$. Let $p'= u^{-1}p$
and $p'_{{\lambda}}:=u_{{\lambda}}^{-1}p_{{\lambda}}$. Then $\tau_{p'}=\alpha_{\Phi(p)}$ and $\tau_{p'_{{\lambda}}}=\tau_{p'_J}=\alpha_J$ and $p'_{{\lambda}}\to p'$. If we can prove that $p'_{{\lambda}}\in G'_J({\mathbb{R}})p'_J$ for ${\lambda}$ sufficiently large, we can obtain $p_{{\lambda}}\in G'_J({\mathbb{R}})p_J$ for ${\lambda}$ sufficiently large. This proves (3).
We now assume $\tau_p=\alpha_{\Phi(p)}$ and $\tau_{p_{\lambda}}=\tau_{p_J}= \alpha_J$ for all ${\lambda}$.
Fix a distance $\beta$ to $\Phi$-boundary.
Let $(\rho'_J, \varphi'_J):=\theta_{\alpha,\beta}(p_J)$ and $(\rho'_{{\lambda}}, \varphi'_{{\lambda}}):=\theta_{\alpha, \beta}(p_{{\lambda}})$ (\ref{U(p)pr}). Let
$(\rho'_J, \xi'_{1,J})$ and $(\rho_{{\lambda}}', \xi'_{1,{\lambda}})$ be the elements of the set
(iv) in Lemma \ref{redp1} corresponding to $(\rho'_J, \varphi'_J)$ and $(\rho_{{\lambda}}', \varphi'_{{\lambda}})$, respectively.
We prove the following.
(4) $(\rho'_{\lambda}, \xi'_{1,{\lambda}}) $ converges to $(\rho'_J, \xi'_{1, J})$ for the compact-open topology of the space of continuous homomorphisms ${\rm{SL}}(2, {\mathbb{R}})^m\times S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}}) \to G({\mathbb{R}})$.
We prove (4).
For $j\in J$, let $D^{(j)}$ be the subset of $D$ consisting of all $F$ such that for every $V\in {\operatorname{Rep}}(G)$, $(W^{(j)},F(V))$ is an ${\mathbb{R}}$-mixed Hodge structure. Then we have a continuous map $\delta_{W^{(j)}}: D^{(j)}\to {\rm {Lie}}\,(G_{{\mathbb{R}}})$ (the $\delta$ in \ref{CKSdelta} for the weight filtration $W^{(j)}$).
Let $(\rho_J, \varphi_J)$ and $(\rho_{{\lambda}}, \varphi_{{\lambda}})$ be ${\rm{SL}}(2)$-orbits in $m$ variables whose classes in $D_{{\rm{SL}}(2)}$ are $p_J$ and $p_{{\lambda}}$, respectively.
Then
$\nu_{\alpha, \beta}(p)=\nu_{\alpha, \beta}(p_J)= \alpha\beta({{\bold r}})^{-1}{{\bold r}}$, where ${{\bold r}}=\varphi_J({\rm {\mathbb i}})$. Since ${{\bold r}}= \exp(iN_1+\dots +iN_j)\varphi_J(\{0\}^j \times \{i\}^{m-j})$, where $N_j$ is the $N_j$ of $\rho_J$, we have $\nu_{\alpha, \beta}(p_J)\in \bigcap_{j\in J} D^{(j)}$ and $\delta_{W^{(j)}}(\nu_{\alpha,\beta}(p_J))=N_1'+\dots+N_j'$ for $1\leq j\leq m$, where $N'_j$ is the $N_j$ of $\rho'_J$. Similarly, $\nu_{\alpha, \beta}(p_{{\lambda}}) \in \bigcap_{j\in J} D^{(j)}$ and $\delta_{W^{(j)}}(\nu_{\alpha, \beta}(p_{{\lambda}}))= N'_{1, {\lambda}}+\dots+ N'_{j,{\lambda}}$ for $1\leq j\leq m$, where $N'_{j,{\lambda}}$ is the $N_j$ of $\rho'_{{\lambda}}$. Since
$p_{{\lambda}}$ converges to $p$, $\nu_{\alpha, \beta}(p_{{\lambda}})$ converges to $\nu_{\alpha, \beta}(p)=\nu_{\alpha, \beta}(p_J)$. Hence $N'_{j, {\lambda}}$ converges to $N'_j$ for $1\leq j\leq m$.
Furthermore, $\varphi'_{{\lambda}}({\rm {\mathbb i}})=\nu_{\alpha,\beta}(p_{{\lambda}})$ converges to $\varphi'_J({\rm {\mathbb i}})= \nu_{\alpha, \beta}(p_J)$.
This proves (4).
We prove the following.
(5) If ${\lambda}$ is sufficiently large, there is $g_{{\lambda}}\in G'({\mathbb{R}})$ which commutes with $\alpha_J(t)$ for all $t\in ({\mathbb{R}}^\times)^m$ such that $N'_{j, {\lambda}}={\rm{Ad}}(g_{{\lambda}})N'_j$ for all $j\in J$ and such that $g_{{\lambda}}\to 1$.
We apply Lemma \ref{U(p)pr2} to the case $E={\mathbb{R}}$, $V={\mathbb{R}} \otimes_{\mathbb{Q}} {\rm {Lie}}\,(G')$, and the action of $\frak{sl}(2, {\mathbb{R}})^m$ on $V$ is induced by the adjoint action of ${\rm{SL}}(2)^m_{\mathbb{R}}$ on $V$ via $\rho_J$. Let $H\subset G'_{\mathbb{R}}$ be the centralizer of the image of $\alpha_J: {\mathbb{G}}_{m,{\mathbb{R}}}^m \to G'_{\mathbb{R}}$. Let $B_j$ ($1\leq j\leq m$) be as in Lemma \ref{U(p)pr2}, let $B= \prod_{j=1}^m B_j$, and let $b= (N_j')_{1\leq j\leq m}\in B$. Then ${\rm {Lie}}\,(H)= \{v\in V\;|\; [Y_j, v]=0\; \text{for}\; 1\leq j\leq m\}$. The map $H \to B\;;\;g \mapsto {\rm{Ad}}(g)b$ induces the map ${\rm {Lie}}\,(H) \to T_b(B)=B$, where $T_b(B)$ denotes the tangent space of $B$ at $b$, and this last map is written as $v\mapsto ([v, N'_j])_{1\leq j \leq m}$. By Lemma \ref{U(p)pr2}, this last map is surjective. Hence the map $H \to B$ is smooth at $1\in H({\mathbb{R}})$ as a morphism of algebraic varieties. Hence there is $g_{{\lambda}}\in H({\mathbb{R}})$, $g_{{\lambda}}\to 1$ such that ${\rm{Ad}}(g_{{\lambda}})N_j= N_{j,{\lambda}}$. Thus (5) is proved.
Now we complete the proof of %
\ref{plot2} (1).
By (5),
we may assume that $\rho'_{{\lambda}}=\rho'_J$.
Consider $\xi'_{1,{\lambda}}, \xi'_{1,J}: S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}\to C_{G'}(\rho)$ (Lemma \ref{redp1}).
Here $C_{G'}(\rho)$ denotes the centralizer.
We use a result in \cite{LW} concerning homomorphisms from compact groups to locally compact groups, applied to homomorphisms from the compact group $S^{(1)}_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})$ to the locally compact group $C_{G'}(\rho)({\mathbb{R}})$ given by $\xi'_{1,{\lambda}},\xi'_{1,J}$. By the above-mentioned result, if ${\lambda}$ is sufficiently large, there is an $A\in C_{G'_{\mathbb{R}}}(\rho)({\mathbb{R}})$
such that $\xi'_{1,{\lambda}}=A\xi'_{1,J}A^{-1}$. Hence $(\rho'_{{\lambda}}, \xi'_{1,{\lambda}})=A(\rho'_J, \xi'_{1,J})A^{-1}$ and hence, by Lemma \ref{redp1},
$(\rho'_{{\lambda}}, \varphi'_{{\lambda}})$ is the twist of $(\rho'_J, \varphi'_J)$ by $A$.
Hence $p_{{\lambda}}$ is the twist of $p_J$ by an element of $G'_J({\mathbb{R}})$.
Thus \ref{plot2} (1) is proved.
\end{sbpara}
\begin{sbpara}\label{glwd}
As in \cite{KNU2} Part II Section 3.4, we can reformulate Theorems \ref{SL2loc}, \ref{SL2loc2}, and \ref{SL2loc3} in terms of $\Phi$-parts,
which will be equivalent to the original statements as soon as the global space structures will be well-defined (Propositions \ref{str2} and \ref{str3}), and
whose proofs are %
similar to those of \cite{KNU2} Part II Section 3.4 and Part IV Theorem 2.3.14.
Here, the openness of $U(p)$ in $D_{{\rm{SL}}(2)}(\Phi)$ in \ref{plot2} (1)
is used in connection with the condition (iv) in \ref{preloc}.
The well-definedness of the global structures as objects of ${\cal {B}}'_{\mathbb{R}}(\log)$ on the ${\rm{SL}}(2)$-spaces (Proposition \ref{str2}, Proposition \ref{str3}) follows from the versions of Theorems \ref{SL2loc}, \ref{SL2loc2} and \ref{SL2loc3} in terms of $\Phi$-parts explained above
similarly as in the corresponding results in \cite{KNU2} Part II and Part IV indicated after each proposition.
That is, first we directly prove that the structure on each $\Phi$-part is independent on the choices of $(\alpha,\beta)$.
Next, since the intersection of $\Phi$-part and $\Phi'$-part coincides with $\Phi \cap \Phi'$-part, it is enough to show that the localization map
from $\Phi'$-part to $\Phi$-part is an open immersion whenever $\Phi'\subset \Phi$.
The last statement is proved by using the version of Theorems \ref{SL2loc}, \ref{SL2loc2} and \ref{SL2loc3} in terms of $\Phi$-parts. %
\end{sbpara}
\subsection{The fan of parabolic subgroups}\label{Fan}
\begin{sbpara}\label{fan12} For a split torus $T$ over a field, let $X(T)=\Hom(T, {\bf G}_m)$ be the group of characters of $T$ and let $X_*(T)=\Hom({\bf G}_m, T)$ be the group of cocharacters of $T$.
In this Section \ref{Fan}, we give a variant \ref{Wfan} of the classical theory of Weyl fan (\ref{XTW}). Let $E$ be a field of characteristic $0$, let $\cG$ be a reductive algebraic group over $E$, let $T$ be a split torus over $E$, and let $a: T\to \cG$ be a homomorphism. Then in \ref{Wfan}, we will have a bijection between a certain set of parabolic subgroups of $\cG$ and the set of all cones of a certain cone decomposition of ${\mathbb{R}} \otimes X_*(T)$. In the case where $E$ is algebraically closed and $T$ is a maximal torus in $\cG$ with the inclusion map $a:T\to \cG$, this is the well-known bijection (\ref{XTW}) between the set of all parabolic subgroups of $\cG$ which contain $T$ and the set of all cones of a cone decomposition called Weyl fan. This variant \ref{Wfan} should be also well-known, and %
is treated in our previous work \cite{KNU2} Part IV Section 2.6 in a certain situation.
In the next Section \ref{s:star_to_BS}, we will use the results in \ref{Fan} to connect the space of ${\rm{SL}}(2)$-orbits and the space of Borel--Serre orbits
\end{sbpara}
\begin{sbpara}\label{Fan1}
Let $X^*$ and $X_*$ be finitely generated free abelian groups which are the ${\mathbb{Z}}$-duals of each other. We will denote the paring $X_*\times X^*\to {\mathbb{Z}}$ by $\langle\cdot,\cdot\rangle$.
Assume that we are given a finite subset $R$ of $X^*$ such that $R=-R$.
In \ref{lemR}--\ref{SigR2}, we will show that we have a fan $\Sigma(R)$ whose support is ${\mathbb{R}} \otimes X_*$.
(Actually, the cones in this fan need not be sharp, and so $\Sigma(R)$ should be called a quasi-fan. But we call it a fan for simplicity.)
For a finite subset $S$
of $X^*$, let $\langle S\rangle$ be the cone in ${\mathbb{R}}\otimes X^*$ generated by $S$ and let
$${\sigma}(S)=\{y\in {\mathbb{R}}\otimes X_*\;|\; \langle y, x \rangle \geq 0\;\text{for all}\; x\in S\}.$$
We have $\langle S\rangle= \{x\in X^*\;|\; \langle y, x\rangle \geq 0\; \text{for all}\; y\in {\sigma}(S)\}$.
\end{sbpara}
\begin{sblem}\label{lemR} For a subset $R'$ of $R$, the following two conditions {\rm (i)} and {\rm (ii)} are equivalent.
{\rm (i)} There is $y\in X_*$ such that $R'=\{x\in R\;|\; \langle y, x\rangle \geq 0\}$.
{\rm (ii)} The following {\rm (ii-1)} and {\rm (ii-2)} are satisfied.
{\rm (ii-1)} $R=R'\cup {\rm (-R')}$.
{\rm (ii-2)} $\langle R'\rangle \cap R = R'$.
\end{sblem}
\begin{pf}
The implication (i) $\Rightarrow$ (ii) is clear.
We prove (ii) $\Rightarrow$ (i). Let $y$ be an interior point of ${\sigma}(R')$. We prove that $R'$ satisfies (i) with this element $y$. Let $x\in R$ and assume $\langle y, x\rangle \geq 0$. We prove $x\in R'$. Assume $x\notin R'$. Then since $R=R'\cup (-R')$, we have $-x\in R'$. Hence $\langle y, -x\rangle \geq 0$ and hence $\langle y,-x\rangle =0$. Since $y$ is in the interior of ${\sigma}(R')$ and $-x\in R'$, this shows that $-x=0$. Hence $x=-x\in R'$.\end{pf}
\begin{sbpara}\label{SigR} Let $\Sigma^*(R)$ be the set of all subsets $R'$ of $R$ satisfying the equivalent conditions in \ref{lemR}.
Note that $R'\in \Sigma^*(R)$ is recovered from ${\sigma}(R')$ as $R'=\{x\in R\;|\;\langle y, x\rangle\geq 0\; \text{for all}\; y\in {\sigma}(R')\}$.
Let $$\Sigma(R)= \{{\sigma}(R')\;|\; R'\in \Sigma^*(R)\}.$$ We have a bijection $\Sigma^*(R) \to \Sigma(R)\;;\; R'\mapsto {\sigma}(R')$.
\end{sbpara}
\begin{sbprop}\label{SigR2} $\Sigma(R)$ is a rational finite fan whose support is ${\mathbb{R}} \otimes X_*$.
\end{sbprop}
\begin{pf} We need to prove the following (i), (ii) and (iii).
(i) If ${\sigma}\in \Sigma(R)$ and if $\tau$ is a face of ${\sigma}$, then $\tau\in \Sigma(R)$.
(ii) If ${\sigma}, \tau\in \Sigma(R)$, then ${\sigma}\cap \tau\in \Sigma(R)$.
(iii) If ${\sigma}, \tau\in \Sigma(R)$ and $\tau\subset {\sigma}$, $\tau$ is a face of ${\sigma}$.
Proof of (i). Let ${\sigma}={\sigma}(R')$ ($R'\in \Sigma^*(R)$). Let $\tau$ be a face of ${\sigma}$ and let $A=\{x\in \langle R'\rangle\;|\; \langle y, x\rangle =0\;\text{for all}\; y\in \tau\}$. Then $A$ is a face of $\langle R'\rangle$ and $\tau=\{y\in {\sigma}\;|\; \langle y,x\rangle=0\; \text{for all}\; x\in A\}$. Let $S=R'\cap A$. Since the cone $\langle R'\rangle$ is generated by $R'$, the cone $A$ is generated by $S$. Hence $\tau= \{y\in {\sigma}\;|\; \langle y, x\rangle =0\; \text{for all}\; x\in S\}= {\sigma}(R'\cup (-S))\in \Sigma(R)$.
Proof of (ii). For $R'_1,R'_2\in \Sigma^*(R)$, we have ${\sigma}(R'_1)\cap {\sigma}(R'_2)={\sigma}(R'_3)$, where $R'_3=\langle R'_1\cup R'_2\rangle \cap R\in \Sigma^*(R)$.
Proof of (iii). If $R', R''\in \Sigma^*(R)$ and if $R'\subset R''$, then $R''=R'\cup (-S)$ for some subset $S$ of $R'$, and hence ${\sigma}(R'')$ is a face of ${\sigma}(R')$.
We prove that the support of $\Sigma(R)$ is ${\mathbb{R}} \otimes X_*$. It is sufficient to prove that for each $y\in X_*$, there is $R'\in \Sigma^*(R)$ such that $y\in {\sigma}(R')$. In fact $R'=\{x\in R\;|\; \langle y,x \rangle \geq 0\}$ has this property.
\end{pf}
\begin{sbpara}\label{XT}
Now let $\cG$ be a reductive algebraic group over a field $E$ of characteristic $0$, let $T$ be an $E$-split torus, and let $a:T\to \cG$ be a homomorphism.
Let $$X^*=X(T)=\Hom(T, {\mathbb{G}}_m), \quad X_*=X_*(T)= \Hom({\mathbb{G}}_m, T)=\Hom(X(T), {\mathbb{Z}}).$$
Let $$R= \{\chi\in X^*\;|\; {\rm {Lie}}\,(\cG)_{\chi}\neq 0\},$$
where ${\rm {Lie}}\,(\cG)_{\chi}$ denotes the part of ${\rm {Lie}}\,(\cG)$ on which the adjoint action of $T$ via $a$ is given by $\chi$.
\end{sbpara}
\begin{sbpara}\label{XTR} Let the notation be as in \ref{XT}. Then we have $R=-R$. This can be seen as follows.
In the case where $E$ is algebraically closed and $T$ is a maximal torus in $\cG$ with $a:T \to \cG$ the inclusion map, $R=-R$ is well-known in the theory of root systems.
The general case is reduced to this case by taking an algebraic closure %
$\bar E$ of $E$ and a maximal torus in %
$\cG \otimes_E \bar E$ which contains the image of %
$a:T\otimes_E \bar E \to \cG \otimes_E \bar E$.
\end{sbpara}
\begin{sblem}\label{XT2} Let the notation be as in $\ref{XT}$. Then for a connected closed algebraic subgroup $P$ of $\cG$, the following two conditions {\rm (i)} and {\rm (ii)} are equivalent.
{\rm (i)} There is $y\in X_*$ such that $P$ is the parabolic subgroup of $\cG$ associated to the homomorphism $a\circ y: {\bf G}_m \to \cG$ in the sense of $\ref{P_is_para}$.
{\rm (ii)} There is $R'\in \Sigma^*(R)$ such that ${\rm {Lie}}\,(P)= \bigoplus_{\chi\in R'} \; {\rm {Lie}}\,(\cG)_{\chi^{-1}}$.
Here we denote the group law of $X^*$ multiplicatively, and so $\chi^{-1}$ denotes the inverse of $\chi$.
\end{sblem}
\begin{pf} Assume that (i) is satisfied. Let $R'\in \Sigma^*(R)$ be the set associated to $y$ as in \ref{lemR} (i). Then (ii) is satisfied by this $R'$.
Conversely assume that (ii) is satisfied. Take $y\in X_*$ which gives $R'$ as in \ref{lemR} (i), and let $P_1$ be the parabolic subgroup of $\cG$ associated to $a\circ y$. Then ${\rm {Lie}}\,(P)={\rm {Lie}}\,(P_1)$. Since both $P$ and $P_1$ are connected, we have $P=P_1$.
\end{pf}
\begin{sbpara}\label{Wfan}
Let the notation be as in \ref{XT}.
Let ${\Cal {P}}$ be the set of all parabolic subgroups $P$ of $\cG$ satisfying the equivalent conditions in Lemma \ref{XT2}.
For $P\in {\Cal {P}}$, let $R(P):= \{\chi\in X^*\;|\; {\rm {Lie}}\,(P)_{\chi^{-1}}\neq 0\}.$
By Lemma \ref{XT2},
we have a bijection
$${\Cal {P}} \quad\overset{1:1}\longleftrightarrow \quad \Sigma^*(R)$$
which sends $P\in {\Cal {P}}$ to $R(P)$ and conversely sends $R'\in \Sigma^*(R)$ to the unique parabolic subgroup $P$ of $\cG$ such that ${\rm {Lie}}\,(P)= \bigoplus_{\chi\in R'}\; {\rm {Lie}}\,(\cG)_{\chi^{-1}}$.
Hence we have the composite bijection $${\Cal {P}}\quad \overset{1:1}\longleftrightarrow \quad \Sigma(R).$$
For $P\in {\Cal {P}}$, we denote the corresponding element of $\Sigma(R)$ by ${\sigma}(P)$.
\end{sbpara}
\begin{sbpara}\label{XTW} Let the notation be as in \ref{XT}. Assume that $E$ is algebraically closed, $T$ is a maximal torus in $\cG$, and $a:T\to \cG$ is the inclusion map.
In this case, $\Sigma(R)$ is called the Weyl fan and ${\Cal {P}}$ coincides with the set of
all parabolic subgroups of $\cG$ which contain $T$.
If $P\in {\Cal {P}}$ is a minimal parabolic subgroup, i.e., a Borel subgroup, the open cone of interior points of ${\sigma}(P)$ is called the dominant Weyl chamber for $P$ (\cite{Mi2} Definition 21.35)
and $\Sigma(R) =\bigcup_w\; (\text{faces of $w{\sigma}(P)$})$,
where $w$ ranges over all elements of the Weyl group (while $P$ is fixed).
See \cite{Sp} Theorem 8.4.3.
\end{sbpara}
\begin{sbpara}\label{Wfan2} Let the notation be as in \ref{XT}. Now fix an isomorphism $T\simeq {\mathbb{G}}_{m,E}^n$.
Then $X(T)$ is identified with ${\mathbb{Z}}^n$. Let $X(T)_+={\mathbb{N}}^n\subset {\mathbb{Z}}^n=X(T)$. Let $R_+=R\cap X(T)_+$. Let $\Sigma^*(R)_+$ be the subset of $\Sigma^*(R)$ consisting of all $R'$ such that $R_+\subset R'$. Let ${\Cal {P}}_+$ be the corresponding subset of ${\Cal {P}}$ and let $\Sigma(R)_+\subset \Sigma(R)$ be the corresponding subset. Then
$\Sigma(R)_+$ is a subfan of $\Sigma(R)$. Its support is $X_*(R)_{{\mathbb{R}},+}={\mathbb{R}}^n_{\geq 0}={\sigma}(R_+)\subset {\mathbb{R}}^n={\mathbb{R}}\otimes X_*$. (In fact, if $y\in X_*$ and $y\in {\sigma}(R_+)$, then for $R':= \{x\in X^*\; |\; \langle y, x\rangle \geq 0\}$, we have $R'\in \Sigma^*(R)_+$ and $y\in {\sigma}(R')$.)
For $1\leq j\leq n$, let $W^{(j)}$ be the increasing filtration on the functor $V\mapsto V$ from ${\operatorname{Rep}}_E(\cG)$ to the category of $E$-vector spaces associated to ${\mathbb{G}}_{m,E}\overset{\text{$j$-th}}\longrightarrow {\mathbb{G}}_{m,E}^n \to \cG$ (\ref{Wlem}), where $j$-th means the $j$-th component. Let $\cG_\Phi\subset \cG$ be the stabilizer of $\Phi:=(W^{(j)})_{1\leq j\leq n}$, and let $\cG^{\circ}_\Phi$ be its connected component containing $1$. Then $\cG^{\circ}_\Phi$ is the unique connected algebraic subgroup of $\cG$ such that ${\rm {Lie}}\,(\cG^{\circ}_\Phi)=\bigoplus_{\chi\in R_+} {\rm {Lie}}\,(\cG)_{\chi^{-1}}$.
For $P\in {\Cal {P}}$, $P\in {\Cal {P}}_+$ if and only if $\cG^{\circ}_{\Phi}\subset P$.
\end{sbpara}
\begin{sbpara}\label{Wfan3} This is a complement to \ref{Wfan2}. Let $\cG$ be a reductive group and assume that we are given increasing filtrations
$W^{(j)}$ ($1\leq j\leq n$) on the functor $V\mapsto V$ from ${\operatorname{Rep}}_E(\cG)$ to the category of
$E$-vector spaces such that there is a homomorphism ${\mathbb{G}}_{m,E}^n \to \cG$ whose $j$-th ${\mathbb{G}}_{m,E}\to \cG$ gives $W^{(j)}$ for $1\leq j\leq n$. Let $\Phi=(W^{(j)})_{1\leq j\leq n}$ and let $\cG_\Phi$ be the stabilizer of $\Phi$. Then we have a canonical homomorphism
$T:={\mathbb{G}}_{m,E}^n\to \cG_{\Phi, {{\rm red}}}$ whose every lifting $T\to \cG_\Phi$ gives $\Phi$. The sets $R_+$, $\Sigma^*(R)_+$, and ${\Cal {P}}_+$, and the fan $\Sigma(R)_+$ associated to ${\mathbb{G}}_{m,E}^n\to \cG$ are independent of the choice of such lifting, for such liftings are conjugates in $\cG_\Phi$ of each other.
\end{sbpara}
\begin{sblem}\label{lemR+} Let the situation and the notation be as in $\ref{Wfan2}$. Then the following three conditions are equivalent.
{\rm (i)} $\cG^{\circ}_\Phi$ is a parabolic subgroup of $\cG$.
{\rm (ii)} $R_+\in \Sigma^*(R)$, that is, $R=R_+\cup (-R_+)$.
{\rm (iii)} $\Sigma(R)_+$ coincides with the set of all faces of ${\sigma}(R_+)$.
\end{sblem}
\begin{pf}
This is clear.
\end{pf}
\subsection{Relation of $D^{\star}_{{\rm{SL}}(2)}$ and $D_{{\rm {BS}}}$}\label{s:star_to_BS}
\label{ss:star_to_BS} We relate $D^{\star}_{{\rm{SL}}(2)}$ and $D_{{\rm {BS}}}$. To do this, the problem is that $D^{\star}_{{\rm{SL}}(2)}$ does not involve parabolic subgroups though $D_{{\rm {BS}}}$ does. We define a modification $$D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}, %
\text{which is something like}\;\;%
\lq\lq D^{\star}_{{\rm{SL}}(2)}%
\;\text{plus parabolic subgroups,}
"%
$$
of $D^{\star}_{{\rm{SL}}(2)}$ and connect $D^{\star}_{{\rm{SL}}(2)}$ and $D_{{\rm {BS}}}$ via $D^{\star, {\rm {W}}}_{{\rm{SL}}(2)}$. More precisely, we define a log modification $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}\to D^{\star}_{{\rm{SL}}(2)}$ associated to cone decompositions related to parabolic subgroups, and define a morphism $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$.
\begin{sbpara}\label{lgmdW}
Assume that $G$ is reductive.
For $\Phi\in {\cal {W}}(G)$ and for a splitting $\alpha: {\mathbb{G}}_{m,{\mathbb{R}}}^{\Phi}\to G_{\mathbb{R}}$ of $\Phi$, we apply \ref{Wfan3} to the case $E={\mathbb{R}}$, $\cG=G_{\mathbb{R}}$, $T= {\mathbb{G}}_{m,{\mathbb{R}}}^{\Phi}$, and $a=\alpha$.
Note that for $\Phi\in {\cal {W}}(G)$, we have $X({\mathbb{G}}_m^{\Phi})_+={\mathbb{N}}^{\Phi} \to M_{>0}/\cO^\times_{>0}$ on $D_{{\rm{SL}}(2)}(\Phi)$. The cone decomposition of $X_*({\mathbb{G}}_m^{\Phi})_{{\mathbb{R}},+}$ in \ref{Wfan3}
defines a log modification $D^{{\rm {W}}}_{{\rm{SL}}(2)}(\Phi)$ of $D_{{\rm{SL}}(2)}(\Phi)$. It is independent of the choice of the splitting $\alpha$. When $\Phi$ moves, these are glued to a log modification $D^{{\rm {W}}}_{{\rm{SL}}(2)}\to D_{{\rm{SL}}(2)}$.
(Here the superscript W respects the Weyl fan.
For a log modification in the category ${\cal {B}}'_{\mathbb{R}}(\log)$, see \cite{KNU2} Part IV 1.4.6.) %
In general, for a linear algebraic group $G$ over ${\mathbb{Q}}$, we define $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$ to be the fiber product of
$D^{\star}_{{\rm{SL}}(2)}\to D_{{{\rm red}},{\rm{SL}}(2)} \leftarrow D^{{\rm {W}}}_{{{\rm red}},{\rm{SL}}(2)}$.
\end{sbpara}
\begin{sbpara}\label{lgmdW2} As a set, $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$ is identified with the set of triples $(x, P, Z)$, where $p\in D_{{{\rm red}},{\rm{SL}}(2)}$, $x:=(p, Z')\in D^{\star}_{{\rm{SL}}(2)}$, $P$ is a parabolic subgroup of $G_{{{\rm red}}}$ satisfying the conditions in \ref{Wfan2} and the condition $G_{{{\rm red}},\Phi,u} \subset P_u$ with $\Phi$ being the set of weight filtrations associated to $p$, and $Z$ is a subset of $Z'$ satisfying the following (i). Let $A_{p,P}$ be the inverse image of $A_P$ under $\tau_p: {\mathbb{R}}_{>0}^{\Phi} \to P_{{{\rm red}}}({\mathbb{R}})$.
(i) If $x$ is an $A$-orbit, $Z$ is a $\tau_x^{\star}(A_{p,P})$-orbit. If $x$ is a $B$-orbit, $Z$ is a $\tau^{\star}_x({\mathbb{R}}_{>0}\times A_{p, P})$-orbit.
\medskip
The map $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)} \to D^{\star}_{{\rm{SL}}(2)}$ is understood as $(x, P, Z) \mapsto x$.
\end{sbpara}
\begin{sbpara}\label{eta} We have a map $$D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}\;;\; (x, P, Z) \mapsto (P, A_P \circ Z).$$
The fact that this is a morphism is proved by using the local structure theorem (Theorem \ref{SL2loc2}). The proof is similar to the proof of \cite{KNU2} Part IV Theorem 2.6.22 (1).
\end{sbpara}
\begin{sbrem}
\label{r:par}
In \cite{KNU2} Part IV Sections 2.5 and 2.6, we considered
$$D^{\star,+}_{{\rm{SL}}(2)} \to D^{\star}_{{\rm{SL}}(2)} \to D^{\star,-}_{{\rm{SL}}(2)} \leftarrow D^{\star,{\rm {BS}}}_{{\rm{SL}}(2)} \to D_{{\rm {BS}}}.$$
In that situation, $D^{{\rm {W}}}_{{{\rm red}},{\rm{SL}}(2)}$ in \ref{lgmdW} coincides with $D_{{\rm{SL}}(2)}(\gr^W)^{{\rm {BS}}}$ in \cite{KNU2} Part IV 2.6.3, $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$ is the fiber product of $D^{\star}_{{\rm{SL}}(2)} \to D^{\star,-}_{{\rm{SL}}(2)} \leftarrow D^{\star,{\rm {BS}}}_{{\rm{SL}}(2)}$, and the map $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)} \to D_{{\rm {BS}}}$ in \ref{eta} coincides with the composition $D^{\star, {\rm {W}}}_{{\rm{SL}}(2)}\to D^{\star,{\rm {BS}}}_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$.
The fiber product property can be seen as
$$
D^{\star}_{{\rm{SL}}(2)}\times_{D^{\star,-}_{{\rm{SL}}(2)}}D^{\star,{\rm {BS}}}_{{\rm{SL}}(2)}
=D^{\star}_{{\rm{SL}}(2)}\times_{D^{\star,-}_{{\rm{SL}}(2)}}(D^{\star,-}_{{\rm{SL}}(2)}\times
_{D_{{\rm{SL}}(2)}(\gr^W)}D_{{\rm{SL}}(2)}(\gr^W)^{{\rm {BS}}})
$$
$$
=D^{\star}_{{\rm{SL}}(2)}\times _{D_{{\rm{SL}}(2)}(\gr^W)}D_{{\rm{SL}}(2)}(\gr^W)^{{\rm {BS}}}
=D^{\star}_{{\rm{SL}}(2)}\times _{D_{{\rm{SL}}(2)}(\gr^W)}D_{{{\rm red}},{\rm{SL}}(2)}^{{\rm {W}}}
=D^{\star,{\rm {W}}}_{{\rm{SL}}(2)},
$$
where the first equality is \cite{KNU2} Part IV Proposition 2.6.14.
\end{sbrem}
\begin{sbrem}
(1) In the second line of \cite{KNU2} Part IV 2.6.3,
$D^{\star,-}_{{\rm{SL}}(2)}(\gr^W)$ should be
$D_{{\rm{SL}}(2)}(\gr^W)$.
In the last line of
loc. cit., $D^{\star}_{{\rm{SL}}(2)}(\gr^W)^{{\rm {BS}}}$ should be
$D_{{\rm{SL}}(2)}(\gr^W)^{{\rm {BS}}}$.
(2) In the proof of \cite{KNU2} Part IV Proposition 2.6.9, line 11 from the end of the proof, $L = \cS({\sigma})\cup \cS({\sigma})^{-1}$ must be corrected as $R(Q)\subset \cS({\sigma})\cup \cS({\sigma})^{-1}$.
\end{sbrem}
\subsection{Case of Shimura varieties}\label{s:Shim}
\begin{sbpara}\label{Shi0} Assume that $G$ is reductive and that $h_0:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ satisfies the condition that the Hodge type of ${\rm {Lie}}\,(G_{{\mathbb{R}}})$ via $h_0$ is in $\{(1,-1), (0, 0), (-1,1)\}$ (as in Shimura data). Then $h_0$ is ${\mathbb{R}}$-polarizable
by \cite{De} (Lemma \ref{pol2}).
\end{sbpara}
We prove
\begin{sbthm}\label{Shim} Let the assumption be as in $\ref{Shi0}$.
Then we have an isomorphism $$D^{{\rm {W}}}_{{\rm{SL}}(2)}\overset{\sim}\to D_{{\rm{SL}}(2)}$$ in ${\cal {B}}'_{\mathbb{R}}(\log)$. In particular, the identity map of $D$ extends uniquely to a morphism $$D_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$$ of locally ringed spaces with log structures with sign.
\end{sbthm}
\begin{sbpara} Note that for a field $E$ of characteristic $0$ and for $n\geq 0$, a finite-dimensional representation of ${\rm{SL}}(2)^n_E$ over $E$ is semisimple and each irreducible representation is isomorphic to $\rho^{(r)}:= {\rm{Sym}}^{r(1)}(\rho_1)\otimes \dots \otimes {\rm{Sym}}^{r(n)}(\rho_n)$ for some $r\in {\mathbb{N}}^n$, where $\rho_j: {\rm{SL}}(2)^n_E\to \operatorname{GL}(2)_E$ is the composition of the $j$-th projection ${\rm{SL}}(2)_E^n
\to {\rm{SL}}(2)_E$ and the inclusion homomorphism ${\rm{SL}}(2)_E\to \operatorname{GL}(2)_E$. Consider the homomorphism ${\mathbb{G}}_{m,E}^n \to {\rm{SL}}(2)^n_E$ whose restriction to the $k$-th ${\mathbb{G}}_{m,E}$ ($1\leq k\leq n$) is
$$t \mapsto (g_1, \dots, g_n), \;\; g_j=\begin{pmatrix} t^{-1}&0 \\0 & t\end{pmatrix}\;\; \text{for}\;1\leq j\leq k, \;\; g_j=1\;\; \text{for}\;\; k<j\leq n.$$
Write the standard base of $E^2$ by $(e_1, e_2)$. Then the action of ${\mathbb{G}}_{m,E}^n$ on $\bigotimes_{j=1}^n (e_1^{a(j)}e_2^{r(j)-a(j)})$ ($a\in {\mathbb{N}}^n$, $a\leq r$) via $\rho^{(r)}$ is given by the character
$$(\sum_{j=1}^k r(j)-2 \sum_{j=1}^k a(j))_{1\leq k\leq n}\in {\mathbb{Z}}^n=X({\mathbb{G}}_{m,E}^n).$$
\end{sbpara}
We will use the following lemma later.
\begin{sblem}\label{rhor}
Let $r\in {\mathbb{N}}^n$ and let $c\in {\mathbb{Z}}^n=X({\mathbb{G}}_{m,E}^n)$ be a character which appears in the representation of ${\mathbb{G}}_{m,E}^n$ in $\rho^{(r)}$ via the above homomorphism ${\mathbb{G}}^n_{m,E}\to {\rm{SL}}(2)^n_E$.
Assume that either one of the following conditions (i)--(iii) is satisfied.
Then we have either $c\in {\mathbb{N}}^n$ or $-c\in {\mathbb{N}}^n$.
(i) $r(k)=0$ for all $k$.
(ii) There is $k$ such that $1\leq k\leq n$, $r(k)>0$, and $r(j)=0$ for all $j\neq k$.
(iii) There are $k,l$ such that $1\leq k<l\leq n$, $r(k)>0$, $r(l)=1$, and $r(j)=0$ for $j\neq k, l$.
\end{sblem}
\begin{pf} We consider the character $c$ of the action of ${\mathbb{G}}_{m,{\mathbb{R}}}^n$ on $\bigotimes_{j=1}^n (e_1^{a(j)}e_2^{r(j)-a(j)})$ ($0\leq a(j)\leq r(j)$ for $1\leq j\leq n$).
In the case (i), $c=0$.
In the case (ii), $c(j)=0$ if $j<k$ and $c(j)=r(k)-2a(k)$ if $j\geq k$.
In the case (iii), $c(j)= 0$ if $j<k$, $c(j)=c(k)=r(k)-2a(k)$ if $k\leq j<l$, and $c(j)=c(l)=r(k)+r(l)-2(a(k)+a(l))$ if $j\geq l$. Since $r(l)=1$ and $a(l)\in \{0,1\}$, we have $|c(k)-c(l)|=1$. Hence we have either $\{c(k), c(l)\}\subset {\mathbb{N}}$ or $\{-c(k), -c(l)\}\subset {\mathbb{N}}$. Since $c(j)\in \{0, c(k), c(l)\}$ for all $j$, we have either $c\in {\mathbb{N}}^n$ or $-c\in {\mathbb{N}}^n$.
\end{pf}
\begin{sbpara}\label{rhor2} Assume that $G$ is reductive. Let $(\rho, \varphi)$ be an ${\rm{SL}}(2)$-orbit in $n$ variables of rank $n$ for $(G, h_0)$, and let $V\in {\operatorname{Rep}}(G)$. Let $r\in {\mathbb{N}}^n$ and assume that $\rho^{(r)}$ appears in the action of ${\rm{SL}}(2)^n_{\mathbb{R}}$ on $V_{\mathbb{R}}$ induced by $\rho$.
Then, by Claim in the proof of \ref{redp2}, for the Hodge structure of $V$ given by any element of $D$,
there is $p\in {\mathbb{Z}}$ such that the $(p+b, p-b)$-Hodge component of $V$ is non-zero for $0\leq b \leq \sum_{j=1}^n r(j)$.
\end{sbpara}
\begin{sbpara} We prove Theorem \ref{Shim}. Let $\Phi\in {\cal {W}}(G)$. Let $(\rho, \varphi)$ be an ${\rm{SL}}(2)$-orbit in $n$ variables of rank $n$ whose associated family of weight filtrations is $\Phi$. Then
by \ref{rhor2} and by the fact that only the Hodge type $(1,-1), (0, 0), (-1,1)$ appears in ${\rm {Lie}}\,(G)$, we have that if $\rho^{(r)}$ appears in the representation ${\rm {Lie}}\,(G_{{\mathbb{R}}})$ of ${\rm{SL}}(2)^n_{\mathbb{R}}$, then we have $\sum_{j=1}^n r(j) \leq 2$.
Hence if $\rho^{(r)}$ appears in ${\rm {Lie}}\,(G_{{\mathbb{R}}})$, the assumption of \ref{rhor} for $r$ is satisfied. Hence
by \ref{rhor},
each character of ${\mathbb{G}}_{m,{\mathbb{R}}}^n$ which appears in ${\rm {Lie}}\,(G_{{\mathbb{R}}})$ is either in $R_+$ or $-R_+$, that is, $R=R_+\cup (-R_+)$. Hence the condition (ii) of \ref{lemR+} is satisfied for $\Phi$. Hence the condition (iii) of \ref{lemR+} is satisfied. This proves that $D^{{\rm {W}}}_{{\rm{SL}}(2)}(\Phi)\to D_{{\rm{SL}}(2)}(\Phi)$ is an isomorphism and hence proves Theorem \ref{Shim}.
\end{sbpara}
\begin{sbpara}
In the classical case of $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to \text{GSp}(g)_{\mathbb{R}}$ which gives the Siegel upper half space
$\frak H_g$ of degree $g$, $D_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$ is a homeomorphism (\cite{KU1} Theorem 6.7).
But even in the case $g=1$, the real analytic structures of $D_{{\rm {BS}}}$ and $D_{{\rm{SL}}(2)}$ are slightly different as is seen in \ref{Ex1}.
For the case of some Shimura variety as in \ref{Ex2}, the map $D_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$ is not bijective.
\end{sbpara}
\subsection{Relation of $D^{\star}_{{\rm{SL}}(2)}$ and $D^{II}_{{\rm{SL}}(2)}$}
\label{ss:star_to_II}
We define a log modification
$D^{\star,+}_{{\rm{SL}}(2)}\to D^{\star}_{{\rm{SL}}(2)}$ associated to a cone decomposition, and define a morphism $D^{\star,+}_{{\rm{SL}}(2)}\to D^{II}_{{\rm{SL}}(2)}$.
\begin{sbpara}\label{lgmd+}
Let $\Phi$ be a finite set of weight filtrations which has a common splitting.
Note that we have $X({\mathbb{G}}_m \times {\mathbb{G}}_m^{\Phi})_+={\mathbb{N}} \times {\mathbb{N}}^{\Phi}\to M_{>0}/\cO^\times_{>0}$ on $D^{\star}_{{\rm{SL}}(2)}(\Phi)$.
Let $\beta_0^{\star} \in M/\cO^{\times}$ be the image of $(1,0,...,0)$ and
let $\beta_{\mathrm{tot}} \in M/\cO^{\times}$ be the image of $(0,1,...,1)$.
These $\beta_0^{\star}$ and $\beta_{\mathrm{tot}}$ are glued to global sections of $M_{>0}/\cO^\times_{>0}$ on $D^{\star}_{{\rm{SL}}(2)}$ which we still denote by $\beta_0^{\star}$ and $\beta_{\mathrm{tot}}$, respectively.
Let $D^{\star,+}_{{\rm{SL}}(2)}(\Phi)$ be the log modification of $D^{\star}_{{\rm{SL}}(2)}(\Phi)$ associated to the cone decomposition of $X_*({\mathbb{G}}_m \times {\mathbb{G}}_m^{\Phi})_+={\mathbb{N}} \times {\mathbb{N}}^{\Phi}$ consisting of cones
$${\sigma}_1:=\{(x_0, x_1, \dots, x_n)\;|\; x_0\leq {\textstyle{\sum}}_{j=1}^n x_j\}\text{ and }{\sigma}_2:=\{(x_0, x_1, \dots, x_n)\;|\; x_0\geq {\textstyle{\sum}}_{j=1}^n x_j\}$$ and their faces.
When $\Phi$ moves, these are glued to a log modification $D^{\star,+}_{{\rm{SL}}(2)}\to D^{\star}_{{\rm{SL}}(2)}$.
For $j=1,2$, let $D^{\star,+}_{{\rm{SL}}(2)}({\sigma}_j)$ be the open set of $D^{\star,+}_{{\rm{SL}}(2)}$ whose intersection with $D_{{\rm{SL}}(2)}^{\star,+}(\Phi)$ coincides with its ${\sigma}_j$-part. Then $D^{\star,+}_{{\rm{SL}}(2)}({\sigma}_1)$ (resp.\ $D^{\star, +}_{{\rm{SL}}(2)}({\sigma}_2)$) coincides with the set of all points $s$ of $D^{\star.+}_{{\rm{SL}}(2)}$ such that $\beta_{\mathrm{tot}}$ (resp.\ $\beta_0^{\star}$) is divided by $\beta_0^{\star}$ (resp.\ $\beta_{\mathrm{tot}}$) at $s$.
\end{sbpara}
\begin{sbpara}\label{+II} We define a map $D^{\star,+}_{{\rm{SL}}(2)}\to D^{II}_{{\rm{SL}}(2)}$ as follows (cf.\ \cite{KNU2} Part IV 2.5.4).
Let $x^+$ be a point of $D^{\star,+}_{{\rm{SL}}(2)}$ lying over $x \in D^{\star}_{{\rm{SL}}(2)}$.
We define the image $x^{II}$ of $x^+$ in $D^{II}_{{\rm{SL}}(2)}$.
There are four cases.
Case 1. Both $\beta_0^{\star}$ and $\beta_{\mathrm{tot}}$ are trivial at $x^+$. That is, $x^+=x\in D$.
Case 2. $\beta_0^{\star}$ is strictly divided by $\beta_{\mathrm{tot}}$ at $x^+$.
Case 3. $\beta_{\mathrm{tot}}$ is strictly divided by $\beta_0^{\star}$ at $x^+$.
Case 4. $\beta_0^{\star}$ and $\beta_{\mathrm{tot}}$ coincide at $x^+$ but are nontrivial.
In Case 1, $x^{II}=x^+=x\in D$.
In Cases 2--4, write $x=(p, Z)$.
In Case 2, $x^{II}$ is $x=(p,Z)$ regarded as an element (a $B$-orbit) of $D_{{\rm{SL}}(2)}$.
In Case 3, $x^{II}$ is $(p,Z_{{\rm{spl}}})$, where $Z_{{\rm{spl}}}:=\{{\rm{spl}}_W(z)(z_{{{\rm red}}})\,|\,z \in Z\}$.
(See \ref{Dspl} for the notation.)
In Case 4, $Z$ in $x=(p, Z)$ is a $\tau_x^{\star}({\mathbb{R}}_{>0}\times {\mathbb{R}}_{>0}^{\Phi(p)})= \tau_x({\mathbb{R}}_{>0}\times {\mathbb{R}}_{>0}^{\Phi(p)})$-orbit,
and $x^+$ is identified with a triple $(p, Z, Z')$ where $Z'$ is a $\tau_x(\{1\} \times {\mathbb{R}}_{>0}^{\Phi(p)})$-orbit contained in $Z$. %
We define $x^{II}= (p, Z')$.
The proof of the fact that the map just defined is a proper and surjective morphism is similar to that of \cite{KNU2} Part IV Theorem 2.5.5 (1).
\end{sbpara}
\begin{sbprop}\label{mtoII} There is a unique morphism $D^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2)}\to D^{II}_{{\rm{SL}}(2)}$ of ${\cal {B}}'_{\mathbb{R}}(\log)$ which extends the identity map of $D$.
\end{sbprop}
This is a $G$-MHS version of a part of \cite{KNU2} Part IV Theorem 2.5.5 (1), and proved similarly as follows. The map $D^{\star,+}_{{\rm{SL}}(2)}\to D^{\star}_{{\rm{SL}}(2)}$ is an isomorphism over the open set $D^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2)}$ of $D^{\star}_{{\rm{SL}}(2)}$ as is easily seen. Hence the morphism $D^{\star,+}_{{\rm{SL}}(2)}\to D^{II}_{{\rm{SL}}(2)}$ induces a morphism $D^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2)}\to D^{II}_{{\rm{SL}}(2)}$.
\begin{sbrem} Let ${\cal {B}}'_{\mathbb{R}}(\log)^+$ be the full subcategory of ${\cal {B}}'_{\mathbb{R}}(\log)$ defined in Part IV 2.7.5 of \cite{KNU2}.
Then by the method in Section 2.7 of ibid. basing on the local structure theorems (Theorems \ref{SL2loc2} and \ref{SL2loc3}), we can prove the following $G$-MHS version of Theorem 2.7.14 of ibid. The spaces $D^I_{{\rm{SL}}(2)}$, $D^{II}_{{\rm{SL}}(2)}$, $D^{\star}_{{\rm{SL}}(2)}$, $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$, $D^{\star,+}_{{\rm{SL}}(2)}$ belong to ${\cal {B}}'_{\mathbb{R}}(\log)^+$. We do not give the details of the proof.
\end{sbrem}
\subsection{Valuative spaces, I}
\label{ss:val1}
Recall that, for an abelian group $L$, a submonoid $V$ of $L$ is said to be {\it valuative} if $V\cup V^{-1}=L$.
\begin{sbpara}\label{val1}
We review the associated valuative space.
For an object $S$ of ${\cal {B}}'_{\mathbb{R}}(\log)$, we have a locally ringed space $S_{\val}$ endowed with a log structure with sign defined as in \cite{KNU2} Part IV 3.1.13. As a set, $S_{\val}$ is the set of triples $(s, V, h)$, where $s\in S$, $V$ is a valuative submonoid of $(M_S/\cO_S^\times)_s^{\gp}$ such that $V\supset (M_S/\cO^\times_S)_s$ and such that $V^\times \cap (M_S/\cO_S^\times)_s= \{1\}$, and, $\tilde V_{>0}$ being the inverse image of $V$ in $M_{S,>0,s}^{\gp}$, $h$ is a homomorphism $(\tilde V_{>0})^\times \to {\mathbb{R}}_{>0}^{\mult}$ extending the evaluation homomorphism $f \mapsto f(s)$ on $\cO_{S,>0,s}^\times$ at $s$.
\cite{KNU2} Part IV Proposition 3.1.9 explicitly describes the projection $S_{\val}\to S$ as a projective limit of log modifications of $S$ (\cite{KNU2} Part IV Proposition 1.4.6).
It follows that the projection $S_{\val}\to S$ is proper and surjective (Corollary 3.1.10).
\end{sbpara}
\begin{sbpara}\label{val2}
By \ref{val1}, we have the following locally ringed spaces with a log structure with sign
$$D_{{\rm {BS}},\val}, \;D^{\star}_{{\rm{SL}}(2),\val}, \; D^I_{{\rm{SL}}(2),\val}, \; D^{II}_{{\rm{SL}}(2),\val}$$
associated to the objects $D_{{\rm {BS}}}$, $D^{\star}_{{\rm{SL}}(2)}$, $D^I_{{\rm{SL}}(2)}$, $D^{II}_{{\rm{SL}}(2)}$ of ${\cal {B}}'_{\mathbb{R}}(\log)$, respectively.
The underlying sets of $D^I_{{\rm{SL}}(2),\val}$ and $D^{II}_{{\rm{SL}}(2),\val}$ are identified because the log structure with sign of
$D^I_{{\rm{SL}}(2)}$ is the inverse image of that of $D^{II}_{{\rm{SL}}(2)}$.
We will denote their common underlying set by $D_{{\rm{SL}}(2),\val}$.
\end{sbpara}
\begin{sbthm}\label{valthm}
$(1)$ There is a unique morphism
$D^{\star}_{{\rm{SL}}(2),\val}\to D_{{\rm {BS}},\val}$ which extends the identity map of $D$. This map is injective.
$(2)$ There is a unique morphism $D^{\star}_{{\rm{SL}}(2),\val}\to D^{II}_{{\rm{SL}}(2),\val}$ which extends the identity map of $D$. It is proper and surjective.
\end{sbthm}
\begin{pf} %
(1) The morphism $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)} \to D_{{\rm {BS}}}$ in Section \ref{ss:star_to_BS} induces the morphism $D^{\star}_{{\rm{SL}}(2),\val}\to D_{{\rm {BS}},\val}$ which extends the identity map of $D$ because $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$ is a log modification of $D^{\star}_{{\rm{SL}}(2)}$ (\ref{lgmdW2}).
The uniqueness is by the density of $D$ in $D^{\star}_{{\rm{SL}}(2),\val}$. The proof of the injectivity is similar to the proof of \cite{KNU2} Part IV Theorem 3.4.4 (1).
(2) The morphism $D^{\star,+}_{{\rm{SL}}(2)} \to D^{II}_{{\rm{SL}}(2)}$ in Section \ref{ss:star_to_II} induces the morphism $D^{\star}_{{\rm{SL}}(2),\val}\to D^{II}_{{\rm{SL}}(2),\val}$ which extends the identity map of $D$ because $D^{\star,+}_{{\rm{SL}}(2)}$ is a log modification of $D^{\star}_{{\rm{SL}}(2)}$ (cf.\ \ref{+II}).
The uniqueness is by the same reason as in (1).
This morphism is proper, because both terms are proper over $D_{{{\rm red}},{\rm{SL}}(2)}\times {\rm{spl}}(W)$ by Proposition \ref{SLbdl}. The surjectivity of this map follows from its properness and the fact that the image of this map contains $D$ and hence is dense in $D^{II}_{{\rm{SL}}(2),\val}$.
\end{pf}
\begin{sbpara}
The inverse image of $D^{{{\rm{mild}}}}_{{\rm {BS}},\val}$ under $D^{\star}_{{\rm{SL}}(2),\val}\to D_{{\rm {BS}},\val}$ is $D^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2),\val}$.
\end{sbpara}
\begin{sbrem} Let $\cC_{\mathbb{R}}(\val)^+$ be the category defined in Part IV 3.2.5 of \cite{KNU2}. Then by the method in Section 3.2 of ibid., we can prove the following $G$-MHS version of a statement in 3.3.1 of ibid. The spaces $D_{{\rm {BS}}, \val}$, $D^I_{{\rm{SL}}(2),\val}$, $D^{II}_{{\rm{SL}}(2),\val}$, $D^{\star}_{{\rm{SL}}(2),\val}$ belong to $\cC_{\mathbb{R}}(\val)^+$. We do not give the details of the proof.
\end{sbrem}
\subsection{Global properties of $D^I_{{\rm{SL}}(2)}$, $D^{II}_{{\rm{SL}}(2)}$, $D^{\star}_{{\rm{SL}}(2)}$ etc.} \label{ss:SL2gl}
\begin{sbthm}\label{SL2gl} Let $X$ be one of $D^I_{{\rm{SL}}(2)}$, $D^{II}_{{\rm{SL}}(2)}$, $D^{\star}_{{\rm{SL}}(2)}$, $D^I_{{\rm{SL}}(2),\val}$, $D^{II}_{{\rm{SL}}(2),\val}$, $D^{\star}_{{\rm{SL}}(2),\val}$, $D_{{\rm {BS}},\val}$, $D^{\star,+}_{{\rm{SL}}(2)}$, $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$.
Let $\Gamma$ be a semi-arithmetic subgroup of $G'({\mathbb{Q}})$ ($\ref{Gamma}$).
$(1)$ The action of $\Gamma$ on $X$ is proper and the quotient space $\Gamma\operatorname{\backslash} X$ is Hausdorff. In particular, $X$ is Hausdorff.
$(2)$ If $\Gamma$ is torsion-free, the action of $\Gamma$ on $X$ is free and the map $X\to \Gamma\operatorname{\backslash} X$ is a local homeomorphism.
\end{sbthm}
The proof, given in \ref{SL2H} and \ref{SL2H2} below, is similar to that of \cite{KNU2} Part II Theorem 3.5.17 and that of \cite{KNU2} Part IV Theorem 6.1.1.
Starting from $D_{{\rm {BS}}}$, we transport various properties along the fundamental diagram in Introduction.
\begin{sbpara}\label{SL2H} We first prove that the case $\Gamma=\{1\}$ of (1), that is, the space $X$ is Hausdorff.
We have an injective continuous map $D^{\star}_{{\rm{SL}}(2),\val}\to D_{{\rm {BS}},\val}$ (Theorem \ref{valthm} (1)).
Since $D_{{\rm {BS}}}$ is Hausdorff (Proposition \ref{p:DBSHaus}), $D_{{\rm {BS}},\val}$ is Hausdorff.
Hence, $D^{\star}_{{\rm{SL}}(2),\val}$ is Hausdorff.
Since $D^{\star}_{{\rm{SL}}(2),\val} \to D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$, $D^{\star}_{{\rm{SL}}(2),\val} \to D^{\star,+}_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2),\val} \to D^{\star}_{{\rm{SL}}(2)}$ are proper and surjective, $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$, $D^{\star,+}_{{\rm{SL}}(2)}$ and $D^{\star}_{{\rm{SL}}(2)}$ are Hausdorff.
Since the maps $D^{\star}_{{\rm{SL}}(2),\val}\to D^{II}_{{\rm{SL}}(2),\val} \to D^{II}_{{\rm{SL}}(2)}$ are proper and surjective (Theorem \ref{valthm} (2)), $D^{II}_{{\rm{SL}}(2),\val}$ and $D^{II}_{{\rm{SL}}(2)}$ are Hausdorff.
Since we have a bijective continuous map $D^I_{{\rm{SL}}(2)}\to D^{II}_{{\rm{SL}}(2)}$, $D^I_{{\rm{SL}}(2)}$ is Hausdorff.
Hence $D^I_{{\rm{SL}}(2),\val}$ is also Hausdorff.
\end{sbpara}
\begin{sbpara}\label{SL2H2} We prove Theorem \ref{SL2gl}.
(1) We prove the former part, that is, that the action is proper.
Since it is valid for $X=D_{{\rm {BS}}}$ (Theorem \ref{BSgl} (1)),
we see that it is valid for $D_{{\rm {BS}}, \val}$ and $D^{\star}_{{\rm{SL}}(2),\val}$ by using continuous maps
$D^{\star}_{{\rm{SL}}(2),\val}\to D_{{\rm {BS}},\val}\to D_{{\rm {BS}}}$, \ref{SL2H}, and the fact \ref{proper} (3.1).
Then we see that it is valid also for $D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$, $D^{\star,+}_{{\rm{SL}}(2)}$, $D^{\star}_{{\rm{SL}}(2)}$, $D^{II}_{{\rm{SL}}(2),\val}$ and $D^{II}_{{\rm{SL}}(2)}$ by using the proper and surjective maps $D_{{\rm{SL}}(2),\val}^{\star}\to D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$, $D_{{\rm{SL}}(2),\val}^{\star}\to D^{\star,+}_{{\rm{SL}}(2)}$, $D_{{\rm{SL}}(2),\val}^{\star}\to D^{\star}_{{\rm{SL}}(2)}$, $D^{\star}_{{\rm{SL}}(2),\val} \to D_{{\rm{SL}}(2),\val} \to D_{{\rm{SL}}(2)}$ and the fact \ref{proper} (3.2).
Then we see it also for $D^I_{{\rm{SL}}(2)}$ and $D^I_{{\rm{SL}}(2),\val}$ by using the continuous maps $D^I_{{\rm{SL}}(2)}\to D^{II}_{{\rm{SL}}(2)}$ and $D^I_{{\rm{SL}}(2),\val}\to D^{II}_{{\rm{SL}}(2),\val}$.
%
The latter part of (1) follows from the former part by \ref{proper} (1).
(2) We prove the former part, that is, the action is free, by using a similar argument as in \ref{pfBSgl}.
We apply \ref{proper} (4) to $H=\Gamma$, $H_1=\Gamma_u$, $X_1={\rm{spl}}(W)$, $X_2=D_{{{\rm red}},{\rm{SL}}(2)}$.
The action of $\Gamma/\Gamma_u$ on $D_{{{\rm red}},{\rm{SL}}(2)}$ is free, by a similar argument in the proof of \cite{KU1} Lemma 5.7, and the action of $\Gamma_u$ on ${\rm{spl}}(W)\simeq G_u({\mathbb{R}})$ is free.
Hence the action of $\Gamma$ on ${\rm{spl}}(W)\times D_{{{\rm red}},{\rm{SL}}(2)}$ is free.
By using the canonical maps from $D_{SL(2)}^{I}$, $D_{SL(2)}^{II}$, $D^{\star}_{{\rm{SL}}(2)}$ to ${\rm{spl}}(W)\times D_{{{\rm red}},{\rm{SL}}(2)}$ together with the related maps in the fundamental diagram, we see that the action of $\Gamma$ on $X$ is free.
The latter part of (2) follows from the former by \ref{proper} (2), the properness of the action proved in (1), and \ref{SL2H}.
\end{sbpara}
\begin{sbpara}\label{SL2SA1}
In Theorem \ref{SL2gl}, we can use a semi-arithmetic subgroup of $G({\mathbb{Q}})$ (not of $G'({\mathbb{Q}})$) in the following two situations.
First,
if either $G$ is semisimple or the condition (1) in Lemma \ref{pol2} is satisfied, \ref{SL2gl} holds for a semi-arithmetic subgroup $\Gamma$ of $G({\mathbb{Q}})$. In fact, $\Gamma \cap G'({\mathbb{Q}})$ is of finite index (cf. Proposition \ref{A=A*} for the latter case). Hence by \ref{proper} (5), we can replace $\Gamma$ by the semi-arithmetic subgroup $\Gamma\cap G'({\mathbb{Q}})$ of $G'({\mathbb{Q}})$.
Next
\end{sbpara}
\begin{sbprop}\label{SL2SA2} Assume that $G$ is reductive.
Let $X$ be one of $D_{{\rm{SL}}(2)}$, $D_{{\rm{SL}}(2),\val}$, $D_{{\rm {BS}},\val}$.
Let $\Gamma$ be a semi-arithmetic subgroup of $G({\mathbb{Q}})$.
$(1)$ The quotient space $\Gamma\operatorname{\backslash} X$ is Hausdorff.
$(2)$ Let $Z$ be the center of $G$. If the image of $\Gamma$ in $(G/Z)({\mathbb{Q}})$ is torsion-free, the map $X\to \Gamma\operatorname{\backslash} X$ is a local homeomorphism.
\end{sbprop}
See \ref{redpf} for the proof.
\section{The space of nilpotent orbits}\label{s:DSig}
Let $D=D(G,h_0)$ be as in \ref{D}.
We assume that $h_0$ is ${\mathbb{R}}$-polarizable (\ref{pol}).
In this section, we define and study the toroidal partial compactification $\Gamma \operatorname{\backslash} D_{\Sigma}$ of $\Gamma \operatorname{\backslash} D$, an extended period domain consisting of nilpotent orbits.
We consider $\Gamma \operatorname{\backslash} D_{\Sigma}$ as the moduli of $G$-log mixed Hodge structures.
It is the $G$-MHS version of the toroidal partial compactification $\Gamma \operatorname{\backslash} D({\Lambda})_\Sigma$ of $\Gamma\operatorname{\backslash} D(\Lambda)$ for the classical period domain $D(\Lambda)$ (\ref{ss:Dold}). This $\Gamma \operatorname{\backslash} D({\Lambda})_{\Sigma}$ is
defined and studied in \cite{KU2} (in the pure case) and in \cite{KNU2} Part III and Part IV (in the mixed case) and is the moduli space of LMH.
\subsection{The sets $D_{\Sigma}$ and $D_{\Sigma}^{\sharp}$}
\label{ss:setDSig}
\begin{sbpara}\label{nilp1}
A {\it nilpotent cone} is a subset ${\sigma}$ of ${\rm {Lie}}\,(G'_{\mathbb{R}})$
satisfying the following (i)--(iii).
(i) ${\sigma}={\mathbb{R}}_{\geq 0}N_1+\dots +{\mathbb{R}}_{\geq 0}N_n$ for some $N_1,\dots,N_n\in {\rm {Lie}}\,(G'_{\mathbb{R}})$.
(ii) For every $V\in {\operatorname{Rep}}(G)$, the image of ${\sigma}$ under the induced map ${\rm {Lie}}\,(G_{\mathbb{R}})\to {\rm {End}}_{\mathbb{R}}(V_{{\mathbb{R}}})$ consists of nilpotent operators.
(iii) We have $[N,N']=0$ for $N, N'\in {\sigma}$.
\end{sbpara}
\begin{sbpara}
Recall that for a vector space $V$ over a field $E$, for an increasing filtration $W$ on $V$, and for a nilpotent linear map $N: V\to V$ such that $NW_w\subset W_w$ for all $w$, an increasing filtration $M$ on $V$ is called the {\it relative monodromy filtration} of $N$ relative to $W$ if $NM_w\subset M_{w-2}$ for all $w$ and $N^m: \gr^M_{w+m}\gr^W_w\overset{\sim}\to \gr^M_{w-m}\gr^W_w$ for all $w$ and all $m\geq 0$.
The relative monodromy filtration $M$ need not exist, but it is unique if it exists.
\end{sbpara}
\begin{sbpara}\label{nilp2}
Let $F\in \Dc$ and let ${\sigma}$ be a nilpotent cone.
We say that the pair $({\sigma}, F)$ {\it generates a nilpotent orbit} if the following conditions (i)--(iii) are satisfied.
\medskip
{\rm (i)} Let $N_1, \dots, N_n$ be as in (i) in \ref{nilp1}. Then $\exp(\sum_{j=1}^n z_jN_j)F\in D$ if $z_j\in {\mathbb{C}}$ and $\text{Im}(z_j)\gg 0$.
{\rm (ii)} $NF^p\subset F^{p-1}$ for all $N\in {\sigma}$ and $p\in {\mathbb{Z}}$.
{\rm (iii)} For every $N\in {\sigma}$ and every $V\in {\operatorname{Rep}}(G)$, the relative monodromy filtration of $N:V_{\mathbb{R}}\to V_{\mathbb{R}}$ with respect to $W(V)_{\mathbb{R}}$ exists.
\medskip
In this case, we also say that $(N_1,\dots,N_n,F)$ {\it generates a nilpotent orbit}.
Note that the above condition (i) is independent of the choice of $(N_1, \dots, N_n)$ as in (i) in \ref{nilp1}. Note also that it is equivalent to the condition that $\exp(\sum_{j=1}^n iy_jN_j)F\in D$ if $y_j\in {\mathbb{R}}$ and $y_j\gg 0$.
\end{sbpara}
\begin{sbprop}\label{nilp3} Let $F\in \Dc$ and let ${\sigma}$ be a nilpotent cone. Then the following conditions {\rm (i)}, {\rm (ii)}, and {\rm (iii)} are equivalent.
{\rm (i)} $({\sigma},F)$ generates a nilpotent orbit in the sense of $\ref{nilp2}$.
{\rm (ii)} For every $V\in {\operatorname{Rep}}(G)$, we have the following
{\rm (ii-1)}, {\rm (ii-2)}, {\rm (ii-3)}.
\quad {\rm (ii-1)}
For each $w\in {\mathbb{Z}}$, there is a $G'_{\mathbb{R}}$-invariant ${\mathbb{R}}$-bilinear form $\langle\cdot, \cdot\rangle_w: \gr^W_wV_{\mathbb{R}}\times \gr^W_wV_{\mathbb{R}} \to {\mathbb{R}}$ such that if $z_j\in {\mathbb{C}}$ and $\text{Im}(z_j)\gg 0$ ($1\leq j\leq n$), $(\gr^W_wV_{\mathbb{R}}, \exp(\sum_{j=1}^n z_jN_j)F(\gr^W_wV))$ is a Hodge structure of weight $w$ polarized by $\langle \cdot,\cdot\rangle_w$.
\quad{\rm (ii-2)}
$NF^p(V)\subset F^{p-1}(V)$ for all $N\in {\sigma}$ and $p\in {\mathbb{Z}}$.
\quad{\rm (ii-3)} For every $N\in {\sigma}$, the relative monodromy filtration of $N:V_{\mathbb{R}}\to V_{\mathbb{R}}$ with respect to $W$ exists.
{\rm (iii)} For some faithful $V\in {\operatorname{Rep}}(G)$, the above conditions {\rm (ii-1)}--{\rm (ii-3)} are satisfied.
\end{sbprop}
\begin{pf} Assume (i). We prove (ii).
Consider the continuous map ${\mathbb{C}}^n \to \Dc\;;\; z\mapsto \exp(\sum_{j=1}^n z_jN_j)F$. For some $c\in {\mathbb{R}}$, the image of
$S:=\{z\in {\mathbb{C}}^n\;|\; \text{Im}(z_j)\geq c\}\subset {\mathbb{C}}^n$ under this map is contained in $D$. Hence it induces a continuous map $S\to D$.
Since $D$ is a disjoint union of $G'({\mathbb{R}})G_u({\mathbb{C}})$-orbits which are open and closed and since $S$ is connected, the image of $S$ in $D$ is contained in one $G'({\mathbb{R}})G_u({\mathbb{C}})$-orbit $D'$.
Take $F'\in D'$. Let $V\in {\operatorname{Rep}}(G)$. By the ${\mathbb{R}}$-polarizability and Lemma \ref{pol2}, for each $w\in {\mathbb{Z}}$, there is a $G'_{\mathbb{R}}$-invariant ${\mathbb{R}}$-bilinear form $\langle\cdot,\cdot\rangle_w: \gr^W_wV_{\mathbb{R}}\times \gr^W_wV_{\mathbb{R}}\to {\mathbb{R}}$ which polarizes $F'(\gr^W_w)$. If $z\in S$, $\exp(\sum_{j=1}^n z_jN_j)F=gF'$ for some $g\in G'({\mathbb{R}})$. Since $\langle\cdot, \cdot\rangle_w$ is fixed by $g$, it polarizes $\exp(\sum_{j=1}^n z_jN_j)F$.
The implication (ii) $\Rightarrow$ (iii) is clear.
By \ref{faith} and by \cite{KNU2} Part III 1.2.2.1, 1.2.2.2, we have the implication (iii) $\Rightarrow $ (i).
\end{pf}
\begin{sbprop}\label{nilp4} Assume that $({\sigma}, Z)$ generates a nilpotent orbit.
Then we have a filtration $M(\tau)\in \frak W(G_{{\mathbb{R}}})$ ($\ref{Wlem}$) for each face $\tau$ of ${\sigma}$ satisfying the following conditions {\rm (i)}--{\rm (iii)}.
If ${\sigma}$ is rational, then all $M(\tau)$ belong to $\frak W(G)$.
{\rm (i)} $NM(\tau)_w\subset M(\tau)_w$ for all $N\in {\sigma}$ and $w\in {\mathbb{Z}}$.
{\rm (ii}) $M(0)=W$.
{\rm (iii)} If $\tau$ and $\tau'$ are faces of ${\sigma}$ and if $N\in {\sigma}$, and if $\tau'$ is the smallest face of ${\sigma}$ containing $\tau$ and $N$, then $M(\tau')$ is the relative monodromy filtration of $N$ with respect to $M(\tau)$.
\end{sbprop}
\begin{pf} This follows from Kashiwara \cite{Kas} 4.4.1 and 5.2.5.
\end{pf}
\begin{sbpara}
A {\it nilpotent orbit} (resp.\ {\it nilpotent $i$-orbit})
is a pair %
$({\sigma}, Z)$ of a nilpotent cone ${\sigma}$ and an $\exp({\sigma}_{\mathbb{C}})$ (resp.\ $\exp(i\cdot {\sigma}_{\mathbb{R}})$)-orbit in $\Dc$
satisfying that, for some $F\in Z$, $({\sigma}, F)$ generates a nilpotent orbit in the sense of \ref{nilp2}. Here ${\sigma}_{\mathbb{C}}$ (resp.\ ${\sigma}_{\mathbb{R}}$) denotes the ${\mathbb{C}}$ (resp.\ ${\mathbb{R}}$)-linear subspace spanned by ${\sigma}$ in ${\rm {Lie}}\,(G'_{\mathbb{C}})$ (resp.\ ${\rm {Lie}}\,(G'_{\mathbb{R}})$).
\end{sbpara}
\begin{sbpara}\label{fan}
A {\it weak fan $\Sigma$ in ${\rm {Lie}}\,(G')$} is a nonempty set of sharp rational nilpotent cones in ${\rm {Lie}}\,(G'_{\mathbb{R}})$
satisfying the following conditions (i) and (ii).
(i) If ${\sigma}\in \Sigma$ and if ${\sigma}'$ is a face of ${\sigma}$, then ${\sigma}'\in \Sigma$.
(ii) Let ${\sigma}, {\sigma}' \in \Sigma$, and assume that ${\sigma}$ and ${\sigma}'$ have a common interior
point and that there is an $F\in \Dc$ such that both $({\sigma}, F)$ and $({\sigma}',F)$ generate nilpotent
orbits. Then ${\sigma}={\sigma}'$.
\end{sbpara}
\begin{sbpara}\label{DSigdef}
Let $D_{\Sigma}$ be the set of all nilpotent orbits $({\sigma}, Z)$ such that ${\sigma}\in \Sigma$.
Then $D$ is naturally embedded in $D_{\Sigma}$ via $F \mapsto (\{0\}, \{F\})$.
Let $D^{\sharp}_{\Sigma}$ be the set of all nilpotent $i$-orbits $({\sigma}, Z)$ such that ${\sigma}\in \Sigma$.
Then $D$ is also naturally embedded in $D^{\sharp}_{\Sigma}$
via $F \mapsto (\{0\}, \{F\})$.
We have a canonical map $D^{\sharp}_{\Sigma}\to D_{\Sigma}\;;\; ({\sigma}, Z) \mapsto ({\sigma}, \exp({\sigma}_{\mathbb{C}})Z)$.
For a rational nilpotent cone ${\sigma}$, we define
$D_{{\sigma}}:=D_{\{\text{face of ${\sigma}$}\}},
D^{\sharp}_{{\sigma}}:=D^{\sharp}_{\{\text{face of ${\sigma}$}\}}.$
\end{sbpara}
\begin{sbpara}\label{scomp}
Let $\Gamma$ be a subgroup of $G({\mathbb{Q}})$ satisfying $(SA)$ (\ref{Gamma}).
We say that $\Sigma$ and $\Gamma$ are {\it compatible} if $\Sigma$ is stable under
the adjoint action of $\Gamma$. If this is the case, $\Gamma$ naturally acts on $D_{\Sigma}$.
We say that $\Sigma$ and $\Gamma$ are {\it strongly compatible} if they are compatible and if every ${\sigma} \in \Sigma$ is generated by elements whose $\exp$ in $G({\mathbb{R}})$ belong to $\Gamma$.
\end{sbpara}
\subsection{$E_{{\sigma}}$ and the spaces of nilpotent orbits}
\label{ss:Esig}
For $\Sigma$ and $\Gamma$ which are strongly compatible, we endow $\Gamma\operatorname{\backslash} D_{\Sigma}$ with a structure of a locally ringed space over ${\mathbb{C}}$ and with a log structure. We endow $D^{\sharp}_{\Sigma}$ with a topology.
\begin{sbpara}\label{toric}
Let $\Sigma$ and $\Gamma$ be as in \ref{fan} and in \ref{scomp}.
Assume that they are strongly compatible (\ref{scomp}).
Let ${\sigma} \in \Sigma$.
Let $\Gamma({\sigma}):= \Gamma \cap \exp({\sigma})$ in $G({\mathbb{R}})$. Then $\Gamma({\sigma})$ is an fs monoid and $\Gamma({\sigma})^{\gp}= \Gamma \cap \exp({\sigma}_{\mathbb{R}})$ is a finitely generated free abelian group. Let
$${\operatorname{torus}}_{{\sigma}}={\operatorname{torus}}_{{\sigma},\Gamma}={\mathbb{C}}^\times \otimes \Gamma({\sigma})^{\gp}.$$
Let $P({\sigma})=\Hom(\Gamma({\sigma}),{\mathbb{N}})$. Let
$${\operatorname{toric}}_{{\sigma}}={\operatorname{toric}}_{{\sigma},\Gamma}=\Hom(P({\sigma}),{\mathbb{C}}^{\mult})=\operatorname{Spec}({\mathbb{C}}[P({\sigma})])^{\an}.$$
\noindent
Here ${\mathbb{C}}^{\mult}={\mathbb{C}}$ regarded as a multiplicative monoid. The standard log structure of the toric variety $\operatorname{Spec}({\mathbb{C}}[P({\sigma})])$ induces the log structure of the analytic toric space ${\operatorname{toric}}_{{\sigma}}$.
We regard ${\operatorname{torus}}_{\sigma}$ as an open set of ${\operatorname{toric}}_{\sigma}$ via the embedding
$$
{\operatorname{torus}}_{\sigma}=\Hom(P({\sigma})^{\gp}, {\mathbb{C}}^\times)\subset {\operatorname{toric}}_{\sigma}.
$$
We have a natural action of ${\operatorname{torus}}_{\sigma}$ on ${\operatorname{toric}}_{\sigma}$.
We have an exact sequence
$$
0\to {\Gamma}({\sigma})^{\gp}\overset{\log}\longrightarrow {\sigma}_{\mathbb{C}}\overset{\bold e}\longrightarrow {\operatorname{torus}}_{\sigma}\to 0,
$$
where
$$
{\bold e}(z \otimes \log({\gamma}))=e^{2\pi iz}\otimes {\gamma}\quad \text{for} \;\;
z\in {\mathbb{C}}, {\gamma}\in {\Gamma}({\sigma})^{\gp}.
$$
For a face $\tau$ of ${\sigma}$,
let $0_\tau\in {\operatorname{toric}}_{\sigma}$ be the homomorphism $P({\sigma})=\Hom(\Gamma({\sigma}), {\mathbb{N}}) \to {\mathbb{C}}^{\mult}$ which sends $h \in \Hom(\Gamma({\sigma}), {\mathbb{N}})$ to
$1$ if $h(\Gamma(\tau))=0$ and to $0$ otherwise.
Each element $q$ of ${\operatorname{toric}}_{\sigma}$ is written in the form $q={\bold e}(a)\cdot 0_\tau$ for $a\in {\sigma}_{\mathbb{C}}$ and for a face $\tau$ of ${\sigma}$.
The face $\tau$ of ${\sigma}$ is determined by $q$ and called the {\it face associated to $q$}, and $a$ modulo $\tau_{\mathbb{C}}+ \log({\Gamma}({\sigma})^{\gp})$ is determined by $q$. The stalk of $M/\cO^\times$ of ${\operatorname{toric}}_{{\sigma}}$ at $q$ is identified with $\Hom(\Gamma(\tau), {\mathbb{N}})$.
\medskip
\end{sbpara}
\begin{sbpara}\label{|toric|} Let the notation be as in \ref{toric}. Define $$|{\operatorname{toric}}|_{{\sigma}}:=\Hom(P({\sigma}), {\mathbb{R}}_{\geq 0}^{\mult})\supset |{\operatorname{torus}}|_{{\sigma}}:= \Hom(P({\sigma})^{\gp}, {\mathbb{R}}_{>0})= {\mathbb{R}}_{>0}\otimes \Gamma({\sigma})^{\gp}.$$
Here ${\mathbb{R}}_{\geq 0}^{\mult}$ denotes the multiplicative monoid ${\mathbb{R}}_{\geq 0}$. Thus we have $|{\operatorname{toric}}|_{{\sigma}}\subset {\operatorname{toric}}_{{\sigma}}$ and $|{\operatorname{torus}}|_{{\sigma}}\subset {\operatorname{torus}}_{{\sigma}}$.
We have projections $q\mapsto |q|\;;\; {\operatorname{toric}}_{{\sigma}}\to |{\operatorname{toric}}|_{{\sigma}}$ and ${\operatorname{torus}}_{{\sigma}}\to |{\operatorname{torus}}|_{{\sigma}}$ induced by taking the absolute value $|\cdot|\;:\; {\mathbb{C}}^{\mult} \to {\mathbb{R}}_{\geq 0}^{\mult}$.
\end{sbpara}
\begin{sbpara}\label{add} We give additive presentations of $|{\operatorname{torus}}|_{{\sigma}}$ and $|{\operatorname{toric}}|_{{\sigma}}$.
We have an isomorphism of topological groups
$${\sigma}_{\mathbb{R}}\simeq |{\operatorname{torus}}|_{{\sigma}}\;;\; b \mapsto {\bf e}(ib).$$ We will often identify $|{\operatorname{torus}}|_{{\sigma}}$ with ${\sigma}_{{\mathbb{R}}}$ via this isomorphism.
This identification is extended to an identification of
$|{\operatorname{toric}}|_{{\sigma}}$ and the set of equivalence classes of pairs $(\tau, b)$, where $b\in {\sigma}_{\mathbb{R}}$ and $\tau$ is a face of ${\sigma}$.
Here $(\tau, b)$ and $(\tau', b')$ are equivalent if and only if $\tau'=\tau$ and $b'\equiv b \bmod \tau_{\mathbb{R}}$. We identify ${\bf e}(ib)0_{\tau}\in |{\operatorname{toric}}|_{\sigma}$ with the class of $(\tau, b)$.
The topology of $|{\operatorname{toric}}|_{{\sigma}}$ is understood as follows. Let $x=\text{class}\,(\tau, b)\in |{\operatorname{toric}}|_{{\sigma}}$.
Take a finite set $(N_j)_j$ of generators of the cone $\tau$.
Then the following sets $V(U, c)$ form a base of neighborhoods of $x$.
Let $U$ be a neighborhood of $b$ in ${\sigma}_{\mathbb{R}}$ and let $c\in {\mathbb{R}}_{>0}$.
Then, $V(U, c)$ is the set of $\text{class}\,(\tau', b')$, where
$\tau'$ is a face of $\tau$ and $b' =b''+\sum_j y_j N_j$ for some $b''\in U$ and some real numbers $y_j\geq c$.
\end{sbpara}
\begin{sbpara}\label{ind1} Note that ${\operatorname{toric}}_{{\sigma}}$ depends on the choice of $\Gamma$ (actually it depends on $\Gamma({\sigma})$) though the notation ${\operatorname{toric}}_{{\sigma}}$ does not tell this dependence.
However, the topological space $|{\operatorname{toric}}|_{{\sigma}}$ does not depend on $\Gamma$ as is seen in \ref{add}.
\end{sbpara}
\begin{sbpara}\label{Esig}
Let $$\Ec_{{\sigma}}:={\operatorname{toric}}_{{\sigma}} \times \Dc, \quad \Ec^{\sharp}_{{\sigma}}:=|{\operatorname{toric}}|_{{\sigma}} \times \Dc.$$
Let $E_{{\sigma}}$ (resp.\ $\tilde E_{{\sigma}}$) be the set of all $(q, F)\in \Ec_{{\sigma}}$ satisfying the following condition (i) (resp.\ (i)${}'$).
Write $q={\bold e}(a)0_{\tau}$, where $a \in {\sigma}_{{\mathbb{C}}}$ and $\tau$ is a face of ${\sigma}$.
(i) The pair $(\tau, \exp(a)F)$ generates a nilpotent orbit.
(i)${}'$ We have $NF^p\subset F^{p-1}$ for $N\in \tau$ and $p\in {\mathbb{Z}}$.
We have $E_{{\sigma}}\subset \tilde E_{{\sigma}} \subset \Ec_{{\sigma}}$.
Endow the complex analytic space $\Ec_{{\sigma}}$ with the pullback log structure from ${\operatorname{toric}}_{{\sigma}}$.
Endow $E_{{\sigma}}$ and $\tilde E_{{\sigma}}$ with the strong topologies (\cite{KU2}, 3.1.1) in $\Ec_{{\sigma}}$ as reviewed below,
with the inverse images of the sheaf of holomorphic functions on $\Ec_{{\sigma}}$, and with the inverse images of the log structure of $\Ec_{{\sigma}}$.
Recall that for a complex analytic space $X$ and a subset $S$ of $X$, the {\it strong topology of $S$ in $X$} is the strongest topology on $S$ such that for every complex analytic space $Y$ and for every morphism ${\lambda}:Y\to X$ of complex analytic spaces such that ${\lambda}(Y)\subset S$, the map ${\lambda}: Y\to S$
is continuous. It is stronger than the topology on $S$ as a subspace of $X$.
Let
$$E^{\sharp}_{{\sigma}}:= E_{{\sigma}}\cap \Ec^{\sharp}_{{\sigma}}, \quad \tilde E^{\sharp}_{{\sigma}}:= \tilde E_{{\sigma}}\cap \Ec^{\sharp}_{{\sigma}},$$
endowed with the topologies as the subspaces of $E_{{\sigma}}$ and $\tilde E_{{\sigma}}$, respectively.
Using the additive presentation of $|{\operatorname{toric}}|_{{\sigma}}$ in \ref{add}, we can identify
$E^{\sharp}_{{\sigma}}$ (resp.\ $\tilde E^{\sharp}_{{\sigma}}$) with the set of $(\text{class}\,(\tau, b), F)\in |{\operatorname{toric}}|_{{\sigma}} \times \Dc=\Ec^{\sharp}_{{\sigma}}$ such that $(\tau, \exp(ib)F)$ generates a nilpotent orbit (resp.\
such that $NF^p\subset F^{p-1}$ for all $N\in \tau$ and $p\in {\mathbb{Z}}$).
\end{sbpara}
\begin{sbpara}\label{indepGam1}
We show that as a topological space, $E^{\sharp}_{{\sigma}}$ does not depend on $\Gamma$. Write $E_{{\sigma}}$, $E^{\sharp}_{{\sigma}}$ and $P({\sigma})$ (\ref{toric}) for $\Gamma$ as $E_{\Gamma({\sigma})}$, $E^{\sharp}_{\Gamma({\sigma})}$ and $P(\Gamma({\sigma}))$, respectively, to express the dependence on $\Gamma({\sigma})$.
Assume that $\Gamma_1$ and $\Gamma_2$ are strongly compatible with $\Sigma$. Then $\Gamma_1\cap \Gamma_2$ is strongly compatible with $\Sigma$. We show that $E_{(\Gamma_1\cap \Gamma_2)({\sigma})}\to E_{\Gamma_j({\sigma})}$ are homeomorphisms for $j=1,2$. Replacing $\Gamma_1\cap \Gamma_2$ by $\Gamma_1$, we may assume $\Gamma_1\subset \Gamma_2$. Write $\check{E}_{\Gamma_j({\sigma})}$ as $Z_j$, $E_{\Gamma_j({\sigma})}$ as $Y_j$, and $E^{\sharp}_{\Gamma_j({\sigma})}$ as $Y^{\sharp}_j$ ($j=1,2$).
Since $P(\Gamma_2({\sigma}))\subset P(\Gamma_1({\sigma}))$, and ${\mathbb{C}}[P(\Gamma_1({\sigma}))]$ is a finitely generated ${\mathbb{C}}[P(\Gamma_2({\sigma})])$-module, the map ${\operatorname{toric}}_{\Gamma_1({\sigma})}\to {\operatorname{toric}}_{\Gamma_2({\sigma})}$ is proper and surjective and hence
the map $Z_1\to Z_2$ is proper and surjective.
We prove that for the map $Y_1\to Y_2$, the topology of the latter is the image of the topology of the latter. Let $U$ be a subset of $Y_2$ and assume that the inverse image $U'$ of $U$ in $Y_1$ is open. We prove that $U$ is open. Let $S$ be an analytic space over ${\mathbb{C}}$ and assume that we have a morphism $S\to Z_2$ whose image is contained in $Y_2$. Our task is to prove that the inverse image of $U$ in $S$ is open. Let $S'$ be the fiber product of $S\to Z_2\leftarrow Z_1$ in the category of analytic spaces over ${\mathbb{C}}$. Since the set $Y_1$ is the fiber product
of $Y_2 \to Z_2 \leftarrow Z_1$, the image of $S'\to Z_1$ is contained in $Y_1$. Hence the inverse image of $U'$ in $S'$, which is the inverse image of $U$ in $S'$, is open. Since $S'\to S$ is proper surjective, this proves that the inverse image of $U$ in $S$ is open.
Since $Y_j^{\sharp}$ is closed in $Y_j$, this tells that for the bijection $Y_1^{\sharp}\to Y^{\sharp}_2$, the topology of the latter is the image of the topology of the former. Hence the last map is a homeomorphism.
\end{sbpara}
\begin{sbpara}\label{phisig}
For ${\sigma}\in \Sigma$, consider the map
$$\varphi_{{\sigma}}: E_{{\sigma}}\to \Gamma \operatorname{\backslash} D_{\Sigma}\;;\; (q,F) \mapsto \text{class}\,(\tau, Z)$$ with $Z=\exp(\tau_{\mathbb{C}})\exp(a)F$, where $\tau$ and $a\in {\sigma}_{\mathbb{C}}$ are such that $q= {\bold e}(a) 0_{\tau}$.
We endow $\Gamma\operatorname{\backslash} D_{\Sigma}$ with a structure of a locally ringed space over ${\mathbb{C}}$ and with a log structure as follows. The topology of $\Gamma \operatorname{\backslash} D_{\Sigma}$ is the strongest topology for which the maps
$\varphi_{{\sigma}}$ are continuous for all ${\sigma}\in \Sigma$. The structure sheaf of $\Gamma \operatorname{\backslash} D_{\Sigma}$ consists of functions whose pullbacks to $E_{{\sigma}}$ belong to the structure sheaf of $E_{{\sigma}}$ for all ${\sigma}\in \Sigma$. The log structure of $\Gamma \operatorname{\backslash} D_{\Sigma}$ is the subsheaf of the structure sheaf of $\Gamma \operatorname{\backslash} D_{\Sigma}$ consisting of functions whose pullbacks to $E_{{\sigma}}$ belong to the log structure of $E_{{\sigma}}$ for all ${\sigma}\in \Sigma$.
\end{sbpara}
\begin{sbpara}
In this topology of $\Gamma \operatorname{\backslash} D_{\Sigma}$, if $({\sigma}, Z)\in D_\Sigma$ and if $F\in Z$ and $N_1, \dots, N_n\in {\sigma}$ generate the cone ${\sigma}$, $\text{class}\,({\sigma}, Z)\in \Gamma \operatorname{\backslash} D_{\Sigma}$ is the limit of $\text{class}\,(\exp(\sum_{j=1}^n z_jN_j)F)\in \Gamma \operatorname{\backslash} D$ where $z_j\in {\mathbb{C}}$ and $\text{Im}(z_j)$ tends to $\infty$ for $1\leq j\leq n$.
\end{sbpara}
\begin{sbpara} Here we do not need $\Gamma$.
For ${\sigma}\in \Sigma$, consider the surjective map $$\varphi^{\sharp}_{{\sigma}}: E^{\sharp}_{{\sigma}}\to D^{\sharp}_{{\sigma}}\;;\; (\text{class}\,(\tau, b), F) \mapsto \text{class}\,(\tau, Z)$$ with $Z=\exp(i\tau_{\mathbb{R}})\exp(ib)F$.
We define the topology of $D^{\sharp}_{\Sigma}$ as the strongest topology such that the composite $E^{\sharp}_{{\sigma}}\to D^{\sharp}_{{\sigma}}\to D^{\sharp}_{\Sigma}$ also denoted by $\varphi^{\sharp}_{{\sigma}}$ are continuous for all ${\sigma}\in \Sigma$.
\end{sbpara}
\begin{sbpara}
In this topology, if $({\sigma}, Z)\in D^{\sharp}_\Sigma$ and if $F\in Z$ and $N_1, \dots, N_n\in {\sigma}$ generate the cone ${\sigma}$, $({\sigma}, Z)$ is the limit of $\exp(\sum_{j=1}^n iy_jN_j)F\in D$ where $y_j\in {\mathbb{R}}_{>0}$ and $y_j\to \infty$ for $1\leq j\leq n$.
\end{sbpara}
\begin{sbpara} Assume that $(\Sigma, \Gamma)$ is strongly compatible.
Since $$\begin{matrix} E^{\sharp}_{{\sigma}}& \overset{\varphi^{\sharp}_{{\sigma}}}\longrightarrow & D_{\Sigma}^{\sharp}\\ \downarrow &&\downarrow \\
E_{{\sigma}}&\overset{\varphi_{{\sigma}}}\longrightarrow & \Gamma\operatorname{\backslash} D_{\Sigma}\end{matrix}$$ is commutative, we have that the map $D_{\Sigma}^{\sharp}\to \Gamma\operatorname{\backslash} D_{\Sigma}$ is continuous.
\end{sbpara}
\begin{sbpara}
\label{logmfd} For an fs log analytic space $X$, by a {\it strong subspace} of $X$, we mean a subset of $X$ endowed with the strong topology in $X$ (\ref{Esig}), with the inverse image of the sheaf of holomorphic functions on $X$, and with the inverse image of the log structure of $X$.
For example, $E_{{\sigma}}$ is a strong subspace of $\check{E}_{{\sigma}}$.
Let ${\cal {B}}(\log)$ be the category of locally ringed spaces endowed with a log structure which are locally isomorphic to a strong subspace of an fs log analytic space.
See \cite{KU2} 3.2.4 and \cite{KNU2} Part III 1.1.4.
Both $E_{{\sigma}}$ and $\tilde E_{{\sigma}}$ are objects of ${\cal {B}}(\log)$.
An object of ${\cal {B}}(\log)$ is a {\it log manifold} if it is locally isomorphic to an open set of a strong subspace $S$ of a log smooth fs log analytic space $X$ satisfying the following condition: There is a finite family of log differential forms $(\omega_j)_j$ on $X$ such that $S=\{x\in X\;|\; \omega_j(x)=0$ for all $j%
\}$. Here $\omega_j(x)$ denotes the pullback of $\omega_j$ to the log point $x$ (it is not the germ of $\omega_j$ at $x$).
See \cite{KU2} 3.5.7 and \cite{KNU2} Part III 1.1.5.
Later we will show that $E_{{\sigma}}$, $\tilde E_{{\sigma}}$, and $\Gamma \operatorname{\backslash} D_{\Sigma}$ for a strongly compatible $(\Sigma, \Gamma)$ with $\Gamma$ being a neat semi-arithmetic subgroup of $G'({\mathbb{Q}})$ (\ref{Gamma}), are log manifolds.
See Theorem \ref{Elm} and Theorem \ref{t:property} (4). We will also show that for such $\Gamma$, the quotient space $\Gamma \operatorname{\backslash} D^{\sharp}_{\Sigma}$ is identified with the space $(\Gamma\operatorname{\backslash} D_{\Sigma})^{\log}$ (Theorem \ref{t:property} (5)).
\end{sbpara}
\subsection{The space of ratios}
\label{ss:ratio}
We review the space of ratios $S_{[:]}$, and discuss $D_{\Sigma, [:]}$ and $D^{\sharp}_{\Sigma, [:]}$ which are modified versions of $D_{\Sigma}$ and $D^{\sharp}_{\Sigma}$, respectively.
\begin{sbpara}\label{rat1}
This is a review of \cite{KNU2} Part IV 4.2.
Let
$S$ be a locally ringed space over $E={\mathbb{R}}$ or ${\mathbb{C}}$ with an fs log structure $M_S$ satisfying the following conditions (i) and (ii).
(i) For every $s\in S$, the natural homomorphism
$E\to \cO_{S,s}/m_s$ is an isomorphism.
Here, we denote by $m_s$ the maximal ideal of $\cO_{S,s}$.
(ii) For every open set $U$ of $S$ and for every $f\in \cO(U)$, the map $U\to E\;;\; s \mapsto f(s)$ is continuous. Here $f(s)$ is the image of $f$ in $\cO_{S,s}/m_s=E$.
Then we have a topological space $S_{[:]}$ over $S$, called the {\it space of ratios}, defined as follows.
\end{sbpara}
\begin{sbpara}\label{rat2a}
For a sharp fs monoid $\cS$, let $R(\cS)$ be the set of all maps $r:(\cS\times \cS)\smallsetminus \{(1,1)\}\to [0,\infty]$ satisfying the following conditions (i)--(iii).
(i) $r(g,f)=r(f,g)^{-1}$.
(ii) $r(f, g)r(g,h)=r(f,h)$ if $\{r(f,g), r(g,h)\}\neq \{0,\infty\}$.
(iii) $r(fg, h)=r(f, h)+r(g,h)$.
\end{sbpara}
\begin{sbpara}\label{rat2} Let ${\sigma}$ be the cone $\Hom(\cS, {\mathbb{R}}_{\geq 0}^{\add})$, where ${\mathbb{R}}_{\geq 0}^{\add}$ denotes the additive monoid ${\mathbb{R}}_{\geq 0}$. Then
$R(\cS)$ is identified with the set of equivalence classes of
$({\sigma}_j, N_j)_{1\leq j\leq n}$, where $n\geq 0$, ${\sigma}_j$ are faces of ${\sigma}$
such that $\{0\}={\sigma}_0\subsetneq {\sigma}_1\subsetneq \dots \subsetneq {\sigma}_n={\sigma}$, and $N_j$ is an element of the interior of ${\sigma}_j$. The equivalence relation is that $({\sigma}_j, N_j)_{1\leq j\leq n} \sim ({\sigma}'_j, N'_j)_{1\leq j\leq n'}$ if and only if $n=n'$, ${\sigma}_j'={\sigma}_j$ for all $j$, and for each $j$, there is a $c_j>0$ such that $N_j'\equiv c_jN_j\bmod {\sigma}_{j-1,{\mathbb{R}}}$.
Such a $\text{class}\,(({\sigma}_j, N_j)_j)$ is identified with $r\in R(\cS)$ defined as follows. For $(f,g)\in \cS\times \cS\smallsetminus \{(1,1)\}$, take the biggest $j$ such that ${\sigma}_{j-1}$ kills $f$ and $g$. Then $r(f,g)=N_j(f)/N_j(g)$.
\end{sbpara}
\begin{sbrem}
There is an error in a related part 4.1.6 in \cite{KNU2} Part IV.
In the definition of the map $R'(\cS) \to R(\cS)$, \lq\lq$\infty$'' in (2) and \lq\lq $0$'' in (3) should be interchanged.
\end{sbrem}
\begin{sbpara}
\label{ratSs}
Let $S$ be as in \ref{rat1}.
We define the set
$S_{[:]}$ as
the set of $(s,r)$ with $s\in S$ and $r\in R((M_S/\cO_S^\times)_s)$.
\end{sbpara}
\begin{sbpara}
\label{ratSt}
We define the topology of $S_{[:]}$ as the weakest topology for which the following conditions (1) and (2) are satisfied.
(1) The map $S_{[:]}\to S\;;\;(s,r)\mapsto s$ is continuous.
(2) Let $U$ be an open set of $S$, let $f,g\in M_S(U)$, and assume that $|f(s)|<1$ and $|g(s)|<1$ for all $s\in U$. Here $f(s)$ is the value at $s$ of the image of $f$ in $\cO_U$ and $g(s)$ is defined similarly. Let $\tilde U$ be the inverse image of $U$ in $S_{[:]}$.
Then the following map $r_{f,g}: \tilde U \to [0, \infty]$ is continuous.
Let $s\in U$. If $f,g\in \cO_{S,s}^\times$, then $r_{f,g}(s,r):= \log(|f(s)|)/\log(|g(s)|)$. Otherwise, $r_{f,g}(s,r)= r({\bar f}(s),{\bar g}(s))$, where ${\bar f}(s)$ is the image of $f$ in $(M_S/\cO_S^\times)_s$ and ${\bar g}(s)$ is defined similarly.
\end{sbpara}
\begin{sbpara}\label{rat4}
Assume that we are given a chart $\cS\to M_S$.
Let $\Phi$ be a set of faces of $\cS$ which is totally ordered for the inclusion relation and which contains $\cS$.
Let
$S_{[:]}(\Phi)$ be the subset of $S_{[:]}$ consisting of all $(s, r)$ such that if $\text{class}(({\sigma}_j, N_j)_{1\leq j\leq n})$ corresponds to $r$ as in \ref{rat2}, the annihilator of ${\sigma}_j$ in $\cS$, which is a face of $\cS$, belongs to $\Phi$ for every $1\leq j\leq n$.
Here the annihilator of ${\sigma}_j$ in $\cS$ means the subset of $\cS$ consisting of all elements which are sent to $0$ by $\cS\to (M_S/\cO_S^\times)_s\overset{h}\to {\mathbb{R}}_{\geq 0}$ for all $h\in {\sigma}_j$.
Then $S_{[:]}(\Phi)$ for all above $\Phi$ forms an open covering of $S_{[:]}$ (ibid.\ Part IV 4.2.11).
For a geometric meaning of $S_{[:]}(\Phi)$, see ibid.\ Part IV 4.2.11--4.2.19 in the general case, and ibid.\ Part IV 4.2.20--4.2.22 in the case $S=|\Delta|^n$ with $|\Delta|:=\{t\in{\mathbb{R}}\,|\,0\le t<1\}$.
\end{sbpara}
\begin{sbpara} Let $|{\operatorname{toric}}|_{{\sigma},[:]}\subset {\operatorname{toric}}_{{\sigma},[:]}$ be the inverse image of $|{\operatorname{toric}}|_{{\sigma}}$ under the map ${\operatorname{toric}}_{{\sigma},[:]}\to {\operatorname{toric}}_{{\sigma}}$. We have a projection ${\operatorname{toric}}_{{\sigma},[:]}\to |{\operatorname{toric}}|_{{\sigma},[:]}$.
This is a unique continuous map which is compatible with the projection ${\operatorname{toric}}_{{\sigma}} \to |{\operatorname{toric}}|_{{\sigma}}$.
\end{sbpara}
\begin{sbpara}\label{add2} We give an additive presentation of $|{\operatorname{toric}}|_{{\sigma},[:]}$.
We can identify
$|{\operatorname{toric}}|_{{\sigma},[:]}$ with the set of equivalence classes of $(({\sigma}_j, N_j)_{1\leq j\leq n},b)$, where
$n\geq 0$, ${\sigma}_j$ are faces of $\sigma$ such that $\{0\}\subsetneq{\sigma}_1\subsetneq \dots \subsetneq {\sigma}_n$ (here ${\sigma}_n$ need not coincide with ${\sigma}$),
$N_j$ is an element of the interior of ${\sigma}_j$, and $b\in
{\sigma}_{\mathbb{R}}$. The equivalence relation is that $(({\sigma}_j, N_j)_{1\leq j\leq n}, b)$ and $(({\sigma}'_j, N'_j)_{1\leq j\leq n'}, b')$ are equivalent if and only if
$n'=n$, ${\sigma}'_j={\sigma}_j$, $N_j'\equiv c_jN_j \bmod {\sigma}_{j-1,{\mathbb{R}}}$ for some $c_j\in {\mathbb{R}}_{>0}$ ($1\leq j\leq n$), and $b'\equiv b \bmod {\sigma}_{n,{\mathbb{R}}}$.
Here ${\sigma}_0$ denotes $\{0\}$.
The projection $|{\operatorname{toric}}|_{{\sigma}, [:]}\to |{\operatorname{toric}}|_{{\sigma}}$ is understood as
$\text{class}\,(({\sigma}_j,N_j), b)\mapsto \text{class}\,({\sigma}_n, b)$.
\end{sbpara}
\begin{sbpara}\label{excel1}
Let $x=\text{class}\,(({\sigma}_j, N_j)_{1\leq j \leq n}, b)\in |{\operatorname{toric}}|_{{\sigma}, [:]}$.
By
a {\it good base} for $x$, we mean a family of elements $(N_s)_{s\in S}$ of ${\sigma}_n$ satisfying the following conditions (i) and (ii).
(i) The index set $S$ is the disjoint union of some subsets $S_j$ ($1\leq j\leq n$), and the following holds for each $j$ ($1\leq j\leq n$).
Let $S_{\leq j}:=\bigsqcup_{k\leq j} S_k\subset S$. Then $N_s\in {\sigma}_j$ if $s\in S_{\leq j}$, and $(N_s)_{s\in S_{\leq j}}$ is a base of the ${\mathbb{R}}$-vector space ${\sigma}_{j, {\mathbb{R}}}$.
(ii) There are $a_s\in {\mathbb{R}}_{>0}$ ($s\in S_j$) such that $N_j \equiv \sum_{s\in S_j} a_sN_s\bmod {\sigma}_{j-1, {\mathbb{R}}}$ for $1\leq j\leq n$.
This is a [:]-version of
good base discussed in \cite{KU2} 6.3.
\end{sbpara}
\begin{sbprop}\label{excel2}
A good base for $x$ exists.
\end{sbprop}
\begin{pf}
For each $j$,
take a simplicial subcone of the cone $({\sigma}_j+{\sigma}_{j-1,{\mathbb{R}}})/{\sigma}_{j-1,{\mathbb{R}}}$
consisting of the interior points except the origin and including the class of $N_j$.
Take a base $(\overline {N}_s)_{s \in S_{j}}$ of this cone and lift $\overline {N}_s$ ($s \in S_{j}$) to an element $N_s$ of ${\sigma}_j$ for each $j$.
Then these $N_s$'s form
a good base.
\end{pf}
\begin{sbpara}\label{add3} We describe the topology of $|{\operatorname{toric}}|_{{\sigma}, [:]}$ by using the additive presentation \ref{add2}.
Let $n\geq 0$, let $\{0\}\subsetneq {\sigma}_1\subsetneq \dots \subsetneq {\sigma}_n$ be faces of ${\sigma}$, and let $(N_s)_{s\in S}$ be a finite family of elements of ${\sigma}_n$ satisfying the condition (i) in \ref{excel1}.
Fix an ${\mathbb{R}}$-subspace $B$ of ${\sigma}_{\mathbb{R}}$ such that ${\sigma}_{\mathbb{R}}={\sigma}_{n, {\mathbb{R}}}\oplus B$.
Let $U$ be the subset of $|{\operatorname{toric}}|_{{\sigma},[:]}$ consisting of classes of $(({\sigma}'_k, N _k)_{1\leq k \leq n'}, b)$
satisfying the following conditions. There is an injective increasing map $\theta: \{1, \dots, n'\}\to \{1, \dots, n\}$ such that ${\sigma}'_k={\sigma}_{\theta(k)}$
for $1\leq k \leq n'$. For $1\leq k\leq n'$, if we write $N_k \equiv \sum_s y_s N_s\bmod {\sigma}'_{k-1, {\mathbb{R}}}$, where $s$ ranges over all elements of $S$
belonging to $S_j$ for some $j$ such that $\theta(k-1)<j\leq \theta(k)$, then $y_s\in {\mathbb{R}}_{>0}$. (In the case $k=1$, $\theta(k-1)$ means $0$.) If we write $b\equiv b' +\sum_s y_sN_s \bmod {\sigma}'_{n',{\mathbb{R}}}$,
where $b'\in B$ and $s$ ranges over all elements of $S$ belonging to $S_j$ for some $j$ such that $\theta(n')<j$, then $y_s\in {\mathbb{R}}_{>0}$.
Then $U$ is an open set of $|{\operatorname{toric}}|_{{\sigma}, [:]}$.
For each $j$, choose an element $c_j$ of $S_j$.
Let $T$ be the complement of $\{c_j\;|\; 1\leq j\leq n\}$ in $S$.
Then we have a homeomorphism
$$U\simeq {\mathbb{R}}^n_{\geq 0} \times {\mathbb{R}}_{>0}^T \times B$$
defined as follows. Let $x' =\text{class}\,(({\sigma}'_k, N_k)_{1\leq k \leq n'}, b)\in U$, and let $\theta$, $y_s$ ($s\in S$), $b'\in B$ be as above. Then the image of $x'$ in ${\mathbb{R}}^n_{\geq 0}\times {\mathbb{R}}_{>0}^T \times B$ is $((t_j)_{1\leq j\leq n}, (y_s/y_{c_j})_{s\in T}, b')$, where $t_j$ are as follows.
If $j$ is in the image of $\theta$, then $t_j=0$.
If $j$ is not in the image of $\theta$ and $j<\theta(n')$, then $t_j= y_{c_{j+1}}/y_{c_j}$.
If $\theta(n')<j$, then $t_j= 1/y_{c_j}$.
Note that if $(N_s)_{s\in S}$ is
a good base for $x=\text{class}\,(({\sigma}_j, N_j)_{1\leq j \leq n}, b)\in |{\operatorname{toric}}|_{{\sigma},[:]}$, $x$ belongs to the above $U$ and hence $U$ is an open neighborhood of $x$.
\end{sbpara}
\begin{sbpara}\label{Esig:}
Let the notation be as in \ref{toric}.
Let
$$\Ec^{\sharp}_{{\sigma},[:]}:=|{\operatorname{toric}}|_{{\sigma},[:]} \times \Dc \subset \Ec_{{\sigma},[:]}={\operatorname{toric}}_{{\sigma},[:]}\times \Dc.$$
Let
$$E^{\sharp}_{{\sigma},[:]}:=E_{{\sigma},[:]}\cap \Ec^{\sharp}_{{\sigma},[:]}, \quad
\tilde E^{\sharp}_{{\sigma},[:]}:=\tilde E_{{\sigma},[:]}\cap \Ec^{\sharp}_{{\sigma},[:]}.$$
We endow $E^{\sharp}_{{\sigma},[:]}$ and $\tilde E^{\sharp}_{{\sigma},[:]}$ with the topologies as the subspaces of $E_{{\sigma},[:]}$ and $\tilde E_{{\sigma},[:]}$, respectively.
These coincide with the topologies defined via the projections $E_{{\sigma},[:]}\to E^{\sharp}_{{\sigma},[:]}$ and $\tilde E_{{\sigma},[:]}\to \tilde E^{\sharp}_{{\sigma},[:]}$, respectively.
\end{sbpara}
\begin{sbpara}\label{indepGam2} We show that as topological spaces, $|{\operatorname{toric}}|_{{\sigma}, [:]}$ and
$E^{\sharp}_{{\sigma}, [:]}$ are independent of the choice of $\Gamma$.
We describe the proof for $E^{\sharp}_{{\sigma}, [:]}$. The proof for $|{\operatorname{toric}}|_{{\sigma}, [:]}$ is similar.
In fact, assume that $\Gamma_j$ ($j=1, 2$) are strongly compatible with $\Sigma$ and assume $\Gamma_1\subset \Gamma_2$. Since $E^{\sharp}_{\Gamma_j({\sigma}),[:]}$ is identifies with $(E^{\sharp}_{\Gamma_j({\sigma})})_{[:]}$ (the $[:]$-space of $E^{\sharp}_{\Gamma_j({\sigma})}$ which is endowed with the inverse image of the log structure of $E_{\Gamma_j({\sigma})}$, $E^{\sharp}_{\Gamma_j({\sigma}), [:]}$ is proper over $E^{\sharp}_{\Gamma_j({\sigma})}$. Since $E^{\sharp}_{\Gamma_1({\sigma})}\to E^{\sharp}_{\Gamma_2({\sigma})}$ is a homeomorphism (\ref{indepGam1}), the map
$E^{\sharp}_{\Gamma_1({\sigma}),[:]}\to E^{\sharp}_{\Gamma_2({\sigma}),[:]}$ is proper continuous and it is bijective. Hence it is a homeomorphism.
\end{sbpara}
\begin{sbpara}\label{rat3}
Let $D_{\Sigma, [:]}$ (resp.\ $D^{\sharp}_{\Sigma,[:]}$) be the set of $({\sigma}, Z, \text{class}\,(({\sigma}_j, N_j)_{1\leq j\leq n}))$, where ${\sigma}\in \Sigma$, $({\sigma},Z)\in D_{\Sigma}$ (resp.\ $({\sigma},Z)\in D^{\sharp}_{\Sigma}$), $n\geq 0$, ${\sigma}_j$ are faces of ${\sigma}$ such that $\{0\}\subsetneq {\sigma}_1\subsetneq \dots \subsetneq {\sigma}_n={\sigma}$, and $N_j$ is an element of the interior of ${\sigma}_j$. The notation class is for the equivalence relation that
$({\sigma}_j, N_j)_{1\leq j\leq n}\sim ({\sigma}'_j, N'_j)_{1\leq j\leq n'}$ if and only if $n'=n$, ${\sigma}'_j={\sigma}_j$, and $N'_j\equiv a_jN_j\bmod {\sigma}_{j-1,{\mathbb{R}}}$
for some $a_j\in {\mathbb{R}}_{>0}$ ($1\leq j\leq n$).
We have canonical maps $$D_{\Sigma, [:]}\to D_{\Sigma}, \quad D^{\sharp}_{\Sigma, [:]}\to D^{\sharp}_{\Sigma}$$
by sending the class of $({\sigma}, Z, \text{class}\,(({\sigma}_j,N_j)_{1\leq j\leq n}))$ to $({\sigma}, Z)$.
\end{sbpara}
\begin{sbpara}\label{rat8} Assume that $(\Sigma, \Gamma)$ strongly compatible. We define a topology of $\Gamma \operatorname{\backslash} D_{\Sigma, [:]}$.
For ${\sigma}\in \Sigma$, by \ref{rat2}, $E_{{\sigma}}$ is identified with the set of triples $(q, \text{class}\,(({\sigma}_j, N_j)_{1\leq j\leq n}), F)$, where $q\in {\operatorname{toric}}_{{\sigma}}$ and writing $q$ as ${\bold e}(a)0_{\tau}$, $n\geq 0$, ${\sigma}_j$ are faces of $\tau$ such that
$\{0\}\subsetneq {\sigma}_1\subsetneq \dots \subsetneq {\sigma}_n=\tau$, and $N_j$ is an element of the interior of ${\sigma}_j$. The equivalence relation is defined in the same way as in \ref{rat2}.
For ${\sigma}\in \Sigma$, consider the map
$$\varphi_{{\sigma},[:]}: E_{{\sigma},[:]}\to \Gamma \operatorname{\backslash} D_{\Sigma,[:]}\;;\; (q,\text{class}\,({\sigma}_j, N_j)_{1\leq j\leq n}, F) \mapsto \text{class}\,(\tau, Z, \text{class}\,({\sigma}_j, N_j)_{1\leq j\leq n})$$ with $q= {\bold e}(a) 0_{\tau}$ and $Z=\exp(\tau_{\mathbb{C}})\exp(a)F$.
We endow $\Gamma\operatorname{\backslash} D_{\Sigma,[:]}$ with the strongest topology for which the maps
$\varphi_{{\sigma},[:]}$ are continuous for all ${\sigma}\in \Sigma$.
In this topology, if $({\sigma}, Z, \text{class}\,(({\sigma}_j, N_j)_{1\leq j\leq n}))\in D_{\Sigma,[:]}$ and if $F\in Z$, then
$\text{class}\,({\sigma}, Z, ({\sigma}_j, N_j)_{1\leq j\leq n})\in \Gamma \operatorname{\backslash} D_{\Sigma}$ is the limit of $\text{class}\,(\exp(\sum_{j=1}^n z_j\tilde N_j)F)\in \Gamma \operatorname{\backslash} D$ where $z_j\in {\mathbb{C}}$, $\text{Im}(z_j)\to \infty$ for $1\leq j\leq n$ and $\text{Im}(z_j)/\text{Im}(z_{j+1})\to \infty$ for $1\leq j\leq n-1$.
\end{sbpara}
\begin{sbpara}\label{rat9} Here we do not need $\Gamma$.
For ${\sigma}\in \Sigma$, we have a map $$\varphi^{\sharp}_{{\sigma}, [:]}: E^{\sharp}_{{\sigma},[:]}\to D^{\sharp}_{\Sigma,[:]}\;;\; (\text{class}\,(({\sigma}_j, N_j)_{1\leq j\leq n}), b, F) \mapsto ({\sigma}_n,\exp(i{\sigma}_{n,{\mathbb{R}}}+ ib)F,\text{class}\,(({\sigma}_j, N_j)_{1\leq j\leq n})).$$
We define the topology of
$D^{\sharp}_{\Sigma,[:]}$ as the strongest topology for which the maps $\varphi^{\sharp}_{{\sigma},[:]}: E^{\sharp}_{{\sigma},[:]}\to D^{\sharp}_{\Sigma,[:]}$ are continuous for all ${\sigma} \in \Sigma$.
In this topology, if $x=({\sigma}, Z, \text{class}\,(({\sigma}_j, N_j)_{1\leq j\leq n}))\in D^{\sharp}_{\Sigma,[:]}$ and if $F\in Z$ and $\tilde N_j$, then
$x$ is the limit of $\exp(\sum_{j=1}^n iy_jN_j)F\in D$ where $y_j\in {\mathbb{R}}_{>0}$, $y_j/y_{j+1}\to \infty$ for $1\leq j\leq n$ ($y_{n+1}:=1$).
\end{sbpara}
\begin{sbpara} The maps $\Gamma\operatorname{\backslash} D_{\Sigma,[:]}\to \Gamma \operatorname{\backslash} D_{\Sigma}$ and $D^{\sharp}_{\Sigma,[:]}\to D^{\sharp}_{\Sigma}$ are continuous.
\end{sbpara}
\subsection{Valuative spaces, II}
\label{ss:val2}
\begin{sbpara} Let $E$ and $S$ be as in \ref{rat1}.
We recall that there are two kinds of valuative spaces $S_{\val(E)}$ and $S_{\val(|\cdot|)}$ associated to $S$ (\cite{KNU2} Part IV 3.1.3).
In the case where $S$ is an object of ${\cal {B}}_{\mathbb{R}}'(\log)$, $S_{\val}$ in Section
\ref{ss:val1}
is identified, as a topological space, with the topological space $S_{\val(|\cdot|)}$. On the other hand, $S_{\val}$ for an object $S$ of ${\cal {B}}(\log)$ (\ref{logmfd}) defined in \cite{KU2} 3.6.18, 3.6.23 is a locally ringed space over ${\mathbb{C}}$ with log structure, and it is $S_{\val({\mathbb{C}})}$.
These two kinds of $S_{\val}$ played important roles in our previous works \cite{KU2} and \cite{KNU2}.
Our rule of the notation $S_{\val}$ in \cite{KU2} and \cite{KNU2} and in this paper is that if $S$ is an object of ${\cal {B}}(\log)$, then $S_{\val}$ means $S_{\val({\mathbb{C}})}$, but otherwise, $S_{\val}$ means $S_{\val(|\cdot |)}$.
We also consider, for a weak fan $\Sigma$, the maps $D_{\Sigma, \val}\to D_{\Sigma, [:]}$ and $D^{\sharp}_{\Sigma, \val}\to D^{\sharp}_{\Sigma,[:]}$.
\end{sbpara}
\begin{sbpara}
Let $E$ and $S$ be as in \ref{rat1}.
As a set, let $S_{\val(|\cdot |)}$ (resp.\ $S_{\val(E)}$) be the set of triples $(s, V, h)$, where $s\in S$, $V$ is a submonoid of $(M_S/\cO_S^\times)_s^{\gp}$ such that $(M_S^{\gp}/\cO_S^\times)_s=V\cup V^{-1}$, $(M_S/\cO_S^\times)_s\subset V$ and $V^\times\cap (M_S/\cO_S^\times)_s=\{1\}$ (here $V^\times$ denotes the subgroup $V\cap V^{-1}$ of $(M_S^{\gp}/\cO_S^\times)_s$), and $h$ is a homomorphism from
$\{f\in M^{\gp}_{S,s}\;|\; f\bmod \cO_{S,s}^{\times} \in V^{\times}\}$
to ${\mathbb{R}}_{>0}$ (resp.\ $E^\times$) such that $h(u)=|u(s)|$ (resp.\ $h(u)=u(s)$) for all $u\in \cO_{S,s}^\times$.
The topologies of $S_{\val(|\cdot|)}$ and $S_{\val(E)}$ are defined
to be the weakest topology having the following properties (i) and (ii).
(i) The projection $(s,V,h)\mapsto s$ to $S$ is continuous.
(ii) Let $U$ be an open set of $S$ and let $f\in M_S(U)$. Then the subset $W=\{(s, V, h)\in S_{\val(|\cdot|)}$ (resp.\ $S_{\val(E)})
\;|\; s\in U,\ f\bmod \cO_{S,s}^\times\in V\}$ of $S_{\val(|\cdot|)}$ (resp.\ $S_{\val(E)}$) is open, and the map $W\to {\mathbb{R}}_{\geq 0}$ (resp.\ $W\to E$), which sends $(s,V, h)$ to $h(f)$ if $f\bmod \cO_{S,s}^\times\in V^\times$
and to $0$ otherwise, is continuous.
For an object $S$ of ${\cal {B}}(\log)$, $S_{\val(E)}$ has a structure of a locally ringed space with log structure given in \cite{KU2} 3.6.23.
For the understandings of these val spaces using inverse limits for blowing ups along the log structure, see \cite{KNU2} Part IV Section 3.1.
\end{sbpara}
\begin{sbpara}\label{VtoR}
For a sharp fs monoid $\cS$, we recall the set $V(\cS)$ and the canonical map $V(\cS)\to R(\cS)$ from \cite{KNU2} Part IV 4.1.7, 4.1.8.
Let $R(\cS)$ be as in \ref{rat2a} and let $V(\cS)$ be the set of all valuative submonoids $V$
of $\cS^{\gp}$ such that
$V \supset \cS$ and $V^\times \cap \cS=\{1\}$.
We have a surjective map
$$V(\cS)\to R(\cS)$$
sending $V\in V(\cS)$ to the element $r_V$ of $R(\cS)$ which is the map $\cS\times \cS\smallsetminus \{(1,1)\}\to[0,\infty]$ defined by
$$r_V(f, g)=\sup\{a/b\;|\; (a,b)\in {\mathbb{N}}^2\smallsetminus \{(0,0)\}, f^b/g^a\in V\}$$
$$= \inf\{a/b\;|\; (a, b)\in {\mathbb{N}}^2\smallsetminus \{(0,0)\}, g^a/f^b \in V\}.$$
\end{sbpara}
\begin{sbpara} We have proper surjective continuous maps
$S_{\val(E)}\to S_{\val(|\cdot |)}\to S_{[:]}\to S$.
Here the second arrow is defined by \ref{VtoR}.
\end{sbpara}
\begin{sbpara} Define
$${\operatorname{toric}}_{{\sigma},\val}:= ({\operatorname{toric}}_{{\sigma}})_{\val({\mathbb{C}})}\supset |{\operatorname{toric}}|_{{\sigma}, \val}:=(|{\operatorname{toric}}|_{{\sigma}})_{\val(|\cdot |)},$$
$$E_{{\sigma},\val}:=(E_{{\sigma}})_{\val({\mathbb{C}})}\supset E^{\sharp}_{{\sigma}, \val}:= (E^{\sharp}_{{\sigma}})_{\val(|\cdot |)}.$$
Then $E^{\sharp}_{{\sigma} \val}$ is identified with the inverse image of $|{\operatorname{toric}}|_{{\sigma},\val}$ under $E_{{\sigma}, \val}\to {\operatorname{toric}}_{{\sigma},\val}$. We have the projections
$${\operatorname{toric}}_{{\sigma},\val}\to |{\operatorname{toric}}|_{{\sigma},\val}, \quad E_{{\sigma}, \val}\to E^{\sharp}_{{\sigma}, \val}.$$
\end{sbpara}
\begin{sbpara}\label{indepGam3}
The topological spaces $|{\operatorname{toric}}|_{{\sigma}, \val}$ and $E^{\sharp}_{{\sigma}, \val}$ are independent of $\Gamma$. The proofs are similar to the proof for $E^{\sharp}_{{\sigma}, [:]}$ given in \ref{indepGam2}.
\end{sbpara}
\begin{sbpara}\label{Dval} Let $\Sigma$ be a weak fan. We define sets $D_{\Sigma, \val}$ and $D^{\sharp}_{\Sigma,\val}$.
For ${\sigma}\in \Sigma$, let $Q({\sigma})$ be the set of all rational linear maps ${\sigma}_{\mathbb{R}}\to {\mathbb{R}}$, and let $\tilde P({\sigma})$ be the set of all elements $h$ of $Q({\sigma})$ such that $h({\sigma})\subset {\mathbb{R}}_{\geq 0}$.
Let $D_{\Sigma, \val}$ (resp.\ $D^{\sharp}_{\Sigma, \val}$) be the set of quadruple $({\sigma}, Z, V, Z')$, where $({\sigma}, Z)\in D_{\Sigma}$ (resp.\ $D^{\sharp}_{\Sigma}$), $V$ is a submonoid of $Q({\sigma})$ such that $Q({\sigma})= V\cup (-V)$, $\tilde P({\sigma})\subset V$, and $V\cap (-V)\cap \tilde P({\sigma})= \{0\}$, and if $A\subset {\sigma}_{\mathbb{R}}\cap {\rm {Lie}}\,(G')$ denotes the annihilator of $V\cap (-V)$ in the perfect pairing ${\sigma}_{\mathbb{R}}\cap {\rm {Lie}}\,(G')\times Q({\sigma}) \to {\mathbb{Q}}$ of ${\mathbb{Q}}$-vector spaces, $Z'$ is an $\exp(A_{\mathbb{C}})$ (resp.\ $\exp(iA_{\mathbb{R}})$)-orbit in $Z$.
The canonical maps $D_{\Sigma, \val}\to D_{\Sigma}$, $D^{\sharp}_{\Sigma,\val}\to D^{\sharp}_{\Sigma}$ are given by $({\sigma}, Z, V, Z') \mapsto ({\sigma}, Z)$.
The shapes of the definitions of $D_{\Sigma, \val}$ and $D^{\sharp}_{\Sigma,\val}$ seem to be slightly different from those in \cite{KU2}, \cite{KNU2} Part III, but are the same. We hope the presentations of the present definitions are better.
\end{sbpara}
\begin{sbpara}
We have canonical maps of sets
$$D_{\Sigma, \val} \to D_{\Sigma, [:]}, \quad D^{\sharp}_{\Sigma, \val} \to D^{\sharp}_{\Sigma, [:]}$$
sending $({\sigma}, Z, V, Z')$ to $({\sigma}, Z, \text{class}\,(({\sigma}_j, N_j)_j))$, where $V\mapsto r_V\leftrightarrow\text{class}\,(({\sigma}_j, N_j)_j)$ by \ref{VtoR} and \ref{rat2}.
\end{sbpara}
\begin{sbpara}
\label{stval1}
Assume that $(\Sigma, \Gamma)$ is strongly compatible.
The structure of $\Gamma\operatorname{\backslash} D_{\Sigma, \val}$ as a locally ringed space with log structure is defined by using $\varphi_{{\sigma}, \val}: E_{{\sigma}, \val}\to \Gamma \operatorname{\backslash} D_{\Sigma, \val}$ (${\sigma}\in\Sigma$) analogously as \ref{phisig}.
\end{sbpara}
\begin{sbpara}
\label{stval2}
Here we do not need $\Gamma$.
The topology of $D^{\sharp}_{\Sigma, \val}$ is defined by using $\varphi^{\sharp}_{{\sigma}, \val}: E^{\sharp}_{{\sigma}, \val}\to D^{\sharp}_{\Sigma, \val}$ (${\sigma}\in\Sigma$) analogously as \ref{rat9}.
\end{sbpara}
\begin{sbpara}
The continuity of $\Gamma\operatorname{\backslash} D_{\Sigma, \val}\to \Gamma \operatorname{\backslash} D_{\Sigma,[:]}$ and the continuity of $D^{\sharp}_{\Sigma, \val}\to D^{\sharp}_{\Sigma, [:]}$ are clear because the topologies of the val spaces are defined by using $E_{{\sigma},\val}$, $E^{\sharp}_{{\sigma}, \val}$, and the topologies of $[:]$-spaces are defined by $E_{{\sigma},[:]}$ and $E^{\sharp}_{{\sigma}, [:]}$, and $E_{{\sigma},\val}\to E_{{\sigma},[:]}$ and $E^{\sharp}_{{\sigma}, \val}\to E^{\sharp}_{{\sigma}, [:]}$ are continuous.
\end{sbpara}
\subsection{Nilpotent orbits and ${\rm{SL}}(2)$-orbits}\label{ss:CKS}
In this section we prove the continuity of the CKS map (Theorem \ref{CKS1}), which is the most important bridge in the fundamental diagram.
We prove this together with that $E_{{\sigma}}$ is open in $\tilde E_{{\sigma}}$ (Theorem \ref{Eopen}), which implies that $E_{{\sigma}}$ is a log manifold (Theorem \ref{Elm}).
Note that there are mistakes in the corresponding parts \cite{KU2} and \cite{KNU2} Part III, which are corrected in \cite{KNU2} Part IV Appendix in a rather complicated way and, unfortunately, the correction itself contains several errors.
So in this section \ref{ss:CKS}, we present the whole structure of the corrected (and improved) proof in the present context.
For more precise explanations about the mistakes and errors in the previous works, see Remark \ref{c_to_IVApp} at the end of this section.
\begin{sbpara}
\label{assSL2orb}
In order to define the map $\psi$ in Theorem \ref{CKS1} below as a map of sets, we explain how to associate an ${\rm{SL}}(2)$-orbit to a nilpotent orbit in \ref{assSL2orb}--\ref{assSL2orb3}.
This construction is a generalization of \cite{KNU2} Part II 2.4.6 based on the SL(2)-orbit theorem in many variables for MHS (\cite{KNU1}).
The pure case of the construction is essentially due to Cattani, Kaplan and Schmid (\cite{CKS}).
Let $(N_1,\ldots,N_n,F)$ generate a nilpotent orbit (\ref{nilp2}). We give the associated triple $(\rho,\varphi, Z)$, where $(\rho,\varphi)$ is an ${\rm{SL}}(2)$-orbit in $n$ variables for $(G_{{{\rm red}}}, h_0)$ and $Z\subset D$ such that $(p, Z)\in D_{{\rm{SL}}(2)}$ for $p=\text{class}\,(\rho, \varphi)\in D_{{{\rm red}},{\rm{SL}}(2)}$.
For $0 \le j \le n$, we denote by $W^{(j)}$ the functor
$$V \mapsto (V, M(N_{1,V}+\cdots +N_{j,V}, W(V)))$$
from ${\operatorname{Rep}}(G)$ to the category of finite-dimensional ${\mathbb{Q}}$-vector spaces endowed with an increasing filtration on its realification.
Here $N_{j,V}$ denotes the image of $N_j$ in ${\rm {End}}_{{\mathbb{R}}}(V_{{\mathbb{R}}})$ for each $j$ and $M(N_{1,V}+\cdots +N_{j,V}, W(V))$ is the relative monodromy filtration of $N_{1,V}+\dots+N_{j, V}$ with respect to $W(V)$. In particular, $W^{(0)}=W$.
The functor $(W^{(n)}, F):V\mapsto (V, W^{(n)}(V), F(V))$ is a $G$-MHS. Let $(W^{(n)}, \hat F_{(n)})$ be the ${\mathbb{R}}$-split $G$-MHS defined by the canonical splitting of $W^{(n)}$ associated to the $G$-MHS $(W^{(n)}, F)$ (\ref{splW}). Then $(W^{(n-1)}, \exp(iN_n)\hat F_{(n)})$ is a $G$-MHS. Let $(W^{(n-1)}, \hat F_{(n-1)})$ be the associated ${\mathbb{R}}$-split $G$-MHS defined by the canonical splitting of $W^{(n-1)}$ associated to the $G$-MHS $(W^{(n-1)}, \exp(iN_n)\hat F_{(n)})$.
Then $(W^{(n-2)}, \exp(iN_{n-1})\hat F_{(n-1)})$ is a $G$-MHS. $\dots$. In this way, we obtain inductively an ${\mathbb{R}}$-split $G$-MHS $(W^{(j)}, \hat F_{(j)})$ for $0\leq j\leq n$. We have $\hat F_{(j)}\in \check{D}$.
We define ${{\bold r}} \in D$ as follows. If all $N_j$ are $0$, let ${{\bold r}}
=F$.
If $N_j\neq 0$ for some $j$, let $k$ be the smallest such $j$ ($1\leq j\leq n$), and let
${{\bold r}}
=\exp(iN_k)\hat F_{(k)}$.
(Note that we have used the symbol ${{\bold r}}_1$ in \cite{KNU2} Part II 2.4.6 instead of ${{\bold r}}$ here.
Thus the notation here is not compatible with that in \cite{KNU1} Theorem 0.5 and in \cite{KNU2} Part II 2.4.
See the remark after \cite{KNU2} Part II Theorem 2.4.2.)
\end{sbpara}
\begin{sbpara}
\label{assSL2orb2}
Now assume that $G$ is reductive. Then there is a unique homomorphism
$\tau: {\mathbb{G}}_{m,{\mathbb{R}}}^n\to G_{\mathbb{R}}$ whose $j$-th component $\tau_j$ gives
the ${\mathbb{R}}$-splitting of $W^{(j)}$ associated to the ${\mathbb{R}}$-split $G$-MHS $(W^{(j)}, \hat F_{(j)})$. This $\tau_j$ also gives ${\rm{spl}}^{{\rm {BS}}}_{W^{(j)}}({{\bold r}})$ for $1\leq j\leq n$. Let $\tau^{\star}: {\mathbb{G}}_{m,{\mathbb{R}}}^n\to G'_{\mathbb{R}}\subset G_{\mathbb{R}}$ be the homomorphism defined by $\tau^{\star}(t)= \tau(t) k_0(\prod_{j=1}^n t_j)^{-1}$.
Consider the direct sum decomposition of ${\rm {Lie}}\,(G'_{\mathbb{R}})$ by the adjoint action of ${\mathbb{G}}_{m,{\mathbb{R}}}^n$ on it via $\tau^{\star}$. For $1\leq j\leq n$, let $\hat N_j$ be the component of $N_j$ in this direct sum decomposition on which the $s$-th factors of ${\mathbb{G}}_m^n$ for $1\leq s<j$ act trivially. Then there is a unique homomorphism $\rho: {\rm{SL}}(2)^n_{\mathbb{R}}\to G_{\mathbb{R}}$ such that $\tau^{\star}_j(t) =\rho(g_1, \dots, g_n)$, where $g_s= \begin{pmatrix} 1/t& 0\\ 0&t\end{pmatrix}$ for $1\leq s\leq j$ and $g_s=1$ for $j<s\leq n$
and such that the induced map ${\rm {Lie}}\,(\rho):{\frak {sl}}(2,{\mathbb{R}})^n \to {\rm {Lie}}\,(G_{\mathbb{R}})$ sends the $j$-th $\begin{pmatrix} 0&1\\0&0\end{pmatrix}$ to $\hat N_j$ for $1\leq j\leq n$. There is a unique holomorphic map $\varphi: {\mathbb{P}}^1({\mathbb{C}})^n \to D$ such that $\varphi(gz)=\rho(g)\varphi(z)$ for all $g\in {\rm{SL}}(2,{\mathbb{C}})^n$ and for all $z\in {\mathbb{P}}^1({\mathbb{C}})^n$ and such that $\varphi({\rm {\mathbb i}})={{\bold r}}$. This holomorphic map $\varphi$ is also characterized by the properties $\varphi(gz)=\rho(g)\varphi(z)$ for all $g\in {\rm{SL}}(2,{\mathbb{C}})^n$ and for all $z\in {\mathbb{P}}^1({\mathbb{C}})^n$ and $\varphi(\bold0)=\hat F_{(n)}$.
It satisfies $\varphi(\{0\}^j\times \{i\}^{n-j})= \hat F_{(j)}$ for $0\leq j\leq n$.
We call this $(\rho, \varphi)$ the ${\rm{SL}}(2)$-orbit associated to $(N_1, \dots, N_n, F)$.
See \cite{CKS} 4.20 for the above facts.
\end{sbpara}
\begin{sbpara}
\label{assSL2orb3}
Now $G$ is not necessarily assumed to be reductive.
Let $p= \text{class}\,(\rho, \varphi)\in D_{{{\rm red}}, {\rm{SL}}(2)}$. We define $x=(p, Z)\in D_{{\rm{SL}}(2)}$ as follows.
If $N_j \neq 0$ for some $j$ and if $\gr^W(N_k)=0$ for $k=\min\{j\;|\; N_j\neq 0\}$, let $x$ be the unique $B$-orbit lying over $p$ such that ${{\bold r}} \in Z$.
Otherwise, let $x$ be the unique $A$-orbit lying over $p$ such that ${{\bold r}}\in Z$.
This $x=(p, Z)$ is called the element of $D_{{\rm{SL}}(2)}$ associated to $(N_1, \dots, N_n, F)$.
The rank of $p$, the family of weight filtrations $(W_x^{(k)})_{1\leq k\leq r}$ (resp.\ $(W_x^{(k)})_{0\leq k\leq r}$) associated $x$, and the homomorphism $\tau_x=(\tau_{x,j})_{1\leq j\leq r}$ (resp.\ $(\tau_{x,k})_{0\leq k\leq r}$) associated to $x$ in the case where $x$ is an $A$ (resp.\ $B$)-orbit (\ref{taux}) are described as follows.
(1) Let $W^{(j)}$ ($0\leq j\leq n$) be as in \ref{assSL2orb} and let $\{j\;|\; 1\leq j\leq n, W^{(j)}\neq W^{(j-1)}\}=\{s(1), \dots, s(r)\}$ with $1\leq s(1)<\dots<s(r)\leq n$.
Then $r$ is the rank of $p$. We have $W_x^{(k)}=W^{(s(k))}$ for $1\leq k\leq r$. In the case where $x$ is a $B$-orbit, $W_x^{(0)}=W$.
(2) Let $\tau_j: {\mathbb{G}}_{m,{\mathbb{R}}} \to G_{\mathbb{R}}$ ($0\leq j \leq n$) be the homomorphism corresponding to the splitting of $W^{(j)}$ given by $\hat F_{(j)}$ in \ref{assSL2orb}. Then
$\tau_{x,k}=\tau_{s(k)}$ for $1\leq k\leq r$. In the case where $x$ is a $B$-orbit, $\tau_{x,0}=\tau_0$.
Let $s(r+1):=n+1$. Then $\tau_j=\tau_{x,k}$ if $1\leq k \leq r$ and $s(k) \leq j<s(k+1)$, and $\tau_j=\tau_0$ if $0\leq j<s(1)$. Hence we have:
Assume $N_1\neq 0$ in the case $n\geq 1$.
Then
for $(t_j)_{1\leq j\leq n} \in {\mathbb{G}}_{m,{\mathbb{R}}}^n$,
we have $$\tau(t)= \tau_x(t')$$ ($\tau(t):=\prod_{j=1}^n \tau_j(t_j)$, $t'\in {\mathbb{G}}_{m,{\mathbb{R}}}^{\{1,\dots, r\}}$ if $x$ is an $A$-orbit, $t'\in {\mathbb{G}}_{m,{\mathbb{R}}}^{\{0, \dots, r\}}$ if $x$ is a $B$-orbit), where $t'$ is defined as follows. For $1\leq k\leq r$, $t'_k= \prod_{s(k)\leq j<s(k+1)} t_j$. In the case where $x$ is a $B$-orbit,
$t'_0=\prod_{1\leq j<s(1)} t_j$.
\end{sbpara}
\begin{sblem}\label{assoc2}
There is a unique map $\psi: D^{\sharp}_{\Sigma,[:]}\to D_{{\rm{SL}}(2)}$ which sends $({\sigma}, Z, \mathrm{class}\,(({\sigma}_j, N_j)_{1\leq j\leq n}))$ to the element of $D_{{\rm{SL}}(2)}$ associated to $(N_1, \dots, N_n, F)$ for $F\in Z$ in $\ref{assSL2orb3}$.
\end{sblem}
This is proved similarly to \cite{KNU2} Part IV 4.5.9. %
\begin{sbthm}\label{CKS1} The map $\psi: D^{\sharp}_{\Sigma,[:]}\to D^I_{{\rm{SL}}(2)}$ is continuous.
\end{sbthm}
This map is the unique continuous extension of the identity map of $D$.
We call this map $\psi$ the {\it CKS map} respecting the work of Cattani, Kaplan and Schmid on their ${\rm{SL}}(2)$-orbit theorem in many variables in pure case in \cite{CKS}.
This is the most important map in the fundamental diagram.
For the proof of Theorem \ref{CKS1}, we use the following theorem.
\begin{sbthm}\label{Eopen} Let ${\sigma}\in\Sigma$.
For the topologies in $\ref{Esig}$, $E_{{\sigma}}$ is open in $\tilde E_{{\sigma}}$.
\end{sbthm}
We will prove Theorem \ref{Eopen} in Proposition \ref{KU7.1.1}--\ref{8.1.b}.
From %
Theorem \ref{Eopen}, we obtain
\begin{sbthm}\label{Elm}
Let ${\sigma}\in \Sigma$.
Then
$\tilde E_{{\sigma}}$ ($\ref{Esig}$) and $E_{{\sigma}}$ are log manifolds.
\end{sbthm}
\begin{pf} For $\tilde E_{{\sigma}}$,
the argument of the proof of \cite{KU2} Proposition 3.5.10 for the pure standard case also works %
for the present case (see also \cite{KNU2} Part III 4.1.1).
The result for $E_{{\sigma}}$ follows from this by Theorem \ref{Eopen}.
\end{pf}
We start to prove Theorem \ref{Eopen}.
The following Proposition \ref{KU7.1.1} %
is a $G$-MHS version of \cite{KU2} Proposition 7.1.1.
\begin{sbprop}\label{KU7.1.1}
Let $\Sigma$ be a weak fan and let
${\sigma}\in \Sigma$. Let $\tilde A({\sigma})$ be the closed analytic subset of $\Dc$ defined by
$\tilde A({\sigma})= \{ F \in \Dc\;|\; N (F^pV_{\mathbb{C}} ) \subset F^{p-1}V_{\mathbb{C}}\; \text{ for all}\; N\in {\sigma}, V\in {\operatorname{Rep}}(G), p\in {\mathbb{Z}}\}$,
and let $A({\sigma})$ be the subset of $\Dc$ consisting of all elements $F $ such that $({\sigma}, \exp({\sigma}_{\mathbb{C}})F)$ is
a nilpotent orbit. Then $A({\sigma})$ is an open set of $\tilde A({\sigma})$ in the strong topology of $\tilde A({\sigma})$ in $\Dc$ ($\ref{Esig}$).
\end{sbprop}
\begin{pf} Assume $F\in A({\sigma})$ and assume that a directed family $F_{{\lambda}}\in \tilde A({\sigma})$ converges to $F$. We prove that $F_{{\lambda}}\in A({\sigma})$ for ${\lambda}$ sufficiently large. Let $H\in D$. Take a faithful representation $V\in {\operatorname{Rep}}(G)$ and take ${\mathbb{R}}$-polarizations $\langle\cdot, \cdot\rangle_w$ of $H(\gr^W_wV)$ which are stable under $G'$.
By \ref{lemopen1} (2), for ${\lambda}$ sufficiently large, the annihilator of $F^p_{{\lambda}}(\gr^W_wV)$ with respect to $\langle \cdot, \cdot\rangle_w$ is $F^{w+1-p}(\gr^W_wV)$.
Take a finite set $N_1, \dots, N_n$ of generators of the cone ${\sigma}$. The proof of \cite{KU2} Proposition 7.1.1 shows that if ${\lambda}$ is sufficiently large, then $\exp(\sum_{j=1}^n z_jN_j)F_{{\lambda}}(\gr^W_wV)\in G({\mathbb{R}})H(\gr^W_wV)$ for every $w$ if $\text{Im}(z_j)$ are sufficiently large.
By \ref{faith}, $F_{{\lambda}}\in A({\sigma})$ for ${\lambda}$ sufficiently large.
\end{pf}
\begin{sbpara}\label{oneN} The proof of Theorem \ref{Eopen} consists of complicated inductions.
To clarify the idea, we explain here the proof when the cone ${\sigma}$ is of rank one.
By the canonical isomorphisms $\Gamma({\sigma})\simeq {\mathbb{N}}$ and $P({\sigma})\simeq {\mathbb{N}}$, we have canonical isomorphisms ${\operatorname{toric}}_{{\sigma}}\simeq {\mathbb{C}}$, $|{\operatorname{toric}}|_{{\sigma}}\simeq {\mathbb{R}}_{\geq 0}$.
We identify $\check{E}_{{\sigma}}$ with ${\mathbb{C}}\times \check{D}$ and $\check{E}^{\sharp}_{{\sigma}}$ with ${\mathbb{R}}_{\geq 0} \times \Dc$. Since $E_{{\sigma}}$ is the inverse image of $E^{\sharp}_{{\sigma}}$ under $|\cdot|\,:\, \check{E}_{{\sigma}}\to \check{E}^{\sharp}_{{\sigma}}$, it is sufficient to prove that $E^{\sharp}_{{\sigma}}$ is open in $\tilde E^{\sharp}_{{\sigma}}$.
Assume that $(q_{{\lambda}}, F_{{\lambda}}) \in \tilde E^{\sharp}_{{\sigma}}$ converges to $(0, F)\in E^{\sharp}_{{\sigma}}$.
We prove that $(q_{{\lambda}}, F_{{\lambda}}) \in E^{\sharp}_{{\sigma}}$ for sufficiently large ${\lambda}$.
Taking subsequences, we divide it into two cases: the case where $q_{{\lambda}}=0$ for all ${\lambda}$ and the case $q_{\lambda}\not=0$ for all ${\lambda}$.
Assume $q_{{\lambda}}=0$.
This is the case Proposition \ref{KU7.1.1} for $\rank({\sigma})=1$.
Assume $q_{{\lambda}} \neq 0$.
Let $q_{\lambda}=e^{-2\pi y_{\lambda}}$. We have to see that, for any sufficiently large ${\lambda}$,
$\exp(iy_{{\lambda}}N)F_{{\lambda}}\in D$ (which means $(q_{{\lambda}}, F_{{\lambda}})\in E_{{\sigma}}$ by definition \ref{Esig}).
Here $N\in{\sigma}$ is such that $\exp(N)$ corresponds $1\in {\mathbb{N}}$ via $\Gamma({\sigma})\simeq{\mathbb{N}}$.
First, applying \cite{KU2} Proposition 3.1.6 to $S:=\tilde E_{{\sigma}}\subset X:=\Ec_{\sigma}={\mathbb{C}}\times\Dc$, $s=(0,F)$, $s_{{\lambda}}=(q_{{\lambda}}, F_{{\lambda}})$, and $A:=\{0\}\times \Dc$, we find $F^*_{{\lambda}}\in\Dc$ which is very near to
$F_{{\lambda}}$ such that $(0, F^*_{{\lambda}})\in \tilde E_{{\sigma}}$ and $F^*_{{\lambda}}$ converges to $F$.
For the precise meaning of \lq\lq very near'' here, see the condition (i) in Lemma \ref{lem712}.
By Proposition \ref{KU7.1.1} again, we may assume that
\smallskip
(1) $(N, F^*_{{\lambda}})$ generates a nilpotent orbit.
Next, let $\tau:{\mathbb{G}}_{m,{\mathbb{R}}}\to G_{\mathbb{R}}$ be the homomorphism corresponding to the splitting of $W^{(1)}:=M(N,W)$ given by $\hat F_{(1)}$ in \ref{assSL2orb3}, and let $\tau_{{\lambda}}=\tau(1/\sqrt{y_{{\lambda}}})$.
By $(1)$, %
$(W^{(1)},F_{{\lambda}}^*)$ is a $G$-MHS.
Together with the fact that $\tau_{{\lambda}}$ splits %
$W^{(1)}$, we have
(2) $\tau_{{\lambda}}^{-1}F^*_{{\lambda}} \to \hat F_{(1)}$.
From this, we have
(3) $\tau_{{\lambda}}^{-1}\exp(iy_{{\lambda}}N)F^*_{{\lambda}}=\exp(iN)\tau_{{\lambda}}^{-1}F^*_{{\lambda}} \to \exp(iN)\hat F_{(1)}$.
Since $F_{{\lambda}}$ and $F^*_{{\lambda}}$ are very near, we have $\tau_{{\lambda}}^{-1}\exp(iy_{{\lambda}}N)F_{{\lambda}} \to \exp(iN)\hat F_{(1)} \in D$.
Since $D$ is open in $\Dc$, we conclude
(4) $\exp(iy_{{\lambda}}N)F_{{\lambda}}\in D$ for sufficiently large ${\lambda}$.
\end{sbpara}
\begin{sbpara}\label{8.1.a}
Note that a large part of the following %
\ref{8.1.a}--\ref{8.1.b} is a copy from \cite{KNU2} Part IV Appendix (after some modifications explained in Remark \ref{c_to_IVApp}).
For example, the statement of Proposition \ref{prop712} is almost identical to that of \cite{KNU2} Part IV Proposition A.1.7.
To prove Theorem \ref{Eopen},
since $\tilde E_{{\sigma},\val}\to\tilde E_{\sigma}$
is proper and surjective, and $E_{{\sigma},\val}\subset\tilde E_{{\sigma},\val}$
is the inverse image of $E_{\sigma}\subset\tilde E_{\sigma}$,
it is sufficient to prove that $E_{{\sigma},\val}$ is open in $\tilde E_{{\sigma},\val}$.
Since we have the continuous projection $\tilde E_{{\sigma},\val}\to \tilde E^{\sharp}_{{\sigma},\val}$ for which $E_{{\sigma},\val}$ is the inverse image of $E^{\sharp}_{{\sigma},\val}$, it is sufficient to prove that $E^{\sharp}_{{\sigma},\val}$ is open in $\tilde E^{\sharp}_{{\sigma}, \val}$.
Assume that a directed system $w_{{\lambda}}=(q_{\lambda}, F'_{\lambda})\in \tilde E^{\sharp}_{{\sigma},\val}$ (${\lambda}\in L$, where $L$ is a directed ordered set) converges in $\tilde E^{\sharp}_{{\sigma},\val}$ to $w=(q, F')\in E^{\sharp}_{{\sigma},\val}$.
We prove that $w_{{\lambda}}\in E^{\sharp}_{{\sigma},\val}$ for any sufficiently large ${\lambda}$.
\end{sbpara}
\begin{sbpara}\label{N,F}
We fix notation.
Let $w_{[:]}=(t, F')$ (resp.\ $w_{{\lambda}, [:]}=(t_{{\lambda}}, F'_{{\lambda}})$) be the image $w$ (resp.\ $w_{{\lambda}}$) in $\check E^{\sharp}_{{\sigma},[:]}=|{\operatorname{toric}}|_{{\sigma},[:]}\times \check{D}$ ($t, t_{{\lambda}}\in |{\operatorname{toric}}|_{{\sigma},[:]}$, $F', F'_{{\lambda}}\in \Dc$).
We use the additive presentation of $|{\operatorname{toric}}|_{{\sigma}, [:]}$ in \ref{add2}.
Let $n$ and ${\sigma}_n$ be as those in there for the point $t$.
Take an ${\mathbb{R}}$-subspace $B$ of ${\sigma}_{\mathbb{R}}$ such that
${\sigma}_{{\mathbb{R}}}={\sigma}_{n,{\mathbb{R}}}\oplus B$.
Take a good base $(N_s)_{s\in S}$ for $t$ and let $S_j\subset S$ be as in the definition of a good base (\ref{excel1}). Write
$t=(\text{class}\,(({\sigma}_j, N_j)_{1\le j \le n}), b)$, where $N_j$ is an interior point of ${\sigma}_j$ and $b\in B$.
Let $a_s\in{\mathbb{R}}_{>0}$ such that $N_j\equiv\sum_{s\in S_j} a_sN_s \mod {\sigma}_{j-1,{\mathbb{R}}}$ for all $1\le j\le n$.
Let $F=\exp(ib)F'$.
Then $((N_s)_{s\in S}, F)$ generates a nilpotent orbit.
We have also the $B$-component $b_{{\lambda}}\in B$ of $t_{{\lambda}}$. Let $F_{{\lambda}}=\exp(ib_{{\lambda}})F'_{{\lambda}}$. Then $F_{{\lambda}}$ converges to $F$ in $\Dc$.
Take an open neighborhood $V$ of $b$ in $B_{\mathbb{C}}$ such that the map ${\operatorname{toric}}_{{\sigma}_n} \times V \to {\operatorname{toric}}_{{\sigma}}$ induced by the canonical map ${\operatorname{toric}}_{{\sigma}_n} \times B_{\mathbb{C}} \to {\operatorname{toric}}_{{\sigma}}$ is an open immersion. We may assume $b_{\lambda}\in V\cap B$.
Let ${\sigma}'\subset {\sigma}$ be the cone generated by $N_s$ ($s\in S$). Replacing $N_s$ by $N_s/r$ for some integer $r>0$, we may assume that $\log\Gamma({\sigma}')\subset \bigoplus_{s\in S} {\mathbb{N}} N_s\subset \bigoplus_{s\in S} {\mathbb{Z}} N_s$.
We have the injective homomorphism $\Gamma({\sigma}')\overset{\subset}\to {\mathbb{N}}^S$. For $s\in S$ we have the $s$-component $\Gamma({\sigma}')\to {\mathbb{N}}$, which is an element $q_s$ of $P({\sigma}')$, regarded as a holomorphic function on $\operatorname{Spec}({\mathbb{C}}[P({\sigma}')])^{\an}\times V={\operatorname{toric}}_{{\sigma}'}\times V$.
We use the description of the topology of $|{\operatorname{toric}}|_{{\sigma},[:]}$ in \ref{add3} associated to the good base $(N_s)_{s\in S}$ for $t$.
We use the notation there.
Let $U$ be the open neighborhood of $t$. %
We may assume that all $t_{{\lambda}}$ belong to $U$.
Since $w_{{\lambda}}\to w$ and since $|{\operatorname{toric}}|_{{\sigma}', \val} \times B$
is open in $|{\operatorname{toric}}|_{{\sigma}, \val}$, we may assume that all $w_{{\lambda}}$ belong to the open set $\tilde E_{{\sigma}', \val} \times V$ of $\tilde E_{{\sigma},\val}$.
Note that we have $c_j\in S_j$ and $T$ as in \ref{add3}.
In the case $q_s(w_{{\lambda}})\neq 0$, $y_{{\lambda},s}\in {\mathbb{R}}_{>0}$ is defined by $|q_s(w_{{\lambda}})|= \exp(- 2\pi y_{{\lambda},s})$.
If $s\in S_j$ and $q_s(w_{{\lambda}})\neq 0$, then $q_{s'}(w_{{\lambda}})\neq 0$ for
any $s'\in S_{j'}$ with $j'\geq j$, and in the case $s\neq c_j$,
$y_{{\lambda},s}/y_{{\lambda},c_j}$ gives the $s$-component of $t_{{\lambda}}$ in $U\simeq
{\mathbb{R}}^n_{\geq 0} \times {\mathbb{R}}_{\geq 0}^T \times B \to {\mathbb{R}}_{\geq 0}^T$. If $s\in
S_j$ and if the set $I=\{{\lambda}\;|\; q_s(w_{{\lambda}})\neq 0\}$ is cofinal in the
directed index set, then for $s'\in S_{j'}$ with $j'> j$ (resp.\ for $s'\in
S_j$) and for ${\lambda}\in I$, we have $y_{{\lambda}, s'}/y_{{\lambda},s}\to 0$ (resp.\
$y_{{\lambda},s'}/y_{{\lambda},s}\to a_{s'}/a_s$).
Let $x_{{\rm{SL}}(2)}\in D_{{\rm{SL}}(2)}$ be the element associated to $(N_1, \dots, N_n, F)$ in \ref{assSL2orb3}.
We have a homomorphism $\tau: {\mathbb{G}}_m^n \to G_{\mathbb{R}}$ as in (2) in \ref{assSL2orb3}. In the following, $\tau_j$ denotes its $j$-th component.
\end{sbpara}
\begin{sbpara}\label{e,tau}
We may assume that there exists an integer $m$ such that $1\leq m\leq n+1$ and such that $q_s(x_{\lambda})=0$ for any ${\lambda}$ and $s\in S_{\leq m-1}$ and $q_s(x_{\lambda})\neq 0$ for any ${\lambda}$ and $s\in S_{\geq m}:=\bigsqcup_{k \ge m}S_k$ ($S_{\leq 0}$ and $S_{\geq n+1}$ are defined as the empty set).
For $m \leq j\leq n$, let
$$
e_{{\lambda},\geq j}=\exp(\sum_{s\in S_{\geq j}} iy_{{\lambda},s}N_s)\in G_{\mathbb{C}},
$$
$$
\tau_{{\lambda},j}=
\tau_j\left(\sqrt{y_{{\lambda},c_{j+1}}/y_{{\lambda},c_j}}\right)\in G_{\mathbb{R}},
\quad \tau_{{\lambda}, \geq j}
= \prod_{k= j}^n \tau_{{\lambda},k}\in G_{\mathbb{R}}
$$
$(y_{{\lambda},c_{n+1}}$ denotes $1$).
Let $\hat F_{(j)}$ ($1\leq j\leq n$) be as in \ref{assSL2orb} associated to $(N_1,\dots, N_n, F)$.
\end{sbpara}
\begin{sblem}\label{lem712} Let the situation and the notation be as above.
Let $d$ be a local metric on $\Dc$ that is compatible with the analytic structure.
Let $m\leq j \leq n$ and let $e\geq 0$. Then for any sufficiently large ${\lambda}$, there exist $F^*_{{\lambda}}\in \Dc$ satisfying the following {\rm (i)} and {\rm (ii)}.
\medskip
{\rm (i)} $y_{{\lambda},s}^ed(F_{{\lambda}}, F^*_{{\lambda}})\to 0 \;\;(\forall s\in S_j)$.
\smallskip
{\rm (ii)} $(N_s, F^*_{{\lambda}})$ {\it satisfies Griffiths transversality for any}\; $s\in S_{\leq j}.$
\end{sblem}
\begin{pf}
We apply \cite{KU2} Proposition 3.1.6 to the following situation:
$S:=\tilde E_{{\sigma}'}\times V\subset X:=\Ec_{{\sigma}'}\times V={\operatorname{toric}}_{{\sigma}'}\times V\times \Dc$ (\ref{Esig}), where ${\sigma}'$ and $V$ are as in \ref{N,F}, and $A$ is the closed analytic subspace of $X$ defined by $q_s=0$ for $s\in S_{\leq j}$.
Consider the images of $w_{{\lambda}}=(q_{\lambda},F'_{\lambda})$ and $w=(q,F')$ of \ref{8.1.a} in $X$ and $S$, respectively, and let $F_{\lambda}$, $F$, and $y_{{\lambda},s}$ be as in \ref{N,F}.
Take a metric on a neighborhood of the image of $w$ in $X$ as the direct sum of a local metric on ${\operatorname{toric}}_{{\sigma}'}\times V$ and the local metric $d$ on $\Dc$.
Then we get Lemma \ref{lem712}.
\end{pf}
The next is a key proposition of this section.
\begin{sbprop}\label{prop712}
Let the situation and the assumption be as above.
Then the following assertions $(A_j)$ $(m-1\leq j\leq n)$, $(B_j)$ $(m\leq j\leq n)$, $(C_j)$ $(m\leq j\leq n)$ are true.
$(A_j)$ (resp.\ $(B_j)$, resp.\ $(C_j)$) for $m\leq j\leq n${\rm:}
Let $e\geq 1$. Then for any sufficiently large ${\lambda}$, there are $F^{(j)}_{{\lambda}}\in \Dc$ satisfying the following $(1)$--$(3)$.
$(1)$ $y^e_{{\lambda},c_j}d(F_{{\lambda}}, F^{(j)}_{{\lambda}}) \to 0$.
$(2)$ $((N_s)_{s\in S_{\leq j}}, e_{{\lambda},\geq j+1}F^{(j)}_{{\lambda}})$ generates a nilpotent orbit.
$(3)$ $\tau_{{\lambda},\geq j+1}^{-1}e_{{\lambda},\geq j+1} F^{(j)}_{{\lambda}}\to \exp(iN_{j+1})\hat F_{(j+1)}$.
(resp.\ $(3)$ $\tau_{{\lambda},\geq j}^{-1}e_{{\lambda},\geq j+1} F^{(j)}_{{\lambda}}\to \hat F_{(j)}$.
resp.\ $(3)$ $\tau_{{\lambda},\geq j}^{-1}e_{{\lambda},\geq j}F^{(j)}_{{\lambda}}\to \exp(iN_j)\hat F_{(j)}$.)
\noindent
Here $(A_n)$ is formulated by understanding $N_{n+1}=0$ and $\hat F_{(n+1)}=F$.
\medskip
$(A_{m-1})${\rm :} For any sufficiently large ${\lambda}$, we have the following $(2)$ and $(3)$.
$(2)$ $((N_s)_{s\in S_{\leq m-1}}, e_{{\lambda},\geq m}F_{{\lambda}})$ generates a nilpotent orbit.
$(3)$ $\tau_{{\lambda},\geq m}^{-1}e_{{\lambda},\geq m} F_{{\lambda}}\to \exp(iN_m)\hat F_{(m)}$.
\end{sbprop}
\begin{sbrem}\label{oneNrem} The case $n=1$ was treated in \ref{oneN}. The case $n=m=1$ is the case $q_{{\lambda}}\neq 0$ for all ${\lambda}$ in \ref{oneN}. The case $n=1$ and $m=2$ is the case $q_{{\lambda}}=0$ for all ${\lambda}$ in \ref{oneN}. In the case $n=m=1$, the course of the arguments about (1), (2), (3), (4) in \ref{oneN} is understood as
$(1)=(A_1)\Rightarrow(2)=(B_1)\Rightarrow(3)=(C_1)\Rightarrow(4)=(A_0)$.
\end{sbrem}
\begin{sbpara}
We prove Proposition \ref{prop712} by using the downward induction of the form
$(A_j)$ $\Rightarrow$ $(B_j)$ $\Rightarrow$ $(C_j)$ $\Rightarrow$ $(A_{j-1})$. (Here $m\leq j\leq n$.)
$(B_j)$ $\Rightarrow$ $(C_j)$ is clear.
We prove $(A_j)$ $\Rightarrow$ $(B_j)$.
By (2), for any sufficiently large ${\lambda}$, $(W^{(j)}, e_{{\lambda},\geq j+1} F^{(j)}_{{\lambda}})$ is a mixed Hodge structure, where $W^{(j)}$ denotes the relative monodromy filtration of $N_1+\dots+N_j$ with respect to $W$.
Since $\tau_{{\lambda},j}$ splits $W^{(j)}$, we have $(B_j)$.
We prove $(C_{j+1})$ $\Rightarrow$ $(A_j)$ if $m-1 \leq j < n$ and $(A_n)$.
Let $e \ge1$.
If $m\leq j \le n$ (resp.\ $j=m-1$), then, by Lemma \ref{lem712}, there are $F^{(j)}_{{\lambda}}\in \Dc$ satisfying (1) and (resp.\ $F^{(j)}_{{\lambda}}:=F_{{\lambda}}$ satisfies) the condition
\medskip
$(2')$ $(N_s, F^{(j)}_{{\lambda}})$ satisfies Griffiths transversality for any $s\in S_{\le j}$.
\medskip
When $m-1\le j<n$, by $(C_{j+1})$, there are $F^{(j+1)}_{{\lambda}}\in \Dc$ satisfying
(resp.\ when $j=n$, $F^{(j+1)}_{{\lambda}}=F_{{\lambda}}$ satisfies) the following.
\medskip
$(1'')$ $y^e_{{\lambda},c_{j+1}}d(F_{{\lambda}}, F^{(j+1)}_{{\lambda}}) \to 0$.
$(3'')$ $\tau_{{\lambda},\geq j+1}^{-1}e_{{\lambda},\geq j+1} F^{(j+1)}_{{\lambda}}\to \exp(iN_{j+1})\hat F_{(j+1)}$. (Recall $\hat F_{(n+1)}$ means $F$.)
\medskip
By $(1'')$ and $(3'')$, we have
\medskip
(4) $\tau_{{\lambda},\geq j+1}^{-1}e_{{\lambda},\geq j+1} F_{{\lambda}}\to \exp(iN_{j+1})\hat F_{(j+1)}$.
\medskip
By (4) and by (1), we have
\medskip
(5) $\tau_{{\lambda},\geq j+1}^{-1}e_{{\lambda},\geq j+1} F^{(j)}_{{\lambda}}\to \exp(iN_{j+1})\hat F_{(j+1)}$.
\medskip
For the left-hand side of (5), by $(2')$, $(N_s, \tau_{{\lambda},\geq j+1}^{-1}e_{{\lambda},\geq j+1} F^{(j)}_{{\lambda}})$ satisfies Griffiths transversality for any $s\in S_{\leq j}$. On the other hand, concerning the right-hand side of (5),
$((N_s)_{s\in S_{\leq j}}, \exp(iN_{j+1})\hat F_{(j+1)})$ generates a nilpotent orbit. Hence (5) and Proposition \ref{KU7.1.1} show that
$((N_s)_{s\in S_{\leq j}}, \tau_{{\lambda},\geq j+1}^{-1}e_{{\lambda},\geq j+1} F^{(j)}_{{\lambda}})$ generates a nilpotent orbit for any sufficiently large ${\lambda}$. This proves that $((N_s)_{s\in S_{\leq j}}, e_{{\lambda},\geq j+1} F^{(j)}_{{\lambda}})$ generates a nilpotent orbit for any sufficiently large ${\lambda}$.
By this and by (1) and (5), we have
$(A_j)$.
\end{sbpara}
\begin{sbpara}\label{8.1.b}
By $(A_{m-1})$ (2) of Proposition \ref{prop712}, $w_{{\lambda}}$ belongs to $E^{\sharp}_{{\sigma},\val}$ if ${\lambda}$ is sufficiently large.
This proves that $E^{\sharp}_{{\sigma},\val}$ is open in $\tilde E^{\sharp}_{{\sigma},\val}$, and hence proves that $E_{{\sigma}}$ is open in $\tilde E_{{\sigma}}$ (\ref{8.1.a}).
The proof of Theorem \ref{Eopen} is completed.
\end{sbpara}
\begin{sbpara}\label{CKS2} We next prove Theorem \ref{CKS1} (the continuity of the CKS map) in \ref{regular}--\ref{8.3.d}.
The outline of the proof of Theorem \ref{CKS1} is as follows. By using the properties of regular spaces reviewed in \ref{regular} applied to the spaces $D^I_{{\rm{SL}}(2)}(\Phi)$, it becomes enough to discuss the convergence of ordinary points to a boundary point (we do not need to discuss the convergence of boundary points to a boundary point). We reduce the proof of Theorem \ref{CKS1} to the three convergences in Proposition \ref{III3.3.4}.
These three convergences are proved in \ref{III3.3.3},
\ref{8.3.c}, and \ref{KU6.2.1}--\ref{8.3.d}, respectively.
The structure of these proofs is essentially the same as that in \cite{KU2}, \cite{KNU2} Parts III and IV.
\end{sbpara}
\begin{sbpara}\label{regular} Concerning regular spaces, we first recall two facts.
\cite{KU2} Definition 6.4.6 (\cite{Bou}, Ch.\ 1, \S 8, no.\ 4, Definition 2). A topological space $X$ is called {\it regular} if it is Hausdorff and satisfies the following axiom: Given any closed subset $F$ of $X$ and any point $x \notin F$, there is a neighborhood of $x$ and a neighborhood of $F$ which are disjoint.
(\cite{Bou}, Ch.\ 1, \S 8, no.\ 5, Theorem 1.) Let $X$ be a topological space, $A$ a dense subset of $X$, $f:A\to Y$ a map from $A$ into a regular space $Y$. A necessary and sufficient condition for $f$ to extend to a continuous map $f : X \to Y$ is that, for each $x \in X$, $f(y)$ tends to a limit in $Y$ when $y$ tends to $x$ while remaining in $A$. The continuous extension ${\bar f}$ of $f$ to $X$ is then unique.
\end{sbpara}
\begin{sbpara}
To prove that $\psi: D^{\sharp}_{\Sigma, [:]}\to D^I_{{\rm{SL}}(2)}$ is continuous, it is sufficient to prove that the composition
$$E^{\sharp}_{{\sigma}, \val}\to E^{\sharp}_{{\sigma}, [:]}
\to D^{\sharp}_{\Sigma, [:]}\overset{\psi}\to D^I_{{\rm{SL}}(2)}$$
is continuous
for each ${\sigma} \in \Sigma$.
Let the notation and the assumption be as in \ref{8.1.a} and \ref{N,F}.
Assume further that all $w_{\lambda}$ belong to $E^{\sharp}_{{\sigma}, \val}$.
Then it is enough to show that the image of $w_{{\lambda}}$ in $D^I_{{\rm{SL}}(2)}$ converges to the image of $w$ in $D^I_{{\rm{SL}}(2)}$.
If $({\sigma}, Z)\in D_{\Sigma}$, the relative monodromy filtration $M(N', W)$ exists for any $N'\in {\sigma}$, and $M(N', W)$ depends only on the face ${\sigma}'$ of ${\sigma}$ such that $N'$ is in an interior point of ${\sigma}'$. We will denote $M(N', W)$ as $W({\sigma}')$.
Recall that the image of $w\in E^\sharp_{{\sigma},\val}$ in $D_{\Sigma, [:]}$ is $({\sigma}, Z, \text{class}\,(({\sigma}_j, N_j)_{1\leq j\leq n}))$.
Since $N_j$ is in the interior of ${\sigma}_j$ for each $j$, $N_1+\dots+ N_j$ is in the interior of ${\sigma}_j$, and hence $W^{(j)}$ in \ref{assSL2orb} for $(N_1, \dots, N_n, F)$ coincides with $ W({\sigma}_j)$.
Hence if $w_{{\lambda}}\in E^\sharp_{{\sigma},\val}$ is near to $w$, the $W({\sigma}_j)$ of $w_{{\lambda}}$ are contained in the set $\Phi$ of $W({\sigma}_j)$
($1\leq j\leq n$),
and hence the image of $w_{{\lambda}}$
in $D_{{\rm{SL}}(2)}$ is contained in $D_{{\rm{SL}}(2)}(\Phi)$.
Since $D_{{\rm{SL}}(2)}(\Phi)$ is regular by Proposition \ref{str3},
we can use the above regular point method, and hence in the proof of the fact that the image of $w_{{\lambda}}$ in $D^I_{{\rm{SL}}(2)}$ converges to the image of $w$ in $D^I_{{\rm{SL}}(2)}$, we may assume that $w_{{\lambda}}\in |{\operatorname{torus}}|_{{\sigma}}\times D$.
\end{sbpara}
\begin{sbpara}\label{4.5.21} %
To state Proposition \ref{III3.3.4} on three kinds of convergences, which are used to prove the continuity of the CKS map, we recall that we are in the following situation. We keep the notation in \ref{N,F} and assume $w_{{\lambda}}\in |{\operatorname{torus}}|_{{\sigma}}\times D$. So the $|{\operatorname{torus}}|_{{\sigma}}$-component of $w_{{\lambda}}$ is written as $(\sum_{s\in S} y_{{\lambda},s}N_s) +b_{{\lambda}}$.
For each $1\le j\le n$, we have $c_j\in S_j$ and we have $N_j\equiv\sum_{s\in S_j}a_sN_s \mod {\sigma}_{j-1,{\mathbb{R}}}$.
Note that $(N_1, \cdots, N_n, F)$ generates a nilpotent orbit.
Let ${{\bold r}} \in D$ be the point associated to $(N_1, \dots, N_n, F)$ in \ref{assSL2orb}.
%
\end{sbpara}
By \ref{regular}, for the proof of Theorem \ref{CKS1}, it is sufficient to prove that
$\exp(\sum_{s\in S}iy_{{\lambda},s}N_s)F_{\lambda} $ converges to the class in $D^I_{{\rm{SL}}(2)}$ of the ${\rm{SL}}(2)$-orbit associated to $(N_1, \dots, N_n,F)$.
As %
will be explained in \ref{conv} below, this is reduced to the following proposition.
\begin{sbprop} \label{III3.3.4}
We have the following convergences {\rm(1)}--{\rm(3)} as ${\lambda}\to\infty$.
\smallskip
{\rm(1)}
$\tau\left(\sqrt{\frac{y_{{\lambda},c_1}}{y_{{\lambda},c_2}}},\dots,
\sqrt{\frac{y_{{\lambda},c_n}}{y_{{\lambda},c_{n+1}}}}\right)
\exp(\sum_{s\in S}iy_{{\lambda},s}N_s)F_{\lambda} \to {{\bold r}}$ in $D$,
where $y_{{\lambda},c_{n+1}}=1$.
\smallskip
{\rm(2)} ${\rm{spl}}_W\bigl(\exp(\sum_{s\in S}iy_{{\lambda},s}N_s)F_{\lambda}\bigr) \to {\rm{spl}}_W({{\bold r}})$ in ${\rm{spl}}(W)$.
\smallskip
{\rm (3)} $(\exp(\sum_{s\in S}iy_{{\lambda},s}N_s)F_{\lambda})_{{{\rm red}}}$ converges to the class in $D_{{{\rm red}},{\rm{SL}}(2)}$ of the ${\rm{SL}}(2)$-orbit associated to $(N_1, \dots, N_n, F)$.
\end{sbprop}
\begin{sbpara}\label{conv}
We explain that this Proposition \ref{III3.3.4} shows that
$x_{{\lambda}}:=\exp(\sum_{s\in S}iy_{{\lambda},s}N_s)F_{\lambda} $ converges to the class $x_{{\rm{SL}}(2)}$ in $D^I_{{\rm{SL}}(2)}$ of the ${\rm{SL}}(2)$-orbit associated to $(N_1, \dots, N_n,F)$ and hence proves Theorem \ref{CKS1}.
By (2) and (3) of Proposition \ref{III3.3.4} and by Proposition \ref{emb2} and Proposition \ref{emb3}, for the proof of $x_{{\lambda}} \to x_{{\rm{SL}}(2)}$, it is sufficient to prove
the following (1) and (2). Let $p=x_{{\rm{SL}}(2), {{\rm red}}}\in D_{{{\rm red}},{\rm{SL}}(2)}$.
\smallskip
(1)
Let $\beta$ be a distance to $\Phi(p)$-boundary. Then if $x_{{\rm{SL}}(2)}$ is an $A$-orbit (resp.\ $B$-orbit),
${\rm{Ad}}(\tau_p(\beta(x_{{\lambda}})))^{-1}\delta(x_{{\lambda}})$ converges to ${\rm{Ad}}(\tau_p(\beta({{\bold r}})))^{-1}\delta({{\bold r}})$ (resp.\ $0\circ {\rm{Ad}}(\tau_p(\beta({{\bold r}})))^{-1}\delta({{\bold r}})$) in $\overline{{\cal {L}}}$.
\smallskip
(2)
Let $\beta$ be a distance to $\Phi(x_{{\rm{SL}}(2)})$-boundary.
Then $\tau_{x_{{\rm{SL}}(2)}}(\beta(x_{{\lambda}}))^{-1}x_{{\lambda}}$ converges to $\tau_{x_{{\rm{SL}}(2)}}(\beta({{\bold r}}))^{-1}{{\bold r}}$ in $D$.
\smallskip
We prove that these (1) and (2) follow from (1) of Proposition \ref{III3.3.4}.
Let $t_{{\lambda}}= \left(\sqrt{\frac{y_{{\lambda},c_2}}{y_{{\lambda},c_1}}},\dots,
\sqrt{\frac{y_{{\lambda},c_{n+1}}}{y_{{\lambda},c_n}}}\right)\in {\mathbb{R}}_{>0}^n$. We have $\tau(t_{{\lambda}})= \tau_{x_{{\rm{SL}}(2)}}(t'_{{\lambda}})$, where $t'_{{\lambda}}\in {\mathbb{R}}_{>0}^{\Phi(x_{{\rm{SL}}(2)})}$ is as in \ref{assSL2orb3} (2).
Since $t_{{\lambda}}$ converges to $ \bold 0$ in ${\mathbb{R}}^n_{\geq 0}$, $t'_{{\lambda}}$ converges to $\bold 0$ in ${\mathbb{R}}_{\geq 0}^{\Phi(x_{{\rm{SL}}(2)})}$.
By (1) of Proposition \ref{III3.3.4}, we have
\smallskip
\noindent
$(*)$ \; $x_{{\lambda}}= \tau_{x_{{\rm{SL}}(2)}}(t'_{{\lambda}})u_{{\lambda}}{{\bold r}}$, $u_{{\lambda}}\in G({\mathbb{R}})G_u({\mathbb{C}})$, $u_{{\lambda}}\to 1$.
\smallskip
If $x_{{\rm{SL}}(2)}$ is a $B$-orbit, since ${{\bold r}}\in D_{{{\rm nspl}}}$, $u_{{\lambda}}{{\bold r}}\in D_{{{\rm nspl}}}$ if ${\lambda}$ is sufficiently large and hence by $(*)$, $x_{{\lambda}} \in D_{{{\rm nspl}}}$ if ${\lambda}$ is sufficiently large.
We prove (1). By applying $\beta$ to $(*)_{{{\rm red}}}$, we obtain that if $x_{{\rm{SL}}(2)}$ is an $A$-orbit (resp.\ $B$-orbit),
${\rm{Ad}}(\tau_p(\beta(x_{{\lambda},{{\rm red}}})))^{-1}\delta(x_{{\lambda}})$ is equal to $\tau_p(\beta(u_{{\lambda}}{{\bold r}}_{{{\rm red}}}))^{-1}\delta(u_{{\lambda}}{{\bold r}})$ (resp.\ $t'_{{\lambda},0}\circ {\rm{Ad}}(\tau_p(\beta(u_{{\lambda}}{{\bold r}}_{{{\rm red}}})))^{-1}\delta(u_{{\lambda}}{{\bold r}})$) and this converges to ${\rm{Ad}}(\tau_p(\beta({{\bold r}}_{{{\rm red}}})))^{-1}\delta({{\bold r}})$ (resp.\ $0\circ {\rm{Ad}}(\tau_p(\beta({{\bold r}}_{{{\rm red}}})))^{-1}\delta({{\bold r}})$).
We prove (2). By applying $\beta$ to $(*)$, we have $\tau_{x_{{\rm{SL}}(2)}}(\beta(x_{{\lambda}}))^{-1}x_{{\lambda}} = \tau_{x_{{\rm{SL}}(2)}}(\beta(u_{{\lambda}}{{\bold r}}))^{-1}u_{{\lambda}}{{\bold r}}$, and
this converges to $\tau_{x_{{\rm{SL}}(2)}}(\beta({{\bold r}}))^{-1}{{\bold r}}$.
\end{sbpara}
\begin{sbpara}\label{III3.3.3}
We start to prove Proposition \ref{III3.3.4}.
Proposition \ref{III3.3.4} (1) follows from $(A_0)$ of the case $m=1$ of Proposition \ref{prop712}.
We prepare the proofs of Proposition \ref{III3.3.4} (2) and (3).
For $1\le j\le n$, let $\Dc_j$ be the subset of $\Dc$ consisting
of all $F'\in\Dc$ such that $((N_s)_{s\in S_{\le j}},F')$ generates
a nilpotent orbit.
We have
$F\in \Dc_n$, $F_{\lambda}\in\Dc$,
and we know from \ref{N,F}, Proposition \ref{prop712} and Theorem \ref{Eopen}
that the following five conditions are satisfied.
\medskip
\noindent
{\rm(1)} $F_{\lambda}$ converges to $F$ in $\Dc$.
\smallskip
\noindent
{\rm(2)} $y_{{\lambda},s}\to\infty$ for any $s\in S$.
\smallskip
\noindent
{\rm(3)} If $1\le j<n$, $s\in S_{\le j}$ and
$t\in S_{\ge j+1}$, then
$\tfrac{y_{{\lambda},s}}{y_{{\lambda},t}}\to\infty$.
\smallskip
\noindent
{\rm(4)} If $1\le j\le n$ and $s,t\in S_j$, then
$\tfrac{y_{{\lambda},s}}{y_{{\lambda},t}}\to
\tfrac{a_s}{a_t}$.
\smallskip
\noindent
{\rm(5)} For $1\le j\le n$ and $e\ge0$,
there exist
$F^*_{\lambda}\in\Dc$ $({\lambda}\in L)$ satisfying the following conditions
(5.1) and (5.2).
(5.1) $\exp\big(\sum_{t\in S_{\ge j+1}}
iy_{{\lambda},t}N_t\big)F_{\lambda}^*\in\Dc_j\quad
({\lambda}:\text{sufficiently large}),$
(5.2) $y_{{\lambda},s}^e d(F_{\lambda},F^*_{\lambda})\to0\quad
(\forall s\in S_j).$
\noindent
Here $d$ is a metric on a neighborhood of $F$ in $\Dc$ which is compatible with the analytic topology of $\Dc$.
\medskip
\end{sbpara}
\begin{sbpara}\label{8.3.c}
Proof of Proposition \ref{III3.3.4} (2).
(This is almost a copy from \cite{KNU2} Part III 3.3.7.)
We prove the following assertion $(A_j)$ by downward induction on $j$.
(Note that $(A_0)$ is what we want to prove.)
\smallskip
$(A_j)$ : Proposition \ref{III3.3.4} (2) is true in the case where $\exp\big(\sum_{t\in S_{\ge j+1}} iy_{{\lambda},t}N_t\big)F_{\lambda}\in\Dc_j$ for all ${\lambda}$.
Here $\Dc_j$ for $1\le j \le n$ are defined in \ref{III3.3.3}, and $\check D_0:=D$.
\medskip
{\it Proof.}
Let $0\leq j\leq n$.
Let $x_{{\lambda}} = \exp(\sum_{s\in S}iy_{{\lambda},s}N_s)F_{\lambda}$,
$\tau_{{\lambda},>j}= \prod_{j< k\le n}\tau_k\Big(
\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}\Big)$, and $x_{{\lambda},j} = \tau_{{\lambda},>j}x_{{\lambda}}$.
Then, by \cite{KNU1} 10.3, we have
$$
x_{{\lambda},j} = \tau_{{\lambda},>j}x_{{\lambda}} =\exp\Bigl(\sum_{s\in S_{\leq j}}i
\tfrac{y_{{\lambda},s}}{y_{{\lambda},c_{j+1}}}N_s\Bigr)U_{{\lambda},j},
$$
$$
\text{where}\quad
U_{{\lambda},j}:=\tau_{{\lambda},>j}\exp\Bigl(\sum_{t\in S_{\ge j+1}}iy_{{\lambda},t}N_t\Bigr)F_{\lambda}.
$$
Assume $\exp\big(\sum_{t\in S_{\ge j+1}} iy_{{\lambda},t}N_t\big)F_{\lambda}\in\Dc_j$.
Then
$(N'_1,\ldots,N'_j, U_{{\lambda},j})$ generates a nilpotent orbit,
where $N'_k=\sum_{s \in S_k}\frac{y_{{\lambda},s}}{y_{{\lambda},c_k}}N_s$
($1 \le k \le j$).
Let $s_{{\lambda}}$ be the associated limit splitting. %
By \cite{KNU1} Theorem 0.5 (2) and ibid.\ Proposition 10.8 (1), there is a convergent power series
$u_{{\lambda}}$ whose values are in $G({\mathbb{R}})$,
whose constant term is $1$ and
whose coefficients depend on $U_{{\lambda},j}$ and $y_{{\lambda},s}/y_{{\lambda},c_k}$ ($1\leq k\leq j$, $s\in S_k$) real analytically
such that
${\rm{spl}}_W(x_{{\lambda},j}) =u_{{\lambda}}\Bigl(\frac{y_{{\lambda},c_2}}{y_{{\lambda},c_1}}, \dots,
\frac{y_{{\lambda},c_{j+1}}}{y_{{\lambda},c_j}}\Bigr)s_{{\lambda}}$.
Since $s_{{\lambda}}$ also depends real analytically on $U_{{\lambda},j}$,
we have
\smallskip
\noindent
(1) ${\rm{spl}}_W(x_{{\lambda},j})$ converges to ${\rm{spl}}_W({{\bold r}})$.
\medskip
This already showed ($A_n$).
Next, assume $j < n$
and assume that $(A_{j+1})$ is true. We prove that $(A_j)$ is true.
Choose a sufficiently big $e>0$ depending on $\tau_{j+1},\ldots,\tau_n$.
Take $F^*_{{\lambda}}$ %
as in \ref{III3.3.3} (5).
Define $x_{{\lambda}}^*$ and $x_{{\lambda},j}^*$ similarly
as $x_{{\lambda}}$ and $x_{{\lambda},j}$, respectively.
Then we have
\smallskip
\noindent
(2) ${\rm{spl}}_W(x^*_{{\lambda},j})$ converges to ${\rm{spl}}_W({{\bold r}})$, and
$y_{{\lambda}, c_{j+1}}^ed({\rm{spl}}_W(x_{{\lambda},j}), {\rm{spl}}_W(x^*_{{\lambda},j})) \to 0$.
\smallskip
By downward induction hypothesis on $j$, we have
\smallskip
\noindent
(3) ${\rm{spl}}_W(x^*_{{\lambda}})= \tau_{{\lambda},>j}^{-1} {\rm{spl}}_W(x^*_{{\lambda}, j})
\tau_{{\lambda},>j}(\gr^W)$ converges to ${\rm{spl}}_W({{\bold r}})$.
\smallskip
By (1)--(3), we have ${\rm{spl}}_W(x_{\lambda})=\tau_{{\lambda},>j}^{-1} {\rm{spl}}_W(x_{{\lambda},j}) %
\tau_{{\lambda},>j}(\gr^W)$ also converges to ${\rm{spl}}_W({{\bold r}})$. %
\end{sbpara}
We next prove (3) of Proposition \ref{III3.3.4}.
We assume that $G$ is reductive in \ref{KU6.2.1}--\ref{8.3.d}.
\begin{sbpara}\label{KU6.2.1}
(Cf.\ \cite{KU2} 6.2.1.) Let $N_j \in \frak g_{\mathbb{R}}$ ($1 \leq j \leq n$) be mutually commuting nilpotent elements, let
$F \in \Dc$, and assume that $(N_1,\dots N_n,F)$ generates a nilpotent orbit. Let $(\rho,\varphi)$ be
the associated ${\rm{SL}}(2)$-orbit in $n$ variables and let ${{\bold r}} = \varphi({\bf i})$ as in \ref{4.5.21}. Then, from \cite{KU2} 6.1.5 (recall that $G$ is reductive now),
we
see that there are $c_h \in \frak g_{\mathbb{R}}^{-}, k_h \in \frak g_{\mathbb{R}}^{+}$ ($h\in {\mathbb{N}}^n$), where $\frak g^{\pm} =\frak g^{\pm,{{\bold r}}}$ are the
$(\pm 1)$-eigen subspaces of $\frak g_{\mathbb{R}}$ under the Cartan involution associated to $K_{{{\bold r}}}$, respectively, such that $\sum_{h\in {\mathbb{N}}^n} c_h \prod_{j=1}^n t_j^{h(j)}$ and $\sum_{h\in {\mathbb{N}}^n} k_h \prod_{j=1}^n t_j^{h(j)}$ ($t_j \in {\mathbb{C}}$) converge when $|t_j|$
are sufficiently small, that $c_0 =k_0 =0$ and that, for $y_j/y_{j+1} \gg %
0$ ($1\leq j\leq n,y_{n+1} =1$),
\begin{align*}
&\tau\left(\sqrt{\frac{y_1}{y_2}},\dots,
\sqrt{\frac{y_n}{y_{n+1}}}\right)\exp\Bigl(\sum_{1\leq j\leq n} iy_j N_j\Bigr)F \tag 1\\
=\; &\exp\Bigl(\sum_{h\in {\mathbb{N}}^n} c_h \prod_{j=1}^n (y_j/y_{j+1})^{-h(j)/2}\Bigr)
\cdot \exp\Bigl(\sum_{h\in {\mathbb{N}}^n} k_h \prod_{j=1}^n (y_j/y_{j+1})^{-h(j)/2}\Bigr)\cdot {{\bold r}}.
\end{align*}
Note that these $c_h$ ($h \in {\mathbb{N}}^n$) are uniquely determined (whereas the $k_h$ are not).
\end{sbpara}
\begin{sbprop}\label{KU6.2.2} (Cf.\ {\rm \cite{KU2} Proposition 6.2.2.})
We use the notation in $\ref{KU6.2.1}$. For $v \in \frak g_{\mathbb{R}}$ and $e \in {\mathbb{Z}}^n$, let $v(e)$ be the component of $v$ on which ${\rm{Ad}}(\tau(t))$ ($t = (t_j)_{1\leq j\leq n} \in {\mathbb{G}}^n_{m,{\mathbb{R}}} $) acts as $\prod_{j=1}^n t_j^{e(j)}$.
We denote $|e| = (|e(j)|)_{1\leq j\leq n}$. Let $h \in {\mathbb{N}}^n \smallsetminus \{0\}$, $e \in {\mathbb{Z}}^n$.
%
Then, $c_h(e)=0$ unless $|e|<h$ for the product order in ${\mathbb{N}}^n$, i.e., $|e(j)|\leq h(j)$ ($1\leq j\leq n$)
and $|e| \neq h$.
\end{sbprop}
\begin{pf}
This proposition is proved in the same way as \cite{KU2} 6.2.4--6.2.6.
\end{pf}
\begin{sbpara}
The following arguments are almost copied from the proof \cite{KU2} 6.4.4 of \cite{KU2} Proposition 6.4.1.
We prove the following assertion (C$_j$) by a
downward induction on $j$.
Let $0\le j\le n$, and let %
$\Dc_0:=D$ (this is the correction of a typo \lq\lq$\Dc_0:=\Dc$'' in \cite{KU2} 6.4.4).
\medskip
\noindent
(C$_j$)\quad{\it
Assume that $\exp\big(\textstyle\sum_{t\in S_{\ge j+1}}
iy_{{\lambda},t}N_t\big)F_{\lambda}\in\Dc_j$ for any
${\lambda}$.
Then, for a sufficiently large ${\lambda}$, we have
\begin{align*}\
&\tau\left(\sqrt{\frac{y_{{\lambda},c_1}}{y_{{\lambda},c_2}}},\dots,
\sqrt{\frac{y_{{\lambda},c_n}}{y_{{\lambda},c_{n+1}}}}\right)\exp\big(\textstyle\sum_{s\in S}
iy_{{\lambda},s}N_s\big)F_{\lambda}\\
=\;&\exp\Big(\textstyle\sum_{h\in{\mathbb{N}}^j}b_{{\lambda},h}
\textstyle\prod_{1\le k\le j}\sqrt{\tfrac{y_{{\lambda},c_k}}
{y_{{\lambda},c_{k+1}}}}^{\,-h(k)}\Big)k_{\lambda}\cdot{{\bold r}},
\end{align*}
where $b_{{\lambda},h}\in\fg_{\mathbb{R}}^{-}$ $(\fg_{\mathbb{R}}^{-}$
denotes the $(-1)$-eigenspace of $\fg_{\mathbb{R}}$ under
the Cartan involution associated to $K_{{\bold r}})$,
$k_{\lambda}\in K_{{\bold r}}$, and $\textstyle\sum_{h\in{\mathbb{N}}^j}
b_{{\lambda},h}\textstyle\prod_{1\le k\le j}x_k^{h(k)}$
$(x_k\in{\mathbb{C}})$ absolutely converges when $|x_k|$
$(1\le k\le j)$ are sufficiently small, which
satisfy the following three conditions.
Here $y_{c_{n+1}}:=1$.
\medskip
\noindent
{\rm(1)} $k_{\lambda}\to1$.
\smallskip
\noindent
{\rm(2)} $|({\rm{Ad}}\circ\tau_k)_{1\le k\le j}
\text{-weight of $b_{{\lambda},h}$}|\le h$ for the product order in ${\mathbb{N}}^j$.
\smallskip
\noindent
{\rm(3)} For each $h\in{\mathbb{N}}^j$,
${\rm{Ad}}\Big(\textstyle\prod_{k\ge j+1}\tau_k\Big(
\textstyle\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
\Big)\Big)^\nu(b_{{\lambda},h})$ converges for
$\nu=0,\pm1$.
Moreover, if $h=0$ then it converges to $0$.
}
\medskip
Note that by the local structure theorem of $D_{{\rm{SL}}(2)}$ in the reductive group case (Theorem \ref{SL2loc}), Proposition \ref{III3.3.4} (3) is
equivalent to (C$_0$).
\end{sbpara}
\begin{sblem}
\label{l:KU6.4.3}
(Cf.\ {\rm \cite{KU2}} Lemma $6.4.3.$)
Let the notation be as above.
Fix $j$ such that $1\le j\le n$, and assume that
$\exp\big(\textstyle\sum_{t\in S_{\ge j+1}}iy_{{\lambda},t}
N_t\big)F_{\lambda}\in\Dc_j$ for any ${\lambda}$.
Put
\begin{align*}
&N_{{\lambda},k}:=\textstyle\sum_{s\in S_k}\tfrac{y_{{\lambda},s}}{y_{{\lambda},c_k}}N_s\quad(1\le k\le j),\\
&U_{\lambda}:=\Big(\textstyle\prod_{l\ge j+1}\tau_l\Big(\textstyle\sqrt{\tfrac{y_{{\lambda},c_l}}{y_{{\lambda},c_{l+1}}}}\Big)\Big)\exp\big(\textstyle\sum_{t\in S_{\ge j+1}}iy_{{\lambda},t}N_t\big)F_{\lambda}.
\end{align*}
For each ${\lambda}$, let $(\rho_{\lambda},\varphi_{\lambda})$ be
the ${\rm{SL}}(2)$-orbit in $j$ variables associated to $((N_{{\lambda},k})_{1\le k\le j},U_{{\lambda}})$, and let ${{\bold r}}_{\lambda}:=\varphi_{\lambda}({\rm {\mathbb i}})$.
Then, ${{\bold r}}_{\lambda}$ converges to ${{\bold r}}$.
\end{sblem}
The proof of \cite{KU2} Lemma 6.4.3 also works for this Lemma \ref{l:KU6.4.3}, which uses the important fact that an ${\rm{SL}}(2)$-orbit moves real analytically if the monodromy weight filtration is constant (\cite{CKS}, see also \cite{KU2} 6.1.6).
\begin{sbpara}\label{8.3.d}
We prove (C$_j$).
By \cite{KNU1} 10.3, %
we have
\begin{align*}
&\tau\left(\sqrt{\frac{y_{{\lambda},c_1}}{y_{{\lambda},c_2}}},\dots,
\sqrt{\frac{y_{{\lambda},c_n}}{y_{{\lambda},c_{n+1}}}}\right)\exp\big(
\textstyle\sum_{s\in S}iy_{{\lambda},s}N_s\big)F_{\lambda}\\
=\;&\Big(\textstyle\prod_{k\le j}\tau_k\Big(
\textstyle\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
\Big)\Big)
\exp\big(\textstyle\sum_{s\in S_{\le j}}
i\tfrac{y_{{\lambda},s}}{y_{{\lambda},c_{j+1}}}N_s\big)
U_{\lambda}\\
=\;&\Big(\textstyle\prod_{k\le j}\tau_k\Big(
\textstyle\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
\Big)\Big)
\exp\big(\textstyle\sum_{k\le j}i
\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{j+1}}}N_{{\lambda},k}
\big)U_{\lambda}.
\end{align*}
Then, by \ref{KU6.2.1} at ${{\bold r}}_{\lambda}$ (see Lemma \ref{l:KU6.4.3} for ${{\bold r}}_{\lambda}$),
\begin{align*}
&\tau\left(\sqrt{\frac{y_{{\lambda},c_1}}{y_{{\lambda},c_2}}},\dots,
\sqrt{\frac{y_{{\lambda},c_n}}{y_{{\lambda},c_{n+1}}}}\right)
\exp(\textstyle\sum_{s\in S}iy_{{\lambda},s}N_s)F_{\lambda}\\
=\;&\Big(\textstyle\prod_{k\le j}\tau_k\Big(
\textstyle\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
\Big)\Big)
\Big(\textstyle\prod_{k\le j}\tau_{{\lambda},k}\Big(
\textstyle\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
\Big)\Big)^{-1}f_{\lambda} k_{1,{\lambda}}\cdot{{\bold r}}_{\lambda},
\quad\text{where}\\
&f_{\lambda}:=\exp\Big(\textstyle\sum_{h\in{\mathbb{N}}^j}a_{{\lambda},h}
\textstyle\prod_{k\le j}
\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
^{\,-h(k)}\Big),\;\;
a_{{\lambda}, h}\in\fg_{\mathbb{R}}^{-,{{\bold r}}_{\lambda}},\\
&k_{1,{\lambda}}\in K_{{{\bold r}}_{\lambda}},\;\;
k_{1,{\lambda}}\to1.
\end{align*}
Here $\fg_{\mathbb{R}}^{-,{{\bold r}}_{\lambda}}$ denotes the
$(-1)$-eigenspace of $\fg_{\mathbb{R}}$ under the Cartan
involution associated to the maximal compact
subgroup $K_{{{\bold r}}_{\lambda}}$ of $G_{\mathbb{R}}$.
\medskip
\noindent {\bf Claim 1.} {\it
We can write
\begin{align*}
&{{\bold r}}_{\lambda}=g_{\lambda} k_{2,{\lambda}}\cdot{{\bold r}},\;\;
\tau_{{\lambda},k}=\operatorname{Int}(g_{\lambda})\circ\tau_k,\\
&g_{\lambda}\in (G^\circ)_{W^{(1)},\dots,W^{(j)},{\mathbb{R}}},
\;\;k_{2,{\lambda}}\in K_{{\bold r}},\;\;g_{\lambda}\to1,\;\;
k_{2,{\lambda}}\to1.
\end{align*}
}
\smallskip
This claim is proved as exactly in the same way as in \cite{KU2}.
We obtain a proof of this claim from the corresponding proof in \cite{KU2} by replacing ``$\tilde \rho_{\lambda,k}$, $\tilde \rho_k$'' by $\tau_{\lambda,k}$, $\tau_k$, respectively, and by
replacing \lq\lq Lemma 6.4.3'' by Lemma \ref{l:KU6.4.3}.
The key point of the proof is the fact that $\tau_{{\lambda},k}$ and $\tau_{\lambda}$ are the Borel--Serre liftings at ${{\bold r}}_{\lambda}$ and ${{\bold r}}$, respectively, of the common homomorphism $\bold G_m\to P/P_u$, where $P$ is a ${\mathbb{Q}}$-parabolic subgroup of $G$ containing $(G^\circ)_{W^{(1)},\dots,W^{(j)},{\mathbb{R}}}$.
\medskip
By Claim 1, we have
\begin{align*}
&\tau\left(\sqrt{\frac{y_{{\lambda},c_1}}{y_{{\lambda},c_2}}},\dots,
\sqrt{\frac{y_{{\lambda},c_n}}{y_{{\lambda},c_{n+1}}}}\right)
\exp\big(\textstyle\sum_{s\in S}
iy_{{\lambda},s}N_s\big)F_{\lambda}\tag4\\
=\;&\operatorname{Int}\Big(\textstyle\prod_{k\le j}\tau_k\Big(
\textstyle\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
\Big)\Big)(g_{\lambda})\operatorname{Int}(g_{\lambda})^{-1}(f_{\lambda})
\operatorname{Int}(g_{\lambda})^{-1}(k_{1,{\lambda}})k_{2,{\lambda}}\cdot{{\bold r}}.
\end{align*}
Here $\operatorname{Int}(g_{\lambda})^{-1}(k_{1,{\lambda}})\in K_{{\bold r}}$
and, concerning
$a_{{\lambda},h}\in\fg_{\mathbb{R}}^{-,{{\bold r}}_{\lambda}}$ in the
definition of $f_{\lambda}$, we have
${\rm{Ad}}(g_{\lambda})^{-1}(a_{{\lambda},h})\in\fg_{\mathbb{R}}^-
=\fg_{\mathbb{R}}^{-,{{\bold r}}}$.
Furthermore, if we write
\begin{align*}
&g_{\lambda}
=\exp\big(\textstyle\sum_{h\in{\mathbb{N}}^j}g_{{\lambda},-h}\big),\quad
g_{{\lambda},-h}\in{\rm {Lie}}\,(G_{W^{(1)},\dots,W^{(j)},{\mathbb{R}}}),
\tag5\\
&(\text{$({\rm{Ad}}\circ\tau_k)_
{1\le k\le j}$-weight of $g_{{\lambda},-h}$})=-h,\quad
g_{{\lambda},-h}\to0,
\end{align*}
we have
\begin{align*}
\operatorname{Int}\Big(\textstyle\prod_{k\le j}\tau_k\Big(
\textstyle\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
\Big)\Big)(g_{\lambda})
=\exp\Big(\textstyle\sum_{h\in{\mathbb{N}}^j}g_{{\lambda},-h}\textstyle\prod_{k\le j}
\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
^{\,-h(k)}\Big).\tag6
\end{align*}
By Proposition \ref{KU6.2.2},
\begin{align*}
|\text{$({\rm{Ad}}\circ\tau_k)_{1\le k\le j}$-weight
of ${\rm{Ad}}(g_{\lambda})^{-1}(a_{{\lambda},h})$}|<h.\tag7
\end{align*}
From (4)--(7), we obtain
\begin{align*}
&\tau\left(\sqrt{\frac{y_{{\lambda},c_1}}{y_{{\lambda},c_2}}},\dots,
\sqrt{\frac{y_{{\lambda},c_n}}{y_{{\lambda},c_{n+1}}}}\right)
\exp\big(\textstyle\sum_{s\in S}iy_{{\lambda},s}N_s\big)
F_{\lambda}\tag8\\
=\;&\exp\Big(\textstyle\sum_{h\in{\mathbb{N}}^j}b_{{\lambda},h}
\textstyle\prod_{k\le j}
\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
^{\,-h(k)}\Big)k_{\lambda}\cdot{{\bold r}},
\quad\text{where}\\
&k_{\lambda}:=\operatorname{Int}(g_{\lambda})^{-1}(k_{1,{\lambda}})k_{2,{\lambda}}
\in K_{{\bold r}},\;\;k_{\lambda}\to1,\\
&b_{{\lambda},h}\in\fg_{\mathbb{R}}^-,\;\;
\text{$b_{{\lambda},h}$ converges for each $h$},\;\;
b_{{\lambda},h}(\pm h)\to0,\\
&|\text{$({\rm{Ad}}\circ\tau_k)
_{1\le k\le j}$-weight of $b_{{\lambda},h}$}|\le h.
\end{align*}
Here $b_{{\lambda},h}(\pm h)$ denotes the parts of
$b_{{\lambda},h}$ of weight $\pm h$ with respect to
$({\rm{Ad}}\circ\tau_k)_{1\le k\le j}$.
In the case $j=n$, (8) already completes the
proof of (C$_j$).
If $0\le j<n$, it remains to prove (3) of (C$_j$).
This is shown by downward induction on $j$, as
we have mentioned.
First we show the following.
\medskip
\noindent {\bf Claim 2.} {\it
To prove $(\text{\rm C}_j)$ $(3)$,
we may assume
$\exp\big(\textstyle\sum_{t\in S_{\ge j+1}}
iy_{{\lambda},t}N_t\big)F_{\lambda}\in\Dc_{j+1}$
for any ${\lambda}$.
}
\medskip
The following is a simplification of the proof of the generalization of \cite{KU2} 6.4.4 Claim 2 by an observation that we can take $y^*_{{\lambda},t}=y_{{\lambda},t}$ there, so that the condition ibid.\ (11) holds trivially.
We prove Claim 2.
By the condition (5) of \ref{III3.3.3} for $j+1$, there exist
$e\ge0$, $F_{\lambda}^*\in\Dc$
satisfying the following
(9)--(12).
\medskip
\noindent
(9) $\exp\big(\textstyle\sum_{t\in S_{\ge j+1}}
iy_{{\lambda},t}N_t\big)F_{\lambda}^*\in\Dc_{j+1}$.
\medskip
\noindent
(10) $y^{2e}_{{\lambda},c_{j+1}}d(F_{\lambda},F^*_{\lambda})
\to0$.
\medskip
\noindent
(11) Let $\alpha_{\lambda}=\Big(\textstyle\prod_{k\ge j+1}
\tau_k\Big(\sqrt{
\frac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}\Big)\Big)
\exp\big(\textstyle\sum_{t\in S_{\ge j+1}}
iy_{{\lambda},t}N_t\big)$.
(Note $U_{\lambda}=\alpha_{\lambda} F_{\lambda}$.)
Then,
$$
y_{{\lambda},c_{j+1}}^{-e}{\rm{Ad}}(\alpha_{\lambda})\to0
$$
in the space of linear endomorphisms of $\fg_{\mathbb{C}}$.
\medskip
\noindent
(12) Let $\beta_{\lambda}=\textstyle\prod_{k\ge j+1}\tau_k\Big(
\sqrt{\frac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
\Big)$.
Then,
$$
y_{{\lambda},c_{j+1}}^{-e}{\rm{Ad}}(\beta_{\lambda})^\nu\to
0\quad\text{for}\;\;\nu=0,\pm 1
$$
in the space of linear endomorphisms of $\fg_{\mathbb{C}}$.
\medskip
Define $b_{{\lambda},h}^*$ ($h\in{\mathbb{N}}^j)$ just as
$b_{{\lambda},h}$ by replacing
$F_{\lambda}$ by $F_{\lambda}^*$.
To prove Claim 2, it is sufficient to prove
$$
{\rm{Ad}}(\beta_{\lambda})^\nu(b_{{\lambda},h})
-{\rm{Ad}}({\beta_{\lambda}})^\nu(b_{{\lambda},h}^*)\to0\quad
\text{for}\;\;\nu=0,\pm1.
$$
The left-hand side of this is equal to
$$
y_{{\lambda},c_{j+1}}^{-e}
{\rm{Ad}}(\beta_{\lambda})^\nu(y_{{\lambda},c_{j+1}}^e
(b_{{\lambda},h}-b^*_{{\lambda},h})).
$$
Hence, by (12), it is sufficient to prove
$$
y_{{\lambda},c_{j+1}}^e(b_{{\lambda},h}-b_{{\lambda},h}^*)\to0.
$$
Since $b_{{\lambda},h}$ is a real analytic function in
$((N_{{\lambda},k})_{1\le k\le j}, U_{\lambda})$ (\cite{KU2}, 6.1.6), it
is sufficient to prove that
\begin{align*}
y_{{\lambda},c_{j+1}}^ed(U_{\lambda}, U_{\lambda}^*)\to0,\tag{13}
\end{align*}
where $U_{\lambda}^*=\alpha_{\lambda} F_{\lambda}^*$.
By (10), we can write
$$
F_{\lambda}=\exp(x_{\lambda})F_{\lambda}^*\quad
\text{with}\quad x_{\lambda}\in\fg_{\mathbb{C}},\quad
y^{2e}_{{\lambda},c_{j+1}}x_{\lambda}\to0.
$$
We have
$$
U_{\lambda}=\alpha_{\lambda} F_{\lambda}=\exp({\rm{Ad}}(\alpha_{\lambda})
(x_{\lambda}))U_{\lambda}^*.
$$
By (11) and by
$$
y_{{\lambda},c_{j+1}}^e{\rm{Ad}}(\alpha_{\lambda})(x_{\lambda})
=(y_{{\lambda},c_{j+1}}^{-e}
{\rm{Ad}}(\alpha_{\lambda}))(y_{{\lambda},c_{j+1}}^{2e}x_{\lambda})\to0,
$$
we obtain (13).
Thus Claim 2 is proved.
\medskip
By Claim 2, we assume $\exp\big(\textstyle\sum_{t\in S_{\ge j+1}}
iy_{{\lambda},t}N_t\big)F_{\lambda}\in\Dc_{j+1}$ for any
${\lambda}$.
Then, by \ref{KU6.2.1} at ${{\bold r}}$,
we have elements $b_{{\lambda},h'}$ for
$h'\in{\mathbb{N}}^{j+1}$ and we have, for $h\in{\mathbb{N}}^j$,
\begin{align*}
b_{{\lambda},h}=\textstyle\sum_{k=0}^\infty b_{{\lambda},(h,k)}
\sqrt{\frac{y_{{\lambda},c_{j+1}}}
{y_{{\lambda},c_{j+2}}}}^{\,-k}.\tag{14}
\end{align*}
Using (8), applied to $b_{{\lambda},(h,k)}$ replacing $j$ by
$j+1$, we have
\medskip
\noindent
(15) $|({\rm{Ad}}\circ\tau_{j+1})$-weight of
$b_{{\lambda},(h,k)}|\le k$.
If $h=0$, the parts of $b_{{\lambda},(h,k)}$ of
$({\rm{Ad}}\circ\tau_{j+1})$-weight $\pm k$
converge to $0$.
\medskip
\noindent
By the hypothesis of induction,
\medskip
\noindent
(16) ${\rm{Ad}}\Big(\textstyle\prod_{k\ge j+2}\tau_k\Big(
\textstyle\sqrt{\tfrac{y_{{\lambda},c_k}}{y_{{\lambda},c_{k+1}}}}
\Big)\Big)^\nu(b_{{\lambda},(h,k)})$ converges for
$\nu=0,\pm1$.
\medskip
\noindent
By (14)--(16), we have (3) of (C$_j$).
\qed
\bigskip
The proof of Proposition \ref{III3.3.4} (3) is completed.
\end{sbpara}
\begin{sbrem}
\label{c_to_IVApp}
As mentioned at the top of this section, \cite{KU2} and \cite{KNU2} Part III
contain some mistakes which are corrected as in \cite{KNU2} Part IV Appendix.
But still the corrections contain some errors.
We review the outline of the mistakes of \cite{KU2} in (1) below, and explain the errors of \cite{KNU2} Part IV Appendix in (2) below.
(1) The essence of the errors are in 6.4.12 and 7.1.2 (3) of \cite{KU2}, called the errors (1) and (2) in \cite{KNU2} Part IV A.1.1, respectively.
Both errors base on a misuse of \cite{KU2} Proposition 3.1.6:
In both situations, the authors thought that they could show the existence of real numbers $y^*_{{\lambda},t}$ satisfying some conditions including the convergence
$$y^e_{{\lambda},s}|y_{{\lambda},t}-y^*_{{\lambda},t}|\to 0,$$
where $e$ is a fixed nonnegative integer.
But, \cite{KU2} Proposition 3.1.6 (applied in the way explained there) gives only those satisfying
$$ y^e_{{\lambda},s}(q_{{\lambda},t} - q_{{\lambda},t}^*) \to 0, $$
which is not enough.
We use \cite{KU2} Proposition 3.1.6 correctly in \ref{oneN} and Lemma \ref{lem712} in the present paper.
Then, we generalize (and correct, see (2) below) in this section (Section \ref{ss:CKS}) an alternative argument \cite{KNU2} Part IV A.1.3--A.1.9 %
explained in \cite{KNU2} Part IV A.1.2, %
which shows that, as is said in \cite{KNU2} Part IV A.1.11, in fact
we can take just $y_{{\lambda},s}$, $y_{{\lambda},t}$ as
$y^*_{{\lambda},s}$, $y^*_{{\lambda},t}$ satisfying all conditions, that is, the stronger statement including $y^e_{{\lambda},s}|y_{{\lambda},t}-y^*_{{\lambda},t}|=0$.
(2) The correction in \cite{KNU2} Part IV Appendix contains several errors including some critical typos.
For example,
1. In A.1.2, \lq\lq problem (1)'' and \lq\lq problem (2)'' should be interchanged.
2. In A.1.5, the definition of $N_1$,...,$N_{m-1}$ is missing. %
3. In the last line of A.1.5, $X$ should be replaced by some log blowing-up of $\check E_{{\sigma}}$ and $S$ should be the corresponding subspace coming from $\tilde E_{{\sigma}}$ (not $E_{{\sigma}}$; the tilde was missed).
4. In A.1.8, line 3 : $(A_n)$ does not follow from Lemma A.1.6 if $m-1=n$ because, then, Lemma A.1.6 is an empty statement. %
5. In A.1.8, line 4: $j \le n$ should be $j < n$.
6. In A.1.10 and A.3.4, all \lq\lq $m=0$'' should be \lq\lq $m=1$.''
7. In A.3.4, all \lq\lq A.1.6'' should be \lq\lq A.1.7.''
\medskip
The proof given in this section (Section \ref{ss:CKS}), in particular, in Proposition \ref{prop712} and Theorem \ref{Eopen}, corrects and generalizes, in the present context, that in \cite{KNU2} Part IV A.1.3--A.1.9.
\end{sbrem}
\subsection{Properties of the spaces of nilpotent orbits}
\label{ss:property}
The aim of this Section \ref{ss:property} is to prove the following theorem.
\begin{sbthm}\label{t:property}
Let $\Sigma$ be a weak fan in ${\rm {Lie}}\,(G')$ (${\rm \ref{fan}}$) and
let $\Gamma$ be a semi-arithmetic subgroup ($\ref{Gamma}$) of $G'({\mathbb{Q}})$.
In $(1)$ and $(2)$ below, we assume that $\Gamma$ is compatible with $\Sigma$. In $(3)$--$(5)$ below, we assume that $\Gamma$ is strongly compatible with $\Sigma$.
\medskip
$(1)$ Let $X$ be one of $D^{\sharp}_{\Sigma}$,
$D^{\sharp}_{\Sigma, [:]}$, $D^{\sharp}_{\Sigma, \val}$. Then the action of $\Gamma$ on $X$ is proper, and the quotient space $\Gamma \operatorname{\backslash} X$ is Hausdorff.
$(2)$ Let $X$ be as in $(1)$. Assume that $\Gamma$ is torsion-free.
Then the action of $\Gamma$ on $X$ is free, and
the projection $X\to \Gamma \operatorname{\backslash} X$ is a local homeomorphism.
$(3)$ The quotient space $\Gamma \operatorname{\backslash} D_{\Sigma}$ is Hausdorff.
$(4)$ Assume that $\Gamma$ is neat. Then $\Gamma \operatorname{\backslash} D_{\Sigma}$ is a log manifold ({\rm \ref{logmfd}}). In particular, it belongs to ${\cal {B}}(\log)$. For each ${\sigma}\in \Sigma$, the map $\Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}}\to \Gamma \operatorname{\backslash} D_{\Sigma}$ is locally an isomorphism of log manifolds.
$(5)$ Assume that $\Gamma$ is neat. Then there is a homeomorphism
$$(\Gamma \operatorname{\backslash} D_{\Sigma})^{\log} \simeq \Gamma \operatorname{\backslash} D^{\sharp}_{\Sigma}$$
over $\Gamma \operatorname{\backslash} D_{\Sigma}$.
\end{sbthm}
See \ref{scomp} for the compatibility and the strong compatibility of $\Gamma$ and $\Sigma$.
\begin{sbrem}\label{redrem3}
In Theorem \ref{t:property}, we can use a semi-arithmetic subgroup of $G({\mathbb{Q}})$ (not of $G'({\mathbb{Q}})$) in the following situation (1) and also in the following situation (2).
(1) If either $G$ is semisimple or the condition (1) in Lemma \ref{pol2} is satisfied, Theorem \ref{t:property} holds for a semi-arithmetic subgroup $\Gamma$ of $G({\mathbb{Q}})$. In fact, $\Gamma \cap G'({\mathbb{Q}})$ is of finite index in $\Gamma$ (see Proposition \ref{A=A*} for the latter case). Hence by \ref{proper} (5), we can replace $\Gamma$ by the semi-arithmetic subgroup $\Gamma\cap G'({\mathbb{Q}})$ of $G'({\mathbb{Q}})$.
(2) Assume that $G$ is reductive. Then Theorem \ref{t:property} remains true for a semi-arithmetic subgroup of $G({\mathbb{Q}})$ if we make the following
modifications $(*)$ and $(**)$ below. Let $\overline \Gamma$ be the image of $\Gamma$ in $(G/Z)({\mathbb{Q}})$, where $Z$ denotes the center of $G$.
$(*)$ In (2) (resp.\ (4) and (5)), the torsion free (resp.\ neat) property is assumed for $\overline \Gamma$, not for $\Gamma$.
$(**)$ In (1) (resp.\ (2)), the proper action (resp.\ free action) is stated for $\overline \Gamma$, not for $\Gamma$.
For the proof, see \ref{redpf}.
\end{sbrem}
\begin{sbrem}
\label{r:KP}
In \cite{KP} Theorem 6.1 and in its proof, the conclusions of Theorem \ref{t:property} except the parts on $X=D^{\sharp}_{\Sigma,[:]},
D^{\sharp}_{\Sigma,\val}$ in (1) and (2) for the Mumford--Tate domain $D$
(and its extensions)
associated to a polarized pure Hodge structure $H$ are proved with $G$ being the (semisimple) Mumford--Tate group associated to $H$ (which is isomorphic to $M/Z$ in \ref{relMT}), $\Gamma$ being an arithmetic subgroup of $G({\mathbb{Q}})$ which is in the connected component of $G({\mathbb{R}})$ containing $1$, and $\Sigma$ being a fan in ${\rm {Lie}}\,(G)$ which is strongly compatible with $\Gamma$.
The proof in \cite{KP} is a reduction to the case (\cite{KU2} 4.1.1 Theorem A)
of the extended period domains of classical period domains for pure Hodge structures.
Our proof of Theorem \ref{t:property} bases on our studies of the space of Borel--Serre orbits, the space of SL(2)-orbits, and the CKS map, which were not considered in \cite{KP}, and provides alternative proofs of their results.
(Minor remarks: Precisely, their $D$ and its extensions are connected components of our period domain $D(G,\bar h_0)$, where $\bar h_0 \colon S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ is the homomorphism associated to $H$, and its extensions, respectively, and their results are deduced from Theorem \ref{t:property}.
Conversely, under the above assumption, their method can treat $\Gamma \operatorname{\backslash} D(M,h_0)$ ($h_0$ is as in \ref{relMT}) and its extensions (which are open and closed subspaces of $\Gamma \operatorname{\backslash} D(G,\bar h_0)$ and its extensions, as is seen by the latter half of \ref{ss:functoriality}).
See \ref{KP2} for some details.
Additionally, their $\Gamma$ is assumed to be neat, though it is easy to reduce the non-neat case to this case.)
\end{sbrem}
\begin{sbpara}
The relation of this theorem (Theorem \ref{t:property}) with the results and their proofs in the former parts is as follows.
The above (3), (4), and (5) of Theorem \ref{t:property} is the $G$-MHS versions of Theorem 2.5.5, Theorem 2.5.2 plus Theorem 2.5.4, and Theorem 2.5.6, respectively, of
\cite{KNU2} Part III for the extended period domains of classical period domains (which are the mixed Hodge structure versions of (v), (ii) plus (iv), and (vi), respectively, of \cite{KU2} 4.1.1 Theorem A for pure Hodge structures).
In the case of the extended period domains of classical period domains, these (3)--(5) of Theorem \ref{t:property}
are proved in Section 4 of \cite{KNU2} Part III.
In there,
also are proved the portion of (1) where
$X=D^{\sharp}_{\Sigma}, D^{\sharp}_{\Sigma,\val}$ and
the portion of (2) where
$X=D^{\sharp}_{\Sigma}, D^{\sharp}_{\Sigma,\val}$ and $\Gamma$ is neat.
The space $X=D^{\sharp}_{\Sigma, [:]}$ was not considered in \cite{KNU2} Part III,
and the portion of (1) where $X=D^{\sharp}_{\Sigma, [:]}$ and the portion of (2)
where $X=D^{\sharp}_{\Sigma, [:]}$ and $\Gamma$ is neat
follow from \cite{KNU2} Part IV Theorem 6.1.1.
Most of this Section \ref{ss:property} is devoted to the proof of Theorem \ref{t:property} which is completed in \ref{end(i)}.
Almost descriptions in the proof in this section are some abridged versions of arguments in
\cite{KNU2} Part III Section 4 etc.
We describe the main steps in the proof, but often omit the details if the arguments are the same as those in
\cite{KNU2} Part III Section 4 etc.
\end{sbpara}
We start to explain the proof of Theorem \ref{t:property}.
Let $\Sigma$ be a weak fan.
\begin{sbprop}\label{claim3}
Let ${\sigma}, {\sigma}' \in \Sigma$.
Let
$$w_{{\lambda}} =(y_{{\lambda}},F_{{\lambda}})\in \{(y, F)\in {\sigma}_{\mathbb{R}}\times \Dc\;|\; \exp(iy)F\in D\}=(|{\operatorname{torus}}|_{{\sigma}}\times \Dc)\cap E^{\sharp}_{{\sigma}}$$
and
$$w'_{{\lambda}} =(y'_{{\lambda}},F'_{{\lambda}})\in \{(y, F)\in {\sigma}'_{\mathbb{R}}\times \Dc\;|\; \exp(iy)F\in D\}=(|{\operatorname{torus}}|_{{\sigma}'}\times \Dc)\cap E^{\sharp}_{{\sigma}'}$$
be directed families with the same index set. Let $*$ be $[:]$ or $\val$. Assume that $w_{{\lambda}} $ converges to $\alpha$ in $E^{\sharp}_{{\sigma},*}$, $w'_{{\lambda}}$ converges to $\alpha'$ in $E^{\sharp}_{{\sigma}',*}$, and
$\exp(iy_{{\lambda}})F_{{\lambda}}= \exp(iy'_{{\lambda}})F'_{{\lambda}}$ in $D$ for all ${\lambda}$.
Then{\rm :}
$(1)$ The images of $\alpha$ and $\alpha'$ in $D^{\sharp}_{\Sigma,*}$ coincide.
$(2)$ $y_{{\lambda}}-y_{{\lambda}}'$ converges in ${\rm {Lie}}\,(G'_{\mathbb{R}})$.
\end{sbprop}
\begin{pf} In the case $*=\val$, this is a $G$-MHS version of \cite{KNU2} Part III Proposition 4.2.3. The proof of the latter works for the proof of Proposition \ref{claim3} for $*=\val$ and also for $*=[:]$. A key point of the proof is the continuity of the CKS map $D^{\sharp}_{\Sigma, *}\to D^I_{{\rm{SL}}(2)}$.
\end{pf}
\begin{sbpara}\label{sigact1}
Let ${\sigma} \in \Sigma$.
We consider the continuous actions of $i {\sigma}_{\mathbb{R}} (\subset {\sigma}_{\mathbb{C}}$) on $E^{\sharp}_{{\sigma}}$, $E^{\sharp}_{{\sigma},[:]}$, $E^{\sharp}_{{\sigma}, \val}$.
For $a\in {\sigma}_{\mathbb{R}}$, $ia$ sends the class of $(\tau, b, F)$ in $E^{\sharp}_{{\sigma}}$ (resp.\ $(({\sigma}_j, N_j)_j, b, F)$ in $E^{\sharp}_{{\sigma},[:]}$, resp.\ $(\tau, V, b, F)$ in $E^{\sharp}_{{\sigma}, \val}$) in the additive presentation to the class of $(\tau, b+a, \exp(-ia)F)$ (resp.\ $(({\sigma}_j, N_j)_j, b+a, \exp(-ia)F)$, resp.\ $(\tau, V, b+a, \exp(-ia)F)$).
It may seem strange that we regard the above action as an action of $ia$ ($a\in {\sigma}_{\mathbb{R}}$), not of $a$, but we do so because, in the situation \ref{sigact2} below, this action of $i{\sigma}_{\mathbb{R}}$ on $E^{\sharp}_{{\sigma}}$ will be compatible with the action of ${\sigma}_{\mathbb{C}}(\supset i {\sigma}_{\mathbb{R}})$ on $E_{{\sigma}}$.
We have $i{\sigma}_{{\mathbb{R}}} \operatorname{\backslash} E^{\sharp}_{{\sigma}} = D^{\sharp}_{{\sigma}}$, $i{\sigma}_{{\mathbb{R}}} \operatorname{\backslash} E^{\sharp}_{{\sigma},[:]} = D^{\sharp}_{{\sigma},[:]}$, and $i{\sigma}_{{\mathbb{R}}} \operatorname{\backslash} E^{\sharp}_{{\sigma},\val} = D^{\sharp}_{{\sigma},\val}$.
\end{sbpara}
\begin{sbprop}\label{claim2}
Let ${\sigma} \in \Sigma$.
Then $E^{\sharp}_{{\sigma}} \to D^{\sharp}_{{\sigma}}$, $E^{\sharp}_{{\sigma},[:]} \to D^{\sharp}_{{\sigma},[:]}$, and $E^{\sharp}_{{\sigma},\val} \to D^{\sharp}_{{\sigma},\val}$ are $i{\sigma}_{{\mathbb{R}}}$-torsors in
the category of topological spaces.
\end{sbprop}
To prove Proposition \ref{claim2}, we use the following Lemma \ref{torsor6} and Lemma \ref{KU7.2.7}.
\begin{sblem}\label{torsor6}
Let $H$ be a topological group, $X$ a topological space, and assume that we have a continuous action $H\times X\to X$. Assume the following {\rm (i)}--{\rm (iii)}.
{\rm (i)} This action is free set-theoretically.
{\rm (ii)} This action is proper topologically.
{\rm (iii)} For each point $x \in X$, there exist a subset $S$ of $X$ which contains $x$ and an open neighborhood $U$ of $1$ in $H$ such that $U \times S\to X$, $(h, s) \mapsto hs$, induces a homeomorphism from $U \times S$ onto an open set of $X$.
Then $ X\to H\operatorname{\backslash} X$ is an $H$-torsor in the category of topological spaces.
\end{sblem}
See \cite{KU2} Lemma 7.3.3 for the proof.
\begin{sblem}\label{KU7.2.7}
Assume that a Hausdorff topological group $H$ acts on a Hausdorff topological space $X$ continuously and freely. Let $X'$ be a dense subset of $X$. Then, the following two conditions {\rm (i)} and {\rm (ii)} are equivalent.
{\rm (i)} The action of $H$ on $X$ is proper.
{\rm (ii)} Let $(h_{{\lambda}}, x_{{\lambda}})_{{\lambda}}$ be a directed family of elements of $H\times X'$ such that $(x_{\lambda})_{\lambda}$ and $(h_{\lambda} x_{\lambda})_{\lambda}$ converge in $X$. Then $(h_{\lambda})_{\lambda}$ converges in $H$.
\end{sblem}
See \cite{KU2} Lemma 7.2.7 for the proof.
\begin{sbpara}\label{pfclaim2} We prove Proposition \ref{claim2}.
We check that the actions of $i {\sigma}_{\mathbb{R}}$ on $E^{\sharp}_{{\sigma}}$, $E^{\sharp}_{{\sigma}, [:]}$, $E^{\sharp}_{{\sigma}, \val}$ satisfy the conditions (i), (ii), (iii) of Lemma \ref{torsor6}, in Claim 1, Claim 2, Claim 3 below, respectively, which completes the proof.
{\bf Claim 1.} The actions of $i {\sigma}_{\mathbb{R}}$ on $E^{\sharp}_{{\sigma}}$, $E^{\sharp}_{{\sigma}, [:]}$, $E^{\sharp}_{{\sigma}, \val}$ are free.
Proof of Claim 1. This is a $G$-MHS version of \cite{KNU2} Part III Proposition 4.2.2 (ii). The proof of the latter works for the proof of Claim 1.
{\bf Claim 2.} The actions of $i{\sigma}_{{\mathbb{R}}}$ on $E^{\sharp}_{{\sigma}}$, $E^{\sharp}_{{\sigma}, [:]}$, $E^{\sharp}_{{\sigma}, \val}$ are proper.
Proof of Claim 2. For $E^{\sharp}_{{\sigma}, [:]}$ and $E^{\sharp}_{{\sigma}, \val}$, this follows from (2) of Proposition \ref{claim3} by Lemma \ref{KU7.2.7}.
The result for $E^{\sharp}_{{\sigma}}$ follows from this by \ref{proper} (3.2).
Finally we have to check
{\bf Claim 3.} For $X= E^{\sharp}_{{\sigma}}$, $E^{\sharp}_{{\sigma},[:]}$, $E^{\sharp}_{{\sigma}, \val}$ and for each $x=(q,F') \in X$ , there are a subspace $S$ of
$X$ passing through $x$ and an open neighborhood $U$ of $0$ in $i{\sigma}_{{\mathbb{R}}}$ such that the induced map $U \times S \to X$ is an open immersion.
Proof of Claim 3. The construction of $S$ at the end of the proof of \cite{KNU2} Part III Proposition 4.4.3 works here.
\end{sbpara}
\begin{sbprop}\label{claim1}
Let ${\sigma} \in \Sigma$.
Then the inclusion maps $D^{\sharp}_{{\sigma}} \to D^{\sharp}_{\Sigma}$, $D^{\sharp}_{{\sigma},[:]} \to D^{\sharp}_{\Sigma,[:]}$, and $D^{\sharp}_{{\sigma},\val} \to D^{\sharp}_{\Sigma,\val}$ are continuous open maps.
\end{sbprop}
\begin{pf} This is a $G$-MHS version of \cite{KNU2} Part III Theorem 4.3.1. The proof of the latter works for the proof of Proposition \ref{claim1}.
\end{pf}
\begin{sbprop}\label{shsh}
The canonical continuous surjections $D^{\sharp}_{\Sigma, \val}\to D^{\sharp}_{\Sigma, [:]}$ and $D^{\sharp}_{\Sigma, [:]}\to D^{\sharp}_{\Sigma}$ are proper.
\end{sbprop}
\begin{pf}
This is a $G$-MHS version of \cite{KNU2} Part III Proposition 4.3.2, Part IV 4.4.3, and Part IV 4.4.6.
By Proposition \ref{claim2} and Proposition \ref{claim1}, this is reduced to the fact that the maps $E^{\sharp}_{{\sigma}, \val}\to E^{\sharp}_{{\sigma}, [:]}$ and $E^{\sharp}_{{\sigma}, [:]}\to E^{\sharp}_{{\sigma}}$ are proper, and hence to the fact that $|{\operatorname{toric}}|_{{\sigma}, \val}\to |{\operatorname{toric}}|_{{\sigma}, [:]}$ and $|{\operatorname{toric}}|_{{\sigma}, [:]}\to |{\operatorname{toric}}|_{{\sigma}}$ are proper.
\end{pf}
\begin{sbprop}\label{sharpH} The spaces $D^{\sharp}_{\Sigma}$, $D^{\sharp}_{\Sigma,[:]}$, and $D^{\sharp}_{\Sigma, \val}$ are Hausdorff. (This is the case $\Gamma=\{1\}$ of $(1)$ of Theorem $\ref{t:property}$.)
\end{sbprop}
\begin{pf} Let $*$ be $[:]$ or $\val$. By Proposition \ref{shsh} and by the case $H=\{1\}$ of (3.2) of \ref{proper}, the Hausdorffness of $D^{\sharp}_{\Sigma}$ follows from that of $D^{\sharp}_{\Sigma, *}$.
To see that $D^{\sharp}_{\Sigma,*}$ is Hausdorff, by Proposition \ref{claim1}, it is enough to show the following.
\smallskip
$(1)$ Let ${\sigma}, {\sigma}' \in \Sigma$ and let $\beta \in D^{\sharp}_{{\sigma},*}$ and $\beta' \in D^{\sharp}_{{\sigma}',*}$.
Assume that $x_{{\lambda}} \in D$ converges to $\beta$ in $D^{\sharp}_{{\sigma},*}$ and to $\beta'$ in $D^{\sharp}_{{\sigma}',*}$.
Then $\beta=\beta'$ in $D^{\sharp}_{\Sigma,*}$.
\smallskip
We prove $(1)$.
By Proposition \ref{claim2}, there exist an open neighborhood $U$ of $\beta$ in $D^{\sharp}_{{\sigma},*}$
(resp.\ $U'$ of $\beta'$ in $D^{\sharp}_{{\sigma}',*}$) and a continuous section $s_{{\sigma}}:U \to E^{\sharp}_{{\sigma},*}$
(resp.\ $s_{{\sigma}'}:U' \to E^{\sharp}_{{\sigma}',*}$) of the projection
$E^{\sharp}_{{\sigma},*} \to D^{\sharp}_{{\sigma},*}$
(resp.\
$E^{\sharp}_{{\sigma}',*} \to D^{\sharp}_{{\sigma}',*}$).
Let
$w_{{\lambda}} =s_{{\sigma}}(x_{{\lambda}})$, $w'_{{\lambda}} =s_{{\sigma}'}(x_{{\lambda}})$, $\alpha =s_{{\sigma}}(\beta)$, and $\alpha' =s_{{\sigma}'}(\beta')$.
Then we can apply Proposition \ref{claim3} (1) and conclude $\beta=\beta'$.
\end{pf}
\begin{sbpara}\label{compa1} We prove (1) and (2) of Theorem \ref{t:property}. Let $\Gamma$ be a semi-arithmetic subgroup of $G'({\mathbb{Q}})$ which is compatible (\ref{scomp}) with $\Sigma$. Under this assumption, the action of $\Gamma$ on $D^I_{{\rm{SL}}(2)}$ is proper by Theorem \ref{SL2gl}.
Together with Theorem \ref{CKS1} and the fact that $D^{\sharp}_{\Sigma,[:]}$ is Hausdorff by Proposition \ref{sharpH}, we see that the action of $\Gamma$ on $D^{\sharp}_{\Sigma,[:]}$ is proper (\ref{proper} (3.1)).
Hence, again by Proposition \ref{sharpH} and \ref{proper} (3.1),
the action of $\Gamma$ on $D^{\sharp}_{\Sigma, \val}$ is proper.
Since $D^{\sharp}_{\Sigma, [:]}\to D^{\sharp}_{\Sigma}$ is proper and surjective, the action of $\Gamma$ on $D^{\sharp}_{\Sigma}$ is also proper (\ref{proper} (3.2)).
%
By \ref{proper} (1), the quotient spaces by these proper actions are Hausdorff. Thus we proved (1) of Theorem \ref{t:property}.
We prove (2) of Theorem \ref{t:property}. Assume that
$\Gamma$ is torsion-free. Then the action of $\Gamma$ on $D^{\sharp}_{\Sigma}$ is free. In fact, by using a neat subgroup of $\Gamma$ of finite index, this is reduced to the case where $\Gamma$ is neat. Then it becomes the $G$-MHS version of \cite{KNU2} Part III Theorem 4.3.5 (i) whose proof also works in the present situation.
By \ref{proper} (2), we have the stated local homeomorphism.
\end{sbpara}
In \ref{sigact2}--\ref{end(i)}, we assume that $\Gamma$ is a semi-arithmetic subgroup of $G'({\mathbb{Q}})$ and is strongly compatible with $\Sigma$.
\begin{sbpara}\label{sigact2}
Let ${\sigma} \in \Sigma$.
We consider the action
$${\sigma}_{{\mathbb{C}}} \times E_{{\sigma}} \to E_{{\sigma}};\; (a, (q,F)) \mapsto (\bold e(a)q, \exp(-a)F)$$
of ${\sigma}_{\mathbb{C}}$ on $E_{{\sigma}}$, where $a \in {\sigma}_{{\mathbb{C}}}$, $q \in {\operatorname{toric}}_{{\sigma}}$, $F \in \Dc$ and
$(q,F)\in E_{{\sigma}}$.
This is an action in the category of log manifolds (we endow ${\sigma}_{\mathbb{C}}$ with the trivial log structure). This action is compatible with the action of $i{\sigma}_{{\mathbb{R}}}$ on $E^{\sharp}_{{\sigma}}$ in \ref{sigact1}.
We have ${\sigma}_{{\mathbb{C}}} \operatorname{\backslash} E_{{\sigma}} = \Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}}$.
\end{sbpara}
The following Proposition \ref{Ctor} and Proposition \ref{Ctor0} are proved together.
\begin{sbprop}\label{Ctor} In the category of locally ringed spaces over ${\mathbb{C}}$ with log structures, $E_{{\sigma}}\to \Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}}$ is a ${\sigma}_{\mathbb{C}}$-torsor.
\end{sbprop}
\begin{sbprop}\label{Ctor0}
The space $\Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}}$ is a log manifold.
\end{sbprop}
\begin{sblem}\label{torsor8}
Let $H$ be a complex analytic group, $X$ a log manifold, and assume that we have an action $H\times X\to X$ in the category of log manifolds (we regard $H$ as having the trivial log structure). Assume the following {\rm (i)}--{\rm (iii)}.
{\rm (i)} This action is free set-theoretically.
{\rm (ii)} This action is proper topologically.
{\rm (iii)} For each point $x \in X$, there exist a log manifold $S$ and a morphism $\iota: S\to X$ of log manifolds whose image contains $x$ and an open neighborhood $U$ of $1$ in $H$ such that $U \times S \to X$, $(h, s) \to h\iota(s)$, induces an isomorphism of log manifolds from $U \times S$ onto an open set of $X$.
Then{\rm :}
$(1)$ The quotient topological space $H\operatorname{\backslash} X$ has a unique structure of a log manifold such that, for an open set $V$ of $H\operatorname{\backslash} X$, $\cO_{H\operatorname{\backslash} X}(V)$ (resp.\ $M_{H\operatorname{\backslash} X}(V)$) is the set of all functions on $V$ whose pullbacks to the inverse image $V '$ of $V $ in $X$ belong to $\cO_X(V')$ (resp.\ $M_X (V')$). (Here $M_*$ denotes the log structure of $*$.)
$(2)$ $X \to H\operatorname{\backslash} X$ is an $H$-torsor in the category of log manifolds.
\end{sblem}
See \cite{KU2} Lemma 7.3.3 for the proof.
\begin{sbpara}\label{pfCtor} We prove Proposition \ref{Ctor} and Proposition \ref{Ctor0}.
By Lemma \ref{torsor8}, it is sufficient to prove the following Claim 1--Claim 3.
We prove these claims one by one, which completes the proofs.
{\bf Claim 1.} The action of ${\sigma}_{\mathbb{C}}$ on $E_{{\sigma}}$ is free.
Proof of Claim 1. This is a $G$-MHS version of \cite{KNU2} Part III 4.2.2 (i) whose proof also works as a proof in the present situation.
{\bf Claim 2.} The action of ${\sigma}_{\mathbb{C}}$ on $E_{{\sigma}}$ is proper.
Proof of Claim 2. This is a $G$-MHS version of \cite{KNU2} Part III 4.4.2 whose proof also works as a proof in the present situation. (The properness of the action of $i{\sigma}_{\mathbb{R}}$ on $E^{\sharp}_{{\sigma}}$ in Claim 2 in \ref{pfclaim2} is used in the proof through the projection $E_{{\sigma}}\to E^{\sharp}_{{\sigma}}$.)
{\bf Claim 3.} For each point $x \in E_{{\sigma}}$, there exist a log manifold $S$ and a morphism $\iota: S\to E_{{\sigma}}$ of log manifolds whose image contains $x$ and an open neighborhood $U$ of $0$
in ${\sigma}_{\mathbb{C}}$ such that $U \times S \to E_{{\sigma}}$, $(h, s) \to h\iota(s)$, induces an isomorphism of log manifolds from $U \times S$ onto an open set of $E_{{\sigma}}$.
Proof of Claim 3. The construction of $S$ at the end of the proof of \cite{KNU2} Part III 4.4.3 works here.
\end{sbpara}
\begin{sbpara}\label{Dlog1} We have the special case $(\Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}})^{\log}\simeq \Gamma({\sigma})^{\gp}\operatorname{\backslash} D^{\sharp}_{{\sigma}}$ of (5) of Theorem \ref{t:property} as follows.
The map $E_{{\sigma}}\to \Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}}$ induces a continuous map $(E_{{\sigma}})^{\log}\to (\Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}})^{\log}$. On the other hand, the
map $|{\operatorname{toric}}|_{{\sigma}}= \Hom(P({\sigma}), {\mathbb{R}}_{\geq 0}^{\mult}) \to ({\operatorname{toric}}_{{\sigma}})^{\log}= \Hom(P({\sigma}), {\mathbb{R}}^{\mult}_{\geq 0}\times {\bold S}^1)$ ($P({\sigma})$ is as in \ref{toric} and ${\bold S}^1=\{u\in {\mathbb{C}}^\times\;|\; |u|=1\}$) induces a continuous map $E^{\sharp}_{{\sigma}} \to (E_{{\sigma}})^{\log}$. The composition $E^{\sharp}_{{\sigma}} \to (E_{{\sigma}})^{\log}\to (\Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}})^{\log}$ induces $\Gamma({\sigma})^{\gp}\operatorname{\backslash} D^{\sharp}_{{\sigma}} \to (\Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}})^{\log}$. The last map is a homeomorphism by Proposition \ref{Ctor} as in \cite{KNU2} Part III 4.4.4.
\end{sbpara}
\begin{sbprop}\label{fixsig} Assume that $\Gamma$ is neat. Let $x=({\sigma}, Z)\in D_{\Sigma}$, $\gamma\in \Gamma$, and assume $\gamma x =x$. Then
$\gamma\in \Gamma({\sigma})^{\gp}$.
\end{sbprop}
\begin{pf} This is a $G$-MHS version of \cite{KNU2} Part III 4.3.5 (ii), and the proof of the latter works for the proof of Proposition \ref{fixsig}. \end{pf}
\begin{sblem}\label{strlem}
Let $X$ be a topological space with a continuous action of a discrete group $\Gamma$, let $Y$ be a set with an action of $\Gamma$, and let $f:X\to Y$ be a $\Gamma$-equivariant surjective map. Let $\Gamma_0$ be a subgroup of $\Gamma$. We introduce the quotient topologies of $X$ on $\Gamma_0\operatorname{\backslash} Y$ and on $\Gamma\operatorname{\backslash} Y$. Let $V$ be an open set of $\Gamma_0\operatorname{\backslash} Y$ and let $U$ be the inverse image of $V$ in $\Gamma_0\operatorname{\backslash} X$. We assume moreover the three conditions {\rm (i)}--{\rm (iii)} below. Then, the map $V \to \Gamma\operatorname{\backslash} Y$ is a local homeomorphism.
{\rm (i)} $X \to \Gamma\operatorname{\backslash} X$ is a local homeomorphism and $\Gamma\operatorname{\backslash} X$ is Hausdorff.
{\rm (ii)} The map $U \to V$ is proper.
{\rm (iii)} If $x\in X$ and $\gamma\in \Gamma$, and if the images of $\gamma x$ and $x$ in $\Gamma_0\operatorname{\backslash} Y$ are contained in $V$ and they coincide, then $\gamma \in \Gamma_0$.
\end{sblem}
\begin{pf} This is \cite{KU2} Lemma 7.4.7. \end{pf}
\begin{sbpara}\label{CsS}
Assume that $\Gamma$ is neat.
We prove that the map $\Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}}\to \Gamma \operatorname{\backslash} D_{\Sigma}$ is a local homeomorphism.
We use Lemma \ref{strlem} for $X =D^{\sharp}_{\Sigma}$, $Y =D_{\Sigma}$, $\Gamma=\Gamma$, $\Gamma_0 =\Gamma({\sigma})^{\gp}$, $V =\Gamma({\sigma})^{\gp}\operatorname{\backslash} D_{{\sigma}}$ and $U = \Gamma({\sigma})^{\gp}\operatorname{\backslash} D^{\sharp}_{{\sigma}}$.
The (1) and (2) of Theorem \ref{t:property} show that the condition (i) in Lemma \ref{strlem} is satisfied.
By \ref{Dlog1}, the condition (ii) in Lemma \ref{strlem} is satisfied.
Proposition \ref{fixsig} shows that the condition (iii) in Lemma \ref{strlem} is satisfied.
\end{sbpara}
\begin{sbpara} We obtain (4) of Theorem \ref{t:property} by Proposition \ref{Ctor0} and by \ref{CsS}.
We obtain (5) of Theorem \ref{t:property} by \ref{Dlog1} and by \ref{CsS}.
\end{sbpara}
\begin{sbprop}\label{fromsh} The map $\Gamma \operatorname{\backslash} D^{\sharp}_{\Sigma} \to \Gamma \operatorname{\backslash} D_{\Sigma}$ is proper and surjective.
\end{sbprop}
\begin{pf} Replacing $\Gamma$ by its
%
neat subgroup of finite index, we may assume that $\Gamma$ is
%
neat. Then this follows from
(5) of Theorem \ref{t:property}.
\end{pf}
\begin{sbpara}\label{end(i)} By Proposition \ref{fromsh} and by (1) of Theorem \ref{t:property}, we obtain (3) of Theorem \ref{t:property}.
\end{sbpara}
The proof of Theorem \ref{t:property} is completed.
\begin{sbprop}\label{t:pro6} Let the assumption be as in $(4)$ of Theorem $\ref{t:property}$.
Then we have canonical homeomorphisms
\begin{align*}
&(\Gamma\operatorname{\backslash} D_{\Sigma})_{[:]}\simeq \Gamma\operatorname{\backslash} D_{\Sigma, [:]}, \quad (\Gamma\operatorname{\backslash} D_{\Sigma})_{\val}\simeq \Gamma\operatorname{\backslash} D_{\Sigma, \val}, \\
&((\Gamma \operatorname{\backslash} D_{\Sigma})^{\log})_{[:]} \simeq \Gamma \operatorname{\backslash} D^{\sharp}_{\Sigma,[:]}, \quad \text{\rm{and} }
((\Gamma \operatorname{\backslash} D_{\Sigma})^{\log})_{\val} \simeq \Gamma \operatorname{\backslash} D^{\sharp}_{\Sigma,\val}.
\end{align*}
Here topologies of the spaces on the right hand side of these homeomorphisms are as in $\ref{rat8}$, $\ref{stval1}$, and $(1)$ of Theorem $\ref{t:property}$.
\end{sbprop}
\begin{pf} This follows from (4) and (5) of Theorem \ref{t:property}.
\end{pf}
\begin{sbrem}\label{t:pro6rem}
The conclusion of Proposition \ref{t:pro6} holds if $G$ is reductive, $\Gamma$ is a semi-arithmetic subgroup of $G({\mathbb{Q}})$, and if the image of $\Gamma$ in $(G/Z)({\mathbb{Q}})$ is neat, where $Z$ is the center of $G$. See \ref{redpf} for the proof.
\end{sbrem}
\subsection{Valuative spaces, III}
\label{ss:val3}
The spaces $S_{[:]}$ of ratios are endowed with new log structures and the associated valuative spaces $S_{[\val]}$ are extensively studied in \cite{KNU2} Part IV Section 4.
In this section, we review this subject and obtain a space $D^{\sharp}_{\Sigma, [\val]}$ over $D^{\sharp}_{\Sigma, [:]}$.
\begin{sbpara}\label{[:][val]}
Let $E$, $S$ and $M_S$ be as in \ref{rat1}.
Let $S_{[:]}$ be the topological space defined in \ref{ratSs} and \ref{ratSt}.
We review the definition of the {\it new log structure on $S_{[:]}$} (\cite{KNU2} Part IV 4.3.3).
We endow $S_{[:]}$ with the sheaf $O_{S_{[:]}}$ of all ${\mathbb{R}}$-valued continuous functions.
Assume that we are given a chart $\cS\to M_S$ with $\cS$ being a sharp fs monoid such that $|f(s)| <1$ for any $f\in \cS\smallsetminus \{1\}$ and any $s\in S$.
Let $\Phi=\{\cS^{(j)}\;|\; 0\leq j\leq n\}$ with
$\cS=\cS^{(0)}\supsetneq \cS^{(1)}\supsetneq \dots \supsetneq \cS^{(n)}$
be as in \ref{rat4}.
Take $q_j\in \cS^{(j-1)}\smallsetminus \cS^{(j)}$ for $1\leq j\leq n$.
We consider the log structure on $S_{[:]}(\Phi)$ (\ref{rat4}) associated to a chart
$${\mathbb{N}}^n \to \cO_{S_{[:]}}\;;\; m\mapsto
(\prod_{j=1}^{n-1} r(q_{j+1}, q_j)^{m(j)/2})\cdot (-1/\log(|q_n|))^{m(n)/2}.$$
These log structures on $S_{[:]}(\Phi)$ are glued to an fs log structure
$M_{S_{[:]}}^{\text{new}}\to \cO_{S_{[:]}}$ on $S_{[:]}$ which is independent of any choices.
We denote by $S_{[\val]}$ the valuative space $(S_{[:]})_{\val}$ associated to $S_{[:]}$ endowed with this new log structure. %
We have a proper and surjective map $S_{[\val]}\to S_{[:]}$ (\cite{KNU2} Part IV Corollary 3.1.10). %
\end{sbpara}
\begin{sbpara}\label{sig[val]} Let $\Sigma$ be a weak fan in ${\rm {Lie}}\,(G')$.
Let ${\sigma}\in\Sigma$.
There is a log structure on $E^{\sharp}_{{\sigma}}$ which is the inverse image of that of $E_{{\sigma}}$ but it depends on $\Gamma$ (precisely speaking, on $\Gamma({\sigma})^{\gp}$).
We define the {\it new log structure $M^{\text{\rm new}}=M_{D^{\sharp}_{\Sigma,[:]}}^{\text{\rm new}}$ of $D^{\sharp}_{\Sigma,[:]}$} by using the new log structure $M_{S_{[:]}}^{\text{new}}\to \cO_{S_{[:]}}$ for $S=E^{\sharp}_{\sigma}$ in \ref{[:][val]} as follows.
Let $U$ be an open set of $D^{\sharp}_{\Sigma,[:]}$.
An ${\mathbb{R}}$-valued continuous function on $U$ belongs to the new log structure of $D^{\sharp}_{\Sigma,[:]}$ if its pullback on $E^{\sharp}_{{\sigma},[:]}$ belongs to the new log structure of $E^{\sharp}_{{\sigma},[:]}$ for all ${\sigma}\in\Sigma$.
Locally on $D^{\sharp}_{\Sigma,[:]}$, for ${\sigma}\in \Sigma$, for an open set $U$ of $D^{\sharp}_{{\sigma},[:]}$, and for a continuous section $s: U \to E^{\sharp}_{{\sigma},[:]}$ of $E^{\sharp}_{{\sigma},[:]}\to D^{\sharp}_{{\sigma}, [:]}$ given on $U$, the restriction of this new log structure to $U$ coincides with the inverse image of the new log structure of $E^{\sharp}_{{\sigma}, [:]}$ by $s$.
Hence the new log structure $M^{\text{\rm new}}$ on $D^{\sharp}_{\Sigma, [:]}$ is an fs log structure which is independent of the choice of $\Gamma$.
Denote by $D^{\sharp}_{\Sigma, [\val]}$ the valuative space associated to the new log structure $M^{\text{\rm new}}$ of $D^{\sharp}_{\Sigma, [:]}$.
\end{sbpara}
\begin{sbpara}\label{CKSval}
Consider the log structure of $D^I_{{\rm{SL}}(2)}$ which is defined in Proposition \ref{str3} by using distance to the boundary.
Similarly as in \cite{KNU2} Part IV 4.5.12, we can prove that the continuous map $D^{\sharp}_{\Sigma,[:]}\to D^I_{{\rm{SL}}(2)}$ (Theorem \ref{CKS1}) respects these log structures.
(In \cite{KNU2} Part IV 4.5.12, the reference 4.3.3 is a little ambiguous.
The precise meaning is as above.)
Thus the map $D^{\sharp}_{\Sigma,[:]} \to D^I_{{\rm{SL}}(2)}$ induces the continuous map $D^{\sharp}_{\Sigma,{[\val]}}\to D^I_{{\rm{SL}}(2),\val}$ of associated valuative spaces (cf.\ \cite{KNU2} Part IV 4.5.13).
\end{sbpara}
\begin{sbprop}
Let the notation and the assumption be as in $(1)$ and $(2)$ of Theorem $\ref{t:property}$. Then the conclusions of $(1)$ and $(2)$ of Theorem $\ref{t:property}$ and their variants in Remark $\ref{redrem3}$ are true also for $X=D^{\sharp}_{\Sigma, [\val]}$.
\end{sbprop}
\begin{pf}
This follows from the corresponding results for $X=D^{\sharp}_{\Sigma,[:]}$ because the map $D^{\sharp}_{\Sigma,[\val]}\to D^{\sharp}_{\Sigma,[:]}$ is separated.
\end{pf}
\subsection{Mild degeneration}
\label{ss:mild}
We consider the $G$-MHS version of \cite{KNU2} Part IV Section 5.1 in which we studied mild degenerations.
\begin{sbpara}
We define the {\it mild part $D^{{{\rm{mild}}}}_{\Sigma}$ of $D_{\Sigma}$} as the part of
points $({\sigma}, Z)$ which satisfy the following condition.
(C) For each $N$ in the cone ${\sigma}$, there is an ${\mathbb{R}}$-splitting of $W$ (which can depend on $N$) that is compatible with $N$.
For the other spaces of nilpotent orbits $D^{\sharp}_{\Sigma}$, $D_{\Sigma, [:]}$, $D^{\sharp}_{\Sigma, [:]}$, $D_{\Sigma, \val}$, and so on, we
define their mild parts $D^{\sharp,{{\rm{mild}}}}_{\Sigma}$, $D^{{{\rm{mild}}}}_{\Sigma, [:]}$, $D^{\sharp,{{\rm{mild}}}}_{\Sigma, [:]}$, $D^{{{\rm{mild}}}}_{\Sigma, \val}$, and so on as the inverse images
of $D^{{{\rm{mild}}}}_{\Sigma}$.
\end{sbpara}
\begin{sbpara}
\label{diadef}
Let $D^{\diamond}_{{\rm{SL}}(2)}$ be the subset of $D^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2)}\times {\cal {L}}$ consisting
of all elements $(p, Z, \delta)$ ($(p, Z) \in D^{\star, {{\rm{mild}}}}_{{\rm{SL}}(2)}$ with $p \in D_{{{\rm red}},{\rm{SL}}(2)}$ and $Z \subset D$ (%
\ref{SL2AB}), $\delta \in {\cal {L}}=W_{-2}{\rm {Lie}}\,(G_{u,{\mathbb{R}}}$)) satisfying the following conditions (i) and (ii).
(i) Let $n$ be the rank of $p$, and let ${\bold 0} := (0,...,0) \in {\mathbb{Z}}^n$. Then the ${\rm{Ad}}(\tau_p^{\star})$-weights of $\delta$ are $\leq \bold 0$.
(ii) For every $x \in Z$, $\delta_W(x)$ coincides with the component of $\delta$ of ${\rm{Ad}}(\tau^{\star}_p)$-weight $\bold 0$.
We define the structure of $D^{\diamond}_{{\rm{SL}}(2)}$ as an object of ${\cal {B}}_{{\mathbb{R}}}' (\log)$ by the embedding $D^{\diamond}_{{\rm{SL}}(2)}\overset{\subset}\to D^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2)}\times {\cal {L}}$.
We regard $D$ as a subspace of $D^{\diamond}_{{\rm{SL}}(2)}$ via the embedding $x\mapsto (x, \delta_W(x))$.
This is the $G$-MHS version of \cite{KNU2} Part IV 5.1.8, 5.1.9.
\end{sbpara}
\begin{sbprop}
The canonical map $D^{\star}_{{\rm{SL}}(2)}\to D_{{{\rm red}}, {\rm{SL}}(2)}\times {\rm{spl}}(W)$ induces a bijection from $D^{\diamond}_{{\rm{SL}}(2)}$ to the subset of $D_{{{\rm red}},{\rm{SL}}(2)}\times {\rm{spl}}(W) \times {\cal {L}}$ consisting of $(p, s, \delta)$ satisfying the following conditions {\rm (i)} and {\rm (ii)}.
{\rm (i)} The ${\rm{Ad}}(\tau^{\star}_p)$-weights of $\delta$ are $\leq \bold 0$.
{\rm (ii)} Let $(\rho, \varphi)$ be an ${\rm{SL}}(2)$-orbit for $G_{{{\rm red}}}$ which represents $p$. Then the component of $\delta$ of ${\rm{Ad}}(\tau^{\star}_p)$-weight $\bold 0$ is of Hodge type $(\leq -1,\leq -1)$ with respect to $\varphi({\rm {\mathbb i}})$.
\end{sbprop}
This is a $G$-MHS version of \cite{KNU2} Part IV Proposition 5.1.11 and is proved in the same way.
\begin{sbthm}\label{mildCKS} The identity map of $D$ extends uniquely to a continuous map $D^{\sharp,{{\rm{mild}}}}_{\Sigma,[:]}\to D^{\diamond}_{{\rm{SL}}(2)}$.
The last map is compatible with the new log structure of $D^{\sharp,{{\rm{mild}}}}_{\Sigma, [:]}$ and the log structure of $D^{\diamond}_{{\rm{SL}}(2)}$, and induces a continuous map between the associated valuative spaces $D^{\sharp,{{\rm{mild}}}}_{\Sigma,[\val]}\to D^{\diamond}_{{\rm{SL}}(2),\val}$.
\end{sbthm}
This is a $G$-MHS version of \cite{KNU2} Part IV Theorem 5.1.10 and is proved in the same way.
\begin{sbpara}\label{afd2}
For mild degenerations,
we can replace the upper right part of the fundamental diagram in Introduction by the following
commutative diagram (maps respect structures of the spaces) which contain the space $D^{\diamond}_{{\rm{SL}}(2)}$ and its associated valuative space $D^{\diamond}_{{\rm{SL}}(2),\val}$.
$$\begin{matrix}
&&D^{\sharp,{{\rm{mild}}}}_{\Sigma,{[\val]}}&
\overset{\psi}\to & D^{\diamond}_{{\rm{SL}}(2),\val} & \to &D^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2),\val}&\overset{\eta^{\star}}{\underset{\subset}\to} & D^{{{\rm{mild}}}}_{{\rm {BS}}, \val}\\
&&\downarrow &&\downarrow&&\downarrow &&\downarrow \\
&&D^{\sharp,{{\rm{mild}}}}_{\Sigma,[:]} &\overset{\psi}\to & D^{\diamond}_{{\rm{SL}}(2)} &\to & D^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2)}&& D^{{{\rm{mild}}}}_{{\rm {BS}}}\\
&&\downarrow&&&&\downarrow&&\\
\Gamma\operatorname{\backslash} D^{{{\rm{mild}}}}_{\Sigma}&\leftarrow&D^{\sharp,{{\rm{mild}}}}_{\Sigma}&&&&D_{{\rm{SL}}(2)}&&
\end{matrix}$$
\end{sbpara}
\begin{sbprop}
The conclusions of Theorem $\ref{SL2gl}$ and their variants in $\ref{SL2SA1}$ and Proposition $\ref{SL2SA2}$ are true also for $X=D^{\diamond}_{{\rm{SL}}(2)}$.
\end{sbprop}
\begin{pf} This follows from the corresponding results for $X=D^{\star}_{{\rm{SL}}(2)}$ because the map $D^{\diamond}_{{\rm{SL}}(2)}\to D^{\star}_{{\rm{SL}}(2)}$ is continuous and $D^{\diamond}_{{\rm{SL}}(2)}$ is Hausdorff.
\end{pf}
\subsection{The fundamental diagram in examples}\label{ss:fund}
We explain what our fundamental diagram tells in special examples.
In particular, by using the fundamental diagram, we give a complement to the work of Goresky and Tai \cite{GT} on the relation of the toroidal compactification and the reductive Borel--Serre compactification (see \ref{Shimu}).
In \ref{Ex1}, \ref{Ex2}, \ref{Shimu}, \ref{noSLBS}, we consider cases in which $G$ is reductive. For a reductive $G$, the main part of the fundamental diagram in Introduction becomes
$$\begin{matrix} & & D^{\sharp}_{\Sigma, [\val]} & \overset{\psi}\to & D_{{\rm{SL}}(2),\val} & \overset{\eta}\to & D_{{\rm {BS}},\val}\\
&& \downarrow && \downarrow && \downarrow\\
&& D^{\sharp}_{\Sigma,[:]} & \overset{\psi}\to & D_{{\rm{SL}}(2)} && D_{{\rm {BS}}}\\
&& \downarrow &&&&\\
\Gamma \operatorname{\backslash} D_{\Sigma} &\leftarrow & D^{\sharp}_{\Sigma} &&&&
\end{matrix},$$
and we consider this part.
\begin{sbpara}\label{Ex1} {\it Example.} Let $G=\operatorname{GL}(2)$ and $h: S_{{\mathbb{C}}/{\mathbb{R}}}\to G$ be the standard one (cf.\ \ref{clEx}).
Then $D=D(G,h)$ is the complex analytic manifold $ \frak H^{\pm}=\{\tau\;|\; \text{Im}(\tau)\neq 0\}={\mathbb{C}}\smallsetminus {\mathbb{R}}$ on which $G({\mathbb{R}})=\operatorname{GL}(2,{\mathbb{R}})$ acts naturally.
We describe the space $D_{{\rm {BS}}}$ of Borel--Serre orbits. Let
$$P=\begin{pmatrix} *& *\\ 0&*\end{pmatrix} \subset \operatorname{GL}(2)_{\mathbb{Q}}=G.$$
All parabolic subgroups of $G$ other than $G$ are conjugate to $P$ under $G({\mathbb{Q}})$, and hence the whole $D_{{\rm {BS}}}$ can be understood as the union of the following picture of the open set $D_{{\rm {BS}}}(P)$.
Let $P_1:=P\cap G'$.
For $iy\in D$ ($y\in {\mathbb{R}}^\times$), the Borel--Serre lifting of $S_{P_1}= P_1/P_{1,u}$ is the group of matrices
$\begin{pmatrix} a&0\\ 0& b \end{pmatrix}$ such that $ab=1$. The adjoint action of this matrix on $\begin{pmatrix} 0&1 \\0& 0\end{pmatrix} \in {\rm {Lie}}\,(P_{1,_u})$ is the multiplication by $ab^{-1}$, and hence the fundamental root sends this matrix to $a^{-1}b$. Hence the isomorphism $A_P\simeq {\mathbb{R}}_{>0}$ given by the fundamental root sends $r\in {\mathbb{R}}_{>0}$ to the matrix $\begin{pmatrix} 1/\sqrt{r} & 0\\ 0 & \sqrt{r}\end{pmatrix}$. Hence the Borel--Serre action of $r\in {\mathbb{R}}_{>0}\simeq A_P$ sends $x+iy$ to $x+ir^{-1}y$. From this, we have a commutative diagram of spaces
$$\begin{matrix} D &\simeq & {\mathbb{R}} \times {\mathbb{R}}_{>0}\times \{\pm 1\}\\ \cap&& \cap\\ D_{{\rm {BS}}}(P) &\simeq & {\mathbb{R}}\times {\mathbb{R}}_{\geq 0}\times \{\pm 1\},\end{matrix}$$
in which the upper horizontal arrow sends $x+iy$ ($x\in {\mathbb{R}}, y\in {\mathbb{R}}^\times$) to $(x, 1/|y|, \text{sgn}(y))$ and the lower isomorphism preserves the structure of real analytic manifolds with corners. We have $D_{{\rm {BS}},\val}=D_{{\rm {BS}}}$.
Next we describe the space $D_{{\rm{SL}}(2)}$ of ${\rm{SL}}(2)$-orbits. Let $W' \in \frak W(G)$ be the filtration associated to the homomorphism
$$\alpha: {\bf G}_m \to G\; ;\; t \mapsto \begin{pmatrix} 1/t & 0\\0 & t\end{pmatrix},$$
and let $\Phi=\{W'\}$. Since $D_{{\rm{SL}}(2)}= \bigcup_{g\in G({\mathbb{Q}})}\; gD_{{\rm{SL}}(2)}(\Phi)$, the whole $D_{{\rm{SL}}(2)}$ can be understood as the union of the following picture of the open set $D_{{\rm{SL}}(2)}(\Phi)$.
We have the distance $\beta: D\to {\mathbb{R}}_{>0}$ to $\Phi$-boundary defined as $x+iy\mapsto 1/\sqrt{|y|}$. Then the injective real analytic map
$$\nu_{\alpha, \beta}: D_{{\rm{SL}}(2)}(\Phi) \overset{\subset}\to {\mathbb{R}}_{\geq 0} \times D \times {\rm{spl}}(W')$$
in Proposition \ref{emb1} sends $x+iy$ ($x\in {\mathbb{R}}, y\in {\mathbb{R}}^\times$) to $(1/\sqrt{|y|}, x|y|^{-1}+i\cdot \text{sgn}(y), x)$, where we identify ${\rm{spl}}(W')$ with ${\mathbb{R}}$ by sending $x\in {\mathbb{R}}$ to $\begin{pmatrix} 1 & x\\0&1\end{pmatrix}\cdot s$ with $s\in {\rm{spl}}(W')$ given by $\alpha$.
The closure of $\nu_{\alpha, \beta}(D)$ in the target space is $C=\{(r, z, x)\;|\; z= xr^2\pm i\}$. Since $D$ is dense in $D_{{\rm{SL}}(2)}(\Phi)$, $\nu_{\alpha, \beta}$ induces an injective map $D_{{\rm{SL}}(2)}(\Phi)\to C$. Let $p\in D_{{\rm{SL}}(2)}(\Phi)$ be the class of the ${\rm{SL}}(2)$-orbit in \ref{clEx2}. Then $\nu_{\alpha, \beta}$ sends $\begin{pmatrix}\epsilon & x\\0 & 1 \end{pmatrix}\cdot p\in D_{{\rm{SL}}(2)}(\Phi)$ for $\epsilon \in \{\pm 1\}$ to $(0, i\epsilon, x)$. This proves the surjectivity of $D_{{\rm{SL}}(2)}(\Phi)\to C$ and hence we have an isomorphism $D_{{\rm{SL}}(2)}(\Phi) \overset{\sim}\to C$ of objects ${\cal {B}}'_{\mathbb{R}}(\log)$.
From this, we have a commutative diagram of spaces
$$\begin{matrix} D &\simeq & {\mathbb{R}} \times {\mathbb{R}}_{>0}\times \{\pm 1\}\\ \cap&& \cap\\ D_{{\rm{SL}}(2)}(\Phi) &\simeq & {\mathbb{R}}\times {\mathbb{R}}_{\geq 0}\times \{\pm 1\},\end{matrix}$$
in which the upper horizontal arrow sends $x+iy$ ($x\in {\mathbb{R}}, y\in {\mathbb{R}}^\times$) to $(x, 1/\sqrt{|y|}, \text{sgn}(y))$ and the lower isomorphism preserves the real analytic structure and the log structure with sign. The image of $p\in D_{{\rm{SL}}(2)}(\Phi)$ under the lower horizontal arrow is $(0, 0, 1)$. We have $D_{{\rm{SL}}(2),\val}=D_{{\rm{SL}}(2)}$.
By Theorem \ref{Shim}, the identity map of $D$ extends uniquely to a morphism
$D_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$ in ${\cal {B}}'_{\mathbb{R}}(\log)$. This induces $D_{{\rm{SL}}(2)}(\Phi) \to D_{{\rm {BS}}}(P)$ for which the following diagram is commutative.
$$\begin{matrix} D_{{\rm{SL}}(2)}(\Phi) & \overset{\sim}\to & {\mathbb{R}} \times {\mathbb{R}}_{\geq 0} \times \{\pm 1\}\\
\downarrow && \downarrow\\
D_{{\rm {BS}}}(P) &\overset{\sim}\to & {\mathbb{R}} \times{\mathbb{R}}_{\geq 0}\times \{\pm 1\}\end{matrix}$$ Here the right vertical arrow is $(x,r, \epsilon)\mapsto (x, r^2, \epsilon)$. Thus the map $D_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$ is a homeomorphism, but their real analytic structures are slightly different.
Next we describe the spaces of nilpotent orbits for the fan $\Sigma$ consisting of all cones ${\mathbb{R}}_{\geq 0}N$ with $N\in {\rm {Lie}}\,(G')=\frak{sl}(2, {\mathbb{Q}})$ such that $N^2=0$ as a $(2,2)$-matrix. Then for a congruence subgroup $\Gamma$ of ${\rm{SL}}(2, {\mathbb{Z}})$, $\Gamma \operatorname{\backslash} D_{\Sigma}$ is a compactified modular curve. We have $D^{\sharp}_{\Sigma, [\val]}=D^{\sharp}_{\Sigma, [:]}= D^{\sharp}_{\Sigma}$, and
the CKS map induces a homeomorphism $D^{\sharp}_{\Sigma}=D^{\sharp}_{\Sigma, [:]}\overset{\sim}\to D_{{\rm{SL}}(2)}$.
Define ${\sigma},\tau\in \Sigma$ by $${\sigma}:={\mathbb{R}}_{\geq 0}N, \quad \tau:= {\mathbb{R}}_{\geq 0}(-N)\quad \text{with}\;\; N=\begin{pmatrix} 0&1\\ 0& 0\end{pmatrix}.$$ The CKS map induces a homeomorphism $D^{\sharp}_{\sigma} \cup D^{\sharp}_\tau \overset{\sim}\to D_{{\rm{SL}}(2)}(\Phi)$. For $a\in {\mathbb{R}}$, this map sends the nilpotent $i$-orbit $({\sigma}, a+i{\mathbb{R}}) \in D^{\sharp}_{{\sigma}}$ (resp.\ $(\tau, a+i{\mathbb{R}})\in D^{\sharp}_\tau$) to the element of $D_{{\rm{SL}}(2)}(\Phi)$ corresponding to the element $(a, 0, 1)$ (resp.\ $(a,0,-1)$) of ${\mathbb{R}}\times {\mathbb{R}}_{\geq 0}\times \{\pm 1\}$.
Here $a+i{\mathbb{R}}$ is regarded as a subset of $\Dc$ by identifying $\Dc$ with ${\bf P}^1({\mathbb{C}})\supset a+i{\mathbb{R}}$.
The part about $D_{{\rm {BS}}}$ and $D_{{\rm{SL}}(2)}$ as topological spaces in this \ref{Ex1} is essentially described in \cite{KU1} 6.2.
\end{sbpara}
\begin{sbpara}\label{Ex3} {\it Example.}
Let $G= \begin{pmatrix} {\mathbb{G}}_m& {\mathbb{G}}_a\\0& 1\end{pmatrix}$ and let $h : S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}={\bf G}_{m,{\mathbb{R}}}$ be the homomorphism which induces $S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})={\mathbb{C}}^\times\to G_{{{\rm red}}}({\mathbb{R}})\::\: z\mapsto z^{-1}\bar z^{-1}$ ($z\in {\mathbb{C}}^\times$).
Let $x\in D=D(G, h)$ be the point defined by the homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}} \to G_{{\mathbb{R}}}$ which induces
$$S_{{\mathbb{C}}/{\mathbb{R}}}({\mathbb{R}})={\mathbb{C}}^{\times}\to G({\mathbb{R}}) = \begin{pmatrix} {\mathbb{R}}^\times& {\mathbb{R}}\\ 0& 1 \end{pmatrix}\;;\; z\mapsto \begin{pmatrix} z^{-1} \bar z^{-1}&0\\0&1\end{pmatrix}
\quad (z\in {\mathbb{C}}^\times).
$$ Then we have an isomorphism of complex analytic manifolds
$${\mathbb{C}} \overset{\sim}\to D\;;\; c \mapsto \begin{pmatrix} 1& c \\0 & 1\end{pmatrix}\cdot x.$$
Let $p$ be the unique element of $D_{{{\rm red}}}$. The real analytic isomorphism $D \overset{\sim}\to {\rm{spl}}(W)\times {\cal {L}}(p)$ in Proposition \ref{Dandgr} sends $c=a+ib\in {\mathbb{C}}=D$ ($a,b\in {\mathbb{R}}$) to $(s(a), \delta(b))$, where
$$s(a)= \begin{pmatrix} 1& a\\ 0 & 1\end{pmatrix} {\rm{spl}}_W(x), \quad \delta(b)= \begin{pmatrix} 0& b \\ 0& 0\end{pmatrix} \in W_{-2}{\rm {Lie}}\,(G_{\mathbb{R}})=\gr^W_{-2}{\rm {Lie}}\,(G_{\mathbb{R}}).$$
Let $P$ be the unique parabolic subgroup of $G_{{{\rm red}}}$, that is, $G_{{{\rm red}}}$ itself.
Since $A_P=\{1\}$, $B_P={\mathbb{R}}_{>0}$. By \ref{Bact}, the Borel--Serre action of $t\in B_P$ on $D= {\mathbb{C}}$ sends $c=a+ib$ ($a,b\in {\mathbb{R}}$) to $a+it^{-2}b$.
As topological spaces with sheaves of real analytic spaces and with log structures with sign, all the spaces $D_{{\rm {BS}}}$, $D_{{\rm {BS}}, \val}$, $D^{\star}_{{\rm{SL}}(2)}$, $D^{\star}_{{\rm{SL}}(2),\val}$, $D^{II}_{{\rm{SL}}(2)}$, $D^{II}_{{\rm{SL}}(2), \val}$, $D^I_{{\rm{SL}}(2)}$, $D^I_{{\rm{SL}}(2),\val}$ coincide with the real analytic manifold with corners ${\mathbb{R}} \times [-\infty, \infty] \supset {\mathbb{R}} \times {\mathbb{R}} \simeq D$, where ${\mathbb{R}} \times {\mathbb{R}} \simeq D$ sends $(a,b) \in {\mathbb{R}}\times {\mathbb{R}}$ to $a+ib\in {\mathbb{C}}=D$. For $a\in {\mathbb{R}}$, $(a, \infty)\in {\mathbb{R}} \times [-\infty, \infty]$ corresponds to the element $(p, a+i{\mathbb{R}}_{>0})$ of $D_{{\rm{SL}}(2)}$ and to the element $(P, a+i{\mathbb{R}}_{>0})$ of $D_{{\rm {BS}}}$, and $(a, -\infty)\in {\mathbb{R}} \times [-\infty, \infty]$ corresponds to the element $(p, a+i{\mathbb{R}}_{<0})$ of $D_{{\rm{SL}}(2)}$ and to the element $(P, a+i{\mathbb{R}}_{<0})$ of $D_{{\rm {BS}}}$.
Define $${\sigma}:={\mathbb{R}}_{\geq 0}N, \quad \tau:= {\mathbb{R}}_{\geq 0}(-N)\quad \text{with}\;\; N=\begin{pmatrix} 0&1\\ 0& 0\end{pmatrix}\in {\rm {Lie}}\,(G'),$$
$$ \Sigma:= \{\{0\}, {\sigma}, \tau\},\quad \Gamma:= \begin{pmatrix} 1 & {\mathbb{Z}}\\ 0 & 1\end{pmatrix}.$$
Then $\Gamma$ and $\Sigma$ are strongly compatible. We have isomorphisms of complex analytic manifolds
$$\Gamma \operatorname{\backslash} D\simeq {\mathbb{C}}^\times, \quad \Gamma \operatorname{\backslash} D_{\Sigma} \simeq {\bf P}^1({\mathbb{C}}),$$
where the class of $c\in {\mathbb{C}}=D$ in $\Gamma \operatorname{\backslash} D$ is identified with $\exp(2\pi ic)\in {\mathbb{C}}^\times$. The point $0\in {\bf P}^1({\mathbb{C}})$ corresponds to the class of the nilpotent orbit $({\sigma}, {\mathbb{C}})$ and the point $\infty\in {\bf P}^1({\mathbb{C}})$ corresponds to the class of the nilpotent orbit $(\tau, {\mathbb{C}})$.
We have $D^{\sharp}_{\Sigma, [\val]}= D^{\sharp}_{\Sigma,[:]}=D^{\sharp}_{\Sigma}$, and the CKS map induces
a homeomorphism $D^{\sharp}_{\Sigma}= D^{\sharp}_{\Sigma, [:]}\overset{\sim}\to D^I_{{\rm{SL}}(2)}$. For $a\in {\mathbb{R}}$, this map sends the nilpotent $i$-orbit $({\sigma}, a+i{\mathbb{R}})\in D^{\sharp}_{{\sigma}}$ to the element of $D_{{\rm{SL}}(2)}$ corresponding to $(a, \infty)\in {\mathbb{R}} \times [-\infty, \infty]$, and the nilpotent $i$-orbit $(\tau, a+i{\mathbb{R}})\in D^{\sharp}_{\tau}$ to the element of $D_{{\rm{SL}}(2)}$ corresponding to $(a, -\infty)\in {\mathbb{R}} \times [-\infty, \infty]$. Here $a+i{\mathbb{R}}$ is regarded as a subset of $\Dc=D={\mathbb{C}}$.
\end{sbpara}
\begin{sbpara}\label{Ex2} {\it Example.} We omit the details in this \ref{Ex2}.
Let $G=\operatorname{GL}(2) \times \operatorname{GL}(2)$ and let $h:S_{{\mathbb{C}}/{\mathbb{R}}}\to \operatorname{GL}(2)_{\mathbb{R}} \times \operatorname{GL}(2)_{\mathbb{R}}$ be the diagonal embedding of the homomorphism in \ref{Ex1}. This $h$ is ${\mathbb{R}}$-polarizable.
We have
$$D=\frak H^{\pm} \times \frak H^{\pm}.$$
Let $\Sigma$ be the fan consisting of all cones of the form ${\mathbb{R}}_{\geq 0}N_1\times {\mathbb{R}}_{\geq 0}N_2\subset {\rm {Lie}}\,(G'_{\mathbb{R}})={\frak {sl}}(2, {\mathbb{R}}) \times {\frak {sl}}(2, {\mathbb{R}})$, where $N_j$ is an element of
the $j$-th ${\frak {sl}}(2,{\mathbb{Q}})$ in ${\rm {Lie}}\,(G')$ such that $N_j^2=0$ as a $(2,2)$-matrix ($j=1,2$).
Then in the category of topological spaces, the fundamental diagram presents
$$\begin{matrix} D^{\sharp}_{\Sigma, [\val]} & \overset{\sim}\to & D_{{\rm{SL}}(2),\val} &\overset{\sim}\to & D_{{\rm {BS}},\val}\\
\downarrow && \downarrow && \\
D^{\sharp}_{\Sigma, [:]} & \overset{\sim}\to & D_{{\rm{SL}}(2)}&&\downarrow\\
\downarrow && &\searrow &\\
D^{\sharp}_{\Sigma} && \overset{\sim}\longrightarrow && D_{{\rm {BS}}}.\end{matrix}$$
Furthermore, $D^{\sharp}_{\Sigma}$ is canonically isomorphic to the product of two copies of $D^{\sharp}_{\Sigma}$ of \ref{Ex1}, and $D_{{\rm {BS}}}$ is canonically isomorphic to the product of two copies of $D_{{\rm {BS}}}$ of \ref{Ex1} (see Proposition \ref{prodD}).
The proper surjective map $D^{\sharp}_{\Sigma, [:]} \to D^{\sharp}_{\Sigma}$ is not injective as the following property of the convergences show, and hence the map $D_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$ is not injective.
Consider the point $p=(iy_1, iy_2)\in \frak H \times \frak H\subset D$ ($y_1, y_2\in {\mathbb{R}}_{>0}$). In the following (1), (2), (3), we give examples of the convergence of $p$ in $D^{\sharp}
_{\Sigma}$, $D^{\sharp}_{\Sigma, [:]}$, and $D^{\sharp}_{\Sigma, [\val]}$, respectively, to show how the topologies of these three spaces are different.
(1) If $y_j\to \infty$ for $j=1,2$, $p$ converges to the class of the nilpotent $i$-orbit $({\sigma}, Z)$, where ${\sigma}={\mathbb{R}}_{\geq 0}N_1\times {\mathbb{R}}_{\geq 0}N_2$ with $N_j$ the matrix $\begin{pmatrix} 0&1\\0&0\end{pmatrix}$ in the $j$-th ${\frak {sl}}(2, {\mathbb{Q}})$ in ${\rm {Lie}}\,(G')$ ($j=1,2$) and $Z$ is the $\exp(i{\sigma}_{\mathbb{R}})$ orbit which passes $(i, i)\in D$.
(2) If $y_1, y_2 \to \infty$ and $y_1/y_2\to \infty$, then $p$ converges in $D^{\sharp}_{\Sigma,[:]}$ to a point $a$, and if $y_1,y_2\to \infty$ and $y_1/y_2\to 1$, then $p$ converges in $D^{\sharp}_{\Sigma,[:]}$ to a point $b$, and $a\neq b$. These $a,b\in D^{\sharp}_{\Sigma, [:]}$ lie over the above class of $({\sigma}, Z)$ in $D^{\sharp}_{\Sigma}$.
(3) If $y_2 \to \infty$ and $y_1/y_2^2\to \infty$, then $p$ converges in $D^{\sharp}_{\Sigma, [\val]}$ to a point $c$, and if $y_2\to \infty$ and $y_1/y_2^3\to \infty$, $p$ converges in $D^{\sharp}_{\Sigma, [:]}$ to a point $d$, and $c\neq d$. These $c,d\in D^{\sharp}_{\Sigma, [\val]}$ lie over the point $a\in D^{\sharp}_{\Sigma, [:]}$.
\end{sbpara}
\begin{sbpara}\label{Shimu} {\it Shimura varieties.}
Assume that $G$ is reductive and that $h_0:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ satisfies the condition that the Hodge type of ${\rm {Lie}}\,(G_{\mathbb{R}})$ via $h_0$ is in $\{(1,-1), (0, 0), (-1,1)\}$ (as in \ref{Shi0}).
Then for an arithmetic subgroup (that is, a subgroup satisfying the condition $(A)$ in \ref{Gamma}) $\Gamma$ of $G'({\mathbb{Q}})$, there is a fan $\Sigma$ which is strongly compatible with $\Gamma$ such that $\Gamma \operatorname{\backslash} D_{\Sigma}$ is compact. This compact space is called a Mumford (or toroidal) compactification of $\Gamma \operatorname{\backslash} D$.
As in Theorem \ref{Shim}, we have a morphism $D_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$ which extends the identity morphism of $D$. We can prove $D_{{\rm{SL}}(2),\val}\overset{\sim}\to D_{{\rm {BS}},\val}$, but we do not give the proof here.
As an application of the fundamental diagram, we have the following complement to the work \cite{GT} of Goresky and Tai on the relation of toroidal compactifications and reductive Borel--Serre compactification.
The reductive Borel--Serre space, which we denote by $D_{{\rm {BS}}}^{\flat}$ here, is defined to be the quotient of $D_{{\rm {BS}}}$ by the following equivalence relation.
For $p_1=(P_1, Z_1), p_2=(P_2, Z_2)\in D_{{\rm {BS}}}$, $p_1\sim p_2$ if and only if $P_1=P_2$ and $P_{1,u}Z_1=P_{2,u}Z_2$, where $(\cdot)_u$ denotes the unipotent radical. %
The quotient $\Gamma\operatorname{\backslash} D^{\flat}_{{\rm {BS}}}$ is compact, and is called the reductive Borel--Serre compactification of $\Gamma \operatorname{\backslash} D$.
Let $\Gamma$ be a neat arithmetic subgroup of $G'({\mathbb{Q}})$ and let $\Sigma$ be strongly compactible with $\Gamma$ such that $\Gamma\operatorname{\backslash} D_{\Sigma}$ is compact.
Then concerning the relation of the compactifications $\Gamma \operatorname{\backslash} D_{\Sigma}$ and $\Gamma \operatorname{\backslash} D^{\flat}_{{\rm {BS}}}$ of $\Gamma \operatorname{\backslash} D$, Goresky and Tai obtained the following result. The identity map of $\Gamma \operatorname{\backslash} D$ extends to a \lq\lq continuous map modulo homotopy'' from $\Gamma \operatorname{\backslash} D_{\Sigma}\to \Gamma \operatorname{\backslash} D^{\flat}_{{\rm {BS}}}$ if we replace $\Sigma$ by a sufficiently finer subdivision. Precisely speaking, if we replace $\Sigma$ by a sufficiently finer subdivision, there are a compact topological space $T$ which contains $\Gamma \operatorname{\backslash} D$ as a dense open subspace, and continuous surjective maps $f: T\to \Gamma\operatorname{\backslash} D_{\Sigma}$ and $g: T\to \Gamma \operatorname{\backslash} D^{\flat}_{{\rm {BS}}}$ such that $f$ is a homotopy equivalence and such that $f$ and $g$ induce the identity map of $\Gamma \operatorname{\backslash} D$.
We have the following result. %
The map $\Gamma \operatorname{\backslash} D_{\Sigma, [:]}\to \Gamma \operatorname{\backslash} D_{\Sigma}$ is proper surjective and a weak homotopy equivalence, and we have the continuous surjective map $\Gamma \operatorname{\backslash} D_{\Sigma, [:]}\to \Gamma \operatorname{\backslash} D^{\flat}_{{\rm {BS}}}$ induced by the continuous maps $D^{\sharp}_{\Sigma, [:]}\to D_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$ by passing to the quotients. That is, compared to \cite{GT},
we do not need a subdivision of $\Sigma$ here and we present a standard space $\Gamma \operatorname{\backslash} D_{\Sigma, [:]}$ which connects $\Gamma \operatorname{\backslash} D_{\Sigma}$ and $\Gamma \operatorname{\backslash} D^{\flat}_{{\rm {BS}}}$.
This gives an alternative proof for the existence of the canonical maps
$H^m(\Gamma \operatorname{\backslash} D^{\flat}_{{\rm {BS}}},A) \to H^m(\Gamma \operatorname{\backslash} D_{\Sigma}, A)$
with $A$ being an abelian group for any $m$, $A$ being a group for $m=1$, and $A$ being a set for $m=0$, obtained by Goresky--Tai.
We plan to discuss the details in a forthcoming paper.
\end{sbpara}
\begin{sbpara}\label{noSLBS} An example of $D=D(G,h)$ with $G$ reductive for which the identity map of $D$ does not extend to a continuous map $D_{{\rm{SL}}(2)}\to D_{{\rm {BS}}}$ is given in \ref{Ex6} basing on \cite{KU1} and \cite{KU2}.
\end{sbpara}
\begin{sbrem} The spaces $D^{\sharp}_{\Sigma, \val}$ and $D^{\sharp}_{\Sigma, [:]}$ in the fundamental diagram play similar roles in our work. The former appears in \cite{KU2} and in \cite{KNU2} Part II, Part III and so on of our series of papers, and the latter appears in \cite{KNU2} Part IV and in this part.
Both have canonical proper continuous maps to $D^{\sharp}_{\Sigma}$ and also continuous maps (the CKS maps) to $D_{{\rm{SL}}(2)}$. In this Part V , we are using $D^{\sharp}_{\Sigma, [:]}$ (and the related space $\Gamma \operatorname{\backslash} D_{\Sigma, [:]}$) more than $D^{\sharp}_{\Sigma, \val}$ (and the related space $\Gamma\operatorname{\backslash} D_{\Sigma,\val}$). The advantages of the space $D^{\sharp}_{\Sigma, [:]}$ and $\Gamma \operatorname{\backslash} D_{\Sigma, [:]}$ are:
(1) The space $D^{\sharp}_{\Sigma, [:]}$ naturally produces the space $D^{\sharp}_{\Sigma, [\val]}$ from which we can go to $D^I_{{\rm{SL}}(2),\val}$ (and in the case $G$ is reductive, to $D_{{\rm {BS}},\val}$ and $D_{{\rm {BS}}}$).
(2) The definition of the CKS map by using $D^{\sharp}_{\Sigma, [:]}$ is simpler and more natural than that by using $D^{\sharp}_{\Sigma, \val}$.
The convergences of ratios such as $y_j/y_{j+1}\to a_j$ ($a_j\in {\mathbb{R}}_{>0}$), $y_j/y_{j+1}\to \infty$ appear in SL(2)-orbit theorem and these are the convergences in the space of ratios, and so the relation to the SL(2)-orbit theorem of $D^{\sharp}_{\Sigma, [:]}$ seems stronger than that of $D^{\sharp}_{\Sigma, \val}$.
(3) The spaces $D^{\sharp}_{\Sigma, [:]}$ and $\Gamma \operatorname{\backslash} D_{\Sigma, [:]}$ have the application described in \ref{Shimu}.
On the other hand, the space $\Gamma \operatorname{\backslash} D_{\Sigma, \val}$ has the sheaf of holomorphic functions which the space $\Gamma \operatorname{\backslash} D_{\Sigma,[:]}$ does not have.
\end{sbrem}
\subsection{Functoriality in $G$}
\label{ss:functoriality}
\begin{sbpara}\label{G1G2}
Assume that we are given a homomorphism $f: G_1\to G_2$.
We describe how we can relate the period domains and extended period domains for $G_1$ and those for $G_2$.
We have to introduce some conditions for this functoriality.
We assume $f(G_{1,u})\subset G_{2,u}$ and hence $f$ induces $f_{{{\rm red}}}: G_{1,{{\rm red}}}\to G_{2,{{\rm red}}}$.
We assume that we are given $h_1: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{1,{{\rm red}}, {\mathbb{R}}}$ as in \ref{D}, and we further assume that the induced homomorphism $h_2:=f_{{{\rm red}}}\circ h_1: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{2, {{\rm red}}, {\mathbb{R}}}$ satisfies the condition
that the composition ${\mathbb{G}}_{m,{\mathbb{R}}}\to S_{{\mathbb{C}}/{\mathbb{R}}} \overset{h_2}\longrightarrow G_{2, {{\rm red}}, {\mathbb{R}}}$ is central.
Then we have holomorphic maps
$$D(G_1,h_1)\to D(G_2, h_2), \quad D(G_{1,{{\rm red}}},h_1)\to D(G_{2,{{\rm red}}},h_2).$$
In \ref{ft1}--\ref{ft3}, we further assume that $h_1$ and $h_2$ are ${\mathbb{R}}$-polarizable.
\end{sbpara}
\begin{sbpara}\label{ft1} We first consider the spaces of Borel--Serre orbits.
Assume the the following condition (i) is satisfied.
\medskip
(i) The map ${\rm {Lie}}\,(G'_1)\to {\rm {Lie}}\,(G'_2)$ is surjective.
\medskip
Here as usual, $(-)'$ denote the commutator groups. Then we have
a morphism of real analytic manifolds with corners
$$D(G_1, h_1)^{{{\rm{mild}}}}_{{\rm {BS}}} \to D(G_2,h_2)^{{{\rm{mild}}}}_{{\rm {BS}}}\;;\; (P_1, Z_1)\mapsto (P_2, Z_2),$$
where $P_1$ is a parabolic subgroup of $G_{1,{{\rm red}}}$, $Z_1$ is an $A_{P_1}$-orbit in $D(G_1,h_1)$, $P_2$ is the algebraic subgroup of $G_2$ generated by the image of $P_1$ and the center of $G_2^{\circ}$, which is a parabolic subgroup of $G_2$, and $Z_2$ is the unique $A_{P_2}$-orbit in $D(G_2,h_2)$ which contains the image of $Z_1$.
Assume that the above condition (i) and the following condition (ii) is satisfied.
\medskip
(ii) The map ${\rm {Lie}}\,(G_{1,u})\to {\rm {Lie}}\,(G_{2,u})$ is injective.
\medskip
Then we have a morphism of real analytic manifolds with corners
$$D(G_1,h_1)_{{\rm {BS}}}\to D(G_2, h_2)_{{\rm {BS}}}\;;\;(P_1, Z_1) \mapsto (P_2, Z_2),$$
where $P_1$ and $P_2$ are as above, $Z_2$ is as above if $Z_1$ is an $A_{P_1}$-orbit, and in the case where $Z_1$ is a $B_{P_1}$-orbit, $Z_2$ is the unique $B_{P_2}$-orbit which contains the image of $Z_1$.
Here in the case where $Z_1$ is a $B_{P_1}$-orbit, the image of $Z_1$ in $D(G_2,h_2)$ does not meet $D(G_2, h_2)_{{\rm{spl}}}$ by the injectivity of ${\rm {Lie}}\,(G_{1,u})\to {\rm {Lie}}\,(G_{2,u})$.
\end{sbpara}
\begin{sbpara}\label{ft2} Next we consider the spaces of ${\rm{SL}}(2)$-orbits.
In the case $G_1$ and $G_2$ are reductive, we have a morphism $D(G_1, h_1)_{{\rm{SL}}(2)}\to D(G_2, h_2)_{{\rm{SL}}(2)}$ of locally ringed spaces with log structures with sign, which sends the class of an ${\rm{SL}}(2)$-orbit $(\rho_1, \varphi_1)$ ($\rho_1: {\rm{SL}}(2)^n_{\mathbb{R}}\to G_{\mathbb{R}}$, $\varphi_1: \frak H^n \to D(G_2, h_2)$) to the class of $(\rho_2, \varphi_2)$, where $\rho_2$ is the composition ${\rm{SL}}(2)_{\mathbb{R}}^n \overset{\rho_1}\to G_{1,{\mathbb{R}}}\to G_{2,{\mathbb{R}}}$ and $\varphi_2$ is the composition $\frak H^n \to D(G_1, h_1)\to D(G_2, h_2)$.
In general, we have morphisms
\begin{align*}
D(G_1, h_1)^A_{{\rm{SL}}(2)} & \to D(G_2, h_2)^A_{{\rm{SL}}(2)}\;\; (\text{for the structures}\; I,II), \\
D(G_1, h_1)^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2)} & \to D(G_2, h_2)^{\star,{{\rm{mild}}}}_{{\rm{SL}}(2)},
\end{align*}
where $(-)^A$ denotes the part consisting of $A$-orbits, which sends $(p_1, Z_1)$ to $(p_2, Z_2)$ ($p_1\in D(G_1, h_1)_{{{\rm red}},{\rm{SL}}(2)}$, $Z_1$ is an $A$-orbit in $D(G_1, h_1)$, $p_2$ is the image of $p_1$ in $D(G_2, h_2)_{{{\rm red}},{\rm{SL}}(2)}$ and $Z_2$ is the unique $A$-orbit in $D(G_2, h_2)$ containing the image of $Z_1$).
If ${\rm {Lie}}\,(G_{1,u})\to {\rm {Lie}}\,(G_{2,u})$ is injective, we have morphisms
\begin{align*}
D(G_1, h_1)_{{\rm{SL}}(2)} & \to D(G_2, h_2)_{{\rm{SL}}(2)}\;\; (\text{for the structures}\; I,II), \\
D(G_1, h_1)^{\star}_{{\rm{SL}}(2)} & \to D(G_2, h_2)^{\star}_{{\rm{SL}}(2)},
\end{align*}
which sends $(p_1, Z_1)$ to $(p_2, Z_2)$ ($p_1\in D(G_1, h_1)_{{{\rm red}},{\rm{SL}}(2)}$, $p_2$ is the image of $p_1$ in $D(G_2, h_2)_{{{\rm red}},{\rm{SL}}(2)}$, either $Z_1$ is an $A$-orbit in $D(G_1, h_1)$
and $Z_2$ is the unique $A$-orbit in $D(G_2, h_2)$ containing the image of $Z_1$, or
$Z_1$ is a $B$-orbit in $D(G_1, h_1)$
and $Z_2$ is the unique $B$-orbit in $D(G_2, h_2)$ containing the image of $Z_1$).
\end{sbpara}
\begin{sbpara}\label{ft3} Lastly, we consider the spaces of nilpotent orbits.
Assume that we are given $\Sigma_1$ for $G_1$.
Assume that the images of elements of $\Sigma_1$ in ${\rm {Lie}}\,(G'_{2,{\mathbb{R}}})$ form a weak fan $\Sigma_2$ in ${\rm {Lie}}\,(G_2')$.
(For example, this is satisfied if ${\rm {Lie}}\,(G_1')\to {\rm {Lie}}\,(G_2')$ is injective.)
Then we have
a map
$$D(G_1, h_1)_{\Sigma_1}\to D(G_2, h_2)_{\Sigma_2},$$
a continuous map $$D(G_1,h_1)^{\sharp}_{\Sigma_1, *}\to D(G_2, h_2)^{\sharp}_{\Sigma_2, *}\;\;\;\text{for $*=[:], \val, [\val]$},$$
and a morphism of log manifolds
$$\Gamma_1 \operatorname{\backslash} D(G_1, h_1)_{\Sigma_1}\to \Gamma_2 \operatorname{\backslash} D(G_2, h_2)_{\Sigma_2},$$
where $\Gamma_j\subset G'_j({\mathbb{Q}})$ $(j=1,2)$ are neat semi-arithmetic subgroups such that $\Gamma_j$ is strongly compatible with
$\Sigma_j$ and the image of $\Gamma_1$ in $G_2({\mathbb{Q}})$ is contained in $\Gamma_2$.
\end{sbpara}
\begin{sbprop}\label{prod0} Let $G_1$ and $G_2$ be linear algebraic groups over ${\mathbb{Q}}$ and let $h_j: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{j,{\mathbb{R}}}$ ($j=1,2$) be homomorphisms as in $\ref{D}$.
Let $h=(h_1, h_2): S_{{\mathbb{C}}/{\mathbb{R}}}\to (G_1\times G_2)_{\mathbb{R}}$.
Then $h$ satisfies the condition as in $\ref{D}$. The morphisms $D(G_1\times G_2, h) \to D(G_j, h_j)$ associated to the projections $G_1\times G_2\to G_j$ ($j=1,2$) induce an isomorphism $$D(G_1\times G_2, h)\overset{\sim}\to D(G_1, h_1) \times D(G_2, h_2).$$
\end{sbprop}
\begin{pf}
In the case where $G_1$ and $G_2$ are reductive, this is proved as
$$D(G_1\times G_2, h)= \{(G_1\times G_2)({\mathbb{R}})\text{-conjugate of}\; h\}$$
$$= \prod_{j=1}^2 \{G_j({\mathbb{R}})\text{-conjugate of}\; h_j\}= D(G_1,h_1)\times D(G_2, h_2).$$
The general case is reduced to the reductive case by Proposition \ref{Dandgr} using
$(G_1\times G_2)_u({\mathbb{R}})=G_{1,u}({\mathbb{R}})\times G_{2,u}({\mathbb{R}})$ (this proves that ${\rm{spl}}(W)$ for $G_1\times G_2$ is the product of ${\rm{spl}}(W)$ for $G_j$) and ${\cal {L}}(p)= {\cal {L}}(p_1) \times {\cal {L}}(p_2)$ for $p_j\in D(G_j, h_j)_{{{\rm red}}}$ and $p=(p_1,p_2)\in D(G_1\times G_2,h)_{{{\rm red}}}$.
\end{pf}
\begin{sbprop}\label{prodD} Let the notation be as in Proposition $\ref{prod0}$ and assume that $h_j$ ($j=1,2$) are ${\mathbb{R}}$-polarizable.
Then $h$ is ${\mathbb{R}}$-polarizable and we have$:$
$(1)$ The canonical maps $D(G_1\times G_2, h)^{{{\rm{mild}}}}_{{\rm {BS}}} \to D(G_j, h_j)^{{{\rm{mild}}}}_{{\rm {BS}}}$ ($j=1,2$) induce an isomorphism of real analytic manifolds with corners
$$D(G_1\times G_2, h)^{{{\rm{mild}}}}_{{\rm {BS}}}\overset{\sim}\to D(G_1, h_1)^{{{\rm{mild}}}}_{{\rm {BS}}} \times D(G_2, h_2)^{{{\rm{mild}}}}_{{\rm {BS}}}.$$
In particular, if $G_1$ and $G_2$ are reductive, we have
$$D(G_1\times G_2, h)_{{\rm {BS}}}\overset{\sim}\to D(G_1, h_1)_{{\rm {BS}}} \times D(G_2, h_2)_{{\rm {BS}}}.$$
$(2)$ Assume that $\Sigma_j$ for $G_j$ are given ($j=1,2$).
Let $\Sigma= \{{\sigma}_1\times {\sigma}_2\;|\; {\sigma}_i\in \Sigma_i\}$.
Then $$D(G_1\times G_2,h)^{\sharp}_{\Sigma_1\times\Sigma_2} \overset{\sim}\to D(G_1,h_1)^{\sharp}_{\Sigma_1}\times D(G_2, h_2)^{\sharp}_{\Sigma_2}$$ as topological spaces, and for neat semi-arithmetic subgroups $\Gamma_j$ of $G'_j({\mathbb{Q}})$ which are strongly compatible with $\Sigma_j$ ($j=1,2$), we have an isomorphism of log manifolds
$$(\Gamma_1\times \Gamma_2)\operatorname{\backslash} D(G_1\times G_2, h)_{\Sigma}\overset{\sim}\to\Gamma_1\operatorname{\backslash} D(G_1,h_1)_{\Sigma_1} \times \Gamma_2 \operatorname{\backslash} D(G_2, h_2)_{\Sigma_2}.$$
\end{sbprop}
\begin{pf} (1) Parabolic subgroups of $G_1\times G_2$ are $P_1\times P_2$ for parabolic subgroups $P_j$ of $G_j$. (This fact is deduced from the surjectivity of the map $\Hom({\bf G}_m, \cG) \to \{\text{parabolic subgroups of}\;\cG\}$ in \ref{P_is_para} and from $\Hom({\mathbb{G}}_m}%{\mathbb{G}_m, G_1 \times G_2) = \Hom({\mathbb{G}}_m}%{\mathbb{G}_m, G_1) \times \Hom({\mathbb{G}}_m}%{\mathbb{G}_m, G_2)$.) We have $A_{P_1\times P_2}=A_{P_1}\times A_{P_2}$.
Hence the converse map is given by $((P_1, Z_1), (P_2, Z_2))\mapsto (P_1\times P_2, Z_1\times Z_2)$.
(2) The converse map is given by $(({\sigma}_1, Z_1), ({\sigma}_2, Z_2))\mapsto ({\sigma}_1\times {\sigma}_2, Z_1\times Z_2)$.
\end{pf}
\begin{sbrem} On the other hand, even if $G$ is reductive, $D(G_1\times G_2, h)_{{\rm{SL}}(2)}$ need not be the product of $D(G_j, h_j)_{{\rm{SL}}(2)}$ $(j=1,2)$ as examples in \ref{Ex1} and \ref{Ex2} show.
\end{sbrem}
In \ref{prod2}--\ref{Ex6}, we give examples of $G_1\to G_2$ whose associated morphisms of spaces of Borel--Serre orbits do not exist, looking at examples of convergence and divergence in the extended period domains.
\begin{sbpara}\label{prod2} {\it Example.}
Let $(G_1,h_1)$ be the $(G, h)$ of \ref{Ex3} and let $G_1=G\times G$, $h_1=(h,h): S_{{\mathbb{C}}/{\mathbb{R}}}\to G\times G$, let $G_2=G$, let $G_1\to G_2$ be the second projection. Then the induced morphism $D(G_1,h_1)\to D(G_2,h_2)$ is understood as ${\mathbb{C}}^2\to {\mathbb{C}}\;;\; (c_1,c_2)\mapsto c_2$. This morphism does not extend to a continuous map $D(G_1,h_1)_{{\rm {BS}}} \to D(G_2, h_2)_{{\rm {BS}}}$. Note that in this case, ${\rm {Lie}}\,(G_{1,u})\to {\rm {Lie}}\,(G_{2,u})$ is not injective. Let $P_1=G_{1,{{\rm red}}}$, the unique parabolic subgroup of $G_{1,{{\rm red}}}$.
For $\theta\in {\mathbb{R}}$, let $Z(\theta)$ be the $B_{P_1}$-orbit $\{(ir\cos(\theta), ir\sin(\theta)\;|\; r\in {\mathbb{R}}_{>0}\}$ in ${\mathbb{C}}^2=D(G_1,h_1)$.
Then when $\theta\to 0$ and $r\to \infty$,
$(ir\cos(\theta), ir\sin(\theta))\in {\mathbb{C}}^2=D(G_1, h_1)$ converges to $(P_1, Z(0))\in D(G_1,h_1)_{{\rm {BS}}}$, but the image $ir\sin(\theta)\in {\mathbb{C}}=D(G_2, h_2)$ does not converge in $D(G_2,h_2)_{{\rm {BS}}}$.
The point is that for finite dimensional graded ${\mathbb{R}}$-vector spaces $V_1$ and $V_2$ of weigh $\leq -1$ and for a linear map $f: V_1\to V_2$ which is compatible with the gradings, the following three conditions are equivalent. (i) Either $f$ is injective or $V_2=0$. (ii) $f$ extends to a continuous map $\overline{V}_1\to \overline{V}_2$. If these conditions are satisfied, $f$ extends to a morphism $\overline{V}_1\to \overline{V}_2$ of real analytic manifolds with corners uniquely.
\end{sbpara}
\begin{sbpara}\label{Ex5}
{\it Example.} Let $G_1=\operatorname{GL}(2) \times \operatorname{GL}(2)$, $G_2=\text{GSp}(4)$, and let $f:G_1\to G_2$ be the natural embedding. Let $h_1:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{1,{\mathbb{R}}}$ be as in \ref{Ex2} and let $h_2:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{2,{\mathbb{R}}}$ be $f\circ h_1$. Then both $h_1$ and $h_2$ are ${\mathbb{R}}$-polarizable. We show that the canonical map $D(G_1, h_1)\to D(G_2, h_2)$, which we also denote by $f$, does not extend to a continuous map $D(G_1, h_1)_{{\rm {BS}}}\to D(G_2, h_2)_{{\rm {BS}}}$.
In fact, we have:
(1) When $y_1, y_2 \to \infty$, $(iy_1, iy_2)\in \frak H^{\pm} \times \frak H^{\pm}=D(G_1, h_1)$ converges in $D(G_1, h_1)_{{\rm {BS}}}$.
On the other hand, the identity map of $D(G_2, h_2)$ extends to a homeomorphism $D(G_2, h_2)_{{\rm{SL}}(2)}\overset{\sim}\to D(G_2, h_2)_{{\rm {BS}}}$ (\cite{KU1} Theorem 6.7). We have
(2) When $y_2, y_1/y_2\to \infty$, $f(iy_1, iy_2)$ converges in $D(G_2, h_2)_{{\rm{SL}}(2)}$ to a point $a$, and when $y_1, y_2/y_1\to \infty$, $f(iy_1, iy_2)$ converges in $D(G_2, h_2)$ to a point $b$, and $a\neq b$.
Hence in $D(G_2, h_2)_{{\rm {BS}}}$, $f(iy_1, iy_2)$ for $y_1, y_2\to \infty$ with $y_1/y_2\to \infty$ and that with $y_2/y_1\to \infty$ have different limits.
\end{sbpara}
\begin{sbpara}\label{Ex6}
{\it Example.}
Let $G_1=\operatorname{GL}(2) \times \operatorname{GL}(2)$, $G_2=\text{GSp}(6)$, and let $f: G_1\to G_2$ be the homomorphism $(g_1, g_2)\mapsto g_1\otimes \text{Sym}^2(g_2)$. Let $h_1:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{1,{\mathbb{R}}}$ be as in \ref{Ex2} and let $h_2:S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{2,{\mathbb{R}}}$ be $f\circ h_1$. Both $h_1$ and $h_2$ are ${\mathbb{R}}$-polarizable.
We explain the following (1) and (2).
(1) The canonical map $D(G_1, h_1)\to D(G_2, h_2)$, which we also denote by $f$, does not extend to a continuous map $D(G_1, h_1)_{{\rm {BS}}} \to D(G_2, h_2)_{{\rm {BS}}}$.
(2) The identity map of $D(G_2,h_2)$ does not extend to a continuous map $D(G_2, h_2)_{{\rm{SL}}(2)} \to D(G_2, h_2)_{{\rm {BS}}}$.
These (1) and (2) follow from (3)--(6) below. Note that $D(G_1, h_1)=\frak H^{\pm} \times \frak H^{\pm}$.
(3) When $y_1, y_2\to \infty$, $(iy_1, iy_2)$ converges in $D(G_1, h_1)_{{\rm {BS}}}$.
(4) When $y_2, y_2/y_1\to \infty$, $f(iy_1, iy_2)$ converges in $D(G_2, h_2)_{{\rm{SL}}(2)}$.
Let $P$ and $Q$ be the parabolic subgroup of $G_2$ associated to the following homomorphisms $\mu: {\bf G}_m\to G_2$ and $\nu: {\bf G}_m\to G_2$, respectively. $$\mu(t):=
f\Bigl(
\begin{pmatrix} t^{-3}&0\\0&t^3\end{pmatrix}, \begin{pmatrix} t^{-1}&0\\0&t\end{pmatrix}\Bigr),\quad
\nu(t):=
f\Bigl(\begin{pmatrix} t^{-3}&0\\0&t^3\end{pmatrix}, \begin{pmatrix} t^{-2}&0\\0&t^2\end{pmatrix}\Bigr).$$
Then $P\neq Q$ because the adjoint action of ${\bf G}_m$ on ${\rm {Lie}}\,(G_2)$ defined by $\mu$ (resp.\ $\nu$) multiplies
$$N= f\Bigl(\begin{pmatrix} 0&1\\0&0\end{pmatrix}, \begin{pmatrix} 0&0\\1&0\end{pmatrix}\Bigr)$$
by $t^{-2}$ (resp.\ $t^2$).
(5) When $y\to \infty$, $f(iy^3, iy)$ converges in $D(G_2, h_2)_{{\rm {BS}}}$ to a point whose associated parabolic subgroup of $G_2$ is $P$.
(6) When $y\to \infty$, $f(iy^3, iy^2)$ converges in $D(G_2, h_2)_{{\rm {BS}}}$ to a point whose associated parabolic subgroup of $G_2$ is $Q$.
(These (5) and (6) are essentially contained in
\cite{KU1} Proposition 6.10 and also in \cite{KU2} Section 12.4.)
\end{sbpara}
In the rest of this %
Section \ref{ss:functoriality}, we assume that $G$ is reductive and let $Z$ be the center of $G$. We consider the case $G_1=G$ and $G_2=G/Z$.
We assume that $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$ is ${\mathbb{R}}$-polarizable.
We will see that the extended period domains for $G$ are understood from those of the semisimple group $G/Z$.
\begin{sblem}\label{redssP} Let $\bar h_0$ be the homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}}\to (G/Z)_{\mathbb{R}}$ induced by $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{\mathbb{R}}$.
Then $\bar h_0$ is ${\mathbb{R}}$-polarizable.
\end{sblem}
\begin{pf}
This is because ${\rm {Lie}}\,((G/Z)')={\rm {Lie}}\,(G')$ and hence ${\rm{Ad}}(\bar h_0(i))$ on ${\rm {Lie}}\,((G/Z)'_{\mathbb{R}})$ is a Cartan involution.
\end{pf}
\begin{sbprop}\label{redss3}
The complex analytic manifold $D(G, h_0)$ is an open and closed submanifold of the complex analytic manifold $D(G/Z, \bar h_0)$.
\end{sbprop}
\begin{pf} We have a canonical morphism $D(G, h_0) \to D(G/Z, \bar h_0)$ of complex analytic manifolds. Hence, to prove Proposition \ref{redss3}, it is sufficient to prove that via this map, $D(G, h_0)$ is an open and closed real analytic submanifold of $D(G/Z, \bar h_0)$.
We first prove
\smallskip
{\bf Claim.} Let $g\in G({\mathbb{C}})$. Then $\operatorname{Int} (g)(h_0)=h_0$ in $\Hom(S_{{\mathbb{C}}/{\mathbb{R}},{\mathbb{C}}}, G_{\mathbb{C}})$ if and only if $\operatorname{Int}(g)(\bar h_0)= \bar h_0$ in $\Hom(S_{{\mathbb{C}}/{\mathbb{R}}, {\mathbb{C}}}, (G/Z)_{\mathbb{C}})$.
Here $\text{Int}(g)$ denotes the inner-automorphism given by $g$.
\smallskip
Proof of Claim. Assume $\text{Int}(g)(\bar h_0)= \bar h_0$. Then there is a homomorphism $z: S_{{\mathbb{C}}/{\mathbb{R}},{\mathbb{C}}}\to Z_{\mathbb{C}}$ such that $\text{Int}(g)(h_0(s))=z(s)h_0(s)$ for all $s\in S_{{{\mathbb{C}}/{\mathbb{R}}},{\mathbb{C}}}$. Since $z(s)= \text{Int}(g)(h_0(s))h_0(s)^{-1}$ belongs to the commutator subgroup $G'_{\mathbb{C}}$ of $G_{\mathbb{C}}$ and $G'_{\mathbb{C}}\cap Z_{\mathbb{C}}$ is finite, the image of $z: S_{{\mathbb{C}}/{\mathbb{R}}.{\mathbb{C}}}\to Z_{\mathbb{C}}$ is finite. Since $S_{{\mathbb{C}}/{\mathbb{R}},{\mathbb{C}}}$ is connected, $z$ is the trivial homomorphism.
Claim is proved.
Let $N= \{g\in G({\mathbb{C}})\;|\; \text{Int}(g)(h_0)=h_0\}= \{g\in G({\mathbb{C}})\;|\; \text{Int}(g)(\bar h_0)=\bar h_0\}$ and let $\bar N= N/Z({\mathbb{C}})$. Since $G({\mathbb{R}})/Z({\mathbb{R}})$ is an open and closed real analytic submanifold of $(G/Z)({\mathbb{R}})$,
$D(G, h_0)= G({\mathbb{R}})/(G({\mathbb{R}})\cap N)= (G({\mathbb{R}})/Z({\mathbb{R}}))/((G({\mathbb{R}})/Z({\mathbb{R}}))\cap \bar N)$ is an open and closed real analytic submanifold of $(G/Z)({\mathbb{R}})/((G/Z)({\mathbb{R}})\cap \bar N)= D(G/Z, \bar h_0)$ as a real analytic manifold.
\end{pf}
\begin{sbpara}\label{redss4} {\it Example.} The map $D(G, h_0) \to D(G/Z, \bar h_0)$ for a reductive $G$ need not be bijective. Let $({\mathbb{Z}}/4{\mathbb{Z}})(1)$ be the algebraic group of $4$-th roots of $1$ over ${\mathbb{R}}$ and let $G$ be the semi-direct product of $S_{{\mathbb{C}}/{\mathbb{R}}}$ and ${\mathbb{Z}}/4{\mathbb{Z}}(1)$ in which $S_{{\mathbb{C}}/{\mathbb{R}}}$ is the normal subgroup and the action of the generator of ${\mathbb{Z}}/4{\mathbb{Z}}(1)$ on $S_{{\mathbb{C}}/{\mathbb{R}}}$ via the inner-automorphism is $z\mapsto z^{-1}$. Let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G$ be the inclusion map. Then $G({\mathbb{R}})= {\mathbb{C}}^\times \times \{\pm 1\}$ (here $\{\pm 1\}\subset {\mathbb{Z}}/4{\mathbb{Z}}(1)$)
and $D(G, h_0)$ is a one-point set. On the other hand, $G/Z$ is the semi-direct product of $S_{{\mathbb{C}}/{\mathbb{R}}}/\{\pm 1\}$ and ${\mathbb{Z}}/4{\mathbb{Z}}(1)/\{\pm 1\}\simeq \{\pm 1\}$ in which $S_{{\mathbb{C}}/{\mathbb{R}}}/\{\pm 1\}$ is normal and the generator of ${\mathbb{Z}}/4{\mathbb{Z}}(1)/\{\pm 1\}$ acts on it via the inner-automorphism by $z\mapsto z^{-1}$. Hence $D(G/Z, \bar h_0)$ consists of two points.
Both $\Dc(G, h_0)$ and $\Dc(G/Z, \bar h_0)$ consist of two points.
\end{sbpara}
\begin{sbprop}\label{redss5} As a real analytic manifold with corners, $D(G, h_0)_{{\rm {BS}}}$ is canonically isomorphic to an open and closed subspace of
$D(G/Z, \bar h_0)_{{\rm {BS}}}$.
\end{sbprop}
\begin{pf} By Proposition \ref{redss3}, we have that $Y:=D(G/Z, \bar h_0)$ is the disjoint union $Y_1\coprod Y_2$ of open closed subspaces $Y_1$ and $Y_2$ of $Y$ such that the map $X:=D(G, h_0)\to D(G/Z, \bar h_0)$ induces an isomorphism $X \overset{\sim}\to Y_1$. As is easily seen, $Y_{{\rm {BS}}}$ is the disjoint union $Y_{{\rm {BS}},1}\coprod Y_{{\rm {BS}}, 2}$, where $Y_{{\rm {BS}}, j}$ ($j=1,2$) is the open and closed subset of $Y_{{\rm {BS}}}$ consisting of all elements $(P, Z)$ such that $Z\subset Y_j$.
The morphism $X \to Y$ induces a morphism
$X_{{\rm {BS}}}\to Y_{{\rm {BS}}}$ and this induces a morphism $X_{{\rm {BS}}}\to Y_{{\rm {BS}},1}$. We show that the last morphism is an isomorphism.
We have a bijection $P\mapsto P/Z$ from the set of all parabolic subgroups of $G$ to that of $G/Z$. It is sufficient to prove that we have an isomorphism $X_{{\rm {BS}}}(P) \overset{\sim}\to Y_{{\rm {BS}},1}(P/Z):= Y_{{\rm {BS}}, 1}\cap Y_{{\rm {BS}}}(P/Z)$. Since $A_P \overset{\sim}\to A_{P/Z}$ and $\bar A_P \overset{\sim}\to {\bar A}_{P/Z}$, we have
$$X_{{\rm {BS}}}(P)= D(G, h_0)\times^{A_P} \bar A_P \overset{\sim}\to Y_1 \times^{A_{P/Z}} \bar A_{P/Z}=Y_{{\rm {BS}},1}(P/Z).$$
\end{pf}
\begin{sbprop}\label{redss6} As a locally ringed space with log structure with sign, $D(G, h_0)_{{\rm{SL}}(2)}$ (resp.\ $D(G, h_0)_{{\rm {BS}}, \val}$, resp.\ $D(G, h_0)_{{\rm{SL}}(2),\val}$) is canonically isomorphic to an open and closed subspace of
$D(G/Z, \bar h_0)_{{\rm{SL}}(2)}$ (resp.\ $D(G/Z, \bar h_0)_{{\rm {BS}}, \val}$, resp.\ $D(G/Z, \bar h_0)_{{\rm{SL}}(2),\val}$).
\end{sbprop}
\begin{pf} We use the notation in the proof of Proposition \ref{redss5}.
The case of $D_{{\rm{SL}}(2)}$ is proved as follows. As is easily seen, $Y_{{\rm{SL}}(2)}$ is the disjoint union of $Y_{{\rm{SL}}(2),1}\coprod Y_{{\rm{SL}}(2), 2}$, where $Y_{{\rm{SL}}(2), j}$ ($j=1,2$) is the open and closed subspace of $Y_{{\rm{SL}}(2)}$ consisting of all elements whose torus orbits are contained in $Y_j$.
The map $X_{{\rm{SL}}(2)}\to Y_{{\rm{SL}}(2)}$ induces a morphism $X_{{\rm{SL}}(2)}\to Y_{{\rm{SL}}(2),1}$. We show that the last morphism is an isomorphism.
We use
\medskip
{\bf Claim.} For any field $E\supset {\mathbb{Q}}$, the map $\Hom({\rm{SL}}(2)^n_E,G_E) \to \Hom({\rm{SL}}(2)^n_E, (G/Z)_E)$ is a bijection.
\medskip
We prove Claim. We first prove the injectivity. Assume that $h_1, h_2\in \Hom({\rm{SL}}(2)^n_E, G_E)$ have the same image in $\Hom({\rm{SL}}(2)^n_E, (G/Z)_E)$. Then there is a homomorphism $a: {\rm{SL}}(2)^n_E \to Z_E$ such that $h_2=ah_1$. But $a$ is trivial because ${\rm{SL}}(2)^n= [{\rm{SL}}(2)^n, {\rm{SL}}(2)^n]$. Next we prove the surjectivity. Let $h\in \Hom({\rm{SL}}(2)^n_E, (G/Z)_E)$. Then the image of $h$ is contained in the commutator subgroup $G'_E/(G'\cap Z)_E$ of $(G/Z)_E$, where $G'=[G, G]$. Since $G'\to G'/(G'\cap Z)$ is an isogeny and since ${\rm{SL}}(2)^n$ is simply connected, this homomorphism ${\rm{SL}}(2)^n_E\to G'_E/(G'\cap Z)_E$ comes from a homomorphism ${\rm{SL}}(2)^n_E\to G'_E$. Claim is proved.
By Claim and by using the description of the set of ${\rm{SL}}(2)$-orbits in (ii) or (iii) in Lemma \ref{redp1}, we see that the map $X_{{\rm{SL}}(2)}\to Y_{{\rm{SL}}(2),1}$ is bijective. It remains to compare the real analytic structures and the log structures with sign. By using the local descriptions Proposition \ref{emb1} of these structures, it is sufficient to prove that the canonical map from space ${\rm{spl}}(W')$ in Proposition \ref{emb1} for $(G,h_0)$ to the corresponding space ${\rm{spl}}(\bar W')$ for $(G/Z, \bar h_0)$ is an isomorphism of real analytic manifolds. This map is identified with the map $G_{{\mathbb{R}}, W',u}\to G_{{\mathbb{R}}, \bar W', u}$ and is identified with the isomorphism ${\rm {Lie}}\,(G_{{\mathbb{R}}, W', u}) \overset{\sim}\to {\rm {Lie}}\,(G_{{\mathbb{R}}, \bar W', u})$. This completes the proof for $D_{{\rm{SL}}(2)}$.
The proof for $D_{{\rm {BS}},\val}$ (resp.\ $D_{{\rm{SL}}(2),\val}$) is similar to that for $D_{{\rm {BS}}}$ (Proposition \ref{redss5}) (resp.\ for $D_{{\rm{SL}}(2)}$).
\end{pf}
\begin{sbprop}\label{redss7} Let $\Sigma$ be a weak fan in ${\rm {Lie}}\,(G')$. Then
$D(G, h_0)^{\sharp}_{\Sigma}$ (resp.\ $D(G, h_0)^{\sharp}_{\Sigma,[:]}$, $D(G, h_0)^{\sharp}_{\Sigma,\val}$, $D(G, h_0)^{\sharp}_{\Sigma,[\val]}$) is canonically homeomorphic to an open and closed subset of $ D(G/Z, \bar h_0)^{\sharp}_{\Sigma}$ (resp.\ $D(G/Z, h_0)^{\sharp}_{\Sigma,[:]}$, $D(G/Z, h_0)^{\sharp}_{\Sigma,\val}$, $D(G/Z, h_0)^{\sharp}_{\Sigma,[\val]}$).
Here we denote the image of $\Sigma$ under the isomorphism ${\rm {Lie}}\,(G'_{\mathbb{R}})\overset{\sim}\to {\rm {Lie}}\,((G/Z)'_{\mathbb{R}})$ by the same letter $\Sigma$.
\end{sbprop}
\begin{pf} We use the notation in the proof of Proposition \ref{redss6}.
For $j=1,2$, let $Y^{\sharp}_{\Sigma, [:], j}$ be the inverse image of $Y_{{\rm{SL}}(2), [:], j}$ under the CKS map $Y^{\sharp}_{\Sigma, [:]}\to Y_{{\rm{SL}}(2)}$. Then $Y^{\sharp}_{\Sigma, [:]}$ is the disjoint union of an open and closed subsets $Y^{\sharp}_{\Sigma,[:], 1}$ and $Y^{\sharp}_{\Sigma, [:]. ,2}$. Since the map $Y^{\sharp}_{\Sigma, [:]}\to Y^{\sharp}_{\Sigma}$ is proper and all fibers of this map are connected, $Y^{\sharp}_{\Sigma}$ is the disjoint union of the open and closed subsets $Y^{\sharp}_{\Sigma,1}$ and $Y^{\sharp}_{\Sigma, 2}$, where $Y^{\sharp}_{\Sigma, j}$ ($j=1,2$) denotes the image of $Y^{\sharp}_{\Sigma,[:],j}$ in $Y^{\sharp}_{\Sigma}$. The set $Y^{\sharp}_{\Sigma, j}$ is the subset of $Y^{\sharp}_{\Sigma}$ consisting of nilpotent $i$-orbits $({\sigma}, Z)$ such that there is an $F\in Z$ having the property that if $N_1, \dots, N_n$ generate ${\sigma}$, then $\exp(\textstyle\sum_{k=1}^n iy_kN_k)F\in Y_j$ if $y_k\geq 0$ for all $k$. From this description, we see that the map $X^{\sharp}_{\Sigma}\to Y^{\sharp}_{\Sigma,1}$ is bijective. The coincidence of the topologies can be seen by the fact that for each ${\sigma}\in \Sigma$, both $X^{\sharp}_{{\sigma}}$ and $Y^{\sharp}_{{\sigma},1}$ have the quotient topologies of the topology of $\{(q, F)\in |{\operatorname{toric}}|_{{\sigma}} \times X\;|\; (q,F)\;\text{belongs to}\; E_{{\sigma}}\;\text{of}\; (G,h_0)\}\simeq
\{(q, F)\in |{\operatorname{toric}}|_{{\sigma}} \times Y_1\;|\; (q,F)\;\text{belongs to}\; E_{{\sigma}}\;\text{of}\; (G/Z,\bar h_0)\}$ (this fact follows from Proposition \ref{claim2}). This proves Proposition \ref{redss7} for $D^{\sharp}_{\Sigma}$. The proofs for $D^{\sharp}_{\Sigma, [:]}$, $D^{\sharp}_{\Sigma, \val}$ and $D^{\sharp}_{\Sigma, [\val]}$ are similar.
\end{pf}
\begin{sbprop}\label{redss8} Let $\Sigma$ be a weak fan in ${\rm {Lie}}\,(G')$, and let $\Gamma$ be a semi-arithmetic subgroup of $G({\mathbb{Q}})$ which is strongly compatible with $\Sigma$ and such that the image $\overline \Gamma$ of $\Gamma$ in $(G/Z)({\mathbb{Q}})$ is neat. Then as a locally ringed space with log structure,
$\Gamma\operatorname{\backslash} D(G, h_0)_{\Sigma}$ is canonically isomorphic to an open and closed subspace of $\overline \Gamma\operatorname{\backslash} D(G/Z, \bar h_0)_{\Sigma}$.
\end{sbprop}
\begin{pf} We use the notation in the proof of Proposition \ref{redss7}. For $j=1,2$, let $Y_{\Sigma,j}$ be the subset of $Y_{\Sigma}$ consisting of nilpotent orbits $({\sigma}, Z)$ such that for some $F\in Z$, if $N_k$ ($1\leq k\leq n$) generate ${\sigma}$, then $\exp(\textstyle\sum_{k=1}^n z_kN_k)F\in Y_j$ if $\text{Im}(z_k)\geq 0$ for all $k$. By the similar descriptions of $Y^{\sharp}_{\Sigma,j}$ for $j=1,2$ in the proof of Proposition \ref{redss7}, we have that $Y_{\Sigma}$ is the disjoint union of $Y_{\Sigma,j}$ for $j=1,2$. From the bijectivity of $X^{\sharp}_{\Sigma}\to Y^{\sharp}_{\Sigma,1}$, we obtain the bijectivity of $X_{\Sigma}\to Y_{\Sigma, 1}$. Hence the map $\Gamma\operatorname{\backslash} X_{\Sigma}\to {\overline \Gamma}\operatorname{\backslash} Y_{\Sigma,1}$ is bijective. The coincidence of the sheaf of rings of holomorphic functions and the coincidence of the log structure can be seen by the following facts (i) and (ii) concerning both $\Gamma({\sigma})^{\gp}\operatorname{\backslash} X_{{\sigma}}$ and ${\overline \Gamma}({\sigma})^{\gp}\operatorname{\backslash} Y_{{\sigma}, 1}$ for ${\sigma}\in \Sigma$.
\medskip
(i) A subset $U$ is open if and only if for any fs log analytic space $S$ and for any morphism $S\to {\operatorname{toric}}_{{\sigma}} \times X\simeq {\operatorname{toric}}_{{\sigma}}\times Y_1$ whose image is contained in $\{(q, F)\in {\operatorname{toric}}_{{\sigma}}\times X\;|\; (q,F)\in E_{{\sigma}}\;\text{of}\; (G, h_0)\}\simeq \{(q, F)\in {\operatorname{toric}}_{{\sigma}}\times Y_1\;|\; (q,F)\in E_{{\sigma}}\;\text{of}\; (G/Z, \bar h_0)\}$, the inverse image of $U$ in $S$ is open.
(ii) For an open set $U$ and for a function $f:U\to {\mathbb{C}}$, $f$ belongs to $\cO(U)$ (resp.\ $M(U)$) if and only if for any $S$ and $S\to {\operatorname{toric}}_{{\sigma}}\times X\simeq {\operatorname{toric}}_{{\sigma}} \times Y_1$ as in (i) such that $\cO_S$ is a sheaf of reduced rings (i.e., rings without non-zero nilpotent elements), the pullback of $f$ on the inverse image of $U$ in $S$ belongs to $\cO_S(U)$ (resp.\ $M_S(U)$).
\medskip
These (i) and (ii) follow from Proposition \ref{Ctor}.
\end{pf}
\begin{sbpara}\label{redpf}
We prove Proposition \ref{BSSA2}, Proposition \ref{SL2SA2},
(2) of Remark \ref{redrem3}, and Remark \ref{t:pro6rem}.
If $\Gamma$ is a semi-arithmetic subgroup of $G({\mathbb{Q}})$, the image $\overline \Gamma$ of $\Gamma$ in $(G/Z)({\mathbb{Q}})$ is a semi-arithmetic subgroup, and $\overline \Gamma \cap (G/Z)'({\mathbb{Q}})$ is of finite index in $\overline \Gamma$.
By \ref{proper} (5) and by Propositions \ref{redss5}, \ref{redss6}, \ref{redss7}, \ref{redss8}, we can replace $G$ by $G/Z$ and replace $\Gamma$ by the semi-arithmetic subgroup $\overline \Gamma \cap (G/Z)'({\mathbb{Q}})$ of $(G/Z)'({\mathbb{Q}})$.
Thus Proposition \ref{BSSA2}, Proposition \ref{SL2SA2}, (2) of Remark \ref{redrem3}, and Remark \ref{t:pro6rem} are reduced to
Theorem \ref{BSgl}, Theorem \ref{SL2gl}, Theorem \ref{t:property}, and Proposition \ref{t:pro6}, respectively.
\end{sbpara}
\begin{sbpara}
\label{KP2}
We describe some details of the relation of this paper with the work \cite{KP} explained in Remark \ref{r:KP}.
Let $H$, $M$, $h_0:S_{{\mathbb{C}}/{\mathbb{R}}}\to M_{\mathbb{R}}$, $\bar h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to (M/Z)_{{\mathbb{R}}}$ be as in \ref{relMT}. Let $\Gamma$ be a neat arithmetic subgroup of $(M/Z)({\mathbb{Q}})$ which is contained in the connected component of $(M/Z)({\mathbb{R}})$ containing $1$ and let $\Sigma$ be a fan in ${\rm {Lie}}\,((M/Z)')={\rm {Lie}}\,(M')$ which is strongly compatible with $\Gamma$. Then $\Gamma$ acts on $D(M, h_0)$ and on $D(M, h_0)_{\Sigma}$. The work \cite{KP} shows that $\Gamma \operatorname{\backslash} D(M, h_0)_{\Sigma}$ is a logarithmic manifold. The method in \cite{KP} is to use the inclusion map $D(M, h_0)\to D({\Lambda})$ (${\Lambda}$ is as in \ref{relMT}) and to use the work \cite{KU2} on the toroidal partial compactification for $D({\Lambda})$.
This result can be deduced also from Theorem \ref{t:property} for $G=M/Z$ as follows. Take a neat semi-arithmetic subgroup $\Gamma_1$ of $M'({\mathbb{Q}})$ whose image $\Gamma_2$ in $(M/Z)({\mathbb{Q}})$ is a normal subgroup of $\Gamma$ of finite index. Then %
by Proposition \ref{redss8}, $\Gamma_1 \operatorname{\backslash} D(M, h_0)_{\Sigma}$ is %
an open and closed subspace of %
$\Gamma_2 \operatorname{\backslash} D(M/Z, \bar h_0)_{\Sigma}$.
By taking the quotients by $\Gamma/\Gamma_2$, we have that $\Gamma \operatorname{\backslash} D(M, h_0)_{\Sigma}$ is an open and closed subspace of $\Gamma \operatorname{\backslash} D(M/Z, \bar h_0)_{\Sigma}$, which is a logarithmic manifold by Theorem \ref{t:property} and by the part of Remark \ref{redrem3} (1) for semisimple algebraic groups, and hence is a logarithmic manifold.
\end{sbpara}
\subsection{$G$-log mixed Hodge structures}\label{ss:GLMH}
We consider the $G$-MHS version of the notion log mixed Hodge structure.
In this Section \ref{ss:GLMH}, $\Gamma$ denotes a semi-arithmetic subgroup (\ref{Gamma}) of $G({\mathbb{Q}})$.
\begin{sbpara}\label{GLMH}
Let $S$ be an object of the category ${\cal {B}}(\log)$ (\ref{logmfd}). Recall that the topological space $S^{\log}$ is endowed with a proper surjective continuous map $\tau: S^{\log}\to S$ and a sheaf of rings $\cO_S^{\log}$ over $\tau^{-1}(\cO_S)$. A log ${\mathbb{Q}}$-mixed Hodge structure on $S$ is a triple $(H_{\mathbb{Q}}, W, H_\cO)$, where $H_{\mathbb{Q}}$ is a locally constant sheaf on $S^{\log}$ of finite-dimensional ${\mathbb{Q}}$-vector spaces, $W$ is an increasing filtration on $H_{\mathbb{Q}}$, $H_\cO$ is a vector bundle on $S$ endowed with an isomorphism $\cO_S^{\log}\otimes_{\mathbb{Q}} H_{\mathbb{Q}}\simeq \cO_S^{\log} \otimes_{\tau^{-1}(\cO_S)} \tau^{-1}(H_\cO)$ and with a decreasing filtration $F$, satisfying certain conditions (see \cite{KNU2} Part III 1.3).
We denote by ${\rm {LMH}} (S)$ the category of log ${\mathbb{Q}}$-mixed Hodge structures over $S$.
A {\it $G$-log mixed Hodge structure} ({\it $G$-LMH}, for short) over $S$ is an exact $\otimes$-functor from ${\operatorname{Rep}}(G)$
to ${\rm {LMH}} (S)$.
A $G$-LMH on $S$ with a {\it $\Gamma$-level structure} is a $G$-LMH $H$ over $S$ endowed with a global section of the quotient sheaf $\Gamma\operatorname{\backslash} {\cal I}$, where $\cal I$ is the following sheaf on $S^{\log}$. For an open set $U$ of $S^{\log}$, ${\cal I}(U)$ is the set of all isomorphisms $H_{\mathbb{Q}}|_U\overset{\sim}\to \text{id}$ of $\otimes$-functors from ${\operatorname{Rep}}(G)$ to the category of local systems of ${\mathbb{Q}}$-modules over $U$.
\end{sbpara}
\begin{sbpara}
\label{type}
Let $\Sigma$ be a weak fan in ${\rm {Lie}}\,(G')$ which is strongly compatible with $\Gamma$ (\ref{scomp}).
A $G$-LMH $H$ over $S$ with a $\Gamma$-level structure $\lambda$ is said to be {\it of type $(h_0,\Sigma)$} if for any $s\in S$, any $t\in s^{\log}$, and
any $\otimes$-isomorphism $\tilde \lambda_t: H_{{\mathbb{Q}},t}\simeq \;\text{id}$ which belongs to $\lambda_t$,
there is a ${\sigma}\in \Sigma$ satisfying the following (i) and (ii).
(i) The logarithm of the action of $\Hom((M_S/\cO^\times_S)_s, {\mathbb{N}})\subset \pi_1(s^{\log})$ on $H_{{\mathbb{Q}},t}$ is contained, via $\tilde \lambda_t$, in $\sigma \subset {\rm {Lie}}\,(G_{\mathbb{R}})$.
(ii) Let $a: \cO_{S,t}^{\log}\to {\mathbb{C}}$ be a ring homomorphism which induces the evaluation $\cO_{S,s}\to {\mathbb{C}}$ at $s$ and consider the element $F: V\mapsto {\tilde \lambda}_t a(H(V))$ of $Y$ (\ref{Y}). Then this element belongs to $\Dc$ and $({\sigma}, F)$ generates a nilpotent orbit (\ref{nilp2}).
\end{sbpara}
\begin{sbrem}
The definition of the type $(h_0,\Sigma)$ in \cite{KNU3} 4.2.2 should be modified as above because \lq\lq the smallest cone satisfying (i)'' in the condition (ii) there may not be well-defined when $\Sigma$ is not a fan.
\end{sbrem}
\begin{sbpara}
If $(H, \lambda)$ is a $G$-LMH with a $\Gamma$-level structure of type $(h_0,\Sigma)$, we have a map $S \to \Gamma \operatorname{\backslash} D_{\Sigma}$, called the {\it period map} associated to $(H, \lambda)$, which sends $s\in S$ to the class of the nilpotent orbit $({\sigma}, Z)\in D_{\Sigma}$.
Here ${\sigma}$ is the smallest cone of $\Sigma$ satisfying (i) and (ii) in \ref{type}, which exists by a variant of \cite{KNU2} Part III Lemma 2.2.4 (see also Appendix of this paper), and $Z$ is the associated $\exp({\sigma}_{{\mathbb{C}}})$-orbit obtained in (ii) in \ref{type}.
\end{sbpara}
\begin{sbpara}\label{GMHSS}
Let $S$ be an object of ${\cal {B}}(\log)$. Let $S^{\circ}$ be the underlying locally ringed space over ${\mathbb{C}}$ of $S$ with the trivial log structure.
By a $G$-MHS on $S$ with a $\Gamma$-level structure, we mean a
$G$-LMH on $S^{\circ}$ with a $\Gamma$-level structure. By a {\it $G$-MHS on $S$ with a $\Gamma$-level structure of type $h_0$}, we mean a $G$-LMH on $S^{\circ}$ with a $\Gamma$-level structure of type $(h_0,\Sigma)$, where $\Sigma$ is the fan consisting of the one cone $\{0\}$.
\end{sbpara}
\subsection{Moduli of $G$-log mixed Hodge structures and period maps}\label{ss:mGLMH}
We show that $\Gamma \operatorname{\backslash} D_{\Sigma}$ is a moduli space of $G$-LMH.
In this Section \ref{ss:mGLMH}, let $\Gamma$ be a subgroup of $G({\mathbb{Q}})$, and assume that either one of the following two conditions is satisfied.
(i) $\Gamma$ is a neat semi-arithmetic subgroup (\ref{neat}, \ref{Gamma}) of $G'({\mathbb{Q}})$.
(ii) $G$ is reductive, $\Gamma$ is a semi-arithmetic subgroup of $G({\mathbb{Q}})$, and the image of $\Gamma$ in $(G/Z)({\mathbb{Q}})$ is neat, where $Z$ is the center of $G$.
Note first the following.
\begin{sbprop} The complex analytic manifold $\Gamma \operatorname{\backslash} D$ represents the functor
$$S\mapsto \{\text{isomorphism class of }
G\text{-MHS on $S$ with a $\Gamma$-level structure of type $h_0$}\}$$
from ${\cal {B}}(\log)$ to the category of sets.
\end{sbprop}
The main result here is the following.
\begin{sbthm}\label{t:main} Let $\Sigma$ be as in $\ref{type}$.
Then
$\Gamma \operatorname{\backslash} D_{\Sigma}$ represents the functor
$$S\mapsto \{\text{isomorphism class of }
G\text{-LMH on }S\text{ with a }\Gamma\text{-level structure of type $(h_0,\Sigma)$}\}\text{.}$$
from ${\cal {B}}(\log)$ to the category of sets.
\end{sbthm}
\begin{sbpara}
The proof of Theorem \ref{t:main} is similar to the proof of \cite{KNU2} Part III Theorem 2.6.6.
The first part of the proof is to understand the functor which $E_{\sigma}$ represents.
Then take the quotient $\Gamma(\sigma)\operatorname{\backslash} D_{\sigma}$ of $E_{\sigma}$ by $\sigma_{{\mathbb{C}}}$.
\end{sbpara}
\begin{sbpara}\label{adelic} There is a variant of Theorem \ref{t:main} for $G$-LMH with adelic level structure.
Let $G_1$ be a closed algebraic subgroup of $G$ and let $K$ be an open compact subgroup of $G_1({\bf A}_{\mathbb{Q}}^{\infty})$, where ${\bf A}^{\infty}_{\mathbb{Q}}$ is the adele ring of ${\mathbb{Q}}$ without the $\infty$-component. We show that under certain assumptions, the space
$$G_1({\mathbb{Q}}) \operatorname{\backslash} (D \times G_1({\bf A}^{\infty}_{\mathbb{Q}})/K)$$
is a moduli space of $G$-MHS with $K$-level structure and its toroidal partial compactification is a moduli space of $G$-LMH with $K$-level structure.
For each $g\in G_1({\bf A}_{\mathbb{Q}}^{\infty})/K$, let $\Gamma(g)= G_1({\mathbb{Q}})\cap {\tilde g}K{\tilde g}^{-1}$, where $\tilde g$ denotes a lifting of $g$ to $G_1({\bf A}^{\infty}_{\mathbb{Q}})$. Then $\Gamma(g)$ is an arithmetic subgroup of $G_1({\mathbb{Q}})$. We have $\Gamma(\gamma g)=\gamma \Gamma(g)\gamma^{-1}$ for $\gamma\in G_1({\mathbb{Q}})$ and $g\in G_1({\bf A}^{\infty}_{\mathbb{Q}})/K$.
Let $R$ be a representative of $G_1({\mathbb{Q}})\operatorname{\backslash} G_1({\bf A}^{\infty}_{\mathbb{Q}})/K$ in $G_1({\bf A}^{\infty}_{\mathbb{Q}})/K$.
We assume that for every $g\in G_1({\bf A}^{\infty}_{\mathbb{Q}})/K$ (equivalently, for each $g\in R$), the subgroup of $\Gamma(g)$ of $G({\mathbb{Q}})$ is neat and satisfies either one of the conditions (i) and (ii) at the beginning of Section \ref{ss:mGLMH}.
We also assume that for each $g\in R$, we are given a weak fan $\Sigma(g)$ in ${\rm {Lie}}\,(G')$ which is strongly compatible with $\Gamma(g)$.
For each $g\in G_1({\bf A}^{\infty}_{\mathbb{Q}})/K$, define $\Sigma(g):= {\rm{Ad}}(\gamma)\Sigma(g_0)$, where $g=\gamma g_0$ with $\gamma\in G_1({\mathbb{Q}})$ and $g_0\in R$ (then $\Sigma(g)$ is independent of the choices of such $\gamma$ and $g_0$). We have $\Sigma(\gamma g)= {\rm{Ad}}(\gamma)\Sigma(g)$ for all $\gamma\in G_1({\mathbb{Q}})$ and $g\in G_1({\bf A}^{\infty}_{\mathbb{Q}})/K$.
Then we have a log manifold
$$G_1({\mathbb{Q}})\operatorname{\backslash} \coprod_{g\in G_1({\bf A}^{\infty})/K} D_{\Sigma(g)} =G_1({\mathbb{Q}})\operatorname{\backslash} (\bigcup_{g\in G_1({\bf A}^{\infty}_{\mathbb{Q}})/K}\; D_{\Sigma(g)} \times \{g\})/K = \coprod_{g\in R} \;\Gamma(g)\operatorname{\backslash} D_{\Sigma(g)}$$
(here the action of $\gamma \in G_1({\mathbb{Q}})$ sends an element $(x,g)$ of $\coprod_{g\in G_1({\bf A}^{\infty})/K} D_{\Sigma(g)}$ with $x \in D_{\Sigma(g)}$ and $g\in G_1({\bf A}^{\infty}_{\mathbb{Q}})/K$ to the element $(\gamma x, \gamma g)$). This log manifold contains $$G_1({\mathbb{Q}}) \operatorname{\backslash} (D \times G_1({\bf A}^{\infty}_{\mathbb{Q}})/K)=\coprod_{g\in R}\; \Gamma(g)\operatorname{\backslash} D$$ as an open set.
By Theorem \ref{t:main}, this log manifold represents the functor
$$S\mapsto \{\text{isomorphism class of \;}
G\text{-LMH on $S$ with a}\;K\text{-level structure of type $(h_0,\Sigma)$}\}$$
and the above open set represents the functor
$$S\mapsto \{\text{isomorphism class of \;}
G\text{-MHS on $S$ with a}\;K\text{-level structure of type $h_0$}\}.$$
Here $\Sigma$ denotes the family $(\Sigma(g))_g$. A $K$-level structure on a $G$-LMH (or its special case $G$-MHS) $H$ on $S$ means a global section of the quotient sheaf $K\operatorname{\backslash} {\cal J}_1$, where ${\cal J}_1$ is the following sheaf on $S^{\log}$. Let $\cal J$ be the following sheaf on $S^{\log}$.
For an open set $U$ of $S^{\log}$, ${\cal J}(U)$ is the set of all isomorphisms $H_{\mathbb{Q}}|_U\otimes_{{\mathbb{Q}}} {\bf A}^{\infty}_{\mathbb{Q}}\overset{\sim}\to \text{id}\otimes_{{\mathbb{Q}}} {\bf A}^{\infty}_{\mathbb{Q}}$ of $\otimes$-functors from ${\operatorname{Rep}}(G)$ to the category of sheaves of ${\bf A}^{\infty}_{\mathbb{Q}}$-modules over $U$. Then $G_1({\bf A}^{\infty}_{{\mathbb{Q}}})$ acts on $\cal J$ and we have a canonical injective morphism ${\cal I} \to {\cal J}$ for $\cal I$ as in \ref{GLMH}. Let ${\cal J}_1=G_1({\bf A}^{\infty}_{\mathbb{Q}})\cal I \subset {\cal J}$. For a $G$-LMH (resp.\ $G$-MHS) $H$ on $S$ with a $K$-level structure, we say that $H$ is of type $(h_0, \Sigma)$ if for each $s\in S$, if the $K$-level structure at the point of $S^{\log}$ lying over $s\in S$ is $g^{-1}{\lambda}$ with $g\in G_1({\bf A}^{\infty}_{{\mathbb{Q}}})$ and ${\lambda}\in {\cal I}$, then $H$ with the $\Gamma(g)$-level structure ${\lambda}$ is of type $(h_0, \Sigma(g))$ (resp.\ $h_0$). The period morphism from $S$ to this log manifold (resp.\ the above open set) associated to $H$ with this $K$-level structure of type $(h_0, \Sigma)$ (resp.\ $h_0$) is as follows. On an open neighborhood of $s$, taking the above $g$ in $R$, it is the period map from $S$ to $\Gamma(g)\operatorname{\backslash} D_{\Sigma(g)}$ (resp.\ $\Gamma(g)\operatorname{\backslash} D$) associated to $(H, {\lambda})$.
\end{sbpara}
Next we consider extensions of the associated period maps in Theorem \ref{t:epm1} and Theorem \ref{t:epm2}.
\begin{sbthm}\label{t:epm1}
Let $S$ be a connected, log smooth, fs log analytic space, and let $U$ be the open subspace of $S$ consisting of all points of $S$ at which the log structure of $S$ is trivial.
Let $(H,{\lambda})$ be a $G$-MHS on $U$ with a $\Gamma$-level structure
of type $h_0$ ($\ref{GMHSS}$).
Let $\varphi: U\to {\Gamma}\operatorname{\backslash} D$ be the associated period map.
Assume that $(H,{\lambda})$ extends to a $G$-LMH on $S$ with a $\Gamma$-level structure ($\ref{GLMH}$).
Then{\rm:}
\medskip
{\rm(1)} For any point $s\in S$, there exist an open neighborhood
$V$ of $s$, a log modification $V'$ of $V$ ({\rm{\cite{KU2}}}\ $3.6.12$), a subgroup ${\Gamma}_1$ of ${\Gamma}$, and a fan (we do not need a weak fan here) $\Sigma$ in ${\rm {Lie}}\,(G')$
which is strongly compatible with ${\Gamma}_1$ such that the period map
$\varphi|_{U\cap V}$ lifts to a morphism $U\cap V \to {\Gamma}_1\operatorname{\backslash} D$ which
extends uniquely to a morphism $V'\to{\Gamma}_1\operatorname{\backslash} D_\Sigma$ of log manifolds.
Furthermore, we can take a
commutative group $\Gamma_1$.
$$
\CD
U&\supset&U\cap V&\quad\subset\quad& V'\\
@V{\varphi}VV@VVV@VVV\\
{\Gamma} \operatorname{\backslash} D@<<< {\Gamma}_1 \operatorname{\backslash} D&\subset& {\Gamma}_1 \operatorname{\backslash} D_\Sigma.
\endCD
$$
{\rm(2)} Assume that $S\smallsetminus U$ is a smooth divisor.
Then we can take $V=V'=S$ and ${\Gamma}_1={\Gamma}$ in $(1)$.
That is, we have a commutative diagram
$$
\CD
U&\subset&S\\
@V{\varphi}VV@VVV\\
{\Gamma} \operatorname{\backslash} D&\quad\subset\quad& {\Gamma} \operatorname{\backslash} D_\Sigma.
\endCD
$$
{\rm(3)} Assume that ${\Gamma}$ is commutative.
Then we can take ${\Gamma}_1={\Gamma}$ in $(1)$.
\medskip
{\rm (4)}
Assume that ${\Gamma}$ is commutative and that the following condition {\rm(i)} is satisfied.
\smallskip
{\rm(i)} There is a finite family $(S_j)_{1\leq j\leq n}$ of connected
locally closed analytic subspaces of $S$ such that $S=\bigcup_{j=1}^n S_j$
as a set and such that, for each $j$, the inverse image of the sheaf
$M_S/\cO^\times_S$ on $S_j$ is locally constant.
\smallskip
Then we can take ${\Gamma}_1={\Gamma}$ and $V=S$ in $(1)$.
\end{sbthm}
\medskip
This is the $G$-MHS version of \cite{KNU2} Part III Theorem 7.5.1 in mixed Hodge case and of \cite{KU2} Theorem 4.3.1 in pure Hodge case.
The proof goes exactly in the same way as in the pure case treated in \cite{KU2}.
\begin{sbthm}\label{t:epm2}
Let the notation $S$, $U$, $(H,{\lambda})$ and the assumptions be as in Theorem $\ref{t:epm1}$.
Let $\varphi:U\to\Gamma\operatorname{\backslash} D$ be the associated period map.
Let $S^{\log}_{[:]}= S^{\log} \times_S S_{[:]}$ and let $S^{\log}_{[\val]}=S^{\log}\times_S S_{[\val]}$, and regard $U$ as open sets of these spaces.
Then{\rm :}
$(1)$
The map $\varphi:U\to{\Gamma}\operatorname{\backslash} D$ extends uniquely to continuous maps
$$
S_{[:]}^{\log}\to{\Gamma}\operatorname{\backslash} D_{{\rm{SL}}(2)}^I, \qquad S_{[\val]}^{\log} \to {\Gamma} \operatorname{\backslash} D^I_{{\rm{SL}}(2),\val}.
$$
$(2)$ Assume that the complement $S\smallsetminus U$ of $U$ is a smooth divisor on $S$. Then
the map $\varphi:U\to{\Gamma}\operatorname{\backslash} D$ extends uniquely to a continuous map
$$
S^{\log} \to {\Gamma} \operatorname{\backslash} D^{\star}_{{\rm{SL}}(2),\val}
$$
and hence extends uniquely to a continuous map $S^{\log} \to {\Gamma} \operatorname{\backslash} D_{{\rm {BS}},\val}$ and to $S^{\log} \to {\Gamma} \operatorname{\backslash} D_{{\rm {BS}}}$.
\end{sbthm}
This is the $G$-MHS version of \cite{KNU2} Part IV Theorem 6.3.1.
The proof goes exactly in the same way as there.
In the proof of %
loc.\ cit., there are typos, i.e., the two $S_{[:]}$ in the middle of the proof should be changed to $S^{\log}_{[:]}$.
\subsection{Infinitesimal study}\label{ss:inf}
In this section, we consider the logarithmic tangent bundle of the moduli space of $G$-LMH.
We will prove
\begin{sbprop}\label{p:tangent}
Let $Z={\Gamma}\operatorname{\backslash} D_\Sigma$ be as in Theorem $\ref{t:main}$ and let $(H_{\text{\rm univ}},\lambda)$ be the universal object on $Z$.
Let $\theta_Z$ be the logarithmic tangent bundle of $Z$ (i.e., the $\cO_Z$-dual of
the sheaf
$\omega^1_Z$ of differential forms with log poles). Then, we have a canonical isomorphism of $\cO_Z$-modules
$$
\theta_Z\simeq H_{\text{\rm univ}}({\rm {Lie}}\,(G))_\cO/F^0H_{\text{\rm univ}}({\rm {Lie}}\,(G))_\cO.
$$
\end{sbprop}
This is an analogue of \cite{KU2} Proposition 4.4.3 and proved in a similar way as below.
\begin{sbpara}\label{tan1} In \ref{tan1}--\ref{tan4}, let $S$ be an object of
$\Cal B(\log)$ and assume that $S$ is log smooth (this means that $S$ is locally a strong subspace (\ref{logmfd}) of a log smooth fs log analytic space).
Let $H$ be a $G$-LMH on $S$.
We will construct a commutative diagram of $\cO_S$-modules
$$\begin{matrix}&& \theta_S &\overset{\sim}\to & %
\tilde\theta_S\\
&&\downarrow && \downarrow\\
H({\rm {Lie}}\,(G))_\cO/F^0&\overset{\sim}\to & \cE(H) &\overset{\sim}\to & %
\tilde\cE(H)
\end{matrix}$$
whose horizontal arrows are isomorphisms. Here $\theta_S$ is the logarithmic tangent bundle of $S$ %
and the sheaves %
$\tilde\theta_S$, $\cE(H)$ and %
$\tilde\cE(H)$ are defined below.
Furthermore, in the case $S=\Gamma \operatorname{\backslash} D_{\Sigma}$, we will show that the right vertical arrow is an isomorphism. This will give the isomorphism in Proposition \ref{p:tangent}.
\end{sbpara}
\begin{sbpara}\label{theta} Define the sheaf
%
$\tilde\theta_S$ as follows.
Let $U$ be an open set of $S$, and let $\tilde U=U[T]/(T^2)= (U, \cO_U[T]/(T^2))$.
Then %
$\tilde\theta_S(U)$ is
the set of all morphisms $\tilde U\to S$ which extend
the inclusion morphism $U \to S$.
We have a canonical isomorphism $\theta_S \overset{\sim}\to \tilde\theta_S$.
%
\end{sbpara}
\begin{sbpara}\label{manyE1} We define the sheaf $\cE(H)$.
A section of $\cE(H)$ is a collection of an $\cO_S$-homomorphism $\delta_{p,V}: F^pH(V)_{\cO}\to H(V)_\cO/F^p$ for $p\in {\mathbb{Z}}$ and $V\in {\operatorname{Rep}}(G)$
satisfying the following conditions (i)--(iii).
(i) Functoriality in $V$. For a morphism $V_1\to V_2$ in ${\operatorname{Rep}}(G)$, the square
$$\begin{matrix} F^pH(V_1)_\cO &\to & H(V_1)_\cO/F^p\\
\downarrow&&\downarrow\\
F^pH(V_2)_\cO &\to & H(V_2)_\cO/F^p
\end{matrix}$$
is commutative.
(ii) The diagram
$$\begin{matrix} F^{p+1}H(V)_\cO &\overset{\delta_{p+1,V}}\longrightarrow & H(V)_{\cO}/F^{p+1}\\
\downarrow &&\downarrow\\
F^pH(V)_\cO & \overset{\delta_{p,V}}\longrightarrow& H(V)_\cO/F^{p}\end{matrix}$$
is commutative for every $p$.
(iii) For $V_1,V_2\in {\operatorname{Rep}}(G)$ and for $p,q\in {\mathbb{Z}}$, the following diagram is commutative.
$$\begin{matrix} F^pH(V_1)_\cO \otimes F^qH(V_2)_\cO &\to & (H(V_1)_\cO/F^p\otimes F^qH(V_2)_\cO)\oplus (F^pH(V_1)_\cO \otimes H(V_2)_\cO/F^q)\\
\downarrow &&\downarrow\\
F^{p+q}H(V_1\otimes V_2)_\cO &\to& H(V_1\otimes V_2)_\cO/F^{p+q}\end{matrix}$$
Here the vertical arrows are the evident ones.
The upper horizontal row is $x\otimes y\mapsto (\delta_{p,V_1}(x) \otimes y,\, x\otimes \delta_{q,V_2}(y))$.
The lower horizontal arrow is $\delta_{p+q, V_1\otimes V_2}$.
A section of $\cE(H)$ on an open set $U$ of $S$ is defined in the same way by replacing $S$ by $U$.
We have the evident homomorphism $H({\rm {Lie}}\,(G))_\cO/F^0 \to \cE(H)$.
\end{sbpara}
\begin{sbpara}\label{E'(H)} We define the sheaf %
$\tilde\cE(H)$.
Let $U$ be an open set of $S$, and let $\tilde U$ be as in \ref{theta}.
Then %
$\tilde\cE(H)(U)$ is
the set of all isomorphism classes of $G$-LMH $\tilde H$ on $\tilde U$ whose
pullbacks to $U$ coincide with the restriction of $H$ to $U$.
\end{sbpara}
\begin{sbpara}\label{tangent} We define the map $\theta_S\to \cE(H)$.
Note that for $V\in {\operatorname{Rep}}(G)$, $H(V)_\cO
=\tau_*(\cO_S^{\log}\otimes_{\mathbb{Q}} H(V)_{\mathbb{Q}})$.
Then, $d\otimes1_{H(V)_{\mathbb{C}}}:\Cal O_S^{\log}\otimes_{\mathbb{C}} H(V)_{\mathbb{C}}
\to\omega_S^{1,\log}\otimes_{\mathbb{C}} H(V)_{\mathbb{C}}$ induces
a connection
$$
\nabla:\Cal H(V)_\cO\to\omega_S^1\otimes_{\Cal O_S}\cH(V)_\cO.
$$
We define a map
$$
\theta_S\to\bigoplus_p\Cal Hom(F^pH(V)_\cO, H(V)_\cO/F^p)
$$
by assigning $\delta\in\theta_S$ the element of
$\bigoplus_p\Cal Hom(F^pH(V)_\cO,H(V)_\cO/F^p)$ induced by the composite
map
$$
H(V)_\cO \overset\nabla\longrightarrow\omega_S^1\otimes_{\Cal O_S}H(V)_\cO
\overset{\delta}\longrightarrow H(V)_\cO.
$$
Note that this map is not $\Cal O_S$-linear but that
it induces an $\Cal O_S$-linear map
$F^pH(V)_\cO\to H(V)_\cO/F^p$.
Thus, we have a homomorphism of $\Cal O_S$-modules
$$
\theta_S\to\cE(H).
$$
\end{sbpara}
\begin{sbpara} We have a map %
$\tilde\theta_S\to \tilde\cE(H)$
which sends a morphism $f: \tilde U\to S$ to the class of $f^*H$.
\end{sbpara}
\begin{sbpara}\label{tan2}
We have a canonical isomorphism
$\cE(H)\to %
\tilde\cE(H)$ defied as follows.
Let $(\delta_{p,V})_{p,V}$ be a section of $\cE(H)$ on $U$. Define the corresponding $G$-LMH $\tilde H$ on $\tilde U$ as follows. We identify the topological spaces $U^{\log}$ and $(\tilde U)^{\log}$. We define $\tilde H(V)_{\mathbb{Q}}$ with the weight filtration and the level structure as the same as the restriction of $H(V)_{\mathbb{Q}}$ to $U^{\log}$. Since $\cO_{\tilde U}^{\log}= \cO_{\tilde U} \otimes_{\cO_U} \cO_U^{\log}$, $\tilde H(V)_\cO= \tau_*(\cO_{\tilde U}^{\log}\otimes \tilde H(V)_{\mathbb{Q}})$ is identified with $\cO_{\tilde U} \otimes_{\cO_U} H(V)_{\cO}|_U$. We define the $p$-th Hodge filter on $\tilde H(V)_\cO$ as the $\cO_{\tilde U}$-submodule of $\tilde H_{\cO}= \cO_{\tilde U} \otimes_{\cO_U} H(V)_\cO|_U$ generated by $x+Ty$, where $x\in F^pH(V)_{\cO}|_U$ and $y\in H(V)_\cO|_U$ such that $y \bmod F^pH(V)_\cO|_U$ coincides with $\delta_{p,V}(x)$. It is easy to see that this $\cE(H)\to %
\tilde\cE(H)$ is an isomorphism.
\end{sbpara}
\begin{sbpara}\label{tan3}
The diagram
$$\begin{matrix} \theta_S &\overset{\sim}\to & %
\tilde\theta_S\\
\downarrow && \downarrow\\
\cE(H) &\overset{\sim}\to & %
\tilde\cE(H)
\end{matrix}$$
is commutative.
\end{sbpara}
\begin{sbpara}\label{manyE3}
By Tannaka duality (see below), $H({\rm {Lie}}\,(G))_\cO$ is identified with the collection of $\delta_V\in \cE nd_{\cO_S}(H(V)_\cO)$ for $V\in {\operatorname{Rep}}(G)$ satisfying the
following conditions (i) and (ii).
\smallskip
(i) It is
functorial in $V$. That is, for a morphism $h:V_1\to V_2$ in ${\operatorname{Rep}}(G)$, we have $h\circ \delta_{V_1}=\delta_{V_2}\circ h$.
(ii) For all $V_1,V_2\in {\operatorname{Rep}}(G)$, $\delta_{V_1\otimes V_2}$ coincides with $\delta_{V_1}\otimes 1 +1\otimes\delta_{V_2}$.
\smallskip
Here Tannaka duality is used as follows. By \cite{SR}, locally on $S$, the functors ${\operatorname{Rep}}(G)\ni V \mapsto \cO_S \otimes_{{\mathbb{Q}}} V$ and ${\operatorname{Rep}}(G)\ni V \mapsto H(V)_{\cO}$ are isomorphic as $\otimes$-functors. By this and by the Tannaka duality (\cite{SR}) applied to the functor ${\operatorname{Rep}}(G)\ni V \mapsto \cO_S[T]/(T^2) \otimes_{\mathbb{Q}} V$, we have the above understanding of $H({\rm {Lie}}\,(G))_\cO$.
\end{sbpara}
\begin{sblem}\label{manyE4} The map $H({\rm {Lie}}\,(G))_{\cO}/F^0H({\rm {Lie}}\,(G))_\cO \to \cE(H)$ is an isomorphism.
\end{sblem}
\begin{pf} By \cite{SR} Ch.\ IV 2.4, the $\otimes$-functors with filtrations $V\mapsto H(V)_\cO$ and $V\mapsto \gr_F(H(V)_\cO)$ are isomorphic locally on $S$. Hence we may assume that they are isomorphic. Fix an isomorphism. Then via it, $H({\rm {Lie}}\,(G))_\cO/F^0$ is identified with $\bigoplus_{p<0} \;\gr_F^p(H({\rm {Lie}}\,(G))_\cO)$ and $\cE(H)$ is identified with the sheaf of collections $\delta_V : \gr_F(H(V)) \to \gr_F(H(V))$ ($V\in {\operatorname{Rep}}(G)$) satisfying the following conditions (i)--(iii).
(i) $V\mapsto \delta_V$ is functorial in $V$.
(ii) $\delta_{V_1\otimes V_2}=\delta_{V_1}\otimes 1 + 1\otimes \delta_{V_2}$ for all $V_1, V_2\in {\operatorname{Rep}}(G)$.
(iii) $\text{Image}(\delta_V)\subset \bigoplus_{p<0}\; \gr^p_F(H(V)_\cO)$.
\noindent
By \ref{manyE3}, the sheaf of those $(\delta_V)_V$ satisfying (i) and (ii) (not necessarily satisfying (iii)) is isomorphic to $\gr_F(H({\rm {Lie}}\,(G))_\cO)$.
This proves Lemma \ref{manyE4}.
\end{pf}
\begin{sbpara}\label{tan4} If $S=\Gamma \operatorname{\backslash} D_{\Sigma}$ and $H = H_{\text{\rm univ}}$, %
$\tilde\theta_S\to \tilde\cE(S)$ is an isomorphism because $S$ is the moduli space.
Consequently, we have $\theta_S\overset{\sim}\to \cE(H)\simeq H({\rm {Lie}}\,(G))_\cO/F^0$. This completes the proof of Proposition \ref{p:tangent}.
\end{sbpara}
\begin{sbpara}\label{htang}
Let $Z=\Gamma\operatorname{\backslash} D_\Sigma$ be as in Proposition \ref{p:tangent}.
We define %
$\theta_Z^1=\gr_F^{-1}H_{\text{\rm univ}}({\rm {Lie}}\,(G))_\cO$.
\end{sbpara}
\begin{sbpara}\label{diffprd}
Let $Z=\Gamma\operatorname{\backslash} D_\Sigma$ be as above.
Let $S$ be a logarithmically smooth object of $\Cal B(\log)$, let
$(H,\lambda)$ be a $G$-${\rm {LMH}}$ on $S$ of type $(h_0,\Sigma)$, and let $\varphi:S\to Z$ be the corresponding period map.
Then $H$ is the pullback of $H_{\text{univ}}$ on $Z$ by
$\varphi$, and
the map $\theta_S\to \cE(H)\simeq H({\rm {Lie}}\,(G))_\cO/F^0$ is identified with the
canonical map $\theta_S\to\varphi^*(\theta_Z)$ and
$\gr_F^{-1}(H({\rm {Lie}}\,(G))_\cO)$ is identified with
$\varphi^*(%
\theta_Z^1)$.
The connection of $H(V)_\cO$ satisfies the Griffiths transversality for every $V\in {\operatorname{Rep}}(G)$ if and only if the map $\theta_S\to \varphi^*\theta_Z$ factors through $\varphi^*%
\theta_Z^1$.
\end{sbpara}
\subsection{Generalizations, I}
\label{ss:gen1}
In this section and the next, we give two generalizations of the theory in this paper.
\begin{sbpara} Let $E$ be a subfield of ${\mathbb{R}}$.
We have the following generalization whose case $E={\mathbb{Q}}$ is the theory explained so far, as far as $\Gamma$ is not involved.
Let $\cG$ be a linear algebraic group over $E$. Assume that we are given a homomorphism
$h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to \cG_{{{\rm red}}}\otimes_E {\mathbb{R}}$ of algebraic groups over ${\mathbb{R}}$ such that the composition ${\mathbb{G}}_{m,{\mathbb{R}}}\to S_{{\mathbb{C}}/{\mathbb{R}}} \to \cG_{{{\rm red}}}\otimes_E {\mathbb{R}}$ comes from a homomorphism $k_0: {\mathbb{G}}_{m,E}\to \cG_{{{\rm red}}}$ whose image is contained in the center of $\cG_{{{\rm red}}}$ such that for some (and hence for every) lifting $\tilde k_0: {\mathbb{G}}_{m,E} \to \cG$ of $k_0$, the adjoint action of ${\mathbb{G}}_{m,E}$ on ${\rm {Lie}}\,(\cG_u)$ via $\tilde k_0$ is of weights $\leq -1$. Let ${\operatorname{Rep}}_E(\cG)$ be the category of finite-dimensional representations of $\cG$ over $E$. Note that every $V\in {\operatorname{Rep}}_E(\cG)$ has a $\cG$-stable weight filtration $W_{\bullet}V$.
Let $D=D(\cG, h_0)$ be the set of isomorphism classes of exact $\otimes$-functors $H: {\operatorname{Rep}}_E(\cG) \to E{\rm {MHS}}$ over $E$ which keeps the underlying $E$-vector spaces and their weight filtrations satisfying the following condition. The homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}}\to \cG_{{{\rm red}}}\otimes_E{\mathbb{R}}$ associated to the restriction of $H$ to ${\operatorname{Rep}}_E(\cG_{{{\rm red}}})$ is $\cG_{{{\rm red}}}({\mathbb{R}})$-conjugate to $h_0$.
By the method of Section \ref{ss:cxanastrD}, $D$ is regarded as a complex analytic manifold.
\end{sbpara}
\begin{sbpara} Define $D_{{\rm {BS}}}$ in the same way as in Section \ref{s:DBS} except that for a parabolic subgroup $P$ of $\cG_{{{\rm red}}}$ (defined over $E$), $S_P$ is defined this time to be the maximal $E$-split torus in the center of $P_{{{\rm red}}}$ and $A_P:= \Hom(X(S_P)^+, {\mathbb{R}}^{\mult}_{>0})$. ($X(S_P)^+$ is defined in the same way as in \ref{Drt}.) We have the Borel--Serre action of $A_P$ on $D$ and the Borel--Serre action of ${\mathbb{R}}_{>0}\times A_P$ on $D_{{{\rm nspl}}}$.
Thus $D_{{\rm {BS}}}$ is defined to be the set of all pairs $(P, Z)$, where $P$ is a parabolic subgroup of $\cG_{{{\rm red}}}$ and $Z$ is either an $A_P$-orbit in $D$ or a $B_P$-orbit in $D_{{{\rm nspl}}}$ for the Borel--Serre action.
By the method of Section \ref{ss:BSan}, $D_{{\rm {BS}}}$ is regarded as a real analytic manifold with corners.
\end{sbpara}
\begin{sbpara} Define the objects $D^{\star}_{{\rm{SL}}(2)}$, $D^I_{{\rm{SL}}(2)}$, and $D^{II}_{{\rm{SL}}(2)}$ of ${\cal {B}}'_{\mathbb{R}}(\log)$ in the same way as in Section \ref{s:DSL} except that we change the condition of the rationality of the weight filtrations $W_{\bullet}^{(j)}$ to the $E$-rationality.
\end{sbpara}
\begin{sbpara} We define the topological spaces
$D^{\sharp}_{\Sigma}$, $D^{\sharp}_{\Sigma,[:]}$ and $D^{\sharp}_{\Sigma,[\val]}$ as explained in Section \ref{s:DSig} except that the rationality of cones in $\Sigma$ are replaced by $E$-rationality.
\end{sbpara}
\begin{sbpara}
We have the following fundamental diagram (without $\Gamma$):
$$\begin{matrix}
&& D^{\sharp}_{\Sigma,[\val]} & \to & D_{{\rm{SL}}(2),\val} & \leftarrow & D^{\star}_{{\rm{SL}}(2),\val}& \to & D_{{\rm {BS}},\val}\\
&& \downarrow && \downarrow && \downarrow && \downarrow\\
D^{\sharp}_{\Sigma} &\leftarrow& D^{\sharp}_{\Sigma,[:]}& \to & D_{{\rm{SL}}(2)} &&D^{\star}_{{\rm{SL}}(2)}&& D_{{\rm {BS}}},
\end{matrix}$$
where the arrows respect the structures (the structure of $D^{\star}_{{\rm{SL}}(2)}$ as an object of ${\cal {B}}'_{\mathbb{R}}(\log)$, etc.) of these spaces.
These extended period domains are Hausdorff spaces.
\end{sbpara}
\begin{sbpara}
Assume that $\cG= G \otimes_{\mathbb{Q}} E$ for a linear algebraic group $G$ over ${\mathbb{Q}}$ and that $k_0: {\mathbb{G}}_{m,E}\to \cG_{{{\rm red}}}$ comes from ${\mathbb{G}}_m \to G_{{{\rm red}}}$. Then $D$ is the same as the period domain $D(G,h_0)$ for $G$, and the above extended period domains contain the ones for $G$.
\end{sbpara}
\begin{sbpara} In this generalization, however, we can not have a nice theory of the quotients by $\Gamma$.
We show an example in which $\cG=G\otimes_{\mathbb{Q}} E$, where $G$ is a reductive algebraic group over ${\mathbb{Q}}$, $\Gamma$ is a semi-arithmetic subgroup of $G'({\mathbb{Q}})$, and $\Gamma \operatorname{\backslash} D_{{\rm {BS}}}$, $\Gamma \operatorname{\backslash} D_{{\rm{SL}}(2)}$, and $\Gamma \operatorname{\backslash} D_{\Sigma}$ for some $E$-rational fan $\Sigma$ which is strongly compatible with $\Gamma$, are not Hausdorff.
Let $L$ be a totally real field of degree $>2$ and let $E$ be a subfield of ${\mathbb{R}}$ which contains all conjugates of $L$. Let $G:=$ Res$_{L/{\mathbb{Q}}} (\operatorname{GL}(2)_L)$, $\cG:=G \otimes_{\mathbb{Q}} E=\prod_{j=1}^n \nu_j^*(\operatorname{GL}(2)_L)=\operatorname{GL}(2)_E^n$, where $n=[L:{\mathbb{Q}}]$ and $\nu_1, \dots, \nu_n$ are all the different field homomorphisms $L\to E$. Let $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to \cG\otimes_k {\mathbb{R}}=\operatorname{GL}(2)_{\mathbb{R}}^n$ be the homomorphism $z\mapsto (\langle z\rangle, \dots, \langle z \rangle)$ (\ref{clEx}). Then $D$ is canonically isomorphic to $\frak H^n$, the $n$-fold product of the upper half plane, and $G({\mathbb{Q}})=\operatorname{GL}(2, L)$ acts on it via $(\nu_1, \dots, \nu_n)$.
Let $\Gamma$ be a subgroup of ${\rm{SL}}(2, O_L)$ of finite index.
We show that the quotient spaces $\Gamma \operatorname{\backslash} D_{{\rm {BS}}}$, $\Gamma \operatorname{\backslash} D_{{\rm{SL}}(2)}$, and $\Gamma \operatorname{\backslash} D_{\Sigma}$ are not Hausdorff, where $\Sigma$ is the set of all nilpotent cones in ${\rm {Lie}}\,(\cG_{\mathbb{R}})= \frak{gl}(2, {\mathbb{R}})^n$ of the form $\bigoplus_{j=1}^n {\mathbb{R}} N_j$ with $N_j$ a nilpotent $(2,2)$-matrix over $E$.
First we show that $\Gamma \operatorname{\backslash} D_{{\rm {BS}}}$ is not Hausdorff. For $z\in \frak H$, let $p_{{\rm {BS}}}(z)\in D_{{\rm {BS}}}$ be the limit of $(iy_1, \dots, iy_{n-1}, z)\in D=\frak H^n$, where $y_j\in {\mathbb{R}}_{>0}$ and $y_j\to \infty$. That is, $p_{{\rm {BS}}}(z)$ is the $A_P$-orbit containing $(i, \dots, i, z)$, where
$P$ is the $E$-parabolic subgroup $\prod_{j=1}^n P_j$ of $\cG=\operatorname{GL}(2)_E^n$ with $P_j= \begin{pmatrix} *&*\\0&* \end{pmatrix}\subset \operatorname{GL}(2)_E$ for $1\leq j\leq n-1$ and $P_n=\operatorname{GL}(2)_E$. Let $S= \{p_{{\rm {BS}}}(ia)\;|\; a\in {\mathbb{R}}_{>0}\}$. Then the diagonal matrix $(u, u^{-1})$ with $u\in O_L^\times$ in ${\rm{SL}}(2, L)$ acts on $S$ as $(i\infty, \dots, i\infty, ia) \mapsto (i\infty, \dots, i\infty, ia \nu_n(u)^2)$. But $\{\nu_n(\gamma)^2\;|\; \gamma\in \Gamma_1\}\operatorname{\backslash} {\mathbb{R}}_{>0}$ for a subgroup $\Gamma_1$ of $O_L^\times$ of finite index is not Hausdorff.
Next we show that $\Gamma \operatorname{\backslash} D_{{\rm{SL}}(2)}$ is not Hausdorff. For $z\in \frak H$, let $p_{{\rm{SL}}(2)}(z)$ be the limit point of $(iy_1, \dots, iy_{n-1}, z)$, where $y_j\in {\mathbb{R}}_{>0}$, $y_j/y_{j+1}\to \infty$ ($1\leq j\leq n-1$) with $y_n:=1$.
That is, $p_{{\rm{SL}}(2)}(z)$ is the class of $(\rho, {{\bold r}})$, where $\rho: {\rm{SL}}(2)_{\mathbb{R}}^{n-1}\to \cG_{\mathbb{R}}=\operatorname{GL}(2)_{\mathbb{R}}^n$ is the homomorphism $(g_q, \dots, g_{n-1})\mapsto (g_1, \dots, g_{n-1}, 1)$ and ${{\bold r}}=(i, \dots, i, z)$.
Let $S$ be the set $\{p_{{\rm{SL}}(2)}(ia)\; |\; a\in {\mathbb{R}}_{>0}\}$. The rest of the proof is similar to the above.
Lastly, we show that $\Gamma \operatorname{\backslash} D_{\Sigma}$ is not Hausdorff.
For $z\in \frak H$, let $p_{\Sigma}(z)\in \Gamma \operatorname{\backslash} D_{\Sigma}$ be the limit point of $(z_1, \dots, z_{n-1}, z)\bmod \Gamma$, where $z_j\in \frak H$ and $\text{Im}(z_j)\to \infty$. That is, $p_{{\rm{SL}}(2)}(z)$ is the class mod $\Gamma$ of the
nilpotent orbit $({\sigma}, Z)$, where ${\sigma}={\sigma}_1\times \dots \times {\sigma}_n \subset \frak{gl}(2, {\mathbb{R}})^n$
with ${\sigma}_j= \begin{pmatrix} 0&*\\0&0\end{pmatrix}$ for $1\leq j\leq n-1$ and ${\sigma}_n=\{0\}$ and $Z$ is
the $\exp({\sigma}_{\mathbb{C}})$-orbit in $\Dc$ which contains $\frak H^{n-1} \times \{z\}$. Let $S= \{p_{\Sigma}(z)\;|\; z\in \frak H\}$. The rest of the proof is similar to the above (we use the fact that for a subgroup $\Gamma_1$ of $O_L^\times$ of finite index, $\{\nu_n(\gamma)^2\;|\; \gamma\in \Gamma_1\}\operatorname{\backslash} \frak H$ is not Hausdorff).
\end{sbpara}
\subsection{Generalizations, II}
\label{ss:gen2}
Here we give a generalization which contains partial toroidal compactifications of higher Albanese manifolds treated in \cite{KNU3}. This generalization is used in \cite{Ka} for applications to number theory.
\begin{sbpara}
Let $\cG$ be a normal algebraic subgroup of $G$ and let $\cQ=G/\cG$. We fix an element $b$ of $D(G, h_0)$. Let $D(G, h_0, \cG, b)\subset D(G, h_0)$ be the inverse image in $D(G,h_0)$
of the image of $b$ in $D(\cQ, h_{0,\cQ})$, where $h_{0,\cQ}$ denotes the composite homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}}\overset{h_0}\to G_{{{\rm red}},{\mathbb{R}}}\to \cQ_{{{\rm red}},{\mathbb{R}}}$.
\end{sbpara}
\begin{sbprop} The morphism $D(G, h_0)\to D(\cQ, h_{0,\cQ})$ is smooth.
\end{sbprop}
This follows from the surjectivity of the map of tangent spaces.
\begin{sbcor}
$D(G, h_0, \cG, b)$ is smooth.
\end{sbcor}
\begin{sbpara}
We consider the quotient space $\Gamma\operatorname{\backslash} D(G, h_0, \cG, b)$ and its toroidal partial compactification for a neat semi-arithmetic subgroup $\Gamma$ of $\cG'({\mathbb{Q}})$.
\end{sbpara}
\begin{sbpara}\label{gen2e1} {\it Example} 1. A higher Albanese manifold is regarded as an example of $\Gamma \operatorname{\backslash} D(G, h_0, \cG, b)$ as is explained in \cite{KNU3}.
\end{sbpara}
\begin{sbpara}\label{gen2e2} {\it Example} 2. Let $H_0$ be a ${\mathbb{Z}}$-MHS, that is, a ${\mathbb{Q}}$-MHS endowed with a ${\mathbb{Z}}$-lattice $H_{0,{\mathbb{Z}}}$ in $H_{0,{\mathbb{Q}}}$. Assume that we have a polarization $p_w: \gr^W_w H_0 \otimes \gr^W_w H_0\to {\mathbb{Q}}(-w)$ in the sense of Deligne for each $w\in {\mathbb{Z}}$. Then for $G$, $\cG$, $h_0$ and $b$ as below, $\Gamma \operatorname{\backslash} D(G,h_0, \cG, b)$ is identified with
$(*)$ the set of all isomorphism classes of ${\mathbb{Z}}$-MHS $H$ endowed with isomorphisms $\gr^W_wH \simeq \gr^W_wH_0$ of ${\mathbb{Z}}$-HS for all $w$.
Let
$$G= \{(g, t)\in {\rm {Aut}}(H_{0, {\mathbb{Q}}}, W) \times {\mathbb{G}}_m\;|\; p_w(gx\otimes gy) = t^wp_w(x, y) \text{ for all }w\in {\mathbb{Z}}, x,y\in \gr^W_wH_{0, {\mathbb{Q}}}\}, $$
$$\cG=G_u,$$
and hence
$$\cQ= G/\cG= G_{{{\rm red}}}=$$ $$ \{(g, t) \in \bigl(\prod_w {\rm {Aut}}(\gr^W_wH_{0, {\mathbb{Q}}})\bigr) \times {\mathbb{G}}_m \;|\; p_w(g_wx\otimes g_wy)= t^wp_w(x\otimes y)\text{ for all }
w\in {\mathbb{Z}}, x,y\in \gr^W_wH_{0,{\mathbb{Q}}}\}.$$
Then we have $h_0: S_{{\mathbb{C}}/{\mathbb{R}}}\to G_{{{\rm red}},{\mathbb{R}}}=\cQ_{\mathbb{R}}$ and $b\in D(G, h_0)$ corresponding to $H_0$ as follows. We have the homomorphism $h_0$ which is associated to the Hodge structure $\gr^WH_0$. Then the condition (1) in Lemma \ref{pol2} is satisfied. Let $\cC_0$ (resp.\ $\cC_{0, {{\rm red}}}$) be the smallest full subcategory of ${\mathbb{Q}}{\rm {MHS}}$ (resp.\ ${\mathbb{Q}}{\rm {HS}}$) which contains $H_0$ and ${\mathbb{Q}}(1)$ (resp.\ $\gr^WH_0$ and ${\mathbb{Q}}(1)$) and which is stable under taking $\oplus$, $\otimes$, duals and subquotients. Let $\Cal T_0$ be the Tannakian group of $\cC_0$ associated to the fiber functor $H\mapsto H_{\mathbb{Q}}$. Then ${\Cal T}_{0, {{\rm red}}}$ is identified with the Tannakian group of $\cC_{0, {{\rm red}}}$ associated to the fiber functor $H \mapsto H_{\mathbb{Q}}$. We have a homomorphism $S_{{\mathbb{C}}/{\mathbb{R}}}\to {\Cal T}_{0, {{\rm red}}, {\mathbb{R}}}$ associated to $\gr^W H_0$, which we denote also by $h_0$. We have a canonical homomorphism ${\Cal T}_0\to G$ and this induces a morphism
$D({\Cal T}_0, h_0)\to D(G, h_0)$. We have the canonical element of $D({\Cal T_0}, h_0)$ which sends $V\in {\operatorname{Rep}}({\Cal T}_0)$ to the corresponding ${\mathbb{Q}}{\rm {MHS}}$.
Let $b$ be the image of this canonical element under $D({\Cal T}_0, h_0)\to D(G, h_0)$.
Let $$\Gamma= \{g\in {\rm {Aut}}(H_{0, {\mathbb{Z}}}, W)\; |\; \gr^W_w(g)=1 \; \text{for all}\; w\in {\mathbb{Z}}\}.$$
We prove that $\Gamma \operatorname{\backslash} D(G,h_0, \cG, b)$ is identified with the above set $(*)$. For an element $H\in D(G, h_0, \cG, b)$, $H(V)$ for $V= H_{0,{\mathbb{Q}}}\in {\operatorname{Rep}}(G)$ with the ${\mathbb{Z}}$-lattice $H_{0, {\mathbb{Z}}}$ gives an element of the set $(*)$.
This gives a map $\Gamma \operatorname{\backslash} D(G, h_0, \cG, b)\to (*)$. Conversely let $H$ be a ${\mathbb{Z}}{\rm {MHS}}$ with $\gr^W_wH\simeq \gr^W_w H_0$ for all $w$. Let $\cC$ be the smallest full subcategory of ${\mathbb{Q}}{\rm {MHS}}$ which contains $H$ and ${\mathbb{Q}}(1)$ and which is stable under taking $\oplus$, $\otimes$, duals and subquotients. Let $\Cal T$ be the Tannakian group of $\cC$ associated to the fiber functor $H'\mapsto H'_{\mathbb{Q}}$. We have ${\Cal T}_{{{\rm red}}}= {\Cal T}_{0,{{\rm red}}}$ and
we have a canonical element $D({\Cal T}, h_0)$. We have a canonical homomorphism $\Cal T\to G$, and the image of this canonical element in $D(G, h_0)$ belongs to $D(G, h_0, \cG, b)$. This gives the converse map $(*)\to \Gamma \operatorname{\backslash} D(G, h_0, \cG, b)$.
\end{sbpara}
\begin{sbpara}
Toroidal partial compactifications of $\Gamma\operatorname{\backslash} D(G, h_0, \cG, b)$ are obtained by using a weak fan $\Sigma$ in ${\rm {Lie}}\,(G)$ which is strongly compatible with $\Gamma$ such that ${\sigma}\subset {\rm {Lie}}\,(\cG_{\mathbb{R}})$ for all ${\sigma}\in \Sigma$. In fact, for such a $\Sigma$, the map $D(G, h_0) \to D(\cQ, h_{0, \cQ})$ induces a morphism $\Gamma \operatorname{\backslash} D(G, h_0)_{\Sigma}\to D(\cQ, h_{0, \cQ})$ of log manifolds. Let $D(G, h_0, \cG, b)_{\Sigma}$ be the inverse image of $b_{\cQ}\in D(\cQ, h_{0,\cQ})$ in $D(G, h_0)_{\Sigma}$. The fiber $\Gamma\operatorname{\backslash} D(G, h_0, \cG, b)_{\Sigma}$ of $b_{\cQ}$ in $\Gamma \operatorname{\backslash} D(G, h_0)_{\Sigma}$ is our toroidal partial compactification of $\Gamma \operatorname{\backslash} D(G, h_0, \cG, b)$.
\end{sbpara}
\begin{sbprop}\label{gen2ls} The space $\Gamma \operatorname{\backslash} D(G, b_0, \cG, b)_{\Sigma}$ is a
log manifold which represents the following functor on ${\cal {B}}(\log)${\rm :} It sends $S\in {\cal {B}}(\log)$ to the set of all morphisms $S\to D(G, h_0)_{\Sigma}$ such that the composition $S\to D(G, h_0)_{\Sigma} \to D(\cQ, (h_0)_{\cQ})$ is the constant function $b_{\cQ}$.
\end{sbprop}
\begin{pf} Let $X=\Gamma \operatorname{\backslash} D(G, h_0)_{\Sigma}$, $Y=D(\cQ, b_{\cQ})$, and let $x\in X$. Then the proof of Claim 3 in \ref{pfCtor} shows that there are an open neighborhood $U$ of $x$ in $X$,
a log smooth fs log analytic space $Z$ over ${\mathbb{C}}$, and log differential forms $\omega_1, \dots, \omega_n$ on $Z$ such that the morphism $U\to Y$ factors as $U\to Z \to Y$ satisfying the following conditions
(i) and (ii). Let $Z'=\{z\in Z\;|\; \omega_j(z)=0\;\text{for}\;1\leq j\leq n\}$. Here $\omega_j(z)$ denotes the log differential form on the log point $z$ obtained from $\omega_j$ (\ref{logmfd}).
(i) $U$ is isomorphic over $Z$ to an open subspace of $Z'$ for the strong topology of $Z'$ in $Z$.
(ii) The morphism $Z\to Y$ is log smooth.
Hence the fiber $Z_b$ of
$b_{\cQ}$ in $Z$ is log smooth, and the fiber of $b_{\cQ}$ in $U$ is an open subspace (for the strong topology)
of $\{z\in Z_b\;|\; \omega_j(z)=0\;\text{for}\;1\leq j\leq n\}$ and hence is a log manifold.
\end{pf}
\begin{sbpara}
In Example 1 in \ref{gen2e1}, $\Gamma \operatorname{\backslash} D(G, h_0, \cG, b)_{\Sigma}$ is the toroidal partial compactification of the higher Albanese manifold discussed in \cite{KNU3} Section 5.
\end{sbpara}
\begin{sbpara}
In Example 2 in \ref{gen2e2}, $\Gamma \operatorname{\backslash} D(G, h_0, \cG, b)_{\Sigma}$ represents the functor on ${\cal {B}}(\log)$ which sends $S\in {\cal {B}}(\log)$ to the set of all isomorphism classes of ${\mathbb{Z}}$-LMH $H$ of type $(h_0, \Sigma)$ on $S$ endowed with isomorphisms $\gr^W_w H \simeq \gr^W_w H_0$ of ${\mathbb{Z}}$-LMH for all $w\in {\mathbb{Z}}$ (this tells that $\gr^W_wH$ are constant ${\mathbb{Z}}$-HS for all $w$). See \cite{KNU2} Part III Section 5 for a more general moduli space of ${\mathbb{Z}}$-LMH on $S$ with given graded quotients for the weight filtration.
\end{sbpara}
\begin{sbpara}
On this toroidal partial compactification $\Gamma\operatorname{\backslash} D(G, h_0, \cG, b)_{\Sigma}$, $\cH_{\text{univ}}({\rm {Lie}}\,(\cG))_{\cO}/F^0$ is the log tangent bundle (this is a generalization of Proposition \ref{p:tangent}).
\end{sbpara}
\setcounter{section}{0}
\renewcommand{\thesection}{\Alph{section}}
\section{Appendix}
Here we give a complement to \cite{KNU2} Part III.
In the proof of (2) $\Rightarrow$ (2)${}''$ in \cite{KNU2} Part III Lemma 2.2.4, it is stated that \lq\lq $({\sigma}_0,F)$ generates a nilpotent orbit because both $(\tau,F)$ and $({\sigma}, F)$ generate nilpotent orbits.''
It turns to be valid, though not trivial, and follows from the following proposition.
\begin{prop}
Let $\Lambda=(H_0,W,(\langle\cdot,\cdot\rangle_w)_w, (h^{p,q})_{p,q})$ be as in {\rm \cite{KNU2} Part III 2.1.1}.
Let ${\sigma}$ be a nilpotent cone,
let ${\sigma}_0$ be its face, let $N$ be an interior of ${\sigma}_0$, and let $F \in \check D$.
Assume that both $({\sigma}, F)$ and $(N,F)$ generate nilpotent orbits.
Then $({\sigma}_0,F)$ also generates a nilpotent orbit.
\end{prop}
First, the admissibility and the Griffiths transversality for $({\sigma}_0,F)$ follow from those for $({\sigma},F)$.
Thus the problem is reduced to the following proposition by forgetting ${\sigma}$.
(Notation is changed.)
\begin{prop}
\label{p:defno}
Let ${\sigma}$ be an admissible nilpotent cone, let $N_0$ be an interior of ${\sigma}$, and let $F \in \check D$
such that $F$ satisfies the Griffiths transversality with respect to ${\sigma}$.
Assume that $(N_0,F)$ generates a nilpotent orbit.
Then $({\sigma}, F)$ also generates a nilpotent orbit.
\end{prop}
\begin{sbrem}
The proof below shows that the assumption of admissibility is weakened to that the
weight filtration with respect to an interior is constant.
(Cf.\ the first and the second lines of \cite{CKS} p.505.)
\end{sbrem}
We prove Proposition \ref{p:defno}.
Let $N_1,\ldots,N_n$ generate ${\sigma}$.
Then the conclusion is equivalent to that $\exp(\sum i y_j N_j)F \in D$ for any $y_j \gg 0$.
Since this condition can be checked on each $\gr^W_w$, we can reduce to the pure case.
In the rest of this proof, we assume that we are in the situation of pure weight $k$.
Let $M$ be the weight filtration of one (and hence for any) interior of ${\sigma}$.
By Remark in Part III 1.3.2 (which is seen by \cite{CKS} (4.66)),
the conclusion of Proposition \ref{p:defno} is equivalent to that $(H_0, \langle\cdot,\cdot\rangle_0,M[-k],F)$ is a
mixed Hodge structure polarized in the sense of \cite{CKS} (2.26) by any interior $N$ of ${\sigma}$.
By the assumption that $(N_0,F)$ generates a nilpotent orbit, $(H_0,M[-k],F)$ is at least a mixed Hodge structure.
Hence for an interior $N$, the condition for $N$ is equivalent to that for any $l \ge0$,
the primitive part $P_{k+l}:=\Ker(N^{l+1}\colon \gr^M_{k+l} \to \gr^M_{k-l-2})$ for $N$ is a Hodge structure polarized by
$S_N:=\langle \cdot,N^l\cdot\rangle_0$.
Note here that by the assumption, each $\gr^M_w$ is already a Hodge structure,
and by
Griffiths transversality, any interior $N$ is a homomorphism of Hodge structures so that
the primitive part $P_{k+l}$ for any $N$ is a Hodge structure (of weight $k+l$) whose Hodge numbers are independent of $N$
(determined by those for $\gr^M$).
Consider the Hodge decomposition of the Hodge structure on $P_{k+l}$ for $N$ and denote its $(p,q)$-component by $P_N^{p,q}$.
Since the dimension of $P_N^{p,q}$ is constant with respect to $N$ (as noted in the above)
and the pair of the subspace $P_N^{p,q}$ of $(\gr^M_{k+l})_{{\mathbb{C}}}$ and
the induced %
Hermitian form $S_N^{p,q}$ by $S_N(\cdot,\overline \cdot)$ on $P_N^{p,q}$ varies continuously with respect to $N$,
if we prove that $S_N^{p,q}$ is always nondegenerate, the positivity for one $N$ inherits to all $N$.
We prove the nondegeneracy.
Assume that $S_N^{p,q}$ degenerates for some $N, p, q$.
Then there is a nonzero vector $v \in P_N^{p,q}$ such that $S_N(\cdot,\overline v)$ is zero on $P_N^{p,q}$.
Since the Hodge components are orthogonal with respect to $S_N(\cdot,\overline \cdot)$,
$S_N(\cdot,\overline v)$ is zero on the whole $P_{k+l}$ for this $N$.
Further, consider the decomposition of $\gr^M_{k+l}$ into the images of primitive parts of weights $\ge k+l$.
Then this decomposition is orthogonal with respect to
$S_N=\langle\cdot,N^l\cdot\rangle_0$ (\cite{Sc} Lemma (6.4)).
Hence
$\langle\cdot,N^l\overline v\rangle_0$
is zero on $\gr^M_{k+l,{\mathbb{C}}}$.
Since $M_{k+l}$ is the orthogonal complement to $M_{k-l-1}$ (the same lemma of ibid.),
$N^l\overline v = 0$ in $\gr^M_{k-l,{\mathbb{C}}}$ and $v=0$ in $\gr^M_{k+l,{\mathbb{C}}}$, a contradiction.
\section*{Correction to \cite{KNU2} Part IV}
There are some typos in the proof of Theorem 6.1.1 in \cite{KNU2} Part IV.
Here we give corrections to them.
In the line 3 of the proof of loc.\ cit., $D_{\Sigma,[\val]}\to D_{\Sigma,[:]}\to\Gamma\operatorname{\backslash} D_\Sigma$ should be changed to $D_{\Sigma,[\val]}^\sharp\to D_{\Sigma,[:]}^\sharp\to D_\Sigma^\sharp$.
In the lines 4, 5 of the proof of loc.\ cit.,
$D_{\Sigma,[\val]}$, $D_{\Sigma,[:]}$, and $\Gamma\operatorname{\backslash} D_\Sigma$ should be changed to
$D_{\Sigma,[\val]}^{\sharp}$,
$D_{\Sigma,[:]}^\sharp$, and $D_\Sigma^\sharp$, respectively.
There are some typos in the proof of Theorem 6.1.3 in \cite{KNU2} Part IV.
In the line 2, $D^I_{{\rm{SL}}(2)}$ should be $\Gamma \operatorname{\backslash} D^I_{{\rm{SL}}(2)}$.
In the lines 4, 5, $S_{[:]}$ should be $S_{[:]}^{\log}$.
\section*{Correction to \cite{KNU3}}
Here we give a correction to \cite{KNU3} 6.1.2.
The construction there does not necessarily give an MHS on
${\rm {Lie}}\,(\cG_{\Gamma})$.
Change the part
\bigskip
We define
the weight filtration on ${\rm {Lie}}\,(\cG_{\Gamma})$ (resp.\ the Hodge
filtration on ${\rm {Lie}}\,(\cG_{\Gamma})_{\mathbb{C}}$) as the image of that of
${\rm {Lie}}\,(\cG_{\Gamma_r})$ (resp.\ ${\rm {Lie}}\,(\cG_{\Gamma_r})_{\mathbb{C}}$) (2.2.4, 2.3).
This gives a
structure of an MHS on ${\rm {Lie}}\,(\cG_{\Gamma})$ which is independent of the
choice of $r$.
\bigskip
into
\bigskip
Hereafter we assume that ${\rm {Lie}}\,(\cG_{\Gamma})$ has an MHS
which is a quotient of MHS on ${\rm {Lie}}\,(\cG_{\Gamma_r})$
induced from the canonical variation of MHS in 2.2.4.
Note that this MHS on ${\rm {Lie}}\,(\cG_{\Gamma})$ is independent of the choice of $r$.
\section*{List of notation}
\noindent
{\bf Period domains}
$D=D(G,h_0)$ \quad \ref{perd}, \ref{D}
$D_{{{\rm red}}}$ \quad \ref{Dred}
$\Dc$ \quad \ref{Y}
\noindent
{\bf Extended period domains}
$D_{{\rm {BS}}}$ \quad \ref{DBSs}
$D_{{\rm{SL}}(2)}$ \quad \ref{redSL} (case of reductive groups), \ref{DSL} (general case)
Structures of $D_{{\rm{SL}}(2)}$: $D^I_{{\rm{SL}}(2)}$ \quad \ref{str3}, \quad $D^{II}_{{\rm{SL}}(2)}$ \quad \ref{str2}
$D^{\star}_{{\rm{SL}}(2)}$ \quad \ref{DSL}
$D^{\star,{\rm {W}}}_{{\rm{SL}}(2)}$ \quad \ref{lgmdW}
$D^{\star,+}_{{\rm{SL}}(2)}$ \quad \ref{lgmd+}
$D_{{\rm {BS}}, \val}$, $D^{\star}_{{\rm{SL}}(2), \val}$, $D^I_{{\rm{SL}}(2),\val}$, $D^{II}_{{\rm{SL}}(2), \val}$ \quad \ref{val2}
$D_{\Sigma}$, $D^{\sharp}_{\Sigma}$ \quad \ref{DSigdef}
$D_{\Sigma,[:]}$, $D^{\sharp}_{\Sigma,[:]}$ \quad \ref{rat3}
$D_{\Sigma,\val}$, $D^{\sharp}_{\Sigma, \val}$ \quad \ref{Dval}
$D^{\sharp}_{\Sigma, [\val]}$ \quad \ref{sig[val]}
$D^{\diamond}_{{\rm{SL}}(2)}$ \quad \ref{diadef}
\noindent
{\bf Categories}
${\cal {B}}'_{\mathbb{R}}(\log)$ \quad\ref{BR1}
${\cal {B}}(\log)$ \quad \ref{logmfd}
\medskip
|
\subsection*{Introduction.}
In \cite{Vieh-Rap}, Rapoport and Viehmann propose that there should be a theory of $p$-adic local Shimura varieties. They conjectured the existence of towers of rigid-analytic spaces whose cohomology groups “understand” the local Langlands correspondence for general $p$-adic reductive groups. In this way, these towers of rigid-analytic varieties would “interact” with the local Langlands correspondence in a similar fashion to how Shimura varieties “interact” with the global Langlands correspondence. Moreover, they conjectured many properties and compatibilities that these towers should satisfy.
In the last decade, the theory of local Shimura varieties went through a drastic transformation with Scholze's introduction of perfectoid spaces and the theory of diamonds. In \cite{Ber2}, Scholze and Weinstein construct the sought for towers of rigid analytic spaces and generalized them to what are now known as moduli spaces of $p$-adic shtukas. Moreover, since then, many of the expected properties and compatibilities for local Shimura varieties have been verified and generalized to moduli spaces of $p$-adic shtukas. The study of the geometry and cohomology of local Shimura varieties and moduli spaces of $p$-adic shtukas is still a very active area of research due to their connection to the local Langlands correspondence. The main aim of this article is to study the locally profinite space of connected components, and describe explicitly the continuous right action of the group $G({\mathbb{Q}_p})\times J_b({\mathbb{Q}_p})\times W_E$ on this space. In particular, we prove and generalize \cite[Conjecture 4.26]{Vieh-Rap} for the case of unramified groups. \\
Let us recall the formalism of local Shimura varieties and moduli spaces of $p$-adic shtukas. Local $p$-adic shtuka datum over ${\mathbb{Q}_p}$ is a triple $(G,[b],[\mu])$ where $G$ is a reductive group over ${\mathbb{Q}_p}$, $[\mu]$ is a conjugacy class of geometric cocharacters $\mu:\bb{G}_m\to G$ and $[b]$ is an element of Kottwitz set $B(G,[\mu])$. Whenever $[\mu]$ is minuscule we say that $(G,[b],[\mu])$ is local Shimura datum. We let $E/{\mathbb{Q}_p}$ denote the reflex field of $[\mu]$ and $\breve{E}=E\cdot \breve{\bb{Q}}_p$. Associated to $(G,[b],[\mu])$ there is a tower of diamonds over $\mrm{Spd}(\breve{E},O_{\breve{E}})$, denoted $({\rm{Sht}}_{G,[b],[\mu],{\cali{K}}})_{\cali{K}}$, where ${\cali{K}}\subseteq G({\mathbb{Q}_p})$ ranges over compact subgroup of $G({\mathbb{Q}_p})$. Moreover, whenever $[\mu]$ is minuscule and ${\cali{K}}$ is a compact open subgroup, then $({\rm{Sht}}_{G,[b],[\mu],{\cali{K}}})_{\cali{K}}$ is represented by the diamond associated to a unique smooth rigid-analytic space $\bb{M}_{\cali{K}}$ over $\breve{E}$. The tower $(\bb{M}_{\cali{K}})_{\cali{K}}$ is the local Shimura variety.
Associated to $[b]\in B(G,\mu)$ there is a reductive group $J_b$ over ${\mathbb{Q}_p}$. After basechange to a completed algebraic closure, each individual space $({\rm{Sht}}_{G,[b],[\mu],{\cali{K}}}\times \bb{C}_p)_{\cali{K}}$ comes equipped with continuous and commuting right actions by $J_b({\mathbb{Q}_p})$ and the Weil group $W_E$. Moreover, the tower receives a right action by the group $G({\mathbb{Q}_p})$ by using correspondences. When we let ${\cali{K}}=\{e\}$ we obtain the space at infinite level, denoted ${\rm{Sht}}_{G,[b],[\mu],\infty}\times \bb{C}_p$, which overall comes equipped with a continuous right action by $G({\mathbb{Q}_p})\times J_b({\mathbb{Q}_p})\times W_E$.
Since the actions are continuous the groups $G({\mathbb{Q}_p})\times J_b({\mathbb{Q}_p})\times W_E$ act continuously on $\pi_0({\rm{Sht}}_{G,[b],[\mu],\infty}\times \bb{C}_p)$ and our main theorem describes explicitly this action whenever $G$ is an unramified reductive group over ${\mathbb{Q}_p}$ and $([b],[\mu])$ is HN-irreducible. It is natural to expect that the methods of this paper combined with those of \cite{Hans} and \cite{gaisin} could be used to remove the HN-irreducible condition. We do not pursue this generality.
Before stating our main theorem we set some notation. Let $(G,[b],[\mu])$ be local $p$-adic shtuka datum with $G$ an unramified reductive group over ${\mathbb{Q}_p}$. Let $G^{\mrm{der}}$ denote the derived subgroup of $G$ and $G^{\mrm{sc}}$ denote the simply connected cover of $G^{\mrm{der}}$, let $N$ denote the image of $G^{\mrm{sc}}({\mathbb{Q}_p})$ in $G({\mathbb{Q}_p})$ and let $G^\circ=G({\mathbb{Q}_p})/N$. This is a locally profinite topological group and it is the maximal abelian quotient of $G({\mathbb{Q}_p})$ when this later is considered as an abstract group.
Let $E\subseteq \bb{C}_p$ be the field of definition of $[\mu]$, let ${\mrm{Art}}_{E}:W_{E}\to E^\times$ be Artin's reciprocity character from local class field theory. In \S 4 we associate to $[\mu]$ a continuous map of topological groups ${\mrm{Nm}}_{[\mu]}^\circ:E^\times \to G^\circ$ and we associate to $[b]$ a map $\mrm{det}^\circ:J_b({\mathbb{Q}_p})\to G^\circ$.
The general construction of ${\mrm{Nm}}_{[\mu]}^\circ$ and $\mrm{det}^\circ$ uses z-extensions and we do not review it in this introduction. Nevertheless, whenever $G^{\mrm{sc}}=G^{\mrm{der}}$ we can construct them as follows. In this case, $G^\circ=G^{\mrm{ab}}({\mathbb{Q}_p})$ with $G^{\mrm{ab}}$ is the co-center of $G$. If we let $\mrm{det}:G\to G^{\mrm{ab}}$ be the quotient map we can consider the induced data $\mu^{\mrm{ab}}=\mrm{det}\circ [\mu]$ and $[b^{\mrm{ab}}]=[\mrm{det}(b)]$. Then ${\mrm{Nm}}^\circ_{[\mu]}$ can be defined as:
$$E^\times\xrightarrow{\mu^{\mrm{ab}}} G^{\mrm{ab}}(E)\xrightarrow{{\mrm{Nm}}^{G^{\mrm{ab}}}_{E/{\mathbb{Q}_p}}} G^{\mrm{ab}}({\mathbb{Q}_p})=G^\circ.$$
Here for a torus $T$ over ${\mathbb{Q}_p}$, like $G^{\mrm{ab}}$, we are letting ${\mrm{Nm}}^{T}_{E/{\mathbb{Q}_p}}:T^{\mrm{ab}}(E)\to T^{\mrm{ab}}({\mathbb{Q}_p})$ denote the usual norm map $$t\mapsto \prod_{\gamma\in {\mrm{Gal}}(E/\bb{Q}_p)}\gamma(t).$$
On the other hand, $\mrm{det}^\circ: J_b({\mathbb{Q}_p})\to G^{\mrm{ab}}({\mathbb{Q}_p})$ is $\mrm{det}=j_{b^{\mrm{ab}}}\circ \mrm{det}_b$ where $\mrm{det}_b:J_b({\mathbb{Q}_p})\to J_{b^{\mrm{ab}}}({\mathbb{Q}_p})$ is obtained from functoriality of the formation of $J_b$, and $j_{b^{\mrm{ab}}}:J_{b^{\mrm{ab}}}({\mathbb{Q}_p})\xrightarrow{\cong} G^{\mrm{ab}}({\mathbb{Q}_p})$ is obtained from regarding $J_{b^{\mrm{ab}}}({\mathbb{Q}_p})$ and $G^{\mrm{ab}}({\mathbb{Q}_p})$ as subgroups of $G^{\mrm{ab}}(K_0)$ and exploiting that $G^{\mrm{ab}}$ is commutative. Our first main theorem is:
\begin{thm2}
\label{thm2:mainTheorem}
Let $(G,[b],[\mu])$ be local shtuka datum with $G$ an unramified reductive group over ${\mathbb{Q}_p}$ and $([b],[\mu])$ HN-irreducible. The following hold:
\begin{enumerate}
\item The right $G({\mathbb{Q}_p})$ action on $\pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \bb{C}_p)$ is trivial on $N=\mrm{Im}(G^{\mrm{sc}}({\mathbb{Q}_p}))$ and the induced $G^{\circ}$-action is simply-transitive.
\item If $s\in \pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \bb{C}_p)$ and $j\in J_b({\mathbb{Q}_p})$ then $$s\cdot_{_{J_b({\mathbb{Q}_p})}} j=s\cdot_{_{G^\circ}} \mrm{det}^\circ(j^{-1}))$$
\item If $s\in \pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \bb{C}_p)$ and $\gamma \in W_{{E}}$ then $$s\cdot_{_{W_{E}}} \gamma =s\cdot_{_{G^\circ}} [{\mrm{Nm}}^\circ_{[\mu]}\circ {\mrm{Art}}_{{E}}(\gamma)].$$
\end{enumerate}
\end{thm2}
Let us comment on previous results in the literature. Before a full theory of local Shimura varieties was available the main examples of local Shimura varieties one could work with were the ones obtained as the generic fiber of a Rapoport--Zink space (\cite{RZ}). The most celebrated examples of Rapoport--Zink spaces are of course the Lubin--Tate tower and the tower of covers of Drinfeld's upper half space. In \cite{deJong} de Jong, as an application of his theory of fundamental groups, computes the connected components of the Lubin--Tate tower for $\mrm{GL}_n({\mathbb{Q}_p})$. In \cite{Strauch}, Strauch computes by a different method the connected components of the Lubin--Tate tower for $\mrm{GL}_n(F)$ and an arbitrary finite extension $F$ of ${\mathbb{Q}_p}$ (including ramification).
In \cite{ChenDet}, M. Chen constructs $0$-dimensional local Shimura varieties and studies their geometry. In a later paper \cite{Chen}, she constructs her “determinant” map and uses these $0$-dimensional local Shimura varieties to describe connected components of Rapoport--Zink spaces of EL and PEL type associated to more general unramified reductive groups. Our result goes beyond the previous ones in that the only condition imposed on $G$ is unramifiedness. In this way, our result is the first to cover very general families of local Shimura varieties that can not be constructed from a Rapoport--Zink space. In particular, our result is new for local Shimura varieties associated to reductive groups of exceptional types.
The central strategy of Chen's result builds on and heavily generalizes the central strategy used by de Jong. Two key inputs of Chen's work to the strategy are the use of her “generic” crystalline representations and her collaboration with Kisin and Viehmann on computing the connected components of affine Deligne--Lusztig varieties \cite{CKV}. Our strategy takes these two inputs as given.
We build on the central strategy employed by de Jong and Chen, but the versatility of Scholze's theory of diamonds and the functorial construction of local Shimura varieties allow us to make simplifications and streamline the proof. Since our arguments take place in Scholze's category of diamonds rather than the category of rigid analytic spaces, our argument works even for moduli spaces of $p$-adic shtukas that are not a local Shimura variety. In these (non-representable) cases, the result is new even for $G=\mrm{GL}_n$.
Our new main contribution to the central strategy is the use of specialization maps. To use these specialization maps in a rigorous way, we developed a formalism whose details were worked out in the separate paper \cite{Specializ}. \\
Let us sketch the central strategy to prove \Cref{thm2:mainTheorem}. Once one knows that $\pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \bb{C}_p)$ is a right $G^\circ$-torsor, computing the actions by $W_E$ and $J_b({\mathbb{Q}_p})$ in terms of the $G^\circ$ action can be reduced to the tori case using functoriality, z-extensions and the determinant map. These uses mainly group theoretic methods and down to earth diagram chases. In the tori case, the $J_b({\mathbb{Q}_p})$ action is easy to compute and the $W_E$ action can be bootstrapped to an easier case as follows. For tori $T$, by the work of Kottwitz, we know that the set $B(T,\mu)$ has a unique element so that the data of $b$ is redundant. We can consider the category of pairs $(T,\mu)$ where $T$ is a torus over ${\mathbb{Q}_p}$ and $\mu$ is a geometric cocharacter whose field of definition is $E$. The construction of moduli spaces of shtukas is functorial with respect to this category. Moreover, this category has an initial object given by $(\mrm{Res}_{E/{\mathbb{Q}_p}}(\bb{G}_m),\mu_u)$ where $$\mu_u:\bb{G}_m\to \mrm{Res}_{E/{\mathbb{Q}_p}}(\bb{G}_m)_E$$ is the unique map of tori that on $E$-points is given by the formula $$f\mapsto f\otimes_{\mathbb{Q}_p} f.$$ After more diagram chasing one can again reduce the tori case to this “universal” case. Finally, this case can be done explicitly using the theory of Lubin--Tate groups and their relation to local class field theory. As we have mentioned, the tori case was already handled by M. Chen in \cite{ChenDet}, but for the convenience of the readers we recall part of the story in a different language. \\
Let us sketch how to prove that $\pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \bb{C}_p)$ is a $G^\circ$ torsor in the simplest case. For this, let $G$ be semisimple and simply connected. Our theorem then says that ${\rm{Sht}}_{G,b,[\mu],\infty}\times \bb{C}_p$ is connected.
The first step is to prove that $G({\mathbb{Q}_p})$ acts transitively on $\pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \bb{C}_p)$. Using the Grothendieck--Messing period map one realizes that this is equivalent to proving that the $b$-admissible locus of Scholze's $B_\mrm{dR}$-Grassmannian is connected. This fact is a result of Hansen and Weinstein to which we give an alternative proof.
For the next step, let $x\in \pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \bb{C}_p)$ and let $G_x\subseteq G({\mathbb{Q}_p})$ denote the stabilizer of $x$. Let ${\cali{K}}\subseteq G({\mathbb{Q}_p})$ be a hyperspecial subgroup of $G$. We claim that it is enough to prove that $G_x$ is open and that $G({\mathbb{Q}_p})={\cali{K}}\cdot G_x$. Indeed, ${\cali{K}}$ surjects onto $G({\mathbb{Q}_p})/G_x$ so that this space is discrete and compact therefore finite. By a theorem of Margulis \cite{Marg}, since we assumed $G$ to be simply connected, the only open subgroup of finite index is the whole group so that $G_x=G({\mathbb{Q}_p})$.
The proof that $G_x$ is open relies heavily on M. Chen's main result of \cite{Chen} on “generic” crystalline representations. To be able to apply her result in our context one uses that for suitable $p$-adic fields $K$, every crystalline representation is realized as a $\mrm{Spd}(K,O_K)$-valued point in Scholze's $B_\mrm{dR}$-Grassmannian. For the convenience of the reader, we include a discussion on how to think of crystalline representations as $\mrm{Spd}(K,O_K)$-valued points.
Finally, proving that $G({\mathbb{Q}_p})={\cali{K}}\cdot G_x$ is equivalent to proving that ${\rm{Sht}}_{G,b,[\mu],{\cali{K}}}\times \bb{C}_p$, the ${\cali{K}}$-level moduli space of shtukas, is connected. This is where our theory of specialization maps gets used, which leads to our second main theorem. Suppose $G$ general reductive group over ${\mathbb{Q}_p}$ (no longer assumed to be unramified) and assume that ${\cali{K}}\subseteq G({\mathbb{Q}_p})$ can be realized as the ${\mathbb{Z}_p}$-points of a parahoric group scheme $\mathscr{G}$ over ${\mathbb{Z}_p}$. In this circumstance, Scholze and Weinstein, construct a v-sheaf $\Shtm{O_{\breve{E}}}$ defined over $\mrm{Spd}(O_{\breve{E}})$ and whose generic fiber is ${\rm{Sht}}_{G,[b],[\mu],{\cali{K}}}$ (\cite[\S 25]{Ber2}).
\begin{thm2}
\label{intro:thm2}
Let $(G,[b],[\mu])$ be local shtuka datum (not necessarily HN-irreducible), let $\mathscr{G}$ be a parahoric model of $G$ and let ${\cali{K}}=\mathscr{G}({\mathbb{Z}_p})$.
\begin{enumerate}[a)]
\item With terminology as in \cite[Definition 4.52, Definition 3.12]{Specializ}, $(\Shtm{O_{\breve{E}}},{\rm{Sht}}_{G,b,[\mu],{\cali{K}}})$ is a rich smelted kimberlite and the reduced special fiber $(\Shtm{O_{\breve{E}}})^\mrm{red}$ is equal to ${X_\g^{\leq\mu}(b)}$, the affine Deligne--Lusztig variety associated to $(\mathscr{G}, [b],\mu)$.\footnote{We expect these v-sheaves to be rich kimberlites, but we have not proved this yet.}
\item There is a continuous, surjective and $J_b({\mathbb{Q}_p})$-equivariant specialization map $$\mrm{Sp}:|{\rm{Sht}}_{G,b,[\mu],{\cali{K}}}\times \bb{C}_p|\to |{X_\g^{\leq\mu}(b)}|.\footnote{The map is also a spectral map of locally spectral spaces, specializing and a quotient map.}$$
\item When $\mathscr{G}$ is hyperspecial, $(\Shtm{O_{\breve{E}}},{\rm{Sht}}_{G,b,[\mu],{\cali{K}}})$ is topologically normal and the specialization map induces a bijection of connected components
$$\pi_0(\mrm{Sp}):\pi_0({\rm{Sht}}_{G,b,[\mu],{\cali{K}}} \times \bb{C}_p)\xrightarrow{\cong} \pi_0({X_\g^{\leq\mu}(b)}).$$
\end{enumerate}
\end{thm2}
Fortunately for us, the study of connected components of affine Deligne--Lusztig varieties has enough literature \cite{CKV}, \cite{Nie} \cite{Hu-Zhou}. In the HN-irreducible case, and $G$ unramified, they can be identified with certain subsets of $\pi_1(G)$. If we go back to the assumptions of \Cref{thm2:mainTheorem} and assume again that $G$ is semi-simple and simply connected, we get $\pi_1(G)=\{e\}$, which finishes the (sketch of) the proof of \Cref{thm2:mainTheorem} for this case. The central strategy used for general unramified groups $G$ is not very different in spirit and only requires more patience. \\
The proof of \Cref{intro:thm2} uses the machinery from integral $p$-adic Hodge theory as discussed in \cite{Ber2}, the formalism developed in \cite{Specializ}, and for general parahoric our recent collaboration \cite{AGLR22}. The key inputs to prove that $\Shtm{O_{\breve{E}}}$ has a specialization map are Kedlaya's work \cite{KedAinf} and Ansch\"utz' work \cite[Theorem 1.1]{Ans2} on extending vector bundles and $\mathscr{G}$-torsors over the punctured spectrum of $A_\mrm{inf}$. Recall that $\Shtm{O_{\breve{E}}}$ parametrizes triples $({\cali{T}},\Phi,\rho)$ where $({\cali{T}},\Phi)$ is a shtuka with $\mathscr{G}$ structure and $\rho:{\cali{T}}\to \mathscr{G}_b$ is $\varphi$-equivariant trivialization over $\cali{Y}_{[r,\infty]}$ for large enough $r$. A key observation is that $(\Shtm{O_{\breve{E}}})^{\mrm{red}}$ is roughly speaking the locus in which $\rho$ is meromorphic. With this in mind we prove $(\Shtm{O_{\breve{E}}})^\mrm{red}={X_\g^{\leq\mu}(b)}$. The finiteness properties (being rich), are known facts coming from the Grothendieck--Messing period morphism and general results on affine Deligne--Lusztig varieties. Finally, to prove surjectivity of the specialization map and relate the connected components of the generic fiber with the connected components of the reduced special fiber, one is led to study the tubular neighborhoods of $(\Shtm{O_{\breve{E}}},{\rm{Sht}}_{G,b,[\mu],{\cali{K}}})$ (as in \cite[Definition 4.18, Definition 4.38]{Specializ}). To do this, we construct a ``local model diagram'' for tubular neighborhoods. We clarify below. \\
Before stating our last main theorem we setup some terminology and formulate a conjectural statement that is philosophically aligned with Grothendieck--Messing theory. Let $\Grm{O_{E}}$ denote the local model studied in \cite{AGLR22} and let ${\cali{A}_{\g,\mu}}=(\Grm{O_{E}})^\mrm{red}$ denote its reduced special fiber. This is the $\mu$-admissible locus in the Witt vector affine flag variety. We let $F\supseteq \breve{E}$ be a nonarchimedean field extension with ring of integers $O_F$ and algebraically closed residue field $k_F$.
\begin{conj}
\label{intro:conjecturetubular}
For every closed point $x\in |({X_{\g}^{\leq\mu}(b)})_{{k_F}}|$ there exist a closed point $y\in |({\cali{A}_{\g,\mu}})_{k_{F}}|$ such that the formal neighborhoods $\Tf{\Shtm{O_F}}{x}$ and $\Tf{\Grm{O_F}}{y}$ are isomorphic v-sheaves.
\end{conj}
The weaker version that we are able to prove at the moment is as follows.
\begin{thm2}
\label{intro:comparisontubular}
With the notation as in \Cref{intro:conjecturetubular} there is a connected v-sheaf in groups $\widehat{L^+_WG}$ such that for every $x$ there exists $y$ and a diagram
\begin{center}
\begin{tikzcd}
& X \arrow{rd}{f} \arrow{dl}{g} & \\
\Tf{\Shtm{O_F}}{x} & & \Tf{\Grm{O_F}}{y}
\end{tikzcd}
\end{center}
where $f$ and $g$ are both $\widehat{L^+_WG}$-bundles. In particular, $\Tf{\Shtm{O_F}}{x}$ is non-empty and $\pi_0(\Tf{\Shtm{O_F}}{x}\times F)=\pi_0(\Tf{\Grm{O_F}}{y}\times F)$.
\end{thm2}
Let us mention that this version of the local model diagram, although not completely satisfactory, has already found some applications in the recent representability results of Pappas and Rapoport \cite{pappas2021padic}. \\
Finally, to establish the identity $\pi_0({\rm{Sht}}_{G,b,[\mu],{\cali{K}}} \times \bb{C}_p)\cong \pi_0({X_\g^{\leq\mu}(b)})$ one is reduced to proving that all the tubular neighborhoods of the local model $\Grm{O_{\mathbb{C}_p}}$ have connected generic fiber. As was observed in \cite{AGLR22}, the condition that these tubular neighborhoods are generically connected is a ``kimberlite analogue" of normality. When $\mathscr{G}$ is hyperspecial, we prove this normality in \cite{Specializ} using a Demazure resolution. Unfortunately, this part of the argument doesn't generalize directly for general parahoric groups $\mathscr{G}$, and the proof of normality will require more sophisticated tools. \\
Let us comment on the organization of this paper. The goal of the first chapter is to prove \Cref{thm2:mainTheorem} using mainly generic fiber methods and taking as a black box some ``integral method inputs", which we justify in the second chapter. In the first two sections, we recall the relation between crystalline representations, Scholze's theory of diamonds, Chen's ``generic" cyrstalline representations, and other geometric constructions that appear in modern rational $p$-adic Hodge theory. This part of the paper is purely expository, but it is important for the rest of the argument to have these relations in mind.
In the third section we discuss local Shimura varieties associated to tori and we review M. Chen's results on this objects.
In section four, the details of the proof of \Cref{thm2:mainTheorem} are provided. \\
The goal of the second chapter is to prove \Cref{intro:thm2} and \Cref{intro:comparisontubular}. In the first section we collect some facts from integral $p$-adic Hodge theory required for our argument to go through. In the second section, we recall the kimberlite structure of the local model. In the third section, we establish the main properties we need to construct a specialization map for moduli spaces of shtukas. In the final section, we prove \Cref{intro:comparisontubular} and finish the proof of \Cref{intro:thm2}.
\subsection*{Acknowledgements.}
We thank the author's PhD advisor, Sug Woo Shin, for his interest, his insightful questions and suggestions at every stage of the project, and for his generous constant encouragement and support during the PhD program. Laurent Fargues, David Hansen, Peter Scholze and Jared Weinstein for answering questions the author had on $p$-adic Hodge theory and the theory of diamonds. Georgios Pappas and Michael Rapoport for bringing to our attention a serious flaw on an attempt we had to prove \Cref{intro:conjecturetubular}.
The author would also like to thank Jo\~ao Louren\c{c}o, Alexander Bertoloni, Rahul Dalal, Gabriel Dorfsman-Hopkins, Zixin Jiang, Dong Gyu Lim, Sander Mack-Crane, Gal Porat, Koji Shimizu for various degrees of help during the preparation of the manuscript. \\
This work was supported by the Doctoral Fellowship from the “University of California Institute for Mexico and the United States” (UC MEXUS) by the “Consejo Nacional de Ciencia y Tecnolog\'ia” (CONACyT), and by Peter Scholze's Leibniz price.
\subsection*{Notation.}
When $R$ is a characteristic $p$ ring we let $W(R)$ denote the ring of $p$-typical Witt vectors of $R$ and we denote by $\varphi:W(R)\to W(R)$ the canonical lift of arithmetic Frobenius.
For a Huber pair $(R,R^+)$ we use the abbreviations $\mrm{Spd}(R)$ and $\mrm{Spa}(R)$ when the entry $R^+$ is understood from the context.
Whenever $f:R\to R'$ is a ring homomorphism (respectively morphism of Huber pairs), we let $f^{\mrm{op}}:\mrm{Spec}(R')\to \mrm{Spec}(R)$ (respectively $f^{\mrm{op}}:\Spf{R'}\to \Spf{R}$ or $f^{\mrm{op}}:\Spdf{R'}\to\Spdf{R}$) the morphism of spaces induced by $f$. \\
We let $k$ be an algebraically closed field in characteristic $p$.
We let $K_0=W(k)[\frac{1}{p}]$. We fix an algebraic closure $\ov{{K}}_0$ of ${K}_0$, and we let ${C}_p$ denote the $p$-adic completion of $\ov{{K}}_0$. We use $K$ to denote subfields of ${C}_p$ of finite degree over $K_0$. We let $\Gamma_K$ denote the continuous automorphisms of ${C}_p$ that fix $K$. If $\ov{K}_0$ is the algebraic closure of $K_0$ in ${C}_p$ then $\Gamma_K$ is canonically isomorphic to ${\mrm{Gal}}(\ov{K}_0/K)$, since $\ov{K}_0$ is dense in ${C}_p$.
We denote by $\Gamma_K^{\mrm{op}}$ the opposite group of $\Gamma_K$ which we identify with the group of automorphisms of $\mrm{Spec}({C}_p)$ over $\mrm{Spec}(K_0)$.
We let $W_{{K}_0}$ denote the subset of continuous automorphisms of $\mrm{Aut}({C}_p)$ that stabilize ${K}_0$ and act as an integral power of $\varphi$ on ${K}_0$. We topologize $W_{{K}_0}$ so that $\Gamma_{{K}_0}$ is an open subgroup. Suppose $E\subseteq {C}_p$ is a field of finite degree over ${\mathbb{Q}_p}$, and let $\bb{Q}_{p^s}$ be the maximal unramified extension of ${\mathbb{Q}_p}$ contained in $E$. The extension $E/\bb{Q}_{p^s}$ is totally ramified and $E\otimes_{\bb{Q}_{p^s}}{K}_{0}$ is canonically isomorphic to the compositum ${E_0}:=E\cdot {K}_0$ inside of ${C}_p$.
We define an automorphism $\hat{\varphi}\in \mrm{Aut}({E_0})$ as the automorphism that maps to $\mrm{Id}\otimes \varphi$ under this identification. We let $W^{K_0}_E$ denote the continuous automorphisms of ${C}_p$ that stabilize ${E_0}$ and act on ${E_0}$ as $\hat{\varphi}^{s\cdot n}$ for some $n\in \bb{Z}$. Notice that $W^{K_0}_E$ fixes $E$. The case of interest is when $k=\ov{\bb{F}}_p$ but some of arguments require us to pass to larger fields. When $k=\ov{\bb{F}}_p$ then $K_0=\breve{\bb{Q}}_p$, ${C}_p=\bb{C}_p$, $E_0=\breve{E}$ and $W^{K_0}_E=W_E$. \\
Through out the text, $G$ will denote a connected reductive group over ${\mathbb{Q}_p}$. In certain subsections we will add the additional assumptions that $G$ is quasi-split or even stronger that it is unramified over ${\mathbb{Q}_p}$. We will point out when one of these two assumptions are taken. Whenever $G$ is quasi-split we will denote by $A$ a maximally split sub-torus of $G$ defined over ${\mathbb{Q}_p}$, $T$ will denote the centralizer of $A$ which is also a torus and $B$ will denote a ${\mathbb{Q}_p}$-rational Borel containing $T$. We will denote by $\mathscr{G}$ a parahoric model of $G$ over ${\mathbb{Z}_p}$. Sometimes we will assume $\mathscr{G}$ is hyperspecial in which case we will abuse notation and declare $G=\mathscr{G}$.\\
We will often work in the situation in which we are given an element $b\in G(K_0)$ and/or a cocharacter $\mu:\bb{G}_m\to G_K$. In these circumstances $[b]$ always denotes the $\varphi$-conjugacy class of $b$ in $G({K}_0)$ and $[\mu]$ denotes the unique geometric conjugacy class of cocharacters $[\mu]\in \mrm{Hom}(\bb{G}_m,G_{{\ov{\bb{Q}}_p}})$ that is conjugate to $\mu$ through the action of $G_{{C}_p}$. Moreover, we let $E/{\mathbb{Q}_p}$ denote the field extension contained in ${C}_p$ over which $[\mu]$ is defined. We let $E_0$ denote the compositum of $E$ and $K_0$ in ${C}_p$.
\section{Geometric connected components.}
\subsection{The geometric perspective on crystalline representations.}
\subsubsection{Vector bundles, isocrystals and crystalline representations.}
Let $K_0$, $K$ and ${C}_p$ be as above. With this setup, in \cite{FF}, Fargues and Fontaine construct a ${\mathbb{Q}_p}$-scheme ${{\rm{X}}_{FF,\C}}$, known as “the Fargues--Fontaine curve”.
Denote by $\Phi{\text{-}\rm{Mod}}_{K_0}$ the category of isocrystals over $K_0$,
this is a $\bb{Q}_p$-linear Tannakian category. Fargues and Fontaine associate to $(D,\Phi)\in \Phi{\text{-}\rm{Mod}}_{K_0}$ a vector bundle ${\cali{E}}(D,\Phi)$ that comes equipped with a $\Gamma^{\mrm{op}}_{K_0}$-action that is compatible with the action on ${{\rm{X}}_{FF,\C}}$ (\cite[D\'efinition 10.2.1, D\'efinition 9.1.1]{FF}).
The Beauville--Laszlo theorem (\cite[Lemma 5.2.9]{Ber2}), provides us with an equivalence from the category of vector bundles over ${{\rm{X}}_{FF,\C}}$ to the category of triples $(M_e,M^+_\mrm{dR},u)$ where $M_e$ is a free module over $B_e$, $M^+_\mrm{dR}$ is a free module over $B_\mrm{dR}^+$ and $u:M_e\otimes_{B_e} B_\mrm{dR}\to M^+_\mrm{dR}\otimes_{B^+_\mrm{dR}} B_\mrm{dR}$ is an isomorphism. This is Berger's category of $B$-pairs. From this equivalence we get a recipe to construct vector bundles by replacing (or modifying) $M^+_\mrm{dR}$ by some other $B_\mrm{dR}^+$-lattice $\Lambda$ contained in $M_\mrm{dR}:=M^+_\mrm{dR}\otimes_{B^+_\mrm{dR}} B_\mrm{dR}$. If we choose $\Lambda$ to be stable under the action of $\Gamma_K$ on $M_\mrm{dR}$, then the new vector bundle produced in this way will have a $\Gamma^{\mrm{op}}_K$-action compatible with the one on ${{\rm{X}}_{FF,\C}}$. Fortunately, we can understand $\Gamma_K$-stable lattices in a concrete way as we recall below.
Given a finite dimensional $K$ vector space $V$ we can let $\mrm{Fil}^\bullet V$ denote a decreasing filtration of $K$ vector spaces. If $\mrm{Fil}^\bullet V$ satisfies $\mrm{Fil}^i V=V$ for $i\ll 0$ and $\mrm{Fil}^i=0$ for $i\gg 0$, we say that $\mrm{Fil}^\bullet V$ is a bounded filtration. To such a filtration we can associate a $B_\mrm{dR}^+$-lattice in $V\otimes_K B_\mrm{dR}$ denoted $\mrm{Fil}^0(V\otimes_K B_\mrm{dR})$ and given by the formula:
$$\mrm{Fil}^0(V\otimes_K B_\mrm{dR})=\sum_{i+j=0} \mrm{Fil}^i V\otimes_K \mrm{Fil}^j B_\mrm{dR}.$$
\begin{sta}\textup{(\cite[Proposition 10.4.3]{FF})}
\label{sta:equivariantlattices}
Let $V$ be a finite dimensional vector space over $K$. The map that assigns to a bounded filtration $\mrm{Fil}^\bullet V$ the $B^+_\mrm{dR}$-lattice $\mrm{Fil}^0(V\otimes_K B_\mrm{dR})$ in $V\otimes_K B_\mrm{dR}$ gives a bijection between the set of bounded filtrations of $V$ and $\Gamma_K$-stable $B^+_\mrm{dR}$-lattices $\Lambda$ in $V\otimes_K B_\mrm{dR}$. If we let $\xi$ denote a uniformizer of $B_\mrm{dR}^+$ then the inverse map is given by: $$\mrm{Fil}^i_\Lambda(V)=\big((\xi^i\cdot \Lambda\cap V\otimes_K B^+_\mrm{dR})/(\xi^i\cdot \Lambda \cap V\otimes_K \xi\cdot B^+_\mrm{dR})\big)^{\Gamma_K}.$$
\end{sta}
\begin{rem}
\label{rem:changeofsignslatticetofiltration}
The careful reader may notice that the reference constructs $\mrm{Fil}^i_\Lambda(V)$ in a slightly different but equivalent way. We also point out the following. Let $(a_1,\dots a_n)$ denote a decreasing sequence of integers and let $\mu:\bb{G}_m\to \mrm{GL}_n$ the character defined by $\mu(t)\cdot e_i=t^{a_i} e_i$. We let $\mrm{Fil}^\bullet_\mu(K^n)$ denote the decreasing filtration associated $\mu$ with $e_j\in\mrm{Fil}^i_\mu$ if $a_j\geq i$. Then the $B_\mrm{dR}$ lattice associated to $\mrm{Fil}^i_\mu$ is generated as a $B^+_\mrm{dR}$-module by $\xi^{-a_i} e_i$. Notice the change of signs! It will be important to keep track of this later in a computation.
\end{rem}
Denote by $\Phi{\rm{-ModFil}}_{K/K_0}$ the category of filtered $\Phi$-modules that has as objects triples $(D,\Phi,\mrm{Fil}^\bullet D_K)$ where $(D,\Phi)$ is in $\Phi{\text{-}\rm{Mod}}_{K_0}$ and $\mrm{Fil}^\bullet D_K$ is a bounded filtration on $D\otimes_{K_0} K$. To any triple as above Fargues and Fontaine associate a vector bundle ${\cali{E}}(D,\Phi,\mrm{Fil}^\bullet D_K)$ equipped with a $\Gamma^{\mrm{op}}_K$-action compatible with the action on ${{\rm{X}}_{FF,\C}}$.
This induces an exact and fully-faithful functor $$\Phi{\rm{-ModFil}}_{K/K_0}\hookrightarrow \mrm{Vec}^{\Gamma^{\mrm{op}}_K}_{{{\rm{X}}_{FF,\C}}}$$ from the category of filtered isocrystals to the category of $\Gamma^{\mrm{op}}_K$-equivariant vector bundles (\cite[Proposition 10.5.3]{FF}). Any object of $\mrm{Vec}^{\Gamma^{\mrm{op}}_K}_{{{\rm{X}}_{FF,\C}}}$ in the essential image of this functor is called a crystalline vector bundle. Moreover, when the filtered isocrystal $(D,\Phi,\mrm{Fil}^\bullet D_K)$ is “weakly admissible” Fargues and Fontaine prove that ${\cali{E}}(D,\Phi,\mrm{Fil}^\bullet D_K)$ is semi-stable of slope $0$ (\cite[D\'efinition 10.5.2, Proposition 10.5.6]{FF}). This implies that ${\cali{E}}(D,\Phi,\mrm{Fil}^\bullet D_K)$ without the $\Gamma^{\mrm{op}}_K$-action is non-canonically isomorphic to $\cali{O}_X^{d}$ for $d=dim_K(D)$ so that $\mrm{H}^0({{\rm{X}}_{FF,\C}}, {\cali{E}}(D,\Phi,\mrm{Fil}^\bullet D_K))$ is a $d$-dimensional ${\mathbb{Q}_p}$-vector space endowed with a continuous $\Gamma_K$-action. This construction recovers the classical functor of Fontaine $V_{cris}:\Phi{\rm{-ModFil}}_{K/K_0}^{w.a.}\to \mrm{Rep}_{\Gamma_K}({\mathbb{Q}_p})$ that associates to a weakly admissible filtered isocrystals a crystalline representation.
\subsubsection{Families of $B_\mrm{dR}$-lattices.}
One can upgrade geometrically the situation using Scholze's theory of diamonds, since this theory allows us to consider “families” of $B^+_\mrm{dR}$-lattices as a geometric object. Recall that the Fargues-Fontaine curve ${{\rm{X}}_{FF,\C}}$ has a counterpart $\Xff{{C}_p^\flat}$ in the category of adic spaces.
Moreover it also has relative analogues. If $S$ be an affinoid perfectoid space in characteristic $p$, Kedlaya and Liu (\cite[\S 8.7]{Ked}) associate to $S$ an adic space $\Xff{S}$ that they call the relative Fargues-Fontaine curve. This construction is functorial in ${\rm{Perf}}_{\bb{F}_p}$, the category of affinoid perfectoid spaces in characteristic $p$. Moreover, if $(D,\Phi)$ is an isocrystal over $K_0$ and $S$ is an affinoid perfectoid space over $\mrm{Spa}(k,k)$ one can construct a vector bundle ${\cali{E}}_S(D,\Phi)$ over $\Xff{S}$. This construction is also functorial in ${\rm{Perf}}_k$ and recovers ${\cali{E}}(D,\Phi)$ when $S=\Spao{{C}_p^\flat}$.
Now, given a perfectoid space $S\in {\rm{Perf}}_{\mathbb{F}_p}$ the data of a map $S\to \Spdo{{K_0}}$ induces a ``section'' at infinity $\infty:S^\sharp\to \Xff{S}$. This is a closed Cartier divisor as in \cite[Definition 5.3.7]{Ber2} and as such it has a good notion of meromorphic functions. We consider the moduli space of meromorphic modifications of ${\cali{E}}_S(D,\Phi)$ along $\infty$.
\begin{defi}
\label{defi:Grassmannian}
\begin{enumerate}
\item We let $\mrm{Gr}({\cali{E}}(D,\Phi))$ denote the functor from ${\rm{Perf}}_{\Spdo{{K_0}}}\to {\rm{Sets}}$ that assigns:
$$(S^\sharp,f)\mapsto \{((S^\sharp,f),{\cali{V}},\alpha)\}/\cong$$
Where $(S^\sharp,f)$ is an untilt of $S$ over $\Spao{{K_0}}$, ${\cali{V}}$ is a vector bundle over $\Xff{S}$ and $\alpha:{\cali{V}}\dasharrow {\cali{E}}_S(D,\Phi)$ is an isomorphism defined over $\Xff{S}\setminus \infty$ and meromorphic along $\infty$.
\item Let $\mrm{Gr}_{GL_n}$ denote the functor from ${\rm{Perf}}_{{{\mathbb{Q}_p}}}\to {\rm{Sets}}$ that assigns:
$$(S^\sharp,f)\mapsto \{((S^\sharp,f),{\cali{V}},\alpha)\}/\cong$$
Where $(S^\sharp,f)$ is an untilt of $S$ over $\mrm{Spa}({\mathbb{Q}_p})$, ${\cali{V}}$ is a vector bundle over ${\rm{Spec}}(B^+_\mrm{dR}(S^\sharp))$ and $\alpha:{\cali{V}}\dasharrow \mathcal{O}^{\oplus n}$ is an isomorphism defined over ${\rm{Spec}}(B_\mrm{dR}(S^\sharp))$.
\end{enumerate}
\end{defi}
These moduli spaces are ind-representable by proper spatial diamonds over $\Spdo{K_0}$ (and $\mrm{Spd}({\mathbb{Q}_p},{\mathbb{Z}_p})$ respectively) and after fixing a basis of $D$ we get an identification $$\mrm{Gr}_{GL_n}\times_{{\mathbb{Q}_p}}\Spdo{{K_0}}\cong \mrm{Gr}({\cali{E}}(D,\Phi))$$ (\cite[Proposition 2.12]{Hans}). The second space is the $B_\mrm{dR}$-Grassmannian of the Berkeley notes (\cite[Definition 20.2.1]{Ber2}).
We can re-interpret the canonical map $\Spao{{C}_p}\to \Spao{{K_0}}$ that comes from thinking of $K_0$ as a subfield of ${C}_p$ as a map $m:\Spdo{{{C}_p^\flat}}\to \Spdo{{K_0}}$. The basechange $$\mrm{Gr}({\cali{E}}_S(D,\Phi))\times_{\Spdo{{K_0}},m} \Spdo{{{C}_p^\flat}}$$ gets identified through Beauville--Laszlo glueing with the moduli space that parametrizes $B^+_\mrm{dR}$-lattices contained in $D\otimes_{{K_0}}B_\mrm{dR}$. This basechange comes equipped with $\Gamma^{\mrm{op}}_{K_0}$-action and the set of $\Gamma_K$-invariant $B_\mrm{dR}^+$-lattices in $D\otimes_{{K_0}}B_\mrm{dR}$ are in bijection with natural transformations $\Spdo{K}\to \mrm{Gr}({\cali{E}}_S(D,\Phi))$.
One defines $\mrm{Gr}({\cali{E}}(D,\Phi))^\mrm{adm}\subseteq \mrm{Gr}({\cali{E}}(D,\Phi))$ to be the subsheaf of tuples for which ${\cali{V}}$ is fiberwise semi-stable of slope $0$. From Kedlaya-Liu's semi-continuity theorem (\cite[Theorem 22.2.1]{Ber2}) we know that this defines an open subfunctor which is called the admissible locus. Additionally, a map $\Spdo{K}\to \mrm{Gr}({\cali{E}}(D,\Phi))$ factors through $\mrm{Gr}({\cali{E}}(D,\Phi))^\mrm{adm}$ if and only if it is coming from a weakly admissible filtration. An aspect of the situation is that if $n=dim_{K_0}(D)$ then $\mrm{Gr}({\cali{E}}(D,\Phi))^\mrm{adm}$ admits a pro-\'etale $\und{\mrm{GL}_n({\mathbb{Q}_p})}$-local system $\bb{L}$ that “interpolates” between the $n$-dimensional crystalline representations associated to $(D,\Phi)$ (\cite[Proposition 2.14]{Hans}).
The precise claim that we will use is the following.
\begin{sta}
\label{pro:crystalineinGrass}
If $\mrm{Fil}^\bullet D_K$ is a weakly admissible filtration of $(D,\Phi)$ and $$\iota:\Spdo{K}\to \mrm{Gr}({\cali{E}}(D,\Phi))^\mrm{adm}$$ is the map associated to $\mrm{Fil}^\bullet D_K$, then $\iota^*\bb{L}$ is isomorphic to $V_{cris}(D,\Phi,\mrm{Fil}^\bullet)$ when we regard $\iota^*\bb{L}$ as a continuous $\Gamma_K$-representation.
\end{sta}
\begin{proof}
We omit the details.
\end{proof}
\subsubsection{Isocrystals with $G$-structure.}
We keep the notation as above, we let $G$ denote a connected reductive group over ${\mathbb{Q}_p}$ and $\mrm{Rep}_G({\mathbb{Q}_p})$ denote the Tannakian category of ${\mathbb{Q}_p}$-linear algebraic representations of $G$. Recall the following definition:
\begin{defi}\textup{(\cite[\S 3]{Kott})}
An isocrystal with $G$-structure ${\cali{F}}$, is a $\otimes$-exact functor ${\cali{F}}:\mrm{Rep}_G({\mathbb{Q}_p})\to \Phi{\text{-}\rm{Mod}}_{K_0}$.
\end{defi}
To an element $b\in G(K_0)$ and a representation $(V,\rho)\in \mrm{Rep}_G({\mathbb{Q}_p})$ we associate the isocrystal $$(D_{b,\rho},\Phi_{b,\rho}):=(V\otimes K_0,\rho(b)\cdot (\mrm{Id}\otimes \varphi)),$$ ranging this construction over $(V,\rho)$ defines an isocrystal with $G$-structure $${\cali{F}}_b:\mrm{Rep}_G({\mathbb{Q}_p})\to \Phi{\text{-}\rm{Mod}}_{K_0}.$$ We say that two elements $b_1,b_2\in G(K_0)$ are $\varphi$-conjugate to each other if $b_1=g^{-1}\cdot b_2 \cdot \varphi(g)$ for some element $g\in G(K_0)$. This defines an equivalence relation and $b_1$ is $\varphi$-conjugate to $b_2$ if and only if ${\cali{F}}_{b_1}$ is isomorphic to ${\cali{F}}_{b_2}$.
Now, since $k=\ov{k}$ the set of equivalence classes of $\varphi$-conjugacy is the set $B(G)$ defined and studied by Kottwitz (\cite[\S 1.4]{Kott}). Every isocrystal with $G$-structure is isomorphic ${\cali{F}}_b$ for some $b\in G({K}_0)$ and consequently $B(G)$ parametrizes isomorphism classes of isocrystals with $G$-structure.
The set $B(G)$ has a very rich theory, we recall some of it below.
Recall that the category of isocrystals over $K_0$ is semisimple and the simple objects can be parametrized by rational numbers $\lambda\in \bb{Q}$. In particular, every object $(D,\Phi)\in \Phi{\text{-}\rm{Mod}}_{K_0}$ admits a canonical “slope” decomposition $$(D,\Phi)=\bigoplus_{\lambda\in \bb{Q}}(D_\lambda,\Phi_\lambda).$$
If we let $\omega_b$ denote the composition $\mrm{Forg}\circ {\cali{F}}_b$ where $$\mrm{Forg}:\Phi{\text{-}\rm{Mod}}_{K_0}\to \mrm{Vec}(K_0)$$ denotes the forgetful functor to the category of vector spaces over $K_0$, then the slope decomposition defines $\otimes$-exact $\bb{Q}$-grading of $\omega_{b}$. In turn, this grading can be interpreted as a slope morphism $\nu_b:\bb{D}\to G_{K_0}$ of pro-algebraic groups, where $\bb{D}$ is the pro-torus with character set $X^*(\bb{D})=\bb{Q}$.
Consider the abstract group defined as a semi-direct product $G(K_0)\rtimes \varphi\cdot \bb{Z}$ where $\varphi$ has its natural action on $G(K_0)$.
\begin{defi}\textup{(\cite[Definition 1.8]{RZ})}
For an element $b\in G(K_0)=G({K}_0)$ with conjugacy class $[b]\in B(G)$ we say that:
\begin{enumerate}
\item $b$ is decent if there exists an integer $s$ such that $(b\varphi)^s=(s\cdot \nu_b)(p)\varphi^s$ as elements of $G(K_0)\rtimes \varphi\cdot \bb{Z}$.
\item We say that $b$ is basic if the map $\nu_b:\bb{D}\to G_{K_0}$ factors through the center of $G$.
\item We say that $[b]\in B(G)$ is basic if all (equivalently some) element of $[b]$ is basic.
\end{enumerate}
\end{defi}
Since we are assuming $k=\ov{k}$ and that $G$ is connected reductive, every $\varphi$-conjugacy class $[b]\in B(G)$ contains a decent element \cite[1.11]{RZ}. \\
Assume for the rest of the subsection that $G$ is quasi-split.
For $b\in G(K_0)$ we can let $\nu_b^{\mrm{dom}}$ denote the unique map $\nu_b^{\mrm{dom}}:\bb{D}\to T_{K_0}$ in the conjugacy class of $\nu_b$ that is dominant with respect to $B$. The map $\nu_b^{\mrm{dom}}$ factors through $A$ and is defined over ${\mathbb{Q}_p}$, so we can write $\nu_b^{\mrm{dom}}\in X^+_*(A)_\bb{Q}=(X^+_*(T)\otimes_\bb{Z}\bb{Q})^{\Gamma_{{\mathbb{Q}_p}}}$ (\cite[\S 4]{SugWoo}, Introduction of \cite{CKV}). This gives a well defined map $\cali{N}:B(G)\to X^+_*(A)_\bb{Q}$ usually referred to as the Newton map.
Recall Borovoi's algebraic fundamental group $\pi_1(G)$ which can be defined as the quotient of $X_*(T)$ by the co-root lattice. This group comes equipped with $\Gamma_{\mathbb{Q}_p}$ action and Kottwitz constructs a map $\kappa_G:B(G)\to (\pi_1(G))_{\Gamma_{{\mathbb{Q}_p}}}$ that is usually referred to as the Kottwitz map.
An important result of Kottwitz \cite{Kott} states that the map of sets $$(\nu_b^{\mrm{dom}},\kappa_G):B(G)\to \cali{N}\times \pi_1(G)_{\Gamma_{{\mathbb{Q}_p}}}$$ is injective.
Now, if we are given an element $\mu\in X_*(T)$ with reflex field $E$ we may define an element $$\ov{\mu}\in X_*^+(A)_\bb{Q}= X_*^+(T)_\bb{Q}^{\Gamma_{\mathbb{Q}_p}}$$ by averaging over the dominant elements inside a conjugacy class in the Galois orbit of $\mu$:
$$\ov{\mu}=\frac{1}{[E:{\mathbb{Q}_p}]} \sum_{\gamma\in {\mrm{Gal}}(E/{\mathbb{Q}_p})} \mu^\gamma$$
We can now recall Kottwitz' definition of the set $B(G,\mu)\subseteq B(G)$.
\begin{defi}
\label{defi:BGmu}
The set $B(G,\mu)$ consists of those conjugacy classes $[b]\in B(G)$ for which $\kappa_G([b])=[\mu]$ in $\pi_1(G)_{\Gamma_{\mathbb{Q}_p}}$ and for which $\ov{\mu}-\nu_b^{\mrm{dom}}\in X_*^+(A)_\bb{Q}$ is a non-negative $\bb{Q}$-linear combination of positive co-roots.
\end{defi}
\subsubsection{$G$-bundles and $G$-valued crystalline representations.}
In this section we assume that $G$ is reductive over ${\mathbb{Q}_p}$, but not necessarily quasi-split. Just as in the case of schemes, one has a theory of $G$-bundles over the relative Fargues-Fontaine curve that uses a Tannakian approach (\cite[Appendix to lecture 19]{Ber2}). Given $S\in {\rm{Perf}}_k$ and ${\cali{F}}:\mrm{Rep}_G({\mathbb{Q}_p})\to \Phi{\text{-}\rm{Mod}}_{K_0}$ an isocrystal with $G$-structure we can define a $\otimes$-exact functor ${\cali{E}}_{{\cali{F}},S}:\mrm{Rep}_G({\mathbb{Q}_p})\to \mrm{Vec}(\Xff{S})$ by letting $${\cali{E}}_{{\cali{F}},S}(V,\rho)={\cali{E}}_S({\cali{F}}(V,\rho)),$$ this defines a $G$-bundle over $\Xff{S}$. When we are given $b\in G(K_0)$ we write ${\cali{E}}_{b,S}$ instead of ${\cali{E}}_{{\cali{F}}_b,S}$. This allow us to extend Tannakianly \Cref{defi:Grassmannian}.
\begin{defi}
\label{defi:GrassmannianG}
\begin{enumerate}
\item Given ${\cali{F}}$ an isocrystal with $G$-structure, we let $\mrm{Gr}({\cali{F}})$ denote the functor from ${\rm{Perf}}_{\Spdo{{K_0}}}\to {\rm{Sets}}$ that assigns:
$$(S^\sharp,f)\mapsto \{((S^\sharp,f),{\cali{G}},\alpha)\}/\cong$$
Where $(S^\sharp,f)$ is an untilt of $S$ over $\Spao{{K_0}}$, ${\cali{G}}$ is a $G$-bundle over $\Xff{S}$ and $\alpha:{\cali{G}}\dasharrow {\cali{E}}_{{\cali{F}},S}$ is an isomorphism defined over $\Xff{S}\setminus \infty$ and meromorphic along $\infty$. When $b\in G(K_0)$ we write $\mrm{Gr}({\cali{E}}_b)$ instead of $\mrm{Gr}({\cali{F}}_b)$.
\item We let $\mrm{Gr}_G$ denote the functor from ${\rm{Perf}}_{\mrm{Spd}({\mathbb{Q}_p})}\to {\rm{Sets}}$ that assigns:
$$(S^\sharp,f)\mapsto \{((S^\sharp,f),{\cali{G}},\alpha)\}/\cong$$
Where $(S^\sharp,f)$ is an untilt of $S$ over $\mrm{Spa}({\mathbb{Q}_p})$, ${\cali{G}}$ is a $G$-bundle over ${\rm{Spec}}(B^+_\mrm{dR}(S^\sharp))$ and $\alpha:{\cali{G}}\dasharrow G$ is a trivialization defined over ${\rm{Spec}}(B_\mrm{dR}(S^\sharp))$.
\end{enumerate}
\end{defi}
As with the $\mrm{GL}_n$ case, the two moduli spaces become isomorphic after basechange to $\Spdo{K_0}$. Instead of fixing a basis one has to fix an isomorphism of the fiber functors: $$(\omega_\mrm{can}\otimes K_0)\cong \omega_{\cali{F}}$$
Here $\omega_{\cali{F}}:\mrm{Rep}_G({\mathbb{Q}_p})\to \Phi{\text{-}\rm{Mod}}_{K_0}\to K_0-\mrm{Vec}$ denotes ${\rm{Forg}}\circ {\cali{F}}$, and if $b\in G(K_0)$ we write $\omega_b$ instead of $\omega_{{\cali{F}}_b}$. A careful inspection of the construction of $\omega_b$ shows that (in contrast with $\omega_{\cali{F}}$) there is a canonical choice of isomorphism $\omega_b\cong \omega_\mrm{can}$.
As with the $\mrm{GL}_n$ case we can define the admissible locus as the subsheaf $\mrm{Gr}({\cali{E}}_b)^\mrm{adm}\subseteq \mrm{Gr}({\cali{E}}_b)$ of those tuples $((S^\sharp,f),{\cali{G}},\alpha)$ such that $x^*{\cali{G}}$ is the trivial $G$-bundle for every geometric point $x:\Spa{C'}\to S$. This is again an open subsheaf and it admits a pro-\'etale $\und{G(\bb{Q}_p)}$-torsor which we will also denote by $\bb{L}$ (\cite[Theorem 22.5.2]{Ber2}). \\
To make contact with crystalline representations we recall how the Tannakian formalism interacts with filtrations, we refer the reader to \cite{Saavedra} for the details. Recall that given a fiber functor $\omega:\mrm{Rep}_G({\mathbb{Q}_p})\to \mrm{Vec}(S)$ one can consider $\otimes$-exact filtrations $\mrm{Fil}^\bullet(\omega)$
(\cite[Chapitre IV \S 2.1.1]{Saavedra}, \cite[Definition 4.2.6]{DOR}). To such a filtration one can associate a $\otimes$-grading $(gr(\mrm{Fil}^\bullet(\omega)))$ which produces a morphism of algebraic groups over $S$, $\mu_{\mrm{Fil}^\bullet(\omega)}:\bb{G}_m\to \und{\mrm{Aut}}^\otimes(\omega')$ \cite[Chapitre IV \S 1.3]{Saavedra} \cite[Corollary 4.2.3]{DOR}. Here $\omega'=(gr(\mrm{Fil}^\bullet(\omega)))$, denotes the $\otimes$-exact functor obtained from the grading after we forget the graded structure. If $x=\mrm{Spec}(C)$ is a geometric point of $S$, we may find an isomorphism $\omega'_x\cong \omega_x$ and this defines a conjugacy class of cocharacters into $\und{\mrm{Aut}}^\otimes(\omega_x)$. This conjugacy class is independent of the isomorphism chosen and we can denote it $[\mu_{\mrm{Fil}^\bullet(\omega)}(x)]$.
Now, fix an isomorphism $\omega_b\cong \omega_\mrm{can}$, we get an isomorphism $\und{\mrm{Aut}}^\otimes(\omega_b)\cong G_{K_0}$. Furthermore, if we are given a conjugacy class $[\mu]$ of morphisms $\mu:\bb{G}_{m,\ov{K}_0}\to G_{\ov{K}_0}$ with field of definition $E_0/K_0$ (\cite[Definition 6.1.2]{DOR}) contained in ${C}_p$, then we can consider the moduli functor of filtrations of $\omega_b$ of \textit{type} $[\mu]$. We denote this moduli space by $$\Flag{E_0}{\omega_b}:{\rm{Sch}}_{/{E_0}}\to {\rm{Sets}},$$
This functor does not depend of our choice of isomorphism $\omega_b\cong \omega_\mrm{can}$.
Since $G$ is defined over ${\mathbb{Q}_p}$ the conjugacy class $[\mu]$ will be defined over a finite extension $E$ of ${\mathbb{Q}_p}$ contained in ${C}_p$ and $\Flag{{E_0}}{\omega_b}$ is isomorphic to the basechange of a similarly defined moduli functor $\Flag{E}{\omega_\mrm{can}}$. If $F/E$ is a finite extension and $\mu\in[\mu]$ is a representative defined over $F$ then $\mu$ defines a parabolic subgroup $P_\mu\subseteq G_F$ and $\Flag{F}{\omega_\mrm{can}}$ is isomorphic to the generalized flag variety $G/P_\mu$. In particular, $\Flag{E}{\omega_\mrm{can}}$ and $\Flag{{E_0}}{\omega_b}$ are represented by geometrically connected smooth projective schemes over ${\rm{Spec}}(E)$ and ${\rm{Spec}}(E_0)$ respectively \cite[Theorem 6.1.4]{DOR}. The associated adic space $(\Flag{{E_0}}{\omega_b})^{\mrm{ad}}$ evaluates on a complete sheafy Huber pair $\Hub{R}$ over $\Spao{E_0}$ to the set:
$$(\Flag{{E_0}}{\omega_b})^{\mrm{ad}}\Hub{R}=\left\{ \mrm{Fil}^\bullet(\omega_{b,R})\mid [\mu_{\mrm{Fil}^\bullet(\omega)}(x)]=[\mu]\,for\,all\,x\in \Spa{R}\right\}$$
In particular, if $K/K_0$ is a complete nonarchimedean field extension then $$(\Flag{{E_0}}{\omega_b})^{\mrm{ad}}\Hubo{K}=\Flag{{E_0}}{\omega_b}(K).$$
Just as $[\mu]$ allows us to define $\Flag{{E_0}}{\omega_b}$ it also allows us to discuss boundedness conditions on affine $B_\mrm{dR}$-Grassmannians.
We can define subsheaves $$\mrm{Gr}^{[\mu]}_{G,E}\subseteq \mrm{Gr}^{\leq[\mu]}_{G,E}\subseteq \mrm{Gr}_G\times \Spdo{E},$$
given by the condition that for every geometric point, the pullback $x^*m$ has relative position $[\mu]$ (bounded by $[\mu]$ respectively). The space $\mrm{Gr}^{\leq[\mu]}_{G,E}$ is spatial diamond that is proper over $\Spdo{E}$ and $\mrm{Gr}^{[\mu]}_{G,E}\subseteq \mrm{Gr}^{\leq[\mu]}_{G,E}$ is an open subdiamond. \\
We can now compare the affine $B_\mrm{dR}$-Grassmannian to the flag variety. Recall that there is a Tannakianly defined Bia\l{}ynicki-Birula map \cite[Proposition 19.4.2]{Ber2}, $$\pi^{[\mu]}_{BB}:\mrm{Gr}^{[\mu]}_{G,E}\to (\Flagn{E}{\omega_\mrm{can}})^{\diamond}.$$ We emphasize that there is a change of signs which is a consequence of the change of signs that appeared in \Cref{rem:changeofsignslatticetofiltration} and of our convention on filtrations.
\label{detali:finish verifying the Tannakian proof}
One can also construct the following variation of the Bia\l{}ynicki-Birula map $$\pi^{[\mu]}_{BB}:\mrm{Gr}_{{E_0}}^{[\mu]}({\cali{E}}_b)\to \Flagn{{E_0}}{\omega_b}.$$ This allows the following group-theoretically enhanced rephrasing of \Cref{sta:equivariantlattices}.
\begin{sta}
\label{pro:weaklyadmissiblegivespoints}
With notation as above
and letting $K/{E_0}$ be a finite field extension.
Then, the Bia\l{}ynicki-Birula map induces a bijection $$\pi_{BB}^{[\mu]}:\mrm{Gr}^{[\mu]}({\cali{E}}_b)\Hubo{K}\cong (\Flagn{{E_0}}{\omega_b})^{\diamond}\Hubo{K},$$
of $\Spdo{K}$-valued points.
\end{sta}
\begin{proof}
We omit the details.
\end{proof}
Let $\mrm{Rep}^\mrm{cont}_{\Gamma_K}({\mathbb{Q}_p})$ denote the category of continuous Galois representations. It is a neutral Tannakian category with canonical fiber functor $\omega^{\Gamma_K}_\mrm{can}(W,\tau)=W$. Recall that by the Tannakian formalism to specify a continuous representation $\rho:\Gamma_K\to G({\mathbb{Q}_p})$ (up to $G({\mathbb{Q}_p})$-conjugation) it is sufficient to specify a $\otimes$-exact functor ${\cali{F}}:\mrm{Rep_G}({\mathbb{Q}_p})\to \mrm{Rep}^\mrm{cont}_{\Gamma_K}({\mathbb{Q}_p})$ for which $\omega^{\Gamma_K}_\mrm{can}\circ {\cali{F}}$ is isomorphic to $\omega_\mrm{can}$. Now, the full subcategory $\mrm{Rep}^\mrm{crys}_{\Gamma_K}({\mathbb{Q}_p})$ of crystalline representations is Tannakian and we can define crystalline representations with $G$-structure as those $\otimes$-exact functors ${\cali{F}}:{\mrm{Rep}_G}({\mathbb{Q}_p})\to \mrm{Rep}^\mrm{cont}_{\Gamma_K}({\mathbb{Q}_p})$ such that ${\cali{F}}(V,\rho)$ is crystalline for all $(V,\rho)\in \mrm{Rep}_G({\mathbb{Q}_p})$.
Given a pair $(b,\mu)$ with $b\in G(K_0)$ and $\mu:\bb{G}_{m,K}\to G_K$ we can construct a filtered isocrystal with $G$-structure by defining a functor $${\cali{F}}_{b,\mu}:{\mrm{Rep}_G}({\mathbb{Q}_p})\to \Phi{\rm{-ModFil}}_{K/K_0}$$ such that $${\cali{F}}_{b,\mu}(V,\rho)=(D_{b,\rho},\Phi_{b,\rho},\mrm{Fil}^\bullet_\mu)$$ with $$\mrm{Fil}^i_\mu(D_{b,\rho}\otimes K)=\oplus_{i\leq n}(V\otimes K)^{(\rho\circ \mu(t)\cdot v=t^n\cdot v)}.$$
\begin{defi}(\cite[Definition 1.18]{RZ}).
\label{defi:admissiblepairs}
We say that a pair $(b,\mu)$ with $b\in G(K_0)$ and $\mu:\bb{G}_m\to G_K$ is admissible if the functor ${\cali{F}}_{b,\mu}$ only takes values on weakly admissible filtered isocrystals.
\end{defi}
In general, even if $(b,\mu)$ is admissible the functor $V_{cris}\circ {\cali{F}}_{b,\mu}$ might not define a crystalline representation with $G$-structure. Indeed, the composition $\omega^{\Gamma_K}_\mrm{can}\circ V_{cris}\circ {\cali{F}}_{b,\mu}$ might fail to be isomorphic to $\omega_\mrm{can}$. Nevertheless, this issue goes away if we impose that $[b]$, the $\varphi$-conjugacy class of $b$ in $G({K}_0)$, lies on the Kottwitz set $B(G,\mu)$ \cite[Proposition 11.4.3]{DOR}.
Associated to the admissible pair $(b,\mu)$ there is a map $y_{b,\mu}:\Spdo{K}\to \Flagn{{E_0}}{\omega_b}$ defined by the filtration $\mrm{Fil}^\bullet_\mu$ on $\omega_b$, and we can let $x_{b,\mu}:\Spdo{K}\to \mrm{Gr}^{[\mu]}_{{E_0}_\mu}({\cali{E}}_b)$ denote the unique lift of $y_{b,\mu}$ of \Cref{pro:weaklyadmissiblegivespoints}. The following is a group-theoretic refinement of \Cref{pro:crystalineinGrass} and it is one of the key inputs from modern $p$-adic Hodge theory that we will need later on.
\begin{sta}
\label{pro:allcrystallinerepsappear}
Suppose that $(b,\mu)$ is an admissible pair with $[b]\in B(G,\mu)$, then the map $x_{b,\mu}:\Spdo{K}\to \mrm{Gr}^{[\mu]}_{{E_0}}({\cali{E}}_b)$ factors through the admissible locus $\mrm{Gr}^{[\mu]}_{{E_0}}({\cali{E}}_b)^\mrm{adm}$. Moreover, if $\bb{L}$ denotes the pro-\'etale $\und{G({\mathbb{Q}_p})}$-torsor on $\mrm{Gr}({\cali{E}}_b)^\mrm{adm}$ then $x_{b,\mu}^*\bb{L}$ agrees with the crystalline representation with $G$-structure defined by the functor $V_{cris}\circ {\cali{F}}_{b,\mu}$.
\end{sta}
\begin{proof}
We omit the details.
\end{proof}
\subsubsection{M. Chen's result on $p$-adic Hodge Theory.}
In this subsection, we assume that $G$ is an unramified reductive group over ${\mathbb{Q}_p}$, this implies the group is quasi-split.
\begin{defi}\textup{(\cite[D\'efinition 5.0.4]{Chen}, \cite[Theorem 2.5.6]{CKV})}
\label{defi:HN-irred}
Recall the notation of \Cref{defi:BGmu}. We say that a pair $([b],[\mu])$ with $[b]\in B(G,\mu)$ and $\mu\in X_*(T)$ is HN-irreducible if all the coefficients of $\ov{\mu}-\nu_b^{\mrm{dom}}$ as a $\bb{Q}$-linear combination of simple coroots are strictly positive.
\end{defi}
The following result of M. Chen is a key ingredient to our computation.
\begin{thm}\textup{(\cite[Th\'eor\`eme 5.0.6]{Chen})}
\label{thm:Chensthm}
Let $\mu:\bb{G}_m\to G_K$ be a morphism and let $b\in G(K_0)$ be a decent element such that $[b]\in B(G,\mu)$ and $[\mu]$ has reflex field $E$. Suppose that the map ${\rm{Spec}}(K)\to \Flagn{\br{E}}{\omega_b}$ induced by the filtration defined by $\mu$ maps to the generic point of $|\Flagn{E}{\omega_\mrm{can}}|$ under the map
$$\Flagn{\br{E}}{\omega_b}=\Flagn{E}{\omega_\mrm{can}}\times_E \br{E}\to \Flagn{E}{\omega_\mrm{can}},$$
induced from the canonical isomorphism $\omega_\mrm{can}\otimes_{\bb{Q}_{p^s}} K_0\cong \omega_b$. Assume further that the pair $([b],[\mu])$ is HN-irreducible, then the following hold:
\begin{enumerate}
\item The pair $(b,\mu)$ is admissible and defines a crystalline representation $\xi_{b,\mu}:\Gamma_K\to G({\mathbb{Q}_p})$, well-defined up to conjugation.
\item The Zariski closure of $\xi_{b,\mu}(\Gamma_K)\subseteq G$ contains $G^{\mrm{der}}$ and $\xi_{b,\mu}(\Gamma_K)$ contains an open subgroup of $G^{\mrm{der}}({\mathbb{Q}_p})$.
\end{enumerate}
\end{thm}
\begin{rem}
M. Chen's result is slightly stronger, but this is the formulation that we will use below. Observe that $K$ has infinite transcendence degree over $E$, so it makes sense for a $K$-point to lie topologically over the generic point of $\Flagn{E}{\omega_\mrm{can}}$.
\end{rem}
Combining \Cref{pro:allcrystallinerepsappear} with Chen's \Cref{thm:Chensthm} and using the fact that every element $b\in G(K_0)$ is $\varphi$-conjugate to a decent one we can deduce the following statement.
\begin{cor}
\label{cor:MainChen}
Let $b\in G(K_0)$ and $\mu\in X^+_*(T)$. Suppose that $[b]\in B(G,\mu)$ and that $([b],[\mu])$ is HN-irreducible. For every finite extension $K/K_0$ there is a map $x:\Spdo{K}\to \mrm{Gr}_{E}^{[\mu]}({\cali{E}}_b)^\mrm{adm}$ such that if $\rho_x:\Gamma_K\to G({\mathbb{Q}_p})$ denotes the Galois representation associated to $x^*\bb{L}$, then $\rho_x(\Gamma_K)\cap G^{\mrm{der}}({\mathbb{Q}_p})$ is open in $G^{\mrm{der}}({\mathbb{Q}_p})$.
\end{cor}
\subsection{The three actions.}
\subsubsection{The action of $G({\mathbb{Q}_p})$.}
We fix $b\in G(K_0)$, $[\mu]\in \mrm{Hom}(\bb{G}_m,G_{\ov{\bb{Q}}_p})$ and we let $E_0=K_0\cdot E$ denote the field of definition of $[\mu]$ over $K_0$. Let ${\cali{K}}\subseteq G({\mathbb{Q}_p})$ denote an open compact subgroup, recall the moduli space of $p$-adic shtukas that appears in the Berkeley notes.
\begin{defi}\textup{(\cite[Proposition 23.3.1]{Ber2})}
We define ${\rm{Sht}}_{G,b,[\mu],{\cali{K}}}:{\rm{Perf}}_k \to {\rm{Sets}}$ as the presheaf that assigns to $S\in {\rm{Perf}}_k$ isomorphism classes of tuples $$((S^\sharp,f),{\cali{E}}, \alpha, \bb{P}_{\cali{K}},\iota)$$ such that:
\begin{enumerate}
\item $(S^\sharp,f)$ is an untilt of $S$ over $E_0$.
\item ${\cali{E}}$ is a $G$-bundle on the relative Fargues-Fontaine $\Xff{S}$ curve whose fibers on geometric points of $S$ are isomorphic to the trivial $G$-torsor.
\item $\alpha:{\cali{E}}\dasharrow {\cali{E}}_b$ is a modification of $G$-bundles defined over $\Xff{S}\setminus S^\sharp$ meromorphic along $S^\sharp$ and whose type is bounded by $[\mu]$ on geometric points.
\item $\bb{P}_{\cali{K}}$ is a pro-\'etale $\und{{\cali{K}}}$-torsor and $\iota$ is an identification of $\bb{P}_{\cali{K}}{\times^{{{\cali{K}}}}} {\und{G({\bb{Q}}_p)}}$ with the pro-\'etale $\und{G({\bb{Q}}_p)}$-torsor that ${\cali{E}}$ defines under the equivalence of \cite[Theorem 22.5.2]{Ber2}.
\end{enumerate}
\end{defi}
It is proven in \cite{Ber2} that the presheaves ${\rm{Sht}}_{G,b,[\mu],{\cali{K}}}$ are locally spatial diamonds over $\Spdo{E_0}$, and that whenever $\mu$ is a minuscule conjugacy class of cocharacters then ${\mrm{Sht}}_{G,b,[\mu],{\cali{K}}}$ is represented by the diamond associated to a smooth rigid-analytic space over $\Spao{E_0}$.
Scholze and Weinstein construct a family of ``Grothendieck--Messing'' period morphisms $$\pi_{GM,{\cali{K}}}:{\rm{Sht}}_{G,b,[\mu],{\cali{K}}}\to \mrm{Gr}_{E_0}^{\leq[\mu]}({\cali{E}}_b)^\mrm{adm}$$
given by the formula:
$$((S^\sharp,f),{\cali{E}}, \alpha, \bb{P}_{\cali{K}},\iota)\mapsto ((S^\sharp,f),{\cali{E}}, \alpha)$$
For every ${\cali{K}}$ this gives a surjective \'etale morphism of locally spatial diamonds. Moreover, this family is functorial on ${\cali{K}}$. That is, if ${\cali{K}}_1\subseteq {\cali{K}}_2$ are two compact and open subsets then we get a commutative diagram of \'etale maps,
\begin{center}
\begin{tikzcd}
{\rm{Sht}}_{G,b,[\mu],{\cali{K}}_1}\arrow{rr}{\pi_{{\cali{K}}_1,{\cali{K}}_2}} \arrow{rd}{\pi_{GM,{\cali{K}}_1}}& & {\rm{Sht}}_{G,b,[\mu],{\cali{K}}_2}\arrow{dl}{\pi_{GM,{\cali{K}}_2}}\\
& \mrm{Gr}_{E_0}^{\leq[\mu]}({\cali{E}}_b)^\mrm{adm} &
\end{tikzcd}
\end{center}
where the transition map $\pi_{{\cali{K}}_1,{\cali{K}}_2}$ is the one deduced from assigning to $\bb{P}_{{\cali{K}}_1}$ the corresponding $\und{{\cali{K}}_2}$-torsor $\bb{P}_{{\cali{K}}_1}\times^{{\cali{K}}_1}{\cali{K}}_2$. Also, if ${\cali{K}}_1\subseteq {\cali{K}}_2$ is normal of finite index then the transition maps $\pi_{{\cali{K}}_1,{\cali{K}}_2}$ are surjective and finite \'etale.
The flexibility of the category of diamonds allows us to define moduli spaces of $p$-adic shtukas associated to an arbitrary compact subgroup ${\cali{K}}'\subseteq G({\mathbb{Q}_p})$ including the case ${\cali{K}}'=\{e\}$ (which is usually referred to as the infinite level). Indeed, the set of compact open subgroups ${\cali{K}}\subseteq G({\mathbb{Q}_p})$ containing ${\cali{K}}'$ is co-filtered and has intersection equal to ${\cali{K}}'$. We may define the limit of diamonds ${\rm{Sht}}_{G,b,[\mu],{\cali{K}}'}=\varprojlim_{{\cali{K}}'\subseteq {\cali{K}}} {\rm{Sht}}_{G,b,[\mu],{\cali{K}}}$, together with a period map $$\pi_{GM,{\cali{K}}'}:{\rm{Sht}}_{G,b,[\mu],{\cali{K}}'}\to \mrm{Gr}_{E_0}^{\leq[\mu]}({\cali{E}}_b)^\mrm{adm}.$$ This sheaf has the structure of a locally spatial diamond. Moreover, although the period map in general might not be \'etale it is always a quasi-pro\'etale map \cite[Definition 10.1]{Et}.
Moduli spaces of shtukas at infinite level ($K'=\{e\})$ have the following pleasant description, $${\rm{Sht}}_{G,b,[\mu],\infty}(S)=\{(S^\sharp,f),\alpha:G\dasharrow {\cali{E}}_b\}$$ where $(S^\sharp,f)$ denotes an untilt of $S$ over $E_0$, $G$ denotes the trivial $G$-bundle over $\Xff{S}$ and $\alpha$ is a modification of $G$-bundles over $\Xff{S}\setminus S^\sharp$, meromorphic along $S^\sharp$ and whose type is bounded by $[\mu]$ on geometric points. The natural action of $G(\bb{Q}_p)$ on the trivial torsor $G$ induces a right action of $\und{G(\bb{Q}_p)}$ on ${\rm{Sht}}_{G,b,[\mu],\infty}$.
\subsubsection{Weil descent.}
Recall that we defined $W^{K_0}_E$ as the subset of continuous automorphisms of ${C}_p$ that act as $\hat{\varphi}:=\mrm{Id}_E\otimes \varphi^{n\cdot s}$ on $\br{E}=E\cdot K_0$. It evidently contains $\Gamma_{\br{E}}$ and we may topologize $W^{K_0}_E$ so that $\Gamma_{\br{E}}\hookrightarrow W^{K_0}_E$ is a topological immersion and an open map. We get a strict exact sequence of topological groups $$e\to \Gamma_{\br{E}}\to W^{K_0}_E\to \hat{\varphi}^\bb{Z}\to e.$$
\begin{defi}
\label{defi:tauWeildescent}
Let ${\cali{G}}$ be a v-sheaf over $\Spdo{\br{E}}$, a Weil descent datum for ${\cali{G}}$ is an isomorphism $\tau:{\cali{G}}\to \hat{\varphi}^{\mrm{op},*}{\cali{G}}$ over $\Spdo{\br{E}}$.
\end{defi}
Weil descent datum provide us with actions by $W^{\mrm{op}}_{\br{E}}$ instead of only $\Gamma^{\mrm{op}}_{\br{E}}$. But we need to endow our spaces with continuous actions rather than plain actions by an abstract group. An efficient way to endow a v-sheaf with a continuous action is to endow it with the action of the group sheaf $\und{W^{\mrm{op}}_{\br{E}}}$ that parametrizes continuous maps $|\Spa{R}|\to W^{\mrm{op}}_{\br{E}}$.
\begin{lem}
\label{lem:Weilaction}
Suppose we are given a right $\und{\Gamma_{\br{E}}}$-action on a v-sheaf, $$m:{\cali{F}}\times \und{\Gamma_{\br{E}}}\to {\cali{F}},$$ and suppose we are given a group homomorphism $\theta:W^{\mrm{op}}_{\br{E}}\to \mrm{\mrm{Aut}}({\cali{F}})$ such that $\theta(\gamma^{\mrm{op}})=m(-,\gamma)$ for all constant elements $\gamma\in \Gamma_{\br{E}}\subseteq \und{\Gamma_{\br{E}}}$. Then there is a unique right $\und{W^{K_0}_E}$-action $m':{\cali{F}}\times \und{W^{K_0}_E}\to {\cali{F}}$ with $m'_{|\und{\Gamma_{\br{E}}}}=m$ and $\theta(\gamma^{\mrm{op}})=m'(-,\gamma)$ for all constant elements $\gamma\in W^{K_0}_E$.
\end{lem}
\begin{proof}
We omit the details.
\end{proof}
\begin{sta}
\label{pro:descentdatumgivesaction}
If $({\cali{G}},\tau)$ is a v-sheaf over $\Spdo{\br{E}}$ equipped with a Weil-descent datum then ${\cali{G}}\times_{\br{E}} \Spdo{{C}_p}$ comes equipped with a right action by $\und{W^{K_0}_E}$.
\end{sta}
Given two diamonds with Weil descent datum $({\cali{G}}_i,\tau_i)$ over $\Spdo{\br{E}}$ and a map $f:{\cali{G}}_1\to {\cali{G}}_2$ compatible with $\tau_i$,
then the corresponding map $f:{\cali{G}}_1\times_{\br{E}}\Spdo{{C}_p}\to {\cali{G}}_2\times_{\br{E}}\Spdo{{C}_p}$ is $\und{W^{K_0}_E}$-equivariant. \\
\begin{sta}
There are canonical isomorphisms of v-sheaves over $\Spdo{\br{E}}$ compatible with the inclusion and the period morphism.
\begin{enumerate}
\item $\hat{\varphi}^{\mrm{op},*}\mrm{Gr}^{\leq[\mu]}_{\br{E}}({\cali{E}}_b)= \mrm{Gr}^{\leq[\mu]}_{\br{E}}({\cali{E}}_{\varphi^s(b)})$.
\item $\hat{\varphi}^{\mrm{op},*}\mrm{Gr}^{\leq[\mu]}_{\br{E}}({\cali{E}}_b)^\mrm{adm}= \mrm{Gr}^{\leq[\mu]}_{\br{E}}({\cali{E}}_{\varphi^{s}(b)})^\mrm{adm}$.
\item $\hat{\varphi}^{\mrm{op},*}{\rm{Sht}}_{G,b,[\mu],\infty}= {\rm{Sht}}_{G,\varphi^s(b),[\mu],\infty}$
\end{enumerate}
\label{pro:modulihasdescente}
\end{sta}
\begin{proof}
We omit the details.
\end{proof}
Observe that $b$ and $\varphi(b)$ are $\varphi$-conjugate by $b$. This induces an isomorphism of $G$-bundles $\Phi_b:{\cali{E}}_{\varphi(b)}\to {\cali{E}}_{b}$ and allows us to endow our moduli of interest with Weil descent datum.
Using \Cref{pro:descentdatumgivesaction} we can endow ${\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p}$ with a right $\und{W^{K_0}_E}$-action. Moreover, the space ${\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p}$ with its right $\und{W^{K_0}_E}$-action is independent of the choice of $b\in [b]$.
\subsubsection{The action of $J_b({\mathbb{Q}_p})$.}
In (\cite[A.2]{Kott}) Kottwitz shows how to associate to the $\otimes$-functor ${\cali{F}}_b:\mrm{Rep}_G({\mathbb{Q}_p})\to \Phi{\text{-}\rm{Mod}}_{K_0}$ a connected reductive group $J_b$ over ${\mathbb{Q}_p}$ whose group of ${\mathbb{Q}_p}$-valued points is the $\varphi$-centralizer of $b$, $$J_b({\mathbb{Q}_p})=\left\{ g\in G(K_0)\mid g^{-1}\cdot b\cdot \varphi(g)=b \right\}.$$
Let us recall this construction. For any ${\mathbb{Q}_p}$-algebra $R$ we let $\Phi{\text{-}\rm{Mod}}_{K_0}\otimes_{{\mathbb{Q}_p}}R$ denote the category whose objects are the same as in $\Phi{\text{-}\rm{Mod}}_{K_0}$ and morphisms are $$\mrm{Hom}_R((D_1,\Phi_1),(D_2,\Phi_2)):=\mrm{Hom}_{\Phi{\text{-}\rm{Mod}}_{K_0}}((D_1,\Phi_1),(D_2,\Phi_2))\otimes_{\mathbb{Q}_p} R$$
There is a natural $\otimes$-functor $\beta_R:\Phi{\text{-}\rm{Mod}}_{K_0}\to \Phi{\text{-}\rm{Mod}}_{K_0}\otimes_{\mathbb{Q}_p} R$ and $J_b(R)$ is defined as $\mrm{Aut}^\otimes(\beta_R\circ {\cali{F}}_b)$. With $J_b$ defined in this way we have $$J_b({\mathbb{Q}_p})=\mrm{Aut}^\otimes({\cali{F}}_b)\subseteq \mrm{Aut}^\otimes(\mrm{Forg}\circ{\cali{F}}_b)=G(K_0).$$ Moreover, recall that the slope decomposition produces a map $\nu_b:\bb{D}\to G_{K_0}$, if we denote $M_b$ the centralizer of $\nu_b$ in $G_{K_0}$ then $(J_b)_{K_0}$ is isomorphic to $M_b$.
Since the elements of $J_b({\mathbb{Q}_p})$ act on ${\cali{F}}_b$ then we get a homomorphism of abstract groups $J_b({\mathbb{Q}_p})\to \mrm{Aut}({\cali{E}}_{b,S})$ this already gives an action of $J_b({\mathbb{Q}_p})$ on ${\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p}$, but from this description it is not clear, for example, if this action is continuous with respect to the $p$-adic topology on $J_b({\mathbb{Q}_p})$. A better approach is to endow our moduli spaces with an action of $\und{J_b({\mathbb{Q}_p})}$. This can be done following \cite[Proposition III.4.7]{FS}.
\subsubsection{Group functoriality.}
As we have discussed ${\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p}$ comes equipped naturally with a left action by $\und{J_b({\mathbb{Q}_p})}$ and right actions by $\und{G({\mathbb{Q}_p})}$ and $\und{W^{K_0}_E}$. Moreover, these three actions commute. Replacing the left $\und{J_b({\mathbb{Q}_p})}$-action by a right $\und{J_b({\mathbb{Q}_p})}$-action, we can say that ${\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p}$ comes equipped with a right action by $\und{G({\mathbb{Q}_p})}\times \und{J_b({\mathbb{Q}_p})} \times \und{W^{K_0}_E}$.
Fix a morphism $f:G\to H$ of reductive groups over ${\mathbb{Q}_p}$. Let $b_H=f(b)\in H(L)$ and let $[\mu_H]=[f\circ \mu]$.
This defines a morphism $f_{\infty,\infty}:{\rm{Sht}}_{G,b,[\mu],\infty}\to {\rm{Sht}}_{H,b_H,[\mu_H],\infty}\times_{E(\mu_H)} E(\mu)$ with $[\alpha:G\dashrightarrow {\cali{E}}_b] \mapsto [f_*\alpha:H\dashrightarrow {\cali{E}}_{b_H}]$.
Associated to $b_H$ we can form $J_{b_H}=\mrm{Aut}^\otimes({\cali{F}}_{b_H})$ and we get a morphism of algebraic groups $f:J_b\to J_{b_H}$.
Now, if we endow ${\rm{Sht}}_{H,b_H,[\mu_H],\infty}$ with the action induced by $f:\und{G({\mathbb{Q}_p})}\times \und{J_b({\mathbb{Q}_p})}\to \und{H({\mathbb{Q}_p})}\times \und{J_{b_H}({\mathbb{Q}_p})}$ then $f_{\infty,\infty}\times {C}_p$ is equivariant with respect to the $\und{G({\mathbb{Q}_p})}\times \und{J_b({\mathbb{Q}_p})}\times \und{W^{K_0}_E}$-action.
We may also impose a level structure ${\cali{K}}\subseteq G({\mathbb{Q}_p})$ to get a family of morphisms $f_{{\cali{K}},f({\cali{K}})}: {\rm{Sht}}_{G,b,[\mu],{\cali{K}}}\to {\rm{Sht}}_{H,b_H,[\mu_H],f({\cali{K}})}\times_{E(\mu_H)} E(\mu)$.
\subsection{Geometric connected components in the case of tori.}
In this section we study
the case in which $G$ is a torus, we change our notation and let $G=T$. We remark that this case was tackled by M. Chen in \cite{ChenDet} and it is also discussed in \cite{FarGeom}. We recall the story in a different language. \\
By the work of Kottwitz we know that every element of $B(T)$ is basic and that the Kottwitz map $\kappa_{T}:B({T})\to \pi_1({T})_{\Gamma_{\mathbb{Q}_p}}=X_*({T}_{{\ov{\bb{Q}}_p}})_{\Gamma_{\mathbb{Q}_p}}$ is a bijection. The sets $B({T},\mu)$ are singletons and are determined by the image of $\mu$ in $\pi_1({T})_{\Gamma_{\mathbb{Q}_p}}$. In this case, moduli spaces of $p$-adic shtukas are $0$-dimensional.
\begin{sta}
\label{pro:twoactionscoincide}
If $b\in B(T,\mu)$ then all the maps in the following diagram are isomorphisms:
\begin{center}
\begin{tikzcd}
\mrm{Gr}_{\br{E}}^{[\mu]}({\cali{E}}_b)^\mrm{adm} \arrow{r}\arrow{rd} & \mrm{Gr}_{\br{E}}^{[\mu]}({\cali{E}}_b) \arrow{r}\arrow{d}{\pi_{BB}} & \mrm{Gr}_{\br{E}}^{\leq[\mu]}({\cali{E}}_b)\arrow{d}\\
& (\Flagn{\br{E}}{\omega_b})^{\diamond}\arrow{r} & \Spdo{\br{E}}
\end{tikzcd}
\end{center}
\end{sta}
\begin{proof}
We omit the details.
\end{proof}
In particular, on geometric points the situation is very simple. Indeed, the structure map $\mrm{Gr}_{{C}_p}^{\leq{\mu}}({\cali{E}}_b)^\mrm{adm}\to \Spdo{{C}_p}$ is an isomorphism and $${\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p\cong\und{T({\mathbb{Q}_p})}\times \Spdo{{C}_p},$$ since every right $\und{T({\mathbb{Q}_p})}$-torsor is trivial on $\mrm{Spd}({C}_p)$. It becomes more interesting when we compare the action of $\und{J_b({\mathbb{Q}_p})}$ and $\und{W^{K_0}_E}$ to that of $\und{T({\mathbb{Q}_p})}$.
We begin by discussing the action of $\und{J_b({\mathbb{Q}_p})}$. Recall that if $b$ is basic then $J_b$ is an inner form of ${T}$, and that since ${T}$ is commutative we must have ${T}=J_b$. More precisely we have a canonical inclusion $J_b({\mathbb{Q}_p})\subseteq T(K_0)$ that induces an isomorphism onto $T({\mathbb{Q}_p})$, we denote by $j_b$ this identification.
\begin{sta}
\label{pro:actionscompatible}
The action of $\und{T({\mathbb{Q}_p})}$ and $\und{J_b({\mathbb{Q}_p})}$ are inverse to each other. In other words, if $S\in {\rm{Perf}}_{{C}_p}$, $f:|S|\to J_b({\mathbb{Q}_p})$ is a continuous map, and $\alpha\in {\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p$ then $$\alpha\cdot_{J_b({\mathbb{Q}_p})} f=\alpha \cdot_{T({\mathbb{Q}_p})}j_b(f^{-1}).$$
\end{sta}
\begin{proof}
We omit the details.
\end{proof}
Let us study the Weil group action. In contrast to the actions of $J_b({\mathbb{Q}_p})$ and $T({\mathbb{Q}_p})$ the action of $W^{K_0}_E$ on ${\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p$ is not ${C}_p$-linear. In particular, we can only compare the actions of $W^{K_0}_E$ and $T({\mathbb{Q}_p})$ on those invariants of ${\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p$ that do not depend on the structure morphism to $\Spdo{{C}_p}$. In our case we compare the continuous actions on the topological space of connected components. As we have seen above this topological space is a topological right $T({\mathbb{Q}_p})$-torsor. Let $x\in \pi_0({\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p)$ and $\gamma\in W^{K_0}_E$. We have $$x\cdot_{W^{K_0}_E} \gamma = x\cdot_{G({\mathbb{Q}_p})} g_{\gamma,x}$$ for a unique element $g_{\gamma,x}\in T({\mathbb{Q}_p})$. Since the actions of $W^{K_0}_E$ and $T({\mathbb{Q}_p})$ commute we get a group homomorphism $g_{-,x}:W^{\mrm{op}}_{\br{E}/E}\to T({\mathbb{Q}_p})$. Since $T({\mathbb{Q}_p})$ is commutative this morphism is independent of $x$. Moreover, the naive map of sets $\gamma\mapsto g_{\gamma,x}$ which would usually not be a group homomorphism is a group homomorphism again by the commutativity of $T({\mathbb{Q}_p})$. We denote this later group homomorphism by $$m_{T,\mu}:W^{K_0}_E\to T({\mathbb{Q}_p}).$$
The following line of reasoning is taken from \cite[Lemma 1.22]{RZ}, which in turn is an elaboration of an argument in \cite[page 413/41]{KottwitzPointsonShimura}.
Let $E$ denote a finite field extension of ${\mathbb{Q}_p}$ let $\{\mrm{Tori}_{\mathbb{Q}_p}\}$ denote the category of tori defined over ${\mathbb{Q}_p}$. Recall the functor $X_*(-):\{\mrm{Tori}_{\mathbb{Q}_p}\}\to \mrm{Sets}$ given by the set of maps $\bb{G}_m\to T_{{\ov{\bb{Q}}_p}}$. Consider the subfunctor $X_*^E\subseteq X_*$ given by the subset of maps $\bb{G}_m\to T_{E}$ that are already defined over $E$. This functor is representable by $\mrm{Res}_{E/{\mathbb{Q}_p}}\bb{G}_m$ and comes equipped with a universal cocharacter $\mu_{u}\in X_*^E(\mrm{Res}_{E/{\mathbb{Q}_p}}\bb{G}_m)$. In other words, given a torus $T\in \{\mrm{Tori}_{\mathbb{Q}_p}\}$ and $\mu\in X^E_*(T)$ there is a unique map ${\mrm{Nm}}_\mu:\mrm{Res}_{E/{\mathbb{Q}_p}}\bb{G}_m\to T$ of algebraic groups over ${\mathbb{Q}_p}$ such that ${\mrm{Nm}}_\mu\circ \mu_{u}=\mu$ in $X_*(T)$. The universal cocharacter can be expressed on $E$-points as follows:
$$E^\times\xrightarrow{e\mapsto e\otimes e} (E\otimes E)^\times.$$
Associated to $\mu_{u}$ there is a unique element of $[b_{u}]\in B(\mrm{Res}_{E/{\mathbb{Q}_p}}\bb{G}_m,\mu_{u})$.
We fix a representative $b_u\in \mrm{Res}_{E/{\mathbb{Q}_p}}\bb{G}_m(\breve{\bb{Q}}_p)$ and we abbreviate by $m_{E,\mu_u}$ the map $m_{(\mrm{Res}_{E/{\mathbb{Q}_p}}\bb{G}_m,\mu_u)}$ previously constructed.
We compute the $W^{K_0}_E$-action on $|{\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p|$ by reduction to the universal case. Suppose we are given $\mu\in X_*^E(T)$ and $b\in T(K_0)$ with $[b]\in B(T,\mu)$, then automatically $(b,\mu)$ is admissible as in \Cref{defi:admissiblepairs} and from the functoriality of the Kottwitz map we have that $[{\mrm{Nm}}_\mu(b_{{u}})]=[b]$ in $B(T)$. We may replace $b$ by ${\mrm{Nm}}_\mu(b_{{u}})$ and we get a norm morphism $${\mrm{Nm}}_\mu:{\rm{Sht}}_{\mrm{Res}_{E/{\mathbb{Q}_p}}(\bb{G}_m),b_u,[\mu_u],\infty}\times {C}_p\to {\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p.$$ This map is $E^\times\times W^{K_0}_E$-equivariant when the right space is endowed with the action induced from the map ${\mrm{Nm}}_\mu:\mrm{Res}_{E/{\mathbb{Q}_p}}(\bb{G}_m)({\mathbb{Q}_p})=E^\times\to T({\mathbb{Q}_p})$. We can deduce the following.
\begin{sta}
Let the notation be as above, for all $T\in \{\mrm{Tori}_{\mathbb{Q}_p}\}$ and $\mu\in X_*^E(T)$ we have $$m_{T,\mu}={\mrm{Nm}}_\mu\circ m_{E,\mu_u}$$ as maps $W^{K_0}_E\to T({\mathbb{Q}_p})$.
\end{sta}
\begin{proof}
Fix $x\in\pi_0({\rm{Sht}}_{\mrm{Res}_{E/{\mathbb{Q}_p}}(\bb{G}_m),b_u,[\mu_u],\infty}\times {C}_p)$ with image $y\in \pi_0({\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p)$ and $\gamma\in W^{K_0}_E$. The equivariance of the norm map with respect to $E^\times$ and $ W^{K_0}_E$ allow us to compute:
\begin{equation*}
\begin{split}
y\cdot_{T({\mathbb{Q}_p})} m_{T,\mu}(\gamma) & = y\cdot_{W^{K_0}_E} \gamma \\
& = {\mrm{Nm}}_\mu(x\cdot_{W^{K_0}_E} \gamma) \\
& = {\mrm{Nm}}_\mu(x\cdot_{E^\times} m_{E,\mu_u}(\gamma)) \\
& = y\cdot_{T({\mathbb{Q}_p})} {\mrm{Nm}}_\mu(m_{E,\mu_u}(\gamma)) \\
\end{split}
\end{equation*}
\end{proof}
In turn, one can do an intricate but explicit computation using local class field theory to show $m_{E,\mu_u}={{\mrm{Art}}_E}$ the Artin reciprocity character.
The following statement summarizes the results discussed on this section:
\begin{thm}\textup{(Compare with \cite[Proposition 4.1]{ChenDet})}
\label{thm:mainTori}
Let $T$ be a torus over ${\mathbb{Q}_p}$, $b\in T(K_0)$, $\mu\in X_*(T)$ with $[b]\in B(T,\mu)$. Let $E\subseteq {C}_p$ be the field of definition of $\mu$, let ${\mrm{Art}}_E:W_E\to E^\times$ be Artin's reciprocity character of local class field theory, let ${\mrm{Nm}}_\mu:\mrm{Res}_{E/{\mathbb{Q}_p}}(\bb{G}_m)\to T$ be as above and let ${\mrm{Art}}_{K_0,E}$ denote the composition ${\mrm{Art}}_{K_0,E}:W^{K_0}_E\to W_E\xrightarrow{{\mrm{Art}}_E} E^\times,$ induced by the inclusion of fields $E\subseteq {E_0}\subseteq {C}_p$. Then the following hold:
\begin{enumerate}
\item ${\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p$ is a trivial right $\und{T({\mathbb{Q}_p})}$-torsor over $\Spdo{{C}_p}$.
\item If $s\in \pi_0({\rm{Sht}}_{T,b,[\mu],\infty}\times {C}_p)$ and $(g,j,\gamma)\in T({\mathbb{Q}_p})\times J_b({\mathbb{Q}_p})\times W^{K_0}_E$ then $$s\cdot (g,j,\gamma)=s\cdot (g\cdot j_b(j^{-1})\cdot ({\mrm{Nm}}_\mu \circ {\mrm{Art}}_{K_0,E}(\gamma)))$$ where $j_b:J_b({\mathbb{Q}_p})\to T({\mathbb{Q}_p})$ is the isomorphism specified by regarding $J_b({\mathbb{Q}_p})$ as a subgroup of $T(K_0)$.
\end{enumerate}
\end{thm}
Since we have a full description of the Galois action we can easily compute from \Cref{thm:mainTori} the connected components of ${\rm{Sht}}_{T,b,[\mu],\infty}$ as a space over $\Spdo{{E_0}}$. The computation is easier to explain with the following lemma:
\begin{lem}
\label{lem:localsystemtoconnectedcomp}
Let ${\cali{K}}$ be a locally profinite group, let $L$ a $p$-adic field with Galois group $\Gamma_L$ and $\bb{L}_{\cali{K}}$ a pro-\'etale $\und{{\cali{K}}}$-torsor over $\Spdo{L}$. Define ${{\mrm{Triv}}}(\bb{L}_{\cali{K}})$ as the moduli of trivializations of $\bb{L}_{\cali{K}}$. Then:
\begin{enumerate}
\item If $C$ is the $p$-adic completion of an algebraic closure of $L$, then the choice of a map $\alpha:\Spdo{C}\to {{\mrm{Triv}}}(\bb{L}_K)$ determines a group homomorphism $\rho_\alpha:\Gamma^{\mrm{op}}_L\to {\cali{K}}$.
\item For any $k\in {\cali{K}}$ we have $\rho_{\alpha\cdot k}=k^{-1}\cdot \rho_\alpha \cdot k$.
\item The right action of ${\cali{K}}$ on $\pi_0({{\mrm{Triv}}}(\bb{L}_{\cali{K}}))$ is transitive.
\item If $\pi_0(\alpha)$ denotes the unique connected component to which $|\alpha|$ maps to, then the stabilizer subgroup is given by the formula ${\cali{K}}_{\pi_0(\alpha)}=\rho_\alpha(\Gamma^{\mrm{op}}_L)$.
\end{enumerate}
\end{lem}
\begin{proof}
We omit the details.
\end{proof}
\begin{pro}
Let ${\cali{K}}\subseteq T({\mathbb{Q}_p})$ denote the largest compact subgroup, the following statements hold.
\begin{enumerate}
\item $\pi_0({\rm{Sht}}_{T,b,[\mu],\infty})$ is a free right $T({\mathbb{Q}_p})/{\mrm{Nm}}_\mu({\mrm{Art}}_{K_0,E}(\Gamma_{\br{E}}))$-torsor.
\item $\pi_0({\rm{Sht}}_{T,b,[\mu],{\cali{K}}})=\pi_0({\rm{Sht}}_{T,b,[\mu],{\cali{K}}}\times {C}_p)$ and it is a free right $T({\mathbb{Q}_p})/{\cali{K}}$-torsor.
\end{enumerate}
\end{pro}
\begin{proof}
The first statement follow directly from \Cref{lem:localsystemtoconnectedcomp} and \Cref{thm:mainTori}. The second statement follows from the fact that the action of $\Gamma_{\br{E}}$ is continuous so the action of this compact group factors through the maximal compact subgroup.
\end{proof}
\subsection{Geometric connected components in the case of unramified groups.}
In this section we compute $\pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times {C}_p)$ together with its right action by $\und{G({\mathbb{Q}_p})}\times \und{J_b({\mathbb{Q}_p})}\times \und{W^{K_0}_E}$-action under the assumption that $G$ is an unramified reductive group and that $(b,\mu)$ is HN-irreducible (\Cref{defi:HN-irred}). Recall that in this case the reflex field is of the form $E=\bb{Q}_{p^s}$ for some $s\in \bb{N}$ and consequently $\br{E}=K_0$. Nevertheless, with the notation we have chosen, $W^{K_0}_E$ is the subgroup of $W_{K_0}$ of those automorphisms of ${C}_p$ that lift a power of $\varphi^s:K_0\to K_0$. Recall that if $G$ is an unramified group then there is a connected reductive group over ${\mathbb{Z}_p}$ whose generic fiber is isomorphic to $G$. We let $\mathscr{G}$ be such a model, and by abuse of notation we let $G=\mathscr{G}$. We let ${\cali{K}}=G({\mathbb{Z}_p})$ and we let $\breve{{\cali{K}}}=G(W(k))$.
\subsubsection{Connected components of affine Deligne--Lusztig Varieties.}
As we prove in the second chapter the moduli spaces of $p$-adic shtukas at parahoric level are closely related to a corresponding affine Deligne--Lusztig variety of the same level. In this section we recall what is known about the connected components of the later when $G$ is unramified and $\mathscr{G}=G$ is hyperspecial.
Since we are assuming $k=\ov{k}$, the group $G_{K_0}$ is split over $K_0$ and we have by the Cartan decomposition a bijection $\breve{{\cali{K}}}\backslash G(K_0)/\breve{{\cali{K}}}=X^+_*(T)$ given by $\mu\mapsto p^\mu:=\mu(p)\in T(K_0).$
There is a map $\kappa_G:G(K_0)\to \pi_1(G)_{\Gamma_{\mathbb{Q}_p}}$ constructed as follows. For an element $b\in G(K_0)$ there is a unique $\mu'\in X^+_*(T)$ with $b\in \breve{{\cali{K}}}\backslash p^{\mu'}/\breve{{\cali{K}}}$. Then $\kappa_G(b)$ is defined to be $[\mu']$, the induced class of $\mu'$ in $\pi_1(G)_{\Gamma_{\mathbb{Q}_p}}$. This map is a group homomorphism that is well-defined on $\varphi$-conjugacy classes. Moreover, the map constructed in this way descends to the Kottwitz map $\kappa_G:B(G)\to \pi_1(G)_{\Gamma_{\mathbb{Q}_p}}$ that we discussed above.
Recall that associated to a pair $(b,\mu)$ one can associate an affine Deligne--Lusztig variety ${X_G^{\leq\mu}(b)}$. This is a perfect scheme (\cite{Witt}) over ${\rm{Spec}}(k)$ whose $k$-valued points can be described as:
$${X_G^{\leq\mu}(b)}(k)=\left\{g\cdot\breve{{\cali{K}}} \in G(K_0)/\breve{{\cali{K}}}\mid g^{-1}\cdot b\cdot \varphi(g)\in \breve{{\cali{K}}}\backslash p^{\mu'}/\breve{{\cali{K}}}\;with\;\mu'\leq \mu \right\}$$
In \cite{CKV}, \cite{Nie} \cite{Hu-Zhou}, the problem of determining connected components of affine Deligne--Lusztig varieties is thoroughly discussed. Although the description in full generality is complicated, in our situation ($\mathscr{G}$ reductive and $\breve{{\cali{K}}}$ hyperspecial) the problem is completely settled. In the references provided above, the connected components are described in three steps. The first step is to pass to the case of a simple adjoint group and it is done as follows:
\begin{thm}(\cite[Corollary 2.4.2]{CKV})
\label{thm:CKVCartesian}
Let $G^{\mrm{ad}}$ denote the adjoint quotient of $G$, then there are natural maps $w_G$ and $w_{G^{\mrm{ad}}}$ and elements $c_{b,\mu}\in \pi_1(G)$ ($c_{b_{\mrm{ad}},\mu_{\mrm{ad}}}\in \pi_1(G^{\mrm{ad}})$ respectively) well-defined up to multiplication by $\pi_1(G)^{\Gamma_{{\mathbb{Q}_p}}}$ (respectively $\pi_1(G^{\mrm{ad}})^{\Gamma_{{\mathbb{Q}_p}}}$) making the following diagram commutative and Cartesian:
\begin{center}
\begin{tikzcd}
{X_G^{\leq\mu}(b)} \arrow{r}\arrow{d}{w_G}& {X_{G^{\mrm{ad}}}^{\leq\mu_{\mrm{ad}}}(b_{\mrm{ad}})}\arrow{d}{w_{G^{\mrm{ad}}}}\\
\und{c_{b,\mu} \pi_1(G)^{\Gamma_{{\mathbb{Q}_p}}}}\times \mrm{Spec}(k) \arrow{r} & \und{c_{b_{\mrm{ad}},\mu_{\mrm{ad}}}\pi_1(G^{\mrm{ad}})^{\Gamma_{{\mathbb{Q}_p}}}}\times \mrm{Spec}(k)
\end{tikzcd}
\end{center}
\end{thm}
In the statement above the two sets that appear on the lower horizontal arrow should be interpreted as discrete topological groups so that the product is a disjoint union of copies of ${\rm{Spec}}(k)$. Once one reduces the problem to the adjoint case, one can further simplify to the simple adjoint case by observing that if $G=G_1\times G_2$ then we get a decomposition ${X_G^{\leq\mu}(b)}={{X_{G_1}^{\leq \mu_1}(b_1)}}\times_k{{X_{G_2}^{\leq \mu_2}(b_2)}}$. This is how the first step is completed in the references.
The second step of the strategy is to reduce the general simple adjoint group case to the case in which $(b,\mu)$ is HN-indecomposable. In this work we only consider the case in which $(b,\mu)$ is already HN-irreducible which is a stronger condition to being indecomposable. For this reason we do not review this step.
The third and final step is the determination of $\pi_0({X_G^{\leq\mu}(b)})$ when $G$ is simple adjoint and $(b,\mu)$ is HN-irreducible or when it is HN-indecomposable, but not HN-irreducible. Again, we only review the HN-irreducible case.
\begin{thm}(\cite[Theorem 1.1]{Nie}, \cite[Theorem 1.1]{CKV}, \cite[Theorem 8.1]{Hu-Zhou})
\label{thm:CKVsimpleadjoint}
If $(b,\mu)$ is HN-irreducible and $G=G^{\mrm{ad}}$ is simple and adjoint then $w_G:\pi_0({X_G^{\leq\mu}(b)})\to c_{ b,\mu } \pi_1(G^{\mrm{ad}})^{\Gamma_{{\mathbb{Q}_p}}}$ is a bijection.
\end{thm}
We can rephrase these results on connected components in a more geometric form. Let $G^{\mrm{der}}$ denote the derived subgroup of $G$, let $G^{\mrm{ab}}:=G/G^{\mrm{der}}$ the maximal abelian quotient and denote by $\mrm{det}:G\to G/G^{\mrm{der}}$ the quotient map.
\begin{cor}
\label{cor:adlvconnected}
If $G^{\mrm{der}}$ is simply connected and $(b,\mu)$ is HN-irreducible, the natural map $\mrm{det}:{X_G^{\leq\mu}(b)}\to {X_{G^{\mrm{ab}}}^{\leq\mu_{\mrm{ab}}}(b_{\mrm{ab}})}$ induced from $\mrm{det}:G\to G^{\mrm{ab}}$ induces a bijection of connected components $\pi_0({X_G^{\leq\mu}(b)})\cong \pi_0({X_{G^{\mrm{ab}}}^{\leq\mu_{\mrm{ab}}}(b_{\mrm{ab}})})$.
\end{cor}
\begin{rem}
Since ${X_{G^{\mrm{ab}}}^{\leq\mu_{\mrm{ab}}}(b_{\mrm{ab}})}$ is a disjoint union of copies of ${\rm{Spec}}(k)$ and $k$ is algebraically closed, we could say instead that the map ${X_G^{\leq\mu}(b)}\to {X_{G^{\mrm{ab}}}^{\leq\mu_{\mrm{ab}}}(b_{\mrm{ab}})}$ has geometrically connected fibers.
\end{rem}
\subsubsection{The case $G^{\mrm{der}}=G^{\mrm{sc}}$.}
In this subsection, we compute $\pi_0({\rm{Sht}}_{G,b,[\mu],\infty})$ under the assumption that $G$ is unramified, $G^{\mrm{der}}$ is simply connected and $(b,\mu)$ is HN-irreducible.
\begin{sta}
\label{sta:surjectivity}
Let $G$ be as above, the determinant map induces a surjective map of locally spatial diamonds $$\mrm{det}:{\rm{Sht}}_{G,b,[\mu],\infty} \to {\rm{Sht}}_{G^{\mrm{ab}},b^{\mrm{ab}},[\mu^{\mrm{ab}}],\infty}$$
\end{sta}
\begin{proof}
The key point is that since $G^{\mrm{der}}$ is simply connected by Kneser's theorem \cite{Kne} the map of groups $G({\mathbb{Q}_p})\to G^{\mrm{ab}}({\mathbb{Q}_p})$ is surjective. We omit the details.
\end{proof}
\begin{lem}
\label{lem:hyperspeciallevel}
Let $G$ and $(b,\mu)$ be as above, let ${\cali{K}}\subseteq G(\bb{Q}_p)$ be a hyperspecial subgroup. Then $$\mrm{det}:{\rm{Sht}}_{G,b,[\mu],{\cali{K}}}\to {\rm{Sht}}_{G^{\mrm{ab}},b^{\mrm{ab}},[\mu^{\mrm{ab}}],\mrm{det}({\cali{K}})}$$ has geometrically connected fibers.
\end{lem}
\begin{proof}
We can construct an exact sequence $$e\to {\cali{G}}^{\mrm{der}}\to {\cali{G}}\xrightarrow{\mrm{det}} {\cali{G}}^{\mrm{ab}}\to e$$ of reductive groups over ${\mathbb{Z}_p}$.
An application of Lang's theorem proves that $\mrm{det}({\cali{K}})={\cali{G}}^{\mrm{ab}}({\mathbb{Z}_p})$ which is the maximal bounded subgroup of $G^{\mrm{ab}}$. By functoriality of the specialization map, see \cite{Specializ}, we have a commutative diagram:
\begin{center}
\begin{tikzcd}
\mid{\rm{Sht}}_{G,b,[\mu],{\cali{K}}}\times {C}_p\mid \arrow{r}{\mrm{det}}\arrow{d}{\mrm{Sp}_{{\cali{G}}}} & \mid{\rm{Sht}}_{G^{\mrm{ab}},b^{\mrm{ab}},[\mu^{\mrm{ab}}],\mrm{det}({\cali{K}})}\times {C}_p\mid \arrow{d}{\mrm{Sp}_{{\cali{G}}^{\mrm{ab}}}} \\
\mid{X_G^{\leq\mu}(b)}\mid \arrow{r}{\mrm{det}} & \mid{X_{G^{\mrm{ab}}}^{\leq\mu_{\mrm{ab}}}(b_{\mrm{ab}})}\mid
\end{tikzcd}
\end{center}
The vertical maps give bijections of connected components by \Cref{thm:specializtheorem} and the lower horizontal map induces a bijection of connected components by \Cref{cor:adlvconnected}.
\end{proof}
The following proposition is a particular case of an unpublished result of Hansen and Weinstein that follows from the work done in \cite{Hans}. We provide an alternative proof that follows the steps of the analogous statement in \cite[Lemme 6.1.3]{Chen}.
\begin{sta}
\label{pro:Grassmannianisconnected}
Let $G$ be as above and let $(b,\mu)$ be HN-irreducible. Then $\mrm{Gr}_{K_0}^{\leq[\mu]}({\cali{E}}_{b})^\mrm{adm}$ is geometrically connected over $\Spdo{K_0}$.
\end{sta}
\begin{proof}
Let $X$ denote a geometric connected component of ${\rm{Sht}}_{G,b,[\mu],{\cali{K}}}$ for ${\cali{K}}=G({\mathbb{Z}_p})$. By \'etaleness of $\pi_{GM,{\cali{K}}}$ the set $U:=\pi_{GM,{\cali{K}}}(X)$ is a connected open subset of $\mrm{Gr}_{{C}_p}^{\leq[\mu]}({\cali{E}}_b)^\mrm{adm}$. We claim, this open subset doesn't depend on the choice of $X$. This immediately implies $\mrm{Gr}_{{C}_p}^{\leq[\mu]}({\cali{E}}_b)^\mrm{adm}=\pi_{GM,{\cali{K}}}(X)$ and in particular that it is connected.
To prove the claim, take a connected component $X_\infty$ of ${\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdf{{C}_p}$ mapping to $X$. Note that $\pi_{\infty,{\cali{K}}}(X_\infty)=X$ since for groups ${\cali{K}}'\subseteq {\cali{K}}$ of finite index the transition maps ${\rm{Sht}}_{G,b,[\mu],{\cali{K}}'}\times \Spdf{{C}_p}\to {\rm{Sht}}_{G,b,[\mu],{\cali{K}}}\times \Spdf{{C}_p}$ are finite \'etale and surjective.
This implies $U=\pi_{GM,\infty}(X_\infty)$. By \Cref{lem:hyperspeciallevel} $\pi_0({\rm{Sht}}_{G,b,[\mu],{\cali{K}}}\times \Spdf{{C}_p})\to \pi_0({\rm{Sht}}_{G^{\mrm{ab}},b^{\mrm{ab}},[\mu^{\mrm{ab}}],\mrm{det}({\cali{K}})}\times {C}_p)$ is a bijection. Let $X'$ denote some other connected component, and let $z$ and $z'$ denote the elements defined by $X$ and $X'$ in $\pi_0({\rm{Sht}}_{G,b,[\mu],{\cali{K}}}\times \Spdf{{C}_p})$. Now, $G^{\mrm{ab}}(\bb{Q}_p)$ and $G^{\mrm{ab}}({\mathbb{Q}_p})/\mrm{det}({\cali{K}})$ act transitively on $\pi_0({\rm{Sht}}_{G^{\mrm{ab}},b^{\mrm{ab}},[\mu^{\mrm{ab}}],\infty}\times \Spdf{{C}_p})$ and $\pi_0({\rm{Sht}}_{G^{\mrm{ab}},b^{\mrm{ab}},[\mu^{\mrm{ab}}],\mrm{det}({\cali{K}})}\times \Spdf{{C}_p})$ respectively.
This allow us to find an element $g\in G(\bb{Q}_p)$ with $\mrm{det}(z)\cdot \mrm{det}(g)=\mrm{det}(z')$. Now $\pi_{\infty,{\cali{K}}}(X_\infty\cdot g)=X'$, which proves $\pi_{GM,{\cali{K}}}(X)=\pi_{GM,{\cali{K}}}(X')$ by equivariance of $\pi_{GM,\infty}$.
\end{proof}
\begin{lem}
\label{lem:Kdertransitive}
Let ${\cali{K}}$ be a hyperspecial subgroup of $G(\bb{Q}_p)$ and let ${\cali{K}}^{\mrm{der}}={\cali{K}}\cap G^{\mrm{der}}(\bb{Q}_p)$. Let $m\in \pi_0(\ShtGab{\infty}\times \Spdf{{C}_p})$ and let $X_m=\mrm{det}^{-1}(m)$.
Then ${\cali{K}}^{\mrm{der}}$ acts transitively on $\pi_0(X_m)$.
\end{lem}
\begin{proof}
Since $\ShtGab{\infty}\times \Spdo{{C}_p}$ is $0$-dimensional, the space $X_m$ is the collection of connected components of $\ShtG{\infty}\times \Spdo{{C}_p}$ that map to $m$. Let $x,y\in \pi_0(X_m)$, using \Cref{lem:hyperspeciallevel} we see that $\pi_{\infty,{\cali{K}}}(x)=\pi_{\infty,{\cali{K}}}(y)$, we let $z$ denote this connected component. Since $\ShtG{\infty}\times \Spdo{{C}_p}$ is a $\und{{\cali{K}}}$-torsor over $\ShtG{{\cali{K}}}\times \Spdo{{C}_p}$, ${\cali{K}}$ acts transitively on the set of connected components of $\ShtG{\infty}\times \Spdo{{C}_p}$ over $z$. In particular, there is an element $g\in {\cali{K}}$ with $x\cdot g=y$. Since $\mrm{det}(x)=\mrm{det}(y)$ we must have that $ m \cdot \mrm{det}(g)=m$, but the action of $G^{\mrm{ab}}(\bb{Q}_p)$ on $\pi_0(\ShtG{\infty}\times \Spdo{{C}_p})$ is simple so $\mrm{det}(g)=e$ and $g\in G^{\mrm{der}}(\bb{Q}_p)$ as we wanted to show.
\end{proof}
We can now describe connected components at infinite level.
\begin{thm}
\label{thm:maintheorem}
Suppose $G$ is an unramified group over ${\mathbb{Q}_p}$, that $G^{\mrm{der}}$ is simply connected and that $(b,\mu)$ is HN-irreducible, then the determinant map $$\mrm{det}_{\infty,\infty}:{\rm{Sht}}_{G,b,[\mu],\infty} \to {\rm{Sht}}_{G^{\mrm{ab}},b^{\mrm{ab}},[\mu^{\mrm{ab}}],\infty}$$ has connected geometric fibers.
\end{thm}
\begin{proof}
Since $\ShtGab{\infty}\times \Spdo{{C}_p}$ is isomorphic to $\und{G^{\mrm{ab}}({\mathbb{Q}_p})}\times \Spdo{{C}_p}$, we may prove instead that the determinant map induces a bijection $$\pi_0(\mrm{det}):\pi_0(\ShtG{\infty}\times \Spdo{{C}_p})\to \pi_0(\ShtGab{\infty}\times \Spdo{{C}_p}).$$
Let $x\in \pi_0(\ShtG{\infty}\times \Spdo{{C}_p})$. Given $K$ a finite extension of $K_0$ we let $x_K$ denote the image of $x$ on $\pi_0(\ShtG{\infty}\times \Spdo{K})$ and let $f:\Spdo{K}\to \mrm{Gr}^{\leq[\mu]}({\cali{E}}_b)^\mrm{adm}$ be a point whose associated crystalline representation is as in \Cref{cor:MainChen}. Let $S_f:={\mrm{Triv}}(f^*(\bb{L}))$ the geometric realization of $f^*\bb{L}$. This space is also the fiber over $f$ of the infinite level Grothendieck--Messing period map. Let $s\in \pi_0(S_f)$ be an element mapping to $x_K$. In summary we have taken a commutative diagram as follows:
\begin{center}
\begin{tikzcd}
* \arrow{r}{x} \arrow{d}{s}\arrow[swap]{rd}{x_K} & \pi_0(\ShtG{\infty}\times \Spdo{{C}_p}) \arrow{d} \\
\pi_0(S_f) \arrow{r}{f} & \pi_0(\ShtG{\infty}\times \Spdo{K})
\end{tikzcd}
\end{center}
We let $G^{\mrm{der}}_x$ (respectively $G^{\mrm{der}}_{x_K}$ and $G^{\mrm{der}}_s$) denote the stabilizer in $G^{\mrm{der}}(\bb{Q}_p)$ of its action on $\pi_0(\ShtG{\infty}\times \Spdo{{C}_p})$ (respectively $\pi_0(\ShtG{\infty}\times \Spdo{K})$ and $\pi_0(S_f)$).
We have inclusions $G^{\mrm{der}}_x,G^{\mrm{der}}_s\subseteq G^{\mrm{der}}_{x_K}$ and by Chen's \Cref{thm:Chensthm} (\Cref{lem:localsystemtoconnectedcomp}) $G^{\mrm{der}}_s$ is an open subgroup of $G^{\mrm{der}}(\bb{Q}_p)$. By \Cref{lem:Kdertransitive}, $G^{\mrm{der}}_x\cdot {\cali{K}}^{\mrm{der}}=G^{\mrm{der}}(\bb{Q}_p)$ which implies that $G^{\mrm{der}}_{x_K}\cdot {\cali{K}}^{\mrm{der}}=G^{\mrm{der}}(\bb{Q}_p)$ as well. In particular, the projection map ${\cali{K}}^{\mrm{der}}\to G^{\mrm{der}}(\bb{Q}_p)/G^{\mrm{der}}_{x_K}$ is surjective. Since $G^{\mrm{der}}(\bb{Q}_p)/G^{\mrm{der}}_{x_K}$ has the discrete topology and ${\cali{K}}^{\mrm{der}}$ is compact, we get that $G^{\mrm{der}}_{x_K}$ is closed and of finite index within $G^{\mrm{der}}(\bb{Q}_p)$. Moreover, since $G^{\mrm{der}}$ is quasi-split (even unramified) all of the simple factors of $G^{\mrm{der}}$ are isotropic. By Margulis theorem
\cite[Chapter II, Theorem 5.1]{Marg} we can conclude that $G^{\mrm{der}}_{x_K}=G^{\mrm{der}}({\mathbb{Q}_p})$. Since the argument doesn't depend on the choice of $x$ the action of $G^{\mrm{der}}(\bb{Q}_p)$ on $\pi_0(\ShtG{\infty}\times \Spdo{K})$ is trivial.
Now, $\Spdo{{C}_p}=\varprojlim \Spdo{K}$ and we may use \cite[Lemma 11.22]{Et} to compute the action map
$$|\ShtG{\infty}\times \Spdo{{C}_p}|\times G^{\mrm{der}}({\mathbb{Q}_p}) \to |\ShtG{\infty}\times \Spdo{{C}_p}|$$
as the limit of the action maps
$$\varprojlim_{K\subseteq {C}_p}[ |\ShtG{\infty}\times \Spdo{K}| \times G^{\mrm{der}}({\mathbb{Q}_p}) \to |\ShtG{\infty}\times \Spdo{K}|].$$
Since in the transition maps $|\ShtG{\infty}\times \Spdo{K_1}|\to |\ShtG{\infty} \times \Spdo{K_2}|$ every connected component on the source surjects onto a connected component on the target we get $\pi_0(\ShtG{\infty}\times \Spdo{{C}_p})=\varprojlim \pi_0(\ShtG{\infty}\times \Spdo{K})$. This proves that $G^{\mrm{der}}(\bb{Q}_p)$ acts trivially on the set of connected components and defines a transitive action of $G^{\mrm{ab}}(\bb{Q}_p)$ on $\pi_0(\ShtG{\infty}\times \Spdo{{C}_p})$. In turn this proves $\pi_0(\mrm{det})$ is bijective.
\end{proof}
\begin{cor}
For $G$, $b$ and $\mu$ as in \Cref{thm:maintheorem} and any compact subgroup ${\cali{K}}\subseteq G(\bb{Q}_p)$ the map
$$\ShtG{{\cali{K}}}\to \ShtGab{\mrm{det}({\cali{K}})}$$ has non-empty connected geometric fibers.
\end{cor}
\begin{proof}
This follows from the identity $\ShtG{{\cali{K}}}=\ShtG{\infty}/\und{{\cali{K}}}$ and that $\pi_0$ is a left adjoint.
\end{proof}
Using functoriality and equivariance for the three actions we can describe the actions by the three groups on $\pi_0(\ShtG{\infty}\times {C}_p)$ in the spirit of \Cref{thm:mainTori}.
\begin{thm}(Compare with \cite[Proposition 4.1]{ChenDet})
\label{thm:mainthreeactionssimplyconn}
Let $G$, $b$ and $\mu$ as in \Cref{thm:maintheorem}. Let $E\subseteq {C}_p$ be the field of definition of $[\mu]$, let ${{\mrm{Art}}}_{K_0,E}:W^{K_0}_E\to E^\times$ be as in \Cref{thm:mainTori}, let ${\mrm{Nm}}_{\mu^{\mrm{ab}}}:\mrm{Res}_{E/{\mathbb{Q}_p}}(\bb{G}_m)\to G^{\mrm{ab}}$ be the norm map associated to $\mu^{\mrm{ab}}$ then:
\begin{enumerate}
\item The $G({\mathbb{Q}_p})$ right action on $\pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times {C}_p)$ makes it a trivial right $G^{\mrm{ab}}({\mathbb{Q}_p})$-torsor.
\item If $s\in \pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times {C}_p)$ and $j\in J_b({\mathbb{Q}_p})$ then $$s\cdot_{J_b({\mathbb{Q}_p})} j=s\cdot_{G^{\mrm{ab}}({\mathbb{Q}_p})} \mrm{det}(j^{-1}))$$ where $\mrm{det}=j_{b^{\mrm{ab}}}\circ \mrm{det}_b$ with $\mrm{det}_b:J_b({\mathbb{Q}_p})\to J_{b^{\mrm{ab}}}({\mathbb{Q}_p})$ the map obtained from functoriality of the formation of $J_b$, respectively $J_{b^{\mrm{ab}}}$, and where the map $j_{b^{\mrm{ab}}}$ is the isomorphism $j_{b^{\mrm{ab}}}:J_{b^{\mrm{ab}}}({\mathbb{Q}_p})\cong G^{\mrm{ab}}({\mathbb{Q}_p})$ obtained from regarding $J_{b^{\mrm{ab}}}({\mathbb{Q}_p})$ as a subgroup of $G^{\mrm{ab}}(K_0)$.
\item If $s\in \pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times {C}_p)$ and $\gamma \in W^{K_0}_E$ then $$s\cdot_{W^{K_0}_E} \gamma =s\cdot_{G^{\mrm{ab}}({\mathbb{Q}_p})} [{\mrm{Nm}}_{\mu^{\mrm{ab}}}\circ {\mrm{Art}}_{K_0,E}(\gamma)].$$
\end{enumerate}
\end{thm}
\subsubsection{z-extensions.}
In this subsection, we extend \Cref{thm:maintheorem} to the case in which $G^{\mrm{der}}$ is not necessarily simply connected, but we still assume that $G$ is unramified and $(b,\mu)$ is HN-irreducible. In what follows, we will denote by $G^{\mrm{sc}}$ the central simply connected cover of $G^{\mrm{der}}$ and we denote by $G^\circ=G({\mathbb{Q}_p})/\mrm{Im}(G^{\mrm{sc}}({\mathbb{Q}_p}))$. Notice that when $G^{\mrm{der}}$ is simply connected $G^\circ=G^{\mrm{ab}}({\mathbb{Q}_p})$. In general, $G^\circ$ surjects onto $G^{\mrm{ab}}({\mathbb{Q}_p})$ and the kernel is a finite group.
Recall the following definition used extensively by Kottwitz:
\begin{defi}
A map of connected reductive groups $f:G'\to G$ is a z-extension if: $f$ is surjective, $Z=ker(f)$ is central in $G'$, $Z$ is isomorphic to a product of tori of the form $\mrm{Res}_{F_i/{\mathbb{Q}_p}}\bb{G}_m$ for some finite extensions $F_i\subseteq \ov{\bb{Q}}_p$ and $G'$ has simply connected derived subgroup.
\end{defi}
By \cite[Lemma 1.1]{RationalConj} whenever $G$ is an unramified group over ${\mathbb{Q}_p}$ that splits over $\bb{Q}_{p^s}$, there exists a $z$-extension $G'\to G$ with $Z$ isomorphic to a product of tori of the form $\mrm{Res}_{\bb{Q}_{p^s}/{\mathbb{Q}_p}}\bb{G}_m$. In particular, it is unramified as well.
In \cite{Kott} Kottwitz proves that for any reductive group $G$ and cocharacter $\mu$ the natural morphism $B(G)\to B(G^{\mrm{ad}})$ induces a bijection $B(G,\mu)\cong B(G^{\mrm{ad}},\mu^{\mrm{ad}})$. From here one can deduce the following statement.
\begin{lem}
\label{lem:zextensionlemma}
Let $A\subseteq T\subseteq B\subseteq G$ as in the notation section. Assume that $\bb{Q}_{p^s}$ is a splitting field for $G$. Let $\mu\in X_*^+(T)$, $[b]\in B(G,\mu)$, and $f:G'\to G$ a $z$-extension with $Z=ker(f)$ isomorphic to a finite product of copies of $\mrm{Res}_{\bb{Q}_{p^s}/{\mathbb{Q}_p}}\bb{G}_m$. Let $T'=f^{-1}(T)$ denote the maximal torus of $G'$ projecting onto $T$. Then:
\begin{enumerate}
\item For any choice of $\mu'\in X_*(T')^+$ lifting $\mu$ there is a unique lift $[b']\in B(G')$ lifting $[b]$ with $[b']\in B(G',\mu')$.
\item For $b'$ and $\mu'$ as in the previous claim $(b,\mu)$ is HN-irreducible if and only if $(b',\mu')$ is HN-irreducible.
\item If $E$ is the field of definition of $\mu$ with ${\mathbb{Q}_p}\subseteq E\subseteq \bb{Q}_{p^s}$ then there is a lift $\mu'\in X_*(T')^+$ with field of definition $E$.
\end{enumerate}
\end{lem}
\begin{proof}
The first claim follows directly from the identifications $B(G,\mu)=B(G^{\mrm{ad}},\mu^{\mrm{ad}})=B(G',\mu')$.
The second claim follows from the first claim, from the fact that $Z:=ker(f)$ is central and from the fact that HN-irreducibility can be checked on the adjoint quotient.
For the third claim consider the exact sequence of $\Gamma_{\mathbb{Q}_p}$-modules:
$$e\to X_*(Z)\to X_*(T')\to X_*(T)\to e$$
One can use Shapiro's lemma to prove $X_*(T')^{\Gamma_E}\to X_*(T)^{\Gamma_E}$ is surjective.
\end{proof}
\begin{sta}
\label{pro:centralpreservecool}
Suppose that $G'$ is an unramified group, $(b',\mu')$ a pair with $[b']\in B(G',\mu')$, suppose that $Z\subseteq G'$ is a central torus, and let $G=G'/Z$ with projection map $f:G'\to G$. Let $b=f(b')$ and $\mu'=f\circ \mu$ the following hold:
\begin{enumerate}
\item $\mrm{Gr}^{\leq[\mu']}({\cali{E}}_{b'})\to \mrm{Gr}^{\leq[\mu]}({\cali{E}}_b)$ is an isomorphism.
\item $\mrm{Gr}^{\leq[\mu']}({\cali{E}}_{b'})^\mrm{adm}\to \mrm{Gr}^{\leq[\mu]}({\cali{E}}_b)^\mrm{adm}$ is an isomorphism.
\item If $\bb{L}_{G'}$ (respectively $\bb{L}_G$) denotes the pro-\'etale $\und{G'({\mathbb{Q}_p})}$-torsor (respectively $\und{G({\mathbb{Q}_p})}$-torsor) then $\bb{L}_G=f_*\bb{L}_{G'}$.
\end{enumerate}
\end{sta}
\begin{proof}
We omit the details.
\end{proof}
\begin{sta}
\label{pro:zextensionset}
If $(b,\mu)$ is HN-irreducible then the following hold:
\begin{enumerate}
\item $\mrm{Gr}^{\leq[\mu]}({\cali{E}}_{b})^\mrm{adm}\times \Spdo{{C}_p}$ is connected
\item The right action of $G({\mathbb{Q}_p})$ on $\pi_0(\ShtG{\infty}\times \Spdo{{C}_p})$ makes this set into a $G^\circ$-torsor.
\end{enumerate}
\end{sta}
\begin{proof}
Using \Cref{lem:zextensionlemma} we may find a z-extension $f:G'\to G$ and lift $(b,\mu)$ to a pair $(b',\mu')$ over $G'$ which is also HN-irreducible. The first claim now follows from \Cref{pro:centralpreservecool} and by \Cref{pro:Grassmannianisconnected} applied to $G'$.
Let $Z=Ker(f)$,
the map $f:G'({\mathbb{Q}_p})\to G({\mathbb{Q}_p})$ is surjective. This together with \Cref{pro:centralpreservecool} gives that $f:{\rm{Sht}}_{G',b',[\mu'],\infty}\times \Spdo{{C}_p}\to {\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p} $
is a $\und{Z({\mathbb{Q}_p})}$-torsor. In particular, the map of sets of connected components is also surjective. Since $\mrm{Gr}^{\leq[\mu]}({\cali{E}}_{b})^\mrm{adm}$ is connected the action of $G({\mathbb{Q}_p})$ on $\pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p})$ is transitive. Let $x\in \pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p})$ and denote by $G_x$ the stabilizer of $x$ in $G({\mathbb{Q}_p})$. Let $y\in \pi_0({\rm{Sht}}_{G',b',[\mu'],\infty}\times \Spdo{{C}_p})$ a lift of $x$, we have $\mrm{Im}(G_y)=\mrm{Im}(G_y\cdot Z({\mathbb{Q}_p}))=G_x$.
By \Cref{thm:maintheorem} the stabilizer of $y$ in $G'({\mathbb{Q}_p})$ is $(G')^{\mrm{der}}({\mathbb{Q}_p})$, so $G_x=\mrm{Im}((G')^{\mrm{der}}({\mathbb{Q}_p}))=\mrm{Im}(G^{\mrm{sc}}({\mathbb{Q}_p}))$.
\end{proof}
We describe the action of $J_b({\mathbb{Q}_p})$ and $W^{K_0}_E$ on $\pi_0(\ShtG{\infty}\times \Spdo{{C}_p})$ in terms of the action of $G^\circ$. We begin with $J_b({\mathbb{Q}_p})$. We first construct a map $\mrm{det}^\circ:J_b({\mathbb{Q}_p}) \to G^\circ$ generalizing the determinant map $\mrm{det}:J_b({\mathbb{Q}_p})\to G^{\mrm{ab}}({\mathbb{Q}_p})$ of \Cref{thm:mainthreeactionssimplyconn} as follows.
Given $G$ and $b\in G(K_0)$ we choose an unramified z-extension $f:G'\to G$ and a lift $b'\in G'(K_0)$ with $f(b')=b$. Let $Z=Ker(f)$. We get a sequence of maps of reductive groups $$e\to Z\to J_{b'} \to J_b\to e.$$
By Shapiro's lemma $J_{b'}({\mathbb{Q}_p})\to J_b({\mathbb{Q}_p})$ is surjective. We can construct the following commutative diagram of topological groups:
\begin{center}
\begin{tikzcd}
Z({\mathbb{Q}_p})\arrow{r}\arrow{d} & G'({\mathbb{Q}_p}) \arrow{r}{f}\arrow{d}& G({\mathbb{Q}_p})\arrow{d} \\
J_{b'}({\mathbb{Q}_p}) \arrow{r}{\mrm{det}}\arrow{rd}\arrow{dd}{f} & (G')^{\mrm{ab}}({\mathbb{Q}_p}) \arrow{r}{f^{\mrm{ab}}}& G^\circ \\
&J_{b'^{\mrm{ab}}}({\mathbb{Q}_p}) \arrow{u}{\cong_{j}}& \\
J_b({\mathbb{Q}_p}) \arrow[bend right, swap]{rruu}{\mrm{det}^\circ} & &
\end{tikzcd}
\end{center}
Now, $\mrm{det}^\circ$ is defined as the unique morphism that could make this diagram commutative. More explicitly, if $j\in J_b({\mathbb{Q}_p})$ we pick a lift $j'\in J_{b'}({\mathbb{Q}_p})$, and we define $\mrm{det}^\circ(j):=f^{\mrm{ab}}(\mrm{det}(j'))$. One can verify this doesn't depend on any of the choices made
Let $x\in \pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p})$ and let $y\in \pi_0({\rm{Sht}}_{G',b',[\mu'],\infty}\times \Spdo{{C}_p})$ be a lift of $x$. Let $j\in J_b({\mathbb{Q}_p})$, and let $j'\in J_{b'}({\mathbb{Q}_p})$ be an element lifting $j$. We compute:
\begin{equation*}
\begin{split}
x\cdot_{J_b({\mathbb{Q}_p})} j =f(y\cdot_{J_{b'}({\mathbb{Q}_p})} j') =f(y\cdot_{G'({\mathbb{Q}_p})} j_{b'}(\mrm{det}_{b'}(j^{-1})))
& = x\cdot_{G^\circ}\mrm{det}^\circ(j^{-1})
\end{split}
\end{equation*}
We now describe the action of $W^{K_0}_E$, we need a variant of the norm map discussed for tori. Given a connected reductive group $G$ and a conjugacy class of cocharacters $[\mu]$ with reflex field $E$ we define a norm map ${\mrm{Nm}}^\circ_{[\mu]}:E^\times \to G^\circ$ as follows. Since is $G$ is quasi-split we may fix ${\mathbb{Q}_p}$-rationally defined Borel a maximal torus $T\subseteq B\subseteq G$ and the unique dominant cocharacter $\mu\in X_*^+(T)$ representing $[\mu]$ and defined over $E$. We get a norm map ${{\mrm{Nm}}}_{\mu}:E^\times \to T({\mathbb{Q}_p})$ and we may define ${\mrm{Nm}}^\circ_{[\mu]}$ as the composition:
$${\mrm{Nm}}^\circ_{[\mu]}:E^\times \xrightarrow{{\mrm{Nm}}_\mu} T({\mathbb{Q}_p})\to G({\mathbb{Q}_p})\to G^\circ.$$
\begin{sta}
With notation as in \Cref{pro:zextensionset} the action of $W^{K_0}_E$ on $\pi_0(\ShtG{\infty}\times \Spdo{{C}_p})$ is given by the map ${\mrm{Nm}}^\circ_{[\mu]}\circ {\mrm{Art}}_{K_0,E}:W^{K_0}_E\to G^\circ$. More precisely, if $x\in \pi_0(\ShtG{\infty}\times \Spdo{{C}_p})$ and $\gamma\in W^{K_0}_E$ then: $$ x\cdot_{W^{K_0}_E} \gamma=x\cdot_{G^\circ} {\mrm{Nm}}^\circ_{[\mu]}({\mrm{Art}}_{K_0,E}(\gamma)).$$
\end{sta}
\begin{proof}
Let $f:G'\to G$ be a $z$-extension, let $(b',\mu')$ be a pair lifting $(b,\mu)$, and let $Z=ker(f)$. By \Cref{lem:zextensionlemma} we can choose $G'$ and $\mu'$ so that $\mu'$ has the same field of definition as $\mu$.
Choose $A\subseteq T\subseteq B\subseteq G$ as above and let $T'=f^{-1}(T)$.
Consider the following commutative diagram of spaces.
\begin{center}
\begin{tikzcd}
{\rm{Sht}}_{G',b',[\mu'],\infty} \arrow{r}\arrow{d} & {\rm{Sht}}_{(G')^{\mrm{ab}},b'^{\mrm{ab}},[\mu'],\infty} &\arrow{l} \arrow{d}{\rm{Sht}}_{T',b_{\mu'},[\mu'],\infty} \\
{\rm{Sht}}_{G,b,[\mu],\infty} & & {\rm{Sht}}_{T,b_\mu,[\mu],\infty}
\end{tikzcd}
\end{center}
Since $G'$ is simply connected we get an equivariant bijection of geometric connected components $$\pi_0({\rm{Sht}}_{G',b',[\mu'],\infty}\times \Spdo{{C}_p})\to \pi_0({\rm{Sht}}_{(G')^{\mrm{ab}},b'^{\mrm{ab}},[\mu'^{\mrm{ab}}],\infty}\times \Spdo{{C}_p}).$$
After forming geometric connected components and choosing a base point $x\in \pi_0({\rm{Sht}}_{T',b_{\mu'},[\mu'],\infty}\times \Spdo{{C}_p})$ the above diagram looks like this:
\begin{center}
\begin{tikzcd}
x\cdot G'^{\mrm{ab}}({\mathbb{Q}_p}) \arrow{r}{\cong} \arrow{d} & x\cdot G'^{\mrm{ab}}({\mathbb{Q}_p}) & \arrow{l} x\cdot T'({\mathbb{Q}_p}) \arrow{d} \\
x\cdot G^\circ & & x\cdot T({\mathbb{Q}_p})
\end{tikzcd}
\end{center}
All of the maps are equivariant with respect to the groups involved. Since the map $T'({\mathbb{Q}_p})\to G^\circ$ factors through the map $T'({\mathbb{Q}_p})\to T({\mathbb{Q}_p})$, we get a canonical surjective and $W^{K_0}_E$-equivariant map $$\pi_0({\rm{Sht}}_{T,b_\mu,[\mu],\infty}\times \Spdo{{C}_p})\to \pi_0({\rm{Sht}}_{G,b,[\mu],\infty}\times \Spdo{{C}_p}).$$
By \Cref{thm:mainTori}, the action on $\pi_0({\rm{Sht}}_{T,b_\mu,[\mu],\infty})$ is through ${\mrm{Nm}}_\mu\circ {\mrm{Art}}_{K_0,E}$. By definition of ${\mrm{Nm}}^\circ_{[\mu]}$ the action of $W^{K_0}_E$ on $\pi_0(\ShtG{\infty}\times \Spdo{{C}_p})$ is through ${\mrm{Nm}}^\circ_{[\mu]}\circ {\mrm{Art}}_{K_0,E}$.
\end{proof}
\section{The specialization map for moduli spaces of $p$-adic shtukas}
For some background on specialization maps for v-sheaves we refer the reader to \cite{Specializ}. We will freely use some of the terminology defined in that work.
\subsection{$G$-torsors, lattices and shtukas.}
In this section we recall the integral theory of vector bundles over the Fargues-Fontaine curve, and point to the technical statements that allow us to discuss the specialization map for the $p$-adic Beilinson--Drinfeld Grassmannians and moduli spaces of $p$-adic shtukas. Nothing in this subsection is new and it is all written in some form in \cite{Ber2}, \cite{Ked}, \cite{FF}, \cite{Ans2}. Nevertheless, we need specific formulations for some of these results that are not explicit in the literature.
\subsubsection{Vector bundles on $\Y{}$.}
\begin{defi}
\label{defi:Y}
Given a perfectoid Huber pair $\Hub{R}$ and a pseudo-uniformizer $\varpi\in R^+$, we define $\Yinf{R^+}$ as $\Spf{W(R^+)}\setminus V([\varpi])$. Here $[\varpi]$ denotes a Teichm\"uller lift of $\varpi$, and $W(R^+)$ is given the $(p,[\varpi])$-adic topology. We let $\Y{R^+}$ denote $\Spf{W(R^+)}\setminus V(p,[\varpi])$.
\end{defi}
We review the geometry of $\Y{R^+}$, fix a pseudo-uniformizer $\varpi\in R^+$. One defines a continuous map $\kappa_{\varpi}: |\Y{R^+}|\to [0,\infty]$ characterized by the property that $\kappa(y)=r$ if and only if for any positive rational number $r\leq \frac{m}{n}$ the inequality $|p|_y^m\leq |[\varpi]|_y^n$ holds and for any positive rational number $\frac{m}{n}\leq r$ the inequality $|[\varpi]|_y^n\leq |p|_y^m$ holds.
Given an interval $I\subseteq [0,\infty]$ we denote by $\Yint{R^+}{I}$ the open subset corresponding to the interior of $\kappa_{\varpi}^{-1}(I)$.
For intervals of the form $[0,\frac{h}{d}]$ where $h$ and $d$ are integers the space $\Yint{R^+}{[0,\frac{h}{d}]}$ is represented by $\Spa{R'}$ corresponding to the rational localization, $\{x\in \Spf{W(R^+)}\mid |p^h|_x \leq |[\varpi]^d|_x\neq 0\}$.
In this case, we can compute $R'^+$ explicitly as the $[\varpi]$-adic completion of $W(R^+)[\frac{p^h}{[\varpi]^d}]$ and $R'$ as $R'^+[\frac{1}{[\varpi]}]$. A direct computation shows that $R'$ does not depend of $R^+$. In particular, the exact category of vector bundles over $\Yinf{R^+}$ does not depend of the choice of $R^+$ either.
Recall the algebraic version of $\Y{R^+}$, which we will denote $\Yal{R^+}$ and define as $\mrm{Spec}(W(R^+))\setminus V(p,[\varpi])$. Since $W(R^+)\subseteq \cali{O}_{\Y{R^+}}$ and since $p$, $[\varpi]$, do not vanish simultaneously on $\Y{R^+}$ we get a map of locally ringed spaces $f:\Y{R^+}\to \Yal{R^+}\subseteq \mrm{Spec}(W(R^+))$.
Recall that given an untilt $R^\sharp$ of $R$ there is a canonical surjection $W(R^+)\to R^{\sharp +}$ whose kernel is generated by an element $\xi\in W(R^+)$ primitive of degree $1$ \cite[Lemma 6.2.8]{Ber2}. The element $\xi$ defines a closed Cartier divisor over $\Y{R^+}$ and also defines a Cartier divisor on the scheme $\Yal{R^+}$.
Recall the GAGA-type theorem of Kedlaya and Liu:
\begin{thm}\textup{(\cite[Theorem 3.8]{KedAinf})}
\label{thm:gagatypekedlay}
Suppose $\Hub{R}$ is a perfectoid Huber pair in characteristic $p$. The natural morphisms of locally ringed spaces $f:\Y{R^+}\to \Yal{R^+}$ gives, via the pullback functor $f^*:\mrm{Vec}_{\Yal{R^+}}\to \mrm{Vec}_{\Y{R^+}}$, an exact equivalence of exact categories.
\end{thm}
\begin{rem}
\label{rem:exactness}
Although the reference does not explicitly claim that this equivalence is exact, one can simply follow the proof loc. cit. exchanging the word ``equivalence'' by ``exact equivalence'' since every arrow involved in the proof is an exact functor.
\end{rem}
\begin{cor}
\label{cor:gagatypekedlymeoro}
With the notation as above, the pullback $f^*$ induces an equivalence
$$f^*:(\mrm{Vec}_{Y_{R^+}^{\xi\neq 0}})^\mrm{mer}\to (\mrm{Vec}_{\cali{Y}_{R^+}^{\xi\neq 0}})^\mrm{mer}$$
between the category whose objects are vector bundles over $\Y{R^+}$ (respectively vector bundles over $\Yal{R^+}$) and morphisms are functions meromorphic along the ideal $(\xi)$ (respectively functions over $\Yal{R^+}\setminus V(\xi)$).
\end{cor}
Since one can define $\mathscr{G}$-torsors Tannakianly these statements immediately generalize to those for $\mathscr{G}$-torsors. Kedlaya proves another important statement.
\begin{thm}\textup{(\cite[Lemma 2.3, Theorem 2.7, Remark 3.11]{KedAinf})}
\label{thm:puncturedtoAinfked}
\label{detail:checkkedlayasproof}
With notation as above, and letting $j$ be the open embedding, $j:\Yal{R^+}\to \mrm{Spec}(W(R^+))$ the following statements hold:
\begin{enumerate}
\item The pullback functor $j^*:\mrm{Vec}_{\mrm{Spec}(W(R^+))}\to \mrm{Vec}_{\Yal{R^+}}$ is fully-faithful.
\item If $R^+$ is a valuation ring then $j^*$ is an equivalence.
\item Taking categories of quasi-coherent sheaves the adjunction morphism $j^*j_*\cali{V}\to \cali{V}$ is an isomorphism.
\end{enumerate}
\end{thm}
We will need a small modification of \Cref{thm:puncturedtoAinfked}.
\begin{defi}
\label{defi:prodpoints}
Given a set $I$ and a collection of tuples $\{\Hub{C_i},\varpi_i\}_{i\in I}$ we construct an adic space $\Spa{R}$. Here each $C_i$ is an algebraically closed nonarchimedean field, the $C_i^+$ are open and bounded valuation subrings of $C_i$, and $\varpi_i$ is a choice of pseudo-uniformizer. We let $R^+:=\prod_{i\in I} C^+_i$, we let $\varpi=(\varpi_i)_{i\in I}$, we endow $R^+$ with the $\varpi$-adic topology and we let $R:=R^+[\frac{1}{\varpi}]$. Any space constructed in this way will be called a product of points.
\end{defi}
The following statement is implicitly used and proved in (\cite[Theorem 25.1.2]{Ber2}).
\begin{pro}
\label{pro:puncturedAinfprodofpoints}
Let $\Spa{R}$ be the product of points associated to $\{\Hub{C_i}, \varpi_i\}_{i\in I}$ as in \Cref{defi:prodpoints}. The pullback functor $j^*:\mrm{Vec}_{\mrm{Spec}(W(R^+))}\to \Yal{R^+}$ gives an equivalence of categories of vector bundles with fixed rank.
\end{pro}
Given $\xi\in W(R^+)$ primitive of degree $1$ as before, observe that since both $\mrm{Spec}(W(R^+))$ and $\Yal{R^+}$ are qcqs schemes the equivalence of vector bundles of \Cref{pro:puncturedAinfprodofpoints} generalizes to the categories where the objects are the same, but morphism are allowed to have poles along $\xi$ on both categories. \\
Interestingly, extending $\mathscr{G}$-torsors from $\Yal{R^+}$ to $\mrm{Spec}(W(R^+))$ adds yet another layer of complexity. Indeed, the equivalences of \Cref{thm:puncturedtoAinfked} and \Cref{pro:puncturedAinfprodofpoints} are not exact equivalences, so Tannakian formalism can't be used directly. As a matter of fact, only the pullback functor $j^*$ is exact. J. Ansch\"utz gives a detailed study of the problem of extending $\mathscr{G}$-torsors along $j$ in \cite{Ans2}.
\begin{thm}\textup{(\cite[Proposition 11.5]{Ans2})}
\label{pro:prodpointextendg-tors}
\label{thm:anschutzgoodloci}
Let $\Spa{R}$ be a product of points over $k$. Every $\mathscr{G}$-torsor ${\cali{T}}$ over $\Yal{R^+}$ extends along $j:\Yal{R^+}\to \mrm{Spec}(W(R^+))$ to a torsor $\mathscr{G}$ torsor over $\mrm{Spec}(W(R^+))$.
\end{thm}
We use the following descent result repeatedly.
\begin{pro}\textup{(\cite[Proposition 19.5.3]{Ber2})}
\label{pro:descendalongcurve}
Let $S$ be a perfectoid space over $k$ and let $U\subseteq \Yinf{S}$ be an open subset. For map of perfectoid spaces $f:S'\to S$, let $\mathcal{C}_{S'}$ denote the category of $\mathscr{G}$-torsors over $\Yinf{S'}\times_\Yinf{S} U$. Then the assignment $S'\mapsto \mathcal{C}_{S'}$, as a fibered category over $\mrm{Perf}_S$, is a v-stack.
\end{pro}
\subsubsection{Lattices and shtukas.}
For this section, fix $\Spa{R}$ an affinoid perfectoid space over $k$, $\varpi\in R^+$ a choice of pseudo-uniformizer, $R^\sharp$ an untilt of $R$ and $\xi_{R^\sharp}$ a generator for the kernel of the map $W(R^+)\to R^{\sharp,+}$.
\begin{defi}
\label{defi:latticesGstructure}
We define the groupoid of $B^+_\mrm{dR}(R^\sharp)$-lattices with $\mathscr{G}$-structure to have as objects pairs $({\cali{T}},\psi)$ where ${\cali{T}}$ is a $\mathscr{G}$-torsor over $\Yinf{R^+}$ and $\psi:{\cali{T}}\to\mathscr{G}$ is an isomorphism over $\Yinf{R^+}\setminus V(\xi_{R^\sharp})$ that is meromorphic along $(\xi_{R^\sharp})$. Isomorphisms are the evident ones.
\end{defi}
We now consider $p$-adic shtukas. Recall that the spaces $\mrm{Spec}(W(R^+))$, $\Yinf{R^+}$, $\Yal{R^+}$ and $\Y{R^+}$ come equipped with a Frobenius action which we denote by $\varphi^{\mrm{op}}$, induced from the arithmetic Frobenius ring homomorphism $\varphi:W(R^+)\to W(R^+)$.
\begin{defi}
\label{defi:singleshtukasGstructure}
We define the groupoid of shtukas with one paw over $\mrm{Spa}(R^\sharp,R^{\sharp,+})$ and $\mathscr{G}$-structure. Objects are pairs $({\cali{T}},\Phi)$ where ${\cali{T}}$ is a $\mathscr{G}$-torsor over $\Yinf{R^+}$ and $\Phi:\varphi^{\mrm{op},*}{\cali{T}}\to{\cali{T}}$ is an isomorphism over $\Yinf{R^+}\setminus V(\xi_{R^\sharp})$ meromorphic along $(\xi_{R^\sharp})$. Isomorphisms being evident.
\end{defi}
\begin{defi}
\label{defi:isogenies}
Given a $\varphi$-module with $\mathscr{G}$-structure $(\cali{E},\Phi_\cali{E})$ over $\Yint{R^+}{(0,\infty)}$ and a shtuka $({\cali{T}},\Phi_{\cali{T}})$ an isogeny is an equivalence class of pairs $(r,f)$ with $r\in \bb{R}$ and $f:({\cali{T}},\Phi_{\cali{T}})\to (\cali{E},\Phi_\cali{E})$ a $\varphi$-equivariant isomorphism defined over $\Yint{R^+}{[r,\infty)}$. Two pairs $(r_1,f_1)$ and $(r_2,f_2)$ are equivalent if there is a third pair $(r_3,f_3)$ with $r_3>r_1,r_2$ and $f_1=f_3=f_2$ when restricted to $\Yint{R^+}{[r_3,\infty)}$.
\end{defi}
In what follows, we prove three technical lemmas that, intuitively speaking, allow us to “deform” lattices and shtukas with $\mathscr{G}$-structure.
For any $r\in [0,\infty)$ let $\Bint{R^+}{[r,\infty]}=H^0(\Yint{R^+}{[r,\infty]},\cali{O}_{\Yint{R^+}{[r,\infty]}})$, and consider the ring $\ovr{R^+}=(R^+/\varpi)^\mrm{perf}$. Observe that the universal property of $\Yint{R^+}{[r,\infty]}$ as a rational subset of $\Spf{W(R^+)}$ induces compatible ring maps $\Bint{R^+}{[r,\infty]}\to W(\ovr{R^+})[\frac{1}{p}]$ for varying $r$. We denote this family of reduction maps by $(\ovr{-})$.
\begin{lem}
\label{lem:smallintegraldecomp}
\label{detail:makingrbigger}
Let $s\in \Bint{R^+}{[r,\infty]}$ and suppose that the reduction $\ovr{s}$, originally defined over $W(\ovr{R^+})[\frac{1}{p}]$, lies in $ W(\ovr{R^+})$, then there is a tuple $(r',a,b,\varpi_s)$ with $r'$ a number $r\leq r'$, $a\in W(R^+)$, $b\in \Bint{R^+}{[r',\infty]}$ and a pseudo-uniformizer $\varpi_s\in R^+$ such that $s=a+b$ and $b\in [\varpi_s]\cdot \Bint{R^+}{[r',\infty]}$.
\end{lem}
\begin{proof}
By enlarging $r$ if necessary we can assume $\Yint{R^+}{[r,\infty]}$ is of the form: $$\{x\in \Spf{W(R^+)}\mid |[\varpi]|_x\leq |p^m|_x\neq 0\}$$ for some $m$, we compute $\Bint{R^+}{[r,\infty]}$ explicitly. If $S^+$ denotes the $p$-adic completion of $W(R^+)[\frac{[\varpi]}{p^m}]$, then $\Bint{R^+}{[r,\infty]}=S^+[\frac{1}{p}]$. Any element $s\in \Bint{R^+}{[r,\infty]}$ is of the form $s=\frac{1}{p^n}\cdot \Sigma_{i=0}^\infty [a_i]x^{m(i)}p^i$ where $a_i\in R^+$, $x=\frac{[\varpi]}{p^m}$, and $m(i)$ denotes a non-negative integer. We can decompose $p^n\cdot s$ as $$x\cdot \left(\sum_{i=0,m(i)>0}^\infty [a_i]x^{m(i)-1}p^i\right)+\sum_{i=0,m(i)=0}^\infty [a_i]p^i.$$ Since $x=\frac{[\varpi]}{p^m}$, we have that $[\varpi]$ divides in $\Bint{R^+}{[r,\infty]}$ the first term of this decomposition. As long as we pick a $\varpi_s$ that divides $\varpi$, we may and do reduce to the case $s=\Sigma_{i=0}^\infty [a_i]p^{i-n}$. In this case, $\ovr{s}=\Sigma_{i=0}^\infty [\ovr{{(a_i)}}]p^{i-n}$ and by hypothesis we have that for $i< n$ $\ovr{{(a_i)}}=0$ in $\ovr{R^+}$. We can choose a pseudo-uniformizer $\varpi_s$ for which all of $a_i$, for $i< n$, are zero in $R^+/\varpi_s$. We can take $a=\sum_{i=n}^\infty [a_i]p^{i-n}$ and $b=\sum_{i=0}^{n-1}[a_i]p^{i-n}$. These clearly satisfy the properties.
\end{proof}
\begin{lem}
\label{lem:smallintegraldecomptorsors}
Let ${\cali{T}}_1$ and ${\cali{T}}_2$ be trivial $\mathscr{G}$-torsor over $\mrm{Spec}(W(R^+))$ and let $\lambda:{\cali{T}}_1\to {\cali{T}}_2$ be an isomorphism over $\Yint{R^+}{[r,\infty]}$ whose reduction to $\mrm{Spec}(W(\ovr{R^+})[\frac{1}{p}])$ extends $\mrm{Spec}(W(\ovr{R^+}))$. Then, there is an isomorphism $\widetilde{\lambda}:{\cali{T}}_1\to {\cali{T}}_2$ over $\mrm{Spec}(W(R^+))$, a pseudo-uniformizer $\varpi_\lambda\in R^+$ and a number $r\leq r'$ such that $\lambda=\widetilde{\lambda}$ in $\mrm{Hom}_{\mrm{Spec}(\Bint{R^+}{[r',\infty]}/[\varpi_\lambda])}({\cali{T}}_1,{\cali{T}}_2)$.
\end{lem}
\begin{proof}
Fix trivializations $\iota_i: {\cali{T}}_i \to \mathscr{G}$, and consider $\iota_2\circ\lambda\circ \iota_1^{-1}$ as an element $g\in H^0(\Yint{R^+}{[r,\infty]},\mathscr{G})\subseteq H^0(\Yint{R^+}{[r,\infty]},\mrm{\mrm{GL}}_n)$ for some $n$ and some embedding $\mathscr{G}\to \mrm{GL}_n$ defined over $W(k)$. By \Cref{lem:smallintegraldecomp} we can find $\varpi_\lambda$ such that $g=M_1+[\varpi_\lambda]M_2$ with $M_1\in \mrm{GL}_n(W(R^+))$ and $M_2\in \mrm{M}_{n\times n}(\Bint{R^+}{[r',\infty]})$. Since $W(R^+)/[\varpi_\lambda]\subseteq \Bint{R^+}{[r',\infty]}/[\varpi_\lambda]$ the reduction of $M_1$ to $\mrm{GL}_n(\Bint{R^+}{[r',\infty]}/[\varpi_\lambda])$ lies in $\mathscr{G}(W(R^+)/[\varpi_\lambda])$. Moreover, since $\mathscr{G}$ is a smooth group and $W(R^+)$ is $[\varpi_\lambda]$-complete, we can lift this to an element $g'\in \mathscr{G}(W(R^+))$ with $g'=M_1$ in $\mrm{GL}_n(W(R^+)/[\varpi_\lambda])$. Consequently $g'=g$ in $\mathscr{G}(\Bint{R^+}{[r',\infty]}/[\varpi_\lambda])$, and by letting $\til{\lambda}=\iota_2^{-1}\circ g'\circ \iota_1$ we get the desired isomorphism.
\end{proof}
The proof of the following lemma is inspired by the computations that appear in \cite[Theorem 5.6]{HartlVieh}, and it is a key input in the proof of \Cref{thm:comparetub}.
\begin{lem}[Unique liftability of isogenies]
\label{lem:liftabilityofiso}
Let ${\cali{T}}$ be a trivial $\mathscr{G}$-torsor over $\mrm{Spec}(W(R^+))$ and let $\mathscr{G}_b$ denote the trivial $\mathscr{G}$-torsor endowed with the $\varphi$-module structure over $\Yint{R^+}{(0,\infty]}$ given by an element $b\in \mathscr{G}(\Yint{R^+}{(0,\infty]})$. Let $\Phi:\varphi^{\mrm{op},*}{\cali{T}}\to {\cali{T}}$ be an isomorphism defined over $\mrm{Spec}(W(R^+)[\frac{1}{\xi}])$ and $\lambda:{\cali{T}}\to \mathscr{G}_b$ a $\varphi$-equivariant isomorphism defined over $\Bint{R^+}{[r,\infty]}/[\varpi]$ for some $r$ big enough so that $\xi_{R^\sharp}$ becomes a unit. Then, there is a unique $\varphi$-equivariant isomorphism $\til{\lambda}:{\cali{T}}\to \mathscr{G}_b$ defined over $\Yint{R^+}{[r,\infty]}$ such that $\til{\lambda}=\lambda$ in $\Bint{R^+}{[r,\infty]}/[\varpi]$.
\end{lem}
\begin{proof}
By transport of structure, we assume that $\mathscr{G}={\cali{T}}$, that $\Phi\in \mathscr{G}(W(R^+)[\frac{1}{\xi}])$, and that $\lambda\in \mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi])$. It suffices to find $\til{\lambda}\in \mathscr{G}(\Bint{R^+}{[r,\infty]})$ reducing to $\lambda$ with $\Phi=\til{\lambda}^{-1}\circ b\circ \varphi(\til{\lambda})$. Choose an arbitrary lift $\lambda_0\in \mathscr{G}(\Bint{R^+}{[r,\infty]})$ of $\lambda$, and let $\eta_0={\lambda_0}^{-1}\circ b\circ \varphi({\lambda_0})\circ\Phi^{-1}$. We construct a pair of sequences of maps, $\lambda_i:\mathscr{G}\to \mathscr{G}_b$ and $\eta_i:\mathscr{G}\to \mathscr{G}$ defined recursively by the relations $\lambda_{n+1}=\lambda_{n}\circ \eta_{n}$ and
$\eta_{n}=\lambda_{n}^{-1}\circ b\circ \varphi(\lambda_n)\circ \Phi^{-1} $.
Observe that $\eta_0=\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi])$. We prove inductively that $\eta_n=\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi^{p^n}])$. Now, when $g\in \mathscr{G}(\Bint{R^+}{[r,\infty]})$ with $g=\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi^{p^n}])$, then $\varphi(g)=\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[\frac{r}{p},\infty]}/[\varpi^{p^{n+1}}])\subseteq \mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi^{p^{n+1}}])$.
The induction then follows from the computation:
\begin{align}
\eta_{n+1} & = \lambda_{n+1}^{-1}\circ b \circ \varphi(\lambda_{n+1}) \circ \Phi^{-1}
= \eta_{n}^{-1}\circ \lambda_n^{-1}\circ b \circ \varphi(\lambda_{n+1}) \circ \Phi^{-1} \\
& = \Phi \circ \varphi(\lambda_n)^{-1}\circ b^{-1}\circ \lambda_n \circ \lambda_n^{-1}\circ b \circ \varphi(\lambda_{n+1}) \circ \Phi^{-1} \\
& = \Phi \circ \varphi(\lambda_n)^{-1}\circ\varphi(\lambda_{n+1}) \circ \Phi^{-1}
= \Phi\circ\varphi(\eta_{n})\circ \Phi^{-1}
\end{align}
Since $\varphi(\eta_n)=\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi^{p^{n+1}}])$ we also have that $\eta_{n+1}=\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi^{p^{n+1}}])$.
This let us conclude that $\eta_i$ converges to $\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]})$. Define $\til{\lambda}\in \mathscr{G}(\Bint{R^+}{[r,\infty]})$ as the limit of the $\lambda_i$. Taking limits we get $\mrm{Id}=\eta_\infty=\til{\lambda}\circ b\circ \varphi(\til{\lambda})\circ \Phi^{-1}$ and $\til{\lambda}=\lambda_i=\lambda$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi])$.
Let us prove uniqueness. Given two lifts $\til{\lambda}_i$ of $\lambda$ we let $g= \til{\lambda}_1\circ \til{\lambda}_2^{-1}$ with $g\in \mathscr{G}(\Bint{R^+}{[r,\infty]})$. Now, $\varphi$-equivariance gives $b=g^{-1}\circ b\circ \varphi(g)$, and since $g=\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi])$ then $\varphi(g)=\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi^p])$. From the identity $b=g^{-1}\circ b\circ \mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi^p])$ we proceed inductively to prove that $g=\mrm{Id}$ in $\mathscr{G}(\Bint{R^+}{[r,\infty]}/[\varpi^{p^n}])$ for every $n$ and by separatedness also in $\mathscr{G}(\Bint{R^+}{[r,\infty]})$.
\end{proof}
\subsection{Specialization map for $p$-adic Beilinson--Drinfeld Grassmannians.}
We recall the definition of the $p$-adic Beilinson--Drinfeld Grassmannian that is most suitable to study its specialization map.
\begin{defi}\textup{(\cite[Definition 20.3.1]{Ber2})}
\label{defi:Grassmannian}
We let $\Gr{W(k)}$ denote the v-sheaf
$\Gr{W(k)}\Hub{R}=\{(R^\sharp,\iota,f,{\cali{T}},\psi)\}_{\cong} $
with $(R^\sharp,\iota,f)$ an untilt over $W(k)$ and $({\cali{T}},\psi)$ is a lattice with $\mathscr{G}$-structure as in \Cref{defi:latticesGstructure}.
\end{defi}
By Beauville--Laszlo glueing this agrees with the loop group description.
\begin{pro}
\label{pro:grassmanianvformal}
With terminology as in \cite[Definition 4.6]{Specializ} the v-sheaf $\Gr{W(k)}$ formalizes products of points. In particular, it is v-formalizing.
\end{pro}
\begin{proof}
Let $\Spa{R}$ be a product of points and $f:\Spa{R}\to \Gr{W(k)}$ a map. By definition, associated to this map we have an untilt $(R^\sharp,\iota,m)$ over $W(k)$ and a $\mathscr{G}$-torsor ${\cali{T}}$ over $\Yinf{R^+}$ together with a trivialization $\psi:{\cali{T}}\to \mathscr{G}$ over $\Yinf{R^+}\setminus V(\xi_{R^\sharp})$ meromorphic along $\xi_{R^\sharp}$.
We use $\psi$ to glue ${\cali{T}}$ and $\mathscr{G}$ along $\Yint{R^+}{[r,\infty)}$ to get a $\mathscr{G}$-torsor defined over $\Y{R^+}$.
Using \Cref{cor:gagatypekedlymeoro}, \Cref{pro:prodpointextendg-tors} and the fact that by construction ${\cali{T}}$ is trivial on $\Yal{R^+}\setminus V(\xi)$ we can extend ${\cali{T}}$ to a $\mathscr{G}$-torsor over $\mrm{Spec}(W(R^+))$ together with a trivialization over $\mrm{Spec}(W(R^+)[\frac{1}{\xi_{R^\sharp}}])$.
This is enough to define a map $\Spdf{R^+}\to \Gr{W(k)}$ that restricts to the original one.
\end{proof}
\begin{pro}\textup{(\cite[\S 20.3]{Ber2})}
\label{pro:grassmanianreduced}
With terminology as in \cite[Definition 4.11, Definition 3.20, Definition 3.12]{Specializ} the v-sheaf $\Gr{W(k)}$ is specializing, formally $p$-adic, and $(\Gr{W(k)})^\mrm{red}$ is represented by the Witt-vector affine flag variety, ${\cali{F}l^{\g}_{\cali{W},k}}$.
\end{pro}
\begin{proof}
We need to prove that $\Gr{W(k)}$ is separated, v-formalizing and that the diagonal map is formally adic. The first two properties follow respectively from \cite[Theorem 20.3.2, Theorem 21.2.1]{Ber2} and \Cref{pro:grassmanianvformal}. By \cite[Proposition 3.29]{Specializ}, it is enough to prove that $\Gr{W(k)}$ is formally $p$-adic. This follows from the fact that $\Gr{W(k)}\times_{\Spdo{W(k)}} \mrm{Spec}(k)^{\diamond}=({\cali{F}l^{\g}_{\cali{W},k}})^{\diamond}$, from \cite[Lemma 3.32]{Specializ} and the fact that ${\cali{F}l^{\g}_{\cali{W},k}}$ is ind-representable by a perfect scheme. Indeed, ind-representability proves that ${\cali{F}l^{\g}_{\cali{W},k}}$ is a reduced scheme-theoretic v-sheaf as in \cite[Definition 3.15]{Specializ}.
\end{proof}
Recall that given $\mu\in X^+_*(T)$ with field of definition $E$ we may define a ``local model" v-sheaf $\Grm{O_{E}}$ over $\Spdo{O_{E}}$. This is defined as the v-sheaf closure of $\mrm{Gr}^{G,\leq \mu}_{E}$ in $\Gr{{\mathbb{Z}_p}}\times_{{\mathbb{Z}_p}} O_{E}$ \cite[\S 21.4]{Ber2}. In \cite{AGLR22}, our collaboration with Ansch\"utz, Louren\c{c}o, and Richarz, we prove the following statement.
\begin{thm}\textup{(\cite{AGLR22})}
\label{thm:AGLR}
With terminology as in \cite{AGLR22}. If $\mathscr{G}$ is parahoric and $\mu\in X^+_*(T)$, then $\Grm{O_{E}}$ is a flat and rich $p$-adic kimberlite. Moreover, $(\Grm{O_{E}})^\mrm{red}={\cali{A}_{\g,\mu}}$, the $\mu$-admissible locus in ${\cali{F}l^{\g}_{\cali{W},k}}$.
\end{thm}
When $\mathscr{G}$ is reductive we can say a bit more. Indeed, in this case one can use a Demazure resolution as in \cite{Specializ} to prove the following statement.
\begin{thm}\textup{(\cite[Theorem 5.1]{Specializ})}
\label{cor:grassprekimber}
Let $F$ be a nonarchimedean field extension of $E$. If $\mathscr{G}$ is reductive and $\mu\in X^+_*(T)$, then $\Grm{O_F}$ has geometrically connected tubular neighborhoods.
\end{thm}
\subsection{Moduli spaces of shtukas are smelted kimberlites.}
Fix an element $b\in G(K_0)$ and let $\mathscr{G}_b:\mrm{Rep}^{\mathscr{G}}_{{\mathbb{Z}_p}}\to \mrm{IsoCrys}_{K_0}$ denote the associated isocrystal with $\mathscr{G}$-structure.
\begin{defi}
\label{defi:moduliofshtukas}
The moduli space of $p$-adic shtukas associated to $\mathscr{G}_b$, which we denote by $\Shtdos{k}$, is the functor
$\Shtdos{k}\Hub{R}=\{(R^\sharp,\iota,f),{\cali{T}},\Phi,\lambda\}/_{\cong}$
with $(R^\sharp,\iota,f)$ untilt over $W(k)$, $({\cali{T}},\Phi)$ is a shtuka as in \Cref{defi:singleshtukasGstructure} and $\lambda:{\cali{T}}\to \mathscr{G}_b|_\Yint{R^+}{[r,\infty)}$ an isogeny as in \Cref{defi:isogenies}.
\end{defi}
We consider the following auxiliary space.
\begin{defi}
\label{defi:auxshtuka}
Let $\Auxsht{k}$ denote the functor
$\Auxsht{k}\Hub{R}=\{(R^\sharp,\iota,f),M,\lambda\} $
with $(R^\sharp,\iota,f)$ an untilt over $W(k)$, $M\in \mathscr{G}(W(R^+)[\frac{1}{\xi_{R^\sharp}}])$ and $\lambda:\mathscr{G}_M\to \mathscr{G}_b$ an isogeny. Here $\mathscr{G}_M:=(\mathscr{G},\Phi_M)$ with $\Phi_M:\varphi^{\mrm{op},*}\mathscr{G}\to \mathscr{G}$ given by $M$.
\end{defi}
We denote by $\mathbb{W}^+\mathscr{G}$ the sheaf in groups $\mathbb{W}^+\mathscr{G}\Hub{R}=\mathscr{G}(W(R^+))$.
\begin{pro}
The following hold:
\begin{enumerate}
\item The functors $\Shtdos{k}$ and $\Auxsht{k}$ are small v-sheaves.
\item The natural map $\Auxsht{k}\to \Shtdos{k}$ is a $\mathbb{W}^+\mathscr{G}$-torsor for the v-topology.
\item $\Auxsht{k}$ is formalizing and $\Shtdos{k}$ is v-formalizing.
\end{enumerate}
\label{pro:shtukavformalizing}
\end{pro}
\begin{proof}
Standard argument using \Cref{pro:descendalongcurve} proves the first claim.
Given $N\in \mathbb{W}^+\mathscr{G}\Hub{R}$ and $(M,\lambda)\in \Auxsht{k}\Hub{R}$ let $N\cdot(M,\lambda)=(N^{-1}M\varphi(N),\lambda\circ N)$. This action on $\Auxsht{k}$ makes the map $\Auxsht{k}\to \Shtdos{k}$ equivariant for the trivial action on the target. It suffices to prove that the basechange of the map along product of points is the trivial $\mathbb{W}^+\mathscr{G}$-torsor.
Let $\Spa{R}$ be a product of points, and let $({\cali{T}},\Phi,\lambda)\in \Shtdos{k}\Hub{R}$. Similarly to the proof of \Cref{pro:grassmanianvformal}, we can glue ${\cali{T}}$ along $\lambda$ over $\Yint{R^+}{[r,\infty)}$ and use \Cref{pro:prodpointextendg-tors} to get a $\mathscr{G}$-bundle over $\mrm{Spec}(W(R^+))$ with a meromorphic $\Phi$ that restrict to the previous one.
Now, any $\mathscr{G}$-bundle on $\mrm{Spec}(W(R^+))$ is trivial. Indeed, $\mrm{Spec}(W(R^+))$ splits every \'etale cover.
The choice of a trivialization specifies a section $(M,\lambda)\in \Auxsht{k}\Hub{R}$ and after chasing definitions one can see that the natural action of $\mathbb{W}^+\mathscr{G}$ on the set of trivialization acts compatibly with the action specified above.
Let us prove that $\Auxsht{k}$ is formalizing. From this and surjectivity of $\Auxsht{k}\to \Shtdos{k}$ it follows that $\Shtdos{k}$ is v-formalizing. Let $\Spa{S}\in \mrm{Perf}_k$, and $\varpi_S\in S^+$ a pseudo-uniformizer. Let $((S^\sharp,\iota,f),M,\lambda)\in \Auxsht{k}\Hub{S}$, we construct a natural transformation $\Spdf{S^+}\to\Auxsht{k}$.
A map $f:\Spa{L}\to \Spdf{S^+}$ induces $f:W(S^+)[\frac{1}{\xi_{S^\sharp}}]\to W(L^+)[\frac{1}{\xi_{L^\sharp}}]$, we let $M_L=f(M)$. Fix a pseudo-uniformizer $\varpi_L\in L^+$, there is a large enough $r'\in \bb{R}$ for which the following diagram is commutative:
\begin{center}
\begin{tikzcd}
\Yint{L^+}{[r',\infty]}\arrow{r} \arrow{d} & \Yint{R^+}{[r,\infty]}\arrow{d} \\
\Spf{W(L^+)} \arrow{r} & \Spf{W(S^+)}
\end{tikzcd}
\end{center}
This map allows us to pullback the isogeny $\lambda$ to $\Spa{L}$. The isogeny constructed this way does not depend of the choices of $\varpi_S$, $\varpi_L$, $r$ or $r'$.
\end{proof}
Recall that moduli spaces of shtukas satisfy the valuative criterion for partial properness over $\Spdo{W(k)}$
\begin{lem}
\label{lem:closedembeddingauxsht}
Let $\mathscr{G}_1\to \mathscr{G}_2$ be a closed embeddings of parahoric group schemes over ${\mathbb{Z}_p}$ and $\mathscr{G}_b$ an isocrystal with $\mathscr{G}_1$ structure. Let $\mathscr{G}'_b=\mathscr{G}_b\overset{\mathscr{G}_1}{\times}\mathscr{G}_2$, the induced map $\Auxshte{k}{\mathscr{G}_b}\to \Auxshte{k}{\mathscr{G}'_b}$ is a closed immersion.
\end{lem}
\begin{proof}
Let $\Spa{S}$ in $\mrm{Perf}_k$ be totally disconnected, and let $(M,\lambda)\in \Auxshte{k}{\mathscr{G}'_b}\Hub{S}$. It suffices to prove that the basechange along $S$ is a closed immersion. Abusing notation, we let $(r,\lambda)$ represent the isogeny. By unraveling definitions we think of $M$ and $\lambda$ as ring maps $\cali{O}_{\mathscr{G}_2}\to W(S^+)[\frac{1}{\xi_{S^\sharp}}]$ and $\cali{O}_{\mathscr{G}_2}\to \Bint{[r,\infty]}{S^+}$ with $\cali{O}_{\mathscr{G}_1}=\cali{O}_{\mathscr{G}_2}/I$.
The basechange $\Spa{S}\times_\Auxshte{k}{\mathscr{G}'_b}\Auxshte{k}{\mathscr{G}_b}$
represents the maps $\Spa{R}\to\Spa{S}$ such that the induced morphisms
$M:\cali{O}_{\mathscr{G}_2} \to W(R^+)[\frac{1}{\xi_{R^\sharp}}]$ and
$\lambda: \cali{O}_{\mathscr{G}_2} \to \Bint{R^+}{[r,\infty]} $
map elements of $I$ to $0$.
Since $I$ is finitely generated, it suffices to prove that if $t\in W(S^+)[\frac{1}{\xi_{S^\sharp}}]$ (or $t\in \Bint{[r,\infty]}{S^+}$) the subfunctor of points in $\Spa{S}$ that map $t$ to $0$ forms a closed immersion. Fix $t\in W(S^+)[\frac{1}{\xi_{S^\sharp}}]$, replacing $t$ by $\xi^n\cdot t$ we may assume $t\in W(S^+)$. Using the Teichm\"uller expansion \label{detail:orthograpy} we have $t\in (S^+)^{\bb{N}}$ and $t$ restricts to $0$ if and only if each entry restricts to $0$. This defines a Zariski closed subset of $\Spa{S}$.
Now fix $t\in \Bint{[r,\infty]}{S^+}\subseteq \Bint{[r,\infty)}{S^+}$ and let $Z\subseteq |\Yint{R^+}{[r,\infty)}|$ be the set of valuations with $|t|_z=0$. The structure map $\pi:(\Yint{S^+}{[r,\infty)})^{\diamond}\to \Spd{S}$ is $\ell$-cohomologically smooth and universally open \cite[Proposition 24.5]{Et}. The subfunctor of points we consider are those maps that factor through $Z'=|\Spa{S}|\setminus \pi(|\Yint{R^+}{[r,\infty)}|\setminus Z)$ which is a closed subset. This set is closed and generalizing, so it defines a closed immersion of $\Spa{S}$ (\cite[Lemma 7.6]{Et}).
\end{proof}
\begin{pro}
\label{pro:shtukaclosedimmersion}
With notation as in \Cref{lem:closedembeddingauxsht} the map $\Shtg{k}{\mathscr{G}_b}\to \Shtg{k}{\mathscr{G}'_b}$ is a closed immersion. Now, using diagonal embeddings, it follows that $\Shtdos{k}\to \Spdo{W(k)}$ is separated.
\end{pro}
\begin{proof}
For injectivity let $t_i=({\cali{T}}_i,\Phi_i,\lambda_i)\in\Shtg{k}{\mathscr{G}_b}\Hub{R}$ with $i\in\{1,2\}$ such that $t_i\overset{\mathscr{G}_1}{\times}\mathscr{G}_2:=({\cali{T}}_i\overset{\mathscr{G}_1}{\times} \mathscr{G}_2, \Phi_i, \lambda_i)$ are isomorphic. We can assume $\Spa{R}$ to be a product of points, in this case $\Spa{R}\to \Shtg{k}{\mathscr{G}_b}$ the $t_i$'s lift to $\Auxshte{k}{\mathscr{G}_b}$, say given by $T_i\in \Auxshte{k}{\mathscr{G}_b}\Hub{R}$ with $T_i:=(M_i,\lambda_i)$.
Since $t_1\overset{\mathscr{G}_1}{\times}\mathscr{G}_2\cong t_2\overset{\mathscr{G}_1}{\times}\mathscr{G}_2$ then $T_1\overset{\mathscr{G}_1}{\times}\mathscr{G}_2$ and $T_2\overset{\mathscr{G}_1}{\times}\mathscr{G}_2$ are in the same $\mathscr{G}(W(R^+))$-orbit. Now, $\lambda_i\in \mathscr{G}_1(\Bint{[r,\infty)}{R^+})$ so $\lambda_1\circ \lambda_2^{-1}\in \mathscr{G}_1(\Bint{[r,\infty)}{R^+})\cap \mathscr{G}_2(W(R^+))$, this intersection is $\mathscr{G}_1(W(R^+))$. This and \Cref{lem:closedembeddingauxsht} proves that $T_1$ and $T_2$ are in the same $\mathbb{W}^+\mathscr{G}_1$-orbit, which proves $t_1=t_2$.
Let us prove $\Shtg{k}{\mathscr{G}_b}\to \Shtg{k}{\mathscr{G}'_b}$ is proper. By injectivity the map is a separated, and since each of them satisfies the valuative criterion of partial properness over $\Spdo{W(k)}$, it is also partially proper. The only thing left to prove is quasi-compactness.
Now, the composition $\Auxshte{k}{\mathscr{G}_b}\to \Auxshte{k}{\mathscr{G}'_b} \to \Shtg{k}{\mathscr{G}'_b}$ is a quasi-compact map, and $\Auxshte{k}{\mathscr{G}_b}\to \Shtg{k}{\mathscr{G}_b}$ is surjective. It follows that $\Shtg{k}{\mathscr{G}_b}\to\Shtg{k}{\mathscr{G}'_b}$ is quasi-compact.
\end{proof}
As with $p$-adic Beilinson--Drinfeld Grassmannians, moduli spaces of shtukas admit bounded versions. Given a geometric point $x:\Spa{C}\to \Shtdos{k}$ the torsor ${\cali{T}}$ is trivial and we can choose a trivialization of $\tau:{\cali{T}}\to \mathscr{G}$. The morphism $\tau\circ \Phi:\varphi^{\mrm{op},*}{\cali{T}}\to \mathscr{G}$ defines a map $y_{\tau,x}:\Spa{C}\to \Gr{W(k)}$ and we say $x$ has relative position bounded by $\mu$ if $y_{\tau,x}$ factors through $\Grm{O_{E_0}}$. Since $\Grm{O_{E_0}}$ is stable under the action of the loop group this condition doesn't depend on the choice of $\tau$.
\begin{defi}
\label{defi:moduliofshtukasbound}
We let $\Shtm{O_{E_0}}\subseteq \Shtdos{k}\times_{W(k)} O_{E_0}$ denote the subfunctor of tuples $\{(R^\sharp,\iota,f),{\cali{T}},\Phi,\lambda\}$ for which the shtuka $({\cali{T}},\Phi)$ is point-wise bounded by $\mu$.
\end{defi}
\begin{rem}
Whenever $\mathscr{G}$ is reductive over ${\mathbb{Z}_p}$, $E(\mu)$ is an unramified extension of $\bb{Q}_p$, so $O_{E_0}={W(k)}$.
\end{rem}
\begin{pro}
\label{pro:shtukaboundedclosed}
If $\mu\in X^+_*({T}_{\ov{\bb{Q}}_p})$ then $\Shtm{O_{E_0}}\to \Shtdos{k}\times_{W(k)}O_{E_0}$ is a closed immersion. Moreover, $\Shtm{O_{E_0}}$ is v-formalizing.
\end{pro}
\begin{proof}
Let ${{\mrm{WSht}}^{\g_b,\leq\mu}_{O_{E_0}}}$ denote the basechange of ${{\mrm{WSht}}^{\mathscr{G}_b}_{O_{{E_0}}}}\to {{\mrm{Sht}^{\mathscr{G}_b}_{O_{E_0}}}} $ by $\Shtm{O_{E_0}}$.
We have a pair of Cartesian diagrams:
\begin{center}
\begin{tikzcd}
{{\mrm{WSht}}^{\g_b,\leq\mu}_{O_{E_0}}} \arrow{r}\arrow{d} & {{\mrm{WSht}}^{\mathscr{G}_b}_{O_{{E_0}}}} \arrow{d} &
{{\mrm{WSht}}^{\g_b,\leq\mu}_{O_{E_0}}} \arrow{r}\arrow{d} & {{\mrm{WSht}}^{\mathscr{G}_b}_{O_{{E_0}}}} \arrow{d} \\
\Grm{O_{E_0}}\arrow{r}& \Gr{O_{E_0}} &
\Shtm{O_{E_0}} \arrow{r} & {{\mrm{Sht}^{\mathscr{G}_b}_{O_{E_0}}}}
\end{tikzcd}
\end{center}
Since being a closed immersion can be checked v-locally on the target (\cite[Proposition 10.11]{Et}), and since ${{\mrm{WSht}}^{\mathscr{G}_b}_{O_{{E_0}}}}\to {{\mrm{Sht}^{\mathscr{G}_b}_{O_{E_0}}}} $ is surjective $\Shtm{O_{E_0}} \to {{\mrm{Sht}^{\mathscr{G}_b}_{O_{E_0}}}} $ is a closed immersion. Moreover, by \Cref{pro:grassmanianreduced} and \Cref{thm:AGLR} the map $\Grm{O_{E_0}}\to \Gr{O_{E_0}}$ is formally adic which implies that ${{\mrm{WSht}}^{\g_b,\leq\mu}_{O_{E_0}}}$ is formalizing and consequently that $\Shtm{O_{{E_0}}}$ is v-formalizing.
\end{proof}
Let us prove that $(\Shtm{O_{E_0}})^{\mrm{red}}$ is represented by an affine Deligne--Lusztig variety as in \cite{Hu-Zhou}.
We recall one of the ways to define these spaces.
\begin{defi}
\label{defi:ADLV}
Let $\mathscr{G}_b$ the isocrystal with $\mathscr{G}$-structure associated to $b$ and $\mu$ a cocharacter. Let ${X_\g^{\leq\mu}(b)} : \mrm{PCAlg}^{\mrm{op}}_{/k}\to \mrm{Sets}$ be the functor on perfect $k$-algebras $R$ given by
${X_\g^{\leq\mu}(b)}(R)=\{({\cali{T}},\Phi,\lambda)\}/_{\cong} $
with ${\cali{T}}$ is a $\mathscr{G}$-torsor over $\mrm{Spec}(W(R))$, $\Phi:\varphi^{\mrm{op},*}{\cali{T}}\to {\cali{T}}$ is an isomorphism over $\mrm{Spec}(W(R)[\frac{1}{p}])$ that is point-wise bounded by $\mu$ (i.e. lying over ${\cali{A}_{\g,\mu}}$) and $\lambda:{\cali{T}}\to \mathscr{G}_b$ is a $\varphi$-equivariant isomorphism over $\mrm{Spec}(W(R)[\frac{1}{p}])$
\end{defi}
\begin{pro}
\label{pro:adlvasreducedfunctor}
The identity ${X_\g^{\leq\mu}(b)}=(\Shtm{O_{E_0}})^{\mrm{red}}$ holds, the adjunction map $({X_\g^{\leq\mu}(b)})^{\diamond}\to \Shtm{O_{E_0}}$ is injective. Moreover, $\Shtm{O_{E_0}}$ is a specializing v-sheaf.
\end{pro}
\begin{proof}
To construct $j:{X_\g^{\leq\mu}(b)} \to (\Shtm{O_{E_0}})^{\mrm{red}}$, by adjunction we construct $h:({X_\g^{\leq\mu}(b)})^{\diamond} \to \Shtm{O_{E_0}}$ instead. Before sheafification, a map $\Spa{S}\to ({X_\g^{\leq\mu}(b)})^{\diamond}$ is given by data $({\cali{T}},\Phi,\lambda)$ over $S^+$ as in \Cref{defi:ADLV}. Restricting to the appropriate loci defines a map $\Spa{S}\to \Shtm{O_{E_0}}$.
Since ${X_\g^{\leq\mu}(b)}$ is representable, $(({X_\g^{\leq\mu}(b)})^{\diamond})^{\mrm{red}}={X_\g^{\leq\mu}(b)}$, and to prove $r$ is injective it suffices to prove that $h$ is. Take maps $g_1,g_2:\Spa{R}\to ({X_\g^{\leq\mu}(b)})^{\diamond}$, injectivity can be proved v-locally so we assume the maps factor through $g_1',g_2':\mrm{Spec}(R^+)^{\diamond}\to ({X_\g^{\leq\mu}(b)})^{\diamond}$. The $g'_i$ are given $({\cali{T}}_i,\Phi_i,\lambda_i)$ over $\mrm{Spec}(W(R^+))$, $\mrm{Spec}(W(R^+)[\frac{1}{p}])$ and $\mrm{Spec}(W(R^+)[\frac{1}{p}])$ and the $h\circ g_i$ are given by restriction to $\Yinf{R^+}$, $\Yinf{R^+}\setminus V(p)$ and $\Yint{R^+}{[r,\infty)}$ respectively. Nevertheless, from $h\circ g_1=h\circ g_2$ and \Cref{thm:puncturedtoAinfked} it follows that $g_1'=g_2'$.
To prove surjectivity of $j$, let $f:\mrm{Spec}(A)^{\diamond}\to \Shtm{O_{E_0}}$ and $g:\Spa{R}\to \mrm{Spec}(A)^{\diamond}$ with $\Spa{R}$ a product of points and $A\in \mrm{PCAlg}^{\mrm{op}}_{/k}$. We construct below a unique $f'$ fitting in:
\begin{center}
\begin{tikzcd}
\Spa{R} \arrow{r}{g}\arrow{d}{f'}& \mrm{Spec}(A)^{\diamond} \arrow{d}{f}\\
({X_\g^{\leq\mu}(b)})^{\diamond} \arrow{r}{j} & \Shtm{O_{E_0}}
\end{tikzcd}
\end{center}
Since products of points are a basis for the topology, and since $j$ is injective the diagram gives $\mrm{Spec}(A)^{\diamond}\to ({X_\g^{\leq\mu}(b)})^{\diamond}$ factoring our original map to $\Shtm{O_{E_0}}$ and proves the desired surjectivity.
Fix a pseudo-uniformizer $\varpi\in R^+$, we let $\Spa{R_\infty}$ be a second product of points defined by $R_\infty^+=\prod_{i=1}^\infty R^+$ with pseudo-uniformizer $\varpi_{R_\infty}=(\varpi^i)_{i=1}^\infty$. This product of points comes with a family of closed embeddings $\iota_i:\Spa{R}\to \Spa{R_\infty}$ given in coordinates by the projections onto the $i$th-factor. The diagonal $\Delta_g:A\to \prod_{i=1}^\infty R^+$ induces ${\Delta_g}:\Spa{R_\infty}\to \mrm{Spec}(A)^{\diamond}$ with ${\Delta_g}\circ \iota_i=g$ for every $i$. Since $\Spa{R_\infty}$ is a product of points, by \Cref{pro:prodpointextendg-tors}, the map $f\circ {\Delta_g}$ can be represented by a triple $({\cali{T}}_{R_\infty},\Phi_{R_\infty},\lambda_{R_\infty})$ with ${\cali{T}}_{R_\infty}$ trivial. After choosing a trivialization $\lambda_{R_\infty}$ is given by a map $\cali{O}_\mathscr{G}\to \Bint{{R^+_\infty}}{[r,\infty]}$. Moreover, since $f\circ {\Delta_g}\circ\iota_i=f\circ {\Delta_g}\circ\iota_j$ for all $i$ and $j$, the $\lambda^*_i:\cali{O}_\mathscr{G}\to \Bint{{R^+_\infty}}{[r,\infty]}\xrightarrow{\iota_i} \Bint{R^+}{[r_i,\infty]}$
lie in the same $\mathscr{G}(W(R^+))$-orbit. Clearly, $\mathscr{G}(W({R^+_\infty}))=\prod_{i=1}^\infty \mathscr{G}(W(R^+))$. By changing the trivialization, we may assume that $r_i=r_j=:r$ and $\lambda^*_i=\lambda^*_j=:\lambda^*_R$ for all $1\leq i,j<\infty$. We claim that $\lambda^*_{R}$ factors through $W(R^+)[\frac{1}{p}]$. Take $t\in \cali{O}_\mathscr{G}$ and consider $s=\lambda^*_{R_\infty}(t)\in \Bint{{R^+_\infty}}{[r,\infty]}$. After replacing $r$, we may assume $r=n\in \bb{N}$. In particular, $p^k\cdot s$ lies in the $p$-adic completion of $W({R^+_\infty})[\frac{[\varpi_{R_\infty}]}{p^n}]$ for some $k$. Write $p^k\cdot s$ as $\sum_{j=0}^\infty x^{n(j)}[\alpha_j]p^j$ with $x=\frac{[\varpi_{R_\infty}]}{p^n}$, $0\leq n(j)$ a multiplicity, and $\alpha_j\in R_\infty^+$. Then, $\iota_i(p^k\cdot s)=\sum_{j=0}^\infty (\frac{[\varpi]^i}{p^n})^{n(j)}[\iota_i(\alpha_j)]p^j$ with $\iota_i(\alpha_j)\in R^+$. In particular, $p^k\cdot \lambda^*_R(t)\in \bigcap_{i\in \bb{N}} (H^0(\Yint{R^+}{[\frac{n}{i},\infty]},\cali{O}^+))$, but this intersection is $W(R^+)$ proving the claim.
Since the triple $({\cali{T}}_{R_\infty},\Phi_{R_\infty},\lambda_{R_\infty})$ is defined over $\mrm{Spec}(W(R^+))$ and $\mrm{Spec}(W(R^+)[\frac{1}{p}])$ it defines a map $\mrm{Spec}(R^+)\to {X_\g^{\leq\mu}(b)}$. The composition, $\Spa{R}\to \mrm{Spec}(R^+)^{\diamond} \to ({X_\g^{\leq\mu}(b)})^{\diamond}$, defines $f'$.
To prove $\Shtm{O_{E_0}}$ is specializing we need to prove it is formally separated and v-formalizing. The first follows from \cite[Lemma 3.30]{Specializ} and \Cref{pro:shtukaclosedimmersion}, the second follows from \Cref{pro:shtukaboundedclosed}.
\end{proof}
\begin{lem}
\label{lem:shtukredclosedimme}
\label{pro:modulishtukformssmeltedkimberl}
The adjunction map $({X_\g^{\leq\mu}(b)})^{\diamond}\to \Shtm{O_{E_0}}$ arising from the identification of \Cref{pro:adlvasreducedfunctor} is a closed immersion. In particular, $(\Shtm{O_{E_0}},\Shtm{{E_0}})$ is a smelted kimberlite.
\end{lem}
\begin{proof}
Recall that ${X_\g^{\leq\mu}(b)}$ admits a closed immersion into $\cali{F}l^{\mathscr{G}}_{\cali{W},k}$. We write $({X_\g^{\leq\mu}(b)})^{\diamond}=\bigcup_{\nu\in \tilde{W}} ({X_\g^{\leq\mu}(b)}\cap \cali{F}l^{\mathscr{G},\leq \nu}_{\cali{W},k})^{\diamond}$ where $\tilde{W}$ is the Iwahori-Weyl group. Each term in the union is proper over $\Spdo{k}$, since they come from a proper perfectly finitely presented schemes over $k$. Consequently, $({X_\g^{\leq\mu}(b)}\cap \cali{F}l^{\mathscr{G},\leq \nu}_{\cali{W},k})^{\diamond} \to \Shtm{O_{E_0}}$ is a closed immersion. Now, ${X_\g^{\leq\mu}(b)}$ is locally perfectly of finite type (\cite[Theorem 1.1]{Vie19}). In particular, each point admits an open neighborhood that is spectral and Noetherian. For all $x\in |{X_\g^{\leq\mu}(b)}|$, there is an open $x\in U_x\subseteq {X_\g^{\leq\mu}(b)}$ and a finite set $I_x\subseteq \tilde{W}$ with $U=(\bigcup_{\nu\in I_x} U\cap \cali{F}l^{\mathscr{G},\leq \nu}_{\cali{W},k})$. Indeed, if $U_x$ is Noetherian every Zariski closed subset is constructible, and we conclude by compactness.
By \Cref{pro:adlvasreducedfunctor} and \cite[Proposition 4.14]{Specializ} we have a specialization map $\Sp{\Shtm{O_{E_0}}}:|\Shtm{O_{E_0}}|\to |{X_\g^{\leq\mu}(b)}|$. Let $V_x=(\Sp{\Shtm{O_{E_0}}})^{-1}(U_x)$ for $x\in |{X_\g^{\leq\mu}(b)}|$ and $U_x$ as above, this forms an open cover of $\Shtm{O_{E_0}}$. Being a closed immersion is v-local on the target. Since $V_x\to \Shtm{O_{E_0}}$ is a formally adic, it suffices to see that $(V_x^{\mrm{red}})^{\diamond} \to V_x$ is a closed immersion. Now, the adjunction map $(U_x)^{\diamond}\to V_x$ fits in:
\begin{center}
\begin{tikzcd}
U_x^{\diamond} \arrow{r}{\mrm{Id}}\arrow{d}& U_x^{\diamond} \arrow{r}\arrow{d}& V_x \arrow{d}\\
(\bigcup_{\nu\in I_x} \cali{F}l^{\mathscr{G},\leq \nu}_{\cali{W},k}\cap {X_\g^{\leq\mu}(b)})^{\diamond} \arrow{r} & ({X_\g^{\leq\mu}(b)})^{\diamond} \arrow{r} & \Shtm{O_{E_0}}
\end{tikzcd}
\end{center}
Moreover, the above diagram is Cartesian, which proves $U_x^{\diamond}\to V_x$ is a closed immersion.
\Cref{pro:adlvasreducedfunctor} proves that $\Shtm{O_{E_0}}$ is a specializing v-sheaf, in \Cref{pro:adlvasreducedfunctor} we proved that $(\Shtm{O_{E_0}})^{\mrm{red}}$ is represented by a scheme and by the argument above the map $((\Shtm{O_{E_0}})^{\mrm{red}})^{\diamond}\to \Shtm{O_{E_0}}$ is a closed immersion, this finishes the proof that $\Shtm{O_{E_0}}$ is a prekimberlite as in \cite[Definition 4.15]{Specializ}. Since $\Shtm{O_{E_0}}\to \mrm{Spd}(O_{E_0})$ is partially proper, by \cite[Proposition 4.32, Definition 4.30]{Specializ} it is a valuative prekimberlite. Finally, by \cite[Theorem 23.1.4]{Ber2} $\Shtm{{E_0}}$ is a locally spatial diamond. Consequently, $(\Shtm{O_{E_0}},\Shtm{{E_0}})$ is a smelted kimberlite.
\end{proof}
\subsection{Tubular neighborhoods and their local model diagram.}
Let ${\mathcal{D}}=({\mathcal{D}},\Phi_{\mathcal{D}})$ with ${\mathcal{D}}$ a $\mathscr{G}$-torsor over $\mrm{Spec}(W(k))$ and $\Phi_{\mathcal{D}}:\varphi^{\mrm{op},*}{\mathcal{D}}\to {\mathcal{D}}$ an isomorphism over $\mrm{Spec}(W(k)[\frac{1}{p}])$, and fix $\mu\in X^+_*({T})$. We can define “coordinate-free” versions of some moduli spaces that we studied in the previous sections:
\begin{defi}
\label{defi:coordinatefreegrass}
We denote functors $$\FGr{W(k)},\FSht{W(k)},{\cali{M}^{\D,\leq \mu}_{O_{E_0}}},{\mrm{Sht}^{\D,\leq \mu}_{O_{E_0}}}: \mrm{Perf}_k\to \mrm{Sets}$$
\begin{enumerate}
\item With $\FGr{W(k)}\Hub{R}=\{((R^\sharp,\iota,f),{\cali{T}},\psi)\}_{/\cong}$
where ${\cali{T}}$ is a $\mathscr{G}$-torsor over $\Y{R^+}$ and $\psi:{\cali{T}}\to {\mathcal{D}}$ is an isomorphism defined over $\Y{R^+}\setminus V(\xi_{R^\sharp})$ that is meromorphic along $\xi_{R^\sharp}$.
\item With $\FSht{W(k)}\Hub{R}=\{((R^\sharp,\iota,f),{\cali{T}},\Phi,\lambda)\}_{/\cong}$
where $({\cali{T}},\Phi)$ is a shtuka with $\mathscr{G}$-structure, and $\lambda:{\cali{T}}\to {\mathcal{D}}$ is an isogeny.
\item With ${\cali{M}^{\D,\leq \mu}_{O_{E_0}}}$ and ${\mrm{Sht}^{\D,\leq \mu}_{O_{E_0}}}$ denoting the evident bounded versions.
\end{enumerate}
\end{defi}
The functors $\FGr{W(k)}$ and $\FSht{W(k)}$ come with canonical sections $c_{\mathcal{D}}:\mrm{Spec}(k)^{\diamond}\to \FGr{W(k)}$ and $c_{\mathcal{D}}:\mrm{Spec}(k)^{\diamond}\to {\mrm{Sht}^{\D}_{W(k)}}$ given by $(\varphi^{\mrm{op},*}{\mathcal{D}},\Phi_{\mathcal{D}})$ and $({\mathcal{D}},\Phi_{\mathcal{D}},\mrm{Id})$ respectively.
Fixing an isomorphism $\tau:{\mathcal{D}}\cong \mathscr{G}$ we get isomorphisms $\tau:{\mrm{Gr}^{\D}_{W(k)}}\cong \Gr{W(k)}$, and $\tau:{\cali{M}^{\D,\leq \mu}_{O_{E_0}}}\cong \Grm{O_{E_0}}$.
Analogously, given a $\varphi$-equivariant isomorphism $\tau:{\mathcal{D}}\cong \mathscr{G}_b$ over $\mrm{Spec}(W(k)[\frac{1}{p}])$ we get isomorphisms $\tau:{\mrm{Sht}^{\D}_{W(k)}}\cong \Shtg{k}{\mathscr{G}_b}$ and $\tau:{\mrm{Sht}^{\D,\leq \mu}_{O_{E_0}}}\cong \Shtm{O_{E_0}}$.
Moreover, if we are given a section $\sigma: \mrm{Spec}(k)^{\diamond}\to \Gr{W(k)}$ (respectively $\sigma: \mrm{Spec}(k)^{\diamond}\to \Shtg{k}{\mathscr{G}_b}$) we can find $({\mathcal{D}},\Phi_{\mathcal{D}})$ and an isomorphism $\tau:{\mathcal{D}}\cong \mathscr{G}$ (respectively $\varphi$-isomorphism) making the diagrams below commutative:
\begin{center}
\begin{tikzcd}
& {\mrm{Gr}^{\D}_{W(k)}} \arrow{dd}{\tau} &
& {\mrm{Sht}^{\D}_{W(k)}} \arrow{dd}{\tau} \\
\mrm{Spec}(k)^{\diamond} \arrow{ru}{c_{\mathcal{D}}} \arrow{rd}{\sigma} & &
\mrm{Spec}(k)^{\diamond} \arrow{ru}{c_{\mathcal{D}}} \arrow{rd}{\sigma}\\
& \Gr{W(k)} &
& \Shtdos{k}
\end{tikzcd}
\end{center}
Since $k$ is algebraically closed every tubular neighborhood of the Beilinson--Drinfeld Grassmannian and of moduli spaces of $p$-adic shtukas at closed points are isomorphic to the canonical one associated to some pair $({\mathcal{D}},\Phi_{\mathcal{D}})$.
\begin{thm}
\label{thm:comparetub}
Given $({\mathcal{D}},\Phi_{\mathcal{D}})$ and $\mu\in X_*({T}_{\ov{\bb{Q}}_p})$ as above, and with notation as below we have a local model diagram:
\begin{center}
\begin{tikzcd}
& {\widehat{\mrm{WSht}^{\D,\leq \mu}_{O_{E_0}}}}={\widehat{W\cali{M}^{\D,\leq \mu}_{O_{E_0}}}}\arrow{rd} \arrow{dl} & \\
\Tf{{\mrm{Sht}^{\D,\leq \mu}_{O_{E_0}}}}{c_{\mathcal{D}}} & & \Tf{{\cali{M}^{\D,\leq \mu}_{O_{E_0}}}}{c_{\mathcal{D}}}
\end{tikzcd}
\end{center}
Moreover, both arrows are ${\widehat{L^+_W\g}}_\D$-torsors. In particular, $\Tup{{\mrm{Sht}^{\D,\leq \mu}_{O_{E_0}}}}{c_{\mathcal{D}}}$ is non-empty if and only if $\Tup{{\cali{M}^{\D,\leq \mu}_{O_{E_0}}}}{c_{\mathcal{D}}}$ is and we have a canonical bijection $$\pi_0(\Tup{{\mrm{Sht}^{\D,\leq \mu}_{O_{E_0}}}}{c_{\mathcal{D}}})\cong \pi_0(\Tup{{\cali{M}^{\D,\leq \mu}_{O_{E_0}}}}{c_{\mathcal{D}}}).$$
\end{thm}
Before proving the theorem we need some preparation.
\begin{defi}
\label{defi:moduliofmatrices}
\begin{enumerate}
We denote functors $${\widehat{L^+_W\g}}_\D,{\widehat{W\mrm{Gr}}_\D},{\widehat{W\cali{M}^{\D,\leq \mu}_{O_{E_0}}}},{\widehat{\mrm{WSht}}_\D},{\widehat{\mrm{WSht}^{\D,\leq \mu}_{O_{E_0}}}}:\mrm{Perf}_{W(k)}\to \mrm{Sets}\footnote{The notation suggests that these functors are the completion at a point of another v-sheaf. This is not quite true, but they behave as if this was the case.}.$$
\item With ${\widehat{L^+_W\g}}_\D\Hub{R}=\{((R^\sharp,\iota,f),g)\}$ where $g:{\mathcal{D}}\to {\mathcal{D}}$ is an automorphism over $\mrm{Spec}(W(R^+))$ for which there is a pseudo-uniformizer $\varpi_g\in R^+$, depending of $g$, with $g=\mrm{Id}$ over $\mrm{Spec}(W(R^+)/[\varpi_g])$. We define ${\widehat{L^+_W\g}}_{\varphi^{\mrm{op},*}\D}$ exchanging ${\mathcal{D}}$ for $\varphi^{\mrm{op},*}{\mathcal{D}}$.
\item With ${\widehat{W\mrm{Gr}}_\D}\Hub{R}=\{(R^\sharp,\iota,f),{\cali{T}},\psi,\sigma\}_{/\cong}$
where ${\cali{T}}$ is a $\mathscr{G}$-torsor over $\mrm{Spec}(W(R^+))$, $\psi:{\cali{T}}\to {\mathcal{D}}$ is an isomorphism over $\mrm{Spec}(W(R^+)[\frac{1}{\xi}])$ and $\sigma:{\cali{T}}\to \varphi^{\mrm{op},*}{\mathcal{D}}$ is an isomorphism over $\mrm{Spec}(W(R^+))$ such that there is a pseudo-uniformizer $\varpi\in R^+$ depending on the data for which $\Phi_{\mathcal{D}}\circ \sigma=\psi$ when restricted to $\mrm{Spec}(W(R^+)/[\varpi])$.
\item With ${\widehat{\mrm{WSht}}_\D}\Hub{R}=\{(R^\sharp,\iota,f),{\cali{T}},\Phi,\lambda,\sigma\}_{/\cong}$
where ${\cali{T}}$ is a $\mathscr{G}$-torsor over $\mrm{Spec}(W(R^+))$, $\Phi:\varphi^{\mrm{op},*}{\cali{T}}\to {\cali{T}}$ is an isomorphism over $\mrm{Spec}(W(R^+)[\frac{1}{\xi}])$, $\lambda:{\cali{T}}\to {\mathcal{D}}$ is an isogeny over $\Yint{R^+}{[r,\infty]}$ and $\sigma:{\cali{T}}\to {\mathcal{D}}$ is an isomorphism over $\mrm{Spec}(W(R^+))$ such that there is a pseudo-uniformizer $\varpi\in R^+$ depending on the data for which $\sigma=\lambda$ when restricted to $\mrm{Spec}(\Bint{R^+}{[r,\infty]}/[\varpi])$.
\item Adding a boundedness conditions on $\psi$ or $\Phi$ we obtain ${\widehat{W\cali{M}^{\D,\leq \mu}_{O_{E_0}}}}$ or ${\widehat{\mrm{WSht}^{\D,\leq \mu}_{O_{E_0}}}}$ respectively.
\end{enumerate}
\end{defi}
Standard arguments using \Cref{pro:descendalongcurve} will prove that the objects in \Cref{defi:moduliofmatrices} are v-sheaves.
There are natural maps ${\widehat{W\mrm{Gr}}_\D}\to {\mrm{Gr}^{\D}_{W(k)}}$ (respectively $\pi:{\widehat{\mrm{WSht}}_\D}\to {\mrm{Sht}^{\D}_{W(k)}}$) that take a tuple $({\cali{T}},\psi, \sigma)$ (respectively $({\cali{T}},\Phi,\lambda,\sigma)$) and assign $({\cali{T}},\psi)$ (respectively $({\cali{T}},\Phi,\lambda)$) restricted to the appropriate loci. These maps are ${\widehat{L^+_W\g}}_{\varphi^{\mrm{op},*}\D}$-equivariant (respectively ${\widehat{L^+_W\g}}_\D$-equivariant) when we endow ${\widehat{W\mrm{Gr}}_\D}$ (respectively ${\mrm{Sht}^{\D}_{W(k)}}$) with the action sending $(g,({\cali{T}},\psi,\sigma))$ to $({\cali{T}},\psi,g\circ \sigma)$ (respectively $(g,({\cali{T}},\Phi,\lambda,\sigma))$ to $({\cali{T}},\Phi,\lambda,g\circ \sigma)$) and ${\mrm{Gr}^{\D}_{W(k)}}$ (respectively ${\mrm{Sht}^{\D}_{W(k)}}$) are given the trivial action.
\begin{lem}
\label{lem:torsorgrassmanian}
The map ${\widehat{W\mrm{Gr}}_\D}\to {\mrm{Gr}^{\D}_{W(k)}}$ factors surjectively onto $\Tf{{\mrm{Gr}^{\D}_{W(k)}}}{c_{\mathcal{D}}}$. Moreover, ${\widehat{W\mrm{Gr}}_\D}\to \Tf{{\mrm{Gr}^{\D}_{W(k)}}}{c_{\mathcal{D}}}$ is a ${\widehat{L^+_W\g}}_{\varphi^{\mrm{op},*}\D}$-torsor.
\end{lem}
\begin{proof}
Observe that ${\widehat{W\mrm{Gr}}_\D}$ formalizes points valued on affinoid perfectoid. Indeed, for $({\cali{T}},\psi,\sigma)\in {\widehat{W\mrm{Gr}}_\D}(A,A^+)$ and a map $f:\Spa{B}\to \Spdf{A^+}$, we form $(f^*{\cali{T}},f^*\psi,f^*\sigma)$ with $f^*{\cali{T}}$ defined over $\mrm{Spec}(W(B^+))$, $f^*\psi:f^*{\cali{T}}\to {\mathcal{D}}$ defined over $\mrm{Spec}(W(B^+)[\frac{1}{f(\xi)}]$ and $f^*\sigma:f^*{\cali{T}}\to f^*\varphi^{\mrm{op},*}{\mathcal{D}}$ defined over $\mrm{Spec}(W(B^+))$. To prove this triple satisfies the constraints, take $\varpi_A\in A^+$ with $\Phi_{\mathcal{D}}\circ \sigma=\psi$ in $\mrm{Spec}(W(A^+)/[\varpi_A])$. Then $f(\varpi_A)$ is topologically nilpotent and any pseudo-uniformizer $\varpi_B\in B^+$ dividing $f(\varpi_A)$ will satisfy $\Phi_{\mathcal{D}}\circ f^*\sigma=f^*\psi$ over $\mrm{Spec}(W(B^+)/[\varpi_B])$.
To prove that ${\widehat{W\mrm{Gr}}_\D}\to {\mrm{Gr}^{\D}_{W(k)}}$ factors through $\Tf{{\mrm{Gr}^{\D}_{W(k)}}}{c_{\mathcal{D}}}$ it suffices to show that for $\Spdf{R^+}\to {\widehat{W\mrm{Gr}}_\D}$ the reduction $(\Spdf{R^+})^{\mrm{red}}\to ({\mrm{Gr}^{\D}_{W(k)}})^{\mrm{red}}$ factors through $c_{\mathcal{D}}:\mrm{Spec}(k)^{\diamond}\to ({\mrm{Gr}^{\D}_{W(k)}})^{\mrm{red}}$. Let $\ovr{R^+}=(R^+/\varpi)^\mrm{perf}$. After restricting $({\cali{T}},\psi,\sigma)$ to $\mrm{Spec}(W(\ovr{R^+}))$ we get $\Phi_{\mathcal{D}}\circ \sigma =\psi$, and $\mrm{Spec}(\ovr{R^+})^{\diamond}\to {\mrm{Gr}^{\D}_{W(k)}}$ is given by $({\cali{T}},\psi)$. Now, $\sigma$ is a witness that $({\cali{T}},\psi)\cong(\varphi^{\mrm{op},*}{\mathcal{D}},\Phi_{\mathcal{D}})$ in this locus, so the map factors through $c_{\mathcal{D}}:\mrm{Spec}(k)^{\diamond}\to {\mrm{Gr}^{\D}_{W(k)}}$.
To prove ${\widehat{W\mrm{Gr}}_\D}\to \Tf{{\mrm{Gr}^{\D}_{W(k)}}}{c_{\mathcal{D}}}$ is surjective it suffices to lift maps valued on product of points. In this case, by \Cref{pro:prodpointextendg-tors}, such a $(R,R^+)$-valued point is given by $({\cali{T}},\psi)$ with ${\cali{T}}$ defined over $\mrm{Spec}(W(R^+))$ and $\psi:{\cali{T}}\to {\mathcal{D}}$ defined over $\mrm{Spec}(W(R^+)[\frac{1}{\xi}])$, with $({\cali{T}},\psi)$ isomorphic to $(\varphi^{\mrm{op},*}{\mathcal{D}}, \Phi_{\mathcal{D}})$ when restricted to $W(\ovr{R^+})$ and $W(\ovr{R^+})[\frac{1}{p}]$. Such an isomorphism $\ovr{\sigma}:({\cali{T}},\psi)\to (\varphi^{\mrm{op},*}{\mathcal{D}}, \Phi_{\mathcal{D}})$ is unique and given by $\ovr{\sigma}=\Phi_{\mathcal{D}}^{-1}\circ \psi$.
We define $\til{\sigma}:=\Phi_{\mathcal{D}}^{-1}\circ \psi: {\cali{T}}\to \varphi^{\mrm{op},*}D$ over $\Yint{R^+}{[r,\infty]}$ for $r$ sufficiently big (avoiding $V(\xi)$), clearly $\til{\sigma}$ restricts to $\ovr{\sigma}$. Using \Cref{lem:smallintegraldecomptorsors} we find $\sigma:{\cali{T}}\to \varphi^{\mrm{op},*}D$ such that $\sigma=\til{\sigma}$ when restricted to $\mrm{Spec}(\Bint{R^+}{[r,\infty]}/[\varpi'])$ for some pseudo-uniformizer $\varpi'\in R^+$. In particular $\Phi_{\mathcal{D}}\circ \sigma=\psi$ over $\mrm{Spec}(W(R^+)/[\varpi'])$. The data $({\cali{T}},\psi,\sigma)$ defines $\Spa{R}\to {\widehat{W\mrm{Gr}}_\D}$ lifting $\Spa{R}\to \Tf{{\mrm{Gr}^{\D}_{W(k)}}}{c_{\mathcal{D}}}$.
To prove ${\widehat{W\mrm{Gr}}_\D}\times_{{\mrm{Gr}^{\D}_{W(k)}}} {\widehat{W\mrm{Gr}}_\D}\cong {\widehat{L^+_W\g}}_{\varphi^{\mrm{op},*}\D}\times_{\Spdo{W(k)}} {\widehat{W\mrm{Gr}}_\D}$, take two sets of data $({\cali{T}}_i,\psi_i,\sigma_i)$ over $\Spa{A}$ with $({\cali{T}}_1|_{\Y{A^+}},\psi_1|_{\Y{A^+}\setminus V(\xi)})\cong ({\cali{T}}_2|_{\Y{A^+}},\psi_2|_{\Y{A^+}\setminus V(\xi)})$. The isomorphism must be given by $\psi_1^{-1}\circ \psi_2:{\cali{T}}_2\to {\cali{T}}_1$ and by the full-faithfulness of \Cref{thm:puncturedtoAinfked} it extends to $\mrm{Spec}(W(A^+))$. Let $g=\sigma_1\circ \psi_1^{-1}\circ \psi_2\circ \sigma_2^{-1}:\varphi^{\mrm{op},*}{\mathcal{D}}\to \varphi^{\mrm{op},*}{\mathcal{D}}$. By hypothesis, $\sigma_i\circ \psi_i^{-1}=\Phi_{\mathcal{D}}^{-1}$ on $\mrm{Spec}(W(A^+)/[\varpi_i])$ for suitable choices of $\varpi_i\in A^+$. Consequently, $(g,{\cali{T}}_2,\psi_2,\sigma_2)\in {\widehat{L^+_W\g}}_{\varphi^{\mrm{op},*}\D}\times_{\Spdo{W(k)}} {\widehat{W\mrm{Gr}}_\D}\Hub{A}$, giving the left to right map. On the other hand, to $(g,{\cali{T}},\psi,\sigma)$ we associate the pair of tuples $({\cali{T}},\psi,g\circ\sigma )$ and $({\cali{T}},\psi,\sigma)$. These constructions are inverse to each other.
\end{proof}
\begin{lem}
\label{lem:torsorshtuka}
The map ${\widehat{\mrm{WSht}}_\D}\to {\mrm{Sht}^{\D}_{W(k)}}$ factors surjectively onto $\Tf{{\mrm{Sht}^{\D}_{W(k)}}}{c_{\mathcal{D}}}$. Moreover, ${\widehat{\mrm{WSht}}_\D}\to \Tf{{\mrm{Sht}^{\D}_{W(k)}}}{c_{\mathcal{D}}}$ is a ${\widehat{L^+_W\g}}_\D$-torsor.
\end{lem}
\begin{proof}
Proving that ${\widehat{\mrm{WSht}}_\D}\to {\mrm{Sht}^{\D}_{W(k)}}$ factors surjectively onto $\Tf{{\mrm{Sht}^{\D}_{W(k)}}}{c_{\mathcal{D}}}$ follows closely the argument of \Cref{lem:torsorgrassmanian}, and we omit the details.
To prove that ${\widehat{\mrm{WSht}}_\D}\times_{{\mrm{Sht}^{\D}_{W(k)}}} {\widehat{\mrm{WSht}}_\D}\cong {\widehat{L^+_W\g}}_\D\times_{\Spdo{W(k)}} {\widehat{\mrm{WSht}}_\D}$, take two sets of data $({\cali{T}}_i,\Phi_i,\lambda_i,\sigma_i)$ over $\Spa{A}$ with $({\cali{T}}_1|_{\Yinf{A^+}},\Phi_1|_{\Yinf{A^+}\setminus V(\xi)},\lambda_1)\cong ({\cali{T}}_2|_{\Yinf{A^+}},\Phi_2|_{\Yinf{A^+}\setminus V(\xi)},\lambda_2)$. The isomorphism must be the unique lift of $\lambda_1^{-1}\circ \lambda_2:{\cali{T}}_2\to {\cali{T}}_1$ to $\Yinf{A^+}$. Glueing along the $\lambda_i$ and by the fully-faithfulness part of \Cref{thm:puncturedtoAinfked} $\lambda_1^{-1}\circ \lambda_2$ extends to $\mrm{Spec}(W(A^+))$. Moreover, letting $g=\sigma_1\circ \lambda_1^{-1}\circ \lambda_2\circ \sigma_2^{-1}:{\mathcal{D}}\to {\mathcal{D}}$ we have $\sigma_1\circ \lambda_1^{-1}=\mrm{Id}=\lambda_2\circ \sigma_2^{-1}$ over $\mrm{Spec}(\Bint{A^+}{[r,\infty]}/[\varpi_A])$ for suitable $\varpi_A\in A^+$. We associate to the original data the tuple $(g,{\cali{T}}_2,\Phi_2,\lambda_2,\sigma_2)\in {\widehat{L^+_W\g}}_\D\times_{\Spdo{W(k)}} {\widehat{\mrm{WSht}}_\D}\Hub{A}$ giving the left to right map. One constructs the inverse using the action map.
\end{proof}
We can now prove \Cref{thm:comparetub}.
\begin{proof}[Proof. (of \Cref{thm:comparetub})]
Let $\phi=(\varphi^{\mrm{op}})^{-1}$. Observe that $\theta:{\widehat{L^+_W\g}}_\D\to{\widehat{L^+_W\g}}_{\varphi^{\mrm{op},*}\D}$ given by $g\mapsto \varphi^{\mrm{op},*}g$ is an isomorphism with inverse $h\mapsto \phi^*h$. Using $\theta$ we can endow ${\widehat{W\mrm{Gr}}_\D}$ with a ${\widehat{L^+_W\g}}_\D$ action, and the projection $\pi:{\widehat{W\mrm{Gr}}_\D}\to {\mrm{Gr}^{\D}_{W(k)}}$ of \Cref{lem:torsorgrassmanian} is a ${\widehat{L^+_W\g}}_\D$-torsor.
We construct an isomorphism $\Theta:{\widehat{W\mrm{Gr}}_\D}\to {\widehat{\mrm{WSht}}_\D}$, given on $(A,A^+)$-valued points by $$({\cali{T}},\psi,\sigma)\mapsto (\phi^*{\cali{T}},\Phi,\lambda,\phi^{*}\sigma).$$ Here $\Phi:{\cali{T}}\to \phi^*{\cali{T}}$ is defined by $\Phi= (\phi^*\sigma)^{-1}\circ \psi$, and $\lambda:\phi^*{\cali{T}} \to {\mathcal{D}}$ is constructed as follows. Consider the following (non-commutative!!!) diagram,
\begin{center}
\begin{tikzcd}
{\cali{T}} \arrow{r}{\sigma} \arrow{d}{\Phi} & \varphi^{\mrm{op},*}{\mathcal{D}} \arrow{d}{\Phi_{\mathcal{D}}} \\
\phi^*{\cali{T}} \arrow{r}{\phi^*\sigma} & {\mathcal{D}}
\end{tikzcd}
\end{center}
defined over $\Yint{A^+}{[r,\infty]}$ for big enough $r$ avoiding $V(\xi)$. By hypothesis, there is $\varpi\in A^+$ with $\psi=\Phi_{\mathcal{D}}\circ \sigma$ over $\mrm{Spec}(W(R^+)/[\varpi])$. Consequently, $\phi^*\sigma\circ\Phi=\Phi_{\mathcal{D}}\circ \sigma$ over $\mrm{Spec}(\Bint{A^+}{[r,\infty]}/[\varpi])$. By \Cref{lem:liftabilityofiso}, we can construct $\lambda$ as the unique isogeny over $\Yint{A^+}{[r,\infty]}$ lifting $\phi^*\sigma$ with $\lambda=\phi^*\sigma$ over $\mrm{Spec}(\Bint{A^+}{[r,\infty]}/[\varpi])$.
The uniqueness of $\lambda$ makes this construction functorial so that $\Theta:{\widehat{W\mrm{Gr}}_\D}\to {\widehat{\mrm{WSht}}_\D}$ is well-defined.
The inverse $\Omega=\Theta^{-1}$ is given on $(A,A^+)$-valued points by
$$({\cali{T}},\Phi,\lambda,\sigma)\mapsto (\varphi^{\mrm{op},*}{\cali{T}},\sigma\circ \Phi,\varphi^{\mrm{op},*}\sigma).$$
Direct computations show $\Omega\circ \Theta=\mrm{Id}$, and that $\Theta\circ \Omega({\cali{T}},\Phi,\lambda,\sigma)=({\cali{T}},\Phi,\lambda',\sigma)$ for some $\lambda'$ with $\lambda'=\sigma=\lambda$ over $\Bint{A^+}{[r,\infty]}/[\varpi]$. The uniqueness part of \Cref{lem:liftabilityofiso} proves $\lambda=\lambda'$ and $\Theta\circ \Omega=\mrm{Id}$.
By inspection, one shows that $\Theta$ and $\Omega$ that it preserve the boundedness conditions so that $\Theta:{\widehat{W\cali{M}^{\D,\leq \mu}_{O_{E_0}}}}\to {\widehat{\mrm{WSht}^{\D,\leq \mu}_{O_{E_0}}}}$ is also an isomorphism. Finally, $$\pi_0(\Tup{{\mrm{Sht}^{\D,\leq \mu}_{O_{E_0}}}}{c_{\mathcal{D}}})=\pi_0(({\widehat{\mrm{WSht}^{\D,\leq \mu}_{O_{E_0}}}})_\eta)=\pi_0(({\widehat{W\cali{M}^{\D,\leq \mu}_{O_{E_0}}}})_\eta)=\pi_0(\Tup{{\cali{M}^{\D,\leq \mu}_{O_{E_0}}}}{c_{\mathcal{D}}})$$ since the v-sheaf in groups ${\widehat{L^+_W\g}}_\D$ is connected.
\end{proof}
We can now prove that moduli spaces of $p$-adic shtukas are rich.
\begin{thm}
\label{thm:shtukasisOrapian}
${\mathcal{K}}=(\Shtm{O_{E_0}},\Shtm{{E_0}})$ is a rich smelted kimberlite. If $\mathscr{G}$ is reductive, ${\mathcal{K}}$ is topologically normal as in \cite[Definition 4.52]{Specializ}.
\end{thm}
\begin{proof}
\Cref{pro:modulishtukformssmeltedkimberl} proves this map is a smelted kimberlite. In \cite[Proposition 23.3.3]{Ber2} it is proven that the period morphism $\Shtm{{E_0}}\to \Grm{{E_0}}$ is \'etale. By \cite[Proposition 4.46]{Specializ} and \Cref{thm:AGLR}, we know that $\Shtm{E_0}$ is a cJ-diamond.
By \cite[Theorem 1.1]{Vie19}, we know that ${X_\g^{\leq\mu}(b)}$ is locally Noetherian. By \cite[Lemma 5.23]{Specializ}, to prove that the specialization map is surjective we only need to prove that for any nonarchimedean field extension $C/W(k)[\frac{1}{p}]$ with $C$ algebraically closed, the specialization map of the base change $\Shtm{O_C}$ is surjective on closed points. It is then enough to prove that for any such $C$ the $p$-adic tubular neighborhoods of $\Shtm{O_C}$ is non-empty and that when $\mathscr{G}$ is reductive that these are connected. These follow from \Cref{thm:comparetub}, \Cref{thm:AGLR} and \Cref{cor:grassprekimber}.
\end{proof}
We finish this section with the proof of \Cref{intro:thm2}.
\begin{thm}
\label{thm:specializtheorem}
For every nonarchimedean field extension $F$ of $E_0$:
\begin{enumerate}[a)]
\item There is a continuous specialization map
$$\Sp{\Shtm{O_{F}}}:|\genSht{\Spdo{F}}|\to |{X_{\g}^{\leq\mu}(b)}|,$$
this map is a specializing and spectral map of locally spectral topological spaces. It is a quotient map and $J_b({\mathbb{Q}_p})$-equivariant.
\item If $\mathscr{G}$ is reductive the specialization map induces a bijection of connected components
$$\Sp{\Shtm{O_{F}}}:\pi_0(\genSht{\Spdo{F}})\to \pi_0({X_{\g}^{\leq\mu}(b)})$$
\end{enumerate}
\end{thm}
\begin{proof}
By \Cref{thm:shtukasisOrapian} and \Cref{pro:adlvasreducedfunctor} $(\Shtm{O_{{F}}},\genSht{\Spdo{F}})$ is a rich smelted kimberlite with reduction ${X_{\g}^{\leq\mu}(b)}$. This implies by \cite[Theorem 4.40]{Specializ} that the specialization map $\Sp{\Shtm{O_{F}}}:|\genSht{\Spdo{F}}|\to |{X_{\g}^{\leq\mu}(b)}|$ is a specializing spectral map of locally spectral spaces. Moreover, by \cite[Lemma 4.53]{Specializ} it is a quotient map. Moreover, $J_b({\mathbb{Q}_p})$-equivariance follows from functoriality of the specialization map.
For the last claim we may apply \cite[Proposition 4.55]{Specializ} and the second part of \Cref{thm:shtukasisOrapian}.
\end{proof}
|
\section{Introduction}
Holography provides a powerful framework to study large classes of strongly coupled systems at finite temperature. One of its most useful applications concerns the study of phase transitions and broken phases of thermodynamic systems. Moreover, the duality allows us to study large-$N$ systems at all energy scales. This includes the hydrodynamic limit of finite temperature systems which is expected to be universal.
In this paper we will be interested in the long wavelength excitations of the Goldstone mode that emerges in superfluid phases of matter which spontaneously break a global $U(1)$ symmetry. One of our aims is to include the first non-trivial dissipative effects which will result to a finite decay rate for the expected ``second sound". The second aim of this paper is to introduce perturbative sources which explicitly break the global symmetry and write down the effective theory of the resulting pseudo-Goldstone mode.
One important aspect of the phases we will consider is that they will be at zero chemical potential and electric charge. This will allow us to isolate the long wavelength dynamics of the condensate avoiding its mixing with the other hydrodynamic degrees of freedom of the system.
Holography has been extensively used to construct and study superfluid phases after their original discovery \cite{Gubser:2008px,Hartnoll:2008kx,Hartnoll:2008vx}. From the bulk point of view, the boundary theory global $U(1)$ is mapped to a gauged $U(1)$ symmetry acting on a complex scalar field. The vector field that gauges the $U(1)$ in the bulk is the gravitational dual of the conserved field theory Noether current operator. Below a critical temperature $T_c$ the charged scalar develops a perturbative instability yielding a new branch of broken phase black holes.
The effective theory of the Goldstone mode in the limit of long wavelengths is a topic which has been explored before. The starting point is the non-dissipative fluids which were first described in the framework of the Landau-Tisza theory \cite{PhysRev.60.356,PhysRev.72.838}. Dissipative effects at finite temperature were subsequently studied in the literature starting from \cite{KHALATNIKOV198270,ISRAEL198179} and more recently in \cite{Bhattacharya:2011eea}, in the context of a systematic classification\footnote{See also \cite{Davison:2016hno} for more recent developments in the framework of superfluids.}.
Due to the absence of chemical potential and the presence of rotational and time reversal symmetry, the only information we will need to extract from our holographic theories is two transport coefficients. We will be able to express these in terms of horizon data related to finite temperature static configurations. This, is in addition to the charge and current susceptibilities which are fixed at the level of thermodynamics and don't capture dissipative dynamics. A particularly useful tool in extracting these coefficients will be the symplectic current for gravity \cite{Crnkovic:1986ex}. At a practical level, this can be seen as the generalisation of the Wronskian for ordinary differential equations. However, it is powerful enough to be applicable in situations where the spacetime is inhomogeneous. Given the explicit expressions for our transport coefficients, we will be able to study our system near the phase transition. As we will see, the speed of second sound will go to zero as we approach the transition and the mode will become diffusive. However, its diffusion constant is not continuously connected to that of the incoherent current pole which exists in the normal phase.
Apart from the purely spontaneous case, we will also consider a scenario in which the global $U(1)$ is an almost exact symmetry\footnote{So far, the interplay of weak explicit and spontaneous breaking of symmetries has been mainly considered in the context of translations in e.g. \cite{Andrade:2015iyf,Amoretti:2018tzw, Donos:2019hpp}. For the case of global symmetries in the bulk see \cite{Donos:2019txg,Amoretti:2018tzw}.}. To implement the explicit breaking of the $U(1)$ in a controlled manner, we will introduce a perturbative static source for our complex operator that condenses at low temperatures. As a result, the corresponding current becomes only partially conserved and the propagating pseudo-Goldstone mode acquires a mass as well as a finite gap. Our analysis is based on a modified Ward identity for the now almost conserved electric current and is therefore applicable beyond the details of our specific model.
In section \ref{sec:setup} we discuss the class of holographic models we will employ in order to realise our scenario along with some relevant aspects of their thermodynamics. In section \ref{sec:LinearResponse} we construct the theory of hydrodynamics which captures the dynamics of our Goldstone mode along with the technical aspects of our computation. We conclude the section with the computation of the Green's functions and the Kubo formulae for the two transport coefficients that enter our description. In section \ref{sec:explicit_breaking} we introduce perturbative static sources which break the global symmetry in a controlled manner as well as spacetime dependent ones for the complex scalar operator. We use the sourced Ward identity for the currents to extract the retarded Green's functions of the system. From the poles we extract the dispersion relations of second sound pseudo-Goldstone mode. Section \ref{sec:numerics} is devoted to numerical checks of some of the analytic results we obtain in the previous sections.
\section{Setup}\label{sec:setup}
In this section we will introduce our holographic superfluids. Our main results on the hydrodynamics of the superfluidity Goldstone mode are independent of the specific scenario in which we will realise the neutral superfluid phase transition. For concreteness, we will consider a holographic CFT which is deformed by introducing a source $\phi_{(s)} $ for the neutral relevant operator $\mathcal{O}_{\phi}$ with bulk dual $\phi$. Below a critical temperature $T_c$, which is set by the scale $\phi_{(s)} $, a boundary operator $\mathcal{O}_{\psi}$ which is charged under a global $U(1)$ symmetry condenses. From the bulk point of view, this condensation leads to black holes with non-zero profile for the dual bulk scalar $\psi$.
To realise this setup in holography, we consider a gravitational theory in the bulk consisting of a metric, a neutral scalar $\phi$ and a complex scalar $\psi$ which is charged under a local $U(1)$ symmetry and a Maxwell field $A_{\mu}$ gauging the symmetry. The local symmetry in the bulk corresponds to a global $U(1)$ symmetry on the boundary theory and the gauge field $A_\mu$ is dual to the corresponding Noether current operator $\hat{\mathcal{J}}^{\mu}$.
The system is described by the bulk action
\begin{align}\label{eq:baction}
S_{\mathrm{bulk}}=\int d^{4}x\,\sqrt{-g}\,\left(R-V(\phi,|\psi|^{2})-\frac{1}{2}\partial_{\mu}\phi\,\partial^{\mu}\phi-(D_{\mu}\psi)(D^{\mu}\psi)^{\ast}-\frac{1}{4}\tau(\phi,|\psi|^{2})\,F^{\mu\nu}F_{\mu\nu} \right)\,,
\end{align}
with the covariant derivative $D_{\mu}\psi=\nabla_{\mu}\psi+iqA_{\mu}\,\psi$ and the field strength $F=dA$. We will be mostly interested in configurations which are dual to superfluids and therefore spontaneously break the $U(1)$ symmetry. These backgrounds will have complex scalar with non-trivial modulus and for such configurations it will be beneficial to perform the field redefinition $\psi=\rho\,e^{i\theta}$. This brings the action to the equivalent form
\begin{align}\label{eq:baction2}
S=\int d^{4}x\,\sqrt{-g}\,\left(R-V(\phi,\rho^{2})-\frac{1}{2}(\partial\phi)^{2}-(\partial\rho)^{2}-\rho^{2}\,(\partial\theta+q A)^{2}-\frac{1}{4}\tau(\phi,\rho^{2})\,F^{\mu\nu}F_{\mu\nu} \right)\,.
\end{align}
The corresponding equations of motion are
\begin{align}\label{eq:eom}
R_{\mu\nu}-\frac{1}{2}g_{\mu\nu}V-\frac{\tau}{2}\left( F_{\mu\rho}F_{\nu}{}^{\rho}-\frac{1}{4}g_{\mu\nu}\,F^{2}\right) \qquad\qquad\qquad\qquad\qquad\qquad&\notag \\
-\frac{1}{2}\partial_{\mu}\phi\,\partial_{\nu}\phi-\partial_{\mu}\rho\,\partial_{\nu}\rho-\rho^{2}(\partial_{\mu}\theta+qA_{\mu})\,(\partial_{\nu}\theta+qA_{\nu})=&0\notag \\
\nabla_{\mu}\nabla^{\mu}\phi-\partial_{\phi}V-\frac{1}{4}\partial_\phi\tau\,F^{2}=&0\notag \\
\nabla_{\mu}\nabla^{\mu}\rho-\partial_{\rho^{2}}V\,\rho-\frac{1}{4}\partial_{\rho^{2}}\tau\,\rho\,F^{2}-\rho\,(\partial\theta+qA)^{2}=&0\notag \\
\nabla_{\mu}\left(\rho^{2}\left(\nabla^{\mu}\theta+q\,A^{\mu} \right)\right)=&0\notag \\
\nabla_{\mu}(\tau\,F^{\mu\nu})-2q\,\rho^{2}\,(\nabla^{\nu}\theta+q\,A^{\nu})=&0\,.
\end{align}
In order to implement our holographic scenario, we will assume that for small $\phi$ and $\psi$ the potential and the gauge coupling admit the expansions
\begin{align}\label{eq:V_Tau_Exp}
V&\approx -6+\frac{1}{2}m_\phi^2\,\phi^2+m_\psi^2\,|\psi|^2+\cdots\notag\\
\tau&\approx 1+\cdots\,.
\end{align}
Under these conditions, our theory admits the geometry of $AdS_4$ as solution with metric
\begin{align}
ds^2=r^2\left(- dt^2+dx^2+dy^2\right)+\frac{dr^2}{r^2}\,
\end{align}
and trivial scalars and gauge field. Given the expansion \eqref{eq:V_Tau_Exp}, the bulk scalars $\phi$ and $\psi$ correspond to operators $\mathcal{O}_\phi$ and $\mathcal{O}_\psi$ whose dimensions $\Delta_\phi$ and $\Delta_\psi$ are fixed by the mass terms according to $\Delta_\phi(\Delta_\phi-3)=m_\phi^2$ and $\Delta_\psi(\Delta_\psi-3)=m_\psi^2$.
Without loss of generality, a suitable ansatz which captures all the necessary ingredients is
\begin{align}\label{eq:background}
ds^{2}&=-U(r)\,dt^{2}+\frac{dr^{2}}{U(r)}+e^{2g(r)}\,\left(dx^{2}+dy^{2} \right)\,,\notag \\
\phi&=\phi(r),\qquad \rho=\rho(r),\qquad A=0\,.
\end{align}
This ansatz leads to a non-linear system of ODEs for the radial functions that appear in it. Notice that the above choice of coordinates does not fully fix the radial coordinate $r$ which we are still free to shift by an arbitrary constant. We will choose to fix this freedom by requiring that the horizon of Hawking temperature $T$ is located at $r=0$. This allows us to write the near horizon expansion
\begin{align}\label{eq:bhor_exp}
&U(r)\approx\,4\pi T\,r+\mathcal{O}(r^{2}),\qquad g(r)\approx g^{(0)}+\mathcal{O}(r)\,,\notag \\
&\phi(r)\approx \phi^{(0)}+\mathcal{O}(r),\qquad \rho(r)\approx \rho^{(0)}+\mathcal{O}(r)\,.
\end{align}
Ultimately, the backgrounds we wish to consider correspond to thermal states of the theory deformed by a source of the relevant operator $\mathcal{O}_\phi$ and a spontaneous VEV for the charged operator $\mathcal{O}_\psi$. Given these considerations, the appropriate near conformal boundary expansions at $r\to\infty$ are
\begin{align}\label{eq:UV_expansion}
&U(r)\approx (r+R)^{2}+\cdots+g_{(v)}\,(r+R)^{-1}+\cdots\,,\notag\\
&g(r)\approx \ln(r+R)+\dots\,,\notag \\
&\phi(r)\approx \phi_{(s)}\,(r+R)^{\Delta_{\phi}-3}+\cdots +\phi_{(v)}\,(r+R)^{-\Delta_{\phi}}+\cdots\,,\notag \\
&\rho(r)\approx \rho_{(s)}\,(r+R)^{\Delta_{\psi}-3}+\cdots\rho_{(v)}\,(r+R)^{-\Delta_{\psi}}+\cdots\,,
\end{align}
where we have the leading behaviour as well as the various constants of integration for our system. Given that we are looking for phases where $\mathcal{O}_{\psi}$ takes a VEV spontaneously, we will either set the sources $\rho_{(s)}$ equal to zero or, as we will do in section \ref{sec:explicit_breaking}, keep them as perturbative deformations. The VEVs of the scalar operators then are fixed by $\phi_{(v)}$ and $\rho_{(v)}$\footnote{In general, holographic renormalisation can involve the sources $\rho_{(s)}$ as part of the VEV of our scalar operators. However, we consider phases in which our operator takes a VEV spontaneously and we will naturally be working in the limit $\rho_{(s)}\ll \rho_{(v)}^{(3-\Delta_\psi)/\Delta_\psi}$. In this situation, the VEV will be approximately fixed by $\rho_{(v)}$.}. The constant shift $R$ is an artefact of the way we chose to fix our radial coordinate by placing the horizon at $r=0$.
At this point, it is worth understanding the asymptotics of the phase field $\theta$. In the absence of (or for perturbatively small) source $\rho_{(s)}$ a perturbation of $\delta\theta$ admits the asymptotic expansion
\begin{align}\label{eq:thetav}
\delta\theta(r)\approx r^{2\Delta_\psi-3}\,\delta\theta_{(s)}+\cdots+\delta\theta_{(v)}+\cdots\,.
\end{align}
In the complete absence of a source for $\psi$, the relevant bit for us is the constant term in $r$, which parametrises the phase of the order parameter. Indeed, for the VEV of the condensed operator we will have that $\langle\mathcal{O}_\psi \rangle\propto \rho_{(v)}\,e^{i\,\theta_{(v)}}$. From the boundary point of view, we can simply change the global phase without any cost in energy. The fact that we can freely rotate the VEV $\langle\mathcal{O}_\psi \rangle$ without changing the energy of our system reflects the existence of a Goldstone mode in the boundary theory. This suggests that the dynamics of the Goldstone mode is captured by the VEV of the operator
\begin{align}
\mathcal{O}_{Y}=\frac{1}{2 i\,\left|\langle\mathcal{O}_\psi \rangle_b\right|}\,(\langle\mathcal{O}_{\bar{\psi}} \rangle_b\,\mathcal{O}_{\psi}-\langle\mathcal{O}_\psi \rangle_b\,\mathcal{O}_{\bar{\psi}})\,,
\label{eq:OY_def}
\end{align}
where $\langle\mathcal{O}_\psi \rangle$ is the thermal state VEV. In the absence of a source for $\psi$, for the fluctuations we can write
\begin{align}\label{eq:vevOY}
\delta \langle\mathcal{O}_Y \rangle=\langle\mathcal{O}_\psi \rangle\,\delta\theta_{(v)}\,.
\end{align}
In section \ref{sec:explicit_breaking} of this paper will be interested in hydrodynamic perturbations in which the source $\delta\theta_{(s)}$ will be much smaller than the scale of $\delta\theta_{(v)}$. Given this information, in this language the perturbative source for the scalar will be $\delta s_{\psi}=i(\rho_{(v)}\,\delta \theta_{(s)}+\delta\rho_{(s)}\,\delta\theta_{(v)})$ while the VEV will be given by $\langle\mathcal{O}_\psi \rangle\propto (2\Delta_\psi-3)\,\rho_{(v)}\,(1+i\delta\theta_{(v)})$ after a perturbation. Therefore the source of the operator $\mathcal{O}_{Y}$ will be simply $s_Y=(\rho_{(v)}\,\delta \theta_{(s)}+\delta\rho_{(s)}\,\delta\theta_{(v)})$ while for its VEV we can write equation \eqref{eq:vevOY}.
A central point of interest to our paper is the fluctuations of the bulk gauge field $A$ around the background black holes of equation \eqref{eq:background}. From the equations of motion \eqref{eq:eom}, we see that fluctuations of the gauge field $A_{\mu}$ and phase field $\theta$ are captured by the last two equations. In fact, after defining the one-form field $B_{\mu}=\partial_{\mu}\theta+q\,A_{\mu}$, we can simply consider the equation of motion of a massive vector field in the bulk
\begin{align}\label{eq:beom}
\nabla_{\mu}(\tau\,W^{\mu\nu})-2q^{2}\rho^{2}\,B^{\nu}=0\,,
\end{align}
where we have defined the two form $W=dB$. The penultimate equation of \eqref{eq:eom} now reads
\begin{align}
\nabla_{\mu}\left( \rho^2\,B^\mu\right)=0\,,
\end{align}
and is simply a consequence of taking the divergence of equation \eqref{eq:beom}. For this reason we will only need to consider equation \eqref{eq:beom}. Close to the conformal boundary, in the absence of background sources for complex scalar, the 1-form field $B_\nu$ admits the expansion
\begin{align}\label{eq:Basympt}
B_{\alpha}=\partial_\alpha\theta_{(s)}\,r^{2\Delta_\psi-3}+\cdots+v_{\alpha}+\cdots+\frac{q\,j_{\alpha}}{r}+\cdots\,,
\end{align}
where $v_{\alpha}=\partial_{\alpha}\theta_{(v)}+q\,\mu_{\alpha}$ is a gauge invariant combination of the superfluid velocity $\partial_{\alpha}\theta_{(v)}$ and the source $\mu_{\alpha}$ for the $U(1)$ current. Moreover, as we will explain later the constants of integration $j_\alpha$ satisfy the Ward identity for the currents which are given by equation \eqref{eq:ftcurrent}. Note that in the thermal states we are interested in we have $\mu_{\alpha}=0$; we will only consider non-zero $\mu_{\alpha}$ when computing the thermodynamic susceptibilities.
\subsection{Thermodynamics}\label{sec:thermo}
An important ingredient in studying the thermodynamics and the linear response of our system is the free energy density $w$. In order to compute it, we first need to regularise our bulk action \eqref{eq:baction} by introducing appropriate couterterms which render the total action finite and the boundary value problem well defined. These form a boundary action which is defined on a hypersurface $\partial M$ of constant radial coordinate $r$ near the conformal boundary. An appropriate choice of boundary action includes the terms
\begin{align}\label{eq:bdy_action}
S_{bdr}=&-\int_{\partial M}d^{3}x\,\sqrt{-\gamma}\,\left(-2K + 4 +R_{bdr}\right)\notag\\
&\quad -\frac{1}{2}\int_{\partial M}d^{3}x\,\sqrt{-\gamma}\,[(3-\Delta_{\phi})\phi^2-\frac{1}{2\Delta_{\phi}-5}\,\partial_{a}\phi\partial^{a}\phi]\notag\\
&\quad -\int_{\partial M}d^{3}x\,\sqrt{-\gamma}\,[(3-\Delta_{\psi})|\psi|^2-\frac{1}{2\Delta_{\psi}-5}\,D_{a}\psi D^{a}\psi^{\ast}]+\cdots\,,
\end{align}
with $\gamma_{\alpha\beta}$ the induced metric on $\partial M$, $R_{bdr}$ the associated Ricci scalar and $K$ the extrinsic curvature scalar of the constant $r$ hypersurface. In fact, for the case with $\Delta_{\phi}=\Delta_{\psi}=2$ on which we focus in our numerics section \ref{sec:numerics}, these are all the terms needed.
In order to compute the free energy we need to evaluate the regularised action $S_{tot}=S_{bulk}+S_{bdr}$ on the Euclidean version of our backgrounds \eqref{eq:background} with $t=-i\,\tau$. Since we are dealing with an infinite field theory system, this is an infinite quantity and we should be discussing densities instead. After dropping the integration over the boundary spatial non-compact coordinates, this yields the density $I_{tot}$ which is related to the free energy density $w_{FE}$ via $w_{FE}=T I_{tot}$ with $T$ the Hawking temperature of our black brane. Notice that, in the absence of sources, the terms which involve the complex scalar $\psi$ in \eqref{eq:bdy_action} will not contribute to the thermodynamics of our system. However, these are needed in order to extract the VEV of the complex operator $\mathcal{O}_{\psi}$.
In order to compute the on-shell value of the Euclidean bulk action $I_{bulk}$, it is useful to write the integrand as a total derivative. After exploiting the existence of the Killing vector $\partial_t$ and using a Komar type of argument, we can write
\begin{align}\label{eq:bonshell}
I_{bulk}=\frac{1}{T}\int_{0}^{\infty}dr\,\left(e^{2g}\,U^{\prime} \right)^{\prime}\,.
\end{align}
Being in the grand canonical ensemble and at zero background chemical potential, the free energy density of our system is
\begin{align}
w_{FE}=\epsilon- T\,s,
\end{align}
where $\epsilon$ is the energy density and $s$ is the Bekenstein-Hawking entropy. This can be expressed in terms of the horizon data \eqref{eq:bhor_exp} as
\begin{align}\label{eq:entropy_density}
s=4\pi\,e^{2\,g^{(0)}}\,.
\end{align}
In the case of e.g. $\Delta_{\phi}=\Delta_{\psi}=2$ the bulk on-shell action \eqref{eq:bonshell} combines with the boundary action \eqref{eq:bdy_action} to yield
\begin{align}
w_{FE}=-2g_{(v)}-\phi_{(s)}\,\phi_{(v)}-T\,s\,.
\end{align}
Even though we have not included a source $\mu_\alpha$ for the current, this is certainly an important part of thermodynanics for a superfluid. The response of the system to an external source includes a non-trivial expectation value for the conserved $U(1)$ current
\begin{align}\label{eq:ftcurrent}
J^\alpha=\lim_{r\to\infty}\sqrt{-g}\,\tau\,F^{\alpha r}=\lim_{r\to\infty}\sqrt{-g}\,\tau\,W^{\alpha r}\,.
\end{align}
For our purposes, we will need this information in the context of linear response.
In addition to the free energy $w$, we are also interested in the thermodynamic susceptibilities of our system. In order to compute them, we consider the static perturbations $\delta B^{(t)}$ and $\delta B^{(x)}$ with zero superfluid velocity. In terms of the asymptotics \eqref{eq:Basympt}, we have $\delta v_{\nu}=q\,\delta^{t}_{\nu}\,\delta \mu_{t}$ and $\delta v_{\nu}=q\,\delta^{x}_{\nu}\,\delta \mu_{x}$. Close to the conformal boundary these perturbations will admit the expansion
\begin{align}\label{eq:therm_pert_UV}
\delta B^{(t)}_{t}&=q\,\delta\mu_{t}+q\,\frac{\delta j_{t}}{r+R}+\cdots\,,\notag \\
\delta B^{(x)}_{x}&=q\,\delta\mu_{x}+q\,\frac{\delta j_{x}}{r+R}+\cdots\,.
\end{align}
In terms of the thermodynamic susceptibilities $\chi_{QQ}$ and $\chi_{JJ}$ we must have $\delta j_{t}=-\chi_{QQ}\,\delta\mu_{t}$\footnote{The charge density is $\delta\rho=-\delta j_{t}$.} and $\delta j_{x}=-\chi_{JJ}\,\delta\mu_{x}$. Close to the event horizon, regularity demands the expansion
\begin{align}\label{eq:therm_pert_IR}
\delta B^{(t)}_{t}&=q\, \delta\mu_{t}\, a_{t}^{(0)}\,r+\mathcal{O}(r^{2})\,,\notag \\
\delta B^{(x)}_{x}&=q\, \delta\mu_{x}\, a_{x}^{(0)}+\mathcal{O}(r)\,.
\end{align}
The quantities $a_{t}^{(0)}$ and $a_{x}^{(0)}$ are certainly part of the thermodynamics of a superfluid. Later, we will see that together with the horizon data of \eqref{eq:nh_exp} they will determine the transport coefficients of our superfluid when we express the current in terms of the superfluid velocity $\partial_\alpha\theta_{(v)}$.
Later in the paper, we will also want to understand our hydrodynamic expansion close to the phase transition. For the case where the transition is second order, close to the critical temperature $T_c$ we must have $\rho\propto \sqrt{T_c-T}$ corresponding to a VEV which scales like $\langle\mathcal{O}_\psi\rangle\propto \sqrt{T_c-T}$. This will let us see the important fact that the Goldstone mode does not connect continuously to the diffusive mode of the incoherent current which exists above $T_c$. More interestingly, we will see that the source for this discontinuity is that our hydrodynamic expansion breaks down close to the critical temperature making the radius of convergence infinitesimally small.
By integrating the bulk equations of motion \eqref{eq:beom} we obtain the relations
\begin{align}
\delta \rho&=e^{2g^{(0)}}\tau^{(0)}\delta\mu_t\,a_t^{(0)}+2q\,\int_{0}^{\infty}dr\,\rho^2\frac{e^{2g}}{U}\delta B_{t}^{(t)}\,,\notag\\
\delta j_x&=-2q\,\int_{0}^{\infty}dr\,\rho^2\,\delta B_x^{(x)}\,.
\end{align}
As we can see, the right hand side of the above equations still involves the perturbation of the one-form field. Close to the phase transitions these equations yield
\begin{align}\label{eq:susc_approx}
\chi_{QQ}&=e^{2g^{(0)}}\tau^{(0)}\,a_t^{(0)}+\mathcal{O}\left(T_c-T\right)\,,\notag\\
\chi_{JJ}&=2q^2\,\int_0^\infty dr\,\rho^2+\mathcal{O}\left((T_c-T)^2\right)\,.
\end{align}
This is indeed the behaviour we would have expected close to a superfluid phase transition with the charge susceptibility $\chi_{QQ}$ remaining finite and the current susceptibility $\chi_{JJ}$ approaching zero.
\section{Linear Response}\label{sec:LinearResponse}
In this section, we will study long wavelength fluctuations of the $U(1)$ current of our system. The thermal state above the critical temperature is simply an electrically neutral hot plasma corresponding to a CFT that has been deformed by a relevant operator while preserving Poincare invariance. In the absence of electric charge, the electric current fluctuations are dominated by a diffusive mode in the hydrodynamic limit \cite{Kovtun:2003wp, Saremi:2007dn, Iqbal:2008by}. The existence of this mode in a neutral plasma is due to the existence of an incoherent current in strongly coupled CFTs \cite{Damle:1997rxu, Hartnoll:2007ih}.
Below the critical temperature the hydrodynamics of the electric current will be dominated by the Goldstone mode associated to the spontaneous breaking of the global $U(1)$ of the boundary theory. In section \ref{sec:sympl} we will introduce the symplectic current in the bulk which will be the main technical tool we will use for our computations. In section \ref{sec:sec_sound} we will construct the hydrodynamic perturbations which couple to the Goldstone mode of our boundary theory. This will allow us to write constitutive relations for the expectation value of the current operator in terms of the phase of our order parameter. Using these and current conservation we will extract the dispersion relation of the second sound mode in terms of thermodynamic susceptibilities and two transport coefficients which are expressed in terms of horizon quantities. Finally, in section \ref{sec:greens} we will include sources for the current in our analysis. We will give expressions for the retarded Green's functions of the system and Kubo formulae for the transport coefficients of our superfluid.
\subsection{Symplectic Current}\label{sec:sympl}
A powerful tool we will use is the symplectic current for the bulk theory. This will allow us to deal with the one-form field fluctuations in an elegant way. Its benefit lies in the fact that it is a conserved current in the bulk and will allow us to relate boundary quantities to horizon ones. As we will see, this logic will allow us to express the boundary electric current in terms of derivatives of the phase of our order parameter, the superfluid velocity, and the sources.
In order to introduce, it we imagine that we have two perturbations $\delta B^{<1>}_\mu$ and $\delta B^{<2>}_\mu$ which solve our bulk equation \eqref{eq:beom}. We can then construct the vector density
\begin{align}\label{eq:sympl_current}
P^{\mu}=\sqrt{-g}\,\tau\,\left(\delta B^{<1>}_{\nu}\delta (W^{<2>})^{\nu\mu}-\delta B^{<2>}_{\nu}\delta (W^{<1>})^{\nu\mu} \right)\,,
\end{align}
which can be shown to be divergence free,
\begin{align}\label{eq:divP}
\partial_{\mu}P^{\mu}=0\,.
\end{align}
This current is not a consequence of a conservation law as it is based on two independent solutions. It merely comes from the fact that the equations of motion of our classical theory in the bulk are derived from a local classical action. In the hydrodynamic limit, the dominant term in \eqref{eq:divP} will be the one involving the radial derivative which will let us relate the symplectic current on the black brane horizon to the symplectic current on the conformal boundary boundary.
This is especially helpful when one of the two solutions we are using in the construction in the construction of \eqref{eq:sympl_current} is considered to be known. For our purposes, the role of the known solution will be played by the static perturbations $\delta B^{(t)}_\mu$ and $\delta B^{(x)}_\mu$ we discussed in section \ref{sec:thermo}. At a philosophical level, we will need to consider as known all the static black holes which can be used to describe the thermodynamics of our system. That would include the black holes corresponding to finite chemical potential as well as persistent supercurrents. The reason is that, as we will see, the susceptibilities $\chi_{QQ}$ and $\chi_{JJ}$ will play an important role even though we will be studying transport in thermal states of zero chemical potential and external vector field. For the purpose of extracting those, the knowledge of the static perturbations $\delta B^{(t)}_\mu$ and $\delta B^{(x)}_\mu$ is sufficient.
\subsection{Second sound}\label{sec:sec_sound}
In this section we would like to construct the bulk perturbation corresponding to the Goldstone mode of the boundary theory: the second sound. As we discussed in section \ref{sec:thermo}, the Goldstone mode involves the phase of our order parameter and therefore the associated conserved current due to the global symmetry on the boundary. In the absence of electric charge, the current decouples from the stress tensor of the theory within linear response. This will allow us to clearly isolate the dynamics of the Goldstone mode from the rest of the hydrodynamics modes of our system.
From the bulk point of view we will only need to examine perturbations of the one-form field $B_\mu$. The spacetime translational symmetries allow us to study Fourier modes. Thus, in order to study perturbations in the hydrodynamic limit, we will consider long wavelength excitations of the form
\begin{align}\label{eq:qnm_ansatz}
\delta B_{\mu}(t,x;r)=e^{-i\omega (t+S(r))+i\varepsilon k\,x}\,\delta b_{\mu}(r)\,dx^{\mu}\,,
\end{align}
for some small number $\varepsilon$. The function $S(r)$ is chosen so that it drops faster that $\mathcal{O}(1/r^3)$ close to the conformal boundary and it therefore doesn't interfere with holographic renormalisation. However, close to the horizon, it is chosen so that it approaches $S(r)\to \frac{1}{4\pi T}\ln r$ and the combination $t+S(r)$ is regular and ingoing. Note that we picked the momentum $k$ to point in the direction $x$ without loss of generality given that the background is isotropic.
An important ingredient in extracting the second sound is the absence of boundary sources. In general, the asymptotic expansion close to the conformal boundary is
\begin{align}
\delta b_{\alpha}=\delta \hat{v}_{\alpha}+q\,\frac{\delta \hat{j}_{\alpha}}{r}+\cdots\,.
\end{align}
The leading terms are a gauge invariant combination of the external one-form source and the superfluid velocity. Absence of sources is equivalent to demanding
\begin{align}\label{eq:gbcs}
\delta \hat{v}_{t}=-i\omega\,\delta \hat{c},\qquad \delta \hat{v}_{x}=i\varepsilon k\,\delta \hat{c}\,,
\end{align}
so that $v_{\alpha}=\partial_{\alpha}\theta_{(v)}$ in the notation of equation \eqref{eq:Basympt}.
Moreover, charge conservation implies that
\begin{align}\label{eq:chargecont}
\partial_{\alpha}\delta j^{\alpha}=0\Rightarrow \omega \delta \hat{j}_{t}+ \varepsilon k \delta\hat{j}_{x}=0\,.
\end{align}
At this point it will be illuminating to count constants of integration. This is crucial in order to see that we are doing the right thing in terms of boundary conditions since we are after specific quasi-normal modes. The equation of motion \eqref{eq:beom} yields two second order equations for $\delta b_t$ and $\delta b_x$ while $\delta b_r$ can be solved algebraically. In order to find a unique solution we will therefore need to fix four constants.
Close to the conformal boundary we have the constant $\delta \hat{c}$, while $\delta\hat{j}_t$ and $\delta\hat{j}_t$ give one more constant since they have to satisfy the constraint \eqref{eq:chargecont}. Close to the horizon, in-falling boundary conditions fix the expansion
\begin{align}
\delta b_\alpha&=\delta b_\alpha^{(0)}+r\,\delta b_\alpha^{(1)}+\cdots\,,\notag\\
\delta b_r&=\frac{1}{4\pi Tr}\delta b_t^{(0)}+\delta b_r^{(1)}+\cdots\,.
\end{align}
We therefore have an extra two constants of integration coming from the near horizon expansion, giving an overall total of 4 constants. However, we are only solving a linear system of homogeneous equations. Since we are not introducing any sources, we can use the scaling symmetry of the problem to set any of the above constants of integration to one leaving with only three. The fourth constant is precisely the frequency $\omega$ which will ultimately become a function of the wavenumber $k$ that we are free to choose. This procedure will fix the dispersion relation for $\omega(\epsilon k)$ for the quasi-normal modes.
For our purposes however, we are after a particular mode which is hydrodynamic and has $\omega=0$ for $\varepsilon=0$. This simply corresponds to the trivial solution for the one form field. This allows us to consider the hydrodynamic expansion
\begin{align}
\omega&=\varepsilon\,\omega_{[1]}+\varepsilon^{2}\,\omega_{[2]}+\cdots\,,\notag \\
\delta\hat{j}_{\mu}&=\varepsilon\,\delta\hat{j}_{\mu[1]}+\varepsilon^{2}\,\delta\hat{j}_{\mu[2]}+\cdots\,.
\end{align}
For the radial function in the ansatz \eqref{eq:qnm_ansatz} we will write the expansion
\begin{align}\label{eq:qnm_eps_exp}
\delta b_{t}(r)&=\varepsilon\,\delta \hat{B}^{(t)}_{t}(r)+\varepsilon^{2}\,\delta B^{(2)}_{t}(r)+\cdots\,,\notag \\
\delta b_{x}(r)&=\varepsilon\,\delta \hat{B}^{(x)}_{x}(r)+\varepsilon^{2}\,\delta B^{(2)}_{x}(r)+\cdots\,,\notag \\
\delta b_{r}(r)&=\varepsilon^{2}\,\delta B^{(2)}_{r}(r)+\cdots\,,
\end{align}
where $\delta \hat{B}^{(t)}_{t}(r)$ and $\delta \hat{B}^{(x)}_{x}(r)$ are precisely the thermodynamic perturbations we discussed in equation \eqref{eq:Basympt} with
\begin{align}
\delta\mu_{t}=-\frac{i\omega_{[1]}}{q}\delta \hat{c},\qquad \delta\mu_{x}=\frac{i k}{q}\delta \hat{c}\,.
\end{align}
For the subleading terms we impose the near conformal boundary expansion
\begin{align}
\delta B_{t}^{(n)}&=-i\omega_{[n]}\delta \hat{c}+ q\frac{\delta\hat{j}_{t[n]}}{r}+\cdots\,,\notag \\
\delta B_{x}^{(n)}&= q\frac{\delta\hat{j}_{x[n]}}{r}+\cdots\,,
\end{align}
which is simply a reorganisation of the perturbation with boundary conditions as in equation \eqref{eq:gbcs}. Close to the horizon, we impose in-falling boundary conditions. This gives us the expansion,
\begin{align}\label{eq:nh_exp}
\delta B_{t}^{(n)}&= \delta B^{(n)(0)}_{t}+\delta B^{(n)(1)}_{t}\,r+\cdots\,,\notag \\
\delta B_{r}^{(n)}&= \frac{\delta B^{(n)(0)}_{t}}{4\pi Tr}+\delta B^{(n)(0)}_{r}+\cdots\,,\notag \\
\delta B_{x}^{(n)}&= \delta B^{(n)(0)}_{x}+\delta B^{(n)(1)}_{x}\,r+\cdots\,.
\end{align}
At leading order in the $\varepsilon$ expansion the components of the conserved current are
\begin{align}\label{eq:currents_leading}
q\,\delta\hat{j}_{t[1]}=i\omega_{[1]}\chi_{QQ}\,\delta \hat{c},\qquad q\,\delta\hat{j}_{x[1]}=-ik\chi_{JJ}\,\delta \hat{c}\,,
\end{align}
which follows from the definition of the charge and current susceptibilities. At that order, we see that equation \eqref{eq:chargecont} gives
\begin{align}\label{eq:disp_linear}
&\omega_{[1]}\delta \hat{j}_{t[1]}+k\delta \hat{j}_{x[1]}=0\Rightarrow \omega_{[1]}^{2}\,\chi_{QQ}-k^{2}\,\chi_{JJ}=0\notag \\
&\Rightarrow\omega_{[1]}=\pm\,c_{s}\,k\,,
\end{align}
with $c_{s}^{2}=\chi_{JJ}/\chi_{QQ}$ being the universal speed of second sound.
To specify $\omega_{[2]}$, we will need to fix the currents $\delta\hat{j}_{\alpha[2]}$. In order to do this we will employ the conservation \eqref{eq:divP} of the symplectic current \eqref{eq:sympl_current}. As we explained in section \ref{sec:sympl}, the symplectic current is particularly useful when we compare the solution we are after to a solution we already know. For this reason we will consider it for two different choices of pairs of perturbations. For both cases, we will choose $\delta B^{<1>}$ to be the perturbation in \eqref{eq:qnm_ansatz}.
Our first choice for $\delta B^{<2>}$ is the static perturbation $\delta B^{(x)}$ of section \ref{sec:thermo}. This will allow us to specify the component $\delta\hat{j}_x$. Expanding the symplectic current in $\varepsilon$ we have
\begin{align}\label{eq:sympl_exp}
P^{\mu}=e^{-i\omega (t+S(r))+i\varepsilon k\,x}\,\left(\varepsilon^{2}\,p^{\mu}_{(2)}+\varepsilon^3\,p^{\mu}_{(3)}+\cdots \right)\,.
\end{align}
One would expect that the leading term would be $\mathcal{O}(\varepsilon)$ since our perturbation $\delta B^{<1>}$ starts at order $\varepsilon$ and $\delta B^{<2>}$ starts at zeroth order. However, the leading term in the $\varepsilon$-expansion of $\delta B^{<1>}$ in equation \eqref{eq:qnm_eps_exp} is proportional to $\delta B^{<2>}$ and the would-be leading term in the symplectic current turns out to vanish.
More explicitly we have
\begin{align}
p^{t}_{(2)}&=\frac{i\tau}{U}\delta B^{(x)}_{x}\,\left(\omega_{[1]}\delta \hat{B}^{(x)}_{x}+k\delta \hat{B}^{(t)}_{t} \right)\,,\notag \\
p^{r}_{(2)}&=-U\tau\,\left(\delta B^{(2)}_{x}\,\partial_{r}\delta B^{(x)}_{x}+\delta B^{(x)}_{x}\,\left(i \omega_{[1]} S^{\prime}\, \delta \hat{B}^{(x)}_{x}-\partial_{r}\delta B^{(2)}_{x}\right) \right)\,,\notag \\
p^{x}_{(2)}&=U\tau\,\delta B_{r}^{(2)}\,\partial_{r}\delta B^{(x)}_{x} \,.
\end{align}
We now consider the divergence \eqref{eq:divP} and keep only terms up to $\mathcal{O}(\varepsilon^{2})$ giving
\begin{align}
\partial_{r}p_{(2)}^{r}=0\,.
\end{align}
Integrating this equation from the horizon up to the conformal boundary, we obtain the relation
\begin{align}\label{eq:current_2ndO}
q\,\delta \hat{j}_{x[2]}=-\omega_{[1]}k\,\sigma_{d}\,\delta \hat{c}\,,
\end{align}
where we have defined \footnote{For this transport coefficient, a similar result was obtained in \cite{Davison:2015taa}. Here we clarify the significance of the quantities that appear in this equation as data related to the geometries dual to the thermal state after the inclusion of the superfluid velocity in the ensemble variables.}
\begin{align}\label{eq:sigmad_def}
\sigma_d=\tau^{(0)}\,(a_x^{(0)})^2\,.
\end{align}
Choosing now $\delta B^{<2>}$ to be $\delta B^{(t)}$, we obtain
\begin{align}
p^{t}_{(2)}&=-e^{2g}\tau\,\delta B^{(2)}_{r}\,\partial_{r}\delta B^{(t)}_{t}\,,\notag \\
p^{r}_{(2)}&=e^{2g}\tau\,\left(\delta B^{(2)}_{t}\,\partial_{r}\delta B^{(t)}_{t}+\delta B^{(t)}_{t}\,\left(i \omega_{[1]} S^{\prime}\, \delta \hat{B}^{(t)}_{t}-\partial_{r}\delta B^{(2)}_{t}\right) \right)\,,\notag \\
p^{x}_{(2)}&=-\frac{i\tau}{U}\delta B^{(t)}_{t}\,\left( \omega_{[1]}\,\delta\hat{B}^{(x)}_{x}+k\,\delta\hat{B}^{(t)}_{t}\right) \,.
\end{align}
Keeping once again only terms up to order $\mathcal{O}(\varepsilon^{2})$ in equation \eqref{eq:divP} and integrating from the horizon up to the conformal boundary, we obtain
\begin{align}
q\,\delta\hat{j}_{t[2]}=i\omega_{[2]}\,\chi_{QQ}\,\delta \hat{c}+e^{2g^{(0)}}\tau^{(0)}\,\delta B_{t}^{(2)(0)}\,a_{t}^{(0)}\,.
\end{align}
We have used the near horizon expansion \eqref{eq:nh_exp} and we need to specify the constant of integration $\delta B_{t}^{(2)(0)}$. We can do this by considering the near horizon limit of the radial component of the equation of motion \eqref{eq:beom} along with the expansion \eqref{eq:nh_exp}. This fixes
\begin{align}
\delta B^{(2)(0)}_{t}=-\frac{\omega_{[1]}^{2}}{2q^{2}(\rho^{(0)})^{2}}a_{t}^{(0)}\tau^{(0)}\,\delta \hat{c}\,,
\end{align}
yielding
\begin{align}\label{eq:charge_2ndO}
q\,\delta\hat{j}_{t[2]}=i\omega_{[2]}\,\chi_{QQ}\,\delta \hat{c}-e^{2g^{(0)}}\,\frac{(\tau^{(0)}a_{t}^{(0)})^{2}}{2q^{2}(\rho^{(0)})^{2}}\omega_{[1]}^{2}\,\delta \hat{c}\,.
\end{align}
Moving on to next to leading order in equation \eqref{eq:chargecont} along with \eqref{eq:charge_2ndO} and \eqref{eq:current_2ndO}, we have
\begin{align}
\omega_{[2]}\,\delta\hat{j}_{t[1]}+\omega_{[1]}\,\delta\hat{j}_{t[2]}+k\,\delta\hat{j}_{x[2]}&=0\Rightarrow\notag \\
2i\,\chi_{QQ}\,\omega_{[2]}-e^{2g^{(0)}}\,\frac{(\tau^{(0)}a_{t}^{(0)})^{2}}{2q^{2}(\rho^{(0)})^{2}}\omega_{[1]}^{2}-k^{2}\sigma_{d}&=0\Rightarrow\notag \\
\omega_{[2]}=-i\frac{1}{2\chi_{QQ}}\left(e^{2g^{(0)}}\,\frac{(\tau^{(0)}a_{t}^{(0)})^{2}}{2q^{2}(\rho^{(0)})^{2}}\frac{\chi_{JJ}}{\chi_{QQ}}+\sigma_{d} \right)\,k^{2}&\,.
\end{align}
Equations \eqref{eq:currents_leading}, \eqref{eq:current_2ndO} and \eqref{eq:charge_2ndO} can be considered as the expansion of the constitutive relations for the conserved current. By introducing the Fourier transform $\delta c$ of $\delta \hat{c}$, we can write them in the form
\begin{align}\label{eq:jconst_rel}
q\,\delta j_{t}&=-\chi_{QQ}\,\partial_{t} \delta c+\Xi\,\partial_{t}^{2}\delta c\,,\notag \\
q\,\delta j_{x}&=-\chi_{JJ}\,\partial_{x}\delta c-\sigma_{d}\,\partial_{x}\partial_{t}\delta c\,,
\end{align}
where we have defined
\begin{align}\label{eq:xi_def}
\Xi=e^{2g^{(0)}}\,\frac{(\tau^{(0)}a_{t}^{(0)})^{2}}{2q^{2}(\rho^{(0)})^{2}}\,.
\end{align}
In addition to the constitutive relations for the currents, the VEV of our charged scalar operator is
\begin{align}\label{eq:scalar_const}
\langle\mathcal{O}_\psi\rangle=\langle\mathcal{O}_\psi\rangle_b\,(1+i\,\delta c)\,,
\end{align}
at leading order in the $\varepsilon$ expansion. Here, we have introduced the VEV of the scalar in the thermal state $\langle\mathcal{O}_\psi\rangle_b=(2\Delta-3)\,\rho_{(v)}$.
Using this notation, the dispersion relation for our sound mode is
\begin{align}\label{eq:disp_rel}
\omega=\pm\,c_s\,k-\frac{i}{2\chi_{QQ}^2}\left(\chi_{JJ}\,\Xi+\chi_{QQ}\,\sigma_d \right)\,k^2\,.
\end{align}
Note that these constitutive relations are based on the two thermodynamic susceptibilities $\chi_{QQ}$ and $\chi_{JJ}$ as well as the two transport coefficients $\sigma_d$ and $\Xi$. In the next section we will introduce sources for the external vector field which will allow us to compute the retarded Green's functions of the current. As a result, we will manage to write Kubo formulae for our transport coefficients $\sigma_d$ and $\Xi$.
Before moving on, we would like to examine the behaviour of our hydrodynamics close to the critical temperature $T_c$. As one can see from the constitutive relations \eqref{eq:jconst_rel_sources}, the coefficients that enter in our hydrodynamic expansion include the susceptibilities $\chi_{JJ}$ and $\chi_{QQ}$. The behaviour of these coefficients close to $T_c$ was given in equation \eqref{eq:susc_approx}. The first derivative with respect to the temperature of both of them exhibits the expected discontinuity close to the transition with the former approaching zero. From that, we can easily see that the speed of second sound fixing the linear part of the dispersion relation\eqref{eq:disp_linear} behaves like $c_s\approx (T_c-T)^{1/2}$ close to the phase transition.
The dissipative part of the constitutive relations \eqref{eq:jconst_rel} is determined by the transport coefficients $\sigma_d$ and $\Xi$. The holographic expressions that we obtained for these are given in equations \eqref{eq:sigmad_def} and \eqref{eq:xi_def} respectively. The behaviour of $\sigma_d$ is fairly simple to understand as $\tau^{(0)}$ goes to a fixed value as we increase temperature and $a_x^{(0)}$ is simply unity at $T_c$. On the other hand, equation \eqref{eq:xi_def} is telling us that $\Xi$ blows up close to the transition since $\rho^{(0)}\propto (T_c-T)^{1/2}$ and everything else remains finite in our holographic expression. We interpret this fact as the breakdown of the hydrodynamic expansion making the radius of convergence smaller and smaller as we approach phase transition. One would have expected such a breakdown since the phase $\delta c$ becomes a not well defined field close to the transition. This is easy to see directly from the definition of $\mathcal{O}_Y$ itself in equation \eqref{eq:OY_def}. Note that there is another mode in the theory which becomes gapless close to the transition which is associated with the modulus of the complex VEV $\langle\mathcal{O}_\psi\rangle$ \cite{Bhaseen:2012gg}. However, this mode completely decouples from the system we are examining as it is captured by the bulk field $\rho$ in our parametrisation.
Despite this fact, the speed of sound and the attenuation in the dispersion relation \eqref{eq:disp_rel} remain finite since, according to equation \eqref{eq:susc_approx}, the current-current scalars behave like $\chi_{JJ}\approx (T_c-T)$. We can easily see that close to the transition the dispersion relation \eqref{eq:disp_linear} becomes
\begin{align}
\omega\approx -\frac{i}{2}\left(\frac{4\pi}{s}\,\int_0^{\infty}dr\,\frac{\rho^2}{(\rho^{(0)})^2} +\frac{\sigma_d}{\chi_{QQ}}\right)\,k^2\,,
\end{align}
which remains finite as we take the $T\to T_c$ limit. Note that this dispersion relation holds for $k\ll T_c-T$.
Above the phase transition where our system is in its normal phase, the $U(1)$ current hydrodynamic excitations are given by the constitutive relations,
\begin{align}
\delta j_t&=-\chi_{QQ}\,\delta\mu\,,\notag\\
\delta j_x&=-\sigma_d\,\partial_x\delta\mu\,,
\end{align}
with $\delta\mu$ the local chemical potential and $\sigma_d$ the incoherent conductivity. We therefore see that above the critical temperature we will have a single diffusive mode determined by the diffusion constant $D_{inc}=\chi_{QQ}^{-1}\,\sigma_d$. So, even though our sound modes tend to become diffusive close to the transition, the attenuation constant does not continuously connect to the diffusion constant of the normal phase incoherent mode at the critical temperature.
\subsection{Green's functions}\label{sec:greens}
In this section we will introduces sources for the conserved $U(1)$ current in our system which should be of order $\delta s_{\alpha}\approx \mathcal{O}(\varepsilon)$. The construction of the hydrodynamic perturbation in the bulk is identical to that of equation \eqref{eq:qnm_eps_exp}. However, this time the frequency is fixed by the external sources and our ultimate goal is to express the boundary current of the system in terms of the sources and the phase of the condensed operator.
The above suggests that we will simply need to replace the boundary conditions \eqref{eq:gbcs} by
\begin{align}\label{eq:gfbcs}
\delta \hat{v}_{t}=\delta\hat{s}_t-i\omega\,\delta \hat{c},\qquad \delta \hat{v}_{x}=\delta\hat{s}_x+i\varepsilon k\,\delta \hat{c}\,,
\end{align}
with $\delta\hat{s}_\alpha\propto\mathcal{O}(\varepsilon)$. Effectively, the whole analysis of section \ref{sec:sec_sound} goes through after replacing $-i\omega\,\delta\hat{c}\to \delta\hat{s}_t-i\omega\,\delta \hat{c}$ and $i\varepsilon k\,\delta \hat{c}\to \delta\hat{s}_x+i\varepsilon k\,\delta \hat{c}$. In terms of spacetime coordinates on the boundary, this is equivalent to replacing the partial derivatives of the phase by the gauge invariant combination
\begin{align}
\partial_\alpha\delta c\to \delta s_\alpha+\partial_\alpha\delta c\,.
\end{align}
One can of course check this explicitly but here we will just state the final result for the expressions of the components of the boundary current
\begin{align}\label{eq:jconst_rel_sources}
q\,\delta j_{t}&=-\chi_{QQ}\,\left(\delta s_t+\partial_{t} \delta c\right)+\Xi\,\partial_{t}\left(\delta s_t+\partial_{t} \delta c\right) \,,\notag \\
q\,\delta j_{x}&=-\chi_{JJ}\,\left( \delta s_x+\partial_{x}\delta c\right)-\sigma_{d}\,\partial_{t}\left( \delta s_x+\partial_{x}\delta c \right)\,.
\end{align}
After having obtained the constitutive relations \eqref{eq:jconst_rel_sources}, we can impose the continuity equation \eqref{eq:chargecont} to obtain an equation for the Goldstone mode. Doing this in momentum space, gives us an expression for $\delta\hat{c}$ in terms of the sources $\delta\hat{s}_\alpha$ which we can plug back in \eqref{eq:jconst_rel_sources}. From that linear relation between the VEVs for the current and the sources we read off the retarded Green's functions
\begin{align}\label{eq:Greens}
G_{J^t J^t}(\omega,\varepsilon k)&=(\varepsilon k)^2\,\mathcal{G}(\omega,\varepsilon k),\qquad G_{J^x J^x}(\omega,\varepsilon k)=\omega^2\,\mathcal{G}(\omega,\varepsilon k)\,,\notag\\
G_{J^t J^x}(\omega,\varepsilon k)&=G_{J^x J^t}(\omega,\varepsilon k)=\varepsilon k\,\omega\,\mathcal{G}(\omega,\varepsilon k)\,,
\end{align}
where we have defined
\begin{align}\label{eq:mathcalG}
\mathcal{G}(\omega,\varepsilon k)=\frac{\left(\chi_{QQ}+i\,\Xi\,\omega\right)\left( i\,\chi_{JJ}+\sigma_d\,\omega\right)}{\omega^2\left( -i\,\chi_{QQ}+\Xi\,\omega\right)+(\varepsilon k)^2\left(i\,\chi_{JJ}+\sigma_d\,\omega\,\right)}\,.
\end{align}
Notice that the last equation in \eqref{eq:Greens} is compatible with the Onsager relation $G_{J^t J^x}(\omega,\varepsilon k)=-G_{J^x J^t}(\omega,-\varepsilon k)$ given that $\mathcal{G}$ is even in $k$. Moreover, the positions of poles of the Green's functions \eqref{eq:Greens} are set by the roots of the denominator of the function \eqref{eq:mathcalG}. As expected, these are located precisely on the curves $\omega=\omega_\pm(\varepsilon k)$ set by the dispersion relations we found in section \ref{sec:sec_sound} for the superfluid sound mode.
The final result we would like to present in this section is the Kubo formulae for our transport coefficients $\sigma_d$ and $\Xi$. By using the Green's functions \eqref{eq:Greens} we can write
\begin{align}
\sigma_d=\lim_{\omega\to 0}\lim_{k\to 0} \frac{\mathrm{Im}\, G_{J^x J^x}}{\omega},\qquad \Xi=\lim_{k\to 0}\lim_{\omega\to 0} \frac{\mathrm{Im}\, G_{J^t J^t}}{\omega}\,.
\end{align}
\section{Scalar Sources and Pinning}\label{sec:explicit_breaking}
In this section we would like to explicitly deform our theory by a perturbatively small pinning parameter $\delta\rho_{(s)}$ and study the resulting pseudo-Goldstone mode. In other words, we would like to explicitly break the global $U(1)$ in a controlled fashion. In order to do this, we will have to deform the backgrounds we have considered so far by adding a small perturbative source $\rho_{(s)}=\delta\rho_{(s)}\propto\mathcal{O}(\varepsilon^2)$ in the near conformal boundary expansion of equation \eqref{eq:UV_expansion}.
Before applying our logic to the class of holographic theories we are considering, it is worth revisiting our expectations in field theory terms. Suppose that we couple our theory to an external gauge field $A_\alpha$ and that we also introduce a source $\lambda$ for our charged scalar operators $\mathcal{O}_\psi^\ast$. If the resulting theory is invariant under the infinitesimal gauge transformations
\begin{align}
\delta A_\alpha=\partial_\alpha\delta\Lambda,\qquad \delta \lambda=-iq\lambda\,\delta\Lambda\,,
\end{align}
then we can show that the corresponding Ward identity for the current gets modified to
\begin{align}\label{eq:current_non_cons}
\nabla_\alpha\langle J^\alpha\rangle=iq\,\left(\langle \mathcal{O}_\psi\rangle \lambda^\ast-\langle \mathcal{O}_\psi^\ast\rangle \lambda\right)\,.
\end{align}
This equation makes clear that the order parameter and the source need to align in the complex plane in equilibrium. In other words we can no longer freely rotate the order parameter in the complex plane after fixing a source without generating a current.
In holography, the small background perturbation we want to consider changes the interpretation of the angle $\theta_{(v)}$ that we introduced in equation \eqref{eq:thetav}. To see this, we need to consider the asymptotic expansion of the charged scalar close to the conformal boundary. To do this, we first need to better understand the asymptotics of the vector field $B_\mu$ to include sources $\theta_{(s)}$ for the Goldstone mode. In the absence of background sources for the charged scalar field, we have
\begin{align}\label{eq:B_exp_sources}
B_{\alpha}=\partial_\alpha\theta_{(s)}\,(r+R)^{2\Delta-3}+\cdots+v_{\alpha}+\cdots+q\,j_\alpha\,(r+R)^{-1}+\cdots\,,
\end{align}
where $\theta_{(s)}$, $v_\alpha$ and $j_\alpha$ are constants of integration, with the equations of motion implying the constraint
\begin{align}\label{eq:current_non_conservation}
\partial_\alpha j^\alpha=2q\,\rho_{(v)}^2\,(2\Delta-3)\,\theta_{(s)}+\mathcal{O}(\partial^2\theta_{(s)})\,,
\end{align}
where we dropped terms of higher order in derivatives of $\theta_{(s)}$. The reason for doing this is that we will be interested in satisfying this equation up to order $\mathcal{O}(\varepsilon^3)$ and such terms would be higher order provided that $\theta_{(s)}\propto\mathcal{O}(\varepsilon^2)$. We will show this later when we consider the proper boundary conditions, compatible with the absence of time dependent sources for the charged scalar operator $\mathcal{O}_\psi$.
After including the perturbative source terms, the angle $\theta$ and the background source term $\delta\rho_{(s)}$ enter the asymptotic expansion of the charged scalar perturbations according to,
\begin{align}
\delta\psi=i(\rho_{(v)}\,\theta_{(s)}+\delta\rho_{(s)}\theta_{(v)})\,(r+R)^{\Delta-3}+\cdots+i\rho_{(v)}\,\theta_{(v)}\,(r+R)^{-\Delta}+\cdots\,.
\end{align}
This shows that equation \eqref{eq:current_non_conservation} is nothing but the Ward identity \eqref{eq:current_non_cons} after identifying
\begin{align}
\langle J^\alpha\rangle&=j^\alpha+\mathcal{O}(\partial\theta_{(s)}),\notag\\
\lambda&=\delta\rho_{(s)}+i(\rho_{(v)}\,\theta_{(s)}+\delta\rho_{(s)}\theta_{(v)})+\mathcal{O}(\delta\rho_{(s)}\,\theta_{(s)}),\notag\\
\langle\mathcal{O}_\psi\rangle&=\langle\mathcal{O}_\psi\rangle_b\,(1+i\theta_{(v)})+\mathcal{O}(\delta\rho_{(s)}\,\theta_{(s)})\,.
\end{align}
From the above we see that in order to correctly identify the time dependent perturbative source $\delta s_\psi$ for the scalar field, we need to impose
\begin{align}
\theta_{(s)}=\frac{1}{\rho_{(v)}}\left(-\delta\rho_{(s)}\,\theta_{(v)}+\delta s_\psi\right)\,.
\end{align}
Note that in this notation, the time dependent source of the complex scalar introduces only a source $\delta s_Y=\delta s_\psi$ for the operator $\mathcal{O}_{Y}$ that we introduced in section \ref{sec:setup}. The above equation shows that the source term $\theta_{(s)}$ for the perturbation of $B_\mu$ and the background perturbation source $\delta\rho_{(s)}$ need to be of the same order in the $\varepsilon$ expansion. After this observation, the constraint equation \eqref{eq:current_non_conservation} becomes
\begin{align}\label{eq:current_non_conservationV2}
\partial_\alpha j^\alpha=-2\,q\,|\langle\mathcal{O}_\psi\rangle_b|\,\delta\rho_{(s)}\,\theta_{(v)}+2\,q\,|\langle\mathcal{O}_\psi\rangle_b|\,\delta s_Y\,.
\end{align}
From the point of view of hydrodynamics, the goal is to have the correct constitutive relations for the currents $j_\alpha$ up to second order in $\varepsilon$. That would allow us to satisfy equation \eqref{eq:current_non_conservationV2} up to third order in $\varepsilon$ provided that we take the source for the charged scalar to be of order $\mathcal{O}(\varepsilon^2)$. This is justified by the fact that the terms we dropped in equation \eqref{eq:current_non_conservation} are of order $\mathcal{O}(\varepsilon^4)$. This argument shows that the constitutive relations of equations \eqref{eq:jconst_rel_sources} and \eqref{eq:scalar_const} are sufficient for this task. Finally, one might worry that we should take in account the fact that the background quantities which enter equation \eqref{eq:beom} will bring their own $\varepsilon$ corrections to the perturbation of $B_\mu$. However, as we argued above, the correction of the bulk scalar due to the perturbative source $\delta\rho_{(s)}$ will be of order $\mathcal{O}(\varepsilon^2)$. That would induce corrections to our perturbation $\delta B_\mu$ at order $\mathcal{O}(\varepsilon^3)$ which is certainly beyond our scope.
In order to compute the retarded Green's functions of the system of our operators, we need to solve the Ward identity \eqref{eq:current_non_conservationV2} after identifying $\theta_{(v)}=\delta c$. By doing so we obtain the explicit expressions
\begin{align}\label{eq:greens_pinning}
G_{J^t J^t}(\omega,\varepsilon k)&=\frac{f\,(w+(\varepsilon\, k)^2\,g)}{h}\,,\quad G_{J^x J^x}(\omega,\varepsilon k)=\frac{(-w+\omega^2 f)\,g}{h}\notag\\
G_{J^x J^t}(\omega,\varepsilon k)&=G_{J^t J^x}(\omega,\varepsilon k)=\varepsilon\, k\,\omega\frac{f\,g}{h}\,,\notag\\
G_{J^t \mathcal{O}_Y}(\omega,\varepsilon k)&=-i\frac{q\omega\,|\langle\mathcal{O}_\psi\rangle_b|\,f}{h}\,,\quad G_{J^x \mathcal{O}_Y}(\omega,\varepsilon k)=-i\frac{q k\,|\langle\mathcal{O}_\psi\rangle_b|\,g}{h}\notag\\
G_{\mathcal{O}_Y J^t}(\omega,\varepsilon k)&=i\frac{q\omega\,|\langle\mathcal{O}_\psi\rangle_b|\,f}{h}\,,\quad G_{\mathcal{O}_Y J^x}(\omega,\varepsilon k)=i\frac{q k\,|\langle\mathcal{O}_\psi\rangle_b|\,g}{h}\notag\\
G_{\mathcal{O}_Y \mathcal{O}_Y}(\omega,\varepsilon k)&=\frac{q^2\,|\langle\mathcal{O}_\psi\rangle_b|^2}{h}
\end{align}
where we have defined
\begin{align}
f&=\chi_{QQ}+i\,\Xi\,\omega,\qquad g=\chi_{JJ}-i\,\sigma_d\,\omega\,,\notag\\
h&=w-\omega^2\,f+\varepsilon^2\,k^2\,g,\qquad w=2q^2\,|\langle\mathcal{O}_\psi\rangle_b|\,\delta\rho_{(s)}\,.
\end{align}
The poles of the Green's functions in equation \eqref{eq:greens_pinning} reveal that the second sound mode has acquired a resonance frequency as well as a gap. More specifically, we find the dispersion relation
\begin{align}\label{eq:gap}
\omega=\pm\sqrt{\frac{w+k^2\,\chi_{JJ}}{\chi_{QQ}}}-\frac{i}{2\chi_{QQ}^2}\left( w\,\Xi+k^2\,(\Xi\,\chi_{JJ}+\sigma_d\,\chi_{QQ})\right)\,,
\end{align}
from which we can read off the resonance frequency $\omega_r=\sqrt{w/\chi_{QQ}}$ and the gap\footnote{Notice that in the language of \cite{Donos:2019txg}, we have $\omega_{gap}\sim \chi_{YY}^{-1}$ with $\chi_{YY}$ the susceptibility of the operator $\mathcal{O}_Y$. Moreover, in the language of \cite{Amoretti:2018tzw} we have $\omega_{gap}\sim \omega_r^2$.} $\omega_{gap}=w\,\Xi/(2\,\chi_{QQ}^2)$.
It is interesting to notice that, when $w<0$, the theory develops an instability. This can be easily seen from the square root in \eqref{eq:gap} which will become imaginary in this case. This instability is simply a mode of the system which wants to align the VEV and explicit deformation of the system in the complex plane.
Finally, we would like to flesh out some of the global effects of the explicit breaking on our observables. In order to do this, we will consider the Green's functions in equation \eqref{eq:greens_pinning} at $k=0$. In that limit, from the Green's function $G_{\mathcal{O}_Y J^x}$ we see that the transport current $J^x$ and the operator $\mathcal{O}_Y$ completely decouple. Similarly, we will see that $J^x$ also decouples from the charge density $J^t$. It is therefore natural to expect that the small explicit breaking will have no effect on the low frequency electric conductivity,
\begin{align}
\sigma_{AC}(\omega)=\frac{G_{J^x J^x}(\omega,k=0)}{i\,\omega}=\frac{i\,\chi_{JJ}}{\omega}+\sigma_d\,.
\end{align}
However, we see that at $k=0$ the charge density and the scalar operator $\mathcal{O}_Y$ remain coupled turning the electric charge to an almost conserved quantity in the deformed theory.
\section{Numerical checks}\label{sec:numerics}
In this section we carry out a series of numerical checks of the results derived in the previous sections and in particular, we numerically confirm the sound mode dispersion relation \eqref{eq:disp_rel}, the Green's functions \eqref{eq:Greens}-\eqref{eq:mathcalG} and the formula for the gap \eqref{eq:gap}.
We consider the action \eqref{eq:baction2} with the following potential and gauge coupling
\begin{align}
&V=-6+m_\rho^2 \rho^2+\frac{c^2}{2}\phi^4+\frac{m_\phi^2}{2}\phi^2+ \lambda \,\rho^2\phi^2\,,\quad m_\rho^2=-2\,,\quad m^2_\phi=-2\,,\nonumber\\
&\tau=\cosh{\phi},
\end{align}
where we note that, for $\rho=0$, $\partial_\phi V=0$ both at $\phi=0$ and at $\phi=1/c$.
Given the choices above, the corresponding equations of motion admit a unit-radius $AdS_4$ vacuum solution with $\rho =\phi= A=\theta=0$, which is dual to a $d = 3$ CFT. Placing the CFT at finite temperature corresponds to considering the Schwarzschild black hole, which typically serves as the configuration dual to the normal phase of holographic systems. However, here we choose to deform our boundary theory by a relevant operator, $O_\phi$, with scaling dimension $\Delta_\phi= 2$. Then, the corresponding backreacted solution dual to the normal phase of our system will be given by black brane with a non-trivial profile for the scalar field $\phi$. As the temperature goes to zero, $T\to 0$, these configurations will approach a flow between the unit-radius $AdS_4$ in the UV, with $\phi=0$, and an IR $AdS_4$ with radius $L_{IR}^2=12 c^2/(1+12 c^2)$ supported by $\phi=1/c$.
To construct these solutions explicitly we consider the ansatz \eqref{eq:background} with $\rho(r)=0$ and the IR and UV boundary conditions, \eqref{eq:bhor_exp} and \eqref{eq:UV_expansion} respectively, with $\rho^{(0)}=$$\rho_{(s)}=\rho_{(v)}=0$. This boundary condition problem is then solved using a double-sided shooting technique. In figure \ref{fig:entropy}, we plot the logarithmic derivative of the entropy of the system with respect to the temperature, $T S'(T )/S(T )$ for $\phi_{(s)} = 1$ and $c = 1$. We clearly see that both at very high and very low temperatures the entropy scales like $T^2$ which is compatible with having $AdS_4$ on both sides of the RG flow.
\begin{figure}[h!]
\centering
\includegraphics[width=0.6\linewidth]{entropy.pdf}
\caption{Plot of the logarithmic derivative of the entropy $T S'(T)/S(T)$ as a function of the temperature indicating that our solutions interpolate between two $AdS_4$ geometries. Here $\phi_{(s)} = 1$ and $c = 1$.}
\label{fig:entropy}
\end{figure}
On top of these thermal states, we will consider instabilities associated to the scalar field $\rho$. To ensure that such instabilities exist in our model we need to make sure that the scalar field $\rho$ violates the BF bound associated with the $AdS_4$ in the IR, i.e.
\begin{equation}
L^2_{IR} \,{m^{IR}_\rho}^2=\frac{12}{1+12 c^2}(c^2\,m_\rho^2+\lambda)< -\frac{9}{4}\,,
\end{equation}
but is nevertheless stable in the UV: $m_\rho^2\ge-\frac{9}{4}\,$. For example, this is the case for $c=1,\lambda=-3/2$ and so we expect an instability to occur for this choice of parameters. Thus, for temperatures below a critical one, we expect a new branch of black holes to emerge characterised by a non-trivial condensate for $\rho$. To determine the critical temperature at which these instabilities set in we need to study the associated zero mode. In particular, we consider a linearised perturbation around the background constructed above of the form
\begin{align}
\rho&=0+\delta\rho\,.
\end{align}
Plugging the above perturbation in the equations of motion, we obtain one second order linear ODE, which we solve by imposing the following boundary conditions at the black hole horizon
\begin{align}
\delta \rho&=\delta\rho_h+\cdots\,,
\end{align}
and asymptotically
\begin{align}
\delta \rho&=0+\frac{\delta\rho_v}{r^2}+\cdots\,,
\end{align}
where we have already set the source for $\delta \rho$ to $0$, so that the emergence of the new phase is spontaneous. Overall, the boundary conditions are determined by 2 constants $\delta\rho_h\,,\delta\rho_v$, one of which can be set to $1$ because of the linearity of the equation. Consequently, performing the numerical integration will fix the highest value of the temperature, $T_c= 0.022$, for which one can find non-trivial solutions for $\delta\rho$.
The next step is to construct the backreacted solutions corresponding to the broken phase. To achieve this we use the ansatz \eqref{eq:background} and the IR and UV boundary conditions, \eqref{eq:bhor_exp}, \eqref{eq:UV_expansion}. When plugging this ansatz in the equations of motion we obtain a set of three second order ODEs and one first order. Thus, a solution is specified in terms of 7 constants of integration. Looking at the expansion \eqref{eq:bhor_exp}, we see that it is specified in terms of 3 constants, in addition to the temperature $T$. Similarly, the asymptotic expansion \eqref{eq:UV_expansion} is parametrised by 4 constants in addition to $\phi_{(s)}$ \textemdash note that we keep $\rho_{(s)}=0$ so that the condensation is spontaneous. Overall, in the IR and UV expansions we have a total of 7 constants as well as $T$ and $\phi_{(s)} $, which matches the 7 constants of integration. We proceed to solve this boundary condition problem numerically using double-sided shooting. In figure \ref{fig:PT} we show the condensate as well as the free energy as functions of the temperature, $T$, in support of the phase transition being second order. Here $\phi_{(s)} =1$ and $c=1,\lambda=-3/2$.
\begin{figure}[h!]
\centering
\includegraphics[width=0.48\linewidth]{condens.pdf}\quad\includegraphics[width=0.48\linewidth]{FE.pdf}
\caption{(left) Plot of the condensate as a function of the temperature. (right) Plot of the free energy of the system in the normal phase (red line) and in the broken phase (blue line) as a function of the temperature. Both plots demonstrate that there is a second order phase transition at $T=T_c$.}
\label{fig:PT}
\end{figure}
\subsection{Static perturbations}
Having constructed the backreacted black holes corresponding to the broken phase, we now turn our attention to studying perturbations around them. In particular, to check numerically the validity of the analytic expressions for the dispersion relation of the sound mode and the spatially resolved two-point functions, we need to construct the static perturbations as in section \ref{sec:thermo} and extract from them $\chi_{JJ}$, $\chi_{QQ}$.
Specifically, considering the perturbations $\delta B_t^{(t)}(r)$ and $\delta B_x^{(x)}(r)$ gives rise to two \textit{decoupled} linear second order equations, which we solve subject to boundary conditions \eqref{eq:therm_pert_UV},\eqref{eq:therm_pert_IR}.
Then, given the numerical solutions, the susceptibilities are simply obtained by dividing the corresponding expectation values by the associated sources as extracted by the asymptotic expansion
\begin{equation}
\chi_{QQ}=-\delta j_t/\delta \mu_t\,,\qquad \chi_{JJ}=-\delta j_x/\delta \mu_x\,.
\end{equation}
On the other hand, $\Xi$, $\sigma_d$ are calculated using horizon data. For $\{T,c,\lambda,\phi_{(s)}\}=\{0.015,1,-3/2,1\}$, we find $\chi_{JJ}=0.12238$, $\chi_{QQ}=0.138$, $\Xi=0.408$, $\sigma_d=0.318$.
\subsection{Second sound and spatially resolved two-point functions}
In order to compute the second sound and the two-point functions we need to go beyond static perturbations. In particular, we consider the linearised perturbation \eqref{eq:qnm_ansatz}, with
\begin{equation}
\label{eq:Seq}
S(r)=\int_{\infty}^{r}\frac{dy}{U(y)}\,.
\end{equation}
Plugging this ansatz in the equations of motion, we obtain two second order ODEs, along with an algebraic equation for $\delta B_r$. We now turn to the boundary conditions for these functions. In the IR we impose in-falling boundary conditions at the horizon which is located at $r=0$
\begin{align}
&\delta B_t=b_t+\dots\nonumber\\
&\delta B_{x_1}=b_{x_1}+\dots\,.\nonumber
\end{align}
Thus, we see that the expansion is fixed in terms of 2 constant $b_t, b_{x_1}$, in addition to $\omega,k$. The UV expansion takes the form
\begin{align}
\label{eq:BUV}
&\delta B_t=\delta s_t- i\omega \delta c+\frac{\delta j_t}{r+R}+\dots\nonumber\\
&\delta B_{x_1}=\delta s_{x_1}+ ik \delta c+\frac{\delta j_{x_1}}{r+R}+\dots,\,
\end{align}
where $\delta j_t$ is fixed in terms of the other parameters. Overall, this expansion is determined in terms of the sources $\delta s_t, \delta s_x$ and the 2 parameters $\delta c, \delta j_{x_1}$, in addition to $\omega, k$.
For constructing the second sound, we solve the above equations around the numerical background of the previous section, imposing that the sources vanish $\delta s_t=\delta s_{x_1}=0$. In addition, due to the linearity of the equations we also impose $b_{x_1}=1$. Thus, for fixed $k$, the shooting method determines $b_t, \delta j_{x_1},\delta c, \omega$. In figure \ref{fig:SS}, we compare our numerical results with the analytics of the previous chapter by plotting certain derivatives of the dispersion relation. For small values of $k$, where our analytic arguments are valid, we see a good quantitative agreement.
For constructing the two point functions we again employ a double-sided shooting technique, but now we set either $\delta s_t$ or $\delta s_{x_1}$ to zero and scale the remaining source to one using the linearity of the equations. Thus, for fixed $\omega, k$ and say $\delta s_t=0, \delta s_x=1$, the boundary condition system determines $ b_t, b_{x_1}, \delta c, \delta j_x$, allowing one to compute $G_{xx}= \omega^2 \,\mathcal{G}(k,\omega), G_{tx}=G_{xt}=k \omega \,\mathcal{G}(k,\omega), G_{tt}= k^2 \,\mathcal{G}(k,\omega)$ where
\begin{equation}
\mathcal{G}(k,\omega)=\frac{ \delta j_x+i \omega- k \omega \delta c}{\omega^2}\,.
\end{equation}
In figure \ref{fig:traspCoeff} we plot $\mathcal{G}$ (scaled appropriately) as function of the frequency, either for zero and finite $k$. In the small frequency limit, these quantities approach the constants $\chi_{QQ}$ (top, left), $-\chi_{JJ}$ (top, right), $\sigma_d$ (bottom, left) and $\Xi$ (bottom, right), in agreement with the analytic expressions \eqref{eq:Greens}-\eqref{eq:mathcalG}.
\begin{figure}[h!]
\centering
\includegraphics[width=0.48\linewidth]{Rew.pdf}\quad\includegraphics[width=0.48\linewidth]{Imw.pdf}
\caption{Plots of $\tfrac{ \omega^2 Re[\mathcal{G}]}{\partial k}$ and $\frac{1}{2}\frac{\partial^2 Im[\omega]}{\partial k^2}$ as functions of $k$ for the second sound dispersion relation. The dashed black line corresponds to the analytic prediction. Here $\{T,c,\lambda,\phi_{(s)}\}=\{0.015,1,-3/2,1\}$. }
\label{fig:SS}
\end{figure}
\begin{figure}[h!]
\centering
\includegraphics[width=0.48\linewidth]{chiq.pdf}\quad\includegraphics[width=0.48\linewidth]{chij.pdf}\\
\includegraphics[width=0.48\linewidth]{sigmad.pdf}\quad\includegraphics[width=0.48\linewidth]{Xi.pdf}
\caption{Plots of $\mathcal{G}$ as a function of $\omega$ for $k=0$ and $k=$ finite. The dashed black lines corresponds to $\chi_{QQ}$ (top, left), $-\chi_{JJ}$ (top, right), $\sigma_d$ (bottom, left) and $\Xi$ (bottom, right). Here $\{T,c,\lambda,\phi_{(s)}\}=\{0.015,1,-3/2,1\}$.}
\label{fig:traspCoeff}
\end{figure}
\subsection{Pseudo-gapless modes}
In this subsection we outline the numerical computation of the pseudo-gapless modes in the presence of
pinning. We perform a calculation similar to the one for second sound, but we now consider linearised fluctuations \eqref{eq:qnm_ansatz}, \eqref{eq:Seq} around a background configuration that has a small but finite source, $\rho_{(s)}$, for the scalar $\rho$. The only difference to the previous subsection is the expansion of the perturbations in the UV part of the geometry. In this case we find that
\begin{align}
&\delta B_t=0+\frac{\delta j_t}{r+R}+\dots\nonumber\\
&\delta B_{x_1}=0+\frac{\delta j_{x_1}}{r+R}+\dots\,.
\end{align}
Note that this expansion differs from \eqref{eq:BUV}, not only because there are no sources for the perturbations in this case, but also because having $\rho_{(s)}\ne0$ pushes the VEV of the goldstone mode to appear at order $1/(r+R)$ leading to $\delta j_t,\delta j_{x_1}$ being independent constants. The parameter counting follows just like above, suggesting that for fixed $k$ we expect to find a discrete set of solutions. In figure \ref{fig:gap}, we plot our numerical results for the real and imaginary part of the gap and we overlay them with the analytics of the previous chapter. We see a good quantitative agreements for small values of $\rho_{(s)}$, as expected.
\begin{figure}[h!]
\centering
\includegraphics[width=0.48\linewidth]{Gap_re.pdf}\quad\includegraphics[width=0.48\linewidth]{Gap_im.pdf}\\
\caption{Plots of the real and imaginary part of the gap as function of the source $\rho_{(s)}$. The dashed black lines corresponds to the analytic prediction. Here $\{T, c,\lambda,\phi_{(s)}\}=\{0.015,1,-3/2,1\}$ and $k=10^{-4}$.}
\label{fig:gap}
\end{figure}
\section{Discussion}
In this paper we studied first order dissipative effects in the hydrodynamic regime of holographic superfluid phases of matter. At zero chemical potential and charge density, the normal and the superfluid collective degrees of freedom remain decoupled. This fact simplified our analysis in extracting the transport coefficients relevant to the superfluid dissipation.
For a relativistic superfluid, in principle we would only have to determine four invariant quantities that would fully fix the constitutive relation of the conserved current in terms of the phase \cite{KHALATNIKOV198270}. In our case, only two of them were non-trivial and they were both fixed in terms of susceptibilities and black hole horizon data. For a specific class of models the coefficient $\sigma_d$ had been computed earlier in the literature \cite{Davison:2015taa,Gouteraux:2019kuy}. Here, we presented a technique which is applicable also in inhomogeneous black hole backgrounds relevant to phases of matter in which translations are broken either spontaneously or explicitly. Interesting extensions of our work include the reduced hydrodynamics of superfluid phases without momentum conservation \cite{toapp}.
One interesting aspect of our work concerns the coefficient $\Xi$ which appears in the time component of constitutive relations \eqref{eq:jconst_rel_sources} for the current. We have shown that this grows like $(T_c-T)^{-1}$ close to the transition signalling the breakdown of the derivative expansion. More specifically, judging from the next to leading term in the hydrodynamic expansion, we have made explicit that this will converge for wavenumbers with $k\ll T_c-T$. It would be interesting to explore the precise way that the hydrodynanic expansion breaks down by following the logic of e.g. \cite{Grozdanov:2019uhi,Grozdanov:2019kge,Withers:2018srf}. Finally, we have studied the hydrodynamics of the system upon introducing sources which break the global symmetry in a controlled manner.
An interesting extension we will report on in the future is the inclusion of a background finite magnetic field \cite{toapp}. That would imply the existence of background vortices which have been previously studied in the framework of holography in \cite{Donos:2020viz}. One step further would include the presence of disorder and the resulting flux pinning which relaxes the supercurrent leading to finite DC electric conductivity at finite temperature.
Finally, holography provides access to a plethora of superfluid phase ground states \cite{Gubser:2009gp,Gouteraux:2012yr}. An interesting direction would be to study the low temperature behaviour of the transport coefficients we computed in this paper. This is possible by extracting the behaviour of low temperature black hole horizons by following the techniques of e.g. \cite{Donos:2014uba}.
\section*{Acknowledgements}
AD is supported by STFC grant ST/T000708/1. CP is supported by the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement HoloLif No 838644.
\newpage
\bibliographystyle{utphys}
|
\section{Introduction}
\label{Introduction}
One of the most common complications arising from nasal airway obstruction surgery is the formation of nasal adhesions, also known as synechiae or scar bands. Nasal adhesions are abnormal tissue bridges between adjacent mucosal surfaces, particularly between the septum and components of the lateral nasal wall, such as the inferior and middle turbinates. The adhesions most commonly form post-operatively following sinonasal surgery or can form following trauma. Less common causes of adhesions include chronic inflammatory conditions such as granulomatosis with polyangiitis (Wegener’s granulomatosis), sarcoidosis, systemic lupus erythematosus, tuberculosis or following radiotherapy \citep{Vartiainen1992, Jones1999}.
Nasal adhesions are thought to form when two opposing raw or inflamed mucosal surfaces heal inappropriately, forming a mucosal bridge \citep{Choi2017}. The location of post-operative nasal adhesions typically depends primarily upon specific patient anatomy and the area of surgical intervention \citep{Nayak1998}. The adhesions are most commonly found at the internal nasal valve following septoplasty or the middle meatus following endoscopic sinus surgery but can occur at other locations \citep{Chandra2009}. The reported incidence of adhesions following septoplasty with submucous turbinate surgery estimates 0-19.7\% occurrence \citep{Naghibzadeh2011, Deniz2014, Chen2019, Joshi2019}.
Patients who develop nasal adhesions after surgery often complain of persistent nasal airway obstruction \citep{Young1997, Stewart2004, JoeJacob2011, Derin2016}. In particular, the degree of perceived nasal airway obstruction that patients report following nasal adhesion formation appears out-of-proportion compared to the relatively small size of the adhesion and minimal reduction in the cross-sectional area typically seen \citep{Becker2010}. Furthermore, the division of such small adhesions is often accompanied by significantly greater relief of nasal airway obstruction than would be anticipated from what appears to be a relatively minor increase in cross-sectional area \citep{Henriquez2013}. More anterior adhesions appear to have an even greater impact on perceived nasal airway obstruction than posterior adhesions \citep{Rettinger2006}. In anterior adhesions, the effect on cross-sectional area is at least partly explained by the relatively narrower dimensions at the internal nasal valve. Despite the observed significant impact of post-operative adhesions, there remains a lack of objective evidence in the literature that examines the cause for this disproportionate symptom profile, nor the physiological mechanism by which this occurs. To the best of our knowledge, there have been no studies assessing nasal adhesions with traditional objective measures of nasal airflow, such as rhinomanometry, acoustic rhinometry or peak nasal inspiratory flow (PNIF).
In recent years, the development of Computational Fluid Dynamics (CFD) has facilitated reliable assessment of airflow within the sinonasal cavity. In contrast to traditional objective measures of airflow, CFD provides highly detailed, reproducible and quantifiable results, where multiple variables can be rapidly assessed while avoiding many of the challenges of physical experiments. CFD has been validated and utilised in the assessment of nasal airflow in various physiological conditions, including septal deviation, sinus ventilation, nasal cycling, and examining the efficacy of nasal irrigation and sprays \citep{Lindemann2013, Nishijima2018, Alam2019, FrankIto2019, Abouali2012, Garcia2015, Tian2017, Inthavong2020a, Dong2018, Kim2014, Salati2021, Gaberino2017, Zhu2012, Jo2015}.
This study used CFD to examine the effect of nasal adhesions on nasal airflow in locations commonly seen following NAO surgery (i.e. septoplasty and turbinate reduction). We hypothesise that the disproportionally excessive NAO observed with postoperative nasal adhesions may be more related to key alterations in local nasal airflow and mucosal cooling downstream to the adhesion, rather than due to the relatively minor reduction in cross-sectional area. Furthermore, we hypothesise that anterior nasal adhesions create greater local disruption in airflow in the critical internal valve region and that reduction in cross-sectional area may have a proportionally greater impact in this already narrow region.
\section{Method}
\subsection{Normal nasal airway model}
A high-resolution Computed Tomography (CT) scan of a healthy 25-year-old female patient was used to create the nasal airway computational model. The patient had no history of previous sinonasal pathology, trauma or surgery and no anatomical abnormalities. CT scanning of the nasal airway was conducted using a Siemens Dual Source CT Scanner (Siemens Healthcare, Erlangen, Germany) with the following imaging parameters: $0.39 \times 0.39 $mm pixel size, $512 \times 512$ pixel image dimensions and slice thickness of 0.6 mm. Written informed consent to participate in the study was obtained from the patient before commencement. IRB approval was obtained (Western Sydney Local Health District, Human Research Ethics Committee; Approval number: ETH08671). 3D Slicer segmentation software was used to create a three-dimensional model of the nasal airway from the CT scan. As previous studies have demonstrated that the paranasal sinuses do not contribute significantly to nasal airflow \citep{Xiong2008, Ge2012}, the frontal, maxillary, ethmoid and sphenoid sinuses were removed from the model. The geometry of the face was retained, and an enclosed hemisphere representing the outer surrounding air was constructed in front of the face, which was set as a pressure inlet condition (Fig \ref{fig:location}A).
\subsection{Nasal adhesion models}
The reference model with no adhesions was edited, and a further five nasal adhesion models were created separately by placing solid transverse cylinders in various locations within the right side of the nasal cavity using ANSYS Spaceclaim\textregistered (Ver 20R1). The cylinder diameters were 2.5 mm, and their locations were consistent with postoperative adhesions commonly seen following NAO surgery (i.e. septoplasty and turbinate reduction). The locations do not represent common sites following endoscopic sinus surgery, which will be investigated in a future study. Fig \ref{fig:location}B demonstrates the adhesion sites chosen; however, each individual model only contained one single adhesion. All virtual nasal adhesions were added under a tertiary fellowship-trained rhinologist (NS) guidance to ensure the models were consistent and clinically accurate. In clinical practice, nasal adhesions are often accompanied by medialisation of the inferior turbinate or middle turbinate. For this study, we chose not to model such medialisation to analyse the effect attributable to the adhesions alone.
The no adhesion model (control) and adhesion models were exported as Standard Tessellation Language (STL) files, and ANSYS Fluent\textregistered (Ver 20R1) was used for mesh generation. Our mesh strategy was based on selecting the recommended mesh element size functions evaluated in \cite{Inthavong2018} where a curvature size of 0.45~mm was found to be sufficient for mesh independence in a nasal cavity. A much larger mesh size function (8~mm) was defined at the hemispherical outer dome for mesh optimisation. Five prism layers were attached to all wall boundaries to ensure the boundary layer was captured. A poly-hexcore mesh was created, which consisted of polyhedral surface elements and hexahedral elements in the internal cavity space. The poly-hexcore mesh was used because it produces significantly fewer elements to tetrahedral meshing, approximately 3.5$\times$ reduction while using the same size functions. We started with a mesh size function of 0.45~mm, which produced a total of 1.7~million elements (equivalent to 5.3~million tetrahedral cells). A second refined mesh was created by decreasing the size function to 0.35mm which produced 1.84~million poly-hexcore cells (equivalent to 8.4~million tetrahedral cells). Comparatively, \cite{frank2016influence, Inthavong2018} both reported a mesh independent nasal model with 4~million tetrahedral cells. A mesh independence analysis of temperature and humidity profiles at two coronal cross-sections is given in the Appendix / Supplementary Material (Supplementary 1). Using the same mesh size functions, the number of poly-hexcore mesh elements for the six models ranged from 1.42 to 1.87 million cells.
\subsection{Fluid flow simulation}
A constant inhalation flow rate of 15 L/min was applied, and a laminar, incompressible flow model was used. A laminar flow regime was assumed to exist throughout the cavity at the same constant flow rate of 15 L/min. Several studies have reported that under the flow rate up to 15 L/min, the nasal airflow can be considered quasi-steady \citep{Doorly2008,Burgos2017}. Therefore, it was assumed that the laminar flow assumption does not cause a significant error \citep{Na2020, shang2019}. The second-order upwind scheme was used for the spatial discretization of the governing equations, and the coupled-scheme was used for the pressure-velocity coupling. The flow equations describing the conservation for mass, momentum, energy, and transport for the mass fraction of water vapour are expressed as:
\begin{align}
\rho \{\frac{\partial u}{\partial t} + ({u} \cdot \nabla){u}\} &= -\nabla {p} + \mu \nabla ^2 {u}
\end{align}
\begin{align}
\nabla \cdot {u} &= 0
\end{align}
\begin{align}
\rho {C_p} \{\frac{\partial T}{\partial t} + ({u} \cdot \nabla){T}\} &= {K}\nabla ^2 {T}
\end{align}
\begin{align}
\frac{\partial F}{\partial t} + ({u} \cdot \nabla) {F} &= {D}\nabla ^2 {F}
\end{align}
where $\rho$, $t$, $u$, $p$, $mu$, $C_p$, $T$, and $K$ are density, time, velocity, pressure, viscosity, specific heat capacity, temperature , and thermal conductivity. In Equation 4, $F$ and $D$ denote mass fraction of water vapour and mass diffusion coefficient, respectively. The simulation was considered to be steady-state, and it was assumed that a converged solution was reached when the residuals reached below 10 e$^{-5}$ except for energy which was taken to 10 e$^{-6}$. The inlet temperature at the outer dome boundary was 20$^\circ$C and 35\% relative humidity.
\subsection{Submucus wall model}
The wall boundary was set with a virtual thickness with length $L$ to represent the mucus and submucus layers (see Supplementary Material 2). An effective thermal resistance, $R = L/kA$ was applied where $A$ is the area normal to the conduction direction and was taken as per unit area. The remaining conductivity and thickness parameters were defined following \citep{Na2020} who reviewed anatomic information on the respiratory mucosa from \citep{Beule2010}. The effective resistance used was $R_{eff} = 0.020$K/W.
Following measurements of patient data that included body temperature, the temperature along the bottom of the wall model surface was set to $36^\circ$ in all nasal cavity surfaces, except for the nasal vestibule, which was set to $34^\circ$, slightly less based on its external location to the internal nasal cavity. The mucosal wall was assumed to be wet and have a saturated state, and its water-vapour mass fraction is defined at the surface boundary with a 100\% relative humidity condition. Since the surface boundary temperature varies with the flow conditions, an approximate function relating the saturated water-vapour concentration with temperature was created, giving the following equation:
\begin{equation}
C_{\mathrm{surface}} = \frac{1}{1000}(0.0006312T^3-0.01097^2+0.6036T+2.027)
\end{equation}
where $C_{\mathrm{surface}}$ is the water vapour concentration in kg.s$^{-1}$ and $T$ is the temperature in $^\circ$C.
\section{Results}
\subsection{Flow streamlines}
The effect of adhesions on nasal airflow was explored through streamlines in the right lateral view shown in Fig \ref{fig:streamlines}. The baseline 'no adhesion' model demonstrated initial oblique high-velocity flow at the nasal vestibule, followed by a decrease in airflow velocity occurring in the middle meatus region, and further decreasing in the curvature down to the nasopharynx. All models demonstrated flow re-circulation in the nasal vestibule which corresponds to the scroll region between the upper and lower lateral cartilages \citep{Inthavong2019, Zhao2004, Ito2017, lu2018part}. This flow circulation was diminished in the internal nasal valve (IV) adhesion model compared to baseline, where the adhesion redirected part of the airflow toward the superior vestibule. In the anterior inferior turbinate (AIT) model, there was a pronounced vertical trajectory in the streamlines secondary to the adhesion, with airflow diverted from the inferior meatus and concentrated in the middle meatus.
The resistance caused by the nasal adhesions in both the middle inferior turbinate (MIT) and posterior inferior turbinate (PIT) models resulted in diversion of airflow to the middle meatus and medial to the middle turbinate, with a corresponding reduction at the inferior meatus. In contrast, the middle turbinate (MT) model showed flow separation around the adhesion, resulting in reduced middle meatal flow and disturbed streamlines in the posterior, inferior region.
\subsection{Velocity, temperature, and relative humidity in coronal planes}
Velocity contours at coronal slices for all models are given in Fig \ref{fig:vel-conts}. Generally, the flow upstream of the adhesion does not differ in comparison with the baseline no-Adhesion model. The presence of an adhesion separates the flow into a superior and inferior flow region, but this is only relevant in the bulk flow region where high velocities are displaced. Where the velocity is low, the effects of the adhesion is minimal. After each adhesion, the downstream flow recovers and is similar to the velocity contours in the baseline model.
Fig \ref{fig:temp-conts} depicts the temperature contours at coronal slices for all models. The inlet air temperature was 20$^\circ$C, and the cooler temperature locations correspond with the high-velocity locations (found in Fig \ref{fig:vel-conts}). In general, the adhesion disturbs the temperature field in the vicinity of the adhesion, and the effects diminish with distance moving downstream.
Fig \ref{fig:rh-conts} depicts the relative humidity contours at coronal slices for all models where the inhaled air is drier and enters the nostrils at 35\%. It influences the inferior half of the coronal planes at slices 1 and 2 before the flow changes. From slice-3 onward, the mass transfer from the wall boundary provides rapid diffusion into the airflow. The presence of the adhesions is most influential at the IV adhesion.
The velocity, temperature, and relative humidity contours were mass-weighted-averaged for the left and right cavities of the no-adhesion model, providing a single averaged value at each coronal slice location. These were plotted in Fig \ref{fig:noadh} and thus provided a quantitative baseline representing the adhesion models compared to the adhesion models. The averaged velocity magnitude was highest at the anterior half and progressively decreased as the cross-sectional area increased posteriorly. Both the temperature and relative humidity increased steadily from the inlet conditions (20$^\circ$C and 35\% relative humidity)
towards the wall conditions of 36$^\circ$C and 100\%.
Similarly, the velocity, temperature, and relative humidity were averaged on each coronal slice for the five adhesion models. The effect of an adhesion was then quantified by taking a percentage difference from the baseline values as:
\[
\frac{\phi_{\textup{adhesion}} -\phi_{\textup{noAdhesion}}}{\phi_{\textup{noAdhesion}}}
\]
Figure \ref{fig:cont-difference} showed negligible change in the left cavity that had no adhesion. In the right cavity, adhesions altered all three flow parameters, velocity, temperature, and relative humidity. The change was most significant for adhesions located most anteriorly. In order of anterior to posterior adhesion, this was IV, AIT, MT, MIT, followed by PT.
The surface heat flux in summarised in Figure \ref{fig:heatFlux} (and given in detail in Supplementary material 4) showed the left cavity was unaffected by the nasal adhesion in the right cavity. The nasal adhesion affected the surface heat flux locally around the location of the adhesion compared to the No-Adhesion model and was most significant for the IV model, where the surface heat flux varied from 2.2 W/m$^2$ (no-adhesion) to 15.6 W/m$^2$. As the air temperature increased from the nostrils to the nasopharynx (Figure \ref{fig:temp-conts}), the surface heat flux decreased for all models. The surface heat flux at the adhesion plane for each model was higher than the No-Adhesion model. The presence of the nasal adhesion increased the air residence and exposure time with the nasal mucosal surface locally which enhanced the heat transfer between the mucosal wall and inhaled air.
The influence of an adhesion was determined by taking the local pressure differential between the cross-section planes prior to and after the adhesion location given by
\[
\Delta P_n = \mathrm{abs}(P_{n+1} - P_{n-1})
\]
and these values were plotted in Fig \ref{fig:press}. The largest pressure differential occurred at the internal valve (IV) region, and the presence of an adhesion increased the differential by a further $42\%$. The smallest pressure differential occurred at the middle inferior turbinate (MIT) region, where there is low flow velocity. The presence of an adhesion increases the pressure differential by more than other regions as a percentage the no-Adhesion control model.
The effect of adhesions on nasal mucosal wall surface temperature for the right nasal cavity, including the medial septal surface and lateral nasal wall, is given in Fig\ref{fig:surfSubt}. The No-Adhesion model demonstrated the heat transfer mechanism of the nasal cavity where the bulk airflow containing cool air entered the nose and cooled the surfaces it came into contact with. As the flow moved downstream, heat exchange took place rapidly and the air was warmed by the nasal mucosa. All adhesion models showed a similar transition, however, a clear area of increased mucosal temperature was evident in the wake of each adhesion. This was particularly significant in the anterior nasal adhesions (IV and AIT) on the septal surface and, to a lesser extent, on the lateral nasal wall surface.
\section{Discussion}
The presence of adhesions in different locations of the nasal cavity lead to different effects on the flow behaviour in the nasal cavity. The results showed that anteriorly located adhesions were more influential in altering the flow field, and the heat transfer, with the anterior-most adhesion being the internal nasal valve which exhibited the most significant changes in all flow parameters. It is established that the anterior portion of the nasal cavity is responsible for up to 80\% of the air conditioning capacity of the respiratory airway \citep{keck2000, elad2008air,Burgos2017}, and high resistance \citep{zhu2011eval,van2021pressure}. As a result, disturbances that impede the natural flow of air in this region create extremely sensitive responses to the air conditioning and resistance that are likely to cause perceptions of airway obstruction. Recent findings corroborate, with anterior adhesions appearing to significantly impact perceived nasal airway obstruction than posterior adhesions (Rettinger and Kirsche 2006).
The nasal adhesion were 2.5mm diameter cylinders in size that represented adhesions commonly seen in clinical practice. The inclusion of adhesions had little to no change in overall resistance or bulk airflow through the nasal cavity because the flow field recovers further downstream of the adhesion. However, the effects were more localised with changes around the adhesion itself and whether it impeded the bulk flow regions. In the anterior nasal cavity, where the cross-sections are small, the flow field is easily disturbed even by small adhesions. This was most evident by the IV and AIT adhesions, which correspond to the greater symptoms observed with adhesions in these regions in clinical practice \citep{Wang2016}.
Adhesions within the nasal cavity altered the flow locally, which generally decreased the temperature in the surrounding regions. For instance, the redirected flow in the IV model moved superiorly in the nasal valve region, which cooled down the mucosal surface compared to the no-adhesion model. \cite{SINGHA2010757} suggested the trailing wake behind a cylinder becomes more unstable with higher velocity, and the reattachment of the separated flow occurs at a further distance. Hence, the mucosal cooling differences between the adhesion models, which were placed in high-velocity regions (IV and AIT) and no adhesion model, are more notable than the other adhesion models.
In the AIT model, the redirected flow over the adhesion caused a lower temperature on the sides of the adhesion and reduced the septal surface temperature compared to the no-Adhesion model. The lowest temperature difference around the adhesion cylinder was found for the PIT model. The PIT adhesion did not intercept the bulk airflow, resulting in a minor change in all flow variables. The adhesion in these models affected the septal surface temperature more than the lateral walls because the bulk fluid flow mainly remains close to the septal wall.
The finding that there is no significant reduction in overall bulk nasal airflow at first glance appears to contradict patient-reported complaints of the degree of perceived NAO associated with postoperative nasal adhesion. This contradiction may be resolved through application of the mucosal cooling theory of nasal patency, as identified by both \cite{Zhao2011} and \cite{Sullivan2014} who found that mucosal cooling was the most important predictor of patient perception of nasal patency, rather than direct detection of nasal airflow. The results of our study support this theory, where adhesions found anteriorly in the nasal cavity have significant alterations to the temperature and humidity field. While the airflow temperatures in the cavity did not change significantly, the surface temperature contours on the mucosal wall showed reduced mucosal cooling in the localised areas immediately downstream to the nasal adhesion. These areas may coincide with areas rich in transient receptor potential melastatin family member 8 (TRPM8) thermoreceptors, in which case this localised reduction in mucosal cooling could likely be misinterpreted centrally as an exaggerated degree of nasal airway obstruction. \cite{Keh2011} and \cite{Liu2015} recently used immunohistochemistry to show that high densities of TRPM8 receptors reside in the sub-epithelial layers of the nasal mucosa, with profuse fibres surrounding blood vessels in deeper regions.
Interestingly, the IV model in the present study showed marked disruption to mucosal cooling in the region of Kisselbach’s plexus in the nasal septum, an area known for its marked vascularity. Disruption of mucosal cooling in this crucial area may contribute to the seemingly exaggerated obstructive symptoms seen in patients with anteriorly located adhesion. Moreover, a recent CFD study by \cite{Zhao2014} identified the region immediately posterior to the nasal vestibule as the site of peak heat loss in respiration as well as being significantly correlated with perceived nasal patency in 44 healthy volunteers. This may help explain why anterior nasal adhesions have been associated with the greatest degree of subjective complaint. In addition, our study shows redistribution of airflow streamlines away from critical surfaces implicated in regulating and assessing inspired air such as the middle and inferior turbinates. The AIT and MT models, in particular, showed marked redirection of local airflow, which coincided with reduced mucosal cooling and would likely interfere with the perception of nasal patency.
\section{Conclusion}
This study used CFD analysis on a single patient with virtual nasal adhesions, located at the sites commonly seen in clinical practice following nasal airway surgery (septoplasty with turbinate reduction), to demonstrate that the presence of postoperative nasal adhesions results in no significant change in overall airflow but does result in localised downstream disruption to airflow. This localised disruption creates reduced local mucosal cooling on critical surfaces, resulting in the exaggerated perception of nasal obstruction, in excess of the minimal reduction in cross-sectional area seen. Adhesions located anteriorly create greater local disruption to airflow and mucosal cooling in critical areas, explaining their associated greater subjective sensation of obstruction.
\section{Acknowledgements}
The authors gratefully acknowledge the financial support provided by the Garnett Passe and Rodney Williams Foundation Conjoint Grant 2019-22.
\small
{\setstretch{1.0}
|
\section{Introduction.}\label{intro}
\section{Introduction}
The partially observable Markov decision process (POMDP) is a framework for dynamic decision-making when some evolving state of the system cannot be observed.
It extends the Markov decision process (MDP) and can be used to model a wide variety of real-world problems, ranging from healthcare to business.
The solution to POMDPs is usually through a reduction to MDPs, whose state is the belief (a probability distribution) of the unobserved state of the POMDP, see e.g. \cite{Krish2016} for an overview.
We study the problem of decision making when the environment of the POMDP, such as the transition probability of the hidden state and the probability distribution governing the observation, is unknown to the agent.
Thus, the agent has to simultaneously learn the model parameters (we use ``environment'' and ``parameters'' interchangeably) and take optimal actions.
Such online learning framework has received considerable attention in the last decades \citep{Sutton2011}.
Despite the practical relevance of POMDPs, the learning of POMDPs is considered much more challenging than finite-state MDPs and few theoretical results are known.
This is not surprising:
even with a known environment, the corresponding belief MDP features a continuous state space.
When the environment is unknown, we face the additional difficulty of not being able to calculate the belief accurately, whose updating formula is based on the environment.
This is in contrast to the learning of standard MDPs, in which the state is always observed exactly.
To tackle this daunting task, we provide an algorithm that achieves sublinear regret, which is a popular measure for the performance of a learning algorithm relative to that of the oracle, i.e., the optimal policy in the known environment.
This is the first algorithm that achieves sublinear regret, to our knowledge, in the general POMDP setup we consider.
We summarize the \emph{three major contributions} of this paper below.
In terms of problem formulation, we benchmark our algorithm against an oracle and measure the performance by calculating the regret.
The oracle we consider is the strongest among the recent literature \citep{Azizzadenesheli2016,Fiez2019}.
In particular, the oracle is the optimal policy of the POMDP with a known environment in terms of the average reward over an infinite horizon.
Such an oracle has higher average reward than the oracles that use the best fixed action \citep{Fiez2019} or the optimal memoryless policy (the action only depends on the current observation) \citep{Azizzadenesheli2016}.
Still our algorithm is able to attain sublinear regret in the length of the learning horizon.
This implies that as the learning horizon increases, the algorithm tends to approximate the strong oracle more accurately.
In terms of the algorithmic design, the learning algorithm we propose (see Algorithm \ref{alg:SEEU}) has two key ingredients.
First, it builds on the recent advance on the estimation of the parameters of hidden Markov models (HMMs) using spectral method-of-moments methods, which involve the spectral decomposition of certain low-order multivariate moments computed from the data \citep{anandkumar2012method, anandkumar2014tensor, Azizzadenesheli2016}.
It benefits from the theoretical finite-sample bound of spectral estimators,
while the finite-sample guarantees of other alternatives such as maximum likelihood estimators remain an open problem \citep{Lehericy2019}.\footnotemark\footnotetext{There are recent advances on the EM algorithm that are applied to likelihood-based methods for HMMs \citep{balakrishnan2017statistical,yang2017statistical} with finite-sample analysis. However, the conditions on the $Q$ function and the resulting basin of attraction are hard to translate to our setting explicitly.}
Second, it builds on the well-known
``upper confidence bound'' (UCB) method in reinforcement learning \citep{ortner2007logarithmic, Jaksch2010}.
We divide the horizon into nested exploration and exploitation phases.
We use spectral estimators in the exploration phase to estimate the unknown parameters such as the transition matrix of the hidden state, which itself is a function of the action in the period.
We apply the UCB method to control the regret in the exploitation phase based on the estimated parameters in the exploration phase and the associated confidence regions.
Although the two components have been studied separately before, it is a unique challenge to combine them in our setting.
In particular, the belief of the hidden state is subject to the estimation error.
We re-calibrate the belief at the beginning of each exploitation phase based on the most recent estimate of the parameters.
This helps us achieve the sublinear regret.
In terms of regret analysis, we establish a regret bound of $O(T^{2/3} \sqrt{\log(T)})$ for our proposed learning algorithm where $T$ is the learning horizon.
Our regret analysis draws inspirations from \cite{Jaksch2010, Ortner2012} for learning MDPs and undiscounted reinforcement learning problems, but the analysis differs significantly from theirs since there are two main technical challenges in our problem.
First, the belief in POMDPs, unlike the state in MDPs,
is not directly observed and needs to be estimated.
This is in stark contrast to learning MDPs \citep{Jaksch2010, Ortner2012} with observed states.
As a result, we need to bound the estimation error of the belief which itself depends on the estimation error of the model parameters.
In addition, we also need to bound the error in the belief transition kernel, which depends on the model parameters in a complex way via Bayesian updating.
We overcome the difficulties by extending the approach in \cite{DeCastro2017} for HMM to POMDP, together with a delicate analysis of the belief transition kernel to control the errors.
Second, to establish the regret bound, we need an uniform bound for the span of the bias function (also referred as the relative value function) for the optimistic belief MDP which has a continuous state space.
Such a bound is often critical in the regret analysis of undiscounted reinforcement learning of continuous MDP, but it is often shown under restrictive assumptions such as
the H\" older continuity that do not hold for the belief state in our setting \citep{Ortner2012, Lakshmanan2015}.
We develop a novel approach to bound the bias span by bounding the Lipschitz module of the bias function for discounted problems when the discount factor tends to one.
One key step is to bound the Lipschitz module of the belief transition kernels using the Kantorovich
metric. Exploiting the connection with the infinite-horizon undiscounted problem via the vanishing discount factor method then yields an explicit bound on the bias span for the optimisitic belief MDPs.
\subsection{Related Literature}\label{sec:literature}
{Closest to our work is \cite{Azizzadenesheli2016}. They also propose to use spectral estimators and upper confidence methods to learn POMDPs, and establish a regret bound of $O(\sqrt{T})$. One main difference between our work and theirs is the choice of the oracle/benchmark. Specifically,
their oracle is the optimal memoryless policy, i.e., a policy that only depends on the current reward observation instead of using all historical observations to form the belief of the underlying state. The performance gap is linear in $T$ between their oracle and ours for general POMDPs.
As a result, we need to design a new learning algorithm to achieve sublinear regret with our oracle.
By considering the belief based policies, several new difficulties arise in our setting. First, the spectral method can not be applied to samples generated from belief-based policies due to history dependency; Second, the belief states can not be observed and need to be calculated using the parameters, which is not an issue in \cite{Azizzadenesheli2016} because the observation in the current period can be regarded as the state; Third, we need to bound the bias span for the optimisitic belief MDP in the regret analysis. We tackle these difficulties by using an exploration-exploitation interleaving approach in the algorithm design, carefully controlling the belief error, and developing a new method to bound the bias span.
We also mention that our bound on the bias span is different from the diameter of the POMDP discussed
in \cite{Azizzadenesheli2016}. The diameter in \cite{Azizzadenesheli2016} is only
for observation-based policies, not for belief-state based policies we consider. That also explains why we need a new approach to bound the bias span, which is related to the diameter at a high level.
}
This paper extends the online learning framework popularized by multi-armed bandits to POMDPs.
There is a large stream of literature on the topic of bandits and \citet{bubeck2012regret} provide a comprehensive survey.
In POMDPs, the rewards across periods are not independent any more.
It can be related to adversarial bandits \citet{auer2002nonstochastic},
in which the oracle is the best fixed arm, and the reward can change arbitrarily over periods.
In our setting, the oracle is the optimal policy of the POMDP, which performs better than any fixed action (the gap is linear in $T$).
Therefore, popular algorithms such as EXP3 does not achieve sublinear regret in our setting.
A stream of literature studies nonstationary/switching MAB, including \citet{auer2002nonstochastic, Garivier2011, besbes2014stochastic,keskin2017chasing,cheung2018hedging,auer2019adaptively}.
The reward can change over periods subject to a number of switches or certain changing budget (the total magnitude of reward changes over the horizon), and the oracle is the best arm in each period.
It should be noted that the oracle considered is stronger than ours.
However, all the designed algorithms in this literature require finite switches or sublinear changing budget (in the order of $o(T)$).
This is understandable, as there is no hope to learn such a strong oracle if the arms can be completely different across periods.
In our setting, the number of changes (state transitions) is linear in $T$ and the algorithms are expected to fail to achieve sublinear regret even measured against our oracle, which is weaker than the oracle in this stream of literature.
There are a few exceptions, including \cite{zhu2020demands,chen2020learning,zhou2020regime}, which study models with linear changing budget but specific structures.
In \cite{chen2020learning}, the rewards are cyclic which can be leveraged to learn across cycles despite of the linear change.
In \cite{zhu2020demands}, the reward grows over time according to a function.
In \cite{zhou2020regime}, the reward is modulated by an unobserved Markov chain.
Another stream of literature investigates the so-called restless Markov bandit problem, in which the state of each arm evolves according to independent Markov chains, whose states may not be observable.
See, for example, \cite{Slivkins2008,Guha2010, Ortner2014}.
The POMDP model we consider has a more complex structure. Thus the algorithms proposed in the above studies cannot achieve sublinear regret.
Our work is related to the rich literature on learning MDPs.
\cite{Jaksch2010} propose the UCRL2 (Upper Confidence Reinforcement Learning) algorithm to learn finite-state MDPs and prove that the algorithm can achieve the optimal rate of regret measured against the optimal policy in terms of the undiscounted average reward.
Follow-up papers have investigated various extensions to \cite{Jaksch2010}, including posterior sampling \citep{agrawal2017posterior}, minimax optimal regret {\citep{azar2017minimax, zhang2019regret}, and the model-free setting \citep{jin2018q}.}
\cite{cheung2019non} consider the case where the parameters of the MDP, such as the transition matrix, may change over time.
The algorithms are not applicable to our setting, because of the unobserved state in POMDPs.
However, since a POMDP can be transformed to a continuous-state MDP, our setting is related to the literature, especially those papers studying MDPs with a continuous state space.
\cite{Ortner2012,Lakshmanan2015} extend the algorithm in \cite{Jaksch2010} to a continuous state space.
Furthermore, \cite{qian2018exploration, Gampa2019} improve the implementation of the algorithm and make it computationally more efficient.
Still, our problem is not equivalent to the learning of continuous-state MDPs.
First, in this literature H\"older continuity is typically assumed for the rewards and transition probabilities with respect to the state, in order to aggregate the state and reduce it to the discrete case.
However, this assumption does not hold in general for the belief state of POMDPs, whose transition probabilities are not given but arise from the Bayesian updating.
Second, even if the continuity holds, the state of the belief MDP in our problem, which is the belief of the hidden state, cannot be observed.
It can only be inferred using the estimated parameters.
This distinguishes our problem from those studied in this literature.
The algorithm and analysis also deviate substantially as a result.
There are studies that focus on the applications such as inventory management \citep{zhang2018perishable,chen2019coordinating,zhang2020closing} and handle specific issues such as demand censoring and lost sales.
We are not aware of any papers that propose learning algorithms for POMDPs in this stream of literature.
Moreover, our work is related to studies on reinforcement learning for POMDPs, see e.g. \cite{ross2011bayesian, spaan2012partially} and references therein. \cite{guo2016pac} propose a learning algorithm for a class of episodic POMDPs, where the performance metric is the sample complexity, i.e. the time required to find an approximately optimal policy. {Recently, \cite{jin2020sample} give a sample efficient
learning algorithm for undercomplete POMDPs in the finite-horizon episodic setting, where the number of observations is larger than the number of hidden states. Their focus is on the sample complexity, while the method may potentially be used in the regret analysis of our infinite-horizon average reward setting.}
There is also a growing body of literature that apply deep reinforcement learning methods to POMDPs, see e.g. \cite{hausknecht2015deep, igl2018deep}.
Our work differs from these papers in that we study the learning of ergodic POMDPs in an unknown environment and we focus on developing an learning algorithm with sublinear regret guarantees. {A concurrent study \citep{kwon2021rl} considers regret minimization for reinforcement learning in a special class of POMDPs called latent MDP. The hidden state is static in their work while it is dynamic in our setting.}
Furthermore, our work is related to the literature on the spectral method to estimate HMMs and its application to POMDPs. For instance,
\cite{anandkumar2012method,anandkumar2014tensor} use the spectral method to estimate the unknown parameters in HMMs, by constructing the so-called multi-views from the observations.
The spectral method is not readily applicable to POMDPs, because of the dependence introduced from the actions.
\cite{Azizzadenesheli2016} address the issue by restricting to memoryless policies, i.e., the action only depends on the observation in the current period instead of the belief state.
They extend the spectral estimator to the data generated from an arbitrary distribution other than the stationary distribution of the Markov chain, which is necessary in learning problems when the policy needs to be experimented.
On the computational side, there is a large body of literature on the planning problem for POMDPs, i.e., computing the optimal belief-based policy for the average reward POMDP when the environment is known.
Solving such planning problems using exact dynamic programming methods for the resulting belief MDP is challenging, because the belief MDP has a continuous state space.
Various methods have been proposed to compute an approximately optimal policy for belief MDPs or more general continuous-state MDPs with average reward criterion. See, e.g.
\cite{ormoneit2002kernel, Yu2004, yu2008near, saldi2017asymptotic, sharma2020approximate} and the references therein for details. In our work, we focus on learning the POMDP while assuming the access to an optimization oracle to the planning problem to derive regret bounds.
Finally, very recently an independent and parallel work \cite{jafarnia2021online} also study online learning for POMDPs under the infinite-horizon average-cost criteria. They assume the transition probabilities are unknown but the observation kernels are known. They propose a posterior
sampling-based algorithm and show that it
achieves a Bayesian expected regret bound of $O(\log T)$ when the parameter set for the transition kernel is finite and the transition kernels are distant in an appropriate sense. In the general case with a continuous parameter set, they prove that
the algorithm achieves $O(T^{2/3})$ regret under additional technical assumptions.
The rest of the paper is organized as follows. In Section~\ref{sec:formulation} we discuss the problem formulation. Section~\ref{sec:alg} presents our learning algorithm. In Section 4,
we state our main results on the regret bounds for the learning algorithm.
Finally, we conclude in Section~\ref{sec:conclusion}. All the proofs of the results in the paper are deferred to the electronic companion.
%
\section{Problem Formulation}\label{sec:formulation}
We first introduce the notation for the POMDP.
A POMDP model with horizon $T$ consists of the tuple
\begin{equation}\label{eq:pomdp-tuple}
\{\mathcal{M} ,\mathcal{I} , \mathcal{O}, \mathcal{P}, \Omega, R \},
\end{equation}
where
\begin{itemize}
\item $\mathcal{M}\coloneqq\{1,2,\dots,M\}$ denotes the state space of the hidden state.
We use $M_t \in \mathcal{M}$ to denote the state at time $t=1, 2, \ldots, T$.
\item $\mathcal{I}\coloneqq\left\{1, 2, \dots,I\right\}$ denotes the action space with $I_t \in \mathcal{I}$ representing the action chosen by the agent at time $t$.
\item $\mathcal{O} \coloneqq\{o_1, o_2, \dots, o_O\} $ is a finite set of possible observations and $O_t$ denotes the observation at time $t$.
\item $\mathcal{P}\coloneqq\{P^{(1)},\dots,P^{(I)}\}$ describes a family of transition probability matrices, where $P^{(i)} \in \mathbb{R}^{M\times M} $ is the transition probability matrix for states in $\mathcal{M}$ after the agent takes action $i \in \mathcal{I}$. That is, $P^{(i)}(m, m') = \mathbb{P}(M_{t+1} = m' |M_t=m, I_t=i)$ for $m, m' \in \mathcal{M}$.
\item The observation density function $\Omega(o |m, i)$ is a distribution over observations $o \in \mathcal{O}$ that occur in state $m \in \mathcal{M}$ after the agent takes action $i$ in the last period, i.e., $\Omega(o |m, i) = \mathbb{P} (O_{t} = o | M_{t}=m, I_{t-1}=i)$.
\item The reward function $R(m, i)$ specifies the immediate reward for each state-action pair $(m,i)$, and we assume the reward function $R: \mathcal{M} \times \mathcal{I} \rightarrow [0, r_{\max}]$ for some constant $r_{\max}>0.$
\end{itemize}
The following sequence of events occur in order in each period.
In period $t$, the underlying state transits to $M_{t}$.
Then the agent observes $o_t \in \mathcal{O}$, whose distribution depends on $M_{t}$ and $I_{t-1}$.
The agent then chooses an action $I_t \in \mathcal{I}$ and receives reward $R_t$ determined by reward function which depends on the state $M_t$ and the action $I_t$.
Then the time proceeds to $t+1$ and the state transits to $M_{t+1}$, whose transition probability depends on the action $I_t$.
In the POMDP model, the agent does not observe the state $M_t$, but only the observation $o_t$,
after which an action is chosen.
Moreover, it is typical to assume that the action does not depend on the realized reward as well \citep{cao2007partially}, as if the reward is not observed.
Therefore, the action taken in period $t$, $I_t$, depends on the history up to time $t$, denoted by
\begin{align}\label{def:history}
&\mathcal{H}_0 \coloneqq \{I_0\},\\
&\mathcal{H}_t \coloneqq \{I_0, O_1, \cdots, I_{t-1}, O_t \}, \quad \text{$t\geq 1$}.
\end{align}
The agent attempts to optimize the expected cumulative reward over a finite horizon $T$.
The information structure is illustrated by the graph in
Figure~\ref{fig:graphical_model}.
\begin{figure}[t]
\begin{center}
\includegraphics[width=0.6\linewidth]{Graphical_Model.png}
\caption{A graph showing the dependence structure of the POMDP.}
\label{fig:graphical_model}
\end{center}
\end{figure}
\subsection{Reformulate POMDP as Belief MDP} \label{subsec:belief_MDP}
If the model environment in \eqref{eq:pomdp-tuple} is known to the agent,
then it is well-known (see, e.g., \citealt{Krish2016}) that to maximize the expected reward, the agent can reformulate the POMDP as
an MDP with a continuous state space.
The state of the MDP reflects the belief, or the distribution, over the hidden states, and thus it is referred to as the belief MDP.
More precisely, define an $M$-dimensional vector ${b_t} =(b_t(1),\dots,b_t(M)) \in \mathcal{B} \coloneqq \{b\in \mathbb{R}_+^{M}: \sum_{m=1}^{M}b(m)=1 \}$ as the belief of the underlying state in period $t$:
\begin{align}\label{def:bt}
b_0(m)&\coloneqq \mathbb{P}(M_0=m),\\
b_t(m)&\coloneqq\mathbb{P}(M_t=m|\mathcal{H}_t),\quad t \geq 1.\notag
\end{align}
Note that we do not include the observed rewards in the history.
This is a typical setting in the POMDP literature \citep{cao2007partially}.
Because of the Markovian structure of the belief, we can show (see, e.g., \citealt{Krish2016,Puterman2014}) that the belief in period $t+1$ can be updated based on the current belief $b_t=b$, the chosen action $I_t=i$ and the observation $O_{t+1}=o$.
In particular, the updating function
$H_{\mathcal{P}, \Omega}\colon\mathcal{B}\times\mathcal{I}\times\mathcal{O}\rightarrow\mathcal{B}$ determines
\begin{align}\label{def:forward-kernel}
b_{t+1}=H_{\mathcal{P}, \Omega}(b_t,I_t,O_{t+1}).
\end{align}
We may omit the dependence on $\mathcal P$ and $\Omega$ if it doesn't cause confusion.
By Bayes's theorem, we have
\begin{align}\label{belief_Bayes}
b_{t+1}(m)&=\frac{\Omega(o|m,i)\sum \limits_{m'\in\mathcal{M}}P^{(i)}(m',m)b_t(m')}{\mathbb{P}(o|b,i)},
\end{align}
where $\mathbb{P}(o|b,i)=\sum \limits_{m''\in\mathcal{M}}\Omega(o|m'',i)\sum\limits_{m'\in\mathcal{M}}P^{(i)}(m',m'')b_t(m')$ is the distribution of the observation under belief $b$ and action $i$.
We next introduce some notations to facilitate the discussion and analysis.
Define the expected reward conditional on the belief and action
\begin{align}\label{def:belief-reward-func}
\bar{R}(b,i)\coloneqq \sum_{m \in \mathcal{M}}R(m,i)b(m).
\end{align}
We can also define the transition kernel of the belief conditional on the action:
\begin{align}\label{def:belief-trans-kernel}
\bar{T}(b_{t+1}|b_t,i_t)&:=\mathbb{P}(b_{t+1}|b_t,i_t)
=\sum_{o_{t+1} \in \mathcal{O}} \mathds{1}_{\{H(b_t,i_t,o_{t+1})=b_{t+1}\}} \mathbb{P}(o_{t+1}|b_t,i_t).
\end{align}
A policy $\mu= (\mu_t)_{t \ge 0}$ for the belief MDP is a mapping from the belief states to actions, i.e., the action chosen by the agent at time $t$ is $I_t = \mu_t (b_t)$.
Following the literature (see, e.g., \citealt{agrawal2017posterior}), we define the gain of a policy and the optimal gain.
\begin{definition}\label{def:gain}
The gain of a policy $\mu,$ given the initial belief state $b$, is defined as the long-run average reward for the belief MDP over an infinite horizon, given by:
\begin{align} \label{eq:long-run-average}
\rho^\mu_b:= \limsup \limits_{T \to \infty}\frac{1}{T} \mathbb{E} \left[\sum_{t=0}^{T-1} R(M_t, \mu_t) |b_0 =b\right],
\end{align}
where the expectation is taken with respect to the interaction sequence when policy $\mu$ interacts with the belief MDP.
The optimal gain $\rho^*$ is defined by
\begin{align}\label{equ:opt average reward}
\rho^{*}\coloneqq \sup_b \sup_{\mu}\rho_{b}^\mu.
\end{align}
\end{definition}
\subsection{Assumptions}
Next we provide the technical assumptions for the analysis.
\begin{assumption}\label{assum:trans_matrix_min}
The entries of all transition matrices are bounded away from zero $\epsilon \coloneqq \min\limits_{i \in \mathcal{I}} \min\limits_{m,n \in \mathcal{M}} P^{(i)}(m,n) >0$.
\end{assumption}
\begin{assumption}\label{assum:reward_density_min}
$\xi \coloneqq \min\limits_{i \in \mathcal{I}} \min\limits_{o \in \mathcal{O}} \sum\limits_{m \in \mathcal{M}}\Omega(o|m,i) >0$.
\end{assumption}
Assumptions~\ref{assum:trans_matrix_min} and \ref{assum:reward_density_min} can be strong in general, but they are required by the state-of-art method to bound the belief error caused by the parameter miscalibration (see \cite{DeCastro2017} for the HMM setting), which is essential in learning POMDPs. Moreover, the two assumptions provide sufficient conditions to guarantee the existence of the solution to the Bellman optimality equation of the belief MDP and the boundedness of the bias span; See Propositions~\ref{lemma:exist-optimal-policy} and \ref{prop:span-uni-bound}. Note that Assumption~\ref{assum:trans_matrix_min} itself implies that for any fixed $i$, the Markov chain with transition matrix $P^{(i)}$ is geometrically ergodic with
a unique stationary distribution denoted by $\omega^{(i)}$, and the geometric rate is upper bounded by $1-\epsilon$. See e.g. Theorems 2.7.2 and 2.7.4 in \cite{Krish2016}. This geometric ergodicity, which can hold under weaker assumptions, is needed for spectral estimations of the POMDP model as in \citet{Azizzadenesheli2016}.
\begin{assumption}\label{assum:trans_matrix_invert}
For each $i \in \mathcal{I}$, the transition matrix $P^{(i)}$ is invertible.
\end{assumption}
\begin{assumption}\label{assum:observation_density_lp}
For all $i\in \mathcal I$, $\Omega(\cdot|1,i), \cdots, \Omega(\cdot|m,i)$ are linearly independent.
\end{assumption}
Assumption~\ref{assum:trans_matrix_invert} and~\ref{assum:observation_density_lp} are required for the finite-sample guarantee of spectral estimators \citep{anandkumar2012method,anandkumar2014tensor}.
See Section~\ref{sec:spectral} for more details.
{Since our learning algorithm uses the spectral estimator to estimate hidden Markov models, our approach inherits the assumptions.}
Before we proceed, we first state a result on the characterization of the optimal gain $\rho^*$ given in Definition~\ref{def:gain} and
the existence of stationary optimal policies for the belief MDP \eqref{eq:long-run-average} {under the average reward criterion}. Note that in general (without the assumptions), there is no guarantee that a stationary optimal policy would exist for problem \eqref{eq:long-run-average} (see e.g. \citealt{Yu2004}).
\begin{proposition}\label{lemma:exist-optimal-policy}
Suppose Assumptions~\ref{assum:trans_matrix_min} and \ref{assum:reward_density_min} hold. There exists a bounded function $v\colon\mathcal{B}\to \mathbb{R}$ and a constant $\rho^* \in \mathbb{R}$ such that the Bellman optimality equation holds for problem \eqref{equ:opt average reward}:
\begin{align}
\rho^*+v(b)=\max_{i \in \mathcal{I}}\left[ \bar{R}(b,i)+\int_{\mathcal{B}}v(b')\bar{T}(db'|b,i)\right], \quad \forall b\in\mathcal{B}.\label{equ:Bellman-thm}
\end{align}
Moreover, there exists a stationary deterministic optimal policy $\mu^*$ for problem \eqref{equ:opt average reward}, which prescribes an action that maximizes the right side of \eqref{equ:Bellman-thm}. The constant $\rho^*$ is the optimal gain defined in \eqref{equ:opt average reward}.
\end{proposition}
The function $v$ is referred to as the bias function, or the relative value function, of the belief state {for the undiscounted problem} \eqref{eq:long-run-average} (Chapter 8 of \citealt{Puterman2014}).
{To prove Proposition~\ref{lemma:exist-optimal-policy}, it is known that the key is to establish the uniform bound of the bias functions for the associated \textit{discounted} problems, see, e.g., \cite{ross1968arbitrary, Hsu2006}.
We achieve this by using a new approach based on analyzing the Lipschitz properties of belief transition kernels and value functions for the discounted problems.}
Generally solving the optimality equation~\eqref{equ:Bellman-thm} and finding the optimal policy for POMDP with average reward criteria in a known environment are computationally challenging due to the continuous belief states.
In this work, we do not focus on this planning problem and assume the access to an optimization oracle that solves the Bellman equation \eqref{equ:Bellman-thm} and returns $\rho^*$ and the optimal stationary policy $\mu^*$.
\subsection{Learning POMDP}\label{sec:learning}
We consider learning algorithms to learn the POMDP model when some model parameters are unknown.
In particular, the agent knows the state space $\mathcal{M}$, the action space $\mathcal{I}$, the observation space $\mathcal{O}$, and the reward function $R(m,i)$, but has no knowledge about the underlying hidden state $M_t$, the transition matrices $P^{(i)}$ for all actions and the observation density function $\Omega(o|m,i)$.
The goal is to design a learning policy to decide which action to take in each period to maximize the expected cumulative reward over $T$ periods even if $T$ is unknown in advance.
Note that the setting is slightly different from multi-armed bandits, in which the reward distribution of each arm is unknown.
In POMDP, it is typical to assume $R(m,i)$ to be a deterministic function and the random noise mainly comes from the observation.
Moreover, the realized reward is usually not observed or used to determine the action, as mentioned previously.
Therefore, it is reasonable to set up the environment to learn the parameters related to the observations.
Our approach can be used to learn the reward function as well, if the historical reward can be observed.
%
%
For a learning policy $\pi$, the action taken in period $t$, which we denote by $\pi_t$, is adapted to the history $\mathcal{H}_t=\{\pi_0,O^{\pi}_1,...,\pi_{t-1},O^{\pi}_{t}\}$,
where $O_t^{\pi}$ denotes the observation received under the learning policy $\pi$ in period $t$.
Note that $\pi_t$ maps the initial belief $b$ and the history $\mathcal H_t$ to an action in period $t$.
Similar to Definition~\ref{def:gain}, we may define the reward in period $t$ for the policy $\pi$ when the initial belief $b$ as
\begin{align}\label{def:policy_reward}
R_t^{\pi}(b)\coloneqq R(M_t, \pi_t).
\end{align}
Note that both $M_t$ and $\pi_t$ depend on the initial belief $b$, which we omit in the notation.
To measure the performance of a learning policy, we follow the literature (see, e.g., \citealt{Jaksch2010, Ortner2014, agrawal2017posterior}) and set the optimal gain as the benchmark.
In particular, we define the total regret of $\pi$ in $T$ periods as
\begin{align}\label{def:reg}
\mathcal{R}_T^{\pi}\coloneqq \max_{b}\left\{(T+1)\rho^* - \sum_{t=0}^T R_t^{\pi}(b)\right\}.
\end{align}
The objective is to design efficient learning algorithms whose regret grows sublinearly in $T$ with theoretical guarantees. In the sequel, the dependency of $\mathcal{R}_T^{\pi}$ on $\pi$ may be dropped if it is clear from the context.
\section{The SEEU Learning Algorithm}\label{sec:alg}
This section describes our learning algorithm for the POMDP, which is referred to as the \emph{Spectral Exploration and Exploitation with Upper Confidence Bound} (SEEU) algorithm.
We first provide a high-level overview of the algorithm and then elaborate on the details.
To device a learning policy for the POMDP with unknown $\mathcal{P}$ (transition probabilities) and $\Omega$ (observation distributions),
one needs a procedure to estimate those quantities from the history, i.e., the past actions and observations.
\citet{anandkumar2012method,anandkumar2014tensor} propose the spectral estimator for the unknown parameters in hidden Markov models (HMMs), with finite-sample theoretical properties.
It serves as a major component in the SEEU algorithm.
However, the spectral estimator is not directly applicable to ours, because there is no decision making involved in HMMs.
In a POMDP, the action may depend on past observations and such dependency violates the assumptions of the spectral estimator.
To address the issue, we divide the horizon $T$ into nested ``exploration'' and ``exploitation'' phases.
In the exploration phase, we choose each action successively for a fixed length of periods.
This transforms the system into an HMM so that we can apply the spectral method to estimate $\mathcal{P}$ and $\Omega$ from the observed actions and observations in that phase.
In the exploitation phase, based on the confidence region of the estimators obtained from the exploration phase,
we use a UCB-type policy to implement the optimistic policy (the optimal policy for the best-case estimators in the confidence region) for the POMDP.
The SEEU algorithm is presented in Algorithm~\ref{alg:SEEU}.
The algorithm proceeds with episodes with increasing length, similar to the UCRL2 algorithm in \cite{Jaksch2010} for learning MDPs.
Each episode is divided into exploration and exploitation phases.
The exploration phase lasts $\tau_1I$ periods (Step~\ref{step:explore-tau1}), where $\tau_1$ is a tunable hyperparameter and $I$ is the total number of actions in the action space.
In this phase, the algorithm chooses each action successively for $\tau_1$ periods.
In Step~\ref{step:all-samples-exploration} it applies the spectral estimator (Algorithm~\ref{alg:spectral} to be introduced in Section~\ref{sec:spectral}) to (re-)estimate $\mathcal{P}$ and $\Omega$.
Moreover, it constructs a confidence region based on Proposition~\ref{prop:spectral} with a confidence level $1-\delta_k$, where $\delta_k\coloneqq\delta/k^3$ is a vanishing sequence with $\delta >0$ in episode $k$ (Step~\ref{step:conf-region}).
The key information to extract from the exploration phase is
\begin{itemize}
\item the optimistic POMDP inside the confidence region (Step~\ref{step:optimistic-pomdp});
\item the updated belief vector according to the new estimators (Step~\ref{step:update-belief}).
\end{itemize}
Then the algorithm enters the exploitation phase (Step~\ref{step:exploit}),
whose length is $\tau_2 \sqrt{k}$ in episode $k$ and $\tau_2$ is another tunable hyperparameter.
In the exploitation phase, an action is chosen according to the optimal policy associated with the optimistic estimators for $\mathcal{P}$ and $\Omega$ inside the confidence region.
This is the principle of ``optimisim in the face of uncertainty'' for UCB-type algorithms.
\begin{algorithm}
\caption{The SEEU Algorithm}
\label{alg:SEEU}
\begin{algorithmic}[1]
\REQUIRE Precision $\delta$, exploration hyperparameter $\tau_1$, exploitation hyperparameter $\tau_2$.
\STATE Initialize: time $T_1=0$, initial belief $b_0$.
\FOR {$k=1,2,3,\dots$}\label{step:episode}
\FOR{$t=T_k,T_k+1,\dots,T_k+\tau_1I$}\label{step:explore-tau1}
\STATE Select each action $\tau_1$ times successively.
\STATE Observe next observation $o_{t+1}$.
\ENDFOR
\STATE\label{step:all-samples-exploration} Use the realized actions and observations in all previous exploration phases $\hat{\mathcal{I}}_k \coloneqq \{i_{T_1:T_1+\tau_1I}, \cdots,i_{T_k:T_k+\tau_1I}
\}$ and $\hat{\mathcal{O}}_k \coloneqq \{o_{T_1+1:T_1+\tau_1I+1},\cdots,o_{T_k+1:T_k+\tau_1I+1}
\}$ as input to Algorithm~\ref{alg:spectral} to compute\\
\centerline{$(\hat{\mathcal{P}}_k, \hat{\Omega}_k) = \textbf{SpectralEstimation}(\hat{\mathcal{I}}_k, \hat{\mathcal{O}}_k)$.}
\STATE \label{step:conf-region} Compute the confidence region $\mathcal{C}_k(\delta_k)$ centered at $(\hat{\mathcal{P}}_k, \hat{\Omega}_k)$ from \eqref{def:confidence bound} using the confidence level $1-\delta_k=1-\delta/k^3$ such that $\mathbb{P}\{(\mathcal{P},\Omega)\in\mathcal{C}_k(\delta_k)\}\geq 1-\delta_k$.
\STATE\label{step:optimistic-pomdp} Find the optimistic POMDP in the confidence region ($\rho^*$ given in \eqref{equ:opt average reward} and \eqref{equ:Bellman-thm}):\\
\centerline{$(\mathcal{P}_k,\Omega_k)=\argmax_{(\mathcal{P},\Omega)\in\mathcal{C}(\delta_k)}\rho^*(\mathcal{P},\Omega)$.}
\FOR{$t=0,1,\dots,T_k+\tau_1I$}
\STATE \label{step:update-belief} Update belief $b_t^k$ to $ b_{t+1}^k=H_{\mathcal{P}_k, \Omega_k}(b_t^k,i_t,o_{t+1})$ under the new parameters $(\mathcal{P}_k,\Omega_k)$.
\ENDFOR
\FOR{$t=T_k+\tau_1I+1,\dots,T_k+\tau_1I+\tau_2\sqrt{k}$}\label{step:exploit}
\STATE Execute the optimal policy $\pi^{(k)}$ by solving the Bellman equation \eqref{equ:Bellman-thm} with parameters $(\mathcal{P}_k,\Omega_k)$: $i_t=\pi_t^{(k)}(b_t^k)$.
\STATE Observe next observation $o_{t+1}$.
\STATE Update the belief at $t+1$ following
$b_{t+1}^k=H_{\mathcal{P}_k, \Omega_k}(b_t^k,i_t,o_{t+1})$.
\ENDFOR
\STATE $T_{k+1}\gets t+1$
\ENDFOR
\end{algorithmic}
\end{algorithm}
Before getting into the details, we comment on the major difficulties of designing and analyzing such an algorithm.
To apply the spectral estimator, in the exploration phase the actions are chosen deterministically to ``mimic'' an HMM, as mentioned above.
This is necessary as the spectral estimator requires fast convergence to a stationary distribution, guaranteed by Assumption~\ref{assum:trans_matrix_min}.
Moreover, at the first sight, the re-calculation of the belief in Step~\ref{step:update-belief} may deviate significantly from the actual belief using the exact parameters.
The belief relies on the whole history, and a small error in the estimation may accumulate over $t$ periods and lead to an erroneous calculation.
We show in Proposition~\ref{prop:lip_bt} that the belief error can actually be well controlled.
This is important for the algorithm to achieve the sublinear regret.
\subsection{Exploration: Spectral Method} \label{sec:spectral}
We next zoom in to the exploration phase of a particular episode, in order to show the details of the spectral estimator in Step~\ref{step:all-samples-exploration} and~\ref{step:conf-region} \citep{anandkumar2012method,anandkumar2014tensor,Azizzadenesheli2016}.
Suppose the exploration phase lasts from period 0 to $N$, with a fixed action $i_t\equiv i$ and realized observations $\{o_1,o_2,\dots,o_{N+1}\}$ sampled according to the observation density $\Omega$.
When the action is fixed, the underlying state $M_t$ converges to the steady state geometrically fast due to Assumption~\ref{assum:trans_matrix_min}.
For the ease of exposition, we assume that the system has reached the steady state at $t=0$.
In Remark~\ref{rmk:stationary-se}, we discuss how to control the error as the system starts from an arbitrary state distribution.
For $t \in \{2,\dots,N\}$, we consider three ``views'' $(o_{t-1},o_{t},o_{t+1})$.
(Here a view is simply a feature of the collected data, a term commonly used in data fusion \citep{zhao2017multi}.
We stick to the term as in the original description of the spectral estimator.)
We can see from Figure \ref{fig:graphical_model} that given $m_t$ and $i_t\equiv i$, all the three views are independent.
Since the system has reached the steady state, the distribution of $(o_{t-1},o_{t},o_{t+1})$ is also stationary.
The key of the spectral estimator is to express the distribution of $(o_{t-1},o_{t},o_{t+1})$
as a function of the parameters to learn.
Then the relevant moments are matched to the samples, which is similar to the spirit of methods of moments.
We represent the views in the vector form for convenience.
Formally, we encode $o_{t-1}$ into a unit vector $v_{1,t}^{(i)}\in \{0,1\}^{O}$, satisfying $\mathds{1}_{\{v_{1,t}^{(i)}=\bm{e}_o\}}=\mathds{1}_{\{O_{t-1}=o\}}$.
Similarly, $o_{t}$ and $o_{t+1}$ can also be expressed as unit vectors $v_{2,t}^{(i)} \in \{0,1\}^{O}$ and $v_{3,t}^{(i)} \in \{0,1\}^{O}$.
Define three matrices $A_1^{(i)}, A_2^{(i)} , A_3^{(i)} \in \mathbb{R}^{O \times M} $ for action $i$ such that:
\begin{align}\label{multi-view}
&A_1^{(i)}(o,m)=\mathbb{P}(v^{(i)}_{1,t}=\bm{e}_o|m_t=m,i_t=i),\\
&A_2^{(i)}(o,m)=\mathbb{P}(v^{(i)}_{2,t}=\bm{e}_o|m_t=m,i_t=i),\\
&A_3^{(i)}(o,m)=\mathbb{P}(v^{(i)}_{3,t}=\bm{e}_o|m_t=m,i_t=i).
\end{align}
By stationarity, the distribution of the matrices is independent of $t$.
We use $\theta_{1,m}^{(i)}, \theta_{2,m}^{(i)}$ and $\theta_{3,m}^{(i)}$ to denote the $m$-th column of $A_1^{(i)}$, $A_2^{(i)}$ and $A_3^{(i)}$, respectively.
Let $W_{p,q}^{(i)}=\mathbb{E}\left[v_{p,t}^{(i)}\otimes v_{q,t}^{(i)}\right]$ be the correlation matrix between $v_{p,t}^{(i)}$ and $v_{q,t}^{(i)}$, for $p,q\in\{1,2,3\}$.\footnote{For any vectors $v \in \mathbb{R}^{n_1}, u \in \mathbb{R}^{n_2}, w \in \mathbb{R}^{n_3}$, the tensor products are defined as follows: $v \otimes u \in \mathbb{R}^{n_1 \times n_2}$ with $[v \otimes u]_{i,j}=v_i u_j$, and $v \otimes u \otimes w \in \mathbb{R}^{n_1 \times n_2 \times n_3}$ with $[v \otimes u \otimes w]_{i,j,k}=v_i u_j w_k$.}
The spectral estimator uses the following modified views, which are linear transformations of $v_{1,t}^{(i)}$ and $v_{2,t}^{(i)}$:
\begin{align}\label{def:modified view}
\widetilde{v}_{1,t}^{(i)}\coloneqq W_{3,2}^{(i)}(W_{1,2}^{(i)})^\dagger v_{1,t}^{(i)},\quad\quad
\widetilde{v}_{2,t}^{(i)}\coloneqq W_{3,1}^{(i)}(W_{2,1}^{(i)})^{\dagger}v_{2,t}^{(i)},
\end{align}
where $\dagger$ represents the pseudoinverse of a matrix.
It turns out that the second and third moment of the modified views,
\begin{align}\label{def:view moments}
M_2^{(i)}\coloneqq\mathbb{E}\left[\widetilde{v}_{1,t}^{(i)}\otimes\widetilde{v}_{2,t}^{(i)}\right],\quad
M_3^{(i)}\coloneqq\mathbb{E}\left[\widetilde{v}_{1,t}^{(i)}\otimes\widetilde{v}_{2,t}^{(i)}\otimes v_{3,t}^{(i)}\right],
\end{align}
can be compactly represented by the model parameters.
More precisely, by Theorem 3.6 in \citet{anandkumar2014tensor}, we have the following spectral decomposition:
\begin{align}\label{eq:M_tensor_decom}
M_2^{(i)}=\sum\limits_{m\in\mathcal{M}}\omega^{(i)}(m)\theta_{3,m}^{(i)}\otimes\theta_{3,m}^{(i)},\quad\quad
M_3^{(i)}=\sum\limits_{m\in\mathcal{M}}\omega^{(i)}(m)\theta_{3,m}^{(i)}\otimes\theta_{3,m}^{(i)}\otimes\theta_{3,m}^{(i)},
\end{align}
where we recall that $\omega^{(i)}(m)$ is the state stationary distribution under the policy $i_t\equiv i$ for all $t$.
With the relationship \eqref{eq:M_tensor_decom}, we can describe the procedures of the spectral estimator.
Suppose a sample path $\left\{o_t\right\}_{t=1}^{N+1}$ is observed under the policy $i_t\equiv i$.
It can be translated to $N-1$ samples of $(v_{1,t}^{(i)}, v_{2,t}^{(i)}, v_{3,t}^{(i)})$, $t \in \{2,\dots,N\}$.
They can be used to construct the sample average of $W_{p,q}^{(i)}$ for $p,q\in\{1,2,3\}$:
\begin{align}\label{eq:w-hat}
\hat{W}_{p,q}^{(i)}=\frac{1}{N-1}\sum_{t=2}^N v_{p,t}^{(i)}\otimes v_{q,t}^{(i)}.
\end{align}
By \eqref{def:modified view} and \eqref{def:view moments}, we can construct the following estimators:
\begin{align}
&\hat{v}_{1,t}^{(i)}=\hat{W}_{3,2}^{(i)}(\hat{W}_{1,2}^{(i)})^{\dagger}v_{1,t}^{(i)},\quad\quad
&&\hat{v}_{2,t}^{(i)}=\hat{W}_{3,1}^{(i)}(\hat{W}_{2,1}^{(i)})^{\dagger}v_{2,t}^{(i)},\label{eq:y-hat}\\
&\hat{M}_2^{(i)}=\frac{1}{N-1}\sum_{t=2}^N\hat{v}_{1,t}^{(i)}\otimes \hat{v}_{2,t}^{(i)},\quad\quad
&&\hat{M}_3^{(i)}=\frac{1}{N-1}\sum_{t=2}^N \hat{v}_{1,t}^{(i)}\otimes \hat{v}_{2,t}^{(i)}\otimes v_{3,t}^{(i)}.\label{eq:M-hat}
\end{align}
Plugging $\hat M_2^{(i)}$ and $\hat M_3^{(i)}$ into the left-hand sides of \eqref{eq:M_tensor_decom},
we can apply the tensor decomposition method \citep{anandkumar2014tensor} to solve $\theta_{3,m}^{(i)}$ from \eqref{eq:M_tensor_decom}, which is denoted as $\hat{\theta}_{3,m}^{(i)}$.
It can also be shown that $\theta_{1,m}^{(i)}=W_{1,2}^{(i)}(W_{3,2}^{(i)})^ \dagger \theta_{3,m}^{(i)}$ and $\theta_{2,m}^{(i)}=W_{2,1}^{(i)}(W_{3,1}^{(i)})^ \dagger \theta_{3,m}^{(i)}$, which naturally lead to estimators $\hat{\theta}_{1,m}^{(i)}$ and $\hat{\theta}_{2,m}^{(i)}$.
As a result, the unknown parameters $P^{(i)}$ and $\Omega$ can be estimated according to the following lemma.
\begin{lemma}\label{lemma:view_to_f_P}
The unknown transition matrix $P^{(i)}$ and the observation density function $\Omega$ satisfy $\Omega(o|m,i)=A_2^{(i)}(o,m)$ and $P^{(i)}=\left(\left(A_2^{(i)}\right)^\dagger A_3^{(i)}\right)^{\top}$.
\end{lemma}
We remark that Assumption \ref{assum:trans_matrix_invert} and Assumption \ref{assum:observation_density_lp} imply that all three matrices $A_1^{(i)}, A_2^{(i)} , A_3^{(i)} $ are all of full column rank \citep{Azizzadenesheli2016}, and hence the pseudoinverse $\left(A_2^{(i)}\right)^\dagger$ in Lemma~\ref{lemma:view_to_f_P} is well defined. The subroutine to estimate POMDP estimators is summarized in Algorithm~\ref{alg:spectral}.
\begin{algorithm}[H]
\caption{The subroutine to estimate POMDP estimators.}
\label{alg:spectral}
\begin{algorithmic}[1]
\REQUIRE Observed actions $\{i_0,\dots,i_N\}$ and observations $\{o_1,\dots,o_{N+1}\}$
\ENSURE POMDP parameters $\hat{\mathcal{P}}, \hat{\Omega}$
\FOR {$i=1,\cdots,I$}
\STATE Construct $v^{(i)}_{1,t} = o_{t-1}$, $v^{(i)}_{2,t} = o_{t}$ and $v^{(i)}_{3,t}=o_{t+1}$.
\STATE Compute $\hat{W}_{p,q}^{(i)}, p,q\in\{1,2,3\}$according to \eqref{eq:w-hat},
\STATE Compute $\hat v_{1,t}^{(i)}$ and $\hat v_{2,t}^{(i)}$ according to~\eqref{eq:y-hat}.
\STATE Compute $\hat{M}_2^{(i)}$ and $\hat{M}_3^{(i)}$ according to \eqref{eq:M-hat} .
\STATE Apply tensor decomposition (\citet{anandkumar2014tensor}) to compute\\ \centerline{$\hat{A}_3^{(i)}=\textbf{TensorDecomposition}(\hat{M}_2,\hat{M}_3)$.}
\STATE Compute $\hat{\theta}_{2,m}^{(i)}=\hat{W}_{2,1}^{(i)}(\hat{W}_{3,1}^{(i)})^ \dagger \hat{\theta}_{3,m}^{(i)}$ for each $m\in\mathcal{M}$.
\STATE Return $\hat{\Omega}(o|m,i)=\hat{A}_2^{(i)}(o,m)$.
\STATE Return $\hat{P}^{(i)}=\left(\left(\hat{A}_2^{(i)}\right)^\dagger \hat{A}_3^{(i)}\right)^{\top}$.
\ENDFOR
\end{algorithmic}
\end{algorithm}
\begin{remark}\label{rmk:stationary-se}
The stationary distribution for a fixed action $i_t\equiv i$ is crucial for the spectral estimator $\hat{\Omega}(o|m,i)$ and $\hat{P}^{(i)}$, which allows \eqref{def:view moments} and \eqref{eq:M_tensor_decom} to be independent of $t$.
In our case, the spectral estimator is applied to a sequence of samples in the exploration phase, which does not start in a steady state.
This is a similar situation as \cite{Azizzadenesheli2016}.
Fortunately, Assumption~\ref{assum:trans_matrix_min} allows fast mixing so that the distribution converges to the stationary distribution at a sufficiently fast rate.
We can still use Algorithm~\ref{alg:spectral}, which is originally designed for stationary HMMs.
The theoretical result in Proposition~\ref{prop:spectral} already takes into account the error attributed to mixing.
\end{remark}
The following result, adapted from \citet{Azizzadenesheli2016}, provides the confidence regions of the estimators in Algorithm~\ref{alg:spectral}.
\begin{proposition}[Finite-sample guarantee of spectral estimators]\label{prop:spectral}
Suppose Assumptions \ref{assum:trans_matrix_min}, \ref{assum:trans_matrix_invert} and \ref{assum:observation_density_lp} hold. For any $\delta \in (0,1)$.
If for any action $i \in \mathcal{I}$, the number of samples $N^{(i)}$ satisfies $N^{(i)}\geq N_0^{(i)}$ for some $N_0^{(i)}$,
then with probability $1-\delta$, the estimated $\hat{P}^{(i)}$ and $\hat{\Omega}$ by Algorithm~\ref{alg:spectral} satisfy
\begin{align}
\left\|\Omega(\cdot|m,i)-\hat{\Omega}(\cdot|m,i)\right\|_1 &\leq C_1 \sqrt{\frac{\log\left(\frac{6(O^2+O)}{\delta}\right)}{N^{(i)}}},\\
\left\|P^{(i)}(m,:)- \hat{P}^{(i)}(m,:)\right\|_2&\leq C_2\sqrt{\frac{\log\left(\frac{6(O^2+O)}{\delta}\right)}{N^{(i)}}}.\label{def:confidence bound}
\end{align}
for $i \in \mathcal{I}$ and $m \in \mathcal{M}$. Here, $C_1$ and $C_2$ are constants independent of any $N^{(i)}$.
\end{proposition}
The explicit expressions of constants $N_0^{(i)}, C_1, C_2$ are given in Section~\ref{sec:proof-prop-spectral} in the appendix.
Note that $\Omega$ and $P^{(i)}$ are identifiable up to a proper permutation of the hidden state labels, because the exact index of the states cannot be recovered.
We do not explicitly mention the permutation in the statement of Proposition~\ref{prop:spectral} for simplicity, consistent with the literature such as \cite{Azizzadenesheli2016}.
\begin{comment}
where
where $\omega_{\min}=\min_m \omega(m)$.
$G,\theta$ are the mixing rate parameters that
$$\sup_{m_1}||f_{1\rightarrow t}(\cdot|m)-\omega||_{TV}\leq G\theta^{t-1}$$
where $f_{1\rightarrow t}(\cdot|m_1)$ denotes the probability distribution vector of the underlying state starting from initial state $m_1$.
$\sigma_{3,1}$ is the smallest nonzero singular value of the covariance matrix $\mathbb{E}[y_{t+1}\otimes y_{t-1}]$.
Let $A_1\in\mathbb{R}^{M\times S}$ be the matrix that $A_1(m,s)=\mathbb{P}(y_{t-1}=s|M_t=m)$. $\sigma$ is defined as
\begin{align*}
\sigma=\min\{\sigma_{\min}(A_1),\sigma_{\min}(A),\sigma_{\min}(AP)\}
\end{align*}
where $\sigma_{\min}(X)$ denotes the smallest nonzero singular value of the matrix $X$.
\end{comment}
\subsection{Exploitation: UCB-type Method}
After the confidence region and the implied coverage probabilities are derived in Proposition~\ref{prop:spectral} at the end of the exploration phase,
we adopt the principle of ``optimism in the face of uncertainty'' and the associated UCB algorithm \citep{auer2002finite} in the subsequent exploitation phase.
It is based on the intuition that the upper confidence bound creates a collection of ``plausible'' environments and selects
the one with the largest optimal gain.
The UCB algorithm has been successfully applied to reinforcement learning (UCRL) \citep{ortner2007logarithmic, Jaksch2010} to control the regret.
We apply this idea to Step~\ref{step:optimistic-pomdp} of~Algorithm \ref{alg:SEEU}.
Selecting the optimal action based on the optimistic yet plausible environment helps to balance the exploration and exploitation.
\subsection{Discussions on the SEEU Algorithm}
We discuss a few points related to the implementation of Algorithm~\ref{alg:SEEU} and alternative methods.
\textbf{Optimistic or point estimator for exploitation.} Algorithm~\ref{alg:SEEU} uses the optimistic estimator in the confidence region formed during the exploitation phase to compute the optimal policy and update the belief (Step \ref{step:exploit}).
Alternatively, since we already device separate phases for exploration and exploitation, one may use the point estimator for $(\mathcal{P},\Omega)$
in the exploitation phase, without using the upper confidence bound or the optimistic estimator.
This method may also achieve sublinear regret.
However, proving regret bound for this method requires a set of properties of the POMDP that are difficulty to analyze, such as the Lipschitz continuity of $\rho^*$ with respect to true model parameters $(\mathcal{P},\Omega)$.
Therefore, we use the optimistic estimator in the exploitation phase.
\textbf{Computational cost of Algorithm~\ref{alg:SEEU}.} For given parameters $(\mathcal{P},\Omega)$, we need to compute the optimal average reward $\rho^*(\mathcal{P},\Omega)$ that depends on the parameters (Step \ref{step:optimistic-pomdp} in Algorithm \ref{alg:SEEU}). Various computational and approximation methods have been proposed in the literature to tackle this planning problem for belief MDPs, which we have already discussed in the introduction. These methods can be applied to our algorithm.
In addition, we need
to find out the optimistic POMDP in the confidence region $\mathcal{C}_k(\delta_k)$ with the best average reward (Step \ref{step:optimistic-pomdp} in Algorithm \ref{alg:SEEU}). For low dimensional models, one can discretize $\mathcal{C}_k(\delta_k)$ into grids and calculate the corresponding optimal average reward $\rho^*$ at each grid point so as to find (approximately) the optimistic model $(\mathcal{P}_k, \Omega_k)$.
However, in general it is not clear whether there is an efficient computational method to find the optimistic plausible POMDP model in the confidence region when the unknown parameters are high-dimensional. This issue is also present in other recent studies on learning continuous-state MDPs with the upper confidence bound approach, see e.g. \cite{Lakshmanan2015} for a discussion. In our regret analysis below, we do not take into account the approximation errors arising from the computational aspects discussed here.
We point out that the main contribution of this paper is not \textit{computational}.
Rather, it is to develop a theoretical framework for learning model-based POMDPs.
To implement the algorithm efficiently remains an intriguing future direction.
\textbf{Dependence on the unknown parameters.}
Algorithm~\ref{alg:SEEU} requires some information about the unknown Markov chain to compute the confidence bounds.
In particular, when computing the confidence region in Step~\ref{step:conf-region} of Algorithm~\ref{alg:SEEU}, the agent needs the information of the constants $C_1$ and $C_2$ in Proposition~\ref{prop:spectral}.
Although $C_1$ and $C_2$ do not depend on the parameters to learn directly, such as the transition matrices, they do depend on a few ``primitives'' that are hard to know, for example, the mixing rate of the underlying Markov chain when the action is fixed.
See Section~\ref{sec:proof-prop-spectral} in the appendix for more details.
Still, we would argue that it is relatively easy to acquire such information and this setup is innocuous:
we only need upper bounds for $C_1$ and $C_2$ for the theoretical guarantee and not exact values.
Therefore, a rough and conservative estimate would be sufficient.
Such dependence on some unknown parameters is common in learning problems: the parameter of the sub-Gaussian noise in multi-armed bandits is usually assumed to be known; the confidence bound in \citet{Azizzadenesheli2016} is constructed based on similar information of the underlying Markov chain; \cite{Ortner2014,Lakshmanan2015} require the knowledge of the H\"older constant for rewards and transition probabilities.
A common remedy is to dedicate the beginning of the horizon to estimate the unknown parameters, which typically doesn't increase the rate of the regret.
Alternatively, $C_1$ and $C_2$ can be replaced by parameters that are tuned by hand.
See Remark 3 of \cite{Azizzadenesheli2016} for a discussion on this issue.
\section{Regret Analysis}\label{sec:regret}
In this section, we state our main results, the upper bound for the regret of Algorithm~\ref{alg:SEEU}
in high probability and expectation.
We first show a uniform bound on the span of $v_k$, where $v_k$ is the bias function satisfying the Bellman equation \eqref{equ:Bellman-thm} for the optimistic belief MDP in episode $k$ of Algorithm \ref{alg:SEEU}.
Such a bound is known to be critical in the regret analysis of learning continuous MDPs.
\begin{proposition}[Uniform bound for the span of the bias function]\label{prop:span-uni-bound}
Suppose Assumption \ref{assum:trans_matrix_min} and Assumption \ref{assum:reward_density_min} hold, and $(\rho^*_k, v_k)$ satisfies the Bellman equation \eqref{equ:Bellman-thm}. Fix the hyperparameter $\tau_1$ in Algorithm~\ref{alg:SEEU} to be sufficiently large.
Then there exists a constant $D$ such that $\text{span}(v_k) :=\max_{b \in \mathcal{B}}v_k(b)-\min_{b\in\mathcal{B}}v_k(b)\le D$ for all $k$, where
\begin{align}
D\coloneqq\frac{8r_{\max}\left( \frac{2}{(1-\bar \alpha)^2}+(1+ \bar \alpha) \log_{\bar \alpha} \frac{1-\bar \alpha}{8}\right)}{1-\bar \alpha},\label{span-bound-constant}
\end{align}
and $\bar \alpha=\frac{1- \epsilon}{1 - \epsilon/2} \in (0,1)$ with $\epsilon=\min\limits_{i \in \mathcal{I}} \min\limits_{m,n \in \mathcal{M}}P^{(i)}(m,n)>0$.
\end{proposition}
Next, recall that in Algorithm \ref{alg:SEEU}, we re-compute the belief after re-estimating the parameters in each exploration phase.
If a small error in the parameter estimation may propagate over time and cause the belief to deviate from the true value, then the algorithm cannot perform well in the exploitation phase.
In the next result (Proposition~\ref{prop:lip_bt}), we show guarantees that the error doesn't accumulate and as a result, the regret incurred in the exploitation phase is proportional to the estimation error.
\begin{proposition}[Controlling the belief error]\label{prop:lip_bt}
Suppose Assumption \ref{assum:trans_matrix_min} and Assumption \ref{assum:reward_density_min} hold.
Given the estimators $((\hat{P}^{(i)})_{i},\hat{\Omega})$ of the true model parameters $( (P^{(i)})_{i},\Omega)$, for an arbitrary reward-action sequence $\{i_{0:t-1},o_{1:t}\}_{t\geq 1}$, let $b_t$ and $\hat{b}_t$ be the corresponding beliefs in period $t$ computed from the same initial belief $b_0$ under $( (P^{(i)})_{i},\Omega)$ and $((\hat{P}^{(i)})_{i},\hat{\Omega})$, respectively. Then there exist constants $L_1,L_2$ such that
\begin{align}
\Vert b_t -\hat{b}_t \Vert_1\leq L_1 \max\limits_{m \in \mathcal{M}, i\in \mathcal{I}}\left\|\Omega(\cdot|m,i)-\hat{\Omega}(\cdot|m,i)\right\|_1+L_2 \max\limits_{m \in \mathcal{M}, i\in \mathcal{I}} \left\| P^{(i)}(m,:)-\hat{P}^{(i)}(m,:) \right\|_2,
\end{align}
where $L_1=\frac{4(1-\epsilon)^2}{\epsilon^2 \xi}$ and
$L_2=\frac{4(1-\epsilon)^2}{\epsilon^3}$.
\end{proposition}
With Propositions~\ref{prop:span-uni-bound} and~\ref{prop:lip_bt}, we are now ready to state our main result about the high-probability regret bound for our algorithm.
\begin{theorem}\label{thm:upper_bound}
Fix the hyperparameter $\tau_1$ in Algorithm~\ref{alg:SEEU} to be sufficiently large. Suppose Assumptions 1 to 4 hold.
There exist constants $T_0$ such that for $T>T_0$, with probability $1-\frac{7}{2}\delta$,
the regret of Algorithm~\ref{alg:SEEU} satisfies
\begin{align}
\mathcal{R}_T& \leq CT^{2/3}\sqrt{\log\left(\frac{3(O+1)}{\delta}T\right)}+T_0\rho^*,
\end{align}
where $\rho^* \le r_{\max},$ and
\begin{align}
C=&3\sqrt{2}\left[\left(\frac{D}{2}+\frac{D}{2}L_1 + r_{\max} L_1\right)C_1+\left(\frac{D\sqrt{M}}{2}+ +\frac{D}{2}L_2+r_{\max} L_2 \right)C_2 \right]\tau_1^{-1/2}\tau_2^{1/3}\\
&\quad\quad+3(\tau_1I\rho^*+D)\tau_2^{-2/3}+D \sqrt{2 \log\left(\frac{1}{\delta}\right)}+\sqrt{2r_{\max}\log \left(\frac{1}{\delta}\right)},
\end{align}
with $C_1, C_2$ given in Proposition~\ref{prop:spectral}, $D$ given in Proposition~\ref{prop:span-uni-bound}, and $L_1, L_2$ given in Proposition~\ref{prop:lip_bt}.
\end{theorem}
We briefly discuss the dependency of $C$ on the model primitives.
The dependence is square-root in $M$ (similar to the learning of MDPs in \citealt{Jaksch2010}) and linear in $I$.
In contrast, the regret of MAB typically scales in $\sqrt{I}$. This is because only one arm emerges optimal.
In our setting, all actions may be optimal depending on the belief of the underlying state, and thus their parameters need to be learned equally accurately.
The dependency on $C_1$ and $C_2$ is directly inherited from the confidence bounds in Proposition~\ref{prop:spectral} (see also \citealt{Azizzadenesheli2016}).
In addition, $C$ depends on $L_1$ and $L_2$ which arise from controlling the propagated error when updating the belief of the hidden state (Proposition~\ref{prop:lip_bt}; see also \citealt{DeCastro2017}). Finally, $C$ depends on the bound $D$ of the bias span (similar to the diameter of MDP in UCRL2 in \citealt{Jaksch2010}) in Proposition~\ref{prop:span-uni-bound}. The constant
$C$ may not be tight, and its dependence on some parameters may be just an artefact of our proof,
but it is the best bound we can obtain.
Since $\mathcal{R}_T \le (T+1)\rho^* $ by the definition \eqref{def:reg}, we can choose $\delta=\frac{3(O+1)}{T+1}$ in Theorem~\ref{thm:upper_bound},
and obtain
\begin{align}
\mathbb{E}[\mathcal{R}_T]&\leq \left(CT^{2/3}\sqrt{\log\left(\frac{3(O+1)}{\delta}T\right)}+T_0\rho^*\right)\left(1-\frac{7}{2}\delta\right)+(T+1)\rho^* \cdot \frac{7}{2}\delta \\
&\leq CT^{2/3}\sqrt{2\log T}+T_0\rho^*+\frac{21(O+1)}{2}\rho^*.
\end{align}
We summarise this bound for the expected regret in the following result.
\begin{theorem}\label{thm:expected_upper_bound}
Under the same setting as in Theorem~\ref{thm:upper_bound}, the regret of Algorithm~\ref{alg:SEEU} satisfies
\begin{align}
\mathbb{E}[\mathcal{R}_T]& \leq CT^{2/3}\sqrt{2\log T} + (T_0+11(O+1))\rho^*,
\end{align}
where constants $C$ and $T_0$ are given in Theorem \ref{thm:upper_bound}.
\end{theorem}
\begin{remark}[Lower bound of the regret]
The typical optimal regret bound for online learning is $O(T^{1/2})$.
The gap is probably caused by the split of exploration/exploitation phases in our algorithm, which resembles the $O(T^{2/3})$ regret for explore-then-commit algorithms in classic multi-armed bandit problems (see Chapter 6 in \citealt{lattimore2020bandit}).
We cannot integrate the two phases because of the following barrier: the spectral estimator cannot use samples generated from the belief-based policy due to the history dependency.
This is also why \citet{Azizzadenesheli2016} focus on memoryless policies in POMDPs to apply the spectral estimator.
In some simpler settings such as linear bandit, the exploration-exploitation interleaving approach can lead to $O(\sqrt{T})$ regret by adaptively varying the length of the phases, see e.g. \cite{rusmevichientong2010linearly}.
The reason for this difference in regret lies in the structure of the problem.
In \citet{rusmevichientong2010linearly}, the linear parametrization and smoothness assumption on the set of arms give rise to an instantaneous regret that is proportional to $\|\text{estimation error}\|_2^2$ in the exploitation phase, while for us it is proportional to $\|\text{estimation error}\|_2$.
\end{remark}
%
%
%
%
\section{Conclusion and Future Work} \label{sec:conclusion}
This paper studies learning of POMDPs in an unknown environment.
We develop a learning algorithm that integrates spectral estimators for hidden Markov Models and upper confidence methods from online learning.
We also establish a regret bound of order of $O(T^{2/3}\sqrt{\log T})$ for the learning algorithm.
There are two research directions based on the work that is worth exploring.
One is the computational aspect of the algorithm.
In our preliminary numerical study, the computational cost is still prohibitively large, mainly due to the spectral estimator and the search for the optimistic parameters in the confidence region.
Second,
it is still not clear if other algorithms can attain regret $\sqrt{T}$ or the lower bound is $T^{2/3}$.
We hope to address both problems in future studies.
\newpage
\bibliographystyle{informs2014}
|
\section{Introduction}
Research suggests that the microbiome, especially the gut microbiome, could serve as a clinical biomarker for disease diagnosis, prognosis, and treatment. These studies use machine learning to fit a model that can predict a clinical outcome as a function of the gut microbe signature. The accuracy of these models are demonstrated through the use of performance metrics like the area under the receiver operating curve (AUC), but can these metrics be trusted?
In the machine learning culture, model verification--also called model validation, as distinct from clinical validation \cite{kim_design_2019}--is used to assess whether a model is fit for purpose. To perform model verification, a model is trained on one set of data, called the \textit{training data}, then tested on completely new unseen data, called the \textit{test data}. If a model performs well for the completely new unseen data, then it can be considered reliable for the tested application \cite{breiman_statistical_2001}.
Model verification is an essential part of a machine learning workflow. When model verification is not performed correctly, or is not performed at all, it becomes impossible to know whether a learned model is accurate \cite{quinn_test_2021}. Two critical errors are
\begin{itemize}
\item \textbf{Test set omission} When a test set is not used, there are no unseen data available for model verification, meaning that model verification cannot be performed.
\item \textbf{Test set leakage} When a test set is used, but information from the test set directly or indirectly influences model training, then the test set no longer represents unseen data, meaning that model verification cannot be performed correctly. One example of leakage is selecting features from the combined training and test data, a common machine learning pitfall among genomic studies \cite{teschendorff_avoiding_2019}.
\end{itemize}
Both errors constitute a misuse of machine learning because they bias performance upwards, making a model appear more accurate than it is. They can even make a model appear highly accurate when it is, in fact, not accurate at all. For this reason, one should not take performance metrics at face value; it is necessary to assess the quality of the training regime used to produce them.
This article presents a systematic review and quantitative analysis of the human gut microbiome literature that seeks to measure the frequency and impact of \textbf{test set omission} and \textbf{test set leakage} on AUC reporting. We find evidence that the absence or misuse of test sets is widespread, with only 12\% of studies performing model verification correctly. Moreover, the 88\% of studies that fail to perform model verification report significantly higher AUCs (95\% CI: 2.3 to 11.1 point difference). Our findings cast serious doubt on the general validity of research claiming that the gut microbiome has high diagnostic or prognostic potential in human disease.
\section{Methods}
\subsection{Study retrieval and screening}
On June 2, 2021 we searched PubMed using the term ``((GUT) OR (STOOL) OR (FECAL) OR (FAECAL)) AND (MICROB*) AND (AUC)''. We had 4 inclusion criteria: (1) the study involved human subjects, (2) the abundances of their gut microbes were measured by a high-throughput assay (e.g., microarray, 16s, or shotgun sequencing), (3) the microbe abundances were used as features to train a classifier, and (4) the AUC of the classifier was reported in the Abstract. Criteria 4 was included because Abstract-reported AUC is the outcome for our quantitative analysis.
We had 7 exclusion criteria: (1) microbe abundances were not measured using a high-throughput assay (e.g., qPCR); (2) microbe abundances were not used as features to train a classifier; (3) fungal or viral abundances were measured without also measuring bacterial microbe abundances; (4) metabolite abundances were measured without also measuring bacterial microbe abundances; (5) reviews or systematic reviews reporting meta-analyses; (6) methodological studies that propose a new tool or that benchmark several competing tools; or (7) article not available in English (2 articles) or not available from our University library (1 article).
\begin{figure}[H]
\centering
\scalebox{1}{
\includegraphics[width=(.5\textwidth)]{screen.pdf}}
\caption{A workflow of study retrieval, screening, and exclusion. Overall, we included 102 studies for data extraction and quality assessment.}
\label{fig:datypes}
\end{figure}
\subsection{Data extraction}
We extracted 5 pieces of data from Abstracts.
\begin{itemize}
\item The study DOI.
\item The first affiliated location of the senior author.
\item Whether the researchers conclude explicitly in the Abstract that their classifier can be used, or has promise to be used, as a biomarker-based prediction tool (Yes or No).
\item Whether the researchers conclude explicitly in the Abstract that their classifier cannot be used as a biomarker-based prediction tool (Yes or No).
\item The Abstract-reported AUC as measured on the \textit{most independent data set} (i.e., rank order: external test set $>$ internal test set $>$ validation set $>$ training set). In the case of multiple classification tasks, we record the highest independent AUC. For example, if the authors published two training set AUCs of 91\% and 95\%, and two validation set AUCs of 84\% and 89\%, we would record 89\%.
\end{itemize}
We extract an additional 5 pieces of data from the Methods.
\begin{itemize}
\item Whether the study meets each of the 4 inclusion criteria.
\item The positive and negative classes for the classification task. In the case of multiple tasks, we record the task that corresponds to the Abstract-reported AUC.
\item The total sample size, as well as the sample size for each group. This sample size includes all patients from training, validation, and test sets. In the case of multiple classification tasks, we record the sample sizes that correspond to the Abstract-reported AUC.
\item The assay used to measure gut microbe abundances.
\item The classification algorithm used.
\end{itemize}
\subsection{Quality assessment}
We assess the quality of each article based on 5 criteria. All criteria recorded as ``1'' (Done and reported clearly) or ``0'' (Not done or not reported clearly).
\begin{itemize}
\item \textbf{VAL\_USE} Records whether a validation set is used, including cross-validation. This assessment is based on our judgement, not the terminology used by the authors.
\item \textbf{TEST\_USE} Records whether an \textit{internal} test set is used. Unlike a validation set, a test set is set aside before model training. By internal, we mean that the test set comes from the same patient cohort used for model training. This assessment is based on our judgement, not the terminology used by the authors. Set to ``1'' if nested cross-validation, or cross-validation without feature selection, is performed.
\item \textbf{EXT\_USE} Records whether an \textit{external} test set is used. By external we mean that the test set comes from a second patient cohort. External test sets must be described as being collected separately from the training, validation, and internal test sets.
\item \textbf{REPORT\_TEST} Records whether AUC reported in the Abstract comes from a test set (internal or external). This is not an assessment of whether the test set has leaked.
\item \textbf{NO\_LEAK} Records whether feature selection is performed on the training data only. In other words, this records whether feature selection happens independently from the test set, without test set leakage. Set to ``1'' if no feature selection is performed.
\end{itemize}
In addition to these 5 quality assessments, we record a final assessment of the article by answering the statement ``I am confident that the AUC reported in the article is calculated on an independent test set that has not leaked into the training of the model.'' Answers are recorded as ``1'' (I agree) or ``0'' (I do not agree).
Quality assessments and data extractions are performed based on a reading of the Methods or equivalent section. Supplemental Methods were not read unless the entire Methods were provided as a Supplemental file. If we could not make the final assessment based on the Methods alone, we would refer to the Results section to see if it contained additional methodological details.
\subsection{Quantitative analysis}
Associations between AUC and sample size were evaluated by Pearson correlation. Associations between AUC and quality assessments were evaluated by Student's t-test. All prior $\alpha=0.05$.
\section{Results}
\subsection{Study characteristics}
We included 102 studies for data extraction. The studies overwhelmingly used 16s sequencing (n=85), followed by shotgun sequencing (n=14), phylogenetic array (n=2), and multiple platforms (n=1). The most represented geographic regions were China and Taiwan (n=63), followed by Europe (n=20), North America (n=13), Near East (n=3), Far East (n=2), and Oceania (n=1).
The medical conditions under study varied greatly. After extracting all data, we assigned each study a category based on the organ system involved in the condition, but giving colorectal cancer (CRC) and inflammatory bowel disease (IBD) their own categories (see Table~\ref{tab:cats}). The most represented categories were CRC (n=15), IBD (n=12), and other enteric conditions (n=15). Autoimmune or inflammatory disease (n=10), neurology (n=9), and psychiatry (n=8) were also popular. Of note, 3 studies did not research a specific medical condition, but rather sampled the general population or a cohort of healthy subjects.
\begin{table}[h]
\centering
\begin{tabular}{|l|l|}
\hline
\textbf{Condition Under Study} & \textbf{Count}\\
\hline
enteric & 15\\
\hline
colorectal cancer & 15\\
\hline
inflammatory bowel disease & 12\\
\hline
autoimmune or inflammatory & 10\\
\hline
neurologic & 9\\
\hline
psychiatric & 8\\
\hline
infectious & 7\\
\hline
diet, nutrition, or obesity & 7\\
\hline
renal or diabetes & 7\\
\hline
other & 5\\
\hline
cardiac & 4\\
\hline
none & 3\\
\hline
\end{tabular}
\caption{The types of studies included for data extraction and quality assessment, classified by the organ system involved in the condition, but giving colorectal cancer (CRC) and inflammatory bowel disease (IBD) their own categories.}
\label{tab:cats}
\end{table}
\subsection{Test sets overwhelmingly absent or leaky}
Test sets are overwhelmingly absent. Only 21 out of 102 studies used an internal test set that was set aside from the training data.
Of these, only 14 did not leak the test data during feature selection. Of these, only 11 reported the AUC for the test set (the others ostensibly reporting AUC for all samples, training and test sets combined). Overall, only 11 of the 102 studies reported a \textit{bonda fide} test set AUC. An additional study did not use a test set \textit{per se}, but replicated a previously published biomarker classifier. These 12 are the only 12 studies that passed our final assessment: ``I am confident that the AUC reported in the article is calculated on an independent test set that has not leaked into the training of the model.''
Figure~\ref{fig:props} shows the proportion of articles satisfying each of the quality assessment criteria, along with the final assessment. Impressively, more than half of articles surveyed did not include \textit{any} validation (e.g., cross-validation), even if leaky. Meanwhile, only 8\% of studies used an \textit{external} test set collected separately from the training data, meaning that most studies lacked the data needed to demonstrate model generalizability, an important step towards establishing clinical validity.
\begin{figure}[H]
\centering
\scalebox{1}{
\includegraphics[width=(.6\textwidth)]{1-analyze-proportion.png}}
\caption{The proportion of studies meeting each of the 6 quality assessments, including our final assessment: ``I am confident that the AUC reported in the article is calculated on an independent test set that has not leaked into the training of the model.''}
\label{fig:props}
\end{figure}
\subsection{Studies without test sets report higher AUC}
Studies that did not use test sets reported higher AUCs than studies that did (95\% CI: 1.3 to 8s.1 point difference). Meanwhile, studies that leaked the test data reported higher AUCs than studies that did not (95\% CI: 2.1 to 9.3 point difference). These differences were even greater when comparing studies that did and did not pass our final assessment (95\% CI: 2.3 to 11.1 point difference).
We observed no significant differences based on whether studies used validation sets, used external test sets, or claimed to report test set AUC. Figure~\ref{fig:aucqc} shows the relevant box plots.
\begin{figure}[H]
\centering
\scalebox{1}{
\includegraphics[width=(.6\textwidth)]{1-analyze-assess.png}}
\caption{The distribution of Abstract-reported AUCs for studies that did and did not meet each quality assessment criteria. Studies that fail to meet certain quality assessment criteria also tended to report higher AUCs in the Abstract. Mean differences for criteria \textbf{TEST\_USE}, \textbf{NO\_LEAK}, and \textbf{FINAL} all $p<0.05$ by t-test.}
\label{fig:aucqc}
\end{figure}
\subsection{Smaller studies report higher AUC}
Reported AUCs range from 0.56 to 1, with a median of 0.8585. 34\% of studies reported an AUC at or above 0.9, while 15.5\% of studies reported an AUC at or above 0.95. AUCs were not distributed randomly with respect to sample size. Studies with larger sample sizes tended to report lower AUCs ($\rho=-0.31$; $p=0.0013$). This is noteworthy because, all things being equal, machine learning fundamentals would suggest that having more data would result in a \textit{higher} AUC because it becomes easier to find a robust and generalizable signal among the noise. The negative correlation between AUC and sample size contradicts this expectation. Figure~\ref{fig:cor} shows the association between classifier performance and log-scale sample size.
\begin{figure}[H]
\centering
\scalebox{1}{
\includegraphics[width=(.6\textwidth)]{1-analyze-sample-size.png}}
\caption{A scatter plot of the Abstract-reported AUC (y-axis) as a function of sample size (x-axis). Studies with larger sample sizes tended to report lower AUCs ($\rho=-0.31$; $p=0.0013$).}
\label{fig:cor}
\end{figure}
\section{Discussion}
AUCs range from 0 to 1, where a 1 indicates that a model always makes the correct prediction. High AUCs, like small p-values, may be used to convince readers that the experimental results are ``significant''. However, also like p-values, the interpretation of an AUC depends on the context in which it was measured. Two key errors, \textbf{test set omission} and \textbf{test set leakage}, can make published AUCs unreliable at best, and misleading at worst. Our Results suggest that the AUC from 88\% of human gut microbiome classification studies cannot be trusted at face value. To contextualize this finding, let us imagine we select a study at random and then flip 3 coins. It is more likely that all coins will land heads than that the reported AUC can be trusted.
Moreover, we find a significant difference in AUC between studies that did use and did not use test sets correctly. We interpret this as evidence that the widespread misuse of machine learning has resulted in overly optimistic AUCs. Although we measure the magnitude of difference in AUC as only 2.3-11.1 points, we speculate that the true effect size of \textbf{test set omission} and \textbf{test set leakage} is much higher. This is because the \textit{studies correctly using test sets} are not counter-factuals of the \textit{studies incorrectly using test sets}. Rather, the AUCs reported by the \textit{studies correctly using test sets} may represent some of the highest possible AUCs because of a publication bias that puts upward pressure on published AUCs (i.e., analogous to the publication bias that puts downward pressure on published p-values). Indeed, only 1/102 studies reported the null finding that the classifier they trained performed no better than chance. Yet, it seems unlikely that 99\% of all experimental gut microbiome classifiers would work out on the first try.
Our Results contribute to a growing literature that exposes systemic problems with the quality of microbiome research and clinical machine learning. Among these, Nearing et al. showed, through benchmark exercises, that different differential abundance software tools produce disturbingly different results, with many failing to control false discovery rate (FDR) \cite{nearing_microbiome_2021}, replicating findings from \cite{hawinkel_broken_2017}. Meanwhile, Walter et al. found that 95\% of studies investigating the rodent microbiome inappropriately generalized findings across species to make unfounded causal inferences about human disease \cite{walter_establishing_2020}. Outside of microbiome research, a recent systematic review of medical AI applications found widespread exaggeration about the clinical utility of machine learning models, alongside routine study bias, opaque reporting, and poor data availability \cite{nagendran_artificial_2020}. These findings all raise concerns that new technologies, while enabling new experiments, may bring them new threats to reproducibility, replicability, robustness, and generalizability \cite{schloss_identifying_2018}.
Readers who would like to learn more about machine learning best practices can refer to the helpful introductory works by Davide Chicco \cite{chicco_ten_2017} and Andrew Teschendorff \cite{teschendorff_avoiding_2019}, as well as introductory coding textbooks like those published by O'Reilly. When in doubt, we encourage our readers to reach out to local computational biology experts for questions and support.
\section{Limitations}
Finally, we ask our readers to interpret our Results in light of two limitations.
First, only one reviewer engaged in Abstract screening, data extraction, and quality assessment. Despite earnest attempts to define the data extraction and quality assessment criteria clearly, there nonetheless remains some subjectivity to the process.
Second, we focus on gut microbiome classification studies that report AUC in the Abstract, which is a subset of all gut microbiome classification studies. Although we use this inclusion criteria intentionally in order to define an outcome for our quantitative analysis, we acknowledge that it may introduce a selection bias. Notably, classification studies \textit{not} reporting AUC in the Abstract may be more likely to use machine learning correctly, for example because machine learning experts often prefer the F1-score over the AUC. Given these limitations, as well as the gravity of the Results themselves, we encourage others to consider replicating this kind of analysis in similar gut microbiome and clinical biomarker studies.
\section{Conclusions}
Plug-and-play analytical software has made it easier than ever to apply machine learning to biological data. Unfortunately, this has also made it easy for amateurs to misuse machine learning. In this study, we show that common errors like \textbf{test set omission} and \textbf{test set leakage} are widespread, occurring in 88\% of surveyed human gut microbiome classification studies. Our findings cast serious doubt on the general validity of research claiming that the gut microbiome has high diagnostic or prognostic potential in human disease.
\section{Availability of data and code}
Data and code available from \url{https://doi.org/10.5281/zenodo.5069117}.
\bibliographystyle{unsrt}
|
\section{Introduction}
The mechanics of deformable porous media filled with fluid, also known as \emph{poromechanics}, plays an important role in understanding the dynamics of biological organisms. From arterial walls to fibrous spider silk and to sea sponges, multi-layer materials with the complex internal structure are ubiquitous in nature \cite{meyers2008biological,naleway2015structural}. When such porous materials are immersed in fluids, for example, as is the case for underwater organisms or various internal organs of the human body, the porous media interacts with the fluid permeating it \cite{khaled2003role}. Thus the understanding of the dynamics of such a system is important for our comprehension of the science of biological tissue. In many biological applications, there is an additional complication due to an internal muscle acting on the material and deforming it. In this case, the effect of the muscle stress should be combined with the dynamics of the elastic matrix (we call it 'solid' for briefness in this article) and of the fluid permeating the matrix. Finally, an essential feature of many biological materials is the large percentage of water in the elastic matrix itself, leading to virtual incompressibility of the elastic material. This paper addresses these challenges using a variational approach to the motion of active porous media.
It is useful to start with a short review of earlier works in poromechanics. Due to the large amount of work in the area, our description must necessarily be brief and only focus on the works essential to this discussion.
The earlier developments in the field of poromechanics are due to K. von Terzaghi \cite{Te1943} and M. Biot \cite{biot1941general,biot1955theory,biot1957elastic} in the consolidation of porous media, and subsequent works by M. Biot which derived the time-dependent equations of motion for poromechanics, based on certain assumptions on the media. M. Biot also considered the wave propagation in both low and high wavenumber regime \cite{biot1962mechanics,biot1962generalized,biot1963theory,biot1972theory}. The amount of recent work in the field of porous media is vast, both in the field of model development \cite{joseph1982nonlinear,detournay1993fundamentals,dell1998micro,brovko2007continuum,carcione2010computational,grillo2014darcy} and their subsequent mathematical analysis \cite{showalter2000diffusion,bociu2016analysis,bastide2018penalization}. We refer the reader interested in the history of the field to the review \cite{rajagopal2007hierarchy} for a more detailed exposition of the literature.
Biot's work still remains highly influential today, especially in the field of acoustic propagation of waves through porous media. However, subsequent careful investigations have revealed difficulties in the interpretation of various terms through the general principles of mechanics, such as material objectivity, frequency-dependent permeability and changes of porosity in the model, as well as the need to describe large deformations of the model \cite{wilmanski2006few}. Based on this criticism, \cite{wilmanski2006few}
develops an alternative approach to saturated porous media equations which does not have the limitations of the Biot's model. Alternatively, \cite{ChMo2010,ChMo2014} develop equations for saturated porous media based on the general thermodynamics principles of mechanics.
The mainstream approach to the porous media has been to treat the dynamics as being friction-dominated by dropping the inertial terms from the equations. The seminal book of Coussy \cite{coussy1995mechanics} contains a lot of background information and analysis on that approach. For more recent work, we will refer the reader to, for example, the studies of multi-component porous media flow \cite{seguin2019multi},
as well as the gradient approach to the thermo-poro-visco-elastic processes \cite{both2019gradient}. Our work, in contrast, is dedicated to the development of modes using variational principles of mechanics, which is a sub-field of all the approaches to porous media. The equations we will derive here, without the viscous terms, will be of an infinite-dimensional Hamiltonian type and approximate the inertia terms and large deformations consistently. On the other hand, the friction-dominated approach gives equations of motion that are of gradient flow type. \revision{R1Q1}{However, these approaches are not mutually exclusive, as we demonstrate in Sec.~\ref{sec:previous_models}, and in particular in Sec.~\ref{sec:PME}}.
Fluid-filled elastic porous media, by its very nature, is a highly complex object involving both the individual dynamics of the fluid and the media and highly nontrivial interactions between them. It is not realistic to assume complete knowledge of the micro-structured geometry of pores in the elastic matrix and the details of fluid motion inside the pores. Hence, models of porous media must include interactions between the macroscopic dynamics and an accurate, and yet treatable, description of \emph{relevant aspects} of the micro-structures. Because of the large variations of the geometry and dynamics of micro-structures between different porous media (e.g. biological materials vs geophysical applications), the task of deriving a detailed, unified theory of porous media suitable for all applications is most likely not possible. However, once a detailed set of assumptions is provided and their limitation is understood, deriving a consistent theory is possible. In such a framework, we believe, the variational theory is advantageous since it can develop a consistent mathematical model satisfying the physical assumptions on the system.
Variational methods are developed by first describing the Lagrangian of the system on an appropriate configuration manifold, and then computing the critical curves of the associated action functional to obtain the equations of motion in a systematic way. The advantage of the variational methods is their consistency, as opposed to approaches based on balancing the conservation laws for a given point, or volume, of fluid. In a highly complex system like poromechanics, primarily when written in the non-inertial Lagrangian frame associated with the matrix, writing out all the forces and torques to obtain correct equations is very difficult. In contrast, the equations of motion follow from variational methods automatically, and the conservation laws are obtained in a general setting, \emph{i.e.} for arbitrary Lagrangians, as long as necessary symmetry arguments are satisfied.
One of the earliest papers in the field of variational methods applied to the porous media was \cite{bedford1979variational} where the kinetic energy of microscopic expansion was incorporated into the Lagrangian to obtain the equations of motion. In that work, several Lagrange multipliers were introduced to enforce the continuity equation for both solid and fluid.
The works
\cite{aulisa2007variational,aulisa2010geometric} use variational principles for explanation of the Darcy-Forchheimer law. Furthermore,
\cite{lopatnikov2004macroscopic,lopatnikov2010poroelasticity} derive the equations of porous media using additional terms in the Lagrangian coming from the kinetic energy of the microscopic fluctuations.
Of particular interest to us are the works on the Variational Macroscopic Theory of Porous Media (VMTPM) which was formulated in its present form in
\cite{dell2000variational,sciarra2008variational,madeo2008variational,dell2009boundary,serpieri2011formulation,serpieri2015variationally,serpieri2016general,auffray2015analytical,serpieri2016variational,travascio2017analysis}, also summarized in a recent book \cite{serpieri2017variational}. In these works, the microscopic dynamics of capillary pores is modelled by a second-grade material, where the internal energy of the fluid depends on both the deformation gradient of the elastic media and the gradients of local fluid content. The study of a pre-stressed system using variational principles and subsequent study of the propagation of sound waves was undertaken in \cite{placidi2008variational}.
One of the main assumptions of the VMTPM is the dependence of the internal energy of the fluid on the quantity measuring the micro-strain of the fluid, or, alternatively, the fluid content or local density of the fluid, including, in some works, the gradients of that quantity. This assumption is physically relevant for compressible fluid, but, in our view, for an incompressible fluid (which, undoubtedly, is a mathematical abstraction), such dependence is difficult to interpret. For example, for geophysical applications, fluids are usually considered compressible because of the high pressures involved. In the biological applications like the dynamics of highly porous sponges in the water we are interested in, the compressibility effects of the water, and, as we shall discuss here, of the sponge itself, can be neglected. For a truly incompressible fluid, it is difficult to assign physical meaning to the dependence of internal energy of the fluid on the parameters of the porous media. The paper \cite{wilmanski2006few} points out the difficulties of developing the true variational principle for Biot's model because of the difficulty of interpreting the fluid content through a variational principle.
\rem{
by stating in the Conclusions:
\\
\emph{It seems to be also clear that it is a waste of effort to try to construct a true variational principle as the Biot model contains a nonequilibrium variable, the increment of fluid contents which rules out the existence of such a principle.}
\\
}
This difficulty in the interpretation of the fluid content was explained in \cite{FaFGBPu2020}, in terms of the fluid content being a constraint in the fluid incompressibility, and the fluid pressure being a Lagrange multiplier related to the incompressibility. Interestingly, Biot model for acoustic wave propagation in porous media was developed in that paper as the linearized case of wave propagation for certain Lagrangians.
In this paper, we go one step beyond the initial variational approach developed in \cite{FaFGBPu2020} and show that the additional complexity of matrix incompressibility for biologically relevant materials can be treated similarly, as the solid's incompressibility constraint introduces another Lagrange multiplier related to the pressure inside the solid. Mathematically, we base our methods on the classical Arnold's description of incompressible fluid \cite{arnold1966geometrie} as geodesic motion on the group of volume-preserving diffeomorphisms of the fluid domain, in the absence of external forces. In Arnold's theory, the Lagrangian is simply the kinetic energy, as the potential energy of the fluid is absent, and the fluid pressure enters the equations from the incompressibility condition. This paper continues the initial derivation of \cite{FaFGBPu2020}, and achieves new results in the following directions:
\begin{enumerate}
\item We introduce incompressibility of both the fluid and the elastic matrix in the variational approach.
\item We also include the actions of the muscle by using a variational approach and show that the application of the muscle and its effect on the boundaries follows from a modified Lagrange-d'Alembert principle.
\item We show an exact reduction of the model for one-dimensional motion and derive integrals of motion, such as the net momenta and, in the case of double incompressibility, an affine relationship between the Lagrangian variables of the fluid and the solid.
\item We perform numerical simulations of the resulting reduced one-dimensional equations for incompressible fluid, for both compressible and incompressible matrix. We illustrate the difference between these cases and show the possibility of self-propulsion of the porous matrix (solid) while preserving the net-zero momentum of the fluid and solid.
\end{enumerate}
It is also useful to have a short discussion on the choice of coordinates and physics of what is commonly considered the saturated porous media. In most, if not all, previous works, the saturated porous media is a combined object consisting of an (elastic) dense matrix, and a network of small connected pores filled with fluid. The fluid encounters substantial resistance when moving through the pores due to viscosity and the no-slip condition on the boundary. In such a formulation, it is easier to consider the motion of the porous matrix to be 'primary', and the fluid motion to be computed relative to the porous matrix coordinates. Because the motion of the elastic matrix is 'primary', the equations are written in the system of coordinates consistent with the description of the elastic media, which is the material frame associated with the media. In this paper, we take an alternative view where we choose the same coordinate system of the stationary observer (Eulerian frame) for the description of both the fluid and the elastic media. Such a coordinate system is more frequently used in the classical fluid description but is less common in the description of elastic media. Ironically, the Eulerian frame is also frequently used in the description of wave propagation in the media, in particular, classical Biot's theory \cite{biot1962mechanics,biot1962generalized,biot1963theory,biot1972theory}.
Physically, our description is more relevant for the case of a porous media consisting of a dense network of elastic 'threads' positioned inside the fluid, which is a case that has not been considered before apart from \cite{FaFGBPu2020}. It is worth noting that the combined Eulerian description that we use in this paper is also applicable to the traditional porous media with a 'dense' matrix, and is also well suited for the description of wave propagation in such media as shown in \cite{FaFGBPu2020} comparing the results of variational models with that of Biot.
We shall also point out that our theory can be reformulated and is applicable for the familiar choice of the Lagrangian material description of the elastic porous matrix. These descriptions are completely equivalent from the mathematical point of view, and this is rigorously justified by using the process of Lagrangian reduction by symmetry in continuum mechanics \cite{GBMaRa12}.
\section{Equations of motion for porous media in spatial coordinates}
\label{sec:3D_eqs}
In this section, we derive the equations of motion for a porous medium filled with an incompressible fluid, for the case of a solid elastic matrix, by using a variational formulation deduced from Hamilton's principle. For both the fluid and the elastic matrix, we shall follow the differential geometric description outlined in the book by Marsden and Hughes \cite{marsden1994mathematical}, where the reader can find the background and fill in technical details of the description of each media. This derivation closely follows the approach developed in \cite{FaFGBPu2020} to which the reader is referred for technical details. This derivation is presented here, first, to make this paper self-consistent, and second, in order to introduce the definitions of the variables. We start with some necessary background information on the description of the combined dynamics of the elastic media and fluid that is contained in it.
\subsection{Definition of variables}
\paragraph{Configuration of the elastic body and the fluid.} The motion of the elastic body (indexed by $s$) and the fluid (indexed by $f$) is defined by two time dependent maps $\boldsymbol{\Psi}(t,\_\,): \mathcal{B} _s \rightarrow \mathbb{R} ^3 $ and $\boldsymbol{\varphi}(t,\_\,): \mathcal{B} _f \rightarrow \mathbb{R} ^3$ with variables denoted as
\[
{\mathbf {x} }=\boldsymbol{\Psi}(t,\boldsymbol{X}) \quad\text{and}\quad {\mathbf {x} }=\boldsymbol{\varphi}(t,\boldsymbol{Y})\,.
\]
Here $ \mathcal{B} _s$ and $ \mathcal{B} _f$ denote the reference configurations containing the elastic and fluid labels $\boldsymbol{X}$ and $\boldsymbol{Y}$.
We assume that there is no fusion of either fluid or elastic body particles, so the map $\boldsymbol{\Psi}$ and $\boldsymbol{\varphi}$ are embeddings for all times $t$, defining uniquely the \textit{back-to-labels maps} $\boldsymbol{X}=\boldsymbol{\Psi}^{-1}(t,{\mathbf {x} })$ and
$\boldsymbol{Y}=\boldsymbol{\varphi}^{-1}(t,{\mathbf {x} })$.
We also assume, for now, that the fluid cannot escape the porous medium
or create voids, so at all times $t$, the domains occupied in space by the fluid ${\mathcal B}_{t,f}=\boldsymbol{\varphi}(t,\mathcal{B})$ and the elastic body ${\mathcal B}_{t,s}=\boldsymbol{\Psi}(t,\mathcal{B})$ coincide:
${\mathcal B}_{t,f}={\mathcal B}_{t,s}={\mathcal B}_{t}$. Finally, we shall assume for simplicity that the domain ${\mathcal B}_t$ does not change with time, and will simply call it ${\mathcal B}$, hence both $\boldsymbol{\varphi}: \mathcal{B} _f \rightarrow \mathcal{B} $ and $\boldsymbol{\Psi}: \mathcal{B} _s \rightarrow \mathcal{B}$ are diffeomorphisms for all time $t$. An extension to the case of the fluid escaping the boundary is possible, although it will require appropriate modifications in the variational principle and we shall not consider it in general for now, but only in a specific case later.
\paragraph{Velocities of the elastic body and the fluid.}
The fluid velocity $\boldsymbol{u}_f$ and elastic solid velocity $\boldsymbol{u}_s$, measured relative to the fixed coordinate system, \emph{i.e.}, in the Eulerian representation, are given as usual by
\begin{equation}
\boldsymbol{u}_f(t,{\mathbf {x} })=\partial_t \boldsymbol{\varphi} \big(t, \boldsymbol{\varphi}^{-1}(t,{\mathbf {x} })\big) \, , \quad \boldsymbol{u}_s(t,{\mathbf {x} })=\partial_t \boldsymbol{\Psi} \big(t, \boldsymbol{\Psi}^{-1}(t,{\mathbf {x} })\big) \, ,
\label{vel_def}
\end{equation}
for all ${\mathbf {x} } \in \mathcal{B}$. Note that since $\boldsymbol{\varphi}$ and $\boldsymbol{\Psi}$ restrict to the boundaries, the vector fields $\boldsymbol{u}_f$ and $\boldsymbol{u}_s$ are tangent to the boundary, \emph{i.e.},
\begin{equation} \label{free_slip}
\boldsymbol{u}_f\cdot\boldsymbol{n}=0\, , \quad \boldsymbol{u}_s\cdot\boldsymbol{n}=0 \, ,
\end{equation}
where $\boldsymbol{n}$ is the unit normal vector field to the boundary. One can alternatively impose that $\boldsymbol{\varphi}$ and $\boldsymbol{\Psi}$ (or only $\boldsymbol{\Psi}$) are prescribed on the boundary. In this case, one gets no-slip boundary conditions
\begin{equation} \label{no_slip}
\boldsymbol{u}_f|_{ \partial \mathcal{B} }=0\, , \quad \boldsymbol{u}_s|_{ \partial \mathcal{B} }=0 \, , \quad \text{(or only $ \boldsymbol{u}_s|_{ \partial \mathcal{B} }=0$)}.
\end{equation}
\paragraph{Elastic deformations of the dry media.}
In order to incorporate the description of the elastic deformations of the media in the potential energy, we consider the deformation gradient of $\boldsymbol{\Psi}$ denoted
\begin{equation}
\mathbb{F}(t,\boldsymbol{X})=\nabla\boldsymbol{\Psi}(t,\boldsymbol{X})\, ,
\label{F_def}
\end{equation}
where $ \nabla \boldsymbol{\Psi}$ denotes the derivative with respect to $\boldsymbol{X}$.
In the spatial frame, we consider the Finger deformation tensor $b(t,{\mathbf {x} })$ defined by
\begin{equation}
b(t,{\mathbf {x} })=\mathbb{F}(t,\boldsymbol{X})\, \mathbb{F}(t,\boldsymbol{X}) ^\mathsf{T}\,,
\label{b_def}
\end{equation}
where ${\mathbf {x} }= \boldsymbol{\Psi}(t,\boldsymbol{X})$, see the paragraph below for the intrinsic geometric definition of $b$. In coordinates, we have
\[
\mathbb{F}^i_A= \frac{\partial\boldsymbol{\Psi}^i}{\partial X^A}\,,\qquad b^{ij}= \frac{\partial\boldsymbol{\Psi}^i}{\partial X^A}\frac{\partial\boldsymbol{\Psi}^j}{\partial X^A}\,,
\]
with the summation over the material index $A$ is assumed.
From its definition \eqref{b_def}, the Finger deformation tensor $b$ is a symmetric 2-contravariant tensor field and satisfies the advection equation
\begin{equation}
\label{intrinsic_def_b}
\partial_t b + \pounds_{\boldsymbol{u}_s} b=0 \, ,
\end{equation}
where $\pounds_{\boldsymbol{u}_s}$ is the Lie derivative of the corresponding tensor quantity. In coordinates, that Lie derivative is computed as
\begin{equation}\label{Lie_der_b}
(\pounds_{\boldsymbol{u}_s}b)^{ij}= \frac{\partial b^{ij}}{\partial x^k} u_s^k - b^{kj}\frac{\partial u_s^i }{\partial x^k} - b^{ik}\frac{\partial u_s^j }{\partial x^k}\,.
\end{equation}
In general the deformation of an elastic media \emph{without fluid} leads to $b \neq \,\mathrm{Id}\,$ (the unit tensor). The potential energy $V$ of deformation of the dry media thus depends on $b$. However, in our case, there is another part that leads to the elastic potential energy, namely, the microscopic deformations of the pores that we shall describe below.
\paragraph{Microscopic variables, pore size and free volume.}
Out of many microscopic variables presented in the solid, the geometric shape of pores, and their connectivity are most important for computing the volume occupied by the fluid. In this paper, just like in \cite{FaFGBPu2020}, as well as several papers before us \cite{placidi2008variational,serpieri2016variational,serpieri2017variational} and others, the internal 'microscopic' volume of the pores is chosen as an important variable affecting the potential energy of the solid.
This choice is true for the case when the pores' geometry will be roughly similar throughout the material. The model will need to be corrected when there is a drastic change of pores' geometry (e.g. from roughly spherical to elliptical pores, for merging of pores \emph{etc}). For now, we consider that the locally averaged internal volume of the pores is represented by the local variable $v(t, {\mathbf {x} })$ in the Eulerian description. Its Lagrangian counterpart is $\mathcal{V}(t,\boldsymbol{X}) = v(t,\boldsymbol{\Psi}(t,\boldsymbol{X}))$. Since we are concentrating on the Eulerian description, we will focus on $v(t, {\mathbf {x} })$. Thus, in our model, the elastic energy of the solid will depend on the Finger deformation tensor $b$ and the infinitesimal pore volume $v$. Physically, this assumption is equivalent to stating that the internal volume variable $v$ will encompass all the effects of microscopic deformations on the elastic energy.
Let us now consider the volume occupied by the fluid in a given spatial domain. We assume that the fluid fills the pores completely, so the volume occupied by the fluid in any given spatial domain is equal to the net volume of pores in that volume. Let us take the infinitesimal Eulerian volume $\mbox{d}^3 {\mathbf {x} }$ and define the pore volume fraction $g(t,{\mathbf {x} })$, so that the volume of fluid is given by $g(t,{\mathbf {x} })\mbox{d}^3 {\mathbf {x} }$. Then, one must take into account the available volume to the fluid, namely, the local concentration of pores $c(t,{\mathbf {x} })$ and the infinitesimal pore volume $v(t,{\mathbf {x} })$.
The total volume of pores is written in the spatial description as:
\begin{equation}
g(t,{\mathbf {x} }) = c(b(t,{\mathbf {x} })) v(t,{\mathbf {x} }) \, .
\label{g_c_v_constraint}
\end{equation}
If, for example, the pores are ``frozen" in the material, they simply move as the material moves. Then, the change of the local concentrations of pores $c(t,{\mathbf {x} })$ due to deformations is given by
\begin{equation}\label{change_c}
c\big(t,\boldsymbol{\Psi}(t,\boldsymbol{X})\big) J_{\boldsymbol{\Psi}}(t,\boldsymbol{X}) = c_0(\boldsymbol{X})\,, \quad J_{\boldsymbol{\Psi}}= |{\rm det} ( \nabla \boldsymbol{\Psi})| = | {\rm det}(\mathbb{F})|\,,
\end{equation}
where $c_0(\boldsymbol{X})$ is the initial concentration of pores in the Lagrangian point $\boldsymbol{X}$. Using the definition \eqref{b_def} of the Finger tensor $b$ gives ${\rm det} \,b(t,{\mathbf {x} }) = |{\rm det} \,\mathbb{F}(t,\boldsymbol{X}_s)|^2$, hence we can rewrite the previous relation as
\[
c(t,{\mathbf {x} })\sqrt{{\rm det} \,b(t,{\mathbf {x} }) } = c_0(\boldsymbol{X}).
\]
In the case of an initially uniform porous media, \emph{i.e.}, $c_0=$ const, this formula shows that the concentration $c(t,{\mathbf {x} })$ is a function of the value $b(t,{\mathbf {x} })$ of the Finger deformation tensor
\begin{equation}
c(b)=\frac{c_0}{\sqrt{{\rm det}b}} \, .
\label{c_b_particular_neq}
\end{equation}
Note that from \eqref{change_c}, the concentration of pores satisfies
\[
\partial_t c+ \operatorname{div}(c\boldsymbol{u}_s)=0\,.
\]
\paragraph{Conservation law for the fluid.}
In what follows, we will consider an incompressible fluid. The density of the fluid itself is denoted as $\bar\rho_f^0=$ const. We can thus discuss the conservation of the volume of fluid rather than the mass. Let us now look at the volume of fluid $g(t,{\mathbf {x} }) \mbox{d}^3 {\mathbf {x} }$ from a different point of view. The fluid must fill all the available volume completely, and it must have come from the initial point $\boldsymbol{Y}=\boldsymbol{\varphi}^{-1}(t,{\mathbf {x} })$. If the initial volume fraction at that point was $g_0(\boldsymbol{Y}) \mbox{d}^3 \boldsymbol{Y}$, then at a point $t$ in time we have
\begin{equation}
g(t,{\mathbf {x} }) = g_0 \big(\boldsymbol{\varphi}^{-1}(t,{\mathbf {x} })\big)J_{\boldsymbol{\varphi}^{-1}}(t,{\mathbf {x} }) \, , \quad
J_{\boldsymbol{\varphi}^{-1}} := {\rm det} \big(\nabla \boldsymbol{\varphi}^{-1}\big) \, .
\label{cons_law_fluid}
\end{equation}
Differentiating \eqref{cons_law_fluid}, we obtain the conservation law for $g(t,{\mathbf {x} })$ written as
\begin{equation}
\partial_t g + \operatorname{div} ( g\,\mathbf{u}_f ) =0 \, .
\label{g_cons}
\end{equation}
The mass of the fluid in the given volume is $\bar\rho_f^0 g \mbox{d}^3 {\mathbf {x} }$.
Note that the incompressibility condition of the fluid \emph{does not} mean that $\operatorname{div}\boldsymbol{u}_f=0$. That statement is only true for the case where no elastic matrix is present, \emph{i.e.}, for pure fluid. In the porous media case, a given spatial volume contains both fluid and elastic parts. The conservation of volume available to the fluid is thus given by \eqref{g_cons}.
\paragraph{Conservation law for the elastic body.} The mass density of the elastic body, denoted $\rho_s$, satisfies an equation analogous to \eqref{cons_law_fluid}, namely,
\begin{equation}
\rho_s(t,{\mathbf {x} }) = \rho_s^0\big(\boldsymbol{\Psi}^{-1}(t,{\mathbf {x} })\big)J_{\boldsymbol{\Psi}^{-1}}(t,{\mathbf {x} }) \, ,
\label{cons_law_elastic}
\end{equation}
where $\rho_s^0(\boldsymbol{X})$ is the mass density in the reference configuration. The corresponding differentiated form is
\begin{equation}
\partial_t \rho_s + \operatorname{div} ( \rho_s \mathbf{u}_s ) =0 \, .
\label{rho_s_cons}
\end{equation}
\subsection{The Lagrangian function and the variational principle in spatial variables}
\paragraph{Lagrangian.} For classical elastic bodies, the potential energy in the spatial description depends on the Finger deformation tensor $b$, \emph{i.e.}, $V=V(b)$. As we discussed above, in the porous media case, we consider the potential energy to depend on $b$ and $v$, and we write $V=V(b,v)$. Then,
the Lagrangian of the porous medium is the sum of the kinetic energies of the fluid and elastic body minus the potential energy of the elastic deformations:
\begin{equation}
\ell(\boldsymbol{u}_f,\boldsymbol{u}_s, \rho_s,b,g,v)= \int_{\mathcal{B}}
\left[\frac{1}{2} \bar\rho_f ^0 g |\boldsymbol{u}_f|^2 + \frac{1}{2} \rho_s |\boldsymbol{u}_s|^2 -V(b,v)\right]{\rm d}^3{\mathbf {x} } \,.
\label{Lagr_def}
\end{equation}
Note that the expression \eqref{Lagr_def} explicitly separates the contribution from the fluid and the elastic body in simple physically understandable terms. The interaction between the fluid and the media comes from the critical action principle involving the incompressibility of the fluid. We shall derive the equations of motion for an arbitrary (sufficiently smooth) expression for $\ell(\boldsymbol{u}_s,\boldsymbol{u}_f, \rho_s,b,g,v)$, and will use
the physical Lagrangian \eqref{Lagr_def} for all computations in the paper.
\paragraph{Variational principle and incompressibility constraint.}
Condition \eqref{g_c_v_constraint} represents a scalar constraint for every point of an infinite-dimensional system. Formally, such constraint can be treated in terms of Lagrange multipliers. The application of the method of Lagrange multipliers for an infinite-dimensional system is quite challenging, see the recent review papers \cite{dell2018lagrange,bersani2019lagrange}. In terms of classical fluid flow, in the framework of Euler equations, the variational theory introducing incompressibility constraint has been developed by V. I. Arnold \cite{arnold1966geometrie} on diffeomorphism groups, with the Lagrange multiplier for incompressibility related to the pressure in the fluid. We will follow in the footsteps of Arnold's method and introduce a Lagrange multiplier for the incompressibility condition \eqref{g_c_v_constraint}. By analogy with Arnold, we will also treat this Lagrange multiplier as related to pressure, as it has the same dimensions, and denote it $p$. Since \eqref{g_c_v_constraint} refers to the fluid content, the Lagrange multiplier $p$ relates to the fluid pressure. The equations of motion \eqref{eq_gen}, connecting pressure with the derivatives of the potential energy with respect to the pores' volume, will further justify this below. Note that $p$ may be different from the actual physical pressure in the fluid depending on the implementation of the model. From the Lagrangian \eqref{Lagr_def} and the constraint \eqref{g_c_v_constraint}, we define the action functional in the Eulerian description as
\begin{equation}
S= \int_0^T\left[ \ell(\boldsymbol{u}_f,\boldsymbol{u}_s, \rho_s,b,g,v) - \int_{{\cal B}} p\big( g- c(b) v\big) \mbox{d}^3 {\mathbf {x} }\right] \mbox{d} t \,.
\label{action_p}
\end{equation}
The equations of motion are obtained by computing the critical points of $S$ with respect to constrained variations of the Eulerian variables induced by free variations of the Lagrangian variables.
Indeed, it is in the Lagrangian description that the variational principle is justified, as being given by the Hamilton principle with constraint.
\revision{R3Q2}{This is one of the most important technical differences of our work with the previous work in the field, as all variations are obtained explicitly in the Eulerian frame, and all equations are therefore in Eulerian frame as well.}
The constrained variations of the Eulerian variables induced by the free variations $\delta\boldsymbol{\Psi}$, $\delta\boldsymbol{\varphi}$ vanishing at $t=0,T$ are computed as
\begin{equation}
\begin{aligned}
\delta \boldsymbol{u}_f &= \partial_t \boldsymbol{\eta}_{f} + \boldsymbol{u}_f \cdot \nabla\boldsymbol{\eta}_f -
\boldsymbol{\eta}_f \cdot \nabla \boldsymbol{u}_f \\
\delta \boldsymbol{u}_s &= \partial_t \boldsymbol{\eta}_{s} + \boldsymbol{u}_s \cdot \nabla\boldsymbol{\eta}_s -
\boldsymbol{\eta}_s \cdot \nabla\boldsymbol{u}_s \\
\delta g&= - \operatorname{div}(g\boldsymbol{\eta}_f) \\
\delta\rho_s&= - \operatorname{div}(\rho_s\boldsymbol{\eta}_s) \\
\delta b &= - \pounds_{\boldsymbol{\eta}_s}b \, ,
\label{g_rhos_b_var}
\end{aligned}
\end{equation}
where $\boldsymbol{\eta}_{f}$ and $\boldsymbol{\eta}_{s}$ are defined
\begin{equation}
\boldsymbol{\eta}_{f}=\delta \boldsymbol{\varphi} \circ \boldsymbol{\varphi}^{-1} \, , \quad
\boldsymbol{\eta}_{s}=\delta \boldsymbol{\Psi} \circ \boldsymbol{\Psi}^{-1} \, .
\label{eta_def}
\end{equation}
The variations $\delta v$ and $\delta p$ are arbitrary.
In the case of the boundary conditions \eqref{free_slip} it follows from \eqref{eta_def} that $\boldsymbol{\eta}_{f}$ and $\boldsymbol{\eta}_{s}$ are arbitrary time dependent vector fields vanishing at $t=0,T$ and tangent to the boundary $\partial\mathcal{B}$:
\begin{equation}
\label{non-permeable}
\boldsymbol{\eta}_s\cdot\boldsymbol{n}=0\, , \quad \boldsymbol{\eta}_f\cdot\boldsymbol{n}=0 \, .
\end{equation}
In the case of no-slip boundary conditions \eqref{no_slip}, we have
\begin{equation}
\label{no_slip_var}
\boldsymbol{\eta}_f|_{ \partial \mathcal{B} }=0\, , \quad \boldsymbol{\eta}_s|_{ \partial \mathcal{B} }=0 \, , \quad \text{(or only $\boldsymbol{\eta}_s|_{ \partial \mathcal{B} }=0$)}.
\end{equation}
\paragraph{Incorporation of external and friction forces.} Frictions forces, or any other forces, acting on the fluid $\boldsymbol{F}_f$ and the media $\boldsymbol{F}_s$ can be incorporated into the variational formulation by using the Lagrange-d'Alembert principle for external forces. This principle reads
\begin{equation}
\delta S+ \int_0^T\!\!\int_{{\cal B}}\left( \boldsymbol{F}_f \cdot \boldsymbol{\eta}_f + \boldsymbol{F}_s \cdot \boldsymbol{\eta}_s \right) \mbox{d}^3{\mathbf {x} } \, \mbox{d} t =0 \, , \quad
\label{Crit_action}
\end{equation}
where $S$ is defined in \eqref{action_p} and the variations are given by \eqref{g_rhos_b_var}.
Such friction forces are usually postulated from general physical considerations. If these forces are due exclusively to friction, the forces acting on the fluid and media at any given point must be equal and opposite, \emph{i.e.} $\boldsymbol{F}_f=-\boldsymbol{F}_s$, in the Eulerian treatment we consider here. For example, for porous media, it is common to posit the friction law
\begin{equation}
\boldsymbol{F}_f = - \boldsymbol{F}_s= \mathbb{K} (\boldsymbol{u}_s - \boldsymbol{u}_f)\,,
\label{Darcy_law}
\end{equation}
with $\mathbb{K}$ being a positive definite matrix potentially dependent on material parameters and variables representing the media. In particular, the matrix $\mathbb{K}$ depends on the local porosity, composition of the porous media, deformation and other variables. The general functional form of dependence of $\mathbb{K}$ on the variables should be of the form $\mathbb{K}=\mathbb{K}(b,g)$.
For example, when deformations of porous media are neglected, \emph{i.e.}, assuming an isotropic and a non-moving porous matrix with $b={\rm Id}$, Kozeny-Carman equation is often used, which in our notation is written in the form $\mathbb{K} = \kappa g^3/(1-g)^2$, with $\kappa$ being a constant, see \cite{costa2006permeability} for discussion.
In general, the derivation of the dependence of tensor $\mathbb{K}$ on variables $g$ and $b$ from the first principles is difficult, and should presumably be obtained from experimental observations.
\subsection{Equation of motion}\label{equ_motion}
\paragraph{General form of the equations of motion.} In order to derive the equations of motion, we take the variations in the Lagrange-d'Alembert principle \eqref{Crit_action} as
\begin{equation}
\label{Crit_action_explicit}
\begin{aligned}
\delta S+ &\int_0^T\!\!\int_{{\cal B}} \left( \boldsymbol{F}_f \cdot \boldsymbol{\eta}_f + \boldsymbol{F}_s \cdot \boldsymbol{\eta}_s \right) \mbox{d}^3{\mathbf {x} }\, \mbox{d} t
\\
=& \int_0^T\!\!\int_{{\cal B}} \left[ \dede{\ell}{\boldsymbol{u}_f} \cdot \delta \boldsymbol{u}_f + \dede{\ell}{\boldsymbol{u}_s} \cdot \delta \boldsymbol{u}_s + \dede{\ell}{\rho_s} \delta \rho_s + \left( \dede{\ell}{b}+ pv \pp{c}{b} \right) :\delta b \right. \\
& \qquad\quad + \left( \dede{\ell}{g} - p\right) \delta g + \left( \dede{\ell}{v} + p c(b)\right) \delta v+ \big(g-c(b) v\big) \delta p \\
&\qquad \left. \phantom{ \frac{\delta }{\delta }} +\boldsymbol{F}_f \cdot \boldsymbol{\eta}_f + \boldsymbol{F}_s \cdot \boldsymbol{\eta}_s \right] \mbox{d}^3 {\mathbf {x} } \, \mbox{d} t=0 \,.
\end{aligned}
\end{equation}
The symbol $``:"$ denotes the contraction of tensors on both indices. Substituting the expressions for variations \eqref{g_rhos_b_var}, integrating by parts to isolate the quantities $\boldsymbol{\eta}_f$ and $\boldsymbol{\eta}_s$, and dropping the boundary terms leads to the expressions for the balance of the linear momentum for the fluid and porous medium, respectively, written in the Eulerian frame. This calculation is tedious yet straightforward for most terms and we omit it here.
For compactness of notation, we denote the contribution of the Finger tensor $b$ in the elastic momentum equation with the \emph{diamond} operator
\begin{equation}\label{diamond_coord}
(\Pi\diamond b)_k= - \Pi_{ij} \pp{b^{ij}}{x^k} - 2 \pp{}{x^i} \left( \Pi_{k j}b^{ij} \right)
\end{equation}
whose coordinate-free form reads
\begin{equation}
\Pi \diamond b = - \Pi : \nabla b - 2 \operatorname{div} \left( \Pi \cdot b \right) \,.
\label{diamond_coord_free}
\end{equation}
\rem{
\begin{equation}\label{boundary_b}
\int_ \mathcal{B} \Pi : \delta b= \int _ \mathcal{B} ( \Pi \diamond b) \cdot \boldsymbol{\eta} \,{\rm d} ^3 {\mathbf {x} } + 2 \int_{ \partial \mathcal{B} } [ (\Pi \cdot b ) \cdot \mathbf{n} ] \cdot \boldsymbol{\eta} \, {\rm d} s.
\end{equation}
}
The equations of motion also naturally involve the expression of the Lie derivative of a momentum density, whose global and local expressions are
\begin{equation}\label{Lie_der_momentum}
\begin{aligned}
\pounds_{\boldsymbol{u}}\boldsymbol{m} &= \boldsymbol{u} \cdot \nabla \boldsymbol{m} + \nabla\boldsymbol{u} ^\mathsf{T} \cdot \boldsymbol{m} + \boldsymbol{m} \operatorname{div}\boldsymbol{u}\\
(\pounds_{\boldsymbol{u}}\boldsymbol{m})_i&= \partial_j m_i u^j + m_j \partial_i u^j+ m_i \partial_j u^j\,.
\end{aligned}
\end{equation}
With these notations, the Lagrange-d'Alembert principle \eqref{Crit_action_explicit} yields the system of equations
\begin{equation}
\label{eq_gen}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\partial_t\frac{\delta \ell}{\delta \boldsymbol{u}_f}+ \pounds_{\boldsymbol{u}_f} \frac{\delta \ell}{\delta \boldsymbol{u}_f} = g \nabla \left( \frac{\delta {\ell}}{\delta g}- p\right)+\boldsymbol{F}_f\\
\displaystyle\vspace{0.2cm}\partial_t\frac{\delta\ell}{\delta \boldsymbol{u}_s}+ \pounds_{\boldsymbol{u}_s} \frac{\delta\ell}{\delta \boldsymbol{u}_s} = \rho_s\nabla \frac{\delta\ell}{\delta \rho_s} + \left(\frac{\delta\ell}{\delta b}+ p v\frac{\partial c}{\partial b}\right)\diamond b+ \boldsymbol{F}_s\\
\displaystyle\vspace{0.2cm} \frac{\delta\ell}{\delta v}= - pc(b)\,,\qquad g= c(b)v\\
\vspace{0.2cm}\partial_tg + \operatorname{div}(g\boldsymbol{u}_f)=0\,,\qquad\partial_t\rho_s+\operatorname{div}(\rho_s\boldsymbol{u}_s)=0\,,\qquad \partial_tb+ \pounds_{\boldsymbol{u}_s}b=0\,.
\end{array}\right.
\end{equation}
When the boundary conditions \eqref{no_slip} are used, no additional boundary condition arise from the variational principle. In the case of the free slip boundary condition \eqref{free_slip}, the variational principle yields the condition
\begin{equation}\label{BC_general}
[\sigma _p \cdot \boldsymbol{n} ] \cdot \boldsymbol{\eta} =0,\quad \text{for all $ \boldsymbol{\eta} $ parallel to $ \partial \mathcal{B} $},
\end{equation}
where
\begin{equation}\label{def_sigma_p}
\sigma _p := -2 \left( \frac{\delta\ell}{\delta b}+ p v\frac{\partial c}{\partial b} \right) \cdot b.
\end{equation}
Physically, the condition \eqref{BC_general} states that the force $ \mathbf{t}= \sigma _p \cdot \boldsymbol{n} $ exerted at the boundary must be normal to the boundary (free slip). With \eqref{def_sigma_p} and \eqref{diamond_coord_free}, the solid momentum equation can be written as
\begin{equation}\label{solid_momentum_rewritten}
\partial_t\frac{\delta\ell}{\delta \boldsymbol{u}_s}+ \pounds_{\boldsymbol{u}_s} \frac{\delta\ell}{\delta \boldsymbol{u}_s} = \rho_s\nabla \frac{\delta\ell}{\delta \rho_s} - \left(\frac{\delta\ell}{\delta b}+ p v\frac{\partial c}{\partial b}\right): \nabla b+ \operatorname{div} \sigma _p + \boldsymbol{F}_s.
\end{equation}
The first equation in \eqref{eq_gen} arises from the term proportional to $\boldsymbol{\eta}_f$ in the application of the Lagrange-d'Alembert principle. The second condition and the boundary condition \eqref{BC_general} arise from the term proportional to $\boldsymbol{\eta}_s$. The third and fourth equations arise from the variations $\delta v$ and $\delta p$.
The last three equations follow from the definitions \eqref{cons_law_fluid}, \eqref{cons_law_elastic}, \eqref{intrinsic_def_b}, respectively.
In the derivation of \eqref{eq_gen}, we have used the fact that on the boundary $\partial\mathcal{B}$, $\boldsymbol{\eta}_s$ and $\boldsymbol{\eta}_f$ satisfy the boundary condition \eqref{non-permeable}.
\begin{remark}[Discussion of the form of the Lagrangian]
{\rm
Equations \eqref{eq_gen} allow for an arbitrary form of the dependence of the Lagrangian on the variables. The derivatives of the Lagrangian with respect to the variables entering \eqref{eq_gen} should be considered to be variational derivatives. For example, if the integrand of the Lagrangian depends on both $\rho_s$ and its spatial derivatives $\nabla \rho_s$, \emph{e.g.}
\[
\ell = \int_{\mathcal{B}} \ell_0 ( \rho_s, \nabla \rho_s, \boldsymbol{u}_s, \ldots) \mbox{d} ^3 {\mathbf {x} }
\]
then
\[
\dede{\ell}{\rho_s}=\pp{\ell_0}{\rho_s}-\mbox{div}\, \pp{\ell_0}{\nabla \rho_s} \, ,
\]
and similarly with other variables such as $\boldsymbol{u}_s$, $\boldsymbol{\rho}_f$, $v$ \emph{etc}.
Thus, equations \eqref{eq_gen} are capable of incorporating very general physical models of the porous media. However, it is important to note that in our model, we do not assume that the energy of the fluid depends on any kind of strain measure of the solid or the fluid. These energy considerations only refer to the fluid; the energy of the solid, of course, depends on $b$, the measure of strain of the solid.
The pressure $p$ in \eqref{eq_gen} is obtained purely from the action principle with the action \eqref{action_p}. In that sense, our paper follows the framework of fluid description due to Arnold \cite{arnold1966geometrie}. }
\end{remark}
\begin{remark}[On energy dissipation]
{\rm
In spatial coordinates, the forces applied to the fluid and solid must be equal and opposite, so $\boldsymbol{F}_f = - \boldsymbol{F}_s$. Under the appropriate boundary conditions, equations \eqref{eq_gen} dissipate energy. It can be shown that for arbitrary Lagrangian in \eqref{eq_gen}, we have
\begin{equation}
E=\int_{{\cal B}} \left[ \boldsymbol{u}_f \!\cdot\! \dede{\ell}{\boldsymbol{u}_f} +
\boldsymbol{u}_s\! \cdot\! \dede{\ell}{\boldsymbol{u}_s}
+
\dot v \dede{\ell}{\dot v} - \mathcal{L} \right] \mbox{d} ^3 {\mathbf {x} } \,
\Rightarrow \,
\dot E = \int_{\cal B} \boldsymbol{F}_s \cdot (\boldsymbol{u}_s - \boldsymbol{u}_f) \mbox{d} ^3 {\mathbf {x} } ,
\label{diss_energy}
\end{equation}
so $\dot E \leq 0$ for arbitrary Darcy-like friction $\boldsymbol{F}_s = \mathbb{K} (\boldsymbol{u}_f-\boldsymbol{u}_s)$, as long as the matrix $\mathbb{K}$ is positive definite.
}
\end{remark}
\paragraph{Specific form of the equations.}
For the Lagrangian defined in \eqref{Lagr_def}, using the third and fourth equations in \eqref{eq_gen}, the second term on the right hand side of \eqref{solid_momentum_rewritten} can be written as
\begin{align*}
- \left(\frac{\delta\ell}{\delta b}+ p v\frac{\partial c}{\partial b}\right): \nabla b&= \frac{\partial V}{\partial b}: \nabla b - pv \frac{\partial c}{\partial b}: \nabla b \\
&= \nabla \left( V - \frac{\partial V}{\partial v}v \right) + v \left( \nabla \frac{\partial V}{\partial v}- p \nabla c \right) \\
& =g\nabla p + \nabla \left( V - \frac{\partial V}{\partial v}v\right).
\end{align*}
Then, the equations of motion \eqref{eq_gen} become
\begin{equation}
\label{expressions_explicit}
\hspace{-3mm}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\bar\rho_f^0(\partial_t \boldsymbol{u}_f+ \boldsymbol{u}_f\cdot\nabla \boldsymbol{u}_f ) = - \nabla p + \frac{1}{g} \boldsymbol{F}_f\\
\displaystyle\vspace{0.2cm}\rho_s (\partial_t \boldsymbol{u}_s \!+\! \boldsymbol{u}_s\cdot\nabla \boldsymbol{u}_s) =g\nabla p \!+\! \nabla \left( V\! - \!\frac{\partial V}{\partial v}v\right) + \operatorname{div} \sigma _p + \boldsymbol{F}_s\\
\displaystyle\vspace{0.2cm} \frac{\partial V}{\partial v}= pc(b),\qquad g= c(b)v\\
\vspace{0.2cm}\partial_tg + \operatorname{div}(g\boldsymbol{u}_f)=0,\qquad \partial_t\rho_s+\operatorname{div}(\rho_s\boldsymbol{u}_s)=0,\qquad \partial_tb+ \pounds_{\boldsymbol{u}_s}b=0\,,
\end{array}\right.
\end{equation}
where the stress tensor $ \sigma _p $ defined in \eqref{def_sigma_p} becomes
\begin{equation}
\label{sigma_p}
\sigma_p= -2 \left( p v \frac{\partial c}{\partial b}\! -\! \frac{\partial V}{\partial b}\right)\cdot b\,, \qquad (\sigma_p)_k^i= -2 \left( p v \frac{\partial c}{\partial b^{kj}}\! -\! \frac{\partial V}{\partial b^{kj}}\right)b^{ij}\,,
\end{equation}
and with the boundary condition \eqref{BC_general}.
With \eqref{sigma_p}, the divergence term in the media momentum equation (second equation above) is the analogue of the divergence of the stress tensor for an ordinary elastic media. This term, however, contains the contribution from both the potential energy and the fluid pressure. In what follows, we are going to extend these equations to the case of doubly incompressible media (fluid and solid), and we will also introduce the muscle stress.
\revision{R1Q1}{
\paragraph{On the analysis of dimensionless parameters and relevant time scales.}
It is interesting to estimate the relative importance of the various terms appearing in the equations of motion. The easiest way to proceed is through the analysis of time scales. \\
Suppose $\mu_f$ is the dynamic viscosity of the fluid, and $d$ is the typical size of the pores. Then, it is natural to form the pore-based Reynolds number comparing the order of magnitude of inertia to viscous terms. Unlike the single fluid case, where this number would be defined as $R = \rho_f u_f d/\mu_f$, this number should incorporate the relative motion of the fluid and solid media to accurately account for friction in the media. So, a natural way to define the porous media Reynolds number would be something like
\begin{equation}
R_{\rm pm} = \frac{\rho_f |\boldsymbol{u}_f-\boldsymbol{u}_s| d}{\mu_f} = \frac{|\boldsymbol{u}_f-\boldsymbol{u}_s| d}{\nu_f}\, ,
\label{PM_R}
\end{equation}
where $\nu_f = \mu_f/\rho_f$ is the kinematic viscosity of the fluid.
Then, $R_{pm} \gg 1$ will define the fully inertial regime whereas $ R_{pm} \ll 1$ will correspond to the fully viscous regime. For a typical velocity difference $|\boldsymbol{u}_f-\boldsymbol{u}_s|\sim$1 mm/s, pore size $d \sim 1$mm, and the fluid being water, $R_{\rm pm} \sim 1$ so inertial and viscous terms are similar in order.
\\
Unfortunately, it is usually not easy to evaluate the typical scale of $|\boldsymbol{u}_f-\boldsymbol{u}_s|$, as they follow from the equations of motion. We shall thus develop an alternative approach by comparing the relevant time scales.
\\
Suppose at $t=0$ there is an instantaneous velocity field created in one of the media, solid or fluid. A typical time scale for velocity field to converge to its equilibrium value $\boldsymbol{u}_f \sim \boldsymbol{u}_s$ due to friction can be estimated as
\begin{equation}
T_{\rm fr} \simeq \frac{\rho_f d^2}{\mu_f}= \frac{d^2}{\nu_f}.
\label{T_friction}
\end{equation}
Taking $d=1$mm and the fluid being water with $\nu_f \sim 0.01$cm$^2$/s yields $T_{\rm fr} \sim$1 sec.
\\
A second time scale can be derived from considerations of sound propagation in the media. This estimate is useful as the sound waves come from the balance of the elastic and inertial terms in the equations. As is described in \cite{FaFGBPu2020}, typical sound velocity in the fluid-filled porous media can be taken to be of the order $c \sim \sqrt{E/\rho_s}$, with $E$ being elastic modulus, with several corrections due to the nature of porous media and fluid interactions. For cells-based materials, the typical value of elastic modulus is in the range of 100Pa to 100kPa \cite{demichelis2013study,vinckier1998measuring}. For biological tissues made mostly of water with $\rho_s \sim 1000$ kg/m$^3$, the typical sound velocity is then about $0.3 -30$m/s. For the purpose of estimate, if we take the sound speed as above, and the typical scale we are interested in is $L$, then the typical time scale is
\begin{equation}
T_{el}= \frac{L}{c} \sim L \sqrt{\frac{\rho_s}{E}}.
\label{T_sound}
\end{equation}
For a typical scale of interest $L \sim 10$cm=$0.1$m, the typical time scale of sound wave propagation from one side of the system to another is going to be from $0.01$s for harder materials, to $1$s for very soft materials. The relevance of inertia to viscous terms can thus be described by the dimensionless number
\begin{equation}
{\cal P} = \frac{T_{fr}}{T_{el}},
\label{inertia_number}
\end{equation}
with ${\cal P} \gg 1$ corresponding to the case when elastic wave takes many oscillations before dissipating due to friction. For typical biological materials and fluid being water as described above ${\cal P} \sim 1 -100$ and the inertia terms are thus important for considerations of biological materials.
}
\revision{EQ1\\R1Q4}{\subsection{Connection to previously derived models of porous media}
\label{sec:previous_models} }
\subsubsection{Static media filled with ideal gas and connection to the porous medium equation (PME)}
\label{sec:PME}
Let us consider a physical system that describes a polytropic flow of an ideal gas through a homogeneous static porous medium. For such a system, the kinetic and potential energies of the solid matrix are no longer relevant and we only have the terms describing the gas component. The state equation for pressure has the form
\begin{equation}
p = p_0 \rho^\gamma,
\end{equation} where $\gamma \ge 1$ is the polytropic exponent. The choice of the exponent could describe among others isentropic (adiabatic and reversible, $\gamma = \gamma_0 > 0$) and isothermal (with $\gamma = 1$) flows. To apply the variational geometric formulation to such system, we need to compute the potential energy of the gas. In case $p_0({\mathbf {x} }) = \mathrm{const}$ we simply have
\begin{equation}
V(\rho, T) = V_0 \rho^{\gamma}.
\end{equation}
The corresponding Lagrangian takes the form
\begin{equation}
\ell(\boldsymbol{u}, \rho)= \int_{{\mathcal B}} \left[\frac{1}{2}\rho|\boldsymbol{u}|^2 -V_0 \rho^{\gamma}\right]{\rm d}^3{\mathbf {x} }.
\label{lagr_simple_fluid}
\end{equation}
With these notations, the variations in the Lagrange-d'Alembert principle \eqref{Crit_action} yields the system of equations
\begin{equation}
\label{eq_pme_dynamic}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\partial_t\frac{\delta\ell}{\delta \boldsymbol{u}}+ \pounds_{\boldsymbol{u}} \frac{\delta\ell}{\delta \boldsymbol{u}} = \rho\nabla \frac{\delta\ell}{\delta \rho} + \boldsymbol{F}\\
\vspace{0.2cm}\partial_t \rho + \operatorname{div}(\rho \boldsymbol{u})=0\,,
\end{array}\right.
\end{equation}
where for the friction force we posit $\boldsymbol{F} := -\mu \rho \boldsymbol{u},$ according to the linear Darcy's law.
After computing the explicit form of functional derivatives and collecting the terms, the equations of motion \eqref{eq_pme_dynamic} become
\begin{equation}
\label{pme_dynamic_explicit}
\hspace{-3mm}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\rho(\partial_t \boldsymbol{u}+ \boldsymbol{u}\cdot\nabla \boldsymbol{u} ) = - \rho \nabla \pp{V}{\rho} - \mu \rho \boldsymbol{u}\\
\vspace{0.2cm}\partial_t \rho + \operatorname{div}(\rho \boldsymbol{u})=0\,.
\end{array}\right.
\end{equation}
Let us consider the special case of a degenerate Lagrangian without kinetic energy term
\begin{equation}
\ell(\boldsymbol{u}, \rho)= -\int_{{\mathcal B}} V_0 \rho^{\gamma}{\rm d}^3{\mathbf {x} }.
\label{potential_only_lagrangian}
\end{equation}
The application of the Lagrange-d'Alembert principle to \eqref{potential_only_lagrangian} will formally yield a system with no dynamic terms in the left hand side of the first equation of \eqref{eq_pme_dynamic}, namely
\begin{equation}
\hspace{-3mm}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\mu \boldsymbol{u} = - \nabla \pp{V}{\rho} = - \gamma V_0 \rho^{\gamma - 1} \nabla \rho = -\frac{V_0}{p_0} \nabla p\\
\vspace{0.2cm}\partial_t \rho + \operatorname{div}(\rho \boldsymbol{u})=0\,.
\end{array}\right.
\label{PME_system}
\end{equation}
We substitute the velocity from the first equation into the continuity equation in the system \eqref{PME_system} to get a closed form equation for the density
\begin{equation}
\label{pme_explicit}
\partial_t \rho
= \frac{V_0}{\mu} \operatorname{div}(\rho \nabla \rho^\gamma).
\end{equation}
The equation \eqref{pme_explicit} is known as the porous medium equation (PME).
We should notice, that while this result was obtained simply by dropping the inertial term $\frac{1}{2}\rho|\boldsymbol{u}|^2$ from the Lagrangian, the correctness of this approach goes beyond the scope of this paper, as it employs a degenerate Lagrangian. The use of a small parameter $\epsilon \rightarrow 0$ as a coefficient for the inertial term would lead to the singular perturbations and will not yield the same result immediately. The solutions of systems with singular perturbations may employ asymptotic methods, see for example \cite{verhulst2005methods}.
The porous medium equation \eqref{pme_explicit} could be nondimensionalized by scaling out the constant and rewritten in the form
\begin{equation}
\partial_t u = \Delta (u^m), \quad m := 1 + \gamma > 1,
\label{PME}
\end{equation} which is a nonlinear heat equation, formally of parabolic type \cite{vazquez2007porous}. The interesting property of this porous medium equation, that does not hold for the linear heat equation $\partial_t u = \Delta u$ is that \eqref{PME} has finite speed for the propagation of disturbances from the level $u = 0.$
The PME \eqref{PME} has a special solution representing mass or heat release from a point source \cite{vazquez2007porous}, that was obtained by Zeldovich, Kompaneets and Barenblatt, and the terms \textit{source solution}, \textit{Barenblatt-Pattle solution}, \textit{Barenblatt solution} or \textit{ZKB solution} are often used for this solution. The ZKB solution has the self-similar form:
$u=t^{-\alpha} f(\xi)$ with $\xi = \|{\mathbf {x} }\| t^{-\beta}$, see \cite{barenblatt_1996}. For equation \eqref{PME}, this self-similar solution can be written explicitly as
\begin{equation}
u({\mathbf {x} }, t) = t^{-\alpha} \left( C - k \|{\mathbf {x} }\|^2 t^{-2\beta}\right)^{\frac{1}{m-1}}_+,
\label{ZKB}
\end{equation}
where $(f)_+ := \max\{f, 0\},$
\begin{equation}
\alpha = \frac{d}{d(m-1) + 2}, \quad \beta = \frac{\alpha}{d}, \quad k = \frac{\alpha(m-1)}{2md},
\end{equation}
$C > 0$ is an arbitrary constant and $d$ is the dimension of the space. The constant $C$ is chosen in such a way that the mass of the solution $M$ is equal to a given value.
The initial data in \eqref{ZKB} as $t \rightarrow 0$ is a Dirac mass $u({\mathbf {x} }, t) \rightarrow M \delta({\mathbf {x} }),$ where $M = M(C, m, d).$ The source solution has compact support in space for every fixed time, in other words, the solution is non-zero only for $\| {\mathbf {x} }\|\leq R(t)$, with the radius of the support $R(t) = t^\beta \sqrt{C/k},$ and the mass of the solution conserved for all times, $\int_{\mathbb{R}^d} u({\mathbf {x} }, t) \mathrm{d}{\mathbf {x} } = M = \mathrm{const}.$
\revision{R2Q1}{
\subsubsection{Connections with Biot's equations for wave propagation}
It is worth noting that the equations \eqref{expressions_explicit} reduce to the Biot's model for propagation of waves in porous media \cite{biot1956theory1}, see also \cite{Fellah2004ultrasonic} for current application to biomedical field. This result was explained in details in \cite{FaFGBPu2020}, and we refer the reader to that paper, as the derivation of linearization is quite technical and cumbersome. To achieve that correspondence, one has to linearize equations \eqref{expressions_explicit} about a uniform homogeneous state $g=g_0$, yielding:
\begin{equation}\label{PDE_dispersion}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\rho_f g_0 \frac{\partial^2}{\partial t^2} \boldsymbol{u}_f +\beta \frac{\partial}{\partial t}(\boldsymbol{u}_f - \boldsymbol{u}_s) -g_0 \zeta \nabla {\rm div} \boldsymbol{u}_f + g_0 (\zeta+ \xi) \nabla {\rm div} \boldsymbol{u}_f=\mathbf{0}\\
\displaystyle\vspace{0.2cm}\rho_s \frac{\partial^2}{\partial t^2}\boldsymbol{u}_s- \beta \frac{\partial}{\partial t}(\boldsymbol{u}_f - \boldsymbol{u}_s) + g_0 {(\zeta + \xi)} \nabla {\rm div} \boldsymbol{u}_f\\
\displaystyle \qquad - \left( g_0 (\zeta +2 \xi) + \Lambda+ G \right) \nabla {\rm div} \boldsymbol{u}_f -G \Delta \boldsymbol{u}_s = \mathbf{0} \,,
\end{array}
\right.
\end{equation}
where $\Lambda$ and $G$ are the Lam\'e coefficients for the dry porous media, and $\zeta$ and $\xi$ come from the microscopic energy of the pores. These variables have the dimension of elastic modulus (\emph{i.e.}, pressure). The coefficient $\xi$ is related to the dry media bulk modulus and is coming from the second derivative $\partial^2_{gg}V$ at the equilibrium. The cross-derivative $\partial^2_{g b}V$ at the equilibrium is a tensor assumed to be proportional to the identity matrix for a uniform isotropic media, with a coefficient of proportionality being equal to $\xi$ with an appropriate coefficient making $\xi$ having the dimension of elastic modulus.
\\
The corresponding Biot's system for acoustic waves in porous media is given by
\begin{equation}
\label{linear_biot_system_0}
\hspace{-0.33cm}\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\frac{\partial^2}{\partial t^2}(\rho^{(f)}_{22} \boldsymbol{u}+ \rho_{12} \boldsymbol{v}) + \beta \frac{\partial}{\partial t}(\boldsymbol{u}_f - \boldsymbol{u}_s) - \nabla\mbox{div}\, (R\boldsymbol{u}_f+ Q\boldsymbol{u}_s ) = \mathbf{0}, \\
\displaystyle\vspace{0.2cm}\frac{\partial^2}{\partial t^2}(\rho^{(s)}_{11} \boldsymbol{u}_s + \rho_{12} \boldsymbol{u}_f) - \beta \frac{\partial}{\partial t}(\boldsymbol{u}_f - \boldsymbol{u}_s)\\
\displaystyle \qquad - \nabla\mbox{div}\, (Q\boldsymbol{u}_f + P\boldsymbol{u}_s) + N \nabla \times \nabla \times \boldsymbol{u}_s = \mathbf{0},
\end{array}
\right.
\end{equation}
with $N$ being shear modulus of the elastic body.
We shall note that Biot's equations is not directly applicable to an incompressible fluid, since the expressions for the variables $P,Q$ and $R$ in \eqref{linear_biot_system_0} involve explicitly the bulk modulus of the fluid. However, if we proceed formally and use the equations from the literature and put $K_f= \infty$ for an incompressible fluid, the expressions for $P,Q$ and $R$ in terms of the bulk moduli of the porous skeleton $K_b$ and the elastic body itself $K_s$, see \textit{e.g.}, \cite{Fellah2004ultrasonic} are given by
\begin{equation}
\label{PQR_def}
P=(1-g_0) K_s + \frac{4}{3} N \,, \quad Q= g_0 K_s \, , \quad R= \frac{g_0^2 K_s}{1- g_0 - K_b/K_s } \, .
\end{equation}
Let us now compare this system with the linearization of our equations \eqref{PDE_dispersion}, where we have set $\rho_{12}=\rho_{21}=0$. The case of $\rho_{12} \neq 0$ and $\rho_{21} \neq 0$ can be easily incorporated by considering a more general inertia matrix in the Lagrangian. There is also an exact correspondence between the friction terms. Thus, we need to compare the coefficients of the spatial derivative terms. A direct comparison between Biot's linearized system \eqref{linear_biot_system_0} and \eqref{PDE_dispersion} gives
$R= g_0 \zeta$ by observing the coefficients of the terms proportional to $\nabla {\rm div} \boldsymbol{u}_f$ from the equations \eqref{linear_biot_system_0}. From the term proportional to $\nabla {\rm div} \boldsymbol{v}$ in the first equation of \eqref{linear_biot_system_0}, we obtain $Q=-g_0 (\xi + \zeta)$. Finally by using $\nabla \times \nabla \times \boldsymbol{v} = \nabla \mbox{div}\, \boldsymbol{v} - \Delta \boldsymbol{v}$ we obtain the expressions of $N$ and $P$. To summarize, the Biot's coefficients $(P,Q,R,N)$ are given by
\begin{equation}
\begin{aligned}
\label{Biot_correspondence}
R &= g_0\zeta,\quad
Q & = -g_0(\xi+\zeta),\quad
N & = G,
\quad
P&=\Lambda +2 G + g_0 ( \zeta + 2 \xi) \,.
\end{aligned}
\end{equation}
The expression $\Lambda+2 G$ is also known as the $P-$wave modulus. In our case, this $P$-wave modulus is modified by additional terms $\xi$ and $\zeta$ coming from the microscopic elasticity properties of the porous matrix. We refer the reader to \cite{FaFGBPu2020} for more details.
}
\revision{R2Q2}{\subsubsection{Connections with Biot's quasi-static equations of porous media}
Other important equations related to porous media are the so-called poroelasticity equations \cite{bociu2016analysis, bociu2020nonlinear}, which are sometimes also called the equations for the porous media, or the (nonlinear) Biot model for quasi-static porous media. See also \cite{showalter2000diffusion} for literature review and mathematical analysis of solutions for related models. These equations describe slow, inertia-less deformation of the porous media filled with an incompressible fluid. If we neglect the kinetic energy terms in the Lagrangian and consider the Lagrange-d'Alembert principle
\[
\delta \int_0^T\!\!\!\int_ \mathcal{B} \left[ -e_s(b, g ) + p\left(g - g_0 \circ \boldsymbol{\varphi}^{-1} J_{\boldsymbol{\varphi}^{-1}} \right) \right] {\rm d} ^3 \mathbf{x} \,{\rm d} t + \int_0^T\!\!\!\int_ \mathcal{B} \big( \boldsymbol{F} _f \cdot \boldsymbol{\eta} _f + \boldsymbol{F} _s \cdot \boldsymbol{\eta} _s \big) {\rm d} ^3 \mathbf{x}\, {\rm d} t=0
\]
for variations $ \delta b = - \pounds _ { \boldsymbol{\eta} _s} b$ and free variations $ \delta g$, $ \delta p$, $ \delta \boldsymbol{\varphi}= \boldsymbol{\eta} _f \circ \boldsymbol{\varphi}$, we get
\rem
\begin{framed}
\textcolor{magenta}{FGB: If we use the principle
\[
\delta \int_0^T \left[\ell(b, \phi ) + \int_ \mathcal{B} p\left(\phi - \phi_0 \circ \boldsymbol{\varphi}^{-1} J_{\boldsymbol{\varphi}^{-1}} \right) {\rm d} ^3 \mathbf{x} \right] {\rm d} t + \int_0^T \!\int_ \mathcal{B} \big( \mathbf{F} _f \cdot \boldsymbol{\eta} _f + \mathbf{F} _s \cdot \boldsymbol{\eta} _s \big) {\rm d} ^3 \mathbf{x}\, {\rm d} t=0
\]
for variations $ \delta b = - \pounds _ { \boldsymbol{\eta} _s} b$,
we get
\begin{equation}
\left\{
\begin{aligned}
&0= - \phi \nabla p + \mathbb{K} (\boldsymbol{u}_s-\boldsymbol{u}_f)\\
&0= -\frac{\partial \ell}{\partial b}: \nabla b + \operatorname{div} \sigma _e + \mathbb{K} (\boldsymbol{u}_f-\boldsymbol{u}_s)\\
&0=\pp{\ell}{\phi}(\phi,b)+ p .
\end{aligned}
\right.
\label{no_inertia_2}
\end{equation}
where $(\sigma_e)^i_k= - 2 \frac{\partial \ell}{\partial b^{kj}}b^{ij}$. The second equation in \eqref{no_inertia_2} is different from the second equation in \eqref{no_inertia_2}. Did you have something else in mind? From the last equation, we can write have $\frac{\partial \ell}{\partial b}: \nabla b = \nabla \ell- \frac{\partial \ell}{\partial \phi } \nabla \phi= \nabla \ell +p \nabla \phi$, so we get
\begin{align*}
0&=- \nabla \ell - p \nabla \phi + \operatorname{div} \sigma _e + \mathbb{K} (\boldsymbol{u}_f-\boldsymbol{u}_s)\\
&= \phi \nabla p - \nabla (\ell + p \phi )+ \operatorname{div} \sigma _e + \mathbb{K} (\boldsymbol{u}_f-\boldsymbol{u}_s)\\
&= - (1- \phi ) \nabla p - \nabla (\ell + p ( \phi -1)) + \operatorname{div} \sigma _e + \mathbb{K} (\boldsymbol{u}_f-\boldsymbol{u}_s).
\end{align*}
This has an additional term compared to the second equation in \eqref{no_inertia}.
\\
\textcolor{blue}{VP: I think we actually agree, up to a misprint in the last equation in the previous model.
Since your $\ell$ just involves $-e_s(b,g)$ (notice that we use $g$ in this paper, not $\phi$) and the old $\ell$ below involves $p$ let us rewrite the above equation for clarity as
\begin{equation}
\left\{
\begin{aligned}
&0= - g \nabla p + \mathbb{K} (\boldsymbol{u}_s-\boldsymbol{u}_f)\\
&0= \nabla e_s -p \nabla g+ \operatorname{div} \sigma _e + \mathbb{K} (\boldsymbol{u}_f-\boldsymbol{u}_s)\\
&0=-\pp{e_s}{g}(b,g)+ p .
\end{aligned}
\right.
\label{no_inertia_3}
\end{equation}
since strictly speaking in above definition $\ell$ is a number obtained after the integration, and not the integrand. If we neglect terms with $\nabla \phi$ then we get $\sigma_{\rm tot}=\sigma_e - e_s(b,g)*{\rm Id}$. So, if we add the first and second equation in \eqref{no_inertia_3}, we obtain
\[
\nabla e_s - p \nabla g - g \nabla p + \mbox{div} \sigma_e =0
\]
or
\[
{\rm div} \sigma_{\rm tot}=0 \, , \quad \sigma_{\rm tot}:= \sigma_e+(e_s - g p) {\rm Id}
\]
which is very much reminiscent of what they have in \cite{bociu2020nonlinear}, except they have
\[
\sigma_{\rm tot} = \sigma_e - \alpha p {\rm I},
\]
with $\alpha$ being the Biot-Willis coefficient. They state that for doubly incompressible media, $\alpha=1$.
\\
I think the biggest issue is the Biot-Willis equation which makes even less sense to me than before. I found even stronger argument and put it in the paper. I think this law is not even invariant with respect to rigid shifts.
\\
I don't get quite the same equations as the references doing the non-inertial Biot stuff, but it is close enough. Also because there are so many versions of those - I think it is going to be impossible and confusing to align with them all.
}
}
\end{framed}
\begin{equation}
\ell = \int_{\cal B} \left[ -e_s(b,g) + p \left(g - g_0 \circ \boldsymbol{\varphi}^{-1} J_{\boldsymbol{\varphi}^{-1}} \right) \right] {\rm d} ^3 {\mathbf {x} }
\label{Lagr_simple}
\end{equation}
the equations of motion in our case become
\begin{equation}
\left\{
\begin{aligned}
0= & - g \nabla p + \mathbb{K} (\boldsymbol{u}_s-\boldsymbol{u}_f)\\
0 =& - (1-g) \nabla p + \operatorname{div} \left[ \big(e_s + p (1- g)\big){\rm Id} + \sigma_e\right] + \mathbb{K} (\boldsymbol{u}_f-\boldsymbol{u}_s)
\\
0 = & -\pp{e_s}{g}(b,g) +p\,,
\end{aligned}
\right.
\label{no_inertia}
\end{equation}
where $(\sigma_e)^i_k= 2 \frac{\partial e_s}{\partial b^{kj}}b^{ij}$.
If we linearize the elastic stress tensor $\sigma_e$ in the above equations as
\begin{equation}
\sigma_e \simeq \Lambda \epsilon +G \mbox{div} \epsilon - (1-\phi) p {\rm Id}, \quad \epsilon \simeq \frac{1}{2} \left(b - {\rm Id} \right)
\end{equation}
and add the first two equations demonstrating the balance of momenta for the fluid and the solid, we obtain the equations for the quasi-static porous media equations that are quite close to (but not exactly the same as) those presented in \cite{bociu2016analysis} without the viscoelastic terms and \cite{bociu2020nonlinear}.
The last equation of our reduced equations \eqref{no_inertia}, obtained with respect to variations $ \delta g$, connects the pressure, which is the Lagrange multiplier for incompressibility, with the fluid content and deformations.
In contrast, the nonlinear Biot model uses an alternative \emph{Bio-Willis} relationship for the quantity (fluid content) $\zeta(t, {\mathbf {x} }) = g(t,{\mathbf {x} })-g_0({\mathbf {x} })$, where $g_0({\mathbf {x} })$ is a baseline local value of the porosity \cite{bociu2020nonlinear}. In our notation, assuming $\boldsymbol{\Psi}(0,{\mathbf {x} })={\mathbf {x} }$, the Biot-Willis relationship for the fluid content $\zeta$ reads
\begin{equation}
\zeta=c_0 p + \alpha {\rm div} \left(\boldsymbol{\Psi}^{-1}(t,{\mathbf {x} })-{\mathbf {x} } \right) \,.
\label{Biot_Willis}
\end{equation}
\revision{R1Q2}{
For an incompressible fluid and solid, one takes $c_0=0$ and $\alpha=1$, attributing all the change in available volume to the dilation of the media. In our opinion, \eqref{Biot_Willis} is somewhat difficult to justify mathematically for large deformations. For example, if the system consisting of incompressible fluid and solid is undergoing a shift as a rigid body with the velocity $\mathbf{U}$, then $\boldsymbol{\Psi}^{-1}(t,{\mathbf {x} }) = \boldsymbol{U} t + {\mathbf {x} }$. Thus, the equation \eqref{Biot_Willis} states that $g(t, {\mathbf {x} })=g_0({\mathbf {x} })$. However, the true statement is that $g$ simply moves with the media, so $g(t,{\mathbf {x} }) = g_0({\mathbf {x} } - \mathbf{U} t)$, where we have identified, for simplicity, the coordinates $\boldsymbol{X}$ and ${\mathbf {x} }$ at $t=0$. Thus, if $g_0({\mathbf {x} })$ is non-uniform in space, it is difficult to interpret the equation \eqref{Biot_Willis}. It is especially true for the biological materials which have inherently non-uniform porosity, such as 'sneezing' sponges \emph{Ephydatia muelleri} described in \cite{ludeman2014evolutionary}, which served as an inspiration for this paper. In our description, we do not need an extra physical assumption such as \eqref{Biot_Willis}. The full condition for porosity for any motion for incompressible fluid and solid reads
\begin{equation}
\left\{
\begin{aligned}
&g(t,{\mathbf {x} }) = g(0,\boldsymbol{\varphi}^{-1} (t,{\mathbf {x} })) J_{\boldsymbol{\varphi}^{-1} } (t,{\mathbf {x} })
\\
&(1-g(t,{\mathbf {x} })) = (1-g(0,\boldsymbol{\Psi}^{-1} (t,{\mathbf {x} })))J_{\boldsymbol{\Psi}^{-1} } (t,{\mathbf {x} })\,.
\end{aligned}
\right.
\label{doubly_incompr}
\end{equation}
Thus, the true condition for doubly incompressible flow involves both $g(t,\boldsymbol{X})$, $\psi(t,\boldsymbol{X})$, and $\boldsymbol{\varphi}(t,\boldsymbol{X})$. A differential form of these incompressibility conditions is given by equation \eqref{g_uf_us_constr} below. This additional incompressibility condition closes the system and no additional physical assumptions such as \eqref{Biot_Willis} are necessary. We shall postpone the discussion of the doubly incompressible case until Sec.~\ref{sec:doubly_incompr}. Here, we just notice that in our opinion, a direct application of Biot-Willis' porosity conditions \eqref{Biot_Willis} to realistic biological systems is difficult, especially when additional muscle stress is introduced for large deformations and in the presence of non-uniform porosity --
a fact of which the sponge \emph{Ephydatia muelleri} is happily unaware.
}
\\
In contrast, in our model we do not need the additional constraint \eqref{Biot_Willis} as the relationship connecting $\zeta$, $p$ and $\phi$ automatically follows from the last equation of \eqref{no_inertia}. \revision{R2Q3}{Moreover, we have an automatic dissipation of the energy due to the existence of variational principle. In contrast, finding the energy-like quantity for the nonlinear porous media (Biot) model is highly nontrivial, as the works \cite{bociu2016analysis, bociu2020nonlinear} illustrate.
We thus believe that in spite of higher apparent complexity compared to the simplified models used in the literature in the field, our equations are actually mathematically simpler to analyze from the point of view of functional analysis, and hope that experts in analysis of PDEs will have an opportunity to perform rigorous analysis of existence and uniqueness of solutions to our equations.
}
}
\revision{R2Q3}{\subsubsection{Perforated domains and the nature of friction terms} }
It is also interesting to connect our works to the literature on homogenizations of perforated domains and subsequent discussions of the nature of friction terms in porous media. Perforated domains are defined to be a two-phased media, which contains of a large number of small holes made out of solid with the remainder of the domain filled with fluid \cite{allaire1991homogenization1,allaire1991homogenization2}. The concept of perforated domains was originally introduced as a means to rigorously derive the origin of friction terms in porous media, such as Darcy's law containing fluid velocity only and corresponding Darcy-Brinkman models, involving velocity and Navier-Stokes like friction terms involving gradients of velocity \cite{brinkman1949calculation,brinkman1952viscosity}, see also \cite{srinivasan2014thermodynamic}. Since then, perforated domains have enjoyed active studies especially regarding rigorous analysis of systems that are close to the Navier-Stokes equations, in the context of vanishing viscosity and very small hole size \cite{lacave2016vanishing}. The vanishing velocity leads to boundary layers and thus very interesting mathematical analysis of the problem. One can view our system as a possible homogenization of the system where the holes in space are not static, but are connected to each other by springs. The discussion of exact nature of the friction terms is beyond the scope of this paper. Two of the authors of this paper have recently outlined general possibilities for the friction terms in \cite{FGBPu2021}, and we refer the reader to that paper for details. Since our equations allow for arbitrary nonlinearities and accurately take into account inertia, we believe that the connection between homogenization of equations in perforated domains is of interest and should be pursued, since the friction terms in our system are posited and not derived.
\rem {
These equations define the coupled motion of an incompressible fluid and porous media. We are not aware of these equations having been derived before.
\begin{remark}[Equations of motion with external equilibrium pressure]
{\rm If the media is subjected to a uniform external pressure $p_0$, then the equations of motion are derived by changing the Lagrangian to $\ell_p \rightarrow \ell + (p-p_0) (g-c(b) v)$. In that case, equations \eqref{eq_gen}, and, similarly, \eqref{expressions_explicit} are altered by simply substituting $p-p_0$ instead of $p$. In what follows, we shall put $p_0=0$.
}
\end{remark}
\subsection{Energy dissipation}
We are now going to proceed to prove that our model yields strict dissipation of mechanical energy in the presence of friction forces in order to demonstrate that our derivation is physically consistent. Fortunately, variational methods are guaranteed to provide energy conservation for the absence of friction, and when the friction forces are introduced correctly, also guaranteed to provide energy dissipation.
Let us consider the energy density associated with the Lagrangian $\ell$ given by
\begin{equation}
e=\boldsymbol{u}_f \cdot \dede{\ell}{\boldsymbol{u}_f} +
\boldsymbol{u}_s \cdot \dede{\ell}{\boldsymbol{u}_s}
+
\dot v \dede{\ell}{\dot v} - \mathcal{L} \, ,
\label{energy_density}
\end{equation}
where $\mathcal{L}$ denotes the integrand of $\ell$.
Note that in our case, $\ell$ does not depend on $\dot v$ hence the third term vanishes.
For the general system \eqref{eq_gen}, and its explicit form \eqref{expressions_explicit}, to be physically consistent, we need to prove that in the absence of forces $\boldsymbol{F}_s$ and $\boldsymbol{F}_f$, the total energy $E= \int_{\cal B} e\, \mbox{d}^3 {\mathbf {x} }$ is conserved. When these forces are caused by friction, we must necessarily have
$\dot E \leq 0$.
We begin by noticing the formula
\begin{equation}\label{formula_energy}
\boldsymbol{u} \cdot {\pounds}_{\boldsymbol{u}} \boldsymbol{m}=
\boldsymbol{u} \cdot \left( \boldsymbol{u} \cdot \nabla \boldsymbol{m}+ \nabla \boldsymbol{u}^\mathsf{T}\cdot\boldsymbol{m}+
\boldsymbol{m}\operatorname{div} \boldsymbol{u} \right)= {\rm div} \big( \boldsymbol{u} \,(\boldsymbol{m}\cdot \boldsymbol{u}) \big) \, ,
\end{equation}
which easily follows from its coordinates expression in \eqref{Lie_der_momentum}.
Then, using equation \eqref{formula_energy} and system \eqref{eq_gen}, we compute
\begin{equation}\label{computation_energy_balance}
\begin{aligned}
\partial_t e &= \boldsymbol{u}_f \cdot \pp{}{t} \dede{\ell}{\boldsymbol{u}_f}
+
\boldsymbol{u}_s \cdot \pp{}{t} \dede{\ell}{\boldsymbol{u}_s}
- \dede{\ell}{\rho_s}\partial_t \rho_s - \dede{\ell}{b}: \partial_t b -\dede{\ell}{g} \partial_t g - \dede{\ell}{v}\partial_t v
\\
&= - {\rm div} \left[
\boldsymbol{u}_f \left( \boldsymbol{u}_f \cdot \dede{\ell}{\boldsymbol{u}_f}\right)
+
\boldsymbol{u}_s \left( \boldsymbol{u}_s \cdot \dede{\ell}{\boldsymbol{u}_s} \right)
- \left( \dede{\ell}{g} - p \right) g \boldsymbol{u}_f \right.\\
&\hspace{5cm}\left.- \dede{\ell}{\rho_s} \rho_s \boldsymbol{u}_s + 2 \boldsymbol{u}_s\cdot \left( \frac{\delta \ell}{\delta b} + pv \frac{\partial c}{\partial b} \right) \cdot b
\right]
\\
&\qquad+\left( \dede{\ell}{g}-p \right)
\partial_t g
+
\dede{\ell}{\rho_s} \partial_t \rho_s
+
\left(\dede{\ell}{b}+ pv \frac{\partial c}{\partial b}\right) \partial_t b \\
&\qquad- \dede{\ell}{\rho_s} \partial_t \rho_s - \dede{\ell}{b}:\partial_t b
- \dede{\ell}{g} \partial_t g - \dede{\ell}{v} \partial_t v + \boldsymbol{u}_s \cdot \boldsymbol{F}_s
+ \boldsymbol{u}_f \cdot \boldsymbol{F}_f
\\
&= - {\rm div} \boldsymbol{J}-p \partial_t g
+ pv \frac{\partial c}{\partial b}:\partial_t b - \dede{\ell}{v} \partial_t v+ \boldsymbol{u}_s \cdot \boldsymbol{F}_s
+ \boldsymbol{u}_f \cdot \boldsymbol{F}_f\,,
\end{aligned}
\end{equation}
where we denoted by $\boldsymbol{J}$ the vector field in the brackets inside the div operator. The last term in these brackets has the local expression
\[
\left(2 \boldsymbol{u}_s\cdot \left( \frac{\delta \ell}{\delta b} + pv \frac{\partial c}{\partial b}\right)\cdot b \right)^k= 2 \boldsymbol{u}_s^i \left( \frac{\delta \ell}{\delta b_{ij}} + pv \frac{\partial c}{\partial b_{ij}}\right) b ^{jk} = - \sigma _p \cdot \mathbf{u} _s\,.
\]
The sum of the second, third, and fourth terms in the last line of \eqref{computation_energy_balance} cancel thanks to the third and fourth equations in \eqref{eq_gen}.
We thus get the energy balance
\[
\partial_t e+ \operatorname{div} \boldsymbol{J} = \boldsymbol{u}_s \cdot \boldsymbol{F}_s
+ \boldsymbol{u}_f \cdot \boldsymbol{F}_f\,.
\]
Then, the total energy change rate is given by
\begin{equation}
\label{energy_total}
\dot E= \int_\mathcal{B} \left( \boldsymbol{u}_s \cdot \boldsymbol{F}_s + \boldsymbol{u}_f \cdot \boldsymbol{F}_f \right) \mbox{d}^3{\mathbf {x} } - \int_{\partial\mathcal{B}} \boldsymbol{J}\cdot \boldsymbol{n} \,{\rm d}s\, .
\end{equation}
From the boundary conditions \eqref{free_slip} and \eqref{BC_general} we have $ \mathbf{u}_s \cdot \mathbf{n} =0$, $ \mathbf{u} _ f \cdot \mathbf{n} =0$, and $ [\sigma _p \cdot \mathbf{n} ] \cdot \mathbf{u}_s =0$ on the boundary $ \partial \mathcal{B} $, so that $\mathbf{J}\cdot \mathbf{n} =\mathbf{0}$ at the boundary. In the case of the boundary conditions \eqref{no_slip}, we have $ \mathbf{J}|_{ \partial \mathcal{B} }=0$.
In the absence of external forces, when $\boldsymbol{F}_f$ and $\boldsymbol{F}_s$ are caused exclusively by the friction between the porous media and the fluid, we have $\boldsymbol{F}_f = - \boldsymbol{F}_s$. Since in that case $\dot E \leq 0$, we must necessarily have
\begin{equation}
\label{Darcys_friction}
\dot E = \int_\mathcal{B} \boldsymbol{F}_s \cdot \left( \boldsymbol{u}_s -
\boldsymbol{u}_f \right) \mbox{d}^3 {\mathbf {x} } \leq 0 \, .
\end{equation}
If one assumes \eqref{Darcy_law} for the friction, \emph{i.e.}, $\boldsymbol{F}_s= \mathbb{K}(\boldsymbol{u}_s-\boldsymbol{u}_f) $, then
$\mathbb{K}$ must be a positive operator, \emph{i.e.}, $\mathbb{K} \boldsymbol{v} \cdot \boldsymbol{v} \geq 0$, for all $\boldsymbol{v} \in \mathbb{R}^3$ and for any point ${\mathbf {x} } \in \mathcal{B} $.
}
\color{black}
\section{The case of living organisms and active porous media}
\subsection{Introduction of elastic muscle stress}\label{Introduction_muscle}
Let us now consider a porous media that can generate its own stress in the solid in addition to the elastic stress experienced by the solid from the deformation. The physical context of this work are the sponges generating their own internal stress to contract and expunge water from themselves. The sponges generate their own internal muscle stress which we call $\bar{s}$, when we compute that stress in the Eulerian frame of reference.
The forces $\operatorname{div} \bar{s}$ generated by this stress in the spatial frame have to be considered as external in Hamilton's principle \eqref{Crit_action}, acting only on the solid part of the system.
In this work, we shall only consider the mechanical effect of the muscle stress, without getting into the details of the actual mechanism of generation of stress itself. The microscopic dynamics of the muscle itself is highly complex \cite{geeves1999structural}, and is not essential at this point. It may, however, become important later when thermodynamics effects are considered.
There are two ways to introduce the muscle force by modifying \eqref{Crit_action}. One way is to consider the muscle stress through the typical way of adding external forces via the Lagrange-d'Alembert principle. In that modification, the muscle forces ${\rm div}\overline{s}$ are added to the force acting on the solid $\boldsymbol{F}_s$, as:
\begin{equation}
\delta S+\int_0^T\!\!\int_{{\cal B}} \left( \boldsymbol{F}_f \cdot \boldsymbol{\eta}_f + \left( \boldsymbol{F}_s + \operatorname{div} \bar{s} \right) \cdot \boldsymbol{\eta}_s \right) \mbox{d}^3{\mathbf {x} } \, \mbox{d} t =0 \, .\quad
\label{Crit_action_muscle}
\end{equation}
Another way is to consider the muscle action as an \emph{internal} force
through an alternative formulation of the critical action principle as
\begin{equation}
\label{Crit_action_muscle_2}
\delta S + \int_0^T\!\!\int_{{\cal B}} \left( \boldsymbol{F}_f \cdot \boldsymbol{\eta}_f+ \boldsymbol{F}_s \cdot \boldsymbol{\eta}_s - \bar{s} : \nabla \boldsymbol{\eta}_s \right) \mbox{d} ^3 {\mathbf {x} } \,\mbox{d} t =0 \,.
\end{equation}
At the first sight, both formulations are equivalent since application of integration over the volume to the last term brings \eqref{Crit_action_muscle_2} to \eqref{Crit_action_muscle}, \emph{except for the boundary terms}. The action \eqref{Crit_action_muscle_2} generates an additional force on the boundary given by $-\overline{s}\cdot \boldsymbol{n}$, with $ \boldsymbol{n} ( \mathbf{x} )$ the normal to the boundary at ${\mathbf {x} } \in \partial {\mathcal B}$.
\revision{R3Q1}{This variational principle illustrates the first key difference with \cite{FaFGBPu2020}, which did not comprise the theory of internal muscle stress. As far as we are aware, this is a novel variational principle for the inclusion of internal muscle stress. In this section, we apply this variational principle to the case of compressible solid and incompressible fluid.
}
Let us now consider the following thought experiment: a volume of solid is acted upon with the uniform muscle stress $\overline{s}= \text{const}$. Then, $\operatorname{div}\overline{s}=0$ inside the volume
${\mathcal B}$. However, uniform stress will affect the boundary in the formulation \eqref{Crit_action_muscle_2} and not in the formulation \eqref{Crit_action_muscle}. Thus, in our opinion, it is more natural to consider the approach \eqref{Crit_action_muscle_2} and not \eqref{Crit_action_muscle}.
This variational principle leads to the modified version of \eqref{eq_gen} for the active porous media:
\begin{equation}
\label{eq_gen_muscle}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\partial_t\frac{\delta \ell}{\delta \boldsymbol{u}_f}+ \pounds_{\boldsymbol{u}_f} \frac{\delta \ell}{\delta \boldsymbol{u}_f} = g \nabla \left( \frac{\delta {\ell}}{\delta g}- p\right)+\boldsymbol{F}_f\\
\displaystyle\vspace{0.2cm}\partial_t\frac{\delta\ell}{\delta \boldsymbol{u}_s}+ \pounds_{\boldsymbol{u}_s} \frac{\delta\ell}{\delta \boldsymbol{u}_s} = \rho_s\nabla \frac{\delta\ell}{\delta \rho_s} + \left(\frac{\delta\ell}{\delta b}+ p v\frac{\partial c}{\partial b}\right)\diamond b+ \operatorname{div} \bar{s} +\boldsymbol{F}_s\\
\displaystyle\vspace{0.2cm} \frac{\delta\ell}{\delta v}= - pc(b)\,,\qquad g= c(b)v\\
\vspace{0.2cm}\partial_tg + \operatorname{div}(g\boldsymbol{u}_f)=0\,,\qquad\partial_t\rho_s+\operatorname{div}(\rho_s\boldsymbol{u}_s)=0\,,\qquad \partial_tb+ \pounds_{\boldsymbol{u}_s}b=0\,.
\end{array}\right.
\end{equation}
For the particular case of the Lagrangian given by \eqref{Lagr_def} the equations become
\begin{equation}
\label{expressions_explicit_muscle}
\hspace{-3mm}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\bar\rho_f^0(\partial_t \boldsymbol{u}_f+ \boldsymbol{u}_f\cdot\nabla \boldsymbol{u}_f ) = - \nabla p + \frac{1}{g} \boldsymbol{F}_f\\
\displaystyle\vspace{0.2cm}\rho_s (\partial_t \boldsymbol{u}_s \!+\! \boldsymbol{u}_s\cdot\nabla \boldsymbol{u}_s) =g\nabla p + \nabla \left( V - \frac{\partial V}{\partial v}v\right) + \operatorname{div} \left( \sigma_p + \bar{s} \right) + \boldsymbol{F}_s\\
\displaystyle\vspace{0.2cm} \frac{\partial V}{\partial v}= pc(b),\qquad g= c(b)v\\
\vspace{0.2cm}\partial_tg + \operatorname{div}(g\boldsymbol{u}_f)=0,\qquad \partial_t\rho_s+\operatorname{div}(\rho_s\boldsymbol{u}_s)=0,\qquad \partial_tb+ \pounds_{\boldsymbol{u}_s}b=0\,.
\end{array}\right.
\end{equation}
In the case of the free slip boundary condition \eqref{free_slip}, the variational principle yields boundary conditions similar to \eqref{BC_general}
\begin{equation}\label{BC_general_2}
\left[(\sigma _p + \overline{s}) \cdot \boldsymbol{n} \right] \cdot \boldsymbol{\eta} =0\,,\quad \text{for all $ \boldsymbol{\eta} $ parallel to $ \partial \mathcal{B} $}\,,
\end{equation}
and the same definition of the stress tensor $ \sigma _p $ in \eqref{def_sigma_p}.
When the boundary conditions \eqref{no_slip} are used, no additional boundary condition arise from the variational principle.
Thus, physically, the muscle stress $\bar{s}$ is simply added to the effective stress $\sigma_p$ in equations \eqref{expressions_explicit_muscle} and the boundary conditions \eqref{BC_general_2}.
\begin{remark}[On the free flow of fluid through the boundary]
\label{remark:free_bnd}
{\rm
Suppose the elastic solid is fixed in space in a domain $ \mathcal{D}_s \subset \mathbb{R} ^3 $. If the fluid can leave or enter the domain, it is natural to assume that all fluid particles are included in a domain $\mathcal{D}_f$ that always contains the solid, $\mathcal{D}_s \subset \mathcal{D}_f$, for example, $ \mathcal{D}_f = \mathbb{R}^3$, \emph{i.e.} the fluid occupies the whole space. Then, the back-to-labels maps in that case are given by
\begin{equation}
\boldsymbol{X}(t, \_\, ) : \mathcal{D}_s \rightarrow \mathcal{B} _s \quad\text{and}\quad \boldsymbol{Y}(t,\_\,): \mathcal{D}_s \rightarrow \mathbb{R} ^3\,,
\label{back_to_labels_map_free_flow}
\end{equation}
where $\boldsymbol{X}(t, x) \in \mathcal{B}_s$ is a diffeomorphism with $\mathcal{B}_s$ the set of all solid labels as before, and $\boldsymbol{Y}(t, x)$ is an embedding with $\mathcal{B} (t):=\boldsymbol{Y}(t, \mathcal{D}_s )$ the set of all fluid labels corresponding to fluid particles that are in the elastic solid at time $t$. Consequently, fluid labels in $ \mathbb{R} ^3-\mathcal{B} (t) $ correspond to fluid particles that are not in the elastic solid at time $t$. Such particle may, \emph{e.g.}, have already left the solid at time $t$ or will penetrate into the solid at a later time. We shall also note that the accurate representation of the moving material boundary needs to be treated carefully, see \cite{dell2009boundary}, as the boundary of the elastic matrix material presents a singularity. We shall postpone the quite complex and technical discussion of the free fluid outflow of the boundary to a follow up work.}
\end{remark}
Under the assumptions leading to the concentration dependence $c=c_0/\sqrt{\operatorname{\det} b}$, equations \eqref{expressions_explicit_muscle} simplify further to
\begin{equation}
\label{expressions_explicit_simple}
\hspace{-3mm}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\bar\rho_f^0(\partial_t \boldsymbol{u}_f+ \boldsymbol{u}_f\cdot\nabla \boldsymbol{u}_f ) = - \nabla p + \frac{1}{g} \boldsymbol{F}_f\\
\displaystyle\vspace{0.2cm}\rho_s (\partial_t \boldsymbol{u}_s \!+\! \boldsymbol{u}_s\cdot\nabla \boldsymbol{u}_s) =g\nabla p
+ \operatorname{div} \left( \sigma_e + \bar{s} \right) \!+\! \boldsymbol{F}_s\\
\displaystyle\vspace{0.2cm} \frac{\partial V}{\partial v}= pc(b),\qquad g= c(b)v\\
\vspace{0.2cm}\partial_tg + \operatorname{div}(g\boldsymbol{u}_f)=0,\qquad \partial_t\rho_s+\operatorname{div}(\rho_s\boldsymbol{u}_s)=0,\qquad \partial_tb+ \pounds_{\boldsymbol{u}_s}b=0\,,
\end{array}\right.
\end{equation}
where $ \sigma _e$ is the elastic stress
\begin{equation}\label{sigma_e}
\sigma _e = 2 \frac{\partial V}{\partial b} \cdot b + V{\rm Id}\,.
\end{equation}
This formula follows from the equality $\nabla \left( V\! - \!\frac{\partial V}{\partial v}v\right) + \operatorname{div} ( \sigma_p)= \operatorname{div} \sigma _e$ which holds when $c=c_0/\sqrt{\operatorname{\det} b}$ since in this case $ \frac{\partial c}{\partial b} \cdot b = - \frac{1}{2} c{\rm Id}$.
We can further put $\boldsymbol{F}_f = - \boldsymbol{F}_s = \mathbb{K} (\boldsymbol{u}_s-\boldsymbol{u}_f)$ to introduce the friction according to the Darcy law.
For the developments below, we also need to introduce the equation for the back-to-labels maps. Recall that the Lagrangian label of the solid is denoted $\boldsymbol{X}$ and we use the same notation for the back-to-labels map defined by $ \boldsymbol{X}(t,{\mathbf {x} }) = \boldsymbol{\Psi} ^{-1} (t,{\mathbf {x} })$ where $\boldsymbol{\Psi}(t, \boldsymbol{X})$ denotes the configuration map for the solid. Recall also that the Eulerian velocity of the solid is given by
\begin{equation}
\boldsymbol{u}_s = \partial _t {\boldsymbol{\Psi}} \circ \boldsymbol{\Psi}^{-1} \quad\text{i.e.}\quad \boldsymbol{u}_s (t,{\mathbf {x} }) = \partial _t {\boldsymbol{\Psi}}\big(t, \boldsymbol{\Psi}^{-1}(t,{\mathbf {x} })\big)\,.
\label{solid_vel}
\end{equation}
Differentiating the identity $\boldsymbol{\Psi} \circ \boldsymbol{X} = {\rm Id}$, or, in coordinates, $\boldsymbol{\Psi}(t, \boldsymbol{X}(t, {\mathbf {x} })) = {\mathbf {x} }$, with respect to time, we obtain:
\begin{equation}
\nabla \boldsymbol{\Psi}\circ \boldsymbol{X} \cdot \partial _t \boldsymbol{X}+ \boldsymbol{u}_s = \mathbf{0}
\quad
\Leftrightarrow
\quad
\partial _t \boldsymbol{X} = - \left( \nabla \boldsymbol{\Psi} \circ \boldsymbol{X} \right)^{-1} \cdot \boldsymbol{u}_s
\label{evolution_X_0}
\end{equation}
which can be written as
\begin{equation}
\label{evolution_X}
\partial _t \boldsymbol{X} = - \nabla \boldsymbol{X} \cdot \boldsymbol{u}_s \quad \Leftrightarrow \quad
\boldsymbol{u}_s = - \left( \nabla \boldsymbol{X} \right)^{-1} \cdot \partial _t \boldsymbol{X}\, .
\end{equation}
The strain tensor $b$ and, correspondingly, stress tensor $\sigma_e$ depend on the spatial gradients of that map, \emph{i.e.}, $\nabla \boldsymbol{X}(t,{\mathbf {x} })$, as well as possibly ${\mathbf {x} }$ and $v$, since $V$ depends on both $b$ and $v$. Thus, the second equation of \eqref{expressions_explicit_simple} becomes a set of coupled elliptic equations for $\nabla \boldsymbol{X}$ and $v$. On the other hand, the muscle action depends only on $\boldsymbol{X}$ and $t$.
\subsection{Simplification: one-dimensional dynamics}
Let us now compute the equations \eqref{expressions_explicit_simple} for one dimensional reduction. The physical model is as follows: suppose there is an elastic porous media filled with an incompressible fluid, positioned inside a perfectly slippery one-dimensional pipe with a circular cross-section. The elastic media has a muscle inside which can contract and expand.
Since the space occupied by the muscle is fixed in space, its back-to-labels map is a diffeomorphism of the form $X(t,\_\,): [-L,L] \rightarrow [-L,L]$, $X=X(t,x)$. The fluid can leave or enter the muscle hence its back-to-labels map is an embedding $Y(t, \_\,):[-L,L] \rightarrow \mathbb{R} $, $Y=Y(t,x)$.
Equation \eqref{evolution_X} for solid and fluid become simply
\begin{equation}
X_t(t,x) = - X_x(t,x) u_s (t,x) \, , \quad
Y_t(t,x) = - Y_x(t,x) u_f (t,x).
\label{evolution_XY_1D}
\end{equation}
Using the assumption of the Darcy law of friction in one dimension, we derive the one-dimensional version of \eqref{expressions_explicit_simple} as
\begin{equation}
\label{expressions_explicit_1D_simplified}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\bar\rho_f^0(\partial_t u_f+ u_f \partial_x u_f ) = - \partial_x p + \frac{1}{g} K(u_s - u_f)\\
\displaystyle\vspace{0.2cm}\rho_s (\partial_t u_s + u_s \partial_x u_s) =g\partial_x p
+ \partial_x \left( \sigma_e + \bar{s} \right) \!+ K(u_f-u_s) \\
\displaystyle\vspace{0.2cm} \frac{\partial V}{\partial v}= pc(b),\qquad g= c(b)v\\
\vspace{0.2cm}\partial_tg + \partial_x (g u_f)=0,\qquad \partial_t\rho_s+\partial_x (\rho_s u_s)=0,\qquad \partial_tb+ \pounds_{u_s}b=0\,.
\end{array}\right.
\end{equation}
In one dimension, the Finger tensor becomes simply
\begin{equation}\label{Finger_1_D}
b(t,x)=(X_x(t,x))^{-2}.
\end{equation}
The densities $g$ and $ \rho _s$ with reference values $ g^0(X)$ and $ \rho _s^0(X)$ are expressed as
\begin{equation}\label{rho_g_1_D}
\rho _s(t,x) = \rho _s^0( X(t,x)) X_x(t,x) \quad\text{and}\quad g(t,x) =g^0( X(t,x)) X_x(t,x)\,.
\end{equation}
The third equation in \eqref{expressions_explicit_1D_simplified} expresses $p$ as an explicit function of $v$ and $b$ hence from \eqref{Finger_1_D} the pressure becomes a function $p=p(X_x,v)$.
Since $v=g/c(b)$ from the fourth equation in \eqref{expressions_explicit_1D_simplified}, we obtain explicitly the pressure as a function $p= p(X_x,g)$. In one dimension, the elastic stress tensor \eqref{sigma_e} is
\begin{equation}\label{sigma_e_1_D}
\sigma _ e = 2 \frac{\partial V}{\partial b}(b,v) b + V(b,v).
\end{equation}
From \eqref{Finger_1_D} and $v=g/c(b)$, we get an explicit expression
\[
\sigma _e= \sigma _e( X_x, g).
\]
\subsection{A reduction of the equation of motion for Lagrangian variables}
We now show how to reduce the system \eqref{expressions_explicit_1D_simplified} to two coupled PDEs for the two variables describing the Lagrangian coordinates of the solid and fluid. \revision{R3Q1}{This exact reduction of the system to one dimension is novel to this paper and was not undertaken in our previous paper \cite{FaFGBPu2020}.} Suppose that at $t=0$, the state is non-deformed so $X(0,x)=x$ and $\rho_s(0,x)=\rho_s^0$ for all $x$, where $\rho_s^0$ is the reference density of the porous media assumed to be a constant in space. Thus from the first equation in \eqref{rho_g_1_D}, we have
\begin{equation}
\rho_s(t,x)=\rho_s^0 X_x(t,x)\,.
\label{rho_s_int}
\end{equation}
Similarly, we also assume that at $t=0$, the fluid is undisturbed, $Y(0,x)=x$ and $g(0,x)=g_0$, for some constant $g_0$.
From the second equation in \eqref{rho_g_1_D}, we have
\begin{equation}
g(t,x)=g_0 Y_x(t,x)\,.
\label{g_eq}
\end{equation}
On the other hand, the velocities can also be expressed from \eqref{evolution_XY_1D} as
\begin{equation}
u_s = - \frac{X_t}{X_x} \, , \qquad u_f = - \frac{Y_t}{Y_x} \, .
\label{uf_us_XY}
\end{equation}
We also note that since the pressure depends on $X_x$ and $g$, from \eqref{g_eq} we have
\begin{equation}
p=p(X_x,g) = P(X_x,Y_x)
\label{P_sol}
\end{equation}
a given function of $(X_x,Y_x)$.
Substitution of \eqref{uf_us_XY} together with \eqref{rho_s_int} and \eqref{g_eq} into the first two equations of
\eqref{expressions_explicit_1D_simplified} gives a closed system of two coupled PDEs for the back-to-labels maps $X$ and $Y$:
\begin{equation}
\left\{
\begin{aligned}
&\bar\rho_f ^0g_0 \left( -Y_{tt} + 2 \frac{Y_t Y_{tx}}{Y_x} - \frac{Y_t^2 Y_{xx}}{Y_x^2} \right) \\
& \hspace{1cm}= - g_0 Y_x \partial_x \big(P(X_x,Y_x)
\big)+K \left( \frac{Y_t}{Y_x}
- \frac{X_t}{X_x} \right)
\\
& \rho_s^0 \left( -X_{tt} + 2 \frac{X_t X_{tx}}{X_x} - \frac{X_t^2 X_{xx}}{X_x^2} \right) \\
& \hspace{1cm}= g_0 Y_x \partial_x \big(P(X_x,Y_x)\big) +
\partial_x \big( \sigma_e (X_x, Y_x) + \overline{s} \big) +K \left( \frac{X_t}{X_x}
- \frac{Y_t}{Y_x} \right) \,.
\end{aligned}
\right.
\label{PDE_XY}
\end{equation}
In addition to lowering the number of equations, in our opinion equation \eqref{PDE_XY} is easier to implement than its Eulerian version since in nature, one would expect the muscle stress to be a function of the Lagrangian variable of the solid $X$, \emph{i.e.}, a given muscle fiber, rather than the spatial coordinate $x$, so $\overline{s}=\overline{s}(X,t)$. It can be written as an explicit function of $x$ only for given solution $X(t,x)$, which is awkward from the point of view of numerical solution, as the last equation of \eqref{expressions_explicit_1D_simplified} describing evolution of $X$ has to be explicitly computed at every time step. In the formulation \eqref{PDE_XY}, where the equation is formulated in terms of back-to-labels maps $(X,Y)$, specifying $\overline{s}=\overline{s}(X,t)$ to be a given function of $X$ does not present any fundamental problem for implementing the numerical solution.
\begin{remark}[Conservation of total momentum]
\label{rem:cons_mom}
{\rm
The total momentum of the fluid is $M_f=\int _{-L}^L\bar\rho_f^0 g u_f \mbox{d} x= -\int_{-L}^L \bar\rho_f^0 g_0 Y_t \mbox{d} x$, and the total momentum of the solid is $M_s=\int _{-L}^L \rho_s u_s \mbox{d} x= - \int _{-L}^L \rho_s X_t \mbox{d} x$. Then, the total fluid+solid momentum
\begin{equation}
M=\int _{-L}^L \left( \bar\rho_f^0 g u_f +\rho_s u_s \right) \mbox{d} x = - \int _{-L}^L \left( \bar\rho_f^0 g_0 Y_t +\rho_s^0 X_t \right) \mbox{d} x
\label{fluid_solid_momentum}
\end{equation}
is conserved for periodic boundary conditions. Indeed,
\begin{equation}
\begin{aligned}
\dot M & =\int _{-L}^L \left( - 2 \rho _s^0 \frac{X_t X_{tx}}{X_x} + \rho _s^0\frac{X_t^2X_{xx}}{X_x^2}
\right.
\\
& \left. \qquad - 2 \bar\rho_f^0 g _0 \frac{Y_t Y_{tx}}{Y_x} + \bar\rho_f^0 g _0\frac{Y_t^2Y_{xx}}{Y_x^2}+
\partial_x \left( \sigma_e + \overline{s} \right) \right) \mbox{d} x
\\
& = \int _{-L}^L \partial_x \left( - \rho _s^0 \frac{X_t^2}{X_x} - \bar\rho_f^0 g _0\frac{Y_t^2}{Y_x} +
\sigma_e + \overline{s} \right) \mbox{d} x
\\
& = \int _{-L}^L \partial_x \left( - \rho _s u_s ^2 - \bar\rho_f^0 gu_f ^2 +
\sigma_e + \overline{s} \right) \mbox{d} x\\
&= \big[ - \rho _s u_s ^2 - \bar\rho_f^0gu_f ^2 +
\sigma_e + \overline{s} \big] _{-L}^L
\, .
\end{aligned}
\label{cons_momentum}
\end{equation}
The boundary terms vanish for periodic boundary conditions. For other cases, for example, fixed boundary conditions for the solid, $u_s(\pm L,t)=0$, the conservation of momentum depends on the cancellation of the fluid momentum through the boundary, elastic stress and muscle stress contributions in the boundary term of \eqref{cons_momentum}.
}
\end{remark}
\subsection{Numerical solution of equations (\ref{PDE_XY})}\label{sec_Numerics}
\paragraph{Choice of potential.} For the numerical solution, we postulate the following choice of potential energy:
\begin{equation}
V (X_x,g)=\frac12 \alpha \left(X_x - 1\right)^{2} + \frac12 \beta \big(g + \left(1 - g_{0}\right) X_x - 1\big)^{2}\,. \label{_sp_potential_0}
\end{equation}
The terms have the following physical sense: the expression proportional to $\alpha$ corresponds to the linear elasticity term (Hooke's law), the second term, proportional to $\beta$, is the difference of $g$ and the ``totally-incompressible porosity", a quantity, that would be equal to the porosity in the case if the solid was totally incompressible. The potential energy ``penalizes" changes in microscopic volume of the solid.
\begin{remark}
{\rm Note that \eqref{_sp_potential_0} is the physical description of the potential as a function of $X_x$ and $g$, consistent with our description $V=V(b,v)$ in general case. For initially uniform system, using $g=g_0 Y_x$ we can express $V$ as
\begin{equation}\label{V_Y_x}
V(X_x,Y_x)=\frac12 \alpha \left(X_x - 1\right)^{2} + \frac12 \beta \big(g_{0} Y_x + \left(1 - g_{0}\right) X_x - 1\big)^{2}
\end{equation}
in terms of $X_x$ and $Y_x$, the latter related to the state of fluid. However, we do not assume that the potential energy of the solid is dependent on the state of the fluid here, it is an inference based on the properties of the solution. Thus, the potential energy defined by \eqref{_sp_potential_0} depends only on the properties of the solid, consistent with our description. This is in contrast, for example, with the works \cite{sciarra2008variational,madeo2008variational} where the energy of the porous media is dependent on the states of fluid and solid. The expression \eqref{V_Y_x} provides a formal connection between two approaches, as the solid energy \emph{formally} depends on the state of the fluid after the substitution $g=g_0 Y_x$, even though the physics of two approaches is quite different. }
\end{remark}
In order to compute the associated stress $ \sigma _0$ and pressure $p$, we need to express $V$ as a function $V(b,v)$.
Recalling that in one dimension, $b=X_x^{-2}$, and using
\[
g= c(b)v= \frac{c_0}{\sqrt{b}}v
\]
we can rewrite \eqref{_sp_potential_0} as
\begin{equation} V(b,v) = \frac{\alpha}{2} \left( \frac{1}{\sqrt{b}} - 1\right)^{2} + \frac{\beta}{2} \left(\frac{c_{0} v}{\sqrt{b}} + \frac{1 - g_{0}}{\sqrt{b}} -1\right)^{2}.
\label{_sp_potential_1}
\end{equation}
Now we are able to compute the stress terms from \eqref{sigma_e_1_D} as follows
\begin{equation}\label{_sp_sigma_e_0}
\begin{aligned}\sigma_e& = 2 b \frac{\partial}{\partial b} V{\left(b, v \right)} + V{\left(b, v \right)}\\
& = \left(1 - \frac{1}{\sqrt{b}}\right) - \frac{\beta }{\sqrt{b}} \left({c_{0} v} + 1 - g_{0}\right) \left(-1 + \frac{c_{0} v}{\sqrt{b}} + \frac{1 - g_{0}}{\sqrt{b}}\right) +V(b,v)\\
&=\frac{\alpha}{2} \left(1 - \frac{1}{b}\right) - \frac{\beta}{2b} \left(- b + (c_0v + (1 - g_0))^2\right)
\end{aligned}
\end{equation}
and the pressure is found as
\begin{equation}\label{_sp_pressure_0}
pc(b) = \pp{V}{v} = \frac{\beta}{\sqrt{b}} c_{0} \left(-1 + \frac{c_{0} v}{\sqrt{b}} + \frac{1 - g_{0}}{\sqrt{b}}\right).
\end{equation}
Substituting $b = X_x ^{-2}$ and $ c_0v = g\sqrt{b} = g_0 Y_x X_x ^{-1} $ in \eqref{_sp_sigma_e_0} and \eqref{_sp_pressure_0} yields $ \sigma _e$ and $p$ as functions of $X_x$ and $Y_x$ as
\begin{align}
\sigma_e(X_x, Y_x)& = - \frac{\alpha}{2} (X_x^2-1) - \frac{\beta}{2} \left( ( X_x (1-g_0) + Y_x g_0)^2-1 \right) \label{_sp_sigma_e_2}\\
p(X_x, Y_x) &= \beta g_{0} \left(g_{0} Y_x + \left(1 - g_{0}\right) X_x- 1\right). \label{_sp_pressure_1}
\end{align}
We will use also the formula
\[
\partial_{x} \sigma_e = - \alpha X_x X_{xx}
- \beta \left(g_{0} Y_x + (1-g_{0})X_x \right) \left(g_{0} Y_{xx} + (1-g_{0}) X_{xx}\right).
\]
\medskip
\noindent
For simulations, it is useful to define $ \xi(t,x)$ and $ \phi (t,x)$ such that
\begin{equation}
X(t, x) = x + \xi(t, x), \qquad Y(t, x) = x+ \phi(t, x)\, .
\label{xi_phi_def}
\end{equation}
Then $V$ is a quadratic, positive definite function of $(\xi_x,\phi_x)$, as expected:
\begin{equation}
V (\xi_x,\phi_x)= \frac12 \alpha \xi_x^{2} + \frac12 \beta \big(g_{0} \phi_x + \left(1 - g_{0}\right) \xi_x \big)^{2}\, .
\label{_sp_potential_phi_xi}
\end{equation}
\medskip
\noindent
For the temporally and spatially bound muscle stress, we take
\begin{equation}\label{s_eq_sims}
\overline{s}(t, X) = S_0 e^{-t/T-X^2/W^2},
\end{equation}
where $S_0$, $T$ and $W$ are the given parameters of amplitude, time scale and width of applied muscle stress.
\revision{R1Q3}{\paragraph{Order of variables and non-dimensionalization.}
The consideration above is valid for the case when the quantities of interest are either dimensional or non-dimensionalized. In what follows, we consider all units to be dimensionless. The Lagrangian function has the dimension of energy per volume, \emph{i.e.}, pressure. For simplicity, we rescale the Lagrangian function by a typical value of the elastic modulus. Then, $\alpha$ and $\beta$ in \eqref{_sp_potential_phi_xi} are of order $1$. The typical velocities can be scaled, for example, by the typical value of the speed of sound in the dry media $c \sim \sqrt{E/\rho_s}$. The time is then scaled by $T = L/c$, where $L$ is the typical value of the length of interest, for example, typical size of the muscle. We can also assume that $\rho_f \sim \rho_s$ since the cells in biological materials mostly consist of water and are also filled with water-based fluid. The value of the total momentum $M$ defined by \eqref{fluid_solid_momentum} is then expressed in terms of units $\rho_s c L$. For example, for water-based sponges $\rho_f \simeq \rho_s \simeq 1000$kg/m$^3$ with $E \sim 1$~kPa, $c \sim 1$ m/s. If $L \sim 0.1 $m then the one-dimensional total momentum is expressed in units of 100 kg$\cdot$m$^2$/s. Additional unit of length comes from the fact that the momentum is integrated over the length of the material.
}
\color{black}
\paragraph{Discretization.} Let us consider the system \eqref{PDE_XY} on a finite space interval $x \in [-L,L]$.
We discretize the system by considering the $N+2$ discrete data points $\left\{ x_0, \ldots x_{N+1} \right\} $, with $x_0=-L$ and $x_{N+1}=L$. We assume, for simplicity, a uniform discretization step $h=x_{i+1}-x_i$.
There are several types of boundary conditions: fixed, free or periodic. Let us for simplicity assume that the total extent of the $x$-domain occupied by the system is fixed, due to implemented boundary conditions holding the elastic material in a fixed place in space and not preventing the escape of fluid. Hence regarding the discretization of $X(t, x)$ we assume $X(t, -L)=X_1(t)=-L$ and $X(t,L)=X_{N+1}(t)=L$. Since $X_0$ and $X_{N+1} $ don't have any dynamics, we only consider the dynamics of $X_1, X_2,\ldots X_{N}$. Then, if the outflow of fluid from the boundaries is blocked, then we will have $Y(t, -L)=-L$ and $Y(t, L)=L$. If there is a fluid outflow from the boundaries, the nature of the boundary conditions will depend on many factors, \emph{i.e.} the need to overcome external pressure of the outside fluid, and the exact nature of the outflow. Thus, even for the fixed boundary conditions for the solid, the setting of boundary conditions for the fluid is non-trivial. The simplest ones are periodic boundary conditions, where $\xi=X-x$ and $\phi=Y-x$ are periodic with period $2 L$. We shall thus use periodic boundary conditions in our simulations.
For periodic boundary conditions, $(X_x,X_t,Y_x,Y_t)$ and their spatial derivatives are periodic function in $x$ with the period $2 L$. The forward $\Delta_i^f$ and backward $\Delta_i^b$ derivatives of any periodic function $F$ for the periodic boundary conditions is
\begin{equation}
\!\!\!\left\{
\begin{aligned}
\Delta_i^f F & = \frac{F_{i+1}-F_i }{h} , \;\; 1 \leq i<N, \;\; \Delta^f_N F =\Delta^f_1 F
\\
\Delta_i^b F & = \frac{F_{i}-F_{i-1}}{h} , \;\; 1 <i\leq N, \;\; \Delta^b_1 F = \Delta^b_N F \, .
\end{aligned}
\right.
\label{derivs_XY}
\end{equation}
Then, we can approximate the first derivative by $\Delta_i^0=(\Delta_i^f+\Delta_i^b)/2$ and second derivative by $\Delta_i^2=\Delta_i^f *\Delta_i^b$.
\rem{
In terms of $\xi(t, x)=X(t, x)-x$ and $\phi(t,x)=Y(t, x)-x$, see \eqref{xi_phi_def}, the boundary conditions \eqref{derivs_XY} are homogeneous. Alternatively, we can use periodic boundary conditions for $\xi(t,x) $ and $\phi(t,x)$ on the interval $-L<x<L$.
and given by:
\begin{equation}
\left\{
\begin{aligned}
\Delta_i^f \xi & = \frac{1}{h} \left(\xi_{i+1}-\xi \right)\, , \quad ( 1 \leq i<N), \quad \Delta^f_N \xi =- \frac{1}{h} \xi \quad \mbox{since $\xi_{N+1}=0$}
\\
\Delta_i^b \xi & = \frac{1}{h} \left( \xi_{i}-\xi_{i-1} \right)\, , \quad ( 1 <i\leq N), \quad \Delta^b_0 \xi = - \frac{1}{h} \xi \quad \mbox{since $\xi_0=0$}
\\
\Delta_i^f \phi & = \frac{1}{h} \left( \phi_{i+1}-\phi \right)\, , \quad ( 1 \leq i<N), \quad \Delta^f_N \phi = 0 \quad \mbox{since $\partial_x \phi (x=x_N) =0$}
\\
\Delta_i^b \phi & = \frac{1}{h} \left( \phi_{i}-\phi_{i-1} \right)\, , \quad ( 1 <i\leq N), \quad \Delta^b_0 \phi = 0 \quad \mbox{since $\partial_x \phi (x=x_1) =0$ } \,.
\end{aligned}
\right.
\label{derivs_XY_homogeneous}
\end{equation}
}
The results for numerical solution for $(\xi,\phi)$ with periodic boundary conditions are presented on Fig.~\ref{fig:solution}. An initial disturbance caused by the muscle action on the matrix in the center of the elastic body is propagating along the matrix, both for fluid and for elastic material, although the shape of wave propagation is different. \revision{R3Q1}{Note that the numerical solutions were also not presented in \cite{FaFGBPu2020}, as that paper was focused on the propagation of sound waves in porous media as a particular application. }
\begin{figure}[htbp]
\centering
\captionsetup{width=.8\linewidth}
\includegraphics[width=0.95 \textwidth]{./graphs/Evolution_XY}
\caption{
\label{fig:solution}
\small Example of numerical solution of \eqref{PDE_XY}. Left panel: solution for $\xi (t,x)=X(t,x)-x$ (solid), right panel: $ \eta (t,x) = Y(t,x)-x$ (fluid). For simulations presented here, the parameters for the stress in \eqref{s_eq_sims} are $S_0=0.1$, $W=1$, $T=1$. The material parameters are $g_0=0.5$, $K=1$ and $\alpha=1$, $\beta=1$ in \eqref{_sp_potential_0}.
}
\end{figure}
\subsection{Self-propulsion by periodic motion of the stress}\label{sec:self_propulsion}
Let us now consider periodic boundary conditions, $\xi(t, x+2L)=\xi(t,x)$ and $\phi(t,x+2 L) = \phi(t,x)$, with $\xi(t,x)=X(t,x)-x$ and $\phi(t,x)=Y(t,x)-x$, and also consider the case when there is a periodic motion of the muscle's stress along the porous media. More precisely, let us consider the prescribed motion of the muscle stress in the form
\begin{equation}
\begin{aligned}
&\overline{s}(t,X) = S_0 e^{ - (X-U t)_{\rm per}^2/W^2 } \, ,
\\
& (X-U t)_{\rm per}:=\left( X-U t \, {\rm mod} \, 2 L \right)-L\,.
\end{aligned}
\label{prescribed_S}
\end{equation}
One can also express \eqref{prescribed_S} by saying $(X-Ut)_{\rm per}$ is a periodic function of $X$ with the same period as $X$, with the values contained in the interval between $-L$ and $L$. It is interesting to see if such a motion of the stress along the porous body can create self-propulsion of the solid. Of course, due to the conservation of momentum given in Remark~\ref{rem:cons_mom}, equation \eqref{cons_momentum}, it is not possible to accelerate both the fluid and solid in the same direction. However, it is possible to have opposite, and non-zero net momenta of solid and fluid, as shown on Fig.~\ref{fig:momenta}. One can see that the amplitude of the net momentum is quite small.
\revision{R1Q5}{
It is important to note that the persistent oscillations in each of the momentum observed for large times on Fig.~\ref{fig:momenta} (as well as Fig.~\ref{fig:momenta_incompressible} below) are not numerical artifacts, but are due to the periodic motion of the muscle action along the media as described in \eqref{prescribed_S}. However, the equations did appear somewhat stiff, likely because of the several time scales present in the media. We used the package \emph{LSODA} from Pythons' \texttt{scipy.integrate} package, implementing Adams/backward differentiation formula (BDF) method with automatic stiffness detection and switching.
}
\color{black}
\begin{figure}[htbp]
\centering
\captionsetup{width=.8\linewidth}
\includegraphics[width=0.95 \textwidth]{./graphs/Momentum}
\caption{
\label{fig:momenta}
\small Momenta for solid $M_s = - \rho_s^0 \int _{-L}^LX_t \mbox{d} x $ (blue line) and fluid
$M_f = - \bar\rho_f^0 g_0 \int _{-L}^L Y_t \mbox{d} x $ (red line) and total momentum $M=M_f+M_s$ (black line) for a given numerical solution with zero initial conditions and prescribed traveling muscle force given by \eqref{prescribed_S} with parameters $S_0=1$, $W=1$ and $U=1$. The total momentum $M_s+M_f$ is close to $0$ with expected accuracy throughout the simulation, starting at $10^{-6}$ and increasing to a fraction of $10^{-5}$ during the computation presented.
}
\end{figure}
One could conjecture that the system is converging to a traveling wave solution, with small persistent oscillations about a steady state as illustrated on Fig.~\ref{fig:momenta}. Presumably, for biological applications, organisms would optimize the efficiency of motion and not smoothness. Thus, while considerations of traveling wave solutions are certainly possible, we will skip them here as they have, in our opinion, limited value for applications.
\section{Equations for the case when both the fluid and the solid are incompressible}
\label{sec:doubly_incompr}
\subsection{Physical justification and derivation of equations}\label{Variational_1}
From the physical point of view we may notice that for many biological materials the bulk modulus $K$ has the same order of magnitude or sometimes higher than the bulk modulus of water (2.2 GPa). The physics of this effective incompressibility can be understood from the fact that the elastic matrix consists of cells which are en large composed of incompressible water. Thus, the porous matrix can be effectively treated as incompressible elastic material. Physically, if we select an arbitrary region in porous media filled with fluid and 'lock' the fluid inside the porous matrix and won't let it escape, the volume of such region shall not change under the assumption of total incompressibility. We can express the incompressibility of the solid as follows
\begin{equation}
\label{total_incompress}
1 - g(t, {\mathbf {x} }) = (1 - g_0)\big(\boldsymbol{\Psi}^{-1}(t,{\mathbf {x} })\big) J_{\boldsymbol{\Psi}^{-1}}(t,{\mathbf {x} })\,.
\end{equation}
Notice the similarity with the incompressibility of fluid given by \eqref{cons_law_fluid}. One way to include the incompressibility of the solid given in \eqref{total_incompress} is by adding an extra term in the action enforcing this condition with a Lagrange multiplier. There is although a simpler way to reach the answer. We differentiate \eqref{total_incompress} with respect to time to get
\begin{equation}
\label{total_g_cons}
\partial_t (1-g) + \mbox{div}\,\big((1-g)\boldsymbol{u}_s\big) = 0\,.
\end{equation}
(compare with \eqref{g_cons} and \eqref{rho_s_cons}) which can be written as
\begin{equation}
\operatorname{div} ( g \boldsymbol{u}_f + (1-g) \boldsymbol{u}_s ) =0 \, .
\label{g_uf_us_constr}
\end{equation}
Since the constraint on the velocities is holonomic, we can also infer the following relationship between the variations $\boldsymbol{\eta}_s$ and $\boldsymbol{\eta}_f$
\begin{equation}
\operatorname{div} \big( g \boldsymbol{\eta}_f + (1-g) \boldsymbol{\eta}_s \big) =0 \, .
\label{eta_uf_us_constr}
\end{equation}
We introduce a Lagrange multiplier $\mu$ for \eqref{eta_uf_us_constr} and add it to the action $S$ in \eqref{action_p} as
\begin{equation}\label{action_add}
\begin{aligned}
S_I &= S - \int_0^T\!\!\int_ \mathcal{B} \mu \operatorname{div} ( g \boldsymbol{\eta}_f + (1-g) \boldsymbol{\eta}_s ) \mbox{d}^3 {\mathbf {x} }\, \mbox{d}t \\
&= S+ \int_0^T\!\!\int_ \mathcal{B} \left( g \nabla \mu \cdot \boldsymbol{\eta}_f + (1-g) \nabla \mu \cdot \boldsymbol{\eta}_s\right) \mbox{d}^3 {\mathbf {x} }\,\mbox{d}t \, .
\end{aligned}
\end{equation}
The Lagrange-d'Alembert principle with friction forces applied to $S_I$ reads, similarly to \eqref{Crit_action_muscle_2},
\begin{equation}
\delta S_I+ \int_0^T\!\!\int_ \mathcal{B} \left( \boldsymbol{F}_f \cdot \boldsymbol{\eta}_f + \boldsymbol{F}_s - \bar{s} : \nabla \boldsymbol{\eta}_s \cdot \boldsymbol{\eta}_s \right) \mbox{d}^3{\mathbf {x} } \, \mbox{d} t =0
\label{Crit_action_muscle_incompressible}
\end{equation}
and yields the system
\rem{
\todo{TF: We should also notice, that upon imposing \eqref{total_incompress}, we no longer have pore volume as an independent variable. So do we need to exclude it from the equations? At least dependence $V=V(b,v)$ makes no sense in such configuration and probably should be replaced with $V = V(b).$ Perhaps we need to use fluid incompressibility constraint in form \eqref{cons_law_fluid} and not introduce $c(b)$ and $v$ into the Lagrangian? Then all terms involving $v$ will be excluded from final equations, as well as the extra equation for the pore volume. \\
VP: You can either exclude pore volume explicitly, in which case there is no need for another Lagrange multiplier. Or, alternatively, we can keep it and have another Lagrange multiplier. Because the constraint of incompressibility is holonomic, these approaches are equivalent. They would not be if the constraint were non-holonomic. }
After collecting terms with corresponding variations, we end up with the following equations of motion. Notice the extra constraint, in comparison with \eqref{eq_gen}. The form of constraint below is the sum of the fluid and the solid incompressibility constraints.
}
\begin{equation}
\label{eq_gen_incomress}
\!\!\!\!\!\!\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\partial_t\frac{\delta \ell}{\delta \boldsymbol{u}_f}+ \pounds_{\boldsymbol{u}_f} \frac{\delta \ell}{\delta \boldsymbol{u}_f} = g \nabla \left( \frac{\delta {\ell}}{\delta g}- (p + \mu)\right)+\boldsymbol{F}_f\\
\displaystyle\vspace{0.2cm}\partial_t\frac{\delta\ell}{\delta \boldsymbol{u}_s}+ \pounds_{\boldsymbol{u}_s} \frac{\delta\ell}{\delta \boldsymbol{u}_s} = -(1-g)\nabla \mu + \rho_s\nabla \frac{\delta\ell}{\delta \rho_s} + \left(\frac{\displaystyle \delta\ell}{\displaystyle \delta b}+ p v\frac{\displaystyle \partial c}{\displaystyle \partial b}\right)\diamond b+
\operatorname{div} \overline{s} +\boldsymbol{F}_s\\
\displaystyle\vspace{0.2cm} \frac{\delta\ell}{\delta v}= - pc(b)\,,\qquad g= c(b)v\\
\vspace{0.2cm}\partial_tg + \operatorname{div}(g\boldsymbol{u}_f)=0\,,\qquad\partial_t\rho_s+\operatorname{div}(\rho_s\boldsymbol{u}_s)=0\,,\qquad \partial_tb+ \pounds_{\boldsymbol{u}_s}b=0\\
\partial_t(1-g)+\operatorname{div}((1-g)\boldsymbol{u}_s)=0\,\Rightarrow\quad\operatorname{div}(g\boldsymbol{u}_f+(1-g)\boldsymbol{u}_s)=0\,.
\end{array}\right.
\end{equation}
\revision{R1Q4}{In the equation \eqref{eq_gen_incomress}, the incompressibility conditions for fluid and solid are enforced by the Lagrange multipliers $p$ and $\mu$ respectively having the physical meaning of pressures in the fluid and solid. In addition, the last equation of that system describes an additional conservation law due to double incompressibility. }
Using the physical Lagrangian \eqref{Lagr_def}, the expanded form of totally incompressible equations of motion becomes
\begin{equation}
\label{expressions_explicit_doubly_incompress}
\!\!\!\!\!\!\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm} \bar\rho_f^0(\partial_t \boldsymbol{u}_f+ \boldsymbol{u}_f\cdot\nabla \boldsymbol{u}_f ) = - \nabla (p + \mu) + \frac{1}{g} \boldsymbol{F}_f\\
\displaystyle\vspace{0.2cm}\rho_s (\partial_t \boldsymbol{u}_s \!+\! \boldsymbol{u}_s\cdot\nabla \boldsymbol{u}_s) =g\nabla p - (1-g)\nabla\mu + \nabla \left( V\! - \!\frac{ \partial V}{ \partial v}v\right) + \operatorname{div} (\sigma _p + \overline{s}) + \boldsymbol{F}_s\\
\displaystyle\vspace{0.2cm} \frac{\displaystyle \partial V}{ \partial v}= pc(b),\qquad g= c(b)v\\
\vspace{0.2cm}\partial_tg + \operatorname{div}(g\boldsymbol{u}_f)=0,\qquad \partial_t\rho_s+\operatorname{div}(\rho_s\boldsymbol{u}_s)=0,\qquad \partial_tb+ \pounds_{\boldsymbol{u}_s}b=0\\
\vspace{0.2cm}\operatorname{div}(g\boldsymbol{u}_f+(1-g)\boldsymbol{u}_s)=0\,.
\end{array}\right.
\end{equation}
As before, under the assumptions leading to the concentration dependence $c=c_0/\sqrt{\operatorname{\det} b}$ given by \eqref{c_b_particular_neq}, the solid momentum equation in \eqref{expressions_explicit_doubly_incompress} simplifies further to
\begin{equation}\label{momentum_solid_ii}
\rho_s (\partial_t \boldsymbol{u}_s \!+\! \boldsymbol{u}_s\cdot\nabla \boldsymbol{u}_s) =g\nabla p - (1-g)\nabla\mu+ \operatorname{div} \left( \sigma_e + \bar{s} \right)+ \boldsymbol{F}_s
\end{equation}
with $ \sigma _e$ the elastic stress given in \eqref{sigma_e}.
Note that in the above equations, the pressure, while being a Lagrange multiplier for the fluid incompressibility condition, is actually specified due to the $\delta v$ condition, \emph{i.e.}, the third equation of \eqref{expressions_explicit_doubly_incompress}, exactly as in \eqref{expressions_explicit} and \eqref{expressions_explicit_muscle}. In contrast, $\mu$, the Lagrange multiplier for the incompressibility of elastic matrix, does not have an explicit expression and must be found so the solution satisfies the last equation of \eqref{expressions_explicit_doubly_incompress}.
The equation for $\mu$ can be derived explicitly by taking a time derivative of the last equation of \eqref{expressions_explicit_doubly_incompress}. For simplicity, let us rewrite the equations for velocities $\mathbf{u}_f$ and $\mathbf{u}_s$ as
\begin{equation}
\partial_t \mathbf{u}_f = \mathbf{R}_f - \frac{1}{\rho_f} \nabla \mu \, , \quad
\partial_t \mathbf{u}_s = \mathbf{R}_s - \frac{1-g}{\rho_s} \nabla \mu \, ,
\label{uf_us}
\end{equation}
where $\mathbf{R}_{f,s}$ are the right-hand sides of the fluid and solid equations excluding the $\mu$-term, which depend on the variables $(\boldsymbol{u}_f,\boldsymbol{u}_s,b,g,\rho_s)$ but not on their time derivatives. Differentiating the last equation of \eqref{expressions_explicit_doubly_incompress} with respect to time, we obtain
\begin{equation}
\!\!\!\!\!\operatorname{div} \left[ \left( \frac{g}{\bar\rho_f^0}+ \frac{(1-g)^2}{\rho_s} \right) \nabla \mu \right]
=\operatorname{div} \big(- \operatorname{div} ( g \mathbf{u}_f ) (\mathbf{u}_f-\mathbf{u}_s )
+g \mathbf{R}_f +(1-g) \mathbf{R}_s \big)
\label{eq_incompress_constraint}
\end{equation}
which is an elliptic equation for $\mu$, reminding of the regular pressure equation in a fluid.
It is also useful to interpret the equation for the fluid pressure $p$ in the doubly incompressible media. When interpreting the physical nature of the potential energy $V=V(b,v)$, one notices that if the solid is incompressible as well, then $v$ is no longer a free variable, but has a dynamics slaved to that of $b$ which, in the simplest case of uniform initial conditions, is written as $v=v(b)$, so $V(b,v) = V(b,v(b))=W(b)$. Thus, the equation for the fluid pressure seemingly would give $p=0$ since $W(b)$ does not depend on $v$. That conclusion, however, would be incorrect. One has to \emph{first} write the expression for the potential energy in terms of the microscopic volume $v$, and \emph{only then} connect $v$ to the Finger tensor $b$ after taking the derivative in the pressure equation. Thus, in general, the pressure in the fluid is not going to vanish. While this approach requires careful consideration, in our opinion, it does have merit since it is easier to compute $V(b,v)$ from general principles and then substitute $v=v(b)$. If one insists on using the expression for potential energy $W=W(b)=V(b,v(b))$ then one needs to accurately compute the derivatives of $W(b)$ as a complex function of $b$, leading to the same terms as in \eqref{expressions_explicit_doubly_incompress}.
\revision{R3Q1}{The incompressibility of both the fluid and the solid is another novel development as compared to \cite{FaFGBPu2020}. As in the previous section, we will continue the investigation incorporating the internal muscle stress using the modified Lagrange-d'Alembert principle. }
We shall further note that equations \eqref{expressions_explicit_doubly_incompress}, while correct, are somewhat difficult to interpret physically because of the presence of two pressures, $p$ and $\mu$ being the Lagrange multipliers for incompressibility of fluid and solid, respectively. With these two pressures, the interpretation of Terzaghi's principle of equating pressures within the matrix and the fluid becomes non-apparent. In Appendix~\ref{app:approach2}, we derive an alternative formulation of the equations of motion, based on thermodynamics, elucidating the nature of the two pressures and connection between them, in compressible and incompressible cases for both fluid and solid.
\revision{R1Q5}{
\begin{remark}[On incompressibility and stiffness of equations]
{\rm It is worth noting that taking the approach of strictly incompressible solid is advantageous when taking the limit of the solid to be progressively closer to being incompressible, \emph{i.e.} the bulk modulus of the material going to infinity. This could be understood on a simple example of a pendulum with a rod that is either fully rigid or very close to being rigid. A pendulum with a rigid constraint leads to a familiar equation for the angle -- the pendulum equation -- that is certainly not stiff. However, taking the limit of a softer pendulum going to an infinitely rigid limit will indeed lead to stiff equations, as we would be trying to describe the vanishingly small and increasingly fast motions of an almost rigid rod.
}
\end{remark}
}
\color{black}
\subsection{Reduction for 1D motion}
In what follows, we shall proceed with further simplification of equation \eqref{expressions_explicit_doubly_incompress}, see also \eqref{eqs_incompr_incompr_final}, to one dimension and its subsequent numerical analysis.
We follow the derivation of \eqref{PDE_XY} applied now to the doubly incompressible system \eqref{expressions_explicit_doubly_incompress}, with the solid momentum equation given in \eqref{momentum_solid_ii}, which leads to
\begin{equation}
\left\{
\begin{aligned}
& \bar\rho ^0_f g_0 \left( -Y_{tt} + 2 \frac{Y_t Y_{tx}}{Y_x} - \frac{Y_t^2 Y_{xx}}{Y_x^2} \right)\\
& \hspace{2.5cm} = - g_0 Y_x \partial_x (p+\mu)
+K \left( \frac{Y_t}{Y_x}
- \frac{X_t}{X_x} \right)
\\
& \rho_s^0 \left( -X_{tt} + 2 \frac{X_t X_{tx}}{X_x} - \frac{X_t^2 X_{xx}}{X_x^2} \right)
= g_0 Y_x \partial_x p - (1-g_0 Y_x) \partial_x \mu \\
& \hspace{2.5cm}
+\partial_x \left( \sigma_e (X_x,Y_x) + \overline{s} \right) +K \left( \frac{X_t}{X_x}
- \frac{Y_t}{Y_x} \right)
\\
& \partial _x\left( g_0 Y_t + (1-g_0 Y_x) \frac{X_t}{X_x} \right) =0, \quad p = \frac{1}{c(b)}\pp{V}{v} \, , \quad b=X_x^{-2}
\end{aligned}
\right.
\label{PDE_XY_2_incompressible}
\end{equation}
where, as before, $\sigma_e:=2 \pp{V}b b+ V $ is the elastic stress tensor reduced to the 1-dimensional case.
\rem{
\todoFGB{I don't understand $\sigma_e:=2 \operatorname{div} \left( \pp{E_s}{b} \cdot b \right) $. Here we use \eqref{expressions_explicit_doubly_incompress} as simplified in \eqref{momentum_solid_ii}. It is equivalent to the version
\[
\rho_s( \partial_t \boldsymbol{u}_s+ \boldsymbol{u}_s\cdot \nabla \boldsymbol{u}_s) = - (1-g) \nabla P+ 2\operatorname{div} \left( \rho_s \frac{\partial E_s}{\partial b}\cdot b \right) + \operatorname{div} \bar s+ \boldsymbol{F}_s
\]
given in \eqref{eqs_incompr_incompr_final}, where $P= p + \mu $. But note that from \eqref{important_relations}, $2\operatorname{div} \left( \rho_s \frac{\partial E_s}{\partial b}\cdot b \right)$ is not $ \sigma _e$, we have instead
\[
\sigma _e= 2 \frac{\partial V}{\partial b} \cdot b + V \delta = - \bar \rho _s ^2 \frac{\partial E_s}{\partial \bar \rho _s } \delta + 2 \rho _s \frac{\partial E_s}{\partial b} \cdot b.
\]
So $ \sigma _e$ is not equal to $2 \rho _s \frac{\partial E_s}{\partial b} \cdot b$ because of the term $- \bar \rho _s ^2 \frac{\partial E_s}{\partial \bar \rho _s } $ which is not zero by the second equation in \eqref{important_relations}.
To sumarize, we have
\begin{align*}
\eqref{momentum_solid_ii}&\equiv g\nabla p - (1-g)\nabla\mu+ \operatorname{div} \sigma_e \\
&= - \underbrace{(1-g)\nabla(p+\mu)}_{= \nabla P} + \underbrace{\operatorname{div} \sigma_e + \nabla p}_{= \operatorname{div} \left( 2 \rho _s \frac{\partial E_s}{\partial b} \cdot b \right) } \\
&\equiv \eqref{eqs_incompr_incompr_final}
\end{align*}
This doesn't change much below I think, just the expression to be used for $ \sigma _e$ at the end.
\textcolor{blue}{VP: I see where the difference is. I have assumed, throughout, that
\[
\pp{E_s}{\bar \rho_s}=0
\]
for incompressible solid, in the analogy with the fluid. However, it is not true in general, it seems. So that brings a question: what is the fundamental physics behind the fact that we can drop the corresponding term in the fluid $\pp{E_f}{\bar \rho_f}$, but not in the solid?
\\
Regarding the above system, I have re-written it back with an original expression involving $V$. The reason is when I tried to justify the physics of the potential we used before, I can understand the $V(b,v)$ formulation. Derivation of $E_s(\bar \rho_s,b)$ is a bit more tricky, I think. Maybe I am not used to that formulation? There is some text and a new picture below.
}
}
}
The last equation of \eqref{PDE_XY_2_incompressible} follows from the last equation of \eqref{expressions_explicit_doubly_incompress} since $g=g_0 Y_x$ by the incompressibility of fluid \eqref{cons_law_fluid} in one dimension. We can further use the reduction of solid incompressibility \eqref{total_incompress} to one dimension to get
\begin{equation}
1-g = 1-g_0 Y_x= (1-g_0) X_x \, ,
\label{eq_X_x}
\end{equation}
so the last equation of \eqref{incompressibility_cond_XY} reduces to
\begin{equation}
\partial _x \left( (1-g_0) X_t + g_0 Y_t \right) \quad \Rightarrow \quad (1-g_0) X_t + g_0 Y_t = C(t) ,
\label{incompr_cond_simplified}
\end{equation}
where the integration 'constant' in the right hand side can depend on time.
One can see that the net momentum defined as
\[
M:=\int_{-L}^L \left( \bar\rho_f^0 g u_f +\rho_s u_s\right) \mbox{d} x = - \int_{-L} ^L \left( \bar\rho^0_f g_0 Y_t +\rho_s^0 X_t \right) \mbox{d} x
\] is still conserved:
\begin{equation}
\begin{aligned}
\dot M&= -\int_{-L}^L \left( \rho_f g_0 Y_{tt} + \rho_s^0 X_{tt} \right) \mbox{d} x\\
&= \int_{-L}^L \partial _x \left( - \rho _s^0 \frac{X_t^2}{X_x} - \bar\rho_f^0 g _0\frac{Y_t^2}{Y_x} - p +
\sigma_e + \overline{s} \right) \mbox{d}x
\\
& =
\left. \left(
- \rho _s^0 \frac{X_t^2}{X_x} - \bar\rho_f^0 g _0\frac{Y_t^2}{Y_x} - p +
\sigma_e + \overline{s} \right) \,
\right|_{-L}^L \, ,
\end{aligned}
\label{cons_tot_mom}
\end{equation}
provided the boundary conditions are periodic, or chosen in such a way that the boundary terms in \eqref{cons_tot_mom} vanish.
Using the initial conditions for the Lagrangian variables $X(t=0,x)=x$ and $Y(t=0,x)=x$, we obtain a connection between the Lagrangian variables \emph{for all} $x$ and time
\begin{equation}
(1-g_0) X(t,x)+ g_0 Y(t,x) = D(t) + x \, , \quad D(t) = \int_0^t C(s) \mbox{d} s \, .
\label{Lagr_var_connect}
\end{equation}
This connection between the Lagrangian variables in porous media is, in our opinion, quite unexpected.
To proceed, we also need to compute the pressure $p$ which can be done from the double incompressibility condition, \emph{i.e.}, the last equation of
\eqref{PDE_XY_2_incompressible}. We rewrite the first two equations of that system as
\begin{equation}
X_{tt}=R_X + \frac{1-g_0Y_x}{\rho_s^0} \partial_x \mu \, , \quad
Y_{tt}=R_Y + \frac{Y_x}{\bar\rho_f^0} \partial_x \mu\, .
\label{eq_XY_short}
\end{equation}
where $R_X$ and $R_Y$ are the right-hand sides of the corresponding equations \eqref{PDE_XY_2_incompressible}
without the $p$ terms.
Differentiating equation \eqref{incompr_cond_simplified} with respect to time gives
\begin{equation}
\left[ \frac{Y_x g_0}{\rho_f} + (1-g_0) \frac{(1-g_0 Y_x) }{\rho_s^0}\right] \mu_x
= - \left( g_0 R_Y + (1-g_0) R_X \right) + C'(t) \, ,
\label{incompressibility_cond_XY}
\end{equation}
from which we express $\mu_x$ as
\begin{equation}
\begin{aligned}
& \mu_x(X_t, X_x, X_{xt}, Y_x, Y_{xt}, R_X, R_Y, C'(t); g_0, \rho_s^0, \rho_f) =
-{\mathcal A} + C'(t) { \mathcal B} \, \quad \mbox{with}
\\ & {\mathcal A} :=
\frac{ g_0 R_Y + (1-g_0) R_X }{ \frac{Y_x g_0}{\rho_f} + (1-g_0) \frac{(1-g_0 Y_x) }{\rho_s^0} },
\quad { \mathcal B}:=\frac{ 1 }{ \frac{Y_x g_0}{\rho_f} + (1-g_0) \frac{(1-g_0 Y_x) }{\rho_s^0} } \, .
\end{aligned}
\label{incompressibility_mu}
\end{equation}
Note that \eqref{incompressibility_mu} is the one-dimensional analogue of \eqref{eq_incompress_constraint} which also uses \eqref{incompr_cond_simplified} for the definition of $C(t)$.
The solution for $\mu_x$ computed from the condition \eqref{incompressibility_cond_XY} can be put back into the first two equations of \eqref{PDE_XY_2_incompressible} to form a closed system in terms of $(X,Y,X_t,Y_t)$ and its spatial derivatives. The value of $C'(t)$ is computed in such a way that the mean value of $\mu_x$ is zero for periodic boundary conditions, which gives:
\begin{equation}
C'(t)= \frac{\int_{-L}^L{\mathcal A} \mbox{d} x}{\int_{-L}^L{\mathcal B} \mbox{d} x} \,.
\label{mu_periodic}
\end{equation}
This adjustment is necessary since we have implicitly assumed that all functions, including the Lagrange multipliers, are periodic and thus all their derivatives have zero mean. The modification \eqref{mu_periodic} is not necessary for simulations on the line.
To derive the potential, we consider the following physical realization of one dimensional, doubly incompressible porous media. Consider a tube filled with an incompressible fluid, and suppose there are elastic muscle threads of negligible volume that are running along the axis of the tube. On each thread, there are rigid (and hence incompressible) beads attached to a given point on a particular thread, as illustrated on Fig.~\ref{fig:2_incompr_1d}. When the threads are stretched, the beads move inside the fluid and change the local volume of the fluid $g$ at the given Eulerian point. Then, the elastic energy is proportional to the deformation energy of the thread times the number of threads per given interval $x.$
\begin{figure}[htbp]
\centering
\captionsetup{width=.8\linewidth}
\includegraphics[width=0.7 \textwidth]{./graphs/Picture_sponges_small}
\caption{
\label{fig:2_incompr_1d}
\small A sketch of the physical realization of a one dimensional, doubly incompressible case, justifying the potential \eqref{pot_incompressible}. A channel is filled with incompressible fluid and holds solid particles on elastic strings running parallel to the axis of the channel (the $x$-axis). The space available to the fluid is dependent on the density of solid particles in a given interval $[x, x+ \mbox{d} x]$. The potential $V$ depends on the local deformations of the strings caused by the motion of the particles, the elastic properties of the strings and the number of the strings running through the channel. }
\end{figure}
\rem{
\todo{VP:
I think it is easier to understand $V(b,v)$ for the case of Fig.~\ref{fig:2_incompr_1d}, rather than $E_s$. I think for the particular case above, $V$ is quite clear, however, I have a bit of trouble understanding the dependence of $E_s$ on $\bar \rho_s$, and total energy. The coefficient $\alpha$ in the potential \eqref{pot_incompressible} depends on the deformations of strings, and the number of strings (and their elastic properties), which is a constant not dependent on density (new strings do not appear or disappear under the deformations). So, in the formula \eqref{pot_incompressible}, $\alpha = k N$ where $k$ is elasticity of the string and $N$ is the number of the string. Then, $E_s=V/\rho_s$ which is difficult to guess. I think the choice of realization, the original using $V$ or the new with $E_s$, depends on the physical problem. All our computations were done using the $V$ realization, including the symbolic computations with Python.
\\
In general, doubly incompressible case which is more general could be done like this. Suppose the circles can be deformed in such a way that they become elliptical in shape, but do not change their area. Then, the perimeter of the ellipse has to increase under the deformation, and if the border of the spherical particles is elastic, it will contribute to the potential energy of deformations. I have a bit of a hard time guessing $E_s$ in that case as well, but $V$ can be written relatively simply as well. It seems to me that the second realization with $E_s$ is more appropriate for a general 3D case for which thermodynamics application is more appropriate. It will be interesting to consider what the difference between the two cases is in terms of finding the appropriate representation of potential energy and the right approach. I think the approach with $E_s$ is more appropriate for thermodynamics considerations and $V$ for purely mechanical systems.
}
}
\revision{R1Q4}{Based on the considerations above, we suggest to use the following potential:
\begin{equation}
V(b,v) = \frac{\alpha}{2} (X_x-1)^2 = \frac{\alpha}{2} \left( \frac{1}{\sqrt{b}} -1 \right)^2 \, ,
\label{pot_incompressible}
\end{equation}
where in the physical realization presented in Fig.~\ref{fig:2_incompr_1d}, the constant $\alpha$ is dependent on the number of the springs for a cross-section of the tube and a typical elasticity of each spring. The potential can be viewed as the lowest power expansion in terms of the extension of each spring $X_x-1$, as the potential must be convex and smooth about the equilibrium $X_x=1$. Physically, this potential is simply the combined potential of multiple springs illustrated on Fig.~\ref{fig:2_incompr_1d}, expressed in terms of $X_x$ in the first equal sign, and then expressed in terms of $b$ in the second part of the equation \eqref{pot_incompressible}.
Alternatively, one can view the potential \eqref{pot_incompressible} as a particular case of \eqref{_sp_potential_0} with $\beta=0$, since the second term in \eqref{_sp_potential_0} proportional to $\beta$ describes the elastic energy due to the deformation of the pores. } With the potential \eqref{pot_incompressible}, we obtain
\begin{equation}
\sigma_e = 2 \pp{V}{b}b+V= -\frac{\alpha}{2}(X_x^2-1)\, , \quad p=\frac{1}{c}\pp{V}{v}=0\, .
\label{p_sigma_incompressible}
\end{equation}
We now present the results of numerical solutions obtained for the potential \eqref{pot_incompressible}.
First, we present a doubly incompressible computation equivalent to the case of the compressible solid presented in Fig.~\ref{fig:solution}, for the same values of parameters except setting $\beta=0$ in the the potential given by \eqref{_sp_potential_0}, \emph{i.e.}, using the potential \eqref{pot_incompressible}. Notice that the motion of the solid and the fluid acquires 'jerkiness' in the double incompressible case, since the motion is less smooth than that illustrated on the Fig.~\ref{fig:solution}.
\begin{figure}[htbp]
\centering
\captionsetup{width=.8\linewidth}
\includegraphics[width=0.95 \textwidth]{./graphs/Evolution_XY_incompressible}
\caption{
\label{fig:solution_incompressible}
\small Example of numerical solution of \eqref{PDE_XY_2_incompressible}. Left panel: solution for $X(t,x)-x$ (solid), right panel: $Y(t,x)-x$ (fluid). All parameters are as for solution presented in Fig.~\eqref{fig:solution} except for the extra incompressibility condition for the solid in \eqref{PDE_XY_2_incompressible} and change $\beta=0$ in potential \eqref{_sp_potential_0}, \emph{i.e.}, taking the the potential \eqref{pot_incompressible} with elastic stress $\sigma_e$ given by \eqref{p_sigma_incompressible}.
}
\end{figure}
Next, we show the self-propulsion due to the generation of momentum due to the traveling wave motion of the muscle stress as was discussed in Section~\ref{sec:self_propulsion} and further illustrated in \eqref{fig:momenta}. Fig.~\ref{fig:momenta_incompressible} shows the possibility of generating self-propulsion of the solid from rest due to non-zero momenta of the solid and fluid, while the net momentum of both solid and fluid is conserved and equal to $0$.
\begin{figure}[htbp]
\centering
\captionsetup{width=.8\linewidth}
\includegraphics[width=0.95 \textwidth]{./graphs/All_momenta_incompressible}
\caption{
\label{fig:momenta_incompressible}
\small Momenta for solid $M_s = - \rho_s^0 \int_{-L}^L X_t \mbox{d} x $ (blue line),
$M_f = - \rho_f g_0 \int_{-L}^L Y_t \mbox{d} x $ (red line) and the total $M_f+M_s$ (black line) for a given numerical solution with zero initial conditions and prescribed traveling muscle force given by \eqref{prescribed_S} with parameters $S_0=0.1$, $W=1$ and $U=1$. As in Fig.~\ref{fig:momenta_incompressible}, the net momentum $M_s+M_f$ is close to $0$ with expected accuracy throughout the simulation. All other parameters for simulations are taken exactly the same as in Fig.~\ref{fig:momenta}, \emph{i.e.} $g_0=0.5$, $K=1$, with the same total time of simulation $t=500$. We note that compared to \eqref{fig:momenta}, the stabilization of motion occurs on a much faster time scale compared with the compressible case.
}
\end{figure}
Furthermore, on Fig.~\ref{fig:incompressibility}, we illustrate how well the incompressibility condition is satisfied. In other words, we plot the term $(1-g_0) X + g_0 Y -x$ as a function of $x$ for all available values of $t$, which, according to the last equation in \eqref{PDE_XY_2_incompressible}, must be equal to $D(t)$, which is a constant as a function of $x$, but can vary in time.
\begin{figure}[htbp]
\centering
\captionsetup{width=.8\linewidth}
\includegraphics[width=0.95 \textwidth]{./graphs/Incompressibility_condition}
\caption{
\label{fig:incompressibility}
\small The value of $(1-g_0) X + g_0 Y-x$ computed for a set of values of $t$ in simulation output ($t=0,50,100,\ldots,500$), presented as a function of $x$. According to the equation \eqref{incompr_cond_simplified}, that expression should be independent of $x$, although can vary with $t$, which is consistent with results presented here. All solutions $(1-g_0) X + g_0 Y-x$ presented as a function of $x$ are close to horizontal lines. The distance of these horizontal lines from the $x$-axis is dependent on time as is permitted by \eqref{incompr_cond_simplified}.
}
\end{figure}
Finally, on Fig.~\ref{fig:incompressibility_vs_time}, we present the variable $D(t)=(1-g_0) X + g_0 Y-x$, expected to be independent of $x$, as defined by the last equation of \eqref{PDE_XY_2_incompressible}. Fig.~\ref{fig:incompressibility} confirms that this variable, taken as a function of $x$ for a fixed $t$, is indeed almost a constant within numerical accuracy. Thus, we compute $D(t)$ as the mean value of $(1-g_0) X + g_0 Y-x$.
\begin{figure}[htbp]
\centering
\captionsetup{width=.8\linewidth}
\includegraphics[width=0.95 \textwidth]{./graphs/Incompressibility_condition_vs_time}
\caption{
\label{fig:incompressibility_vs_time}
\small The value of $D(t)$, computed as the mean value of $(1-g_0) X + g_0 Y -x $ (mean computed with respect to the $x$-variable), as a function of time $t$, for the results presented in
Fig.~\ref{fig:incompressibility}.
}
\end{figure}
\rem{
\todo{VP: We can write an analogue of equations \eqref{expressions_explicit_muscle_simple2} here as well. They will include 2 Lagrange multipliers, and will be interesting to look into too. I think something may be wrong with one of the signs of $\mu$. I think it should be something like this, depending on the chosen sign notation for $\mu$, with $p \pm \mu$ entering in exactly the same way in both first and second equation:
\begin{equation}
\label{expressions_explicit_incompress2}
\hspace{-3mm}
\left\{
\begin{array}{l}
\displaystyle\vspace{0.2cm}\rho_f(\partial_t \boldsymbol{u}_f+ \boldsymbol{u}_f\cdot\nabla \boldsymbol{u}_f ) = - \nabla (p-\mu) + \frac{1}{g} \boldsymbol{F}_f\\
\displaystyle\vspace{0.2cm}\rho_s (\partial_t \boldsymbol{u}_s \!+\! \boldsymbol{u}_s\cdot\nabla \boldsymbol{u}_s) =g\nabla p \textcolor{red}{+} (1-g)\nabla\mu \!+\! \nabla \left( V\! - \!\frac{\partial V}{\partial v}v\right) \!-\! 2 \operatorname{div} \left[\left( p v \frac{\partial c}{\partial b}\! -\! \frac{\partial V}{\partial b}\right)\cdot b\right]\!+\! \boldsymbol{F}_s\\
\displaystyle\vspace{0.2cm} \frac{\partial V}{\partial v}= pc(b),\qquad g= c(b)v\\
\vspace{0.2cm}\partial_tg + \operatorname{div}(g\boldsymbol{u}_f)=0,\qquad \partial_t\rho_s+\operatorname{div}(\rho_s\boldsymbol{u}_s)=0,\qquad \partial_tb+ \pounds_{\boldsymbol{u}_s}b=0,\\
\vspace{0.2cm}\operatorname{div}(g\boldsymbol{u}_f+(1-g)\boldsymbol{u}_s)=0.
\end{array}\right.
\end{equation}
Then, the pressure will cancel in exactly the same way that they did in \eqref{expressions_explicit_muscle_simple2}, and the second equation will only have the static-looking terms and $\nabla \mu$, which is related to the stress of the solid. It does not have to be true, of course, but this is what my intuition tells me. Tagir - can you verify please?
}
}
\revision{EQ1\\R2Q4\\R3Q2}{\section{Conclusions}}
\noindent In this paper, we have demonstrated the following new results:
\medskip
\begin{enumerate}
\item Incompressibility of both the fluid and the matrix is introduced using a variational principle with Lagrange multiplier. The advantage of this method is the consistent approach to both phases (fluid and solid) and automatic coupling between microscopic and macroscopic variables. In addition, the balance of pressures on the fluid-solid interface is incorporated automatically by the variation with respect to the fluid volume fraction, or an equivalent variable.
\item Our theory is derived in spatial (Eulerian) coordinates which makes it more appropriate for such applications as wave propagation in porous media, in contrast to the theories based on Lagrangian coordinates.
\item Our theory is valid for arbitrary Lagrangians and arbitrary deformations of the media, and can incorporate the case of incompressible fluid and either compressible or incompressible solid.
\item An additional advantage of the variational method developed here is the automatic derivation of boundary conditions for the media in the no-stress and fixed cases.
\item We state a novel (as far as we are aware) analogue of the Lagrange-d'Alembert method for external forces to incorporate the internal stress caused by the muscle, for the case of biological materials.
\item We demonstrate that the equations of motion can be reduced exactly to one dimension and perform analytical and numerical studies of the resulting model, in the case of incompressible fluid and when the solid is either compressible or incompressible.
\item Using numerical simulations, we show the possibility of self-propulsion of the porous matrix (solid) while preserving the net-zero momentum of the fluid and solid.
\end{enumerate}
\revision{EQ1//R2Q3//R2Q4}{There are several avenues for further work based on the ideas developed in our paper.
\\
\paragraph{Biological applications.} In the future, it will be interesting to combine this work to include additional biologically relevant problems. For example, one could combine the variational methods introduced here with the previous work by the authors on the geometric variational approach to elastic tubes conveying fluid \cite{gay2014exact,gay2015flexible,gay2018stability}. Making the tube's wall porous will be relevant to other engineering \cite{heshmati2019vibration} and biological applications like arterial flow \cite{bukac2015effects}.
\\
\paragraph{Analysis of PDEs.} Due to the variational approach used here, our equations dissipate energy in the absence of muscle work. The dissipation of energy naturally gives the bounds on the solution in the phase space. While the focus of this paper is not on the rigorous mathematical analysis, it seems that the existence of solutions in the appropriate functional space can be proven quite easily. Physically, we expect the solution to be unique if the Lagrangian has appropriate convexity properties. This is just a conjecture, however, which will need to be investigated more closely.
\\
\paragraph{Boundary conditions.} For a successful implementation of variational methods for fluid-structure interaction problems, and, in particular, for understanding the outflow from the porous media, the boundary conditions for moving boundaries need to be considered in more detail, as outlined in Remark~\ref{remark:free_bnd}. Boundary conditions for porous media using variational methods have been considered before \cite{dell2009boundary,serpieri2016general}, and using geometric variational methods in the context of purely elastic media in \cite{GBMaRa12}. Thus, further investigations of boundary conditions for incompressible fluid and solid using variational methods presented here are certainly of interest.
\\
\paragraph{Variational approach to thermodynamics of porous media.} It is possible to incorporate irreversible processes and thermodynamics in variational methods \cite{gay2017variational,gay2017lagrangian,gay2017lagrangian2,GBYo2018,GBYo2019}. We have recently submitted a paper \cite{FGBPu2021} outlining the thermodynamics of porous media with heat exchange between fluid and solid. Based on the second law of thermodynamics, we have derived the equations of motion incorporating heat exchange and also derived the general form of the friction terms based on the second law of thermodynamics. Further work in the variational analysis of porous media with thermodynamics also appears to be a promising direction of future research.
\\
\paragraph{Discrete variational methods for accurate long-term computations of porous media.} It is worth noting that our numerical scheme does not take into account the variational structure of equations. For the time scales we have computed the solutions for, $t \sim 10^3$, no apparent loss of accuracy was observed in simulations. However, the computation of much longer times may need the use of variational integrators. Variational integrators conserve momenta-related quantities to machine precision and allow for accurate introduction of the friction to equations. In our case, since the friction is strictly internal to the system, variational methods can be beneficial for ensuring the long-term preservation of momenta of combined fluid-solid system. It is especially important for computations of the motion in two or three dimensions, and in the case where the fluid viscosity, and, correspondingly, the friction forces, is relatively small. We refer the reader to \cite{WeMa1997,MaWe2001} for the general theory of variational integrators and to \cite{gay2016variational,FGBPu2020} for the derivations of variational integrators for fluid-structure interactions with incompressibility constraint, in particular, for the application to the motion of an elastic tube filled with an incompressible fluid. }
\color{black}
|
\section{Introduction}
Artist Mark Lombardi drew beautiful diagrams of international political and financial conspiracies, often using curved edges and circular layouts~\cite{HobRic-03}. His name is commemorated in Lombardi drawing, a style of graph drawing in which the edges are drawn as circular arcs that meet at equal angles at each vertex~\cite{DunEppGoo-DCG-13,DunEppGoo-JGAA-12}. Many kinds of graph are now known to have Lombardi drawings, including for instance all 2-degenerate graphs, the graphs that can be formed from a single edge by repeatedly adding a new vertex incident to at most two previous vertices~\cite{DunEppGoo-JGAA-12}. Beyond their aesthetic quality, these drawings can be considerably more compact than straight-line drawings of the same graphs~\cite{DunEppGoo-DCG-13}, and they have found application in the realization of soap bubble foams~\cite{Epp-DCG-14} and in the visualization of knots and links~\cite{KinKobLof-JoCG-19}.
In this style of drawing, it is of interest, when possible, to avoid any crossings or intersections of edges other than at shared endpoints, forming a planar drawing~\cite{DunEppGoo-JoCG-18}. Obviously, this requires that the graph to be drawn be planar, but not every planar graph has a planar Lombardi drawing~\cite{DunEppGoo-JGAA-12}. The planar graphs known to have planar Lombardi drawings include the trees~\cite{DunEppGoo-DCG-13}, the subcubic planar graphs~\cite{Epp-DCG-14}, the 4-regular polyhedral graphs~\cite{Epp-DCG-14}, the Halin graphs~\cite{DunEppGoo-JGAA-12}, and the outerpaths~\cite{DunEppGoo-JoCG-18}. However, examples of planar graphs with no planar Lombardi drawing have been found for graph classes including the 4-regular graphs~\cite{Epp-DCG-14}, planar 3-trees~\cite{DunEppGoo-JoCG-18}, and planar bipartite graphs~\cite{Epp-CCCG-19}. In addition, for planar graphs with a fixed choice of embedding, a planar Lombardi drawing might not exist even when the given graph is series-parallel~\cite{Epp-CCCG-19}.
For some of the simplest classes of planar graphs (notably, the outerplanar graphs) the existence of planar Lombardi drawings has remained unknown. In this work, we tackle an even simpler class of graphs, the cacti. Intuitively, a cactus is a tree of cycles; it can be defined as a graph in which each edge belongs to at most one cycle. These graphs have a natural class of planar embeddings in which their cycles form faces of the embedding, with the rest of the graph always drawn outside of the cycle. In this paper, we show that these embeddings of cacti always have Lombardi drawings. However, we find examples of other embeddings of cacti (including one as simple as a triangle with four leaf vertices attached to each triangle vertex) that have no planar Lombardi drawing.
The cycles of any planar Lombardi drawing form simple closed curves in the plane, with sides composed of circular arcs; we call these shapes arc-polygons. The constraints of a Lombardi drawing translate into constraints on the vertex angles of these arc-polygons, and naturally raise the question of which systems of angles can be realized by an arc-polygon and what other geometric properties their realizations have. For instance, the analysis of arc-quadrilaterals with equal angles at all vertices, and the key property of these arc-quadrilaterals that their vertices are all cocircular, figured heavily into our previous work on Lombardi drawings of 4-regular graphs~\cite{Epp-DCG-14}, planar bipartite graphs, and embedded series-parallel graphs~\cite{Epp-CCCG-19}. Here, we focus on arc-triangles, the simplest (and therefore most highly constrained) shapes needed for the faces of Lombardi drawings of cacti. We completely characterize the triples of angles that can be realized by simple arc-triangles; this characterization forms the basis of our proof that some embedded cacti have no planar Lombardi drawing. We also use the same characterization to prove a natural sufficient condition for the existence of a simple arc-polygon with specified interior angles: such an arc-polygon exists whenever all of the specified angles are at most $\pi$. Larger angles than this are not needed for the Lombardi drawings of the natural embeddings of cacti, from which it follows that all cacti have planar Lombardi drawings for their natural embeddings.
\subsection{New results}
The main results that we prove in this work are the following.
\begin{itemize}
\item We completely characterize the triples of angles that can be realized as the internal angles of arc-triangles, in terms of a system of linear inequalities on the angles (\cref{thm:triangle}).
\item We prove that every cyclic sequence of three or more angles, all of which are in the range $[0,\pi]$, except for the triple $(0,0,\pi)$, can be realized as the internal angles of an arc-polygon (\cref{thm:up-to-pi}).
\item We prove that every cactus graph has a planar Lombardi drawing in its natural planar embedding, the embedding in which every cycle is a face (\cref{thm:natural-cactus}).
\item We find an embedded cactus graph that does not have a planar Lombardi drawing for that embedding (\cref{thm:bad-hat}).
\end{itemize}
\subsection{Related work}
As well as in Lombardi drawing, circular arcs have been incorporated in other ways into graph drawing; see for instance~\cite{CheDunGoo-DCG-01,EfrErtKob-JGAA-07,AngEppFra-JGAA-14,Schu-JGAA-15,CarHofKus-CG-18}. Force-directed methods can often achieve good but not perfect angular resolution for arc-based graph drawings~\cite{CheCunGoo-GD-11,BanEppGoo-GD-12,DonFuXu-CVS-13}, and the effectiveness of curved edges in graph drawing has been tested through user studies~\cite{XuRooPas-TVCG-12,PurHamNol-GD-12,Dud-PhD-16}.
The cactus graphs whose drawings we study here are an old and well-studied class of graphs~\cite{Hus-JCP-50,HarUhl-PNAS-53}. Cactus graphs are one of the most basic minor-closed families of graphs, defined (as simple graphs) by the absence of a diamond graph minor or (as multigraphs) by the absence of a 3-edge dipole graph minor. In graph drawing, cactus graphs play a key role in the proof that polyhedral graphs have greedy embeddings~\cite{LeiMoi-DCG-10}, in the visualization of minimum cuts~\cite{BraCorFie-CGTA-04}, and in the approximation of maximum planar subgraphs~\cite{CalFerFin-Algs-98}. The question of whether cactus graphs have Lombardi drawings was explicitly posed by our previous work on the non-existence of Lombardi drawings for certain bipartite planar graphs~\cite{Epp-CCCG-19}; this question was the main motivation for our present work.
\begin{figure}[t]
\centering\includegraphics[width=0.3\columnwidth]{boscovich}
\caption{Roger Boscovich's arc-triangle formed from three semicircles has the property that every line through its cusp partitions the perimeter into two equal lengths.}
\label{fig:boscovich}
\end{figure}
Beyond our work's contributions to graph drawing, we believe that it contributes to the fundamental study of arc-polygons. These are a natural and important class of two-dimensional shapes whose long history of study can be traced back to the work of Archimedes and Pappus on the arbelos, an arc-triangle formed by three semicircles on the same side of a line, to the use of the Reuleaux triangle in Gothic architecture and by Leonardo da Vinci for map projection and fortress floor plans, and to the work of 18th-century mathematician Roger Boscovich on shapes that have a center through which every line bisects the perimeter (\cref{fig:boscovich})~\cite{BanGib-AMM-94}. It has been stated that ``more than 90\% of machined parts'' have arc-polygon shapes, because of their ease of manufacturing~\cite{CheVenWu-IVC-96}, and arc-polygons have been used to model the shapes for irregular parts to be packed into and cut from metal sheets~\cite{PlaTseShy-ICTME-20}. Arc-polygons can accurately approximate arbitrary smooth curves~\cite{Fej-BAMS-48,MeeWal-JCAM-95}, and their approximations of non-smooth curves form a useful stepping stone to the Riemann mapping theorem~\cite{Kel-BAMS-26}. Aichholzer et al.~\cite{AicAurHac-IJCGA-11} argue that for approximating irregular shapes in this way, arc-polygons have significant advantages over straight-sided polygons in allowing more concise and accurate representations while still allowing efficient computations of basic geometric primitives such as medial axes. For additional work on the computational geometry of these shapes see~\cite{AicAigAur-JGAA-15,WeiJutAur-EuroCG-18,WanLinFan-CAD-17}.
\section{Preliminaries}
\subsection{Arc-polygons}
\begin{definition}
We define an \emph{arc-polygon} to be a cyclic sequence that alternates between points and closed circular arcs in the Euclidean plane, with each arc appearing in the sequence consecutively with its two endpoints. (Here, we allow line segments to count as a degenerate special case of circular arcs.) The points of the arc-polygon are called its \emph{vertices} and the arcs are called its \emph{edges}. In particular, an \emph{arc-triangle} is an arc-polygon with three vertices and three edges. An arc-polygon is \emph{simple} if the only points of intersection between pairs of its edges are shared vertices consecutive with both edges. The union of the arcs in a simple arc-polygon forms a Jordan curve, which separates the plane into two components, the \emph{interior} and \emph{exterior} of the arc-polygon. We define the \emph{interior angle} of a vertex of a simple arc-polygon to be the angle between tangent lines to its two arcs at that vertex, spanning the interior of the arc-polygon in a (possibly empty) neighborhood of the vertex.
Unlike classical straight-sided polygons, it is also possible to form arc-polygons with only two vertices and two sides.
As in \cite{Epp-CCCG-19}, we call these \emph{bigons}.
\end{definition}
A bigon with two different arcs as sides is automatically simple: two different circles can cross in at most two points, and these two crossing points are used up by the vertices of the bigon, so no more crossings are possible. The two interior angles of a bigon must be equal, and can be any angle in the open interval $(0,2\pi)$. It will be convenient to consider an arc-polygon with two identical arcs to be a kind of degenerate bigon, with interior angle $0$.
\subsection{Lombardi drawings}
\begin{definition}
We define a \emph{Lombardi drawing} of a given graph to be a mapping from the vertices of the graph to points in the plane, and from the edges to circular arcs or straight line segments, with the following two properties:
\begin{itemize}
\item For each edge, the two endpoints of the edge in the graph are mapped to the two endpoints of its arc in the plane.
\item For each vertex $v$, the incident edges form arcs that are equally spaced around the point representing $v$, forming angles of $2\pi/\operatorname{deg}(v)$ between each consecutive pair of arcs.
\end{itemize}
A Lombardi drawing is \emph{planar} if the only points of intersection between pairs of its arcs are shared vertices.
\end{definition}
\subsection{M\"obius transformations}
By the \emph{extended plane} we mean the Euclidean plane augmented with a single point at infinity, denoted $\infty$.
An \emph{inversion} of the extended plane, with respect to a circle~$C$, maps each point $p$ to another point $p'$, so that $p$ and $p'$ both belong to a single ray from the center of $C$, with the product of their distances from the center equal to the squared radius of $C$. The center of $C$ is mapped to $\infty$, and vice versa. We consider a reflection of the plane to be a degenerate case of an inversion, and we consider the line of reflection to be a degenerate case of a circle with infinite radius. A \emph{M\"obius transformation} is any functional composition of inversions. These transformations map circles (or degenerate circles) to other circles (or degenerate circles), and preserve the angles between any two curves. For an introduction to these transformations, and the geometry of circles under these transformations, see e.g. \cite{Sch-79}.
Because M\"obius transformations map circular arcs (or straight line segments) to curves of the same type, and preserve angles, they map simple arc-polygons to other simple arc-polygons and Lombardi drawings to other Lombardi drawings.
It is possible for a M\"obius transformation to map the interior of a simple arc-polygon to its exterior and vice versa, but otherwise these transformations leave the angles of arc-polygons unchanged. As previous work on Lombardi drawing has already shown~\cite{Epp-DCG-14}, these properties make M\"obius transformations very convenient as a tool for bringing pieces of arc-polygons and of Lombardi drawings into a position where they can be glued together.
\section{Arc-triangles}
\begin{figure}[t]
\centering\includegraphics[scale=0.4]{starfleet}
\caption{A simple arc-triangle (blue), the circle through its three vertices (yellow), and the three bigons between the arc-triangle and the circle, labeled with vertices $v_i$, arc-triangle angles $\theta_i$, and bigon angles $\phi_i$.}
\label{fig:starfleet}
\end{figure}
Consider an arbitrary simple arc-triangle with vertices $v_i$ and interior angles $\theta_i$ (for $i\in\{0,1,2\}$), for instance the one in \cref{fig:boscovich} (for which the interior angles are $2\pi,\pi,\pi$) or the one in \cref{fig:starfleet}. Any three points are contained either in a unique circle or a straight line, but for the following definitions we need to know which side of the circle is its inside and which its outside, so we assume (by perturbing the triangle by a M\"obius transformation, if necessary) that the three vertices are not collinear, and are clockwise as $v_0$, $v_1$, and $v_2$ on the circle $C$ through them. We assume also that these three vertices have the same clockwise ordering on the arc-triangle, as shown in \cref{fig:starfleet}, meaning that when traveling along the arcs from $v_0$ to $v_1$, from $v_1$ to $v_2$, and from $v_2$ to $v_0$, the polygon is consistently on the right side of each arc; if necessary, this can be achieved by an inversion with respect to $C$.
Let $\theta_i$ be the interior angle of the arc-triangle at vertex $v_i$, as labeled on the figure. Each arc of the triangle is separated from $C$ by a bigon, and (in the case that the arc is contained in $C$) we let $\phi_i$ denote the angle of the bigon opposite vertex $v_i$. It is also possible for an arc to lie on $C$, defining a degenerate bigon with $\phi_i=0$. If an arc of the arc-triangle lies outside $C$, it still defines a bigon, but in this case we define $\phi_i$ to be a negative number, the negation of the interior angle of the bigon.
\begin{observation}
\label{obs:linear}
For angles $\theta_i$ and $\phi_i$ defined as above from a simple arc-triangle, and for $i\in\{0,1,2\}$,
\[ \theta_i + \phi_{(i-1)\bmod{3}} + \phi_{(i+1)\bmod{3}} = \pi. \]
\end{observation}
\begin{proof}
The three angles on the left hand side are the angles at $v_i$ measured clockwise from the arc of $C$ clockwise of $v_i$ to the side of the arc-triangle clockwise of $v_i$, from this side of the arc-triangle to the other side, and from the other side of the arc-triangle to the arc of $C$ counter-counterclockwise of $v_i$. Therefore, their sum is the total angle at $v_i$ between the two arcs of $C$, which is just $\pi$.
\end{proof}
\begin{corollary}
\label{cor:phi}
Let $\psi=(\pi-\sum\theta_i)/2$. Then $ \phi_i = \psi+\theta_i$.
\end{corollary}
\begin{proof}
Simple algebra verifies that this is the solution to the system of three linear equations in three unknowns given by \cref{obs:linear}.
\end{proof}
\begin{lemma}
\label{lem:1bad}
For three given angles $\theta_i$ with $0\le\theta_i\le 2\pi$, at most one of the angles $\phi_i$ calculated from the formula of \cref{cor:phi} can fail to satisfy $-\pi\le\phi_i\le\pi$.
If $\phi_i<-\pi$ then $\theta_i$ must be the only angle of the three given angles that is less than $\pi$; if $\phi_i>\pi$ then $\theta_i$ must be the only angle of the three given angles that is greater than~$\pi$.
\end{lemma}
\begin{proof}
Consider the three angles $\theta_i$ and the angle $\pi$, listed in sorted order. Each $\phi_i$ is obtained by adding two of these angles, subtracting the other two, and dividing the total by two; in terms of the sorted ordering of the angles, we can represent this
(up to the sign of $\phi_i$) as one of the three sign patterns $++--$, $+-+-$, or $+--+$.
However, only the first of these can produce a value of $\phi_i$ that is out of range.
The other two sign patterns describe the difference of the smallest two angles, plus or minus the difference of the largest two angles. Because these two differences span different ranges of angles, they can sum to at most $2\pi$ (and must sum to at least $-2\pi$). Therefore, for these other two sign patterns, division by two produces a value in the range between $-\pi$ and~$\pi$.
For the sign pattern $++--$, $\pi$ cannot be the maximum or minimum of the three angles, because if it were then each difference of angles would be at most $\pi$, and so would the average of two differences. So when this sign pattern leads to a value of $\phi_i$ that is out of range, there is a unique angle $\theta_i$ with the same sign in the sign pattern, implying the second part of the lemma.
\end{proof}
\begin{figure}[t]
\includegraphics[width=0.5\columnwidth]{crossed}
\caption{For some triples of angles $\theta_i$, using \cref{cor:phi} to compute angles $\phi_i$ and then drawing arcs with these angles may not produce a simple arc-triangle. Left: $\theta_i=0,4\pi/3,5\pi/3$ (at the top, right, and left vertices, respectively) and $\phi_i=-\pi,\pi/3,2\pi/3$. The arc with angle $\phi_i=-\pi$ overlays the opposite vertex. Right: $\theta_i=0,3\pi/2,11\pi/6$, $\phi_i=-7\pi/6,\pi/3,2\pi/3$. The arc with angle $\phi_i=-7\pi/6$ crosses the other two arcs.}
\label{fig:crossed}
\end{figure}
The definitions above of $\theta_i$ and $\phi_i$ are only for simple arc-triangles, but one can also plug in other choices of $\theta_i$, compute $\phi_i$ from them, and examine the arc-triangles that result, which may not be simple. Examples of what can go wrong are depicted in \cref{fig:crossed}: the left arc-triangle of the figure has a vertex on the opposite side arc, and the right arc-triangle has two crossing pairs of arcs.
\begin{theorem}
\label{thm:triangle}
Three given angles $\theta_i$ with $0\le\theta_i\le 2\pi$ can be realized as the interior angles of a simple arc-triangle if and only if the angles $\phi_i$, as calculated by \cref{cor:phi}, satisfy the inequalities $-\pi<\phi_i<\pi$.
\end{theorem}
\begin{proof}
By \cref{cor:phi}, a realization must have the form shown in \cref{fig:starfleet}: three circular arcs making angles of $\phi_i$ to the circumcircle of the three vertices. The location of these vertices on the circumcircle, and the location of the circumcircle, are not important, as any three points may be transformed into any other three points by a M\"obius transformation. The important question for the realizability of these angles by an arc-triangle is whether these three arcs form a simple arc-triangle $\Delta$, or whether they have undesired crossings.
First, let us disprove the existence of a realization when the angles $\phi_i$ do not satisfy the inequalities.
Consider the case that some $\phi_i=\pm\pi$. In this case, the arc with angle $\phi_i$, opposite vertex $v_i$, coincides with an arc of the circumcircle passing through vertex $v_i$. Since a simple arc-triangle is not allowed to have one of its sides passing through the opposite vertex, the angles in this case cannot come from a simple arc-triangle.
Next, instead suppose that there is an angle $\phi_i$ that is out of range: $\phi_i<-\pi$ or $\phi_i>\pi$.
By \cref{lem:1bad}, it must be the only angle with this property. In the case that $\phi_i<-\pi$, consider continuously increasing $\phi_i$ (and decreasing the two given angles that are not $\theta_i$ to match) until it is greater than $-\pi$.
By the second part of \cref{lem:1bad}, this decrease in the given angles cannot cause them to become negative. At the end of the sequence, the angles meet the conditions of the previous case of the theorem, producing a simple arc-triangle, but at the point in the sequence where $\phi_i$ becomes equal to $-\pi$, and the arc with angle $\phi_i$ crosses over vertex $v_i$, two crossings with the other two arcs are removed. There is no combinatorial change to the configuration of arcs and their crossings anywhere else in the sequence, so these two crossings must have been present in the configuration with the given angle~$\phi_i$. In the case when $\phi_i>\pi$, instead continuously decrease $\phi_i$ until it is less than $\pi$; the remaining argument is the same.
Finally, let us prove that angles $\phi_i$ satisfying the inequalities must be simple. Suppose all $\phi_i$ obey $-\pi<\phi_i<\pi$. Then it is impossible for the two arcs at $v_i$ to cross.
If the values of $\phi$ corresponding to these two arcs have opposite signs, then one is inside the circumcircle and the other outside, and if one has sign zero, then it lies on an arc of the circumcircle inaccessible to the other. If both arcs have values of $\phi$ with the same sign, then they leave the circumcircle at $v_i$ in a relative ordering, determined by their angle at $v_i$, that is consistent with the relative ordering at which they reach the circumcircle again at the other two vertices, determined by the positions of those two vertices. Since circular arcs can meet only twice, and these two arcs meet once at $v_i$, any additional crossing would swap their relative positions, so they cannot cross.
\end{proof}
\begin{figure}[t]
\centering\includegraphics[width=0.3\columnwidth]{feasible}
\caption{Polyhedral visualization of the subset of triples of angles that can be realized by simple arc-triangles.}
\label{fig:feasible}
\end{figure}
The linear inequalities $0\le\theta_i\le 2\pi$ can be thought of as defining a cube in a three-dimensional space having the angles $\theta_i$ as Cartesian coordinates. For this interpretation of these numbers, the additional linear inequalities $-\pi<\phi_i<\pi$ cut off six of the eight corners of the cube (the corners where not all coordinate values are equal), replacing them by equilateral triangle faces whose vertices are midpoints of the cube edges. The result of this truncation is a feasible region of triples of angles that can be realized by simple arc-triangles, bounded by six pentagonal faces (the truncated faces of the cube) and six triangular faces (the inequalities on $\phi_i$). It is depicted in \cref{fig:feasible}. The result in \cref{lem:1bad} that only one of the inequalities on $\phi_i$ can be exceeded corresponds geometrically to the fact that the triangular faces meet only in vertices, not in edges. At the vertices where two triangular faces meet, two of these inequalities on $\phi_i$ are exactly met but neither is exceeded.
We remark that it is straightforward to implement this construction of a simple arc-triangle for given angles and given triangle vertices, by computing the circumcircle of the vertices and the angle made by the triangle arcs to this circumcircle.
\section{Arc-polygons}
We do not have a complete characterization of the angle sequences of higher-order simple arc-polygons, as we do for arc-triangles. Instead, we prove a sufficient condition, which will be enough for our application to Lombardi drawing: with a single exception, an angle sequence can be realized by a simple arc-polygon whenever all angles are $\le\pi$. For triangles, this follows from our previous characterization:
\begin{lemma}
\label{lem:polygon-base}
If a triple of given angles $\theta_i$ all lie in the range $0\le\theta_i\le\pi$ and is not a permutation of $(0,0,\pi)$ then there exists a simple arc-triangle having these interior angles.
\end{lemma}
\begin{proof}
For these angles, the values of $\phi_i$ calculated according to \cref{cor:phi} range from a minimum of $-\pi/2$ (when $\theta_i=0$ and both other given angles are $\pi$) to a maximum of $\pi$ (when $\theta_i=\pi$ and both other given angles are $0$). Because the angles $(0,0,\pi)$ are the only combination achieving this maximum, all other triples of angles result in $-\pi/2\le\phi_i<\pi$. The result follows from \cref{thm:triangle}.
\end{proof}
We also need the following two special cases:
\begin{figure}[t]
\centering\includegraphics[width=0.5\columnwidth]{kilroy}
\caption{Arc-quadrilaterals with interior angles $(0,0,\pi,\pi)$ (left, yellow) and $(0,\pi,0,\pi)$ (right, blue).}
\label{fig:kilroy}
\end{figure}
\begin{observation}
\label{obs:kilroy}
The sequences $(0,0,\pi,\pi)$ and $(0,\pi,0,\pi)$ can be realized as the interior angles of arc-quadrilaterals.
\end{observation}
\begin{proof}
See \cref{fig:kilroy}, which realizes these sequences using four vertices equally spaced along a line, with semicircular arcs.
\end{proof}
For higher-order polygons, we will prove the existence of a simple realization by induction on the order of the polygon, gluing together arc-polygons with fewer vertices at \emph{cusps}, vertices of interior angle zero.
\begin{definition}
If $\sigma$ and $\tau$ denote sequences of angles, we let $\sigma\tau$ denote their concatenation, and we let $\sigma0$ and $\tau0$ denote the sequences of angles obtained from $\sigma$ and $\tau$ respectively by including one more angle equal to zero.
\end{definition}
With this notation, the following lemma describes the process of gluing together two arc-polygons.
\begin{lemma}
\label{lem:polygon-glue}
Let $\sigma$ and $\tau$ both be sequences of angles such that the augmented sequences $\sigma0$ and $\tau0$ are realizable as the sequences of interior angles of simple arc-polygons. Then the concatenation $\sigma\tau$ is also realizable by a simple arc-polygon.
\end{lemma}
\begin{proof}
Let $S$ and $T$ be simple arc-polygons realizing $\sigma_0$ and $\tau_0$ respectively. Apply inversions separately to~$S$ and $T$, centered respectively on the cusps of $S$ and $T$, producing arc-polygons $S'$ and $T'$. Both $S'$ and $T'$ have their cusp transformed to lie at $\infty$, and the circular arcs incident to these cusps transformed into infinite rays. All other vertices and edges of $S'$ and $T'$ remain finite. The condition that the angle at the cusp be zero in $S$ and $T$ corresponds, in $S'$ and $T'$, to the condition that these two rays be parallel. By adjusting the radii of the inversions we can additionally ensure that in both $S'$ and $T'$ the rays lie on lines at distance one from each other. By rotating $S'$ and $T'$ so that their pairs of rays both lie on the same two lines, in opposite directions, and translating them far enough apart along these two parallel lines, we may glue them together into a single simple arc-polygon, as shown in \cref{fig:glue-infinite-cusps}, giving a realization of $\sigma\tau$.
\end{proof}
\begin{figure}[t]
\centering\includegraphics[width=0.4\columnwidth]{glue-infinite-cusps}
\caption{Gluing together two simple arc-polygons with cusps at infinity, realizing angle sequences $\sigma0$ and $\tau0$, to produce a single arc-polygon realizing angle sequence~$\sigma\tau$.}
\label{fig:glue-infinite-cusps}
\end{figure}
\begin{theorem}
\label{thm:up-to-pi}
A finite sequence of three or more angles $\theta_i$ can be realized as the interior angles of a simple arc-polygon whenever all angles satisfy $0\le\theta_i\le\pi$ and the sequence is not a permutation of $(0,0,\pi)$.
\end{theorem}
\begin{proof}
We use induction on the number of angles, with \cref{lem:polygon-base} as a base case for sequences of exactly three angles and \cref{obs:kilroy} for the two four-angle-sequences $(0,0,\pi,\pi)$ and $(0,\pi,0,\pi)$ and their cyclic permutations.
For any other sequence of more than three angles that includes $\pi$ as one of its angles, we form a shorter sequence by removing the $\pi$, realize the shorter sequence as the interior angles of a simple arc-polygon by the induction hypothesis, and then reinsert the vertex with angle $\pi$ anywhere along the circular arc between its two neighbors in the resulting arc-polygon.
For a sequence of more than three angles that does not include $\pi$ as an angle, partition the sequence into a concatenation $\sigma\tau$ where both $\sigma$ and $\tau$ contain at least two angles. By the induction hypothesis, both $\sigma0$ and $\tau0$ are realizable, so by \cref{lem:polygon-glue} their concatenation $\sigma\tau$ is also realizable.
\end{proof}
It is tempting to guess that all sequences of four or more angles are realizable by simple arc-polygons, but this is not true, as the following example demonstrates.
\begin{figure}[t]
\centering\includegraphics[width=0.3\columnwidth]{moons}
\caption{Interior angles that alternate between $0$ and $2\pi$ force the arcs of a simple arc-polygon to be confined to a sequence of nested circles.}
\label{fig:moons}
\end{figure}
\begin{observation}
In a simple arc-polygon, if the two interior angles at the vertices of a given arc $A$ are $0$ and $2\pi$, then the two adjacent arcs lie on opposite sides of the circle through $A$.
\end{observation}
\begin{proof}
The arcs are tangent to $A$, and two circles that are tangent cannot cross. The choice of angles ensures that, near the point of tangency, the arcs are on opposite sides of the circle, and because they cannot cross this circle they remain on opposite sides for their entire length.
\end{proof}
\begin{corollary}
\label{cor:no-zigzag}
It is not possible for a simple arc-polygon with an even number of sides to have angles that alternate between $0$ and $2\pi$ around the polygon.
\end{corollary}
\begin{proof}
The alternation would cause the sides to belong to a sequence of nested circles (\cref{fig:moons}), from which it would be impossible to loop back around from the innermost to the outermost circle.
\end{proof}
\section{Lombardi drawing}
\subsection{Existence}
As stated in the introduction, a \emph{cactus} is a graph in which each edge belongs to at most one cycle. In the natural embedding of a cactus, each cycle forms a face, with the other edges that are incident to each cycle vertex placed outside the face. At a vertex of degree $d\ge 2$, the interior angle of the cycle will be $2\pi/d$. Because all angles are nonzero and at most $\pi$, the sequence of interior angles meets the conditions of \cref{thm:up-to-pi}, allowing the face to be drawn as a simple arc-polygon. Each edge belongs to at most one cycle, and the edges that do not belong to cycles are even easier to draw (on their own) as line segments. To construct a Lombardi drawing for the entire graph, we glue these pieces of drawings together using M\"obius transformations, similar to the gluing process used to construct arc-polygons in \cref{lem:polygon-glue}.
\begin{definition}
If $G$ is an embedded graph, and $H$ is a subgraph of $G$ we define a \emph{partial Lombardi drawing} of $H$ with respect to $G$ to be a drawing of the vertices and edges of $H$ as points and circular arcs, in the manner of a Lombardi drawing, with pairs of circular arcs that meet at a vertex having the angle that they would be required to have in a Lombardi drawing of $G$. We define a partial Lombardi drawing to be \emph{planar} in the same way as for a full Lombardi drawing: the only intersection points of arcs are shared endpoints.
\end{definition}
The \emph{biconnected components} of a cactus are its cycles and its edges that do not belong to cycles. Its \emph{articulation points} are the vertices that belong to more than one biconnected component. The reasoning above proves the following observation:
\begin{observation}
\label{obs:cactus-blocks}
Each biconnected component of a cactus has a planar partial Lombardi drawing with respect to the natural embedding of the cactus.
\end{observation}
\begin{lemma}
\label{lem:cactus-glue}
Let $H_i$ be a collection of subgraphs of a given graph $G$ that all share a common vertex $v$, with no other pairwise intersections, let $G$ be given a planar embedding in which the edges of each subgraph $H_i$ appear consecutively at $v$, and let each $H_i$ have a planar partial Lombardi drawing with respect to $G$. Then the union $\cup H_i$ also has a planar partial Lombardi drawing with respect to $G$.
\end{lemma}
\begin{proof}
Perform an inversion centered at $v$ on each drawing of $H_i$, producing a drawing where $v$ is at $\infty$ and its incident edges have become rays, radiating outward from the finite part of the drawing, with relative angles equal to the angles they should have at $v$ in a Lombardi drawing of $G$.
Let $v$ have degree $d$ in $G$, and draw a system of $d$ rays meeting at the origin in the plane, separated from each other by angles of $2\pi/d$. Assign consecutive subsets of rays to each subgraph $H_i$, according to its number of edges incident to $v$. Additionally assign to each subgraph $H_i$ a wedge of the plane, with the apex as the origin, extending beyond these assigned rays to an additional angle of $\pi/d$ on both sides. This assignment produces open wedges for each $H_i$, within which (after a suitable rotation) each may be placed; we place each $H_i$ so that its rays are parallel to the rays it is assigned, but we do not require these rays to coincide. Because the wedges are open, they are disjoint from each other and from the origin.
Once all of the drawings of subgraphs have been placed in this way, another inversion centered at the origin returns the drawing to a state in which all vertices and arcs are finite. All of the angles within each drawing of each subgraph $H_i$ have been preserved, and the rays to $\infty$ invert to circular arcs meeting at $v$ at the desired angles.
\end{proof}
\begin{theorem}
\label{thm:natural-cactus}
Every cactus has a planar Lombardi drawing for its natural embedding.
\end{theorem}
\begin{proof}
We construct planar Lombardi drawings for each biconnected component of the cactus by \cref{obs:cactus-blocks}, and glue these partial drawings into partial drawings for larger subgraphs by applying \cref{lem:cactus-glue} at each articulation point of the cactus, until the entire drawing has been glued together. Each step preserves planarity, so the resulting Lombardi drawing is planar.
\end{proof}
\subsection{Nonexistence}
\begin{figure}
\centering\includegraphics[width=0.4\columnwidth]{badhat}
\caption{An embedded cactus that has no planar Lombardi drawing.}
\label{fig:badhat}
\end{figure}
\begin{theorem}
\label{thm:bad-hat}
The embedded cactus depicted in \cref{fig:badhat}, consisting of a 3-cycle with four pendant vertices at each 3-cycle vertex, embedded so that the pendant vertices are outside the 3-cycle at two 3-cycle vertices and inside at one, has no planar Lombardi drawing.
\end{theorem}
\begin{proof}
A planar Lombardi drawing of this embedded graph would draw its 3-cycle as a simple arc-triangle with angles $\theta_i$ of $\pi/3$, $\pi/3$, and $5\pi/3$. A calculation following \cref{cor:phi} shows that these angles produce corresponding angles $\phi_i$ of $-\pi/3$, $-\pi/3$, and $\pi$, respectively. Since one of the angles $\phi_i$ is $\pi$, \cref{thm:triangle} shows that this simple arc-triangle cannot exist.
\end{proof}
Additional pendant vertices only make the angles farther from realizability, producing an infinite family of examples without planar Lombardi drawings.
\section{Conclusions}
We have completely characterized the triples of internal angles of simple arc-triangles, and proven that for higher-order simple arc-polygons (with one exception) all sequences of angles that are at most $\pi$ are realizable. We have used these results to find planar Lombardi drawings for the natural planar embeddings of all cacti, and to prove that certain other embeddings of cacti do not have planar Lombardi drawings. In particular, this shows that it is possible for an outerplanar graph, embedded in a non-outerplanar way, to fail to have a planar Lombardi drawing.
This work leaves the following questions open for future research:
\begin{itemize}
\item Can we characterize more completely the sequences of angles that can be realized by simple arc-polygons? (\cref{cor:no-zigzag} shows that this question has a nontrivial answer.) What is the computational complexity of finding such a realization?
\item Similarly, what is the computational complexity of determining whether an embedded cactus has a planar Lombardi drawing?
\item In previous work, for trees with fixed embeddings, we were able to prove the existence of Lombardi drawings whose area is a polynomial multiple of the minimum separation between vertices, compared to the exponential area requirement for straight-line drawings with uniformly spaced edges at each vertex~\cite{DunEppGoo-DCG-13}. What are the area requirements for Lombardi drawing of cacti?
\item As already discussed in our previous work on Lombardi drawing, do all outerplanar graphs have planar Lombardi drawings? Do they have planar Lombardi drawings for each outerplanar embedding? What is the computational complexity of finding these drawings?
\end{itemize}
\small
\bibliographystyle{abuser}
|
\subsubsection*{References}}
\usepackage{mathtools}
\usepackage{booktabs}
\usepackage{tikz}
\usepackage[ruled,vlined,linesnumbered,noend]{algorithm2e}
\usepackage{amsmath}
\usepackage{amsfonts}
\usepackage{enumitem}
\usepackage{subfigure}
\usepackage{soul}
\newcommand{\squishlist}[1][$\bullet$]
{
\begin{list}{#1}
{
\setlength{\itemsep}{0pt}
\setlength{\parsep}{2pt}
\setlength{\topsep}{2pt}
\setlength{\partopsep}{0pt}
\setlength{\leftmargin}{1.5em}
\setlength{\labelwidth}{1.5em}
\setlength{\labelsep}{0.5em}
}
}
\newcommand{\end{list}}{\end{list}}
\newcommand{\swap}[3][-]{#3#1#2}
\title{CLAIM: Curriculum Learning Policy for Influence Maximization in Unknown Social Networks}
\author[1]{\href{mailto:<<EMAIL>>?Subject=Your UAI 2021 paper}{Dexun Li}{}}
\author[1]{Meghna Lowalekar}
\author[1]{Pradeep Varakantham}
\affil[1]{%
School of Computing and Information Systems\\
Singapore Management University\\
Singapore
}
\begin{document}
\maketitle
\begin{abstract}
Influence maximization is the problem of finding a small subset of nodes in a network that can maximize the diffusion of information. Recently, it has also found application in HIV prevention, substance abuse prevention, micro-finance adoption, etc., where the goal is to identify the set of peer leaders in a real-world physical social network who can disseminate information to a large group of people. Unlike online social networks, real-world networks are not completely known, and collecting information about the network is costly as it involves surveying multiple people. In this paper, we focus on this problem of network discovery for influence maximization. The existing work in this direction proposes a reinforcement learning framework. As the environment interactions in real-world settings are costly, so it is important for the reinforcement learning algorithms to have minimum possible environment interactions, i.e, to be sample efficient. In this work, we propose CLAIM - \textbf{C}urriculum \textbf{L}e\textbf{A}rning \textbf{P}olicy for \textbf{I}nfluence \textbf{M}aximization to improve the sample efficiency of RL methods. We conduct experiments on real-world datasets and show that our approach can outperform the current best approach.
\end{abstract}
\section{Introduction}\label{sec:intro}
Social interactions between people play an important role in spreading information and behavioral changes. The problem of identifying a small set of influential nodes in a social network that can help in spreading information to a large group is termed as influence maximization (IM) \citep{Kempe03}. It was widely used in applications such as viral marketing \citep{Kempe03}, rumor control \citep{Budak11}, etc, which use the online social network. In addition to these, IM has also found useful applications in domains involving real world physical social networks. Some of these applications include identifying peer leaders in homeless youth network to spread awareness about HIV \citep{Wilder18,yadav2016using}, identifying student leaders in school network to disseminate information on substance abuse \citep{valente2007identifying}, identifying users who can increase participation in micro-finance \citep{banerjee2013diffusion}, etc. In the case of real world social networks, the network information is not readily available and it is generally gathered by individually surveying different people who are part of the network. As conducting such surveys is a time intensive process requiring substantial efforts from a dedicated team of social work researchers, it is not practically possible to have access to a complete network structure. Therefore, the influence maximization problem in the real world is coupled with the uncertain problem of discovering network using a limited survey budget (i.e., the number of people who can be queried).
Most of the existing work \citep{Wilder18,Bryan18,yadav2016using} which addresses real-world influence maximization problems perform network discovery by surveying nodes while exploiting a specific network property such as community structure. CHANGE algorithm \citep{Wilder18} is based on the principle of \textit{friendship paradox} and performs network discovery by surveying a random node and one of its neighbour. Each node reveals the information about its neighbors upon querying. The subgraph obtained after querying a limited set of nodes is used to pick a set of influential nodes using an influence maximization algorithm. A recent work by \citet{kamarthi2019influence} provides a reinforcement learning based approach to automatically train an agent for network discovery. They developed an extension to DQN referred to as Geometric-DQN to learn policies for network discovery by extracting relevant graph properties, which achieves better performance than the existing approaches. As any other reinforcement learning approach, the work by \citet{kamarthi2019influence} needs to perform multiple interactions with the environment to perform exploration. As in the real world settings, the environment interactions are costly, the approach can be improved by reducing the environment interactions, i.e., by increasing the sample efficiency. This approach employs a myopic heuristic (new nodes discovered) to guide exploration and we employ goal directed learning to provide a forward looking (non-myopic) heuristic.
In this work, we propose to model the network discovery problem as a goal-directed reinforcement learning problem. We take the advantage of the \textit{Hindsight Experience Replay} \citep{Andrychowicz2017} framework which suggests learning from failed trajectories of agent by replaying each episode with a different goal (e.g. the state visited by agent at the end of its failed trajectory) than the one agent was trying to achieve. This helps in increasing sample efficiency as agent can get multiple experiences for learning in a single environment interaction. To further improve the performance, we use the curriculum guided selection scheme proposed by \citet{Fang2019} to select the set of episodes for experience replay. While there have been some other works which focus on improving the sample-efficiency \citep{sukhbaatar2017intrinsic,burda2018large,colas2019curious}, most of them are designed for domain specific applications and unlike our curriculum guided selection scheme which adaptively controls the exploration-exploitation trade-off by gradually changing the preference on goal-proximity and diversity-based curiosity, they only perform curiosity-driven learning.
\noindent \textbf{Contributions:} In summary, following are the main contributions of the paper along different dimensions:
\begin{itemize}[leftmargin=*]
\item \textbf{Problem:} We convert the whole process of network discovery and influence maximization into a goal directed learning problem. Unlike standard goal directed learning problems where goal state is known, in this problem, the goal state is not given. We provide a novel heuristic to generate goals for our problem setting.
\item \textbf{Algorithm:} We propose a new approach CLAIM - \textbf{C}urriculum \textbf{L}e\textbf{A}rning Policy for \textbf{I}nfluence \textbf{M}aximization in unknown social networks which by using Curriculum guided hindsight experience replay and goal directed Geometric-DQN architecture can learn sample efficient policies for discovering network structure.
\item
\textbf{Experiments:} We perform experiments in social networks from three different domains and show that by using our approach, the total number of influenced nodes can be improved by upto 7.51\% over existing approach.
\end{itemize}
\begin{table}[htp]
{\small
\begin{center}
\begin{tabular}{|l|l|}
\toprule
\textbf{Notation} & \textbf{Description}\\
\hline
$G^{\ast}=(V^{\ast},E^{\ast})$ & Entire Unknown Graph\\
\hline
$S$ & Set of nodes known initially \\
\hline
$G_{t} = (V_{t},E_{t})$ & Subgraph of $G^{\ast}$ discovered after $t$ queries\\
\hline
$N_{G^{\ast}}(u)$ & Neighbors of vertex $u$ in graph $G^{\ast}$ \\
\hline
$E(X,Y)$ &All direct edges that connect a node in \\
~& set $X$ and a node in set $Y$\\
\hline
$O(G)$ & Set of nodes from graph $G$ selected by \\
~& influence maximization algorithm $O$\\
\hline
$I_{G^{\ast}}(A)$ & Expected Number of nodes influenced in \\
~& graph$G^{*}$ on choosing $A$ as the set of \\
~& nodes to activate\\
\bottomrule
\end{tabular}
\end{center}
}
\vspace{-0.1in}
\caption{ Notations}
\label{table:notations}
\vskip -10pt
\end{table}
\section{Problem Description}\label{sec:prob}
The problem considered in this work involves discovering a subgraph of the unknown network such that the set of peer leaders chosen from the discovered subgraph maximizes the number of people influenced by peer leaders. We now describe both the components of the problem, i.e., network discovery and influence maximization in detail. The notations used in the problem description are defined in Table \ref{table:notations}.
\begin{itemize}
\item \textbf{Network Discovery Problem:} The network discovery problem can be described as a sequential decision making problem where at each step, the agent queries a node from the discovered subgraph. The queried node reveals its neighbors, expanding the discovered subgraph. The process goes on for a fixed number of steps, determined by the budget constraint. Formally, initially we are given a set of nodes $S$ and the agent can observe all the neighbors of nodes in set $S$. Therefore, $V_{0} = S \cup N_{G^{\ast}}(S)$. The agent has a budget of $T$ queries to gather additional information. For $(t+ 1)^{th}$ query, the agent can choose a node $u_t$ from $G_t$ and observe $G_{t+1}$.
\begin{equation*}
\resizebox{.99\linewidth}{!}{
$G_{t+1} = (V_t\cup N_{G^\ast}(u_t),E(G_t) \cup E(N_{G^\ast}(u_t),\{u_t \}))$.
}
\end{equation*}
\end{itemize}
At the end of network discovery process, i.e., after $T$ queries, we get the final discovered subgraph $G_T$. This graph is provided as an input to an IM algorithm.
\begin{itemize}
\item \textbf{Influence Maximization (IM) :} IM is the problem of choosing a set of influential nodes in a social network who can propagate information to maximum nodes. In this paper, the information propagation over the network is modeled using Independent Cascade Model (ICM ) \citep{Kempe03}, which is the most commonly used model in the literature. In the ICM, at the start of the process, only the nodes in the set of chosen initial nodes are active. The process unfolds over a series of discrete time steps, where at every step, each newly activated node attempts to activate each of its inactive neighbors and succeeds with some probability $p$. The process ends when there are no newly activated nodes at the final step.
After discovering the subgraph $G_T$ using network discovery process, we can use any standard influence maximization algorithm to find out the best set of nodes to activate based on the available information. \citet{lowalekar2016robust} showed the robustness of the well-known greedy approach \citep{Kempe03} on medium scale social network instances, which is also served as the oracle in our paper.
\end{itemize}
\begin{figure}
\centering
\includegraphics[width=\linewidth,height=1.8in]{Discovery.pdf}
\caption{{\small Network discovery and influence maximization. Grey: Set of Queried Nodes; Orange: Set of unqueried nodes (In the initial subgraph $G_{0}$, grey nodes will represent the set $S$ and orange nodes will represent the set $N_{G^{\ast}}(S)$), Yellow: node picked by agent to query ($u_{t}$); Red: nodes selected by influence maximization algorithm in the final discovered subgraph ($O(G_{T})$); Blue: other nodes in the final discovered subgraph $G_{T}$} }\label{fig:problem}
\end{figure}
Overall, given a set of initial nodes $S$ and its observed connections $N_{G^\ast}(S)$, our task is to find sequence of queries $(u_0,u_1,\dots,u_{T-1})$ such that $G_T$ maximizes $I_{G^\ast}(O(G_T))$. Figure \ref{fig:problem} shows the visual representation of the problem.
\section{Background}\label{sec:bg}
In this section, we describe the relevant research, the MDP formulation and the Geometric-DQN architecture used by \citet{kamarthi2019influence} to solve the network discovery and influence maximization problem.
\subsection{MDP Formulation}
\label{sect:mdp}
The social network discovery and influence maximization problem can be formally modelled as an MDP.
\begin{itemize}
\item {\bf State:} The current discovered graph $G_t$ is the state.
\item {\bf Actions:} The nodes yet to be queried in network $G_t$ constitute the action space. So, set of possible actions is $V_t\setminus \{ S\cup_{i\leq t} u_i\} ~ \forall t>0 \text{ and } N_{G^\ast}(S) \text{ when } t = 0$.
\item {\bf Rewards:} Reward is only obtained at the end of episode, i.e,, after T steps. It is the number of nodes influenced in the entire graph $G^{*}$ using $G_{T}$, i.e., $I_{G^{*}}(O(G_{T}))$. The episode reward is denoted by $R_{T}$, where $T$ is the length of the episode (budget on the number of queries available to discover the network).
\end{itemize}
\noindent \textbf{Training:} To train the agent in the MDP environment, DQN algorithm is used but the original DQN architecture which takes only the state representation as an input and outputs the action values can not be used as the action set is not constant and depends on the current graph. Therefore, both state and action are provided as an input to DQN and it predicts the state action value. The DQN model can be trained using a single or multiple graphs. If we train simultaneously on multiple graphs, then the MDP problem turn out to be Partially observable MDP, as the next state is determined by both current state and current action as well as the graph we are using. The range of reward values also depends on the size and structure of the graph, therefore, the reward value is normalized when multiple graphs are used for training.
\begin{equation}
R_{T} = \frac{I_{G^{*}}(O(G_{T}))}{OPT(G^{*})}
\end{equation}
\subsection{Geometric-DQN}
As described in previous section, the state is the current discovered graph $G_{t}$ and actions are the unqueried nodes in the current discovered graph. So, a good vector representation of the current discovered graph is required. It is also important to represent nodes such that it encodes the structural information of the node in the context of the current discovered graph. Figure~\ref{fig:gcn-arch} shows the Geometric-DQN architecture which takes the state and action representation as input and outputs the $Q(s,a)$ values. The details about state and action representation are provided below.
\begin{figure}
\centering
\includegraphics[width=\linewidth,height=1.8in]{gcn-cropped.pdf}
\vspace{-0.1in}
\caption{{\small Geometric-DQN Architecture. Figure taken from \citet{kamarthi2019influence}. FC1/FC2 - fully connected layers.}} \label{fig:gcn-arch}
\vspace{-0.1in}
\end{figure}
\begin{itemize}[leftmargin=*]
\item \textbf{State representation:} The state is the current graph. and the Geometric-DQN architecture uses Graph Convolutional Networks to generate graph embeddings. The graph $G_{t}$ is represented with the adjacency matrix $A_t \in \mathbb{R}^{|V_{t}|\times |V_{t}|}$ and a node feature matrix $F_{t}^{(k-1)}\in\mathbb{R}^{|V_{t}| \times d}$ in layer $k-1$ where $d$ is the number of features. The node features in the input layer of graph convolution network, i.e., $F_{t}^{0}$ are generated by using random-walk based Deepwalk embeddings\footnote{Deepwalk learns node representations that are similar to other nodes that lie within a fixed proximity on multiple random walks.} \citep{Perozzi14}.
Now, a Graph Convolutional layer derives node features using a transformation function $F^{k} = M(A,F^{k-1};W^{k})$, where $W^{k}$ represent the weights of the $k^{th}$ layer. Using the formulation in \citet{Ying19}, the transformation function is given by
\begin{align}
F_{t}^{(k)} &= ReLU(D^{-\frac{1}{2}} \tilde{A} D^{-\frac{1}{2}} F_{t}^{(k-1)}W^{(k)}) \nonumber
\end{align}
where $\tilde{A}$ means adjacency matrix $A_{t}$ with added self-connections, i.e., $\tilde{A} = A_{t} + I_n$ ($I_n$ is the identity matrix). $D=\sum_j \tilde{A}_{ij}$. To better represent the global representation of graph, differential pooling is used which learns hierarchical representations of the graph in an end-to-end differentiable manner by iteratively coarsening the graph, using graph convolutional layer as a building block. The output of graph convolutional network is provided as an input to a pooling layer.
\item \textbf{Actions representation:} DeepWalk node embeddings are also utilized for representing actions. We use $\phi$ to denote the deepwalk embeddings.
\end{itemize}
Therefore, if $G_{t}$ is the current graph (state) and $u_{t}$ is the current node to be queried (action), we represent state as $S_{t} = (F_{t}^{0},A_{t})$ and action as $\phi(u_{t})$ which are input to the network as shown in the Figure~\ref{fig:gcn-arch}.
\section{Our Approach - CLAIM}
In this section, we present our approach CLAIM - \textbf{C}urriculum \textbf{L}e\textbf{A}rning Policy for \textbf{I}nfluence \textbf{M}aximization in unknown social networks. We first explain how the problem can be translated into a Goal directed learning problem. The advantage of translating the problem into goal directed learning problem is that it allows us to increase sample efficiency by using the Curriculum guided Hindsight experience replay (CHER) \citep{Fang2019}. CHER involves replaying each episode with pseudo goals, so the agent can get multiple experiences in a single environment interaction which results in increasing the sample efficiency.
To use goal directed learning in our setting, we first present our novel heuristic to generate goals and the modifications to the MDP formulation for goal directed learning. After that, we present our algorithm to generate curriculum learning policy using Hindsight experience replay.
\subsection{Goal Directed Reinforcement Learning}
In the Goal Directed or Goal Conditioned Reinforcement Learning \citep{Andrychowicz2017,nair2018visual}, an agent interacts within an environment to learn an optimal policy for reaching a certain goal state or a goal defined by a function on the state space in an initially unknown or only partially known state space. If the agent reaches the goal, then the reinforcement learning method is terminated, and it solves the goal-directed exploration problem.
In these settings, the reward that agent gets from the environment is also dependent on the goal that agent is trying to achieve. A goal-conditioned $Q$-function $Q(s, a, g)$ \citep{schaul15} learns the expected return for the goal $g$ starting from state $s$ and taking action $a$. Given a state $s$, action $a$, next state $s'$ , goal $g$ and corresponding reward $r$, one can train an approximate $Q$-function parameterized by $\theta$ by minimizing the following Bellman error:
\begin{align}
\frac{1}{2} || Q_\theta(s,a,g) - (r+\gamma \cdot \max_{a'} Q_{\theta'}(s',a',g)||^2 \nonumber
\end{align}
This loss can be optimized using any standard off-policy reinforcement learning method \citep{nair2018visual}.
Generally, in these goal-directed reinforcement learning problems, a set of goal states or goals defined by a function on the state space is given and the agent needs to reach one of the goal states (goals). But in our setting, we do not have an explicit goal state given. To convert the network discovery and influence maximization problem to a goal directed learning problem, we introduce the notion of goals for our problem. We define goal as the expected long term reward, i.e., the expected value of the number of nodes which can be influenced in the network and any state which can achieve this goal value becomes our goal state. As we have limited query budget to discover the network, the goal value will be highly dependent on the initial sub-graph. If we use the same value of goal for each start state, for some start states this common goal value will turn out to be a very loose upper bound (or very loose lower bound). Experimentally, we found that if the goal value is too far from the actual value which can be achieved, it negatively affects the speed of learning. So, we design a heuristic to compute a different goal for each start state.
\subsubsection{Goal Generation Heuristic}
As we need to generate goal at the start of each episode (i.e., before the agent starts interacting with the environment), we need to compute the goal value without making any queries to the environment. We assume that based on the domain knowledge, agent can get an estimate about the number of nodes ($|\tilde{V}^{\ast}|$) and edges ($|\tilde{E}^{\ast}|$ in the network and also an estimate about average number of nodes which can be influenced in the network (irrespective of the start state) ($\tilde{I}^{\ast}$). We now describe how we use these estimates to design our heuristic to compute the goal value for each start state.
\begin{figure}
\centering
\includegraphics[width=0.9\linewidth,height=1.7in]{goalgen1.pdf}
\vspace{-0.1in}
\caption{Process to generate the goal for each start state}
\vspace{-0.1in}
\label{fig:goalgen}
\end{figure}
Figure \ref{fig:goalgen} represents the steps for our heuristic. As the network is unknown to the algorithm, we assume a network structure and compute the diffusion probability based on the assumed network structure and estimates about the number of nodes, edges and average influence. By using the computed diffusion probability, given estimates and assumed network structure, we generate a goal value for a given initial subgraph.
We assume that the network is undirected and uniformly distributed, i.e, each node is connected to $\frac{2*|\tilde{E}^\ast|}{|\tilde{V}^\ast|}$ nodes. We also assume a local tree structure as shown in Figure~\ref{fig:goalgen}~\footnote{These simplified assumptions work well to approximate the influence propagation. We also observe in our experiments that our heuristic outputs a value which is closer to actual value.} to approximate the actual expected influence within the social network \citep{chen2010scalable,wang2012scalable}. The root of the tree can be any of the $|S|$ nodes (initially given nodes) and each node will be part of only one of such trees. The influence propagation probability is assumed to be $p'$ and is considered same for all edges. We now show how the value of $p'$ can be computed based on the network structure assumption and available information.
\begin{enumerate}
\item \textbf{Computing p':} We find a value of $p'$ such that the expected influence in our tree-structured network is similar to the estimate on the average value of influence $\tilde{I}^{\ast}$. To compute the expected influence or expected number of nodes activated in the network, we need to know the number of layers in the tree structure. Therefore, we first compute the number of layers in our assumed tree structure. Let $K_{1} = |S|*2*\frac{|E^\ast|}{|V^\ast|}$, which is the number of nodes at first layer. For subsequent layers, each node will be connected to $2*\frac{|\tilde{E}^\ast|}{|\tilde{V}^\ast|} -1$ nodes at the layer below it (one edge will be to the node at the above layer). We use $r$ to denote the quantity $2*\frac{|\tilde{E}^\ast|}{|\tilde{V}^\ast|} -1$ . As the total number of nodes in the graph is $|\tilde{V}^{\ast|}$, sum of the number of nodes at all layers should be equal to $|\tilde{V}|^{\ast}$. Let $L$ denotes the number of layers. Then,
{\small
\begin{align}
&|\tilde{V}|^{\ast} = |S| + K_{1} + K_1 * r + K_{1} * r^2 + .. + K_{1} * r^{L-1} \\
& \implies \frac{(|\tilde{V}|^{\ast} - |S|)}{K_{1}} = \frac{r^L - 1}{r-1} \label{eq:layer}
\end{align}
}
Solving for $L$ gives $L = \log_{r} (1+\frac{ |\tilde{V}|^{\ast} - |S|)*(r-1)}{K_{1}})$. Now, we compute the expected number of nodes activated (influenced) in our assumed network with the propagation probability $p'$. Let $J$ denotes the expected number of nodes influenced in the network. Then,
{\small
\begin{align}
&J= |S| + K_{1}*p' + K_1 * r * p'^2 + K_{1} * r^2 *p'^3\\ \nonumber
&\hspace{1in}+ .. + K_{1} * r^{L-1} * p'^{L} \\
& \implies \frac{(J - |S|)}{K_{1}} = \frac{p'*((p'*r)^L - 1)}{p'*r-1} \label{eq:inf}
\end{align}
}
If our assumed network is similar to actual network, the value of $J$ should be close to $\tilde{I}^{\ast}$, i.e., the average number of nodes influenced in the network. Therefore, to find the value of $p'$, we perform a search in the probability space and use the value of $p'$ which makes $J$ closest to $\tilde{|I|}^{\ast}$.
\item \textbf{Computing goal value $g$ for a given initial subgraph:}
Now, to compute the goal value for a given initial subgraph, we use the $p'$ value computed above. The subgraph is known, i.e., the neighbors of nodes in set $S$ ($N_{G^{\ast}}(S)$) are known. Therefore, the number of nodes at first layer is equal to $N_{G^{\ast}}(S)$, i.e., $K_1=|N_{G^{\ast}}(S)|$. For the next layer onwards, we assume a similar tree structure as before with each node connected to $2*\frac{|\tilde{E}|}{|\tilde{V}|}-1$ node at the layer below it. Therefore, to compute the goal value, we substitute $K_1$ as $|N_{G^{\ast}}(S)|$ in equations \ref{eq:layer} and \ref{eq:inf} to compute the number of layers and influence value. We use the value of $p'$ computed above and solve for $J$. The $J$ value obtained is the influence value we can achieve for the given subgraph based on the assumptions and available information. We use the value of $J$ as our goal $g$ for the subgraph.
\end{enumerate}
\subsubsection{Modifications to the MDP formulation:}
The state and action remain the same as before but due to the introduction of goals, the reward function is now parameterized by the goal. Let $R_{t,g}$ denote the reward obtained at timestep $t$ when the goal is $g$. As we only get episode reward, therefore~\footnote{Normalizing the reward using the goal stabilizes the learning.},
{\small
\begin{equation}
R_{T-1,g} = \frac{I_{G^\ast}(O(G_T))-g}{g} ~and~ R_{t,g} = 0, \forall t\neq T-1 \label{eq:reward_func}
\end{equation}
}
\subsection{Algorithm}
In this section, we describe the algorithm used to train the reinforcement learning agent. We use the $DQN$ algorithm and use Curriculum Guided Hindsight Experience Replay for improving the sample efficiency. Algorithm~\ref{al:HER3} describes the detailed steps. Figure~\ref{fig:Structure} provides a visual representation.
\begin{figure*}[t]
\centering
\includegraphics[width=0.8\textwidth,height=1.8in]{Structure2-cropped.pdf}
\caption{Network discovery framework for influence maximization}
\label{fig:Structure}
\end{figure*}
{\small
\begin{algorithm}
\caption{Train Network}
\label{al:HER3}
\SetAlgoLined
\KwIn{Train graphs $\mathcal{G}=\{G_1,G_2,...,G_k \}$, number of episodes $N$. Query budget $T$}
Initialize DQN $Q_{\theta}$ and target DQN $Q_{\theta^\prime}$ with $\theta=\theta^\prime$ and the Replay Buffer $\mathcal{B}$\;
\For{episode $=1$ to $N$}{
$G=sample(\mathcal{G})$, $S=sample(G)$\;
Initialize the subgraph $G_0 = (S \cup N_{G^{\ast}}(S) , E(S,N_{G^{\ast}}(S)))$ and corresponding desired goal $g$\;
$F_0^0=DeepWalk(G_0)$ and $S_0=(F_0^0,A_0)$ \label{lst:line:emb}\;
Get the possible action set $X= N_G(S)$\;
\For{$t=0$ to $T-1$}{
With probability $\epsilon$ select a random node $u_{t}$ from $X$ and with probability 1-$\epsilon$ select $u_t \leftarrow \max_{u \in X} Q_\theta(S_t,\phi(u),g)$ \label{lst:line:query}\;
Query node $u_t$ and observe new graph $G_{t+1}$\;
Update the state $F_{t+1}^0=DeepWalk(G_{t+1})$\ and $S_{t+1}=(F_{t+1}^0 , A_{t+1})$\;
Update the possible action set $X$ which is the set of nodes not yet queried in $G_{t+1}$\;
}
\For{$t=0$ to $T-1$}{
Store the transition $(S_t,\phi(u_t),R_t,g, S_{t+1},g)$ in $\mathcal{B}$ \label{lst:expreplay}\;
Sample the additional goals $\mathbb{G}$ for replay \label{lst:line:sample}\;
\For{$g^\prime \in \mathbb{G}$}{
Add the transition $(S_t,\phi(u_t),R_{t,g^\prime}, S_{t+1},g^\prime)$ to replay buffer $\mathcal{B}$; \label{lst:line:her}
}
}
\For{$t = 0$ to $T-1$}{
Sample a minibatch $A$ from the replay buffer ${\cal B}$(according to the proximity and diversity scores) \label{lst:line:cher}\;
Update the proximity-diversity trade-off parameter $\lambda \leftarrow \gamma \times \lambda$ ;
Update $Q_{\theta}$ using the minibatch $A$\;
}
Update target network $Q_{\theta^\prime}$ with parameters of $Q_{\theta}$ at regular intervals\;
}
\end{algorithm}
}
We train using multiple training graphs. In each episode, we sample a training graph and then sample initial set of nodes $S$. We generate the input state by computing the deepwalk embeddings at each timestep and use $\epsilon-$greedy policy to select the action, i.e., the node to be queried. In step~\ref{lst:expreplay}, we store the transitions according to standard experience replay where we add the goal as well in the experience buffer.
Steps \ref{lst:line:sample}-\ref{lst:line:her} are the \textbf{\textit{first set of crucial steps}} to improve the sample efficiency, where as per the Hindsight Experience Replay technique proposed by \citet{Andrychowicz2017}, we sample pseudo goals and in addition to storing the sample with the actual goal for the episode, we also store each sample by modifying the desired goal (which the agent could not achieve in the failed trajectory) with a pseudo goal $g'$. The reward with the pseudo goal $g'$ is recomputed as per the Equation ~\ref{eq:reward_func}.
While there are multiple possible strategies to generate the set of pseudo goals \citep{Andrychowicz2017}, the most common strategy to generate the pseudo goals is to use the goal achieved at the end of episode. Therefore, in this work, we use $g'$ as $I_{G^\ast}(O(G_T))$.
\noindent Step \ref{lst:line:cher} is the \textbf{\textit{second crucial step}} towards improving the sample efficiency where for sampling experiences from the replay buffer, we use a curriculum guided selection process which relies on the goal-proximity and diversity based curiosity \citep{Fang2019}. Instead of sampling experiences uniformly, we select a subset of experiences based on the trade-off between goal-proximity and diversity based curiosity. This plays an important role in guiding the learning process. A large proximity value enforces the training to proceed towards the desired goals, while a large diversity value ensures exploration of different states and regions in the environment. To sample a subset $A$ of size $k$ for replay from the experience buffer ${\cal B}$, the following optimization needs to be solved:
\begin{equation}\label{eq:selection}
\underset{A\subseteq {B}, |A|\leq k}{\max} F(A) = \underset{A\subseteq { B}, |A|\leq k}{\max} (F_{prox}(A) + \lambda F_{div}(A))
\end{equation}
where $B$ is the uniformly sampled subset of size $mk$ from the buffer ${\cal B}$. Let $m=3$ as \citet{Fang2019} does. $F_{prox}(A)$ measures the proximity of the achieved goals $g^\prime$ in $A$ to its desired goal $g$. The second term $F_{div}(A)$ denotes the diversity of states and regions of the environment in $A$. And the weight $\lambda$ is used to balance the trade-off between the proximity and the diversity. The trade-off between the two values is balanced such that it enforces a human-like learning strategy, where there is more curiosity in exploration in the earlier stages and later the weight is shifted to the goal-proximity.
In our work, we define the proximity as the similarity between goal values and diversity based on the distance between visited states. This is because even though goal values (influence achieved) can be different, the states visited can still be very similar to each other. Formally, to define proximity, we use the difference between achieved goal $g^\prime_i$ and the desired goal $g_i$ as distance and subtract it from a large constant to get the similarity, i.e.,
\begin{align}
F_{prox}(A) &=\sum_{i\in A} (c - |(g_i^\prime-g_i)|) \label{eq:prox}
\end{align}
where $c$ is a large number to guarantee $(c - |(g_i^\prime-g_i)|)\geq 0$ for all possible $g_i$, and $g_i$ is the goal corresponding to experience $i$ in set $A$.
\noindent For defining diversity, we need to compute similarity between states, and the Geometric DQN architecture allows us to easily compute this value. Diversity is defined as follows
\begin{equation}
F_{div}(A) = \sum_{j\in {B}} \underset{i \in A}{\max}\{0, sim(s^{emb}_i,s^{emb}_j)\} \label{eq:div}
\end{equation}
where we use $s^{emb}_i$ to denote the embedding vector of the state (representation of the graph in the embedding space) corresponding to the experience $i$. The embedding vector of the state is the output of the graph convolution and pooling layer (input to FC1) in Figure \ref{fig:gcn-arch}. $sim(s^{emb}_i,s^{emb}_j)$ denotes the similarity score between the vector representations and is computed by taking the dot product of the vectors.
This definition of diversity is inspired by the facility location function \citep{cornuejols1977uncapacitated,lin2009graph} which was also used by \citet{Fang2019}. Intuitively, this diversity term is measuring how well the selected experiences in set $A$ can represent the experiences from ${B}$. A large diversity score $F_{div}(A)$ indicates that every achieved state in $B$ can find a sufficiently similar state in $A$. A diverse subset is more informative and thus helps in improving the learning.
It has been shown that $F(A)$ defined in equation ~\ref{eq:selection} is a monotone non-decreasing submodular function~\footnote{It is a weighted sum of a non-negative modular function ($F_{prox}(A)$) and a submodular function ($F_{div}(A)$). Please refer to the paper by \citet{Fang2019} for details.} Therefore, even though exactly solving equation ~\ref{eq:selection} is NP-hard, due to the submodularity property, greedy algorithm can provide a solution with an approximation factor $1-\frac{1}{e}$ \citep{nemhauser1978analysis}. The greedy algorithm picks top $k$ experiences from the buffered experiences $B$. It will start by taking $A$ as an empty set and at each step, it will add the experience $i$ which maximizes the marginal gain. We denote the marginal gain for experience $i$ by $F(i|A)$ and it is given by
\begin{align}
F(i|A) &= F(i \cup A) - F(A)
\end{align}
Therefore, by using equations \ref{eq:selection}-\ref{eq:div}, we get
\begin{equation}
\resizebox{.99\linewidth}{!}{$
\begin{aligned}
F(i|A) &= (c- (|g_i^\prime-g_i|)) + \lambda \sum_{j\in {B}} \max\{0, (sim(s^{emb}_i,s^{emb}_j) \nonumber \\ &- \underset{l \in A}{\max}(sim(s^{emb}_l,s^{emb}_j)))\}
\end{aligned}
$}
\end{equation}
At the end of each episode, the trade-off coefficient $\lambda$ is multiplied by a discount rate $\gamma$, which produces the continuous shifting of weights from diversity to proximity score. Then effect of $F_{div}(A)$ will go to zero when $\lambda\rightarrow 0 $.
\section{Experiments}
The goal of the experiment section is to evaluate the performance of our approach CLAIM in comparison to following state-of-the-art approaches:
\squishlist
\item \textbf{Random} - At each step, it randomly queries a node from available unqueried nodes.
\item \textbf{CHANGE} Algorithm by \citet{Wilder18}
\item \textbf{Geometric-DQN (Baseline)} Algorithm by \citet{kamarthi2019influence}
\end{list}
\begin{table}[ht]
\centering
\begin{tabular}{ccl}
\hline
Category & Train networks & Test networks \\
\hline
Retweet & copen, occupy & israel, damascus,\\
& & obama, assad \\
Animal & plj, rob & bhp, kcs\\
FSW & zone 1 & zone 2, zone 3\\
\hline
\end{tabular}
\vspace{-0.1in}
\caption{Train and test networks}
\vspace{-0.1in}
\label{tab:data}
\end{table}
\begin{table*}[ht]
\caption{Comparison of influence score of our proposed approach and existing approaches for each test network. For each network, a paired t-test is performed and $\ast$ indicates statistical significance of better performance at $\alpha = 0.05$ level, $\ast\ast$ at $\alpha = 0.01$ level, and $\ast\ast\ast$ at $\alpha = 0.001$ level.}
\label{tab:Result}
\vspace{-0.1in}
\centering
\begin{tabular}{c|cccc|cc|cc}
\hline
Network category & \multicolumn{4}{c|}{Retweet networks} & \multicolumn{2}{c|}{Animals networks} & \multicolumn{2}{c}{FSW networks}\\ \hline
Test networks & israel & damascus$\ast\ast$ & obama$\ast\ast$ & assad$\ast$ & bhp$\ast\ast\ast$ & kcs$\ast\ast$ &zone 2$\ast$ &zone 3 \\
OPT value & 113.9 & 195.8 & 154.7 & 134.2 & 111.9 & 113.4 & 20.98 & 16.40 \\
Random value &31.17 &84.71 &40.81 &69.44 &36.80 &54.39 & 13.26&12.31 \\
CHANGE value & 32.42 & 92.41 & 48.61 & 69.77 & 35.87 & 54.52 & 12.60 & 10.51 \\
Geometric DQN & 37.33 & 105.2 & 52.01 & 75.12 & 40.12 & 60.81 & 13.65 & 12.35\\
CLAIM approach & \textbf{38.55}& \textbf{113.1} & \textbf{54.67} & \textbf{77.49} & \textbf{42.25} & \textbf{64.58} & \textbf{13.94} & \textbf{12.48}\\ \hline
Improve percent & 3.27\% & 7.51\% & 5.11\% & 3.15\% & 5.31\% & 6.20\% & 2.12\% & 1.05\%\\ \hline
\end{tabular}
\end{table*}
\begin{figure*}[ht]
\centering
\begin{minipage}[b]{\linewidth}
\includegraphics[width=0.33\linewidth,height = 1.1in]{sensity-twitter2-cropped.pdf}
\includegraphics[width=0.33\linewidth,height = 1.1in]{sensity-animal2-cropped.pdf}
\includegraphics[width=0.33\linewidth,height = 1.1in]{Sensity-india2-cropped.pdf}
\end{minipage}
\vspace{-0.1in}
\caption{Comparison of performance of our approach and baseline approach in dense and sparse network environment. }
\vspace{-0.1in}
\label{fig:sensity}
\end{figure*}
\noindent \textbf{Dataset:} The first network is the Retweet Network from twitter \citep{Rossi14}. The second network is Animal Interaction networks which are a set of contact networks of field voles (Microtus agrestis) inferred from mark–recapture data collected over 7 years and from four sites \citep{davis2015spatial}. The third network is a real-world physical network between Female Sex Workers (FSW) in a large Asian city divided into multiple zones. This is a confidential dataset physically collected by a non-profit by surveying different female sex workers recently. The goal in FSW networks is to discover the network and select a subset of FSW from the discovered network to be enrolled in the HIV prevention programs. The enrolled FSWs should be such that they can pass on the information (influence) maximum FSWs in the complete network. For each family of network, we divide them into train and test data as shown in Table \ref{tab:data}.
\noindent \textbf{Experimental Settings:} Our experimental settings are similar to the settings used in \citet{kamarthi2019influence}. There are 5 nodes in the set $S$. All nodes in $S$ and their neighbors are known. We have further budget of $T=5$ queries to discover the network. After getting the final subgraph $G_T$, we pick 10 nodes to activate using greedy influence maximization algorithm. We use $p=0.1$ as the diffusion probability for all the edges.
\subsection{Results}
To demonstrate sample efficiency, we measure the performance of our approach against past approaches by the average number of nodes influenced over 100 runs under a fixed number of queries. Here are the key observations:
\begin{itemize}
\item \textbf{Average influence value: }Table \ref{tab:Result} shows the comparison of number of nodes influenced by different algorithms. Each algorithm selects the set of nodes to activate from the discovered graph. As shown in the table, our approach consistently outperforms all existing approaches across different networks. CLAIM learns a better policy in the same number of episodes and hence more sample efficient.
We would like to highlight here that even a small consistent improvement in these settings is very important as it can ensure more life safety (as an example by educating people about HIV prevention).
\item \textbf{Effect of density of the initial subgraph:} The number of nodes which can be influenced in the graph is highly dependent on the position of initial subgraph in the whole social network. Therefore, we also test the performance of CLAIM against the baseline approach on the \textit{dense} and \textit{sparse} initial subgraphs (we identify the initial subgraph as dense or sparse based on the ratio of $\frac{|S \cup N_{G^{\ast}}(S)|}{|S|}$). We compare the average influence values as shown in Figure \ref{fig:sensity}. CLAIM outperforms the baseline in most of the cases, except the sparse case in the damascus network. The reason for this may be that the damascus network is an extremely sparse network, and it has some specific structure property that leads this result.
\item \textbf{Ablation Study:} We also present the detailed results for our ablation study over all datasets in Table \ref{tab:ablation}. We observe the effect of adding each additional component in CLAIM one by one. First, we add only goal as a feature to the baseline model. Next, we add the Hindsight Experience Replay and finally we add the curriculum guided selection of experiences for replay. These results indicate that a single component can not guarantee a better result for all networks, and we need all three components to improve the performance across multiple datasets.
\item \textbf{Stability check:} We check the stability of CLAIM by comparing the performance of models trained using different random seeds. We train three models for both baseline and CLAIM. Table \ref{tab:stable} shows the mean and deviation of influence value for different networks. CLAIM not only achieves high mean it also provides a low deviation reflecting the stability of approach.
\begin{table*}
\begin{tabular}{c|cccc|cc|cc}
\hline
Network category & \multicolumn{4}{c|}{Retweet Networks} & \multicolumn{2}{c|}{Animals networks} & \multicolumn{2}{c}{FSW networks}\\ \hline
Test networks & israel & damascus & obama & assad & bhp & kcs &zone 2 &zone 3 \\
\hline
Baseline (Geometric DQN) & 37.33 & 105.2 & 52.01 & 75.12 & 40.12 & 60.81 & 13.65 & 12.35\\
Goal-directed Geometric DQN & 36.24 & 110.5 & 51.61 & 73.68 & 41.59 & 62.80 & 13.79 & 12.32\\
Hindsight Experience Replay & 37.79 & 109.4 & 53.51 & 76.32 & 42.00 & \textbf{64.64} & 13.81 & \textbf{12.48} \\
Our proposed approach (CLAIM) & \textbf{38.55}& \textbf{113.1} & \textbf{54.67} & \textbf{77.49} & \textbf{42.25} & \textbf{64.58} & \textbf{13.94} & \textbf{12.48}\\ \hline
\end{tabular}
\caption{Ablation study for each test network}
\label{tab:ablation}
\end{table*}
\begin{table}[t]
\centering
\begin{tabular}{c|cc}
\hline
Networks\textbackslash{}Method & Geometric DQN & CLAIM \\ \hline
israel & $37.11\pm 0.42$ & $38.32\pm 0.32$ \\
damascus & $104.2\pm 5.22$ & $112.8\pm 4.01$ \\
obama & $52.15\pm 1.05$ & $54.78 \pm 0.78$ \\
assad & $74.53 \pm 1.71$ & $77.45\pm 1.02$ \\ \hline
bhp & $40.24 \pm 1.25$ & $42.37\pm 0.81$ \\
kcs & $59.67\pm 1.91$ & $63.21 \pm 1.43$ \\ \hline
zone 2 & $13.62 \pm 0.01$ & $13.94\pm 0.00$ \\
zone 3 & $12.23\pm 0.01$ & $12.45 \pm 0.00$ \\
\hline
\end{tabular}
\vspace{-0.1in}
\caption{Stability of our approach compared to the baseline on different sets of 100 runs}
\label{tab:stable}
\vspace{-0.2in}
\end{table}
\begin{figure}
\centering
\begin{minipage}[b]{\linewidth}
\includegraphics[width = \linewidth,height =1.0in]{degree-tw-cropped.pdf}\\
\includegraphics[width = \linewidth,height=1.0in]{degree-tw-line-cropped.pdf}
\end{minipage}
\vspace{-0.1in}
\caption{{\small Top Graph - Average degree, closeness and betweenness centrality of nodes queried in the full graph by CLAIM and baseline. Bottom Graph - Variation of these properties across timesteps.}}
\label{fig:degree}
\vspace{-0.15in}
\end{figure}
\item \textbf{Property insight:} We also explore the properties of the selected nodes to further investigate why CLAIM performs better. We look at \textit{degree centrality measures, closeness centrality measures,} and \textit{betweenness centrality measures} of the nodes queried in the underlying graph. In particular, we conduct experiment using \textit{assad}, a retweet network with sparsely interconnected star-graph. As we can see in Figure \ref{fig:degree}, compared to the baseline approach, on an average, CLAIM can recognize nodes with higher degree, closeness and betweenness centrality. As a result, CLAIM is able to discover a bigger network. The higher degree centrality, higher closeness centrality and higher betweenness also show that CLAIM can explore nodes which plays an important role in influence maximization problem. Besides, these values are large at the beginning which means that CLAIM tends to explore a bigger graph first, and then leverage the available information with the learned graph to find complex higher-order patterns in the graphs that enable it to find key nodes during the intermediate timesteps, and finally utilise all the information to expand the discovered graph at the end.
\end{itemize}
\section{Discussion}
We provide a justification for the choices made in the paper.
\begin{itemize}
\item \textbf{Network structure assumption for goal generation:} As we have no prior information about the networks except the initial nodes, we need to make some assumption to compute the goal value. We make the assumption of network being uniformly distributed and use a tree structure to approximate the information propagation as most networks observed for these problems have similar structure or can be converted in these forms with minimal loss of information.
\item \textbf{Goodness of heuristic used for goal generation:} Experimentally, we observe that the goal value computed by our heuristic is closer to the actual value. For example, for the training network \textit{copen}, the achieved influence value by the model after training is at most within 20\% of goal value computed using heuristic. In addition, most of the achieved influence value is much closer and is smaller than the computed goal. In the future, we will investigate different ways to generate a goal with proven upper bound.
\end{itemize}
\section{Conclusion}
In this work, we proposed a sample efficient reinforcemernt learning approach for network discovery and influence maximization problem. Through detailed experiments, we show that our approach outperforms existing approaches on real world datasets. In future, we would like to extend this work to consider multiple queries at each timestep.
|
\section*{Introduction}
Let $R$ be a ring\footnote{Throughout what follows, rings are understood to possess a unit element, not necessarily different from $0$, and to be commutative. In general, notation and terminology follow Bourbaki's \textit{\'El\'ements de math\'ematique.}}, and let $\mathfrak{a}\subseteq R$ be an ideal. For an $R$-module $M$ we consider its small $\mathfrak{a}$-torsion submodule \[\Gamma_\mathfrak{a}(M)=\{x\in M\mid\exists n\in\mathbbm{N}\colon\mathfrak{a}^n\subseteq(0:_Rx)\}\] and its large $\mathfrak{a}$-torsion submodule \[\overline{\Gamma}_\mathfrak{a}(M)=\{x\in M\mid\mathfrak{a}\subseteq\sqrt{(0:_Rx)}\}.\] This gives rise to subfunctors $\Gamma_\mathfrak{a}\hookrightarrow\overline{\Gamma}_\mathfrak{a}\hookrightarrow{\rm Id}_{{\sf Mod}(R)}$. If $R$ is noetherian, the two torsion functors coincide, but they need not do so in general. For an $R$-module $M$ we consider its assassin \[\ass_R(M)=\{\mathfrak{p}\in\spec(R)\mid\exists x\in M\colon\mathfrak{p}=(0:_Rx)\}\] and its weak assassin \[\ass^{\rm f}_R(M)=\{\mathfrak{p}\in\spec(R)\mid\exists x\in M\colon\mathfrak{p}\in\min(0:_Rx)\},\] where $\min(\mathfrak{a})$ denotes the set of minimal primes of an ideal $\mathfrak{a}\subseteq R$. So, we get subsets $\ass_R(M)\subseteq\ass^{\rm f}_R(M)\subseteq\spec(R)$. If $R$ is noetherian, the two subsets of $\spec(R)$ coincide, but they need not do so in general. In \cite{sol}, the functors $\Gamma_\mathfrak{a}$ and $\overline{\Gamma}_\mathfrak{a}$ were investigated extensively. In \cite{asstor}, the relations between assassins and weak assassins of $\Gamma_\mathfrak{a}(M)$, $M$ and $M/\Gamma_\mathfrak{a}(M)$ were studied. The goal of this work is on one hand to extend the results from \cite{asstor}, and on the other hand to study their analogues for large torsion functors.
Torsion functors, and especially their right derived cohomological functors (i.e., local cohomology), are useful tools in commutative algebra and algebraic geometry. If the ring $R$ is noetherian, then they behave rather nicely (cf. \cite{bs} for a comprehensive treatment from an algebraic point of view). Several approaches to an extension of this theory to non-noetherian rings can be found in the literature. However, in general torsion functors quickly start to behave nastily; we refer the reader to \cite{lipman}, \cite{qr} and \cite{schenzel} for some examples.\medskip
In this article, we consider the following properties of an ideal $\mathfrak{a}$:
\begin{aufz}
\item[(1)] $\mathfrak{a}$ is fair, i.e., $\ass_R(M/\Gamma_\mathfrak{a}(M))=\ass_R(M)\setminus\var(\mathfrak{a})$ for any $M$;
\item[($\overline{1}$)] $\mathfrak{a}$ is large fair, i.e., $\ass_R(M/\overline{\Gamma}_\mathfrak{a}(M))=\ass_R(M)\setminus\var(\mathfrak{a})$ for any $M$;
\item[(2)] $\mathfrak{a}$ is weakly fair, i.e., $\ass^{\rm f}_R(M/\Gamma_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a})$ for any $M$;
\item[($\overline{2}$)] $\mathfrak{a}$ is weakly large fair, i.e., $\ass^{\rm f}_R(M/\overline{\Gamma}_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a})$ for any $M$;
\item[(3)] $\mathfrak{a}$ is weakly quasifair, i.e., $\ass^{\rm f}_R(\Gamma_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})$ for any $M$;
\item[($\overline{3}$)] $\mathfrak{a}$ is weakly large quasifair, i.e., $\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})$ for any $M$;
\item[(4)] $\mathfrak{a}$ is half-centred, i.e., $\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\emptyset$ for any $M$ with $\Gamma_\mathfrak{a}(M)=0$;
\item[(5)] $\mathfrak{a}$ is centred, i.e., $\Gamma_\mathfrak{a}(M)=M$ for any $M$ with $\ass^{\rm f}_R(M)\subseteq\var(\mathfrak{a})$.
\end{aufz}
If $R$ is noetherian, all these statements hold, but none of them need hold in general. We are interested in conditions on $\mathfrak{a}$ under which some of these properties hold, as well as in relations among these properties. In \cite[4.5]{sol} it was shown for example that (4) holds if and only if $\Gamma_\mathfrak{a}=\overline{\Gamma}_\mathfrak{a}$.
We will see that the ``large version'' of (4) holds always and that the ``large version'' of (5) is equivalent to ($\overline{3}$). We will also see that (2)$\Rightarrow$(3)$\Rightarrow$(5)$\Rightarrow$($\overline{3}$)$\Leftarrow$($\overline{2}$). A further result will be the equivalence of (3), (4) and (5) provided $\sqrt{\mathfrak{a}}$ is maximal and $\Gamma_\mathfrak{a}$ is a radical. Moreover, we will have a look at how the above properties behave when we manipulate $\mathfrak{a}$, e.g., by taking its radical, or by adding to it a further ideal with some of these properties.\medskip
After some rather general results and criteria in Section 2, we will have a closer look at two special classes of ideals, namely idempotent ideals (Section 3) and nil ideals (Section 4). Torsion functors with respect to such ideals behave not too bad. We will be able to show, for example, that idempotent ideals fulfil (1); as an application it will follow that any ideal in an absolutely flat ring has all of the above properties. The case of nil ideals is more complicated, but we will show that for the maximal ideal of a $0$-dimensional local ring there are at most five possibilities concerning fairness and centredness properties. (Unfortunately, for one of these five classes the author was not able to decide whether or not it is empty.) Finally, we will have a brief look at the behaviour of the above properties under localisation in Section 5.\medskip
\textbf{Notation.} We denote by $\spec(R)$ the spectrum of $R$, by $\Max(R)$ the set of maximal ideals of $R$, by $\Min(R)$ the set of minimal prime ideals of $R$, and by ${\sf Mod}(R)$ the category of $R$-modules. For a set $I$ we denote by $R[(X_i)_{i\in I}]$ the polynomial algebra over $R$ in the indeterminates $(X_i)_{i\in I}$. We denote by $\var(\mathfrak{a})$ the variety of $\mathfrak{a}$, by $\min(\mathfrak{a})$ the set of minimal elements of $\var(\mathfrak{a})$, and by $\max(\mathfrak{a})$ the set of maximal element of $\var(\mathfrak{a})$. For an $R$-module $M$ we denote by $\supp_R(M)$ the support of $M$.
\section{Preliminaries}
We collect basic facts about torsion functors, assassins, and weak assassins. For details we refer the reader to \cite{sol}, \cite[Chapter IV]{ac} (especially Exercice IV.1.17) and \cite[00L9, 0546]{stacks}.
\begin{no}\label{pre03}
Setting \[\Gamma_\mathfrak{a}(M)\mathrel{\mathop:}=\{x\in M\mid\exists n\in\mathbbm{N}\colon\mathfrak{a}^n\subseteq(0:_Rx)\}\] and \[\overline{\Gamma}_\mathfrak{a}(M)\mathrel{\mathop:}=\{x\in M\mid\mathfrak{a}\subseteq\sqrt{(0:_Rx)}\}\] for every $R$-module $M$ yields subfunctors \[\Gamma_\mathfrak{a}\hookrightarrow\overline{\Gamma}_\mathfrak{a}\hookrightarrow{\rm Id}_{{\sf Mod}(R)}\] (\cite[3.2]{sol}). The functors $\Gamma_\mathfrak{a}$ and $\overline{\Gamma}_\mathfrak{a}$ are called \textit{the small $\mathfrak{a}$-torsion functor} and \textit{the large $\mathfrak{a}$-torsion functor;} they need not be equal (\cite[Section 4]{sol}).
\end{no}
\begin{no}\label{pre05}
A) Both functors $\Gamma_\mathfrak{a}$ and $\overline{\Gamma}_\mathfrak{a}$ are left exact, hence for an $R$-module $M$ and a sub-$R$-module $N\subseteq M$ we have $N\cap\Gamma_\mathfrak{a}(M)=\Gamma_\mathfrak{a}(N)$ and $N\cap\overline{\Gamma}_\mathfrak{a}(M)=\overline{\Gamma}_\mathfrak{a}(N)$ (\cite[9.1 A), 9.2]{sol}).\smallskip
B) We have $\Gamma_\mathfrak{a}={\rm Id}_{{\sf Mod}(R)}$ if and only if $\mathfrak{a}$ is nilpotent, and $\overline{\Gamma}_\mathfrak{a}={\rm Id}_{{\sf Mod}(R)}$ if and only if $\mathfrak{a}$ is nil. Moreover, $\Gamma_\mathfrak{a}=0$ if and only if $\overline{\Gamma}_\mathfrak{a}=0$ if and only if $\mathfrak{a}=R$ (\cite[3.6]{sol}).\smallskip
C) If $\mathfrak{b}\subseteq R$ is an ideal with $\mathfrak{a}\subseteq\mathfrak{b}$, then $\Gamma_\mathfrak{b}$ and $\overline{\Gamma}_\mathfrak{b}$ are subfunctors of $\Gamma_\mathfrak{a}$ and $\overline{\Gamma}_\mathfrak{a}$, resp. Moreover, if $\mathfrak{b}\subseteq R$ is an arbitrary ideal, then $\overline{\Gamma}_\mathfrak{a}=\overline{\Gamma}_\mathfrak{b}$ if and only if $\sqrt{\mathfrak{a}}=\sqrt{\mathfrak{b}}$. Furthermore, if $n\in\mathbbm{N}^*$, then $\Gamma_\mathfrak{a}=\Gamma_{\mathfrak{a}^n}$ and $\overline{\Gamma}_\mathfrak{a}=\overline{\Gamma}_{\mathfrak{a}^n}$ (\cite[3.4, 3.5]{sol}).\smallskip
D) If $\mathfrak{b}\subseteq R$ is an ideal, then $\Gamma_{\mathfrak{a}+\mathfrak{b}}=\Gamma_\mathfrak{a}\circ\Gamma_\mathfrak{b}$ and $\overline{\Gamma}_{\mathfrak{a}+\mathfrak{b}}=\overline{\Gamma}_\mathfrak{a}\circ\overline{\Gamma}_\mathfrak{b}$ (\cite[3.3 D)]{sol}).\smallskip
E) The functor $\overline{\Gamma}_\mathfrak{a}$ is a radical, i.e., $\overline{\Gamma}_\mathfrak{a}(M/\overline{\Gamma}_\mathfrak{a}(M))=0$ for every $R$-module $M$. If $R$ is noetherian or $\mathfrak{a}$ is idempotent, then $\Gamma_\mathfrak{a}$ is a radical; it need not be so in general, but it may be so even if $\Gamma_\mathfrak{a}\neq\overline{\Gamma}_\mathfrak{a}$ (\cite[Section 5]{sol}).\smallskip
F) If $\mathfrak{p}\in\spec(R)\setminus\var(\mathfrak{a})$, then $\Gamma_\mathfrak{a}(R/\mathfrak{p})=\overline{\Gamma}_\mathfrak{a}(R/\mathfrak{p})=0$. If $\mathfrak{b}\subseteq R$ is an ideal with $\mathfrak{a}\subseteq\mathfrak{b}$, then $\Gamma_\mathfrak{a}(R/\mathfrak{b})=\overline{\Gamma}_\mathfrak{a}(R/\mathfrak{b})=R/\mathfrak{b}$. If $M$ is an $R$-module, then $\supp_R(\Gamma_\mathfrak{a}(M))\subseteq\supp_R(\overline{\Gamma}_\mathfrak{a}(M))\subseteq\var(\mathfrak{a})$.\smallskip
G) If $R\rightarrow S$ is a morphism of rings, then $\Gamma_\mathfrak{a}(\bullet\!\!\upharpoonright_R)=\Gamma_{\mathfrak{a} S}(\bullet)\!\!\upharpoonright_R$ and $\overline{\Gamma}_\mathfrak{a}(\bullet\!\!\upharpoonright_R)=\overline{\Gamma}_{\mathfrak{a} S}(\bullet)\!\!\upharpoonright_R$ as functors from ${\sf Mod}(S)$ to ${\sf Mod}(R)$ (\cite[3.7 A)]{sol}).
\end{no}
\begin{no}\label{pre06}
An $R$-module $M$ is said to be \textit{of bounded small $\mathfrak{a}$-torsion} if there exists $n\in\mathbbm{N}$ with $\mathfrak{a}^n\Gamma_\mathfrak{a}(M)=0$, and \textit{of bounded large $\mathfrak{a}$-torsion} if there exists $n\in\mathbbm{N}$ with $\mathfrak{a}^n\overline{\Gamma}_\mathfrak{a}(M)=0$. If $M$ is of bounded large $\mathfrak{a}$-torsion, then $\Gamma_\mathfrak{a}(M)=\overline{\Gamma}_\mathfrak{a}(M)$. If $\mathfrak{a}$ is idempotent, then every $R$-module is of bounded small $\mathfrak{a}$-torsion (\cite[7.4 A), 7.5 a)]{sol}).
\end{no}
\begin{no}\label{pre08}
Let $M$ be an $R$-module. A prime ideal $\mathfrak{p}\subseteq R$ is said to be \textit{associated to $M$} if there exists $x\in M$ with $\mathfrak{p}=(0:_Rx)$, and \textit{weakly associated to $M$} if there exists $x\in M$ with $\mathfrak{p}\in\min(0:_Rx)$. The sets $\ass_R(M)$ and $\ass^{\rm f}_R(M)$ of associated and weakly associated primes of $M$ are called \textit{the assassin of $M$} and \textit{the weak assassin of $M$} (\cite[IV.1]{ac}).
\end{no}
\begin{no}\label{pre10}
A) Let $M$ be an $R$-module. We have $\ass_R(M)\subseteq\ass^{\rm f}_R(M)$, with equality if $R$ or $M$ is noetherian. Furthermore, $M=0$ if and only if $\ass^{\rm f}_R(M)=\emptyset$ (\cite[0589, 058A, 0588]{stacks}, \cite[1.2]{yassemi}).\smallskip
B) If $0\rightarrow L\rightarrow M\rightarrow N\rightarrow 0$ is an exact sequence of $R$-modules, then \[\ass_R(L)\subseteq\ass_R(M)\subseteq\ass_R(L)\cup\ass_R(N)\] and \[\ass^{\rm f}_R(L)\subseteq\ass^{\rm f}_R(M)\subseteq\ass^{\rm f}_R(L)\cup\ass^{\rm f}_R(N)\] (\cite[02M3, 0548]{stacks}).\smallskip
C) We have $\ass^{\rm f}_R(R/\mathfrak{a})\subseteq\var(\mathfrak{a})$. If $\mathfrak{p}\in\spec(R)$, then $\ass_R(R/\mathfrak{p})=\ass^{\rm f}_R(R/\mathfrak{p})$\linebreak$=\{\mathfrak{p}\}$.\smallskip
D) If $M$ is an $R/\mathfrak{a}$-module, then the isomorphism of ordered sets \[\var(\mathfrak{a})\rightarrow\spec(R/\mathfrak{a}),\;\mathfrak{p}\mapsto\mathfrak{p}/\mathfrak{a}\] induces by restriction and coastriction bijections \[\ass^{\rm f}_R(M\!\!\upharpoonright_R)\rightarrow\ass^{\rm f}_{R/\mathfrak{a}}(M)\quad\text{and}\quad\ass_R(M\!\!\upharpoonright_R)\rightarrow\ass_{R/\mathfrak{a}}(M)\] (\cite[05BY, 05C8]{stacks}).
\end{no}
\begin{no}\label{pre11}
A) For a subset $S\subseteq R$ there are canonical monomorphisms of functors \[\rho^S_\mathfrak{a}\colon S^{-1}\Gamma_\mathfrak{a}(\bullet)\rightarrowtail\Gamma_{S^{-1}\mathfrak{a}}(S^{-1}\bullet)\quad\text{and}\quad\overline{\rho}^S_\mathfrak{a}\colon S^{-1}\overline{\Gamma}_\mathfrak{a}(\bullet)\rightarrowtail\overline{\Gamma}_{S^{-1}\mathfrak{a}}(S^{-1}\bullet)\] that need not be isomorphisms (\cite[8.2, 8.3 B)]{sol}). If $S=R\setminus\mathfrak{p}$ for some $\mathfrak{p}\in\spec(R)$, then they are also denoted by $\rho^\mathfrak{p}_\mathfrak{a}$ and $\overline{\rho}^\mathfrak{p}_\mathfrak{a}$.\smallskip
B) For a subset $S\subseteq R$ there is a bijection \[\{\mathfrak{p}\in\ass^{\rm f}_R(M)\mid\mathfrak{p}\cap S=\emptyset\}\rightarrow\ass^{\rm f}_{S^{-1}R}(S^{-1}M),\;\mathfrak{p}\mapsto S^{-1}\mathfrak{p}.\] By restriction and coastriction it induces an injection \[\{\mathfrak{p}\in\ass_R(M)\mid\mathfrak{p}\cap S=\emptyset\}\rightarrow\ass_{S^{-1}R}(S^{-1}M)\] that need not be surjective (\cite[05C9, 05BZ, ]{stacks}, \cite[IV.1 Exercice 1 c)]{ac}). Note that if $N$ is an $S^{-1}R$-module, then $\{\mathfrak{p}\in\ass_R(N\!\!\upharpoonright_R)\mid\mathfrak{p}\cap S=\emptyset\}=\ass_R(N\!\!\upharpoonright_R)$.
\end{no}
\begin{prop}\label{pre12}
If $M$ is an $R$-module and $N\subseteq M$ is a sub-$R$-module, then\/\footnote{The statement about assassins is part of \cite[IV.1 Exercise 3]{ac}.} \[\ass_R(M/N)\setminus\var(0:_RN)\subseteq\ass_R(M)\text{ and }\ass^{\rm f}_R(M/N)\setminus\var(0:_RN)\subseteq\ass^{\rm f}_R(M).\]
\end{prop}
\begin{proof}
Let $\mathfrak{p}\in\ass_R(M/N)\setminus\var(0:_RN)$. There exist $x\in M\setminus N$ with $\mathfrak{p}=(N:_Rx)$ and $r\in R\setminus\mathfrak{p}$ with $rN=0$. If $s\in(0:_Rrx)$, then $srx=0\in N$, hence $sr\in\mathfrak{p}$, and thus $s\in\mathfrak{p}$. If $t\in\mathfrak{p}$, then $trx=rtx\in rN=0$, and thus $t\in(0:_Rrx)$. This shows that $\mathfrak{p}=(0:_Rrx)$. It follows that $\mathfrak{p}\in\ass_R(M)$.
Let $\mathfrak{p}\in\ass^{\rm f}_R(M/N)\setminus\var(0:_RN)$. There exist $x\in M\setminus N$ with $\mathfrak{p}\in\min(N:_Rx)$ and $r\in R\setminus\mathfrak{p}$ with $rN=0$. If $s\in(0:_Rrx)$, then $srx=0\in N$, hence $sr\in\mathfrak{p}$, and thus $s\in\mathfrak{p}$. This shows that $(0:_Rrx)\subseteq\mathfrak{p}$. Let $\mathfrak{q}\in\spec(R)$ with $(0:_Rrx)\subseteq\mathfrak{q}\subseteq\mathfrak{p}$. If $s\in(N:_Rx)$, then $sx\in N$, hence $srx=rsx=0$, and thus $s\in(0:_Rrx)\subseteq\mathfrak{q}$. It follows that $(N:_Rx)\subseteq\mathfrak{q}$, and minimality of $\mathfrak{p}$ implies $\mathfrak{q}=\mathfrak{p}$. Therefore, $\mathfrak{p}\in\min(0:_Rrx)$, and thus $\mathfrak{p}\in\ass^{\rm f}_R(M)$.
\end{proof}
\section{Fairness and centredness}
In this section, we recall the fairness and centredness properties introduced in \cite{asstor}. Moreover, we introduce ``large versions'' of these fairness properties, and we show that ``large versions'' of these centredness properties yield nothing new. In the further results, there are three main themes. First, we are interested in how these properties behave under change of the supporting ideal. Second, we look for implications between these properties. And third, we collect criteria for some of these properties.
\newpage
\begin{no}\label{fac10}
A) Let $M$ be an $R$-module. By \cite[3.1]{asstor}, we have the following relations.
\begin{aufz}
\item[a)] $\ass_R(\Gamma_\mathfrak{a}(M))=\ass_R(M)\cap\var(\mathfrak{a})$;
\item[b)] $\ass^{\rm f}_R(\Gamma_\mathfrak{a}(M))\subseteq\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})$;
\item[c)] $\ass_R(M/\Gamma_\mathfrak{a}(M))\supseteq\ass_R(M)\setminus\var(\mathfrak{a})$;
\item[d)] $\ass^{\rm f}_R(M/\Gamma_\mathfrak{a}(M))\supseteq\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a})$.
\end{aufz}
The $R$-module $M$ is called \textit{weakly $\mathfrak{a}$-quasifair} if \[\ass^{\rm f}_R(\Gamma_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\cap\var(\mathfrak{a}),\] \textit{$\mathfrak{a}$-fair} if \[\ass_R(M/\Gamma_\mathfrak{a}(M))=\ass_R(M)\setminus\var(\mathfrak{a}),\] and \textit{weakly $\mathfrak{a}$-fair} if \[\ass^{\rm f}_R(M/\Gamma_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a}).\] (In view of \ref{fac30}, these notions could be called ``weakly small $\mathfrak{a}$-quasifair'', ``small $\mathfrak{a}$-fair'' and ``weakly small $\mathfrak{a}$-fair'', but we stick to the less clumsy terminology introduced in \cite{asstor}.)\smallskip
B) The ideal $\mathfrak{a}$ is called \textit{weakly quasifair,} \textit{weakly fair,} or \textit{fair,} resp. if every $R$-module is weakly $\mathfrak{a}$-quasifair, weakly $\mathfrak{a}$-fair, or $\mathfrak{a}$-fair, resp.\smallskip
C) By \cite[3.5]{asstor}, $\mathfrak{a}$ is weakly quasifair, weakly fair, or fair resp. if and only if every monogeneous $R$-module is weakly $\mathfrak{a}$-quasifair, weakly $\mathfrak{a}$-fair, or $\mathfrak{a}$-fair, resp.
\end{no}
\begin{prop}\label{fac20}
Let $M$ be an $R$-module. Then:
\begin{aufz}
\item[a)] $\ass_R(\overline{\Gamma}_\mathfrak{a}(M))=\ass_R(M)\cap\var(\mathfrak{a})=\ass_R(\Gamma_\mathfrak{a}(M))$;
\item[b)] $\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\subseteq\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})$;
\item[c)] $\ass_R(M/\overline{\Gamma}_\mathfrak{a}(M))\supseteq\ass_R(M)\setminus\var(\mathfrak{a})$;
\item[d)] $\ass^{\rm f}_R(M/\overline{\Gamma}_\mathfrak{a}(M))\supseteq\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a})$.
\end{aufz}
\end{prop}
\begin{proof}
We have $\ass_R(\overline{\Gamma}_\mathfrak{a}(M))\subseteq\ass_R(M)$ and $\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\subseteq\ass^{\rm f}_R(M)$ (\ref{pre10} B)). Let $\mathfrak{p}\in\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))$. There exists $x\in\overline{\Gamma}_\mathfrak{a}(M)$ with $(0:_Rx)\subseteq\mathfrak{p}$. For $r\in\mathfrak{a}$ there exists $n\in\mathbbm{N}$ with $r^nx=0$, hence $r^n\subseteq(0:_Rx)\subseteq\mathfrak{p}$ and therefore $r\in\mathfrak{p}$. It follows $\mathfrak{a}\subseteq\mathfrak{p}$, hence $\ass_R(\overline{\Gamma}_\mathfrak{a}(M))\subseteq\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\subseteq\var(\mathfrak{a})$ (\ref{pre10} A)). So, we have proven b) and the inclusion ``$\subseteq$'' at the first place in a). As \[\ass_R(M)\cap\var(\mathfrak{a})=\ass_R(\Gamma_\mathfrak{a}(M))\subseteq\ass_R(\overline{\Gamma}_\mathfrak{a}(M))\] (\ref{fac10} A) a), \ref{pre03}, \ref{pre10} B)) we also get the inclusion ``$\supseteq$'' at the first place and the second equality in a). Finally, \[\ass_R(M)\subseteq\ass_R(\overline{\Gamma}_\mathfrak{a}(M))\cup\ass_R(M/\overline{\Gamma}_\mathfrak{a}(M))\] and \[\ass^{\rm f}_R(M)\subseteq\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\cup\ass^{\rm f}_R(M/\overline{\Gamma}_\mathfrak{a}(M))\] (\ref{pre10} B)), thus c) and d) follow from a) and b).
\end{proof}
\begin{no}\label{fac30}
A) An $R$-module $M$ is called \textit{weakly large $\mathfrak{a}$-quasifair} if \[\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\cap\var(\mathfrak{a}),\] \textit{large $\mathfrak{a}$-fair} if \[\ass_R(M/\overline{\Gamma}_\mathfrak{a}(M))=\ass_R(M)\setminus\var(\mathfrak{a}),\] and \textit{weakly large $\mathfrak{a}$-fair} if \[\ass^{\rm f}_R(M/\overline{\Gamma}_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a}).\]
B) The ideal $\mathfrak{a}$ is called \textit{weakly large quasifair,} \textit{weakly large fair,} or \textit{large fair}, resp. if every $R$-module is weakly large $\mathfrak{a}$-quasifair, weakly large $\mathfrak{a}$-fair, or large $\mathfrak{a}$-fair, resp.
\end{no}
\begin{prop}\label{fac40}
The ideal $\mathfrak{a}$ is weakly large quasifair, weakly large fair, or large fair, resp. if and only if every monogeneous $R$-module is weakly large $\mathfrak{a}$-quasifair, weakly large $\mathfrak{a}$-fair, or large $\mathfrak{a}$-fair, resp.
\end{prop}
\begin{proof}
Let $M$ be an $R$-module. Suppose that every monogeneous $R$-module is weakly large $\mathfrak{a}$-quasifair. Let $\mathfrak{p}\in\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})$. There exists $x\in M$ with $\mathfrak{p}\in\min(0:_Rx)$. It follows that \[\mathfrak{p}\in\ass^{\rm f}_R(\langle x\rangle_R)\cap\var(\mathfrak{a})=\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(\langle x\rangle_R))\subseteq\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\] (\ref{pre10} B), \ref{pre05} A)), and thus $M$ is weakly large $\mathfrak{a}$-quasifair (\ref{fac20} b)).
Next, suppose that every monogeneous $R$-module is large $\mathfrak{a}$-fair or weakly large $\mathfrak{a}$-fair, resp. Let $\mathfrak{p}\in\ass_R(M/\overline{\Gamma}_\mathfrak{a}(M))$ or $\mathfrak{p}\in\ass^{\rm f}_R(M/\overline{\Gamma}_\mathfrak{a}(M))$, resp. There exists $x\in M$ with $\mathfrak{p}=(0:_R\overline{x})$ or $\mathfrak{p}\in\min(0:_R\overline{x})$, resp., where $\overline{x}$ denotes the canonical image of $x$ in $M/\overline{\Gamma}_\mathfrak{a}(M)$. Then, $\langle x\rangle_R/\overline{\Gamma}_\mathfrak{a}(\langle x\rangle_R)\cong\langle\overline{x}\rangle_R$ (\ref{pre05} A)), and thus \[\mathfrak{p}\in\ass_R(\langle\overline{x}\rangle_R)=\ass_R(\langle x\rangle_R/\overline{\Gamma}_\mathfrak{a}(\langle x\rangle_R))=\ass_R(\langle x\rangle_R)\setminus\var(\mathfrak{a})\subseteq\ass_R(M)\setminus\var(\mathfrak{a})\] or \[\mathfrak{p}\in\ass^{\rm f}_R(\langle\overline{x}\rangle_R)=\ass^{\rm f}_R(\langle x\rangle_R/\overline{\Gamma}_\mathfrak{a}(\langle x\rangle_R))=\ass^{\rm f}_R(\langle x\rangle_R)\setminus\var(\mathfrak{a})\subseteq\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a}),\] resp. (\ref{pre10} B)). Thus, $M$ is large $\mathfrak{a}$-fair or weakly large $\mathfrak{a}$-fair, resp. (\ref{fac20} c), d)).
\end{proof}
\begin{prop}\label{fac60}
Let $M$ be an $R$-module. Then:
\begin{aufz}
\item[a)] $\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\emptyset\Rightarrow\overline{\Gamma}_\mathfrak{a}(M)=0\Rightarrow\Gamma_\mathfrak{a}(M)=0\Rightarrow\ass_R(M)\cap\var(\mathfrak{a})=\emptyset$;
\item[b)] $\Gamma_\mathfrak{a}(M)=M\Rightarrow\ass^{\rm f}_R(M)\subseteq\var(\mathfrak{a})\Leftrightarrow\overline{\Gamma}_\mathfrak{a}(M)=M$.
\end{aufz}
\end{prop}
\begin{proof}
a) The first implication follows from \ref{fac20} b) and \ref{pre10} A), the second from \ref{pre03}, and the third from \ref{fac10} a). b) holds by \cite[4.2]{sol}.
\end{proof}
\begin{no}\label{fac63}
A) The ideal $\mathfrak{a}$ is called \textit{centred} if \[\Gamma_\mathfrak{a}(M)=0\Leftrightarrow\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\emptyset\] for every $R$-module $M$, \textit{half-centred} if \[\Gamma_\mathfrak{a}(M)=M\Leftrightarrow\ass^{\rm f}_R(M)\subseteq\var(\mathfrak{a})\] for every $R$-module $M$, and \textit{well-centred} if it is centred and half-centred. (These notions could be called ``small centred'', ``small half-centred'' and ``small well-centred'', but we will recognise this as superfluous in \ref{fac110}.)
B) By \cite[4.5]{sol}, $\mathfrak{a}$ is half-centred if and only if $\Gamma_\mathfrak{a}=\overline{\Gamma}_\mathfrak{a}$.\smallskip
C) By B), \ref{pre05} E) and \cite[4.4]{asstor}, $\mathfrak{a}$ is well-centred if and only if $\mathfrak{a}$ is centred and $\Gamma_\mathfrak{a}$ is a radical.
\end{no}
\begin{prop}\label{fac70}
a) The ideal $\mathfrak{a}$ is centred if and only if $\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\emptyset$ for every monogeneous $R$-module $M$ with $\Gamma_\mathfrak{a}(M)=0$.
b) The ideal $\mathfrak{a}$ is half-centred if and only if $\Gamma_\mathfrak{a}(M)=M$ for every monogeneous $R$-module $M$ with $\ass^{\rm f}_R(M)\subseteq\var(\mathfrak{a})$.
\end{prop}
\begin{proof}
a) Suppose that $\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\emptyset$ for every monogeneous $R$-module $M$ with $\Gamma_\mathfrak{a}(M)=0$. Let $M$ be an $R$-module with $\Gamma_\mathfrak{a}(M)=0$. Let $\mathfrak{p}\in\ass^{\rm f}_R(M)$. There exists $x\in M$ with $\mathfrak{p}\in\min(0:_Rx)$. Then, $\Gamma_\mathfrak{a}(\langle x\rangle_R)=0$ (\ref{pre05} A)) and $\mathfrak{p}\in\ass^{\rm f}_R(\langle x\rangle_R)$, hence $\mathfrak{p}\notin\var(\mathfrak{a})$. It follows that $\mathfrak{a}$ is centred. The converse is clear.
b) Suppose that $\Gamma_\mathfrak{a}(M)=M$ for every monogeneous $R$-module $M$ with\linebreak $\ass^{\rm f}_R(M)\subseteq\var(\mathfrak{a})$. Let $M$ be an $R$-module with $\ass^{\rm f}_R(M)\subseteq\var(\mathfrak{a})$. Let $x\in M$. Then, $\ass^{\rm f}_R(\langle x\rangle_R)\subseteq\ass^{\rm f}_R(M)\subseteq\var(\mathfrak{a})$ (\ref{pre10} B)), hence $\Gamma_\mathfrak{a}(\langle x\rangle_R)=\langle x\rangle_R$, and therefore $x\in\Gamma_\mathfrak{a}(M)$ (\ref{pre05} A)). This shows that $\Gamma_\mathfrak{a}(M)=M$. It follows that $\mathfrak{a}$ is half-centred. The converse is clear.
\end{proof}
\begin{prop}\label{fac100}
The following statements are equivalent:
\begin{equi}
\item[(i)] $\mathfrak{a}$ is weakly large quasifair;
\item[(ii)] $\overline{\Gamma}_\mathfrak{a}(M)=0\Leftrightarrow\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\emptyset$ for every $R$-module $M$.
\end{equi}
\end{prop}
\begin{proof}
If (i) holds and $M$ is an $R$-module with $\overline{\Gamma}_\mathfrak{a}(M)=0$, then\linebreak $\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))=\emptyset$, hence \ref{fac60} a) yields (ii). If (ii) holds and $M$ is an $R$-module, then $\ass^{\rm f}_R(M/\overline{\Gamma}_\mathfrak{a}(M))\cap\var(\mathfrak{a})=\emptyset$ (\ref{pre05} E)), hence \[\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})\subseteq\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\cup(\ass^{\rm f}_R(M/\overline{\Gamma}_\mathfrak{a}(M))\cap\var(\mathfrak{a}))=\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\] (\ref{pre10} B)), and thus \ref{fac20} b) yields (i).
\end{proof}
\begin{no}\label{fac110}
As every ideal is ``large half-centred'' by \ref{fac60} b) and ``large centredness'' is equivalent to weak large quasifairness by \ref{fac100}, there is no need to introduce large centredness notions. Therefore, we will stick to the terminology for small centredness introduced in \cite{asstor}.
\end{no}
\begin{no}\label{fac115}
A) Let $\mathfrak{b}\subseteq R$ be an ideal and let $M$ be an $R/\mathfrak{b}$-module. It follows from \ref{pre10} D) and \ref{pre05} G) that $M$ is (large) $(\mathfrak{a}+\mathfrak{b})/\mathfrak{b}$-fair, weakly (large) $(\mathfrak{a}+\mathfrak{b})/\mathfrak{b}$-fair, or weakly (large) $(\mathfrak{a}+\mathfrak{b})/\mathfrak{b}$-quasifair, resp. if and only if $M\!\!\upharpoonright_R$ is (large) $\mathfrak{a}$-fair, weakly (large) $\mathfrak{a}$-fair, or weakly (large) $\mathfrak{a}$-quasifair, resp.\smallskip
B) Let $\mathfrak{b}\subseteq R$ be an ideal. It follows from A) that if $\mathfrak{a}$ is (large) fair, weakly (large) fair, or weakly (large) quasifair, resp., then so is $(\mathfrak{a}+\mathfrak{b})/\mathfrak{b}$.\smallskip
C) Let $\mathfrak{b}\subseteq R$ be an ideal. It follows from \ref{pre10} D) and \ref{pre05} G) that if $\mathfrak{a}$ is centred, half-centred, or well-centred, resp., then so is $(\mathfrak{a}+\mathfrak{b})/\mathfrak{b}$.\smallskip
D) Let $\mathfrak{b}\subseteq R$ be an ideal. It follows from C) and \ref{fac63} B) that if $\Gamma_\mathfrak{a}=\overline{\Gamma}_\mathfrak{a}$, then $\Gamma_{(\mathfrak{a}+\mathfrak{b})/\mathfrak{b}}=\overline{\Gamma}_{(\mathfrak{a}+\mathfrak{b})/\mathfrak{b}}$.
\end{no}
\begin{prop}\label{fac120}
For an $R$-module $M$ we have the following implications: \[\xymatrix@R15pt{M\text{ is weakly }\mathfrak{a}\text{-fair}\ar@{=>}[d]&M\text{ is weakly large }\mathfrak{a}\text{-fair}\ar@{=>}[d]\\M\text{ is weakly }\mathfrak{a}\text{-quasifair}\ar@{=>}[r]&M\text{ is weakly large }\mathfrak{a}\text{-quasifair}.}\]
\end{prop}
\begin{proof}
The left vertical implication holds by \cite[3.3]{asstor}. For a weakly large $\mathfrak{a}$-fair $R$-module $M$ we have \[\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})\subseteq\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\cup(\ass^{\rm f}_R(M/\overline{\Gamma}_\mathfrak{a}(M))\cap\var(\mathfrak{a}))=\]\[\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\cup((\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a}))\cap\var(\mathfrak{a}))=\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\] (\ref{pre10} B)), so the right vertical implication follows from \ref{fac20} b). For a weakly $\mathfrak{a}$-quasifair $R$-module $M$ we have \[\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\ass^{\rm f}_R(\Gamma_\mathfrak{a}(M))\subseteq\ass^{\rm f}_R(\overline{\Gamma}_\mathfrak{a}(M))\subseteq\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})\] (\ref{pre10} B), \ref{pre03}), so the horizontal implication follows from \ref{fac20} b).
\end{proof}
\begin{prop}\label{fac130}
a) We have the following implications: \[\xymatrix@R15pt{\mathfrak{a}\text{ is weakly fair}\ar@{=>}[d]&&\mathfrak{a}\text{ is weakly large fair}\ar@{=>}[d]\\\mathfrak{a}\text{ is weakly quasifair}\ar@{=>}[r]&\mathfrak{a}\text{ is centred}\ar@{=>}[r]&\mathfrak{a}\text{ is weakly large quasifair}.}\]
b) If $\mathfrak{a}$ is half-centred, we have the following implications: \[\xymatrix@R15pt{\mathfrak{a}\text{ is weakly fair}\qquad\ar@{<=>}[rr]\ar@{=>}[d]&&\qquad\mathfrak{a}\text{ is weakly large fair}\ar@{=>}[d]\\\mathfrak{a}\text{ is weakly quasifair}\ar@{<=>}[r]&\mathfrak{a}\text{ is centred}\ar@{<=>}[r]&\mathfrak{a}\text{ is weakly large quasifair}.}\]
\end{prop}
\begin{proof}
a) The vertical implications are clear by \ref{fac120}. The first horizontal implication was shown in \cite[4.4]{asstor} under the hypothesis that $\Gamma_\mathfrak{a}$ is a radical, but no use was made of this hypothesis. The second horizontal implication follows from \ref{fac60} a) and \ref{fac100}. b) follows from a) and \ref{fac63} B).
\end{proof}
\begin{no}\label{fac131}
A) Let $\mathfrak{b}\subseteq R$ be an ideal with $\mathfrak{a}\subseteq\mathfrak{b}\subseteq\sqrt{\mathfrak{a}}$ (e.g. $\mathfrak{a}=\mathfrak{b}^n$ for some $n\in\mathbbm{N}^*$, or $\mathfrak{b}=\sqrt{\mathfrak{a}}$). Then, $\var(\mathfrak{a})=\var(\mathfrak{b})$ and $\overline{\Gamma}_\mathfrak{a}=\overline{\Gamma}_\mathfrak{b}$ (\ref{pre05} C)). Therefore, an $R$-module $M$ is large $\mathfrak{a}$-fair, weakly large $\mathfrak{a}$-fair, or weakly large $\mathfrak{a}$-quasifair, resp. if and only if it is large $\mathfrak{b}$-fair, weakly large $\mathfrak{b}$-fair, or weakly large $\mathfrak{b}$-quasifair, resp. In particular, $\mathfrak{a}$ is large fair, weakly large fair, or weakly large quasifair if and only if $\mathfrak{b}$ is so.\smallskip
B) Let $n\in\mathbbm{N}^*$. Then, $\Gamma_\mathfrak{a}=\Gamma_{\mathfrak{a}^n}$ (\ref{pre05} C)). Therefore, an $R$-module $M$ is $\mathfrak{a}$-fair, weakly $\mathfrak{a}$-fair, or weakly $\mathfrak{a}$-quasifair, resp. if and only if it is $\mathfrak{a}^n$-fair, weakly $\mathfrak{a}^n$-fair, or weakly $\mathfrak{a}^n$-quasifair, resp. In particular, $\mathfrak{a}$ is fair, weakly fair, or weakly quasifair if and only if $\mathfrak{a}^n$ is so. Moreover, $\mathfrak{a}$ is half-centred, centred, or well-centred if and only if $\mathfrak{a}^n$ is so.
\end{no}
\begin{prop}\label{fac132}
Let $\mathfrak{b}\subseteq R$ be an ideal with $\mathfrak{a}\subseteq\mathfrak{b}\subseteq\sqrt{\mathfrak{a}}$.
a) A weakly $\mathfrak{b}$-quasifair $R$-module is weakly $\mathfrak{a}$-quasifair.
b) If $\mathfrak{b}$ is weakly quasifair, then so is $\mathfrak{a}$.
c) If $\mathfrak{b}$ is half-centred, centred, or well-centred, then so is $\mathfrak{a}$.
\end{prop}
\begin{proof}
a) For a weakly $\mathfrak{b}$-quasifair $R$-module $M$ we have \[\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\ass^{\rm f}_R(M)\cap\var(\mathfrak{b})=\ass^{\rm f}_R(\Gamma_{\mathfrak{b}}(M))\subseteq\ass^{\rm f}_R(\Gamma_\mathfrak{a}(M)),\] and hence we get the claim. b) follows from a). c) holds since $\var(\mathfrak{a})=\var(\mathfrak{b})$ and $\Gamma_\mathfrak{b}$ is a subfunctor of $\Gamma_\mathfrak{a}$.
\end{proof}
\begin{no}\label{fac133}
The converses of \ref{fac132} a) and b) need not hold. More precisely, if an $R$-module $M$ is $\mathfrak{a}$-fair, weakly $\mathfrak{a}$-fair, or weakly $\mathfrak{a}$-quasifair, resp., then it need not be $\sqrt{\mathfrak{a}}$-fair, weakly $\sqrt{\mathfrak{a}}$-fair, or weakly $\sqrt{\mathfrak{a}}$-quasifair, resp. Indeed, since every $R$-module is $0$-fair and weakly $0$-fair, it suffices to exhibit $0$-dimensional local rings whose maximal ideals, necessarily equal to $\sqrt{0}$, are not fair or not weakly quasifair (\ref{fac130} a)). Such examples were constructed in the proofs of \cite[3.8, 3.9]{asstor}. (In \ref{nil60} B) we will see that the converses of \ref{fac132} c) hold neither.)
\end{no}
\begin{prop}\label{fac134}
a) If $\mathfrak{a}$ has a power of finite type, then it is well-centred and weakly quasifair.
b) Ideals in noetherian rings are well-centred, fair, and weakly fair.
c) Noetherian $R$-modules are $\mathfrak{a}$-fair, weakly $\mathfrak{a}$-fair, large $\mathfrak{a}$-fair, and weakly large $\mathfrak{a}$-fair.
\end{prop}
\begin{proof}
a) By \ref{fac131} B), we may suppose that $\mathfrak{a}$ is of finite type. Then, $\mathfrak{a}$ is half-centred (\cite[4.4 c)]{sol}), hence $\Gamma_\mathfrak{a}=\overline{\Gamma}_\mathfrak{a}$ is a radical (\ref{fac63} B), \ref{pre05} E)), and $\mathfrak{a}$ is weakly quasifair (\cite[5.4]{asstor}), thus well-centred (\ref{fac130} a), \ref{fac63} B)). b) follows from \cite[3.6]{asstor} and a). c) follows from \cite[3.6]{asstor} and \cite[4.6 d)]{sol}.
\end{proof}
\begin{exas}\label{fac136}
A) The ideal $R$ is well-centred, fair, and weakly fair (\ref{pre05} B)).\smallskip
B) An $R$-module $M$ with $\overline{\Gamma}_\mathfrak{a}(M)=M$ is large $\mathfrak{a}$-fair and weakly large $\mathfrak{a}$-fair; an $R$-module $M$ with $\Gamma_\mathfrak{a}(M)=M$ is $\mathfrak{a}$-fair, weakly $\mathfrak{a}$-fair, large $\mathfrak{a}$-fair, and weakly large $\mathfrak{a}$-fair (\ref{pre03}).\smallskip
C) Nil ideals are large fair and weakly large fair; nilpotent ideals are well-centred, fair, and weakly fair (B), \ref{pre05} B), \ref{fac134} a)).\smallskip
D) If $\mathfrak{b}\subseteq R$ is an ideal with $\mathfrak{a}\subseteq\mathfrak{b}$, then the $R$-module $R/\mathfrak{b}$ is $\mathfrak{a}$-fair, weakly $\mathfrak{a}$-fair, large $\mathfrak{a}$-fair, and weakly large $\mathfrak{a}$-fair (B), \ref{pre05} F)).\smallskip
E) If $\mathfrak{p}\in\spec(R)$, the $R$-module $R/\mathfrak{p}$ is $\mathfrak{a}$-fair, weakly $\mathfrak{a}$-fair, large $\mathfrak{a}$-fair, and weakly large $\mathfrak{a}$-fair. Indeed, for $\mathfrak{p}\in\var(\mathfrak{a})$ this holds by D), and for $\mathfrak{p}\notin\var(\mathfrak{a})$ it follows from \ref{pre10} C) and \ref{pre05} F). In particular, if $R$ is integral, then the $R$-module $R$ is $\mathfrak{a}$-fair, weakly $\mathfrak{a}$-fair, large $\mathfrak{a}$-fair, and weakly large $\mathfrak{a}$-fair.
\end{exas}
\begin{no}\label{fac137}
If we wish to check whether $\mathfrak{a}$ has some fairness or centredness property, then by \ref{fac10} C), \ref{fac40} and \ref{fac70}, it suffices to consider $R$-modules of the form $R/\mathfrak{b}$ for ideals $\mathfrak{b}\subseteq R$. By \ref{fac136} D) and \ref{pre05} F), we may additionally suppose that $\mathfrak{a}\not\subseteq\mathfrak{b}$.
\end{no}
\begin{no}\label{fac161}
In \cite[5.11 $(*)$]{asstor} we asked whether every ideal $\mathfrak{a}$ such that $\Gamma_\mathfrak{a}$ is a radical is weakly quasifair, or even weakly fair. The answer to this is negative. Indeed, by \cite[5.5 B)]{sol} and \ref{fac63} B), there exist a ring $R$ and an ideal $\mathfrak{a}\subseteq R$ that is not half-centred such that $\Gamma_\mathfrak{a}$ is a radical. Then, $\mathfrak{a}$ is not well-centred, hence not weakly quasifair, and thus not weakly fair (\ref{fac130} a), \ref{fac63} B)).
\end{no}
\begin{prop}\label{fac162}
a) Suppose that $\Gamma_\mathfrak{a}(R)=\mathfrak{a}$. If $R\neq 0$, the $R$-module $R$ is not weakly $\mathfrak{a}$-fair. If $\mathfrak{a}$ is prime, the $R$-module $R$ is neither $\mathfrak{a}$-fair nor weakly $\mathfrak{a}$-fair.
b) Suppose that $\overline{\Gamma}_\mathfrak{a}(R)=\mathfrak{a}$. If $R\neq 0$, the $R$-module $R$ is not weakly large $\mathfrak{a}$-fair. If $\mathfrak{a}$ is prime, the $R$-module $R$ is neither large $\mathfrak{a}$-fair nor weakly large $\mathfrak{a}$-fair.
\end{prop}
\begin{proof}
Let $F$ denote $\Gamma_\mathfrak{a}$ or $\overline{\Gamma}_\mathfrak{a}$. As $F(R)=\mathfrak{a}$, we have \[\ass_R(R/F(R))\subseteq\ass^{\rm f}_R(R/F(R))=\ass^{\rm f}_R(R/\mathfrak{a})\subseteq\var(\mathfrak{a})\] (\ref{pre10} A), C)). So, if the $R$-module $R$ is weakly (large) $\mathfrak{a}$-fair, then $\ass^{\rm f}_R(R/\mathfrak{a})=\emptyset$, hence $R/\mathfrak{a}=0$, thus $\mathfrak{a}=R$ and therefore $R=0$. Moreover, if the $R$-module $R$ is (large) $\mathfrak{a}$-fair, then $\ass_R(R/\mathfrak{a})=\emptyset$, and thus $\mathfrak{a}$ is not prime (\ref{pre10} C)).
\end{proof}
\begin{prop}\label{fac163}
Let $M$ be an $R$-module.
a) $\ass_R(M/\overline{\Gamma}_{\mathfrak{a}}(M))\cap\var(\mathfrak{a})=\emptyset$.
b) If $\Gamma_\mathfrak{a}$ is a radical, then $\ass_R(M/\Gamma_{\mathfrak{a}}(M))\cap\var(\mathfrak{a})=\emptyset$.
c) If $\mathfrak{a}$ is well-centred, then $\ass^{\rm f}_R(M/\Gamma_{\mathfrak{a}}(M))\cap\var(\mathfrak{a})=\emptyset$.\footnote{By \ref{fac134} a) this generalises \cite[5.3]{asstor}.}
\end{prop}
\begin{proof}
a) Applying \ref{pre05} E) and \ref{fac20} a) to the $R$-module $M/\overline{\Gamma}_\mathfrak{a}(M)$ yields \[\emptyset=\ass_R(0)=\ass_R(\overline{\Gamma}_\mathfrak{a}(M/\overline{\Gamma}_\mathfrak{a}(M)))=\ass_R(M/\overline{\Gamma}_\mathfrak{a}(M))\cap\var(\mathfrak{a})\] (\ref{pre05} E)) and thus the claim. b) holds by \cite[4.1]{asstor}. c) As $\Gamma_\mathfrak{a}$ is a radical (\ref{fac63} C)), we have $\Gamma_\mathfrak{a}(M/\Gamma_\mathfrak{a}(M))=0$, so centredness implies $\ass^{\rm f}_R(M/\Gamma_{\mathfrak{a}}(M))\cap\var(\mathfrak{a})=\emptyset$.
\end{proof}
\begin{prop}\label{fac165}
Let $\mathfrak{b}\subseteq R$ be an ideal.
a) If $\mathfrak{a}$ and $\mathfrak{b}$ are half-centred, then so is $\mathfrak{a}+\mathfrak{b}$.
b) If $\mathfrak{a}$ is centred and $\mathfrak{b}$ is well-centred or weakly fair, then $\mathfrak{a}+\mathfrak{b}$ is centred.
c) If $\mathfrak{a}$ and $\mathfrak{b}$ are well-centred, then so is $\mathfrak{a}+\mathfrak{b}$.
\end{prop}
\begin{proof}
a) follows from \ref{pre05} D) and \ref{fac63} B). b) Suppose that $\mathfrak{a}$ is centred and $\mathfrak{b}$ is well-centred or weakly fair. Let $M$ be an $R$-module with $\Gamma_{\mathfrak{a}+\mathfrak{b}}(M)=0$. Then, $\Gamma_\mathfrak{a}(\Gamma_\mathfrak{b}(M))=0$ (\ref{pre05} D)). Centredness of $\mathfrak{a}$ yields $\ass^{\rm f}_R(\Gamma_\mathfrak{b}(M))\cap\var(\mathfrak{a})=\emptyset$. The hypothesis on $\mathfrak{b}$ implies that $\ass^{\rm f}_R(M/\Gamma_\mathfrak{b}(M))\cap\var(\mathfrak{b})=\emptyset$ (\ref{fac163} c)). It follows that \[\ass^{\rm f}_R(M)\cap\var(\mathfrak{a}+\mathfrak{b})\subseteq(\ass^{\rm f}_R(\Gamma_\mathfrak{b}(M))\cup\ass^{\rm f}_R(M/\Gamma_\mathfrak{b}(M)))\cap\var(\mathfrak{a})\cap\var(\mathfrak{b})\subseteq\]\[(\ass^{\rm f}_R(\Gamma_\mathfrak{b}(M))\cap\var(\mathfrak{a}))\cup(\ass^{\rm f}_R(M/\Gamma_\mathfrak{b}(M))\cap\var(\mathfrak{b}))=\emptyset\] (\ref{pre10} B)). Thus, $\mathfrak{a}+\mathfrak{b}$ is centred. c) follows from a) and b).
\end{proof}
\begin{prop}\label{fac170}
Let $M$ be an $R$-module. If $\overline{\Gamma}_\mathfrak{a}(M)=0$, then $M$ is large $\mathfrak{a}$-fair. If $\Gamma_\mathfrak{a}(M)=0$, then $M$ is $\mathfrak{a}$-fair.
\end{prop}
\begin{proof}
This follows immediately from \ref{fac20} a).
\end{proof}
\begin{prop}\label{fac172}
Let\/ $\dim(R)=0$, and let $\mathfrak{a}\subsetneqq R$ be a proper ideal. If $\Gamma_\mathfrak{a}(R)=0$, then the $R$-module $R$ is not weakly $\mathfrak{a}$-fair.
\end{prop}
\begin{proof}
As $\dim(R)=0$, every prime ideal is minimal over $0=(0:_R1)$, implying $\ass^{\rm f}_R(R)=\spec(R)$. It follows \[\ass^{\rm f}_R(R)\setminus\var(\mathfrak{a})\subsetneqq\spec(R)=\ass^{\rm f}_R(R)=\ass^{\rm f}_R(R/\Gamma_\mathfrak{a}(R)),\] and thus the claim holds.
\end{proof}
\begin{prop}\label{fac180}
If $\sqrt{\mathfrak{a}}\in\Max(R)$, then: \[\xymatrix{\mathfrak{a}\text{ weakly fair}\ar@{=>}[r]&\mathfrak{a}\text{ half-centred}\ar@{=>}[r]&\mathfrak{a}\text{ weakly quasifair}\ar@{<=>}[r]&\mathfrak{a}\text{ centred.}}\]
\end{prop}
\begin{proof}
The hypothesis implies that $\var(\mathfrak{a})=\{\sqrt{\mathfrak{a}}\}$. First, let $\mathfrak{a}$ be weakly fair. Let $M$ be an $R$-module with $\ass^{\rm f}_R(M)\subseteq\{\sqrt{\mathfrak{a}}\}$. If this inclusion is proper, $M=0$ (\ref{pre10} A)), and otherwise, \[\ass^{\rm f}_R(M/\Gamma_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\setminus\{\sqrt{\mathfrak{a}}\}=\emptyset.\] It follows that $\Gamma_\mathfrak{a}(M)=M$, hence $\mathfrak{a}$ is half-centred. Next, let $\mathfrak{a}$ be half-centred. If $M$ is an $R$-module with $\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})\neq\emptyset$, then $\ass^{\rm f}_R(M)=\{\sqrt{\mathfrak{a}}\}$, hence half-centredness implies $\Gamma_\mathfrak{a}(M)=M$, and so $M$ is weakly $\mathfrak{a}$-quasifair. Therefore, $\mathfrak{a}$ is weakly quasifair. Finally, let $\mathfrak{a}$ be centred. Let $M$ be an $R$-module. We have \[\emptyset\subseteq\ass^{\rm f}_R(\Gamma_\mathfrak{a}(M))\subseteq\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})\subseteq\{\sqrt{\mathfrak{a}}\}\] (\ref{fac10} A) b)). If the first inclusion is proper, then the second one is an equality. If the first inclusion is an equality, then so is the second one by centredness and \ref{pre10} A). Thus, $M$ is weakly $\mathfrak{a}$-quasifair. As weakly quasifair ideals are centred (\ref{fac130} a)), the claim is proven.
\end{proof}
\begin{cor}\label{fac185}
If $\sqrt{\mathfrak{a}}\in\Max(R)$ and $\Gamma_\mathfrak{a}$ is a radical, then: \[\xymatrix{\mathfrak{a}\text{ half-centred}\ar@{<=>}[r]&\mathfrak{a}\text{ weakly quasifair}\ar@{<=>}[r]&\mathfrak{a}\text{ centred.}}\]
\end{cor}
\begin{proof}
This follows immediately from \ref{fac180} and \ref{fac63} B).
\end{proof}
\begin{cor}\label{fac190}
If the maximal ideal of a $0$-dimensional local ring is weakly quasifair or centred, then every ideal is weakly quasifair and centred.
\end{cor}
\begin{proof}
This follows immediately from \ref{fac180} and \ref{fac132} b).
\end{proof}
\begin{prop}\label{fac200}
If every prime ideal in $\var(\mathfrak{a})$ is centred, then $\mathfrak{a}$ is centred.
\end{prop}
\begin{proof}
Let $M$ be an $R$-module with $\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})\neq\emptyset$. There exists a centred $\mathfrak{p}\in\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})$. It follows $0\neq\Gamma_\mathfrak{p}(M)\subseteq\Gamma_\mathfrak{a}(M)$ (\ref{pre05} C)), hence $\Gamma_\mathfrak{a}(M)\neq 0$. Therefore, $\mathfrak{a}$ is centred.
\end{proof}
\section{Idempotent ideals}
In this section, we consider fairness and centredness properties of idempotent ideals, and -- as an application -- of ideals in absolutely flat rings. Our main results are that idempotent ideals are fair, and that all ideals in an absolutely flat ring share all the fairness and centredness properties.
\begin{prop}\label{idem10}
a) Let $M$ be an $R$-module of bounded small $\mathfrak{a}$-torsion. If $\ass_R(M/\Gamma_\mathfrak{a}(M))\cap\var(\mathfrak{a})=\emptyset$, then $M$ is $\mathfrak{a}$-fair. If $\ass^{\rm f}_R(M/\Gamma_\mathfrak{a}(M))\cap\var(\mathfrak{a})=\emptyset$, then $M$ is $\mathfrak{a}$-fair and weakly $\mathfrak{a}$-fair.
b) Let $M$ be an $R$-module of bounded large $\mathfrak{a}$-torsion. Then, $M$ is large $\mathfrak{a}$-fair. If $\ass^{\rm f}_R(M/\overline{\Gamma}_\mathfrak{a}(M))\cap\var(\mathfrak{a})=\emptyset$, then $M$ is weakly large $\mathfrak{a}$-fair.
\end{prop}
\begin{proof}
a) We prove both claims simultaneously. As there exists $n\in\mathbbm{N}$ with $\Gamma_\mathfrak{a}(M)=(0:_M\mathfrak{a}^n)$, we have $(0:_R\Gamma_\mathfrak{a}(M))\subseteq\var(\mathfrak{a})$. Let $\mathfrak{p}\in\ass_R(M/\Gamma_\mathfrak{a}(M))$ or $\mathfrak{p}\in\ass^{\rm f}_R(M/\Gamma_\mathfrak{a}(M))$. By our hypothesis, $\mathfrak{p}\notin\var(\mathfrak{a})$, hence $\mathfrak{p}\notin\var(0:_R\Gamma_\mathfrak{a}(M))$, and so \ref{pre12} implies $\mathfrak{p}\in\ass_R(M)\setminus\var(\mathfrak{a})$ or $\mathfrak{p}\in\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a})$. Thus, $M$ is $\mathfrak{a}$-fair or weakly $\mathfrak{a}$-fair. This proves the first claim, and together with \ref{pre10} A) we get the remaining part of the second claim. b) follows from a), \ref{pre06} and \ref{fac163} a).
\end{proof}
\begin{cor}\label{idem20}
If $\Gamma_\mathfrak{a}$ is a radical, every $R$-module of bounded small $\mathfrak{a}$-torsion is $\mathfrak{a}$-fair. If $\mathfrak{a}$ is well-centred, every $R$-module of bounded small $\mathfrak{a}$-torsion is $\mathfrak{a}$-fair and weakly $\mathfrak{a}$-fair.
\end{cor}
\begin{proof}
This follows immediately from \ref{idem10} a) and \ref{fac163} b), c).
\end{proof}
\begin{cor}\label{idem40}
Idempotent ideals are fair.\footnote{This generalises \cite[5.1]{asstor}.}
\end{cor}
\begin{proof}
If $\mathfrak{a}$ is idempotent, every $R$-module is of bounded small $\mathfrak{a}$-torsion and $\Gamma_\mathfrak{a}$ is a radical (\ref{pre05} E), \ref{pre06}), so \ref{idem20} yields the claim.
\end{proof}
\begin{prop}\label{idem44}
In an absolutely flat ring, every ideal is well-centred, fair and weakly fair.\footnote{This generalises \cite[5.2]{asstor}.}
\end{prop}
\begin{proof}
Let $\mathfrak{a}$ be an ideal in an absolutely flat ring $R$. Then, $\mathfrak{a}$ is half-centred (\cite[4.6 b)]{sol}) and fair (\ref{idem40}). Moreover, every prime ideal is centred (\ref{fac180}), and thus $\mathfrak{a}$ is centred (\ref{fac200}). If $M$ is an $R$-module, then $M$ is of bounded small $\mathfrak{a}$-torsion (\ref{pre06}) and $\ass^{\rm f}_R(M/\Gamma_\mathfrak{a}(M))\cap\var(\mathfrak{a})=\emptyset$ (\ref{fac163} c)), hence $M$ is weakly $\mathfrak{a}$-fair (\ref{idem10} a)). This shows that $\mathfrak{a}$ is weakly fair, and thus the claim is proven.
\end{proof}
\begin{exas}\label{idem50}
A) Let $K$ be a field, let \[R\mathrel{\mathop:}= K[(X_i)_{i\in\mathbbm{N}}]/\langle X_i^2-X_i\mid i\in\mathbbm{N}\rangle,\] denote by $Y_i$ the canonical image of $X_i$ in $R$ for $i\in\mathbbm{N}$, and let $\mathfrak{a}\mathrel{\mathop:}=\langle Y_i\mid i\in\mathbbm{N}\rangle_R$. Then, $R$ is absolutely flat, and $\mathfrak{a}$ is maximal and generated by idempotents, but not by a single idempotent (\cite[1.7 C), D)]{sol}). It follows that $\mathfrak{a}$ is well-centred, fair and weakly fair (\ref{idem44}).\smallskip
B) Let $K$ be a field, let \[R\mathrel{\mathop:}= K[(X_i)_{i\in\mathbbm{Z}}]/\langle X_i^2-X_{i+1}\mid i\in\mathbbm{Z}\rangle,\] denote by $Y_i$ the canonical image of $X_i$ in $R$ for $i\in\mathbbm{Z}$, and let $\mathfrak{a}\mathrel{\mathop:}=\langle Y_i\mid i\in\mathbbm{Z}\rangle_R$. Then, $R$ is a $1$-dimensional Bezout domain, and $\mathfrak{a}$ is maximal and idempotent, but neither generated by idempotents nor half-centred (\cite[1.7 C), E), 5.5 B)]{sol}). It follows that $\mathfrak{a}$ is not centred, and therefore neither weakly quasifair nor weakly fair (\ref{fac185}, \ref{fac130} a)).
\smallskip
C) (cf. \cite[8.3 B)]{sol}) Let $K$ be a field, let \[R\mathrel{\mathop:}= K[(X_i)_{i\in\mathbbm{N}}]/\langle X_i^2-X_i\mid i\in\mathbbm{N}^*\rangle,\] let $Y_i$ denote the canonical image of $X_i$ in $R$ for $i\in\mathbbm{N}$, and let $\mathfrak{a}\mathrel{\mathop:}=\langle Y_i\mid i\in\mathbbm{N}^*\rangle_R$. Then, $\mathfrak{a}$ is generated by idempotents, hence idempotent, half-centred and fair (\cite[4.6 a)]{sol}, \ref{idem40}). Moreover, $\mathfrak{a}\in\Min(R)$. Indeed, $\mathfrak{a}$ is prime since $R/\mathfrak{a}\cong K[Y_0]\cong K[X_0]$. Let $\mathfrak{p}\in\spec(R)$ with $\mathfrak{p}\subseteq\mathfrak{a}$. Let $i\in\mathbbm{N}^*$. If $Y_i\notin\mathfrak{p}$ and $1-Y_i\notin\mathfrak{p}$, then we get the contradiction $0=Y_i(1-Y_i)\notin\mathfrak{p}$. If $1-Y_i\in\mathfrak{p}$, then $1-Y_i\in\mathfrak{a}$, and we get the contradiction $1=1-Y_i+Y_i\in\mathfrak{a}$. It follows that $Y_i\in\mathfrak{p}$, and therefore $\mathfrak{p}=\mathfrak{a}$.
Let $\mathfrak{b}\mathrel{\mathop:}=\langle Y_0^iY_i\mid i\in\mathbbm{N}^*\rangle_R$. Let $f\in R\setminus\{0\}$ with $f\mathfrak{a}\subseteq\mathfrak{b}$, so that there occurs a monomial $g$ in $f$. If $Y_0^p$ is the highest power of $Y_0$ that divides $g$, then we have $fY_{p+1}\in\mathfrak{b}$, hence $gX_{p+1}\in\mathfrak{b}$, and thus $X_0^{p+1}X_{p+1}$ divides $gX_{p+1}$, contradicting our choice of $p$. This shows that $(\mathfrak{b}:_R\mathfrak{a})=0$, and hence -- as $\mathfrak{a}$ is idempotent -- $\Gamma_\mathfrak{a}(R/\mathfrak{b})=0$.
We show now that $\mathfrak{a}$ is not weakly $\mathfrak{a}$-quasifair, and therefore neither centred nor weakly fair (\ref{fac130} b)). Let $g\in(\mathfrak{b}:_RY_0)$. If there occurs in $g$ a monomial of the form $Y_0^l$ with $l\in\mathbbm{N}$, then there occurs in $gY_0\in\mathfrak{b}$ a monomial of the form $Y_0^{l+1}$ with $l\in\mathbbm{N}$, which is a contradiction. Thus, every monomial occuring in $g$ is a multiple of $Y_i$ for some $i\in\mathbbm{N}^*$, and therefore $g\in\mathfrak{a}$. This shows that $(\mathfrak{b}:_RY_0)\subseteq\mathfrak{a}$. As $\mathfrak{a}\in\Min(R)$, we get $\mathfrak{a}\in\min(\mathfrak{b}:_RY_0)=\min(0_{R/\mathfrak{b}}:_R(Y_0+\mathfrak{b}))$, hence $\mathfrak{a}\in\ass^{\rm f}_R(R/\mathfrak{b})$. As $\Gamma_\mathfrak{a}(R/\mathfrak{b})=0$, this implies that $R/\mathfrak{b}$ is not weakly $\mathfrak{a}$-quasifair (\ref{fac100}), and therefore our claim holds.
Note that $\ass_R(R/\mathfrak{b})\cap\var(\mathfrak{a})=\emptyset$ (\ref{fac60} a)) and hence $\mathfrak{a}\in\ass^{\rm f}_R(R/\mathfrak{b})\setminus\ass_R(R/\mathfrak{b})$.
\end{exas}
\begin{no}\label{idem60}
A) If $\mathfrak{a}$ is generated by a single idempotent, then it is well-centred, fair and weakly fair (\ref{fac134} a), \ref{idem40}, \cite[1.7 B)]{sol}, \cite[5.5]{asstor}).\smallskip
B) If $\mathfrak{a}$ is generated by idempotents, then it is half-centred and fair (\cite[4.6 a)]{sol}, A)), but it need not be weakly quasifair, hence neither weakly fair nor centred (\ref{fac130} b), \ref{idem50} C)).\smallskip
C) If $\mathfrak{a}$ is idempotent, then it is fair by A), but it need be neither weakly large quasifair by B) nor half-centred by \ref{idem50} B). Thus, it need be neither weakly quasifair, nor weakly fair, nor weakly large fair, nor centred (\ref{fac130} a)).\smallskip
D) The observations in A)--C) give rise to the following questions:
\begin{qulist}
\item[$(*)$] Are idempotent ideals large fair?
\item[$(**)$] Do there exist a ring $R$ and an ideal $\mathfrak{a}\subseteq R$ that is generated by idempotents, fair, weakly quasifair, but not weakly fair?
\end{qulist}
\end{no}
\section{Nil ideals}
The next class of ideals we turn to are nil ideals. Clearly, they share all large fairness properties, but for small fairness and centredness properties, the situation is more intricate. We will see that for the maximal ideal of a $0$-dimensional local ring there are at least four and at most five possibilities concerning fairness and centredness.
\begin{prop}\label{nil10}
Let $\mathfrak{a}$ be nil.
a) The following statements are equivalent: (i) $\mathfrak{a}$ is nilpotent; (ii) $\mathfrak{a}$ is weakly fair; (iii) $\mathfrak{a}$ is weakly quasifair and $\Gamma_\mathfrak{a}$ is a radical; (iv) $\mathfrak{a}$ is well-centred; (v) $\mathfrak{a}$ is half-centred.
b) The ideal $\mathfrak{a}$ is fair if and only if $\ass_R(M/\Gamma_\mathfrak{a}(M))=\emptyset$ for every (monogeneous) $R$-module $M$.
c) The ideal $\mathfrak{a}$ is weakly quasifair if and only if $\ass^{\rm f}_R(\Gamma_\mathfrak{a}(M))=\ass^{\rm f}_R(M)$ for every (monogeneous) $R$-module $M$.
d) The ideal $\mathfrak{a}$ is centred if and only if $\Gamma_\mathfrak{a}(M)\neq 0$ for every nonzero (monogeneous) $R$-module $M$.
\end{prop}
\begin{proof}
First we note that $\var(\mathfrak{a})=\spec(R)$. a) ``(i)$\Leftrightarrow$(ii)'': The ideal $\mathfrak{a}$ is weakly fair if and only if $\ass^{\rm f}_R(M/\Gamma_\mathfrak{a}(M))=\emptyset$ for every $R$-module $M$, hence if and only if $\Gamma_\mathfrak{a}={\rm Id}_{{\sf Mod}(R)}$ (\ref{pre10} A)), thus if and only if $\mathfrak{a}$ is nilpotent (\ref{pre05} B)). ``(i)$\Rightarrow$(iii)'' follows from \ref{fac134} a) and \ref{fac63} C). ``(iii)$\Rightarrow$(iv)'' follows from \ref{fac130} a) and \ref{fac63} C). ``(iv)$\Rightarrow$(v)'' is clear. ``(v)$\Rightarrow$(i)'': If $\mathfrak{a}$ is half-centred, then $\Gamma_\mathfrak{a}(M)=M$ for every $R$-module $M$, hence $\mathfrak{a}$ is nilpotent (\ref{pre05} B)). b), c), d) follow immediately from \ref{fac10} C) and \ref{fac70}.
\end{proof}
\newpage
\begin{prop}\label{nil20}
Let $\mathfrak{a}$ be nil.
a) If $\mathfrak{a}$ is idempotent and nonzero, it is neither half-centred nor centred.
b) If $\Gamma_\mathfrak{a}$ is a radical, $\mathfrak{a}$ is fair.\footnote{This answers a special case of the still open part of \cite[5.11 $(*)$]{asstor}.}
\end{prop}
\begin{proof}
a) As $\mathfrak{a}$ is idempotent, $\Gamma_\mathfrak{a}$ is a radical (\ref{pre05} E)). Moreover, $\mathfrak{a}$ is not nilpotent, hence not half-centred (\ref{nil10} a)) and thus not centred (\ref{fac63} C)). b) Let $M$ be an $R$-module. We have $\var(\mathfrak{a})=\spec(R)$ and $\Gamma_\mathfrak{a}(M/\Gamma_\mathfrak{a}(M))=0$, hence \[\ass_R(M/\Gamma_\mathfrak{a}(M))=\ass_R(M/\Gamma_\mathfrak{a}(M))\cap\var(\mathfrak{a})=\ass_R(\Gamma_\mathfrak{a}(M/\Gamma_\mathfrak{a}(M)))=\emptyset\] (\ref{fac10} A) a)), so \ref{nil10} b) yields the claim.
\end{proof}
\begin{prop}\label{nil25}
Let $R$ be a $0$-dimensional local ring with maximal ideal $\mathfrak{a}$.
a) If $\Gamma_\mathfrak{a}(R)=0$, then $\mathfrak{a}$ is not centred. If, in addition, there exists an ideal $\mathfrak{b}\subseteq R$ with $\Gamma_\mathfrak{a}(R/\mathfrak{b})=\mathfrak{a}/\mathfrak{b}$, then $\mathfrak{a}$ is not fair.
b) If $\Gamma_\mathfrak{a}(R)=\mathfrak{a}$, then $\mathfrak{a}$ is centred, but not fair.
\end{prop}
\begin{proof}
a) The ideal $\mathfrak{a}$ is not centred by \ref{nil10} d). Concerning the second claim, we have $\ass_R((R/\mathfrak{b})/\Gamma_\mathfrak{a}(R/\mathfrak{b}))=\ass_R(R/\mathfrak{a})=\{\mathfrak{a}\}$ (\ref{pre10} C)), hence $\mathfrak{a}$ is not fair by \ref{nil10} b). b) Let $\mathfrak{b}\subseteq R$ be an ideal with $\mathfrak{b}\subsetneqq\mathfrak{a}$. Then, $0\neq\mathfrak{a}/\mathfrak{b}=\Gamma_\mathfrak{a}(R)/\mathfrak{b}\subseteq\Gamma_\mathfrak{a}(R/\mathfrak{b})$, hence $\Gamma_\mathfrak{a}(R/\mathfrak{b})\neq 0$. As $\Gamma_\mathfrak{a}(R/\mathfrak{a})=R/\mathfrak{a}\neq 0$ (\ref{pre05} F)) we get that $\Gamma_\mathfrak{a}(M)\neq 0$ for every nonzero monogeneous $R$-module $M$. Thus, $\mathfrak{a}$ is centred (\ref{nil10} d)). Finally, $\mathfrak{a}$ is not fair by \ref{fac162} a).
\end{proof}
\begin{exas}\label{nil40}
A) Let $K$ be a field, let \[R\mathrel{\mathop:}= K[(X_i)_{i\in\mathbbm{N}}]/\langle X_i^2\mid i\in\mathbbm{N}\rangle,\] let $Y_i$ denote the canonical image of $X_i$ in $R$ for $i\in\mathbbm{N}$, and let $\mathfrak{a}\mathrel{\mathop:}=\langle Y_i\mid i\in\mathbbm{N}\rangle_R$. Then, $R$ is a $0$-dimensional local ring whose maximal ideal $\mathfrak{a}$ is nil but not nilpotent, and $\Gamma_\mathfrak{a}$ is not a radical. We clearly have $\Gamma_\mathfrak{a}(R)=0$, and setting $\mathfrak{b}\mathrel{\mathop:}=\sum_{i\in\mathbbm{N}}Y_i\mathfrak{a}^i\subseteq R$ we have $\Gamma_\mathfrak{a}(R/\mathfrak{b})=\mathfrak{a}/\mathfrak{b}$. Thus, $\mathfrak{a}$ is neither fair nor centred (\cite[1.4 A), 5.4 A)]{sol}, \ref{nil25} a)).\smallskip
B) Let $K$ be a field, let \[R\mathrel{\mathop:}= K[(X_i)_{i\in\mathbbm{N}}]/\langle\{X_iX_j\mid i,j\in\mathbbm{N},i\neq j\}\cup\{X_i^{i+1}\mid i\in\mathbbm{N}\}\rangle,\] let $Y_i$ denote the canonical image of $X_i$ in $R$ for $i\in\mathbbm{N}$, and let $\mathfrak{a}\mathrel{\mathop:}=\langle Y_i\mid i\in\mathbbm{N}\rangle_R$. Then, $R$ is a $0$-dimensional local ring whose maximal ideal $\mathfrak{a}$ is nil but not nilpotent, and $\Gamma_\mathfrak{a}$ is not a radical. As $\Gamma_\mathfrak{a}(R)=\mathfrak{a}$ it follows that $\mathfrak{a}$ is centred, but not fair (\cite[1.4 B), 5.4 B)]{sol}, \ref{nil25} b)).\smallskip
C) Let $K$ be a field, let \[R\mathrel{\mathop:}= K[(X_i)_{i\in\mathbbm{N}}]/\langle\{X_i^2\mid i\in\mathbbm{N}\}\cup\{X_iX_j\mid i,j\in\mathbbm{N},2i<j\}\rangle,\] let $Y_i$ denote the canonical image of $X_i$ in $R$ for $i\in\mathbbm{N}$, and let $\mathfrak{a}\mathrel{\mathop:}=\langle Y_i\mid i\in\mathbbm{N}\rangle_R$. Then, $R$ is a $0$-dimensional local ring whose maximal ideal $\mathfrak{a}$ is nil but not nilpotent, and $\Gamma_\mathfrak{a}$ is not a radical. As $\Gamma_\mathfrak{a}(R)=\mathfrak{a}$ it follows that $\mathfrak{a}$ is centred, but not fair (\cite[1.5, 5.4 C)]{sol}, \ref{nil25} b)).\smallskip
D) Let $K$ be a field, let \[R\mathrel{\mathop:}= K[(X_i)_{i\in\mathbbm{N}}]/\langle X_i^{i+1}\mid i\in\mathbbm{N}\rangle,\] let $Y_i$ denote the canonical image of $X_i$ in $R$ for $i\in\mathbbm{N}$, and let $\mathfrak{a}\mathrel{\mathop:}=\langle Y_i\mid i\in\mathbbm{N}\rangle_R$. Then, $R$ is a $0$-dimensional local ring whose maximal ideal $\mathfrak{a}$ is nil but not nilpotent, and $\Gamma_\mathfrak{a}$ is not a radical. Moreover, we have $\Gamma_\mathfrak{a}(R)=0$. Indeed, if $f\in R\setminus\{0\}$ and $n\in\mathbbm{N}$ with $\mathfrak{a}^nf=0$, then there occurs a monomial $g$ in $f$, and we have $Y_k^ng=0$ for all $k\in\mathbbm{N}$ with $k\geq n$, implying the contradiction that $Y_k^{k+1-n}$ divides $g$ for every $k\in\mathbbm{N}$ with $k\geq n$. Setting \[\mathfrak{b}\mathrel{\mathop:}=\langle Y_iY_j\mid i,j\in\mathbbm{N},i\neq j\rangle_R,\] we have $\Gamma_\mathfrak{a}(R/\mathfrak{b})=\mathfrak{a}/\mathfrak{b}$. Thus, $\mathfrak{a}$ is neither fair nor centred (\cite[5.4 D)]{sol}, \ref{nil25} a)).\smallskip
E) Let $K$ be a field, let $Q$ denote the additive monoid of positive rational numbers, let $R\mathrel{\mathop:}= K[Q]$ denote the algebra of $Q$ over $K$, and let $\{e_\alpha\mid\alpha\in Q\}$ denote its canonical basis. Then, $\mathfrak{m}\mathrel{\mathop:}=\langle e_\alpha\mid\alpha>0\rangle_R$ is a maximal ideal. We consider $S\mathrel{\mathop:}= R_\mathfrak{m}$ and $\mathfrak{n}\mathrel{\mathop:}=\mathfrak{m}_\mathfrak{m}$. Then, $S$ is a $1$-dimensional valuation ring with idempotent maximal ideal $\mathfrak{n}$. Let $\mathfrak{a}\mathrel{\mathop:}=\langle\frac{e_1}{1}\rangle_S$, let $T\mathrel{\mathop:}= S/\mathfrak{a}$, and let $\mathfrak{p}\mathrel{\mathop:}=\mathfrak{n}/\mathfrak{a}$. Then, $T$ is a $0$-dimensional local ring whose maximal ideal $\mathfrak{p}$ is idempotent and nonzero (\cite[2.2]{qr}). In particular, $\Gamma_\mathfrak{a}$ is a radical (\ref{pre05} E)), and thus $\mathfrak{a}$ is fair, but not centred (\ref{idem40}, \ref{nil10} a)).\footnote{This extends \cite[3.9]{asstor}.}
\end{exas}
\begin{no}\label{nil60}
A) Centred ideals whose small torsion functors are radicals are half-centred (\ref{fac63} B)), and half-centred maximal ideals are centred (\ref{fac180}). In general, half-centredness and centredness are independent. Indeed, there exist well-centred ideals (\ref{fac134} a)), half-centred ideals that are not centred (\ref{idem50} C)), centred ideals that are not half-centred (\ref{nil40} B)), and ideals that are neither half-centred nor centred (\ref{nil40} A)).\smallskip
B) The converses of \ref{fac132} c) need not hold. More precisely, there exist a ring $R$ and a well-centred ideal $\mathfrak{a}\subseteq R$ such that $\sqrt{\mathfrak{a}}$ is neither centred nor half-centred. Indeed, since the zero ideal in any ring is well-centred, it suffices to exhibit a $0$-dimensional local ring whose maximal ideal $\sqrt{0}$ is neither centred nor half-centred, which we did in \ref{nil40} A).\smallskip
C) Since nil ideals share all the large fairness properties, the examples in \ref{nil40} together with \ref{fac130} and \ref{nil10} a) show that if $\mathfrak{a}$ is large fair, weakly large fair and weakly large quasifair, then it need not have any of the small fairness or centredness properties.\smallskip
D) We saw in \ref{fac10} C), \ref{fac40} and \ref{fac70} that fairness can be checked on monogeneous $R$-modules. By \ref{nil40} A), there exist a ring $R$ and an ideal $\mathfrak{a}\subseteq R$ such that $\mathfrak{a}$ is not fair, while the $R$-module $R$ is $\mathfrak{a}$-fair (\ref{fac170}). Thus, fairness cannot be checked on the $R$-module $R$ alone.
\end{no}
\begin{no}\label{nil105}
Let $R$ be a $0$-dimensional local ring with maximal ideal $\mathfrak{a}$. By \ref{nil10} a) and \ref{fac180}, the fairness and centredness properties of $\mathfrak{a}$ are determined by whether it is nilpotent, fair, or centred. Thus, $\mathfrak{a}$ lies in precisely one of the five classes specified in the following table.\smallskip
\begin{center}{\small\begin{tabular}{|c|c|c|c|c|c|c|c|}\hline
&$\mathfrak{a}$ nilpot.&$\Gamma_\mathfrak{a}$ radical&$\mathfrak{a}$ fair&$\mathfrak{a}$ w.fair&$\mathfrak{a}$ w.q.fair&$\mathfrak{a}$ centred&$\mathfrak{a}$ half-centred\\\hline
I&\checkmark&\checkmark&\checkmark&\checkmark&\checkmark&\checkmark&\checkmark\\\hline
II&--&--&\checkmark&--&\checkmark&\checkmark&--\\\hline
III&--&--&--&--&\checkmark&\checkmark&--\\\hline
IV&--&?&\checkmark&--&--&--&--\\\hline
V&--&--&--&--&--&--&--\\\hline
\end{tabular}}\end{center}\smallskip
\noindent(Note that all large fairness properties are always fulfilled.) It follows from \ref{nil10} a) and \ref{nil40} that the classes I, III, IV and V are nonempty. However, we do not know of an example in class II and thus are left with the following question.
\begin{qulist}
\item[$(*)$] Does there exist a $0$-dimensional local ring, whose maximal ideal $\mathfrak{a}$ is fair and centred, but not nilpotent?
\end{qulist}
Note that a positive answer to $(*)$ implies a negative answer to \cite[3.10 $(**)$]{asstor}. If the converse of \ref{nil20} b) holds, then class II would indeed be empty. Thus:
\begin{qulist}
\item[$(**)$] Suppose that $\mathfrak{a}$ is a nil ideal (or even the maximal ideal of a $0$-dimensional local ring). Does fairness of $\mathfrak{a}$ imply that $\Gamma_\mathfrak{a}$ is a radical?
\end{qulist}
\end{no}
\section{Localisation and delocalisation}
While assassins and torsion functors do not behave nicely with respect to localisation, weak assassins do so (\ref{pre11} A), B)). In this final section we exploit this behaviour to prove elementary results on localisation and delocalisation of radicality of torsion functors and of centredness and weak fairness properties of ideals. Finally, we give a criterion for weak large quasifairness using localisation properties of large torsion functors.
\begin{prop}\label{loc05}
We consider the following statements:
(1) $\Gamma_\mathfrak{a}$ is a radical;
(2) $\Gamma_{S^{-1}\mathfrak{a}}$ is a radical for every subset $S\subseteq R$;
(3) $\Gamma_{\mathfrak{a}_\mathfrak{m}}$ is a radical for every $\mathfrak{m}\in\max(\mathfrak{a})$.
We have (1)$\Rightarrow$(2)$\Rightarrow$(3). If $\rho^\mathfrak{m}_\mathfrak{a}$ (cf.\ \ref{pre11} A)) is an isomorphism for every $\mathfrak{m}\in\max(\mathfrak{a})$, we have (1)$\Leftrightarrow$(2)$\Leftrightarrow$(3).
\end{prop}
\begin{proof}
``(1)$\Rightarrow$(2)'': Suppose that (1) holds. Let $S\subseteq R$ be a subset, and let $M$ be an $S^{-1}R$-module. Then, \[\Gamma_{S^{-1}\mathfrak{a}}(M/\Gamma_{S^{-1}\mathfrak{a}}(M))\!\!\upharpoonright_R=\Gamma_\mathfrak{a}(M\!\!\upharpoonright_R/\Gamma_\mathfrak{a}(M\!\!\upharpoonright_R))=0\] (\ref{pre05} G)). This implies (2). ``(3)$\Rightarrow$(1)'': Suppose that $\rho^\mathfrak{m}_\mathfrak{a}$ is an isomorphism for every $\mathfrak{m}\in\max(\mathfrak{a})$ and that (3) holds. Let $M$ be an $R$-module. If $\mathfrak{m}\in\max(\mathfrak{a})$, then \[\Gamma_\mathfrak{a}(M/\Gamma_\mathfrak{a}(M))_\mathfrak{m}=\Gamma_{\mathfrak{a}_\mathfrak{m}}(M_\mathfrak{m}/\Gamma_{\mathfrak{a}_\mathfrak{m}}(M_\mathfrak{m}))=0\] (\ref{pre11} A)). Together with \ref{pre05} F) this implies (1).
\end{proof}
\begin{prop}\label{loc10}
Let $\P$ denote one of the properties of being half-centred, centred, weakly quasifair, or weakly large quasifair. We consider the following statements:
(1) $\mathfrak{a}$ has $\P$;
(2) $S^{-1}\mathfrak{a}$ has $\P$ for every subset $S\subseteq R$;
(3) $\mathfrak{a}_\mathfrak{m}$ has $\P$ for every $\mathfrak{m}\in\max(\mathfrak{a})$.
We have (1)$\Rightarrow$(2)$\Rightarrow$(3). If $\rho^\mathfrak{m}_\mathfrak{a}$ is an isomorphism for every $\mathfrak{m}\in\max(\mathfrak{a})$, we have (1)$\Leftrightarrow$(2)$\Leftrightarrow$(3).
\end{prop}
\begin{proof}
First, we prove the claim about half-centredness. ``(1)$\Rightarrow$(2)'': Suppose that $\mathfrak{a}$ is half-centred. Let $S\subseteq R$ be a subset, and let $M$ be an $S^{-1}R$-module. Then, \[\Gamma_{S^{-1}\mathfrak{a}}(M)\!\!\upharpoonright_R=\Gamma_\mathfrak{a}(M\!\!\upharpoonright_R)=\overline{\Gamma}_\mathfrak{a}(M\!\!\upharpoonright_R)=\overline{\Gamma}_{S^{-1}\mathfrak{a}}(M)\!\!\upharpoonright_R\] (\ref{pre05} G), \ref{fac63} B)). This implies (2). ``(3)$\Rightarrow$(1)'': Suppose that $\mathfrak{a}_\mathfrak{m}$ is half-centred and $\rho^\mathfrak{m}_\mathfrak{a}$ is an isomorphism for every $\mathfrak{m}\in\max(\mathfrak{a})$. Let $M$ be an $R$-module. If $\mathfrak{m}\in\max(\mathfrak{a})$, then \[\Gamma_\mathfrak{a}(M)_\mathfrak{m}=\Gamma_{\mathfrak{a}_\mathfrak{m}}(M_\mathfrak{m})=\overline{\Gamma}_{\mathfrak{a}_\mathfrak{m}}(M_\mathfrak{m})=\overline{\Gamma}_\mathfrak{a}(M)_\mathfrak{m}\] (\ref{fac63} B)). Together with \ref{pre05} F) this implies $\Gamma_\mathfrak{a}(M)=\overline{\Gamma}_\mathfrak{a}(M)$ and therefore (1).
Second, we prove the claim about centredness. ``(1)$\Rightarrow$(2)'': Suppose that $\mathfrak{a}$ is centred. Let $S\subseteq R$ be a subset, and let $M$ be an $S^{-1}R$-module with $\Gamma_{S^{-1}\mathfrak{a}}(M)=0$. Then, $\Gamma_\mathfrak{a}(M\!\!\upharpoonright_R)=\Gamma_{S^{-1}\mathfrak{a}}(M)\!\!\upharpoonright_R=0$ (\ref{pre05} G)), hence, by centredness,\pagebreak \[\ass^{\rm f}_{S^{-1}R}(M)\cap\var(S^{-1}\mathfrak{a})\cong\{\mathfrak{p}\in\ass^{\rm f}_R(M\!\!\upharpoonright_R)\mid\mathfrak{p}\cap S=\emptyset\}\cap\var(\mathfrak{a})\subseteq\]\[\ass^{\rm f}_R(M\!\!\upharpoonright_R)\cap\var(\mathfrak{a})=\emptyset\] (\ref{pre11} B)). This implies (2). ``(3)$\Rightarrow$(1)'': Suppose that $\mathfrak{a}_\mathfrak{m}$ is centred and $\rho^\mathfrak{m}_\mathfrak{a}$ is an isomorphism for every $\mathfrak{m}\in\max(\mathfrak{a})$. Let $M$ be an $R$-module with $\Gamma_\mathfrak{a}(M)=0$.\linebreak If $\mathfrak{m}\in\max(\mathfrak{a})$, then $\Gamma_{\mathfrak{a}_\mathfrak{m}}(M_\mathfrak{m})\cong\Gamma_\mathfrak{a}(M)_\mathfrak{m}=0$, hence, by centredness,\linebreak $\ass^{\rm f}_{R_\mathfrak{m}}(M_\mathfrak{m})\cap\var(\mathfrak{a}_\mathfrak{m})=\emptyset$. Together with \ref{pre11} B) this implies $\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\emptyset$, and therefore (1) holds.
Third, we prove simultaneously the claims about weak quasifairness and weak large quasifairness. For an ideal $\mathfrak{b}$ we write $F_\mathfrak{b}$ for $\Gamma_\mathfrak{b}$ or $\overline{\Gamma}_\mathfrak{b}$. ``(1)$\Rightarrow$(2)'': Suppose that $\mathfrak{a}$ is weakly (large) quasifair. Let $S\subseteq R$ be a subset. Let $M$ be an $S^{-1}R$-module. If $\mathfrak{P}\in\ass^{\rm f}_{S^{-1}R}(S^{-1}M)\cap\var(S^{-1}\mathfrak{a})$, then there exists $\mathfrak{p}\in\linebreak\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\ass^{\rm f}_R(F_\mathfrak{a}(M))$ with $\mathfrak{p}\cap S=\emptyset$ and \[\mathfrak{P}=S^{-1}\mathfrak{p}\in\ass^{\rm f}_{S^{-1}R}(S^{-1}F_\mathfrak{a}(M))\subseteq\ass^{\rm f}_{S^{-1}R}(F_{S^{-1}\mathfrak{a}}(S^{-1}M))\] (\ref{pre10} B), \ref{pre11} A), B)), implying (2).
``(3)$\Rightarrow$(1)'': Suppose that $\mathfrak{a}_\mathfrak{m}$ is weakly (large) quasifair and that $\rho^\mathfrak{m}_\mathfrak{a}$ (or $\overline{\rho}^\mathfrak{m}_\mathfrak{a}$) is an isomorphism for every $\mathfrak{m}\in\max(\mathfrak{a})$. Let $M$ be an $R$-module. Let $\mathfrak{p}\in\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})$. If $\mathfrak{m}\in\max(\mathfrak{a})$ with $\mathfrak{p}\subseteq\mathfrak{m}$, then \[\mathfrak{p}_\mathfrak{m}\in\ass^{\rm f}_{R_\mathfrak{m}}(M_\mathfrak{m})\cap\var(\mathfrak{a}_\mathfrak{m})=\ass^{\rm f}_{R_\mathfrak{m}}(F_{\mathfrak{a}_\mathfrak{m}}(M_\mathfrak{m}))=\ass^{\rm f}_{R_\mathfrak{m}}(F_\mathfrak{a}(M)_\mathfrak{m})\] (\ref{pre11} B)), hence $\mathfrak{p}\in\ass^{\rm f}_R(F_\mathfrak{a}(M))$, implying (1).
\end{proof}
\begin{prop}\label{loc40}
a) Let $S\subseteq R$ be a subset such that $\rho^S_\mathfrak{a}$ (or $\overline{\rho}^S_\mathfrak{a}$) is an isomorphism. If $\mathfrak{a}$ is weakly (large) fair, then so is $S^{-1}\mathfrak{a}$.
b) Suppose that $\rho_\mathfrak{a}^\mathfrak{m}$ (or $\overline{\rho}^\mathfrak{m}_\mathfrak{a}$) is an isomorphism for every $\mathfrak{m}\in\Max(R)$. Then, $\mathfrak{a}$ is weakly (large) fair if and only if $\mathfrak{a}_\mathfrak{m}$ is weakly (large) fair for every $\mathfrak{m}\in\Max(R)$.
\end{prop}
\begin{proof}
For an ideal $\mathfrak{b}$ we write $F_\mathfrak{b}$ for $\Gamma_\mathfrak{b}$ or $\overline{\Gamma}_\mathfrak{b}$. a) Let $M$ be an $S^{-1}R$-module. If \[\mathfrak{P}\in\ass^{\rm f}_{S^{-1}R}(S^{-1}M/F_{S^{-1}\mathfrak{a}}(S^{-1}M))=\ass^{\rm f}_{S^{-1}R}(S^{-1}(M/F_\mathfrak{a}(M))),\] then there exists $\mathfrak{p}\in\ass^{\rm f}_R(M/F_\mathfrak{a}(M))=\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a})$ with $\mathfrak{p}\cap S=\emptyset$ and $\mathfrak{P}=S^{-1}\mathfrak{p}\in\ass^{\rm f}_{S^{-1}R}(S^{-1}M)\setminus\var(S^{-1}\mathfrak{a})$ (\ref{pre11} B)), implying the claim. b) Suppose that $\mathfrak{a}_\mathfrak{m}$ is weakly (large) fair for every $\mathfrak{m}\in\Max(R)$. Let $M$ be an $R$-module, and let $\mathfrak{p}\in\ass^{\rm f}_R(M/F_\mathfrak{a}(M))$. If $\mathfrak{m}\in\Max(R)$ with $\mathfrak{p}\subseteq\mathfrak{m}$, then \[\mathfrak{p}_\mathfrak{m}\in\ass^{\rm f}_{R_\mathfrak{m}}((M/F_\mathfrak{a}(M))_\mathfrak{m})=\ass^{\rm f}_{R_\mathfrak{m}}(M_\mathfrak{m}/F_{\mathfrak{a}_\mathfrak{m}}(M_\mathfrak{m}))=\ass^{\rm f}_{R_\mathfrak{m}}(M_\mathfrak{m})\setminus\var(\mathfrak{a}_\mathfrak{m}),\] hence $\mathfrak{p}\in\ass^{\rm f}_R(M)\setminus\var(\mathfrak{a})$ (\ref{pre11} B)). Together with a) this yields the claim.
\end{proof}
\begin{prop}\label{loc50}
If $\overline{\rho}^\mathfrak{p}_\mathfrak{a}$ is an isomorphism for every $\mathfrak{p}\in\var(\mathfrak{a})$, then $\mathfrak{a}$ is weakly large quasifair.
\end{prop}
\begin{proof}
Let $M$ be an $R$-module with $\overline{\Gamma}_\mathfrak{a}(M)=0$. If $\mathfrak{p}\in\var(\mathfrak{a})$, then $\overline{\Gamma}_{\mathfrak{a}_\mathfrak{p}}(M_\mathfrak{p})=\overline{\Gamma}_\mathfrak{a}(M)_\mathfrak{p}=0$, hence $\ass^{\rm f}_{R_\mathfrak{p}}(M_\mathfrak{p})\cap\var(\mathfrak{a}_\mathfrak{p})=\emptyset$ (\ref{fac60} a)), thus $\mathfrak{p}_\mathfrak{p}\notin\ass^{\rm f}_{R_\mathfrak{p}}(M_\mathfrak{p})$, and therefore $\mathfrak{p}\notin\ass^{\rm f}_R(M)$ (\ref{pre11} B)). It follows that $\ass^{\rm f}_R(M)\cap\var(\mathfrak{a})=\emptyset$, and so \ref{fac100} yields the claim.
\end{proof}
\noindent\textbf{Acknowledgement:} I thank the anonymous referee for his suggestions.
|
\section{Introduction}
Temporal interaction networks are useful resources to reflect the relationships between users and items over time, which have been successfully applied in many real-world domains such as electronic commerce~\cite{bigi}, online education~\cite{liyanagunawardena2013moocs} and social media~\cite{iba2010analyzing}. A temporal interaction network naturally keeps a graph data structure with temporal characteristics, where each edge represents a user-item interaction marked with a concrete timestamp.
Representation learning on temporal interaction networks has gradually become a hot topic in the research of machine learning~\cite{survey}. A key challenge of modeling temporal interaction networks is how to capture the evolution of user interests and item features effectively. Because users may interact with various items sequentially and their interests may shift in a period of time. Similarly, item features are also ever-changing and largely influenced by user behaviours. Recent works have been proposed to tackle this challenge by generating the dynamic embeddings of users and items~\cite{ctdne,coeve,jodie,dgcf}. Although these methods achieve promising results to some extent, they still suffer from the following two significant problems.
1) \textbf{Topological structure missing}.
Most previous methods regard learning temporal interaction networks as a coarse-grained sequential prediction problem and ignore the topological structure information.
In fact, instead of only treating a temporal interaction network as multiple interaction sequences, we can discover user similarity and item similarity from the view of the topological structure. Nevertheless, due to the bipartite nature of temporal interaction networks, each node is not the same type as its adjacent nodes, so that we have to develop a flexible method to capture such a meaningful topology.
2) \textbf{Long-range dependency structure missing}. Most current methods are built upon the variants of recurrent neural networks (RNNs) to learn interaction sequences. Hence, they typically pay more attention to short-term effects and miss the dependency structure in long-range historical information~\cite{attention,bert}. But learning the long-range dependency structure in temporal interaction networks is also critical, since it can better model the long-standing user preference and intrinsic item properties.
In this paper, we propose the \textbf{D}eep \textbf{S}tructural \textbf{P}oint \textbf{P}rocess termed as \textbf{DSPP} to solve above problems.
Following the framework of Temporal Point Process (TPP)~\cite{ppsurvey}, we devise a novel intensity function which combines the topological structure and the long-range dependency structure to capture the dynamic influence between users and items.
Specifically, we first design a topological fusion encoder (TFE) to learn the topological structure. TFE includes a two-steps layer to encourage each node to aggregate homogeneous node features.
To overcome the long-range dependency issue, we then develop an attentive shift encoder (ASE) to recognize the complex dependency between each historical interaction and the new-coming interaction.
Finally, we incorporate the learned embeddings from TFE and ASE into our intensity function to make time prediction and item prediction.
The main contributions of our work are summarized as follows:
\begin{itemize}
\item We propose the novel DSPP to learn temporal interaction networks within the TPP paradigm, with the goal of solving two above structural missing problems simultaneously.
\item DSPP includes the well-designed TFE and ASE modules. TFE utilizes the topological structure to generate steady embeddings, and ASE exploits the long-range dependency structure to learn dynamic embeddings. Furthermore, these two types of embeddings can be seamlessly incorporated into our intensity function to achieve future prediction.
\item Extensive experiments are conducted on three public standard datasets. Empirical results show that the proposed method achieves consistent and significant improvements over state-of-the-art baselines\footnote{The source code is available from \url{https://github.com/cjx96/DSPP}.}.
\end{itemize}
\section{Related Work}
\label{related}
Previous studies for learning temporal interaction networks can be roughly divided into the following three branches: random walk based method, RNN based methods and TPP based method.
\begin{itemize}
\item Random walk based method. Nguyen $et$ $al$. propose CTDNE~\cite{ctdne} which models user and item dynamic embeddings by the random walk heuristics with temporal constraints. CTDNE first samples some time increasing interaction sequences, and then learns context node embeddings via the skip-gram algorithm~\cite{word2vec}. However, it ignores the useful time information of the sampled sequences, e.g., a user clicks an item frequently may indicate that the user pays more attention to this item at the moment.
\item RNN based methods. LSTM~\cite{lstm}, RRN~\cite{rrn}, LatentCross~\cite{latent} and Time-LSTM~\cite{timelstm} are pioneering works in this branch. For example, RRN provides a unified framework for combining the static matrix factorization features with the dynamic embeddings based on LSTM. Moreover, it provides a behavioral trajectory layer to project user and item embeddings over time. LatentCross is an extension of the architecture of GRU~\cite{gru}, which incorporates multiple types of context information. Time-LSTM develops the time gates for LSTM for modeling the interaction time information. Furthermore, JODIE~\cite{jodie} and DGCF~\cite{dgcf} are the state-of-the-art methods for learning temporal interaction networks via the coupled variants of RNNs. JODIE defines two-steps embedding update operation and an embedding projection function to predict the target item embedding for each user directly. DGCF extends JODIE by considering the 1-hop neighboring information of temporal interaction networks.
\item TPP based method. DeepCoevolve~\cite{coeve} is a promising work that applies TPPs to learn temporal interaction networks. It uses a multi-dimensional intensity function to capture the dynamic influence between users and items. However, DeepCoevolve maintains the same embeddings of user and item until it involves a new interaction, which is not consistent with real-world facts~\cite{jodie}. Furthermore, it uses a linear intensity function to describe the dynamic influence, leading to the limited model expressiveness.
\end{itemize}
\section{Background}
\subsection{Temporal Interaction Network}
\label{TIN}
A series chronological interactions can be represented as a temporal interaction network. Formally, a temporal interaction network on the time window $[0,T)$ can be described as $\mathcal{G}(T)=(\mathcal{U},\mathcal{V},\mathcal{E})$, where $\mathcal{U}$, $\mathcal{V}$ and $\mathcal{E}$ denote the user set, item set and interaction set, respectively. Each element $(u_i, v_j, t) \in \mathcal{E}$ is an interaction, describing that the user $u_i \in \mathcal{U}$ conducts an action with the item $v_j \in \mathcal{V}$ at the concrete timestamp $t$.
\subsection{Temporal Point Process}
\label{TPP}
TPPs are one of branches of stochastic processes for modeling the observed random discrete events, e.g. user-item interactions over time.
Using conditional intensity function $\lambda(t)$ is a convenient way to describe TPPs. Given a interaction sequence that only has time information $\mathcal{T}:=\{t_i\}_{i=1}^{n}$ and an infinitesimal time interval $\mathrm{d}t$, where $t_i \in \mathbb{R}^+$ and $0 < t_1 < t_2 ... < t_n$, $\lambda(t)\mathrm{d}t$ is the conditional probability of happening an interaction in the infinitesimal interval $[t,t+\mathrm{d}t)$ based on $\mathcal{T}$. It can be also interpreted heuristically in the following way:
\begin{equation*}
\small
\begin{split}
\lambda(t)\mathrm{d}t := \mathbb{P}\{\text{an interaction occurs in } [t, t+\mathrm{d}t)|\mathcal{T}\} = \mathbb{E}[N([t,t+\mathrm{d}t))|\mathcal{T}],
\end{split}
\label{lambda}
\end{equation*}
where $N([t,t+\mathrm{d}t))$ is used to count the number of interactions happened in the time interval $[t,t+\mathrm{d}t)$. A general assumption made here is that there is either zero or one interaction happened in this infinitesimal interval, i.e., $N([t,t+\mathrm{d}t)) \in \{0,1\}$. Furthermore, given a future timestamp $t^+ > t_n$ and $\mathcal{T}$, we can formulate the conditional probability of no interactions happened during $[t_n, t^+)$ as $S(t^+)=\exp{(-\int_{t_n}^{t^+}\lambda(t)\text{d}t)}$. Therefore, the conditional probability density of the next interaction happened at the future timestamp $t^+$ can be defined as: $f(t^+) = S(t^+)\lambda(t^+)$, which means that no interaction happens in time interval $[t_n,t^+)$ and an interaction happens in infinitesimal interval $[t^+, t^+ + \mathrm{d}t)$.
Multivariate Hawkes Process (MHP) is one of the most important TPPs for modeling interaction sequences~\cite{hawkes}. We denote $\mathcal{S}_{u_i}(T) = (\mathcal{V},\mathcal{H}_{u_i})$ as an interaction sequence of user $u_i$ on the time window $[0,T]$, where $\mathcal{H}_{u_i}$ is the interaction sequence of user $u_i$. The $h$-th interaction of $\mathcal{H}_{u_i}$ is denoted as $(v^h, t^h)$, which describes that the user $u_i \in \mathcal{U}$ has interacted with the item $v^h \in \mathcal{V}$ at $t^h \leq T$.
The intensity function of an arbitrary item $v_j$ in $\mathcal{S}_{u_i}(T)$ is defined as:
\begin{equation*}
\small
\begin{split}
\lambda_{v_j}(t) = \mu_{v_j} + \sum\nolimits_{t^h<t}\alpha_{(v_j,v^h)}\kappa(t-t^h),
\end{split}
\label{hawkes}
\end{equation*}
where $\mu_{v_j}$ (a.k.a base intensity) is a positive parameter which is independent of the interaction sequence $\mathcal{S}_{u_i}(T)$, $\alpha_{(v_j,v^h)}$ is also a positive parameter that estimates the influence between item pair $(v_j,v^h)$ and the $\kappa(t-t^h)$ is a triggering kernel function. The intensity function explicit models dynamic influence among interaction sequence. However, most existing approaches ignore to model the topological structure between a series of interaction sequences. To fill this gap, DSPP includes a novel TFE module which provides a strong structure prior to enhance model expressiveness.
\begin{figure}[t]
\begin{center}
\includegraphics[height=9cm]{model_20210624.pdf}
\caption{A simple overview of DSPP. ``TFE", ``ASE", ``Intensity" mean topological fusion encoder, attentive shift encoder and intensity function, respectively. $\mathcal{G}^{m-1}$ and $\mathcal{G}^m$ are two network snapshots. Noticeably, $\mathcal{G}^{m-1} \in \mathcal{G}^{m}$. $(u_i,v_j,t_p)$, $(u_i, v_j, t_q)$ denote two interactions, where $t_p \in [d \times (m-1), d \times m)$ and $t_q \in [d \times m, d \times (m+1))$. $\mathcal{S}_{u_i}(t_p)$ and $\mathcal{S}_{u_i}(t_q)$ are two interaction sequences.}
\label{model}
\end{center}
\end{figure}
\section{Proposed Model}
\subsection{Overview}
For a temporal interaction network $\mathcal{G}(T) = (\mathcal{U},\mathcal{V},\mathcal{E})$, the adjacency matrix would change over time, because the emerge of a new interaction would introduce a new edge in the temporal interaction network, causing the huge occupation of memory. To sidestep this problem, we exploit an ordered snapshot sequence $\{\mathcal{G}^m\}_{m=0}^{M-1}$ with the same time interval $d = \frac{T}{M}$ to simulate the temporal interaction network $\mathcal{G}(T)$. Each snapshot $\mathcal{G}^m$ equals to $\mathcal{G}(d\times m)$, and $M$ is a hype-parameter to control the number of snapshot.
\par
Fig.\ref{model} shows the overview of our model. In DSPP, the TFE module aims to learn \textbf{steady embeddings} which represent the stable intentions of users and items in the corresponding time period $[d \times m, d \times (m + 1))$ from $\mathcal{G}^m$. Here we denote the steady embeddings of an arbitrary user $u_i$ and an item $v_j$ as $\bm{u}^m_i$ and $\bm{v}^m_j$, respectively.
The second module ASE aims to learn \textbf{dynamic embeddings} of users and items for describing their dynamic intentions at timestamp $t$.
\subsection{Embedding Layer}
The embedding layer is used to initialize node embeddings (all users and items) and time embedding. It consists of two parts: the node embedding layer and the time embedding layer.
\subsubsection{Node Embedding Layer}
The node embedding layer aims to embed users and items into a low-dimensional vector space. Formally, given a user $u_i$ or an item $v_j$, we can obtain its $D$-dimensional representation ($\bm{u}_{i} \in \mathbb{R}^D$ or $\bm{v}_{j} \in \mathbb{R}^D$) from an initialization embedding matrix with a simple lookup operation, where $D$ denotes the dimension number of embeddings.
\subsubsection{Time Embedding Layer}
Position embedding~\cite{sasrec,dysat} is widely used to recognize the ordered information of sequences. However, the continuous time information of interaction sequence cannot be well reflected by the discrete position embedding. Therefore, we design a time embedding layer that encodes the discrete ordered information and continuous time information simultaneously. Concretely, given a future timestamp $t^+ \geq t$, user $u_i$ and the $h$-th interaction $(v^h,t^h)$ of its interaction sequence $\mathcal{S}_{u_i}(t)$ (detailed in Sec. \ref{TPP}), the $h$-th interaction time embedding $\bm{p}_{t^h}(t^+)$ of future timestamp $t^+$ can be formulated as follows:
\begin{equation*}
\small
\begin{split}
\left[\bm{p}_{t^h}(t^+) \right]_j =\left\{
\begin{aligned}
&\cos(\omega_j (t^+ - t^h) + h / 10000^{\frac{j-1}{D}}), \rm{if\;}\textsl{j}\rm{\;is\;odd}, \\
&\sin(\omega_j (t^+ - t^h) + h / 10000^{\frac{j}{D}}), \rm{if\;}\textsl{j}\rm{\;is\;even}, \\
\end{aligned}
\right.
\end{split}
\label{time_encoding}
\end{equation*}
where $[\bm{p}_{t^h}(t^+)]_j$ is the $j$-th element of the given vector $\bm{p}_{t^h}(t^+)$, and $\omega_j$ is a parameter to scale the time interval $t^+ - t^h$ in the $j$-th dimension.
\subsection{Topological Fusion Encoder}
In this section, we propose a novel topological fusion encoder (TFE) to learn the topological structure. The existing graph encoders~\cite{gcrn,tgat} learn node embeddings by aggregating the features of neighboring nodes directly. However, in temporal interaction networks, it would easily lead to improper feature aggregations due to the fact that the user neighbors are items. In this paper, we introduce a topological aggregation layer (TAL) into TFE to alleviate this issue.
\subsubsection{Topological Aggregation Layer}
Different with homogeneous graphs, the distance between a user (item) and other users (items) is always an even number in temporal interaction network, e.g. 2, 4 and 6. This fact indicates that our encoder should aggregate homogeneous information through the even-number-hop. Based on this topological structure, we design a novel topological aggregation layer (TAL) as shown in Fig.\ref{gnn}. Concretely, given an interaction $(u_i,v_j,t)$, we firstly compute its corresponding snapshot identifier $m = \lfloor \frac {t}{d}\rfloor$, where $\lfloor \cdot \rfloor$ denotes the floor function and $d$ is the time interval of ordered snapshot sequence. Then, to generate the user representation $\bm{u}_i^k$ in the $k$-th TAL, we calculate its intermediate representation $\widehat{\bm{v}}^{k}_{c}$ as follows:
\begin{equation}
\small
\begin{split}
\widehat{\bm{v}}^{k}_{c} = \delta \Big( \widehat{W}^{k}_{u} \ {\rm MEAN} \big( \{ \bm{u}^{k-1}_{q} : u_q \in \mathcal{N}_m(v_c) \} \big) \Big), {\rm where} \ v_c \in \mathcal{N}_m(u_i),
\label{graph_conv_1}
\end{split}
\end{equation}
where $\delta$ is the ReLU activity function, $\widehat{W}^{k}_{u}$ is a parameter matrix, and $\mathcal{N}_m(v_c)$ denotes the set of 1-hop neighbors (user-type) of item $v_c$ in $\mathcal{G}^m$. Therefore, $\widehat{\bm{v}}^{k}_{c}$ can be consider as a user-type representation since it only aggregates the user-type features. After obtaining the intermediate representation $\widehat{\bm{v}}^{k}_{c}$, we leverage the attention mechanism~\cite{attention} to learn different weights among the neighboring intermediate representations for user $u_i$. The final embedding $\bm{u}^{k}_{i}$ can be formulated as:
\begin{equation}
\small
\begin{split}
e_{c} = \delta \big( (\overline{W}^{k}_{u}& \bm{u}_i^{k-1})^\top \widehat{\bm{v}}^{k}_{c} \big), {\rm where} \ v_c \in \mathcal{N}_m(u_i),\\
\alpha_{c} &= \frac{\exp{(e_{c})}}{\sum_{v_q \in \mathcal{N}_m(u_i)}\exp{(e_{q})}},\\
\overline{\bm{u}}^{k}_{i} &= \delta \big( \sum\nolimits_{v_c \in \mathcal{N}_m(u_i)} \alpha_{c} \widehat{\bm{v}}^{k}_{c} \big),\\
&\bm{u}^{k}_{i} = W^{k}_{u} \ \big[\overline{\bm{u}}^{k}_{i} \big| \bm{u}^{k-1}_{i} \big],
\end{split}
\label{graph_attention_1}
\end{equation}
where the $\overline{W}^{k}_{u}$ and $W^{k}_{u}$ are parameter matrices, $(\cdot)^\top$ is the transpose operation and $[\cdot | \cdot]$ is concatenation operation. Analogously, we can employ the same learning procedure to update $\bm{v}_j^{k-1}$. In TFE, we stack $K$ TALs and denote the final outputs of $\bm{u}_i^{K}$ and $\bm{v}_j^{K}$ as our steady embeddings $\bm{u}^m_i$ and $\bm{v}^m_j$ for user $u_i$ and item $v_j$ in $\mathcal{G}^m$, respectively.
\begin{figure}[tbp]
\begin{center}
\includegraphics[height=4.5cm]{GNN_20210331.pdf}
\caption{Illustration of topological aggregation layer (TAL). Blue and yellow color nodes denote users and items, respectively. Nodes with two colors denote the intermediate representations, and gray lines denote that users have interacted with items. The sub-graphs (a) and (b) show the learning procedures of $\bm{u}^{k-1}_{i}$ in $k$-th TAL. The green dotted lines (Eq.(\ref{graph_conv_1})) and orange dotted lines (Eq.(\ref{graph_attention_1})) describe how to derive the embedding $\bm{u}_i^{k}$ by considering the topological structure of temporal interaction network.}
\label{gnn}
\end{center}
\end{figure}
\subsubsection{Temporal Fusion Layer}
The proposed TAL can effectively deal with a single network snapshot, but it cannot capture the structural variations across the ordered snapshot sequence $\{\mathcal{G}^0, \mathcal{G}^1, ..., \mathcal{G}^{M-1}\}$. To mitigate this problem, after obtaining user and item embeddings (e.g. $\bm{u}^m_i$ and $\bm{v}^m_j$) for each discrete snapshot $\mathcal{G}^m$, we introduce a temporal fusion layer to encode these dynamical changes in the ordered snapshot sequence:
\begin{equation}
\small
\begin{split}
\bm{u}^{m}_{i} = f_u(\bm{u}^{m-1}_i, \bm{u}^m_i),\quad\bm{v}^{m}_{j} = f_v(\bm{v}^{m-1}_j, \bm{v}^m_j),
\label{merge_1}
\end{split}
\end{equation}
where $f_u$ and $f_v$ are temporal modeling functions. There are many alternative methods that can be used for concrete implementations. In our model, we choose two separate GRUs~\cite{gru} to model $f_u$ and $f_v$, respectively.
\subsection{Attentive Shift Encoder}
In this section, we develop an attentive shift encoder (ASE) for temporal interaction networks for capturing the long-range dependency structure. Previous works employ different RNN variants which tend to forget the long history information, leading to the problem of long-range dependency structure missing. In contrast, our ASE module can explicitly learn the dependencies between each historical interaction and the new-coming interaction via the attention mechanism.
\subsubsection{Attentive Interaction Layer}
Considering a new-coming interaction $(u_i, v_j, t)$ that user $u_i$ has an interaction with item $v_j$ at the timestamp $t$, we can use it to generate the dynamic embeddings of users and items and compute the correlation among historical interactions in $\mathcal{S}_{u_i}(t)$. The concrete implementation is given as:
\begin{equation}
\small
\begin{split}
e_{h} = \big(W_{Q}[\bm{u}_i|(\bm{v}_j + \bm{p}_{t^{|\mathcal{H}_{u_i}|}}(t&))]\big)^\top W_{K}[\bm{u}_i|(\bm{v}^h + \bm{p}_{t^h}(t))], {\rm where} \ (v^h, t^h) \in \mathcal{S}_{u_i}(t) \\
\alpha_{h} &= \frac{\exp{(e_h)}}{\sum_{(v^c, t^c) \in \mathcal{S}_{u_i}(t)} \exp{(e_c)}}, \\
\bm{o}^t = &\delta \big( \sum\nolimits_{(v^h, t^h) \in \mathcal{S}_{u_i}(t)} \alpha_{h} W_{V} \bm{v}^h \big),
\end{split}
\label{attention_score}
\end{equation}
where $|\mathcal{H}_{u_i}|$ is the number of interaction sequence $\mathcal{S}_{u_i}(t)$, and $\bm{o}^t$ is the new-coming interaction feature. $W_Q, W_K$ and $W_V$ are the query, key and value parameter matrices, respectively. Afterwards, we generate the embeddings of user $u_i$ and item $v_j$ at timestamp $t$ via the following operations:
\begin{equation}
\small
\begin{split}
\bm{u}_{i}(t) = g_u(\bm{u}_i, \bm{o}^t),\quad\bm{v}_{j}(t) = g_v(\bm{v}_j, \bm{o}^t),
\label{merge_2}
\end{split}
\end{equation}
where $g_u$ and $g_v$ are embedding generation functions. In our model, we also use two separate GRUs for their implementations.
\subsubsection{Temporal Shift Layer}
Intuitively, the embeddings of user and item should be changed over time. For example, electronic products will gradually reduce their prices over time, and users may have different intentions when they returned to the E-commerce platform again. Hence, maintaining the same embeddings in a period cannot reflect the reality for the future prediction~\cite{latent}. In our work, we devise a temporal shift layer to achieve dynamic embeddings over time. Specifically, after obtaining the embeddings of user $u_i$ and item $v_j$ at timestamp $t$, i.e., $\bm{u}_{i}(t)$ and $\bm{v}_{j}(t)$ in Eq.(\ref{merge_2}), their dynamic embeddings at future timestamp $t^+ \geq t$ can be calculated as follows:
\begin{equation}
\small
\begin{split}
\bm{u}_{i}(t^+) =\left(1 + \Delta \bm{w}_{u_i}\right) * \bm{u}_{i}(t), \quad
\bm{v}_{j}(t^+) =\left(1 + \Delta \bm{w}_{v_j}\right) * \bm{v}_{j}(t),
\end{split}
\end{equation}
where $\Delta\!= t^+\!-t$ is the shift time interval, $*$ is the element-wise product, $\bm{w}_{u_i}$ and $\bm{w}_{v_j}$ are corresponding learnable shift vectors of user $u_i$ and item $v_j$, respectively. We assume that the user or item embedding can shift in continuous space with its own trajectory, so each user or item has a specific shift vector.
\subsection{Model Training}
To explicitly capture dynamic influence between users and items, we devise a novel intensity function which is generated via the steady embeddings and dynamic embeddings.
\subsubsection{Intensity Function}
We model all possible interactions for all users with items via a multi-dimensional intensity function, where each user-item pair holds one dimension. Formally, based on the learned user and item embeddings, the intensity function of user-item pair $(u_i,v_j)$ is defined as follows:
\begin{equation}
\small
\begin{split}
\lambda_{(u_i, v_j)}(t) &=\sigma \big(\underbrace{(\bm{u}_{i}^{\lfloor \frac{t}{d}\rfloor})^\top \ \bm{v}_{j}^{\lfloor \frac{t}{d} \rfloor}}_{\text{base intensity} \atop \text{(TFE)}} + \underbrace{(\bm{u}_{i}(t))^\top \ \bm{v}_{j}(t)}_{\text {dynamic change} \atop \text{(ASE)}}\big),
\end{split}
\label{intensity}
\end{equation}
where $\lfloor \frac{t}{d} \rfloor$ denotes the corresponding network snapshot identifier and $\sigma$ is the softplus function for ensuring that the intensity function is positive and smooth. Our intensity function is similar with MHP (detailed in Sec. \ref{TPP}): 1) The former term $(\bm{u}_{i}^{\lfloor \frac{t}{d}\rfloor})^\top \ \bm{v}_{j}^{\lfloor \frac{t}{d} \rfloor}$ is provided by TFE, which uses the topological structure of temporal interaction network as a strong prior to generate the base intensity. 2) The latter term $(\bm{u}_{i}(t))^\top \ \bm{v}_{j}(t)$ is obtained by ASE, which describes the dynamic changes for this user-item pair.
\subsubsection{Objective Function}
Based on the proposed intensity function, we can train our model by maximizing the log-likelihood of these happened interactions during time window $[0, T)$:
\begin{equation}
\small
\begin{split}
\mathcal{L}=\sum_{(u_i,v_j,t) \in \mathcal{G}(T)}& \!\!\!\!\!\!\!\!\log (\lambda_{(u_{i}, v_{j})}(t))-\!\!\!\!\!\!\!\!\!\!\!\!\!\!\underbrace{\int_{0}^{T} \lambda (t) \mathrm{d} t,}_{\text {non-happened interactions}}
\end{split}
\label{loss}
\end{equation}
\begin{equation}
\small
\begin{split}
\lambda(t) &= \sum\nolimits_{u_i \in \mathcal{U}} \sum\nolimits_{v_j \in \mathcal{V}}\lambda_{(u_i,v_j)}(t).
\end{split}
\label{original}
\end{equation}
Maximizing the likelihood function $\mathcal{L}$ can be interpreted intuitively in the following way: 1) The first term ensures that all happened interactions probabilities are maximized. 2) The second term penalizes the sum of the log-probabilities of infinite non-happened interactions, because the probability of no interaction happens during $[t, t+\mathrm{d}t)$ is $1 - \lambda(t)\mathrm{d}t$, and its log form is $-\lambda(t)\mathrm{d}t$~\cite{nhp}.
\begin{algorithm}[t]
\caption{The training procedure of DSPP.}
\label{dspp}
\begin{algorithmic}[1]
\REQUIRE The training temporal interaction network $\mathcal{G}(T_{tr})$, the ordered snapshot sequence $\{\mathcal{G}^0,\mathcal{G}^1,...,\mathcal{G}^{M-1}\}$, the time interval $d$, the user set $\mathcal{U}$, the item set $\mathcal{V}$, sampling number $N$.
\STATE Initialize model parameters.
\WHILE {not convergence}
\STATE Enumerate a batch of consecutive interactions from $\mathcal{G}(T_{tr})$ as $B$.
\STATE $\nabla \leftarrow 0$ \quad $\backslash\backslash$ Happened interactions.
\STATE $\Lambda \leftarrow 0$\quad\enspace $\backslash\backslash$ Non-happened interactions.
\FOR {each interaction $(u_i,v_j,t) \in B$}
\STATE $m$ $\leftarrow$ $\lfloor \frac{t}{d} \rfloor$ $\backslash\backslash$ Calculate the snapshot identifier.
\STATE Calculate steady embedding $\bm{u}^{m}_{i}$ and $\bm{v}^{m}_{j}$ via TFE based on $\mathcal{G}^{m}$.
\STATE Calculate dynamic embedding $\bm{u}_{i}(t)$ and $\bm{v}_{j}(t)$ by ASE.
\STATE $\nabla \leftarrow \nabla + \log(\lambda_{(u_{i}, v_{j})}(t))$
\IF {$u_i$ has next interaction at future timestamp $t^+$ with item $v_c$}
\STATE $\nabla \leftarrow \nabla + \log(\lambda_{(u_{i}, v_{c})}(t^+))$
\STATE Uniformly sample a timestamp set $t^s=\{t^s_k\}_{k=1}^{N} \leftarrow \mathrm{Uniform}(t,t^+,N)$.
\STATE Sample the negative item set $\Upsilon$ $\backslash\backslash$ Negative sampling.
\FOR{$k \in \{2,...,N\}$}
\STATE $\Lambda \leftarrow \Lambda + (t^s_k - t^s_{k-1})\lambda(t^s_k)$ $\backslash\backslash$ Monte Carlo estimation.
\ENDFOR
\ENDIF
\ENDFOR
\STATE $\mathcal{L}$ $\leftarrow$ $\nabla-\Lambda$
\STATE Update the model parameters by Adam optimizer.
\ENDWHILE
\end{algorithmic}
\end{algorithm}
\subsubsection{Prediction Tasks}
Beneficial from TPP framework, DSPP can naturally tackle the following two tasks:
\begin{itemize}
\item Item prediction: Given user $u_i$ and a future time $t^+$, \textit{what is the item that this user will interact at time $t^+$?} To answer this question, we rank all items and recommend the one that has the maximum intensity:
\begin{equation}
\small
\begin{split}
\mathrm{argmax}_{v_j} \frac{\lambda_{(u_i,v_j)}(t^+)} {\sum_{v_c \in \mathcal{V}} \lambda_{(u_i,v_c)}(t^+)},
\end{split}
\label{item_expect}
\end{equation}
\item Time prediction: Given the user $u_i$, item $v_j$ and timestamp $t_n$, \textit{how long will this user interact with this item again after timestamp $t_n$?} To answer this question, we estimate the following time expectation:
\begin{equation}
\small
\begin{split}
\Delta=\int_{t_n}^{\infty} (t-t_n) f_{(u_i,v_j)}(t) \mathrm{d} t,
\end{split}
\label{time_expect}
\end{equation}
\end{itemize}
where $f_{(u_i,v_j)}(t) = S_{(u_i,v_j)}(t)\lambda_{(u_i,v_j)}(t)$ is the conditional density (details in Section \ref{TPP}) and $\Delta$ is the expectation interaction time.
\subsection{Model Analysis}
\subsubsection{Differences with Sequential Recommendation}
Sequential recommendation methods~\cite{gru4rec,rum,sasrec,xu2019recurrent} also focus on modeling sequential user preferences. Compared with them, DSPP has the following fundamental differences:
\begin{itemize}
\item In the task level, DSPP concentrates on modeling the dynamic evolution of users and items in continuous time. DSPP can not only predict the next item, but also explicitly estimates the time expectation of a given user-item interaction. In contrast, sequential recommendation aims to model interaction sequences in the discrete manner. Thus, most of them ignore the timestamp information and cannot model the time distribution.
\item In the model level, DSPP simultaneously captures the topological structure and the long-range dependency structure via our TFE and ASE modules, but sequential recommendation methods usually ignore the topology information in temporal interaction networks.
\end{itemize}
\subsubsection{Time Complexity}
To accelerate the training process of DSPP, we adopt $t$-$batch$ algorithm~\cite{jodie} to organize data for paralleling training. Moreover, we apply Monte Carlo Algorithm~\cite{survival} with the negative sampling trick~\cite{coeve} to estimate our objective function Eq.(\ref{loss}). Hence, the main operations of DSPP fall into the proposed TFE and ASE modules. The computational complexity of TFE is $\mathcal{O}(K|\mathcal{E}|D)$, and the ASE is $\mathcal{O}(HBD)$, where $K$ is the number of TAL, $B$ is the batch size, and $H$ is a hype-parameter to control the maximum length of historical interactions. In general, our model keeps an efficient training speed. Empirically, in the same running environment, JODIE~\cite{jodie}, DGCF~\cite{dgcf} and DSPP would cost about 5.1 mins, 17.7 mins, and 8.15 mins per epoch on the Reddit dataset, respectively. The pseudo code of the training procedure is shown in Algorithm \ref{dspp}.
\begin{table}[tbp]
\centering
\caption{Statistics of three datasets.}
\setlength{\tabcolsep}{15pt}
\resizebox{12cm}{!}{
\begin{tabular}{|c|c|c|c|c|}
\hline
Datasets & $|\mathcal{U}|$ &$|\mathcal{V}|$ &Interactions & Action Repetition \\ \hline
Reddit &10,000 &1,000 &672,447 &79\% \\ \hline
Wikipedia &8,227 &1,000 &157,474 &61\% \\ \hline
Last.FM &1,000 &1,000 &1,293,103 &8.6\% \\ \hline
\end{tabular}
}
\label{dataset}
\end{table}
\section{Experiments}
\subsection{Datasets}
To make a fair comparison, we evaluate DSPP on three pre-processed benchmark datasets~\cite{jodie}, i.e., Reddit\footnote{\url{http://snap.stanford.edu/jodie/reddit.csv}}, Wikipedia\footnote{\url{http://snap.stanford.edu/jodie/wikipedia.csv}} and Last.FM\footnote{\url{http://snap.stanford.edu/jodie/lastfm.csv}}. The concrete statistics of users, items, interactions and action repetition are listed in Table \ref{dataset}. Noticeably, these datasets are largely different in terms of action repetition rate, which can verify whether DSPP is able to capture the dynamic influence in various action repetition scenarios accurately.
\subsection{Experiment Setting}
\textbf{Data Preprocessing}: As used in JODIE~\cite{jodie} and DGCF~\cite{dgcf}, for each dataset, we first sort all interactions by chronological order. Then, we use the first 80\% interactions to train, the next 10\% interactions to valid, and the remaining 10\% interactions for the test. In contrast with JODIE and DGCF, we generate a snapshot sequence $\{\mathcal{G}^m\}_{m=0}^{M-1}$. In our setting, the validation snapshots cover the training data, and the test snapshots also contain all training and validation data.
\\
\textbf{Evaluation Metrics}: To evaluate our model performance, for each interaction, we first generate corresponding user and item steady and dynamic embeddings. Then, we rank all items by Eq.(\ref{item_expect}) and predict the future time by Eq.(\ref{time_expect}). Afterward, we evaluate the item prediction task with the following metrics: Mean Reciprocal Rank (MRR) and Recall@10. higher values for both metrics are better. For the time prediction task, we use Root Mean Square Error (RMSE) to measure model performance, and a lower value for RMSE is preferred.
\\
\textbf{Baselines}: We compare DSPP with the following baselines.
\begin{itemize}
\item Random walk model: CTDNE~\cite{ctdne}.
\item Recurrent network models: LSTM~\cite{lstm}, RRN~\cite{rrn}, LatentCross~\cite{latent}, Time-LSTM~\cite{timelstm}, JODIE~\cite{jodie} and DGCF~\cite{dgcf}.
\item Temporal point process model: DeepCoevolve~\cite{coeve}.
\end{itemize}
\textbf{Implementation Details}: In our experiments, we use the official implementations\footnote{\url{https://hanjun-dai.github.io/supp/torch_coevolve.tar.gz}} of DeepCoevolve. Except from it, we directly report the experimental results in the original papers~\cite{jodie,dgcf}. DSPP follows the same hyper-parameter setting with baselines: the embedding dimension $D$ is fixed as 128, the batch size $B$ is fixed as 128, the learning rate is fixed as 0.001, the model weight decay is fixed as 0.00001, the sampling number for Monte Carlo estimate is fixed as 64, the number of negative sampling is fixed as 10, the number of TAL $K$ is fixed as $2$, the Attention is stacked 8 layers, the GRUs are 1 layer, the number of snapshots $M$ is selected from $\{128, 256, 512, 1024\}$ and the maximum length of interaction sequence $H$ is chosen from $\{20, 40, 60, 80\}$. The Adam~\cite{adam} optimizer is used to update all model parameters.
\begin{table}[tbp]
\centering
\caption{Performance (\%) comparison of item prediction.}
\setlength{\tabcolsep}{20pt}
\resizebox{12cm}{!}{
\begin{tabular}{cp{10pt}p{10pt}p{10pt}p{10pt}p{10pt}p{10pt}}
\toprule
\multirow{2}{*}{Model} & \multicolumn{2}{c}{Last.FM} & \multicolumn{2}{c}{Wikipedia} & \multicolumn{2}{c}{Reddit}\\ \cmidrule(lr){2-3}\cmidrule(l){4-5}\cmidrule(l){6-7}
&Recall@10 &MRR &Recall@10 &MRR &Recall@10 &MRR \\ \midrule
CTDNE & 1.0 & 1.0 &5.6 &3.5 &25.7 &16.5\\
LSTM &12.7 &8.1 &45.9 &33.2 &57.3 &36.7 \\
Time-LSTM &14.6 &8.8 &35.3 &25.1 &60.1 &39.8 \\
RRN &19.9 &9.3 &62.8 &53.0 &75.1 &60.5 \\
LatentCross &22.7 &14.8 &48.1 &42.4 &58.8 &42.1 \\
DeepCoevolve &33.6 &21.3 &60.6 &48.5 &78.7 &65.4 \\
JODIE &38.7 &23.9 &82.1 &74.6 &85.1 &72.4 \\
DGCF &45.6 &32.1 &85.2 &78.6 &85.6 &72.6 \\
\midrule
DSPP & \textbf{47.1} & \textbf{34.3} & \textbf{90.5} & \textbf{82.1} & \textbf{86.7} & \textbf{74.5} \\ \bottomrule
\end{tabular}
}
\begin{center}
\end{center}
\label{nextitem}
\end{table}
\subsection{Item Prediction}
For item prediction, Table \ref{nextitem} shows the comparison results on the three datasets according to Recall@10 and MRR. From the experimental results, we have the following observations:
\begin{itemize}
\item DSPP consistently yields the best performances on all datasets for both metrics. Compared with state-of-the-art baselines, the most obvious effects are that DSPP achieves the 6.8\% improvement in terms of MRR on Last.FM, the 6.2\% improvement in terms of Recall@10 on Wikipedia and the 2.6\% improvement in terms of MRR on Reddit. It reveals that incorporating the topological structure and long-range dependency structure can bring good robustness in different action repetition scenarios.
\item DSPP outperforms DeepCoevolve significantly. This phenomenon demonstrates that DSPP has a more powerful intensity function that can better capture the dynamic influence between users and items.
\item DSPP and DGCF are superior to other baselines on Last.FM, which indicates that it is critical to model the topological structure information for learning temporal interaction networks.
\end{itemize}
\begin{table}[tbp]
\centering
\caption{Performance (hour$^2$) comparison of time prediction.}
\setlength{\tabcolsep}{30pt}
\resizebox{12cm}{!}{
\begin{tabular}{cccc}
\toprule
Model &Last.FM &Wikipedia &Reddit\\ \midrule
DeepCoevolve &9.62 &10.94 &11.07\\
DSPP &7.78 &8.71 &9.06 \\ \bottomrule
\end{tabular}
}
\begin{center}
\end{center}
\label{timepred}
\end{table}
\subsection{Time Prediction}
Table \ref{timepred} shows the prediction performances of DeepCoevolve and DSPP. From it, we can observe that DSPP achieves more accurately time prediction. Specifically, our model achieves the 19.1\% improvement on Last.FM, the 20.3\% improvement on Wikipedia and the 18.1\% improvement on Reddit. We suppose that the improvements owe to the following reasons: 1) DeepCoevolve uses a linear intensity function to model dynamic influence over time, which would reduce the model flexibility of intensity function. 2) DeepCoevolve remains the same user and item embeddings until it involves a new-coming interaction, so it limits model expressiveness. In contrast, our intensity function can learn the nonlinear dynamic influence, since the ASE module can provide time-aware dynamic embeddings.
\begin{table}[tbp]
\centering
\caption{Performance (\%) comparison of different model variants.}
\setlength{\tabcolsep}{35pt}
\resizebox{12cm}{!}{
\begin{tabular}{lcc}
\toprule
Model & Recall@10 & MRR \\
\midrule
DSPP & 47.1 & 34.3 \\
\enspace \enspace Remove TFE & 40.2 & 25.3 \\
\enspace \enspace Replace TAL with GCN & 44.5 & 32.4 \\
\enspace \enspace Replace TAL with GAT & 45.2 & 32.7 \\
\bottomrule
\end{tabular}
}
\label{variant}
\end{table}
\subsection{Discussion of Model Variants}
To investigate the effectiveness of our model components, we implement several variants of DSPP and conduct the experiment on Last.FM dataset for the task of item prediction. The experimental results are reported in Table \ref{variant}.
According to it, we can draw the following conclusions:
\begin{itemize}
\item Remove TFE. To verify whether our proposed TFE module is useful to enhance the expressiveness of the intensity function, we first remove it and only remain the second term of Eq.(\ref{intensity}) as our intensity function. Then, we directly predict the item that is most likely to interact with each user via Eq.(\ref{item_expect}). As shown in the results, both metrics Recall@10 and MRR sharply drop 14.6\% and 26.2\%, respectively. It demonstrates that modeling the topological structure of temporal interaction networks can provide a powerful structural prior for enhancing the expressiveness of intensity function.
\item Remove TFE. This variant can be also viewed as a non-graph based model, since it does not exploit the topological structure, and the remaining temporal attention shift encoder only provides the long-range dependency structure to model intensity function. Compared with DeepCoevolve, this variant yields 19.6\% and 18.7\% improvements on Recall@10 and MRR respectively. This observation shows that our proposed temporal attention shift encoder can further enhance the intensity function.
\item Replace TAL with GCN/GAT. To verify whether our proposed TAL is superior to other graph encoders for capturing the topological structure of temporal interaction networks. We replace TAL by GCN~\cite{gcn} and GAT~\cite{gat}. For the GCN variant, both Recall@10 and MRR drop 5.8\%. For GAT variant, Recall@10 and MRR drop 4.0\% and 4.6\%, respectively. So, We suppose that our proposed TAL can better capture the information of the same type entity.
\end{itemize}
\section{Conclusion}
In this paper, we present the deep structural point process for learning temporal interaction networks. Our model includes two proposed modules, i.e., topological fusion encoder and attentive shift encoder to learn the topological structure and the long-range dependency structure in temporal interaction networks, respectively. On top of that, a novel intensity function, which combines the learned steady and dynamic embeddings, is introduced to enhance the model expressiveness. Empirically, we demonstrate the superior performance of our model on various datasets for both tasks of item prediction and time prediction.
\section*{Acknowledgement}
This work is supported in part by the Strategic Priority Research Program of Chinese Academy of Sciences (Grant No. XDC02040400) and the Youth Innovation Promotion Association of CAS (Grant No. 2021153).
|
\section{Introduction}
X-ray pulsars offer vital information through studies of their pulse characteristics about
their nature and geometry of the binary system. The shape of the pulse profile offers
insight about mode of accretion inflows, its luminosity, geometry of accretion column and
its magnetic field configuration \citep{parmar89a}. Therefore, such studies offer understanding of
its pulsar system and the process of mass accretion in the presence of strong magnetic field of the neutron star.
Detailed studies on pulse characteristics were conducted during outburst activities of some of the
pulsars earlier such as EXO 2030+375 \citep{parmar89a}, Cepheus X-4 \citep{koyama91,mihara91,mukerjee00},
XTE J1946+274 \citep{paul01} etc., which offered valuable information and
understanding of physical processes responsible for the observed properties of these pulsars.
Spectroscopic studies, on the other hand, reveal environment surrounding the pulsar and the underlying
mechanism responsible for energy generation in these systems. Detailed studies on cyclotron absorption
features, if present in the pulsar spectrum, not only enable us to determine its surface magnetic field,
but also offers an insight into the line producing region, its structure and geometry of the accretion column
\citep{staubert19}. Therefore, detailed studies of cyclotron absorption features are being pursued by
researchers since its discovery \citep{truemper78} as it is an important diagnostic probe for pulsars.
Cyclotron absorption features were detected in the spectrum of many Be-binaries covering a wide range
of energies, starting from a lower energy of $\sim10$ keV \citep{decesar13, jun12} to a higher energy
at $\sim100$ keV \citep{barbara01}. Detailed studies of cyclotron line sources and their properties were
reported by \citet{staubert19} and \citet{maitra17}. The Be-binaries, particularly because of their
transient nature, offer us opportunities of detailed studies of some of these interesting properties
with change in source luminosity and in time. The studies on cyclotron-line energy with respect to
its pulse-phase, source luminosity and with time, showed a wide variations for some sources, such as
Vela X-1, Cen X-3 and Her X-1 \citep{staubert19}. These interesting properties help us to systematically
investigate and understand their underlying physical properties.
A Be-binary pulsar system is a class of high mass X-ray binary,
where a neutron star has a Be-star as its companion, shows significant variations
of the source luminosity and pulse period during its outburst activity.
The stellar wind from rapidly rotating Be-stars are highly asymmetric
and frequently form equatorial accretion disc around the Be-star. Such systems
typically have a large orbital eccentricity resulting from relatively recent supernova explosion.
The presence of these two features, equatorial disc and large eccentricity, enables the matter to
accrete on to the neutron star directly from the equatorial Be-star disc during its
periastron passage. This results in a short duration outburst due to enhanced accretion on to the
neutron star and cause increase in the observed X-ray flux by several orders of
magnitude, typically up to $\approx 10^{37}$~erg~s$^{-1}$. Such outburst events occur in a particular
phase of the orbit and are identified as a Type-I outburst.
In addition to such events, there are Type-II outbursts, which are due to a sudden
increase in amount of matter in the circumstellar disc surrounding the Be-star, which can occur
at any orbital phase \citep{okazaki01, okazaki02, okazaki16}.
The duration of Type-II outbursts varies from weeks to months, during
which the source X-ray luminosity can reach the Eddington limit, $\approx 10^{38}$ erg~s$^{-1}$ Reig (2011).
Therefore, Be-binary systems in particular, offer the best opportunities for studies of variation of
pulse characteristics and spectral behavior of sources with change in source luminosity during its
outburst activity. Hence, many Be-binaries were observed over the period during outbursts and
offered interesting results for understanding accretion theory \citep{bildsten97, reig11}.
The Cepheus X-4 is one such interesting Be-binary pulsar which showed
rare and long outburst of about 40 days in a span of about 4--5 years and was observed and studied
by many observatories from time to time during its outburst activities.
Cepheus X-4 was discovered by X-ray telescope of OSO-7 as a
transient source during June--July, 1972 \citep{ulmer73}. Ginga
observed the source during March 1988 outburst and detected spin period of
66.25 s of its neutron star for the first time \citep{koyama91}.
Spectroscopic studies from the same Ginga observations lead to detection
of cyclotron resonance scattering feature corresponding to a centroid
energy at $30.5\pm0.4$ keV \citep{mihara91}.
The ROSAT observations during June 1993 outburst refined the source
coordinates and also determined its pulsar spin period \citep{schulz95}.
The observations by BATSE during June--July 1993 and during subsequent
outburst of June--July 1997 which was also followed by RXTE, determined
pulse characteristics of Cepheus X-4. Additionally, a possible range of its orbital period
from 23--147.3 days was suggested using RXTE data \citep{wilson99}.
From observed characteristic features and outburst activities, it was predicted that
Cepheus X-4 could possibly have a massive early type Be-star with
its circumstellar disk as a companion, which was thought as most likely cause for its long
outburst of about 40 days, as seen for other Be-binaries.
Optical observations of Cepheus X-4 subsequently confirmed
it as a Be-binary system and estimated its location at a distance of $3.8 \pm 0.6$ kpc \citep{bonnet98}.
But this distance estimate was later challenged by \citet{riquelme12} who proposed a
distance of either 7.9 or 5.9 kpc according to whether the stellar
type of the companion is a B1 or B2 star, respectively. The
distance of Cepheus X-4 was later reported by Gaia at $10.2^{+2.2}_{-1.6}$ kpc \citep{malac20}.
Luminosity dependent changes in the pulse profile of Cepheus X-4 were studied
during declining phase of 1997 outburst \citep{mukerjee00} by combining observations by
Indian X-ray Astronomy Experiment \citep{agrawal97} along with RXTE \citep{roth98}.
The RXTE observed another outburst in 2002 and re-established its cyclotron resonance
feature corresponding to its centroid energy at $30.7 \pm 1.8$ keV (as established earlier
by Ginga) which did not show a significant dependence on X-ray luminosity, although the continuum
became harder with increasing source luminosity \citep{mcbride07}.
The source went into outburst again in 2014 and was observed with the Nuclear
Spectroscopic Telescope Array (NuSTAR), \citep{harrison13} and Suzaku \citep{mitsuda07}.
Results obtained from Suzaku observation of the 2014 outburst, overlapped with NuSTAR second
observation on July 1--2, 2014, which detected additional absorption feature at $\approx45$ keV in the phase-resolved
spectra of the pulsar, which was identified as the first harmonic of the fundamental cyclotron
line detected at $\approx28$ keV \citep{jaiswal15}.
The source spectra obtained from NuSTAR observations of 2014 were well fitted by Fermi-Dirac cutoff (FD-cutoff)
model along with iron emission line and cyclotron absorption feature was clearly detected in both the observations at $30.39^{+0.17}_{-0.14}$ keV and $29.42^{+0.27}_{-0.24}$ keV,
respectively. Although, the averaged source luminosity was different by a factor of about 3 between these
two observations, however it only showed marginal variation in its centroid energy \citep{furst15}.
Using same observations of NuSTAR of 2014 outburst \citep{vybornov17} reported that spectrum of Cepheus X-4
showed two cyclotron resonance scattering features, the fundamental line at $\approx 30$ keV and its harmonic
at $\approx 55$ keV. They also showed that the energy of the fundamental cyclotron absorption feature increases
and the continuum becomes harder with increasing X-ray luminosity. Pulse phase resolved spectroscopic
studies of Cepheus X-4 were conducted by \citet{bhargava19} at these two different intensities of the source
using same two observations of NuSTAR of 2014 outburst. It was found that the observed cyclotron
line profile of Cepheus X-4 was of asymmetric shape for phase averaged spectrum. However, for phase resolved
spectra, a single symmetric cyclotron profile fitted the data well.
The spectral continuum and parameters of the cyclotron line, showed some
variations with respect to the pulse phase only within a limited pulse-phase \citep{bhargava19}.
Motivated with further studies and investigations on timing and spectroscopic properties
of Cepheus X-4 during its latest 2018 outburst, AstroSat observed the source,
on July 2 and again on July 8, during the declining phase of the outburst at
two different source luminosities. Results obtained from these studies
on timing and spectral properties of Cepheus X-4 at two different source luminosity
during 2018 outburst are presented in this paper. The rest of the paper is organized such that
Section 2 describes the observations and data analysis including software tools used,
Section 3 describes the results and then implications of these results are discussed
in Section 4. Finally, the conclusions drawn from this study are summarized in Section 5.
\begin{figure}
\centerline{\includegraphics[scale=0.55,angle=-90]{BATmm_prof_cepx4_2Lo.ps}}
\caption{Intensity variation in 15--50 keV energy band of Cepheus X-4 as observed by Swift-BAT
during 2018 outburst is shown by data points while the continuous line
shows a fitted curve with a combination of two Lorentzian. Data points with very large error bars were
removed. The start and end times for two AstroSat observation intervals are marked
by vertical dashed lines.}
\label{batfit}
\end{figure}
\section{Observations and Data Analysis }
Cepheus X-4 had another long outburst during June--July, 2018 as
its latest event, as seen in the Swift-BAT intensity curve shown in Figure~\ref{batfit}.
The peak of the outburst was approximately determined by fitting a combination of
two Lorentzian to the Swift-BAT intensity curve. The peak of the outburst occurred
at MJD 58298.37 when the source intensity was about 60 mCrab
(Swift-BAT 0.01308 cts cm$^{-2}$ s$^{-1}$) in the 15--50 keV energy band as determined from the
fitted model. AstroSat observed the source twice during its declining phase of
the 2018 outburst under target of opportunity observation (TOO). First observation was
made during July 2--3, 2018 between MJD 58301.61850 and 58302.56154
with an Obsid T02\_055T01\_9000002206. This was followed by the second observation
during July 8--9, 2018 between MJD 58307.40211 and 58308.60036 with an Obsid T02\_057T01\_9000002212.
The start and end times of these observation intervals are marked by consecutive dashed vertical lines
on Swift-BAT light curve
in Figure~\ref{batfit}. The source intensity during these two observations were about 52 mCrab and 27 mCrab,
respectively in the Swift-BAT energy band. The Swift-BAT light curve was obtained from
Archive\footnote{https://swift.gsfc.nasa.gov/results/transients/index.html} and
relevant descriptions about these light curves are given by \citet{krimm13}.
The outburst of 2018 and the earlier outburst of 2014,
lasted for about the same duration of $\approx 45$ days but peak intensity of
the 2018 outburst $\approx 60$ mCrab (Figure~\ref{batfit}), was lower compared to $\approx 80$ mCrab
during 2014 in the 15--50 keV energy band of the Swift-BAT \citep{furst15}. AstroSat observed the source
during the outburst about 3-days and 9-days after attaining its peak luminosity, which is about 87\% and 45\% of
its observed peak luminosity.
During the two AstroSat observations of Cepheus X-4, the Large Area X-ray Proportional
Counter (LAXPC) was used as the prime instrument for data acquisition. The LAXPC and
its capabilities are well described by \citet{antia17} and can be referred for details.
During these observations only LAXPC20 was working nominally and was operated in its
event-analysis mode. As LAXPC10 was operated at a very low gain hence data were not
utilized for our studies. An average source count-rate of 158 cts s$^{-1}$ and
77 cts s$^{-1}$ were detected by LAXPC20 in the 3--60 keV energy band.
Total effective exposure for two observations of LAXPC were 44~ks and 54~ks respectively.
The Soft X-ray Telescope (SXT) was operated in its photon counting mode during both observations,
with an effective exposure of about 20~ks and 29~ks.
An average count-rate of $2$ cts s$^{-1}$ and
$1$ cts s$^{-1}$, were detected in SXT during two observations respectively in the 0.5--8 keV energy band.
The SXT payload and its read-out modes are described by \citet{singh16}.
The data from the AstroSat SXT and LAXPC20 were combined for detailed
timing and spectroscopic studies in 0.3--60 keV energy band. AstroSat data of these
TOO proposals are available in the public domain at the AstroSat
Data Archive\footnote{https://astrobrowse.issdc.gov.in/astro\_archive/archive/Home.jsp}.
The pipeline software version laxpcsoftv3.4\footnote{https://www.tifr.res.in/$\sim${}astrosat\_laxpc/LaxpcSoft.html}
was used for the analysis of LAXPC data. The pipeline software runs by taking the required input files from
its well defined directory structure which includes level-1 data files, calibration and background files
for generation of level-2 data products. These included light curves in the desired energy band and its full
range of spectrum. The required background files are supplied along with the
software. The software itself offers guidance for selection of a suitable
background as well as a response file which may be used for further analysis.
The background observation of August, 2018 was used for this analysis
to estimate the contribution from the source. The background observation of
July 2018 as recommended for use by the pipeline software was avoided as it posed problems
particularly at energies of 30 keV and above, as the model under-predicted the background
counts affecting source contributions. The July 2018 background observations was most likely affected
due to occurrence of a geomagnetic storm, hence was not considered.
The pipeline software was executed with default values of all the input parameters.
We have considered all the events from main anodes from each layer of LAXPC20.
Appropriate energy channels were selected during the software run for extracting light curves for
a required energy band. Gain corrections are applied automatically by the pipeline software itself
to account for any shift in the gain between the source and background, based on calibration data.
Thus the pipeline generates calibrated spectrum and background subtracted light curves of the source
within its selected energy band for further analysis of the data using other astronomical software
as mentioned later.
The pipeline analysis software specifically designed for SXT was used.
The latest version of the software AS1SXTLevel2-1.4b, available at its payload operation center
site\footnote{https://www.tifr.res.in/$\sim${}astrosat\_sxt/index.html} was used.
The software includes other files such as spectral response,
auxiliary response and background files, those are required for spectral data analysis.
The SXT calibration files are accessed automatically by the software from its well organized directory structure
during its execution. The SXT level-1 data along with House Keeping and calibration files are taken
as input by the analysis software and produce cleaned and calibrated events lists.
The ultimate data products such as spectrum, light curve and image were
produced by the pipeline software, by filtering and screening of the events, for a set of
default parameters. A circular region of interest of 6 arc minutes radius was
considered with respect to the source center, for extraction of photon events for this analysis,
covering all the grades between 0--12. We thus generated spectrum and light curves in different
energy bands covering 0.3--8.0 keV. The version 2.4c of the {\tt Xselect} tool
was used for screening of the data. Timing analysis was performed after delay time corrections
applied to all the events with respect to the solar system barycenter for both SXT and LAXPC data,
using a tool {\tt as1bary}\footnote{https://astrosat-ssc.iucaa.in/?q=data\_and\_analysis},
developed by the AstroSat science support cell.
Astronomical software HEASoft version 6.14 was employed for the higher level
analysis of AstroSat data. The timing analysis was done using software tools
{\tt lcurve}, {\tt efsearch} and {\tt efold} etc. of Xronos 5.22 package.
The spectral data were analyzed using Xspec software version 12.8.1.
The standard spectral models supplied by the Xspec software were used.
Additionally, a Fermi-Dirac cuttoff model was defined and used in combination
with other Xspec models which are described below. All these results are presented
in the following section.
\begin{figure}
\centerline{\includegraphics[scale=0.36,angle=-90]{comb_lc_2206_133.ps}
\qquad\includegraphics[scale=0.36,angle=-90]{comb_lc_2212_133.ps}}
\caption{A common time segment of light curves derived from SXT in 0.3--8.0 keV and
LAXPC20 in 3--60 keV energy band with 133 s binning are shown. The light curve from July 2--3, 2018
observation corresponds to a start time at MJD 58301.61850 (left panel) and
from July 8--9, 2018 observation at MJD 58307.40211 (right panel) are displayed.}
\label{lc2}
\end{figure}
\section{Results}
\subsection{X-ray Light curve and Pulse Period determination}
Light curves of Cepheus X-4 in 3--60 keV energy band from LAXPC20 with 1~s time bin
showed regular and strong 66 s pulsations along with variation in its intensity.
A time segment of X-ray light curves after applying the solar system barycentric time correction,
for both SXT and LAXPC20 with 133 s binning are shown from the observations of
July 2--3, 2018 (Figure~\ref{lc2}-left panel) and of July 8--9, 2018 (Figure~\ref{lc2}-right panel).
Start time for these two observations are at MJD 58301.61850 and
MJD 58307.40211, respectively.
The binning of 133 s, which is twice the pulse period was applied to the light curve to detect source flaring and
dipping activities by suppressing observed intensity variations due to spin-pulses and pulse to pulse variations
in the high time resolution light curve and to improve on statistical fluctuations.
Sudden flaring and dips were clearly seen in the light curves of SXT and LAXPC20
as can be seen in the Figure~\ref{lc2} along with its usual intensity variations during
AstroSat observations. These variations are typical property of a Be-binary pulsar
and is also observed in the case of Cepheus X-4 during AstroSat observations.\\
Using photon arrival time delay corrected light curves, first, average spin-period of the pulsar
was determined using epoch folding technique
for each of these two AstroSat observations along with its estimated
1-$\sigma$ error as $66.351\pm0.008$ s and $66.353\pm0.008$ s respectively.
The uncertainties are the estimated 1-$\sigma$ errors from Gaussian function fit to the
values of calculated $\chi^2$ versus a range of period curve, where best-period is chosen
corresponding to the Gaussian peak \citep{pravdo01}. The estimated errors so derived are
rather an over estimate of the measurement errors.
From the difference of these spin periods, an average spin-down rate of the order
of $\approx 1\times10^{-12}$ Hz s$^{-1}$ was determined
for the purpose of an initial information.
Now, the pulsar spin period was determined with higher precision, at an epoch corresponding to
the start of the observation at $t=t_0$ along with its time derivative independently for two
observations, by applying the phase correction technique using
\begin{equation}
\phi(t)=\phi_0+\nu_0(t-t_0)+\dot\nu{(t-t_0)^2\over 2},
\label{eq:phase}
\end{equation}
where $\phi$ is the phase which covers the range 0--1 of the period, $\phi_0$ is the phase,
$\nu_0$ is the spin frequency and $\dot\nu$ is its time derivative, all corresponding to the start time $t_0$.
The fit was performed by fitting a periodic signal and considering reasonable numbers of harmonics of the basic
spin frequency using
\begin{equation}
c(t)=c_0+\sum_{k=1}^N\Big(a_k\sin(2\pi k\phi)+b_k\cos(2\pi k\phi)\Big),
\label{eq:fit}
\end{equation}
where $c(t)$ is the observed count rate, $N$ is the number of harmonics included in the fit
and $c_0,a_k,b_k$ are the coefficients fitted, apart from $\nu_0$ and $\dot\nu$.
The light curve with a time resolution of 1 s was obtained for the analysis.
The best fitted values for spin-frequency $\nu_0$ and its derivative
$\dot\nu$ were determined by minimizing $\chi^2$ deviation of the
light curve from the model defined by Eq.~\ref{eq:fit}. Different number of harmonics $N$ were tried and
it was found that $N=20$ is adequate to define the signal appropriately for the analysis.
Monte Carlo simulations were done to determine errors in the fitted values of $\nu$ and $\dot\nu$.
The simulations were performed by perturbing $c(t)$ and repeating the process for 4000 different
realization of noise and thus 90\% confidence limits for the parameters were determined.
The program was also used to extract data for pulse-profile generation and to
define good time intervals for different phase intervals for extraction of spectra using
the fitted values of parameters, for studies of phase resolved spectroscopy.
The fitted value of the spin-period of the pulsar and its spin-up rate were determined as
$P=66.35080\pm0.00014$ s and $\dot\nu=(-2.1\pm0.8)\times10^{-12}$ Hz s$^{-1}$
corresponding to MJD 58301.61850 for the first AstroSat observation. Whereas for
the second observation, it was determined as $P=66.35290 \pm 0.00017$ and
$\dot\nu=(-1.6\pm0.8)\times10^{-12}$ Hz s$^{-1}$ at an epoch MJD 58307.40211.
The quoted error denotes 90\% confidence limit for both the observations.
The effect of orbital motion on these parameters could not be determined, as orbit of
this binary is still unknown.
\begin{figure}
\centerline{\includegraphics[scale=0.35,angle=-90]{MProf_sxt_overlapp.ps}
\qquad\includegraphics[scale=0.35,angle=-90]{MProf_lx20_overlapp.ps}}
\caption{Pulse-profiles derived from SXT in 0.3--8 keV energy band (left panel) and LAXPC in 3--60 keV
energy band (right panel) from two AstroSat observations are shown with an overlap. The blue colored profile
is derived from July 2--3, 2018 and red colored profile from July 8--9, 2018 observation.
The 5 different phase bins used in the phase resolved study are marked in the figure.}
\label{pulsea}
\end{figure}
\begin{figure}
\centerline{\includegraphics[width=10cm,height=8cm,angle=-90]{Ef_2206_all7_BC.ps}
\qquad\includegraphics[width=10cm,height=8cm,angle=-90]{Ef_2212_all7_BC.ps}}
\caption{Folded pulse profiles derived from SXT and LAXPC20 at different energy bands
covering 0.5--60 keV during the two AstroSat observations. The left panel shows the result
from the first observation (July 2--3, 2018), while the right panels shows that from
the second observation (July 8--9, 2018).}
\label{pulseb}
\end{figure}
\subsection{Pulse profiles and Pulse fraction Measurements}
Light curves were extracted corresponding to different energy bands and barycentric corrections
were applied. Respective pulse profiles were derived by folding corresponding light curves with its
derived spin-period and its derivative for the two observations. Small phase-shifts were applied to
the corresponding start of the epochs to match the phase of these pulse profiles for the two observations.
Pulse profiles were derived for observation-1, using 3--60 keV light curve of LAXPC20 first, such that the
minimum of the profile corresponds to pulse phase 0.5. Same reference epoch was used for folding 0.3--8 keV
SXT light curve for observation-1. Similar procedure was followed for observation-2.
Two cycles of all such pulse-profiles are shown in Figures for clarity.
The pulse profiles showed mainly two prominent pulses, the pulse between the phase 0.5--1.0 (1.5--2.0)
covers the primary-pulse and phase between 0.0--0.5 (1.0--1.5) the secondary-pulse, as can be seen
in Figure~\ref{pulsea}.
Folded pulse-profiles showed variation at different energy with respect to the pulsar spin-phase.
The average pulse-profile for both observations covering energy band between 0.3--8 keV of SXT and
between 3--60 keV of LAXPC20
are overlayed in the Figure~\ref{pulsea} for relative comparison. The relative
intensities of primary pulse compared to its secondary showed increase with decrease in source luminosity
at both energy bands 0.3--8 keV (left panel) and 3--60 keV (right panel) as can be seen in Figure~\ref{pulsea}.
For detailed comparison, we derived pulse profiles at 7-different energy bands between 0.5--60 keV from
two AstroSat observations and results are shown in Figure~\ref{pulseb} for observation-1 (left panel)
and observation-2 (right panel). The pulse profile between 0.5--3 keV energy band was derived from SXT data, where
both the pulses, primary and
secondary showed multiple structures at lower energy bands and are most prominent between 0.5--3.0 keV.
Where as for higher energy bands, it showed two pulses with change in its relative intensities
depending on energy and source luminosity. The relative intensity of primary pulse increases with
energy and the secondary pulse becomes gradually narrower. Moreover, the sharp narrow dip at lower
energies changes to a smoother and broader shape connecting primary and secondary pulses as can be seen during
both the observations. It is also noticed that the presence of multiple structures and absorption dips
of both primary and secondary pulses as seen at lower energies, gradually merged into a
double-pulse profile with gradual increase in the energy and then becomes asymmetric and broad
with smoothening of the dip joining primary and secondary at higher energies. We also noticed
that for observation-2 at lower luminosity the primary pulse becomes relatively stronger than the
secondary pulse in contrast to observation-1 for higher source luminosity.
Pulse profiles showed remarkable variability in shape and its
pulse-fraction with respect to energy and source luminosity as seen in Figure~\ref{pulseb} and
Figure~\ref{pfrac} respectively.
The RMS pulse fraction varied from about $32 \pm 4$\% at 3--6 keV,
$48 \pm 6$\% at 15--20 keV and $38 \pm 5$\% at 30--60 keV during observation-1.
The corresponding measurements for observation-2 showed $37 \pm 5 $\%,
$54 \pm 7 $\% and $25 \pm 3$\%, respectively.
Pulse-profiles derived from recent AstroSat observations are though
similar in shape but structures can be seen more clearly, as compared to those reported from
November 28, 1996 RXTE observation between 2--60 keV during its earlier
outburst \citep{wilson99}.
RMS pulse fraction measurements from 2 outbursts of Cepheus X-4, observed by
NuSTAR in 2014 and with AstroSat in 2018, are shown in Figure~\ref{pfrac}.
The pulse shape and pulse fractions measurements
of AstroSat observation-2 corresponding to 27 mCrab Swift-BAT intensity in 15-50 keV energy band,
showed consistency with the
NuSTAR observation at similar intensity during 2014 outburst \citep{bhargava19}.
These plots show that the RMS pulse fraction varies with both the energy and the source intensity.
The pulse fraction measurements starting from highest intensity of source at 72 mCrab showed gradual
increase as source intensity decrease to 52 mCrab and 27 mCrab attaining its peak-value around 20 keV.\\
\begin{figure}
\centerline{\includegraphics[scale=0.45,angle=-90]{MPF-ast-nu_logx_data1.ps}}
\caption{RMS Pulse fraction variation with energy and the source intensity during
2 outbursts of Cepheus X-4 as observed by different observatories
NuSTAR (2014) and AstroSat (2018) are shown.}
\label{pfrac}
\end{figure}
\subsection{Spectrum and Cyclotron Resonance Scattering feature}
AstroSat observations enabled us to derive X-ray spectrum in 0.7--55 keV energy band at
two different source intensities which
fitted reasonably well using two continuum models. The first model was defined as an absorbed
Fermi-Dirac cutoff (FD-cutoff)
model \citep{tanaka86} along with a black-body, a Fe-emission line and a cyclotron absorption line
as shown in Figure~\ref{spec1}.
The compTT model \citep{tit94} was used as the second model in combination with a Fe-emission line
and a cyclotron absorption line as shown in Figure~\ref{spec2}.
In most cases, the compTT-model itself defines pulsar spectrum adequately well at lower energies,
without a black-body component \citep{doroshenko10, maitra13, jaiswal15, yoshida17, mukerjee20} unlike
cutoff-models combined with a black-body. However, in some cases black-body model was combined with compTT-model to
appropriately define the low energy spectrum such as for 1A 1118-61 \citep{suchy11}. For AstroSat
phase-averaged spectra, addition of a black-body component with the compTT-model
changed the overall ${\chi^2}$ only by $\approx 1$ and resulted in large errors of the black-body parameters,
hence it did not offer any useful results. We, therefore, used a compTT-model for Cepheus X-4 without a back-body
component which defined its continuum well covering the energy band 0.7--55 keV, like it was used earlier for
Suzaku observations \citep{jaiswal15}.
The fitted model parameters along with estimated flux for two observations are given in Table~1.
The relative normalization between the two instruments were modeled by introducing a constant term in the
combined model. Then by fixing the normalization of LAXPC20 to 1, the relative normalization
of the SXT was found to be 0.3 due to its fixed offset with respect to LAXPC20.
The SXT spectral data were restricted to the energy range within 0.7--4.6 keV
to offer a good statistics to its spectral data in the range which helped in improving the overall spectral fit.
An overall systematic error of $2.5\%$ was introduced during spectral fitting to account for uncertainties in
response matrices of both the instruments.
The Cepheus X-4 spectrum during two AstroSat observations shows significant change in its continuum as can be
seen by comparing spectral parameters as given in the Table~1.
A single photo-electric absorption (phabs) component is employed in both the models for two observations.
The combined effect of absorption due to hydrogen column density
and due to presence of matter surrounding the neutron star should result in relatively lower
net absorption for lower source luminosity.
Therefore phabs is relatively lower for the second AstroSat observation of
Cepheus X-4 as seen in the Table~1. This is consistent with earlier observed case of GX 1+4, where
corresponding to lower source luminosity in 2--60 keV energy band, the phabs were lower as can be
observed in Table~1 of \citet{galloway00}.
Moreover, the photo-electric absorption
is usually found relatively lower when compTT-model is employed compared to when high energy cutoff models
combined with a black-body are used \citep{enoto14, mukerjee20}.
This is also observed here for the case of Cepheus X-4. The compTT-model does reflect this change appropriately
as seen in GX 1+4 and also in the present case of Cepheus X-4 from Table~1.
The Fe-emission line was prominently detected by LAXPC during both the
AstroSat observations and its energy and width were fixed to appropriately model other features of spectra.
A residual feature around 30 keV, which is sometimes observed in the LAXPC
spectra in many sources, \citep{antia21, beri21, jaiswal20, sridhar19, sreehari19},
was found to be very weak and barely detectable in LAXPC spectra of Cepheus X-4. This is similar to the case of
GRO J2058+42 \citep{mukerjee20}, and hence it would not pose any implications for measurements of the
spectral continuum and cyclotron-line parameters for Cepheus X-4.
Spectral data when fitted with a variety of continuum models, additional features
were observed in the spectral residuals of many accretion powered X-ray pulsars.
These features were observed either in emission between energy band 10--20 keV or more rarely
in absorption between 8--10 keV \citep{coburn02}.
It was subsequently argued and understood that such features may be caused more
likely because of inadequacies of the continuum models rather than
due to presence of cyclotron resonance features \citep{coburn02}.
For example, this feature was observed as an emission-line between 10--20 keV
for Vela X-1 \citep{kreykenbohm02}, Her X-1 \citep{coburn02},
Cepheus X-4 \citep{mcbride07} while as an absorption-line between 8--10 keV
for 4U 1907+09, 4U 1538-52 and 4U 0352+309, as can be seen in Figure~6 of \citet{coburn02}.
During the RXTE observations of Cepheus X-4, a similar feature was clearly seen
and modeled using $\sim14$ keV Gaussian line \citep{mcbride07}.
This is in contrast to the NuSTAR data where a broad feature with 6 keV line-width and centered
around 12--13 keV was observed \citep{vybornov17} during its two observations of Cepheus X-4 during 2014 outburst.
Interestingly, similar feature between 10--20 keV was also observed by \citet{furst15} (in their Figure-2(b))
during studies of Cepheus X-4 using the same NuSTAR observations.
An absorption feature around 19 keV was added in their model, to account for an asymmetry of
the main absorption line profile. Most likely due to inclusion of 19 keV line, the observed feature in emission
between 10--20 keV was also smoothed out during the spectral fit. Similar approach was followed by \citet{bhargava19}
for their studies using the same 2014 NuSTAR data, however, no absorption line around 19 keV was introduced for
their studies of phase resolved spectroscopy. This is in contrast to the fact that such broad-feature was clearly
seen in the residuals of phase-averaged spectra of two NuSTAR observation of 2014 as reported by \citet{vybornov17}.
We find presence of 16 keV feature in the phase averaged spectra for both the
observations of AstroSat and hence a Gaussian component was included in the combined model as can be seen in the Table~1.
We find 16 keV feature is relatively weaker for the observation-2 and has no significant interference with
the cyclotron line. For observation-1, the Gaussian width of the 16 keV feature was measured from the residuals of
the fitted spectral model without it and then fixed its width for the overall
spectral modeling, particularly for FD-cutoff model to reduce its interference with the cyclotron line measurements.
The effect of 16 keV features on spectral continuum was found to be in-significant for both the models
for two observations, as all parameters values are found to be consistent within their respective error limits.
The cyclotron-line width, particularly for observation-1, is found to be significantly lower due to introduction of 16 keV
feature in the model. The cyclotron-line energy, however, are either
marginally affected or remains consistent like its optical-depth within their parameter error limits.
The $E_{cut}$ parameter for observation-2 showed wide variation with respect to observation-1 for FD-cutoff model,
with or without the inclusion of 16 keV feature in the spectral model,
which was not seen in all earlier observations by other instruments.
Therefore, $E_{cut}$ parameter was frozen at a value as in observation-1 and then all other parameter were estimated
for observation-2.
The derived spectral parameters from FD-cutoff model showed that the source spectrum
is relatively harder for higher source luminosity. Where as the black-body
temperature is although relatively lower at $0.62^{+0.04}_{-0.05}$ keV
at higher source luminosity than the temperature $0.69^{+0.04}_{-0.05}$ keV
observed at the lower luminosity but are within their error limits. This is similar to earlier
observation of Cepheus X-4 during 2014 where back-body temperatures
were found to be at $0.92^{+0.02}_{-0.02}$ keV and
at $1.04^{+0.03}_{-0.04}$ keV at two luminosities \citep{bhargava19}
but at higher values compared to 2018 observations.
The compTT model could successfully define spectrum of many
X-ray pulsars in high mass X-ray binaries for example Cepheus X-4 \citep{jaiswal15},
4U 1907+09 \citep{varun19} and GRO J2058+42 \citep{mol19, mukerjee20}.
Though, It is generally applied to neutron star based low mass X-ray binaries such as
Z-type and atoll sources having relatively lower magnetic field ($<10^{12}$ G) \citep{ferinelli08}.
The FD-cutoff model estimated black-body temperatures at two different luminosity of the source
along with other spectral and cyclotron line parameters for both the AstroSat observations (Table~1).
The Comptonization model on the other hand
enabled us to determine input photon Wien-temperature of $0.42^{+0.04}_{-0.03}$ keV and $0.49 \pm 0.03$,
the plasma temperature of $5.17^{+0.25}_{-0.17}$ keV and $6.92^{+0.62}_{-0.49}$ keV, along with its corresponding
plasma optical depth of $6.05^{+0.26}_{-0.53}$ and $5.21^{+0.22}_{-0.30}$ respectively for
the phase-averaged spectra.
As bulk Comptonization occurs as per compTT model, in the innermost part of the transition-layer
presumably within some extended region located away from the neutron star, while thermal Comptonization
is dominant in the outer transition layer. The Wien-temperature is, therefore, always found to be relatively lower
than the neutron star surface black-body temperature as it originates away from the neutron star surface
at the outer transition layer \citep{ferinelli08}. Difference in these two temperatures were also observed earlier in
spectral data of Cepheus X-4 fitted with compTT-model and FD-cutoff model combined with a black-body \citep[Table 1 of][]{jaiswal15}.
The cyclotron line parameters are found to be consistent well within the error limits of the
two models. The cyclotron line parameters when compared for two different luminosity of the source
showed consistency in cyclotron line energy, however, line width and the line depth
were found relatively larger at lower luminosity of the source.
\begin{figure}
\centerline{\includegraphics[scale=0.36,angle=-90]{fdcut_2206_m2.ps}
\quad\includegraphics[scale=0.36,angle=-90]{fdcut_2212_m2.ps}}
\caption{Spectrum fitted with combined model; an absorbed power law with Fermi-Dirac
cut-off, along with a black-body, a cyclotron absorption line and an iron emission
line for observation~1 (left panel) and observation~2 (right panel).
The residue to the fit are shown below. An additional Gaussian line was introduced to model
16 keV feature in the pulsar spectrum.}
\label{spec1}
\end{figure}
\begin{figure}
\centerline{\includegraphics[scale=0.36,angle=-90]{comptt_2206_m2.ps}
\quad\includegraphics[scale=0.36,angle=-90]{comptt_2212_m2.ps}}
\caption{Spectrum fitted with combined model; an absorbed thermal Comptonization
(compTT) along with a cyclotron absorption line and an iron emission
line for observation~1 (left panel) and observation~2 (right panel).
The residue to the fit are shown below. An additional Gaussian line was
introduced to model 16 keV feature in the pulsar spectrum.}
\label{spec2}
\end{figure}
The detection of a second cyclotron absorption feature in the spectrum was reported
earlier during 2014 outburst around 45 keV by \citet{jaiswal15} in Suzaku
observation, and around 55 keV by
\citet{vybornov17} in NuSTAR observation. AstroSat LAXPC20 is having effective area of about 1500 cm$^2$ at
50 keV and 1300 cm$^2$ at 60 keV \citep{antia17} in comparison to about 150 cm$^2$ at 50 keV
and 130 cm$^2$ at 60 keV of NuSTAR \citep{harrison13}. AstroSat, thus has superior
effective area of an order of magnitude higher than the NuSTAR in these energies,
though uncertainties in LAXPC background are higher at these energies. We, therefore,
made a comparison of spectral counts at two observed source intensities of AstroSat. The
combined source plus background and background counts of LAXPC20 with $1\sigma$
errors on data are shown in Figure~\ref{sbcomp}. These plots show detection of source
above the background spectrum until it merges with the background around 52--55 keV.
We noticed a weak signature of absorption feature around 50 keV in the residuals of the
AstroSat spectrum. And, since the source appears to be marginally detectable above background at around
50 keV with $1-2\sigma$ detection limit for both the AstroSat observations. We, therefore, attempted to include
an additional absorption line around 49 keV in the combined spectral model for both the continuum.
We could not detect presence of any significant absorption feature in the spectrum around 49--50 keV in the
AstroSat data as overall difference in $\chi^2$, $\Delta\chi^2\approx 5$ was found.
As a result, we have not included this feature in further analysis.
\begin{figure}
\centerline{\includegraphics[scale=0.45,angle=-90]{spect_comb_aug.ps}}
\caption{ Comparison of spectral counts of source plus background (Blue points) and background (Red points) of LAXPC20
for observation~1 (top panel) and observation~2 (bottom panel).}
\label{sbcomp}
\end{figure}
\begin{deluxetable}{cccccc}
\tablecolumns{6}
\tablecaption{Spectral parameters obtained for phase averaged spectrum obtained from two AstroSat observations}
\tablehead{\colhead{Parameter}& \colhead{Units}& \colhead{Obs-1(FD-cutoff)}& \colhead{Obs-2(FD-cutoff)} & \colhead{Obs-1(compTT)}& \colhead{Obs-2(compTT)}}
\startdata
\hline
\textbf{Parameter values with 16 keV line} \\
\hline
Phabs(nH) & 10$^{22}$ cm$^{-2}$ & $0.87^{+0.07}_{-0.07}$ & $0.83^{+0.07}_{-0.07}$ & $0.77^{+0.06}_{-0.06}$ & $0.62^{+0.05}_{-0.05}$ \\
bbody(kT) & keV & $0.62^{+0.04}_{-0.05}$ & $0.69^{+0.04}_{-0.05}$ &- &- \\
bbody(Norm) & ph keV$^{-1}$ cm$^{-2}$ s$^{-1}$ & $1.98^{+0.59}_{-0.51}\times 10^{-3}$ & $8.02^{+2.95}_{-3.04}\times 10^{-4}$ &- & - \\
\hline
gauss(Line E) & keV & 6.5 (fixed) & 6.5 (fixed) & 6.5 (fixed) & 6.5 (fixed) \\
gauss(Sigma) & keV & 0.30 (fixed) & 0.30 (fixed) & 0.30 (fixed) & 0.30 (fixed)\\
gauss(Norm) & ph~cm$^{-2}~s^{-1}$ & $5.74^{+6.07}_{*}\times 10^{-4}$ & $3.94^{+3.03}_{-2.95}\times 10^{-4}$ & $5.69^{+6.88}_{*}\times 10^{-4}$ & $3.16^{+2.69}_{-2.52}\times 10^{-4}$ \\
\hline
gauss(Line E) & keV & $16.33^{+0.49}_{-0.63}$ & $16.12^{+1.36}_{-1.25}$ &$15.00^{+1.56}_{-1.84}$ & $15.56^{+0.98}_{-1.72}$ \\
gauss(Sigma) & keV & 2.34 (fixed) & $2.22^{+1.37}_{-0.71}$ & $3.43^{+1.50}_{-1.08}$ & $2.34^{+1.71}_{-1.03}$ \\
gauss(Norm) & ph~cm$^{-2}~s^{-1}$ & $2.19^{+0.49}_{-0.51}\times 10^{-3}$ & $4.42^{+2.99}_{-3.10}\times 10^{-4}$ & $4.05^{+6.32}_{-1.84}\times 10^{-3}$ & $6.60^{+13.12}_{-3.48}\times 10^{-4}$ \\
\hline
power-law(PI) &- & $0.83^{+0.17}_{-0.23}$ & $0.98^{+0.13}_{-0.12}$ & - & - \\
$E_{cut}$ & keV & $12.79^{+4.25}_{-5.21}$ & 12.79 (fixed) & - & - \\
$E_{fold}$ & keV & $7.78^{+0.41}_{-0.37}$ & $11.52^{+1.36}_{-1.08}$ & - & - \\
power-law(Norm) at 1~keV & ph keV$^{-1}$ cm$^{-2}$ s$^{-1}$ & $5.74^{+1.38}_{-1.31} \times 10^{-2}$ & $3.98^{+1.26}_{-0.95}\times 10^{-2}$ & - & - \\
\hline
compTT(T0) & keV & - & - & $0.42^{+0.04}_{-0.03}$ & $0.49^{+0.03}_{-0.03}$ \\
compTT(kT) & keV & - &- & $5.17^{+0.25}_{-0.17}$ &$6.92^{+0.62}_{-0.49}$ \\
compTT(tau) & - & - &- & $6.05^{+0.26}_{-0.53}$ & $5.21^{+0.22}_{-0.30}$ \\
compTT(Norm) & - & - &- & $4.78^{+0.29}_{-0.43}\times 10^{-2}$ & $1.72^{+0.12}_{-0.12}\times 10^{-2}$ \\
\hline
cyclabs(Line E0) & keV & $30.48^{+0.33}_{-0.34}$ & $30.68^{+0.45}_{-0.44}$ & $30.46^{+0.32}_{-0.28}$ & $30.30^{+0.40}_{-0.37}$ \\
cyclabs(Width) & keV & $3.25^{+1.14}_{-0.93}$ & $5.89^{+1.38}_{-1.26}$ & $3.33^{+1.10}_{-1.01}$ & $7.12^{+1.33}_{-1.22}$ \\
cyclabs(Opt. Depth) & - & $1.03^{+0.14}_{-0.11}$ & $1.42^{+0.18}_{-0.18}$ & $1.02^{+0.12}_{-0.12}$ & $1.52^{+0.20}_{-0.18}$ \\
\hline
Flux(3--80 keV) & erg cm$^{-2}$ s$^{-1}$ & $1.62\times 10^{-9}$ & $8.08\times 10^{-10}$ & $1.61\times 10^{-9}$ & $8.07\times 10^{-10}$\\
\hline
$\chi^2$ & - & 429.09 & 456.13 & 426.53 & 463.03 \\
$\chi^2_{{red}}$ (dof) &- & 0.962(446) & 1.016(449) & 0.956(446) & 1.031(449) \\
\hline
\hline
\textbf{Parameter values without 16 keV line} \\
\hline
Phabs(nH) & 10$^{22}$ cm$^{-2}$ & $0.87^{+0.04}_{-0.04}$ & $0.76^{+0.04}_{-0.04}$ & $0.77^{+0.06}_{-0.06}$ & $0.62^{+0.05}_{-0.05}$ \\
bbody(kT) & keV & $0.65^{+0.03}_{-0.04}$ & $0.73^{+0.03}_{-0.03}$ &- &- \\
bbody(Norm) & ph keV$^{-1}$ cm$^{-2}$ s$^{-1}$ & $2.04^{+0.33}_{-0.32}\times 10^{-3}$ & $1.17^{+0.19}_{-0.19}\times 10^{-3}$ &- & - \\
\hline
gauss(Line E) & keV & 6.5 (fixed) & 6.5 (fixed) & 6.5 (fixed) & 6.5 (fixed) \\
gauss(Sigma) & keV & 0.30 (fixed) & 0.30 (fixed) & 0.30 (fixed) & 0.30 (fixed)\\
gauss(Norm) & ph~cm$^{-2}~s^{-1}$ & $9.20^{+5.86}_{-5.74}\times 10^{-4}$ & $6.56^{+2.89}_{-2.83}\times 10^{-4}$ & $1.29^{+5.07}_{*}\times 10^{-4}$ & $2.58^{+2.50}_{-2.43}\times 10^{-4}$ \\
\hline
Power-law(PI) &- & $0.93^{+0.05}_{-0.05}$ & $0.88^{+0.06}_{-0.06}$ & - & - \\
$E_{cut}$ & keV & $20.88^{+3.46}_{-2.27}$ & 20.88 (fixed) & - & - \\
$E_{fold}$ & keV & $7.40^{+0.46}_{-0.39}$ & $10.65^{+1.31}_{-1.01}$ & - & - \\
power-law(Norm) at 1~keV & ph keV$^{-1}$ cm$^{-2}$ s$^{-1}$ & $5.34^{+0.64}_{-0.62} \times 10^{-2}$ & $2.52^{+0.39}_{-0.35}\times 10^{-2}$ & - & - \\
\hline
compTT(T0) & keV & - & - & $0.40^{+0.03}_{-0.03}$ & $0.48^{+0.02}_{-0.03}$ \\
compTT(kT) & keV & - &- & $5.58^{+0.27}_{-0.22}$ &$7.24^{+0.63}_{-0.49}$ \\
compTT(tau) & - & - &- & $6.30^{+0.17}_{-0.17}$ & $5.35^{+0.18}_{-0.19}$ \\
compTT(Norm) & - & - &- & $4.55^{+0.25}_{-0.23}\times 10^{-2}$ & $1.67^{+0.11}_{-0.11}\times 10^{-2}$ \\
\hline
cyclabs(Line E0) & keV & $29.57^{+0.35}_{-0.35}$ & $29.99^{+0.44}_{-0.43}$ & $30.23^{+0.26}_{-0.26}$ & $30.16^{+0.36}_{-0.34}$ \\
cyclabs(Width) & keV & $6.93^{+0.96}_{-0.86}$ & $8.09^{+1.10}_{-0.97}$ & $6.54^{+1.11}_{-0.96}$ & $8.14^{+1.11}_{-1.01}$ \\
cyclabs(Opt. Depth) & - & $1.17^{+0.12}_{-0.11}$ & $1.62^{+0.18}_{-0.16}$ & $1.26^{+0.12}_{-0.10}$ & $1.70^{+0.19}_{-0.17}$ \\
\hline
$\chi^2$ & - & 465.21 & 473.50 & 484.94 & 463.03 \\
$\chi^2_{{red}}$ (dof) &- & 1.036(449) & 1.048(452) & 1.080(449) & 1.069(452) \\
\hline
\enddata
\tablecomments{Errors quoted for each parameters above are with 90\% confidence range. *--parameter pegged at hard limit 0}
\end{deluxetable}
\begin{figure}
\centerline{\includegraphics[scale=0.36,angle=-90]{QPhase_plot2.ps}
\quad\includegraphics[scale=0.36,angle=-90]{QPhase_plot1.ps}}
\caption{Spectral parameters with 90\% errors as derived from phase resolved spectroscopy of AstroSat observation-1
(Blue colored points) \& observation-2 (Red colored points) are shown for the continuum defined
by thermal Comptonization compTT-model (left panel) and the
cyclotron absorption line defined by cyclabs-model (right panel) with respect to different pulse phases as
defined in figure-3 and can be seen from the overlay-pulse of observation-2.}
\label{phs2}
\end{figure}
Studies of spin-pulse phase resolved spectroscopy were performed from two AstroSat
observations of 2018 outburst during its declining phase with a source intensity changed by
a factor of $\sim2$. The spectral data from SXT and LAXPC20 from two AstroSat observations,
were extracted corresponding to the 5-different pulse-phase intervals considered
as marked in Figure~\ref{pulsea}.
The phase intervals were selected primarily for easy comparison of AstroSat results with the
results of 2014 outburst observed by NuSTAR \citep{bhargava19}, and
to capture variations in the structures of secondary and primary pulses of the pulse profile
in reference to the soft X-rays energy band as marked in Figure~\ref{pulsea} (left-panel)
and to follow variations in the higher energy bands in the same 5 phase-intervals.
The primary and the secondary pulse were divided in 2 phase-intervals each,
while a single interval was chosen to include the valley region (Ph3), in between the
secondary-pulse and the primary-pulse (Figure~\ref{pulsea}). The valley region so defined is found to become
gradually wider and flatter at higher energies than at lower X-ray energy bands as can be seen in Figure~\ref{pulseb}.
Therefore, the second phase interval at higher energies appears to capture larger extent of the narrower
secondary pulse at higher energies than at lower energies (Figure~\ref{pulsea}, Figure~\ref{pulseb}).
The compTT-model was preferred over the FD-cutoff model for
phase resolved spectroscopy, as parameters of cutoff model such as E-cut has no clear physical meaning,
although it might be related to the strength of the magnetic field \citep{makishima90}, where as E-fold has been
associated by some authors \citep{unger92} with the plasma temperature in the emission region. The thermal
Comptonization compTT-model on the other hand, offers significant physical details about plasma distributions
in the pulsar accretion column in terms of its plasma temperature, its optical depth in addition to its input
photon Wien temperature over the different pulse-phases.
We, thus, studied phase resolved spectroscopy for Cepheus X-4 for the first
time employing a compTT-model without a black-body component for the spectral continuum.
The black-body temperature variation, therefore, was not
considered here, like it was presented earlier along with FD-cutoff model by \citet{bhargava19}.
All the important
spectral features of the Cepheus X-4, as observed in the phase-averaged spectrum of AstroSat were
also present in the phase-resolved spectra of the pulsar. As regards to the Fe-line, its
energy and width were frozen to the values as in the phase-averaged case for all the 5-phases considered,
as extracted data for the 5 individual phase intervals could not constrain the Fe-line
parameters during the spectral fit. Thus, all these spectra
were well fitted using absorbed compTT model for the continuum along with a
fixed Fe-emission line and a cyclotron absorption feature defined by cyclabs-model.
We have not included 16 keV feature for AstroSat phase resolved spectroscopic studies,
to avoid any interference of this feature with cyclotron-line parameters.
For phase resolved spectrum, the significance of the feature is also low because of division of data in 5-phases resulting
in lower signal to noise ratio.
Our main motivation is to study the fundamental line through phase-resolved
spectroscopy. Therefore, results obtained from analysis of pulse phase-resolved spectra corresponding to 5 different
pulse-phases of the pulsar are presented in Figure~\ref{phs2}. Spectral parameters derived for the continuum
fitted with a compTT-model are plotted in left-panel and cyclotron line parameters are plotted on
the right-panel of the Figure~\ref{phs2}. These results from both the observations were plotted
on the same graph along with extent of each interval along with overlay spin-pulse of observation-2 for direct
comparison of phase-resolved spectral parameters and studying relative variability at two different source intensity.
It is noticed that input soft photon Wien temperature T0 varies, in the these 5 pulse phases, covering the range
including its 90\% error limits from 0.22--0.48 keV and 0.27--0.61 keV for two observations respectively.
It has a maximum at the falling edge of the primary-pulse around
phase 0.9 and minimum near the rising edge of the secondary pulse around phase 0.1
for the both AstroSat observations as seen in Figure~\ref{phs2}.
We observed plasma temperature kT though marginally higher for observation-2 than for observation-1, but
remained consistently stable in all phases within its 90\% error limits. It covers
a range 5.41--10.66 keV for the observation-1 and 6.74--14.71 keV for observation-2 within its error limits.
The plasma optical depth $\tau$ varied in the range 3.61--7.36 for observation-1 and 2.61--6.54 for observation-2
with relatively lower range of variation and following pulse
amplitude variation with phase with minimum near pulse-minima at phase 0.5 and maximum
corresponding to primary-pulse-maxima near the phase 0.7 as can be seen in Figure~\ref{phs2} (left panel).
The cyclotron line energy within 90\% error limits, was found to vary in the range
from 28.93--32.91 keV and 28.48--32.34 keV for two observations respectively. The minimum is
near the rising edge of the primary around phase 0.7 and maximum is around rising edge of the secondary
around phase 0.1.
The centroid energy for the cyclotron line for both AstroSat observations, showed
variation with the pulse-phase as seen in Figure~\ref{phs2} (right panel).
The cyclotron line-widths showed overall indication of variations with pulse amplitude in phase but
remained consistent for both the observations within 90\% error limits. The line-widths was found
to vary in the range 3.99--12.77 keV and 3.81--13.91 keV over the phase for the two observations
respectively with some indication of variation. The optical-depths of the cyclotron line were
found in the range 1.40--2.49 and 1.51--2.76 over the complete phase.
The optical-depth, however, remains stable overall with phase except for some indication of increase near phase 0.5
for these two AstroSat observations.\\
\begin{deluxetable}{ccccc}
\tablecolumns{5}
\tablecaption{Pulse period measurements of Cepheus X-4 }
\tablehead{\colhead{Observation} &\colhead{Telescope} &\colhead{MJD} &\colhead{Pulse-Period${^a}$} &\colhead{Ref$^{c}$}}
\startdata
1988 April & GINGA$^{b}$ & 47263.5 & $66.2490 \pm 0.0001$ & [1]\\\\
1993 June & ROSAT & 49160.0 & $66.2552 \pm 0.0007$ & [2]\\\\
1993 June & BATSE & 49163.0 & $66.2510 \pm 0.0009$ & [3]\\
& & 49167.0 & $66.2497 \pm 0.0009$ & \\
& & 49169.0 & $66.2511 \pm 0.0009$ & \\
& & 49171.0 & $66.2502 \pm 0.0008$ & \\
& & 49173.0 & $66.2501 \pm 0.0007$ & \\\\
1997 July & BATSE & 50633.0 & $66.2713 \pm 0.0009$ & [3]\\
& & 50635.0 & $66.2733 \pm 0.0009$ & \\
& & 50637.0 & $66.2749 \pm 0.0009$ & \\
& & 50639.0 & $66.2743 \pm 0.0009$ & \\
& & 50641.0 & $66.2769 \pm 0.0009$ & \\
& & 50643.0 & $66.2775 \pm 0.0009$ & \\\\
1997 July & RXTE & 50647.0 & $66.278 \pm 0.017 $ & [3] \\
& & 50654.0 & $66.273 \pm 0.017 $ & \\\\
2002 July & RXTE & 52450.7 & $ 66.30 \pm 0.01$ & [4] \\
& & 52451.3 & $66.30 \pm 0.01$ & \\
& & 52451.7 & $66.296 \pm 0.004$ & \\\\
2014 June & NuSTAR & 56827.38 & $66.3352 \pm 0.0003$ & [5] \\
2014 July & & 56839.87 & $66.3336 \pm 0.0002$ & \\\\
2018 July & AstroSat & 58301.61850 & $66.35080 \pm 0.00008$ & [6] \\
2018 July & & 58307.40211 & $66.35290 \pm 0.00011$ & \\
\enddata
\tablecomments{${^a}$Errors with 68\% confidence range for each parameter.
${^b}$ Helio-centric corrected time.
${^c}$References [1] Koyama et al. (1991) [2] Schulz et al. (1995)
[3] Wilson et al. (1999) [4] McBride et al.(2007) [5] Vybornov et al.(2017) [6] Present Work}
\end{deluxetable}
\section{Discussion}
\subsection{Long term Spin-down of the Pulsar }
The measurements of spin-up and spin-down rate in X-ray pulsars offers scope for in-depth
studies of underlying mechanism for transfer of angular momentum to the neutron star by
accreting matter \citep{bildsten97}. It can serve as a tool to investigate the
interaction of accreting plasma with magnetosphere of rotating neutron stars and the
nature of the different torques acting on the neutron star \citep{nelson00, dai16}.
In the case of a wind-fed accretion in a high mass X-ray binary, if the specific angular
momentum of gravitationally captured matter is sufficiently high, then an accretion disk can
possibly be formed around the neutron star, as seen in the cases of A0535+262 \citep{finger96, finger98},
EXO 2030+375 \citep{angelini89}, 4U 0115+63 \citep{soong89, heindl99, dugair13}, V0032+53 \citep{qu05},
4U 1907+09 \citep{mukerjee01}, and GRO J2058+42 \citep{mukerjee20}. Accretion, otherwise can occur
through different regimes of a quasi-spherical accretion on to the neutron star \citep{burnard83, shakura12}.
Measurements of pulse period variations in such systems can provide scope for understanding
different processes responsible for the angular momentum transfer, the structure of the accretion
flows in binary systems, their dependence on system parameters, X-ray luminosity, etc.
Different physical mechanisms for torques acting on X-ray pulsars have been proposed
to explain these variations \citep{ghosh79, love95, rappa04}.
For studies of variation of spin-period of Cepheus X-4, we compiled all the period measurements
of the Cepheus X-4 observed during various outbursts over the last 30 years by different observatories
(Table-2). All these data are plotted with a linear fit and shown in Figure~\ref{pdot}.
Two types of variations in the spin-period are seen in the Cepheus X-4 during all these
observations as can be seen from Figure~\ref{pdot}. Firstly, the source showed luminosity dependent
spin-period variations during each outburst which gives rise to the spread of data points in Figure~10
about the mean trend, as expected from accretion
torque theory \citep[][and references therein]{ghosh79, bildsten97, malac20}.
Whereby during an outburst, depending on change in the mass
accretion rate and hence due to proportionate change in transfer of angular momentum, it affects change in
the pulsar spin period and its rate as seen in Cepheus X-4. Similar changes were also observed for many other
Be-binaries during an outburst \citep{sugizaki17, finger96, parmar89b}.
During declining phase of 2018 outburst, the observed rate of change in spin period of Cepheus X-4 are
relatively higher at higher source luminosity $\dot\nu=(-2.1\pm0.8)\times10^{-12}$ Hz s$^{-1}$
for the first AstroSat observation compared to the second observation
$\dot\nu=(-1.6\pm0.8)\times10^{-12}$ Hz s$^{-1}$ at lower source luminosity
as expected from the accretion torque theory. Additionally, a long term secular decrease in the spin period
of the pulsar was also observed between each of these outbursts as shown by the straight line fit to all the data.
The straight-line fit to the data showed a continuous decrease in the pulsar spin-period at a rate of
${1.081\pm 0.002} \times 10^{-10}~s~s^{-1}$ ($\dot\nu = -(2.455\pm 0.004)\times10^{-14}$ Hz s$^{-1}$)
over the long duration of about 30 years, which we investigate in detail below. For Ginga observation only
helio-centric correction was applied to the measured value of the spin-period.
This average spin-down is consistent with the earlier reported measurement of BATSE
$\dot{P} = 1.82\times 10^{-10}$~s~s$^{-1}$ ($\dot\nu = -4.14 \times10^{-14}$ Hz s$^{-1}$)
between two outbursts of 1993 and 1997, \citep{wilson99}.
The observed continuous slowing down behavior of pulsars could be due to
resulting centrifugal inhibition of accretion, which occurs at the end of the outburst.
During the declining phase of an outburst, there is a gradual decrease of accretion on to the neutron star
leading to the reduction of source luminosity. As the accretion rate decreases, the ram pressure decreases,
the magnetosphere expands and magnetospheric radius $r_{m}$ extends closer to the co-rotation radius
$r_{co}$ where the angular velocity of Keplerian motion is equal to that of the neutron star.
As the magnetosphere grows beyond the co-rotation radius, centrifugal force prevents material
from entering the magnetosphere, and thus accretion onto magnetic poles ceases
\citep{pringle72, lamb73, illar75}. Consequently, no X-ray pulsation
is expected. This is commonly known as the propeller effect, because accreting matter is
likely to be ejected in the presence of a strong magnetic field.
The in-falling material is flung away, carrying part of the angular momentum extracted from the neutron
star, resulting in slowing down of the neutron star.
As this mechanism occurs at relatively much lower source luminosity at about
$L_{X}\mathrm{(min)}= 1.3 \times 10^{34}$~erg~s$^{-1}$ as shown below for Cepheus X-4 and hence at much
lower mass accretion rate at the end of the source outburst. Therefore, change of angular momentum
of the neutron star due to onset of propeller effect is at a much lower rate
of spin-down
($\dot\nu = -(2.455\pm 0.004) \times 10^{-14}$~Hz~s$^{-1}$), which is two orders of magnitude lower
than that during the outburst as derived from all the available observations of Cepheus X-4.
Now, prior to detailed investigations on the Propeller effect, we derive some of the
required parameters associated with the neutron star as below.
In the presence of a strong magnetic field of a neutron star of an accreting X-ray binary,
the plasma electrons in the accretion column, get quantized in the Landau states. X-ray photons
get scattered from these quantized plasma electrons in the strong magnetic field
close to the surface of an accreting X-ray pulsar and produce cyclotron resonant scattering
features. It results in appearance of a complex absorption features at a particular energy
in the X-ray spectrum depending on strength of magnetic field of the neutron star
\citep{schw17}. Alternatively, reflection of X-rays from the atmosphere of the neutron star can also
produce cyclotron absorption features \citep{pout13}. The complex shape of the
cyclotron absorption feature depends on many factors. These include physical condition of the
line-forming region, strength of the local magnetic field, nature of the accretion column,
source luminosity and pulse-phase of an accreting X-ray pulsar \citep{nishi03, nishi05, nishi13}.
From the measurement of centroid energy of the cyclotron absorption feature,
the strength of the surface magnetic field $B$ of a neutron star can be
obtained using the following equation
\begin{equation}
E_{0} \simeq 11.57 n \left(\frac{1}{1+z} \right) \left(\frac{B}{10^{12}G} \right)\; \mbox{keV}.
\label{ecycl}
\end{equation}
We assume that the observed cyclotron absorption feature at $E_{0}$ is associated with its fundamental
line ($n = 1$), and considering a gravitational red-shift of $z = 0.3$ at the surface of a
typical neutron star having a mass of $1.4 M_{\odot}$ and a radius of 10 km.
From the measurements of the centroid energy of $30.46^{+0.32}_{-0.28}$ keV for observation-1,
and $30.30^{+0.36}_{-0.34}$ keV for observation-2, derived from the phase averaged spectrum using compTT model (Table~1),
we could thus establish the strength of the magnetic field of the pulsar as
$(3.42^{+0.04}_{-0.03}) \times 10^{12}$ G and $(3.40^{+0.04}_{-0.04}) \times 10^{12}$ G, respectively.
The cyclotron line energies agree within their error limits, shows consistency during
two observations even when the source luminosity changed by a factor of $\sim~2$.
If all the potential energy of the accreted mass released during the
outburst is converted into radiation then the luminosity can be expressed as,
\begin{equation}
L_{37} = 0.133 \times {\dot{M}_{16}} \left(\frac{M}{M_{\odot}}\right){R_{6}}^{-1} \quad \mbox{erg s}^{-1},
\label{l37}
\end{equation}
where $L_{37}$ is the luminosity in units of $10^{37}$ erg s$^{-1}$ and $R_6$ is the
radius in units of $10^6$ cm, $\dot{M}_{16}$ is the mass accretion rate in
$10^{16}$ g s$^{-1}$ and M is the mass of neutron star. The mass accretion
rate $\dot{M}$ can be calculated from the
observed luminosity, which is derived by measurements of flux from spectral model
for AstroSat spectrum (Table~1), and known distance of the star.
The Cepheus X-4 luminosity during the AstroSat observations were
estimated to be $2.04 \times 10^{37}$~erg~s$^{-1}$
and $1.02 \times 10^{37}$~erg~s$^{-1}$ respectively,
in 3--80 keV energy band. This was derived using distance measurements of Gaia
as $10.2^{+2.2}_{-1.6}$ kpc \citep{malac20} and estimated flux from
AstroSat observations (Table~1).
The estimated value of $\dot{M}$ during the AstroSat observations were
$11.0 \times 10^{16}$ g s$^{-1}$ and $5.5 \times 10^{16}$ g s$^{-1}$ respectively.
It is therefore inferred that
the accretion process was intensively active during AstroSat observations.
The magnetospheric radius $r_{m}$, of the neutron star can be expressed
in terms of its mass accretion rate and strength of magnetic field of neutron star
by the Equation-6.18, page 158 of \citet{frank02}
\begin{equation}
r_{m} \simeq 5.2~\mu_{30}^{4/7} {\dot{M}_{16}}^{-2/7} {m}^{-1/7}
\times 10^{8} \, \mbox{cm} = 5.0 \times 10^{8} \, \mbox{cm},
\label{eq:rmag}
\end{equation}
where $m= M/{M_{\odot}} = 1.4$ is the mass ratio of neutron star,
$\dot{M}_{16} = 11.0$ is its mass accretion rate expressed in units of $10^{16}$ g s$^{-1}$
and $\mu_{30}$ is magnetic moment of the neutron star expressed in units of $10^{30}$ G cm$^{3}$.
The magnetic moment ($\mu)$ of the neutron star for a dipole-like field configuration
is given by ${{\mu} = B R^3}$, where $B$ is surface polar magnetic field strength and
$R$ is the radius of the neutron star. From the AstroSat measurements of cyclotron
resonance scattering feature, we have derived ${B = 3.4 \times 10^{12}}$ G, which
gives ${\mu}_{30} = 3.4$ for a 10 km radius of the neutron star.
Thus, all these parameters are derived from observed values of neutron star magnetic
field and source luminosity respectively from AstroSat observation.
\begin{figure}
\centerline{\includegraphics[scale=0.45,angle=-90]{cepx4_period_hist_m34.ps}}
\caption{Pulse period of Cepheus X-4 during different outburst observed by
different observatories over the last 30 years.}
\label{pdot}
\end{figure}
The radius, where the spin angular velocity of neutron star is equal to the Keplerian
angular velocity of matter, is defined as the co-rotation radius $r_{co}$ of an X-ray pulsar
and can be expressed as
\begin{equation}
r_{co} = 1.7 \times 10^{8} P^{2/3} \left(\frac{M}{1.4 M_\odot} \right)^{1/3} \, \mbox{cm}
= 2.8 \times 10^{9} \, \mbox{cm}.
\label{eq:rco}
\end{equation}
Using measured value of the spin period of the neutron star from AstroSat observations
$P=66.35$ s and assuming a neutron star mass of $M = 1.4 M_{\odot}$,
one can obtain the co-rotation radius $r_{co}$ for Cepheus X-4 as
$2.8 \times 10^{9}$ cm (Equation-\ref{eq:rco}).
Now, by applying the condition $r_{m} = r_{co}$, that is
equating Equation-\ref{eq:rmag} and Equation-\ref{eq:rco} and utilizing Equation-\ref{l37}, one can derive
the minimum luminosity $L_{X}$ (min) at which
an X-ray pulsar turns off due to the centrifugal inhibition of accretion, so called the
propeller effect, is given by \citep{illar75}
\begin{equation}
L_{X}\mathrm{(min)} \approx 2 \times 10^{37} {\left(\frac{R}{10^6~cm} \right)}^{-1} \left(\frac{M}{1.4 M_\odot} \right)^{-2/3} \mu_{30}^{2} \left(\frac{P}{1 s} \right)^{-7/3}~~\hbox{erg~s}^{-1},
\end{equation}
where R, M, ${\mu}$ and ${P}$ are radius, mass, magnetic moment and
spin period of the neutron star respectively.
Using derived values of $\mu_{30}$, ${P}$ and ${M = 1.4 M_{\odot}}$,
one can obtain $L_{X}\mathrm{(min)}= 1.3 \times 10^{34}$~erg~s$^{-1}$ for
Cepheus X-4. The pulsar luminosity must go down below
this limiting value for the propeller effect to prevail.
As a limiting case, corresponding to the minimum luminosity of
$L_{X}\mathrm{(min)} = 1.3 \times 10^{34}$~erg~s$^{-1}$ below which the
pulsar turns off due to propeller effect as derived above, the corresponding $\dot{M}$
can be estimated as ${\dot{M} = 7.0 \times 10^{13} ~g~s^{-1}}$ using Equation-4. Similarly, in the
propeller regime where $r_{m} = r_{co}$ (where $r_{co}$ can be estimated using Equation-6),
one can estimate the corresponding value of magnetic moment
$\mu$ of the neutron star as $\mu_{30} = 1.7$ (using Equation-5),
which corresponds to magnetic field of $B = 1.7 \times 10^{12}$~G for a 10 km radius
neutron star.
Many researchers have investigated this phenomenon of propeller effect over
the period \citep{pringle72, illar75, davies81, ikhsanov01, shakura12, malac20}.
It was suggested that the propeller phase of the pulsar can be divided
into two sub-phases (a) a supersonic propeller phase or (b) a subsonic propeller
phase \citep{davies81}. This classification was made
depending on the angular velocity of the pulsar ($\Omega_{s}$). For the case of
supersonic propeller phase ${r_{c}\Omega_{s} \gg c_{s}(r_{c})}$,
where $r_{c}$ is the inner boundary of the accretion disk and $c_{s}(r_{c})$
is the sound speed at the radius $r_{c}$.
Let us therefore consider these two cases of propeller
regime separately for Cepheus X-4 and infer the most likely scenario based on observed value of $\dot{P}$.
(a) Supersonic Propeller Phase: The spin down rate during the supersonic propeller phase
can be obtained using the equation derived by \citet{ikhsanov04} and expressed as
\begin{equation}
\tau_{c} = \frac{P}{2\dot{P}} \simeq 5.12 \times 10^{13}~~\mu_{30}^{-3/7}~~{{I}_{45}}~~\dot{M}_{16}^{-11/14}~~V_{7}^{1/2} \,
\mbox{~s}.
\label{eq:pppdot}
\end{equation}
Here $V_{7}$ is the relative velocity of the star and surrounding medium in the units of $10^{7}$~cm~s$^{-1}$. Using
$V_{7} =~1$, $\mu_{30}=1.7$ G~cm$^{3}$ and ${\dot{M} = 7.0 \times 10^{13}}$ g~s$^{-1}$ we
get $\dot{P} = 1.6 \times 10^{-14}$~s~s$^{-1}$ ($\dot\nu = -3.6 \times10^{-18}$ Hz s$^{-1}$)
for the supersonic propeller case.
(b) Subsonic Propeller Phase: The spin down rate during the subsonic propeller phase
is as derived by \citet{ikhsanov04}
\begin{equation}
\dot{P} = \left(\frac{P^{3}L_\mathrm{ssp}}{4\pi^2I}\right) \simeq 2.5 \times 10^{-11} \mu_{30}^{2} {m}^{-1} {{I}_{45}}^{-1}
\, \mbox{~s~s$^{-1}$} = 0.52 \times 10^{-10} \, \mbox{~s~s$^{-1}$},
\label{eq:dp}
\end{equation}
where $m= M/{M_{\odot}} = 1.4$ is the mass ratio of neutron star, $I_{45}$ is moment of inertia of
the neutron star expressed in the units of $10^{45}$ g cm$^2$ and $L_\mathrm{ssp}$ is the
luminosity of the pulsar in the subsonic propeller regime expressed by
\citep{davies81, ikhsanov04}.
\begin{equation}
L_{ssp} = 1\times 10^{36} \mu_{30}^{2} {m}^{-1} P^{-3} \mbox{~erg~s}^{-1} .
\label{eq:lsup}
\end{equation}
Using these above parameters established for Cepheus X-4 in the propeller regime,
the corresponding value of $\dot{P}$ was established and found to be
${\dot{P}= 0.52 \times 10^{-10}~s~s^{-1}}$ (${\dot\nu = -1.18 \times10^{-14}}$ Hz s$^{-1}$).
This value is comparable to the observationally derived
$\dot{P} = (1.081\pm0.002) \times 10^{-10}$~s~s$^{-1}$ ~($\dot\nu = -(2.455\pm 0.004)\times10^{-14}$~Hz~s$^{-1}$)
within underlying parameter uncertainty.
We also cross-verified the subsonic case described by \citet{malac20}
and derived the $\dot{P}$ as described by their Equation-12
\begin{equation}
\dot{P} \simeq 1.16 \times 10^{-11}~~{(2\pi)}^{-1}~~\Pi_{sd}~~\mu_{30}^{13/11}~~\dot{M}_{16}^{3/11}~~P \,
\mbox{~s~s$^{-1}$} = 0.59 \times 10^{-10} \times \Pi_{sd} \, \, \mbox{~s~s}^{-1},
\label{eq:ppdot}
\end{equation}
Both of these estimates of $\dot{P}$ showed consistency with the value derived value from observations favoring the
case of subsonic propeller regime of the pulsar. The comparison of observed value with Equation-\ref{eq:ppdot}, suggest that
the value of dimensionless parameter would be $\Pi_{sd}$ = 1.8 for the case of Cepheus X-4.
The parameter ${\Pi_{sd}}$ is a combination of dimensionless parameters \citep{shakura14} and its
derived values from observations were found to be between 5--10 for some of the other X-ray pulsars studied \citep{postnov15}.
This result therefore suggest that the pulsar enters subsonic propeller regime after each outburst activity
observed with 4--5 years interval and hence showed continuous slowing down of its spin period. Thus,
using this established spin-down rate one can predict pulse-period of the pulsar for an epoch when
the next outbursts would occur.
\subsection{Pulse Phase-averaged Spectrum}
The cyclotron line energy was measured for Cepheus X-4 by various observatories
during different outbursts observed over the long period of more than 30 years since its discovery
in 1988 by Ginga. It was first measured by Ginga and then followed by RXTE,
NuSTAR and most recently by AstroSat.
The measurements of cyclotron line parameters from phase-averaged spectrum obtained during different
outburst of the source are compiled in Table~3 along with observation epoch and the observed source flux.
The Ginga spectral data were fitted by a combination of an absorbed power-law along with cyclotron
resonance scattering (cyclabs) as its cutoff model \citep{mihara91} and measured centroid line energy.
While for rest of the measurements,
spectral data were modeled by absorbed Fermi-Dirac cutoff model \citep{tanaka86} combined with the same cyclotron scattering
(cyclabs) model. The use of different continuum and absorption line models affect measurements of
cyclotron line parameters marginally.
Therefore, for the purpose of comparison we report here the values obtained in previous studies, derived
using the same model except for the Ginga, as tabulated in Table~3 along with respective references.
The results from simultaneous Suzaku observation of 2014 outburst
\citep{jaiswal15} with NuSTAR was not considered here for comparison, since cyclotron feature in the spectrum
was modeled employing gabs-model although its continuum was modeled using same Fermi-Dirac cutoff model.
\begin{deluxetable}{cccccccc}
\tablecolumns{8}
\tablecaption{Cyclotron line energy measurements of Cepheus X-4 }
\tablehead{\colhead{Observation} &\colhead{Telescope} &\colhead{MJD} &\colhead{Source flux (3--78 keV)} &\colhead{} &\colhead{Cyclotron Line} &\colhead{} &\colhead{Ref$^{(c)}$}\\
& & & (erg cm$^{-2}$ s$^{-1}$) & Energy (keV) & Width (keV) & Depth ($\tau$) & }
\startdata
1988 April & GINGA & 47263.5 & $7.23 \times 10^{-9}$$^{(b)}$ & $30.2^{+0.5}_{-0.5}$ & $16.1^{+1.8}_{-1.8}$ & $2.88^{+0.11}_{-0.11}$ & [1] \\\\
2002 July & RXTE & 52450.7 & $1.08 \times 10^{-9}$$^{(b)}$ & $30.7^{+1.8}_{-1.9}$ & $3.6^{+2.9}_{-1.5}$ & $0.7^{+0.3}_{-0.2}$ & [4] \\\\
2014 June & NuSTAR & 56827.38 & $2.69 \times 10^{-9}$ & $30.6^{+0.2}_{-0.3}$ & $3.9^{+0.2}_{-0.2}$ & $6.6^{+0.9}_{-0.8}$ $^{(a)}$ & [5] \\
2014 July & & 56839.87 & $7.10 \times 10^{-10}$ & $29.0^{+0.3}_{-0.2}$ & $3.8^{+0.2}_{-0.2}$ & $7.0^{+0.8}_{-0.6}$ $^{(a)}$ & \\\\
2018 July & AstroSat & 58301.618 & $1.62 \times 10^{-9}$ & $30.48^{+0.33}_{-0.34}$ & $3.24^{+1.14}_{-0.93}$ & $1.03^{+0.14}_{-0.11}$ & [6] \\
2018 July & & 58307.402 & $8.08 \times 10^{-10}$ & $30.68^{+0.45}_{-0.44}$ & $5.89^{+1.38}_{-1.26}$ & $1.42^{+0.18}_{-0.18}$ & \\\\
\hline
\enddata
\tablecomments{Errors quoted with 90\% confidence range for each parameter.\\
$^{(a)}$ expressed in terms of absorption depth (d) related to optical depth $\tau = d/\sigma~(\sqrt{2\pi})$.\\
$^{(b)}$ Corrected flux with some approximation in 3-78 keV energy band.\\
$^{(c)}$References [1] Mihara et al. (1991) [4] McBride et al.(2007) [5] Vybornov et al.(2017) [6] Present Work}
\end{deluxetable}
\begin{figure}[h]
\centerline{\includegraphics[scale=0.36,angle=-90]{cepx4_cycl_hist_m222.ps}
\quad\includegraphics[scale=0.36,angle=-90]{flux_cycl_cepx4_m222.ps}}
\caption{Cyclotron line energy of Cepheus X-4 measured during different outbursts observed by
different observatories over the period, Ginga(1988), RXTE(2002), NuSTAR(2014)
and AstroSat(2018) respectively. (left-panel). The cyclotron line energy plotted against the
corresponding source flux as in Table~3 is also shown (right-panel).
The horizontal line denotes the average value which corresponds
to 30.23 $\pm0.22$ keV in both the panels. }
\label{lhist}
\end{figure}
The centroid energy of the cyclotron line was plotted against the observed source flux
as shown in Figure~\ref{lhist} (right-panel). It is evident from the plot that there are no specific
trend observed with respect to the source flux or luminosity. This is in contrast to some of the other wind-fed
X-ray pulsars like, GX 304--1 \citep{furst15} and Vela-X-1 \citep{laparola16}
where they showed increase in line energy with increasing source luminosity. For other pulsars such as
V0332+53 \citep{makishima90}, 4U 0115+63 \citep{mihara95} and SMC X-2 \citep{klus14, lutovinov17}
they showed decrease in line energy with increase in the source luminosity. In contrast to these
variations, cyclotron line energy of Cen X-3 showed a long duration stability with an average at
$31.6\pm0.2$ keV over the period of 14 years \citep{ji19}. Two observations by NuSTAR
of Cepheus X-4 during 2014 showed increasing trend with source luminosity \citep{furst15, vybornov17}.
However, when it is compared from other available measurements of Cepheus X-4, it did not show any
such dependence on source luminosity as can be seen from Figure~\ref{lhist} (right-panel). We also plotted
cyclotron line energy with respect to the time of observation, expressed in MJD as shown in
Figure~\ref{lhist} (left-panel). The plot does not show any specific trend with time or its luminosity.
However some significant variation in the cyclotron line energy was observed with respect
to its average value $30.23\pm0.22$ keV during 2014 outburst when source flux was found below
about $8\times 10^{-10}$ erg cm$^{-2}$ s$^{-1}$ as can be seen in Figure~\ref{lhist} (right-panel).
The average value of the cyclotron energy measurement is shown by the horizontal line.
With respect to average value of cyclotron line energy, the AstroSat observation showed
consistency during 2018 outburst, in contrast to NuSTAR second observation of 2014, where it showed decrease.
Relatively large errors associated with the measurement by RXTE prohibit us to identify long term trend
in between Ginga and NuSTAR observations and extent of variation more accurately.
The flux measurement of RXTE in 3.5--10 keV energy band of
$3.6 \times 10^{-10}$ erg cm$^{-2}$ s$^{-1}$ \citep{mcbride07} and
similarly for Ginga measurements of flux $5.85 \times 10^{-9}$ erg cm$^{-2}$ s$^{-1}$
in 2--20 keV are under-estimate of actual flux in equivalent energy band of NuSTAR and AstroSat.
We, therefore, scaled these fluxes by a respective factor established by determining the ratios of fluxes from
equivalent energy band using the AstroSat spectrum. This corrections approximate the corresponding fluxes
from Ginga and RXTE in 3--78 keV energy band for comparison as given in Table~3. The errors on these estimates
could only affect a marginal shift of this point along the X-axis corresponding to the actual flux.
The large error associated with the RXTE measurement of cyclotron line energy, do not indicate any
significant trend even when flux is known accurately, similarly, Ginga measurements is close to the average
value and hence its accurate flux estimate would not lead to any possible trend.
The change in cyclotron line energy with luminosity for X-ray pulsars are due to the effect of change in
the behavior of the line forming regions in the accretion column. It was shown by \citet{becker12} that when accreting
X-ray pulsars attain a critical luminosity $L_{crit}$ (Equation-12), then the radiation pressure in the accretion column
decelerates in-falling matter, thus affecting height of the cyclotron line forming region.
The physical model of \cite{becker12} also demonstrated that when the source luminosity is higher than $L_\mathrm{crit}$
the line forming region in the accretion column shift to higher heights from the neutron star surface
due to dominant radiation pressure of its supercritical luminous X-ray pulsar. In contrast to this, when the source
luminosity is below the $L_{crit}$, a sub-critical luminosity, the cyclotron line energy increases due to
the consequence of dominant pressure of in-falling matter where the characteristic emission height decrease
towards the surface of the neutron star. The sign of this dependence is thus opposite in the
supercritical and sub-critical cases, hence creating the observed bimodal behavior for many X-ray pulsars.
\begin{equation}
L_{crit} \approx 1.49 \times 10^{37} \left(\frac{\Lambda}{0.1} \right)^{-7/5} \left(\omega\right)^{-28/15}
{\left(\frac{R}{10~km} \right)}^{1/10} \left(\frac{M}{1.4 M_\odot} \right)^{29/30} \left(\frac{B}{10^{+12}~G~} \right)^{16/15}
\mbox{~~erg~s}^{-1}.
\label{ecrit}
\end{equation}
The constant
$\Lambda$ in Equation-12 accounts for certain uncertainties such as due to spin-averaging of the magnetospheric radius,
effects of plasma shielding and other magnetospheric effects. Whereas the constant $\omega$ depends on the shape of
the spectrum \citep{becker12}.
The studies of luminosity dependence for Cepheus X-4 from 2014 outburst data \citep{furst15}, suggested
positive correlation with its luminosity. \citet{vybornov17} conducted pulse-to-pulse analysis of the same
NuSTAR data and also demonstrated positive correlation with source luminosity during the short time scale.
We compiled all the measurements of cyclotron line energy from phase averaged spectra
in Table~3 and presented in Figure~\ref{lhist} (right-panel) for long term comparison. From these
results, one can infer that
there are no specific long term variation trend with respect to source luminosity or time except
with an indication that below a certain source flux $\sim 8 \times 10^{-10}$ erg cm$^{-2}$ s$^{-1}$
the cyclotron line energy showed some variability. For higher than this flux, cyclotron line energy
almost remained stable close to its average value at $30.23\pm0.22$ keV.
Now, for Cepheus X-4 the critical source luminosity estimated using Equation-\ref{ecrit}
is ${{\sim} 4 \times 10^{37}}$ erg s$^{-1}$. The source luminosity during two
AstroSat observations were estimated to be $2.04 \times 10^{37}$~erg~s$^{-1}$
and $1.02 \times 10^{37}$~erg~s$^{-1}$ respectively, for its distance of 10.2 kpc
as reported from Gaia observations \citep{malac20}. Both of these values are below the estimated value of
$L_\mathrm{crit}$, which may have some uncertainty depending on the mass($M$) and radius($R$) of the neutron star and constants
$\Lambda$=0.1 and $\omega$=1 as considered here. The AstroSat
measurements should have shown a positive correlation in cyclotron line energy with source luminosity with increase
by a factor of $\sim 2$
as per the physical model of \citet{becker12}. But within its error limits, it showed almost similar and stable
at its long term average value. The Ginga observation is higher than the critical luminosity, where as the first observation
of NuSTAR is close to its critical luminosity. However, within the measurement errors cyclotron line energy shows
almost stable and close to its long term average of $30.23\pm0.22$ keV rather than a negative correlation with source luminosity
as predicted by the model. For more clarity, we further investigate physical parameters of accretion column
and its implications.
The maximum height of the line forming region can be estimated by the equations described by \citet{becker07},
for a super-critical case, and is given by
\begin{equation}
h_{s} = 2 r_{0} \lesssim 1.3 \times 10^{5}
\left(\frac{B}{10^{12}~G~} \right)^{-2/7}
{{R}_6}^{9/14} \left(\frac{M}{M_\odot} \right)^{1/14}
\left(\frac{L_{37}}{1.3} \right)^{1/7}~~\hbox{cm},
\label{ehs}
\end{equation}
where ${h_{s} = 2 r_{0}}$ where $r_{0}$ is polar cap or accretion column radius of the pulsar.
The height of the bottom of the line-forming region is treated as the height of its thermal mound \citep{becker07}.
The height-size depends on source luminosity ($L$), the magnetic field ($B$), mass ($M$) and radius ($R$) of the neutron star.
Using the parameter values from Table~3 for Ginga and NuSTAR observation-1, the source luminosity
were found to be $ {9.1 \times 10^{37}}$ erg s$^{-1}$ and ${3.4 \times 10^{37}}$ erg s$^{-1}$ respectively
for source distance of 10.2 kpc. Hence these observations can be treated as comparable to super-critical case within
some approximation and their corresponding maximum height of line forming region can be estimated from above Equation-13
as 1.2 km and 1.1 km respectively.
The height of the line-forming region ${h_{c}}$ in the accretion column for sub-critical luminous accreting X-ray pulsars,
can be estimated using Equation-14. For sub-critical luminous sources, the line forming
height reduces with increase in source luminosity where as for super-critical luminous sources it increases with
increase in source luminosity as can be seen from given equations \citep{becker12}
\begin{equation}
h_{c} = 1.48 \times 10^{5} \left(\frac{\Lambda}{0.1} \right)^{-1} \left(\frac{\tau}{20} \right)
\left(\frac{M}{1.4 M_\odot} \right)^{19/14} {{R}_6}^{1/14}
\left(\frac{B}{10^{12}~G~} \right)^{-4/7} {L}_{37}^{-5/7}~~\hbox{cm}.
\end{equation}
For most of the accreting pulsars, the values of the parameters taken are ${\Lambda = 0.1}$ and
Thomson optical depth ${\tau = 20}$.
Where as for other parameters of equations, values are
obtained from the two AstroSat observations, we thus estimated the radius of accretion column and
height of the line forming region above the thermal mound. Using measured values of
${B = 3.42 \times 10^{12}}$ G and ${L = 2.04 \times 10^{37}}$ erg s$^{-1}$ for observation-1 and
${B = 3.40 \times 10^{12}}$ G and ${L = 1.02 \times 10^{37}}$ erg s$^{-1}$ for observation-2, we
estimate size of the line forming regions in accretion column for the sub-critical case, during the two AstroSat observations as
${h_{c} = 440}$ m and ${h_{c} = 725}$ m, respectively for the two observations.
This indicate a difference of height of $\sim 285$ m between two observations.
The altitude, $H$, of the radiation-dominated shock can be estimated in these cases using the expression
of \citet{becker12}
\begin{equation}
H_\mathrm{shock} = 1.14 \times 10^{5} \left(\frac{M}{1.4 M_\odot} \right)^{-1} {{R}_6}
{L}_{37}~\hbox{cm.}
\label{hshock}
\end{equation}
The respective shock heights during AstroSat observations are 2.3~km and
1.2~km, corresponding to two different luminosities. From these
estimates, it suggests that during the first observation of the AstroSat at higher source luminosity,
the line-forming region height of $\sim 400$ m and its shock height is located at 2.3 km altitude in the accretion column,
which is about 6 times away from the neutron star surface. Therefore, there are less chance of any possible
impact of shock region on the line forming region, that may cause change in its size and location. Hence,
the cyclotron line energy remains almost stable similar to the values estimated at higher luminosities by NuSTAR
and Ginga as can be seen in the Figure~\ref{lhist} (right-panel). For the second AstroSat observation at lower luminosity, size
of the line forming region is relatively larger $\sim 700$ m and shock height is about 1.2 km, which is
relatively in closer proximity. As there could be uncertainties involved with equation parameters, hence
there is possibility of some impact of shock region with the line forming
region at this lower luminosity, which possibly may cause some variations in the cyclotron line energy depending
on whether it may affect its size or its location or both. However no such effect is seen for the
observation-2, at lower source luminosity of Cepheus X-4 by AstroSat during 2018 outburst. Now, for the NuSTAR
observation-2, for which the strength of magnetic field and source luminosity was measured as
${B = 3.25 \times 10^{12}}$ G and ${L = 0.89 \times 10^{37}}$ erg s$^{-1}$ respectively. The corresponding height of the
line forming region was determined from Equation-14 as ${h_{c} = 818}$ m and shock height using Equation-15 of
about 1.0~km are found to be in very close consistency considering parameters uncertainties involved.
This may therefore, expected to cause some variation
in cyclotron line energy due to possible interaction of shock region with the cyclotron line forming region.
The physical model of \citet{becker12} for sub-critical luminosity predict that cyclotron line energy
should decrease for NuSTAR observation-2.
This is, therefore, possibly a very likely cause of sudden deviation or decrease of cyclotron line energy
at ${E_{0}=29.0^{+0.2}_{-0.3}}$ keV during NuSTAR observation-2 from its average energy of ${30.23 \pm 0.22}$ keV.
This is when compared with super-critical cases the altitude of shock heights for Ginga and NuSTAR observation-1
are found be about 10.3 km and 3.9 km as determined from Equation-15. These are much beyond the corresponding maximum heights
of line forming regions of 1.2 km and 1.1 km as estimated above for a super-critical case. This is therefore the
most possible reason that the cyclotron line energy of Cepheus X-4 remains stable for wide range of variation
of its luminosity.
\citet{nishi14} studied cyclotron line variation with source luminosity based on changes in polar cap
dimensions, direction of propagation and changes of shock height with source luminosity. He successfully
explained observed changes, for some of the wind-fed X-ray pulsars using his model.
Interestingly, it was demonstrated that for a luminosity range of ${\geq 1.0 \times 10^{37}}$ erg s$^{-1}$
line forming region remains almost same in terms of its dimensions and location, which do not change considerably
with luminosity this was particularly demonstrated for the X-ray pulsar X0115+63. This result is similar to
the observations of Cepheus X-4, where it showed stability of cyclotron line energy for higher source luminosity.
\subsection{Pulse Phase-resolved Spectra}
Pulse-phase resolved spectroscopy for Cepheus X-4 was first performed with Ginga
observations during 1988 outburst, for studies of the physical condition of line forming regions.
An absorbed power-law with cyclotron scattering cut-off model was applied to the spectral data
\citep{mihara91}. It was subsequently followed up during 2014 outburst observed by
NuSTAR, where an absorbed Fermi-Dirac cutoff model combined with a black-body,
an Fe-emission line and a cyclotron absorption line was employed for studies \citep{bhargava19}.
AstroSat observation of 2018 outburst of Cepheus X-4 was used for the most recent studies of
phase resolved spectroscopy. A combined model defined by an absorbed compTT-model with
a Gaussian for Fe-emission line along with a cyclotron absorption line defined by cyclabs-model was
employed for 5-spectra derived from 5-different pulse phases for studies.
Results obtained from the two AstroSat observations are presented along with its spin-pulse overlay
in Figure~\ref{phs2}, with the source luminosity differing by a factor $\sim 2$. The AstroSat results
are also compared with earlier results in the following discussion below.
The variation in spectral continuum and cyclotron line parameters were estimated over the pulse phase.
This was done by measuring difference in the parameter range (maximum -- minimum)
and expressed in percentage with respect to its phase-averaged value shown in Table~1.
The 1-$\sigma$ error in percentage was determined by considering respective 1-$\sigma$ error in
3 parameters considered. The parameter variation is significant,
if the variation is found to be more than 3-$\sigma$ confidence limit.
Thus, variation in cyclotron line energy for two AstroSat observations were found as
$8.0\pm2.5\%$, $11.2\pm2.0$\%, the line-width as $105.0\pm30.4$\%, $85.0\pm19.0$\%
and its optical-depth as $86.5\pm40.8$\%, $59.4\pm54.8$\% respectively. The variation in spectral
parameters such as soft photon Wien temperature $T_{0}$ were found as
$22.5\pm19.0$\%, $45.8\pm20.5$\% and plasma temperature $kT$ as $48.2\pm26.0$\%,
$58.6\pm28.3$\% and for its associated optical-depth as $48.7\pm5.1$\%, $60.9\pm5.9$\% respectively,
for two AstroSat observations. This shows that only component of
the spectral continuum defined by compTT-model, plasma optical-depth
showed significant variation over the pulse phase for both AstroSat observations. While cyclotron line
energy showed considerable and relatively higher variation for observation-2 than observation-1
for AstroSat, it is not statistically significant though.
The cyclotron line-width showed considerable variation for two observations,
whereas, the variation in line-depth was not statistically significant for both of the
observations within error limits.
This when compared to Ginga results, we find variation in line-energy of $7.2\pm1.4$\%,
and in line-width as $72\pm6$\% whereas in its line optical-depth as $54.6\pm5.3$\%.
The source luminosity was relatively much higher for Ginga \citep{mihara91} as can be seen in the Table~3.
It was noticed that the variation in line-width of the cyclotron line was though higher for
two AstroSat observations, but the measurements errors were also relatively higher than that of
the Ginga observation. The variation of the optical-depth of the cyclotron line
during two AstroSat observations are though comparable to Ginga, but due to larger errors
associated with AstroSat, we are not able to detect any significant change during these observations.
The results from two NuSTAR observations in 2014, showed variations in cyclotron line energy
of $15.4\pm4.2$\%, $8.1\pm2.2$\% when measurement for observation-2 with very large error was
dis-regarded and next minimum was considered.
The cyclotron line-width variation of $83.3\pm2.4$\%, $94.3\pm13.6$\% and optical-depth
of $211.0\pm24.0$\%, $176.0\pm27.1$\%, were observed respectively for two observations of NuSTAR,
at different source flux (or luminosity) as given in Table~3.
As the pulse-phase was divided into 9 different phases for NuSTAR data, therefore,
these variations are higher compared to AstroSat results, where pulse-phase was divided into
5 longer phase intervals and resultant variations were relatively lower due
to effect of phase averaging. There could also be a marginal effect due to selection of different
continuum model particularly for Ginga results. Therefore, direct comparison of these variations may not be appropriate.
However, one can compare observed trend of these variations of cyclotron line parameters with
pulse-phase. A similar trend of variation of the centroid energy of cyclotron line was noticed,
for AstroSat 2018 data as that of NuSTAR 2014 observations. It remains almost stable
within error limits except within the rising and the falling edge of the primary-pulse of AstroSat,
where these variations are consistent with respect to NuSTAR observation-2 at lower
source luminosity.
The cyclotron line-width variations trend almost followed
pulse intensity, for both the AstroSat observations.
This variation from NuSTAR results was found to be very similar to observation-1 than that of observation-2.
AstroSat observation of cyclotron line optical-depth variation for both observations
are found almost stable with the spin-pulse
intensity variation except in the pulse minima where it showed increasing trend.
The optical-depths of cyclotron line for the AstroSat observation-2 showed marginally higher values
for all the phases than the observation-1.
The NuSTAR measurements of optical depth appeared to show variation with spin-phase for observation-1 within its large error
limits, however for observation-2, during the rising phase of the secondary pulse, it remains almost same at relatively
lower value.
Thus, AstroSat phase resolved spectroscopy although showed overall a similar trend of variations except
with distinct differences corresponding to certain phases where extent of relative variations are different.
Cepheus X-4 showed overall variation of 5--10\% in cyclotron line-energy
over the pulse-phase. In contrast to this, other sources such as Cen X-3 \citep{burderi00, suchy08},
Vela X-1 \citep{barbara03, kreykenbohm02}, 4U 0115+63 \citep{heindl04},
GX 301--2 \citep{kreykenbohm04, suchy12}, Her X-1 \citep{voges82, soong90, klochkov08} and
GRO J2058+42 \citep{mukerjee20}, showed variation in their fundamental cyclotron line energy of about
10--30\% over the pulse-phase.
The variation in cyclotron features with pulse-phase may occur due to overall effect of
superposition of a number of lines formed at different heights of line-forming region in its
accretion column, affected by a large field gradient of neutron star magnetic field.
Therefore, variation of the centroid energy and shape of the cyclotron absorption feature may
be possible depending on orientation of the overall system and visibility of accretion column
with respect to line of sight \citep{nishi15}.
The variation in spectral continuum as well as in the cyclotron lines, may occur
due to influence of the velocity of bulk motion of in-falling plasma in the
line-forming regions as explained in the recent work by \citet{nishi19}. As line forming regions are located near the
walls of the accretion column of its cylindrical geometry and spectral continuum are
formed above and around the accumulated mound close to surface of the neutron star.
Therefore, based on the relative location of these two regions with
respect to an observer line of sight, variation in the spectral
continuum as well as variation in cyclotron-line parameters could be observed during certain pulse-phase
depending on optimum conditions of the overall system such as velocity of the bulk motion of the in-falling
matter, gravitational effects on the emitted radiation and local variation of its magnetic field \citep{nishi19}.
The neutron star surface area where magnetic field is more intense, may produces a hotter region resulting
in a relatively hotter plasma accumulation. These may cause a significant variation in the spectrum
due to the interaction of accelerated high energy particles with soft photons which give rise to the process of
Comptonization, resulting change in the spectral shape with pulse phase.
It is therefore inferred that the observed phase dependent changes in the spectral features
as well as in the parameters of the cyclotron line for Cepheus X-4 during AstroSat observation,
could likely be due to such changes such as in the geometry, physical conditions in the accretion column,
local magnetic field strength of the line producing region and the system orientation with respect to
the observer line of sight during its spin phase, at a particular source luminosity.
The cyclotron line energy of Cepheus X-4 within 90\% confidence limit showed variation with
its pulse phase in a range of (28.5--32.9) keV. This indicate a variation in
the magnetic field strength of (3.2--3.7)$\times 10^{12}$ G over the pulse phase of the pulsar
including the gravitational effect of its neutron star.
The magnetic field strength derived from its spectrum for Cepheus X-4 is
comparable to the magnitude of other X-ray pulsars, such as X-Persei ($28.6^{+1.5}_{-1.7}$ keV) \citep{coburn01},
RX J0440.9+4431 ($31.9^{+1.3}_{-1.3}$ keV) \citep{tsygan12},
RX J0520.5-6932 ($31.3^{+0.8}_{-0.7}$ keV) \citep{tendul14}
and Cen X-3 ($31.6^{+0.2}_{-0.2}$ keV) \citep{ji19}.
where energy values of their respective fundamental
cyclotron absorption features are shown within parenthesis.
\section{Conclusion}
Timing and spectral properties of Cepheus X-4 were studied during declining phase of 2018 outburst,
using AstroSat observations at two different source luminosities.
The pulsar was observed in spin-down phase during both the observations. Spin-period
and spin-down rate of the pulsar were determined as $65.35080\pm0.00014$ s,
$(-2.10\pm0.8)\times10^{-12}$ Hz s$^{-1}$ at MJD 58301.61850 and
$65.35290\pm0.00017$ s, $(-1.6\pm0.8)\times10^{-12}$ Hz s$^{-1}$ at MJD 58307.40211 for two observations.
Pulse-profiles derived at different energy bands covering 0.5--60 keV, showed pronounced and
multiple structures at lower energies, and showed a variation in shape and pulse-fraction
with energy. The RMS pulse fraction showed variations with energy and source
luminosity. After certain higher luminosity of the source, pulse fraction showed
overall decrease. Pulse-profiles derived from recent AstroSat observations were found
to be similar in shape to those reported earlier from RXTE 1997 and NuSTAR 2014 observations.
The pulsar between the outburst showed continuous spinning down at an average rate
of $(-2.455\pm0.004)\times10^{-14}$ Hz s$^{-1}$ over last 30 years, due to its entry into
subsonic propeller regime.
Spectral measurements between 0.7--55 keV showed difference in its continuum for
two different source luminosity for phase-averaged spectrum.
The prominent cyclotron resonance scattering features with a peak absorption energy of
$30.48^{+0.33}_{-0.34}$ keV and $30.68^{+0.45}_{-0.44}$ keV for FD-cutoff model and
$30.46^{+0.32}_{-0.28}$ keV and $30.30^{+0.40}_{-0.37}$ keV for compTT-model were detected.
The cyclotron line energy showed some deviations below a specific source luminosity, otherwise
remained stable at an average value of 30.23 $\pm$ 0.22 keV established from our studies.
The pulse-phase dependent variations were observed in some of the parameters of spectral continuum and
cyclotron line. These variations were more for the lower luminosity of the source.
The detection of cyclotron line lead to determination of strength of its strong
magnetic field of the neutron star. Therefore, using AstroSat observation,
we could establish the variation of strength of magnetic field over the pulse-phase
of the pulsar as (3.2--3.7)$\times 10^{12}$ G.
Further, follow up observation of the source during its rare outbursts would
offer us scope for study spectral variability with source
luminosity, variation of magnetic field strength with time and to probe nature
of its accretion column and geometry where cyclotron lines are produced.
\acknowledgments
We gratefully acknowledge vital contributions and crucial support of the Indian Space
Research Organization (ISRO) for the success of the AstroSat mission. The generous
support of ISRO for instrument building, tests and qualifications, software developments and
mission operations are always gratefully acknowledged. We thankfully acknowledge the
support of respective Payload Operation Centers (POCs) of the Large Area Proportional
Counter (LAXPC) as well as the Soft X-ray Telescope (SXT) at TIFR Mumbai, for the release
of verified data, calibration data products and pipeline processing tools.
We gratefully acknowledge the support of the Department of Atomic Energy, Government of India,
under project~no.~12-R\&D-TFR-5.02-0200. We acknowledge generous support through
the High Energy Astrophysics Science Archive Research Center On-line Services, for the
data obtained from Swift-BAT provided by the NASA/Goddard Space Flight Center for this
research work. We gratefully acknowledge generous support of NASA's HEASARC for offering
all the useful software and tools for analysis of Astronomical data. Last but never
the least, we express our sincere thanks to the referee for very valuable and constructive
comments to improve the paper.
\facility{Astrosat}
|
\section*{Acknowledgement}
This work is partially supported by the ERC Advanced Grant 788893 AMDROMA ``Algorithmic and Mechanism Design Research in Online Markets'', the EC H2020RIA project ``SoBigData++'' (871042), and the MIUR PRIN project ALGADIMAR ``Algorithms, Games, and Digital Markets''.
\section{Appendix}
\subsection{Connection Probability}
\begin{figure}[ht]
\centering
\includegraphics[width=\textwidth]{imgs/model/connection_probability/TCP_L3.png}
\caption{Network similarity does not imply connectivity. }
\label{fig:connection_probability_all_network}
\end{figure}
\newpage
\subsection{Protein-Protein Interaction Network Dataset}
\begin{table}[htbp]
\centering
\begin{tabular}{ |p{3cm}|p{3cm}|p{4cm}|p{3cm}|p{3cm}|}
\hline
\multicolumn{5}{|c|}{Considered Protein-Protein Interaction Networks} \\
\hline
\textbf{Data Set}&
\textbf{Organism}&
\textbf{Reference}&
\textbf{Number of Nodes ($|V|$)}&
\textbf{Number of Edges ($|E|$)}\\
\hline
& Synthetic & V{\'a}zquez et al. (2003)\cite{vazquez2003modeling} & $8272$ & $52922$\\
STRING &Yeast& Szklarczyk et al. (2015)\cite{szklarczyk2015string} & $2539$ & $29219$\\
STRING &C. Elegans& Szklarczyk et al. (2015)\cite{szklarczyk2015string} & $517$ & $1329$\\
STRING &Arabidopsis& Szklarczyk et al. (2015)\cite{szklarczyk2015string} & $2831$ & $28628$\\
STRING &Homo Sapiens& Szklarczyk et al. (2015)\cite{szklarczyk2015string} & $6325$ & $36674$\\
BioGRID &Homo Sapiens& Oughtred et al. (2019) \cite{oughtred2019biogrid}& $13103$ & $92250$\\
INTERACTOME 3D &Homo Sapiens& Mosca et al (2013)\cite{mosca2013interactome3d} & $6100$ & $11996$\\
HuRI & Homo Sapiens & Luck, K.et al (2020)\cite{luck2020reference} & $8272$ & $52548$\\
\hline
\end{tabular}
\caption{Considered Protein Protein Interaction Networks: A synthetic network created using the method discussed in\cite{vazquez2003modeling} and several networks downloaded from STRING DB\cite{szklarczyk2015string} }
\label{tab:networks}
\end{table}
\subsection{ Jaccard Index to Model Evolutionary and Functional Similarity}
To statistically quantify if proteins created by this evolutionary process show this behaviour, we downloaded from \cite{ouedraogo2012duplicated} a data set consisting of groups of protein products generated by the gene duplication process. Firstly, we filtered out the smallest groups, keeping only groups consisting of a large number of proteins (i.e number of proteins $\ge 10$ ) that appear in the PPI network. Secondly, for each group $I$, we defined the Mean Jaccard Index of group $I$ ($MJI_I$) as:
\begin{equation}
MJI_I = \frac{1}{\mid m \mid} \cdot \sum_{(u,v) \in IxI} \hat{J}(u,v)
\label{eq:mean_jaccard}
\end{equation}
Where $m$ is the size of $IxI$ and $\hat{J}(u,v)$ is the Biological Jaccard index defined in section \ref{sub:jac_for_seq_sim} of the main article. Finally, we compared the value of each group's Mean Jaccard Index with a random distribution of the score computed using random set of proteins with the same size of the original group $I$.
\begin{figure}[ht]
\centering
\includegraphics[width=\textwidth]{imgs/model/duplicated_gene_set_distribution_on_protein_sequecne_similarity.png}
\caption{Proteins originated by Gene Duplication Phenomena have more similar primary structures than Random Expectation}
\label{fig:duplicated_gene_set_biological_jaccard_index}
\end{figure}
\subsection{Algorithm Comparison}
\begin{figure}[!htb]
\centering
\includegraphics[width=\textwidth]{imgs/metrics/heatmap/Figure_2.png}
\caption{Heatmap plots show the performance of each method on each
Human interactome with the following evaluation metrics: Area Under the Receiver Operating Characteristic (AUROC), Area Under the Precision-Recall Curve (AUPRC), Precision of the top500 predicted PPIs (P@500) and Normalized Discounted Cumulative Gain (NDCG).}
\label{fig:heatmap_not_human_ppi}
\end{figure}
\begin{figure}[!htb]
\centering
\includegraphics[width=\textwidth]{imgs/metrics/heatmap/Figure_3.png}
\caption{Heatmap plots show the performance of each method on each
Human interactome with the GO Sim Score computed on Biological Process (B.P), Molecular Function(M.F) and Cellular Component(C.C) .}
\label{fig:heatmap_GO_sim_score}
\end{figure}
\begin{figure}[!htb]
\centering
\includegraphics[width=\textwidth]{imgs/metrics/algorithm_comparison/computational_metrics/SPRINT_vs_RA.png}
\caption{Analysis of top 500 candidate pairs predicted respectively by SPRINT and Resource Allocation. For each algorithm we plot the histogram representing the distribution of the number of common neighbours (CN) for the top 500 candidate pairs. It is easy to see that candidate pairs ranked by resource allocation show a greter number of CN if compared with those ones ranked by SPRINT. We have taken in consideration interactomes in which Resource Allocation is one of the best predictors.}
\label{fig:CN_SPRINT}
\end{figure}
\section{Conclusion}
\label{sec-conclusions}
We presented two network-based approaches, named $Max^{t}_{sim}$ and $Max^{b}_{sim}$, for predicting candidate interacting protein pairs. The exceptional success of our models depends on their ability to capture the structural and evolutionary principles that drive protein-protein interactions that Jaccard Indices infer, as discussed in Material and Methods.
We compared $Max^{t}_{sim}$ and $Max^{b}_{sim}$ with state-of-the-art network-based approaches using a 10-fold cross-validation approach on several Human and Not Human Protein-Protein Interaction networks. The ability of network-based approaches to predict protein interactions strongly depends on the network's topology. Indeed, L3 approaches have similar performances, and $Max^{t}_{sim}$ outperforms the other heuristics in the majority of the network considered. On the other hand, Sequence-based approaches that do not rely exclusively on network topology fail in predicting candidate interacting pairs. Furthermore, to better understand the biological similarity of the top candidate protein pairs ranked by each framework, we implemented the GOSimScore as Kovaks et al.\cite{}. Surprisingly, SPRINT, a well-known sequence-based approach, returned the candidate protein pairs involved in similar processes, molecular function, and in the same area.
Surprised by the excellent prediction power of $Max^{b}_{sim}$ on HuRI Interactome, we investigated possible combinations with the best network-based methods. We discover that combining topological and biological methods help in ranking interacting protein pairs without decreasing their biological similarity.
However, the $Max^{t}_{sim}$ framework is not without limitations. Like all L3-based methods, $Max^{t}_{sim}$ alone cannot find interacting partners for proteins without known links. For such proteins, we integrated information on sequence combining $Max^{t}_{sim}$ with $Max^{b}_{sim}$, SPRINT or MPS(B).
Another limitation concerns the computational validation: Fig. \ref{fig:heatmap_comparison} and Supp. Fig. \ref{fig:heatmap_GO_sim_score} represent two different ways to validate candidate protein pairs predicted by the different frameworks. It is worth noticing that frameworks based on network topology perform better when compared with classical data-mining measures such as P@K and NDCG. At the same time, frameworks that rely on protein's primary sequence outperform the others when GOSimScore is considered.
We can still do much work to improve our framework: we can think of a more reasonable way to combine topology and sequence-based methods. We can extend the framework to use several biological information such as Co-Expression of protein pairs, their functional similarities, and phylogenetic profile similarity, evolutionary history or 3D structure that we have not considered in this manuscript but that are integrated in several well-known bioinformatics tools\cite{zhang2012structure,keskin2016predicting,szilagyi2005prediction,wuchty2006topology}. In conclusion, $Max^{t}_{sim}$ and $Max^{b}_{sim}$ with their combinations are promising tools for the completion of the human interactome, allowing us to exploit network effects as we aim to uncover the mechanistic roots of human disease\cite{menche2015uncovering, huttlin2017architecture}.
\section{Introduction}
\label{sec:intro}
Protein-Protein Interactions (PPIs) play a crucial role in several biological processes since, in many cases, proteins perform vital functions by interacting with each other in the formation of protein complexes. The identification of new Protein-Protein interactions is thus crucial in understanding cells' biological mechanisms. Furthermore, knowledge of the interactions can be exploited for applications such as drug repurposing \cite{}, which leverages network topology to predict drug-disease associations, or network-based approaches to disease-gene prioritization \cite{}, which leverage the PPI network to find new candidate disease genes. Consequently, charting protein-protein interaction maps remains a fundamental goal in biological research.
Protein-protein interactions can be most readily identified by protein affinity chromatography or pull-down experiments, yeast two-hybrid screens, or purifying protein complexes that have been tagged in \textit{vivo}.
These methods are all labor and time consuming and have a high cost associated with them. Each of them has inherent advantages and disadvantages. For instance, the yeast two-hybrid system has the advantage of identifying the direct interaction between protein pairs. However, data gathered using this method may contain a high (as much as 50\%) rate of false positives.
Therefore, in the absence of other lines of evidence, this data alone cannot be considered biologically significant.
The high cost and the technical limitations associated with such biochemical approaches have resulted in a growing need for the development of computational tools capable of identifying prospective protein-protein interactions.
Several tools have been designed for this purpose over the past few years. Some of these approaches predict protein interactions using the primary structure of proteins themselves. In this line of research, SPRINT\cite{li2017sprint} and PIPE\cite{pitre2006pipe} are two well-known algorithms that rely on the same underlying hypothesis: a pair of proteins similar to a pair of interacting proteins have a higher chance to interact. In this line of thought, some very promising approaches, like L3\cite{} and SIM\cite{}, leverage network topology to define the notion as mentioned earlier of similarity.
We propose a new framework that can exploit topological and biological information to predict protein-protein interactions. The algorithm relies on the underlying hypothesis that two proteins interact in proportion to the structural similarity that one has with the most similar of the interactors of the other. From a topological perspective, the structural similarity between two proteins is proportional to the number of common neighbors. Instead, from a biological perspective, the structural similarity between two proteins is proportional to the similarity of their primary sequences.
We compare our framework with the state-of-art approaches on several synthetic and Human PPI networks. We show that it outperforms many heuristics in predicting protein interactions. Moreover, candidate protein pairs prioritized by our algorithm are involved in the same biological processes, molecular functions, and cellular components. Finally, a subset of the candidate protein pairs predicted by our framework has been experimentally validated by Xu-Wen Wang et al.
\section{Materials and Methods}
\label{sec:materials_and_methods}
\subsection{Scoring Protein Interaction}
\label{sub:scoring}
One way to detect protein-protein interaction consists of look at each interactor's tertiary structure to find complementary binding sites. However, compared to topological and protein's primary structure, the protein's shape information (tertiary and quaternary structure) is scarce. This lack of information is consequence of the expensive cost to discover the tertiary structure of proteins using new technologies. Network-based approaches, that score the likelihood to have a direct interaction between a protein pair, do not need any protein's structure information, but they can infer it leveraging network topology. Furthermore, the increasing coverage of the interactome has inspired the development of network-based algorithms, which exploit the patterns characterizing already mapped interactions to identify missing interactions. The problem of identifying new links in the interactome is known as link prediction problem \cite{}. To predict new links in the network several types of measures have been studies and proposed\cite{}. The most promising measures used in link prediction problem relies on two different hypothesis: the hypothesis that nodes topological similar to each others (i.e nodes that shares several neighbours ) and the hypothesis that a node should be linked a candidate if it is similar to the known interactors. Figure \ref{fig:JC_vs_L3} shows the different between measures that leverage the former hypothesis and those ones that exploit the latter idea.
\begin{figure}[h]
\centering
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{imgs/model/TCP_L3/TCP.png}
\caption{TCP predicts (P) links based on node similarity (S), quantifying the number of shared neighbors between each node pair $(A^2)$}
\label{fig:JC}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{imgs/model/TCP_L3/L3.png}
\caption{PPIs often require complementary interfaces. Hence, two proteins, X and Y, with similar interfaces share many of their neighbors. An additional interaction partner of X (protein U) might be also shared with protein Y (blue link)}
\label{fig:L3}
\end{subfigure}
\caption{comparison of frameworks based on 2-path lengths and those based on 3-path length }
\label{fig:JC_vs_L3}
\end{figure}
More precisely, figure \ref{fig:JC_vs_L3} a) shows measures that scores a possible interaction between node $u$ and $v$ computing the number of neighbours $u$ and $v$ shares. Metrics that use this information are Jaccard Index, Common Neighbours, Adamich Adar, $CH1\_L2$ and $CH2\_L2$. While figure \ref{fig:JC_vs_L3} b) shows groups metrics that link $u$ and $v$ if $v$ is similar to $u$'s partner and vice-versa. Furthermore, metrics that leverage common neighbours have been widely used in link prediction problem on social network, while, metrics that leverage partner similarity are more biological driven and they are based on the hypothesis that if $v$ is similar to an $u$'s interactor, then $u$ and $v$ are likely to interact (i.e they shares complementary binding sites).
To compare these two approaches that relies on different ideas, we computed the probability of a pair $(u,v)$ to be connected in the Protein-Protein Interaction (PPI) network when Jaccard Index (figure \ref{fig:JC_vs_L3_connection_probability} a)) and the number of three path length between $(u,v)$ (figure \ref{fig:JC_vs_L3_connection_probability} b)) are increasing.
To estimate this probability, we first computed the Jaccard Index and the number of three path length of each pair of nodes in the PPI Network G(V,E).
We estimated the probability of connection in the following way:
\begin{equation}
P\left(\left(u,v \right) \in E \mid s \geq x\right) = \frac{\sum_{\left(u,v\right) \in V \times V} \chi_{u,v}}{\mid S \mid}
\end{equation}
\begin{figure}[h]
\centering
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{imgs/model/connection_probability/fig_1.png}
\caption{High Jaccard similarity indicates a lower chance for the proteins to interact }
\label{fig:JC_connection_probability}
\end{subfigure}
\hfill
\begin{subfigure}[t]{0.49\textwidth}
\centering
\includegraphics[width=\textwidth]{imgs/model/connection_probability/fig_2.png}
\caption{We observe a strong positive trend in HuRI between the probability of two interacting proteins and the number of $l=3$ paths between them}
\label{fig:L3_connection_probability}
\end{subfigure}
\caption{Network similarity does not imply connectivity. \textbf{a} and \textbf{b} show the difference between TCP paradigm and L3 principle.}
\label{fig:JC_vs_L3_connection_probability}
\end{figure}
Where $\chi_{u,v}$ is 1 if $(u,v) \in E$ and 0 otherwise, while S is the set that contains all pairs $u,v$ with a score $s \ge x$.
Figure \ref{fig:JC_vs_L3_connection_probability} demonstrate that, if we use as score the Jaccard Similarity fig. \ref{fig:JC_vs_L3_connection_probability} a) and the number of three path length fig.\ref{fig:JC_vs_L3_connection_probability} b), protein pairs with high Jaccard Similarity do not tend to interact if we compare them with $A^3$ (i.e. the number of 3 path length between $u$ and $v$). This pattern is visible on several Human and not Human PPI Network as shown in Supp. Fig. \ref{fig:connection_probability_all_network}
\subsubsection{Jaccard Index as a Measure of Protein Interface Similarity}
\label{sub:jac_as_protein_interface_sim}
As discussed so far, protein pairs with high jaccard similarity do not tend to interact. This could be due to the fact that proteins that shares several neighbours should have similar binding sites (i.e similar tertiary structure). To assert the validity of this hypothesis, we considered the correlation between sequence similarity and the Jaccard Index of a pair $(u,v)$. More formally, we define the Protein sequence Similarity of $(u,v)$ as the distance between the longest sequence and the global alignment of their protein primary structures computed using the Needleman–Wunsch algorithm \cite{}.
\begin{figure}[h]
\centering
\begin{subfigure}[b]{0.45\textwidth}
\centering
\includegraphics[width=\textwidth]{imgs/model/jaccard_and_mean_alignment/HuRI.png}
\caption{HuRI}
\label{fig:HuRI}
\end{subfigure}
\hfill
\begin{subfigure}[b]{0.45\textwidth}
\centering
\includegraphics[width=\textwidth]{imgs/model/jaccard_and_mean_alignment/STRING.png}
\caption{STRING}
\label{fig:STRING}
\end{subfigure}
\caption{Jaccard similarity as a measure to infer protein structure similarity.}
\label{fig:jaccard_index_sequence_sim}
\end{figure}
Figure \ref{fig:jaccard_index_sequence_sim} a) shows the correlation between Jaccard Similarity and Protein sequence similarity. To better understand the correlation between the score induced by the global alignment and the Jaccard Similarity of a protein pair, we grouped each pairs by their Jaccard Index creating four different buckets as shown in the X axes of fig. \ref{fig:jaccard_index_sequence_sim} a) . For each bucket, we drawn the box plot representing the overall distribution of the global alignment score of protein pairs with similar Jaccard Index. As illustrated in fig. \ref{fig:jaccard_index_sequence_sim} a), when the Jaccard Similarity is in the interval $\left(\frac{3}{4}, 1\right]$
, protein pairs shares similar sequences.
Finally, fig \ref{fig:jaccard_index_sequence_sim} b) illustrates the number of samples belonging to each bucket.
Every bucket, with the exception of the bucket with interval $\left(\frac{1}{2}, \frac{3}{4}\right]$, has a similar number of samples.
\subsubsection{Jaccard Index as a Measure of Gene Duplication Phenomena}
\label{sub:jac_as_gene_dup}
Jaccard Index, not only is useful to find proteins with similar structures, but it can be applied to identify proteins originated by the process of gene duplication. Indeed, in the process of evolution, genes may produce new proteins, which may retain many of the biological functions of the original ones. As we know, the structure of a proteins is related to its biological functions \cite{} and thus, proteins born from the process of gene duplication should share similar interactors. To statistically quantify if proteins created by this evolutionary process show this behaviour, we downloaded from \cite{ouedraogo2012duplicated} a data set consisting of groups of protein products generated by the gene duplication process. Firstly, we filtered out the smallest groups, keeping only groups consisting of a large number of proteins (i.e number of proteins $\ge 10$ ) that appear in the PPI network. Secondly, for each group $I$, we defined the Mean Jaccard Index of group $I$ ($MJI_I$) as:
\begin{equation}
MJI_I = \frac{1}{\mid m \mid} \cdot \sum_{(u,v) \in IxI} J(u,v)
\label{eq:mean_jaccard}
\end{equation}
Where $m$ is the size of $IxI$. Finally, we compared the value of each group's Mean Jaccard Index with a random distribution of the score computed using random set of proteins with the same size of the original group $I$.
\begin{figure}[ht]
\centering
\includegraphics[width=\textwidth]{imgs/model/duplicated_gene_set_distribution.png}
\caption{Proteins originated by Gene Duplication Phenomena shares more common naighbors than Random Expectation.}
\label{fig:duplicated_gene_set}
\end{figure}
Figure \ref{fig:duplicated_gene_set} shows the scores of Mean Jaccard Index of the original groups and compare them with a random distribution. As illustrated by each plot, the value of the $MJI$ of each group is very large if we compare with the associated random distribution. Indeed, each vertical line, representing the score of each group is in the tail of each distribution. As, discussed before, each group consists of a number of proteins in the interval $[10, 27]$.
\subsubsection{Jaccard Index to Model Evolutionary and Functional Similarity}
\label{sub:jac_for_seq_sim}
The relationship between protein sequences and structures has long been a widely accepted tenet of biochemistry\cite{kidera1985relation,guzzo1965influence}. Indeed, one of the foundations of molecular biology is that a protein's sequence determines its structure, which determines how the protein functions.
Protein sequence–structure-function relationships have been investigated and quantified in various ways. Several studies\cite{chothia1986relation,wilson2000assessing} have established the correlation between structural similarity and sequence similarity. Other ones\cite{rost1999twilight, yang2000integrated} have studied the level of sequence similarity at which structural similarity is likely to be observed. Consequently, protein primary sequence similarity indices have been widely used to capture evolutionary relationships between paralogs (i.e., homologous proteins related to a gene duplication phenomena)\cite{jeffryes2018rapid}.
Consequently, we modeled a protein pairwise similarity function, named Biological Jaccard Index, that leverages the primary sequence to score the resemblance of a protein pair. In more detail, given two protein $u$ and $v$ and their associated protein sequences $S_u$ and $S_v$, we first identify the set of k-mers~\footnote{K-mers are substrings of length $k$ contained within a general biological sequence.} of each sequence $\hat{S}_u$ and $\hat{S}_v$ and we define the Jaccard Similarity between sets of k-mers as:
\begin{equation}
\hat{J}(u,v) = \frac{ \mid \hat{S}_u \cap \hat{S}_v \mid }{\mid \hat{S}_u \cup \hat{S}_v \mid}
\label{eq:biological_jaccard_index}
\end{equation}
To statistically validate if this index was able to keep evolutionary relationships among set of proteins (Gene Duplication Phenomena), we followed the same approach discussed in Section \ref{sub:jac_as_gene_dup}. As shown in supplementary figure \ref{fig:duplicated_gene_set_biological_jaccard_index}, duplicated gene sets have mean jaccard similarity grater than random expectation. Furthermore, the mean of pairwise similarities of each group is greater if Biological Jaccard Index is considered instead of the topological index. This finding might be related to the incompleteness of the interactome.
\begin{figure}[ht]
\centering
\includegraphics[width=\textwidth]{imgs/model/correlation_biological_jaccard_index_biological_similarity.png}
\caption{Correlation between Sequence Similarity and Functional Similarity. Protein pairs with high Sequence Similarity tend to be involved in the same biological processes and be localized in the same cellular components.}
\label{fig:biological_jaccard_index_functional_similarity}
\end{figure}
Finally, as shown by several studies\cite{hegyi1999relationship,joshi2007quantitative,sangar2007quantitative}, protein pairs with higher sequence similarity tend to be more functionally similar than dissimilar proteins. Indeed, Figure \ref{fig:biological_jaccard_index_functional_similarity} shows the correlation between the Biological Jaccard Index and the functional similarity of a protein pair. We considered Gene Ontologies (Biological Process, Cellular Component and Molecular Function) downloaded from the Gene Ontology Consortium and we plotted the distribution of pairwise Gene Ontology similarity over the interval of the Biological Jaccard Index. All protein pairs with a Jaccard Index in the interval $(0.8, 1.0]$ have several Gene Ontologies in Common if compared with pairs with low JI.
\subsubsection{Model Definition}
\label{sub:model}
From the discussion introduced in sections~\ref{sub:jac_as_protein_interface_sim},~\ref{sub:jac_as_gene_dup} and~\ref{sub:jac_for_seq_sim}, the Similarity between a protein pairs can be used to measure the interface similarity, paralogy and functional similarity. In other words, given a protein pair $(u,v)$, we can use the Jaccard functions to compute the similarity between $v$ and $u$'s neighbors. If $v$ is highly topologically or biologically similar to at least one neighbour of $u$, then there is a good chance that $v$ shares the same binding sites (i.e $v$ has complementary binding site of $u$) or that it is involved in the same function of a neighbour of $u$.
Thus, we can model the probability of connection between $u$ and $v$ in two different ways: using the topological Jaccard Index or the Jaccard Index defined in equation \ref{eq:biological_jaccard_index}.
\begin{figure}[h]
\centering
\includegraphics[width=\textwidth]{imgs/model/model.png}
\caption{Topological and Biological Models of our framework: \textbf{a)} shows a candidate protein pair $(U,V)$ in which $V$ is topologically similar (i.e High Topological Jaccard similarity) to $a$, a (i.e $U$'s neighbour). \textbf{b)} shows a candidate protein pair $(U,V)$ in which $V$ is highly biologically similar to $U$'s neighbour.}
\label{fig:model}
\end{figure}
Figure \ref{fig:model} shows how we score the likelihood of interaction between $u$ and $v$. Figure \ref{fig:model} \textbf{A)} illustrate the model from a topological point of view in which protein $v$ is very similar to protein $a$ (i.e. $u$'s neighbor) and consequently, as discussed previously, $v$ may share complementary binding site with $u$. On the other side, figure \ref{fig:model} \textbf{B)} shows the model from a biological point of view in which, instead of considering the topological Jaccard Similarity, Jaccard Sequence similarity is used to understand if $v$ is functionally similar to at least a neighbor of $u$.
Indeed, as shown in figure \ref{fig:model} \textbf{B)}, $v$ has similar tertiary structure to $a$, but not with $b$. In conclusion, we can formalize the model in the following way:
\begin{equation}
Max_{sim}(u,v) = max_{a \in N(u)} J(a,v) + max_{b \in N(v)} J(b,u)
\label{max_sim_definition}
\end{equation}
Where $N(i)$ is the set of direct neighbors of i and we can replace the Jaccard Index J, with the one analyzed in section \ref{sub:jac_for_seq_sim}. Surprisingly, the protein pair scoring function that leverages protein's primary structures is not linked to the topology of the PPI network. Indeed, it is able to rank candidate interacting pair that are not close (i.e Shortest path length greater than 3) in the network. Thus, is not affected by the bias induced by network topology and by the network incompleteness (i.e missing data).
\section{Results}
\label{sec:results}
\subsection{Evaluation-Scheme and Accuracy-Measures}
\label{sub:eval}
To evaluate the prediction of our frameworks and comparing it with other algorithms, we selected several Protein-Protein Interaction Networks:
\begin{itemize}
\item From STRING\cite{szklarczyk2015string} we downloaded PPI networks of different organism (Yeast, C. Elegans, Arabidopsis and Humo Sapiens) and we selected only experimental validated physical interactions. In other words, we removed those protein - protein interactions with an overall score lower than 900.
\item We downloaded a Human Interactome from from \cite{luck2020reference}, that consists of experimental validated PPIs using Yeast to Hybrid screening\cite{}. From BioGRID\cite{}, we downloaded another Human Interactome only considered ”physical” and proteins assigned to the specific to the studied species. Finally, we also included the Interactome3D\cite{} dataset, summarizing currently available interactions with structural evidence
\end{itemize}
Finally, for each protein in each Interactome, we downloaded its associated protein sequence from Uniprot Knowledge Based\cite{}, and in each network, we removed those proteins associated with more than one protein sequence (i.e. those proteins not manually curated by Swiss Prot. Institute\cite{}). The complete list of PPI Networks used in this manuscript is visible in Supp. Table \ref{tab:networks}. To assess accuracy in predicting protein interactions, we performed 10-fold cross validation on each dataset, picking a portion of edges at random to create the Training Graph (90\%) and using the remaining edges (10\%) to Test algorithm's performances. To assess accuracy, we considered four standard prediction indices in Data Mining. For a given set of truly interacting pairs (Test Set),
and an algorithm ranking protein pairs with respect to their interaction likelihood:
\begin{itemize}
\item \textbf{Precision@500:} this is the fraction of the test set
that is successfully retrieved in the top $k$ positions of the ranking computed by the
algorithm.
\item \textbf{nDCG\cite{wang2013theoretical}:} The normalized Discounted Cumulative Gain (nDCG) is proven to be able to select the better ranking between any two, substantially different rankings. For binary classification the nDCG is given by:
\begin{center}
$\frac{\sum_{i \in P} \frac{1}{log_2(i + 1)}}{\sum_{i = 0}^{|P|} \frac{1}{log_2(i + 1)}}$
\end{center}
Where summation in the numerator runs over all positive instances, while summation in the denominator quantifies the ideal case, in which positive instances appear in the top positions of the algorithm's ranked list.
\end{itemize}
For the seek of completeness, we also compare all the algorithms with the \textbf{AUROC} and \textbf{AUPRC}, that are widely used to compare algorithm's performances, even if it is well established that \textbf{AUROC} measure overestimates algorithm's performances\cite{}.
\subsection{Competing Methods}
\label{sub:competing_methods}
Network-based approaches leverage network topology to estimate the likelihood of protein interactions. The advantages of network-based methods are high efficiency, easy access to input data (only network topology is needed), and good generalization schemes.
Table~\ref{tab:methods} collects all PPIs prediction methods that have been implemented and tested.
\begin{table}[htbp]
\centering
\begin{tabular}{|p{3.6cm}|p{4cm}|p{6cm}|p{2cm}|}
\hline
\multicolumn{4}{|c|}{PPIs Prediction Methods} \\
\hline
\textbf{Method}& \textbf{Reference}&\textbf{Index}&\textbf{Path Length}\\
\hline
Common Neighbor & Newman (2001)~\cite{newman2001} & $CN_{i,j} = |\Gamma_i \cap \Gamma_j|$ & l = 2\\
Jaccard Index & Jaccard (1912)~\cite{jaccard1912} & $JI_{i,j} = \frac{|\Gamma_i \cap \Gamma_j|}{|\Gamma_i \cup \Gamma_j|}$ & l = 2\\
Adamich Adar &Adamic and Adar (2003)~\cite{aa} & $AA_{i,j} = \sum_{z \in \Gamma_i \cap \Gamma_j}\frac{1}{log_2k_z}$ & l = 2\\
Resource Allocation & Zhou et al. (2009)~\cite{zhou2009predicting} & $RA_{i,j} = \sum_{z \in \Gamma_i \cap \Gamma_j}\frac{1}{k_z}$ & l = 2\\
CH1\_L2 & Cannistraci et al. (2018)~\cite{muscoloni2018local} & $CH1_{L2}(i,j) = \sum_{z \in \Gamma_i \cap \Gamma_j} \frac{ki_z}{k_z}$ & l = 2\\
CH2\_L2 & Cannistraci et al. (2018)~\cite{muscoloni2018local} & $CH2_{L2}(i,j) = \sum_{z \in \Gamma_i \cap \Gamma_j} \frac{1 + ki_{z}}{1 + ke_z}$ & l = 2\\
A3 & Barabâsi et al. (2019)~\cite{kovacs2019network} & $A3_{i,j} = \sum_{u,v} a_{iu} \cdot a_{u,v} \cdot a_{vj}$ & l = 3\\
L3 & Barabâsi et al. (2019)~\cite{kovacs2019network} & $L3_{i,j} = \sum_{u,v}\frac{a_{iu} \cdot a_{u,v} \cdot a_{vj}}{k_u \cdot k_v}$ & l = 3\\
L3E & Yuen. (2020)~\cite{yuen2020better} & $P^{L3E}_{i,j} = \frac{|U|}{|\Gamma_i|} \cdot \frac{|V|}{|\Gamma_j|} \cdot \sum_{U,V} J (i,v) \cdot J(u,j)$ & l = 3\\
CH1\_L3 & Cannistraci et al. (2018)~\cite{muscoloni2018local} & $CH1_{L3}(i,j) = \sum_{z_1,z_2 \in L_3} \bigg( \frac{ki_{z_1} \cdot ki_{z_2} }{k_{z_1} \cdot k_{z_2}} \bigg)^{\frac{1}{2}}$ & l = 3\\
CH2\_L3 & Cannistraci et al. (2018)~\cite{muscoloni2018local} & $CH2_{L3}(i,j) = \sum_{z_1,z_2 \in L_3} \bigg( \frac{ki_{z_1} \cdot ki_{z_2} }{ke_{z_1} \cdot ke_{z_2}} \bigg)^{\frac{1}{2}}$ & l = 3\\
SIM & Chen et al. (2020)~\cite{chen2020protein} & $SIM_{i,j} = \sum_{v \in \Gamma(j)} A \cdot J_{vi} + \sum_{u \in \Gamma(i)} A \cdot J_{uj}$ & l = 3\\
Preferencial Attachment & Barabâsi et al. (2002)~\cite{barabasi2002} & $PA_{i,j} = k_i \cdot k_j$ & \textit{any}\\
MPS(B) & Wang et al. (2002)~\cite{wang2021assessment} & None & \textit{any}\\
SPRINT & Li, et al. (2020)~\cite{li2017sprint} & None & \textit{any}\\
\hline
\end{tabular}
\caption{All PPIs prediction methods that have been implemented and tested on several PPI Networks.
$k$, $ki$~\cite{muscoloni2018local}, and $ke$~\cite{muscoloni2018local} represent the degree, the internal degree, and the external degree of a node in the network.}
\label{tab:methods}
\end{table}
\paragraph{The Preferential Attachment method:} The basic premise is that the probability that a new link has node \textit{i} as an endpoint is proportional to $|\Gamma(i)|$, the current number of neighbors of \textit{i}.
\paragraph{Methods Based on Paths of Length 2:} These heuristics leverage the idea, very popular in social network mining, that two nodes $i$ and $j$ that share many common neighbors are more likely to interact. The most relevant metrics that are based on this hypothesis are: \textbf{Common Neighbor} (CN), defined as the number of common interacting nodes between $i$ and $j$, \textbf{Jaccard Index}\cite{jaccard1912}(JC), a commonly used similarity. Intuitively, it measures the probability that a feature $f$ that \emph{either} $x$ or $y$ possess is actually shared by both. In our case, a feature $f$ is an interacting protein. \textbf{Resource Allocation} \cite{zhou2009predicting}, a similarity index that indicates how well a node $i$ can transmits information to node $j$ using its neighborhood. Finally, Cannistraci et al.\cite{muscoloni2018local} designed a family of metrics ($CH1\_L2$ and $CH2\_L2$), based on \textbf{Resource Allocation}, in which a node $z \in \Gamma_i \cap \Gamma_j$ is associated an internal degree $ki_z$ that is the number of links that common neighbors $i$ and $j$ share between them, and an external degree $ke_z$ that is defined as the number of links that $z$ shares with nodes that are not common neighbors of $i$ and $j$.
\paragraph{Methods Based on Paths of Length 3:}
These methods are based on the hypothesis that proteins should have complementary binding sites to be able to interact with each other. Following this idea, Barabasi et al.\cite{kovacs2019network} showed that nodes that share a large number of paths of length $3$ share complementary tertiary structures and are more likely to interact. This idea, i.e., the \textbf{L3 principle}, is at the basis of several heuristiscs proposed since Barabasi et al.'s work. Indeed, Chen et al.\cite{chen2020protein} proposed a network-based link prediction method, named Sim, for PPI networks. This index is designed from two perspectives: the complementarity of protein interaction
interfaces and gene duplication. Cannistraci et al.\cite{muscoloni2018local} designed a family of metrics ($CH1\_L3$ and $CH2\_L3$) that plug in the concept of \textbf{Local Community Paradigm} in the L3 formula designed by Barabasi et al. (2019). Finally, Yuen et al. \cite{yuen2020better} designed a metrics based on the L3 principle and uses Jaccard Index as a penalty to score a candidate interaction.
\paragraph{Methods Based on Protein Primary Structure:}SPRINT is a well know method to predict protein's interactions using their amino-acid sequence. It relies on the idea that proteins similar with interacting proteins are likely to interact as well. In a way or another, this is essentially the idea behind the brute force calculation of PIPE as well as the machine learning algorithms of Martin, Shen, and Guo. Since, all these methods relies on the same concept, we decided to take in consideration SPRINT that has been shown to have a better prediction power and to be faster than the other algorithms.
\paragraph{Methods Implemented for Protein Interaction prediction Challenge:} The proposed Methods has been implemented to participate to the Protein Interaction prediction Challenge organized by the Network Medicine Consortium \footnote{\url{https://www.network-medicine.org/}}. At the challenge, we also proposed a biological score, named MPS(B), to estimate the likelihood of protein interaction that leverages protein sequence in a different way from what we have discussed so far. We took inspiration from PIPE\cite{pitre2006pipe} and we designed a simplified and faster framework in which we don't directly consider all co-occurrences of two sub sequence pairs $(u_i,v_j)$, but we use them to define a protein similarity measure.
\subsection{Algorithm Comparison}
\label{sub:algorithm_comp}
\begin{figure}[t]
\centering
\includegraphics[width=\textwidth]{imgs/metrics/heatmap/Figure_1.png}
\caption{ Heatmap plots show the performance of each method on each
Human interactome with the following evaluation metrics: Area Under the Receiver Operating Characteristic (AUROC), Area Under the Precision-Recall Curve (AUPRC), Precision of the top500 predicted PPIs (P@500) and Normalized Discounted Cumulative Gain (NDCG).}
\label{fig:heatmap_comparison}
\end{figure}
This section presents the overall comparison of sixteen different methods using several Human and Not-Human Protein-Protein Interaction networks.
To begin, Figure \ref{fig:heatmap_comparison} shows the algorithm's performances on four different Human PPI networks. If we look at frameworks that leverage only topological information, we can see that algorithms based on the L3 paradigm outperform metrics that can predict only interactions between proteins within two hops (TCP paradigm). Indeed, this pattern is visible on all the data sets considered: $Max^{t}_{sim}$, sim, CH2L3, CH1L3, L3E, L3, and A3 consistently outperform Resource Allocation, Adamich Addar, Jaccard Coefficient, CH1L2, and CH2L2. Furthermore, $Max^{t}_{sim}$ outperforms all the other heuristics in terms of AUPCR on three networks (INTERACTOME 3D, HuRI, and STRING) and returns the highest number of true positives (Precision@500) on two PPI networks (INTERACTOME 3D, and HuRI). Interestingly, Methods that leverage protein's primary structures show lower computational performances than topology-based frameworks .
Since most topology-based algorithms show similar values of P@500, we plotted the precision curve of the best performers. Figure \ref{fig:algorithm_comparison} \textbf{a)} shows the precision of the best algorithms when the number of top predictions is varying. On the INTERACTOME 3D CH1L3, CH2L3 and $Max^{t}_{sim}$ show similar behavior, but $Max_{sim}$ beats when we consider the top 500 predicted interactions. The same signal is visible on STRING: our topological framework is the best predictor when we consider a larger number of top ranked candidate protein pairs. Finally, on HuRI, $Max^{t}_{sim}$ is the best oracle. Surprisingly, $Max^{b}_{sim}$ shows promising results on this network. This result might be related to the positive correlation between Jaccard Index and Sequence similarity among protein pairs in HuRI as shown in Luck, K. et al.\cite{luck2020reference}.
Besides, we verify the validity of our approaches also on not Human PPI networks. Supp. Figure \ref{fig:heatmap_not_human_ppi} shows the framework's validation on a Synthetic, and three different not Human (Yeast, C. Elegans, and Arabidopsis) interactomes. Results are coherent with the previous ones: L3 approaches outperforms methods that only predict candidate protein pairs within 2 hops(i.e. Resource Allocation, Jaccard Coefficient and Adamich Adar). Furthermore, methods that leverages protein sequence information shows better performances on these networks than Human interactomes. This observation may be due to a greater incompleteness of the Human interactomes than the non-Human ones\cite{hart2006complete}.
\begin{figure}[h]
\centering
\includegraphics[width=\textwidth]{imgs/metrics/algorithm_comparison/computational_metrics/computational_evaluation.png}
\caption{Algorithm Comparison. CH1L2, CH1L3, CH2L3, $Max^{b}_{sim}$, $Max^{t}_{sim}$, and sim are are compared using two different measures: \textbf{a)} shows the Precision@k plot and \textbf{b)} shows the MeanGOSimScore. }
\label{fig:algorithm_comparison}
\end{figure}
To further validate these heuristics, we compared their top candidate protein's interaction using Gene Ontologies annotation\cite{ashburner2000gene,gene2019gene} (Biological Process, Molecular Function, and Cellular Component) downloaded from GO Consortium\cite{gene2015gene}. These annotations are routinely applied to validate computationally predicted links in the literature\cite{you2010using} instead of performing high-throughput validations or pairwise testing experiments. To induce a biological score for each framework, we consider the top 500 candidate pairs of each framework and we compute the GO sim score as in Kovaks et al.\cite{kovacs2019network}. More formally, for each candidate protein pair ($u,v$) in the top k positions we defined $T_u$ and $T_v$ the sets of annotation u and v are respectively involved into, and we estimate their similarity as:
\begin{equation}
GOSimScore(u,v) = \min_{ i \in T_u \cap T_v } \frac{2}{n_i}
\end{equation}
Where $n_i$ are the total number of protein involved in annotation $i$. Finally, the framework's score consists of the mean of all $GOSimScore$ associated to the top k candidate predicted protein pairs:
\begin{equation}
GOSimScore =\frac{1}{k} \cdot \sum_{(u,v) \in Top_k} GOSimScore(u,v)
\end{equation}
Figure \ref{fig:algorithm_comparison} \textbf{b)} shows the performances of some of the best network-based and sequence-based approaches. Despite their prediction power shown in figure \ref{fig:heatmap_comparison}, candidate pairs seem to be less biologically similar than those ranked by Resource Allocation and Adamich Adar (see Supp. Figure \ref{fig:heatmap_GO_sim_score}). Kovaks et al.\cite{kovacs2019network} observed the same pattern when they analyzed TCP-based methods and compared them with L3 using the same similarity metric. However, It is worth noticing that SPRINT get the best performances if compared with all the other frameworks, and almost all predicted interactions do not share a large number of common neighbors if compared with Resource Allocation (see Supp. Fig. \ref{fig:CN_SPRINT}). In conclusion, if we take in consideration methods based on L3 principle, $Max^{t}_{sim}$ and $Max^{b}_{sim}$ return candidate pairs more similar than those ones returned by other proposed methods (A3, L3, L3E, CH1L3, CH2L3 and sim) as shown in Figure \ref{fig:algorithm_comparison} \textbf{b)} and Supp. Figure \ref{fig:heatmap_GO_sim_score}.
\subsection{An Unsupervised Approach to Combine Sequence Based and Topological Information}
\label{sub:combiner}
Section \ref{sub:algorithm_comp} allowed us to understand framework's limitations. First, topology-based approaches are unable to predict candidate protein pairs far away in the Interactome (i.e., Shortest path distance greater than 3). Secondly, as shown in Fig \ref{fig:heatmap_comparison} and Supp. Fig. \ref{fig:heatmap_GO_sim_score}, they are very biased on the topology of the Protein-Protein Interaction network and fail to rank highly similar candidate protein pairs. On the other hand, methods that rely on primary sequence can score the likelihood of interaction of candidate proteins localized in distant areas of the network. Also, they rely on the information of the protein's primary structure, reducing the bias of the Interactome.
Consequently, we investigate the effect of combining topological and biological frameworks to predict new protein interactions to moderate their topological bias and rank biologically similar protein pairs. Given the topological feature $f_t$ and the biological feature $f_b$, we combine them using a linear combination of the two:
\begin{equation}
f_{t,b}(u,v) = \alpha \cdot f_t + \beta \cdot f_b
\end{equation}
To choose the value of $\alpha$ and $\beta$, we first normalized/standardized $f_t$ and $f_b$. Then, we projected them on a 1-dimensional space with the help of principal components analysis (PCA), a classical technique for extracting patterns and performing dimensionality reduction from unlabeled data. It computes a linear combination of two features, forming the direction that captures the most variance in the data set.
\begin{figure}[h]
\centering
\includegraphics[width=\textwidth]{imgs/metrics/algorithm_comparison/metrics_combination/computational_validation.png}
\caption{Algorithm Comparison. CH1L2, CH1L3, CH2L3, $Max^{b}_{sim}$, $Max^{t}_{sim}$, and sim are are compared using two different measures: \textbf{a)} shows the Precision@k plot and \textbf{b)} shows the GOSimScore. }
\label{fig:combination_performer}
\end{figure}
Figure \ref{fig:combination_performer} illustrates the performance of the combined metrics compared to individual ones. We analyzed the performances on HuRI Interactome: The network in which both topological and biological metrics have an excellent prediction power on P@K and GoSimScore.
Each plot represents a topological framework and its combinations.
As a first result, $Max^{b}_{sim}$ can improve the retrieval of the top 200 candidate protein pairs of each topological algorithm considered, as shown in Figure \ref{fig:combination_performer} \textbf{a)}. Furthermore, biological frameworks help network-based approaches to retrieve more biologically similar protein pairs, as shown in Figure \ref{fig:combination_performer} \textbf{b)}.
|
\section{Introduction}
Knowledge bases are prevalent in various domains such as online encyclopedias (e.g., DBpedia), social media (e.g., Twitter), biomedical fields (e.g., Geonames), and bibliographical networks (e.g., DBLP).
Essentially, a knowledge base is defined as a collection of interlinked descriptions of entities (e.g., real-world objects and persons) that enables storage, analysis, and reuse of this knowledge in a machine-interpretable manner \cite{Knowledge_graph_definition}.
With the fact that the knowledge bases describe various properties and relationships between different facts, the complex relationships among different entities are thus well preserved and represented.
Nowadays, knowledge bases have been widely used in a large number of real applications.
For example, Google uses the knowledge graph to enhance its search engine.
Specifically, by using the knowledge graph, Google search engine can identify different meanings for the same word and summarize relevant content of the word to provide better search results (e.g., the word ``Taj Mahal'' may denote the monument or a musician, but Google search engine can show their difference when searching the relevant information like ``Taj Mahal's history''\footnote{\url{https://blog.google/products/search/introducing-knowledge-graph-things-not/}}).
For another example, the knowledge graph in Siemens has supported the knowledge-driven application across companies and generates new knowledge \cite{Siemens}.
Owing to their great importance, knowledge bases have received much attention from both the academia and industry community.
Very often, researchers need to resort to publicly accessible knowledge bases to evaluate their methods. Ideally, the knowledge bases need to offer insights to the devised models and solutions, and meanwhile should be user friendly and enable researchers to easily evaluate their methods.
In light of this, in this paper, we provide a note on general statistics of several publicly accessible knowledge bases, which include their numbers of objects, relations, object types, relation types, etc.
Table \ref{tab:general statistics} lists the publicly accessible knowledge bases that are reviewed in this paper\footnote{The statistics data were extracted from the official websites of the knowledge bases on June 28, 2021.}.
As shown in Table \ref{tab:general statistics}, we group these knowledge bases into two categories, i.e., schema-rich and simple-schema knowledge bases.
Herein, the schema of a knowledge base refers to a network describing all allowable relation types between entities types and also the properties of entities \cite{XML_schema}.
For example, if an entity is ``Taylor Swif'', then the schema defines the type of this entity (i.e., Person) and the properties of this entity in this type (i.e., her age, job, country, etc.).
Therefore, the schema-rich knowledge bases often refer to the knowledge bases with a large number of object/relation types, while the simple-schema knowledge bases only have a few object/relation types.
We would like to remark that apart from these, there are many other knowledge graphs whose entire data are not publicly available.
For example, for the enterprise knowledge bases (e.g., Twitter, Flickr, and Google), only a small proportion of their data are accessible.
For these knowledge bases, we will not cover in this paper.
Note that, Table \ref{tab:general statistics} only includes several publicly accessible knowledge bases according to the popularity in academic research.
We will continue to update this table by including more open-source knowledge bases in the future.
\footnotetext[1]{\url{https://blog.google/products/search/introducing-knowledge-graph-things-not/}}
\begin{table*}[h]
\centering
\caption{Publicly accessible knowledge bases reviewed in this paper.}
\label{tab:general statistics}
\begin{tabular}{l c c c c c c}
\hline
Name&Schema type&URL&Major object types& Objects/entities&Initially released\\
\hline\hline
Yago&Schema-rich&https://yago-knowledge.org/&10K&67M&2008\\
\hline
DBpedia&Schema-rich&https://www.dbpedia.org/&484k&6 M&2007\\
\hline
Wikidata&Schema-rich&https://www.wikidata.org/&24M&93 M&2012\\
\hline
KBpedia&Schema-rich&https://kbpedia.org/&173 (ontology)&40M&2016\\
\hline
DBLP&Simple Schema&https://dblp.org/&4&8M&1993\\
\hline
IMDb&Simple Schema&https://www.imdb.com/&7&186M&1990\\
\hline
Geonames&Simple Schema&https://www.geonames.org/&9&12M&2005\\
\hline
\end{tabular}
\end{table*}
\section{General Statistics of Publicly Accessible Knowledge Bases}
We divide the general statistics of the publicly accessible knowledge bases into two parts.
The first part contains the common statistics of all knowledge bases, while the second part includes specific statistics.
For the first part, we mainly show the schema type, URL, initially released time, and the numbers of objects/entities, relations, and object types of each knowledge base. \autoref{tab:general statistics} summarizes the common statistics of these knowledge bases, where all the statistic numbers were collected from the official websites in June 2021 and they may change as time goes on.
Note that for some knowledge bases, the entity types are hierarchically organized, and here we mainly count the number of object types in high levels which is denoted by ``Major object types'' in \autoref{tab:general statistics}.
The second part covers the specific statistics for each knowledge base.
Since various knowledge bases have different structures, this leads to specified statistics.
Besides, the same concepts may have different meanings in each knowledge base.
For example, in \autoref{tab:general statistics}, the concept of entity types in Yago means the types for all the entities and ontology classes, while it refers to the type of entities for DBLP.
Therefore, apart from the common information, one needs to further elaborate on their specific statistics.
In the following, we mainly focus on introducing the specific statistics of each publicly accessible knowledge base.
Note that this paper will not extensively discuss the specific statistics of Wikidata, since many other knowledge bases (e.g., DBpedia, Yago, and KBpedia) are built based on this data.
\subsection{Schema-rich Knowledge Bases}
In general, schema-rich knowledge bases refer to the knowledge bases consisting of entities with a large number of types. For example, Yago covers the information of various areas such as people, cities, countries, movies, and organizations \cite{Yago}, making it a knowledge base with various types of objects.
\subsubsection{DBpedia}
\indent\setlength{\parindent}{1em}DBpedia was created by scientists at the Free University of Berlin and Leipzig University in collaboration with OpenLink Software\cite{DBpedia_version_2007}. Now DBpedia is maintained by scientists at the University of Mannheim and Leipzig University.
\begin{figure}
\centering
\includegraphics[width=\linewidth]{figures/4.pdf}
\caption{``Berlin'' recorded in DBpedia.}
\label{fig:DBpedia dbo}
\end{figure}
DBpedia mines data from ``Wikipedia'', ``DBpedia common'', and ``Wikidata'', and updates the data around the 15th of every month, allowing users to find answers to questions where the information is spread across multiple Wikipedia articles. For example, the word ``Berlin'' has many different meanings like Berlin, West-Berlin, and Ost-Berlin. By querying DBpedia with the keyword ``Berlin'', it will return descriptions about Berlin, West-Berlin, and Ost-Berlin, even if you only search Berlin. It will also return many properties and relationships to other entities, e.g., the information of universities and famous people in Berlin in history. In \autoref{fig:DBpedia dbo}\footnote{\url{https://dbpedia.org/page/Berlin}}, we choose some properties of Berlin and relationships to other entities. For example, ``Berlin'' has property ``areaCode'' and its value is ``030''. ``Berlin'' has a relationship to ``German'' and the relationship is ``country''.
The specific statistics of DBpedia are presented in \autoref{tab:DB specified statistics}\footnote{\url{https://www.dbpedia.org/blog/yeah-we-did-it-again-new-2016-04-dbpedia-release/}} and \autoref{tab:DB ontology}\footnote{\url{https://www.dbpedia.org/blog/yeah-we-did-it-again-new-2016-04-dbpedia-release/}}. Object property defines the relationship between one entity and another entity. Datatype property defines the relationship between one object and one of its values. For example, ``mother'' is an object property because mother is an individual as an entity, while ``age'' is a datatype property because a human's age is a value belonging to this human, not an entity. Languages symbolize the languages number knowledge base supports. Mappings define the mappings from Wikidata templates to the DBpedia classes. The mappings are classified by language. For example, in these 5800 mappings, there are 646 mappings are used in Dutch.
\autoref{tab:DB ontology} shows the distribution of ontology entities of DBpedia. Ontology classes mean the number of classes in ontology. Some classes are not in ontology but in knowledge bases. There are 5.2M entities in ontology classes. The classes having the largest size are Persons, Places, Works, Organizations, Species, and Diseases. In \autoref{tab:DB ontology}, we show the numbers of entities of each class having a large size.
\begin{table}[h]
\centering
\caption{Specific statistics of DBpedia.}
\label{tab:DB specified statistics}
\begin{tabular}{c c c c c }
\hline
\tabincell{c}{Object\\properties}
&\tabincell{c}{Datatype\\properties}
&Languages
&Mappings\\
\hline\hline
1105&1754&136&5800\\
\hline
\end{tabular}
\end{table}
\begin{table}[ht]
\caption{The distribution of ontology entity of DBpedia.}
\label{tab:DB ontology}
\begin{tabular}{l c}
\hline
Item&Number\\
\hline\hline
Ontology classes&754\\
\hline
Entities in ontology classes&5.2M\\
\hline
Persons&1.5M\\
\hline
Places&810k\\
\hline
Works&490k\\
\hline
Organizations&275k\\
\hline
Species&301k\\
\hline
Diseases&5k\\
\hline
Relationships/facts&9.5B\\
\hline
\end{tabular}
\end{table}
\subsubsection{Yago}
Yago is an open-source knowledge base developed at the Max Planck Institute for Computer Science in Saarbrücken. It is a knowledge graph containing knowledge about people, cities, countries, movies, and organizations. Each entity in Yago belongs to at least one class. The high classes in Yago are taken from schema.org and bioschemas.org, and the lower classes are a selection of classes from Wikidata. Yago has been used in the Watson artificial intelligence system \cite{Watson_artificial_intelligence}.
Yago extracted facts/relationships from Wikidata and Wikipedia, cleaned these data, and finally organized the cleaned data in the structures defined by the anthologies of ``Schema.org'' and ``Biosche-ma.org'', which define the number and the kind of classes, properties, and relationships.
The facts/relationships that are not fitted in these classes were ignored.
Yago used these classes as high-level classes and further built the low-level classes by extracting classes from Wikidata to make the whole ontology more clear.
If Wikipedia articles lack some entities' classes and properties, Yago will check the labels in Wikipedia. If Wikipedia cannot satisfy the need, Yago will further extract data from Wikidata \cite{Yago}.
\begin{figure}
\centering
\includegraphics[width=\linewidth]{figures/Yago.pdf}
\caption{Using Yago to search ``Taylor Swift''.}
\label{fig:Yago example}
\end{figure}
\autoref{fig:Yago example}\footnote{\url{https://yago-knowledge.org/graph/yago:Taylor_Swift}} shows an example of the information of the famous singer ``Taylor$\_$Swift'' in Yago. This graph only shows a few of relationships and properties belonging to ``Taylor$\_$Swift''. In terms of top classes, Taylor Swift is a singer, so it belongs to the class ``Human'', which is a subclass of class ``Person'' . Note that ``Person'' is a subclass of the highest classes ``Thing'' from Schema.org.
For properties of ``Taylor$\_$Swift'', the symbol ``(+x)'' after every properties or entities is the number of relationships in this relationship or property. In \autoref{fig:Yago example}, we see ``rdfs:label'' and ``rdfs:comment'', which are datatype properties of ``Taylor$\_$Swift''.
``Rdfs:label" means her different names in different languages, e.g., Chinese name.
In \autoref{fig:Yago example}, ``schema:X'' symbolizes a relationship between entity``Taylor$\_$Swift'' and other entities where this X refers to different contents, e.g., ``schema:nationality(schema:national...)'' shows that the country of ``Taylor$\_$Swift'' is another entity ``United States''.
``Owl:sameAs'' is a link to other knowledge bases. In this example, ``wd:Q26875'' symbolizes ``Taylor$\_$Swift'' in Wikidata, and ``(+2)'' means that there are 1+2=3 connections to other knowledge bases.
\autoref{fig:Yago example} only shows a part of relationships and properties about entity ``Taylor Swif''. \autoref{fig:Yago sepcified example} is the page showing all related information about entity ``Taylor Swift''.
\begin{figure}
\centering
\includegraphics[width=\linewidth]{figures/3.pdf}
\caption{Using Yago to search ``Taylor Swift''.}
\label{fig:Yago sepcified example}
\end{figure}
\autoref{tab:Yago ontology}\footnote{\url{https://yago-knowledge.org/resource/yago:Taylor_Swift}} presents specific statistics of Yago. Here, the domain constraints mean some relationships only apply to some classes. For instance, ``birthPlace'' can only apply to a person and a place. Object range constraints and Datatype range constraints are similar to Domain constraints in function. Four of six major top-level classes (i.e., ``schema:BioChemicalEntity'', ``schema:Event'', ``schema:Person'', and ``schema:CreativeWork'') are pairwise disjoint, which implies that these classes cannot have any instances in common. As a result, the disjoint constraints can make these instances different\cite{Yago}. Note that these statistics are collected from the latest version of the Yago, called Yago 4, which is an RDFS knowledge base released in 2020.
\begin{table}[h]
\caption{Yago ontology statistics \cite{Yago}.}
\centering
\label{tab:Yago ontology}
\begin{tabular}{l c}
\hline
Item&Number\\
\hline\hline
Schema.org classes&235\\
\hline
Bioschema.org classes&6\\
\hline
Object Properties&100\\
\hline
Datatype properties&41\\
\hline
Node shapes&49\\
\hline
Property shapes&247\\
\hline
Domain constraints&247\\
\hline
Object range constraints&132\\
\hline
Datatype range constraints&57\\
\hline
Regex constraints&21\\
\hline
Disjoint constraints&18\\
\hline
Relationships/Facts&343M\\
\hline
\end{tabular}
\end{table}
\subsubsection{KBpedia}
The co-editors of KBpedia are Mike Bergman and Frédérick Giasson. Partial sponsorship of KBpedia has been provided by Cognonto Corporation. KBpedia was constructed by combining seven core knowledge bases, i.e., Wikipedia, Wikidata, schema.org, DBpedia, GeoNames, OpenCyc, and standard UNSPSC products and services. Until now, KBpedia has covered 98$\%$ Wikidata and nearly completely covers Wikipedia.
The upper structure of the KBpedia Knowledge Ontology (KKO) is informed by the triadic logic and universal categories of Charles Sanders Peirce. There are three categories in Peirce's trichotomy. The first category is about possibilities or potentials, the basic forces or qualities that combine or interact in various ways to enable the real things we perceive in the world, such as matter, life and ideas. The second category is about particular realized things or concepts we can describe such as an event, individual, entity. The third category is about laws, habits, regularities and continuities that may be generalized from particulars or possibilities. All generals — what are also known as classes, kinds or types — belong to this category\footnote{\url{https://kbpedia.org/docs/kko-upper-structure/}}.
Now, we use an example to introduce KBpedia structure. We use In KBpedia, each record has eight sections. The eight sections are ``Header'', ``Core Structure'', ``Extended Linkages'', ``Typologies'', ``Entities'', ``Aspect-related Entities'', ``Broader Concepts'', and``Narrower Concepts''. ``Header'' contains the alternative names, definition of ``Currency'' and image about this class (concept) if it has. The core structure contains sub-classes, super-classes and equivalent classes. Each item in this class is a mapping to the class in core knowledge bases. ``Extended Linkages'' is similar to ``Core structure'' but is connecting to more knowledge bases. Core knowledge bases are OpenCyc, UMBEL, GeoNames, DBpedia, Wikipedia and Wikidata. ``Entities'' is the same to the concept ``Entities'' in other knowledge bases. This item contains many entities and each entity has its properties and relationships with other entities. ``Aspect-related Entities'' are the entities related to class ``Currency'' but it provides a classifications for entities by situation for example related entities in financial. ``Typologies'' contain the core and extended typologies (classes) that the class ``Currency" belongs to. ``Typologies'' concept is similar to ``classes". KBpedia has 30 core typologies in total such as ``visual information''. Extended typologies indicate typologies that are not included in core typologies. ``Broader Concepts'' and ``Narrow Concepts'' correspond to super-classes and sub-classes.
\footnote{\url{https://kbpedia.org/use-cases/browse-the-knowledge-graph/}}
\autoref{tab:KBpedia statistics}\footnote{\url{https://kbpedia.org/resources/statistics/}} shows the ontology statistics of KBpedia. Ontology classes indicate the number of classes in ontology. Mapped vocabularies mean the number of mappings to those 7 knowledge bases and 16 extended vocabularies. Properties mean the number of relationships between different entities or entities and its properties.
\begin{table}[ht]
\caption{Some statistics of KBpedia ontology.}
\centering
\label{tab:KBpedia statistics}
\begin{tabular}{ll}
\hline
&Number\\
\hline
ontology classes&173\\
\hline
Number of mapped vocabularies&23\\
\hline
No. of properties(Sum)&5004\\
\hline
mappings to Wikidata&3970\\
\hline
mappings to schema.org&877\\
\hline
\end{tabular}
\end{table}
\subsection{Simple-schema Knowledge Bases}
Simple-schema knowledge bases are often designed for describing the information of objects in one particular area, so the numbers of object types and relation types are often very limited.
\subsubsection{DBLP}
As a computer science bibliography website, the DBLP was created in 1993 at Universität Trier in Germany. DBLP grew and became an organization hosting a programming bibliography database site from a collection of HTML files \cite{DBLP_lessons_learned}. DBLP became a branch of Schloss Dagstuhl – Leibniz-Zentrum für Informatik (LZI) in Novemberm 2018.
The typical types of objects in DBLP are publications, authors, conferences, journals, research topics, etc. \autoref{fig:DBlP example}\footnote{\url{https://dblp.org/search?q=hyperdoc2vec}} shows an example of a research paper record in DBLP, which includes five authors, paper title, conference name, published year, and page number.
\autoref{tab:DBLP general statistics}\footnote{\url{https://dblp.org/statistics/index.html}} and \autoref{tab:DBLP articles distribution}\footnote{\url{https://dblp.org/statistics/distributionofpublicationtype.html}} report some specific statistics of DBLP.\footnote{\url{https://dblp.org/statistics/distributionofpublicationtype.html}} \autoref{tab:DBLP general statistics} shows 4 top classes and the number of entities belong to each of them. For publications, DBLP has more detailed classification as shown in \autoref{tab:DBLP articles distribution}.
\begin{table}[ht]
\centering
\caption{The numbers of objects in each type in DBLP.}
\label{tab:DBLP general statistics}
\begin{tabular}{c c c c}
\hline
Publications&Authors&Conferences&Journals\\
\hline\hline
5633863&2773696&5438&1764\\
\hline
\end{tabular}
\end{table}
\begin{table}[ht]
\centering
\caption{DBLP articles distribution.}
\label{tab:DBLP articles distribution}
\begin{tabular}{l r}
\hline
Type&Percentage\\
\hline\hline
References work&0.48$\%$\\
\hline
Books and thesis&1.74$\%$\\
\hline
Parts in Book or Collections&0.70$\%$\\
\hline
Journal articles&39.19$\%$\\
\hline
Informal publications&6.84$\%$\\
\hline
Editorship&0.88$\%$\\
\hline
Conference and workshop papers&50.17$\%$\\
\hline
\end{tabular}
\end{table}
\begin{figure}[h]
\centering
\includegraphics[width=\linewidth]{figures/2.pdf}
\caption{An example research paper in DBLP.}
\label{fig:DBlP example}
\end{figure}
In \autoref{fig:DBlP example}, we present an example of the article titled ``Dynamic Mosaics'', which was written by Rahul Garg and Steven M, Seitz. This article was published in conference 3DIMPVT 2012 and its page number is 65-72. Note that if this article was published in another venue like a journal, then the conference name would be replaced by the name of the venue.
\subsubsection{IMDb}
IMDb is an online database containing information related to films, television programs, home videos, video games, and streaming content online.
IMDb was established in 1990 as a movie database on the Usenet group ``rec.arts.movies''. It moved to the web in 1993. Now, IMDb is owned and operated by Amazon.
\autoref{tab:IMDb statistics}\footnote{\url{https://www.imdb.com/pressroom/stats/}} shows the specific statistics for IMDb. IMDb mainly consist of seven types of entities, i.e., titles,
genres, filmography, names, images, and videos.
More precisely, the titles contain plot outline, literature, and keyword;
The genres contain drama, talk show, and romance;
The names contain article, birth name, etc.;
The filmography contains different people in different works such as actors, actresses, producers, writers, etc.;
Images contain images, publicity images, posters, etc.;
Videos contain trailers, clips, feature films, etc.
To illustrate the data, we show a part of the information for the record of the singer ``Taylor Swift'' in \autoref{fig:IM}\footnote{\url{https://www.imdb.com/find?q=Taylor+Swift&ref_=nv_sr_sm}}. Here, ``Taylor Swift'' is an entity, and the introduction of ``Taylor Swift'' is a property of ``Taylor Swift''.
The relationship could be considered as ``rdfs:comments'' in Yago. Entity ``Taylor Swift'' has other properties and relationships.
In the complete record of ``Taylor Swift'', the entity has three relationships to other entities, i.e., ``Photos'', ``Known For'', ``Filmography''. For example, each photo is an entity and every single photo has properties like titles or some other properties.
\begin{table}[h]
\centering
\caption{Some specific statistics of IMDb.}
\label{tab:IMDb statistics}
\begin{tabular}{l c c}
\hline
Item&Number&subclass types\\
\hline
Titles&7766299&19\\
\hline
Genres&12951717&28\\
\hline
Filmography&142530261&32\\
\hline
Names&10827285&12\\
\hline
Images&11856447&8\\
\hline
Videos&471449&7\\
\hline
\end{tabular}
\end{table}
\begin{figure}[h]
\centering
\includegraphics[width=\linewidth]{figures/6.pdf}
\caption{An example of search result in IMDb.}
\label{fig:IM}
\end{figure}
\subsubsection{GeoNames}
GeoNames is a user-editable geographical knowledge graph founded in 2005. GeoNames contains over 25,000,000 geographical names corresponding to over 11,800,000 unique features. Geonames is editable for everyone. In other words, if some false information entered the knowledge base and the information is not accessed frequently, it is difficult to find and fix it\cite{Geonames_accuracy}, which is one of the drawbacks of Geonames.
However, according to some studies, there is a way to adjust such information in the Geonames \cite{Geonames_improving}.
Geonames has nine feature classes and 645 feature codes. All coordinates in Geonames use the World Geodetic System 1984 (WGS84). Each feature in Geonames has its corresponding URI, which provides access to HTML wiki page, or a RDF description of the feature through content negotiation, using elements of the GeoNames ontology. This ontology describes the GeoNames features properties using the Web Ontology Language (OWL), the feature classes and codes being described in the SKOS language. GeoNames data are linked to DBpedia data and other RDF Linked Data through Wikipedia url in RDF descriptions.
\begin{figure}
\centering
\includegraphics[width=\linewidth]{figures/GEO.pdf}
\caption{Example of ``New York City'' in GeoNames.}
\label{fig:geo}
\end{figure}
We use the entity of ``New York City'' as an example to show the data of GeoNames. As shown in \autoref{fig:geo}\footnote{\url{https://www.geonames.org/5128581/new-york-city.html}}, the population is a property of ``New York City'' and its value is 8175133. Its first order administrative division is ``New York'' and its country is ``United States'', which are entities in GeoNames.
\autoref{tab:Geonames statistics}\footnote{\url{https://www.geonames.org/statistics/total.html}} presents some specific statistics data for GeoNames. Specifically, Geonames has 9 top classes \cite{schema_for_Geonames}:
Administrative Boundary Features describes the ways as how to define a complete Administrative boundary and its levels;
Hydrographic Features define the classes of hydrographic items like ``lake'', ``well'', and ``stream'';
Area Features contain ``park'', ``locality'', etc.;
Populated Place Features describe the features in area with many people such as populated locality and religious populated place;
Road/Railroad Features contain ``road junction'';
Spot features contain specified spot like ``farm'' and ``school'';
Hypsographic Features contain ``mountain'', ``hill'', ``island'', etc.;
Undersea Features contains ``shoals'', ``canyon'', etc.;
Vegetation Features contains ``forest'', ``grove'', etc.
A more detailed introduction of these statistics could be found from \cite{schema_for_Geonames}.
\begin{table}[h]
\centering
\caption{Some specific statistics of GeoNames.}
\label{tab:Geonames statistics}
\begin{tabular}{l c c}
\hline
Item&Number&Subfeatures Types\\
\hline\hline
Administrative Boundary Features&452363&25\\
\hline
Hydrographic Features&2236741&135\\
\hline
Area Features&417387&49\\
\hline
Populated Place Features&4793777&19\\
\hline
Road/Railroad Features&52112&21\\
\hline
Spot Features&2440626&254\\
\hline
Hypsographic Features&1598944&99\\
\hline
Undersea Features&14899&63\\
\hline
Vegetation Features&48709&18\\
\hline
Undefined&5058&\\
\hline
\end{tabular}
\end{table}
\section{Conclusions and Future Work}
In this paper, we present the general statistics of several knowledge bases, which are publicly accessible and receive much attention from both academic area and industry area. In particular, we divide the knowledge graphs into schema-rich knowledge bases and simple-schema knowledge bases. We introduce their common statistics and also the specific statistics of each knowledge base. We hope that by providing such statistics, the paper can make researchers have a better understanding of existing open-source knowledge bases.
In the future, we will continue to update the statistics of popular publicly accessible knowledge bases. On the one hand, the existing knowledge bases are growing as new information is included. On the other hand, more knowledge bases will be released and made publicly accessible. Thus, we will keep updating this paper continuously to ensure the statistics data in this paper could provide up-to-date information.
\bibliographystyle{ACM-Reference-Format}
|
\section{Introduction}\label{sec:introduction}
The classical Borsuk-Ulam theorem states that for all $n\in \mathbb{N}$ and any continuous map $\map{f}{\mathbb{S}^n}[\mathbb{R}^n]$, there exists a point $x\in \mathbb{S}^n$ such that $f(-x)=f(x)$~\cite[Satz~II]{Bo}. This result has since been generalised in many directions, and the reader may consult the extensive survey~\cite{Sten}, the book~\cite{Mato}, as well as the papers~\cite{BiaMat,CotVen,Dol,Fad,FadHus,Izy,IzyJaw,Mar,MarMatSan} (note that this list is by no means exhaustive). One such generalisation consists in the study of the validity of the theorem when we replace $\mathbb{S}^n$ and $\mathbb{R}^n$ by manifolds $M$ and $N$ respectively, and we replace the antipodal map of $\mathbb{S}^n$ by a free involution $\tau$ of $M$. More precisely, the triple $(M,\tau;N)$ is said to have the Borsuk-Ulam property if for any continuous map $\map{f}{M}[N]$, there exists a point $x \in M$ for which $f(\tau(x))=f(x)$. Some examples of results in this direction may be found in~\cite{BarGonVen,DesPerVen,Gon,GonGua,GonSan}. Very recently, the following more refined Borsuk-Ulam-type problem was introduced by the authors in the context of homotopy classes of maps from $M$ to $N$~\cite{GonGuaLaa1}. If $\beta\in [M,N]$ is a homotopy class of maps between $M$ and $N$, $\beta$ is said to have the Borsuk-Ulam property with respect to $\tau$ if for every map $f\in \beta$, there exists a point $x\in M$ (that depends on $f$) such that $f(\tau(x))=f(x)$. If a triple $(M, \tau; N)$ satisfies the Borsuk-Ulam property, then it is certainly the case that every homotopy class of maps between $M$ and $N$ satisfies the Borsuk-Ulam property with respect to $\tau$. The study of the converse leads to an interesting and delicate question that was posed in~\cite{GonGuaLaa1}, namely the classification of those elements of $[M,N]$ that satisfy the Borsuk-Ulam property with respect to the possible free involutions $\tau$ of $M$. In that paper, the authors solved this problem in the cases where $M=N$ and $M$ is either the $2$-torus $\mathbb{T}^2$ or the Klein bottle $\mathbb{K}^2$. It is then natural to consider the case $M=\mathbb{T}^2$ and $N=\mathbb{K}^2$. In this case, if $\tau$ is a free involution of $\mathbb{T}^2$ then the corresponding orbit space $\mathbb{T}^2/\langle\tau\rangle$ is either $\mathbb{T}^2$ and $\mathbb{K}^2$. In the first case, where $\mathbb{T}^2/\langle\tau\rangle=\mathbb{T}^2$, the authors recently determined the elements of the set $[\mathbb{T}^2,\mathbb{K}^2]$ that possess the Borsuk-Ulam property with respect to $\tau$~\cite{GonGuaLaa2}. The current paper is a continuation of~\cite{GonGuaLaa2}, in the sense that we determine the elements of the set $[\mathbb{T}^2,\mathbb{K}^2]$ that possess the Borsuk-Ulam property with respect to $\tau$ in the second case, where $\mathbb{T}^2/\langle\tau\rangle=\mathbb{K}^2$. In each of the two cases, by~\cite[Proposition~21]{GonGuaLaa1} there is only one class of free involutions, and by~\cite[Proposition~8]{GonGuaLaa1}, it suffices to consider a specific free involution of $\mathbb{T}^2$.
In order to state Theorem~\ref{th:BORSUK_TAU_2}, which is the main result of this paper, we first recall some facts and notation. As in~\cite[Theorems~12 and~19]{GonGuaLaa1}, we identify $\pi_1 (\mathbb{T}^2,\ast )$ and $\pi_1 (\mathbb{K}^2, \ast)$ with the free Abelian group $\mathbb{Z} \oplus \mathbb{Z}$ and the (non-trivial) semi-direct product $\mathbb{Z} \rtimes \mathbb{Z}$ respectively. Consider the following short exact sequence:
\begin{align}
& 1 \to \pi_1(\mathbb{T}^2)= \mathbb{Z} \oplus \mathbb{Z} \stackrel{i_2}{\longrightarrow} \pi_1(\mathbb{K}^2)= \mathbb{Z} \rtimes \mathbb{Z} \stackrel{\theta_2}{\longrightarrow} \mathbb{Z}_2 \to 1,\label{eq:homo_tau_2}
\end{align}
where the homomorphisms $i_{2}$ and $\theta_{2}$ are defined by:
\begin{equation*}
\text{$i_2\colon\thinspace\begin{cases}
(1,0) \longmapsto (1,0)\\
(0,1) \longmapsto (0,2)
\end{cases}$ and
$\theta_2\colon\thinspace\begin{cases}
(1,0) \longmapsto \overline{0}\\
(0,1) \longmapsto \overline{1}.
\end{cases}$}
\end{equation*}
By standard results in covering space theory, there exists a double covering $\map{c_2}{\mathbb{T}^2}[\mathbb{K}^2]$ whose induced homomorphism on the level of fundamental groups is $i_2$. If $\map{\tau_2}{\mathbb{T}^2}$ is the non-trivial deck transformation associated with $c_2$, then it is a free involution. Further, $\tau_{2}$ lifts to a homeomorphism $\map{\widehat{\tau}_{2}}{\mathbb{R}^2}$, where $\widehat{\tau}_{2}(x,y)=(x+\frac{1}{2},1-y)$ for all $(x,y)\in \mathbb{R}^2$.
We recall an appropriate algebraic description of the set $[\mathbb{T}^2,\mathbb{K}^2]$ that was given in~\cite[Proposition~1.1 and Remark~1.2]{GonGuaLaa2}.
\begin{proposition}\label{prop:set_homotopy}
The set $[\mathbb{T}^2,\mathbb{K}^2]$ is in bijection with the subset of $\hom(\mathbb{Z} \oplus \mathbb{Z},\mathbb{Z} \rtimes \mathbb{Z})$ whose elements are described as follows:
\begin{multicols}{2}
\setlength{\parskip}{0.2\baselineskip}
Type 1: ${\allowdisplaybreaks
\begin{cases}
(1,0) \longmapsto (i,2s_1+1)\\
(0,1) \longmapsto (0,2 s_2 )
\end{cases}}$
Type 3: ${\allowdisplaybreaks
\begin{cases}
(1,0) \longmapsto (0,2s_1)\\
(0,1) \longmapsto (i,2 s_2 +1)
\end{cases}}$
Type 2: ${\allowdisplaybreaks
\begin{cases}
(1,0) \longmapsto (i,2s_1+1)\\
(0,1) \longmapsto (i,2 s_2+1)
\end{cases}}$
Type 4: ${\allowdisplaybreaks
\begin{cases}
(1,0) \longmapsto (r_1,2s_1)\\
(0,1) \longmapsto (r_2,2 s_2 ),
\end{cases}}$
\end{multicols}
\noindent where $i \in \{0,1 \}$ and $s_1, s_2 \in \mathbb{Z}$ for Types~1,~2 and~3, and $r_1, r_2, s_1, s_2 \in \mathbb{Z}$ and $r_1 \geq 0$ for Type~4.
\end{proposition}
\begin{remark}\label{rem:homotopy_pi1}
The bijection of Proposition~\ref{prop:set_homotopy} may be obtained using standard arguments in homotopy theory that are described in detail in~\cite[Chapter~V, Corollary~4.4]{White}, and more briefly in~\cite[Theorem~4]{GonGuaLaa1}. Within the framework of this paper, it may be defined as follows: given a homotopy class $\beta \in [\mathbb{T}^2,\mathbb{K}^2]$, there exists a pointed map $\map{f}{(\mathbb{T}^2,\ast)}[(\mathbb{K}^2,\ast)]$ that gives rise to a representative of $\beta$ if we omit the basepoints. The induced homomorphism $\map{f_\#}{\pi_1(\mathbb{T}^2,\ast)}[\pi_1(\mathbb{K}^2,\ast)]$ is conjugate to exactly one of the elements of $\hom(\mathbb{Z} \oplus \mathbb{Z},\mathbb{Z} \rtimes \mathbb{Z})$, denoted by $\beta_\#$, and described in Proposition~\ref{prop:set_homotopy}. Note that $\beta_\#$ is independent of the choice of $f$.
\end{remark}
The following theorem is the main result of this paper.
\begin{theorem}\label{th:BORSUK_TAU_2}
Let $\beta \in [\mathbb{T}^2,\mathbb{K}^2]$, and let $\beta_\# \in \hom(\mathbb{Z} \oplus \mathbb{Z},\mathbb{Z} \rtimes \mathbb{Z})$. Then $\beta$ has the Borsuk-Ulam property with respect to $\tau_2$ if and only if one of the following conditions is satisfied:
\begin{enumerate}[(a)]
\item $\beta_\#$ is a homomorphism of Type~1, and $s_2$ is even.
\item $\beta_\#$ is a homomorphism of Type~2.
\item $\beta_\#$ is a homomorphism of Type~3, and $s_1 \neq 0$.
\item $\beta_\#$ is a homomorphism of Type~4, and one of the following conditions holds:
\begin{enumerate}[(i)]
\item $r_2 s_1 \neq 0$.
\item $r_2 = s_2 = 0$ and $s_1 \neq 0$.
\item $s_1 = s_2 = 0$, $r_1 \neq 0$ and $r_2$ is even.
\end{enumerate}
\end{enumerate}
\end{theorem}
It follows from Theorem~\ref{th:BORSUK_TAU_2} and the remarks in the first paragraph regarding~\cite[Propositions~8 and~21]{GonGuaLaa1} that if $\tau$ is an arbitrary free involution of $\mathbb{T}^2$, one may decide which elements of the set $[\mathbb{T}^2,\mathbb{K}^2]$ possess the Borsuk-Ulam property with respect to $\tau$, which solves the Borsuk-Ulam problem for $[\mathbb{T}^2,\mathbb{K}^2]$.
One of the main tools used in this paper is the study of a certain two-variable equation in the $2$-string pure braid group of the Klein bottle, as well as some additional information that may be obtained from the fundamental groups of the torus and the Klein bottle. So the solutions of certain equations in the braid groups of some of the surfaces in question play an important r\^ole in the resolution of the Borsuk-Ulam problem for homotopy classes. These equations are derived from a commutative diagram involving fundamental groups and $2$-string braid groups of the surfaces (see~\cite[Theorem~7]{GonGuaLaa1} for more details).
The rest of this paper comprises two sections. In Section~\ref{sec:equalg}, we start by recalling some notation and a number of previous results. In Proposition~\ref{prop:p2_k2}, we describe some relevant properties of the $2$-string pure braid group $P_{2}(\mathbb{K}^2)$ of the Klein bottle that appeared in~\cite{GonGuaLaa2}. In Lemma~\ref{lem:algebra_tau_2}, we give an algebraic criterion involving elements of $P_{2}(\mathbb{K}^2)$ for a homotopy class to satisfy the Borsuk-Ulam property, and in Lemma~\ref{lem:lemma_1}, we derive a useful necessary condition, in terms of the existence of solutions to a certain equation in a free Abelian group of infinite rank, for a given homotopy class to satisfy this property. Section~\ref{sec:borsuk_2} of the paper is devoted to proving Theorem~\ref{th:BORSUK_TAU_2}. The proof will follow from Propositions~\ref{prop:tau_2_case_23I}--\ref{prop:tau_2_case_6I} whose statements correspond to the types of homotopy classes given by Proposition~\ref{prop:set_homotopy}.
\section{Preliminaries and algebraic criteria}\label{sec:equalg}
Let $\alpha=[f] \in [ \mathbb{T}^2,\ast ; \mathbb{K}^2,\ast]$ be a pointed homotopy class, let $\beta \in [ \mathbb{T}^2,\mathbb{K}^2]$ be the homotopy class for which $f$ is a representative map if we omit the basepoints, and let $\map{\tau_2}{\mathbb{T}^2}$ be the free involution defined in the Introduction. By~\cite[Theorem~7(b)]{GonGuaLaa1}, $\alpha$ has the Borsuk-Ulam property with respect to the free involution $\tau_2$ if and only if $\beta$ does. So to prove Theorem~\ref{th:BORSUK_TAU_2}, it suffices to restrict our attention to pointed homotopy classes. Let $\alpha_\#$ denote the induced homomorphism $\map{f_\#}{\pi_1 (\mathbb{T}^2 , \ast)}[\pi_1 (\mathbb{K}^2 , \ast)]$. We will make use of the following properties of the $2$-string pure braid group $P_2 (\mathbb{K}^2)$ of $\mathbb{K}^2$ that were derived in~\cite[Section~3]{GonGuaLaa2}.
\begin{proposition}\cite[Propositions~3.1, 3.3 and~3.5]{GonGuaLaa2}\label{prop:p2_k2}
The group $P_2(\mathbb{K}^2)$ is isomorphic to the semi-direct product $F(u,v) \rtimes_\theta (\mathbb{Z} \rtimes \mathbb{Z})$, where $F(u,v)$ is the free group of rank $2$ on the set $\{u,v\}$, and the action $\map{\theta}{\mathbb{Z} \rtimes \mathbb{Z}}[\operatorname{Aut}(F(u,v))]$ is defined as follows:
\begin{equation*}
\theta(m,n): \begin{cases}
u \longmapsto B^{m-\delta_n} u^{\varepsilon_n} B^{-m+\delta_n}\\
v \longmapsto B^m v u^{-2m} B^{-m+\delta_n}\\
B \longmapsto B^{\varepsilon_n},
\end{cases}
\end{equation*}
where $\delta_n=\begin{cases}
0 & \text{if $n$ is even}\\
1 & \text{if $n$ is odd,}
\end{cases}$ $\varepsilon_n=(-1)^n$ and $B=uvuv^{-1}$. With respect to this decomposition, the following properties hold:
\begin{itemize}
\item the standard Artin generator $\sigma \in B_2(\mathbb{K}^2)$ satisfies $\sigma^2 =(B ; 0,0)$.
\item if $\map{l_\sigma}{P_2(\mathbb{K}^2)}$ is the homomorphism defined by $l_\sigma(b)=\sigma b \sigma^{-1}$ for all $b \in P_2 (\mathbb{K}^2)$, then:
\begin{align*}
l_\sigma(u^r;0,0)&=((Bu^{-1})^r B^{-r} ; r,0) & l_\sigma(\boldsymbol{1};m,0)&=(\boldsymbol{1} ; m,0)\\
l_\sigma(v^s;0,0)&=((uv)^{-s} (u B)^{\delta_s} ; 0,s) & l_\sigma(\boldsymbol{1};0,n) &=(B^{\delta_n} ; 0,n)\\
l_\sigma(B;0,0)&=(B ; 0,0) &&
\end{align*}
for all $m,n,r,s \in \mathbb{Z}$, where the symbol $\boldsymbol{1}$ denotes the trivial element of $F(u,v)$.
\item if $\map{p_1}{F_2 (\mathbb{K}^2)}[\mathbb{K}^2]$ is the map defined by $p_1(x,y)=x$, then the induced homomorphism $\map{(p_1)_\#}{P_2(\mathbb{K}^2)}[\pi_1(\mathbb{K}^2)=\mathbb{Z} \rtimes \mathbb{Z}]$ satisfies $(p_1)_\# (w; r,s)=(r,s)$.
\end{itemize}
Given an element $w \in F(u,v)$, let $\rho(w) \in F(u,v)$ and $g(w) \in \mathbb{Z} \rtimes \mathbb{Z}$ such that $l_\sigma(w ; 0, 0)=(\rho(w),g(w))$. Then $\map{g}{F(u,v)}[\mathbb{Z} \rtimes \mathbb{Z}]$ is the homomorphism defined on the basis $\{ u , v \}$ by:
\begin{equation*}
\begin{cases}
g(u)=(1,0)\\
g(v)=(0,1).
\end{cases}
\end{equation*}
Let $\overline{\left\langle \sigma^2 \right\rangle}$ be the normal closure of the element $\sigma^2$.
Up to isomorphism, $\overline{\left\langle \sigma^2 \right\rangle}$ may be identified with the group $\ker g$ which is the free group of infinite countable rank on the set $\{ B_{k,l} \}_{k,l\in \mathbb{Z}}$, where $B_{k,l} =v^k u^l B u^{-l} v^{-k}$ for all $k,l \in \mathbb{Z}$.
With respect to this description, the action $\map{\theta}{\mathbb{Z} \rtimes \mathbb{Z}}[\operatorname{Aut}F(u,v)]$ and the map $\map{\rho}{F(u,v)}$ induce homomorphisms $\mathbb{Z} \rtimes \mathbb{Z} \to \overline{\left\langle \sigma^2 \right\rangle}$ and $\overline{\left\langle \sigma^2 \right\rangle} \to \overline{\left\langle \sigma^2 \right\rangle}$ respectively, which we also denote by $\theta$ and $\rho$ respectively. Let $w \in F(u,v)$, and let $g(w)=(r,s)$. Then there exists a unique element $x \in \overline{\left\langle \sigma^2 \right\rangle}$ such that $w=u^r v^s x$.
\end{proposition}
The following algebraic criterion, similar to that of~\cite[Lemma~23]{GonGuaLaa1}, will be used in what follows to decide whether a pointed homotopy class possesses the Borsuk-Ulam property with respect to $\tau_2$.
\begin{lemma}\label{lem:algebra_tau_2}
A pointed homotopy class $\alpha \in [\mathbb{T}^2,\ast ; \mathbb{K}^2, \ast]$ does not have the Borsuk-Ulam property with respect to $\tau_2$ if and only if there exist $a,b \in P_2 (\mathbb{K}^2)$ such that:
\begin{enumerate}[(i)]
\item\label{eq:algebra_i} $a b l_\sigma(a)=b$.
\item\label{eq:algebra_ii} $(p_1)_\# (a)= \alpha_\# (1,0)$.
\item\label{eq:algebra_iii} $(p_1)_\# (b l_\sigma(b))=\alpha_\# (0,1)$.
\end{enumerate}
\end{lemma}
\begin{proof}
The proof is similar to that of~\cite[Lemma~23]{GonGuaLaa1}, using Proposition~\ref{prop:p2_k2} instead of~\cite[Theorem~12]{GonGuaLaa1}, and the details are left to the reader.
\end{proof}
\begin{corollary}\label{cor:reduction_tau_2}
Let $\alpha , \alpha' \in [ \mathbb{T}^2 , \ast ; \mathbb{K}^2 , \ast]$ be pointed homotopy classes, and suppose that:
\begin{equation*}
\text{$\alpha_\#: \begin{cases}
(1,0) \longmapsto (r_1 , s_1)\\
(0,1) \longmapsto (r_2 , s_2)
\end{cases}$
and $\alpha'_\#: \begin{cases}
(1,0) \longmapsto (r_1 , s_1)\\
(0,1) \longmapsto (r_2 , s_2')
\end{cases}$}
\end{equation*}
for some $r_1, r_2 , s_1 , s_2 , s_2' \in \mathbb{Z}$. If $s_2 \equiv s_2' \bmod 4$ then $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$ if and only if $\alpha'$ has the Borsuk-Ulam property with respect to $\tau_2$.
\end{corollary}
\begin{proof}
Since the statement is symmetric with respect to $\alpha$ and $\alpha'$, it suffices to show that if $\alpha$ does not have the Borsuk-Ulam property then neither does $\alpha'$. If $\alpha$ does not have the Borsuk-Ulam property, there exist $a,b \in P_2(\mathbb{K}^2)$ satisfying~(\ref{eq:algebra_i})--(\ref{eq:algebra_iii}) of Lemma~\ref{lem:algebra_tau_2}. By hypothesis, there exists $k \in \mathbb{Z}$ such that $s'_2=s_2+4 k$. Let $b'=b (\boldsymbol{1} ; 0 , 2 k)$. As in the proof of~\cite[Corollary~4.2]{GonGuaLaa2}, the centre of $B_2(\mathbb{K}^2)$ is generated by $(\boldsymbol{1} ; 0 , 2)$, so $ab' l_\sigma(a)=a b l_\sigma(a) (\boldsymbol{1} ; 0 , 2 k)=b(\boldsymbol{1} ; 0 , 2 k)=b'$ by~(\ref{eq:algebra_i}), $(p_1)_\# (a)= \alpha_\# (1,0)=\alpha'_\# (1,0)$ by~(\ref{eq:algebra_ii}), and:
\begin{align*}
(p_1)_\# (b' l_\sigma(b')) &= (p_1)_\# (b(\boldsymbol{1} ; 0 , 2 k) l_\sigma(b (\boldsymbol{1} ; 0 , 2 k)))
= (p_1)_\# (b l_\sigma(b)) (p_1)_\# (\boldsymbol{1}; 0 , 4k) \\
& \stackrel{\text{(\ref{eq:algebra_iii})}}{=} (r_2,s_2)(0, 4 k)=(r_2 , s_2')=\alpha'_\# (0,1).
\end{align*}
Lemma~\ref{lem:algebra_tau_2} implies that $\alpha'$ does not have the Borsuk-Ulam property with respect to $\tau_2$, from which the result follows.
\end{proof}
In addition to Proposition~\ref{prop:p2_k2}, we use some facts and notation about some automorphisms and elements of $\overline{\left\langle \sigma^2 \right\rangle}$ that are summarised in the following proposition. If $l\in \mathbb{Z}$, let $\sigma_{l}$ denote its sign, \emph{i.e}\ $\sigma_{l}=1$ if $l>0$, $\sigma_{l}=-1$ if $l<0$, and $\sigma_{l}=0$ if $l=0$, and if $x$ and $y$ are elements of a group then let $[x,y]=xyx^{-1}y^{-1}$ denote their commutator.
\begin{proposition}\cite[equations~(3.14)--(3.16) and Proposition~3.7]{GonGuaLaa2}\label{prop:gsigma}
The group $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ is free Abelian, and $\{ B_{k,l} := v^k u^l B u^{-l} v^{-k}\; | \; k,l\in \mathbb{Z} \}$ is a basis, namely:
\begin{equation*}
\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}= \bigoplus_{k,l \in \mathbb{Z}} \mathbb{Z} \left[ B_{k,l} \right].
\end{equation*}
Let $p,q \in \mathbb{Z}$ and consider the following automorphism of $\overline{\left\langle \sigma^2 \right\rangle}$:
\begin{equation}\label{eq:defcpq}
\begin{array}{rrcl}
c_{p,q}: & \overline{\left\langle \sigma^2 \right\rangle} & \longrightarrow & \overline{\left\langle \sigma^2 \right\rangle}\\
& x & \longmapsto & v^p u^q x u^{-q} v^{-p}.
\end{array}
\end{equation}
For all $(m,n) \in \mathbb{Z} \rtimes \mathbb{Z}$ and $p,q \in \mathbb{Z}$, the endomorphisms $\theta(m,n), \rho$ and $(c_{p,q})$ of $\overline{\left\langle \sigma^2 \right\rangle}$ induce endomorphisms $\theta(m,n)_{\text{Ab}}, \rho_{\text{Ab}}$ and $(c_{p,q})_{\text{Ab}}$ of $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ respectively, and they satisfy:
\begin{align}
\theta(m,n)_{\text{Ab}}(B_{k,l}) &= { \varepsilon_n}B_{k ,\varepsilon_n l-2 \delta_k m} \label{eq:homo_gsigmab_theta} \\
\rho_{\text{Ab}}(B_{k.l}) &={\varepsilon_k} B_{-k,\varepsilon_{(k+1)} l}, \text{ and} \label{eq:homo_gsigmab_rho} \\
(c_{p,q})_{\text{Ab}}(B_{k,l}) &= B_{k+p, l+\varepsilon_{k} q}. \label{eq:homo_gsigmab_cpq}
\end{align}
If $k,l \in \mathbb{Z}$ and $r \in \{ 0 , 1 \}$, consider the following elements of $F(u,v)$:
\begin{equation}\label{eq:defTIOJ}
\text{$T_{k,r}= u^{k} (B^{\varepsilon_{r}} u^{-\varepsilon_{r}})^{k\varepsilon_{r}}$, $I_{k}=v^{k} (v B )^{-k}$, $O_{k,l}=\left[ v^{2k},u^l \right]$ and $J_{k,l}=v^{2k}(v u^l )^{-2k}$.}
\end{equation}
Then $T_{k,r}, I_{k}, O_{k,l}$ and $J_{k,l}\in \overline{\left\langle \sigma^2 \right\rangle}$. Let $\widetilde{T}_{k,r}$, $\widetilde{I}_k$, $\widetilde{O}_{k,l}$ and $\widetilde{J}_{k,l}$ be the projections of $T_{k,r}, I_{k}, O_{k,l}$ and $J_{k,l}$ in $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$.
\begin{enumerate}[(a)]
\item\label{it:wordsb} If $k=0$ then $\widetilde{T}_{0,r}=\widetilde{I}_0=0$, and if $k=0$ or $l=0$ then $\widetilde{O}_{k,l}=\widetilde{J}_{k,l}=0$.
\item\label{it:wordsc} For all $k,l \neq 0$:
\begin{align*}
\hspace*{-6mm}\widetilde{I}_k&=- \sigma_{k} \sum_{i=1}^{\sigma_k k} B_{\sigma_k i+(1-\sigma_k )/2 ,0} & \widetilde{O}_{k,l}&=\sigma_k \sigma_l \sum_{i=1}^{\sigma_k k} \sum_{j=1}^{\sigma_l l} \bigl(B_{\sigma_k (2i-1 ),-\sigma_l j+(\sigma_l -1 )/2}
- B_{ \sigma_k (2i-1) -1 , \sigma_l j-(1+\sigma_l)/2}
\bigr)\\
\hspace*{-6mm}\widetilde{T}_{k,r}&= \sigma_{k} \sum_{i=1}^{\sigma_{k}k} B_{0,\sigma_{k}(i+(\sigma_{k}(1-2r)-1)/2)} & \widetilde{J}_{k,l}&=-\sigma_{k}\sigma_{l} \sum_{i=1}^{\sigma_{k}k} \sum_{j=1}^{\sigma_{l}l} B_{\sigma_{k}(2i-1), \sigma_{l}(j-(1+\sigma_{l})/2)}.
\end{align*}
\end{enumerate}
\end{proposition}
If $k,l \in \mathbb{Z}$, let:
\begin{equation}\label{eq:defQ}
Q_{k,l}=u^k v^{2l+1} u^k v^{-2l-1} \in F(u,v).
\end{equation}
\begin{proposition}\label{prop:element_q}
Let $k,l \in \mathbb{Z}$. Then $Q_{k,l} \in \overline{\left\langle \sigma^2 \right\rangle}$, and $Q_{0,l}=\boldsymbol{1}$. If $\widetilde{Q}_{k,l}$ denotes the projection of $Q_{k,l}$ in $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ then for all $k\neq 0$:
\begin{equation}\label{eq:formqkl}
Q_{k,l}=O_{l,k}^{-1} \left(\prod_{i=1}^{\sigma_k k} B_{2l,-i+k (1+\sigma_k)/2}\right)^{\sigma_k}
\end{equation}
and
\begin{equation}\label{eq:formqkl2}
\widetilde{Q}_{k,l} =-\widetilde{O}_{l,k}+\sigma_k \sum_{i=1}^{\sigma_k k} B_{2l,\sigma_k i-(1+\sigma_k)/2}.
\end{equation}
\end{proposition}
\begin{proof}
Clearly $Q_{0,l}=\boldsymbol{1}$ for all $l\in \mathbb{Z}$. So assume that $k\neq 0$, and suppose first that $l=0$. If $\lvert k\rvert=1$ then $Q_{k,0}=u^{k} v u^{k} v^{-1}=B_{0,-1+(1+\sigma_{k})/2}^{\sigma_{k}}$, and~(\ref{eq:formqkl}) is valid in this case.
Suppose then that~(\ref{eq:formqkl}) holds for some $k\neq 0$. Then by induction we have:
\begin{align*}
Q_{k+\sigma_{k},0} &= u^{\sigma_{k}} u^{k}vu^{k}v^{-1} u^{-\sigma_{k}} \ldotp u^{\sigma_{k}} v u^{\sigma_{k}} v^{-1}= c_{0,\sigma_{k}} (Q_{k,0}) \ldotp B_{0,-1+(1+\sigma_{k})/2}^{\sigma_{k}}\\
& =\left(\prod_{i=1}^{\sigma_k k} B_{0,-i+\sigma_k+k(1+\sigma_k)/2}\right)^{\sigma_k} B_{0,-1+(1+\sigma_{k})/2}^{\sigma_{k}}\\
&=\begin{cases}
\left(\displaystyle\prod_{i=1}^{k} B_{0,-i+1+k}\right) B_{0,0}= \displaystyle\prod_{i=1}^{k+1} B_{0,-i+1+k} & \text{if $k>0$}\\
\left(\displaystyle\prod_{i=1}^{-k} B_{0,-i-1}\right)^{-1} B_{0,-1}^{-1}=\left(\displaystyle\prod_{i=1}^{-(k-1)} B_{0,-i}\right)^{-1} & \text{if $k<0$.}
\end{cases}
\end{align*}
Thus~(\ref{eq:formqkl}) holds for all $k\neq 0$ and $l=0$. Finally, suppose that $k \neq 0$ and $l\neq 0$. Then from the case $l=0$, we have:
\begin{align*}
Q_{k,l} & =(u^k v^{2l} u^{-k} v^{-2l}) v^{2l} (u^k v u^k v^{-1}) v^{-2l}=O_{l,k}^{-1} c_{2l,0} (Q_{k,0})=O_{l,k}^{-1} c_{2l,0} \left(\prod_{i=1}^{\sigma_k k} B_{0,-i+k (1+\sigma_k)/2 }\right)^{\sigma_k}\\
&= O_{l,k}^{-1} \left(\prod_{i=1}^{\sigma_k k} B_{2l,-i+k (1+\sigma_k)/2 }\right)^{\sigma_k}.
\end{align*}
and (\ref{eq:formqkl}) holds in this case. So for all $k,l\in \mathbb{Z}$, (\ref{eq:formqkl}) is valid, and $Q_{k,l} \in \overline{\left\langle \sigma^2 \right\rangle}$. Equation~(\ref{eq:formqkl2}) then follows by projecting into $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ and using the fact that the sets $\{ -i+k(1+\sigma_k)/2 \, | \, 1 \leq i \leq \sigma_k k \}$ and $\{ \sigma_k i - (1+\sigma_k)/2 \, | \, 1 \leq i \leq \sigma_k k \}$ are equal.
\end{proof}
Let $a,b\in P_{2}(\mathbb{K}^2)$. By~\cite[Lemma~4.8]{GonGuaLaa2}, there exist $a_1,a_2,b_1,b_2, m_1,n_1,m_{2}, n_{2} \in \mathbb{Z}$ and $x,y \in \overline{\left\langle \sigma^2 \right\rangle}$ such that:
\begin{equation}\label{eq:normformab}
\text{$a=(u^{a_1} v^{a_2} x ; m_1 , n_1)$ and $b=(u^{b_1} v^{b_2} y ; m_{2} , n_{2})$.}
\end{equation}
Exchanging the r\^oles of $a$ and $b$ in~\cite[equations~(4.5),~(4.6) and~(4.8)]{GonGuaLaa2}, and noting that $a_{2}$ is not necessarily zero (as it was in the proof of~\cite[Lemma~4.8]{GonGuaLaa2}), it follows that:\\
\begin{align}
bl_{\sigma}(a)
=& (u^{b_1} v^{b_2} y \theta(m_{2} , \delta_{n_{2}})((Bu^{-1})^{a_{1}} B^{-a_{1}} \theta(a_{1},0)((uv)^{-a_{2}}(uB)^{\delta_{a_{2}}}) \theta(a_{1},\delta_{a_{2}})(\rho(x) B^{\delta_{n_{1}}}));\notag\\
& m_{2}+ \varepsilon_{n_{2}}(a_{1}+(-1)^{\delta_{a_{2}}}m_{1}), a_{2}+n_{1}+n_{2})\notag\\
=& (u^{b_1} v^{b_2} y \theta(m_{2} , \delta_{n_{2}})((Bu^{-1})^{a_{1}} B^{-a_{1}})\theta(m_{2}+ \varepsilon_{n_{2}}a_{1} , \delta_{n_{2}})((uv)^{-a_{2}}(uB)^{\delta_{a_{2}}}) \notag\\
&\theta(m_{2}+\varepsilon_{n_{2}}a_{1} , \delta_{n_{2}}+\delta_{a_{2}})(\rho(x) B^{\delta_{n_{1}}}); m_{2}+ \varepsilon_{n_{2}}(a_{1}+(-1)^{\delta_{a_{2}}}m_{1}), a_{2}+n_{1}+n_{2}).\label{eq:blsiga}
\end{align}
In a similar manner, exchanging the r\^oles of $a$ and $b$ in~\cite[equation~(4.4)]{GonGuaLaa2}, replacing $b$ by $a$ in~\cite[equation~(4.5)]{GonGuaLaa2}, and then substituting $a$ (resp.\ $b$) by $ab$ (resp.\ $a$) in~\cite[equation~(4.6)]{GonGuaLaa2}, we see that:
\begin{align}\label{eq:a_b_lsigma_a1}
abl_\sigma(a)
= & (u^{a_1}v^{a_2} x \theta(m_1,\delta_{n_1})(u^{b_1}v^{b_2}y) \theta(m_1+\varepsilon_{n_1}m_2,\delta_{n_1+n_2})((Bu^{-1})^{a_{1}} B^{-a_{1}} \theta(a_1,0)((uv)^{-a_2}(uB)^{\delta_{a_2}} \nonumber \\
& \theta(0,\delta_{a_2})(\rho(x)B^{\delta_{n_{1}}}))); m_1+\varepsilon_{n_1}m_2 + \varepsilon_{n_1+n_2} (a_1 + \varepsilon_{a_2} m_1), 2n_1+n_2+a_2).
\end{align}
The following result is similar to~\cite[Lemma~4.8]{GonGuaLaa2}, and will be used in the proof of Lemma~\ref{lem:lemma_1}.
\begin{lemma}\label{lem:lem48ggl2}
Let $a,b \in P_2 (\mathbb{K}^2)$, which we write in the form~(\ref{eq:normformab}).
Suppose that $a$ and $b$ satisfy the relation of Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}).
Then:
\begin{equation}\label{eq:a1a2}
\text{$a_{1}=\varepsilon_{n_{2}}m_{2}(\varepsilon_{n_{1}}-1)-m_{1}(1+\varepsilon_{n_{1}+n_{2}})$ and $a_{2}=-2n_{1}$,}
\end{equation}
so $a_{1}$ and $a_{2}$ are even, and:
\begin{align}
y =& v^{-b_{2}} u^{a_{1}-b_{1}} v^{a_{2}} x \theta(m_{1},\delta_{n_{1}})(u^{b_{1}}v^{b_{2}}y)\ldotp\notag\\
&\theta(m_{1}+(-1)^{\delta_{n_{1}}}m_{2},n_{1}+n_{2})((Bu^{-1})^{a_{1}} B^{-a_{1}} \theta(a_{1},0)((Bv^{2})^{-a_{2}/2}) \theta(a_{1},0)(\rho(x) B^{\delta_{n_{1}}})).\label{eq:yexp}
\end{align}
\end{lemma}
\begin{proof}
Let $a,b \in P_2 (\mathbb{K}^2)$, which we write in the form~(\ref{eq:normformab}).
By Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}), we have $(p_{1})_{\#}(ab l_{\sigma}(a))=(p_{1})_{\#}(b)$. By~(\ref{eq:normformab}) and~(\ref{eq:a_b_lsigma_a1}), we thus obtain the second relation of~(\ref{eq:a1a2}), and $m_{2}=m_{1}+ \varepsilon_{n_{1}}m_{2} +\varepsilon_{n_{1}+n_{2}} (a_{1}+ m_{1})$,
where we have used the fact that $a_{2}$ is even, and that $(-1)^{\delta_{q}}=\varepsilon_{q}$ for all $q\in \mathbb{Z}$. The first relation of~(\ref{eq:a1a2}) then follows, and we deduce also that $a_{1}$ is even. Equation~(\ref{eq:yexp}) is then also a consequence of~(\ref{eq:normformab}) and~(\ref{eq:a_b_lsigma_a1}), using also the equality $(uv)^{2}=Bv^{2}$ and the fact that $a_{2}$ is even.
\end{proof}
The following lemma will be used in the proofs of Propositions~\ref{prop:tau_2_case_23I},~\ref{prop:tau_2_case_5I} and~\ref{prop:tau_2_case_7I}.
\begin{lemma}\label{lem:lemma_1}
Let $\alpha \in [\mathbb{T}^2, \ast;\mathbb{K}^2, \ast]$ and suppose that ${\allowdisplaybreaks
\alpha_\#: \begin{cases}
(1,0) \longmapsto (\delta_{i+1} \delta_{j+1} r_1 , 2s_1+i) \\
(0,1) \longmapsto (\delta_{i+1} \delta_{j+1} r_2 , 2s_2+j),
\end{cases}
}$ where $r_1,r_2,s_1,s_2 \in \mathbb{Z}$ and $i,j \in \{0,1\}$. If $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$, then there exist $m,n \in \mathbb{Z}$ and $x,y \in \overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ for which the following equality holds in $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$:
\begin{multline}\label{eq:lema_1}
(c_{a_2-b_2,a_1-b_1})_{\text{Ab}} (x)+\theta(g,\delta_{n+i})_{\text{Ab}} (\rho_{\text{Ab}} (x))+(c_{a_2,a_1\varepsilon_{n+i}})_{\text{Ab}} (\theta(\delta_{i+1}\delta_{j+1}r_1,\delta_i)_{\text{Ab}}(y))-y\\
+(c_{a_2,0})_{\text{Ab}}(\widetilde{T}_{a_1\varepsilon_{n+i},\delta_{n+i}} )
+(c_{a_2-b_2,0})_{\text{Ab}} (\widetilde{O}_{2s_1+i,a_1-b_1}-\delta_{j+1} \widetilde{O}_{s_{2}-n,2\delta_i m-2\delta_{i+1}\delta_{n+1}r_1}+\delta_j \widetilde{Q}_{-2\delta_i m,s_{2}-n}) \\
+(c_{a_2,a_1\varepsilon_{n+i}})_{\text{Ab}} (\widetilde{J}_{\delta_{i+1}(n-s_2),-2\delta_{i+1}\delta_{j+1}r_1})
+(c_{a_2-1,a_1 \varepsilon_{n+i+1}})_{\text{Ab}}(\widetilde{I}_{-\delta_i b_2})
+(c_{0,\delta_{n+i+1}})_{\text{Ab}} (\widetilde{J}_{-2s_1 -i,1-2g}) \\
+\widetilde{O}_{-2s_1-i,\delta_{n+i-1}} +(\delta_{n+i}+\delta_i \varepsilon_{n+i}-g)B_{0,0}+(\delta_i-\delta_{n+i}+\varepsilon_i m)B_{a_2,a_1 \varepsilon_{n+i}}+(\delta_{i+1}\delta_{j+1}r_1-\delta_i)B_{a_2-b_2,a_1-b_1}
= 0,
\end{multline}
where $a_1=-2(\delta_{i+1}\delta_{j+1}\delta_{n+1} r_1+\delta_i \varepsilon_{n} m)$, $a_2=-4s_1-2i$,
$b_1 =\delta_{i+1}\delta_{j+1}\varepsilon_{n} r_2+2 \delta_{j+n+1}\varepsilon_{j+1} m$, $b_2=2s_2-2n+j$
and $g=\delta_{i+1}\delta_{j+1}r_1+\varepsilon_i m+\varepsilon_{n+i} a_1$.
\end{lemma}
\begin{proof}
Suppose that $\alpha \in [\mathbb{T}^2, \ast;\mathbb{K}^2, \ast]$ does not have the Borsuk-Ulam property with respect to $\tau_2$. Then there exist $a,b \in P_2 (\mathbb{K}^2)$ such that conditions~(\ref{eq:algebra_i})--(\ref{eq:algebra_iii}) of Lemma~\ref{lem:algebra_tau_2} hold. With the notation of Lemma~\ref{lem:lem48ggl2}:
\begin{equation}\label{eq:defm1n1}
(m_1,n_1)=(\delta_{i+1}\delta_{j+1}r_1,2s_1+i)
\end{equation}
by Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_ii}), and $(\delta_{i+1}\delta_{j+1}r_2,2s_2+j)=(m_{2},n_{2}) (b_1,b_2)(m_{2},n_{2})$ by Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_iii}) and Proposition~\ref{prop:p2_k2}, so:
\begin{equation}\label{eq:defb2}
b_2=-2n_{2}+2s_2+j
\end{equation}
by comparing the second coordinates. Thus:
\begin{align}
(\delta_{i+1}\delta_{j+1}r_2,2s_2+j)&=(m_{2},n_{2}) (b_1,- 2n_{2} +2s_2+j)(m_{2},n_{2})= (m_{2}+\varepsilon_{n_{2}} b_1 , -n_{2}+2s_2+j) (m_{2},n_{2})\notag\\
&= (m_{2}+\varepsilon_{n_{2}} b_1+\varepsilon_{-n_{2}+j} m_2 , 2s_2+j).\label{eq:imp1blsb}
\end{align}
The first coordinate of~(\ref{eq:imp1blsb}) yields $\varepsilon_{n_{2}} b_1=\delta_{i+1}\delta_{j+1}r_2-m_{2}-\varepsilon_{-n_{2}+j} m_{2}$, and so:
\begin{equation}\label{eq:defb1}
b_1 =\delta_{i+1}\delta_{j+1}\varepsilon_{n_{2}} r_2- (\varepsilon_j+\varepsilon_{n_{2}}) m_{2} =\delta_{i+1}\delta_{j+1}\varepsilon_{n_{2}} r_2 +2 \delta_{j+n_{2}+1} \varepsilon_{j+1} m_{2}.
\end{equation}
Using the relations $(\varepsilon_{i}-1)=-2\delta_{i}$ and $\delta_{i+1}(1+\varepsilon_{n_{2}+i})=2\delta_{i+1}\delta_{n_{2}+1}$, as well as Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}),~(\ref{eq:a1a2}) and~(\ref{eq:defm1n1}), we have:
\begin{equation}\label{eq:defa1a2}
\text{$a_2=-4s_1-2i$ and $a_{1}=-2 (\delta_{n_{2}+1} \delta_{i+1}\delta_{j+1}r_1+\delta_i \varepsilon_{n_{2}} m_{2})$}
\end{equation}
Let $g=m_{1}+\varepsilon_i m_{2}+\varepsilon_{n_{2}+i} a_1$. Then by~(\ref{eq:yexp}) and Proposition~\ref{prop:p2_k2}, there exist $x,y \in \overline{\left\langle \sigma^2 \right\rangle}$ such that:
\begin{align}
y =& v^{-b_{2}} u^{a_{1}-b_{1}} v^{a_{2}} x \theta(m_{1},\delta_{n_{1}})(u^{b_{1}}v^{b_{2}}y)\ldotp\notag\\
&\theta(m_{1}+(-1)^{\delta_{n_{1}}}m_{2},n_{1}+n_{2})((Bu^{-1})^{a_{1}} B^{-a_{1}} \theta(a_{1},0)((Bv^{2})^{-a_{2}/2}) \theta(a_{1},0)(\rho(x) B^{\delta_{n_{1}}}))\notag\\
=& v^{-b_2} u^{a_1-b_1} v^{a_2} x B^{m_{1}-\delta_i} u^{\varepsilon_i b_1} (B^{\delta_i} v u^{-2m_{1}})^{b_2} B^{-m_{1}+\delta_i}\theta(m_{1},\delta_i)(y)\,
B^{m_{1}+\varepsilon_i m_{2}-\delta_{n_{2}+i}} (B^{\varepsilon_{n_{2}+i}} u^{\varepsilon_{n_{2}+i+1}} )^{a_1}\ldotp\notag\\
& (B^{\varepsilon_{n_{2}+i}}(B^{\delta_{n_{2}+i}} v u^{-2g})^2)^{-a_2/2} B^{-g+\delta_{n_{2}+i}} \theta(g, \delta_{n_{2}+i})(\rho(x)) B^{\delta_i \varepsilon_{n_{2}+i}}\notag\\
=& v^{a_2-b_2} [v^{-a_2},u^{a_1-b_1}] u^{a_1-b_1} x B^{m_{1}-\delta_i} u^{-a_1+b_1} \left(u^{a_1-b_1 +\varepsilon_i b_1} v^{b_2}
u^{-a_1 \varepsilon_{n_{2}+i}} v^{-b_2} \right) v^{-a_2+b_2} . v^{a_2} u^{a_1 \varepsilon_{n_{2}+i}}\ldotp\notag\\
& \left(v^{-b_2}(B^{\delta_i} v u^{-2m_{1}})^{b_2} \right) B^{-m_{1}+\delta_i}\theta(m_{1},\delta_i)(y) B^{m_{1}+\varepsilon_i m_{2}-\delta_{n_{2}+i}}
u^{-a_1\varepsilon_{n_{2}+i}} \left(u^{a_1\varepsilon_{n_{2}+i}} (B^{\varepsilon_{n_{2}+i}} u^{\varepsilon_{n_{2}+i+1}} )^{a_1} \right)\ldotp\notag\\
& v^{-a_2} \left(v^{a_2} (B^{\varepsilon_{n_{2}+i}}(B^{\delta_{n_{2}+i}} v u^{-2g})^2)^{-a_2/2} \right) B^{-g+ \delta_{n_{2}+i}} \theta(g, \delta_{n_{2}+i})(\rho(x)) B^{\delta_i \varepsilon_{n_{2}+i}}.\label{eq:calcy}
\end{align}
It remains to identify the four bracketed terms of~(\ref{eq:calcy}) with elements of $\overline{\left\langle \sigma^2 \right\rangle}$. First, by~(\ref{eq:defTIOJ}) and~(\ref{eq:defQ}) we have:
\begin{align}
O_{s_2-n_{2},2 \delta_i m_{2}-2\delta_{i+1}\delta_{n_{2}+1}r_1}^{-\delta_{j+1}} Q_{-2\delta_i m_{2},s_2-n_{2}}^{\delta_j} &= \begin{cases}
[u^{2 \delta_i m_{2}-2\delta_{i+1}\delta_{n_{2}+1}r_1}, v^{2(s_2-n_{2})}]
& \text{if $j=0$}\\
u^{-2 \delta_i m_{2}} v^{2(s_2-n_{2})+1} u^{-2 \delta_i m_{2}} v^{-2(s_2-n_{2})-1}
& \text{if $j=1$}
\end{cases}\notag\\
&=u^{-2\delta_{i+1}\delta_{j+1}\delta_{n_{2}+1}r_1+2 \delta_i \varepsilon_{j} m_{2}} v^{b_{2}} u^{2\delta_{i+1}\delta_{j+1}\delta_{n_{2}+1}r_1-2 \delta_i m_{2}} v^{-b_{2}}\label{eq:calcOQ}
\end{align}
using~(\ref{eq:defb2}). Now by~(\ref{eq:defb1}) and (\ref{eq:defa1a2}):
\begin{align}
-a_{1} \varepsilon_{n_{2}+i} &=2\varepsilon_{n_{2}+i}(\delta_{n_{2}+1} \delta_{i+1}\delta_{j+1}r_1+\delta_i \varepsilon_{n_{2}} m_{2})= 2(\delta_{n_{2}+1} \delta_{i+1}\delta_{j+1}r_1-\delta_i m_{2})\label{eq:calcOQi}\;\text{and}\\
a_{1}+(\varepsilon_i-1)b_{1}&= -2 (\delta_{n_{2}+1} \delta_{i+1}\delta_{j+1}r_1+\delta_i \varepsilon_{n_{2}} m_{2})-2\delta_{i} (\delta_{i+1}\delta_{j+1} \varepsilon_{n_{2}} r_2 +2 \delta_{j+n_{2}+1} \varepsilon_{j+1} m_{2})\notag\\
&= -2\delta_{n_{2}+1} \delta_{i+1}\delta_{j+1}r_1-2\delta_{i}m_{2}(\varepsilon_{n_{2}}+2\delta_{j+n_{2}+1} \varepsilon_{j+1})\notag\\
&=-2\delta_{n_{2}+1} \delta_{i+1}\delta_{j+1}r_1+2\delta_{i}\varepsilon_{j}m_{2}.\label{eq:calcOQii}
\end{align}
It follows from~(\ref{eq:calcOQ}),~(\ref{eq:calcOQi}) and~(\ref{eq:calcOQii}) that:
\begin{equation}\label{eq:resultOQ}
O_{s_2-n_{2},2 \delta_i m_{2}-2\delta_{i+1}\delta_{n_{2}+1}r_1}^{-\delta_{j+1}} Q_{-2\delta_i m_{2},s_2-n_{2}}^{\delta_j}=u^{a_1-b_1 +\varepsilon_i b_1} v^{b_2} u^{-a_1 \varepsilon_{n_{2}+i}} v^{-b_2}.
\end{equation}
Secondly, by~(\ref{eq:defTIOJ}) and~(\ref{eq:defb2}), we have:
\begin{align}
J_{\delta_{i+1}(n_{2}-s_2),-2m_{1}} c_{-1,0}(I_{-\delta_i b_2})&=
v^{\delta_{i+1}(\delta_{j}-b_{2})} (vu^{-2m_{1}})^{\delta_{i+1}(b_{2}-\delta_{j})} v^{-1} v^{-\delta_i b_2} (vB)^{\delta_i b_2} v\notag\\
&= v^{-\delta_{i+1}b_{2}} v^{\delta_{i+1}\delta_{j}} (vu^{-2m_{1}})^{-\delta_{i+1}\delta_{j}} (vu^{-2m_{1}})^{\delta_{i+1}b_{2}}
v^{-\delta_i b_2} v^{-1} (vB)^{\delta_i b_2} v\notag\\
&= v^{-\delta_{i+1}b_{2}} (vu^{-2m_{1}})^{\delta_{i+1}b_{2}} \ldotp
v^{-\delta_i b_2} (v^{-1} vBv)^{\delta_i b_2}\notag\\
&=v^{-\delta_{i+1}b_{2}} (vu^{-2m_{1}})^{\delta_{i+1}b_{2}} \ldotp
v^{-\delta_i b_2} (Bv)^{\delta_i b_2}=v^{-b_2}(B^{\delta_i} v u^{-2m_{1}} )^{b_2}\label{eq:calcJI}
\end{align}
using the fact that $j=\delta_{j}$ and $v^{\delta_{i+1}\delta_{j}} (vu^{-2m_{1}})^{-\delta_{i+1}\delta_{j}}=1$ for all $i,j\in \{ 0,1\}$ (recall from~(\ref{eq:defm1n1}) that $m_{1}=\delta_{i+1}\delta_{j+1}r_1$). Thirdly, it follows directly from~(\ref{eq:defTIOJ}) that:
\begin{equation}\label{eq:calcT}
T_{a_1\varepsilon_{n_{2}+i},\delta_{n_{2}+i}} =u^{a_1\varepsilon_{n_{2}+i}}(B^{\varepsilon_{n_{2}+i}}u^{\varepsilon_{n_{2}+i+1}})^{a_1}.
\end{equation}
Finally, since $a_{2}$ is even, we have:
\begin{align}
O_{a_2/2,\delta_{n_2+i+1}} c_{0,\delta_{n_2+i+1}}(J_{a_2/2,-2g+1}) &= [v^{a_{2}}, u^{\delta_{n_2+i+1}}] u^{\delta_{n_2+i+1}} v^{a_{2}} (vu^{-2g+1})^{-a_{2}} u^{-\delta_{n_2+i+1}}\notag\\
&= v^{a_{2}} u^{\delta_{n_2+i+1}} ((vu^{-2g+1})^{2})^{-a_{2}/2} u^{-\delta_{n_2+i+1}}\notag\\
&=v^{a_{2}} (u^{\delta_{n_2+i+1}}(vu^{-2g+1})^{2}u^{-\delta_{n_2+i+1}})^{-a_{2}/2} \notag\\
&=v^{a_2} (B^{\varepsilon_{n_2+i}}(B^{\delta_{n_2+i}} v u^{-2g})^2)^{-a_2/2}.\label{eq:calcOcJ}
\end{align}
Substituting~(\ref{eq:resultOQ})--(\ref{eq:calcOcJ}) in~(\ref{eq:calcy}) and using~(\ref{eq:defcpq}) and~(\ref{eq:defTIOJ}), we obtain:
\begin{multline}\label{eq:fuv3}
y=c_{a_2-b_2,0} (O_{2s_1+i,a_1-b_1}) c_{a_2-b_2,a_1-b_1}(x) B_{a_2-b_2,a_1-b_1}^{m_{1}-\delta_i} c_{a_2-b_2,0}(O_{s_2-n_{2},2 \delta_i m_{2} -2\delta_{i+1}\delta_{n_{2}+1}r_1}^{-\delta_{j+1}} Q_{-2\delta_i m_{2},s_2-n_{2}}^{\delta_j}) \\
c_{a_2,a_1\varepsilon_{n_{2}+i}}(J_{\delta_{i+1}(n_{2}-s_2),-2m_{1}}) c_{a_2,a_1\varepsilon_{n_{2}+i}}(c_{-1,0}(I_{-\delta_i b_2})) B_{a_2,a_1\varepsilon_{n_{2}+i}}^{-m_{1}+\delta_i}
c_{a_2,a_1\varepsilon_{n_{2}+i}}(\theta(m_{1},\delta_i)(y)) B_{a_2,a_1\varepsilon_{n_{2}+i}}^{m_{1}+\varepsilon_i m_{2}-\delta_{n_{2}+i}} \\
c_{a_2,0}(T_{a_1\varepsilon_{n_{2}+i},\delta_{n_{2}+i}})
O_{a_2/2,\delta_{n_{2}+i+1}} c_{0,\delta_{n_{2}+i+1}}(J_{a_2/2,-2g+1}) B_{0,0}^{-g+ \delta_{n_{2}+i}} \theta(g, \delta_{n_{2}+i})(\rho(x)) B_{0,0}^{\delta_i \varepsilon_{n_{2}+i}}.
\end{multline}
By~(\ref{eq:homo_gsigmab_cpq}), for all $k,l\in \mathbb{Z}$, we have:
\begin{align}\label{eq:coc}
(c_{a_2,a_1\varepsilon_{n_{2}+i}})_{\text{Ab}} ((c_{-1,0})_{\text{Ab}} (B_{k,l}))
= &(c_{a_2,a_1\varepsilon_{n_{2}+i}})_{\text{Ab}} (B_{k-1,l})
= B_{k+a_2-1,l+\varepsilon_{k}a_1\varepsilon_{n_2+i+1}} \nonumber \\
= & (c_{a_2-1,a_1\varepsilon_{n_2+i+1}})_{\text{Ab}} (B_{k,l}).
\end{align}
By abuse of notation, let $x$ and $y$ denote the projection in $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ of the elements $x$ and $y$ respectively, and let $m=m_{2}$ and $n=n_{2}$.
Projecting~(\ref{eq:fuv3}) in $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ and using~(\ref{eq:defm1n1}),~(\ref{eq:defa1a2}),~(\ref{eq:coc}) and Proposition~\ref{prop:gsigma}(\ref{it:wordsc}), we obtain~(\ref{eq:lema_1}) as required.
\end{proof}
\section{Proof of Theorem~\ref{th:BORSUK_TAU_2}}\label{sec:borsuk_2}
In this section, we prove Theorem~\ref{th:BORSUK_TAU_2}. Its proof will follow from the following five propositions.
\begin{proposition}\label{prop:tau_2_case_23I}
Suppose that
$\alpha_\#: \begin{cases}
(1,0) \longmapsto (0 , 2s+1) \\
(0,1) \longmapsto (0,(2z+1)w)
\end{cases}$ for some $s \in \mathbb{Z}$ and $z,w \in \{ 0,1 \}$. Then $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$.
\end{proposition}
\begin{proposition}\label{prop:tau_2_case_14I}
Suppose that $\alpha_\#:
\begin{cases}
(1,0) \longmapsto (0,(2s+1)(1-w)) \\
(0,1) \longmapsto (0,(2z-1)w + 2)
\end{cases}
$
for some $s \in \mathbb{Z}$ and $z,w \in \{0,1\}$.
Then $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$.
\end{proposition}
\begin{proposition}\label{prop:tau_2_case_5I}
Suppose that $\alpha_\#: \begin{cases}
(1,0) \longmapsto (0 , 2s) \\
(0,1) \longmapsto (0 , 2z+1)
\end{cases}$ for some $s \in \mathbb{Z} \setminus\{ 0 \}$ and $z \in \{ 0,1 \}$. Then $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$.
\end{proposition}
\begin{proposition}\label{prop:tau_2_case_7I}
Suppose that $\alpha_\#: \begin{cases}
(1,0) \longmapsto (r_1 , 2s) \\
(0,1) \longmapsto (r_2 , 2z)
\end{cases}$ for some $r_1, r_2, s \in \mathbb{Z}$ and $z \in \{ 0,1 \}$, where $r_1 \geq 0$, satisfy one of the following conditions:
\begin{enumerate}[(i)]
\item\label{it:case_7I_1} $r_2 s \neq 0$.
\item\label{it:case_7I_2} $r_1 > 0$, $r_2$ is even and $z = 0$.
\item\label{it:case_7I_3} $r_1 = r_2 = z = 0$ and $s \neq 0$.
\end{enumerate}
Then $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$.
\end{proposition}
\begin{proposition}\label{prop:tau_2_case_6I}
For $n \in \mathbb{Z}$, let $\omega_n=1$ (resp.\ $\omega_n=0$) if $n=0$ (resp.\ if $n \neq 0$), and let $\delta_n$ as defined in Proposition~\ref{prop:p2_k2}.
Suppose that $\alpha_\#: \begin{cases}
(1,0) \longmapsto ((z +(1-z)\delta_{r_2})r_1, 2zs)\\
(0,1) \longmapsto (\omega_{zs}r_2 , 2z)
\end{cases}$
for some $r_1, r_2, s \in \mathbb{Z}$ and $z \in \{ 0,1 \}$ such that $r_1 \geq 0$. Then $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$.
\end{proposition}
We will prove Propositions~\ref{prop:tau_2_case_23I}--\ref{prop:tau_2_case_6I} presently. Assuming for the moment that they hold, we first give the proof of Theorem~\ref{th:BORSUK_TAU_2}.
\begin{proof}[Proof of Theorem~\ref{th:BORSUK_TAU_2}.]
Applying~\cite[Theorem 7(b)]{GonGuaLaa1},~\cite[Proposition~2.2]{GonGuaLaa2} and Corollary~\ref{cor:reduction_tau_2}, we claim that Theorem~\ref{th:BORSUK_TAU_2} follows from
Propositions~\ref{prop:tau_2_case_23I}--\ref{prop:tau_2_case_6I}. To see this,
let $\alpha \in [ \mathbb{T}^2, * ; \mathbb{K}^2,*]$ be a pointed homotopy class, and let $\alpha_\# : \pi_1(\mathbb{T}^2)\to \pi_1(\mathbb{K}^2)$ be the homomorphism described in Remark~\ref{rem:homotopy_pi1},
which is of one of the types~1--4 given in the statement of Proposition~\ref{prop:set_homotopy}.
\begin{enumerate}[(a)]
\item\label{it:summarya} Suppose that $\alpha_\#$ is of Type~1, 2 or~3, and let $i\in \{0,1\}$, $s_{1}$ and $s_{2}$ be the integers that appear in the description of $\alpha_\#$ in Proposition~\ref{prop:set_homotopy}. By~\cite[Proposition~2.2]{GonGuaLaa2} and Corollary~\ref{cor:reduction_tau_2}, it suffices to
consider the cases where $i=0$, and
$s_2 \in \{0,1\}$. In order to apply Propositions~\ref{prop:tau_2_case_23I}--\ref{prop:tau_2_case_14I}, we may subdivide these cases as follows.
\begin{enumerate}[(i)]
\item\label{it:summaryai} If $\alpha_{\#}$ is of Type~1 and $s_{2}=0$ (resp.\ $s_2=1$) then $\alpha$ has (resp.\ does not have) the Borsuk-Ulam property with respect to $\tau_2$ by Proposition~\ref{prop:tau_2_case_23I} (resp.\ Proposition~\ref{prop:tau_2_case_14I}).
\item\label{it:summaryaiii} If $\alpha_{\#}$ is of Type~2 then $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$ by Proposition~\ref{prop:tau_2_case_23I}.
\item\label{it:summaryaiv} If $\alpha_{\#}$ is of Type~3 then $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$ if and only if $s_{1}\neq 0$ by Propositions~\ref{prop:tau_2_case_14I} and~\ref{prop:tau_2_case_5I}.
\end{enumerate}
\item\label{it:summaryb} Suppose that $\alpha_\#$ is of Type~4, and let $r_{1},r_{2},s_{1}$ and $s_{2}$ be the integers that appear in the description of $\alpha_\#$ in Proposition~\ref{prop:set_homotopy}, where $r_{1}\geq 0$. By Corollary~\ref{cor:reduction_tau_2}, it suffices to consider the cases where
$s_2 \in \{0,1\}$. In order to apply Propositions~\ref{prop:tau_2_case_7I}--\ref{prop:tau_2_case_6I}, we may subdivide these cases as follows.
\begin{enumerate}[(i)]
\item Suppose that $s_1 r_2\neq 0$. Then
$\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$ by Proposition~\ref{prop:tau_2_case_7I}(\ref{it:case_7I_1}).
\item Suppose that $s_1\neq 0$ and $r_2=0$. If $s_{2}=1$ then $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$ by Proposition~\ref{prop:tau_2_case_6I}. So suppose that $s_{2}=0$.
If $r_{1}>0$ (resp.\ $r_{1}=0$) then $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$ by Proposition~\ref{prop:tau_2_case_7I}(\ref{it:case_7I_2}) (resp.\ Proposition~\ref{prop:tau_2_case_7I}(\ref{it:case_7I_3})).
\item Finally, suppose that $s_{1}=0$. If $s_{2}=0$, $r_{2}$ is even and $r_{1}>0$ then $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$ by Proposition~\ref{prop:tau_2_case_7I}(\ref{it:case_7I_2}). In the remaining cases (either $s_{2}=1$, or $s_{2}=0$, and either $r_{2}$ is odd, or else $r_{2}$ is even and $r_{1}=0$), $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$ by Proposition~\ref{prop:tau_2_case_6I}.\qedhere
\end{enumerate}
\end{enumerate}
\end{proof}
The rest of this section is devoted to proving Propositions~\ref{prop:tau_2_case_23I}--\ref{prop:tau_2_case_6I}.
\begin{proof}[Proof of Proposition~\ref{prop:tau_2_case_23I}.]
Suppose on the contrary that $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$. Applying Lemma~\ref{lem:lemma_1} with $s_1 = s$, $i =1$, $s_2= zw$ and $j = w$, there exist $m,n \in \mathbb{Z}$ and $x,y \in \overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ that satisfy the following equation in~$\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$:
\begin{multline}\label{eq:prop23}
(c_{2n-(2z+1)w-4s-2,2m\varepsilon_{w}\delta_{n+w}})_{\text{Ab}} (x)+\theta(m,\delta_{n+1})_{\text{Ab}} (\rho_{\text{Ab}} (x))+(c_{-4s-2,2m})_{\text{Ab}} (\theta(0,1)_{\text{Ab}}(y))-y\\
+(c_{-4s-2,0})_{\text{Ab}}(\widetilde{T}_{2m,\delta_{n+1}})
+(c_{2n-(2z+1)w-4s-2,0})_{\text{Ab}} (\widetilde{O}_{2s+1,2m\varepsilon_{w}\delta_{n+w}}-\delta_{w+1} \widetilde{O}_{zw-n,2m}+\delta_w \widetilde{Q}_{-2m,zw-n}) \\
+(c_{-4s-3,-2m})_{\text{Ab}}(\widetilde{I}_{2n-(2z+1)w})
+(c_{0,\delta_{n}})_{\text{Ab}} (\widetilde{J}_{-2s -1,1-2m}) +\widetilde{O}_{-2s-1,\delta_{n}}\\ +(\delta_{n}-m)(B_{0,0}+B_{-4s-2,2m})-B_{2n-(2z+1)w-4s-2,2m\varepsilon_{w}\delta_{n+w}}= 0,
\end{multline}
where we have also used the fact that $\varepsilon_{n}+\delta_{w+n+1} \varepsilon_{w+1} =-\varepsilon_{w}\delta_{n+w}$. Let $\map{\xi}{\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}}[\mathbb{Z}_2=\{ \overline{0} , \overline{1} \}]$ be the homomorphism defined on the basis $\{ B_{k,l} \}_{k,l \in \mathbb{Z}}$ of $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ by $\xi(B_{k,l})=\delta_{w}\overline{1}+\delta_{w+1}\overline{k}$ for all $k,l \in \mathbb{Z}$. To prove the result, we will arrive at a contradiction by computing the image by $\xi$ of~(\ref{eq:prop23}).
Clearly $\xi(B_{k,l})= \xi(B_{k,0})$ for all $k,l\in \mathbb{Z}$. Using Proposition~\ref{prop:gsigma}, we may check that $\xi \circ \theta(m,n)_{\text{Ab}}=\xi \circ \rho_{\text{Ab}}= \xi$ for all $m,n\in \mathbb{Z}$, and that $\xi \circ (c_{p,q})_{\text{Ab}}=\xi$ if
$w$ is odd or $p$ is even, from which it follows that the image of the first line of~(\ref{eq:prop23}) by $\xi$ is equal to $\overline{0}$.
Note that if $k=0$ or $l=0$ then $\xi(\widetilde{O}_{k,l})=\xi(0)=\overline{0}$, while if $k,l\in \mathbb{Z} \setminus \{0\}$ then:
\begin{align*}
\xi(\widetilde{O}_{k,l})&= \sum_{i=1}^{\lvert k \rvert} \sum_{j=1}^{\lvert l\rvert} \xi\bigl(
B_{\sigma_k (2i-1 ),-\sigma_l j+(\sigma_l -1 )/2}
- B_{ \sigma_k (2i-1) -1 , \sigma_l j-(1+\sigma_l)/2}
\bigr)= \lvert k \rvert \lvert l \rvert \left( (\delta_{w} \overline{1}+\delta_{w+1} \overline{1}) +\delta_{w} \overline{1}\right)\\
&=\lvert k \rvert \lvert l \rvert \delta_{w+1} \overline{1}.
\end{align*}
In particular, if $w$ is odd, or if either $k$ or $l$ is even then $\xi(\widetilde{O}_{k,l})=\overline{0}$. Taking the image of~(\ref{eq:prop23}) and using the above computations involving compositions with $\xi$ and the fact that $\delta_{w+1}\overline{w}=\overline{0}$, we obtain:
\begin{equation}\label{eq:prop23a}
\xi(\widetilde{T}_{2m,\delta_{n+1}})+ \delta_{w}\xi(\widetilde{Q}_{-2m,zw-n}) +\xi\circ(c_{-4s-3,-2m})_{\text{Ab}}(\widetilde{I}_{2n-(2z+1)w})
+\xi (\widetilde{J}_{-2s -1,1-2m}) +\overline{\delta_{w+1}\delta_{n}}+\overline{\delta_{w}}= \overline{0}.
\end{equation}
If $m = 0$ then $\xi(\widetilde{T}_{2m,\delta_{n+1}}) = \xi(\widetilde{Q}_{-2m,zw-n}) = \xi(0) = \overline{0}$, while if $m\neq 0$ then:
\begin{align}
\xi(\widetilde{T}_{2m,\delta_{n+1}})&= \sum_{i=1}^{\lvert 2m \rvert} \xi(B_{0,\sigma_{m}(i+(\sigma_{m}(1-2\delta_{n+1})-1)/2)})=\sum_{i=1}^{\lvert 2m \rvert} \xi(B_{0,0})=\sum_{i=1}^{\lvert 2m \rvert} \overline{\delta_{w}}=\overline{0}\label{eq:xit2m}\\
\xi(\widetilde{Q}_{-2m,zw-n}) &=\xi(\widetilde{O}_{zw-n,-2m})+\sum_{i=1}^{\lvert 2m\rvert} \xi(B_{2(zw-n),\sigma_{-m} i-(1+\sigma_{-m})/2})=
\sum_{i=1}^{\lvert 2m\rvert} \overline{\delta_{w}}=\overline{0}.\label{eq:qm2m}
\end{align}
Now:
\begin{align}
\xi (\widetilde{J}_{-2s -1,1-2m})&= \sum_{i=1}^{\lvert 2s +1\rvert} \sum_{j=1}^{\lvert 2m-1 \rvert} \xi(B_{-\sigma_{2s+1}(2i-1), \sigma_{1-2m}(j-(1+\sigma_{1-2m})/2)})=\sum_{i=1}^{\lvert 2s +1\rvert} \sum_{j=1}^{\lvert 2m-1 \rvert} \xi(B_{-\sigma_{2s+1}(2i-1), 0})\notag\\
&=\sum_{i=1}^{\lvert 2s +1\rvert} \sum_{j=1}^{\lvert 2m-1 \rvert} (\overline{\delta_{w}}+\overline{\delta_{w+1}})= \sum_{i=1}^{\lvert 2s +1\rvert} \sum_{j=1}^{\lvert 2m-1 \rvert} \overline{1}=\overline{1}.\label{eq:j2s1}
\end{align}
It follows from~(\ref{eq:prop23a})--(\ref{eq:j2s1}) that:
\begin{equation}\label{eq:prop23b}
\xi\circ(c_{-4s-3,-2m})_{\text{Ab}}(\widetilde{I}_{2n-(2z+1)w})
+\overline{1} +\overline{\delta_{w+1}\delta_{n}}+\overline{\delta_{w}}= \overline{0}.
\end{equation}
Assume first that $w=0$. If $n=0$ then~(\ref{eq:prop23b}) gives rise to a contradiction. So suppose that $n \neq 0$. Then:
\begin{align*}
\xi\circ(c_{-4s-3,-2m})_{\text{Ab}}(\widetilde{I}_{2n-(2z+1)w})&= \xi\circ(c_{-4s-3,-2m})_{\text{Ab}}(\widetilde{I}_{2n})=\xi\circ(c_{-4s-3,-2m})_{\text{Ab}} \Biggl(\sum_{i=1}^{2\lvert n\rvert} B_{\sigma_{n} i+(1-\sigma_{n} )/2 ,0}\Biggr)\\
&= \sum_{i=1}^{2\lvert n\rvert} \xi(B_{\sigma_{n} i+(1-\sigma_{n} )/2 -4s-3,0})=\overline{\delta_{n}}.
\end{align*}
The last equality follows from the fact that as $i$ varies between $1$ and $2\lvert n\rvert$, $\sigma_{n} i+(1-\sigma_{n} )/2 -4s-3$ runs over $2\lvert n\rvert$ consecutive integers of which exactly $\lvert n\rvert$ are odd. Equation~(\ref{eq:prop23b}) then yields a contradiction. Finally if $w=1$ then:
\begin{align*}
\xi\circ(c_{-4s-3,-2m})_{\text{Ab}}(\widetilde{I}_{2n-(2z+1)w}) &=\xi\circ(c_{-4s-3,-2m})_{\text{Ab}}(\widetilde{I}_{2n-2z-1})\\
&= \sum_{i=1}^{\lvert 2n-2z-1\rvert} \xi(B_{\sigma_{2n-2z-1} i+(1-\sigma_{2n-2z-1})/2-4s-3 ,0})=\overline{1},
\end{align*}
using the definition of $\xi$. Once more, (\ref{eq:prop23b}) gives rises to a contradiction. We conclude that $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$.
\end{proof}
\begin{proof}[Proof of Proposition~\ref{prop:tau_2_case_14I}]
Let $a = (v^{(4s+2)(w-1)}x;0,(2s+1)(1-w))$ and $b=(v^w; 0, w(z-1)+1)$, where $x = (v^{2s+2} (Bv^2)^{-s-1})^{1-w} \in \overline{\left\langle \sigma^2 \right\rangle}$. Note that $a,b\in P_2(\mathbb{K}^2)$. To prove the result, it suffices to show that these elements satisfy Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i})--(\ref{eq:algebra_iii}). Clearly $(p_1)_\# (a)= \alpha_\# (1,0)$, so Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_ii}) holds. With the notation of~(\ref{eq:normformab}), we have $a_{1}=m_{1}=b_{1}=m_{2}=0$, $y=\boldsymbol{1}$ and $a_{2}$ is even. Taking $a=b$ in~(\ref{eq:blsiga}), we may check that $(p_1)_\# (bl_{\sigma}(b))=(0,b_{2}+2n_{2})$, and this may be seen to be equal to $\alpha_\# (0,1)$, so Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_iii}) is satisfied too. It remains to show that Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}) holds. As in~\cite[p.~534]{GonGuaLaa2}, let $\map{p_{F}}{P_2(\mathbb{K}^2)}[F(u,v)]$ be defined by $p_F(w; m,n)=w$ for all $w\in F(u,v)$ and $(m,n)\in \mathbb{Z} \rtimes \mathbb{Z}$. Then $w=(p_{F}(w); (p_{1})_{\#}(w))$, and to prove that $abl_\sigma(a)=b$, it thus suffices to show that $(p_1)_\# (abl_{\sigma}(a))= (p_1)_\# (b)$ and that $p_{F}(abl_{\sigma}(a))= p_{F}(b)$. By~(\ref{eq:a_b_lsigma_a1}), we have:
\begin{equation}\label{eq:ablsigared}
abl_\sigma(a)= (v^{a_2} x \theta(0,\delta_{n_1})(v^{b_2}) \theta(0,\delta_{n_1+n_2})((uv)^{-a_2} \rho(x)B^{\delta_{n_{1}}}); 0, 2n_1+n_2+a_2).
\end{equation}
One may check easily that $(p_1)_\# (abl_{\sigma}(a))= (p_1)_\# (b)$. Hence it remains to show that $p_{F}(abl_{\sigma}(a))= p_{F}(b)$. By~(\ref{eq:ablsigared}), if $w=1$ then $x=\boldsymbol{1}$ and $p_F(abl_{\sigma}(a))=v=p_F(b)$. So suppose that $w=0$. Then by~(\ref{eq:ablsigared}) and the fact that $Bv^{2}=(uv)^{2}$, we have:
\begin{equation}\label{eq:ablsigared2}
p_F(abl_{\sigma}(a)) =v^{-4s-2} v^{2s+2}(Bv^{2})^{-s-1} (uv)^{4s+2} \rho(x) B= v^{-2s} (uv)^{2s} \rho(x) B.
\end{equation}
Recall that $\rho(x)=p_{F}(l_{\sigma}(x);0,0)$ by~\cite[equation~(3.2)]{GonGuaLaa2}.
Now $x=v^{2s+2}(Bv^{2})^{-s-1}$, and using Proposition~\ref{prop:p2_k2}, we obtain:
\begin{align*}
l_{\sigma}(x;0,0)&= l_{\sigma}(v^{2s+2}(Bv^{2})^{-s-1};0,0)=((uv)^{-2s-2};0,2s+2)(B(uv)^{-2};0,2)^{-s-1}\\
&=((uv)^{-2s-2}(B(uv)^{-2})^{-s-1};0,0).
\end{align*}
So $\rho(x)=(uv)^{-2s-2}(B(uv)^{-2})^{-s-1}$. Since $(uv)^{2}=Bv^{2}$, we see from~(\ref{eq:ablsigared2}) that:
\begin{align*}
p_F(abl_{\sigma}(a))&= v^{-2s} (uv)^{-2}(B(uv)^{-2})^{-s-1} B=v^{-2s-2} B^{-1}
(Bv^{-2}B^{-1})^{-s-1}B=\boldsymbol{1}=p_F(b).
\end{align*}
It follows that $abl_{\sigma}(a)=b$, so Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}) holds, and this completes the proof of the proposition.
\end{proof}
\begin{proof}[Proof of Proposition~\ref{prop:tau_2_case_5I}]
We argue by contradiction. Suppose that $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$. By Lemma~\ref{lem:lemma_1}, there exist $m,n \in \mathbb{Z}$ and $x,y \in \overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ that satisfy the following equation in~$\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$:
\begin{multline}\label{eq:tau_2_case_5}
(c_{2n-2z-4s-1,-2\delta_n m})_{\text{Ab}} (x)+\theta(m,\delta_n)_{\text{Ab}}(\rho_{\text{Ab}}(x))+(c_{-4s,0})_{\text{Ab}}(y)-y
+ (c_{2n-2z-4s-1,0})_{\text{Ab}}(\widetilde{O}_{2s,-2\delta_n m}) \\
+ (c_{0,\delta_{n+1}})_{\text{Ab}} (\widetilde{J}_{-2s,1-2m})+\widetilde{O}_{-2s,\delta_{n+1}}
+(m-\delta_n)(B_{-4s,0}-B_{0,0}) =0.
\end{multline}
Let $\map{\xi}{\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}}[\mathbb{Z}_2]$ be the homomorphism defined on the basis $\{ B_{k,l} \}_{k,l \in \mathbb{Z}}$ of $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ by:
\begin{equation}\label{eq:defxi3}
\xi (B_{k,l})=\begin{cases}
\overline{1} & \text{if $k \equiv 0 \bmod{4s}$ or $k \equiv 2n-2z-1 \bmod{4s}$}\\
\overline{0} & \text{otherwise,}
\end{cases}
\end{equation}
which implies that:
\begin{equation}\label{eq:bkts}
\text{$\xi(B_{k,l})=\xi(B_{k+4ts,0})$ for all $k,l,t,s\in\mathbb{Z}$.}
\end{equation}
Now if $s>0$ and $t\in \mathbb{Z}$ then:
\begin{align}
\bigl\{ -\sigma_{s}(2i-1)+t + 4\lvert s \rvert \; \bigl| \; i=1,\ldots, 2\lvert s \rvert\bigr\}&= \bigl\{ (2i-1)+t \; \bigl| \; i=1,\ldots, 2\lvert s \rvert\bigr\}\notag\\
&= \bigl\{ -\sigma_{-s}(2i-1)+t \; \bigl| \; i=1,\ldots, 2\lvert s \rvert\bigr\}.\label{eq:sigs4s}
\end{align}
It follows from~(\ref{eq:bkts}) and~(\ref{eq:sigs4s}) that for all $s,t\in \mathbb{Z}$, $s\neq 0$:
\begin{equation}\label{eq:xibt0}
\xi\left(\sum_{i=1}^{2\lvert s \rvert} B_{t-\sigma_{s}(2i-1),0}\right)= \xi\left(\sum_{i=1}^{2\lvert s \rvert} B_{2i-1+t,0}\right).
\end{equation}
We claim that the expression on the right-hand side of~(\ref{eq:xibt0}) is equal to $\overline{1}$.
To prove the claim,
note that as $i$ varies between $1$ and $2\lvert s \rvert$, the index $2i-1+t$ takes successively the values $1+t, 3+t, \ldots, 4\lvert s \rvert-1+t$. In particular, if $t$ is even (resp.\ odd), $2i-1+t$ is never congruent to $0\bmod{4s}$ (resp.\ to $2n-2z-1 \bmod{4s}$), and it is congruent to $2n-2z-1 \bmod{4s}$ (resp.\ to $0\bmod{4s}$) for precisely one value of $i$, which using~(\ref{eq:defxi3}) proves the claim. It follows from~(\ref{eq:xibt0}) that for all $s,t\in \mathbb{Z}$, $s\neq 0$:
\begin{equation}\label{eq:xi3sum1}
\xi\Biggl(\sum_{i=1}^{2\lvert s \rvert} B_{t-\sigma_{s}(2i-1),0}\Biggr)=\overline{1}.
\end{equation}
Let $p,q\in \mathbb{Z}$. Applying~(\ref{eq:homo_gsigmab_cpq}) and~(\ref{eq:xi3sum1}), if $u=0$ then $\xi \circ (c_{p,q})_{{\text{Ab}}}(\widetilde{O}_{2s,u})=\overline{0}$, while if $u\neq 0$ we obtain:
\begin{equation*}
\xi \circ (c_{p,q})_{{\text{Ab}}}(\widetilde{O}_{2s,u})= \xi\left( \sum_{i=1}^{2\lvert s\rvert} \sum_{j=1}^{\lvert u \rvert} B_{\sigma_{2s}(2i-1)+p,0}-B_{\sigma_{2s}(2i-1)+p-1,0}\right)= \lvert u \rvert(\overline{1}+\overline{1})=\overline{0}.
\end{equation*}
In a similar manner, one sees that $\xi(\widetilde{J}_{-2s,-2m+1})=\overline{1}$. Taking the image of~(\ref{eq:tau_2_case_5}) by $\xi$, we conclude that:
\begin{equation}\label{eq:xi3red}
\xi((c_{2n-2z-4s-1,-2\delta_n m})_{\text{Ab}} (x)+\theta(m,\delta_n)_{\text{Ab}}(\rho_{\text{Ab}}(x)))+\xi((c_{-4s,0})_{\text{Ab}}(y)-y) =\overline{1}.
\end{equation}
Using~(\ref{eq:homo_gsigmab_cpq}) once more, for all $k,l\in \mathbb{Z}$, we have:
\begin{equation*}
\xi \left((c_{-4s,0})_{\text{Ab}}(B_{k,l}) \right)+\xi \left(B_{k,l} \right)
= \xi \left(B_{k-4s,0} \right)+\xi \left(B_{k,0} \right)
= \xi \left(B_{k,0} \right)+\xi \left(B_{k,0} \right)=\overline{0},
\end{equation*}
from which we see that $\xi((c_{-4s,0})_{\text{Ab}}(y)-y)=\overline{0}$. Further, by~(\ref{eq:homo_gsigmab_theta})--(\ref{eq:homo_gsigmab_cpq}), we obtain:
\begin{equation}\label{eq:xi3bkl}
\xi \left((c_{2n-2z-4s-1,-2\delta_n m })_{\text{Ab}} (B_{k,l})+(\theta(m,\delta_n)_{\text{Ab}} \circ \rho_{\text{Ab}})(B_{k,l}) \right)= \xi(B_{k-2z+2n-1,0})+\xi (B_{-k,0} ).
\end{equation}
Now:
\begin{align*}
k-2z+2n-1 \equiv 0 \bmod{4s} &\Longleftrightarrow -k \equiv -2z+2n-1 \bmod{4s}, \;\text{and}\\
k-2z+2n-1 \equiv -2z+2n-1 \bmod{4s} &\Longleftrightarrow-k \equiv 0 \bmod{4s},
\end{align*}
from which it follows using~(\ref{eq:xi3bkl}) that $\xi \left((c_{2n-2z-4s-1,-2\delta_n m })_{\text{Ab}} (B_{k,l})+(\theta(m,\delta_n)_{\text{Ab}} \circ \rho_{\text{Ab}})(B_{k,l}) \right)=\overline{0}$, and hence that $\xi((c_{2n-2z-4s-1,-2\delta_n m})_{\text{Ab}} (x)+\theta(m,\delta_n)_{\text{Ab}}(\rho_{\text{Ab}}(x)))=\overline{0}$. Equation~(\ref{eq:xi3red}) then yields a contradiction. We thus conclude that $\alpha$ has the Borsuk-Ulam property with respect to $\tau_2$.
\end{proof}
\begin{proof}[Proof of Proposition~\ref{prop:tau_2_case_7I}]
Suppose on the contrary that $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$. Applying Lemma~\ref{lem:lemma_1} with $i=j=0$, $s_{1}=s$ and $s_{2}=z$, there exist $m,n \in \mathbb{Z}$ and $x,y \in \overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ that satisfy the following equation in~$\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$:
\begin{multline}\label{eq:tau_2_case_7}
\mu(x)+\nu(y)
+(c_{-4s,0})_{\text{Ab}} (\widetilde{T}_{-2\delta_{n+1}r_1,\delta_{n}}) + (c_{2n-2z-4s,0})_{\text{Ab}}(\widetilde{O}_{2s,2\delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2}
-\widetilde{O}_{z-n,-2\delta_{n+1}r_1}) \\
+ (c_{-4s,-2\delta_{n+1}r_1})_{\text{Ab}}(\widetilde{J}_{n-z,-2r_1})
+ (c_{0,\delta_{n+1}})_{\text{Ab}}(\widetilde{J}_{-2s,2\varepsilon_n r_1-2m+1})+\widetilde{O}_{-2s,\delta_{n+1}}
+(\varepsilon_n r_1-m +\delta_n)B_{0,0}\\
+(m-\delta_n)B_{-4s,-2\delta_{n+1}r_1} +r_1 B_{2n-2z-4s,2\delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2}=0,
\end{multline}
where $\map{\mu,\nu}{\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}}$ are the homomorphisms defined on the basis $\{B_{k,l}\}_{k,l\in \mathbb{Z}}$ of $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ by:
\begin{align*}
\mu(B_{k,l}) &= (c_{2n-2z-4s,2\delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2})_{\text{Ab}} (B_{k,l})+\theta(m+\varepsilon_{n+1}r_1,\delta_n)_{\text{Ab}}(\rho_{\text{Ab}}(B_{k,l})) \\
\nu(B_{k,l}) &= (c_{-4s,-2\delta_{n+1}r_1})_{\text{Ab}}(\theta(r_1,0)_{\text{Ab}}(B_{k,l}))-B_{k,l}.
\end{align*}
Using Proposition~\ref{prop:gsigma}, one may check that:
\begin{align*}
\mu(B_{k,l}) &= B_{k-2z+2n-4s,l +\varepsilon_{k}(2 \delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2)}+\varepsilon_{k+n}B_{-k,\varepsilon_{k+n+1}l-2\delta_k(m+\varepsilon_{n+1}r_1)} \\
\nu(B_{k,l}) &= B_{k-4s,l-2\delta_{n+k+1}r_1}-B_{k,l}.
\end{align*}
In what follows, we analyse in turn each of the conditions~(\ref{it:case_7I_1})--(\ref{it:case_7I_3}) of the statement of the proposition, and in each case, we will reach a contradiction.
\begin{enumerate}[(i)]
\item Suppose that $r_2 s \neq 0$, and let $\map{\xi_1}{\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}}[\mathbb{Z}]$ be the homomorphism defined on the basis $\{ B_{k,l} \}_{k,l \in \mathbb{Z}}$ of $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ by $\xi_1 (B_{k,l})=\delta_{k+n}$ for all $k,l \in \mathbb{Z}$. Then $\xi_1(B_{k,l})=\xi_1(B_{k+2t,0})$ for all $k,l,t \in \mathbb{Z}$, from which we obtain $\xi_1 \circ \mu (B_{k,l})=\delta_{k+n} +\varepsilon_{k+n}\delta_{k+n}=0$ and
$\xi_1 \circ \nu (B_{k,l})=0$. Using~Proposition~\ref{prop:gsigma}, we see that $\xi_1(\widetilde{O}_{k,l} )=kl (\delta_{n+1}-\delta_n)=\varepsilon_n kl$,
$\xi_1(\widetilde{J}_{k,l})=-\delta_{n+1}kl$ and $\xi_1(\widetilde{T}_{k,r}) =\delta_n k$. Taking the image of~(\ref{eq:tau_2_case_7}) by~$\xi_1$, and making use of these facts, it follows that:
\begin{multline}\label{eq:multcondi}
- 2 \delta_n \delta_{n+1}r_1+\varepsilon_n(2s(2\delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2)+ 2(z-n)\delta_{n+1}r_1-2s\delta_{n+1}) \\
-\delta_{n+1}(-2s(-2m+2\varepsilon_n r_1+1)-2(n-z)r_1))+ \delta_n(\varepsilon_n r_1+r_1) =0.
\end{multline}
Applying the equalities $\delta_{n+1}\varepsilon_n=\delta_{n+1}$, $\delta_n \delta_{n+1}=0$ and $\delta_n(1+\varepsilon_n)=0$ to~(\ref{eq:multcondi}), we obtain $-2 r_2 s=0$, which contradicts the hypothesis.
\item Suppose that $r_1 > 0$, $r_2$ is even and $z = 0$, and let $\map{\xi_2}{\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}}[\mathbb{Z}_2]$ be the homomorphism defined on the basis $\{ B_{k,l} \}_{k,l \in \mathbb{Z}}$ of $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ by:
\begin{equation*}
\xi_2 (B_{k,l})=\begin{cases}
\overline{k+n+1} & \text{if $l \equiv \varepsilon_n m-r_2/2 \bmod{2 \lvert r_1\rvert}$}\\
\overline{0} & \text{otherwise.}
\end{cases}
\end{equation*}
So $\xi_2 (B_{k,l})=\xi_2 (B_{k+2t,l+2u r_1})$ for all $k,l,t,u \in \mathbb{Z}$, and $\xi_2 (B_{k,l})=\overline{0}$ if $k+n$ is odd. Also, by Proposition~\ref{prop:gsigma} we have:
\begin{equation}\label{eq:cpq}
\text{$\xi_2 \circ (c_{p,q})_{\text{Ab}}=\xi_2 \circ (c_{p+2t,q+2ur_1})_{\text{Ab}}$ for all $p,q,t,u \in \mathbb{Z}$.}
\end{equation}
To analyse the image by $\xi_{2}$ of the terms of~(\ref{eq:tau_2_case_7}), note that if $k\in \mathbb{Z}$ is even, $j\in \mathbb{Z}$,
and $\rho_{1},\rho_{2}\in \mathbb{Z}$ then:
\begin{equation*}
\xi_{2}\Biggl(\sum_{i=1}^{\lvert k \rvert} B_{\rho_{1} \sigma_{k}(2i-1)+\rho_{2},j}\Biggr)= \sum_{i=1}^{\lvert k \rvert} \xi_{2}(B_{\rho_{2}-\rho_{1} \sigma_{k},j})= \overline{k} \xi_{2}(B_{\rho_{2}-\rho_{1} \sigma_{k},j})=\overline{0}.
\end{equation*}
In particular, if $k$ is even and $l\in \mathbb{Z}$ then it follows from Proposition~\ref{prop:gsigma} that:
\begin{equation}\label{eq:jkl0}
\xi_{2}(\widetilde{J}_{k,l})=\xi_{2}(\widetilde{O}_{k,l})=\overline{0}.
\end{equation}
Using~(\ref{eq:cpq}) and~(\ref{eq:jkl0}), we conclude that the images by $\xi_{2}$ of the terms $(c_{0,\delta_{n+1}})_{\text{Ab}}(\widetilde{J}_{-2s,2\varepsilon_n r_1-2m+1})$, $\widetilde{O}_{-2s,\delta_{n+1}}$ and $(c_{2n-4s,0})_{\text{Ab}}(\widetilde{O}_{2s,2\delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2} )$ of~(\ref{eq:tau_2_case_7}) are all equal to $\overline{0}$. Similarly, we have $\xi_2\circ (c_{2n-4s,0})_{\text{Ab}}(\widetilde{O}_{-n,-2\delta_{n+1}r_1})=\overline{0}$ if $n$ is even, while if $n$ is odd, $\xi_2\circ (c_{2n-4s,0})_{\text{Ab}}(\widetilde{O}_{-n,-2\delta_{n+1}r_1})=\overline{0}$ by Proposition~\ref{prop:gsigma}. It follows that $\xi_2\circ (c_{2n-4s,0})_{\text{Ab}}(\widetilde{O}_{-n,-2\delta_{n+1}r_1})=\overline{0}$ for all $n$. Thus the image of~(\ref{eq:tau_2_case_7}) by $\xi_{2}$ yields:
\begin{equation}\label{eq:tau_2_case_7a}
\xi_{2}(\mu(x)+\nu(y)
+ \widetilde{T}_{-2\delta_{n+1}r_1,\delta_{n}}+ \widetilde{J}_{n,-2r_1}
+\chi)=\overline{0},
\end{equation}
where $\chi=(\varepsilon_n r_1-m +\delta_n)B_{0,0}+(m-\delta_n)B_{-4s,-2\delta_{n+1}r_1}+r_1 B_{2n-4s,2\delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2}$. We now compute each of the terms of~(\ref{eq:tau_2_case_7a}).
\begin{enumerate}[(a)]
\item\label{it:tr1} Let us show that $\xi_{2}(\widetilde{T}_{-2\delta_{n+1}r_1,\delta_{n}})=\overline{n+1}$ for all $n\in \mathbb{Z}$. To see this, if $n$ is odd then $\widetilde{T}_{-2\delta_{n+1}r_1,\delta_{n}}= \widetilde{T}_{0,1}=0$ by Proposition~\ref{prop:gsigma}, and so $\xi_{2}(\widetilde{T}_{-2\delta_{n+1}r_1,\delta_{n}})=\overline{0}=\overline{n+1}$. So suppose that $n$ is even. Since $r_{1}>0$, we have:
\begin{equation*}
\xi_{2}(\widetilde{T}_{-2\delta_{n+1}r_1,\delta_{n}})=\xi_{2}(\widetilde{T}_{-2r_1,0})=\sum_{i=1}^{2r_{1}} \xi_{2}(B_{0,1-i}).
\end{equation*}
Since the set $\{ 1-i \, | \, 1\leq i\leq 2r_{1}\}$ contains precisely one element that is congruent to $m-r_2/2$ modulo $2r_{1}$, it follows that $\xi_{2}(\widetilde{T}_{-2\delta_{n+1}r_1,\delta_{n}})=\overline{n+1}$, which proves the result.
\item We claim that $\xi_{2}(\widetilde{J}_{n,-2r_1})=\overline{n}$ for all $n\in \mathbb{Z}$. To see this, if $n$ is even then $\xi_{2}(\widetilde{J}_{n,-2r_1})=\overline{0}=\overline{n}$ by~(\ref{eq:jkl0}). So suppose that $n$ is odd. Then $n\neq 0$, and since $r_{1}>0$, we have:
\begin{equation*}
\xi_{2}(\widetilde{J}_{n,-2r_1})= \sum_{i=1}^{\lvert n \rvert} \sum_{j=1}^{2 r_1} \xi_2 (B_{\sigma_{n}(2i-1), -j})= \sum_{i=1}^{\lvert n \rvert} \sum_{j=1}^{2 r_1} \xi_2 (B_{-\sigma_{n}, -j})= \sum_{j=1}^{2 r_1} \xi_2 (B_{-\sigma_{n}, -j}).
\end{equation*}
As in case~(\ref{it:tr1}), it follows that $\xi_{2}(\widetilde{J}_{n,-2r_1})=\overline{-\sigma_{n}+n+1}=\overline{n}$, which proves the claim.
\item Let us show that the homomorphisms $\xi_{2}\circ \mu$ and $\xi_{2}\circ \nu$ are both zero. It suffices to prove that they are zero on the elements of the basis $\{ B_{k,l} \}_{k,l\in \mathbb{Z}}$ of $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$. Let $k,l\in \mathbb{Z}$. Then:
\begin{equation}\label{eq:tau_2_case_7_aux1a}
\xi_2 \circ \mu (B_{k,l})= \xi_{2}(B_{k,l+2\delta_{n+1}\varepsilon_k m+\varepsilon_{k+n+1} r_2})+ \xi_2 (B_{k,\varepsilon_{n+k+1}l-2\delta_k m}).
\end{equation}
If $k+n$ is odd then it follows from~(\ref{eq:tau_2_case_7_aux1a}) and the definition of $\xi_{2}$ that $\xi_2 \circ \mu (B_{k,l}) =\overline{0}$. So suppose that $k+n$ is even. Then $\varepsilon_k=\varepsilon_n$ and $\varepsilon_{n}(1- 2\delta_{n+1})=-1=-(\varepsilon_n+2\delta_k)$.
Hence:
\begin{align*}
l+2\delta_{n+1}\varepsilon_k m-r_2 \equiv \varepsilon_n m -r_2/2 \bmod{2r_1} &\Longleftrightarrow
l \equiv \varepsilon_n(1-2\delta_{n+1})m+r_2/2 \bmod{2r_1}\\
&\Longleftrightarrow
-l \equiv (\varepsilon_n+2\delta_k)m-r_2/2 \bmod{2r_1}\\
&\Longleftrightarrow
-l-2\delta_{k}m \equiv \varepsilon_n m -r_2/2 \bmod{2r_1}.
\end{align*}
So the terms on the right hand-side of~(\ref{eq:tau_2_case_7_aux1a}) take the same value in $\mathbb{Z}_2$, and thus $\xi_2 \circ \mu (B_{k,l})=\overline{0}$. Since $\xi_{2}(B_{k-4s,l-2\delta_{n+k+1}r_1})=\xi_{2}(B_{k,l})$, it follows that $\xi_{2}\circ \nu(B_{k,l})= \xi_{2}(B_{k,l})+\xi_{2}(B_{k,l})=\overline{0}$, which proves the result.
\item\label{it:tr4} Using the definition of $\xi_{2}$ and the previous calculation, we have:
\begin{align*}
\xi_2(\chi)&=\overline{(-m +\varepsilon_n r_1 +\delta_n)}\xi_2(B_{0,0})+ \overline{(-\delta_n+m)}\xi_{2}(B_{0,0})+\overline{r_{1}}\xi_{2}(B_{2n-4s,2\delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2})\\
&=\overline{r_1}\xi_2(\varepsilon_n B_{0,0})+\overline{r_{1}}\xi_{2}(B_{2n-4s,2\delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2})\\
&= \overline{r_1}\xi_2\bigl(\theta(m+\varepsilon_{n+1}r_1,\delta_n)_{\text{Ab}}(\rho_{\text{Ab}}(B_{0,0}))+ (c_{2n-4s,2\delta_{n+1}(m-r_1)+\varepsilon_{n+1}r_2})_{{\text{Ab}}}(B_{0,0})\bigr)\\
&=\overline{r_1}\xi_2\circ \mu(B_{0,0})=\overline{0}.
\end{align*}
\end{enumerate}
Substituting the results of~(\ref{it:tr1})--(\ref{it:tr4}) in~(\ref{eq:tau_2_case_7a})yields a contradiction in this case.
\item Finally, suppose that $r_1=r_2=z=0$ and $s \neq 0$. Let $\map{\xi_3}{\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}}[\mathbb{Z}_2]$ be the homomorphism defined on the basis $\{ B_{k,l} \}_{k,l \in \mathbb{Z}}$ of $\overline{\left\langle \sigma^2 \right\rangle}_{\text{Ab}}$ by:
\begin{equation*}
\xi_3 (B_{k,l})=\begin{cases}
\overline{1} & \text{if $k \equiv n \bmod{4\lvert s \rvert}$}\\
\overline{0} & \text{otherwise.}
\end{cases}
\end{equation*}
Then $\xi_3(B_{k+4ts,l})=\xi_3(B_{k,0})$ for all $k,l,t\in\mathbb{Z}$. It follows from this equality that $\xi_3\circ\nu(y)=\overline{0}$, that $\xi_{3}\circ (c_{0,\delta_{n+1}})_{\text{Ab}}(\widetilde{J}_{-2s,1-2m})=\xi_{3}(\widetilde{J}_{-2s,1-2m})$, and that $\xi_{3}((\delta_n-m)B_{0,0}+(m-\delta_n)B_{-4s,0})=\overline{0}$. Further, since $k + 2n \equiv n \bmod{4 \lvert s \rvert}$ if and only if $-k \equiv n \bmod{4 \lvert s \rvert}$, we see from the definition of $\mu$ that $\xi_3(\mu(x)) = \overline{0}$. Applying $\xi_3$ to~(\ref{eq:tau_2_case_7}) and making use of Proposition~\ref{prop:gsigma}, we obtain:
\begin{equation}\label{eq:tau_2_case_7b}
\xi_3((c_{2n-4s,0})_{\text{Ab}}(\widetilde{O}_{2s,2\delta_{n+1}m})) + \xi_3(\widetilde{J}_{-2s,1-2m}) + \xi_3(\widetilde{O}_{-2s,\delta_{n+1}}) = \overline{0}.
\end{equation}
It remains to compute each of the terms of~(\ref{eq:tau_2_case_7b}).
\begin{enumerate}[(a)]
\item\label{it:xi3a} Let us show that $\xi_3((c_{2n-4s,0})_{\text{Ab}}(\widetilde{O}_{2s,2\delta_{n+1}m}))= \overline{0}$. If $n$ is odd or $m=0$, this is clearly the case.
So suppose that $n$ is even and $m \neq 0$. Then by Proposition~\ref{prop:gsigma} we have:
\begin{align*}
\xi_3((c_{2n-4s,0})_{\text{Ab}}(\widetilde{O}_{2s,2\delta_{n+1}m}))
& = \displaystyle \sum_{i=1}^{2\lvert s \lvert } \sum_{j=1}^{2 \lvert m\rvert} \left( \xi_3 \left( B_{\sigma_s(2i-1)+2n-4s,0} - B_{\sigma_s(2i-1)+2n-4s-1,0}\right) \right) \\
& = 2 \lvert m \rvert \displaystyle \sum_{i=1}^{2\lvert s \lvert } \left( \xi_3 \left( B_{\sigma_s(2i-1)+2n-4s,0} - B_{\sigma_s(2i-1)+2n-4s-1,0}\right) \right) = \overline{0}.
\end{align*}
\item We claim that $\xi_3(\widetilde{J}_{-2s,-2m+1}) = \overline{n}$. To see this, by Proposition~\ref{prop:gsigma} we have:
\begin{equation*}
\xi_3(\widetilde{J}_{-2s,1-2m})
= \displaystyle \sum_{i=1}^{2 \lvert s \rvert} \sum_{j=1}^{\lvert 2m-1 \rvert} \xi_3(B_{-\sigma_s(2i-1),0})
= \sum_{i=1}^{2 \lvert s \rvert} \xi_3(B_{-\sigma_s(2i-1),0}).
\end{equation*}
Let $A=\{ -\sigma_s(2i-1) \, | \, 1 \leq i \leq 2\lvert s \rvert \}$. Then $A$ consists of all odd integers between $-\sigma_s$ and $-\sigma_s\lvert 4s \rvert$. So if $n$ is even (resp.\ odd) then there is no element (resp. exactly one element) of $A$ that is congruent to $n\bmod{4\lvert s \rvert}$, and the claim follows.
\item\label{it:xi3c} Let us show that $\xi_3(\widetilde{O}_{-2s,\delta_{n+1}})=\overline{n+1}$. If $n$ is odd the result is clear. So suppose that $n$ is even. By Proposition~\ref{prop:gsigma} we have:
\begin{equation*}
\xi_3(\widetilde{O}_{-2s,\delta_{n+1}})
= \displaystyle \sum_{i=1}^{2 \lvert s \rvert}\left( \xi_3(B_{-\sigma_s(2i-1),0}) + \xi_3(B_{-\sigma_s(2i-1)-1,0}) \right).
\end{equation*}
Let $A = \{ -\sigma_s(2i-1) \, | \, 1 \leq i \leq 2 \lvert s \rvert \}$ and $B = \{ -\sigma_s(2i-1)-1 \, | \, 1 \leq i \leq 2 \lvert s \rvert \}$. Note that $A$ and $B$ are disjoint, and if $s<0$ (resp.\ $s>0$), $A \cup B$ is equal to $\{0 ,1, \ldots , 4 \lvert s \rvert - 1\}$ (resp.\ to $\{-1,-2, \ldots , -4 \lvert s \rvert\}$) So there is exactly one element of $A \cup B$ that is congruent to $n\bmod{4 \lvert s \rvert}$, and therefore $\xi_3(\widetilde{O}_{-2s,\delta_{n+1}}) = \overline{1} = \overline{n+1}$ as required.
\end{enumerate}
We obtain a contradiction by substituting the results of~(\ref{it:xi3a})--(\ref{it:xi3c}) in~(\ref{eq:tau_2_case_7b}), and we conclude that $\alpha$ possesses the Borsuk-Ulam property with respect to~$\tau_2$.\qedhere
\end{enumerate}
\end{proof}
\begin{proof}[Proof of Proposition~\ref{prop:tau_2_case_6I}]
To prove that $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$, it suffices to exhibit elements $a,b\in P_2(\mathbb{K}^2)$ that satisfy conditions~(\ref{eq:algebra_i})--(\ref{eq:algebra_iii}) of Lemma~\ref{lem:algebra_tau_2}.
We define these elements as follows:
\begin{enumerate}
\item\label{it:case6_a}
\begin{enumerate}
\item\label{it:case6_ai} if $z=0$ and $r_{2}$ is even, let $a=(\boldsymbol{1};0,0)$ and $b=(\boldsymbol{1};r_2/2,0)$.
\item\label{it:case6_aii} if $z=1$, let $a=(v^{-2s} (u^{2r_1-1} v^{-1})^{2s} B^{-r_1}; r_1 , 2s)$ and $b =(u^{-\omega_s r_2} B^{1-\omega_s};0,1)$
\end{enumerate}
\item\label{it:case6_b} if $z=0$ and $r_{2}$ is odd, let $a= a_1^{r_1}$ and $b=(b_1 \sigma)^{-r_2} \sigma^{-1}$, where $a_1=(u^{-2};1,0)$ and $b_1=(u^{-1};0,0)$.
\end{enumerate}
We start by considering case~(\ref{it:case6_a}). First, $(p_{1})_{\#}(a)=(0,0)$ in case~(\ref{it:case6_a})(\ref{it:case6_ai}) and $(p_{1})_{\#}(a)=(r_{1},2s)$ in case~(\ref{it:case6_a})(\ref{it:case6_aii}), and it follows that $(p_{1})_{\#}(a)=((z +(1-z)\delta_{r_2})r_1, 2zs) =\alpha_\#(1,0)$, so Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_ii}) holds. Secondly, by taking $a=b$ in~(\ref{eq:blsiga}), we obtain $(p_1)_\# (b l_\sigma(b))=(r_{2},0)$ in case~(\ref{it:case6_a})(\ref{it:case6_ai}) and $(p_1)_\# (b l_\sigma(b))=(\omega_{s} r_{2},2)$ in case~(\ref{it:case6_a})(\ref{it:case6_aii}), and it follows that $(p_1)_\# (b l_\sigma(b))=(\omega_{zs}r_2 , 2z)=\alpha_\#(0,1)$, so Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_iii}) is satisfied. In case~(\ref{it:case6_a})(\ref{it:case6_ai}), it is clear that $abl_{\sigma}(a)=b$, so Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}) holds, and thus $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$ in this case. We now show that Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}) is satisfied in case~(\ref{it:case6_a})(\ref{it:case6_aii}). Taking $a=(u^{2r_1-1} v^{-1}; 0,0)$ and $b=(\boldsymbol{1};0,0)$ in~(\ref{eq:blsiga}) and using Proposition~\ref{prop:p2_k2} and the fact that $B=uvuv^{-1}$, we obtain:
\begin{align*}
l_{\sigma}(u^{2r_1-1} v^{-1}; 0,0)&= ((Bu^{-1})^{2r_{1}-1} B^{1-2r_{1}} \theta(2r_{1}-1,0)(uvuB); 2r_{1}-1,-1)\\
&= (uvu^{2r_{1}-1}v^{-1}u^{-1}\ldotp B^{2r_1-1} \ldotp B^{1-2r_{1}} uvu^{2(1-2r_{1})}u B^{1-2r_{1}} \ldotp B ; 2r_{1}-1,-1)\\
&=(uvu^{2-2r_{1}}B^{2-2r_{1}}; 2r_{1}-1,-1).
\end{align*}
So:
\begin{align*}
(l_{\sigma}(u^{2r_1-1} v^{-1}; 0,0))^{2s}=& ((uvu^{2-2r_1}B^{2-2r_1} ;2r_1-1,-1)(uvu^{2-2r_1}B^{2-2r_1} ;2r_1-1,-1))^{s}\\
=& (uvu^{2-2r_1}B^{2-2r_1} B^{2r_1-2}u^{-1}B^{2-2r_1} B^{2r_1-1}vu^{2-4r_1}B^{2-2r_1}\ldotp\\
& (B^{2r_1-2}u^{-1}B^{2-2r_1})^{2-2r_1}B^{2r_1-2};0,-2)^{s} \\
=& (uvu^{1-2r_1}Bvu^{2-4r_1}u^{2r_1-2};0,-2)^{s}=(uvu^{2-2r_1}vu^{1-2r_1};0,-2)^{s} \\
=& (B(vu^{1-2r_1})^2;0,-2)^{s}= ((B(vu^{1-2r_1})^2)^{s};0,-2s).
\end{align*}
Now:
\begin{align*}
\theta(r_{1},2s+1)((Bv^{2})^{s}) &= \theta(r_{1},2s+1)((uv)^{2s})=(B^{r_1-1}(u^{-1}Bvu^{-2r_{1}})B^{1-r_1})^{2s}\\
&=(B^{r_1-1}(vu^{1-2r_{1}})B^{1-r_1})^{2s})=B^{r_1-1}(vu^{1-2r_{1}})^{2s} B^{1-r_1},
\end{align*}
and
\begin{align*}
\theta(r_{1},2s+1)((B(vu^{1-2r_{1}})^{2})^{s})&=(B^{-1} (B^{r_{1}}vu^{-2r_{1}}B^{1-r_{1}}\ldotp B^{r_{1}-1} u^{2r_{1}-1} B^{1-r_{1}})^{2})^{s}\\
&= (B^{-1} (B^{r_{1}}vu^{-1}B B^{-r_{1}})^{2})^{s}= (B^{r_{1}-1} vu^{-1}Bvu^{-1} B^{1-r_{1}})^{s}\\
&= (B^{r_{1}-1} v^{2}B^{1-r_{1}})^{s}= B^{r_{1}-1} v^{2s}B^{1-r_{1}}.
\end{align*}
Hence:
\begin{align*}
l_\sigma(a) &=l_\sigma(v^{-2s};0,0) (l_\sigma (u^{2r_1-1}v^{-1};0,0))^{2s} l_\sigma (B^{-r_1};r_1,2s) \\
&= ((uv)^{2s};0,-2s) ((B(vu^{1-2r_1})^2)^{s};0,-2s) (B^{-r_1};r_1,2s)\\
&= ((uvuv^{-1} v^2)^s;0,-2s) ((B(vu^{1-2r_1})^2)^{s};0,-2s) (B^{-r_1};r_1,2s)\\
&= ((Bv^2)^s (B(vu^{1-2r_1})^2)^sB^{-r_1};r_1,-2s).
\end{align*}
If $s=0$ then:
\begin{align*}
a b l_\sigma(a) &=(B^{-r_1};r_1,0)(u^{-r_2};0,1)(B^{-r_1};r_1,0)=(B^{-r_1}(B^{r_1} u B^{-r_1} )^{-r_2} ; r_1,1 )(B^{-r_1};r_1,0) \\
&=(u^{-r_2} B^{-r_1} B^{r_1};0,1)=(u^{-r_2};0,1)=b,
\end{align*}
while if $s\neq 0$ then:
\begin{align*}
a b l_\sigma (a) &= (v^{-2s} (u^{2r_1-1} v^{-1})^{2s} B^{-r_1}; r_1,2s)(B ; 0 , 1)((Bv^2)^s (B(vu^{1-2r_1})^2)^s B^{-r_1};r_1,-2s) \\
&= (v^{-2s} (u^{2r_1-1} v^{-1})^{2s} B^{1-r_1}; r_1 ,2s+1)((Bv^2)^s (B(vu^{1-2r_1})^2)^s B^{-r_1};r_1,-2s) \\
&= (v^{-2s} (u^{2r_1-1} v^{-1})^{2s} B^{1-r_1} \ldotp B^{r_1-1}(vu^{1-2r_{1}})^{2s} B^{1-r_1} \ldotp B^{r_{1}-1} v^{2s}B^{1-r_{1}}\ldotp B^{r_1}; 0,1)\\
&= (B;0,1)=b.
\end{align*}
So Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}) is satisfied in case~(\ref{it:case6_a})(\ref{it:case6_aii}), and hence $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$ in this case.
We now consider case~(\ref{it:case6_b}). First, $(p_1)_\#(a)=(p_1)_\# (a_1)^{r_1}=(1,0)^{r_1}=(r_1,0)= \alpha_\# (1,0)$, so Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_ii}) holds. Further:
\begin{align*}
b l_\sigma(b) &=(b_1 \sigma)^{-r_2} \sigma^{-1} \sigma (b_1 \sigma)^{-r_2} \sigma^{-1} \sigma^{-1}
=(b_1 \sigma b_1 \sigma)^{-r_2} B^{-1}=(b_1 l_\sigma (b_1) B)^{-r_2} B^{-1},
\end{align*}
and hence:
\begin{align*}
(p_1)_\# (b l_\sigma(b)) &= ((p_1)_\# (b_1) (p_1)_\# (l_\sigma (b_1)) (p_1)_\# (B))^{-r_2} (p_1)_\# (B^{-1})=(-1,0)^{r_2}=(r_2,0)=\alpha_\# (0,1),
\end{align*}
so Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_iii}) is satisfied. It remains to show that Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}) holds.
By~(\ref{eq:a_b_lsigma_a1}), we have:
\begin{align*}
a_1 b_1 l_\sigma(a_1) &= (u^{-2} \theta(1,0)(u^{-1}) \theta(1,0)((Bu^{-1})^{-2} B^{2}); 0,0)=(u^{-2} \theta(1,0)(u^{-1}(Bu^{-1})^{-2} B^{2}); 0,0)\\
&= (u^{-2} \theta(1,0)(B^{-1}uB); 0,0)= (u^{-1};0,0)=b_1.
\end{align*}
So $l_\sigma(a_1)=b_1^{-1}a_1^{-1} b_1$, hence $\sigma a \sigma^{-1}= l_\sigma(a)=b_1^{-1}a^{-1} b_1$, and thus $a^{-1}=(b_1\sigma)^{-1}a (b_1\sigma)$. Since $r_{2}$ is odd, it follows that $a^{-1}=(b_1\sigma)^{-r_{2}} a (b_1\sigma)^{r_{2}}= b l_\sigma(a) b^{-1}$, which implies that $ab l_\sigma(a)=b$. So Lemma~\ref{lem:algebra_tau_2}(\ref{eq:algebra_i}) is satisfied in case~(\ref{it:case6_a})(\ref{it:case6_aii}), and therefore $\alpha$ does not have the Borsuk-Ulam property with respect to $\tau_2$ in this case.
\end{proof}
\section*{Ackowledgements}
This paper was completed during the Postdoctoral Internship of the third author at IME-USP from March 2020 to August 2021. He was supported by Capes/INCTMat project n\textsuperscript{o} 8887.136371/2017-00-465591/2014-0. The first author is partially supported by the Projeto Temático FAPESP, \emph{Topologia Alg\'ebrica, Geom\'etrica e Diferencial}, grant n\textsuperscript{o} 2016/24707-4.
|
\section{Introduction}
\label{intro}
According to information theory, entropy can reflect the richness of image information and the value of information entropy reflects the amount of information carried by the image. Generally speaking, the higher the information entropy, the richer the content of image is. In 1948, C. E. Shannon, the father of information Theory, pointed out that there is redundancy in any information, and the size of redundancy is related to the occurrence probability or uncertainty of each in the information. Shannon referred to the concept of thermodynamics, called the average amount of information after removing redundancy in information ``information entropy", and gave the mathematical expression for calculating information entropy as below:
\begin{equation}
H(x) = E[I(xi)] = E[\log_{2}{P(x_i)}] = -\sum_{i=1}^{n}{P(x_i)\log_{2}{P(x_i)}}
\end{equation}
Image super-resolution refers to the conversion of a low-resolution image into a high-resolution image and fill in the details.Super-resolution technology can be roughly divided into three categories. According to its input and output, namely, multi-image, video and single-image super-resolution. The single image super-resolution reconstruction technology has always been a research hotspot in the field of image processing because of its high practical value in enhancing image details and texture.\\
However, single image based super-resolution is ill-posed, because there are multiple corresponding high-resolution images for the same low-resolution image. The traditional mean square loss tends to generate the average value of multiple possible solutions and encourage blurry and over-smoothed results. To push the solution closer to the natural manifold, the perceptual loss is presented by J. Johnson\cite{RefPerceptualLoss},which optimized model in a high dimensional feature space rather than a pixel space. Furthermore, Ledig\cite{RefSRGAN} proposed to add adversarial loss to make the network more similar to the result of natural images.\\
By using these losses, the visual quality obtained by super-resolution has been greatly improved. However, the current mainstream objective evaluation criteria, such as PSNR and SSIM, can only describe the similarity between the super-resolution image and the original image, but cannot describe the true degree of the details generated by the super-resolution image. The above perception-based methods have lower PSNR and SSIM\cite{RefSSIM} scores while have higher perception quality. Therefore, in the past few years, more and more scholars take MOS and DMOS as metrics. But there is a problem, MOS and DMOS is influenced by the bias of the subjective perception of the crowed. Because different people have different judgements on the quality of the same image. it is very time-consuming and laborious to obtain a valid large-scale subjective evaluation result.The lack of a faithful objective criterion for assessing the perceptual quality of images is restricting progress in perceptually-aware image reconstruction and manipulation tasks. The current main tool for comparing methods are human-opinion studies, which are hardly reproducible, making it practically impossible to systematically compare methods and assess progress.\\
Therefore, a new objective metric is proposed in this paper, which can better describe the reality degree of super-resolution image details. It is much better for quantifying perceptual quality than PSNR and SSIM. The contribution of this paper is as below:
\begin{enumerate}
\item In this paper, image information entropy is viewed and described from a new perspective, that is, neural network, which shows the possibility of simulating traditional algorithms by using convolution with specific weights and special activation function;
\item The traditional information entropy calculation method is serial, but the spatial information entropy proposed in this paper has a great increase in speed compared with the traditional image information entropy due to its high parallelism;
\item Compared with the traditional image quality evaluation indexes such as PSNR and SSIM, the spatial information entropy proposed in this paper is closer to the subjective perception of human beings.
\end{enumerate}
\section{Related Works}
\label{sec:1}
Image quality metrics can be grouped by subjective metrics and objective metrics.
\subsection{subjective metrics}
\label{sec:2}
The most direct and natural evaluation method is evaluating by human. In order to realize subjective quality evaluation, it is necessary to establish a super-resolution image database by using the open natural image database, and then set up reasonable evaluation criteria and organize several non-expert observers.\\
Subjective quality evaluation usually requires people to subjectively rate the image quality according to certain experimental rules. Generally, MOS score (the average score of all experimental subjects) or DMOS score (the difference between the evaluation score of undistorted image and distorted image by human eyes) is adopted. Subjective quality evaluation generally requires subjects to make subjective qualitative evaluation on the quality of images, so the selection of valuators should consider whether they have ever participated in similar experiments, or whether they have undergone subjective experimental training. It is needed to select a large number of valuators to ensure that the results of subjective image quality evaluation are statistically significant. The subjective quality evaluation method is time-consuming and laborious, and it cannot be described by mathematical model.
\subsection{objective metrics}
\label{sec:3}
The idea of objective evaluation of image quality is to design a computational model that can accurately and automatically measure image quality. Ideally, we would like to be able to use computer models to see and understand images in the same way that we perceive them. At present, PSNR and SSIM are the most commonly used image quality evaluation criteria in the field of super-resolution. Actually, PSNR is just another form of mean square error. It only calculates the square error between each pixel of two images, which is quite different from the perception quality of human eyes. The model trained with mean square error as loss also tends to generate overly-smoothed images and lose many texture details. Therefore, the size of PSNR value cannot accurately reflect the visual quality of super-resolution images. Compared with PSNR, SSIM\cite{RefSSIM} can better reflect the quality of super-resolution images. It compares the brightness, contrast and structure information of reconstructed images with original high-resolution images to calculate the similarity, which is better when higher. However, SSIM still has the problem of inconsistency with perceptual quality when evaluating super-resolution method of the past few years. Sheikh et al. proposed the information fidelity criterion\cite{RefIFC} and visual information fidelity \cite{RefVIF}as metrics. These two methods model the quality perception modeling as the information extraction process to measure the quality of the reconstruction image, and the evaluation results have better consistency with the visual perception quality of the human eye, but this method has no response to the structure information of the image. The sub-pixel level matching errors between the reconstructed image and the high-resolution reference image caused a problem of image quality evaluation. To solve this problem, Kim et al \cite{RefSubPixel} presents a method to evaluate different super-resolution images by eliminating the subpixel displacement between the reference image and the reconstructed image. The experimental results show that this method is more accurate than the traditional metrics. In addition, Liu et al\cite{RefPhaseConsistency} found that human eyes are more sensitive to pixels with high phase consistency, so phase consistency is applied to image quality evaluation. Zhang et al\cite{RefFSIM} in Hong Kong Polytechnic University compare the difference between the reconstructed image and the original image is estimated by comparing the Feature Similarity (FSIM) between the images. The method selects the phase consistency and gradient information of interest to human eyes as the characteristics of image quality evaluation, which has good consistency with the subjective quality evaluation in some cases, but it doesn't showe well in super-resolution cases.
In 2018 PIRM Challenge on Perceptual Image Super-resolution, Yochai Blau et al present PI\cite{RefPI} as evaluation metric, which is combined by Ma\cite{RefMa} and NIQE\cite{RefNIQE}. However, it is a no-reference image quality metric, which means a super-resolution image with high perceptual quality but low relevance with the high-resolution image can get high score. It can only be used with other metrics together. But the metric we present can take account both of similarity and perceptual quality, it will be introduced detailedly in section 3.
\section{Method}
\label{sec:4}
\begin{figure}
\subfigure[]{
\begin{minipage}[t]{0.3\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig1a.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.3\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig1b.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.3\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig1c.png}
\end{minipage}}
\centering
\caption{Three totally different images with the same global information entropy}
\label{fig:1}
\end{figure}
\begin{figure}
\subfigure[]{
\begin{minipage}[t]{0.3\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig2a.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.3\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig2b.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.3\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig2c.png}
\end{minipage}}
\centering
\caption{RIE results of the three images above}
\label{fig:2}
\end{figure}
As shown in Fig. \ref{fig:1}, a statue on the left, a stripe on the right, and a rectangle in the middle. They look totally different, but they are the same under the traditional measure of information entropy of entire image. The ratio of pixels of white to black of them is the same, it is 68:32. The same ratio result in the same global information entropy. The traditional global information entropy can't seize the structure and content of the images. To overcome the problem, we take regional information entropy instead. The regional information entropy results are shown in Fig. \ref{fig:2}, the structure and content of images are well captured. The images that look different are also different in terms of regional information entropy. The equations of regional differential information entropy is as below:
\begin{equation}
P_l(u)=\left\{
\begin{aligned}
\frac{1}{h*w}, & & u=l \\
0, & & u\neq l
\end{aligned}
\right.
\end{equation}
\begin{equation}
H(A)=-\sum_{n=1}^{L-1}{\sum_{i=0}^{h-1}{\sum_{j=0}^{w-1}{p_l(x_{ij})log_{2}{p_l(x_{ij})}}}} ,x_{ij}\in{A}
\end{equation}
\begin{equation}
E(I,I^r)=\frac{\sum_{y=0}^{\frac{height}{s}+s-h}{\sum_{x=0}^{\frac{width}{s}+s-w}{(H(I_{xy})-H(I_{xy}^r))}}}
{(\frac{height}{s}+s-h)(\frac{width}{s}+s-w)}
\end{equation}
Where $h$ and $w$ are the height and width of a single image region, $x_{ij}$represents the pixel gray value at $(i , j)$ position in a single image region, height is the height of the image, width is the width of the image, s is the step length, $I$ is the test image, $I^r$ is the the reference image. $I_{xy}$represents the image window ranking $x$ by column and $y$ by row. \\
Traditional image information entropy is quantified by 256 grays levels.However, human eyes are not sensitive to small differences in gray levels. As shown in Fig. \ref{fig:3}, the two images has the same shape and same regional information entropy result with 256 gray levels, but look totally different in human eyes. So we take smaller gray levels $L$ instead, such as 8,16,32 . We also take experiments on section 4.1 to get the appropriate gray levels. $P_l(u)$ becomes as follows:
\begin{equation}
P_l(u)=\left\{
\begin{aligned}
\frac{1}{h*w}, & & u={\frac{l*256}{L},...,(l+1)*\frac{256}{L}-1} \\
0, & & u\neq {\frac{l*256}{L},...,(l+1)*\frac{256}{L}-1}
\end{aligned}
\right.
\end{equation}
\begin{figure}
\subfigure[]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig3a.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig3b.png}
\end{minipage}}
\caption{Stripe patterns in different colors.
The difference between the two adjacent stripes on the left is 3, while the difference on the right is 255}
\label{fig:3}
\end{figure}\\
However, it is very time consuming to calculate the information entropy with sliding windows. So we optimized the algorithm of RDIE, make it possible to calculate information entropy parallel in every window. To be specific, we use different channels to calculate the frequency of different grayscales appears. And we take a neural network composed by a $1\times1$ convolution layer,a average pooling layer, two specific activation functions,a summation and scaling step to replace traditional ways. The pipeline is as Fig. \ref{fig:4} showns. The two specific activation functions are a step function and an entropy function, they are as below:
\begin{equation}
Step_{L}(x)=\left\{
\begin{aligned}
1, & & 0 \leq x < \frac{256}{L} \\
0, & & else
\end{aligned}
\right.
\end{equation}
\begin{equation}
Entropy(x)=\left\{
\begin{aligned}
-x*\log_{2}{x}, & & x\neq0 \\
0, & & 0
\end{aligned}
\right.
\end{equation}
\begin{figure}
\includegraphics[width=\textwidth]{Fig4.png}
\caption{An illustration of $RIE_{nn}$ architecture.
A special $1\times1$ convolution with the same weights and different bias is taken to map the image to $3\times L$ channels, step function is applied to make the channels only responds to the corresponding grayscale. Average pooling is used to calculate the frequency of specify grayscale in the sliding window. Entropy function is applied to get the entropy values from the frequency. Grouping sum along the channels is to get entropy values of RGB. Scaling is used to make all the entropy values is between 0 and 255}
\label{fig:4}
\end{figure}
\begin{center}
\begin{table}
\caption{the speed of traditional method and neural network method}
\label{tab:1}
\includegraphics[width=\textwidth]{table1.png}
\end{table}
\end{center}
With the help of existing parallel computing platform, the computational efficiency also increase a lot, the time consuming between traditional method and our method is as Tab. \ref{tab:1} shown. ``GIE" means global information entropy of entire image, while ``RIE'' means regional information entropy. The window size of RIE is set as $4\times4$ and the gray levels is set as 8. The subscript ``t" means traditional method which is calculated in cpu, while the subscript ``nn" means neural network method which is calculated in gpu. The physical environment is i7-8700K where traditional method calculate and 2080Ti where our proposed method calculate. Traditional method is written in python with opencv-python and numpy, while our method is written in python with tensorflow. The time calculated is the time consuming of processing an image with $2040\times1356$ resolution. From the results, we can find that the neural network method is about 3 times of speed when calculate GIE, and 5400 times of speed when calculate RIE. \\
\begin{figure}
\subfigure[]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig5a.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig5b.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig5c.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig5d.png}
\end{minipage}}
\caption{comparison of RIE results with different window sizes. (a) is the original image; (b) is generated by
$4\times4$ window size; (c) is generated by $16\times16$ window size; (d) is generated by $64\times64$ window size }
\label{fig:5}
\end{figure}\\
To visually see the influence of different window sizes on RIE, we performed an experiment, the results is shown in Fig. \ref{fig:5}. Image(d) has the biggest window size but can only reflect rough contours, image(c) can reflect a more distinct contours and information distribution, image(b) is the best. In general, the smaller the window, the clearer the result. We also performed experiments on section 4.2 to learn the influence of window sizes on RDIE(reginal differential information entropy). \\
For common steps of RDIE, the generated super-resolution image and high-resolution image respectively as input to get the corresponding regional information entropy Maps, then we calculate the mean absolute error between maps as quantitative value. For the convenience of visualization and comparison, the values of maps are first normalize to [0,1] and then scaled to [0,255], the quantitative value is scaled to [0,255] accordingly. When the value is smaller, the super-resolution image is closer to the high-resolution image in the regional information richness.
\section{Experiments}
We take validation set of div2k\cite{RefDiv2k} as test datasets. As is known to all, the similarity of images obtained from down-sampling and up-sampling back is negatively correlated with the resample rate. The higher the resample rate, the lower the similarity. For example, an image which is down-sampled by $2\times$ and up-sampled back always have higher similarity with the original image than the image which is down-sampled by $4\times$ and up-sampled back. Therefore, the evaluation metrics were first tested by different resample rate of the same images.\\
Fig. 6 is the results of PSNR and SSIM on images with different resample rates. These results are the average values of PSNR and SSIM of 100 resample images in the DIV2K validation dataset. Both PSNR and SSIM are capable of evaluating images' similarities with different resample rates reasonably. Both of the curves are monotonically decreasing and steep enough.\\
\begin{figure}
\subfigure[]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig6a.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig6b.png}
\end{minipage}}
\centering
\caption{PSNR and SSIM for images with different resample rates}
\label{fig:6}
\end{figure}
\begin{figure}
\centering
\subfigure[the influence of different gray levels on RDIE ]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig7a.png}
\end{minipage}}
\centering
\subfigure[the influence of different window size on RDIE ]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig7b.png}
\end{minipage}}
\centering
\caption{PSNR and SSIM for images with different resample rates}
\label{fig:7}
\end{figure}
\subsection{Ablation experiments}
\subsubsection{the influence of gray levels on RDIE}
With $4\times4$ window, the influence of gray levels on RDIE is shown in Fig. \ref{fig:7}. All the curves are monotonically increasing with the resample rate, but the curve of gray level 32 is too flat between resample rate 4 and 5. In the rest of curves, curves of gray levels 8 and 16 are steepest, and they are very closed. But for the sake of computational efficiency, gray level 8 is the best choice.
\subsubsection{the influence of window size on RDIE}
When the gray level is 8, the influence of different sliding window sizes on RDIE is shown in Fig. \ref{fig:8}. The evaluation of image quality with different resampling rates of regional information entropy error presents a nonlinear trend as a whole. When the sliding window sizes is greater than or equal to 16, the curves are not monotonically increasing, and their relative values of 4x and 5x is not right. Curves of window size 4 and 8 are monotonically increasing, and they are very similar. But curve of window size 4 is more well-distributed, so window size $4\times4$ is the better.
\subsection{PSNR,SSIM,RDIE,Mos of different super-resolution method}
We performed a user study to quantify the ability of different approaches to reconstruct perceptually convincing images. Because the high-resolution images in div2k\cite{RefDiv2k} are two big(about $2k\times1k$) to put on the user study page or on the paper, we select 30 groups of images and cropped them with the size of $500\times500$. We take bicubic, EDSR\cite{RefEDSR}, WDSE\cite{RefWDSR}, SAN\cite{RefSAN}, SRGAN\cite{RefSRGAN}, SPSR\cite{RefSPSR} as super-resolution method to generate $4\times$ super-resolution images from low-resolution images. Bicubic is a traditional method, EDSR\cite{RefEDSR} removed the redundant structure from SRResNet\cite{RefSRResNet}, so it can run very fast. WDSR\cite{RefWDSR} expand channels before convolution on the basis of EDSR\cite{RefEDSR}, the effect is improved in some degeree. With temporal and spatial attention, SAN\cite{RefSAN} improved both perceptual quality and reconstruction precision. SRGAN\cite{RefSRGAN} is the first method to use both perceptual loss and adversarial loss, which get much higher perceptual quality than EDSR and WDSR, but lower PSNR and SSIM. With extra gradient loss, SPSR\cite{RefSPSR} is state-of-the-art super-resolution method in perceptual quality.
As shown in Fig. \ref{fig:8}, the results of EDSR and WDSR are very similar, while the results of SAN are much better especially in regular text and shapes, all of the three method target PSNR maximization. SRGAN and SPSR target perceptual quality maximization, they perform better results in natural texture. In fact, most of the images in the test dataset are natural scene images, so SRGAN and SPSR get higher mean opinion score in the user study. \\
According to the previous ablation experiments, we set the gray level as 8, the sliding window size as $4\times4$. With 30 cropped high-resolution images as reference, PSNR, SSIM, RDIE and MOS of different super-resolution method is shown in Tab. \ref{tab:2}. Best results show in black bold, and worst results in red bold. As shown in Tab. \ref{tab:2}, RDIE has similar results with MOS while PSNR and SSIM are totally different with MOS. SAN get highest PSNR and SSIM, rank second and third are WDSR and EDSR, while SRGAN and SPSR get even lower PSNR and SSIM than Bicubic. There is inconsistency between PSNR/SSIM values and perceptual quality. Under the metric we proposed, bicubic method is the worst, SPSR is the best method, both of them has better perceptual quality in natural texture. It shows great consistency between RDIE and MOS.
To validate the cropped images can well represent the original 100 groups of images, we performed an experiment on the whole 100 2K images without MOS, the results is shown in Tab. \ref{tab:3}. Although the specific values are different, they has the same conclusions. SAN also get the highest PSNR and SSIM, while SRGAN also get the lowest. SPSR also get the best RDIE, while Bicubic get the worst. \\
Fig. \ref{fig:9} is a comparison of different super-resolution method on artificial scene. SAN and SPSR are the top-2 method under MOS and RDIE. SAN has a better reconstruction of the plaid shirt pattern, while SPSR has better reconstruction of the texture of the jeans. PSNR, SSIM and MOS show consistency on image (d), but inconsistency on image (f). The results of EDSR and WDSR are blurry, while the result of SRGAN has artifacts.\\
Fig. \ref{fig:10} is a comparison of different super-resolution method on natural scene. Image (b),(c),(e) has distortion on the wooden rail, while image (d) and (e) has straight wooden rail. The boats, branch and the cottage on (b),(c),(d) is more like a painting, while those on (e) and (f) is more like a photo. In general, the method target PSNR maximization don't perform well on natural scene, because the results are too smooth. The method target perceptual quality maximization is the best under RDIE and MOS.
\begin{figure}
\includegraphics[width=1\textwidth]{Fig8.png}
\caption{results of different super-resolution method}
\label{fig:8}
\end{figure}
\begin{table}
\caption{PSNR,SSIM,RDIE and MOS of different super-resolution method}
\label{tab:2}
\includegraphics[width=\textwidth]{table2.png}
\end{table}
\begin{table}
\caption{PSNR,SSIM and RDIE of different super-resolution method}
\label{tab:3}
\includegraphics[width=\textwidth]{table3.png}
\end{table}
\begin{figure}
\subfigure[bicubic]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig9a.png}\\
PSNR:22.672 SSIM:0.647 \\
RDIE:43.563 MOS:2.075
\end{minipage}}
\subfigure[EDSR]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig9b.png}\\
PSNR:23.613 SSIM:0.732 \\
RDIE:29.654 MOS:2.900
\end{minipage}}
\subfigure[WDSR]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig9c.png}\\
PSNR:24.053 SSIM:0.745 \\
RDIE:29.950 MOS:3.125
\end{minipage}}
\subfigure[SAN]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig9d.png}\\
PSNR:\textbf{26.009} SSIM:\textbf{0.824} \\
RDIE:23.223 MOS:\textbf{4.000}
\end{minipage}}
\subfigure[SRGAN]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig9e.png}\\
PSNR:22.142 SSIM:0.664 \\
RDIE:27.293 MOS:3.550
\end{minipage}}
\subfigure[SPSR]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig9f.png}\\
PSNR:23.388 SSIM:0.728 \\
RDIE:\textbf{23.161} MOS:3.925
\end{minipage}}
\caption{comparison of different super-resolution method on artificial scene}
\label{fig:9}
\end{figure}
\begin{figure}
\subfigure[bicubic]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig10a.png}\\
PSNR:20.209 SSIM:0.552 \\
RDIE:48.662 MOS:1.850
\end{minipage}}
\subfigure[EDSR]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig10b.png}\\
PSNR:21.019 SSIM:0.622 \\
RDIE:38.673 MOS:3.075
\end{minipage}}
\subfigure[WDSR]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig10c.png}\\
PSNR:21.055 SSIM:0.621 \\
RDIE:38.302 MOS:2.950
\end{minipage}}
\subfigure[SAN]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig10d.png}\\
PSNR:\textbf{21.514} SSIM:\textbf{0.650} \\
RDIE:36.603 MOS:3.425
\end{minipage}}
\subfigure[SRGAN]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig10e.png}\\
PSNR:19.780 SSIM:0.520 \\
RDIE:29.946 MOS:3.850
\end{minipage}}
\subfigure[SPSR]{
\begin{minipage}[t]{0.48\textwidth}
\centering
\includegraphics[width=\textwidth]{Fig10f.png}\\
PSNR:19.067 SSIM:0.535 \\
RDIE:\textbf{22.927} MOS:\textbf{4.575}
\end{minipage}}
\caption{comparison of different super-resolution method on natural scene}
\label{fig:10}
\end{figure}
\section{Discussion and Conclusion}
In this paper, a parallel algorithm of regional differential information entropy is presented. From a novel perspective, information entropy is presented by a special neural network, demonstrating the possibility of simulating traditional algorithms by using convolution with specific weights and special activation functions. Through experiments, this paper verified RDIE's ability to distinguish images' similarities and perceptual qualities.By perform ablation experiments on window size and gray levels, we found the proper RDIE parameters. With appropriate parameters, RDIE can better reflect people's perception of image quality than traditional overall image information entropy, PSNR and SSIM, and provide evaluation results similar to MOS on the test dataset. In the future work, we plan to use RDIE in other cases, to validate whether it can evaluate different types of image degradation reasonably or not. And we also want have a try to make it a guidance to lead the neural network pay more attention to the area which has bigger information entropy error.
\section{Introduction}
\label{sec:intro}
These guidelines include complete descriptions of the fonts, spacing, and
related information for producing your proceedings manuscripts. Please follow
them and if you have any questions, direct them to Conference Management
Services, Inc.: Phone +1-979-846-6800 or email
to \\\texttt{<EMAIL>}.
\section{Formatting your paper}
\label{sec:format}
All printed material, including text, illustrations, and charts, must be kept
within a print area of 7 inches (178 mm) wide by 9 inches (229 mm) high. Do
not write or print anything outside the print area. The top margin must be 1
inch (25 mm), except for the title page, and the left margin must be 0.75 inch
(19 mm). All {\it text} must be in a two-column format. Columns are to be 3.39
inches (86 mm) wide, with a 0.24 inch (6 mm) space between them. Text must be
fully justified.
\section{PAGE TITLE SECTION}
\label{sec:pagestyle}
The paper title (on the first page) should begin 1.38 inches (35 mm) from the
top edge of the page, centered, completely capitalized, and in Times 14-point,
boldface type. The authors' name(s) and affiliation(s) appear below the title
in capital and lower case letters. Papers with multiple authors and
affiliations may require two or more lines for this information. Please note
that papers should not be submitted blind; include the authors' names on the
PDF.
\section{TYPE-STYLE AND FONTS}
\label{sec:typestyle}
To achieve the best rendering both in printed proceedings and electronic proceedings, we
strongly encourage you to use Times-Roman font. In addition, this will give
the proceedings a more uniform look. Use a font that is no smaller than nine
point type throughout the paper, including figure captions.
In nine point type font, capital letters are 2 mm high. {\bf If you use the
smallest point size, there should be no more than 3.2 lines/cm (8 lines/inch)
vertically.} This is a minimum spacing; 2.75 lines/cm (7 lines/inch) will make
the paper much more readable. Larger type sizes require correspondingly larger
vertical spacing. Please do not double-space your paper. TrueType or
Postscript Type 1 fonts are preferred.
The first paragraph in each section should not be indented, but all the
following paragraphs within the section should be indented as these paragraphs
demonstrate.
\section{MAJOR HEADINGS}
\label{sec:majhead}
Major headings, for example, "1. Introduction", should appear in all capital
letters, bold face if possible, centered in the column, with one blank line
before, and one blank line after. Use a period (".") after the heading number,
not a colon.
\subsection{Subheadings}
\label{ssec:subhead}
Subheadings should appear in lower case (initial word capitalized) in
boldface. They should start at the left margin on a separate line.
\subsubsection{Sub-subheadings}
\label{sssec:subsubhead}
Sub-subheadings, as in this paragraph, are discouraged. However, if you
must use them, they should appear in lower case (initial word
capitalized) and start at the left margin on a separate line, with paragraph
text beginning on the following line. They should be in italics.
\section{PRINTING YOUR PAPER}
\label{sec:print}
Print your properly formatted text on high-quality, 8.5 x 11-inch white printer
paper. A4 paper is also acceptable, but please leave the extra 0.5 inch (12 mm)
empty at the BOTTOM of the page and follow the top and left margins as
specified. If the last page of your paper is only partially filled, arrange
the columns so that they are evenly balanced if possible, rather than having
one long column.
In LaTeX, to start a new column (but not a new page) and help balance the
last-page column lengths, you can use the command ``$\backslash$pagebreak'' as
demonstrated on this page (see the LaTeX source below).
\section{PAGE NUMBERING}
\label{sec:page}
Please do {\bf not} paginate your paper. Page numbers, session numbers, and
conference identification will be inserted when the paper is included in the
proceedings.
\section{ILLUSTRATIONS, GRAPHS, AND PHOTOGRAPHS}
\label{sec:illust}
Illustrations must appear within the designated margins. They may span the two
columns. If possible, position illustrations at the top of columns, rather
than in the middle or at the bottom. Caption and number every illustration.
All halftone illustrations must be clear black and white prints. Colors may be
used, but they should be selected so as to be readable when printed on a
black-only printer.
Since there are many ways, often incompatible, of including images (e.g., with
experimental results) in a LaTeX document, below is an example of how to do
this \cite{Lamp86}.
\section{FOOTNOTES}
\label{sec:foot}
Use footnotes sparingly (or not at all!) and place them at the bottom of the
column on the page on which they are referenced. Use Times 9-point type,
single-spaced. To help your readers, avoid using footnotes altogether and
include necessary peripheral observations in the text (within parentheses, if
you prefer, as in this sentence).
\begin{figure}[htb]
\begin{minipage}[b]{1.0\linewidth}
\centering
\centerline{\includegraphics[width=8.5cm]{image1}}
\centerline{(a) Result 1}\medskip
\end{minipage}
\begin{minipage}[b]{.48\linewidth}
\centering
\centerline{\includegraphics[width=4.0cm]{image3}}
\centerline{(b) Results 3}\medskip
\end{minipage}
\hfill
\begin{minipage}[b]{0.48\linewidth}
\centering
\centerline{\includegraphics[width=4.0cm]{image4}}
\centerline{(c) Result 4}\medskip
\end{minipage}
\caption{Example of placing a figure with experimental results.}
\label{fig:res}
\end{figure}
\section{COPYRIGHT FORMS}
\label{sec:copyright}
You must include your fully completed, signed IEEE copyright release form when
form when you submit your paper. We {\bf must} have this form before your paper
can be published in the proceedings.
\section{REFERENCES}
\label{sec:ref}
List and number all bibliographical references at the end of the
paper. The references can be numbered in alphabetic order or in
order of appearance in the document. When referring to them in
the text, type the corresponding reference number in square
brackets as shown at the end of this sentence \cite{C2}. An
additional final page (the fifth page, in most cases) is
allowed, but must contain only references to the prior
literature.
\bibliographystyle{IEEEbib}
\section{Introduction}
The Elsevier cas-dc class is based on the
standard article class and supports almost all of the functionality of
that class. In addition, it features commands and options to format the
\begin{itemize} \item document style \item baselineskip \item front
matter \item keywords and MSC codes \item theorems, definitions and
proofs \item lables of enumerations \item citation style and labeling.
\end{itemize}
This class depends on the following packages
for its proper functioning:
\begin{enumerate}
\itemsep=0pt
\item {natbib.sty} for citation processing;
\item {geometry.sty} for margin settings;
\item {fleqn.clo} for left aligned equations;
\item {graphicx.sty} for graphics inclusion;
\item {hyperref.sty} optional packages if hyperlinking is
required in the document;
\end{enumerate}
All the above packages are part of any
standard \LaTeX{} installation.
Therefore, the users need not be
bothered about downloading any extra packages.
\section{Installation}
The package is available at author resources page at Elsevier
(\url{http://www.elsevier.com/locate/latex}).
The class may be moved or copied to a place, usually,\linebreak
\verb+$TEXMF/tex/latex/elsevier/+,
or a folder which will be read
by \LaTeX{} during document compilation. The \TeX{} file
database needs updation after moving/copying class file. Usually,
we use commands like \verb+mktexlsr+ or \verb+texhash+ depending
upon the distribution and operating system.
\section{Front matter}
The author names and affiliations could be formatted in two ways:
\begin{enumerate}[(1)]
\item Group the authors per affiliation.
\item Use footnotes to indicate the affiliations.
\end{enumerate}
See the front matter of this document for examples.
You are recommended to conform your choice to the journal you
are submitting to.
\section{Bibliography styles}
There are various bibliography styles available. You can select the
style of your choice in the preamble of this document. These styles are
Elsevier styles based on standard styles like Harvard and Vancouver.
Please use Bib\TeX\ to generate your bibliography and include DOIs
whenever available.
Here are two sample references:
\cite{Fortunato2010}
\cite{Fortunato2010,NewmanGirvan2004}
\cite{Fortunato2010,Vehlowetal2013}
\section{Floats}
{Figures} may be included using the command,\linebreak
\verb+\includegraphics+ in
combination with or without its several options to further control
graphic. \verb+\includegraphics+ is provided by {graphic[s,x].sty}
which is part of any standard \LaTeX{} distribution.
{graphicx.sty} is loaded by default. \LaTeX{} accepts figures in
the postscript format while pdf\LaTeX{} accepts {*.pdf},
{*.mps} (metapost), {*.jpg} and {*.png} formats.
pdf\LaTeX{} does not accept graphic files in the postscript format.
\begin{figure}
\centering
\includegraphics[scale=.75]{figs/Fig1.pdf}
\caption{The evanescent light - $1S$ quadrupole coupling
($g_{1,l}$) scaled to the bulk exciton-photon coupling
($g_{1,2}$). The size parameter $kr_{0}$ is denoted as $x$ and
the \PMS is placed directly on the cuprous oxide sample ($\delta
r=0$, See also Table \protect\ref{tbl1}).}
\label{FIG:1}
\end{figure}
The \verb+table+ environment is handy for marking up tabular
material. If users want to use {multirow.sty},
{array.sty}, etc., to fine control/enhance the tables, they
are welcome to load any package of their choice and
{cas-dc.cls} will work in combination with all loaded
packages.
\begin{table}[width=.9\linewidth,cols=4,pos=h]
\caption{This is a test caption. This is a test caption. This is a test
caption. This is a test caption.}\label{tbl1}
\begin{tabular*}{\tblwidth}{@{} LLLL@{} }
\toprule
Col 1 & Col 2 & Col 3 & Col4\\
\midrule
12345 & 12345 & 123 & 12345 \\
12345 & 12345 & 123 & 12345 \\
12345 & 12345 & 123 & 12345 \\
12345 & 12345 & 123 & 12345 \\
12345 & 12345 & 123 & 12345 \\
\bottomrule
\end{tabular*}
\end{table}
\section[Theorem and ...]{Theorem and theorem like environments}
{cas-dc.cls} provides a few shortcuts to format theorems and
theorem-like environments with ease. In all commands the options that
are used with the \verb+\newtheorem+ command will work exactly in the same
manner. {cas-dc.cls} provides three commands to format theorem or
theorem-like environments:
\begin{verbatim}
\newtheorem{theorem}{Theorem}
\newtheorem{lemma}[theorem]{Lemma}
\newdefinition{rmk}{Remark}
\newproof{pf}{Proof}
\newproof{pot}{Proof of Theorem \ref{thm2}}
\end{verbatim}
The \verb+\newtheorem+ command formats a
theorem in \LaTeX's default style with italicized font, bold font
for theorem heading and theorem number at the right hand side of the
theorem heading. It also optionally accepts an argument which
will be printed as an extra heading in parentheses.
\begin{verbatim}
\begin{theorem}
For system (8), consensus can be achieved with
$\|T_{\omega z}$ ...
\begin{eqnarray}\label{10}
....
\end{eqnarray}
\end{theorem}
\end{verbatim}
\newtheorem{theorem}{Theorem}
\begin{theorem}
For system (8), consensus can be achieved with
$\|T_{\omega z}$ ...
\begin{eqnarray}\label{10}
....
\end{eqnarray}
\end{theorem}
The \verb+\newdefinition+ command is the same in
all respects as its \verb+\newtheorem+ counterpart except that
the font shape is roman instead of italic. Both
\verb+\newdefinition+ and \verb+\newtheorem+ commands
automatically define counters for the environments defined.
The \verb+\newproof+ command defines proof environments with
upright font shape. No counters are defined.
\section[Enumerated ...]{Enumerated and Itemized Lists}
{cas-dc.cls} provides an extended list processing macros
which makes the usage a bit more user friendly than the default
\LaTeX{} list macros. With an optional argument to the
\verb+\begin{enumerate}+ command, you can change the list counter
type and its attributes.
\begin{verbatim}
\begin{enumerate}[1.]
\item The enumerate environment starts with an optional
argument `1.', so that the item counter will be suffixed
by a period.
\item You can use `a)' for alphabetical counter and '(i)'
for roman counter.
\begin{enumerate}[a)]
\item Another level of list with alphabetical counter.
\item One more item before we start another.
\item One more item before we start another.
\item One more item before we start another.
\item One more item before we start another.
\end{verbatim}
Further, the enhanced list environment allows one to prefix a
string like `step' to all the item numbers.
\begin{verbatim}
\begin{enumerate}[Step 1.]
\item This is the first step of the example list.
\item Obviously this is the second step.
\item The final step to wind up this example.
\end{enumerate}
\end{verbatim}
\section{Cross-references}
In electronic publications, articles may be internally
hyperlinked. Hyperlinks are generated from proper
cross-references in the article. For example, the words
\textcolor{black!80}{Fig.~1} will never be more than simple text,
whereas the proper cross-reference \verb+\ref{tiger}+ may be
turned into a hyperlink to the figure itself:
\textcolor{blue}{Fig.~1}. In the same way,
the words \textcolor{blue}{Ref.~[1]} will fail to turn into a
hyperlink; the proper cross-reference is \verb+\cite{Knuth96}+.
Cross-referencing is possible in \LaTeX{} for sections,
subsections, formulae, figures, tables, and literature
references.
\section{Bibliography}
Two bibliographic style files (\verb+*.bst+) are provided ---
{model1-num-names.bst} and {model2-names.bst} --- the first one can be
used for the numbered scheme. This can also be used for the numbered
with new options of {natbib.sty}. The second one is for the author year
scheme. When you use model2-names.bst, the citation commands will be
like \verb+\citep+, \verb+\citet+, \verb+\citealt+ etc. However when
you use model1-num-names.bst, you may use only \verb+\cite+ command.
\verb+thebibliography+ environment. Each reference is a\linebreak
\verb+\bibitem+ and each \verb+\bibitem+ is identified by a label,
by which it can be cited in the text:
\noindent In connection with cross-referencing and
possible future hyperlinking it is not a good idea to collect
more that one literature item in one \verb+\bibitem+. The
so-called Harvard or author-year style of referencing is enabled
by the \LaTeX{} package {natbib}. With this package the
literature can be cited as follows:
\begin{enumerate}[\textbullet]
\item Parenthetical: \verb+\citep{WB96}+ produces (Wettig \& Brown, 1996).
\item Textual: \verb+\citet{ESG96}+ produces Elson et al. (1996).
\item An affix and part of a reference:\break
\verb+\citep[e.g.][Ch. 2]{Gea97}+ produces (e.g. Governato et
al., 1997, Ch. 2).
\end{enumerate}
In the numbered scheme of citation, \verb+\cite{<label>}+ is used,
since \verb+\citep+ or \verb+\citet+ has no relevance in the numbered
scheme. {natbib} package is loaded by {cas-dc} with
\verb+numbers+ as default option. You can change this to author-year
or harvard scheme by adding option \verb+authoryear+ in the class
loading command. If you want to use more options of the {natbib}
package, you can do so with the \verb+\biboptions+ command. For
details of various options of the {natbib} package, please take a
look at the {natbib} documentation, which is part of any standard
\LaTeX{} installation.
\section{Introduction}
The Elsevier cas-sc class is based on the
standard article class and supports almost all of the functionality of
that class. In addition, it features commands and options to format the
\begin{itemize} \item document style \item baselineskip \item front
matter \item keywords and MSC codes \item theorems, definitions and
proofs \item lables of enumerations \item citation style and labeling.
\end{itemize}
This class depends on the following packages
for its proper functioning:
\begin{enumerate}
\itemsep=0pt
\item {natbib.sty} for citation processing;
\item {geometry.sty} for margin settings;
\item {fleqn.clo} for left aligned equations;
\item {graphicx.sty} for graphics inclusion;
\item {hyperref.sty} optional packages if hyperlinking is
required in the document;
\end{enumerate}
All the above packages are part of any
standard \LaTeX{} installation.
Therefore, the users need not be
bothered about downloading any extra packages.
\section{Installation}
The package is available at author resources page at Elsevier
(\url{http://www.elsevier.com/locate/latex}).
The class may be moved or copied to a place, usually,
\verb+$TEXMF/tex/latex/elsevier/+,
or a folder which will be read
by \LaTeX{} during document compilation. The \TeX{} file
database needs updation after moving/copying class file. Usually,
we use commands like \verb+mktexlsr+ or \verb+texhash+ depending
upon the distribution and operating system.
\section{Front matter}
The author names and affiliations could be formatted in two ways:
\begin{enumerate}[(1)]
\item Group the authors per affiliation.
\item Use footnotes to indicate the affiliations.
\end{enumerate}
See the front matter of this document for examples.
You are recommended to conform your choice to the journal you
are submitting to.
\section{Bibliography styles}
There are various bibliography styles available. You can select the
style of your choice in the preamble of this document. These styles are
Elsevier styles based on standard styles like Harvard and Vancouver.
Please use Bib\TeX\ to generate your bibliography and include DOIs
whenever available.
Here are two sample references:
See \citet{Fortunato2010}. Also refer \citet{Fortunato2010,NewmanGirvan2004}.
More citations are here \citep{Fortunato2010,Vehlowetal2013}.
\section{Floats}
{Figures} may be included using the command, \verb+\includegraphics+ in
combination with or without its several options to further control
graphic. \verb+\includegraphics+ is provided by {graphic[s,x].sty}
which is part of any standard \LaTeX{} distribution.
{graphicx.sty} is loaded by default. \LaTeX{} accepts figures in
the postscript format while pdf\LaTeX{} accepts {*.pdf},
{*.mps} (metapost), {*.jpg} and {*.png} formats.
pdf\LaTeX{} does not accept graphic files in the postscript format.
\begin{figure}
\centering
\includegraphics[scale=.75]{figs/Fig1.pdf}
\caption{The evanescent light - $1S$ quadrupole coupling
($g_{1,l}$) scaled to the bulk exciton-photon coupling
($g_{1,2}$). The size parameter $kr_{0}$ is denoted as $x$ and
the \PMS is placed directly on the cuprous oxide sample ($\delta
r=0$, See also Table \protect\ref{tbl1}).}
\label{FIG:1}
\end{figure}
The \verb+table+ environment is handy for marking up tabular
material. If users want to use {multirow.sty},
{array.sty}, etc., to fine control/enhance the tables, they
are welcome to load any package of their choice and
{cas-sc.cls} will work in combination with all loaded
packages.
\begin{table}[width=.9\linewidth,cols=4,pos=h]
\caption{This is a test caption. This is a test caption. This is a test
caption. This is a test caption.}\label{tbl1}
\begin{tabular*}{\tblwidth}{@{} LLLL@{} }
\toprule
Col 1 & Col 2 & Col 3 & Col4\\
\midrule
12345 & 12345 & 123 & 12345 \\
12345 & 12345 & 123 & 12345 \\
12345 & 12345 & 123 & 12345 \\
12345 & 12345 & 123 & 12345 \\
12345 & 12345 & 123 & 12345 \\
\bottomrule
\end{tabular*}
\end{table}
\section[Theorem and ...]{Theorem and theorem like environments}
{cas-sc.cls} provides a few shortcuts to format theorems and
theorem-like environments with ease. In all commands the options that
are used with the \verb+\newtheorem+ command will work exactly in the same
manner. {cas-sc.cls} provides three commands to format theorem or
theorem-like environments:
\begin{verbatim}
\newtheorem{theorem}{Theorem}
\newtheorem{lemma}[theorem]{Lemma}
\newdefinition{rmk}{Remark}
\newproof{pf}{Proof}
\newproof{pot}{Proof of Theorem \ref{thm2}}
\end{verbatim}
The \verb+\newtheorem+ command formats a
theorem in \LaTeX's default style with italicized font, bold font
for theorem heading and theorem number at the right hand side of the
theorem heading. It also optionally accepts an argument which
will be printed as an extra heading in parentheses.
\begin{verbatim}
\begin{theorem}
For system (8), consensus can be achieved with
$\|T_{\omega z}$ ...
\begin{eqnarray}\label{10}
....
\end{eqnarray}
\end{theorem}
\end{verbatim}
\newtheorem{theorem}{Theorem}
\begin{theorem}
For system (8), consensus can be achieved with
$\|T_{\omega z}$ ...
\begin{eqnarray}\label{10}
....
\end{eqnarray}
\end{theorem}
The \verb+\newdefinition+ command is the same in
all respects as its \verb+\newtheorem+ counterpart except that
the font shape is roman instead of italic. Both
\verb+\newdefinition+ and \verb+\newtheorem+ commands
automatically define counters for the environments defined.
The \verb+\newproof+ command defines proof environments with
upright font shape. No counters are defined.
\section[Enumerated ...]{Enumerated and Itemized Lists}
{cas-sc.cls} provides an extended list processing macros
which makes the usage a bit more user friendly than the default
\LaTeX{} list macros. With an optional argument to the
\verb+\begin{enumerate}+ command, you can change the list counter
type and its attributes.
\begin{verbatim}
\begin{enumerate}[1.]
\item The enumerate environment starts with an optional
argument `1.', so that the item counter will be suffixed
by a period.
\item You can use `a)' for alphabetical counter and '(i)' for
roman counter.
\begin{enumerate}[a)]
\item Another level of list with alphabetical counter.
\item One more item before we start another.
\item One more item before we start another.
\item One more item before we start another.
\item One more item before we start another.
\end{verbatim}
Further, the enhanced list environment allows one to prefix a
string like `step' to all the item numbers.
\begin{verbatim}
\begin{enumerate}[Step 1.]
\item This is the first step of the example list.
\item Obviously this is the second step.
\item The final step to wind up this example.
\end{enumerate}
\end{verbatim}
\section{Cross-references}
In electronic publications, articles may be internally
hyperlinked. Hyperlinks are generated from proper
cross-references in the article. For example, the words
\textcolor{black!80}{Fig.~1} will never be more than simple text,
whereas the proper cross-reference \verb+\ref{tiger}+ may be
turned into a hyperlink to the figure itself:
\textcolor{blue}{Fig.~1}. In the same way,
the words \textcolor{blue}{Ref.~[1]} will fail to turn into a
hyperlink; the proper cross-reference is \verb+\cite{Knuth96}+.
Cross-referencing is possible in \LaTeX{} for sections,
subsections, formulae, figures, tables, and literature
references.
\section{Bibliography}
Two bibliographic style files (\verb+*.bst+) are provided ---
{model1-num-names.bst} and {model2-names.bst} --- the first one can be
used for the numbered scheme. This can also be used for the numbered
with new options of {natbib.sty}. The second one is for the author year
scheme. When you use model2-names.bst, the citation commands will be
like \verb+\citep+, \verb+\citet+, \verb+\citealt+ etc. However when
you use model1-num-names.bst, you may use only \verb+\cite+ command.
\verb+thebibliography+ environment. Each reference is a
\verb+\bibitem+ and each \verb+\bibitem+ is identified by a label,
by which it can be cited in the text:
\noindent In connection with cross-referencing and
possible future hyperlinking it is not a good idea to collect
more that one literature item in one \verb+\bibitem+. The
so-called Harvard or author-year style of referencing is enabled
by the \LaTeX{} package {natbib}. With this package the
literature can be cited as follows:
\begin{enumerate}[\textbullet]
\item Parenthetical: \verb+\citep{WB96}+ produces (Wettig \& Brown, 1996).
\item Textual: \verb+\citet{ESG96}+ produces Elson et al. (1996).
\item An affix and part of a reference:
\verb+\citep[e.g.][Ch. 2]{Gea97}+ produces (e.g. Governato et
al., 1997, Ch. 2).
\end{enumerate}
In the numbered scheme of citation, \verb+\cite{<label>}+ is used,
since \verb+\citep+ or \verb+\citet+ has no relevance in the numbered
scheme. {natbib} package is loaded by {cas-sc} with
\verb+numbers+ as default option. You can change this to author-year
or harvard scheme by adding option \verb+authoryear+ in the class
loading command. If you want to use more options of the {natbib}
package, you can do so with the \verb+\biboptions+ command. For
details of various options of the {natbib} package, please take a
look at the {natbib} documentation, which is part of any standard
\LaTeX{} installation.
\section{Introduction}
\label{intro}
According to information theory, entropy can reflect the richness of image information and the value of information entropy reflects the amount of information carried by the image.
Generally speaking, the higher the information entropy, the richer the content of image is. In 1948, C. E. Shannon, the father of information Theory, pointed out that there is redundancy in any information, and the size of redundancy is related to the occurrence probability or uncertainty of each in the information.
Shannon referred to the concept of thermodynamics, called the average amount of information after removing redundancy in information "information entropy", and gave the mathematical expression for calculating information entropy as below:
\begin{equation}
H(x) = E[\log_{2}{P(x_i)}] = -\sum_{i=1}^{n}{P(x_i)\log_{2}{P(x_i)}}
\end{equation}
Image super-resolution(SR) refers to the conversion of a low-resolution(LR) image into a high-resolution(HR) image and fill in the details.
Super-resolution technology can be roughly divided into three categories. According to its input and output, namely, multi-image, video and single-image super-resolution(SISR). The SISR reconstruction technology has always been a research hotspot in the field of image processing because of its high practical value in enhancing image details and texture.\\
However, single image based SR is ill-posed, because there are multiple corresponding HR images for the same low-resolution image. The traditional mean square loss tends to generate the average value of multiple possible solutions and encourage blurry and over-smoothed results. To push the solution closer to the natural manifold, the perceptual loss is presented by J. Johnson\cite{johnson2016perceptual},which optimized model in a high dimensional feature space generated by deep neural-network rather than a original color space. Furthermore, Ledig\cite{ledig2017photo} proposed to take adversarial loss to make the network more similar to the style of natural images.
Wang\cite{wang2018esrgan} combined both perceptual loss and adversarial loss, generated better results. On their basis, Cheng Ma take gradient as an extra guidance, generated images with sharp edges.\\
By using these losses, the visual quality obtained by SR has been greatly improved. However, the current mainstream objective evaluation criteria, such as PSNR and SSIM, can only describe the similarity between the SR image and the original image, but cannot describe the true degree of the details in the SR image. The above perception-based methods have lower PSNR and SSIM\cite{wang2004image} scores while have higher perception quality.
To judge the perceptual quality of images correctly, in the past few years, more and more scholars take MOS and DMOS as metrics.
However, it is very time-consuming and laborious to obtain a valid large-scale subjective evaluation result.
The lack of a faithful objective criterion for assessing the perceptual quality of images is restricting progress in perceptually-aware image reconstruction and manipulation tasks.
The current main tool for comparing methods are human-opinion studies, which are hardly reproducible, making it practically impossible to systematically compare methods and assess progress.\\
Therefore, a faithful image quality assessment(IQA) method is urgently needed.
In this paper, we proposed a new IQA method which can better describe the reality degree of SR image details.
It is much better for quantifying perceptual quality than PSNR, SSIM, VIF, MS-SSIM and so on.
The contribution of this paper is as below:
\begin{enumerate}
\item In this paper, image information entropy is viewed and described from a new perspective, that is, neural network, which shows the possibility of simulating traditional algorithms by using convolution with specific weights and special activation function;
\item The traditional information entropy calculation method is serial, but the spatial information entropy proposed in this paper has a great increase in speed compared with the traditional image information entropy due to its high parallelism;
\item Compared with other IQA methods such as PSNR, SSIM, MS-SSIM and VIF, the regional differential information entropy(RDIE) proposed in this paper is closer to the subjective perception of human beings.
\end{enumerate}
\section{Related Works}
\label{sec:1}
An ideal IQA method is supposed to be fast and reliable, and it should have similar judgements as human's.
According to different usage scenarios, IQA methods can be divided into full-reference methods (FR-IQA) and no-reference methods (NR-IQA).
According to whether it can learn from the data, IQA methods can be divided into knowledge-based and data-driven methods.
Our method is a knowledge-based and full-reference method.
\subsection{No-reference Methods}
NR-IQA quantify the perceptual quality of an image without reference image.
These methods are commonly based on estimating deviations from natural image statistics. Wang\cite{wang2005reduced} proposed a perceptual quality index based on Kullback-Leibler divergence between the distribution of the wavelet coefficients of distortion images and natural scenes.
The idea was further extended by DIIVINE\cite{moorthy2011blind}, NIQE\cite{mittal2012no}, Ma\cite{ma2017learning}, PI\cite{blau2018perception},which quantify perceptual quality by various measures of deviation from natural image statistics in the spatial, wavelet and neural-net based deep features domain.
Since most SISR problems always has reference images, NR-IQA often used in combination with other FR-IQA methods.
\subsection{Full-reference Methods}
FR-IQA quantify the quality of image by calculate its similarity to reference image.
The most common distortion measure is PSNR, which has very poor correlation with perceptual similarity between images.
Actually, PSNR is just another form of mean square error.
It only calculates the square error between each pixel of two images, which is quite different from the perception of human eyes.
The model trained with mean square error as loss also tends to generate overly-smoothed images and lose many texture details.
Therefore, the size of PSNR value cannot accurately reflect the visual quality of SR images.
Compared with PSNR, SSIM\cite{wang2004image} can better reflect the quality of SR images.
It compares the brightness, contrast and structure information of reconstructed images with original HR images to calculate the similarity, which is better when higher.
Wang proposed MS-SSIM\cite{wang2003multiscale} to calculate multi-scale structural similarity and get more perceptual results.
However, SSIM still has the problem of inconsistency with perceptual quality when evaluating SR method of the past few years especially after GAN-based SR methods become popular. \\
Sheikh et al. proposed the information fidelity criterion\cite{sheikh2005information} and visual information fidelity\cite{sheikh2006image}as metrics.
These two methods model the quality perception modeling as the information extraction process to measure the quality of the reconstruction image, and the evaluation results have better consistency with the visual perception quality of the human eye, but this method has no response to the structure information of the image.
The sub-pixel level matching errors between the reconstructed image and the HR reference image caused a problem of image quality evaluation.
To solve this problem, Kim et al\cite{kim2015framework} presents a method to evaluate different SR images by eliminating the subpixel displacement between the reference image and the reconstructed image.
The experimental results show that this method is more accurate than the traditional metrics. In addition, Liu et al\cite{liu2007phase} found that human eyes are more sensitive to pixels with high phase consistency, so phase consistency is applied to image quality evaluation.
Zhang et al\cite{zhang2011fsim} in Hong Kong Polytechnic University compare the difference between the reconstructed image and the original image is estimated by comparing the Feature Similarity (FSIM) between the images.
The method selects the phase consistency and gradient information of interest to human eyes as the characteristics of image quality evaluation, which has good consistency with the subjective quality evaluation in some cases, but it doesn't show well in SR cases.
By mimicking the visual perceptual property in the local receptive field of the HVS, Jinjian Wu\cite{wu2020perceptual} proposed a novel structure-texture decomposition method based on perceptual sensitivity. This method can decompose image contents into five regions, which are the smooth area, the primary edge, the secondary edge, the regular texture and the irregular texture. This inspired us: smooth areas, edge areas, and texture areas have significant differences in perception \\
Recently, data-driven measures become popular.
Measures based on the l2-distance between deep feature maps of a neural-net havebeen shown to capture more perceptual similarities.
These measures were used as loss functions in SRand style transfer applications, leading to reconstructions with high visual quality\cite{prashnani2018pieapp,zhang2018unreasonable,bosse2017deep,ding2020image}.\\
In some recent works, NR-IQA and FR-IQA methods are combined to measure IR algorithms Despite of the progress of IQA methods, only a few IQA methods (e.g., PSNR,SSIM and PI) are frequently used to evaluate IR methods.
\section{Method}
\label{sec:4}
\begin{figure}
\centering
\subfigure[]{
\includegraphics[width=0.15\textwidth]{figs/Fig1a}}
\subfigure[]{
\includegraphics[width=0.15\textwidth]{figs/Fig1b}}
\subfigure[]{
\includegraphics[width=0.15\textwidth]{figs/Fig1c}}
\caption{Three totally different images with the same global information entropy}
\label{fig:1}
\end{figure}
\begin{figure}
\centering
\subfigure[]{
\includegraphics[width=0.15\textwidth]{figs/Fig2a}}
\subfigure[]{
\includegraphics[width=0.15\textwidth]{figs/Fig2b}}
\subfigure[]{
\includegraphics[width=0.15\textwidth]{figs/Fig2c}}
\caption{RIE results of the three images above}
\label{fig:2}
\end{figure}
As shown in Fig. \ref{fig:1}, a statue on the left, a stripe on the right, and a rectangle in the middle. They look totally different, but they are the same under the traditional measure of information entropy of entire image. The ratio of pixels of white to black of them is the same, it is 68:32. The same ratio result in the same global information entropy. The traditional global information entropy can't seize the structure and content of the images. To overcome the problem, we take regional information entropy instead. The regional information entropy results are shown in Fig. \ref{fig:2}, the structure and content of images are well captured. The images that look different are also different in terms of regional information entropy. The equations of regional differential information entropy is as below:
\begin{equation}
P_l(u)=\left\{
\begin{aligned}
\frac{1}{h*w}, & & u=l \\
0, & & u\neq l
\end{aligned}
\right.
\end{equation}
\begin{equation}
H(A)=-\sum_{n=1}^{L-1}{\sum_{i=0}^{h-1}{\sum_{j=0}^{w-1}{p_l(x_{ij})log_{2}{p_l(x_{ij})}}}} ,x_{ij}\in{A}
\end{equation}
\begin{equation}
E(I,I^r)=\frac{\sum_{y=0}^{\frac{height}{s}+s-h}{\sum_{x=0}^{\frac{width}{s}+s-w}{(H(I_{xy})-H(I_{xy}^r))}}}
{(\frac{height}{s}+s-h)(\frac{width}{s}+s-w)}
\end{equation}
Where $h$ and $w$ are the height and width of a single image region, $x_{ij}$represents the pixel gray value at $(i , j)$ position in a single image region, height is the height of the image, width is the width of the image, s is the step length, $I$ is the test image, $I^r$ is the reference image. $I_{xy}$represents the image window ranking $x$ by column and $y$ by row. \\
Traditional image information entropy is quantified by 256 grays levels.However, human eyes are not sensitive to small differences in gray levels. As shown in Fig. \ref{fig:3}, the two images has the same shape and same regional information entropy result with 256 gray levels, but look totally different in human eyes. So we take smaller gray levels $L$ instead, such as 8,16,32. $P_l(u)$ becomes as follows:
\begin{equation}
P_l(u)=\left\{
\begin{aligned}
\frac{1}{h*w}, & & u={\frac{l*256}{L},...,(l+1)*\frac{256}{L}-1} \\
0, & & u\neq {\frac{l*256}{L},...,(l+1)*\frac{256}{L}-1}
\end{aligned}
\right.
\end{equation}
\begin{figure}
\centering
\subfigure[]{
\includegraphics[width=0.23\textwidth]{figs/Fig3a}}
\subfigure[]{
\includegraphics[width=0.23\textwidth]{figs/Fig3b}}
\caption{Stripe patterns in different colors.
The difference between the two adjacent stripes on the left is 3, while the difference on the right is 255}
\label{fig:3}
\end{figure}
\begin{figure}
\centering
\includegraphics[width=0.5\textwidth]{figs/gamma}
\caption{The brightness response curve of the human visual system.}
\label{fig:gamma}
\end{figure}
Since our visual system is a nonlinear system, we are much sensitive to changes in dark tones than we are to similar changes in bright tones. The relationship between the brightness perceived by the human eye and the actual brightness is shown in Fig. \ref{fig:gamma}. To simulate this characteristic, we take $\gamma$ quantization. We also made some experiments on section \ref{4.3.1} to verify the effect of gamma quantization. \\
However, it is very time-consuming to calculate the information entropy with sliding windows. So we optimized the algorithm of RDIE, make it possible to calculate information entropy parallel in every window. To be specific, we use different channels to calculate the frequency of different gray-scales appears. Besides, we take a neural network composed by a $1\times1$ convolution layer, an average pooling layer, three specific activation functions,a summation and scaling step to replace traditional ways. The pipeline is as Fig. \ref{fig:4} shows. The three specific activation functions are a gamma function, a step function and an entropy function, they are as below:
\begin{equation}
\gamma(x) = 255*(x/255)^{1/2.5}
\end{equation}
\begin{equation}
Step_{L}(x)=\left\{
\begin{aligned}
1, & & 0 \leq x < \frac{256}{L} \\
0, & & else
\end{aligned}
\right.
\end{equation}
\begin{equation}
Entropy(x)=\left\{
\begin{aligned}
-x*\log_{2}{x}, & & x\neq0 \\
0, & & 0
\end{aligned}
\right.
\end{equation}
\begin{figure*}
\includegraphics[width=\textwidth]{figs/Fig4.jpg}
\caption{An illustration of $RIE_{nn}$ architecture. Fist ,we use the $\gamma$ function to simulate the feature that the human eye is more sensitive to changes in the brightness of dark parts. A special $1\times1$ convolution with the same weights and different bias is taken to map the image to $3\times L$ channels, step function is applied to make the channels only responds to the corresponding grayscale. Average pooling is used to calculate the frequency of specify grayscale in the sliding window. Entropy function is applied to get the entropy values from the frequency. Grouping sum along the channels is to get entropy values of RGB. Scaling is used to make all the entropy values is between 0 and 255}
\label{fig:4}
\end{figure*}
\begin{center}
\begin{table}
\caption{the speed of traditional method and neural network method}
\label{tab:1}
\includegraphics[width=0.5\textwidth]{figs/table1}
\end{table}
\end{center}
With the help of existing parallel computing platform, the computational efficiency also increase a lot, the time consuming between traditional method and our method is as Tab. \ref{tab:1} shown. ``GIE" means global information entropy of entire image, while ``RIE'' means regional information entropy. The window size of RIE is set as $4\times 4$ and the gray levels is set as 8. The subscript ``t" means traditional method which is calculated in cpu, while the subscript ``nn" means neural network method which is calculated in gpu. The physical environment is i7-8700K where traditional method calculate and 2080Ti where our proposed method calculate. Traditional method is written in python with opencv-python and numpy, while our method is written in python with tensorflow. The time calculated is the time-consuming of processing an image with $2040\times1356$ resolution. From the results, we can find that the neural network method is about 3 times of speed when calculate GIE, and 5400 times of speed when calculate RIE. \\
\begin{figure}
\centering
\subfigure[]{
\includegraphics[width=0.11\textwidth]{figs/Fig5a}}
\subfigure[]{
\includegraphics[width=0.11\textwidth]{figs/Fig5b}}
\subfigure[]{
\includegraphics[width=0.11\textwidth]{figs/Fig5c}}
\subfigure[]{
\includegraphics[width=0.11\textwidth]{figs/Fig5d}}
\caption{comparison of RIE results with different window sizes. (a) is the original image; (b) is generated by
$4\times4$ window size; (c) is generated by $16\times16$ window size; (d) is generated by $64\times64$ window size }
\label{fig:5}
\end{figure}\\
To visually see the influence of different window sizes on RIE, we performed an experiment, the results is shown in Fig. \ref{fig:5}. Image(d) has the biggest window size but can only reflect rough contours, image(c) can reflect a more distinct contours and information distribution, image(b) is the best. In general, the smaller the window, the clearer the result. We also performed experiments on section 4.3.2 to learn the influence of window sizes on RDIE(regional differential information entropy). \\
For common steps of RDIE, the generated SR image and HR image respectively as input to get the corresponding regional information entropy Maps, For the convenience of visualization and comparison, the values of maps are scaled to [0,255], then we calculate the mean square error(MSE) between maps as quantitative index.
When the index is smaller, the SR image is closer to the HR image in the regional information richness.
Since RDIE is relevant with windows size and quantization level.
We define $RDIE_{s,l}$, where s represents window size and l represents quantization level. For example $RDIE_{10,16}$ represents windows size is $10\times10$ and quantization level is 16.
Our method can be viewed as a series of transformations, transforming the image into a special feature space, and then calculating their mse as their perception of similarity.
\section{Experiments}
\subsection{Datasets}
\begin{figure}
\includegraphics[width=0.5\textwidth]{figs/Fig8}
\caption{Results of 4x SR Method}
\label{fig:8}
\end{figure}
We used a widely used for SR evaluation dataset, DIV2k, to make a IQA dataset for SR as the images has high-resolution and significant diversity.
As the images in DIV2k are too big(about $2k\times1k$) to put on the user study page or on the paper, we select 30 ground truth images and cropped them with the size of $500\times500$.\\
We take bicubic, EDSR\cite{lim2017enhanced}, WDSR\cite{yu2018wide}, SAN\cite{dai2019second}, SRGAN\cite{wang2018esrgan}, SPSR\cite{ma2020structure} as SR method to generate $4\times$ SR images from low-resolution images.
Bicubic is a traditional up-sampling method, EDSR is a deep-learning based method, it removed the redundant structure from SRResNet, so it can run very fast.
WDSR expand channels before convolution on the basis of EDSR, the effect is improved in some degree.
With temporal and spatial attention, SAN improved both perceptual quality and reconstruction precision of SR images.
SRGAN is the first method to use both perceptual loss and adversarial loss, which get much higher perceptual quality than EDSR and WDSR, but lower PSNR and SSIM. With extra gradient loss, SPSR is state-of-the-art SR method in perceptual quality.\\
We performed a user study to quantify the ability of different approaches to reconstruct perceptually convincing images.
The SR images which corresponds to the same HR image are shuffled and present together.
Users rated images based on perceived quality from one star to five stars.
In total, the IQA dataset we made includes 30 reference images, 6 SR method, 180 SR images and 7200 human judegements.
As shown in Fig. \ref{fig:8}, the results of bicubic is absolutely the worst.
The results of EDSR and WDSR are very similar, while the results of SAN are much better especially in chinese character and regular shapes, all the three method target PSNR maximization.
That is also why their results look relatively smooth.
SRGAN and SPSR target perceptual quality maximization, they have a more realistic natural texture.
With extra gradient loss, SPSR while keeping a good natural texture, the edges are clearer.\\
To verify RDIE’s ability to evaluate more scenarios and distortion types, we also test our method in PIPAL\cite{jinjin2020pipal}.
PIPAL is a very large IQA dataset which has 250 reference images, 6 sub-types, 40 distort types, 29k distort images and 1.13 million human judgements.
We selected 3 sub-types which contains 10k distort images in PIPAL.\\
We evaluate IQA methods mainly using Spearman rank order correlation coefficients (SRCC) of the method and the subjective scores.
This index can well evaluate the monotonicity of methods: whether the scores of higher perceptual quality images is higher(or lower).
The larger the absolute value of SRCC, the stronger the correlation.
\subsection{Results in Our Dataset}
We evaluate PSNR, SSIM, MS-SSIM, VIF, RDIE in our dataset, the results are shown in Fig. \ref{fig:srcc} and Tab. \ref{tab:2}.
In Fig. \ref{fig:srcc}, we show the scatter plots of subjective scores vs the values of some IQA methods for 180 SR images.
As can be seen that, The scattered points of our method are relatively clustered and concentrated, while scattered points of others are very loose.
Although widely used, when facing with GAN-based SR methods, PSNR, SSIM, and VIF are little correlated with subjective scores.
MS-SSIM is a little better, but its correlation with perceived quality is still far from our method's.
In Tab. \ref{tab:2}, we show the mean scores of every SR method under different metrics.
As can be seen that, RDIE has similar results with MOS while PSNR, SSIM, MS-SSIM and VIF are totally different with MOS. It's very unreasonable that when evaluated by PSNR, SSIM and VIF, SPSR even worse than Bicubic.
When evaluated by these metrics, SAN is the best and EDSR,WDSR are the next, the performance of SRGAN and SPSR are very poor.
Under our method and MOS, these six SR methods have the same rankings.
Under our proposed MOS, SPSR is the best method, because it has the most authentic natural texture and sharp edges.
EDSR, WDSR and SAN get lower scores because the images generated are too smooth.
Bicubic as a traditional SR method which brings no extra details is obviously the worst in perceptual quality.
\begin{figure}
\centering
\subfigure[PSNR]{
\includegraphics[width=0.22\textwidth]{figs/SRCC-PSNR}
}
\subfigure[SSIM\cite{wang2004image}]{
\includegraphics[width=0.22\textwidth]{figs/SRCC-SSIM}
}
\subfigure[MS-SSIM\cite{wang2003multiscale}]{
\includegraphics[width=0.22\textwidth]{figs/SRCC-MS-SSIM}
}
\subfigure[VIF\cite{sheikh2006image}]{
\includegraphics[width=0.22\textwidth]{figs/SRCC-VIF}
}
\subfigure[RDIE]{
\includegraphics[width=0.22\textwidth]{figs/SRCC-RDIE}
}
\caption{Analysis of IQA methods in evaluating SR methods.}
\label{fig:srcc}
\end{figure}
\begin{table*}
\centering
\caption{The x4 SR results in our dataset. The bolded values are the best and the superscripts indicate the ranking.}
\begin{tabularx}{\textwidth}{XXXXXXX}
\toprule
Method & Bicubic & EDSR\cite{lim2017enhanced} & WDSR\cite{yu2018wide} & SAN\cite{dai2019second} &SRGAN\cite{ledig2017photo} & SPSR\cite{ma2020structure}\\
\midrule
PSNR\textuparrow & $24.86^4$ & $26.84^3$ & $26.89^2$ & $\textbf{27.65} ^1$ & $24.51^6$ & $24.64^5$\\
SSIM\textuparrow\cite{wang2004image} & $0.6962^4$ & $0.7740^3$ & $0.7745^2$ & $\textbf{0.7997}^1$ & $0.6773^6$ & $0.6953^5$\\
MS-SSIM\textuparrow\cite{wang2003multiscale} &$0.8669^5$ &$0.9171^3$ &$0.9175^2$ & $\textbf{0.9297}^1$ &$0.8650^6$ &$0.8769^4$\\
VIF\textuparrow\cite{sheikh2006image} &$0.2211^4$ &$0.2899^2$ &$0.2884^3$ &$\textbf{0.3128}^1$ &$0.2117^5$ &$0.2097^6$\\
$RDIE_{10,16}$\textdownarrow &$793.4^6$ &$432.9^4$ &$441.1^5$ &$390.0^3$ &$342.0^2$ & $\textbf{150.3}^1$\\
MOS\textuparrow & $2.019^6$ & $3.163^4$ & $3.141^5$ & $3.415^3$ & $3.763^2$ & $\textbf{4.15}^1$\\
\bottomrule
\end{tabularx}
\label{tab:2}
\end{table*}
\subsection{Ablation experiments}
\subsubsection{$\gamma$ Quantization vs Linear Quantization}
\label{4.3.1}
\begin{table}
\centering
\caption{SRCC of RDIE with $\gamma$ or not. "$-\gamma$" represent $\gamma$ quantization, "$-l$" represent linear quantization.}
\begin{tabularx}{0.5\textwidth}{lXXX}
\toprule
Method & Traditional Distortion & Denoising & GAN-based SR\\
\midrule
$RDIE_{4,32}-l$ &0.5138 &0.6228 &0.4358 \\
$RDIE_{4,32}-\gamma$ &0.5528 &0.6255 &0.4474\\
$RDIE_{4,64}-l$ &0.4698 &0.6336 &0.4184\\
$RDIE_{4,64}-\gamma$ &0.5142 &0.6519 &0.4395\\
$RDIE_{8,64}-l$ &0.4779 &0.6041 &0.4391\\
$RDIE_{8,64}-\gamma$ &0.5157 &0.6127 &0.4513\\
$RDIE_{8,128}-l$ &0.4487 &0.6032 &0.4096 \\
$RDIE_{8,128}-\gamma$ &0.4787 &0.6215 &0.4312\\
\bottomrule
\end{tabularx}
\label{tab:gamma}
\end{table}
We show the results of 4 sets of comparative experiments under three sub-types in Tab. \ref{tab:gamma}.
As can be seen that, when other parameters are the same, the methods with $\gamma$ quantization always get higher SRCC in all the sub-types.
In Tab. \ref{tab:gamma}, the positive absolute gain which $\gamma$ quantization brings can up to 0.444, the positive relative gain can up to 9.5\%.
It' obviously that $gamma$ quantization is much better than linear quantization.
In this article, if there is no "-l" behind "$RDIE_{s,l}$", the default is the result of gamma quantization.
\subsubsection{Different Window Sizes and Quantization Levels}
\begin{figure}
\centering
\subfigure[Traditional Distortion]{
\includegraphics[width=0.22\textwidth]{figs/traDis}
}
\subfigure[Denoising]{
\includegraphics[width=0.22\textwidth]{figs/denoise}
}
\subfigure[GAN-based SR]{
\includegraphics[width=0.22\textwidth]{figs/Gan-basedSR}
}
\caption{SRCC with Different Window Sizes and Quantization levels}
\label{fig:levels&&sizes}
\end{figure}
Different quantization levels and window size can lead to different results.
When window size changed, the optimal quantization level also changed.
It's a complex problem to find the optimal parameters.
Benefiting from the fast execution speed of our method, we have done a lot of experiments in PIPAL to search the optimal parameters.
After experiments, we find that the optimal window size and quantization levels can also be different for different image distortion types.
We display the experiment results in the form of a three-dimensional thermal mesh in Fig. \ref{fig:levels&&sizes}.
The x-axis and y-axis are the quantization level and window size, z-axis is SRCC.
Although these three meshes look very different, they all show a certain periodicity with the change of the quantization levels.
Among them, the mesh of Denoising is the most obvious.
It's just like the waves and when quantization level come to 64, it reachs the top.
The mesh of GAN-based SR is just like a helmet, the highest point is around the center line.
From the results, it seems that the perception of traditional distortion requires a moderate receptive field and a small quantization level;
the perception of denoising requires a small perceptive field and a large quantization level;the perception of GAN-based SR requires a large window or receptive field and a moderate quantization level.
Finally, we get the optimal parameters as below:\\
For traditional distortion, the optimal window size and optimal quantization levels are $7\times7$ and 4; for denoising, they are $4\times4$ and 64;
for gan-based sr, they are $14\times14$ and 16.
The interesting thins is that the optimal quantization levels are all integer powers of 2. Specially, 64 is 5 powers of 2, 16 is 4 powers of 2 and 4 is 2 powers of 2.
\section{Results in PIPAL}
The SRCC in PIPAL is shown in Tab. \ref{pipal}, we compared with 15 other knowledge-based FR-IQA methods.
The up arrow represents that under this metric, the higher the value, the better.
The down arrow represents the opposite.
The SRCC of the other methods come from the benchmark\cite{jinjin2020pipal}.
With proper parameters, our method in the all three sub-types has favorable performance, which indicates that our method has sufficiently wide application scenarios in the field of image distortion.
Especially in GAN-based SR, our method has the best performance.
In traditional distortion, our method also performs well and get the second highest SRCC.
\begin{table}
\caption{The SRCC results with respect to different distortion sub-types in PIPAL. The best values are marked in bold.}
\begin{tabularx}{0.5\textwidth}{lXXX}
\toprule
Method & Traditional Distortion & Denoising & GAN-based SR\\
\midrule
PSNR\textuparrow & 0.3589 & 0.4542 & 0.2839\\
NQM\textuparrow\cite{damera2000image} & 0.2561 & 0.5650 & 0.3410\\
UQI\textuparrow\cite{wang2002universal} & 0.3455 & 0.6246 & 0.3385\\
SSIM\textuparrow\cite{wang2004image} & 0.3910 & 0.6684 & 0.3388\\
MS-SSIM\textuparrow\cite{wang2003multiscale} & 0.3967 & 0.6942 & 0.3823\\
IFC\textuparrow\cite{sheikh2005information} & 0.3708 & \textbf{0.7440} & 0.3217\\
VIF\textuparrow\cite{sheikh2006image} & 0.4516 & 0.7282 & 0.3857\\
VSNR-FR\textuparrow\cite{chandler2007vsnr} & 0.4030 & 0.5938 & 0.3128\\
RFSIM\textuparrow\cite{zhang2010rfsim} & 0.3450 & 0.4520 & 0.2951\\
GSM\textuparrow\cite{liu2011image} & 0.5645 & 0.6067 & 0.3523\\
SR-SIM\textuparrow\cite{zhang2012sr} & \textbf{0.6036} & 0.6727 & 0.4631\\
FSIM\textuparrow\cite{zhang2011fsim} & 0.5760 & 0.6882 & 0.4090\\
$FSIM_{c}$\textuparrow\cite{zhang2011fsim} & 0.5724 & 0.6866 & 0.4058\\
VSI\textuparrow\cite{zhang2014vsi} & 0.4993 & 0.5745 & 0.3706\\
MAD\textdownarrow\cite{bae2016novel} & 0.3769 & 0.7005 & 0.3494\\
$RDIE_{4,64}$\textdownarrow & 0.5142 & 0.6519 & 0.4395\\
$RDIE_{14,16}$\textdownarrow & 0.5691 & 0.5163 & \textbf{0.4696}\\
$RDIE_{7,4}$\textdownarrow & 0.5861 & 0.4247 & 0.4132\\
\bottomrule
\label{pipal}
\end{tabularx}
\end{table}
\section{Summary}
In this paper, a parallel algorithm of regional differential information entropy for IQA is presented.
From a novel perspective, information entropy is presented by a special neural network, demonstrating the possibility of simulating traditional algorithms by using convolution with specific weights and special activation functions.
Through experiments, this paper verified RDIE's ability to distinguish perceptual qualities of images with various distortion types.
We also verified the postive influence of $\gamma$ quantization in PIPAL.
By perform ablation experiments on window sizes and quantization levels, we found the optimal parameters for different sub-types.
We made a test in our dataset and PIPAL. It proves that with appropriate parameters, RDIE can better reflect people's perception of image quality than other well-known IQA methods, such as PSNR, SSIM, VIF and MS-SSIM.
In the future work, we want to have a try to make it a guidance to lead the neural network pay more attention to the area which has bigger information entropy error.
It may help the SR method improve perceived quality.
\section{Acknowledgement}
This work was supported by the Ningbo Science and Technology Innovation Project (NO. 2020Z019, NO.2018B10080).
\bibliographystyle{./model1-num-names}
\section{Introduction}
\label{sec:intro}
Single image super-resolution(SISR) reconstruction technology has always been a research hotspot in the field of image processing because of its high practical value in enhancing image details and texture. However, single image based super-resolution is ill-posed, because there are multiple corresponding high-resolution images for the same low-resolution image. The traditional mean square loss tends to generate the average value of multiple possible solutions and encourage blurry and over-smoothed results. To push the solution closer to the natural manifold, the perceptual loss is presented by J. Johnson\cite{RefPerceptualLoss},which optimized model in a high dimensional feature space rather than a pixel space. Furthermore, Ledig\cite{RefSRGAN} proposed to add adversarial loss to make the network more similar to the result of natural images.\\
By using these losses, the visual quality obtained by super-resolution has been greatly improved. However, the current mainstream objective evaluation criteria, such as PSNR and SSIM, can only describe the similarity between the super-resolution image and the original image, but cannot describe the true degree of the details generated by the super-resolution image. The above perception-based methods have lower PSNR and SSIM\cite{RefSSIM} scores while have higher perception quality. Therefore, in the past few years, more and more scholars take mean opinion of human(MOS) as metrics. But there is a problem, it is very time-consuming and laborious to obtain a valid result. When the dataset is bigger and the super-resolution method is more, the cost of Mos is also growing. The lack of a faithful and easy-to-use criterion for assessing the perceptual quality of images is restricting progress in perceptually-aware image reconstruction and manipulation tasks. \\
According to information theory, entropy can reflect the richness of image information and the value of information entropy reflects the amount of information carried by the image. It means information entropy can reflect perceptual quality in some way. Therefore, a new objective metric, regional differential information entropy, is proposed in this paper, which can better describe the reality degree of super-resolution image details. It is much better for quantifying perceptual quality than PSNR and SSIM. The contribution of this paper is as below:
\begin{enumerate}
\item Image information entropy is viewed and described from a new perspective, that is, neural network, which shows the possibility of simulating traditional algorithms by using convolution with specific weights and special activation function;
\item The traditional information entropy calculation method is serial, but the spatial information entropy proposed in this paper has a great increase in speed compared with the traditional image information entropy due to its high parallelism;
\item Compared with the traditional image quality metrics such as PSNR and SSIM, the regional diffrential information entropy is closer to the subjective perception of human beings.
\end{enumerate}
\section{Related Works}
\label{sec:related works}
Image quality metrics can be grouped by subjective metrics and objective metrics.
\subsection{subjective metrics}
\label{sec:subjective metrics}
The most direct and natural evaluation method is evaluating by human. In order to realize subjective quality evaluation, it is necessary to establish a super-resolution image database by using the open natural image database, and then set up reasonable evaluation criteria and organize several non-expert observers.\\
Subjective quality evaluation usually requires people to subjectively rate the image quality according to certain experimental rules. Generally, MOS score (the average score of all experimental subjects) or DMOS score (the difference between the evaluation score of undistorted image and distorted image by human eyes) is adopted. It is needed to select a large number of valuators to ensure that the results of subjective image quality evaluation are statistically significant. The subjective quality evaluation method is time-consuming and laborious, and it cannot be described by mathematical model.
\subsection{objective metrics}
\label{sec:objective metrics}
The idea of objective evaluation of image quality is to design a computational model that can accurately and automatically measure image quality. Ideally, we would like to be able to use computer models to see and understand images in the same way that we perceive them. At present, PSNR and SSIM are the most commonly used image quality evaluation criteria in the field of super-resolution. Compared with PSNR, SSIM\cite{RefSSIM} can better reflect the quality of images. It compares the brightness, contrast and structure information of reconstructed images with original images. However, SSIM still has the problem of inconsistency with perceptual quality when evaluating super-resolution method of the past few years.\\
Sheikh et al. proposed the information fidelity criterion\cite{RefIFC} and visual information fidelity \cite{RefVIF}as metrics. These two methods model the quality perception modeling as the information extraction process to measure the quality of the reconstruction image, and the evaluation results have better consistency with the visual perception quality of the human eye, but this method has no response to the structure information of the image.\\
The sub-pixel level matching errors between the reconstructed image and the high-resolution reference image caused a problem of image quality evaluation. To solve this problem, Kim et al \cite{RefSubPixel} presents a method to evaluate different super-resolution images by eliminating the subpixel displacement between the reference image and the reconstructed image. The experimental results show that this method is more accurate than the traditional metrics. In addition, Liu et al\cite{RefPhaseConsistency} found that human eyes are more sensitive to pixels with high phase consistency, so phase consistency is applied to image quality evaluation.\\
Zhang et al\cite{RefFSIM} in Hong Kong Polytechnic University compare the difference between the reconstructed image and the original image is estimated by comparing the Feature Similarity (FSIM) between the images. The method selects the phase consistency and gradient information of interest to human eyes as the characteristics of image quality evaluation, which has good consistency with the subjective quality evaluation in some cases, but it doesn't showe well in super-resolution cases.\\
In 2018 PIRM Challenge on Perceptual Image Super-resolution, Yochai Blau et al present PI\cite{RefPI} as evaluation metric, which is combined by Ma\cite{RefMa} and NIQE\cite{RefNIQE}. However, it is a no-reference image quality metric, which means a super-resolution image with high perceptual quality but low relevance with the high-resolution image can get high score. It can only be used with other metrics together. But the metric we present can take account both of similarity and perceptual quality, it will be introduced detailedly in section 3.
\section{Method}
\label{sec:method}
\begin{figure}
\subfigure[]{
\begin{minipage}[t]{0.3\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig1a.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.3\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig1b.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.3\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig1c.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.3\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig2a.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.3\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig2b.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.3\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig2c.png}
\end{minipage}}
\centering
\caption{Three totally different images with the same global information entropy but different regional information entropy}
\label{fig:1}
\end{figure}
As shown in Fig. \ref{fig:1}, a statue on the left, a stripe on the right, and a rectangle in the middle. They look totally different, but they are the same under the traditional measure of information entropy of entire image. The ratio of pixels of white to black of them is the same, it is 68:32. The same ratio result in the same global information entropy. The traditional global information entropy can't seize the structure and content of the images. To overcome the problem, we take regional information entropy instead. The regional information entropy results are shown in Fig. \ref{fig:1}(d),(e),(f), the structure and content of images are well captured. The images that look different are also different in terms of regional information entropy. The equations of regional differential information entropy is as below:
\begin{equation}
P_l(u)=\left\{
\begin{aligned}
\frac{1}{h*w}, & & u=l \\
0, & & u\neq l
\end{aligned}
\right.
\end{equation}
\begin{equation}
H(A)=-\sum_{n=1}^{L-1}{\sum_{i=0}^{h-1}{\sum_{j=0}^{w-1}{p_l(x_{ij})log_{2}{p_l(x_{ij})}}}} ,x_{ij}\in{A}
\end{equation}
\begin{equation}
E(I,I^r)=\frac{\sum_{y=0}^{\frac{height}{s}+s-h}{\sum_{x=0}^{\frac{width}{s}+s-w}{(H(I_{xy})-H(I_{xy}^r))}}}
{(\frac{height}{s}+s-h)(\frac{width}{s}+s-w)}
\end{equation}
Where $h$ and $w$ are the height and width of a single image region, $x_{ij}$represents the pixel gray value at $(i , j)$ position in a single image region, height is the height of the image, width is the width of the image, s is the step length, $I$ is the test image, $I^r$ is the the reference image. $I_{xy}$represents the image window ranking $x$ by column and $y$ by row. \\
Traditional image information entropy is quantified by 256 grays levels.However, human eyes are not sensitive to small differences in gray levels. So we take smaller gray levels $L$ instead, such as 8,16,32 . We also take experiments on section 4.1 to get the appropriate gray levels. $P_l(u)$ becomes as follows:
\begin{equation}
P_l(u)=\left\{
\begin{aligned}
\frac{1}{h*w}, & & u={\frac{l*256}{L},...,(l+1)*\frac{256}{L}-1} \\
0, & & u\neq {\frac{l*256}{L},...,(l+1)*\frac{256}{L}-1}
\end{aligned}
\right.
\end{equation}
However, it is very time consuming to calculate the information entropy with sliding windows. It takes about 2 minutes to calculate RIE of a 2K resolution image. So we optimized the algorithm of RDIE, make it possible to calculate information entropy parallel in every window. Therefore, the computing time is reduced to 30~80 ms. To be specific, we use different channels to calculate the frequency of different grayscales appears. And we take a neural network composed by a $1\times1$ convolution layer, a average pooling layer, two specific activation functions, a summation and scaling step to replace traditional ways. The pipeline is as Fig. \ref{fig:4} showns. The two specific activation functions are a step function and an entropy function, they are as below:
\begin{equation}
Step_{L}(x)=\left\{
\begin{aligned}
1, & & 0 \leq x < \frac{256}{L} \\
0, & & else
\end{aligned}
\right.
\end{equation}
\begin{equation}
Entropy(x)=\left\{
\begin{aligned}
-x*\log_{2}{x}, & & x\neq0 \\
0, & & 0
\end{aligned}
\right.
\end{equation}
\begin{figure}
\includegraphics[width=\linewidth]{Fig4.png}
\caption{An illustration of $RIE_{nn}$ architecture.
A special $1\times1$ convolution with the same weights and different bias is taken to map the image to $3\times L$ channels, step function is applied to make the channels only responds to the corresponding grayscale. Average pooling is used to calculate the frequency of specify grayscale in the sliding window. Entropy function is applied to get the entropy values from the frequency. Grouping sum along the channels is to get entropy values of RGB. Scaling is used to make all the entropy values is between 0 and 255}
\label{fig:4}
\end{figure}
\section{Experiments}
\label{sec:experiments}
To visually see the influence of different window sizes on RIE, we performed an experiment, the results is shown in Fig. \ref{fig:5}. Image(d) has the biggest window size but can only reflect rough contours, image(c) can reflect a more distinct contours and information distribution, image(b) is the best. In general, the smaller the window, the clearer the result. \\
\begin{figure}
\subfigure[]{
\begin{minipage}[t]{0.22\linewidth}
\centering
\includegraphics[width=\textwidth]{Fig5a.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.22\linewidth}
\centering
\includegraphics[width=\textwidth]{Fig5b.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.22\linewidth}
\centering
\includegraphics[width=\textwidth]{Fig5c.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.22\linewidth}
\centering
\includegraphics[width=\textwidth]{Fig5d.png}
\end{minipage}}
\caption{comparison of RIE results with different window sizes. (a) is the original image; (b) is generated by
$4\times4$ window size; (c) is generated by $16\times16$ window size; (d) is generated by $64\times64$ window size }
\label{fig:5}
\end{figure}
For common steps of RDIE, the generated super-resolution image and high-resolution image respectively as input to get the corresponding regional information entropy Maps, then we calculate the mean absolute error between maps as quantitative value. For the convenience of visualization and comparison, the values of maps are scaled to [0,255]. When the value is smaller, the super-resolution image is closer to the high-resolution image in RIE feature space.\\
We take validation set of div2k\cite{RefDiv2k} as test datasets. As is known to all, the similarity of images obtained from down-sampling and up-sampling back is negatively correlated with the resample rate. For example, an image which is down-sampled by $2\times$ and up-sampled back always have higher similarity with the original image than the image down-sampled by $4\times$ and up-sampled back. Therefore, the evaluation metrics were first tested by different resample rate of the same images.\\
\begin{figure}
\subfigure[]{
\begin{minipage}[t]{0.48\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig6a.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.48\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig6b.png}
\end{minipage}}
\subfigure[]{
\begin{minipage}[t]{0.48\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig7a.png}
\end{minipage}}
\centering
\subfigure[]{
\begin{minipage}[t]{0.48\linewidth}
\centering
\includegraphics[width=\linewidth]{Fig7b.png}
\end{minipage}}
\centering
\caption{PSNR, SSIM and RDIE for images with different resample rates}
\label{fig:6}
\end{figure}
Fig. \ref{fig:6}(a) and (b) is the results of PSNR and SSIM on images with different resample rates. These results are the average values of PSNR and SSIM of 100 resample images in the DIV2K validation dataset. Both PSNR and SSIM are capable of evaluating images' similarities with different resample rates reasonably. Both of the curves are monotonically decreasing and steep enough. As shown in Fig. \ref{fig:6}(c) and (d). the curve of $4\times4$ window size and gray levels 8 has ability to distinguish the similarities of images like PSNR and SSIM.\\
We performed a user study to quantify the ability of different approaches to reconstruct perceptually convincing images. Because the high-resolution images in div2k\cite{RefDiv2k} are too big(about $2k\times1k$) to put on the user study page or on the paper, we select 30 groups of images and cropped them with the size of $500\times500$. We take bicubic, EDSR\cite{RefEDSR}, WDSE\cite{RefWDSR}, SAN\cite{RefSAN}, SRGAN\cite{RefSRGAN}, SPSR\cite{RefSPSR} as super-resolution method to generate $4\times$ super-resolution images from low-resolution images. And we finally get 40 valid questionnaires.\\
As shown in Fig. \ref{fig:8}, the results of EDSR and WDSR are very similar, while the results of SAN are much better especially in regular text and shapes, all of the three method target PSNR maximization. SRGAN and SPSR target perceptual quality maximization, they perform better results in natural texture. In fact, most of the images in the test dataset are natural scene images, so SRGAN and SPSR get higher mean opinion score in the user study. \\
We set the gray level and sliding window size of RDIE as 8 and $4\times4$. Best results show in black bold, and worst results in red bold. As shown in Tab. \ref{tab:3}, RDIE has similar results with MOS while PSNR and SSIM are totally different with MOS. SAN get highest PSNR and SSIM, WDSR and EDSR rank second and third , while SRGAN and SPSR get even lower PSNR and SSIM than Bicubic. There is inconsistency between PSNR/SSIM values and perceptual quality. Under the metric we proposed, bicubic method is the worst, SPSR is the best, both of them has better perceptual quality in natural texture. It shows great consistency between RDIE and MOS.
\section{Discussion and Conclusion}
\label{sec:discuss}
In this paper, a parallel algorithm of regional differential information entropy is presented. From a novel perspective, information entropy is presented by a special neural network, demonstrating the possibility of simulating traditional algorithms by using convolution with specific weights and special activation functions. Through experiments, this paper verified RDIE's ability to distinguish images' similarities and perceptual qualities. With appropriate parameters, RDIE can better reflect people's perception of image quality than traditional overall image information entropy, PSNR and SSIM, and provide evaluation results similar to MOS on the test dataset. In the future work, we plan to use RDIE in other cases, to validate whether it can evaluate different types of image degradation reasonably or not. And we also want have a try to make it a guidance to lead the neural network pay more attention to the area which has bigger information entropy error.
\begin{figure}
\includegraphics[width=1\linewidth]{Fig8.png}
\caption{results of different super-resolution method}
\label{fig:8}
\end{figure}
\begin{table}
\caption{PSNR,SSIM and RDIE of different super-resolution method}
\label{tab:3}
\includegraphics[width=\linewidth]{table3.png}
\end{table}
\bibliographystyle{IEEEbib}
|
\section{Compilation Rules}
\subsection{Source Language}
\[
s ::= \tau x \quad\vert\quad x = e \quad\vert\quad s_1; s_2 \quad\vert\quad \text{if(e) then } s_1 \text{else} s_2 \quad\vert\quad x=v
\tau ::= int \quad\vert\quad int[n] \quad\vert\quad int[n_1][n_2]
e ::= x + y \quad\vert\quad x * y \quad\vert\quad x \geq y \quad\vert\quad x \quad\vert\quad sgn(x) \quad\vert\quad tanh(x)
v ::= n \quad\vert\quad [n_1, ..., n_k] \quad\vert\quad [[n_1^1, ..., n_k^1], ....., [n_1^l, ..., n_k^l]]
\]
\subsection{Rules}
$\alpha$: mapping from variable name to memory name
$\Sigma$: mapping from memory name to memory content
$\Gamma$: mapping from variable name to Type($\tau$)
$\rho$: list of all variables that have been declared
$\mu$: mapping from matrix operation to instantiation name
$\kappa$: mapping from RAM to instantiation name
\[
\infer[C-Var]{
\vdash x \leadsto x
}
{
\begin{array}[b]{c}
\end{array}\quad
}
\]
\[
\infer[C-Assn]{
\vdash x = e_2 \leadsto \textit{assign } d_1 = d_2;
}
{
\begin{array}[b]{c}
\vdash x \leadsto d_1
\end{array}\quad
\begin{array}[b]{c}
\vdash e_2 \leadsto d_2
\end{array}\quad
}
\]
\[
\infer[C-Add]{
\vdash e_1 + e_2 \leadsto d_1 + d_2
}
{
\begin{array}[b]{c}
\vdash e_1 \leadsto d_1
\end{array}\quad
\begin{array}[b]{c}
\vdash e_2 \leadsto d_2
\end{array}\quad
}
\]
\[
\infer[C-Mul]{
\vdash e_1 * e_2 \leadsto d_1 * d_2
}
{
\begin{array}[b]{c}
\vdash e_1 \leadsto d_1
\end{array}\quad
\begin{array}[b]{c}
\vdash e_2 \leadsto d_2
\end{array}\quad
}
\]
\[
\infer[C-GEQ]{
\vdash e_1 \geq e_2 \leadsto d_1 \geq d_2
}
{
\begin{array}[b]{c}
\vdash e_1 \leadsto d_1
\end{array}\quad
\begin{array}[b]{c}
\vdash e_2 \leadsto d_2
\end{array}\quad
}
\]
\[
\infer[C-Cond]{
\rho \vdash \mathit{if}(e)\;then\;s_1\;else\;s_2 \leadsto C_1
}
{
\begin{array}[b]{c}
\vdash e \leadsto d
\end{array}\quad
}
\]
where,
$C_1$ $\equiv$
\begin{lstlisting}[language=verilog]
always@* begin
if(d)begin
s_1;
end
else begin
s_2;
end
end
\end{lstlisting}
\[
\infer[C-Matrix]{
\kappa, \Gamma, \alpha, \Sigma \vdash int[I][J]X \leadsto \Sigma[T \mapsto k], \emptyset, \alpha[X \mapsto T], \Gamma[X \mapsto int[I][J]], \kappa'
}
{
\begin{array}[b]{c}
T = fresh(\Sigma)
\end{array}\quad
\begin{array}[b]{c}
k = initzeros(I, J, \kappa), \kappa'=\kappa+1
\end{array}\quad
}
\]
\[
\infer[C-MatAdd]{
\kappa, \mu,\Sigma \vdash x + y \leadsto (T, \Sigma_1, MatAdd_\mu(T_1, T_2, T)), \mu'
}
{
\begin{array}[b]{c}
T_1 = \alpha(x)
\end{array}\quad
\begin{array}[b]{c}
T_1 = \alpha(y)
\end{array}\quad
\begin{array}[b]{c}
\mu'=\mu+1,
T=fresh(\Sigma),
k=initzeros(I,J,\kappa),
\Sigma_1 = \Sigma[T \mapsto k]
\end{array}\quad
}
\]
\[
\infer[C-MatMul]{
\kappa, \mu,\Sigma \vdash x * y \leadsto (T, \Sigma_1, MatMul_\mu(T_1, T_2, T)), \mu'
}
{
\begin{array}[b]{c}
T_1 = \alpha(x)
\end{array}\quad
\begin{array}[b]{c}
T_1 = \alpha(y)
\end{array}\quad
\begin{array}[b]{c}
\mu'=\mu+1,
T=fresh(\Sigma),
k=initzeros(I,J,\kappa),
\Sigma_1 = \Sigma[T \mapsto k]
\end{array}\quad
}
\]
\[
\infer[C-MulCir]{
\kappa, \mu,\Sigma \vdash x <*> y \leadsto (T, \Sigma_1, MulCir_\mu(T_1, T_2, T)), \mu'
}
{
\begin{array}[b]{c}
T_1 = \alpha(x)
\end{array}\quad
\begin{array}[b]{c}
T_1 = \alpha(y)
\end{array}\quad
\begin{array}[b]{c}
\mu'=\mu+1,
T=fresh(\Sigma),
k=initzeros(I,J,\kappa),
\Sigma_1 = \Sigma[T \mapsto k]
\end{array}\quad
}
\]
\[
\infer[C-SparseMatMul]{
\kappa, \mu,\Sigma \vdash x |*| y \leadsto (T, \Sigma_1, SparseMatMul_\mu(T_1, T_2, T)), \mu'
}
{
\begin{array}[b]{c}
T_1 = \alpha(x)
\end{array}\quad
\begin{array}[b]{c}
T_1 = \alpha(y)
\end{array}\quad
\begin{array}[b]{c}
\mu'=\mu+1,
T=fresh(\Sigma),
k=initzeros(I,J,\kappa),
\Sigma_1 = \Sigma[T \mapsto k]
\end{array}\quad
}
\]
\[
\infer[C-TanH]{
\mu,\Sigma \vdash tanh(x) \leadsto (T, \Sigma_1, TanH_\mu(T_1, T)), \mu'
}
{
\begin{array}[b]{c}
\Sigma \vdash e \leadsto (T_1, \Sigma)
\end{array}\quad
\begin{array}[b]{c}
\mu'=\mu+1,
T=fresh(\Sigma),
k=initzeros(I,J),
\Sigma_1 = \Sigma[T \mapsto k], \Gamma[x] = int[I][J]
\end{array}\quad
}
\]
\[
\infer[C-SGN]{
\mu \vdash sgn(x) \leadsto (SGN_\mu(x)), \mu'
}
{
\begin{array}[b]{c}
\Sigma \vdash x \leadsto x
\end{array}\quad
\begin{array}[b]{c}
\mu'=\mu+1, \Gamma[x] = int
\end{array}\quad
}
\]
\section{Introduction}
\label{sec:introduction}
Traditionally, IoT devices are used for data collection and the data analysis is performed in the cloud~\cite{cloud1, cloud2, cloud3}. However, performing ML inference directly on IoT devices has recently gained attention, offering benefits such as real-time analysis, increased privacy, and reduced energy consumption. Recent breakthroughs have produced new classes of ML applications that have compute and memory requirements low enough to be run directly on milliwatt-scale IoT devices~\cite{protonn,bonsai} while still having high classification accuracy. While microcontrollers are often used to implement these applications~\cite{gesturepod,farmbeats}, reconfigurable devices like FPGAs may be better suited for such applications. Several reconfigurable architectures for edge computing have been proposed by prior works~\cite{reconfig-on-edge-1, reconfig-on-edge-2, reconfig-on-edge-3}. On one hand, as we can configure an FPGA to directly run a program, it can deliver superior performance and energy efficiency compared to general-purpose micro-controllers. On the other hand, unlike ASICs which do not allow updates to algorithms once deployed and incur a high non-recurring engineering (NRE) cost, an FPGA can be reprogrammed in the field using over-the-air updates~\cite{ota_1,ota_2} to accommodate the constant evolution of ML models. Unfortunately, FPGAs are notoriously hard to program, even for experts.
To enable practical use of FPGAs in this domain, we need a compiler that can take high-level specifications of a ML model and directly compile it to an FPGA program. Unfortunately, existing solutions are insufficient in that they
mainly focus on running DNN models on large FPGAs. However, state-of-the-art ML models~\cite{protonn,bonsai} for IoT applications are mostly based on classical ML algorithms~\cite{mitchell}, and not DNNs. In fact, existing DNN-to-FPGA compilers cannot even express the state-of-the-art ML models designed for IoT applications, and the techniques used by DNN-to-FPGA compilers do not extend to small form-factor FPGAs because they assume an abundance of FPGA resources that allows them to preconfigure the FPGA as, for instance, a sea of matrix multipliers. While general-purpose C-HLS tools can express our target models, they do not exploit specific properties of ML inference and thereby generate suboptimal programs. Section~\ref{sec:motivation} describes the limitations of these two approaches in more detail.
We propose \textsc{MAFIA}\xspace, a compiler for Machine-learning Acceleration on FPGA for IoT Applications. \textsc{MAFIA}\xspace provides native support for linear algebra operations and can express classical ML inference algorithms~\cite{mitchell} like decision trees~\cite{decisiontree} and k-nearest neighbors~\cite{kNN}.
We currently support a subset of TensorFlow~\cite{tensorflow} and the framework of a recent prior work, \textsc{SeeDot}\xspace~\cite{Seedot} that compiles ML inference code to IoT devices (Section~\ref{sec:main-artifacts}).
We compare \textsc{MAFIA}\xspace with four different tools: A)~Bambu HLS, B)~Xilinx Vivado HLS, C)~Vivado HLS with automatically generated compiler hints, and D)~(C) with additional manual hints. We evaluate these mechanisms on two state-of-the-art ML models~\cite{protonn,bonsai}, each on ten different data sets used as benchmark by prior works~\cite{bonsai,protonn,Seedot}. \textsc{MAFIA}\xspace-generated programs consistently outperform all prior approaches -- 2.5$\times$ better on average compared to Vivado HLS with automatically generated hints.
\section{Limitations of Existing HLS Tools}
\label{sec:motivation}
\subsection{ML-HLS tools target the Neural-network family}
\label{sec:limit-mlhls}
Existing ML-HLS tools such as DNN Weaver~\cite{dnnweaver}, FP-DNN~\cite{fp-dnn} and DeepBurning~\cite{deepburning} specifically target deep neural network (DNN) workloads. There are several reasons these tools do not work well for our target models.
\vspace{1mm}\noindent \textbf{Building Blocks}: These tools focus on DNN layers (e.g. conv, pooling, FC). As a result, currently, they cannot express classical algorithms such as decision tree, k-Nearest Neighbors, and kernels like RBF of SVM. Although, we can incorporate support for the classical algorithms in these frameworks, the optimization strategies for DNN's are at odds with classical algorithms (see below). \textsc{MAFIA}\xspace identifies that matrix operations are the fundamental building blocks of most classical ML algorithms and expresses the input program as a matrix data flow graph (DFG).
\vspace{1mm}\noindent \textbf{Parallelism}: The logical view of a DNN model is serial.
Therefore, ML-HLS tools only exploit intra-layer parallelism since opportunities for inter-layer parallelization are often scarce. \textsc{MAFIA}\xspace exploits both intra-node and inter-node parallelism (Section~\ref{sec:template-library}).
\vspace{1mm}\noindent \textbf{Nature of Computation}: Most DNN workloads are computation-bound. Therefore, the overhead of data shuffling across layers has minimal impact on latency~\cite{reuse}. However, classical ML algorithms are memory-bound, and data shuffling can significantly increase latency. \textsc{MAFIA}\xspace manages this by introducing intelligent design constraints (Section~\ref{sec:inter-node-communication}).
\vspace{1mm}\noindent \textbf{Resource-efficiency}:~Most ML-HLS tools focus primarily on optimizing matrix multiplication. However, in ML models for IoT applications, the dominant kernel can be any node in the matrix DFG. For example, in the output code of \textsc{MAFIA}\xspace, a matrix addition node may be more critical for latency than a matrix multiplication node. \textsc{MAFIA}\xspace iteratively optimizes the design based on the criticality of each operation in the program (Section~\ref{sec:best-pf-estimator}). Furthermore, existing tools usually target high-end FPGAs and assume abundance of resources. As a result, the optimization techniques employed in these tools are impractical for resource-scarce devices.
\subsection{Limited Scope for Optimizations of C-based HLS tools}
\label{sec:limit-chls}
\noindent \textbf{Difficult to extract parallelism}:~Automatically extracting parallelism from a sequential C program is difficult. Most safe compiler transformations make conservative assumptions and yield suboptimal performance.
To extract better performance, some HLS tools allow the programmer to annotate the C program with compiler hints. However, this requires expert knowledge, is restrictive in the kind of information that can be provided and is time-consuming.
\vspace{1mm}\noindent \textbf{Difficult to explore solution space}:~One approach explored by prior work is to automatically generate loop unrolling hints for the HLS compiler. To determine the best unrolling factor for each loop, the compiler must estimate how critical each loop is for the program and the impact of unrolling on resource consumption. This is hard because 1)~finding the critical path in a C program requires knowledge of target domain 2)~HLS compilers have poor accuracy in predicting (without requiring synthesis and simulation) the resource consumption and critical path latency (Section~\ref{sec:regression-model-accuracy}).
\begin{comment}
C-based HLS tools are the popular choice with many HLS enthusiasts today. Moreover, they are the only solution available as of today to accelerate ML algorithms on tiny edge devices. However, the limitations of C-based HLS tools to generate hardware are well documented in the literature\cite{C_HLS_limitations,Seedot, Ghanathe_2017}. Faced with a similar challenge for accelerating DNNs, prior research has moved to develop DNN-specific accelerator frameworks\cite{dnnweaver,fp-dnn,eyeriss,diannao} for FPGAs. However, this approach is too rigid and is often meant to target a specific set/class of algorithms, subsequently leading to poor performance for other algorithms. \textsc{MAFIA}\xspace differs from both these approaches by expressing an ML algorithm in terms of a Data flow graph (DFG), where each node represents a matrix operation.
Consider the following program written in a matlab-like language, where all the operations are performed on matrices.
\begin{lstlisting}[language=MatLab]
Z = X |*| Y - Q
P = (Z * A) * (Z * B)
Q = tanh(Z * C) + (Z * D)
R = argmax(P + Q)
\end{lstlisting}
where, \textsc{|*|} represents Sparse matrix-vector multiplication operation.
A typical implementation in C of these matrix operations would involve \texttt{for-loops}. It is evident that loop unrolling (through pragmas) would benefit the performance of the design significantly. However, many state-of-the-art C-HLS compilers do not automatically unroll loops. Even if they do, naively unrolling all the loops may cause the resource usage to explode beyond the FPGA's limit. As a result, the compiler needs to determine an unroll factor for each loop of the program in cognizance of the amount of resources available. This is a complex process and often yields poor results\cite{C_HLS_limitations,}. In addition to this, traditional C-HLS compilers fail to exploit task level parallelism (TLP). In the code shown above, it is obvious that the matrix multiplication operation is the dominant operation compared to matrix addition. It follows from that unrolling the loops of the matrix multiplication operation will benefit the performance of the design more than unrolling the loops of matrix addition. However, C-HLS compilers fail to differentiate between various tasks (operations). They can only exploit instruction-level parallelism (ILP). Since \textsc{MAFIA}\xspace expresses a ML algorithm in terms of a matrix-abstracted DFG, both TLP and ILP are straightforward to exploit (Section\ref{sec:arch}) . But, one might argue that the C-HLS compilers also construct a Control-data flow graph (CDFG) from the source code. However, unlike \textsc{MAFIA}\xspace, the nodes of this CDFG are basic blocks (BB), which is a straight line code sequence with no branching statements\cite{bb}. Interestingly, our analysis on Bambu HLS compiler~\cite{bambu} revealed that even a simple optimization such as \textit{if-conversion}~\cite{if-conv} (to reduce control dependencies by eliminating branches) is not part of the compiler optimizations. As a result, the C-HLS compilers are restricted to extract parallelism within a BB. This underlines the complexity of extracting parallelism from the C-code.
While traditional C-HLS tools possess high expressiveness, they often fail to synthesize the optimal designs. Hence, prior research has focused on coming up with domain specific solutions. As a result, researchers have contributed many accelerator frameworks~\cite{dnnweaver,fp-dnn,eyeriss, diannao}. To the best of out knowledge, no accelerator framework exists to accelerate KB-sized (tiny edge) ML algorithms. The existing FPGA accelerator frameworks mostly target deep neural networks (DNN) like Convolutional neural network (CNN)\cite{}, recurrent neural networks (RNNs)\cite{} and so on. Typically, a high-level description of the algorithm is mapped to a predefined hardware template on the FPGA. The hardware templates are usually a sea of interconnected processing elements (PE) (usually multipliers or a multiply-accumulate units). The design space exploration (DSE) involves figuring out the optimal mapping of the algorithm onto these PEs. Thus, the hardware architectures of these frameworks are rigid in that they are carefully designed and tailor-made to obtain maximum performance for a particular type/class of algorithms. Thus, they are inherently restrictive in nature because each algorithm translates differently to hardware. For example, consider a hardware template consisting of interconnected PEs in a systolic array fashion, where each PE is a multiply-accumulate (MAC) unit. If we try to map our simple motivating example onto this template, it is easy to observe that matrix multiplication and SpMV operations fully utilize the MAC units, whereas matrix addition, matrix subtraction and TanH do not. Further, since the interconnect is pre-established the mapping becomes tedious and inefficient if the constitution of the algorithm changes. For example, if the new algorithm calls for a \textit{Sigmoid} activation unit, then either the PE has to configurable to act as a \textit{Sigmoid} activation unit or the output has to be routed to PEs that are implemented as \textit{Sigmoid} activation units. In the former case, the design of PEs will be very complex and often become bloated, which is undesirable. In the latter case, the pre-defined interconnect will make the routing of outputs inefficient and complex. Hence, this approach limits the expressiveness of the framework.
We aim to overcome these challenges by proposing an acceleration framework for tiny-edge ML models on FPGAs that maintains high expressiveness and can generate designs that are resource efficient and highly parallel.
\end{comment}
\begin{comment}
C-based HLS tools are the popular choice with many HLS enthusiasts today. However, the limitations of C-based HLS tools to generate hardware are well documented in the literature\cite{C_HLS_limitations,}. As a result, there have been many research efforts to come up with domain-specific solutions. Consequently, there exists many DNN and ML accelerator architectures and frameworks to accelerate applications specific to the DNN and ML space \cite{,,,}. However, this approach is too rigid and is often meant to target a specific set/class of ML algorithms, subsequently leading to poor performance for other ML algorithms. \textsc{MAFIA}\xspace differs from both these approaches by expressing an ML algorithm in terms of a Data flow graph (DFG), where each node represents a matrix operation.
The advantages of this approach is illustrated by a simple motivating example that contrasts the how a typical C-based HLS compiler and a typical ML accelerator framework synthesizes design.
Consider an ML algorithm that consists of a matrix addition followed by a matrix multiplication as shown below.
\begin{lstlisting}[language=MatLab]
W = X + Y
Z = W * D
\end{lstlisting}
where, X, Y, W, D and Z are matrices of size 10$\times$10.
\subsection{C-based HLS synthesis}
\label{subsec:CSyn}
A typical implementation in C for the above program would be as follows.
\begin{lstlisting}[language=C]
//Matrix Addition
for(int i=0; i<10;i++){
W[i] = X[i] + Y[i];
}
//Matrix Multiplication
for(int i=0; i<10;i++){
for(int j=0; j < 10;j++){
for (k = 0; k < 10; k++){
prod = W[i][k] * D[k][j];
Z[i][j] += prod;
}
}
}
\end{lstlisting}
It is clear from the code that loop unrolling would benefit the performance of the design significantly. Although many state-of-the-art C-HLS compilers do not automatically unroll for-loops, we will assume our hypothetical C-HLS compiler does. First, our C-HLS compiler checks if there are any inter-loop dependencies so that it may unroll the for-loops. While, the first for-loop (for MatAdd) does not have any dependencies, the same cannot be said about the innermost loop of the matrix multiplication operation on account of the variable \texttt{prod}. Even this simple example illustrates the need for code restructuring to infer parallelism. Next, the C-HLS compiler can either naively unroll all loops completely or use some intelligent technique to determine the unroll factor. In the former case, resource usage might explode beyond the FPGA's limit, rendering the design useless. In the latter case, the compiler has to estimate the increase in resource usage caused due to unrolling and settle at an unroll factor in cognizance of the amount of resources available. This is a complex process and often yeilds poor results\cite{,,}. Unlike many contemporary C-HLS compilers, let us assume that our hypothetical C-HLS compiler is able to perform this analysis. In addition to this, traditional C-HLS compilers fail to exploit task level parallelism (TLP). In the example shown above, it is obvious that the matrix multiplication operation is the dominant operation. It follows from that unrolling the for-loops of the matrix multiplication operation will benefit the performance of the design more than unrolling the loops of matrix addition. However, the C-HLS compiler fails to differentiate between various tasks. It can only exploit instruction-level parallelism (ILP). Even if we assume that our hypothetical C-HLS compiler is able to accomplish the above-mentioned complicated tasks optimally, the compiler still has to deal with the difficult task of partition and(or) duplication of memories for loop-unrolling to work.
\textsc{MAFIA}\xspace exploits the fact that matrix operations are the natural language for linear algebra, which is used to express many ML algorithms. Thus, any ML inference algorithm is a combination of various matrix operations. \textsc{MAFIA}\xspace expresses a ML algorithm in terms of a DFG, where each node represents a matrix operation. One might argue that the C-HLS compilers also construct a Control-data flow graph (CDFG) from the source code. However, the nodes of this CDFG are basic blocks (BB), which is a straight line code sequence with no branching statements\cite{wiki}. As a result, the C-HLS compilers are restricted to extract parallelism within a BB.
Since we know that matrix operations are elementary units of ML algorithms, we can easily establish dependency relationships between them. As a result, task level parallelism is inherently inferred in a DFG. Further, we make the observation that the matrix operations themselves are basically Single-instruction multiple data (SIMD) units. Consequently. \textsc{MAFIA}\xspace also exploits ILP by implementing the Verilog templates for each matrix operation to support multiple threads of execution. The number of threads of execution for a particular matrix operation is specified by the parallelization factor (PF), which is akin to the unroll factor of loops.
\subsection{Template-based HLS synthesis}
\label{subsec: TempSyn}
While traditional C-HLS tools possess high expressiveness, they often fail to synthesize the optimal designs. Thus, domain specific problems require domain specific solutions. As a result, researchers have contributed many accelerator frameworks\cite{}. To the best of out knowledge, no accelerator framework exists to accelerate KB-sized (tiny edge) ML algorithms. The existing FPGA accelerator frameworks mostly target deep neural networks (DNN) like Convolutional neural network (CNN)\cite{}, recurrent neural networks\cite{} and so on. Typically, a high-level description of the algorithm is mapped to a predefined hardware template on the FPGA. The hardware templates are usually a sea of interconnected processing elements (PE) (usually multipliers or a multiply-accumulate units). The design space exploration (DSE) involves figuring out the optimal mapping of the algorithm to these PEs. As a result, the hardware architectures of these frameworks are rigid in that they are carefully designed and tailor-made to obtain maximum performance for a particular type of neural network\cite{}. Thus, they are often restrictive in terms of supporting different types of neural networks because each algorithm translates differently to hardware. For example, let us consider a hardware template consisting of interconnected PEs, where each PE is a multiply-accumulate (MAC) unit. If we try to map our simple motivating example onto this template, it is easy to observe that matrix multiplication operation fully utilizes the MAC units, whereas matrix addition does not. Further, since the interconnect is pre-established and there is a data dependency between the two operations, there exists a constraint in mapping of operations onto the PEs. Also, if the constiution of the algorithm changes, the mapping becomes tedious. For example, if the new algorithm calls for a TanH activation unit, then either the PE has to configurable to act as a TanH activation unit or the output has to be routed to PEs that are TanH activation units. In the former case, the design of PEs will be very complex and they often become bloated, which is undesirable. In the latter case, the pre-defined interconnect will make the routing of outputs inefficient and complex. Hence, this approach limits the expressiveness of the framework.
\textsc{MAFIA}\xspace overcomes these challenges as follows. First, since \textsc{MAFIA}\xspace works at the matrix abstraction level, it can express most ML algorithms. The algorithm is expressed as a DFG, where the nodes have the freedom to be any matrix operation. Further, instead of desinging a single complex hardware template, we design multiple hardware templates for each type of matrix operation. As a result, the implementation of these templates is relatively straightforward. Thus, \textsc{MAFIA}\xspace can express various ML algorithms effectively. Second, since the DFG is flexible and is a direct represenatation of the ML algorithm, we can instantiate necessary compute units like multipilers, adders, activation units and define the interconnect based on the edges of the DFG. As a result, the generated design is resource efficient, flexible and significantly improves performance.
\end{comment}
\section{Overview of \textsc{MAFIA}\xspace}
\label{sec:overview}
We propose \textsc{MAFIA}\xspace, a compiler that generates high-performance Verilog program from a high-level specification of an ML inference algorithm for a milliwatt-scale FPGA.
The heart of the compiler is an optimizer which minimizes the latency of the critical path in the DFG by
\emph{determining the level of parallelism with which each node in the program's DFG should be executed}. We formulate this optimization problem as an integer programming problem (Section~\ref{sec:best-pf-estimator}).
We augment \textsc{MAFIA}\xspace with two components. The first component is a library of Verilog templates with one template for each type of matrix operation. Each template is Verilog implementation of the operation, parameterized by
the dimensions of the input matrices and a \emph{parallelism factor} (PF). Our Matrix Template Library currently supports various dense and sparse matrix operations: sparse matrix-vector multiplication (SpMV), matrix addition/subtraction, dot product, outer product, hadamard product, dense matrix-vector/vector-matrix/matrix-matrix multiplication, scalar-matrix multiplication and non-linear activations including exponentiation, relu, sigmoid and hyperbolic-tan. These operations are sufficient to express a variety of ML models targeting IoT applications~\cite{edgeml}, including state-of-the-art models~\cite{protonn,bonsai}. \textsc{MAFIA}\xspace's optimizer is agnostic to the exact implementation of the template. Therefore, we can improve performance further by providing an improved template for a particular operation or extend support to other matrix operations by simply adding to the library.
The second component is a set of latency/resource estimation models that can predict the amount of FPGA resources and execution latency for an operation given its input dimensions and PF. Since there are finite number of operation types, generating these templates and their regression models is tractable and a one-time-effort during the tool development.
\subsection{\textsc{MAFIA}\xspace Compiler Flow}
\label{sec:main-artifacts}
Figure~\ref{fig:mafia-flow} shows the compiler's flow. We provide an overview in this section; more details are provided in Section~\ref{sec:design}.
\begin{figure}[tb]
\centering
\scalebox{0.55}{\input{figs/compiler-flow}}
\caption{Overview of MAFIA Flow}
\label{fig:mafia-flow}
\end{figure}
Given an input program, the \emph{DFG generator} extracts the matrix DFG of the computation along with the matrix dimensions. The \emph{PF-1 Profiler} profiles the resource consumption and latency of each node in the DFG when their PF is set to 1. This information is used by the estimation models to estimate the resource consumption and latency of each node. The \emph{Best-PF Estimator} then uses our optimizer to find the best PF for each node that minimizes the overall latency of the program.
The \emph{Scheduler Generator} uses the static DFG to generate a schedule that executes the program in \emph{data flow order}. This allows \textsc{MAFIA}\xspace to execute data-independent nodes in parallel. Finally, the \emph{Verilog Generator} uses the identified PFs and the template library to generate the final Verilog code.
\section{Detailed Design}
\label{sec:design}
In this section, we describe \textsc{MAFIA}\xspace in detail. We begin by describing the \emph{Paramterized Matrix Template Library} and the \emph{Latency/Resource Estimation Models} (yellow blocks in Figure~\ref{fig:mafia-flow}). We then explain the flow of the \textsc{MAFIA}\xspace compiler.
\subsection{Parameterized Matrix Template Library}
\label{sec:template-library}
At the backend of the \textsc{MAFIA}\xspace compiler is a library of hand-optimized Verilog templates, one for each type of matrix operation.
Each template consists of two components: 1)~the execution unit and 2)~the data interface unit. The execution unit is the core computation unit (eg. adder, multiply-accumulate) with a configurable number of processing elements (PE) specified by the PF. The data interface unit holds logic for supplying data to the execution unit by reading the output memories of the node's predecessors and writing the result generated by the execution unit into the input memories of the node's consumers. The structure of the data interface unit depends both on the execution PF of the node and the PF of the consumer nodes as follows.
\label{sec:execution-unit}
\label{sec:data-interface-unit}
\label{sec:inter-node-communication}
Consider two nodes: producer and consumer.
In the producer node, each PE writes its partial output to a buffer.
However, if the execution PF of producer (i.e. number of PEs) does not match that of the consumer, two sets of buffers with data shuffling logic in between may be needed. For nodes that can complete their execution in linear time, e.g., matrix addition, this data shuffling eliminates any performance benefit gained by parallelizing its execution.
To avoid this problem, we introduce additional constraints on PFs (shown in Figure~\ref{fig:pf-constraints}). We classify nodes as: 1)~\emph{linear-time nodes}, those that can complete execution in linear time (or less) in terms of the input size (e.g., matrix addition), and 2)~\emph{non-linear-time nodes}, those that take worse than linear time to complete execution (e.g., matrix multiplication). We associate each node with multiple PFs: one for each input, one for its execution unit, and one for its output. The figure shows a two-input linear-time node and a two-input non-linear-time node. For a linear-time node, we require the input, execution, and the output PFs to be the same (thereby avoiding the need for any data shuffling). For non-linear time nodes, we introduce a logic before and after the execution to appropriately shuffle the data. Finally, for two nodes with a producer-consumer relationship, the output PF of the producer must be equal to the input PF of the consumer. One natural implication of these constraints is that a sub-graph of connected linear-time nodes will all have the same PFs. We exploit this observation further to enable pipelined execution of linear-time nodes (Section~\ref{sec:pipelining}).
\subsection{Latency/Resource Estimation Models}
\label{sec:latency-resource-estimation}
The key optimization problem in \textsc{MAFIA}\xspace is to determine the best PF for each node in the DFG such that the overall latency is minimized, while fitting inside the resource budget of the FPGA.
This entails exploration of a vast solution space of possible PF assignments. To reduce exploration time, we build regression models for each template that can predict the resource consumption and latency of a node. The overall resource consumption of a candidate solution is the sum of the resource consumption of all nodes and the execution latency is the sum of the latency of all the nodes in the \emph{critical} path (path with maximum latency). For our target models, we find that the buffering is done mainly using distributed RAM (LUTRAM) because of smaller matrix dimensions. As a result, there are typically more than enough memory resources (BRAM, Flip Flops) on our target FPGA boards, so we focus on predicting only the compute resources (LUT+LUTRAM, DSP).
\label{sec:model-setup}
We build a separate estimation model for each type of matrix operation.
Given the input dimensions of the operation and a target PF, our model estimates the resource consumption (LUTs and DSPs) and execution latency of the operation.
In general, we expect LUT consumption to increase linearly with PF.
The DSP usage in a PE is known statically for an operation. We expect latency of a node, in general, to reduce linearly as $1/\textrm{PF}$. However, we find that for some operations, the parallel execution is followed by some linear reduction of the partial sums (e.g., \textsf{DotProduct}). Accordingly, we use the following models for estimating LUT, DSP, and latency consumption of a node.
In the equations below, LUT[1] and Latency[1] are the LUT consumption and latency of the corresponding operation with the specified input dimensions when the PF is set to 1.
\begin{eqnarray*}
\textrm{Latency}[\textrm{PF}] & = & (\alpha_L + \beta_L \cdot \textrm{PF} + \gamma_L\cdot\frac{1}{\textrm{PF}})\cdot\textrm{Latency}[1] \\
\textrm{LUT}[\textrm{PF}] & = & (\alpha_{LUT} + \beta_{LUT}.\textrm{PF})\cdot \textrm{LUT}[1]\\
\textrm{DSP}[\textrm{PF}] & = & \alpha_{DSP} \cdot \textrm{PF}
\end{eqnarray*}
These equations require values for $\alpha_{LUT}$, $\beta_{LUT}$, $\alpha_{DSP}$, $\alpha_{L}$, $\beta_{L}$, and $\gamma_{L}$ for each matrix type.
Of these, $\alpha_{DSP}$ is set by the template developer to the number of DSPs used by the template's PE. We use a training algorithm to find the remaining parameters. To do this, we generate multiple sets of training data points. Within each set, we fix the input dimensions to an arbitrary value and vary the PF from 1 to a number beyond which the operation cannot be further parallelized by the underlying template. We synthesize and simulate Verilog implementations for each set to obtain the true LUT consumption and execution latency for each operation. We then identify the best parameters that minimize the mean squared error on the training data set. This is an one-time-effort for a family of FPGAs (Artix-7 in our case). These regression models are pre-trained during the tool development and are already included as a part of the \textsc{MAFIA}\xspace framework.
\begin{figure}[bt]
\centering
\scalebox{0.7}{\input{figs/PF-constraints}}
\caption{Linear-time and non-linear-time nodes}
\label{fig:pf-constraints}
\end{figure}
\subsection{Data Flow Graph Generator}
\label{sec:dfg-generator}
\textsc{MAFIA}\xspace constructs the data flow graph (DFG) of the input program by analyzing the data dependencies in the program. Each node in the DFG is annotated with 1)~type of operation, 2)~input dimensions for the operation, and 3)~any static model parameters for the operation. \textsc{MAFIA}\xspace currently includes a DFG generator for \textsc{SeeDot}\xspace DSL~\cite{Seedot}. We also support a subset of Tensorflow~\cite{tensorflow} by converting the Tensorflow program to \textsc{SeeDot}\xspace and extracting the DFG.
\subsection{PF-1 Profiler}
\label{sec:pf1-profiler}
The \textit{PF-1 profiler} determines
\textrm{LUT}[1] and \textrm{Latency}[1] described earlier.
For each node in the program's DFG, it
synthesizes the Verilog implementation of the corresponding template with the node's operation dimensions to obtain the value of LUT[1] (once for each node). It then simulates the whole design with a random input to measure the PF=1 latency (one-time).
The \textit{PF-1 profiler} tags each node of the DFG with the measured values and passes the DFG to the next stage.
\subsection{Best-PF Estimator}
\label{sec:best-pf-estimator}
The goal of the Best-PF Estimator is to determine the best PF assignment for each node. The best PF of a node depends on the criticality of the node in the input program, which is influenced by the node's data dimensions. For example, across the 20 datasets we evaluate in Section~\ref{sec:results}, the PF for the SpMV node generated by the \textsc{MAFIA}\xspace optimizer ranges from 3 to 71. This further demonstrates the inefficiency of existing DNN accelerators that optimize for a single type of workload.
Since all the execution PFs are integers, the optimization problem can be expressed as an integer program. We explore two optimization strategies for the best-PF estimator.
\subsubsection{Black-box optimization}
\label{sec:lp-approximation}
In this approach we employ a generic solver to solve the optimization problem.
The critical path of the program can change as PF assignments change. Therefore, we express this optimization metric as a min-max problem: minimize the maximum latency across all paths in the program.
Our framework adds constraints for each path in the DFG, stating that the sum of latency of all the nodes for each path should be less than a target latency. The integer program is then setup to minimize this target latency. Since solving an integer program is NP-hard, we relax it to be an optimization problem over real numbers and round the PFs to the nearest integer.
\subsubsection{Greedy Optimization}
\label{sec:greedy-optimization}
As finding a global optimum can be computationally intensive, we also explore a greedy strategy. Our greedy algorithm initializes the PFs of all the nodes to one. It then repeats the following steps while resources are still available.
\begin{enumerate}
\item Identify the current critical path of the program.
\item Identify the most critical node in that path. The most critical node is the one which yields the maximum \emph{benefit} when its PF is increased by one subject to the constraints established in Section~\ref{sec:inter-node-communication}. Note that when a node's PF is increased by one, the optimizer may also have to increase the PF of some connected nodes.
\item If the optimizer cannot increase the PF of any node on the critical path, it exits immediately. As \textsc{MAFIA}\xspace executes the program in data flow order, there is no benefit to parallelizing a non-critical node even if there are resources available.
\item If not, \textsc{MAFIA}\xspace increases the PF of the critical node by one and iterates.
\end{enumerate}
We support two \emph{benefit} metrics: reduction in latency and reduction in latency per additional LUT consumed.
\subsection{Scheduler Generator}
\label{sec:scheduler}
\textsc{MAFIA}\xspace enables concurrent execution of nodes wherever possible.
Each template is associated with a \emph{start} and \emph{done} signal. A node can start execution as soon as its \emph{start} signal is asserted. When a node completes execution, it asserts its \emph{done} signal. \textsc{MAFIA}\xspace generates the controller that encodes this scheduling logic for the program's DFG.
\subsection{Pipelining Linear-Time Nodes}
\label{sec:pipelining}
When consecutive operations have the same PF, it is possible to
view these two nodes as a super node and pipeline their execution (rather than waiting for the first to complete before starting the second).
This optimization eliminates the need for memory buffers between pipelined nodes. To perform this optimization, \textsc{MAFIA}\xspace identifies clusters of linear-time nodes that are connected to each other and pipelines them. The pipeline begins execution only when \emph{all} the nodes supplying input to the pipeline have completed execution.
\begin{comment}
\subsection{Overview}
\label{subsec:overview}
\begin{figure}[t]\small
\centering
\input{figs/DFG_example}
\caption{DFG example}
\label{fig:sampleDFG}
\end{figure}
Figure\ref{fig:sampleDFG} shows the DFG extracted from the example program introduced in Section\ref{sec:motivation}. The program is broken down into individual matrix operations and the DFG is constructed as shown. \textsc{MAFIA}\xspace maintains a library of hand-written Verilog templates for each of the matrix operation supported. This is a one-time effort and is easier implement as opposed to implementing the systolic-array like Verilog template that many DNN accelerator frameworks use.
The \textsc{MAFIA}\xspace-generated design consists of a set of hardware modules interconnected using a \texttt{producer-consumer} dataflow model. The Verilog design is generated as follows.
First, the \textsc{MAFIA}\xspace compiler extracts the Intermediate representation (IR) and the Data flow graph (DFG) from the program. The IR contains information such as input dimensions and scaling factors. Each node in the DFG represents a matrix operation (like matrix addition, matrix multiplication and so on) involved in the program and each edge represents a memory block (on-chip RAM). Every node in the DFG has the freedom to have its own parallelism factor (PF).
Next, the compiler maps each node in the DFG to its corresponding Verilog template and initializes them with the appropriate PF and input dimensions. Each module reads data generated from its predecessor and writes the output into a buffer (memory) on the FPGA. The successive modules operate on the data from these buffers and sends its output to its successor module(s) by writing into yet another buffer(s). For example, in Figure\ref{fig:sampleDFG}, \textit{node 1} reads the data generated by \textit{node 0} module and feeds the output to nodes \textit{3,4,2 and 5}. Modules are interconnected using buffers, each implemented using a single-read/single-write RAM module on the FPGA of sufficient size to hold the matrix associated with the matrix operation. Further, the matrices are always stored in the row-major format in the buffers by default. Each buffer receives data from only one module, but may provide data to multiple successor modules through memory duplication. A particular node starts executing as soon as all its predecessors finish executing. In Figure\ref{fig:sampleDFG}, the output of node 1 is duplicated 4 times so that nodes 3,4,2 and 5 can execute concurrently. Thus, the data flows from the \texttt{start} to \texttt{end} to complete execution. As a result, the objective of the compiler boils down to reducing the time taken to go from the \texttt{start} to \texttt{end} by optimizing the nodes of the DFG through techniques like parallelization (Section\ref{sec:implementation}) and pipelining (Section\ref{subsec:pipeline}). Before delving into the optimization problem, we introduce the target architecture of the \textsc{MAFIA}\xspace compiler.
\subsection{Template Structure}
\label{subsec:tempstruc}
At the core of each template is an arithmetic logic unit (ALU). The composition of the ALU depends on the nature of the matrix operation. For example, a matrix addition module will have an adder whereas a matrix multiplication module will have a multiply-accumulate (MACC) unit. Additionally, each module contains address decode/encode logic to read/write from external memories and local buffers.
Based on the nature of the operation, we classify modules into two types:
\begin{itemize}
\item \textbf{\textit{Linear-time modules}} : Linear-time (LT) modules are those that
execute in linear time such as Matrix-addition, Matrix-subtraction, and Scalar-Matrix
multiplication. The workload for these regular modules can be
partitioned uniformly among the Processing Elements (PE) such that there are
no memory contentions among them.
\item \textbf{\textit{Non-linear-time modules}} : Non-linear-time (NLT) modules are those that
have non-linear execution time. Dense Matrix-multiplication, Sparse
Matrix-vector multiplication are instances of non-linear-time modules. Since these
modules possess non-linear memory access patterns, the workload cannot be
uniformly partitioned among the PEs without memory contention.
\end{itemize}
Figure~\ref{fig:sampleDFG} shows a sample DFG with both LT (elliptical) and NLT (rectangular) nodes. Each node in the DFG corresponds to a matrix operation, which is implemented by creating Verilog templates for each such operation.
Each template has its own customized computation engines. The structure of these templates vary for LT and NLT modules.
\subsubsection{Template Structure for Linear-time modules}
\label{subsubsec:LT}
The computation engines inside LT modules are essentially Single-instruction Multiple Data (SIMD) units. These include operations such as as matrix addition/subtraction, scalar multiplication and hyperbolic tangent (TanH). Since a matrix is stored in a RAM on the FPGA contiguously, it is partitioned statically and divided between the threads based on the module's PF. As a result, each processing element (PE)/thread has exclusive access to its own input and output memory. Additionally, the address encode/decode logic is included as well. For example, consider a 10$\times$10 matrix addition module (\texttt{C = A + B}) with a PF of 2. Each of the two threads will have an adder units and two input address generator (for the two operands) and one output address generator. Consequently, input matrices \texttt{A} and \texttt{B} are divided equally between the two threads for execution and the threads work only on the part of the matrix assigned to it. Thus, there exists a linear trend in the increase of resource consumption w.r.t the increase of PF. Similarly, the is latency trend emulates an harmonic progression. As a result, this approach of template design reduces the complexity to model the resource and latency significantly (Section\ref{subsec:profiler})
\subsubsection{Template Structure for Non-linear-time modules}
\label{subsubsec:NLT}
The execution of NLT modules is characteristically skewed. Unlike LT modules, the PE's may not access matrix elements at contiguous memory locations. As a result, for efficient execution, the input matrices might have to undergo transformations such as transpose, duplication, row-wise partitioning and column-wise partitioning. Since all the matrices are stored in a row-major order by default, all of these transformations incur an overhead and are handled by a special piece of logic called \textit{glue logic} (Section\ref{subsubsec:gluelogic}). Similarly, the glue logic also stitches together the local results (output matrices) of the threads to form the final output matrix in row-major order. There are two modules defined within \textsc{SeeDot}\xspace language that can be classified as NLT modules
\paragraph{\textbf{\textit{Dense Matrix- Dense Matrix Multiplication}}}
The matrix multiplication is the core kernel for many ML algorithms. Over the years various techniques have been proposed for parallel processing of the kernel\cite{,,}. However, most of these implementations either do not take into account the dimensionality of input matrices or perform inefficiently. For example, consider a matrix multiplication operation below.
\begin{equation}
C\textsubscript{ij} = \sum A\textsubscript{ik} . B\textsubscript{kj}
\label{matmulequation}
\end{equation}
where, I$\times$J and J$\times$K are the dimensions of input matrices A and B respectively and I,J,K $\geq$1. If I$>$1, J$>$1 and K=1, then the operation turns into a matrix-vector multiplication. Similarly, I$>$1, J$>$1 and K$>$1 turns into a matrix-matrix multiplication whereas I=1, J=1 and K$>$1 turns into a scalar-vector multiplication. It is evident that we have eight different combinations for I,J,K and hence eight modes of the matrix multiplication kernel. As a result, a single template architecture for matrix multiplication will not yield good results for all modes. For example, a parallel implementation of a matrix-matrix multiplication kernel may require partitioning matrix A row-wise and matrix B column-wise among the threads followed by a reduction stage to combine the local results from all the threads. However, the same architecture will result in poor resource utilization for a scalar-vector multiplication. As a result, the template for matrix multiplication kernel includes a tailored implementation for each of the eight modes. Consequently, we maintain high resource utilization efficiency throughout.
\paragraph{\textbf{\textit{Sparse Matrix- Dense Vector Multiplication (SpMV)}}}
SpMV operation has a significant presence in many scientific applications\cite{}. Furthermore, it is a critical part of the dimensionality reduction\cite{} phase of many ML classification algorithms. It is notoriously difficult to parallelize the operation because the sparsity of matrix is unpredictable. There have been numerous works developing efficient storage schemes for the Sparse matrices to enhance the performance of Sparse matrix operations. The storage format essentially dictates the architecture to implemented. We adopt the Compressed Sparse Column (CSC)\cite{} storage format in our implementation. The CSC format compresses the sparse matrix into three vectors.
\begin{itemize}
\item \textbf{Value}: Contains all non-zero values of the sparse matrix
\item \textbf{Row\_id}: Contains the row index of each non-zero value
\item \textbf{Column\_ptr}: Contains the index of the first non-zero value in each column
\end{itemize}
We choose the CSC format for the following reasons. First, it reduces the memory footprint considerably. Second, it forces all entries of a given column to lie in contiguous memory, which enables straightforward distribution of workload among the threads. Finally, CSC format avoids duplication of the dense vector among threads unlike its row-major counterpart, compressed sparse row (CSR) format, thereby boosting the temporal locality.
The \textsc{MAFIA}\xspace compiler (and the glue logic Section(\ref{subsubsec:gluelogic})) pre-processes the data in the CSC format and uniformly distributes the workload based on the number of multiply-accumulate (MAC) operations. Each thread in the SpMV template reads the input data and computes the local output (partial sums) through a pipelined datapath consisting of a MAC unit. Finally, a reduction logic reduces the partial sum from the threads to form the final output.
\subsection{Glue Logic}
\label{subsec:gluelogic}
The novelty in the proposed architecture is the increased flexibility obtained by accommodating various types of nodes in the design. But, each node (template) in the DFG is characteristically different from other nodes w.r.t its nature of operation, input dimensions and PF. Thus, the composition (hardware footprint) of every node varies. As a result, the communication between the various modules is intricate. The \textit{glue logic} is a special circuitry that allows modules to read/write from/to a previous module/next module with arbitrary values of parallelization factors (PF). It includes special decode/encode logic to aggregate data from the producer(s) and prepare data for its own execution and feeding data to the consumer module(s).
The glue logic module is highly parameterized to handle all sorts of data access patterns. Some of the functionality that it includes are Transpose, row-wise memory partition, column-wise memory partition, element-wise memory partition, broadcast, partial-sum reduction and so on. Since the input dimensions and the PF are known at compile time, only those transfomational units that are necessary are instantiated. Consider an example of Matrix-multiplication (MatMul) operation , which is an NLT operation. As mentioned in Section\ref{subsubsec:tempforIrregular}, the matrix multiplication kernel has 8 modes of execution based on the input dimensions. Hence, a Scalar-Vector multiplication (I$=$1, J$=$1, K$>$1) can be treated as a LT operation. Thus, the Scalar 'A' is broadcast to all threads and Vector 'B' is partitioned based on number of elements among the threads. On the other hand, Matrix-Matrix multiplication (I$>$1, J$>$1, K$>$1) needs the Matrices 'A' and 'B' to be partitioned column-wise and row-wise respectively. The glue logic instantiates the requisite functional units depending on the mode of execution. Similarly, the glue logic module also aggregates data from its predecessors and pre-processess data for a module. For example, in Figure\ref{fig:sampleDFG}, consider \textit{node1} feeding \textit{node3}. \textit{Node1} has a PF of 3 and \textit{node3} has a PF of 5. Consequently, \textit{node1} has 3 PEs, each of which compute one-third of the output. The pre-processing stage of glue logic inside \textit{node3} possesses an address encode/decode logic that reads from the three output memories but presents a single memory interface to \textit{node3's} core logic. The same principle applies for the post-processing (feeding to consumers) stage of the glue logic.
While the glue logic enables modules with different PFs to communicate, it has to be used judiciously in appropriate places, which will be discussed in Section\ref{subsec:prac}.
In this way, the intelligent glue logic module enables the modules to communicate effectively with a minimum overhead, thereby promoting inter-node (inter-module) parallelism.
\subsection{Intra-node and Inter-node Parallelism}
\label{subsec:parallelism}
The biggest asset of a FPGA is its ability to parallelize. However, the C-based HLS tools fail from exploiting them fully without an expert. Further, the syntactic variance in the input program make it harder to adequately identify the paralellization opportunities in the design. Also, even with a limited repertoire of operations in the ML domain, the significant gap in the programming paradigms between C and Register Transfer Level (RTL) often lead to misinterpretation of many details of the hardware design. Additionally, the fine level of granularity means complex scheduling strategies and increased synchronization overheads, which make it even more difficult to extract parallelism~\cite{}. Although the finer granularity means that within each control block in the control dataflow graph (CDFG), the datapath of the design can be optimized better through strategies such as loop unrolling, inlining and pipelining etc., the program itself is often toohttps://www.overleaf.com/project/5e6828ab46eee20001cb9587 cluttered to extract an optimized version of CDFG. While there exists considerable work on extracting parallelism in such scenarios\cite{}, they are often complex and still call for intervention from a digital design expert.
On the other hand, a single-template architecture maps all algorithms to a specific pre-defined template architecture. The design of such templates are excruciatingly difficult because they have to be designed in such a way that they can map various types of algorithms in an efficient manner without large performance and resource overheads. Although we are working with a specific domain (ML), it is still difficult to come up with such a template. Many algorithms are often mapped to the template inefficiently. The fixed nature of the template frequently leads to poor resource utilization, thereby resulting in loosing parallelization opportunities. While the execution control and scheduling strategies are fairly simple in this scenario, the inefficient datapath design degrades both the performance and resource utilization of the FPGA.
Our approach finds a middle-ground between the above-mentioned two approaches. The nodes in the DFG and hence the modules are separate entiies. Thus, the modules have their own control flow and datapath. As a result, we now have at least two levels of control hierarchy. The topmost control flow employs a scheduling strategy to enable \textit{inter-node parallelism} by scheduling/executing the nodes/modules in parallel while the control flow inside each template promotes \textit{intra-node parallelism} by implementing customized scheduling strategy(ies) for the datapath. This allows for more complex scheduling strategies and efficient use of the datapath inside each template.
Further, since the matrix operations are virtually atomic from algorithmic perspective, the control flow inside each template can be predetermined by selecting an optimal scheduling strategy. For example, the implementation of matrix-multiplication template as described in Section\ref{subsubsec:NLT} allows us to write a very efficient implementation with any blueprint. Although the design of such a template is sometimes intricate and time-consuming, it is only a one-time effort and is abstracted to the user.
In addition to this, as the topmost control flow depends on the number, type and the interconnection of nodes, the only dynamic part in the control flow is deciding when to start executing a particular node, which is relatively straightforward. Thus, by careful design of each template coupled with a simple scheduling strategy, we incur low overheads for implementing the control logic. Also, unlike previously mentioned approaches, the control logic does not bloat with increase in parallelism, thereby granting more space on the FPGA for parallelizing the design.
\end{comment}
\section{Evaluation Methodology}
\label{sec:eval_method}
\subsection{Hardware Setup and Benchmarks}
We target the small form-factor Xilinx Arty-board, which has 20800 logic units (LUTs), 90 DSP (multiplier) slices and 225~KB of on-chip memory operating at 10MHz. For comparison with microcontrollers, we use the results presented by~\textsc{SeeDot}\xspace~\cite{Seedot}. \textsc{SeeDot}\xspace targets the Arduino Uno Board (8-bit ATmega328P) with 2KB of SRAM and 32KB of read-only flash operating at 16MHz.
We evaluate different tools using two state-of-the-art machine learning algorithms: \textsc{Bonsai}\xspace~\cite{bonsai}, a decision-tree based classifier, and \textsc{ProtoNN}\xspace~\cite{protonn}, a k-nearest-neighbour based classifier, from Microsoft's EdgeML library~\cite{edgeml}. These algorithms are crafted specifically to run on milliwatt-scale IoT devices and have state-of-the-art accuracies on various tasks.
We use ten standard ML datasets (both binary and multiclass): cifar~\cite{cifar}, character recognition (cr)~\cite{cr}, usps~\cite{usps}, mnist~\cite{mnist}, letter~\cite{letter} and ward~\cite{ward}. In total, we evaluate 20 different DFGs as our benchmarks.
\subsection{Comparison Points}
\label{sec:comparison-points}
We compare \textsc{MAFIA}\xspace with four mechanisms that can currently be used for generating Verilog programs from high-level specifications for our target models.
We leverage the quantization scheme from a prior work, \textsc{SeeDot}\xspace~\cite{Seedot}. The fixed-point programs generated from \textsc{SeeDot}\xspace are used in our evaluations.\\
\noindent \textbf{Bambu HLS and Vivado HLS}
We run Bambu with the \texttt{BAMBU-PERFORMANCE-MP} flag (\texttt{-O3} optimizations) and Vivado HLS with the default options without any additional compiler hints (denoted by \textsf{Vivado No Opt}\xspace. in Figure~\ref{plot:latency}).
\noindent \textbf{\textsf{Vivado Auto Opt}\xspace.}
In this variant, we compare our work against a recent work, \textsc{SeeDot}\xspace~\cite{Seedot}. \textsc{SeeDot}\xspace is a language and a compiler to generate efficient implementation of ML inference algorithms targeting low-end IoT devices. The FPGA backend of \textsc{SeeDot}\xspace 1)~uses a hand-optimized Verilog implementation for Sparse Matrix Vector Multiplication (the most time consuming kernel in the microcontroller-based implementations of~\cite{protonn,bonsai}) with a fixed parallelism factor of 10 and 2)~accelerates the rest of the program by automatically annotating the input C program to Vivado HLS with loop unrolling and pipelining hints.
\noindent \textbf{\textsf{Vivado + \tool}\xspace.}
To understand the best we could do using a commercial HLS tool, we use the parallelism factors obtained from the \textsc{MAFIA}\xspace optimizer to generate appropriate hints to the Vivado HLS compiler. We build this variant on top of \textsf{Vivado Auto Opt}\xspace. First, we set the parallelism factor for the hand-optimized SpMV implementation to the PF value of the SpMV node generated by the \textsc{MAFIA}\xspace optimizer. Second, we iteratively incorporate the other PFs from the \textsc{MAFIA}\xspace optimizer by appropriately unrolling the outermost loop in the C-code of the corresponding operation.
We then manually improve the design performance by further unrolling the loops of the program, until the solution runs out of resource budget.
\noindent \textbf{\textsf{\tool}\xspace.}
In our evaluations, we extract the DFGs from the \textsc{SeeDot}\xspace~\cite{Seedot} framework and use them as input for \textsc{MAFIA}\xspace. All our main results are presented with the best performing configuration in which the code is generated by our greedy optimizer (see Section~\ref{sec:greedy-vs-convex} for more details) with latency reduction per additional LUT as the benefit metric.
\begin{figure*}[t]
\centering
\scalebox{0.75}{\input{figs/latency-plot-logscale.tex}}
\caption{Prediction latency using different compilers (lower is better). Y-axis is in log-scale.}
\label{plot:latency}
\end{figure*}
\section{Results}
\label{sec:results}
\begin{figure}[b]
\centering
\scalebox{0.9}{\input{figs/resource-plot}}
\caption{FPGA resource utilization}
\label{plot:resource-results}
\end{figure}
We first compare \textsc{MAFIA}\xspace-generated programs with other prior approaches on both prediction latency and resource utilization (Section~\ref{sec:performance-results}). Our results show that \textsc{MAFIA}\xspace generates programs that reduce prediction latency by 2.5$\times$ on average compared to the best previous approach. Figure~\ref{plot:resource-results} illustrates the efficiency of \textsc{MAFIA}\xspace in allocating resources based on criticality of nodes. This is underlined in our evaluation in Section~\ref{sec:regression-model-accuracy}, where we observe that our approach is more accurate than existing tools. Finally, in Section~\ref{sec:greedy-vs-convex}, our evaluation of two optimization strategies, greedy and black-box optimization, reveal that the greedy approach is significantly faster and generates programs of similar quality (if not better) compared to the black-box approach.
\subsection{Comparison of Different Mechanisms}
\label{sec:performance-results}
Our results show that all FPGA tools perform comfortably better than programs running on microcontrollers. \textsf{Vivado No Opt}\xspace. performs 14$\times$ better than microcontroller implementations. However, as expected \textsc{MAFIA}\xspace outperforms both Bambu HLS and \textsf{Vivado No Opt}\xspace significantly.
Therefore, in the rest of the paper, we present results on the following mechanisms: 1)~\textsf{Vivado Auto Opt}\xspace, 2)~\textsf{Vivado + \tool}\xspace, and 3)~\textsf{\tool}\xspace.
Figure~\ref{plot:latency} plots the prediction latency of these mechanisms for all twenty benchmarks. The y-axis is in log-scale. Table~\ref{table-baseline-latency} lists the number of features for each dataset and their baseline (microcontroller) latencies. Figure~\ref{plot:resource-results} shows the average utilization of LUT, DSP, LUT RAM, Flip Flops, and Block RAMs. Since we find memory resources not to be a bottleneck, we focus our attention on LUT and DSP.
\subsubsection{\textsf{Vivado Auto Opt}\xspace.}
\textsf{Vivado Auto Opt}\xspace improves prediction latency by 7$\times$ on average and quadruples the utilization of compute resources compared to \textsf{Vivado No Opt}\xspace. by using a hand-optimized implementation for SpMV and adding automatic loop unrolling hints.
However, this prior approach is still lacking in two aspects. First, it uses a fixed parallelism factor of 10 for SpMV on all data sets. But, we observe that the criticality of this operation varies significantly with different data sets. As detailed in Section~\ref{sec:best-pf-estimator}, the PF for SpMV generated by the \textsc{MAFIA}\xspace optimizer ranges from 3 to 71. Second, the mechanism used by prior work to estimate resource utilization had high error rate and results in subpar loop unrolling hints.
\subsubsection{\textsf{Vivado + \tool}\xspace.}
\textsf{Vivado + \tool}\xspace involves two steps. First, we incorporate the PFs generated by \textsc{MAFIA}\xspace's optimizer in the code generated by \textsf{Vivado Auto Opt}\xspace by appropriately setting the PF of the SpMV node and the loop unrolling factors for the other nodes. Although, this improved the performance by ~27\% on average, we observed that this approach still resulted in suboptimal performance. This is because, \emph{Best-PF Estimator} of \textsc{MAFIA}\xspace assumes that the program will be executed in data flow order. However, Vivado HLS does not execute independent nodes in parallel. Therefore, even parallelizing the non-critical nodes in the DFG can enable better performance. We manually unrolled loops for non-critical nodes as well till we hit the resource budget. With this improvement, \textsf{Vivado + \tool}\xspace outperforms \textsf{Vivado Auto Opt}\xspace by up to 3.5$\times$ on average across all datasets.
\begin{table}[b]
\centering
\scalebox{0.8}{
\small
{
\begin{tabular}{ c c c c}
\toprule
\multirow{2}{*}{\textbf{DATASET}} & \multirow{2}{*}{\textbf{\parbox[t]{1.5cm}{\centering Num\\Features}}} & \textsc{Bonsai}\xspace & \textsc{ProtoNN}\xspace\\
& & \parbox[t]{1.5cm}{\centering Baseline\\Latency(us)} & \parbox[t]{1.5cm}{\centering Baseline\\Latency(us)}\\
\toprule
cifar-b & 400 & 6121 & 14112\\
cr-b & 400 & 6263 & 28446\\
mnist-b & 784 & 11568 & 15983 \\
usps-b & 256 & 4099 & 9206\\
ward-b & 1000 & 14733 & 23241\\
cr-m & 400 & 29030 & 34667\\
curet-m & 610 & 39731 & 37769\\
letter-m & 16 & 11161 & 35377\\
mnist-m & 784 & 16026 & 18491\\
usps-m & 256 & 9140 & 14017\\
\bottomrule
\end{tabular}
}
}
\caption{\centering Baseline (microcontroller) latency and number of features for the evaluated datasets}
\label{table-baseline-latency}
\end{table}
\subsubsection{\textsf{\tool}\xspace.}
Our analysis of the performance and resource consumption of the different mechanisms show that \textsf{\tool}\xspace improves upon the state-of-the-art on two fronts. First, \textsc{MAFIA}\xspace is able to better estimate required parallelism factors for each node. Second, \textsc{MAFIA}\xspace executes the program in data flow order, rather than sequentially. \textsf{\tool}\xspace outperforms \textsf{Vivado Auto Opt}\xspace by 4.2$\times$ and even \textsf{Vivado + \tool}\xspace (with manual hints) by 2.5$\times$ despite consuming only half the LUT resources compared to \textsf{Vivado + \tool}\xspace. This highlights the fact that the performance improvement in C-based HLS tools is only due to intra-node parallelism. With static knowledge of the program's data flow graph, \textsc{MAFIA}\xspace is able to schedule operations in data flow order, and thereby execute independent nodes in parallel. Unfortunately, there are no simple hints that can be provided to Vivado HLS to express this opportunity. Also, the hand-optimized implementation of each matrix operation template allows \textsc{MAFIA}\xspace to more efficiently perform the underlying arithmetic operations.
Therefore, \textsc{MAFIA}\xspace exploits both inter-node and intra-node parallelism and can offer higher benefits on more resource constrained FPGAs.
\subsection{\textsc{MAFIA}\xspace Resource/Latency Estimation Models}
\label{sec:regression-model-accuracy}
The accuracy of \textsc{MAFIA}\xspace's estimation models ensures that the optimizer does not overestimate resources and yields suboptimal results by setting lower PFs. The final error of \textsc{MAFIA}\xspace estimation models is 36\% for LUT, 17\% for DSPs, and 99\% for overall latency. The high error in latency estimate is in part due to the fact that our estimation algorithm does not capture the pipelining optimization (Section~\ref{sec:pipelining}). Pipelining results in significant reduction in latency while consuming similar amount of compute resources. However, the latency model correctly captures the relative latencies of all nodes, which is sufficient to guide the \textsc{MAFIA}\xspace-optimizer. In any case, to put these numbers in context, the estimation error of the Vivado HLS compiler for programs generated by \textsf{Vivado + \tool}\xspace is 73\% for LUT, 673\% for DSP, and fails to provide latency estimates.
\subsection{Greedy vs Black-box optimization}
\label{sec:greedy-vs-convex}
So far, we have presented results using our greedy optimization strategy. As described in Section~\ref{sec:lp-approximation}, we also explore the use of a generic solver. We observe that the prediction latency of programs generated by the greedy approach are on average 10\% \emph{lower} than those obtained from the black-box approach (for \textsc{Bonsai}\xspace across all data sets). The greedy optimizer is also \emph{significantly} faster than the black-box approach (22$\times$ on average). The better performance of the greedy approach can be attributed to our rounding mechanism in the black-box optimization. To ensure that we fit within the resource budget of the FPGA, we round down all the PF numbers obtained from the black-box solver. Optimal rounding is itself an NP-hard problem.
\textbf{Power Consumption:}~The average power consumption across all implementations (20 datasets) is 76.15 mW.
\section{Related Work}
\label{sec:related}
Development of small, accurate ML models for IoT devices is a budding research area~\cite{bonsai, protonn, emirnn, fastgrnn} with several novel and interesting applications including face-detection, assistance for visual impaired, remote farming and radar classification. We believe \textsc{MAFIA}\xspace can allow these applications to be run on similar form-factor FPGA instead of microcontrollers, thereby providing significant boost in the performance of the underlying models. Many \emph{ML-HLS tools}~\cite{leflow,TF2FPGA,hls4ml,fp-dnn,dnnweaver,autodnn,brainwave,fastwave} exist to compile ML inference to FPGAs from popular frameworks like Tensorflow and Pytorch. Unfortunately, all of them target DNN workloads and focus their attention on high-end FPGAs~\cite{cnn1, rnn1, accOp1, accOp2}.
Other works on automatically extracting parallelism in general-purpose HLS tools include~\cite{affine1, affine2, affine3}. The closest work to \textsc{MAFIA}\xspace is \textsc{SeeDot}\xspace~\cite{Seedot}, a framework that compiles efficient code for microcontrollers and low-end FPGAs from a high-level specification.
\section{Conclusion}
\label{sec:conclusion}
ML inference models targeting milli-watt powered IoT devices depart from the DNN architecture and use sophisticated primitives with fewer parameters~\cite{protonn,bonsai}.
However, most current HLS for ML research focuses on neural networks and target high-end FPGAs, resulting in tools that lack the requisite expressiveness. Thus, developers in the IoT space have to rely on general purpose HLS tools that have sufficient expressiveness but suffer from poor resource utilization. \textsc{MAFIA}\xspace achieves both high expressiveness and efficiency; it is a fully automatic toolchain that compiles device-agnostic ML algorithms to efficient Verilog code. We have evaluated MAFIA on state-of-the-art ML algorithms in the IoT space and it outperforms prior work by $2.5\times$ on average.
\section{Acknowledgements}
This work was funded by NSERC through the COHESA strategic network.
|
\section{Introduction}
Nonlocality is ubiquitous and of great importance in many physical systems. In optics, a nonlinear medium is considered spatially nonlocal when the nonlinear response of the material to the light wave is determined not only by the wave at that point but also by its vicinity. The spatially nonlocal nonlinearity appears if the interaction between light and matter involves a mechanism such as the diffusion of carriers, reorientation of molecules, heat conduction, etc~\cite{Assanto-book-13, Guo-book-15}. Since the pioneering work done by Snyder and Mitchell\cite{Snyder-science-97}, the research on optical beams in nonlocal nonlinear media has been brought in focus. Some particular properties resulting from nonlocality have been found, such as the long-range interactions between beams~\cite{Rasmussen-pre-05, Rotschild-np-06, Hu-apl-06}, the large phase shift of solitons~\cite{Guo-pre-04, Shou-ol-11, Shou-oc-15}, the supports of complex spatial solitons~\cite{Rotschild-prl-05, Xu-ol-05, Rotschild-ol-06, Skupin-pre-06, Buccoliero-prl-07, Skupin-prl-07, Deng-josab-07, Buccoliero-ol-08, Rotschild-np-08, Dong-pra-10, Song-oe-18} and chaoticons~\cite{Zhong-sr-17, Zhong-pra-19}, etc.
However, most of the researches concentrated on the nonlocal nonlinearity with positive definite and localized response function, such as the phenomenological Gaussian response function~\cite{Guo-pre-04, Buccoliero-prl-07, Deng-josab-07, Song-oe-18}, the logarithmic response function~\cite{Shou-ol-09, Zeng-pra-18} in the lead-glass ~\cite{Rotschild-prl-05, Dong-pra-10, Shou-ol-09, Zeng-pra-18} for negligible loss thermal-nonlinearity~\cite{Ghofraniha-PRL-99}, the exponential-decay response function~\cite{Rasmussen-pre-05, Xu-ol-05, Zhong-sr-17, Zhong-pra-19} and the zeroth-order modified Bessel function~\cite{ Hu-apl-06, Skupin-pre-06} in media with a nonlinearity described by the diffusion-type equation~\cite{Skupin-pre-06}, e.g., the effect of plasma heating on the
propagation of electromagnetic waves~\cite{Litvak-jl-1966}, the orientational nonlinearity of the nematic liquid crystal~\cite{Assanto-book-13, Conti-prl-04}, and the thermal-nonlinearity in the regime of strong absorption~\cite{Ghofraniha-PRL-99}.
Recently, some attention has been paid to the nonlocal nonlinear system with the sine-oscillation response function~\cite{Esbensen-pra-12, Wang-ol-14, Wang-oc-17, Liang-oe-16, Chen-pra-18, Liang-pra-19, Liang-njp-20, Guan-sr-20}, which was first put forward by Nikolov et al in the study of quadratic solitons~\cite{Nikolov-pre-03}. The distinct difference of such a response function from the localized ones lies in that it is periodically oscillatory. The peculiarity of the response function may lead to some novel properties for the nonlocal nonlinear system. For example, the very recent research~\cite{Liang-pra-19, Liang-njp-20} revealed that there appears a transition between self-focusing and self-defocusing in this kind of nonlocal nonlinear media when the degree of nonlocality goes across a critical value.
As it is known, in the nonlocal nonlinear systems with localized response functions, there exist not only the fundamental solitons, but also high order solitons with multi-peak~\cite{Xu-ol-05, Dong-pra-10, Deng-josab-07}. The reason may relate to the fact that the nonlinear refractive index (NRI) is approximate to the parabolic shape on the condition of strong nonlocality, which possesses the Hermite-Gaussian (HG) soliton solutions with multi-peaks. However, the upper thresholds of the peak-number of stable solitons supported are different in the system with different response function.
For instance, in the nonlocal system with the exponential-decay response, only the multi-peak solitons with the peak-number less than five are stable~\cite{Xu-ol-05, Zhong-sr-17}. While in the system with the Gaussian response, the multi-peak solitons with any peak-number are stable~\cite{Xu-ol-05, Deng-josab-07}.
For the nonlocal nonlinear system with the sine-oscillation response, the fundamental solitons and a kind of dipole soliton have been discussed~\cite{Liang-oe-16, Liang-pra-19, Liang-njp-20}. Here we will study the existence and the stability of the multi-peak solitons in this system by both the analytical and numerical methods.
The paper is organized as follows. In Sec.~\ref{sec2}, the model describing the nonlocal nonlinear system with the sine-oscillation response is introduced. In Sec.~\ref{sec3}, the HG multi-peak solitons and their existence condition are investigated by the variational approach. In Sec.~\ref{sec4}, the numerical multi-peak solitons are acquired, and the relations between several quantities are discussed. In Sec.~\ref{sec5}, the stability of the multi-peak solitons is studied by the linear stability analysing. Section \ref{sec6} gives the conclusion that the variational and numerical results agree with each other, and the upper thresholds of the peak-number of the stable solitons are five and four in the cases with negative and positive Kerr coefficients, respectively.
\section{Model}\label{sec2}
We consider the paraxial propagation of a (1+1)-dimensional optical beam in a nonlocal nonlinear medium described by the coupled equations~\cite{Liang-oe-16, Liang-pra-19, Liang-njp-20}
\begin{equation}\label{se}
i\frac{\partial q}{\partial z}+\frac{1}{2}\frac{\partial^{2}q}{\partial x^{2}}+q\Delta n=0,
\end{equation}
\begin{equation}\label{nri}
w_{M}^{2}\frac{\partial^{2}\Delta n}{\partial x^{2}}+\Delta n-s|q|^{2}=0,
\end{equation}
in which $q(x,z)$ and $\Delta n(x,z)$ are the dimensionless complex optical field amplitude and the light-induced NRI, respectively, $x$ and $z$ stand for the transverse and longitudinal coordinates, respectively, and $w_{M}$ is the nonlinear characteristic length of the media, $s(=\pm 1)$ is the sign of the Kerr coefficient.
When the Kerr coefficient is negative ($s=-1$), Eqs.~(\ref{se}) and (\ref{nri}) resemble the model describing the propagation of beams in the nematic liquid crystals~\cite{Rasmussen-pre-05, Xu-ol-05, Zhong-sr-17, Zhong-pra-19}, where the only difference is that the sign before the second term is minus in Eq.~(\ref{nri}).
When the Kerr coefficient is positive ($s=1$), Eqs.~(\ref{se}) and (\ref{nri}) are identical with the second harmonic generation model in media with the quadratic nonlinearity for the stationary solutions~\cite{Buryak-pla-95}. Thus, these equations can be deemed a reasonable extension of the models describing the real physics~\cite{Liang-pra-19, Liang-njp-20}.
When the boundary of Eq.~(\ref{nri}) satisfies certain conditions~\cite{Liang-pra-19}, the NRI can be expressed as a convolution
\begin{equation}\label{index}
\Delta n(x, z)=sR\otimes|q|^{2}=s\int_{-\infty}^{\infty}R(x-x')|q(x',z)|^{2}\mathrm{d}x',
\end{equation}
where the symbol $\otimes$ denotes the convolution, the response function $R$ is of the sine-oscillation form
\begin{equation}\label{rf}
R(x)=\frac{1}{2w_{M}}\sin\left (\frac{|x|}{w_{M}}\right ).
\end{equation}
We can find easily that the oscillation period of the above response function is $2\pi w_{M}$. Then Eq.~(\ref{index}) are equivalent to Eq.~(\ref{nri}).
The soliton (stationary) solutions of Eqs.~(\ref{se}) and (\ref{index}) have the form
\begin{equation}\label{ss}
q(x,z)=u(x)\exp(ibz),
\end{equation}
in which both the profile function $u$ and the propagation constant $b$ are real. The existence and the shape of the soliton solution depend not only on the sign of $s$, but also on the generalized degree of nonlocality (GDN)~\cite{Liang-oe-16, Liang-pra-19} $\sigma=w_{M}/w$, in which the beam width is defined by the second order moment
\begin{equation}\label{bw}
w=\left (2\int_{-\infty}^{\infty}x^{2}|q|^{2}\mathrm{d}x/\int_{-\infty}^{\infty}|q|^{2}\mathrm{d}x\right )^{1/2}.
\end{equation}
As stated in previous works~\cite{Liang-pra-19}, there exists the intertransition between the self-focusing and self-defocusing nonlinearity.
When $s=-1$ and $\sigma>0.82$, or $s=1$ and $\sigma<0.82$, the system exhibits the self-focusing nonlinearity,
and the fundamental solitons~\cite{Liang-oe-16, Liang-pra-19} and a kind of out-of-phase solitons~\cite{Liang-oe-16} had been found. Here in this paper, we will discuss the bright solitons with multi-peak analytically and numerically for the self-focusing nonlinearity state.
\section{Variational procedure}\label{sec3}
Now we will find the approximate multi-peak solitons analytically by using the variational approach. The Lagrangian density of the system described by Eqs.~(\ref{se}) and (\ref{index}) is~\cite{Anderson-pra-83, Zhong-oc-17}
\begin{equation}\label{density}
l=\frac{i}{2}\left (q^{*}\frac{\partial q}{\partial z}-q\frac{\partial
q^{*}}{\partial z}\right )-\frac{1}{2}\left |\frac{\partial q}{\partial
x}\right |^{2}+\frac{s}{2}|q|^{2}\int^{\infty}_{-\infty}R(x-\xi)|q(\xi,z)|^{2}\mathrm{d}\xi,
\end{equation}
where the superscript $*$ denotes the conjugate complex. We search the multi-peak solitons with the HG shape, so the trial solution $q(x,z)$ for the variational problem is supposed to be~\cite{Deng-josab-07, Zhong-oc-17}
\begin{equation}\label{trial}
q_{n}(x,z)=\frac{A_{n}(z)\exp[i \alpha_{n}(z)]}{(\sqrt{\pi} 2^{n}n!)^{1/2}}H_{n}\left [\frac{\sqrt{2n+1}x}{w_{n}(z)}\right ]\exp\left[-\frac{(2n+1)x^{2}}{2w_{n}^{2}(z)}+ic_{n}(z)x^{2}\right],
\end{equation}
where $H_{n}(x)=(-1)^{n}e^{x^{2}}\mathrm{d}^{n}e^{-x^{2}}/\mathrm{d}x^{n}$ is the $n$th-order ($n=0,1,2,3,...$) Hermite polynomial~\cite{Abramowitz-book-72}, $A_{n}$ and $\alpha_{n}$ are the amplitude and phase of the complex amplitude of the solution, respectively, $c_{n}$ is the phase-front curvature, $w_{n}$ is exactly the beam width given in Eq.~(\ref{bw}). All of $A_{n}$, $\alpha_{n}$, $w_{n}$ and $c_{n}$ are the real functions of $z$, the power $P_{n}=\int_{-\infty}^{\infty}|q_{n}|^{2}\mathrm{d}x=A_{n}^{2}w_{n}/\sqrt{2n+1}$. When $n=0$, $H_{0}(x)=1$, Eq.~(\ref{trial}) degenerates to the Gaussian form with the shape of single peak.
By substituting the trial solution (\ref{trial}) into the Lagrangian density (\ref{density}), using the expression $H_{n+1}(x)-2xH_{n}(x)+2nH_{n-1}(x)=0$ and the orthogonality of the Hermite polynomial, the Lagrangian $L=\int_{-\infty}^{\infty}l\mathrm{d}x$ can be obtained
\begin{equation}\label{lagran}
L=-\frac{w_{n}^{3}A_{n}^{2}}{2\sqrt{2n+1}}\left[\frac{\mathrm{d}c_{n}}{\mathrm{d}z}+\frac{(2n+1)^{2}}{2w_{n}^{4}}+2c_{n}^{2}\right]
-\frac{w_{n}A_{n}^{2}}{\sqrt{2n+1}}\frac{\mathrm{d}\alpha_{n}}{\mathrm{d}z}+\frac{sA_{n}^{4}}{2(\sqrt{\pi}2^{n}n!)^{2}}e_{n}(w_{n},w_{M}),
\end{equation}
where $e_{n}(w_{n},w_{M})=\int_{-\infty}^{\infty}H_{n}^{2}\exp[-(2n+1)x^{2}/w_{n}^{2}]\{R(x)\otimes H_{n}^{2}\exp[-(2n+1)x^{2}/w_{n}^{2}]\}\mathrm{d}x$.
Following the standard procedures of the variational approach~\cite{Anderson-pra-83}, we obtain the second order differential equation for the width of the HG beam (The detailed deviation is given in appendix A.)
\begin{equation}\label{width}
\frac{\mathrm{d}^{2}w_{n}}{\mathrm{d}z^{2}}=\frac{(2n+1)^{2}}{w_{n}^{3}}-\frac{sP_{n}(2n+1)}{(\sqrt{\pi}2^{n}n!)^{2}}N_{n}(w_{n},w_{M}),
\end{equation}
where
\begin{equation}\label{Nn}
N_{n}(w_{n},w_{M})=\frac{2e_{n}(w_{n},w_{M})-f_{n}(w_{n},w_{M})}{w_{n}^{3}},
\end{equation}
and $f_{n}(w_{n},w_{M})=\int_{-\infty}^{\infty}(H_{n+1}^{2}-4n^{2}H_{n-1}^{2})\exp[-(2n+1)x^{2}/w_{n}^{2}]\{R(x)\otimes H_{n}^{2}\exp[-(2n+1)x^{2}/w_{n}^{2}]\}\mathrm{d}x$.
By comparing Eq.~(\ref{width}) with the Newton's second law in the classical mechanics~\cite{Guo-pre-04}, the right hand side can be viewed as the ``force"
\begin{equation}\label{force}
F=\frac{(2n+1)^{2}}{w_{n}^{3}}-\frac{sP_{n}(2n+1)}{(\sqrt{\pi}2^{n}n!)^{2}}N_{n}(w_{n},w_{M})
\end{equation}
acted on a particle with the unit mass for the one-dimensional motion. Here the beam width $w_{n}$ and the longitudinal coordinate $z$ are equivalent to the spatial and temporal coordinates of the particle, respectively. The ``potential" of the force is $V_{n}=-\int_{w_{n0}}^{w_{n}}F\mathrm{d}w_{n}$. The existence of the stationary solutions, equivalently, the stable equilibrium state of the particle, appears on the minimal point of the potential. Then the two conditions should be met: $\mathrm{d}V_{n}/\mathrm{d}w_{n}(=-F)=0$ and $\mathrm{d}^{2}V_{n}/\mathrm{d}w_{n}^{2}(=-\mathrm{d}F/\mathrm{d}w_{n})>0$.
According to the condition of $\mathrm{d}V_{n}/\mathrm{d}w_{n}=0$ and Eq.~(\ref{force}), we can easily obtain the critical power $P_{nc}=(2n+1)(\sqrt{\pi}2^{n}n!)^{2}/[sw_{n}^{3}N_{n}(w_{n},w_{M})]$, which is the power carried by the $n$-th order HG solitons. The beam is assumed to be incident at its waist, that is, $[\mathrm{d}w_{n}(z)/\mathrm{d}z]|_{z=0}=0$ (the equivalent particle starts from rest). And the initial ``position" is regarded as $w_{n}(z)|_{z=0}=w_{n0}=1$ for the dimensionless system. Then the nonlinear
characteristic length $w_{M}=\sigma w_{n}=\sigma_{0}|_{w_{n0}=1}$, where the initial GDN $\sigma_{0}=\sigma(z)|_{z=0}$. The beam will keep the width $w_{n}(z)=w_{n0}=1$ unchanged during the propagation, since the equivalent particle at rest will never move when it is acted by the balance force. Hence the critical power can be rewritten as
\begin{equation}\label{pc}
P_{nc}=\frac{(2n+1)(\sqrt{\pi}2^{n}n!)^{2}}{sN_{n}(1,\sigma_{0})}.
\end{equation}
Therefore, the trail solution Eq.~(\ref{trial}) is of the form of the soliton solution [Eq.~(\ref{ss})]: $q_{n}(x,z)=u_{n}(x)\exp(ib_{n}z)$, where the propagation constant is
$b_{n}=\mathrm{d}\alpha_{n}/\mathrm{d}z=-(2n+1)^{2}/2+3(2n+1)^{2}[2e_{n}-f_{n}/3]/[4N_{n}(1,\sigma_{0})]$, the profile function is
\begin{equation}\label{un}
u_{n}=\left(\frac{P_{nc}\sqrt{2n+1}}{2^{n}n!\sqrt{\pi}}\right)^{1/2}H_{n}(\sqrt{2n+1}x)\exp\left[-\frac{(2n+1)x^{2}}{2}\right].
\end{equation}
Obviously, the profile of the $n$-th order HG soliton possesses $n+1$ peaks.
To consider the condition of $\mathrm{d}^{2}V_{n}/\mathrm{d}w_{n}^{2}>0$, we obtain firstly
\begin{equation}\label{potent}
\begin{split}
\frac{\mathrm{d}^{2}V_{n}}{\mathrm{d}w_{n}^{2}}=&\frac{(2n+1)^{2}}{N_{n}(1,\sigma_{0})}\left[2f_{n}(1,\sigma_{0})-\frac{\partial f_{n}(1,\sigma_{0})}{\partial w_{n}}\right]\\
=&\frac{2(2n+1)^{2}}{N_{n}(1,\sigma_{0})}\Phi_{n}(1,\sigma_{0}),
\end{split}
\end{equation}
where
\begin{equation}\label{fi}
\begin{split}
\Phi_{n}(1,\sigma_{0})=&\int^{+\infty}_{-\infty}\left[H^{2}_{n+1}-4n^{2}H^{2}_{n-1}+(2n^{2}+2n+1)H^{2}_{n}-4n^{2}(n-1)^{2}H^{2}_{n-2}-\frac{H^{2}_{n+2}}{4}\right]\\
&\exp[-(2n+1)x^{2}]\left\{R(x)\otimes H^{2}_{n}\exp[-(2n+1)x^{2}]\right\}\mathrm{d}x\\
&-\int^{+\infty}_{-\infty}\left(\frac{H^{2}_{n+1}}{4}-n^{2}H^{2}_{n-1}\right)\exp[-(2n+1)x^{2}]\\
&\left\{R(x)\otimes(H^{2}_{n+1}-4n^{2}H^{2}_{n-1})\exp[-(2n+1)x^{2}]\right\}\mathrm{d}x.
\end{split}
\end{equation}
It is clear from Eq.~(\ref{potent}) that a positive value of $\mathrm{d}^{2}V_{n}/\mathrm{d}w_{n}^{2}$ requires the same signs of $N_{n}$ and $\Phi_{n}$. Additionally, the power $P_{nc}$ [given by Eq.~(\ref{pc})] is demanded to be positive for a physical system, which requires that the signs of $s$ and $N_{n}$ should also be same. Therefore, for the case of $s=-1$, the inequations of $N_{n}<0$ and $\Phi_{n}<0$ should hold. On the contrary, for the case of $s=1$, the inequations of $N_{n}>0$ and $\Phi_{n}>0$ should hold.
Then we can find the ranges of $\sigma_{0}$ within which the above conditions are satisfied by solving numerically the
algebraic equations of $N_{n}(1,\sigma_{0})=0$ and $\Phi_{n}(1,\sigma_{0})=0$, where the two functions $N_{n}$ and $\Phi_{n}$ are given by Eqs.~(\ref{Nn}) and (\ref{fi}), respectively.
Without loss of generality, the triple-solitons ($n=2$) are exemplified. When $s=-1$, the inequations of $N_{n}(1,\sigma_{0})<0$ and $\Phi_{n}(1,\sigma_{0})<0$ correspond to the ranges that $\sigma_{0}\in (0.12, 0.14)\cup(0.24, 0.30)\cup(1.06, +\infty)$. When $s=1$, the inequations of $N_{n}(1,\sigma_{0})>0$ and $\Phi_{n}(1,\sigma_{0})>0$ correspond to the ranges that $\sigma_{0}\in (0,0.06)\cup(0.09, 0.11)\cup(0.17, 0.21)\cup(0.39, 0.79)$.
However, the above two conditions are not sufficient physically for the existence of the HG solions.
The HG solitons exist only in the condition that the induced NRI is bell-shaped, or quasi-bell-shaped, because the solitary waves can be considered as the eigen-modes of the self-induced waveguide, i.e., the linear waveguide induced by the waves themselves~\cite{Snyder-ol-91}.
The bell-shaped NRI induced by the beam appears only within the rightmost range of the GDN obtained above.
Taking the case of triple-solitons for example, the induced NRIs [given by Eq.~(\ref{index})] at different $\sigma_{0}$ are shown in Fig.~\ref{fig1}. For comparison, the corresponding intensity $I(x)[=|u_{2}(x)|^{2}$] of the HG wave [described by Eq.~(\ref{un})] are also shown.
We can see that for both $s=-1$ [Fig.~\ref{fig1} (a)] and $s=1$ [Fig.~\ref{fig1} (b)], the NRI with the $\sigma_{0}$ in the rightmost range, i.e., $\sigma_{0}\in(1.06, +\infty)$ and $\sigma_{0}\in (0.39, 0.79)$, respectively, are bell-shaped. Otherwise, the NRI with the $\sigma_{0}$ in other ranges, even close to the rightmost one, is not bell-shaped at all (the dashed blue curves in Fig.~\ref{fig1}), and can not construct a waveguide.
Likewise, in the cases of other $n$, the bell-shaped [or quasi-bell-shaped, as shown in Fig.~\ref{fig2} (a)] NRI appears only in the rightmost GDN ranges obtained from the minimal ``potential".
Following the same procedure, the ranges of $\sigma_{0}$ within which the HG solitons exist are given in Table \ref{tab-1} (the variational results).
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{fig1.pdf}
\caption{The NRI $\Delta n$ (normalized values) induced by the triple-soliton at different $\sigma_{0}$. (a) $\sigma_{0}=1.10$ (the dotted black curve) and $\sigma_{0}=0.29$ (the dashed blue curve) for $s=-1$. (b) $\sigma_{0}=0.40$ (the dotted black curve) and $\sigma_{0}=0.21$ (the dashed blue curve) for $s=1$. The solid red curves represent the corresponding intensity of the beam.}\label{fig1}
\end{figure}
\begin{table}[htbp]
\centering
\caption{The ranges of $\sigma_{0}$ within which the HG-type solitons exist}\label{tab-1}
\begin{threeparttable}
\begin{tabular}{cc|c|p{2.0cm}<{\centering}|c|c}
\hline \hline
& &$n=0$\tnote{*}&$n=1$&$n=2$&$n\geq3$\\ \hline
$s=-1$&variational&$(1.05, +\infty)$&$(1.06, +\infty)$ &$(1.06, +\infty)$&$(1.06, +\infty)$\\
&numerical&$(1.05, +\infty)$&$(1.05, +\infty)$ &$(1.05, +\infty)$&$(1.05, +\infty)$\\ \hline
$s=+1$&variational&$(0, 0.77)$&$(0.38, 0.79)$ &$(0.39, 0.79)$&$(0.39, 0.79)$\\
&numerical&$(0.05, 0.78)$&$(0.38, 0.78)$\tnote{**}&$(0.39, 0.78)$&$(0.40, 0.78)$\\
\hline \hline
\end{tabular}
\begin{tablenotes}
\centering
\footnotesize
\item[*] The cases that $n=0$ were discussed in the Ref.~\cite{Liang-njp-20}.
\item[**]It is the case referred to as the out-of-phase bound-state solitons in the Ref.~\cite{Liang-oe-16}, where the existence range of the soliton is $0.16\leq\sigma\leq0.78$, and the algorithm used is the imaginary-time method. However, the results on $\sigma<0.38$ in the Ref.~\cite{Liang-oe-16} are unreliable, because of the reason given in the Ref.~\cite{note}.
\end{tablenotes}
\end{threeparttable}
\end{table}
\section{Numerical solutions}\label{sec4}
For the nonlocal nonlinear system described by Eqs.~(\ref{se}) and (\ref{index}), we know from the variational analysis above that there exist the HG-type solitos on the conditions that $\sigma_{0}>1.06$ when $s=-1$, and $0.38<\sigma_{0}<0.79$ when $s=1$. Next we will search its multi-peak solitons by numerical methods according to the stationary equation
\begin{equation}\label{e-ss}
\frac{1}{2}\frac{\mathrm{d}^{2}u(x)}{\mathrm{d}x^{2}}+u(x)\int^{\infty}_{-\infty}R(x-\xi)|u(\xi)|^{2}\mathrm{d}\xi=bu(x),
\end{equation}
which is obtained by substituting Eq.~(\ref{ss}) into Eqs.~(\ref{se}) and (\ref{index}).
In the computation, the $w_{M}$ can be chosen arbitrarily, and a set of soliton solutions with any value of $w_{M}$ can be obtained from the solution of a given $w_{M}$, because the system has the transform invariance~\cite{Liang-oe-16}.
For the case that $s=-1$, the multi-peak solitons are obtained by the perturbation-iteration method~\cite{Hong-josab-18}, and the initial conditions are taken as the variational solutions. The numerical results show that the multi-peak solitons always exist when the initial GDN $\sigma_{0} >1.05$. The ranges of $\sigma_{0}$ obtained by the numerical method are also shown in Table \ref{tab-1}, from which we can observe that the numerical and variational values agree well with each other. The profiles $u(x)$ of several multi-peak solitons and the light induced NRIs $\Delta n(x)$ are shown in Fig.~\ref{fig2}, where $w_{M}=5$.
It can be found that the NRIs are of convex shapes at the center of the beams, although the values are negative.
In such cases, the beams can sample the self-focusing NRIs that construct the self-induced waveguides.
For comparison, the variational solutions with the same $\sigma_{0}$, $w_{M}$ and $n$ are also given. Clearly, the variational multi-peak solitons are in good agreement with the numerical ones.
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{fig2.pdf}
\caption{The profiles of the numerical multi-peak solitons $u(x)$ (the solid red curves) and the light induced NRI $\Delta n(x)$ (the dotted blue curves) for $s=-1$ and $w_{M}=5$. (a-d) for $n=1, 4, 5, 6$ and $\sigma_{0}=1.13, 1.43, 3.52, 1.08$, respectively. The variational results [the dashed black curves for $u(x)$, and the dashed green curves for $\Delta n(x)$] with the same parameters are also given for comparison.}\label{fig2}
\end{figure}
For the case that $s=1$, the numerical results are shown in Fig.~\ref{fig3}. We can find that the NRIs in the main area of the beams are almost positive, although they can be negative in the area with zero light intensity.
Like in the above case that $s=-1$, the corresponding variational HG solitons are shown for comparison. Obviously,
there appears more considerable difference between the numerical and variational ones compared with Fig.~\ref{fig2},
especially in Fig.~\ref{fig3}(a, c) with large $\sigma_{0}$.
The profiles $u(x)$ are HG-like when $\sigma_{0}$ is small [Fig.~\ref{fig3}(b, d)], while they deform to be with flat step-like wings and far from the HG-like shape when $\sigma_{0}$ becomes large [Fig.~\ref{fig3}(a, c)].
The GDN ranges within which the numerical multi-peak solitons exist are also given in Table \ref{tab-1}.
We can see that the numerical results agree well with the variational ones, too.
Here the multi-peak solitons with relatively small GDN (about $\sigma_{0}\leq0.5$) can be obtained by the perturbation-iteration method as in the case that $s=-1$. However, when $\sigma_{0}$ increases, the perturbation-iteration has a poor accuracy, even can not convergent (when $\sigma_{0}>0.65$). The reason may lies in that the perturbation-iteration method only applies to the solutions close to the HG function.
Thus, we should use another method, the Newton-conjugate-gradient method~\cite{Yang-jcp-09}, to obtain the soliton solutions on this condition.
Since the Newton-conjugate-gradient method is sensitive to the initial condition, that is, the initial condition should be reasonably close to the exact solution~\cite{Yang-jcp-09}, we at advance obtain the soliton with smaller GDN, by iterating with the solition acquired by the perturbation-iteration method as the initial condition. Then the solitons with larger GDN are iterated stepwise by taking the solitons with slightly smaller GDN as the initial conditions.
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{fig3.pdf}
\caption{The profiles of the numerical multi-peak solitons $u(x)$ (the solid red curves) and the light induced NRI $\Delta n(x)$ (the dotted blue curves) for $s=1$ and $w_{M}=10$. (a-d) for $n=2, 3, 5, 6$ and $\sigma_{0}=0.74, 0.48, 0.75, 0.51$, respectively. The corresponding numerical results are denoted in the same way as in Fig.~\ref{fig2}. }\label{fig3}
\end{figure}
Then, let us investigate the dependencies of the power $P_{c}=\int_{-\infty}^{\infty}|u(x)|^{2}\mathrm{d}x$ and the propagation constant $b$ on the GDN $\sigma_{0}$ for the multi-peak solitons. We present the results with the peak numbers ranging from 2 ($n=1$) to 9 ($n=8$) in Fig.~\ref{fig4}, the upper row of which are for the case $s=-1$ with the GDN $\sigma_{0}\leq 5$, the bottom row of which are for the case $s=1$ with the GDN $\sigma_{0}$ in the whole existence range of the solitons.
Here the results about the dipole-solitons ($n=1$) for the case $s=1$ are omitted, since they, referred to as the out-of-phase solitons, had been discussed~\cite{Liang-oe-16}.
It is clear from Fig.~\ref{fig4} (a, c) that $P_{c}$ increase monotonically with $\sigma_{0}$ for all the multi-peak solitons. From Fig.~\ref{fig4} (b, d), we can see that all the propagation constants $b$ are negative, which decrease monotonically with $\sigma_{0}$. These results are similar to the low order solitons~\cite{Liang-pra-19, Liang-oe-16}, but the slope (the absolute value) of the curves increases with the peak number.
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{fig4.pdf}
\caption{The dependencies of the power $P_{c}$ on the GDN $\sigma_{0}$ [(a, c)] and the propagation constant $b$ on the GDN $\sigma_{0}$ [ (b, d)] for the multi-peak solitons. (a, b) and (c, d) for $s=-1$ and $s=1$, respectively.}\label{fig4}
\end{figure}
\section{Stability of the multi-peak solitons}\label{sec5}
Further more, we will study the stability of the HG-type solitons by the linear stability analysing~\cite{Xu-ol-05, Dong-pra-10, Liang-oe-16,Liang-pra-19}. The perturbed soliton solution is supposed to be of the form $q(x,z)=[u(x)+g(x,z)+ih(x,z)]\exp(ibz)$, where the real part $g(x,z)$ and the imaginary part $h(x,z)$ of the perturbation can grow with a complex rate $\delta$ on propagation. Linearization of Eq.~(\ref{se}) around the soliton solution $u(x)$ yields the eigenvalue equations~\cite{Liang-oe-16,Liang-pra-19}
\begin{equation}\label{eig1}
\delta g=-\frac{1}{2}\frac{d^{2}h}{dx^{2}}+bh-\Delta nh,
\end{equation}
\begin{equation}\label{eig2}
\delta h=-\frac{1}{2}\frac{d^{2}g}{dx^{2}}-bg+\Delta ng+u\Delta N,
\end{equation}
in which $\Delta N=2\int_{-\infty}^{\infty}R(x-x')u(x')g(x')dx'$ is the refractive index perturbation. By solving the system of Eqs.~(\ref{eig1}) and (\ref{eig2}) we obtain the eigenvalues $\delta$, a positive real part of which means the instability of the solution $u(x)$.
Fig.~\ref{fig5} shows the maximal real parts of the perturbation growth rate $Re(\delta)$ for the multi-peak solitons with different $n$, in which figures (a) and (b) are for the cases $s=-1$ and $s=1$, respectively. We can see from Fig.~\ref{fig5} (a-1) that the dipole-, triple- and quadrupole-solitons ($n=1, 2, 3$, respectively) are stable
[$Re(\delta)=0$] when the GDN exceed certain values, while they are unstable [$Re(\delta)>0$] at small $\sigma_{0}$.
Fig.~\ref{fig5} (a-2) shows that the multi-peak solitons that $n>4$ are all unstable; however, when $n=4$ the (fifth-order) solitons can be stable
only within a small range of GDN. From figure (b), we can see that most of the $Re(\delta)$ are positive,
but $Re(\delta)=0$ for the triple- and quadrupole-solitons ($n=2, 3$, respectively) in very small ranges of GDN. That is, the multi-peak solitons are unstable on most conditions, except for the cases that $n=2,3$ within very small ranges of $\sigma_{0}$. The ranges of the GDN $\sigma_{0}$ within which the stable HG-type solitons exist are summarized in Table \ref{tab-2}.
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{fig5.pdf}
\caption{The maximal real parts of the perturbation growth rate $Re(\delta)$ versus the GDN $\sigma_{0}$ for the multi-peak solitons. (a) for $s=-1$, the open circles denoted by \textit{A} to \textit{D} corresponding to ($n=1, \sigma_{0}=1.13$), ($n=4, \sigma_{0}=1.43$), ($n=5, \sigma_{0}=3.52$) and ($n=6, \sigma_{0}=1.08$), respectively. (b) for $s=1$, the open circles denoted by \textit{A} to \textit{D} corresponding to ($n=2, \sigma_{0}=0.74$), ($n=3, \sigma_{0}=0.48$), ($n=5, \sigma_{0}=0.75$) and ($n=6, \sigma_{0}=0.51$), respectively.}\label{fig5}
\end{figure}
\begin{table}[htbp]
\centering
\caption{The ranges of $\sigma_{0}$ within which the stable HG-type solitons exist}\label{tab-2}
\begin{threeparttable}
\begin{tabular}{p{1cm}|c|c}
\hline \hline
&$s=-1$&$s=+1$\\\hline
$n=0$ \tnote{*}& $(1.05, +\infty)$&$(0.05, 0.78)$ \\
$n=1$& $(1.41, +\infty)$&$(0.38, 0.78)$\tnote{**}\\
$n=2$& $(1.10, +\infty)$&$(0.42, 0.45) $\\
$n=3$& $(1.10, +\infty)$&$(0.48, 0.49)$ \\
$n=4$& $(1.10, 1.61)$&no \\
$n\geq5$&no&no\\
\hline \hline
\end{tabular}
\begin{tablenotes}
\centering
\footnotesize
\item[*] The cases that $n=0$ were discussed in the Ref.~\cite{Liang-njp-20}.
\item[**] The value is different from the result in the Ref.~\cite{Liang-oe-16} because of the reason noted below Table \ref{tab-1} .
\end{tablenotes}
\end{threeparttable}
\end{table}
To confirm the above results of the stability analysis, we simulate the propagation of the multi-peak solitons with the input condition $q(x,0)=u(x)[1+\rho(x)]$, where $\rho(x)$ is a random function with a normal distribution and a standard deviation equal to 0.01. Fig.~\ref{fig6} depicts the contour plots of the intensity $I(x,z)$ [$=|q(x,z)|^2$ ] for the system that $s=-1$. Fig.~\ref{fig6} (b) is for a stable fifth-order soliton, and the other three figures of Fig.~\ref{fig6} are for unstable propagations of the multi-peak solitons.
Similarly, the propagation of several multi-peak solitons for the case $s=1$ are shown in Fig.~\ref{fig7}.
Fig.~\ref{fig7} (b) is for the stable propagation of the quadrupole-soliton, the other three figures depict the unstable propagations of the solitons.
It is clear that the stable propagations of the solitons agree well with the zero value of the $Re(\delta)$, while the unstable propagations of the solitons correspond to the positive $Re(\delta)$. We can also find that, among the unstable cases, there are two quite different behaviours for the propagation of beams. In Fig.~\ref{fig6} (a, d) and Fig.~\ref{fig7} (d), the beams break up after propagate several Rayleigh distances $L_{R}$ ($=w_{0}^{2}$); on the other hand, the beams keep self-trapped without spreading in Fig.~\ref{fig6} (c) and Fig.~\ref{fig7} (a, c). The former are for relatively small GDN, while the latter are for relatively large GDN, either $s=-1$ or $s=1$.
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{fig6.pdf}
\caption{The contour plots of the intensity $I(x,z)$ for the propagation of several multi-peak solitons in the system that $s=-1$. (a-d) are corresponding to the cases denoted by \textit{A} to \textit{D} in Fig.\ref{fig5} (a), the initial inputs $u(x)$ of which are shown in Fig.~\ref{fig2} (a-d), respectively.}\label{fig6}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[width=8.5cm]{fig7.pdf}
\caption{The contour plots of the intensity $I(x,z)$ for the propagation of several multi-peak solitons in the system that $s=1$. (a-d) are corresponding to the cases denoted by \textit{A} to \textit{D} in Fig.\ref{fig5} (b), the initial inputs $u(x)$ of which are shown in Fig.~\ref{fig3} (a-d), respectively.}\label{fig7}
\end{figure}
In the end of the paper, we would like to discuss the upper threshold for the peak number of the stable multi-peak solitons in different nonlocal nonlinear systems. The system with the sine-oscillation response function can support the stable multi-peak solitons with at most five peaks.
On the other hand, the systems with the exponential-decay response function~\cite{Xu-ol-05} and the logarithmic response function (in the lead glass)~\cite{Dong-pra-10} allow the stable multi-peak solitons with at most four peaks,
and the system with the Gaussian response function admits of no upper threshold for the number of peaks of stable solitons~\cite{Xu-ol-05, Deng-josab-07}.
\section{conclusions}\label{sec6}
In conclusion, the multi-peak solitons and their existence range for the nonlocal nonlinear system with the sine-oscillation response have been studied. By the variational approach, the HG solitons have been obtained, and their existence range have been acquired according to the minimal ``potential" and the bell-shaped NRI. To our knowledge, it is the first time to obtain analytically the existence range for the multi-peak solitons. The numerical multi-peak solitons have been obtained also, which agree with the variational ones, especially in the case of negative Kerr coefficient ($s=-1$). The linear stability analyses for the multi-peak solitons show that the system permits the stable solitons with at most five and four peaks for the cases $s=-1$ and $s=1$, respectively.
\section*{ACKNOWLEDGMENTS}
This research was supported by the National Natural Science Foundation of China (Grant No.~11704169) and the Science and Technology Program of Guangzhou (No. 2019050001).
\section*{Appendix A. Deviation of the evolution equation (\ref{width}) for the beam width}
The Euler-Lagrange equation corresponding to the variational problem
$\delta\int^{+\infty}_{0}L(A_{n},w_{n},c_{n},\alpha_{n},\dot{A}_{n},\dot{w}_{n},\dot{c}_{n},\dot{\alpha}_{n})\mathrm{d}z=0$ is
\begin{equation}\label{A-1}
\frac{\mathrm{d}}{\mathrm{d}z}(\frac{\partial L}{\partial\dot{q}_{i}})-\frac{\partial L}{\partial q_{i}}=0, \tag{A.1}
\end{equation}
in which $L$ is the Lagrangian [Eq.~(\ref{lagran})],$q_{i}=\{A_{n},w_{n},c_{n},\alpha_{n}\}$, $\dot{q}_{i}=dq_{i}/dz$.
Following the standard procedures of the variational approach, we get $\delta L/\delta A_{n}=0$, $\delta L/\delta w_{n}=0$, $\delta L/\delta c_{n}=0$, and $\delta L/\delta \alpha_{n}=0$. Then, we can obtain the four equations:
\begin{equation}\label{A-a}
-\frac{w^{3}_{n}A_{n}}{\sqrt{2n+1}}\left[\frac{\mathrm{d}c_{n}}{\mathrm{d}z}+\frac{(2n+1)^{2}}{2w^{4}_{n}}+2c_{n}^{2}\right]-\frac{2w_{n}A_{n}}{\sqrt{2n+1}}\frac{\mathrm{d}\alpha_{n}}{\mathrm{d}z}+\frac{2sA^{3}_{n}}{(\sqrt{\pi}2^{n}n!)^{2}}e_{n}=0, \tag{A.2}
\end{equation}
\begin{equation}\label{A-w}
-\frac{3w^{2}_{n}A_{n}^{2}}{2\sqrt{2n+1}}\left[\frac{\mathrm{d}c_{n}}{\mathrm{d}z}+2c_{n}^{2}\right]+\frac{A^{2}_{n}(2n+1)^{3/2}}{4w^{2}_{n}}-\frac{A_{n}^{2}}{\sqrt{2n+1}}\frac{\mathrm{d}\alpha_{n}}{\mathrm{d}z}+\frac{sA^{4}_{n}}{2w_{n}(\sqrt{\pi}2^{n}n!)^{2}}f_{n}=0, \tag{A.3}
\end{equation}
\begin{equation}\label{A-c}
-\frac{1}{2\sqrt{2n+1}}\frac{\mathrm{d}(w^{3}_{n}A_{n}^{2})}{\mathrm{d}z}+\frac{2w^{3}_{n}A_{n}^{2}}{\sqrt{2n+1}}c_{n}=0, \tag{A.4}
\end{equation}
\begin{equation}\label{A-alph}
-\frac{1}{\sqrt{2n+1}}\frac{\mathrm{d}}{\mathrm{d}z}(w_{n}A_{n}^{2})=0. \tag{A.5}
\end{equation}
The last equation (\ref{A-alph}) indicates that the power $P_{n}=w_{n}A_{n}^{2}/\sqrt{2n+1}$ is a constant.
By combining Eqs.~(\ref{A-a}) and (\ref{A-w}), we obtain
\begin{equation}\label{equ-22}
\frac{\mathrm{d}\alpha_{n}}{\mathrm{d}z}=-\frac{(2n+1)^{2}}{2w^{2}_{n}}+\frac{3sP_{n}(2n+1)}{4w_{n}^{2}(\sqrt{\pi}2^{n}n!)^{2}}[2e_{n}-f_{n}/3], \tag{A.6}
\end{equation}
By substituting the constant power, the Eq.~(\ref{A-c}) can lead to
\begin{equation}\label{equ-23}
\frac{\mathrm{d}c_{n}}{\mathrm{d}z}=-\frac{1}{2w^{2}_{n}}(\frac{\mathrm{d}w_{n}}{\mathrm{d}z})^{2}+\frac{1}{2w_{n}}\frac{\mathrm{d}^{2}w_{n}}{\mathrm{d}z^{2}}. \tag{A.7}
\end{equation}
Then we can obtain the second order differential equation (\ref{width}) about the evolution of the beam width by eliminating other variables from Eqs.~(\ref{A-c}), (\ref{equ-22}) and (\ref{equ-23}).
|
\section{Introduction}
\label{sec: Intro}
In recent years, the LIGO-Virgo collaboration has detected gravitational waves emitted by merging binary black holes~\cite{Abbott:2016blz,LIGOScientific:2018mvr,Abbott:2020niy},
which revealed the existence of black holes with masses $\sim \mathcal{O}(10-100) M_\odot$.
Interestingly, many of observed black holes have heavy masses around $30 M_\odot$.
The origin of these massive black holes is still unknown.
One fascinating candidate is the primordial origin~\cite{Bird:2016dcv,Kashlinsky:2016sdv,Sasaki:2016jop,Carr:2016drx,Kawasaki:2016pql,Clesse:2016vqa,Eroshenko:2016hmn,Inomata:2016rbd,Ali-Haimoud:2017rtz,Inomata:2017vxo,Ando:2017veq,Ando:2018nge,Raidal:2018bbj,Liu:2018ess,Vaskonen:2019jpv,Gow:2019pok,Liu:2019rnx,Wu:2020drm,DeLuca:2020bjf,DeLuca:2020qqa}.
Primordial black holes (PBHs) are produced from large density fluctuations in the early Universe~\cite{Hawking:1971ei,Carr:1974nx,Carr:1975qj}.
Such large density fluctuations can be produced by inflation~\cite{GarciaBellido:1996qt,Yokoyama:1995ex,Kawasaki:1997ju} or other mechanisms.
However, if the PBHs have a broad mass spectrum, the corresponding density fluctuation can be severely constrained by cosmological observations.
For example, the observation of the CMB $\mu$-distortion excludes the density fluctuations seeding the PBHs with masses $6 \times 10^4 M_\odot \lesssim M_\mathrm{PBH} \lesssim 5 \times 10^{13} M_\odot$~\cite{Kohri:2014lza}.
In addition, large curvature fluctuations induce the second-order gravitational wave~\cite{Saito:2008jc,Saito:2009jt}, which is constrained by the pulsar timing array experiments.
As a result, the PBHs with masses $0.03 M_\odot \lesssim M_\mathrm{PBH} \lesssim 10 M_\odot$ are severely constrained~\cite{Bugaev:2010bb} (see also~\cite{Carr:2020gox}).
These constraints can be weakened or evaded if the density perturbations seeding the PBHs do not follow the Gaussian distribution,
which is the case, for example, for large density fluctuations with non-Gaussianity~\cite{Garcia-Bellido:2017aan} or nonlinear local objects \cite{Hawking:1987bn,Caldwell:1995fu,Garriga:1992nm,Cotner:2016cvr,Nakama:2016kfq,Deng:2017uwc,Kitajima:2020kig,Kawana:2021tde}.
One of the latter mechanisms is realized by the PBH formation model utilizing the Affleck-Dine (AD) baryogenesis~\cite{Affleck:1984fy,Dine:1995kz}, which is studied in~\cite{Dolgov:1992pu,Dolgov:2008wu,Blinnikov:2016bxu,Hasegawa:2017jtk,Hasegawa:2018yuy,Kawasaki:2019iis}.
While the AD baryogenesis is originally suggested as a model explaining the baryon asymmetry of the Universe in a supersymmetric setup, it is also extended in various contexts.
For example, the AD baryogenesis can work well in the case of large extra dimensions~\cite{Mazumdar:2001nw,Allahverdi:2001dm} and can produce non-thermal dark matter~\cite{Enqvist:1998en,Fujii:2001xp,Fujii:2002kr} through the decay of Q-balls~\cite{Enqvist:1997si,Kusenko:1997si,Kasuya:1999wu,Kasuya:2000wx,Enqvist:2000gq}.
In the PBH formation model utilizing the AD baryogenesis, the IR mode of the AD field diffuses by quantum fluctuations during inflation and has multiple vacua just after inflation.
Then, while the origin of the AD field becomes the true vacuum,
the false vacuum has a non-zero field value.
The inhomogeneity of the field value results in the inhomogeneous baryogenesis, which forms baryon-rich bubbles.
At the QCD phase transition, baryons in the bubbles form massive nucleons and generate density fluctuations.
If the bubbles are large enough, the density fluctuations grow sufficiently and then collapse into PBHs at the horizon reentry.
PBHs generated in this scenario can have masses larger than $\mathcal{O}(10) M_\odot$ and are expected to explain the origin of LIGO-Virgo events~\cite{Hasegawa:2017jtk,Hasegawa:2018yuy}.
In these works, the PBH merger rate has been evaluated under the assumption of the random spatial distributions of PBHs.
However, this scenario can result in a significant clustering of PBHs as pointed out in~\cite{Shinohara:2021psq} for supermassive BHs, and the clustering of PBHs can alter the PBH merger rate.
Since the formation of PBHs or bubbles depends on the diffusion of the IR field,
the time evolution of the IR field on a larger scale can affect the bubble formation on a smaller scale.
Therefore, we have to take into consideration the correlation of the PBH formations in two separate points, which can modify the PBH merger rate.
This mechanism of PBH clustering can be applied to other models of PBH formation~\cite{Nakama:2016kfq,Kitajima:2020kig}, which also utilize the quantum diffusion of the IR field.
The various works also investigate the clustered PBH distribution ~\cite{Rubin:2001yw,Khlopov:2004sc,Chisholm:2005vm,Raidal:2017mfl,Ali-Haimoud:2018dau,Desjacques:2018wuu,Belotsky:2018wph,Ballesteros:2018swv,Bringmann:2018mxj,Ding:2019tjk,DeLuca:2020jug,Atal:2020igj,DeLuca:2021hcf,DeLuca:2021hde}
especially for the non-Gaussian fluctuations~\cite{Tada:2015noa,Young:2015kda,Suyama:2019cst,Young:2019gfc,Suyama:2019cst} while there are no sufficient studies about the clustering of PBHs formed by bubbles.
In this paper, we investigate the quantum diffusion of the AD field with more general initial conditions than the previous works~\cite{Hasegawa:2017jtk,Hasegawa:2018yuy,Kawasaki:2019iis} and formulate the clustering of PBHs through the two-point correlation of the PBH formation in a different way from~\cite{Shinohara:2021psq}.
While they obtain the correlation function of the total PBH number density, we consider the mass distribution of PBHs and obtain the mass dependent correlation function, which is consistent with the result in~\cite{Shinohara:2021psq}.
Then we evaluate the cosmological effect of the PBH clustering on the isocurvature fluctuations and the PBH merger rate in the context of the LIGO-Virgo events.
As a result, we find that the clustering significantly enhances the isocurvature fluctuations and then the PBH abundance can be severely constrained depending on the strength of the PBH clustering.
We also find that, since the PBH clustering in this scenario is strong enough, many of the PBHs form three-body or many-body systems, which results in considerable uncertainty in the estimation of the PBH merger rate.
This paper is organized as follows.
In Sec.~\ref{sec: Affleck-Dine HBB}, we briefly summarize PBH formation from the Affleck-Dine baryogenesis.
In Sec.~\ref{sec: PBH formation and correlation}, we formulate the diffusion of the Affleck-Dine field during inflation and derive the PBH formation rate, mass distribution, and correlation function.
Then we discuss cosmological effects of PBH clustering in Sec.~\ref{sec: cosmological effect}.
Sec.~\ref{sec: discussion} is devoted to the summary and discussion of our results.
\section{High baryon bubbles from the Affleck-Dine baryogenesis}
\label{sec: Affleck-Dine HBB}
In this section, we review the PBH formation in the modified version of the AD baryogenesis based on~\cite{Hasegawa:2017jtk,Hasegawa:2018yuy,Kawasaki:2019iis} and estimate the properties of PBHs formed from baryon-rich regions.
The number density and spatial distribution of PBHs are discussed in Sec.~\ref{sec: PBH formation and correlation}.
In the AD baryogenesis, the AD field is selected as one of the flat directions of the supersymmetric (SUSY) potential, along which the scalar fields have no renormalizable potential term unless SUSY is broken.
When the AD field has a baryon number, a phase rotation of the AD field causes baryogenesis.
We consider the AD field $\phi = \varphi e^{i\theta}$ with the potential of
\begin{equation}
V(\phi) = \begin{cases}
(m_{\phi}^2 + c_I H^2) |\phi|^2 + V_{\mathrm{NR}}
& (\mathrm{during ~ inflation}) \\
(m_{\phi}^2 - c_M H^2) |\phi|^2 + V_{\mathrm{NR}} + V_\mathrm{T} (\phi)
& (\mathrm{after ~ inflation})
\end{cases}
,
\end{equation}
where $c_I$ and $c_M$ are dimensionless positive constants,
$m_\phi$ is the soft SUSY breaking mass,
and $V_{\mathrm{NR}}$ is the non-renormalizable contribution given by
\begin{equation}
V_\mathrm{NR} = \left(
\lambda a_M \frac{m_{3/2} \phi^n}{n M_{\mathrm{Pl}}^{n-3}}+ \mathrm{h.c.}
\right)
+ \lambda^2 \frac{|\phi|^{2(n-1)}}{M_{\mathrm{Pl}}^{2(n-3)}},
\end{equation}
where $\lambda$ and $a_M$ are dimensionless constants,
and $M_\mathrm{Pl}$ is the reduced Planck mass.
The integer $n (\geq 4)$ is determined by specifying a flat direction.
Flat directions in the minimal SUSY standard model (MSSM) are summarized in \cite{Dine:1995kz}.
After inflation, the AD field acquires the thermal potential $V_\mathrm{T}$, which is written as
\begin{equation}
V_\mathrm{T}(\phi)
=
\begin{cases}
c_1 T^2 |\phi|^2
& (|\phi| \lesssim T)
\\
c_2 T^4 \ln\left( \frac{|\phi|^2}{T^2} \right)
& (|\phi| \gtrsim T)
\end{cases}
,
\end{equation}
where $c_1$ and $c_2$ are $\mathcal{O}(1)$ parameters relevant to the couplings between the AD field and the thermal bath.
During inflation, this potential has the positive Hubble induced mass.
If $c_I \lesssim 1$, the AD field value drifts by quantum fluctuations around the potential minimum at $\phi = 0$.
The time evolution of the AD field is beyond the perturbative method, and we need the stochastic formulation to evaluate the scalar field dynamics, which is discussed in Sec.~\ref{sec: PBH formation and correlation}.
After inflation, the thermal potential overcomes the negative Hubble induced mass near the origin.
Then the potential comes to have the multi-vacuum structure and the AD field rolls down to either of the two vacua depending on whether the field value is larger than the local maximum point $\varphi = \varphi_c$ or not.
As the Hubble parameter decreases, the thermal potential or soft SUSY breaking mass term becomes dominant and the vacuum at $\phi \neq 0$ disappears.
In a Hubble patch where the AD field rolls down to the vacuum at $\phi = 0$, the Affleck-Dine baryogenesis does not work well and almost no baryon number is generated.
On the other hand, in a Hubble patch where the AD field rolls down to the vacuum at $\varphi \neq 0$, the AD field begins to oscillate around the origin at $H \simeq H_\mathrm{osc}$ after the vacuum at $\phi \neq 0$ disappears.
Therefore, the Affleck-Dine baryogenesis works, and the produced baryon to photon ratio is given by
\begin{equation}
\eta_b \equiv \frac{n_b}{s}
\simeq \epsilon \frac{T_R m_{3/2}}{H_\mathrm{osc}^2}
\left(\frac{\varphi_\mathrm{osc}}{M_\mathrm{Pl}}\right)^2,
\end{equation}
where $n_b$ is the produced baryon number density, $s$ is the total entropy density, $T_R$ is the reheating temperature, and $\varphi_\mathrm{osc}$ is the field value when the AD field begins to oscillate.
$\epsilon$ is given by
\begin{equation}
\epsilon
=
\sqrt{\frac{c_M}{n-1}}
\frac{q_b |a_M| \sin[ n\theta_0 + \arg (a_M)]}
{3\left( \frac{n-4}{n-2}+1 \right)},
\end{equation}
where $q_b$ is the baryon charge of the AD field and $\theta_0$ is the initial phase of the AD field.
In this way, the AD baryogenesis takes place only in the regions with $\varphi > \varphi_c$ at the end of inflation and
the baryon-rich regions are formed.
Hereafter, we call them high-baryon bubbles (HBBs).
Just after inflation, the energy density inside and outside the HBBs is almost the same since the inflaton dominates the total energy during inflation.
Until the QCD phase transition, quarks, which carry the produced baryon number, remain relativistic and the density fluctuation is not generated.
After the QCD phase transition, the baryon number is carried by massive nucleons, which behave as non-relativistic matter.
Therefore, the density contrast between inside and outside the HBBs grows as
\begin{equation}
\delta
\equiv
\frac{\rho^\mathrm{in} - \rho^\mathrm{out}}{\rho^\mathrm{out}}
\simeq
\frac{n_b m_b}{\pi^2g_* T^4/30}
\simeq
0.3 \eta_b \left(\frac{T}{200\,\mathrm{MeV}}\right)^{-1}
\theta(T_\mathrm{QCD}-T),
\label{eq: density contrast}
\end{equation}
where $m_b \simeq 938 \, \mathrm{MeV}$ is the nucleon mass, $\theta(x)$ is the Heaviside theta function, and $T_\mathrm{QCD}$ is the cosmic temperature at the QCD phase transition.
If this density contrast is large enough, the HBBs collapse into PBHs after they reenter the horizon.
For the perfect fluid with the equation of state $p = w\rho$,
the threshold value of the density contrast for the PBH formation is estimated as~\cite{Harada:2013epa}
\begin{equation}
\delta_c
\simeq
\sin^2 \left( \frac{\pi\sqrt{w}}{1+3w} \right).
\end{equation}
Since, $w$ is written in terms of $\delta$ as
\begin{equation}
w
=
\frac{p^\mathrm{in}}{\rho^\mathrm{in}}
\simeq \frac{p^\mathrm{out}}{\rho^\mathrm{in}}
=
\frac{1}{3(1+\delta)},
\end{equation}
the condition for the PBH formation is given by
\begin{equation}
\delta
\gtrsim
\sin^2
\left(
\sqrt{ \frac{1+\delta}{3} } \frac{\pi}{2+\delta}
\right)
\Longleftrightarrow
\delta \gtrsim 0.60.
\end{equation}
This condition gives the upper bound of the temperature at the horizon reentry for the PBH formation as
\begin{equation}
T_c \simeq \min [100\eta_b \, \mathrm{MeV},T_\mathrm{QCD}]
\geq T,
\end{equation}
where we used Eq.~\eqref{eq: density contrast}.
The temperature at the horizon reentry is related to the produced PBH mass.
We denote the length scale of the HBBs as $2\pi/k$.
When the mode with the wavenumber $k$ reenter the horizon, the whole energy within the Hubble horizon (horizon mass) is given by
\begin{equation}
M_H(k)
\simeq
20.5 M_{\odot}
\left( \frac{g_*}{10.75} \right)^{-1/6}
\left( \frac{k}{10^6 \, \mathrm{Mpc}^{-1}} \right)^{-2},
\label{eq: horizon mass vs wavenumber}
\end{equation}
where $M_{\odot}$ is the solar mass and $g_*$ is the effective degree of freedom of relativistic particles.
The scale $k$ can be also related to the cosmic temperature when such a scale reenter the horizon as
\begin{equation}
T(k)
\simeq
85.5 \,\mathrm{MeV}
\left( \frac{g_*}{10.75} \right)^{-1/6}
\left( \frac{k}{10^6 \, \mathrm{Mpc}^{-1}} \right).
\end{equation}
By using this relation, we can relate the horizon mass and the temperature as
\begin{equation}
M_H(T)
\simeq
3.75 M_{\odot}
\left( \frac{g_*}{10.75} \right)^{-1/4}
\left( \frac{T}{200 \, \mathrm{MeV}} \right)^{-2}.
\end{equation}
Since the PBH mass roughly corresponds to the horizon mass at the horizon reentry $M_\mathrm{PBH} \sim M_H$, the upper bound of temperature can be translated into the lower limit of the PBH mass as
\begin{equation}
M \geq M_c
\simeq
\max \left[
15.0 \, \eta_b^{-2},3.75\left( \frac{T_\mathrm{QCD}}{200\,\mathrm{MeV}}\right)^{-2}
\right]
\times M_\mathrm{\odot} \left( \frac{g_*}{10.75} \right)^{-1/4}.
\label{eq: minimum PBH mass}
\end{equation}
In this paper, we focus on PBHs with masses about $30M_\odot$.
For convenience, we define the $e$-foldings during inflation $N_k$ when the scale $k$ exits the horizon as
\begin{equation}
N_k
\equiv
\ln \left( \frac{k}{H_I a_i} \right)
=
\ln\left( \frac{k}{k_0} \right),
\label{eq: e-foldings vs wavenumber}
\end{equation}
where $H_I$ is the Hubble parameter during inflation and $a_i$ is the scale factor when the current horizon scale $k_{0} = 2.24 \times 10^{-4} \, \mathrm{Mpc}^{-1}$ exits the horizon.
The PBH formation scale corresponding to the PBH mass $30M_\odot$ is given by
\begin{align}
N_{\rm PBH} \equiv N_{k_{\rm PBH}} \simeq 22
\quad,\quad
k_\mathrm{PBH} \simeq 8.2 \times 10^5~\mathrm{Mpc}^{-1}.
\end{align}
We comment on the bubbles that do not collapse into PBHs.
The baryon number in them can contribute to the baryon asymmetry of the Universe.
However, in order not to spoil the success of the standard BBN, the baryon asymmetry should be sufficiently homogeneous.
Therefore we should require that the spatially averaged baryon density due to the HBBs $\eta_b^B$ should be much smaller than the observed baryon density of the Universe $\eta_b^\mathrm{obs} \sim 10^{-10}$.
However the baryon charge produced in the AD mechanism is determined by the initial phase of the AD field, which takes a random value after the quantum diffusion.
Then the cancellation of the positive and negative baryon charge will relax this constraint\footnote{Even if the cancellation of baryon and anti-baryon does not work well for some reasons, we can evade the constraint from the baryon overproduction by utilizing, for example, the double inflation or L-balls~\cite{Kawasaki:2021xxx}.}.
Note that, since the inhomogeneous contribution of the bubbles to the baryon asymmetry should be negligible, we need another baryogenesis mechanism in order to explain the baryon asymmetry in the Universe.
In the most simple scenario, the required baryon asymmetry is generated by utilizing another flat direction of the MSSM potential.
\section{PBH formation rate and correlation}
\label{sec: PBH formation and correlation}
In this section, we consider the stochastic time evolution of a complex scalar field $\phi$ during inflation and the bubble formation after inflation.
We investigate the correlation between the field values at different points, $\phi(\bm x)$ and $\phi(\bm y)$.
When two points lie within the same Hubble patch, they have a similar field value $\phi(\bm x) \sim\phi(\bm y)$.
After two points are separated by the inflation and lie in different Hubble patches, they start to evolve in different ways, $\phi(\bm x) \neq\phi(\bm y)$.
Thus, the field values have large correlations when they are spatially close.
Once the scalar field exceeds the threshold value of the potential in some domains, such domains finally form HBBs, which can gravitationally collapse to form PBHs later.
We derive the mass spectrum of PBHs and their spatial correlations in the following.
\subsection{Stochastic dynamics of scalar field}
\label{subsec_scalar_field_dynamics}
During inflation, the scalar field acquires fluctuations with amplitude of the Hubble scale at the horizon exit, and we call the fluctuations as IR modes after they exit the horizon.
The dynamics of IR modes of the scalar field during inflation is described by the Langevin equation including the Gaussian noise originating from the quantum fluctuation~\cite{Vilenkin:1982wt,Starobinsky:1982ee,Linde:1982uu}.
The probability distribution function of the scalar field $P(N,\phi)$ follows the Fokker-Planck equation:
\begin{equation}
\frac{\partial P(N,\phi)}{\partial N}
=
\sum_{i = 1,2} \frac{\partial}{\partial \phi_i}
\left[
\frac{\partial V(\phi)}{\partial \phi_i} \frac{P(N,\phi)}{3H_I^2}
+
\frac{H_I^2}{8\pi^2} \frac{\partial P(N,\phi)}{\partial \phi_i}
\right],
\end{equation}
where $(\phi_1, \phi_2) \equiv (\mathrm{Re}[\phi],\mathrm{Im}[\phi])$, $V(\phi)$ is the potential of $\phi$, and $N$ is the $e$-foldings during inflation.
The first term on the right-hand side represents the classical force induced by the potential and the second term represents the quantum fluctuation.
As the initial condition, we assume that $\phi$ stays at the origin, $P(N=0,\phi) = \delta^{(2)} (\phi)$.
In our analysis, we approximate that the Hubble parameter is constant during inflation and we neglect the energy density of the AD field.
During inflation, the potential of $\phi$ is dominated by the Hubble induced positive mass:
\begin{equation}
V(\phi) = \frac{1}{2} c_I H_I^2 \left( \phi_1^2 + \phi_2^2 \right).
\end{equation}
Since we are interested in the amplitude of $\phi$,
we rewrite this differential equation using $(\varphi, \theta) = (|\phi|, \mathrm{arg}\phi)$ as
\begin{align}
\frac{\partial P(N,\phi)}{\partial N}
=&
\frac{1}{3H_I^2}
\left[
\left(
\frac{\partial^2 V(\varphi)}{\partial \varphi^2}
+
\frac{1}{\varphi} \frac{\partial V(\varphi)}{\partial \varphi}
\right)
P(N,\phi)
+
\frac{\partial V(\varphi)}{\partial \varphi}
\frac{\partial P(N,\phi)}{\partial \varphi}
\right]
\nonumber\\
&+
\frac{H_I^2}{8\pi^2}
\left(
\frac{\partial^2 P(N,\phi)}{\partial \varphi^2}
+
\frac{1}{\varphi} \frac{\partial P(N,\phi)}{\partial \varphi}
+
\frac{1}{\varphi^2} \frac{\partial^2 P(N,\phi)}{\partial \theta^2}
\right)
\nonumber\\
=&
c_I'
\left(
P(N,\phi)
+
\frac{\varphi}{2} \frac{\partial P(N,\phi)}{\partial \varphi}
\right)
+
\frac{H_I^2}{8\pi^2}
\left(
\frac{\partial^2 P(N,\phi)}{\partial \varphi^2}
+
\frac{1}{\varphi} \frac{\partial P(N,\phi)}{\partial \varphi}
+
\frac{1}{\varphi^2} \frac{\partial^2 P(N,\phi)}{\partial \theta^2}
\right),
\label{eq: massive Fokker-Planck equation}
\end{align}
where $c_I' \equiv 2c_I/3$.
In order to consider the probability distribution of $\varphi$, we integrate the probability distribution $P(N,\phi)$ over the phase, i.e., we consider
\begin{equation}
\tilde{P}(N,\tilde{\varphi})
\equiv
\left( \frac{H_I}{2\pi} \right)^2
\tilde{\varphi} \int_0^{2\pi} \mathrm{d}\theta \, P(N,\varphi,\theta),
\end{equation}
where we use the dimensionless field $\tilde{\varphi} \equiv 2\pi \varphi/H_I$.
Note that $\tilde{P}(N,\tilde{\varphi})$ is normalized to satisfy
\begin{equation}
\int_0^{\infty} \mathrm{d}\tilde{\varphi} \, \tilde{P}(N,\tilde{\varphi})
= 1.
\end{equation}
Then the differential equation that $\tilde{P}(N,\tilde{\varphi})$ satisfies is
\begin{equation}
\frac{\partial \tilde{P}(N,\tilde{\varphi})}{\partial N}
=
\frac{c_I'}{2}
\left(
\tilde{P}(N,\tilde{\varphi})
+
\tilde{\varphi} \frac{\partial \tilde{P}(N,\tilde{\varphi})}{\partial \tilde{\varphi}}
\right)
+
\frac{1}{2}
\left(
\frac{\partial^2 \tilde{P}(N,\tilde{\varphi})}{\partial \tilde{\varphi}^2}
-
\frac{1}{\tilde{\varphi}}
\frac{\partial \tilde{P}(N,\tilde{\varphi})}{\partial \tilde{\varphi}}
+
\frac{\tilde{P}(N,\tilde{\varphi})}{\tilde{\varphi}^2}
\right).
\label{eq: tildeP DE}
\end{equation}
As discussed in App.~\ref{App: Prob distro in massive}, for the initial condition of $\tilde{P}(N = 0, \tilde{\varphi}) = \delta(\tilde{\varphi} - \tilde{\varphi}_{\mathrm{init}})$, this differential equation has the solution of
\begin{equation}
\tilde{P}(N, \tilde{\varphi}; \tilde{\varphi}_{\mathrm{init}})
=
\frac{\tilde{\varphi}}{\tilde{\sigma}^2(N)} I_0
\left(
e^{\frac{-c_I' N}{2}}
\frac{ \tilde{\varphi}_{\mathrm{init}}\tilde{\varphi}}{\tilde{\sigma}^2(N)}
\right)
\exp
\left[
-\frac{ \tilde{\varphi}^2 + e^{-c_I' N}\tilde{\varphi}_{\mathrm{init}}^2 }
{ 2 \tilde{\sigma}^2(N) }
\right],
\end{equation}
where $I_0(z)$ is the modified Bessel function of the first kind of order $0$, and
$\tilde{\sigma}^2(N) \equiv (1 - e^{-c_I' N})/c_I'$
describes the variance of the field value.
Especially, for $\tilde{\varphi}_{\mathrm{init}} = 0$,
\begin{equation}
\tilde{P}(N, \tilde{\varphi}; 0)
=
\frac{\tilde{\varphi}}{\tilde{\sigma}^2(N)}
\exp
\left[
-\frac{\tilde{\varphi}^2 }{2 \tilde{\sigma}^2(N)}
\right].
\end{equation}
The formation rate of bubbles is derived by using $\tilde{P}$, which leads to the PBH formation rate.
The formation of bubbles is determined by the field value at the end of inflation.
$\tilde{P}$ represents the probability distribution of the field value at the horizon exit.
The AD field follows the classical dynamics after the horizon exit, and it rolls down the potential toward the origin.
Taking this effect into account, the threshold of the AD field value to form a bubble is determined by $\varphi_{c,\mathrm{eff}}(N) \equiv \mathrm{exp}[c_I'(N_\mathrm{end}-N)/2]\varphi_c$.
The size of a bubble is set by the horizon scale when $\varphi$ exceeds the threshold value $\varphi_{c,\mathrm{eff}}$.
Since the regions with $\varphi > \varphi_{c,\mathrm{eff}}(N_{k_x})$ at $N_{k_x}$ become bubbles with scales larger than $2\pi/k_x$ after inflation, the volume fraction of
such regions is obtained by integrating $\tilde{P}$ as
\begin{equation}
{B_1}(N_{k_x},\bm{x})
=
\int_{\tilde{\varphi}_{c,\mathrm{eff}}(N_{k_x})}^{\infty} \mathrm{d} \tilde{\varphi} \,
\tilde{P}(N_{k_x}, \tilde{\varphi}; 0)
=
\exp
\left[
-\frac{\tilde{\varphi}_{c,\mathrm{eff}}^2(N_{k_x})}{2 \tilde{\sigma}^2(N_{k_x})}
\right].
\label{eq: B1}
\end{equation}
Note that the physical volume fraction is the same as the comoving volume fraction during inflation since each patch follows the same expansion history whether $\varphi > \varphi_{c,\mathrm{eff}}$ or not.
In the same way as in the Press-Schechter formalism,
the volume fraction of the regions that would later become bubbles with $k\sim k_{\rm PBH}$ is obtained by differentiating ${B_1}$ with respect to $N$ as
\begin{equation}
{\beta_{N,1}}(N_{k_x},\bm{x})
\equiv
\frac{\partial {B_1}(N_{k_x},\bm{x})}{\partial N_{k_x}}.
\end{equation}
For simplicity, we set $c_M, c_1 \sim 1$ and then
\begin{equation}
\tilde{\varphi}_c = 2 \pi \Delta^{1/2},
\quad
\Delta \equiv \frac{T_R^2 M_\mathrm{Pl}}{H_I^3},
\end{equation}
where $\Delta\gtrsim 1 $ is required for the potential to have the vacuum at the origin.
Next, we consider the two-point correlation of the bubble formation rate.
As a first step, we consider the field values at two points $x$ and $y$ separated by the distance $L$ corresponding to the scale $k_L\equiv 2\pi/L$.
The IR modes of $\phi$ at these two points experience the same time-evolution until the scale $k_L$ exits the horizon since the two points are included in the same Hubble patch.
We denote the field value at the horizon crossing of the mode $k_L$ as $\tilde\phi_L$.
After that, field values at $x$ and $y$ experience the independent history of the field evolution.
Therefore, the volume fraction that $\tilde{\varphi}$ at $x$ exceeds the threshold value at $N_{k_x}$ and that $\tilde{\varphi}$ at $y$ exceeds the threshold value at $N_{k_y}$ is given by
\begin{align}
{B_2}(k_x,k_y, L)
=&
\int \int \int \mathrm{d} \tilde{\varphi}_L \mathrm{d} \tilde{\varphi}_x \mathrm{d} \tilde{\varphi}_y \,
\tilde{P}(N_{k_L},\tilde{\varphi}_L; 0)
\tilde{P}(N_{k_x}-N_{k_L},\tilde{\varphi}_x; \tilde{\varphi}_L)
\tilde{P}(N_{k_y}-N_{k_L},\tilde{\varphi}_y; \tilde{\varphi}_L)
\nonumber\\
&\times
\theta\left( \tilde{\varphi}_x - \tilde{\varphi}_{c,\mathrm{eff}}(N_{k_x}) \right)
\theta\left( \tilde{\varphi}_y - \tilde{\varphi}_{c,\mathrm{eff}}(N_{k_y}) \right).
\label{eq: B2}
\end{align}
The formation rate distribution of two bubbles with the scale of $k_x$ and $k_y$ at a distance of $L$ is derived by differentiating ${B_2}$ with respect to $N_{k_x}$ and $N_{k_y}$:
\begin{equation}
{\beta_{N,2}} (k_x, k_y, L)
=
\frac{\mathrm{d^2} {B_2}(k_x, k_y, L)}
{\mathrm{d}N_{k_x} \mathrm{d}N_{k_y}}.
\end{equation}
The distribution of the bubbles with respect to the $e$-foldings $N$ can be translated to the PBH distribution with respect to the logarithm of the PBH mass, $\ln (M_\mathrm{PBH})$.
Considering the relation $M \propto e^{-2N}$ derived from Eqs.~\eqref{eq: horizon mass vs wavenumber} and~\eqref{eq: e-foldings vs wavenumber} and the minimum mass of the PBHs $M_c$ in Eq.~\eqref{eq: minimum PBH mass},
the single PBH formation rate with respect to $M$ is given by
\begin{equation}
{\beta_1}(M)
=
\frac{1}{2} {\beta_{N,1}}(N_k)
\theta(M - M_c),
\label{eq_beta1}
\end{equation}
where $M$ and $k$ are related by Eq.~\eqref{eq: horizon mass vs wavenumber}.
Similarly the formation rate of two PBHs with masses $M_x$ and $M_y$ at a distance of $L$ is given by
\begin{equation}
{\beta_2}(M_x, M_y, L)
=
\frac{1}{4} {\beta_{N,2}} (k_x, k_y, L)
\theta(M_x - M_c)
\theta(M_y - M_c),
\label{eq_beta2}
\end{equation}
where $M_i$ and $k_i$ with $i = x,y$ are related by Eq.~\eqref{eq: horizon mass vs wavenumber}.
\subsection{Mass spectrum of PBHs}
\label{subsec_PBH_mass_spec}
Now, we derived the PBH formation rate of one PBH as $\beta_1(M)$ in Eq.~\eqref{eq_beta1} and two PBHs separated by $L$ as $\beta_2(M_i ,M_j, L)$ in Eq.~\eqref{eq_beta2}.
Note that $\beta_1$ and $\beta_2$ are the volume fraction of the regions which collapse into PBHs.
Since the PBH mass is typically the horizon mass at the PBH formation, the total mass of PBHs per volume is given by $\int \mathrm{d} \ln(M)~\beta_1(M)\rho_\mathrm{total}(M)$, where $\rho_\mathrm{total}(M)$ is the total energy density of the Universe at the formation of PBHs with mass $M$.
The energy and number density of the PBHs are evaluated by using $\beta_1(M)$ as
\begin{align}
\bar{\rho}
=
\int \mathrm{d}\ln M \, \rho_\mathrm{total}(M) {\beta_1}(M)
\quad,\quad
\bar{n}
=
\int \mathrm{d}\ln M \, \frac{\rho_\mathrm{total}(M) \beta_1(M)}{M}.
\end{align}
The present energy ratio of PBHs to the total dark matter is written as
\begin{equation}
f_\mathrm{PBH}
\equiv
\frac{\Omega_\mathrm{PBH}}{\Omega_c}
\simeq
\left. \frac{\bar{\rho}}{\rho_m}\right|_\mathrm{eq}
\frac{\Omega_m}{\Omega_c}
=
\int \mathrm{d} (\ln M)~
{\beta_1}(M) \frac{T(M)}{T_\mathrm{eq}}
\frac{\Omega_m}{\Omega_c},
\end{equation}
where $\rho_m$ represents the energy density of matter,
the subscript ``$\mathrm{eq}$'' represents the matter-radiation equality,
$\Omega_c$ and $\Omega_m$ represent the present density parameters of the dark matter and total non-relativistic matter, respectively,
and $T(M)$ represents the temperature at the formation of PBHs with mass $M$.
The mass spectrum of PBHs is defined by $f_{\rm PBH}=\int \mathrm{d} (\ln M)~f(M)$, and given by
\begin{align}
f(M) =
{\beta_1}(M) \frac{T(M)}{T_\mathrm{eq}}
\frac{\Omega_m}{\Omega_c}.
\end{align}
In Fig.~\ref{fig_abundance}, we show the PBH mass spectrum,
where the blue and red lines represent the mass spectrum of our model.
In our model, the relevant constraint on the PBH abundance is given by the PBH accretion~\cite{Ali-Haimoud:2016mbv,Poulin:2017bwe,Serpico:2020ehh}.
Although Ref.~\cite{Serpico:2020ehh} gives the most stringent constraint, we choose the most conservative one~\cite{Ali-Haimoud:2016mbv} as the gray region in Fig.~\ref{fig_abundance}.
The left and right panels represent the different choice of $c_I'$.
We choose $\eta_b$ so that the threshold of the PBH mass comes to $M_\mathrm{c} = 20 M_\odot$.
In our model, the PBH abundance and mass spectrum are controlled by the potential parameters to a certain extent including $f_{\rm PBH}\sim 10^{-3}$, which is a typical value to explain the LIGO-VIRGO events by PBHs assuming that the PBHs are not clustered.
The mass spectrum of PBHs can be approximated by monochromatic distribution when the mass spectrum has a peak shape as in our model.
Using $f_\mathrm{PBH}$, the number density of PBHs with monochromatic mass distribution is given by
\begin{align}
\bar n
&\simeq
\frac{f_{\rm PBH}\Omega_{\rm DM}\rho_{c,0}}{M_{\rm PBH}}
=
\left(
9.65\times 10^{-3}\,{\rm Mpc}
\right)^{-3}
~
\left(\frac{f_{\rm PBH}}{10^{-3}}\right)
\left(\frac{30 M_\odot}{M_{\rm PBH}}\right)
\left(\frac{ \Omega_{\rm DM}}{0.25}\right)
\left(\frac{ \rho_{c,0}}{0.9\times 10^{-29}\,{\rm g~cm}^{-3}}\right).
\end{align}
\begin{figure}[t
\centering
\includegraphics[width=.45\textwidth ]{abundance0005.pdf}
\includegraphics[width=.45\textwidth ]{abundance001.pdf}
\caption{
PBH mass spectra are plotted for different parameters of the potential.
The left and right panels represent the results for the different $c_I'$ and the colors of lines represent the different $\Delta$s.
The total abundance of PBHs is $f_{\rm PBH}\sim 8.6 \times 10^{-4}$ for blue line and $7.9 \times 10^{-6}$ for red line in the left panel, and
$f_{\rm PBH}\sim 7.8 \times 10^{-4}$ for blue line and $8.2 \times 10^{-6}$ for red line in the right panel.
The gray region represents the CMB constraint from the PBH accretion under the collisional ionization assumption~\cite{Ali-Haimoud:2016mbv}, which we choose as the most conservative constraint.
}
\label{fig_abundance}
\end{figure
\begin{figure}[t
\centering
\includegraphics[width=.45\textwidth ]{xi0005.pdf}
\includegraphics[width=.45\textwidth ]{xi001.pdf}
\caption{
The reduced PBH correlation function.
The parameters are the same as the Fig.~\ref{fig_abundance}.
The dotted lines are fitting lines of $\xi(r)$ and correspond to the formulae in each panel.
}
\label{fig-xi}
\end{figure
\subsection{Reduced PBH correlation function}
\label{subsec: formulation of PBH correlations}
Here, we formulate the clustering of PBHs using the PBH correlation functions.
When the PBHs are randomly formed independent of the other surrounding PBHs, the PBHs follow the Poisson distribution.
If not, we expect the PBH correlation functions beyond the Poisson distribution.
We derive the PBH correlation functions using the $\beta_2$ in Eq.~\eqref{eq_beta2}.
The outline follows Ref.~\cite{Desjacques:2018wuu} and we extend the formulation for continuous mass spectrum.
First, we start with a finite number of PBHs to calculate their spatial correlation.
The clustering of PBHs is characterized by the two-point correlation function of density perturbations.
We consider $N$ PBHs in a volume $V$, where $i$-th PBH with a mass $M_i$ is located at $\bm x=\bm x_i$ ($i=1,2, \ldots ,N$).
The averaged number density, mass, and energy density of PBHs are given by
\begin{align}
\bar n = \frac{N}{V}
\quad,\quad
\overline{M}
= \frac{\sum_i M_i}{N}
\quad,\quad
\bar \rho = \frac{\sum_i M_i}{V}
= \bar n \overline{M}.
\end{align}
The density fluctuation of PBHs is written as
\begin{align}
\delta_\mathrm{PBH}(\bm x)
\equiv
\frac{\delta \rho_\mathrm{PBH}(\bm x)}{\bar{\rho}_\mathrm{PBH}}
=
\frac{1}{\bar \rho} \sum_{i} M_i\delta^{(3)}(\bm x-\bm x_{i})
-1.
\end{align}
The two-point correlation function is given by
\begin{align}
& \braket{\delta_\mathrm{PBH}(0)\delta_\mathrm{PBH}(\bm x)}
\nonumber\\
&=
\Braket{
\sum_{i,j}
\frac{M_i M_j}{\bar \rho^2}
\delta^{(3)}(\bm x-\bm x_{i})
\delta^{(3)}(-\bm x_{j})
-
\frac{
\sum_{i} M_i \delta^{(3)}(\bm x-\bm x_i)
+\sum_j M_j \delta^{(3)}(-\bm x_j)
}{\bar \rho}
+ 1
}
\nonumber\\
&\equiv
\frac{\delta^{(3)}(\bm x)}{\bar n} \frac{\overline{M^2}}{( \overline{M} )^2}
+ \xi(\bm x),
\label{eq_delta_twopoint}
\end{align}
where the bracket describes the average over the position of PBHs,
$\overline{M^2}\equiv \sum_i M_i^2/N$ is the averaged mass squared,
and $\xi(\bm x)$ is ``a reduced PBH correlation function'' defined by
\begin{align}
\xi(\bm x)&=
\sum_{i\neq j } \frac{M_i M_j}{(\bar \rho)^2}
\Braket{
\delta^{(3)}(\bm x-\bm x_i) \delta^{(3)}(-\bm x_j)
}
- 1.
\label{eq_def_xi_finite}
\end{align}
Next, we extend the definition of the reduced PBH correlation function for continuous mass spectrum of PBHs.
Using the formation rate of two PBHs ${\beta_2}(M_j ,M_J, L)$ in Eq.~\eqref{eq_beta2},
we can deduce the reduced PBH correlation function as
\begin{equation}
\tilde{\xi}(x)
\equiv
\frac{\int \mathrm{d}\ln M_i \mathrm{d}\ln M_j \, \rho_\mathrm{total}(M_i) \rho_\mathrm{total}(M_J) {\beta_2}(M_i, M_j, \bm x)}
{\left(\int \mathrm{d} \ln M \, \rho_\mathrm{total}(M) {\beta_1}(M)\right)^2}
- 1.
\label{eq_def_tildexi}
\end{equation}
Note that $\tilde{\xi}(x)$ vanishes
when there are no correlations in the PBH distribution,
${\beta_2}(M_i, M_j, x) = {\beta_1}(M_i) {\beta_1}(M_j)$.
Here we comment on a subtle difference between $\xi(x)$ and $\tilde{\xi}(x)$.
Strictly speaking, $\tilde{\xi}$ is defined so that $(1+\tilde{\xi}(x))\bar{n}$ represents the expectation value of the PBH number density at a distance $x$ when we assume that one PBH is located at the origin $x = 0$.
Since this assumption increases the PBH formation rate around the origin, the calculation of $\tilde{\xi}$ implicitly assumes the larger number density of PBHs than $\bar n$.
On the other hand, $\xi(x)$ represents the probability that two PBHs form at a distance $x$ when the number density of PBHs is fixed to $\bar n$.
This difference leads to a correction factor to the relation between $\xi(x)$ and $\tilde{\xi}(x)$
We estimate this correction in App.~\ref{app: reduced PBH correlation function} and find that the difference is about $\mathcal O(10\%)$.
Thus, we approximately use $\xi(x)\sim\tilde{\xi}(x)$ in this paper.
We show the reduced PBH correlation function in Fig.~\ref{fig-xi}, where the parameters are the same as in Fig.~\ref{fig_abundance}.
Here we evaluated $\tilde{\xi}(x)$ by assuming the monochromatic mass spectrum with $M=30M_{\odot}$ and ignoring the integration over mass.
As shown in Fig.~\ref{fig-xi}, the decline of $\xi$ becomes milder for smaller $c_I'$.
This is because smaller $c_I'$ leads to a larger variance of $\phi$ during inflation
and the PBH formation on smaller scales is more affected by the fluctuations on larger scales.
In the limit of a scale of the PBH radius,
$\xi$ is proportional to
$\beta_1^{-1}(M_\mathrm{PBH})$, since, in this limit, the AD field follows almost the same evolution in the two distanced points.
(See Eqs.~\eqref{eq: B1} and \eqref{eq: B2}.)
This is why $\xi(x)$ is roughly proportional to $f_\mathrm{PBH}^{-1}$ when we compare the blue and red lines in Figs.~\ref{fig_abundance} and \ref{fig-xi}.
The reduced PBH correlation function around $r\sim 1~$Mpc is fitted by the following formula,
\begin{align}
\xi(r)
&=
\xi_*
\left(\frac{r}{1~\mathrm{Mpc}}\right)^{-\alpha}
\label{eq_xi_summary}
\quad,\quad
f_\mathrm{PBH} \xi_* \sim (0.3 \, \mathchar`- \, 3) \times 10^{2}
\quad,\quad
\alpha\sim 1.2 \, \mathchar`- \, 1.5
\end{align}
where $ k_{\rm PBH} $ is the comoving scale of fluctuations to form PBHs with $M=30M_{\odot}$.
In the following section, we use $\alpha=1.5$ as a typical value and treat $(f_\mathrm{PBH},\, \xi_*)$ as free parameters although they are roughly inversely proportional.
\section{Cosmological effects of PBH clustering}
\label{sec: cosmological effect}
In this section, we discuss the cosmological effects of PBH clustering.
The clustered distribution of PBHs induces the density fluctuation in addition to the Poisson fluctuation as we derived in Eq.~\eqref{eq_delta_twopoint}.
Such additional fluctuations source the isocurvature perturbations.
Moreover, the clustering of PBHs affects the binary formation rate of PBHs, which can modify the merger rate distribution of PBHs.
We discuss these cosmological phenomena in the following.
\subsection{Isocurvature fluctuations}
\label{subsec: isocurvature}
It is known that PBHs induce isocurvature fluctuations due to their Poisson fluctuations, and the clustering also sources isocurvature fluctuations~\cite{Desjacques:2018wuu,Matsubara:2019qzv}.
The power spectrum of PBH density perturbations is defined as
\begin{align}
P_{\rm PBH}(k)
& =
\int
\mathrm{d} ^3 \bm x ~
e^{-i\bm k\cdot \bm x}
\braket{\delta_\mathrm{PBH}(\bm 0)\delta_\mathrm{PBH}(\bm x)}
=
P_{\rm Poisson}(k)
+ P_{\xi}(k),
\\
P_{\rm Poisson}(k)
&\equiv
\frac{1}{\bar n}
\frac{\overline{M^2}}{(\overline{ M})^2},
\label{eq_Poisson_power_spec}
\\
P_{\xi}(k)
&\equiv
\int
\mathrm{d} ^3 \bm x ~
e^{-i\bm k\cdot \bm x} \xi(x)
= 4\pi \int\mathrm{d} x~
x^2
\frac{\sin(kx)}{kx} \xi(x),
\label{eq_Pxi_integral}
\end{align}
where $P_{\rm Poisson}(k)$ comes from the Poisson fluctuation induced by the fluctuation of the number of PBHs, and
$P_{\xi}(k)$ comes from the clustered distribution of PBHs.
When we adapt the power law form of $\xi(r)$ in Eq.~\eqref{eq_xi_summary} with $1<\alpha<3$, $P_{\xi}(k)$ is given by
\begin{align}
P_{\xi}(k)
&
=
4\pi k^{-3} \xi_*
(1~\mathrm{Mpc}\times k)^{\alpha}
\sin \left( \frac{\alpha \pi}{2} \right)
\Gamma(2-\alpha)
.
\end{align}
Note that the integration variable $x$ has a lower bound at the scale of the PBH formation and an upper bound at the scale of the observable Universe.
We compare $P_\xi$ to the Poisson fluctuation in Fig.~\ref{fig_isocurvature}.
The Poisson fluctuation of PBHs (black line) is evaluated for $f_{\rm PBH} = 10^{-6}$.
$P_\xi(k)$ is shown by colored lines, where the reduced PBH function is assumed as $\xi(r) = 10^1 (r/1\mathrm{Mpc})^{-\alpha}$.
The contribution of clustering overcomes the Poisson fluctuation on a larger scale even though the clustering decreases on a larger scale as $\xi(r) \propto r^{-\alpha}$ with $\alpha<3$.
In all the parameter sets used in Fig.~\ref{fig_abundance}, $P_\zeta$ gives the main contribution to the isocurvature perturbation at $k= \mathcal O(1) \, \mathrm{Mpc}^{-1}$.
\begin{figure}[t
\centering
\includegraphics[width=.80\textwidth ]{figs/fig_isocurvature.pdf}
\caption{
The power spectrum of PBH density perturbations $\delta_{\rm PBH}\equiv \delta\rho_{\rm PBH}/\bar\rho_{\rm PBH}$.
The black line represents the Poisson fluctuation in Eq.~\eqref{eq_Poisson_power_spec} for $f_{\rm PBH} = 10^{-6}$.
The colored lines represent the power spectrum induced by the clustering of PBHs assuming the reduced PBH function as $\xi(k) = 10^1 (r/1\mathrm{Mpc})^{-\alpha}$.
The tilts of the colored lines are given by $P_\xi(k)\propto k^{\alpha-3}$.
}
\label{fig_isocurvature}
\end{figure
The isocurvature fluctuation is given by
\begin{align}
P_{\rm iso}(k)
=
\left(\frac{\rho_{\rm PBH}}{\rho_{\rm DM}} \right)^2
P_{\rm PBH}(k)
=
f_{\rm PBH}^2
P_{\rm PBH}(k)
.
\end{align}
The amount of isocurvature perturbations $\beta_{\rm iso}\equiv P_{\rm iso}/(P_{\rm iso}+ P_{\mathcal R})$ is constrained by CMB observations~\cite{Akrami:2018odb}, where $P_{\mathcal{R}}$ is the power spectrum of curvature perturbations and they assume the flat power spectrum of isocurvature perturbations.
Since our result predicts the blue-tilted power spectrum, we conservatively use the constraint on a large scale, $\beta_{\rm iso}< 0.035 $ for the uncorrelated cold DM case at the scale $k_{\rm low} =0.002\,{\rm Mpc}^{-1}$~\cite{Akrami:2018odb}.
The PBH abundance and clustering are constrained as
\begin{align}
f_\mathrm{PBH}^2
\xi_*
&\lesssim
1.75\times 10^{-5}
~
\left( 2\times 10^{-3} \right)^{2-\alpha}
\frac{\pi/2}{\sin \left(\frac{\alpha \pi}{2} \right) \Gamma(2-\alpha)}
\frac{\beta_{\rm iso}}{0.035}
\frac{\mathcal P_{\mathcal R}}{2\times 10^{-9}}
\quad,\quad
\mathrm{(1<\alpha<3)}.
\label{eq_const_isocurvature}
\end{align}
We show the constraints on $f_\mathrm{PBH}^2 \xi_*$ in Fig.~\ref{fig_const_xif2},
where the red dotted line represents the analytic formula in Eq.~\eqref{eq_const_isocurvature} and the red solid line represents the numerical result including the lower bound of the integration variable in Eq.~\eqref{eq_Pxi_integral} at $x = 2\pi/k_{\rm PBH}$.
The lower bound of integration affects the results for $\alpha \gtrsim 3 $.
The parameters used in Fig.~\ref{fig_abundance} are also plotted.
Although our model is constrained by the isocurvature perturbations for our parameter sets, we can still avoid it by choosing a smaller abundance of PBHs.
As the abundance is small, the tilt of the clustering, $\alpha$, becomes large, which helps to avoid the isocurvature constraint.
\begin{figure}[t
\centering
\includegraphics[width=.80\textwidth ]{figs/fig_const_xif2.pdf}
\caption{
The constraint on the PBH abundance and clustering by the CMB observation.
We approximate the reduced PBH correlation function as $\xi(r) = \xi_*(r/1\mathrm{Mpc})^{-\alpha}$.
The isocurvature constraint by Planck satellite~\cite{Akrami:2018odb} excludes the strong clustering of PBHs (red region), where the red dotted line represents the analytic formula [Eq.~\eqref{eq_const_isocurvature}] valid for $1<\alpha<3$ and the red solid line represents the numerical result including the lower bound of the integration variable in Eq.~\eqref{eq_Pxi_integral} at $x = 2\pi/k_{\rm PBH}$.
Each point describes the parameters used in Fig.~\ref{fig_abundance}.
}
\label{fig_const_xif2}
\end{figure
\subsection{Merger rate distribution}
\label{subsec: merger rate calc}
The clustered distribution of PBHs modifies the PBH merger rate distribution~\cite{Raidal:2017mfl,Ding:2019tjk,Ballesteros:2018swv,Bringmann:2018mxj,Young:2019gfc,DeLuca:2020jug,Atal:2020igj}.
Here, we estimate the merger rate distribution with clustering.
For simplicity, we assume the monochromatic PBH mass spectrum with $M_{\rm PBH}=30 M_\odot$.
The PBH merger rate is calculated in two steps.
First, we calculate the probability in which three PBHs (I), (II), and (III) are produced at the comoving distance $r=0$, $x$, and $y$ ($0<x\ll y$).
Second, we estimate when PBHs (I) and (II) form binary and merge.
Since the eccentricity of the binary affects the coalescence time, we need to estimate the angular momentum of the binary induced by PBH (III).
We include the main contribution of angular momentum induced by PBH (III) and neglect the effect of the outer PBHs, which is discussed in \cite{Ali-Haimoud:2017rtz}.
Then, we can derive the current merger rate distribution~\cite{Sasaki:2016jop,Kocsis:2017yty}.
The clustering of PBHs modifies the above discussion through the increased formation rate of PBHs (II) and (III) by factors $\xi(x)$ and $\xi(y)$.
When PBH (II) is more frequently produced, we have more binaries and a larger merger rate.
When PBH (III) is more frequently produced, the binaries tend to acquire larger angular momenta and longer coalescence times.
If PBH (III) is too close to the binary, it may form a three-body system and disrupt the binary.
Thus, the clustered distribution has two opposite effects on the binary formation rate.
We include those effects in the following calculation to quantitatively estimate the merger rate.
First, we investigate the effect of clustering on the distribution of PBHs.
Without clustering, the mean separation length between PBHs is given by $r_{\rm mean} \sim \bar n^{-1/3}$.
With the positive (negative) clustering, $r_{\rm mean}$ becomes smaller (larger).
We estimate $r_{\rm mean}$ between two PBHs, (I) at the origin ($r=0$) and (II) at $r=x$, which is the nearest neighbor of PBH (I).
The PBH formation probability of a PBH at $\bm x$ is given by $(1+\xi(x)) \bar n \mathrm{d}^3 x$.
Since PBH (II) is the nearest neighbor, we require that no other PBH lies between $r\in [0,x]$, which suppress the probability by $\exp[- \int_0^x \mathrm{d}^3 r~ (1+\xi(r)) \bar n]$.
The probability for the formation of PBH (II) is given by~\cite{Raidal:2017mfl,Ballesteros:2018swv}
\begin{align}
Q_1(x) &= (1+\xi(x)) ~\bar n ~
\exp\left[
-\Gamma(x)
\right],
\\
\Gamma(x) &\equiv
\frac{ 4\pi \bar n x^3}{3}
\left(
1+
3 x^{-3} \int^x_0\mathrm{d} s \, s^2 \xi(s)
\right),
\end{align}
where $Q_1(x)$ is normalized as $\int_0^\infty \mathrm{d}^3 x~Q_1(x)=1$.
Using this probability, we define the mean separation of the nearest-neighbor PBHs as
\begin{align}
r_{\rm mean}
&\equiv
\int \mathrm{d} ^3 \bm r ~
r Q_1(r).
\label{eq_rmean}
\end{align}
Without clustering, we can analytically calculate Eq.~\eqref{eq_rmean} as $r_{\rm mean}\to \Gamma(1/3)(36\pi)^{-1/3}\bar n^{-1/3}\sim 0.6\bar n^{-1/3}$, which is consistent to the naive estimation, $r_{\rm near}\sim\bar n^{-1/3}$.
We show the normalized $r_{\rm mean}$ in Fig.~\ref{fig_typical_Separation}, where we assume that the reduced PBH correlation function as $\xi(r)= \xi_*\left({r}/1~\mathrm{Mpc}\right)^{-1.5}$.
The horizontal axis represents the strength of clustering.
The clustering of PBHs shortens the mean separation of the nearest-neighbor PBHs, especially for the larger PBH abundance (red line) rather than the smaller PBH abundance (blue line).
\begin{figure}[t
\centering
\includegraphics[width=.60\textwidth ]{figs/fig_typical_Separation.pdf}
\caption{
The mean separation of the nearest-neighbor PBH [Eq.\eqref{eq_rmean}] with clustering for the PBH abundance $f_{\rm PBH} =10^{-3}$ (red line) and $10^{-6}$ (blue line).
We assume the reduced PBH correlation function as $\xi(r)= \xi_*\left(r/1~\mathrm{Mpc}\right)^{-1.5}$.
}
\label{fig_typical_Separation}
\end{figure
Next, we define the probability distribution in which PBH (II) is formed between $x$ and $x+\mathrm{d} x$ and PBH (III) is formed between $y$ and $y+\mathrm{d} y$ as $Q_{12}(x,y) \mathrm{d} ^3 x\mathrm{d} ^3 y$.
First, we focus on the conditional probability $Q_{2}(y|x)$ where PBH (III) is formed at $y$ on the condition that PBH (II) lies at $x$.
Since PBH (III) is the next-to-nearest neighbor of PBH (I), we require that no other PBH lies between $r\in[x,y]$, which leads to $Q_{2}(y|x) = (1+\xi(y)) \bar n\exp[- \int_x^y \mathrm{d}^3 r~ (1+\xi(r)) \bar n]\theta(y-x)$.
Then, $Q_{12}(x,y)$ is given by~\cite{Raidal:2017mfl,Ballesteros:2018swv}
\begin{align}
Q_{12}(x,y)
&=
Q_1(x)Q_2(y|x)
=
\bar n^2 (1+\xi(x)) (1+\xi(y))
\exp\left[
-\Gamma(y)
\right]
\theta(y-x).
\end{align}
Using this formula, we can calculate the probability for PBHs to form with the initial separations $(x,y)$.
Once the initial configuration of three PBHs is given, we can check whether PBHs (I) and (II) form the binary.
We impose two conditions for the configuration of PBHs to result in the binary merger: PBH (I) and (II) should be bounded gravitationally overcoming the Hubble expansion; and PBH (III) should not fall into the binary.
The binary formation occurs if $t_{\rm ff}(r,z) <H(z)^{-1} $, where $t_{\rm ff}(r,z)$ is the free-fall time of the binary with the total mass $2M_{\rm PBH}$ with the initial separation $r$ at redshift $z$:
\begin{align}
t_{\rm ff}(r,z)\equiv (2M_{\rm PBH} G)^{-1/2} \left( \frac{r}{1+z} \right)^{3/2}.
\end{align}
Since the Hubble time changes as $H^{-1}\propto (1+z)^{-3/2}$ during the matter dominated era and $H^{-1}\propto (1+z)^{-2}$ during the radiation dominated era,
the ratio of $t_{\rm ff}(r,z)$ to $H(z)^{-1} $ decreases during the radiation dominated era and is constant during the matter dominated era.
Thus, the binary formation can occur only before the matter-radiation equality, and no more binaries are formed in the matter dominated era.
During the radiation dominated era, we approximate the energy density as $\rho(z)\simeq \rho_{c,0}\Omega_m (1+z)^4/(1+z_{\rm eq})$.
We define the ``decoupling time'' as $t_{\rm ff}(r,z_{\rm dec}) = H(z_{\rm dec})^{-1}$, and then $z_{\rm dec}(r)$ is given by
\begin{align}
\frac{1+z_{\rm dec}(r)}{1+z_{\rm eq}}
=
\left(
\frac{r_{\rm max}}{r}
\right)^3
\quad,\quad
r_{\rm max}
\equiv
\left(
\frac{3}{4\pi}
\frac{2M_{\rm PBH}}{ \rho_{c,0}\Omega_m}
\right)^{1/3}
=
7.1\times 10^{-4} \, {\rm Mpc}
\left(
\frac{M_{\rm PBH}}{30 M_\odot}
\frac{0.3}{ \Omega_m}
\frac{0.9\times 10^{-29}\,{\rm g~cm}^{-3}}{ \rho_{c,0}}
\right)^{1/3}
.
\end{align}
We require that the decoupling of PBHs (I) and (II) occurs during the radiation dominated era and that the decoupling of PBH (III) does not occur, which lead to the condition of the initial separation for the binary merger:
\begin{align}
x < r_{\rm max} < y,
\end{align}
where we neglect an $\mathcal O(1)$ factor for PBH (III) due to a difference mass.
Once the binary is formed, it shrinks radiating gravitational waves and finally merges.
The coalescence time is determined by the initial radius and eccentricity of the binary.
The physical separation of PBHs (I) and (II) at $z_{\rm dec}(x)$ is given by
\begin{align}
a(x)=\frac{x}{1+z_{\rm dec}}
=
\left( \frac{x}{r_{\rm max}}\right)^3
\frac{x}{1+z_{\rm eq}}.
\end{align}
The eccentricity of the binary $e$ is determined by the angular momentum induced by PBH (III).
When all the PBHs have the same mass, the eccentricity is roughly given by
\begin{align}
e= \sqrt{1-
\left( \frac{x}{y}\right)^6
}.
\end{align}
Then, the coalescence time is given by
\begin{align}
T(x,y) = R_m^{-3} a^4 (1-e^2)^{7/2}
=\frac{x^{37}}{R_m^{3}r_{\rm max}^{12} y^{21}(1+z_{\rm eq})^4}
\quad,\quad
R_m=
\left(\frac{3}{170}\right)^{-1/3}GM_{\rm PBH}
=
5.5\times 10^{-21} \, {\rm Mpc}
~\frac{M_{\rm PBH}}{30M_\odot}
.
\end{align}
We can convert the probability distribution of the initial configuration $(x,y)$ into that of the coalescence time $t$ as
\begin{align}
P_{\rm merge}(t)
&=
\int_0^{r_{\rm max}} 4\pi x^2\mathrm{d} x
\int_{r_{\rm max}}^\infty 4\pi y^2\mathrm{d} y
~
Q_{12}(x,y) ~
\delta(t- T(x,y)) \nonumber
\\ &=
(4\pi)^2
\int_0^{r_{\rm max}} x^2\mathrm{d} x
~
y^2
Q_{12}(x,y)
\left(
\frac{\mathrm{d} T(x,y)}{\mathrm{d} y}
\right)^{-1}
~
\theta(T(x,r_{\rm max})-t )
\bigg |_{y=y_t(x)},
\label{eq_Pmerge}
\\
y_t(x)
&\equiv
\left(
\frac{x^{37}}{t R_m^{3}r_{\rm max}^{12}(1+z_{\rm eq})^4}
\right)^{1/21},
\end{align}
where $y_t(x)$ represents the distance of PBH (III) to make the binary merge at $t = T(x,y_t(x))$.
The step function $\theta$ describes the condition $y>r_{\rm max}$, that is, $t=T(x,y)<T(x,r_{\rm max})$.
When PBH (III) is far away from the binary ($y\to \infty$), it exerts small torque on the binary ($e\to 1$), and the coalescence time becomes short ($T(x,y)\to 0$).
The step function, $\theta(T(x,r_{\rm max})-t )$, requires that the initial separation of the binary is large enough for the binary to survive until $t$, which determines the lower limit of integration as
\begin{align}
x_t =
\left(
t R_m^{3}
(1+z_{\rm eq})^4 r_{\rm max}^{33}
\right)^{1/37}.
\end{align}
In summary, the integration range of Eq.~\eqref{eq_Pmerge} is $x\in [x_t,r_{\rm max}]$.
The integrand of Eq.~\eqref{eq_Pmerge} is proportional to $x^{51/7}Q_{12}(x,y_t(x))$, and the integrated value depends on the functional form of $Q_{12}(x,y_t(x))$.
We show $Q_{12}(x,y_t(x))$ in Fig.~\ref{fig_integrand_Pmerge}.
The orange region is the integration range, and PBH (III) is too close to avoid the three-body problem for $x<x_t$, and PBHs (I) and (II) are too far to form the binary for $r_{\rm max}<x$.
The solid lines represent the normalized $Q_{12}(x,y_t(x))$ for PBH abundance $f_{\rm PBH} = 10^{-1}$ (red line) and $10^{-4}$ (blue line).
Without clustering (left panel), $Q_{12}(x,y_t(x))$ becomes $\bar n^2$ for small $x$.
For large $x$, the location of PBH (III), $y_t(x)$, should be far from the binary to merge at $t = T(x,y_t(x))$.
When the distance to PBH (III) becomes larger than the mean separation of PBHs, $y_t(x)> r_{\rm mean}$,
$\Gamma(y_t)$ suppresses $Q_{12}(x,y_t(x))$.
The dotted lines represent $x$ satisfying $r_{\rm mean} = y_t(x)$, and the suppression factor $\exp[-\Gamma(y_t)]$ becomes significant on the right side of the dotted lines.
With clustering (right panel), the suppression is stronger than the case without clustering, and the integrand is highly suppressed over the whole range of integration for $f_{\rm PBH} =10^{-1}$.
Thus, for a large PBH abundance, most of the binaries lead to the three-body problem with clustering.
\begin{figure}[t
\centering
\includegraphics[width=0.49\textwidth ]{figs/fig_integrand_Q12_xi0_new.pdf}
\includegraphics[width=0.49\textwidth ]{figs/fig_integrand_Q12_xi4_new.pdf}
\caption{
A part of integrand in the merger rate [Eq.\eqref{eq_Pmerge}] without (left) and with (right) clustering.
The horizontal axes represent the separation of PBHs (I) and (II), and the position of PBH (III) is fixed so that the binary merges at $t = T(x,y_t(x))$.
The color of lines represents the abundance of PBHs, $f_{\rm PBH} = 10^{-1}$ (red lines) and $10^{-4}$ (blue lines), respectively.
The dotted lines represent $x$ satisfying $r_{\rm mean} = y_t(x)$, where the distance to the PBH (III) is equal to the mean separation of PBHs.
The orange region is integration range, $x\in [x_t,r_{\rm max}]$.
}
\label{fig_integrand_Pmerge}
\end{figure
The merger rate
at the current time $t_0 = 13.7$~Gyr is given by
\begin{align}
\mathcal R_{\rm merger}
=\bar n P_{\rm merge}(t_0)
=
8.2
~
{\rm Gpc}^{-3}{\rm yr}^{-1}
~
\frac{f_{\rm PBH}}{10^{-3}}
\frac{t_0P_{\rm merge}(t_0)}{10^{-4}}
\frac{30 M_\odot}{M_{\rm PBH}}
\frac{ \Omega_{\rm DM}}{0.25}
\frac{ \rho_{c,0}}{0.9\times 10^{-29}\,{\rm g~cm}^{-3}},
\end{align}
where $t_0 P_{\rm merge}(t_0)$ depends on the mass, abundance, and clustering of PBHs.
We numerically calculate the merger rate with some choices of clustering, which is shown in Fig.~\ref{fig_example_Rmerge}.
Although the LIGO-Virgo collaboration observes the binary mergers up to $z\lesssim 1$ \cite{Abbott:2020niy}, we simply compare the current merger rate with the observed value (orange region), $\mathcal R= 23.9^{+14.3}_{-8.6} ~{\rm Gpc}^{-3}{\rm yr}^{-1}$~\cite{Abbott:2020gyp}.
Without clustering (black line), the merger rate increases as the PBH abundance $f_{\rm PBH}$ increases.
On the other hand, with clustering, the merger rate is amplified for small $f_{\rm PBH}$, while it is highly suppressed for large $f_{\rm PBH}$.
Since we calculate the merger rate conservatively by removing the binary merger with three-body dynamics, the merger rate is highly suppressed for large $f_{\rm PBH}$.
As shown in Fig.~\ref{fig_integrand_Pmerge}, the suppression occurs when the integrand is suppressed over the whole integration range, which is given by the condition $r_{\rm mean} < y_t(x_t) $ and shown in Fig.~\ref{fig_example_Rmerge} as the dotted lines.
\begin{figure}[th
\centering
\includegraphics[width=0.8\textwidth ]{figs/fig_mergerrate_xis_new.pdf}
\caption{
The merger rate distribution of PBHs with the mass 30~$M_\odot$ and the abundance $f_{\rm PBH}$.
The orange line is the observed merger rate of LIGO-VIRGO experiment~\cite{Abbott:2020gyp}, $\mathcal R= 23.9^{+14.3}_{-8.6} ~{\rm Gpc}^{-3}{\rm yr}^{-1}$.
The different lines represent the significance of the clustering with $\xi= \xi_* (r/1\mathrm{Mpc})^{-2}$.
The dotted lines represent the condition $r_{\rm mean} < y_t(x_t) $,
where PBHs are produced too close to avoid three-body problem.
}
\label{fig_example_Rmerge}
\end{figure
The clustered PBH distribution drastically changes the merger rate density.
When the PBH abundance is small, the clustering increases the merger rate due to the increased binary formation rate.
On the other hand, when the PBH abundance is large, the PBHs tend to be too close to avoid the three-body problem, and it leads to the strong suppression of the merger rate in our formulation.
In our PBH formation model, the typical clustering effect [Eq.~\eqref{eq_xi_summary}] is so large that most binaries result in the three-body problem.
Thus, to precisely estimate the merger rate in our model, it is necessary to include the mergers in three-body systems of PBHs~\cite{Vaskonen:2019jpv}.
It is very difficult to analytically solve the three-body system, and numerical calculation is required, which is out of the scope of this paper.
In the end, we comment on the assumption on the monochromatic mass spectrum in the above analysis.
When the mass spectrum is broad, the merger rate increases by a factor of $\mathcal O(1)$ as shown in Fig.~3 of Ref.~\cite{Raidal:2018bbj}.
The authors fix the total abundance of PBHs and assume the log-normal distribution, which leads to a larger number of small PBHs.
Such small PBHs contribute to the merger rate, while the three-body problem could be more serious in this case.
We expect that the clustering is more important than the extended mass spectrum for the merger rate.
\section{Discussion and Summary}
\label{sec: discussion}
The spatial distribution of PBHs is an important property since it can drastically change the phenomena related to PBHs.
Although models of PBH formation usually assume the random distribution of PBHs, some models predict the clustered PBH distribution, for example, the models with the non-Gaussian perturbations and the models using the false vacuum to produce the bubble-like objects.
In this paper, we have investigated the clustering of PBHs in the PBH formation model using the Affleck-Dine baryogenesis.
We have studied the stochastic dynamics of the scalar field during inflation and derived the PBH formation rate.
We also estimated the two-point correlation function of PBHs, which characterizes the clustering of PBHs.
It was found that the formed PBHs show a strong clustering,
which is consistent with the result derived in a different method~\cite{Shinohara:2021psq}.
Finally, we derive the reduced PBH correlation function given by Eq.~\eqref{eq_xi_summary}.
Using the reduced PBH correlation function, we have investigated the effect of the clustering on two phenomena related to PBHs; the isocurvature fluctuations and the merger rate distribution.
First, the clustering sources the isocurvature perturbations of PBHs in addition to the Poisson fluctuations.
We have estimated the power spectrum of density fluctuation of PBHs and have put the upper bound on the PBH abundance and the significance of clustering by using the current isocurvature constraints from the Planck satellite as shown in Fig.~\ref{fig_const_xif2}.
Second, the clustering of PBHs can drastically change the binary formation rate of PBHs, and the resultant merger rate is also modified.
We have found that the merger rate increases with the clustering for a small PBH abundance due to the enhanced binary formation rate, while it decreases for a large PBH abundance since the three-body problem occurs more frequently for the clustered PBHs.
As a result, it was found that it is difficult for our model to explain the LIGO-Virgo event rate of binary mergers when we conservatively neglect the binary merger in three-body systems.
While the treatment of the three-body problem is difficult, Ref.~\cite{Vaskonen:2019jpv} suggests that the perturbed binaries by the three-body problem still contribute to the merger rate.
The authors estimate $\mathcal O(10^2)$ suppression of the merger rate due to the three-body problem (See Fig.~2 of Ref.~\cite{Vaskonen:2019jpv} ).
Thus, it might be still possible that the strongly clustered PBHs explain the observed merger rate when we carefully estimate the merger of perturbed binaries.
It is left for future work to see whether our model can explain the merger rate observed by LIGO-VIRGO collaboration by correctly including PBH mergers in three-body systems.
\section*{Acknowledgments}
We would like to thank Tomoya Kinugawa for fruitful discussions and productive comments.
This work is supported by the Grant-in-Aid for Scientific Research Fund of the JSPS 20H05851(M.\,K.), 21K03567(M.\,K.),
20J20248 (K.\,M.) and
19J21974 (H.\,N.).
M.\,K. and K.\,M. are supported by World Premier International Research Center Initiative (WPI Initiative), MEXT, Japan (M.\,K. and K.\,M.).
K.\,M. is supported by the Program of Excellence in Photon Science.
H.\,N. is supported by Advanced Leading Graduate Course for Photon Science.
|
\section{Introduction} \label{sec:intro}
In the recent development of photometric redshifts (photo-$z$\xspace's), the use of probability distribution functions (PDFs, or $p(z)$) has become much sought after. Since the $p(z)$ of a galaxy produced may provide more information than a point estimate photo-$z$\xspace, many have dedicated their time into developing and improving the ways $p(z)$'s are generated \cite{fernandez-soto_error_2002,polsterer_uncertain_2016}. Other than being able to show the probability of multiple peaks, the $p(z)$'s produced for every galaxy in a sample could be stacked together to form a smooth photo-$z$\xspace distribution $n(z)$. Many have found that this form of $n(z)$ has showed better results in weak lensing analyses \cite{gerdes_arborz:_2010,bonnett_using_2015}.
The quality of the $p(z)$'s produced by a photo-$z$\xspace algorithm, however, is difficult to assess: unlike spectroscopic redshifts, there is no 'true' $p(z)$ for a certain galaxy to be compared with. Many recent and ongoing works have been dedicated to introduce and assess quality metrics for $p(z)$'s \cite{wittman_overconfidence_2016,schmidt_evaluation_nodate}. Examples of such quality metrics include the continuous ranked probability score (CRPS), probability integral transform (PIT), and the quantile-quantile (QQ) plot, in which the latter is a graphical representation of the PIT \cite{polsterer_uncertain_2016}.
In this work, we are interested to characterise some of these $p(z)$ metrics by studying if an improvement in the photo-$z$\xspace point estimates would be reflected in an improvement in the $p(z)$ metrics. In particular, we study quantitatively if the improvement in photo-$z$\xspace brought by including galaxy morphological parameters in the training of an artificial neural network (ANN) would reflect an improvement in the $p(z)$ metrics. This is important in its own right, as it helps producers of photo-$z$\xspace's to calibrate their algorithms to produce 'better' $p(z)$'s, so to say.
This work is a quick follow-up study to the work of Soo et al. (2018), in which they showed that galaxy morphology improves the point estimate photo-$z$\xspace's of galaxies in the CS82 sample, and the magnitude of improvement increases with decreasing number of broadband filters used \cite{soo_morpho-z:_2018}. Using this as the basis of our definition of 'improvement', we extend Soo's qualitative analysis on PDFs into a quantitative one.
\section{Methodology and Data Sample Used}
In this work, we use the exact same data sample, photo-$z$\xspace algorithm and input parameters used in \cite{soo_morpho-z:_2018}. These would be briefly introduced below, but the reader could refer to \cite{soo_morpho-z:_2018} for more details.
The galaxy sample used is constructed by cross-matching data from various surveys: it uses $ugriz$ broadband photometry from the Sloan Digital Sky Survey (SDSS) Stripe-$82$ Coadd \cite{annis_sloan_2014}, high-quality morphology from the Canada-France-Hawaii Telescope Stripe-$82$ (CS82) Survey \cite{moraes_cfht/megacam_2014}, and spectroscopic redshifts from SDSS, DEEP2, WiggleZ and the VIMOS VLT Deep Survey (VVDS) \cite{york_sloan_2000,newman_deep2_2013,drinkwater_wigglez_2010,le_fevre_vimos_2013}. This sample contains $59498$ galaxies, which is divided equally into $3$ sets for training, validation and testing respectively.
The photo-$z$\xspace algorithm used is \textsc{annz}$2$\xspace \cite{sadeh_annz2:_2016}, it is a powerful package capable of utilising several machine learning methods to estimate photo-$z$\xspace point estimates and PDFs of galaxies. Using the same settings as those in \cite{soo_morpho-z:_2018}, several runs of photo-$z$\xspace's for the same set of galaxies are produced, in each run we vary the number of broadband magnitudes used as training inputs (e.g. $i$, $ri$, $gri$, $ugri$, $ugriz$ and etc), in the same fashion shown in Section~$6.1$ of \cite{soo_morpho-z:_2018}. These runs are repeated by adding $5$ morphological parameters as training inputs, these parameters are the galaxy radius ($r$), axial ratio ($q$), mean surface brightness ($\mu$), S\'{e}rsic index ($n$) and shape probability ($p$). These latter runs are known as the 'with morphology' runs, which quality metrics will be compared to the former 'without morphology' runs. In \cite{soo_morpho-z:_2018} it has been established that the photo-$z$\xspace point estimate metrics (root-mean square error, $68$th percentile error and outlier rate) are generally better in the 'with morphology' runs.
We note that the results shown in \cite{soo_morpho-z:_2018} have been reweighted with respect to the CS82 target sample so to reflect its performance on that sample. In this work, however, we consider both the weighted and unweighted cases to see if there are differences in results between the two.
\section{Results and Discussion}\label{results}
\subsection{Metrics Used}
To evaluate quantitatively the overall impact of galaxy morphology on the $p(z)$'s produced, we assess the mean value of several metrics and characteristics of each individual galaxy $p(z)$. A total of $5$ metrics will be assessed:
\begin{enumerate}
\item \textit{The mean CRPS value} ($\rho_\textrm{CRPS}$), it tells us how close the position of the true redshift is located to the peak of the $p(z)$, the smaller the value the better the fit \cite{polsterer_uncertain_2016};
\item \textit{The mean PIT value} ($\rho_\textrm{PIT}$), it tells us if the $p(z)$ produced have adequately defined widths, a large value indicates that the $p(z)$'s are either too wide or too narrow \cite{polsterer_uncertain_2016};
\item \textit{The mean Bayesian odds} ($\bar{\Theta}$), a value between $0$ and $1$, it measures the confidence of the PDF produced, the closer to $1$ the more confident and reliable the $p(z)$ \cite{soo_morpho-z:_2018};
\item \textit{The mean PDF height} ($\bar{h}$), which we assume that the higher the better; and
\item \textit{The mean PDF $68$th percentile width} ($\bar{w}_{68}$), which we assume the narrower the better.
\end{enumerate}
We note that these values or metrics are not expected to correlate with one another, e.g. a high $\rho_\textrm{CRPS}$ (accurately peaked) does not imply a low $\rho_\textrm{PIT}$ (correctly shaped).
\subsection{Impact of Galaxy Morphology on $p(z)$}
\begin{figure}
\centering
\includegraphics[width=0.8\linewidth,page=3]{imgs/met.pdf}
\caption{Comparison of the mean CRPS ($\rho_\textrm{CRPS}$, first row) and root-mean-square PIT value ($\rho_\textrm{PIT}$, second row) when morphology is added to the training (green circles) on the unweighted (left) and weighted (right) CS82 training sample. Also shown are the mean odds ($\bar{\Theta}$, third row), mean peak height ($\bar{h}$, fourth row) and mean $68\%$ width ($\bar{w}_{68}$ last row) of the $p(z)$ produced for each case. The grey lines indicate the metric value of the pure $ugriz$ run.} \label{fig:res_pdfnz:pzmet}
\end{figure}
The values of $\rho_\textrm{CRPS}$, $\rho_\textrm{PIT}$, $\bar{\Theta}$, $\bar{h}$ and $\bar{w}_{68}$ are calculated for both the unweighted and weighted CS82 samples, for cases when trained with different numbers of magnitudes, with and without morphology, and the results are shown in Fig.~\ref{fig:res_pdfnz:pzmet}. Overall, we see that for both cases most metrics experience more improvement than degradation when morphology is added to training, and the trend of smaller improvement in with increasing number of bands used is also seen in most metrics. Notably $\rho_\textrm{CRPS}$, we see that galaxy morphology improves the forecast of the $p(z)$ immensely in both the weighted and unweighted samples, in most cases improvements of at least $5\%$ are achieved.
The change in $\rho_\textrm{PIT}$ is somewhat different from that of $\rho_\textrm{CRPS}$: while we see improvement in the unweighted sample, degradation in seen when the training sample is weighted. The reason for an increase in $\rho_\textrm{PIT}$ is not easy to pin down just by merely looking at the metric alone, since it could go both ways: either the widths of the $p(z)$ are going too narrow, or too wide. But with the values of $\bar{w}_{68}$ generally decreasing, we deduce that the sizes of the $p(z)$ have turned narrower than they should be with the inclusion of morphology.
In regards to $\bar{\Theta}$, for a $5$ $ugriz$ band training with morphology we find that the change in $\bar{\Theta}$ is almost negligible with morphology in the unweighted case: $\bar{\Theta}$ increased from $0.950$ to $0.951$ when multiple morphological parameters are included, partly because $\bar{\Theta}$ is very high to begin with. However we see a general improvement in both the unweighted and weighted case when morphology is added to the training, which indicates that morphology is indeed helping the ANN to improve the confidence in photo-$z$ values. We also see a direct correlation between the improvement of $\bar{\Theta}$ and $\rho_\textrm{CRPS}$, this is expected since both measure how well the expected redshift has been encapsulated within the PDF. However when checked for individual galaxies, we have verified that there is almost no correlation between the improvement in the point estimate photo-$z$ and the improvement in $\Theta$ for individual galaxies when morphology is added. This suggests that a galaxy with high $\Theta$ does not necessarily dictate a better photo-$z$ point estimate, although it remains sufficiently useful to remove outliers across an entire sample of galaxies \cite{soo_morpho-z:_2018}.
The change in $\bar{w}_{68}$ follows a similar trend as $\bar{\Theta}$, where we see that morphology on average has successfully reduced the widths of the $p(z)$. However, the impact of morphology on $\bar{h}$ shows a different story: there is a mixture of improvement and degradation. In fact, we find low correlation not only between $\bar{h}$ and the performance metrics across number of filters used, we also find low correlation between the improvement with $\bar{h}$ and the improvement in photo-$z$ for individual objects when morphology is added. We also do not see significant correlation between the improvement of $h$ and $\Theta$ either.
The motivation to study the change in $\bar{h}$ was in fact to see if morphology could decrease the degeneracy of multiple peaks, making only one peak stand out to obtain a more accurate photo-$z$. So to probe this a little further, we tabulated the distribution of $h$ for each run. From the distribution of PDF heights, we find that the shift in the peak of the $h$ distribution is in fact very small, and this is in contrast with the change in $w_{68}$ and $\Theta$. From further inspection of individual PDFs, we also find that many PDFs have very fuzzy and noisy distributions, some even having more than $10$ peaks in a single distribution. We suggest that these two factors have inhibited $\bar{h}$ from becoming a viable indicator for improvement in $p(z)$, and could be improved if smoother $p(z)$'s are produced.
\section{Conclusion and Future Work}
From our study, it is clear that $\rho_\textrm{PIT}$ is not a good metric to study improvement / degradation of the $p(z)$ in the context of CS82, although it remains an important metric to measure over- and under-confidences in PDFs. $\rho_\textrm{CRPS}$, $\bar{\Theta}$ and $\bar{w}_{68}$ are shown to be promising metrics to evaluate improvements in the photo-$z$\xspace PDFs reflected by the quality of point estimates. The viability of the metric $\bar{h}$ remains to be verified, and methods to produce smoother $p(z)$'s will be explored to achieve this purpose.
Note that in this work we have assumed that an improvement in the photo-$z$ estimates implies an improvement in the $p(z)$ and $n(z)$, and this assumption will be analysed in future work. Other future work include studies of $QQ$ plots, testing on improvements without relying on galaxy morphology, PDF smoothing methods and also the exploration of other metrics.
\begin{acknowledgments}
JYHS acknowledges the financial support from the MyBrainSc Scholarship endowed by the Ministry of Education, Malaysia during which this work was completed. JYHS would also like to thank Ofer Lahav, Samuel Schmidt, Alex Malz and other members of the Large Synoptic Survey Telescope (LSST) Photo-$z$ Working Group for fruitful discussions which led to this work.
\end{acknowledgments}
\bibliographystyle{apsrev4-2}
|
\section{Introduction}
\label{sec:intro}
Assigning topics to documents is an important task in several applications.
For example, press agencies need to identify articles of interest to readers based on the topics of articles that they have read in the past.
Analogous goals are pursued by many other text-mining applications such as, for example, recommending blogs from among
the millions of blogs available.
A popular approach to the problem of estimating hidden thematic structures in a corpus of documents is based on topic modeling.
Topic models have
attracted a great deal of attention in the past two decades. Beyond text mining, they were used in areas, such as population genetics~\cite{bicego2012investigating,pritchard2000inference}, social networks~\cite{mccallum2005author,curiskis2020evaluation}, image analysis~\cite{li2010building,zhu2017scene}, e-commerce~\cite{palese2018relative,yuan2018topic}.
In this paper, we adopt the \textit{probabilistic Latent Semantic Indexing} (pLSI) model introduced in~\cite{hofmann1999probabilistic}. The pLSI model deals with three types of variables, namely, documents, topics and words. Topics are latent variables, while the observed variables are words and documents. Assume that we have a dictionary of $p$ words and a collection of $n$ documents. Documents are sequences of words from the dictionary. The number of topics is denoted by~$K$. Usually, $K\ll \min(p,n)$. Throughout this paper, we assume that $2\le K\le \min(p,n)$. The pLSI model assumes that the probability of occurrence of word $j$ in a document discussing topic $k$ is independent of the document. Therefore, by the total probability formula,
\begin{align*}
\mathbb{P}(\text {word } j | \text {document } i) = \sum_{k = 1}^{K} \mathbb{P}(\text {topic } k | \text {document } i) \mathbb{P}(\text {word } j | \text {topic } k).
\end{align*}
Introducing the notation $\Pi_{ij}:=\mathbb{P}(\text {word } j | \text {document } i)$, $W_{ik} := \mathbb{P}(\text{topic }k\rvert\text{document }i)$ and $A_{kj} := \mathbb{P}(\text{word }j\rvert\text{topic } k)$ we may write $\Pi_{ij} = W_{i}^\mathrm{T} A_{j}$, where $W_{i}=(W_{i1}, \dots, W_{iK})^\mathrm{T} \in \left[0,1\right]^K$ is the topic probability vector for document $i$ and $A_{j}=(A_{1j}, \dots, A_{Kj})^\mathrm{T}\in \left[0,1\right]^K$ is the vector of word $j$ probabilities under topics $k=1,\dots, K$. In matrix form,
\begin{align}\label{factoriz}
\boldsymbol{\Pi} = \boldsymbol{W} \boldsymbol{A},
\end{align}
where $\boldsymbol{\Pi}$ is the document-word matrix of size $n\times p$ with entries $\Pi_{ij}$, $\boldsymbol{W}:= \left(W_{1}, \dots, W_{n} \right)^\mathrm{T}$ is the document-topic matrix of size $n\times K$ and $\boldsymbol{A} := \left(A_{1}, \dots, A_{p} \right)$
is the topic-word matrix of size $K\times p$. The rows of these matrices are probability vectors,
\begin{align}\label{factoriz1}
\sum_{m = 1}^K W_{im}=1,~\sum_{j = 1}^p A_{kj}=1,~\sum_{j=1}^p \Pi_{ij}=1~\text{for any }i= 1,\dots,n,~k= 1,\dots K.
\end{align}
Unless otherwise stated, we will assume throughout the paper that $\boldsymbol{\Pi}, \boldsymbol{W}, \boldsymbol{A}$ are matrices with non-negative entries satisfying~\eqref{factoriz1}.
The value $\Pi_{ij}$ is the probability of occurrence of word $j$ in document $i$. It is not available but we have access to the corresponding empirical frequency $X_{ij}$.
Thus, we have a document-word matrix $\boldsymbol{X}=(X_{ij})$ of size $n \times p$ such that for each document $i$ in $1,\dots, n,$ and each word $j$ in $1,\dots, p$, the entry $X_{ij}$ is the observed frequency of word $j$ in document $i$. Let $N_i$ denote the (non-random) number of sampled words in document $i$.
In what follows, we assume that, for each document-word vector $X_i = (X_{i1}, \dots,X_{ip})^\mathrm{T}$, the corresponding vector of cumulative counts $N_i X_i$ follows a $\text{Multinomial}_p(N_i,\Pi_i)$ distribution,
where $\Pi_i := \operatorname{\mathbb{E}}(X_i) = (\Pi_{i1}, \dots,\Pi_{ip})^\mathrm{T}$. We also assume that $X_1,\dots,X_n$ are independent random vectors. We will denote by $\mathbb{P}_{\boldsymbol{\Pi}}$
the probability measure corresponding to the distribution of $\boldsymbol{X}$.
We can write the observation model in a ``signal + noise" form:
\begin{align}
\label{eq:anchor_docs_model}
\boldsymbol{X} = \boldsymbol{\Pi} + \boldsymbol{Z} = \boldsymbol{W} \boldsymbol{A} + \boldsymbol{Z},
\end{align}
where $\boldsymbol{Z} := \boldsymbol{X} - \boldsymbol{\Pi}$ is a zero mean noise.
The objective in topic modeling is to estimate matrices $\boldsymbol{A}$ and $\boldsymbol{W}$ based on the observed frequency matrix $\boldsymbol{X}$ and on the known $N_1, \dots, N_n$. The recovery of $\boldsymbol{A}$ and the recovery of $\boldsymbol{W}$ address different purposes. An estimator of matrix $\boldsymbol{A}$ identifies the topic distribution on the dictionary. An estimator of $\boldsymbol{W}$ indicates the topics associated to each document.
Estimation of $\boldsymbol{W}$ has multiple applications and has been extensively discussed in the literature, mainly in the Bayesian perspective. The focus was on Latent Dirichlet Allocation (LDA) and related techniques (see Section~\ref{sec:comparison} for more details and references).
These methods are computationally slow and, to the best of our knowledge, no theoretical guarantees on their performance are available.
On the other hand, estimation of matrix $\boldsymbol{A}$ is well-studied in the theory. Several papers provide bounds on the performance of different estimators of $\boldsymbol{A}$. We give a more detailed account on this work in Section~\ref{sec:comparison}. Most of the results use the \textit{anchor word assumption} postulating that for every topic there is at least one word, which occurs only in this topic, see~\cite{arora2013practical,bing2018fast,Ke2017}. At first sight, it seems that results on estimation of matrix $\boldsymbol{A}$ can be applied to estimation of $\boldsymbol{W}$ by simply taking the transpose of~\eqref{factoriz1} and inverting the roles of these two matrices. However, such an argument is not valid since the resulting models are different. Indeed, the rows of matrix $\boldsymbol{X}^\mathrm{T}$ are not independent and the rows of matrices $\boldsymbol{\Pi}^\mathrm{T}, \boldsymbol{A}^\mathrm{T}, \boldsymbol{W}^\mathrm{T}$ do not sum up to 1, which leads to a different statistical analysis.
In the present paper, we change the framework compared to ~\cite{arora2013practical,bing2018fast,Ke2017} by focusing on estimation of matrix $\boldsymbol{W}$ rather than $\boldsymbol{A}$. We introduce the following assumption.
\begin{assumption}[Anchor document assumption]
\label{ass:anchorDoc}
For each topic \(k = 1, \dots, K,\) there exists at least one document \(i\) (called an anchor document) such that \(W_{ik} = 1\) and \(W_{il} = 0\) for all \(l \not= k\).
\end{assumption}
{Both anchor word and anchor document assumptions are very relevant in real word applications.}
Since each document is identified with a mixture of $K$ topics, anchor document assumption means that, for each topic, there is a document devoted solely to this topic. To illustrate the anchor document assumption, consider
the Associated Press data set~\cite{Harman1993}, which is a collection of 2246 articles published by this press agency mostly around 1988. An application of the pLSI model fitted via the LDA method with $K = 2$ leads to two well-shaped topics ``finance'' and ``politics''. We refer to~\cite[Section~6]{Silge2020}
for the details of the analysis. The first 10 rows of the estimator of matrix \(\boldsymbol{W}\) are presented in Table~\ref{tab:associated_matrix}. Notice that documents 6 and 8 in Table~\ref{tab:associated_matrix} can be considered as anchor documents. For example, document 6 has the weight of the second topic estimated as \(0.999\). A closer look at the most frequent words in this document (Noriega, Panama, Jackson, Powell, administration, economic, general) tells us that, indeed, this article corresponds solely to the topic ``politics'' -- it is about the relationship between the American government and the Panamanian leader Manuel Noriega.
\begin{table}[t]
\centering
\captionof{table}{The first ten rows of the estimated matrix \(\boldsymbol{W}\) for the Associated Press data set.}
\begin{tabular}{|c|c|c|}
\hline
Document & Finance & Politics \\
\hline
\hline
1 & 0.248 & 0.752 \\
2 & 0.362 & 0.638 \\
3 & 0.527 & 0.473 \\
4 & 0.357 & 0.643 \\
5 & 0.181 & 0.819 \\
6 & 0.001 & 0.999 \\
7 & 0.773 & 0.227 \\
8 & 0.004 & 0.996 \\
9 & 0.967 & 0.033 \\
10 & 0.147 & 0.953 \\
\hline
\end{tabular}
\label{tab:associated_matrix}
\end{table}
Our approach to estimation of matrix $\boldsymbol{W}$ that we call Successive Projection Overlapping Clustering (SPOC) is inspired by the Successive Projection Algorithm (SPA) initially proposed for non-negative matrix factorization~\cite{Araujo2001} and further used by~\cite{Gillis2014,panov2017consistent,Mao2020} in the context of mixed membership stochastic block models.
The idea of such methods is to start with the singular value decomposition (SVD) of matrix $\boldsymbol{X}$, and launch an iterative procedure that, at each step, chooses the maximum norm row of the matrix composed of singular vectors
and then projects on the linear subspace orthogonal to the selected row. From a geometric perspective, the rows of the matrix composed of singular vectors of $\boldsymbol{\Pi}$ belong to a simplex in $\mathbb{R}^K$. The documents can be identified with some points in this simplex and the anchor documents with its vertices. Our algorithm iteratively finds estimators of the vertices, based on which we finally estimate $\boldsymbol{W}$.
Note that the idea of exploiting simplex structures for estimation of matrix $\boldsymbol{A}$ rather than $\boldsymbol{W}$ was previously developed in, for example, ~\cite{arora2013practical,Ding2013,Ke2017}, among others. For example, the method to estimate $\boldsymbol{A}$ suggested in~\cite{Ke2017} is based on an exhaustive search over all size $K$ subsets of $\{1,\dots, p\}$. Its goal is to select $K$ vertices of a $p$-dimensional simplex and its computational cost is at least of the order $p^K$. Our algorithm for estimating $\boldsymbol{W}$ recovers the vertices of much less complex object, which is a $K$-dimensional simplex (recall that $K\ll p$), and its computational cost is of the order $\max(p, n) K + nK^2$. Here, $\max(p, n) K$ and $n K^2$ are the costs of performing a truncated singular value decomposition and the SPA algorithm, respectively. Another important point is that existing simplex-based methods for estimation of matrix $\boldsymbol{A}$ require the number $K$ of topics to be known. In the present paper, we propose a procedure that is adaptive to
unknown $K$.
{Our theoretical results deal only with the problem of estimating the topic-document matrix $\boldsymbol{W}$, for which the theory was not developed in prior work. But in practice, our method can be used for estimation of matrix $\boldsymbol{A}$ as well. Based on the SPOC estimator of $\boldsymbol{W}$, we immediately obtain an estimator of matrix $\boldsymbol{A}$ by a computationally fast procedure (see Section \ref{sec:anchor}). Our simulation studies (see Section~\ref{sec:topic_word_experiments} of the Appendix) indicate that this estimator exhibits a behavior similar to LDA on average while being more stable.}
{In this paper, we prove that the SPOC estimator of $\boldsymbol{W}$ converges in the Frobenius norm and in the $\ell_1$-norm with the rates $\sqrt{n/N}$ and $n/\sqrt{N}$ (up to a weak factor\footnote{In what follows, we mean by {\it weak factor} a small power of $K$ multiplied by a term logarithmic in the parameters of the problem. We will ignore weak factors when discussing the convergence rates.}), respectively, assuming that $N_i=N$ for $i=1,\dots,n$. We also prove lower bounds of the order $\sqrt{n/N}$ and $n/\sqrt{N}$, respectively, implying near optimality of the proposed method.
} One of the conclusions, both from the theory and the numerical experiments, is that the error of the SPOC algorithm does not grow significantly with the size of the dictionary $p$, in contrast to what one observes for Latent Dirichlet Allocation. We also introduce an estimator for the number $K$ of topics, which is usually unknown in practice. We show that SPOC algorithm using the estimator of $K$ preserves its optimal properties in this more challenging setting.
The rest of the paper is organized as follows.
In Section~\ref{sec:anchor}, we introduce the SPOC algorithm. Section~\ref{sec:consistency} contains the main results on the convergence rate of the algorithm and the minimax lower bound for estimation of \(\boldsymbol{W}\). Section~\ref{sec:comparison} is devoted to discussion of the prior work. In Section~\ref{sec:simulations}, we present numerical experiments for synthetic and real-world data in order to illustrate our theoretical findings. Finally, in Section~\ref{sec:discussion} we summarize the outcomes of the study. The proofs are given in the Appendix.
\section{Notation}
\label{sec:notation}
For any matrix $\boldsymbol{M}=(M_{ij})\in \mathbb{R}^{n \times k}$, we denote by $\|\boldsymbol{M}\|$ its spectral norm, i.e., its maximal singular value, by $\|\boldsymbol{M}\|_F$ its Frobenius norm, and by $\|\boldsymbol{M}\|_1=\sum_{i = n}^k\sum_{j = 1}^k\vert M_{ij}\vert$ its $\ell_1$-norm. We also consider the maximum $\ell_1$-norm of its rows $\|\boldsymbol{M}\|_{1,\infty} =\underset{1 \leq i \leq n}{\max} \sum_{j = 1}^k\vert M_{ij}\vert$. We denote by $\lambda_j(\boldsymbol{M})$ the $j$th singular value and by $\lambda_{\min}(\boldsymbol{M})$ the smallest singular value of $\boldsymbol{M}$. Assuming that matrix $\boldsymbol{M}$ has rank $K$ we consider its singular values $\lambda_1(\boldsymbol{M}) \geq \lambda_2(\boldsymbol{M}) \geq \dots \geq \lambda_K(\boldsymbol{M})>0$ and its condition number $\kappa(\boldsymbol{M}) = {\lambda_1(\boldsymbol{M})}/{\lambda_K(\boldsymbol{M})}$. If $J$ is a non-empty subset of rows of matrix $\boldsymbol{M}$ the notation $\boldsymbol{M}_J$ is used for a matrix in $\mathbb{R}^{|J| \times k}$ obtained from $\boldsymbol{M}$ by keeping only the rows in $J$. We denote by $\boldsymbol{I}_K$ the $K\times K$ identity matrix, and by $(\mathbf{e}_1,\dots,\mathbf{e}_n)$ the canonical basis of $\mathbb{R}^n$. For any vector $u\in \mathbb{R}^d$, we denote by $\|u\|_2$ its Euclidean norm. Throughout the paper, we use the notation $\mathbf{O}$
for orthogonal matrices and $\boldsymbol{\mathrm{P}}$ for permutation matrices. We denote by $\mathcal{P}$ the set of all permutation matrices in $\mathbb{R}^{K \times K}$. We denote by $c, C$ positive constants than may vary from line to line
\section{Successive Projection Overlapping Clustering}
\label{sec:anchor}
In this section, we introduce the \textit{Successive Projection Overlapping Clustering (SPOC)} algorithm for estimation of matrix \(\boldsymbol{W}\). It is an analog, in the context of topic models, of the algorithm proposed in~\cite{panov2017consistent} for the problem of parameter estimation in Mixed Membership Stochastic Block Model.
In order to explain the main idea of the algorithm, we start with considering the singular value decomposition (SVD) of matrix \(\boldsymbol{\Pi}\):
\begin{EQA}[c]
\label{svc:Pi}
\boldsymbol{\Pi} = \mathbf{U} \mathbf{L} \mathbf{V}^{\mathrm{T}},
\end{EQA}
where \(\mathbf{U} = \left[U_{1}, \dots, U_{K}\right] \in \mathbb{R}^{n \times K}\) and \(\mathbf{V} = \left[V_{1}, \dots, V_{K}\right] \in \mathbb{R}^{p \times K}\) are the matrices of left and right singular vectors and \(\mathbf{L} \in \mathbb{R}^{K \times K}\) is a diagonal matrix of the corresponding singular values. We have used here the fact that the rank of matrix \(\boldsymbol{\Pi}\) is at most~$K$. Recall that we assume $K\le \min(p,n)$. A key observation is that, if $\lambda_K(\boldsymbol{\Pi})>0$
and Assumption~\ref{ass:anchorDoc} is satisfied, then matrix \(\mathbf{U}\) can be represented as
\begin{equation}
\label{UWH}
\mathbf{U} = \boldsymbol{W} \bf H,
\end{equation}
where \({\bf H}\in \mathbb{R}^{K \times K}\) is a full rank matrix (cf. Lemma~\ref{lemma:matrix_eigen0} in the Appendix).
Thus, the rows of matrix \(\mathbf{U}\) belong to a simplex in $\mathbb{R}^K$ with vertices given by the rows of matrix \(\bf H\).
The empirical counterparts of $\bf{U,L,V}$ are obtained from the SVD of the observed matrix \(\boldsymbol{X}\):
\begin{EQA}[c]\label{svc:X}
\bf \boldsymbol{X} = \hat{\probLeftEigenvectors} \hat{\probEigenvalues} \widehat{\mathbf{V}}^{\mathrm{T}} + \hat{\probLeftEigenvectors}_1 \hat{\probEigenvalues}_1 \widehat{\mathbf{V}}_1^{\mathrm{T}},
\end{EQA}
where $\hat{\probLeftEigenvectors} = [\widehat{U}_{1}, \dots, \widehat{U}_{K}]$ and $\widehat{\mathbf{V}} = [\widehat{V}_{1}, \dots, \widehat{V}_{K}]$ are, respectively, the matrices of left and right singular vectors of $\boldsymbol{X}$ corresponding to its $K$ leading singular values $\widehat{\lambda}_{1} \geq \dots \geq \widehat{\lambda}_{K}$; $\widehat{\mathbf{L}} = \mathop{\rm diag}\nolimits\{\widehat{\lambda}_{1}, \dots, \widehat{\lambda}_{K}\}$, and $\hat{\probLeftEigenvectors}_1 \hat{\probEigenvalues}_1 \widehat{\mathbf{V}}_1^{\mathrm{T}}$ is the singular value decomposition of $\boldsymbol{X} - \hat{\probLeftEigenvectors} \hat{\probEigenvalues} \widehat{\mathbf{V}}^{\mathrm{T}}$.
Due to matrix perturbation results (see Appendix~\ref{subsec:perturbation}), there exists an orthogonal matrix ${\bf O}$ such that $\hat{\probLeftEigenvectors}$ is a good approximation for $\mathbf{U} {\bf O}$.
We can write
\begin{EQA}[c]\label{eq:umodel}
\hat{\probLeftEigenvectors} = \mathbf{U} {\bf O} + {\bf N} = \boldsymbol{W} \bf H {\bf O} + {\bf N},
\end{EQA}
where ${\bf N}$ is a "small enough" noise matrix.
Having obtained $\hat{\probLeftEigenvectors}$ from the SVD of $\boldsymbol{X}$, we then apply the \textit{Successive Projection Algorithm} (SPA)~\cite{Araujo2001,Gillis2014} to estimate the matrix \(\bf H {\bf O}\) in model~\eqref{eq:umodel}.
\begin{algorithm}
\caption{SPA}
\begin{algorithmic}[1]
\Require{Matrix \(\boldsymbol{M}\in \mathbb{R}^{n\times K}\) and integer \(r\le n\).}
\Ensure{Set of indices $J\subseteq \{1,\dots,n\}$.}
\State Initialize: $\boldsymbol{S}_0=\boldsymbol{M}^{\mathrm{T}}$, $J_0=\emptyset$.
\State For $t=1,\dots,r$ do:\newline
-- Find $i(t) = \mathop{\rm arg\,max}_{i=1,\dots,n}\|\mathbf{s}_i\|_2$, where $\mathbf{s}_i$'s are the column vectors of $\boldsymbol{S}_{t-1}$.\newline
-- Set
$
\boldsymbol{S}_{t}= \left(\boldsymbol{I}_K - \frac{\mathbf{s}_{i(t)}\mathbf{s}_{i(t)}^\mathrm{T}}{\|\mathbf{s}_{i(t)}\|_2^2}\right)\boldsymbol{S}_{t-1}
$,
$\quad J_t=J_{t-1}\cup \{i(t)\}$.
\State Set $J=J_r$.
\end{algorithmic}
\label{algo:SPA}
\end{algorithm}
Applied to matrix $\boldsymbol{M} =\hat{\probLeftEigenvectors}$ and $r=K$
this algorithm finds the rows of matrix \(\hat{\probLeftEigenvectors}\) with the maximum Euclidean norm and then projects on the subspace orthogonal to these rows and repeats the procedure until $K$ rows are selected. The main idea underlying the SPA is that the maximum of the Euclidean norm of a vector on a simplex is attained at one of its vertices.
In the noiseless case when ${\bf N}=0$, it can be shown that if Assumption~\ref{ass:anchorDoc} holds then
$\hat{\bf U}_J={\bf H} {\bf O}$, where $J$ is the set of $K$ rows of \(\hat{\bf U}\) selected after $K$ steps of SPA.
In the noisy case, we need additional assumptions on the noise level to ensure that SPA extracts documents close to anchor ones, which leads to an accurate enough estimator $\hat{\bf H}$ of $\bf H {\bf O}$ (see Appendix~\ref{sec:consistencySPA} for the precise statement). Once we have such an \(\hat{\bf H}\), the final step is to define the following estimator of matrix \(\boldsymbol{W}\):
\begin{EQA}[c]
\hat{\documentTopicMatrix} = \hat{\probLeftEigenvectors} \hat{\bf H}^{-1}.
\end{EQA}
%
This definition is valid only if matrix $\hat{\bf H}$ is non-degenerate, which is true with high probability under suitable assumptions (cf. Section~\ref{sec:consistency}).
An additional potentially useful step is to apply preconditioning to matrix \(\hat{\probLeftEigenvectors}\), which leads to improved bounds on the performance of the algorithm in the presence of noise, see~\cite{Gillis2015,Mizutani2016}. Preconditioned SPA is defined as follows. Let $r=K$ and let $\mathbf{a}_1,\dots,\mathbf{a}_n$ be the column vectors of matrix $\boldsymbol{M}^\mathrm{T}$. Let $\boldsymbol{L}^*\in \mathbb{R}^{K\times K}$ be the solution of the minimization problem
\begin{equation}
\min_{\boldsymbol{L}\succ 0:\ \ \max_i \mathbf{a}_i^\mathrm{T}\boldsymbol{L}\mathbf{a}_i\le 1} - \log \mathop{\rm det} \boldsymbol{L} .
\end{equation}
Matrix $\boldsymbol{L}^*$ defines the minimum volume ellipsoid centered at the origin that contains $\mathbf{a}_1,\dots,\mathbf{a}_n$.
The preconditioned SPA is defined by Algorithm~\ref{algo:SPA} initialized with $\boldsymbol{S}_0=(\boldsymbol{L}^*)^{1/2}\boldsymbol{M}^\mathrm{T}$
rather than with $\boldsymbol{S}_0=\boldsymbol{M}^\mathrm{T}$.
The SPOC algorithm for topic modeling is summarized in Algorithm~\ref{algo:SPOC}.
\begin{algorithm}
\caption{SPOC (respectively, preconditioned SPOC)}
\begin{algorithmic}[1]
\Require{Observed matrix \(\boldsymbol{X}\) and number of topics \(K\).}
\Ensure{Estimated document-topic matrix \(\hat{\boldsymbol{W}}\).}
\State Get the rank \(K\) SVD of \(\boldsymbol{X}\colon \hat{\probLeftEigenvectors} \hat{\probEigenvalues} \hat{\probRightEigenvectors}^{\mathrm{T}}\).
\State Run SPA (respectively, preconditioned SPA) with input \((\hat{\probLeftEigenvectors}, K)\), which outputs a set of indices \(J\) with cardinality \(K\).
\State Set \(\hat{\bf H}: = \hat{\probLeftEigenvectors}_J\).
\State Set \(\hat{\documentTopicMatrix}: = \hat{\probLeftEigenvectors} \hat{\bf H}^{-1}\).
\end{algorithmic}
\label{algo:SPOC}
\end{algorithm}
{Based on the SPOC estimator $\hat{\boldsymbol{W}}$ of matrix $\boldsymbol{W}$, it is possible to construct an estimator for matrix $\boldsymbol{A}$ in a straightforward way. Indeed, given the decompositions \eqref{svc:Pi} and \eqref{UWH}, we can use the definition $\boldsymbol{\Pi} = \boldsymbol{W} \boldsymbol{A}$ and deduce that $\boldsymbol{A} = \bf{H} \mathbf{L} \mathbf{V}^{\mathrm{T}}$. A direct sample-based estimator of~$\boldsymbol{A}$ is then given by
\begin{equation}
\label{A_estimate}
\hat {\boldsymbol{A}}= \hat{\bf{H}} \hat{\probEigenvalues} \widehat{\mathbf{V}}^{\mathrm{T}}.
\end{equation}
%
In order to illustrate the usefulness of this estimator, we have performed its experimental comparison with LDA, see Section~\ref{sec:topic_word_experiments} of the Appendix.}
\section{Main results
\label{sec:consistency}
In this section, we provide bounds on the performance of SPOC algorithm. We first prove deterministic bounds assuming that $\boldsymbol{X}$ is some fixed matrix close enough to $\boldsymbol{\Pi}$ in the spectral norm. Next, we combine these results with a concentration inequality for $\|\boldsymbol{X} - \boldsymbol{\Pi}\|$ when $\boldsymbol{X}$ is distributed according to $\mathbb{P}_{\boldsymbol{\Pi}}$ in order to obtain a bound on the estimation error with high probability under our statistical model.
\subsection{Deterministic bounds}
A key step in analyzing the performance of SPOC algorithm is to show that $\hat{\bf U}$ is close to an orthogonal transformation $\mathbf{U} \mathbf{O}$ of the population matrix $\mathbf{U}$.
The next lemma gives a bound on the maximal \(\ell_2\)-distance between the rows of \(\hat{\probLeftEigenvectors}\) and \(\mathbf{U} \mathbf{O}\) for some orthogonal matrix \(\mathbf{O}\),
which will allow us to deduce an upper bound on the error of SPA from the results of~\cite{Gillis2015,Mizutani2016} (see Appendix~\ref{sec:consistencySPA} for the details).
We state this lemma as a deterministic result where $\boldsymbol{X}$ is some fixed matrix close enough to $\boldsymbol{\Pi}$ in the spectral norm.
Recall that \(\lambda_{1}(\bW}%\pmb{\mathrm{\Theta}})\) is the maximum singular value of matrix \(\bW}%\pmb{\mathrm{\Theta}}\), $\lambda_{K}( \boldsymbol{\Pi})$ is the $K$th singular value of matrix $\boldsymbol{\Pi}$, and \(\kappa(\bW}%\pmb{\mathrm{\Theta}})\), \(\kappa(\boldsymbol{\Pi})\) are the condition numbers of matrices \(\bW}%\pmb{\mathrm{\Theta}}\) and $\boldsymbol{\Pi}$, respectively.
Assuming that $\lambda_{K}(\boldsymbol{\Pi})>0$ (that is, $\boldsymbol{\Pi}$ is a rank $K$ matrix) we define the values
\begin{EQA}[c]
\beta_{i}(\boldsymbol{X}, \boldsymbol{\Pi})
=
K^{1/2} \kappa^2(\boldsymbol{\Pi}) ~ \frac{\|\mathbf{e}_{i}^{\mathrm{T}} \boldsymbol{X}\|_{2} \|\boldsymbol{X} - \boldsymbol{\Pi}\|}{\lambda_{K}^{2}(\boldsymbol{\Pi})}
+
\frac{\|\mathbf{e}_{i}^{\mathrm{T}}(\boldsymbol{X} - \boldsymbol{\Pi}) \|_{2}}{\lambda_{K}(\boldsymbol{\Pi})},\quad i=1,\dots,n,
\end{EQA}
where
$(\mathbf{e}_1, \dots, \mathbf{e}_n)$ is the canonical basis of $\mathbb{R}^n$.
%
%
\begin{lemma}
\label{lemma:rowFactorBound}
Assume that $\boldsymbol{\Pi} \in \mathbb{R}^{n \times p}$ is a rank \(K\)
matrix,
and
$\boldsymbol{X} \in \mathbb{R}^{n \times p}$ is any matrix such that
\(\|\boldsymbol{X} - \boldsymbol{\Pi}\| \le \frac{1}{2} \lambda_{K}(\boldsymbol{\Pi})\). Let \(\hat{\probLeftEigenvectors}, \mathbf{U}\) be the \(n \times K\) matrices of left singular vectors
corresponding to the top \(K\) singular values of \(\boldsymbol{X}\) and \(\boldsymbol{\Pi}\), respectively. Then, there exist an orthogonal matrix \(\mathbf{O}\) and a constant $C>0$ such that, for any $i=1,\dots,n$,
\begin{EQA}
\label{eq:rowConcentr}
\|\mathbf{e}_{i}^{\mathrm{T}}(\hat{\probLeftEigenvectors} - \mathbf{U} \mathbf{O})\|_{2}
&\le&
C \beta_{i}(\boldsymbol{X}, \boldsymbol{\Pi}).
\end{EQA}
\end{lemma}
%
Define now
\begin{EQA}[c]
\label{eq:errorDef}
\beta(\boldsymbol{X}, \boldsymbol{\Pi}) = \max_{i =1, \dots, n} \beta_{i}(\boldsymbol{X}, \boldsymbol{\Pi}).
\end{EQA}
We will need the following condition.
\begin{assumption}
\label{cond:community memberships}For a constant $\bar C>0$ we have
\begin{EQA}[c]
\beta(\boldsymbol{X}, \boldsymbol{\Pi}) \leq \frac{\bar C}{\lambda_{1}(\boldsymbol{W}) \kappa(\boldsymbol{W}) {K}\sqrt{K}}.
\end{EQA}
\end{assumption}
Assumption~\ref{cond:community memberships} is satisfied with high probability for $\boldsymbol{X}\sim \mathbb{P}_{\boldsymbol{\Pi}}$ when the sample size $N$ is large enough (see Appendix~\ref{Appendix:proof-of-thm1}).
Under Assumption~\ref{cond:community memberships}, we can derive from Lemma~\ref{lemma:rowFactorBound} the following deterministic bound on the error of estimating the topic-document matrix by the SPOC algorithm.
%
\begin{lemma}
\label{lemma:documenTopicMatrixBound}
Let Assumptions~\ref{ass:anchorDoc} and~\ref{cond:community memberships} be satisfied with constant $\bar C$ small enough. Assume that $\boldsymbol{\Pi} \in \mathbb{R}^{n \times p}$ is a rank \(K\)
matrix,
and
$\boldsymbol{X} \in \mathbb{R}^{n \times p}$ is any matrix such that
\(\|\boldsymbol{X} - \boldsymbol{\Pi}\| \le \frac{1}{2} \lambda_{K}(\boldsymbol{\Pi})\). Then, {matrix $\hat{\bf{H}}$ is non-degenerate and} the preconditioned SPOC algorithm outputs matrix \(\hat{\documentTopicMatrix}\) such that
\begin{EQA}[c]
\min_{\boldsymbol{\mathrm{P}}\in \mathcal{P}} \|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\|_F \leq C K^{1/2} \left \{ \lambda^2_{\max}(\bW}%\pmb{\mathrm{\Theta}}) \kappa(\boldsymbol{W}) \beta + \frac{\kappa(\boldsymbol{\Pi})\lambda_{1}(\bW}%\pmb{\mathrm{\Theta}})\|\boldsymbol{X} - \boldsymbol{\Pi}\|}{\lambda_{K}(\boldsymbol{\Pi})}\right\},
\end{EQA}
where $\mathcal{P}$ denotes the set of all permutation matrices.
\end{lemma}
Inspection of the proof shows that, for this lemma to hold, it is enough to choose the constant $\bar C \le \min(C_*,C_0^{-1})$ where
$C_*,C_0$ are the constants from Theorem~\ref{theorem:spaBasic} and Corollary~\ref{corollary:consistencyBasis}.
\subsection{Bounds with high probability}\label{subsec:bounds with high}
Lemma~\ref{lemma:documenTopicMatrixBound} combined with a concentration inequality for $\|\boldsymbol{X} - \boldsymbol{\Pi}\|$ (cf. Lemma~\ref{lemma:spectralNormNoise} in the Appendix) allows us to derive a bound for the estimation error that holds with high probability when $\boldsymbol{X}$ is sampled from distribution $\mathbb{P}_{\boldsymbol{\Pi}}$. Introduce the value
\begin{EQA}[c]
\Delta(\boldsymbol{W}, \boldsymbol{\Pi}) = \left(\dfrac{\lambda_{1}(\bW}%\pmb{\mathrm{\Theta}})}{\lambda_{K}(\boldsymbol{\Pi})}\right)^2 \kappa(\boldsymbol{W}) \kappa^2(\boldsymbol{\Pi}).
\end{EQA}
The main result is summarized in the next theorem.
\begin{theorem}
\label{theorem:mainBound}
Let Assumption~\ref{ass:anchorDoc} hold,
and $N_i=N$ for $i=1,\dots,n$. Assume that $N \ge \log(n + p)$ and
\begin{equation}\label{cond:lambda}
\lambda_K(\boldsymbol{\Pi}) \ge \sqrt{\frac{10}{\bar C}}\, K\left(\dfrac{n \log(n + p)}{N}\right)^{1/4} {\kappa(\boldsymbol{\Pi})\sqrt{\lambda_{1}(\boldsymbol{W})
\kappa(\boldsymbol{W})}}.
\end{equation}
Then, with probability at least $1 - 2(n + p)^{-1}$, matrix $\hat{\bf{H}}$ is non-degenerate and the output \(\hat{\documentTopicMatrix}\) of preconditioned SPOC algorithm satisfies, for some constant ${\rm C}_1 >0$,
\begin{EQA}
\min_{\boldsymbol{\mathrm{P}}\in \mathcal{P}}\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{F}
&\le&
{\rm C}_1 K\sqrt{\dfrac{n \log(n+ p)}{N}} \Delta(\boldsymbol{W}, \boldsymbol{\Pi}),
\end{EQA}
where $\mathcal{P}$ denotes the set of all permutation matrices.
\end{theorem}
{Condition \eqref{cond:lambda} in Theorem~\ref{theorem:mainBound} guarantees that Assumption~\ref{cond:community memberships} is satisfied. This condition holds if $N$ is large enough and it quantifies the separation of the spectrum of matrix $\boldsymbol{\Pi}$ from zero.}
The bound of Theorem~\ref{theorem:mainBound} depends on the singular values of matrices \(\bW}%\pmb{\mathrm{\Theta}}\) and \(\boldsymbol{\Pi}\).
We now further detail this bound for the balanced case where matrices $\boldsymbol{W}$ and $\boldsymbol{\Pi}$ are well conditioned and the smallest non-zero singular value of $\boldsymbol{\Pi}$ is of the same order as the largest singular value of $\boldsymbol{W}$. It follows from Lemma~\ref{lemma:matrix_eigen} in the Appendix that in this case both $\lambda_{K}(\boldsymbol{\Pi})$ and $\lambda_{1}(\boldsymbol{W})$ are of the order of $\sqrt{n/K}$. This is coherent with the behavior of the singular values of $\boldsymbol{\Pi}$ and $\boldsymbol{W}$ that we observed in the simulation study (see Section~\ref{simulations_sv}). The balanced case is formally described by the following assumption.
\begin{assumption}\label{assumption_eigenvalues}
There exist two constants \(C > 1\) and $c > 0$
such that
\begin{equation*}
\lambda_{K}(\boldsymbol{\Pi}) \ge C \lambda_{1}(\boldsymbol{W}) \quad
\text{and}
\quad \max\left\{\kappa(\boldsymbol{\Pi}), \kappa(\boldsymbol{W})\right\} \le c.
\end{equation*}
\end{assumption}
The second condition in Assumption \ref{assumption_eigenvalues} is quite standard and just states that matrices $\boldsymbol{\Pi}$ and $\boldsymbol{W}$ are well-conditioned. The first condition is more restrictive. It holds, in particular, if matrix $\boldsymbol{A}$ is well-conditioned with large enough singular value $\lambda_{K}(\boldsymbol{A}) $. For example, it will be the case if $\boldsymbol{A}$ satisfies the {\it anchor word assumption} (see Section \ref{sec:intro}) with the probabilities of anchor words uniformly above the probabilities of other words. This is detailed in Lemma \ref{lem:anchor_word} of the Appendix. {Noteworthy, the lower bound of Theorem \ref{theorem:lower_bound} below is attained with such choice of matrix $\boldsymbol{A}$, see the proof of Theorem \ref{theorem:lower_bound} in Appendix \ref{sec:proof-of-lower-bound}. We can interpret it as the fact that, in a minimax sense, such matrices $\boldsymbol{A}$ are associated
with the least favorable models.}
The following corollary quantifies the behavior of SPOC estimator in the balanced case.
%
\begin{corollary}[Upper bound in the balanced case]
\label{corollary:mainBound}
Let Assumptions~\ref{ass:anchorDoc} and~\ref{assumption_eigenvalues} hold, and $N_i=N$ for $i=1,\dots,n$.
Let also
\begin{align}\label{eq:condition-on-N}
N & \ge C K^5
\log(n + p)
\end{align}
for some ${C}>0$ large enough.
Then, with probability at least $1 - 2(n + p)^{-1}$, matrix $\hat{\bf{H}}$ is non-degenerate and the output \(\hat{\documentTopicMatrix}\) of preconditioned SPOC algorithm satisfies, for some constant ${\rm C}_2 >0$,
\begin{EQA}[c
\min_{\boldsymbol{\mathrm{P}}\in \mathcal{P}}\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{F}
\le
{\rm C}_2 K \sqrt{\dfrac{n \log(n+ p)}{N}},
\end{EQA}
where $\mathcal{P}$ denotes the set of all permutation matrices.
\end{corollary}
%
To prove Corollary~\ref{corollary:mainBound}, it is enough to notice that under Assumption~\ref{assumption_eigenvalues} we have $\Delta(\boldsymbol{W}, \boldsymbol{\Pi})\le C'$ for some constant $C'>0$, and condition~\eqref{cond:lambda} follows from~\eqref{eq:condition-on-N}, Assumption~\ref{assumption_eigenvalues} and the inequality $\lambda_{1}(\boldsymbol{W})\ge \sqrt{n/K}$ (see Lemma~\ref{lemma:matrix_eigen} in the Appendix).
Note that from Theorem~\ref{theorem:mainBound} and Corollary~\ref{corollary:mainBound} we can derive bounds in other norms. Thus, using the inequalities { $\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{1}\leq \sqrt{Kn} \bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{F}$} and $\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{1, \infty}\leq \sqrt{K} \bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{F}$, we obtain the following corollary:
%
\begin{corollary}
\label{corollary:one-infty-norm}
If the assumptions of Theorem~\ref{theorem:mainBound} are satisfied then,
with probability at least $1 - 2(n + p)^{-1}$, matrix $\hat{\bf{H}}$ is non-degenerate and the output \(\hat{\documentTopicMatrix}\) of preconditioned SPOC algorithm satisfie
\begin{EQA}
\min_{\boldsymbol{\mathrm{P}}\in \mathcal{P}}\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{1,\infty}
&\le&
{\rm C}_1 K^{3/2}\sqrt{\dfrac{n \log(n+ p)}{N}} \Delta(\boldsymbol{W}, \boldsymbol{\Pi})\quad \text{and}\\ \min_{\boldsymbol{\mathrm{P}}\in \mathcal{P}}\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{1}
&\le&
{\rm C}_1 K^{3/2}n\sqrt{\dfrac{ \log(n+ p)}{N}} \Delta(\boldsymbol{W}, \boldsymbol{\Pi}).
\end{EQA}
If the assumptions of Corollary~\ref{corollary:mainBound} are satisfied then, with probability at least $1 - 2(n + p)^{-1}$, matrix $\hat{\bf{H}}$ is non-degenerate and the output \(\hat{\documentTopicMatrix}\) of preconditioned SPOC algorithm satisfie
\begin{EQA}[c]
\label{eq:vtor}
\min_{\mathbf{P}\in \mathcal{P}}
\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{1,\infty}
\le
{\rm C}_2 K^{3/2} \sqrt{\dfrac{n \log(n+p)}{N}}\quad \text{and}\quad \min_{\mathbf{P}\in \mathcal{P}}
\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{1}
\le
{\rm C}_2 K^{3/2}n \sqrt{\dfrac{ \log(n+p)}{N}}
\end{EQA}
\end{corollary}
It follows from Corollaries \ref{corollary:mainBound} and
\ref{corollary:one-infty-norm} that, for all the considered norms, the rate of estimating $\boldsymbol{W}$ (to within a weak factor) is determined by two parameters, which are the number of documents $n$ and the sample size $N$. The dependency on the size of the dictionary $p$ is weak. This is confirmed by the numerical experiments, see Section \ref{sec:simulations}.
\subsection{Adaptive procedure when $K$ is unknown.}
We now propose an adaptive variant of the SPOC algorithm when the number of topics $K$ is unknown. It is obtained by replacing $K$ in Algorithm \ref{algo:SPOC} by the estimator
$$
\hat K = \max\Big\{j: \ \lambda_j(\boldsymbol{X})>4 \sqrt{\dfrac{n \log(n+p)}{N}} \Big\}.
$$
In the sequel, the resulting procedure will be called the adaptive (preconditioned) SPOC algorithm. The following analogs of Theorem~\ref{theorem:mainBound} and Corollary~\ref{corollary:mainBound} hold.
%
\begin{theorem}
\label{theorem:mainBound-adapt}
Let the assumptions of Theorem~\ref{theorem:mainBound} be satisfied and
\begin{equation}\label{cond:lambda-adapt}
\lambda_{1}(\boldsymbol{W}) > \frac{32 \bar C}{5 K^2}\, \sqrt{\dfrac{n \log(n+p)}{N}} .
\end{equation}
Then, with probability at least $1 - 2(n + p)^{-1}$, matrix $\hat{\bf{H}}$ is non-degenerate, {$\hat K=K$,} and the output \(\hat{\documentTopicMatrix}\) of the adaptive preconditioned SPOC algorithm satisfie
\begin{EQA}
\min_{\boldsymbol{\mathrm{P}}\in \mathcal{P}}\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{F}
&\le&
{\rm C}_1 K \sqrt{\dfrac{n \log(n+ p)}{N}} \Delta(\boldsymbol{W}, \boldsymbol{\Pi}).
\end{EQA}
\end{theorem}
%
\begin{corollary}
\label{corollary:mainBound-adapt}
Let the assumptions of Corollary~\ref{corollary:mainBound} and \eqref{cond:lambda-adapt} be satisfied. Then, with probability at least $1 - 2(n + p)^{-1}$, matrix $\hat{\bf{H}}$ is non-degenerate, {$\hat K=K$,} and the output \(\hat{\documentTopicMatrix}\) of the adaptive preconditioned SPOC algorithm satisfie
\begin{EQA}[c]
\label{eq:vtor}
\min_{\mathbf{P}\in \mathcal{P}}
\bigl\|\hat{\documentTopicMatrix} - \bW}%\pmb{\mathrm{\Theta}} \boldsymbol{\mathrm{P}}\bigr\|_{F}
\le
{\rm C}_2 K \sqrt{\dfrac{n \log(n+p)}{N}}.
\end{EQA}
\end{corollary}
Note that condition \eqref{cond:lambda-adapt} introduced in Theorem~\ref{theorem:mainBound-adapt} and Corollary~\ref{corollary:mainBound-adapt} additionally to the conditions of Theorem~\ref{theorem:mainBound} and Corollary~\ref{corollary:mainBound} is rather mild. Indeed, due to inequality \eqref{eq:matrix_property2} proved in the Appendix we have $\lambda_{1}(\boldsymbol{W})\ge \sqrt{n/K}$.
Therefore, it is sufficient that $N> \frac{C\log(n+p)}{K^3}$ to grant \eqref{cond:lambda-adapt}.
\subsection{Minimax lower bound}
The following lower bound shows that the rate obtained in Corollary~\ref{corollary:mainBound} is near minimax optimal. Denote by $\mathcal{M}$ the class of all matrices $\boldsymbol{\Pi}$ satisfying the assumptions stated in the Section \ref{sec:intro} and Assumption~\ref{assumption_eigenvalues}.
\begin{theorem}[Lower bound]
\label{theorem:lower_bound}
Assume that $N_i=N$ for $i=1,\dots,n$ and $2\leq K\leq \min( p/4,N/2,{n/2})$.
Then, there exist two constants $C >0$ and $c \in ( 0,1)$ such that, for any estimator and ${\overline{\boldsymbol{W}}}$ of $\boldsymbol{W}$ we have
\begin{align}\label{inf_bnd_l2}
\sup_{\boldsymbol{\Pi}\in \mathcal{M}} \mathbb{P}_{\boldsymbol{\Pi}}
\bigg\{\min_{\mathbf{P}\in \mathcal{P}}\|\overline{\boldsymbol{W}} - \boldsymbol{W}\mathbf{P}\|_F \geq C \sqrt{\frac{n}{N}} \bigg\}
\geq c,
\end{align}
and
\begin{align}\label {inf_bnd_l1}
\sup_{\boldsymbol{\Pi}\in \mathcal{M}} \mathbb{P}_{\boldsymbol{\Pi}}
\bigg\{\min_{\mathbf{P}\in \mathcal{P}}\|\overline{\boldsymbol{W}} - \boldsymbol{W}\mathbf{P}\|_1 \geq Cn \sqrt{\frac{K}{N}} \bigg\}
\geq c,
\end{align}
where $\mathcal{P}$ denotes the set of all permutation matrices.
\end{theorem}
Combining Corollary~\ref{corollary:mainBound} and \eqref{inf_bnd_l2} we find that, to within a weak factor, the minimax optimal rate of estimation of $\boldsymbol{W}$ on the class $\mathcal{M}$ in the Frobenius norm scales as $\sqrt{n/N}$. On the other hand, \eqref{inf_bnd_l1} and Corollary~\ref{corollary:one-infty-norm} imply that, again to within a weak factor, the minimax optimal rate of estimation of $\boldsymbol{W}$ in the $l_1$-norm on $\mathcal{M}$ scales as $n/\sqrt{N}$.
{
\begin{remark}
\label{rem1}
Inspection of the proof of Theorem \ref{theorem:lower_bound} shows that the lower bound is in fact established for a subset of $\mathcal{M}$ composed of matrices satisfying both anchor word and anchor document assumptions.
\end{remark}
%
\begin{remark}\label{rem2}
It is proved in~\cite{Ke2017,bing2018fast} that, under the same model of observations and anchor word assumption, the minimax optimal rate for estimation of matrix $\boldsymbol{A}$ in the $\ell_1$-norm
scales as $\sqrt{\frac{p}{nN}}$ (to within weak factors).
Note that this rate is determined by all the three main parameters of the problem - the size of the dictionary $p$, the number of documents $n$ and the sample size $N$.
This is quite different from the minimax $\ell_1$-rate $n/\sqrt{N}$ of estimation $\boldsymbol{W}$, which remains valid under anchor word assumption, cf. Remark \ref{rem1} and the remark after Assumption \ref{assumption_eigenvalues}.
It shows that there is a significant difference between the problems of estimating matrices $\boldsymbol{A}$ and $\boldsymbol{W}$ in topic models.
\end{remark}
}
\section{Related Work}
\label{sec:comparison}
There exists an extensive literature on topic modeling and several algorithms have been proposed for estimation of matrices $\boldsymbol{A}$ and $\boldsymbol{W}$. As the problem of recovering these two matrices when there is no noise is an instance of non-negative matrix factorisation several papers propose algorithms based on minimization of a regularized cost function, see, e.g., \cite{lee99,Donoho2004,Cichocki2009,Recht2012}. Such methods result in non-convex optimization and often fail when many words do not appear in a single document, that is when $N\ll p$.
Another approach is to use Bayesian methods such as the popular \textit{Latent Dirichlet Allocation} (LDA) introduced in~\cite{blei2003latent}.
LDA proceeds by imposing a Dirichlet prior on $\boldsymbol{A}$ and then computing an estimator of $\boldsymbol{W}$ by a variational EM-algorithm. The original paper~\cite{blei2003latent} and the subsequent line of work do not provide statistical guarantee on the recovery of $\boldsymbol{W}$. In~\cite{blei2003latent}, the authors argue that {LDA} avoids two issues of the {pLSI} that are the risk of overfitting and the difficulty of classifying a new document outside the corpus. Yet, {LDA} is computationally slow and makes the assumption that topics are uncorrelated, which may be not realistic~\cite{blei2007correlated,li2006pachinko}. This last issue has been addressed in~\cite{lafferty2006correlated} by introducing \textit{Correlated topic models}. LDA has been extended to relax some assumptions such as the \textit{bag-of-words} hypothesis (``order of words does not matter'')~\cite{wallach2006topic}, the exchangeability of documents (``topics do not vary in time'')~\cite{blei2006dynamic}, the assumption that the number of topics is known~\cite{teh2005sharing}. Also, to recover $\boldsymbol{W}$ in the LDA setting, some papers used Gibbs-sampling~\cite{ramage2009labeled, porteous2008fast} or variational Bayes techniques~\cite{zhai2012mr,chien2010dirichlet} rather than the EM-algorithm. However, these works do not provide statistical guarantees on the estimation of $\boldsymbol{W}$ and the associated algorithms are computationally slow.
{
For the problem of estimation of matrix $\boldsymbol{A}$, papers~\cite{arora2012learning,anandkumar2012spectral,arora2013practical,Ding2013,anandkumar2014tensor,bansal2014provable,Ke2017,bing2018fast}, to mention but a few, provided algorithms with provable statistical guarantees under {\it anchor word assumption}. They proposed various techniques based, for example, on analyzing co-occurrence matrices, tensors, or on recovering vertices of a simplex using SVD. Most of these papers, except for~\cite{Ke2017, bing2018fast}, do not work under the same statistical model as ours (cf. Section \ref{sec:intro}). Thus, \cite{arora2012learning,arora2013practical,Ding2013} assume that topic-document matrix $\boldsymbol{W}$ is randomly generated from some prior distribution. For a setting with no randomness, \cite{Mizutani14} proposes ellipsoidal rounding algorithm with application to topic models.
Paper~\cite{mao2018overlapping} develops a generalized method to bind overlapping clustering models, including topic models. Moreover, for some classes of matrices, papers~\cite{Ke2017, bing2018fast} proposed minimax optimal algorithms of estimating $\boldsymbol{A}$. Both~\cite{Ke2017, bing2018fast} impose {\it anchor word assumption} but their estimators are different. Thus, ~\cite{Ke2017} performs SVD on properly normalized matrix $\boldsymbol{X}$ followed by an exhaustive search over a $p$-dimensional simplex, while ~\cite{bing2018fast} proceeds by first recovering the anchor words and then deriving estimators of $\boldsymbol{A}$ from a scaled version of matrix $\boldsymbol{X} \boldsymbol{X}^\mathrm{T}$.
}
\section{Simulations}
\label{sec:simulations}
\subsection{Synthetic Data}
We first present the results of experiments on synthetic data.
We have performed simulations with different values of the parameters $n,p,N$ and the number of topics $K$. Our objective was to observe the effect of each parameter on the Frobenius error between $\boldsymbol{W}$ and its estimator $\hat{\boldsymbol{W}}$ obtained by the SPOC algorithm. We report the results for the SPOC algorithm without preconditioning step as it had a negligible impact on the performance of the method while being computationally demanding. As a benchmark, we use the LDA algorithm~\cite{blei2003latent}. For the experiments we use the Python implementation of SPOC\footnote{The code of SPOC algorithm is available at https://github.com/stat-ml/SPOC} and an implementation of the LDA algorithm available in Sklearn~\cite{scikit-learn}.
Figures~\ref{fig:fig_n_1}-\ref{fig:fig_K_1} present an example of results that we have typically obtained in simulations. In Figures~\ref{fig:fig_n_1}-\ref{fig:fig_p_1} we take $K=3$ and the matrix $\boldsymbol{W}$ has the following structure: $K$ rows of $\boldsymbol{W}$ are canonical basis vectors, each of the remaining $n-K$ rows is generated independently using the Dirichlet distribution with parameter $\alpha = (0.1,0.15,0.2)$. In Figure~\ref{fig:fig_K_1}, where $K$ must vary, we define $\boldsymbol{W}$ in a different way. Namely, for the $n-K$ rows that are not canonical basis vectors, each element \(W_{kj}\) is generated from the uniform distribution on $[0, 1]$ and then each row of the matrix is normalized so as to have \(\sum_{k = 1}^K W_{ik} = 1\). For the matrix $\boldsymbol{A}$, we take $K$ columns proportional to canonical basis vectors. The elements \(A_{kj}\) of matrix \(\boldsymbol{A}\) in the remaining $p-K$ columns are obtained by generating numbers from the uniform distribution on $[0, 1]$ and then normalizing each row of the matrix to have \(\sum_{j = 1}^p A_{kj} = 1\). For given $\boldsymbol{W}$ and $\boldsymbol{A}$, the data matrix $\boldsymbol{X}$ is generated according to the pLSI model defined in Section~\ref{sec:intro}.
For each value on the $x$-axes of the figures, we present the averaged result over 10 simulations.
We clearly retrieve the patterns indicated in Theorem~\ref{theorem:mainBound}, Corollary~\ref{corollary:mainBound} and \eqref{inf_bnd_l2}. Thus, the plots have a near \(\sqrt{n}\) behaviour in Figure~\ref{fig:fig_n_1} and a near \(1 / \sqrt{N}\) behaviour in Figure~\ref{fig:fig_N_1}. Figure~\ref{fig:fig_p_1} shows weak dependence of the error of the SPOC algorithm on the size of the dictionary \(p\), which agrees with the bound obtained in Corollary~\ref{corollary:mainBound}.
{This can be interpreted as one of the advantages of our method over LDA. Indeed, for LDA we observe that the error increases significantly as $p$ grows.} Finally, we notice the linear dependence of the error on \(K\) as predicted by Corollary~\ref{corollary:mainBound}.
In all the experiments we observe that SPOC algorithm is very competitive with LDA while being much more stable.
\begin{figure}[t]
\centering
\includegraphics[scale=0.3]{depn1.png}
\caption{The $n$-dependency of {$\min_{\mathbf{P}\in \mathcal{P}}\|\boldsymbol{W} - \hat{\boldsymbol{W}}\mathbf{P}\|_F$} using SPOC and LDA algorithms.
Total number of words $p=5000$, number of sampled words in each document $N=200$.
}
\label{fig:fig_n_1}
\end{figure}
\begin{figure}[H]
\centering
\includegraphics[scale=0.3]{depNsampled1.png}
\caption{The $N$-dependency of {$\min_{\mathbf{P}\in \mathcal{P}}\|\boldsymbol{W} - \hat{\boldsymbol{W}}\mathbf{P}\|_F$} using SPOC and LDA algorithms.
Total number of words $p=5000$, number of documents $n=1000$.
}
\label{fig:fig_N_1}
\end{figure}
\begin{figure}[H]
\centering
\includegraphics[scale=0.3]{depp1.png}
\caption{The $p$-dependency of {$\min_{\mathbf{P}\in \mathcal{P}}\|\boldsymbol{W} - \hat{\boldsymbol{W}}\mathbf{P}\|_F$} using SPOC and LDA algorithms.
{Number of documents} $n=1000$, number of sampled words in each document $N=200$.
}
\label{fig:fig_p_1}
\end{figure}
\begin{figure}[H]
\centering
\includegraphics[scale=0.3]{depk1.png}
\caption{The $K$-dependency of {$\min_{\mathbf{P}\in \mathcal{P}}\|\boldsymbol{W} - \hat{\boldsymbol{W}}\mathbf{P}\|_F$} using SPOC and LDA algorithms.
Total number of words $p=5000$, number of sampled words in each document $N=5000$.
}
\label{fig:fig_K_1}
\end{figure}
A numerical study of the SPOC estimator $\hat {\boldsymbol{A}}$ of matrix $\boldsymbol{A}$ is deferred to Section~\ref{sec:topic_word_experiments} of the Appendix. It shows that $\hat {\boldsymbol{A}}$ behaves similarly to the corresponding LDA estimator while being more stable.
\subsection{Corpus of NIPS abstracts}
We now illustrate the performance of our algorithm applying it to the data set
of full texts of NIPS papers\footnote{The link to the dataset: https://archive.ics.uci.edu/ml/datasets/NIPS+Conference+Papers+1987-2015}~\cite{Perrone2016Nips}.
This data set contains the distribution of words in the full text of the NIPS conference papers published from 1987 to 2015. The data set has the form of a $11463 \times 5811$ matrix of word counts containing $11463$ words and $5811$ NIPS conference papers. Each column contains the number of times each word appears in the corresponding document.
We start by pre-processing the data. We first remove all the documents with less than 150 words. Then we remove from the resulting dictionary the stop words and the words that appear in less that 150 documents. This results in a database of $5801$ documents with a dictionary of $6380$ words.
Note that we do not actually have access to the true topics of each document. We also do not have access to the true number of topics. In order to compare our method to LDA, we proceeded as follows. For each value of $K = 3, \dots, 10$, we first computed the LDA estimator $\tilde{\boldsymbol{W}}$ of the document-topic matrix and the LDA estimator $\tilde{\boldsymbol{A}}$ of the topic-word matrix. Next, with the underlying matrix $\tilde{\boldsymbol{\Pi}}=\tilde{\boldsymbol{W}}\tilde{\boldsymbol{A}}$, for each value of $K$ we simulated 10 matrices $\tilde{\boldsymbol{X}}$ with $N=200$ sampled words {according to pLSI model}. For each matrix $\tilde{\boldsymbol{X}}$, we estimated $\tilde{\boldsymbol{W}}$ using both LDA and SPOC algorithms. Finally, for each $K$ we computed the mean error over 10 simulations. The resulting comparison as function of $K$ is presented in Figure~\ref{fig:fig_K_2}. We can observe that SPOC systematically outperforms the LDA algorithm, except for $K = 2$.
\begin{figure}[H]
\centering
\includegraphics[scale=0.3]{semi-simul.png}
\caption{The $K$-dependency of {$\min_{\mathbf{P}\in \mathcal{P}}\|\boldsymbol{W} - \hat{\boldsymbol{W}}\mathbf{P}\|_F$} using SPOC and LDA algorithms on semi-synthetic data. Matrix $\tilde{\boldsymbol{W}}$ is the LDA estimator on the NIPS data set ($n=5081$ documents, $p=6380$ words), and $\hat{\boldsymbol{W}}$ is the LDA or SPOC estimator on data simulated from
$\tilde{\boldsymbol{\Pi}}$.
}
\label{fig:fig_K_2}
\end{figure}
Next, we investigate whether our estimator of matrix $\boldsymbol{W}$ helps to well classify the documents in the NIPS corpus. We apply the simplest possible classifier based on the obtained SPOC estimator~$\hat{\boldsymbol{W}}$, namely, we classify article $i$ to the topic that has the maximum value of $\hat{W}_{ik}$ for $k = 1, \dots, K$. We consider the number of topics $K = 3$. While apparently for NIPS papers some words (such as ``learning'' or ``model'') are more frequent than others in the full corpus, other words can be more frequent for particular topics. Therefore, for each topic we present the words that have the highest difference {between their frequency for this topic and their maximum frequency in other topics}. We clearly see that the obtained topics are semantically well separated, cf. Table~\ref{tab:topics}.
\begin{table}[H]
\centering
\caption{Top 10 words, which have the highest difference in frequency for each topic compared to other topics. The three topics were identified by SPOC method.}
\begin{tabular}{|c|c|c|c|}
\hline
& ``Neural networks'' & ``{Statistical}
learning'' & ``Algorithms and theory''
\\
\hline
1 & network & model & algorithm
\\
\hline
2 & input & data & learning
\\
\hline
3 & neural & image & function
\\
\hline
4 & neurons & distribution & problem
\\
\hline
5 & units & inference & set
\\
\hline
6 & output & likelihood & theorem
\\
\hline
7 & layer & latent & bound
\\
\hline
8 & neuron & prior & matrix
\\
\hline
9 & system & Gaussian & loss
\\
\hline
10 & synaptic & parameters & error
\\
\hline
\end{tabular}
\label{tab:topics}
\end{table}
\section{Conclusion}
\label{sec:discussion}
In the present paper, we proposed the SPOC algorithm, which is a computationally efficient procedure to estimate the document-topic matrix in topic models with known or unknown number of topics $K$. It is based on the Successive Projection Algorithm used to recover the vertices of a $K$-dimensional simplex in the context of separable matrix factorization. We developed the statistical analysis of SPOC algorithm under the \textit{anchor document assumption} requiring that, for each topic, there is a document devoted solely to this topic. We proved that the proposed method is near minimax optimal for estimation of the document-topic matrix under the Frobenius norm and the $\ell_1$-norm.
As an element of our analysis, we derived a bound on concentration of matrices with independent multinomial columns that may be of independent interest. The theoretical results are supported by empirical evidence demonstrating a good performance of the SPOC algorithm and its advantages compared to LDA.
\medskip
{\bf Acknowledgement.} The research of Suzanne Sigalla and Alexandre B. Tsybakov is supported by the grant of French National Research Agency (ANR) "Investissements d'Avenir" LabEx Ecodec/ANR-11-LABX-0047.
|
\section{#1}}
\def\thesection.\arabic{equation}{\thesection.\arabic{equation}}
\newcommand{\newcommand}{\newcommand}
\newcommand{\parent}[1]{$[\![#1]\!]$}
\newtheorem{theorem}{Theorem}[section]
\newtheorem{lemma}{Lemma}[section]
\newtheorem{example}{Example}[section]
\newtheorem{corollary}{Corollary}[section]
\newtheorem{proposition}{Proposition}[section]
\newtheorem{remark}{Remark}[section]
\newtheorem{definition}{Definition}[section]
\newtheorem{assumption}{Assumption}[section]
\newtheorem{guess}{Conjecture}
\newenvironment{pf-main}{{\sc Proof of Theorem \ref{mainresult}.}\hspace{3mm}}{\qed}
\DeclareMathOperator{\sgn}{sgn}
\DeclareMathOperator{\interior}{int}
\newcommand{\red}[1]{{\color{red}#1}}
\newcommand{\jul}[1]{\marginpar{\color{red}\textbf{Julien: } #1}}
\newcommand{\cadlag}{c\`{a}dl\`{a}g } \newcommand{\ba}{\begin{array}}
\newcommand{\ea}{\end{array}} \newcommand{\be}{\begin{equation}}
\newcommand{\ee}{\end{equation}} \newcommand{\bea}{\begin{eqnarray}}
\newcommand{\eea}{\end{eqnarray}} \newcommand{\bean}{\begin{eqnarray*}}
\newcommand{\eean}{\end{eqnarray*}} \newcommand{\bu}{\bullet} \newcommand{\nn}{\nonumber}
\newcommand{\cA}{{\mathcal A}} \newcommand{\cB}{{\mathcal B}} \newcommand{\cC}{{\mathcal
C}} \newcommand{\cD}{{\mathcal D}} \newcommand{\bbD}{\mathbb{D}}
\newcommand{\cG}{{\mathcal G}} \newcommand{\cF}{{\mathcal F}} \newcommand{\cS}{{\mathcal
S}} \newcommand{\cU}{{\mathcal U}} \newcommand{\cH}{{\mathcal H}}
\newcommand{\cK}{{\mathcal K}}\newcommand{\cL}{{\mathcal L}} \newcommand{\cM}{{\mathcal
M}} \newcommand{\cO}{{\mathcal O}} \newcommand{\cT}{{\mathcal T}} \newcommand{\cP}{{\mathcal P}} \newcommand{\cW}{{\mathcal W}}
\newcommand{\bbE}{\mathbb{E}} \newcommand{\tbA}{\tilde{\bbA}}\newcommand{\bbA}{\mathbb{A}}\newcommand{\bbF}{\mathbb{F}}
\newcommand{\bbEQ}{\mathbb{E}_{\mathbb{Q}}} \newcommand{\eps}{\varepsilon}
\newcommand{\bbEP}{\mathbb{E}_{\mathbb{P}}}\newcommand{\bbL}{\mathbb{L}}
\newcommand{\what}{\widehat} \newcommand{\bbP}{\mathbb{P}} \newcommand{\bbQ}{\mathbb{Q}}
\newcommand{\del}{\partial} \newcommand{\Om}{\Omega} \newcommand{\om}{\omega}
\newcommand{\bbR}{\mathbb{R}} \newcommand{\bbN}{\mathbb{N}} \newcommand{\fps}{$(\Om, \cF,
(\cF_t)_{t\geq 0}, \bbP)$} \newcommand{\bbC}{\mathbb{C}}
\newcommand{\bfr}{\begin{flushright}} \newcommand{\efr}{\end{flushright}}
\newcommand{\dXt}{\Delta X_{t}} \newcommand{\dXs}{\Delta X_{s}}
\newcommand{\bs}{\blacksquare} \newcommand{\dX}{\Delta X} \newcommand{\dY}{\Delta Y}
\newcommand{\dnkx}{\left(X(T^{n}_{k})-X(T^{n}_{k-1})\right)}
\newcommand{\esssup}{\mathrm{ess}\mbox{ }\mathrm{sup}}
\newcommand{\essinf}{\mathrm{ess}\mbox{ } \mathrm{inf}}
\newcommand{\dhats}{\widehat{\delta_s}} \newcommand{\half} {\frac{1}{2}}
\newcommand{\elr}{(\ell,r)}
\newcommand{\wXn}{\what{X}_{t_n}}\newcommand{\wXnp}{\what{X}_{t_{n+1}}}\newcommand{\wXt}{\what{X}_{t}}\newcommand{\wXs}{\what{X}_{s}}
\newcommand{\wYn}{\what{Y}_{t_n}}\newcommand{\wYnp}{\what{Y}_{t_{n+1}}}\newcommand{\wYt}{\what{Y}_{t}}
\def\langle{\langle}
\def\rangle{\rangle}
\newcommand{\ol}{\overline}
\def\rightarrow{\rightarrow}
\def\Rightarrow{\Rightarrow}
\newcommand{\chf}{\mbox{$\mathbf1$}}
\begin{document}
\title{Speeding up the Euler scheme for killed diffusions}
\author{Umut \c{C}et\.in}
\address{Department of Statistics, London School of Economics and Political Science, 10 Houghton st, London, WC2A 2AE, UK}
\email{<EMAIL>}
\author{Julien Hok}
\address{Investec Bank, 30 Gresham St, London EC2V 7QN}
\email{<EMAIL>}
\address{}
\date{\today}
\begin{abstract}
Let $X$ be a linear diffusion taking values in $(\ell,r)$ and consider the standard Euler scheme to compute an approximation to $\bbE[g(X_T)\chf_{[T<\zeta]}]$ for a given function $g$ and a deterministic $T$, where $\zeta=\inf\{t\geq 0: X_t \notin (\ell,r)\}$. It is well-known since \cite{GobetKilled} that the presence of killing introduces a loss of accuracy and reduces the weak convergence rate to $1/\sqrt{N}$ with $N$ being the number of discretisatons. We introduce a drift-implicit Euler method to bring the convergence rate back to $1/N$, i.e. the optimal rate in the absence of killing, using the theory of recurrent transformations developed in \cite{rectr}. Although the current setup assumes a one-dimensional setting, multidimensional extension is within reach as soon as a systematic treatment of recurrent transformations is available in higher dimensions.
\noindent {\bf Keywords:} diffusions with killing, Euler-Maruyama scheme, drift-implicit scheme, weak convergence, recurrent transformations, strict local martingales, Kato classes, barrier options.
\end{abstract}
\maketitle
\section{Introduction}
Let $X$ be a diffusion on some filtered probability space taking values in $(\ell,r)$ and solving
\be \label{i:X}
X_t=x+ \int_0^t\sigma(X_s)dB_s+ \int_0^tb(X_s)ds, \quad t <\zeta,
\ee
where $B$ is a Brownian motion, and $\zeta:=\inf\{t\geq 0: X_t \notin (\ell,r)\}$ is the first exit time from the interval $(\ell,r)$. The process is {\em killed} at $\zeta$ and sent to a cemetery state.
Let's assume that at least one of the boundaries are accessible and $\zeta$ is finite a.s. and consider $\bbE[g(X_T)\chf_{[T<\zeta]}]$ for a given function $g$ and a deterministic $T$. Letting $g$ take the value $0$ at the cemetery state, one can rewrite this expression in terms of the {\em killed} diffusion as $\bbE[g(X_T)\chf_{[T<\zeta]}]$. Such computations appear very naturally in many applied problems of science, engineering, and finance. For instance, in Mathematical Finance theory, such an expectation corresponds to the price of a barrier option with payoff $g$ and maturity $T$ written on a stock whose price process is given by $X$. The barrier feature renders the option worthless if the stock price hits one of the accessible boundaries before the maturity of the option.
A closed form expression for $\bbE[g(X_T)\chf_{[T<\zeta]}]$ is rarely available even in this one-dimensional setting. Thus, one needs to resort to an approximation scheme for an answer. Arguably the easiest approach is to run a standard Euler-Maruyama scheme on the SDE (\ref{i:X}) by setting
\[
\bar{X}_{t_{n+1}} =\bar{X}_{t_n} +\sigma(\bar{X}_{t_n})(B_{t_{n+1}}-B_{t_n}) + b(\bar{X}_{t_n}) \frac{T}{N},\]
where $\bar{X_0}=x$, $t_0=0$, $N>0$ is an integer, $t_n=\frac{nT}{N}$ for $n=1, \ldots N$, and compute $\bbE[g(\bar{X}_T)\chf_{[T<\tau]}]$, where $\tau$ is the first time that the discrete-time process $(\bar{X}_{t_{n}})_{n=0}^N$ hits any of the barriers. Under standard regularity conditions on the diffusion process and $g$, such a scheme indeed converges as $N\rightarrow \infty$. However, it converges at a rate much slower than a standard Euler-Maruyama scheme applied to a diffusion process that is not killed at accessible boundaries.
Indeed it was shown by Gobet \cite{GobetKilled} that under standard hypothesis the above scheme for the killed diffusion converges weakly at rate $N^{-1/2}$ as opposed to $N^{-1}$, which is the rate of weak convergence for the Euler-Maruyama scheme in the absence of killing (see, e.g., Talay and Tubaro \cite{TTeuler} or Mikulevi\v{c}ius and Platen \cite{MPEuler}). This rate is optimal since it is reached when $X$ is a Brownian motion and $g$ is an indicator function of a set strictly contained in $(\ell,r)$ (see Siegmund and Yuh \cite{SYbmkilled}).
\c{C}etin \cite{rectr} conjectured that using a {\em recurrent transformation} would bring the convergence rate back to $N^{-1}$. A recurrent transformation at heart is a change of measure that keeps the Markovian structure intact while transforming the process into a recurrent one. In particular $X$ never touches the boundaries of $(\ell,r)$ under the new measure $\bbQ$. \cite{rectr} shows that $\bbQ$ is locally absolutely continuous with respect to the original measure $\bbP$, and $X$ follows
\be \label{i:Xrtr}
dX_t=\sigma(X_t)dW_t + \left(b(X_t)+\sigma^2(X_t)\frac{h'}{h}(X_t)\right)dt,
\ee
for some function $h$ and a $\bbQ$-Brownian motion $W$. That the above claim was a conjecture and not following immediately from the standard results on Euler-Maruyama schemes is that $\frac{h'}{h}$ is explosive near boundaries and is not Lipschitz, which is in fact needed for $X$ not to touch the previously accessible boundaries after the measure change. This can create significant difficulties with approximation and may even lead to divergence (see, e.g., the potential issues that may arise with non-Lipschitz drivers and methods on how to resolve them in \cite{HJK1} and \cite{HJK2}).
In this paper we prove this conjecture with a slight ``twist.'' Note that if one applies the Euler-Maruyama scheme naively to (\ref{i:Xrtr}), one obtains, as usual, a Brownian motion with drift whose parameters change at times of discretisation. This process will hit finite boundaries with positive probability, and therefore will exit the state space of $X$ with positive probability. One way to overcome this is to impose an ad hoc reflection on the boundaries. However, this will introduce a local time term in computations requiring additional estimates on its convergence rate to $0$. Moreover, it is far from obvious that reflection is the optimal resolution of problems arising from the discretised process exiting the domain.
We instead study a drift-implicit method that keeps the state space intact after discretisation. To see this, suppose that $b\equiv 0$, which can be obtained by changing the scale if necessary, and consider the backward Euler-Maruyama scheme
\be \label{i:BEM}
\what{X}_{t_{n+1}} =\what{X}_{t_n} +\sigma(\what{X}_{t_n})(B_{t_{n+1}}-B_{t_n}) + \frac{T}{N}\sigma^2(\what{X}_{t_n})\frac{h'}{h}(\wXnp),
\ee
where $h$ becomes a concave function.
Note that different than what one would expect from a backward scheme (see, e.g. Mao and Szpruch \cite{MSbem}, Alfonsi \cite{AlfCIR1}, Alfonsi \cite{AlfCIR2}, and Neunkirch and Szpruch \cite{NSimp} to name a few) the $\sigma^2$-term in the drift of (\ref{i:Xrtr}) is still evaluated at $\wXn$. This stems from the fact that (\ref{i:Xrtr}) with $b\equiv 0$ should be viewed as a time-changed version of
\[
dY_t=dW_t +\frac{h'}{h}(Y_t)dt,
\]
where the time change is given by $\int_0^t\sigma^2(Y_s)ds$. We make an extensive use of this correspondence in our proofs.
Our main result is Theorem \ref{t:main} which proves that the rate of weak convergence of the above backward Euler-Maruyama scheme is $N^{-1}$ under standard assumptions on the diffusion process. Moreover, there is no single $h$ function that achieves this rate. We show that any nonnegative concave $h$ vanishing at accessible boundaries can be used to obtain this convergence rate as long as it satisfies some mild growth conditions. Such functions are easy to construct and we study in Section \ref{s:numerics} the construction of some particular $h$-functions to compute approximate prices for barrier options in a Black-Scholes framework. Our numerical results are very promising and error terms very rapidly converge to $0$ even with a small number of iterations. Moreover, in the case of a particular local volatility model with double barriers, our method yields smaller error terms than the so-called {\em Brownian bridge method} when the number of discretisations is reasonably large.
We are not the first to consider implicit schemes for studying diffusions with infinite lifetime and taking values in a strict subset of $\bbR$. Alfonsi in \cite{AlfCIR1, AlfCIR2} and Neunkirch and Szpruch \cite{NSimp} consider such scalar processes whose SDE representation is given by
\be \label{i:ASimp}
dY_t= dW_t + f(Y_t)dt,
\ee
and $f$ satisfying the conditions of a Feller test ensuring that $Y$ takes values in $(\ell,r)$ (see also \cite{DNScir} in the special case of Cox-Ingersoll-Ross (CIR) process). \cite{AlfCIR2} and \cite{NSimp} show that a the drift implicit Euler scheme for $Y$ converge strongly with rate $N^{-1}$ if $f$ satisfies certain integrability conditions including
\be \label{i:condimp}
\bbE^{\bbQ}\left[\int_0^T(f'(Y_t))^2dt\right]<\infty.
\ee
However, this condition cannot be satisfied by $h$ that paves the way for recurrent transformation rendering $X$ recurrent and following (\ref{i:Xrtr}). Indeed, if the dynamics of $X$ are given by (\ref{i:Xrtr}) where $h$ is a function satisfying the condition of Theorem 3.2 in \cite{rectr}, $b\equiv 0$, and $\sigma\equiv 1$, then
\[
d\frac{1}{h}(X_t)=-\frac{h'}{h^2}(X_t)dW_t +dC_t,
\]
where $C$ is an adapted, continuous and increasing process. Note that $h$ is concave and
\[
\left(\frac{h'}{h}\right)'=\frac{h''}{h}-\left(\frac{h'}{h}\right)^2.
\]
Moreover, $h'$ never vanishes at the boundary points where $h$ does. Thus, (\ref{i:condimp}) implies that the local martingale in the above $\bbQ$-Doob-Meyer decomposition of $\frac{1}{h(X)}$ is a true martingale, which in turn will yield $\frac{1}{h}\exp(-A)$ is a true martingale, where $dA_t=-\half \frac{h''(X_t)}{h(X_t)}$. But this would imply that $\bbP\sim \bbQ$ (when restricted to $\cF_t$, with $(\cF_t)$ representing the underlying filtration) in view of the absolute continuity relationship manifested in Theorem 3.2 in \cite{rectr}. This is not possible since for an arbitrary $t>0$ $\bbQ(\zeta<t)=0$ while $\bbP(\zeta<t)>0$.
The estimates obtained by the authors in \cite{AlfCIR2} and \cite{NSimp} rely on the Burkholder-Davis-Gundy (BDG) inequality which requires the corresponding local martingale be a true martingale. As $\frac{1}{h(X)}$ is a strict local submartingale under $\bbQ$, one needs to develop new techniques to arrive at the needed estimate for convergence theorem.
This brings to the fore another novelty of our paper. Given the impossibility of the use of BDG inequality we use potential theoretic methods that yield the boundedness of inverse moments of $h(X)$ under $\bbQ$, which is crucial for obtaining the weak convergence result in our paper (or a strong convergence type results considered by Alfonsi, Neunkirch and Szpruch). We use the theory of {\em Kato class} potentials to show the boundedness of required moments. Kato potentials are one of the fundamental objects in the study of Schr\"odinger operators (see, e.g. \cite{AiSiSchr}, \cite{CFZGauge}, \cite{ChenGauge}, \cite{ChenSongGauge}). We show in Theorem \ref{t:fundtr} that the additive functional $dA_t=-\half \frac{h''(X_t)}{h(X_t)}$ belongs to a particular Kato class defined in \cite{ChenGauge}, which in turn yields the boundedness of the inverse moment of $\frac{1}{h}(\wXn)$ (uniformly in $N$) in conjunction with a comparison argument via Lemma \ref{l:tchange}. The potential theory also helps us to prove uniform bounds on the moments of integral functionals of $h^{-2-p}(\wXt)$ (see Theorem \ref{t:bemest} for an exact description).
Our methodology offers hope to study the convergence rates for CIR processes that do not satisfy (\ref{i:condimp}). We also show in this paper that if one considers the $3$-dimensional Bessel process,
\[
dX_t=dW_t+ \frac{1}{X_t}dt,
\]
the implicit scheme in (\ref{i:BEM}) converges weakly at rate $N^{-1}$. Clearly, (\ref{i:condimp}) is violated since the reciprocal of a $3$-dimensional Bessel process is a prime example of a strict local martingale. This process satisfies the conditions of Theorem \ref{t:main} and one obtains the optimal convergence rate for sufficiently smooth $g$. We leave the investigation of the convergence rate for conservative diffusions on $(0,\infty)$ satisfying (\ref{i:ASimp}) in the absence of condition (\ref{i:condimp}) to a future study.
Although our analysis assumes a one-dimensional framework, a close look into our technical analysis reveals that our convergence result does not depend heavily on this assumption apart from the comparison argument used in Lemma \ref{l:tchange}. In particular it is relatively clear how to obtain a version of Theorem \ref{t:invmomnt} in the multidimensional case using well-known potential theoretic arguments on Kato classes. However, our main obstacle in not being able to extend our results to a multidimensional setting is the absence of a systematic study of recurrent transformations in higher dimensions. Also note that Lemma \ref{l:tchange} is only used to obtain estimates on $h(\what{X})$, which is always a one-dimensional object with $\what{X}$ referring to the continuous Euler scheme. Such a study and its applications to Euler methods for killed diffusions will be the subject of future research.
The outline of the paper is as follows. Section \ref{s:prelim} fixes the setting, gives a brief summary of results for recurrent transformations needed for this paper together with novel inverse moment estimates, and introduces the backward Euler-Maruyama scheme that is tailored for our purposes. Section \ref{s:moment} obtains the moment estimates that will be needed for the weak convergence analysis. Theoretical predictions are confirmed via numerical studies in Section \ref{s:numerics} and Section \ref{s:conclusion} concludes.
\section{Preliminaries} \label{s:prelim}
Let $X$ be a regular diffusion on $(\ell,r)$, where $ -\infty \leq \ell <r \leq \infty$. We assume that infinite boundaries are inaccessible and if any of the boundaries are reached in finite time, the process is killed and sent to the cemetery state $\Delta$. This is the only instance when the process can be `killed', we do not allow killing inside $(\ell,r)$. The set of points that can be reached in finite time starting from the interior of $(\ell,r)$ and entrance boundaries will be denoted by $I$. That is, $I$ is the union of $(\ell,r)$ with the regular, exit and entrance boundaries. The law induced on $C(\bbR_+,I)$, the space of $I$-valued continuous functions on $[0,\infty)$, by $X$ with $X_0=x$ will be denoted by $P^x$ as usual, while $\zeta$ will correspond to its lifetime, i.e. $\zeta :=\inf\{t>0:X_{t} \notin (\ell,r)\}$. We also introduce the set $I_{\Delta}:=I\cup \{\Delta\}$ and extend any $I$-valued Borel measurable function $f$ to $I_{\Delta}$ by setting $f(\Delta)=0$ unless stated otherwise. The filtration $(\cF^0_t)_{t \geq 0}$ will correspond to the natural filtration of $X$, $\tilde{F}_t$ will be the universal completion of $\cF^0_t$, and $\cF_t=\tilde{F}_{t+}$ so that $(\cF_t)_{t\geq 0}$ is a right continuous filtration. We will also set $\cF:=\bigvee_{t \geq 0} \cF_t$. We refer the reader to \cite{BorSal} for a summary of results and references on one-dimensional diffusions. The definitive treatment of such diffusions is, of course, contained in \cite{IM}.
Since we are only concerned with the diffusion process until it is killed, we can assume without any loss of generality that $X$ is on natural scale. The extra regularity conditions imposed in the following assumption are standard in the theory of Euler discretisations for SDEs.
\begin{assumption} \label{a:reg} $X$ is a regular one-dimensional diffusion on $(\ell,r)$ such that
\[
X_t=X_0+ \int_0^t\sigma(X_s)dB_s, \qquad t < \zeta,
\]
where $\sigma:(\ell,r)\to (0,\infty)$ is continuously differentiable with a bounded derivative, $B$ is a standard Brownian motion, and $\zeta=\inf\{t>0: X_{t}\in \{l,r\}\}$. Moreover, $\sigma(\ell+)$ (resp. $\sigma(r-)$) exist and is finite if $\ell$ (resp. $r$ ) is finite.
\end{assumption}
Note that the speed measure $m$ associated with $X$ is given by $m(dx)=2\sigma^{-2}(x)dx$ on the Borel subsets of $(\ell,r)$.
Since we are interested in diffusions with killing, the following assumption is needed to ensure that we are not dealing with a vacuous problem.
\begin{assumption}
\label{a:killing} $P^x(\zeta<\infty)>0$ for each $x \in \elr$.
\end{assumption}
Let $I_0$ be the set of points in $I$ that can be reached from its interior in finite time. Note that under Assumptions \ref{a:reg} and \ref{a:killing} there are only two cases to consider:
\begin{itemize}
\item[Case 1:] Both $\ell$ and $r$ are accessible, which in turn implies $\ell$ and $r$ are finite and $I_0=[\ell,r]$.
\item[Case 2:] Only one of $\ell$ and $r$ is accessible, which can be assumed to be $\ell$ without any loss of generality. In particular, $I^0=[\ell, r)$.
\end{itemize}
As $\ell$ is always finite as a result of the above convention, the following will also be assumed for convenience:
\begin{assumption}
\label{a:ell} $\ell=0$.
\end{assumption}
As a transient diffusion on $(\ell,r)$, $X$ has a finite potential density, $u: (\ell,r)^2 \to \bbR_+$, with respect to its speed measure (see Paragraph 11 in Section II.1 of \cite{BorSal}). That is, for any nonnegative and measurable $f$ vanishing at accessible boundaries
\[
Uf(x):=\int_0^{\infty}E^x[f(X_t)]dt=\int_l^r f(y)u(x,y)m(dy).
\]
The potential density is symmetric and is explicitly known in terms of the scale function and the speed measure of $X$. This leads to the following specification of the potential density:
\be \label{e:potden}
u(x,y)=\left\{\ba{ll}
(x\wedge y)\left(1-\frac{x \vee y}{r}\right), & \mbox{ if } r<\infty,\\
x\wedge y, &\mbox{ otherwise.}\ea \right.
\ee
The following is a direct consequence of Theorem 3.2 in \cite{rectr}. The reader is referred to \cite{rectr} for all unexplained terminology.
\begin{theorem} \label{t:fundtr} Suppose that Assumptions \ref{a:reg}-\ref{a:ell} are in force. Let $f:(0,r)\to (0,\infty)$ be a continuous function such that $\int_{(0,r)}f(y)m(dy)<\infty$ and $\int_{(0,r)}yf(y)m(dy)<\infty$, and define
\[
h(x):=\int_{(\ell,r)} u(x,y)f(y)m(dy).
\]
Then, the following hold:
\begin{enumerate}
\item $(h,M)$ is a recurrent transform of $X$, where
\[
M_t :=\exp\left(\int_0^t\frac{f(X_s)}{h(X_s)}ds\right).
\]
\item There exists a probability measure $Q^{h,x}$ on $\cF$ that is locally absolutely continuous with respect to $P^x$ such that
\be \label{e:SDErt}
dX_t=\sigma(X_t)dW_t +\sigma^2(X_t)\frac{h'(X_t)}{h(X_t)}dt
\ee
and $W$ is an $Q^{h,x}$-Brownian motion.
\item If $S$ is a stopping time such that $Q^{h,x}(S<\infty)=1$, then for any $ F \in \cF_S$ the following identity holds:
\[
P^x(\zeta>S, F)= h(x)E^{h,x}\left[\chf_F \frac{1}{h(X_S)}\exp\left(-\int_0^S\frac{f(X_s)}{h(X_s)}ds\right)\right],
\]
where $E^{h,x}$ is the expectation operator with respect to the probability measure $Q^{h,x}$. In particular, $Q^{h,x}(\zeta<\infty)=0$.
\end{enumerate}
\end{theorem}
Note that $h$ constructed above is a concave function that is twice continuously differentiable and satisfies on $(\ell,r)$
\begin{equation} \label{eqforh}
\half \sigma^2 h''=-f.
\end{equation}
The class of concave functions $h$ such that $h=Uf$ where $f$ is a continuous function satisfying the conditions of Theorem \ref{t:fundtr} will be denoted by $\cH_0$.
We shall also consider the following $h$-transformation when $r=\infty$:
\begin{theorem} \label{t:ht}
Suppose that Assumptions \ref{a:reg}-\ref{a:ell} are in force and $r=\infty$. Let $h(x):=x$.
Then, the following hold:
\begin{enumerate}
\item There exists a probability measure $Q^{h,x}$ on $\cF$ that is locally absolutely continuous with respect to $P^{x}$ such that
\be \label{e:SDEht}
dX_t=\sigma(X_t)dW_t +\sigma^2(X_t)\frac{h'(X_t)}{h(X_t)}dt
\ee
and $W$ is a $Q^{h,x}$-Brownian motion.
\item If $S$ is a stopping time such that $Q^{h,x}(S<\infty)=1$, then for any $ F \in \cF_S$ the following identity holds:
\[
P^x(\zeta>S, F)= h(x)E^{h,x}\left[\chf_F \frac{1}{h(X_S)}\right],
\]
where $E^{h,x}$ is the expectation operator with respect to the probability measure $Q^{h,x}$. In particular, $Q^{h,x}(\zeta<\infty)=0$.
\end{enumerate}
\end{theorem}
The above result is well-known and the reader is referred to Theorem 6.2 in \cite{EH} for a proof in a much more general setting. Note that the $h$-transform of Theorem \ref{t:ht} does not produce a recurrent diffusion. Indeed, $Q^{h,x}(\lim_{t \rightarrow \infty}X_t=\infty)=1$ since the corresponding scale function is finite at $\infty$.
For ease of later reference define the set $\cH$ to be the union of $\cH_0$ and the set that contains only the identity function when $r=\infty$. If $r$ is finite, set $\cH=\cH_0$.
\begin{lemma}\label{l:key} Let $h\in \cH$.
\begin{enumerate}
\item For any given $z> 0$ consider the function $H$
defined by
\begin{equation} \label{Hdefinition}
H(x)=x-z \frac{h'(x)}{h(x)}, \qquad x\in (0,r).
\end{equation}
$H$ is strictly increasing and $H((0,r))=\bbR$.
\item $h$ is increasing if $r=\infty$. However, $h'$ is bounded. In particular, for $h\in \cH_0$,
we have
\[
\begin{split}
h'(0)&=\left\{\ba{ll}
\int_0^{\infty}f(y)m(dy), &\mbox{ if } r=\infty,\\
\int_0^{\infty} \frac{r-y}{r}f(y)m(dy)>0, &\mbox{ otherwise.}\ea
\right. \\
h'(r)&= \left\{\ba{ll}
0, &\mbox{ if } r=\infty,\\
-\frac{1}{r}\int_0^r yf(y)m(dy)<0, &\mbox{ otherwise.}\ea
\right.
\end{split}
\]
\item For any $\alpha\geq 0$ and $h\in \cH_0$
\be \label{e:kato}
\int_{(0,r)}u(y,y) \frac{\alpha |h'(y)|-h''(y)}{h(y)}dy<\infty.
arxiarr \ee
\end{enumerate}
\end{lemma}
\begin{proof}
\begin{enumerate}
\item Since $h$ is concave, $H'(x)>1$, which shows the desired strict monotonicity.
If $r=\infty$ and $h(x)=x$, that $H((0,\infty))=\bbR$ is immediate.
Next, suppose $h\in \cH_0$. Then, the dominated convergence theorem implies that $h(0)=0$ as well as $h(r)=0$ if $r<\infty$ since the potential density vanishes at finite endpoints. Moreover, as $h$ is strictly concave and never vanishes in the interior of the state space, $h'(0)>0$. Thus,
\[
\lim_{x \rightarrow 0}\frac{h'(x)}{h(x)}=\infty.
\]
This proves the desired range for $H$ when $r=\infty$. Indeed, in this case $h$ is increasing, which in turn yields
\[
\frac{h'(x)}{h(x)}\leq \frac{h'(1)}{h(1)} \qquad x\geq 1.
\]
If $r<\infty$, similar considerations imply $h'(r)<0$, and therefore
\[
\lim_{x \rightarrow r}\frac{h'(x)}{h(x)}=-\infty.
\]
This completes proof of the first assertion.
\item If $r=\infty$ and $h(x)=x$, $h'(x)=1$ for all $x\geq 0$. If $h\in \cH_0$,
\[
h'(x)=\int_x^{\infty}f(y)m(dy),
\]
which is nonnegative and finite by the assumption on $f$. In particular, $h'(0)=\int_0^{\infty}f(y)m(dy)$ and $h'(\infty)=0$.
If $r<\infty$,
\[
h(x)=\frac{r-x}{r}\int_0^x yf(y)m(dy)+x\int_x^r \frac{r-y}{r}f(y)m(dy).
\]
Thus,
\[
h'(x)=\int_x^rf(y)m(dy)-\frac{1}{r}\int_0^r yf(y)m(dy).
\]
This yields the desired boundedness and the boundary levels for the derivatives.
\item First suppose $r<\infty$. Since $h'$ does not vanish at the boundaries, $u(y,y)/h(y)$ is bounded.
Moreover,
\[
-\int_{(0,r)}h''(y)dy=\int_{(0,r)}f(y)m(dy).
\]
This proves the claim when $r<\infty$. Now suppose that $r=\infty$. Thus, $u(y,y)=y$ and
\[
-\int_{(0,\infty)}y\frac{h''(y)}{h(y)}dy=\int_{(0,1)}y\frac{f(y)}{h(y)}m(dy)+\int_{(1,\infty)}y\frac{f(y)}{h(y)}m(dy).
\]
The first integral on the right hand side is finite since $f$ is $m$-integrable and $y/h(y)$ is bounded on $[0,1]$ as $h'(0)>0$. The second integral is also finite since $h(\infty)>0$ and $\int yf(y) m(dy)<\infty$ by assumption.
\end{enumerate}
\end{proof}
Let $g:I_0\to \bbR$ be a continuous function vanishing at accessible boundaries and Then for $h\in \cH$ and a deterministic $T>0$ we have
\be\label{e:RNkey}
E^x\left[g(X_T)\chf_{[T<\zeta]}\right]=h(x) E^{h,x}\left[ \frac{g(X_T)}{h(X_T)}\exp\left(\half \int_0^T\frac{\sigma^2(X_s)h''(X_s)}{h(X_s)}ds\right)\right].
\ee
In order to approximate the expectation on the right side of (\ref{e:RNkey}) we shall use a backward Euler-Maruyama (BEM) scheme:
Let $N>1$ be an integer and define $t_n:=\frac{n}{N}T$ for $n=0, \ldots, N$. Set $\bar{X}_0=X_0$ and proceed inductively by setting,Then proceed inductively by setting
\be \label{e:BEM}
\what{X}_t=\what{X}_{t_n}+\sigma(\what{X}_{t_n})(W_t-W_{t_n})+ (t-t_n)\sigma^2(\what{X}_{t_n})\frac{h'(\what{X}_{t})}{h(\what{X}_{t})}
\ee
for $t \in (t_n,t_{n+1}]$ and $n=0, \ldots N-1$.
Note that in view of Lemma \ref{l:key} the mapping $x\mapsto x- z\frac{h'}{h}(x)$ is one-to-one and onto for any given $z>0$. Thus, the above scheme is well-defined since $\sigma(x)>0$ for all $x\in (0,r)$.
As we shall see in Section \ref{s:moment} the following type of diffusion processes on $(0,r)$ will play a crucial role:
\be \label{e:Ydef}
dY_{t}=dW_t + \left\{\frac{h'(Y_t)}{h(Y_t)}+c\right\}dt, \quad t <\zeta(Y)
\ee
where $\zeta(Y)$ denotes the first hitting time of $0$ or $r$. Note that $c=0$ corresponds to the recurrent transform defined above.
\begin{theorem}\label{t:invmomnt} Suppose that Assumptions \ref{a:reg}-\ref{a:ell} are in force, $h\in \cH$, and $Y$ is a process defined by (\ref{e:Ydef}) with $Y_0=X_0$. Assume further that $c\leq 0$ if $r=\infty$, and $c=0$ if $h(x)=x$ for all $x$. Then the following statements are valid:
\begin{enumerate}
\item $Q^{h,X_0}(\zeta(Y)=\infty)=1$.
\item For any stopping time $S$ that is bounded $Q^{h,X_0}$-a.s. there exists a constant $K$ that does not depend on $X_0$ such that
\[
E^{h,X_0}\left[\frac{1}{h(Y_{S})}\right]<\frac{K}{h(X_0)}.
\]
\item For any $t>0$ and $p\in[0,1)$
\[
E^{h,X_0}\left[\int_0^t\frac{1}{h^{2+p}(Y_{s})}ds\right]<\infty.
\]
\end{enumerate}
\end{theorem}
\begin{proof}
\begin{enumerate}
\item First observe that a scale function and speed measure for $Y$ can be chosen as
\[
s_y(x)= \int_d^x\frac{e^{-2cy}}{h^2(y)}dy, \quad m_y(dx) = 2 h^2(x)\exp{2cx} dx,
\]
where $d\in (0,r)$. Since $s_y(0)=-\infty$, $0$ is an inaccessible boundary for $Y$. By the same token, $r$ is also an inaccessible boundary when $s_y(r)=\infty$, which will be valid when $r<\infty$ or $c\leq 0$.
\item Define $Z$ by
\[
Z_t:= \frac{1}{h(Y_{t})}\exp\left(\half\int_{0}^{t} \frac{ 2 ch'(Y_s)+ h''(Y_s)}{h(Y_s)}ds\right)
\]
and note that $Z$ is a nonnegative $Q^{h,X_0}$-local martingale by a straightforward application of Ito's formula. By Theorem 62.19 in \cite{GTMP} there exists a probability measure $\tilde{P}$ such that
\[
dY_t=d\beta_t + c dt, \quad t<\zeta(Y),
\]
where $\beta$ is a $\tilde{P}$-Brownian motion, and whenever $S$ is a stopping time that is finite $Q^{h,X_0}$-a.s., one has
\[
\begin{split}
&E^{h,X_0}\left[\frac{1}{h(Y_{S})}\right]=\frac{1}{h(X_{0})}\tilde{E}\left[\chf_{[S<\zeta(Y)]}\exp\bigg(-\half\int_{0}^{S}\frac{2 ch'(Y_s)+h''(Y^N_s)}{h(Y_s)}ds\bigg)\right]\\
&\leq \frac{1}{h(X_{0})}\tilde{E}\left[\chf_{[S<\zeta]}\exp\bigg(\half\int_{0}^{S}\frac{2 (ch'(Y_s))^--h''(Y_s)}{h(Y_s)}ds\bigg)\right],
\end{split}
\]
where $x^-$ denotes the negative part of $x$ and we drop the dependency on $Y$ for $\zeta$ to ease the exposition.
Suppose that $S< R, \, Q^{h,X_0}$, a.s. where $R$ is a deterministic constant, and note that $\tilde{P}(S\geq R, S<\zeta)=0$. Thus,
\[
\tilde{E}\left[\chf_{[S<\zeta]}\exp\bigg(\half\int_{0}^{S}\frac{2 (ch'(Y_s))^--h''(Y_s)}{h(Y_s)}ds\bigg)\right]\leq \tilde{E}\left[\exp\bigg(\half\int_{0}^{R\wedge \zeta}\frac{2 (ch'(Y_s))^--h''(Y_s)}{h(Y_s)}ds\bigg)\right]
\]
Let $\cW^{c,y}$ denote the law of the process $\tilde{Y}$ starting at $y$, where $d\tilde{Y}_t=d\beta_t +c dt$ and gets killed at hitting $0$ or $r$. Thus,
\[
\tilde{E}\left[\exp\bigg(\half\int_{0}^{R\wedge \zeta}\frac{2 (ch'(Y_s))^--h''(Y_s)}{h(Y_s)}ds\bigg)\right]=\cW^{c,X_0}\left[\exp(C_{R})\right],
\]
where $C$ is the positive continuous additive functional of $\tilde{Y}$ with $dC_t= \half \frac{2 (ch'(\tilde{Y}_t))^--h''(\tilde{Y}_t)}{h(\tilde{Y}_t)}\chf_{[t<\tilde{\zeta}]}dt$.
Note that the potential function $u_C$ of $C$ is given by
\[
u_C(x)=\cW^x[C_{\infty}]=\int_0^{r} v (x,y)\mu_C(y)\frac{d\tilde{m}}{dy},
\]
where $v$ is the potential density of $\tilde{Y}$, $\mu_C(y)=\half \frac{(2ch'(y))^-- h''(y)}{h(y)}$, and $d\tilde{m}$ is the associated speed measure of $Y$. Since a scale function and a speed measure of $\tilde{Y}$ can be chosen as
\[
\tilde{s}(x)=\frac{1-e^{-2cx}}{2c} \mbox{ and } \tilde{m}(dx)=2e^{2cx}dx,
\]
where $\tilde{s}(x)=x$ if $c=0$, we obtain for $x\leq y$
\[
v(x,y)= \frac{\tilde{s}(x)(\tilde{s}(r)-\tilde{s}(y))}{\tilde{s}(r)},
\]
with $\frac{\tilde{s}(r)-\tilde{s}(y)}{\tilde{s}(r)}$ being interpreted as $1$ if $\tilde{s}(r)=\infty$.
First observe that $v(x,y)=u(x,y)$ if $c=0$. On the other hand, if $r=\infty$ and $c<0$
\be \label{e:potbd1}
v(y,y)e^{2cy}=\frac{e^{2cy}-1}{2c}\leq y.
\ee
Similarly, for $r<\infty$
\be \label{e:potbd3}
v(y,y)e^{2cy}=\frac{e^{-2cr}}{2c(1-e^{-2cr})}(e^{2cy}-1)(e^{2c(r-y)}-1)\leq K(c,r) y(1-\frac{y}{r}).
\ee
Thus,
\be \label{e:vyy2}
\int_0^{r} v (y,y)\mu_C(y)2e^{2cy}dy\leq K \int_0^{r}u(y,y)\frac{(2c h'(y))^-- h''(y)}{h(y)}dy<\infty
\ee
by another application of (\ref{e:kato}) due to the bounds obtained via (\ref{e:potbd1}) and (\ref{e:potbd3}), and the assumption on the choice of $c$ when $r=\infty$.
As
\[
u_C(x)\leq \int_0^{r} v (y,y)\mu_C(y)2e^{2cy}dy,
\]
we deduce that $u_c$ is bounded.
Now consider a decreasing sequence $(D_n)$ of subsets of $(0,r)$ such that $D_n \rightarrow \emptyset$. Since
\[
\int_0^{r}v(x,y)\chf_{D_n}(y)\mu_C(y)2e^{2cy}\leq \int_0^{r}v(y,y)\chf_{D_n}(y)\mu_C(y)2e^{2cy}dy,
\]
and the right side converges to $0$ by the dominated convergence theorem due to (\ref{e:vyy2}), we establish that $\mu_C \in \mathbf{K}_1(\tilde{Y})$ (see Definition 2.2 in Chen \cite{ChenGauge}) by Proposition 2.4 in \cite{ChenGauge}. Therefore, by Proposition 2.3 in \cite{ChenSongGauge} we arrive at
\[
\sup_{y\in (0,r)}\cW^{c,y}\exp(C_t)\leq d_1 e^{d_2 t}
\]
for some constants $d_1$ and $d_2$. This proves the claim.
\item Since the semigroup is self-dual with respect to the speed measure, for any nonnegative measurable $f$ we have
\[
\begin{split}
\int_0^r dy2h^2(y)e^{2cy}f(y)E^{h,y}\int_0^t\frac{e^{-s}\chf_{[Y_s\in D]}}{h^{2+p}(Y_s)}ds=\int_D dy2h^2(y)e^{2cy}\frac{1}{h^{2+p}(y)}E^{h,y}\int_0^te^{-s}f(Y_s)ds\\
\leq \int_D dy\frac{2e^{2cy}}{h^{p}(y)}E^{h,y}\int_0^t f(Y_s)ds,
\end{split}
\]
where $D:=\{y: h(y)<1\wedge \half \|h\|_{\infty}\}$.
In particular, when $f(y)=q(\eps, y,y^*)$ for some $\eps>0$, where $q$ is the transition density of $Y$ with respect to its speed measure, we obtain
\[
\begin{split}
\int_0^r dy2h^2(y)e^{2cy}q(\eps, y,y^*)E^{h,y}\int_0^t\frac{e^{-s}\chf_{[Y_s\in D]}}{h^{2+p}(Y_s)}ds\leq \int_D dy2e^{2cy}h^{-p}(y)E^{h,y}(L^{y*}_{t+\eps})\\
\leq E^{h,y^*}(L^{y*}_{t+\eps})\int_D dy2e^{2cy}h^{-p}(y),
\end{split}
\]
where $L^{y*}$ is the diffusion local time with respect to the speed measure. Letting $\eps\rightarrow 0$ we arrive at
\[
E^{h,y^*}\int_0^t\frac{e^{-s}\chf_{[Y_s\in D]}}{h^{2+p}(Y_s)}ds\leq E^{h,y^*}(L^{y*}_{t})\int_D dy2e^{2cy}h^{-p}(y)<\infty,
\]
provided $y\mapsto E^{h,y}\int_0^t\frac{e^{-s}\chf_{[Y_s\in D]}}{h^{2+p}(Y_s)}ds$ is lower semi-continuous. Note that the finiteness of the integral on the right hand side follows from the fact that $|h'(y)|\geq \alpha$ for some $\alpha>0$ on $D$.
Observe that
\[
E^{h,y}\int_0^t\frac{e^{-s}\chf_{[Y_s\in D]}}{h^{2+p}(Y_s)}ds=\phi(y)-e^{-t}E^{h,y}(\phi(Y_t)),
\]
where
\[
\phi(y):=E^{h,y}\int_0^{\infty}ds \frac{e^{-s}\chf_{[Y_s\in D]}}{h^{2+p}(Y_s)}ds=\int_D\frac{2 e^{2cz}v_1(y,z)}{h^p(z)}dz,
\]
where $v_1$ is the $1$-potential density of $Y$. Since $v_1$ is jointly continuous (see Paragraphs 10-11 in Chapter II of \cite{BorSal}), the claimed semi-continuity follows.
Since
\[
E^{h,y^*}\int_0^t\frac{1}{h^{2+p}(Y_s)}ds\leq e^t E^{h,y^*}\int_0^t\frac{e^{-s}\chf_{[Y_s\in D]}}{h^{2+p}(Y_s)}ds + K,
\]
for some $K$, the claim follows from the arbitrariness of $y^*$.
\end{enumerate}
\end{proof}
\section{Moment estimates for the continuous BEM scheme}\label{s:moment}
In this section we will obtain some moment estimates, including inverse ones, that will be necessary to establish the weak rate of convergence. We start with the following consequence of Ito's formula.
\begin{lemma}\label{l:dcomp}
Suppose that $h\in C^2_b((0,r), (0,\infty))$, $h^{(3)}$ exists and satisfies $|h^{(3)}| \leq K(1+h^{-p})$ for some constant $K$ and $p\in [0,1)$. Consider the BEM scheme defined by (\ref{e:BEM}) for $h\in \cH$. Then
\be \label{e:Xhdecomp}
d\what{X}_t=\frac{\sigma(\wXn)}{H_x(t_n,\wXn;t,\wXt)}dW_t +\frac{\sigma^2(\wXn)}{H_x^2(t_n,\wXn;t,\wXt)}\left\{\frac{h'}{h}(\wXt) +\mu(t_n, \wXn; t, \wXt)\right\} dt, \quad t\in (t_n,t_{n+1}],
\ee
where
\[
\begin{split}
H(t_n,z;t,x)&:=x-\sigma^2(z)(t-t_n)\frac{h'}{h}(x)\\
\mu(t_n,z;t,x)&:=(H_x(t_n,z;t,x)-1)\frac{h'}{h}(x) +\half \frac{\sigma^2(z)(t-t_n)}{H_x(t_n,z;t,x)}\left(\frac{h'}{h}\right)''(x).
\end{split}
\]
Consider the sets $O_1:=\{x:h'(x)>0\}$ and $O_2:=\{x:h'(x)<0\}$.
Then
\[
\inf_{x\in O_1}\mu(t_n,z;t,x)\geq c_1 \mbox{ and } \sup_{x\in O_2}\mu(t_n,z;t,x)\leq c_2 \
\]
for some constants $c_1\leq 0\leq c_2$ that do not depend on $t_n, t$ or $z$. In particular, $c_1=0$ when $h(x)=x$.
\end{lemma}
\begin{proof}
The decomposition (\ref{e:Xhdecomp}) follows from Ito's formula and straightforward calculations regarding the derivatives of the inverse function.
To prove the second assertion first observe that $H_x(t,x)-1=-\sigma^2(z)(t-t_n)\Big(\frac{h'}{h}\Big)'(x)\geq 0$, where we drop the dependency on $t_n$ and $z$ to ease the exposition.
Observe that
\be \label{e:murep}
\mu=-\frac{\sigma^2(z)(t-t_n)\Big(\frac{h'}{h}\Big)'}{H_x}\left(H_x\frac{h'}{h}- \frac{1}{2}\frac{\left(\frac{h'}{h}\right)''}{\left(\frac{h'}{h}\right)'}\right),
\ee
and that the claim follows immediately if $h(x)=x$ since the term in the parenthesis in (\ref{e:murep}) becomes nonnegative. Thus, it remains to show the assertion when $h\in \cH_0$.
First consider the case $r=\infty$, and let $u:=\frac{h'}{h}$ and note that $\lim_{x\rightarrow \infty} u'(x)=0$ by Lemma \ref{l:key}. Moreover, $|u'(x)|\leq K x^{-2}$ for some $K <\infty$, which in turn implies
\be \label{e:u2u1}
\lim_{x\rightarrow \infty} \frac{\log (-u'(x))}{x}=0=\lim_{x\rightarrow \infty} \frac{ u''(x)}{u'(x)},
\ee
where the second equality is an application if L'Hospital's rule. Thus,
\[
- \frac{1}{2}\frac{\left(\frac{h'}{h}\right)''}{\left(\frac{h'}{h}\right)'}> c \mbox{ on } (\frac{x^*}{2},\infty)
\]
for some $c<0$ where $x^*:=\inf\{x:h'(x)=0\}>0$ by Lemma \ref{l:key}.
An alternative representation for $\mu$ is given by
\be \label{e:mualt}
\mu= \sigma^2(z)(t-t_n)\left(-\frac{h'}{h}\left(\frac{h'}{h}\right)'\frac{1+H_x}{H_x}+\frac{1}{2H_x}\frac{h'''h-h''h'}{h^2}\right).
\ee
Thus, we will be done if
\[
r(t,x):=\frac{\sigma^2(z)(t-t_n)}{2H_x}\frac{h'''h-h''h'}{h^2}
\]
is bounded from below on $(0,\frac{x^*}{2})$. Indeed, as $h'$ is bounded away from $0$ on this interval, the hypothesis on $h'''$ implies
\[
r(t,x)\geq -K\frac{\sigma^2(z)(t-t_n)\left(\frac{h'}{h}\right)^2}{1+ \sigma^2(z)(t-t_n)(\frac{h'}{h})^2}
\]
leading to the desired lower bound.
When $r<\infty$, we have in particular that $\sigma$ is bounded. Moreover,
\[
|r(t,x)|\leq K\frac{\sigma^2(z)(t-t_n)\frac{1}{h^2}}{2H_x},
\]
for some constant $K$, which renders $r$ bounded. Observing that the remaining terms in (\ref{e:mualt}) has the correct sign completes the proof.
\end{proof}
The next result is a key comparison result that relates the inverse moments of the BEM scheme to those of the process (\ref{e:Ydef}) and thereby provide estimates that are valid uniformly in $N$.
\begin{lemma}\label{l:tchange}
Suppose that $h$ satisfies the conditions of Lemma \ref{l:dcomp}, $\sigma$ is bounded, $r=\infty$, and consider the BEM scheme defined by (\ref{e:BEM}) for $h\in \cH$. Then for any non-decreasing and measurable function $\phi$ that does not change sign, we have
\[
E^{h,X_0}(\phi(\what{X}_{A_t^{-1}}))\geq E^{h,X_0}(\phi(Y_{t}))
\]
where $Y$ is the process defined by (\ref{e:Ydef}) with $c=c_1$, $c_1$ is as in Lemma \ref{l:dcomp}, and $A$ is a continuous time-change defined by $A_0=0$ and
\[
dA_t=\frac{\sigma^2(\wXn)}{H_x^2(t_n,\wXn;t,\wXt)}dt,\qquad t\in (t_n,t_{n+1}].
\]
Moreover, $Q^{h,X_0}(A_t\leq t\|\sigma\|_{\infty}^2)=1$.
\end{lemma}
\begin{proof}
Consider the process $\what{Y}$ defined by $\what{Y}_t=\what{X}_{A_t^{-1}}$.
Dambis, Dubins-Schwarz Theorem (cf. Theorem V.1.6 in \cite{RY}) yields
\[
d\what{Y}_t=d\beta_t +\left(\frac{h'}{h}(\wYt) +\mu_t\right)dt, \quad t\in (t_n,t_{n+1}],
\]
where $\mu_t\geq c_1$ and $\beta$ is a standard Brownian motion adapted to the filtration $(\cF_{A_t^{-1}})_{t\geq 0}$.
Then the comparison theorem for stochastic differential equations (cf. Theorem 2.10 in \cite{DMB-CD}) show that
\[
P^{h,X_0}(\wYt\geq Y_t, t\leq T)=1,
\]
where
\be\label{e:Ydef2}
Y_t= X_0+ \beta_t +\int_0^t \left(\frac{h'}{h}(Y_s)+c_1\right)ds.
\ee
Since $H_x \geq 1$, it follows that $A_t\leq \|\sigma\|_{\infty}^2 t$. This completes the proof.
\end{proof}
The main moment estimates are collected in the following theorem.
\begin{theorem} \label{t:bemest}
Suppose that $h$ satisfies the conditions of Lemma \ref{l:dcomp}, $\sigma$ is bounded, and consider the BEM scheme defined by (\ref{e:BEM}). Then for any $T>0$ and $p\in[0,1)$, the following statements are valid:
\begin{enumerate}
\item For each $m\in \bbN$
\be \label{e:integrable1}
\sup_{t\leq T, N} E^{h,X_0}\left(\frac{1}{h}(\wXt)+\sum_{n=0}^{N-1}\int_{t_n}^{t_{n+1}}\frac{\sigma^2(\wXn)h^{-2-p}(\wXt)}{H_x^{2}(t_n,\wXn;t,\wXt)}dt+ |\wXt|^m |\right)<\infty.
\ee
\item For each $n$
\be \label{e:ui}
\esssup_{\tau \in \cT_n}E^{h,X_0}\Big(\frac{1}{h}(\what{X}_{\tau})+ X^m_{\tau}\big| \cF_{t_n}\Big)<\infty,
\ee
where $m\geq 0$ is an integer and $\cT_n:=\{\tau: \tau \mbox{ is a stopping time such that } \tau \in [t_n, t_{n+1}], Q^{h,X_0}\mbox{-a.s.}.\}$.
\item Suppose further that $p\leq \half$ and that $\frac{h''}{h^{1-p}}$ is bounded. Then for each $n \in \bbN$ and $m\geq 0$
\be \label{e:hinvctrl}
E^{h,X_0}\left(\sum_{n=0}^{N-1}\int_{t_n}^{t_{n+1}}\left(1-\exp\big((s-t_n)\sigma^2(\wXn)\frac{h''}{2h}(\wXn)\big)\right)\frac{\sigma(\wXn)^2(h^{-p}(\wXs)+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}ds\right)<\frac{KT}{N},
\ee
where $K$ is independent of $N$.
\end{enumerate}
\end{theorem}
Proof of the above theorem is lengthy and is delegated to the Appendix. We end this section with the following lemma that will be useful in our PDE approach to weak convergence rate in the following section.
\begin{lemma} \label{l:weak}
Suppose that $h$ satisfies the conditions of Lemma \ref{l:dcomp}, $\sigma$ is bounded, and consider the BEM scheme defined by (\ref{e:BEM}). Then for any $T>0$ the following statements are valid:
\begin{enumerate}
\item Let $p\in [0,1)$ and $m\geq 0$ be an integer. For each $n$
\be
\begin{split}
E^{h,X_0}\bigg(\int_{t_n}^{t_{n+1}}\bigg|\frac{h^{1-p}(\wXt)(1+\wXt^m)\mu(t_n, \wXn; t, \wXt)}{H_x^2(t_n,\wXn;t,\wXt)}\bigg|dt\Big| \cF_n\bigg) \\ \leq \frac{KT}{N}E^{h,X_0}\bigg(\int_{t_n}^{t_{n+1}}\frac{\sigma^2(\wXn)(h^{-2-p}(\wXt)+\wXt^m)}{H_x^2(t_n,\wXn;t,\wXt)}dt\big| \cF_n\bigg),
\end{split}
\ee
with $K$ being a constant independent of $n$.
\item Assume further that $h\in C^4((0,r),(0,\infty))$. Consider $p\in [0,1)$ and suppose
\[
\frac{|h^{(k)}|}{h}<\frac{K}{h^{k-2+p}}, \qquad k\in \{2,3,4\},
\]
for some $K$. Let $f\in C^2((0,r), \bbR)$ be a bounded function such that
\[
|f^{(k)}(x)|\leq K(1+ x^m)h^{2-p-k}(x), \qquad k\in \{1,2\},
\]
for some $m\geq 0$.
Then for each $n$ and $t\in [t_n,t_{n+1}]$
\[
\begin{split}
\left|E^{h,X_0}\bigg(f(\wXt)\bigg\{\frac{h''}{h}(\wXn)-\frac{h''(\wXt)}{H_x^2(t_n,\wXn;t,\wXt)h(\wXt)}\bigg\}\Big| \cF_n\bigg)\right|\\
\leq K E^{h,X_0}\bigg( \int_{t_n}^t\frac{\sigma(\wXn)^2(h^{-(2+p)}(\wXs)+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}ds\big| \cF_n\bigg)\\ -K\frac{h''}{h}(\wXn)E^{h,X_0}\bigg(\int_{t_n}^t\frac{\sigma(\wXn)^2\left((h^{-p}(\wXs)+\wXs^m)+(s-t_n)(h^{-2}(\wXs)+\wXs^m)\big)\right)}{H_x^2(t_n,\wXn;s,\wXs)}ds\big| \cF_n\bigg)\\
\end{split}
\]
for some constant $K$ independent of $n$.
\item Suppose $f$ and $h$ satisfy the conditions of the previous part and $b\in C^2_b((0,r), \bbR)$. Then for each $n$ and $t\in [t_n,t_{n+1}]$ ,
\[
\begin{split}
\left|E^{h,X_0}\bigg(f(\wXt)\bigg\{b(\wXn)-\frac{b(\wXt)}{H_x^2(t_n,\wXn;t,\wXt)}\bigg\}dt\Big| \cF_n\bigg)\right|\\
\leq K E^{h,X_0}\bigg( \int_{t_n}^t\frac{\sigma(\wXn)^2(h^{-2-p}(\wXs)+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}ds\big| \cF_n\bigg),
\end{split}
\]
for some constant $K$ independent of $n$.
\end{enumerate}
\end{lemma}
\begin{proof}
\begin{enumerate}
\item It follows directly from the definition of $\mu$ and the hypothesis on $h'''$ that
\[
h^{1-p}(\wXt)|\mu(t_n, \wXn; t, \wXt)|\leq K \sigma^2(\wXn)(t-t_n)h^{-2-p}(\wXt), \quad t\in [t_n,t_{n+1}],
\]
for some $K$. Also note that if $m\geq 1$ and $r=\infty$, there exists a $K$ such that $x^m h^{-(2+p)}\leq Kh^{m-(2+p)}$ for $x\in [0,1]$. An analogous bound can be obtained near $r$ when $r$ is finite. Thus,
\be \label{e:loseprod}
x^m h^{-(2+p)}\leq K(x^m + h^{-(2+p)}).
\ee
\item Let $\mu_s:=\mu(t_n, \wXn; s, \wXs)$, $u:=\frac{h'}{h}$, and $\eta_s:= H_x(t_n,\wXn;s,\wXs)$. Then Ito's formula yields
\[
f(\wXt)\left(\frac{h''}{h}(\wXn)-\frac{h''(\wXt)}{h(\wXt)\eta_t^2}\right)=M_t + A_t,
\]
where $M$ is a local martingale with $M_{t_n}=0$ since $\eta_{t_n}=1$, and
\[
\begin{split}
A_t&=\int_{t_n}^t\frac{\sigma^2(\wXn)f(\wXs)}{2\eta_s^4}\left\{\frac{2h''h'}{h^2}(\wXs)\mu_s+\frac{(h'')^2-h h^{(4)}}{h^2}(\wXs)\right\}ds\\
&-\int_{t_n}^t\frac{\sigma(\wXn)^2f(\wXs)}{\eta_s^4}\frac{h^{(3)}}{h}(\wXs)\left\{\mu_s+2\sigma^2(\wXn)(s-t_n)\frac{u''(\wXs)}{\eta_s}\right\}ds\\
&-\int_{t_n}^t\frac{\sigma^4(\wXn)(s-t_n)f(\wXs)h''(\wXs)}{h(\wXs)\eta_s^5}\left\{2\mu_s u''(\wXs)+\frac{3\sigma^2(\wXn)(s-t_n)(u'')^2(\wXs)}{\eta_s}+u^{(3)}(\wXs)\right\}ds\\
&+\int_{t_n}^t\left(\frac{h''}{h}(\wXn)-\frac{h''(\wXs)}{h(\wXs)\eta_s^2}\right)\frac{\sigma^2(\wXn)}{\eta_s^2}\left\{f'(\wXs)(u(\wXs)+\mu_s)+\half f''(\wXs)\right\}ds\\
&+\int_{t_n}^t\frac{\sigma^2(\wXn)f'(\wXs)}{\eta_s^4}\left\{\frac{h''h'-h h^{(3)}}{h^2}(\wXs)-2\frac{\sigma^2(\wXn)(s-t_n)u''(\wXs)}{\eta_s}\frac{h''}{h}(\wXs)\right\}ds.
\end{split}
\]
Observe that the hypothesis on $h$ implies that
\[
|u^{(k)}|\leq K h^{-1-k}, \qquad k \in \{0,1,2, 3\},
\]
for some constant $K$. Moreover, $|\mu_s|\leq K \sigma^2(\wXn) (s-t_n)h^{-3}$ and
\[
\sigma^2(\wXn)(s-t_n)h^{-2}\eta_s^{-1}\leq K,
\]
for some other constant $K$ that does not depend on $s$.
Thus, combined with the assumption on $f$ we arrive at
\be\label{e:Abd}
\begin{split}
|A_t|\leq-K\frac{h''}{h}(\wXn)\int_{t_n}^t\frac{\sigma(\wXn)^2(1+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}\left(h^{-p}(\wXs)(1+(s-t_n)h^{-2}(\wXs))\right)ds\\
+K \int_{t_n}^t\frac{\sigma^2(\wXn)(1+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)h^{2+p}(\wXs)}ds
\end{split}
\ee
for some constant $K$. This in particular implies $M$ is a martingale since we can deduce from the estimates (\ref{e:integrable1}) and (\ref{e:ui}) that the set $\{f(\what{X}_{\tau})\frac{h''(\what{X}_{\tau})}{h(\what{X}_{\tau})\eta_{\tau}^2}:\tau \in (t_n, t_{n+1}] \mbox{ is a stopping time}\}$ is uniformly integrable as soon as we once again recall that $|h''/h| <Kh^{-p}$ for some $p<1$. Hence, the claim holds in view of (\ref{e:loseprod}).
\item Applying Ito's formula and repeating the similar estimates yields the claim.
\end{enumerate}
\end{proof}
\section{Weak convergence of the BEM scheme} \label{sec:Weak convergence of the BEM scheme}
Consider the following stochastic differential equation on a filtered probability space $(\Om, \cG, (\cG_t)_{t\in [0,T]}, \bbP)$ satisfying the usual conditions:
\be
X_t=X_0+ \int_0^t\sigma(X_s)dW_s +\int_0^t \mu(X_s)ds
\ee
where $X_0\in (0,r)$, $\sigma$ and $\mu$ are bounded and Lipschitz on $(0,r)$, and $\sigma(x)>\eps$ for all $x\in (0,r)$. Let $\tau:=\inf\{t\geq 0: X_t\notin (0,r)\}$ for some $\eps>0$. We are interested in a numerical approximation for
\[
\bbE[\tilde{g}(X_T)\chf_{[T<\tau]}],
\]
for a sufficiently regular $\tilde{g}$.
Observe that by a Girsanov transformation we can rewrite the above expression in terms of a diffusion process satisfying the conditions in earlier sections. Indeed, defining $\bbQ$ on $\cG$ via
\[
\frac{d\bbQ}{d\bbP}=\exp\left(-\int_0^T\frac{\mu(X_s)}{\sigma(X_s)}dW_s-\half\int_0^T\frac{\mu^2(X_s)}{\sigma^2(X_s)}ds\right)
\]
renders $X$ solve
\[
dX_t= \sigma(X_s)dB_s,
\]
for a $\bbQ$-Brownian motion $B$. Therefore,
\be
\begin{split}
\bbE[\tilde{g}(X_T)\chf_{[T<\tau]}]&=\exp(-F(X_0))\bbE^{\bbQ}\left[g(X_T)\exp\left(\int_0^T \sigma^2(X_t) b(X_t)dt\right)\chf_{[T<\tau]}\right], \mbox{ where }\\
g(x)&=\tilde{g}(x)\exp(F(x)), \\
F(x)&=\int_c^x \frac{\mu(y)}{\sigma^2(y)}dy, \\
b&=-\half\bigg\{\big(\frac{\mu}{\sigma^2}\big)'+\frac{\mu^2}{\sigma^4}\bigg\},
\end{split}
\ee
and $c\in (0,r)$.
Thus, we may assume $\mu\equiv 0$ and consider
\be \label{e:girsanovK}
\begin{split}
&E^{X_0}\left[g(X_T)\exp\left(\int_0^T \sigma^2(X_t) b(X_t)dt\right)\chf_{[T<\zeta]}\right]\\&=h(x)E^{h,X_0}\left[\frac{g(X_T)}{h(X_T)}\exp\left(\int_0^T \sigma^2(X_t)\Big\{ b(X_t)+\frac{h''(X_t)}{2h(X_t)}\Big\}dt\right)\right],
\end{split}
\ee
where $X$ is a process satisfying Assumption \ref{a:reg}, $b$ is bounded, $\eps<\sigma< K_{\sigma}$ and $g$ is sufficiently regular.
\begin{proposition} Suppose $b \in C^4_b((0,r), \bbR)$, $\sigma \in C^4_b((0,r)$, $h\in \cH$ with
\[
\frac{|h^{(k)}|}{h}<\frac{K_h}{h^{k-2+p}}, \qquad k\in \{2,3,4\},
\]
for some $K_h$ and $p\in (0,1)$, $g\in C^6_b((0,r),\bbR)$ is a bounded function with $g^{(k)}(0)=0$ (and $g^{(k)}(r)=0$ if $r <\infty$) for $k\in \{0,1,2,3,4\}$, and define for $t\leq T$
\be \label{e:defv}
v(T-t,x):=E^{h,x}\left[\frac{g(X_t)}{h(X_t)}\exp\left(\int_0^t \sigma^2(X_s)\Big\{ b(X_s)+\frac{h''(X_s)}{2h(X_s)}\Big\}ds\right)\right].
\ee
Then
\be \label{e:pdev}
v_t+\frac{\sigma^2}{2}v_{xx} +\sigma^2 \frac{h'}{h}v_x=-\sigma^2v\Big(b+\frac{h''}{2h}\Big).
\ee
Moreover, $v$ and $v_t$ are uniformly bounded and there exists a constant $K$ such that
\be
\sup_{t\leq T}\Big|\frac{\partial^k}{\partial x^k}v_t(t,x)\Big|+\sup_{t\leq T}\Big|\frac{\partial^k}{\partial x^k}v(t,x)\Big|\leq Kh^{2-p-k}(x), \qquad k\in \{1,2\}.
\ee
\end{proposition}
\begin{proof}
Note that $v(T-t,x)=\frac{u(T-t,x)}{h(x)}$, where
\[
u(T-t,x):=E^{x}\left[g(X_t)\exp\left(\int_0^t \sigma^2(X_s) b(X_s)ds\right)\chf_{[t<\zeta]}\right].
\]
Note that $u(t,0)=0$ for $t\leq T$. Moreover, it follows from Theorem 5.2 in \cite{Ladyzhenskaya} that $u$ is the unique solution of
\be \label{e:pdeu}
u_t +\half \sigma ^2 u_{xx} + \sigma^2 u b=0,
\ee
and that
\be \label{e:uderbound}
\sup_{t\leq T, x\in (0,r)}\left|\frac{\partial^l}{\partial x^l}\frac{\partial^k}{\partial t^k}u\right|<\infty, \quad 0\leq 2k+l\leq 5.
\ee
Also note that since
\[
\begin{split}
&E^{x}\left[g(X_t)\exp\left(\int_0^t \sigma^2(X_s) b(X_s)ds\right)\chf_{[t<\zeta]}\right]=g(x)\\
&+\half E^{x}\left[\int_0^t\sigma^2(X_u)\exp\left(\int_0^u \sigma^2(X_s) b(X_s)ds\right)(g''(X_u)+2g(X_u)b(X_u))\chf_{[u<\zeta]}du\right],
\end{split}
\]
we have
\be \label{e:u_t}
u_t(t,x)=-\half E^{x}\left[\sigma^2(X_{T-t})\exp\left(\int_0^{T-t} \sigma^2(X_s) b(X_s)ds\right)(g''(X_{T-t})+2g(X_{T-t})b(X_{T-t}))\chf_{[u<\zeta]}\right].
\ee
In particular, $u_t(\cdot,0)=0$, which in turn implies $u_{xx}(\cdot,0)=0$. Analogous boundary conditions also holds at $r$ if $r$ is finite.
Let $w:=u_t$ and note that $w$ solves (\ref{e:pdeu}) with the boundary condition $w(t,0)=0$ and $w(T,\cdot)=-\half \sigma^2 g'' -\sigma^2 gb$. Using the stochastic representation in (\ref{e:u_t}) and analogous arguments we again arrive at $w_t$ vanishing at finite boundaries .
Using the PDE for $u$ it is straightforward to establish that $v$ solves (\ref{e:pdev}) and is bounded. Moreover, as $v_x=\frac{h u_x- uh'}{h^2}$, using integration by parts we arrive at
\[
v_x(t,x)=\frac{\int_0^x\left\{h(y)u_{xx}(t,y)-u(t,y)h''(y)\right\}dy}{h^2(x)}
\]
Since $h'(0)<\infty$ and $u$ and $u_{xx}$ vanish at $0$ (and are jointly continuous near $t=T$), there exists a neighbourhood of $0$ in which $|h''|(y) \leq Kh^{1-p}(y)\leq K^2 y$, $|u(\cdot,y)|+|u_{xx}(\cdot,y)|<Ky$ (due to Lipschitz continuity), and $h(y)>cy$. Thus, whenever $x$ belongs to this neighbourhood, we have
\[
\frac{v_x(t,x)}{h^{1-p}(x)}\leq \frac{K\int_0^x\left\{y(Ky+K^2 y^{1-p})\right\}dy}{c^{3-p}x^{3-p}}=\frac{K^2/3 x^3+K^3/(3-p)x^{3-p}}{c^{3-p}x^{3-p}}.
\]
Thus, $v_x/h^{1-p}$ is bounded near $0$. Analogous considerations when $r<\infty$ shows that the ratio is bounded over $(0,r)$.
Next observe that $v_t$ is bounded since $u_t$ vanishes at finite boundaries and $u_{tx}$ is bounded. In particular, $v_t h^p$ remain bounded near finite boundaries (uniformly in $t$). Multiplying (\ref{e:pdev}) by $h^p$ and using the fact that $v_x/h^{1-p}$ is bounded demonstrate that
\[
\sup_{t\leq T, x\in (0,r)}|v_{xx}(t,x)h^p(x)|<\infty.
\]
Finally, since $v_t=\frac{w}{h}$, repeating the above arguments and using the fact that $w_{xx}$ vanish at finite boundaries and is Lipschitz continuous in view of (\ref{e:uderbound}), we deduce $v_{tx}/h^{1-p}$ is bounded. Similar arguments (due to the boundedness of $w_{tx}=u_{ttx}$ in view of (\ref{e:uderbound}) also lead to
\[
\sup_{t\leq T, x\in (0,r)}|v_{txx}(t,x)h^p(x)|<\infty.
\]
\end{proof}
In view of the above proposition, and for the convenience of the reader, we collect all the assumptions needed in Assumption \ref{a:weak} below to prove our convergence result.
\begin{assumption} \label{a:weak} The functions $\sigma, b, h$ and $g$ satisfy the following regularity conditions.
\begin{enumerate}
\item $h\in \cH\cap C^4((0,r), (0,\infty))$ such that
\[
\frac{|h^{(k)}|}{h}<\frac{K_h}{h^{p+k-2}}, \qquad k\in \{2,3,4\},
\]
for some $K_h$ and $p\in [0,\half]$.
\item $\sigma \in C_b^2((0,r),(0,\infty))$ is bounded away from $0$.
\item $b \in C^2_b((0,r), \bbR)$.
\item $g\in C((0,r),\bbR)$ is of polynomial growth with $g(0)=0$ (and $g(r)=0$ if $r <\infty$).
\item The function $v$ defined by (\ref{e:defv}) belongs to $C^{1,4}((0,r),\bbR)$, satisfies (\ref{e:pdev}) as well as the growth conditions
\[
\sup_{t\leq T}\Big|\frac{\partial^k}{\partial x^k}v_t(t,x)\Big|+\sup_{t\leq T}\Big|\frac{\partial^k}{\partial x^k}v(t,x)\Big|\leq K(1+x^m)h^{2-p-k}(x), \qquad k\in \{1,2\},
\]
for some constant $K$ and integer $m\geq 0$.
\end{enumerate}
\end{assumption}
\begin{remark} The first condition on the derivatives of $h$ is not restrictive for practical purposes. Indeed, if a given $h\in \cH\cap C^4((0,r), (0,\infty))$ does not satisfy this condition, one can always linearise this concave function near the boundaries at which $h$ vanishes to obtain a new concave function satisfying the stated condition.
\end{remark}
\begin{theorem} \label{t:main}
Consider the BEM scheme defined by (\ref{e:BEM}) as well as the associated error
\[
e(N):=\frac{g(X_T)}{h(X_T)}\exp\left(\int_0^T \sigma^2(X_t)\Big\{ b(X_t)+\frac{h''(X_t)}{2h(X_t)}\Big\}dt\right)-\frac{g(\what{X}_T)}{h(\what{X}_T)}\exp\left(\sum_{n=0}^{N-1}\frac{T}{N} \sigma^2(\wXn)\Big\{ b(\wXn)+\frac{h''(\wXn)}{2h(\wXn)}\Big\}\right).
\]
Then
\[
\big|E^{h,X_0}[e(N)]\big|\leq \frac{KT}{N},
\]
for some constant $K$ independent of $N$ under Assumption \ref{a:weak}.
\end{theorem}
\begin{proof}
Let $\pi_0(s)= 1$,
\[
\pi_k(s):=\exp\left(\sum_{n=0}^{k-1}s \sigma^2(\wXn)\Big\{ b(\wXn)+\frac{h''(\wXn)}{2h(\wXn)}\Big\}\right), k=1,\ldots, N,
\]
with the convention that $\pi_k =\pi_k(TN^{-1})$, and observe that
\[
\begin{split}
E^{h,X_0}[e(N)]&=E^{h,X_0}\left[v(T,\what{X}_T)\pi_N\right]-v(0,X_0)\\
&=\sum_{n=0}^{N-1}E^{h,X_0}\left[v(t_{n+1},\wXnp)\pi_{n+1}-v(t_{n},\wXn)\pi_{n}\right]\\
&=\sum_{n=0}^{N-1}E^{h,X_0}\left[\pi_{n}\Big(v(t_{n+1},\wXnp)\exp\Big(TN^{-1} \sigma^2(\wXn)\Big\{ b(\wXn)+\frac{h''(\wXn)}{2h(\wXn)}\Big\}\Big)-v(t_{n},\wXn)\Big)\right]
\end{split}
\]
Next observe that
\[\begin{split}
E^{h,X_0}\left[\pi_{n}\Big(v(t_{n+1},\wXnp)\exp\Big(TN^{-1} \sigma^2(\wXn)\Big\{ b(\wXn)+\frac{h''(\wXn)}{2h(\wXn)}\Big\}\Big)-v(t_{n},\wXn)\Big)\Big|\cF_n\right]\\
=\pi_nE^{h,X_0}\left[\Big(v(t_{n+1},\wXnp)\exp\Big(TN^{-1} \sigma^2(\wXn)\Big\{ b(\wXn)+\frac{h''(\wXn)}{2h(\wXn)}\Big\}\Big)-v(t_{n},\wXn)\Big)\Big|\cF_n\right].
\end{split}
\]
Moreover, in view of (\ref{e:pdev}) (in fact dividing both sides of the equality by $\sigma^2$) we have
\[
v(t_{n+1},\wXnp)\exp\Big(TN^{-1} \sigma^2(\wXn)\Big\{ b(\wXn)+\frac{h''(\wXn)}{2h(\wXn)}\Big\}\Big)-v(t_{n},\wXn)=M_{t_{n+1}}-M_{t_n}+ I_1+ I_2 +I_3,
\]
where $M$ is a local martingale and
\[
\begin{split}
I_1&=\int_{t_n}^{t_{n+1}}\frac{\pi_{n+1}(t-t_n)}{\pi_{n}(t-t_n)}\frac{\sigma^2(\wXn)v_x(t,\wXt)\mu(t_n, \wXn; t, \wXt)}{H_x^2(t_n,\wXn;t,\wXt)}dt\\
I_2&=\int_{t_n}^{t_{n+1}}\frac{\pi_{n+1}(t-t_n)}{\pi_{n}(t-t_n)}\sigma^2(\wXn)v_t(t,\wXt)\Big(\frac{1}{\sigma^2(\wXn)}-\frac{1}{\sigma^2(\wXt)H_x^2(t_n,\wXn;t,\wXt)}\Big)dt\\
I_3&=\int_{t_n}^{t_{n+1}}\frac{\pi_{n+1}(t-t_n)}{\pi_{n}(t-t_n)}\sigma^2(\wXn)v(t,\wXt)\Big(b(\wXn)+\frac{h''(\wXn)}{2h(\wXn)}-\Big(b(\wXt)+\frac{h''(\wXt)}{2h(\wXt)}\Big)\frac{1}{H_x^2(t_n,\wXn;t,\wXt)}\Big)dt.
\end{split}
\]
First note that $M$ is martingale due to (\ref{e:integrable1}) by the hypothesis on $v$ and that $h$ is bounded. Moreover, Lemma \ref{l:weak} shows (for a generic constant $K$ that may change from line to line albeit remaining bounded uniformly in $N$) such that
\[
\begin{split}
&\Big|E^{h,X_0}[I_1+I_2+I_3|\cF_n]\Big|\leq K\frac{T}{N} E^{h,X_0}\bigg( \int_{t_n}^{t_{n+1}}\frac{\sigma^2(\wXn)(h^{-2-p}(\wXs)+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}ds\big| \cF_n\bigg)\\
&+K E^{h,X_0}\bigg(\int_{t_n}^{t_{n+1}}dt\frac{\pi_{n+1}(t-t_n)}{\pi_{n}(t-t_n)}\sigma^2(\wXn)\int_{t_n}^t\frac{\sigma(\wXn)^2(h^{-2-p}(\wXs)+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}ds\big| \cF_n\bigg)\\
&-KE^{h,X_0}\bigg(\int_{t_n}^{t_{n+1}}dt\frac{\pi_{n+1}(t-t_n)}{\pi_{n}(t-t_n)}\frac{h''}{h}(\wXn)\sigma^2(\wXn)\bigg(\int_{t_n}^t\frac{\sigma(\wXn)^2(h^{-p}(\wXs)+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}ds\big| \cF_n\bigg)\\
&-KE^{h,X_0}\bigg(\int_{t_n}^{t_{n+1}}dt\frac{\pi_{n+1}(t-t_n)}{\pi_{n}(t-t_n)}\frac{h''}{h}(\wXn)\sigma^2(\wXn)\bigg(\int_{t_n}^t\frac{\sigma(\wXn)^2(h^{-2}(\wXs)+\wXs^m)(s-t_n)}{H_x^2(t_n,\wXn;s,\wXs)}ds\big| \cF_n\bigg)\\
&\leq K\frac{T}{N} E^{h,X_0}\bigg( \int_{t_n}^{t_{n+1}}\frac{\sigma^2(\wXn)(h^{-2-p}(\wXs)+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}ds\big| \cF_n\bigg)\\
&+E^{h,X_0}\bigg(\int_{t_n}^{t_{n+1}}\left(1-\exp\big((s-t_n)\sigma^2(\wXn)\frac{h''}{2h}(\wXn)\big)\right)\frac{\sigma(\wXn)^2(h^{-p}(\wXs)+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}ds\Big| \cF_n\bigg)\\
&+K\frac{T}{N}E^{h,X_0}\bigg(\int_{t_n}^{t_{n+1}}\frac{\sigma(\wXn)^2(h^{-2}(\wXs)+\wXs^m)}{H_x^2(t_n,\wXn;s,\wXs)}ds\Big| \cF_n\bigg),
\end{split}
\]
where we have used the boundedness of $\pi_{n+1}/\pi_n$ several times and the last two lines follow from the interchange of the order of integration on the third and the fourth lines.
This proves the assertion in view of Theorem \ref{t:bemest} and, in particular (\ref{e:integrable1}) and (\ref{e:hinvctrl}), since $(\pi_n)$s are non-negative and uniformly bounded, and $H_x\geq 1$.
\end{proof}
\section{Numerical analysis}\label{s:numerics}
This section is dedicated to the numerical experiments illustrating the above technical analysis. As we shall see, one does not really need to satisfy all the conditions assumed in Theorem \ref{t:main} in order to achieve the advertised convergence rate in practice. The experiments below will compare the our methodology developed in this paper to standard numerical approaches for pricing of barrier options.
We shall consider the classical Black-Scholes model in the first part. As barrier option values are quite sensitive to the market skew/smile of volatility, the time-homogeneous {\it{hyperbolic local volatility}} model will also be studied and the corresponding results will be reported in the second part.
\subsection{Black-Scholes model for barrier options} \label{subsec:BSBarrierOptions}
For expository purposes\footnote{Deterministic interest rate, dividend yield or borrow cost can be incorporated without difficulty.}, let's assume that the asset price follows
\begin{equation} \label{BSmodel}
\frac{dS_t}{S_t} = \sigma dW_t, \,\,\,\, S_0=1
\end{equation}
with volatility $\sigma > 0$ under risk neutral probability $\bbP$. The value of the barrier option with payoff $\tilde{g}$ is given by
\begin{equation} \label{PriceEq}
price = \bbE^{\bbP} \left[ \tilde{g}(S_T) \mathds{1}_{\zeta > T} \right]
\end{equation}
with $\zeta :=\inf\{t>0:S_{t} \notin (e^{\ell},e^r)\}$, where $e^{\ell}$ represents the down barrier and $e^{r}$ the up barrier for $-\infty \leq \ell < r \leq \infty$.
For the volatility to be bounded away from $0$ (cf. point (2) in Assumption \ref{a:weak}), we perform a change of variable $X_t = \ln(S_t)$. Equations (\ref{BSmodel}) and (\ref{PriceEq}) then become
\begin{equation} \label{BSmodelinLog}
dX_t = -\frac{1}{2} \sigma^2dt + \sigma dW_t, \,\,\,\, X_0=x = 0
\end{equation}
\begin{equation} \label{PriceEqinLog}
price = \bbE^{\bbP} \left[ \tilde{g}(X_T) \mathds{1}_{\zeta > T} \right]
\end{equation}
with $\zeta =\inf\{t>0:X_{t} \notin (\ell,r)\}$ and $\tilde{g}(x)$ still denotes the payoff function in $x$ variable by an abuse of notation.
To remove the drift in (\ref{BSmodelinLog}), we follow the Girsanov transformation described at beginning of Section \ref{sec:Weak convergence of the BEM scheme}. We thus obtain
\begin{equation} \label{BSmodelinLogwithGirsanov}
dX_t = \sigma dW_t, \,\,\,\, X_0=x
\end{equation}
under $\bbQ$, where $\frac{d \bbQ}{ d \bbP } = e^{ -\frac{1}{8} \sigma^2 T + \frac{1}{2} \sigma W_T }$. Consequently,
\begin{equation} \label{PriceEqinLogwithGirsanov}
price = e^{ \frac{1}{2} x - \frac{1}{8} \sigma^2 T} \bbE^{\bbQ} \left[ g(X_T) \mathds{1}_{\zeta > T} \right],
\end{equation}
and $g(x) = \tilde{g}(x) e^{-\frac{1}{2}x}$.\\
We shall perform a path transformation method described in earlier section that either produces a recurrent process (see Theorem \ref{t:fundtr}) or generates a transient process with infinite lifetime (see Theorem \ref{t:ht}).
\subsubsection{Specification of the recurrent transformation} \label{subsubsection:Recurrent h-transform}
\begin{itemize}
\item Double barrier case with $l$ and $r$ finite.
We shall pick
\begin{equation}\label{fdoublebarrier}\nn
f(x) = (x-l)(r-x)
\end{equation}
to construct the function $h$ via (\ref{eqforh}). This in particular yields $h^{(3)}$ is bounded in $(\ell,r)$, which in turn implies the boundedness of $\frac{h^{(2)}}{h}$ by means of L'Hopital's rule. In particular, (1) in Assumption \ref{a:weak} is satisfied. Double integration from (\ref{eqforh}) gives
\begin{equation} \label{hDoubleBarrier}\nn
h(x) = -\frac{2}{\sigma^2} \left[ -\frac{1}{12}x^4 + \frac{(l+r)}{6} x^3 - \frac{lr}{2} x^2 + ax \right] + b
\end{equation}
where $a$ and $b$ are given by
\begin{align*}
a &= \frac{1}{(r-l)} \left[ \frac{(r^4 - l^4)}{12} - \frac{(r+l)}{6}(r^3 - l^3) + \frac{lr}{2}(r^2 - l^2) \right], \nonumber \\
b &= \frac{1}{\sigma^2} \left[ -\frac{(r^4 + l^4)}{12} + \frac{(r+l)(r^3 + l^3)}{6} - \frac{rl}{2}(r^2 + l^2) + a(r+l) \right].
\end{align*}
\item Single barrier case with $l$ finite and $r = + \infty$
We shall choose
\begin{equation} \label{hforSinglebarrier}\nn
h(x) = e^{-l} - e^{-x}
\end{equation}
with $h'(x) = e^{-x}$ and $h''(x) = -e^{-x}$. Note that with this choice of $h$ (1) in Assumption \ref{a:weak} is only partially satisfied as $\frac{|h''(x)|}{h(x)}$ is unbounded for $x$ around $l$.\\
\end{itemize}
We will apply the implicit scheme (\ref{e:BEM}) so that the price (\ref{PriceEqinLog}) is approximated by
\begin{equation} \label{BEMPrice}\nn
price \approx e^{ \frac{1}{2} x - \frac{1}{8} \sigma^2 T} h(x) \bbE^{h,x} \left[ \frac{g}{h}(\what{X}_{t_{N}}) e^{ \frac{\sigma^2}{2} \frac{T}{N} \sum_{n=0}^{N-1} \frac{h''}{h}( \what{X}_{t_{n}} ) } \right]
\end{equation}
{\remark{In the Black-Scholes model with the change of variable $X_t = \ln(S_t)$, the H function is identical at each time step and needs to be computed once. In the implementation, we introduce a dense grid covering the interval $(l, r)$, calculate the values of H on these points and $H^{-1}$ is computed by piecewise constant approximation.}}
\subsubsection{The transient transformation} \label{subsubsection:Non-recurrent h-transform}
In the single barrier case of a down-and-out option that will constitute a part of our experiments we can also consider transformation via $h(x) = x-l$ when $l$ is finite and $r = +\infty$, as in Theorem \ref{t:ht}. Under $Q^{h,x}$, the the process $X$ defined in (\ref{BSmodelinLogwithGirsanov}) follows
\begin{equation} \label{BSmodelinLogwithhId}\nn
dX_t = \sigma dW_t + \frac{\sigma^2}{X_t - l}dt, \,\,\,\, X_0=x.
\end{equation}
One advantage of this transformation is that the inverse of the function $H$ appearing in the implicit scheme (\ref{e:BEM}) can be computed analytically and is given by
\begin{equation}\nn
H^{-1}(x) = \frac{1}{2} \left( \sqrt{4 \sigma^2 \frac{T}{N} + (x-l)^2} + x+l \right).
\end{equation}
\subsection{Down and out put option} \label{subsection:downoutput}
For a down-and-out put barrier option, the payoff is given by $\max(K - S_T, 0) \mathds{1}_{\zeta > T}$ where $\zeta :=\inf\{t>0:S_{t} \notin (b, + \infty)\}$, $0 < b (=e^{\ell}0$, $K$ is the option strike and $T$ the maturity. In Black-Scholes model, standard barrier option prices are given analytically and are provided for completeness (see, e.g, p.153 of \cite{haug2007complete}). It uses a common set of factors:
\begin{align*}
A &= \phi S_0 N(\phi x_1) - \phi K N(\phi x_1 - \phi \sigma \sqrt{T}), \quad B = \phi S_0 N(\phi x_2) - \phi K N(\phi x_2 - \phi \sigma \sqrt{T})\\
C &= \phi S_0 ( H/S )^{2(\mu + 1)} N(\eta y_1) - \phi K ( H/S )^{2 \mu} N(\eta y_1 - \eta \sigma \sqrt{T})\\
D &= \phi S_0 ( B/S )^{2(\mu + 1)} N(\eta y_2) - \phi K ( B/S )^{2 \mu} N(\eta y_2 - \eta \sigma \sqrt{T})
\end{align*}
where $N$ is the cumulative distribution function of a standard Normal,
\begin{align*}
x_1 &= \frac{ \ln(S_0/K) }{\sigma \sqrt{T}} + (1+\mu) \sigma \sqrt{T}, \hspace{1cm}
x_2 = \frac{ \ln(S_0/H) }{\sigma \sqrt{T}} + (1+\mu) \sigma \sqrt{T} \\
y_1 &= \frac{ \ln(H^2 / (S_0 K)) }{\sigma \sqrt{T}} + (1+\mu) \sigma \sqrt{T}, \hspace{1cm}
y_2 = \frac{ \ln(H/S) }{\sigma \sqrt{T}} + (1+\mu) \sigma \sqrt{T},
\end{align*}
$\mu = -\frac{1}{2}$ and $H = \{ b, B \}$.
For a down-and-out put barrier option with $S_0 > H = b$ and $K > H$ the price is given analytically by:
\begin{equation} \label{BSDownOutPuPrice}\nn
price = A-B+C-D+F \hspace{1cm} \eta = 1, \phi = -1.
\end{equation}
As mentioned at the beginning of this section, to put our methodology in perspective
we have also implemented two other approaches to the numerical pricing of the barrier option:\\
\begin{itemize}
\item Standard Euler without hitting probability:\\
It consists of discretizing the SDE (\ref{BSmodelinLog}) according to the Euler scheme
\begin{equation} \label{EulerScheme}\nn
\left\lbrace
\begin{array}{l}
\what{X}_{0} = \ln(S_0) \\
\what{X}_{t_{i+1}} = \what{X}_{t_{i}} - \frac{1}{2} \sigma^2 \frac{T}{N} + \sigma(W_{t_{i+1}}-W_{t_i}).
\end{array}
\right.
\end{equation}
and evaluating $ \tilde{g}(X_T) \mathds{1}_{\zeta > T} $ by $ \tilde{g}(\what{X}_{t_{N}}) \mathds{1}_{\zeta^N > T} $
where $\zeta^N = \inf (t_i > 0: \what{X}_{t_{i}} \notin (\ell = \log(b), \infty)))$.
This numerical scheme for barrier option pricing had been studied in \cite{GobetKilled}, where it was shown to have a convergence rate of $\mathcal{O}(\frac{1}{\sqrt{N}})$. This loss of accuracy is mainly due to the fact that it is possible for $X$ to cross the barriers $l$ or $r$ at some time $t$ between grid points $t_i$ and $t_{i+1}$ and never be below the barrier at any of the dates $t_i$ for $i=1,..,N$.\\
\item Standard Euler with hitting probability:\\
Although this is still based on the Euler scheme simulations (\ref{EulerScheme}), it applies a further correction to remove the barrier crossing biases via the conditional no-hitting probability $\hat{p}_i$ using the Brownian bridge technique (see e.g, p.169 of \cite{GobetKilled}).
More precisely, the $\hat{p}_i$ are defined and can be computed analytically as
\begin{equation} \label{nohitproba_downout}\nn
\hat{p}_i := \bbP( \forall t \in [t_i, t_{i+1}], \what{X}_{t} > l | \what{X}_{t_i} = x_i, \what{X}_{t_{i+1}} = x_{i+1})
=1-e^{\left( -2 \frac{(x_i - l)(x_{i+1} - l)}{\sigma^2 (t_{i+1}-t_i)} \right)}
\end{equation}
where the process $(\what{X}_{t})_{0 \leq t \leq T}$ is the continuous Euler scheme which interpolates
$(\what{X}_{t_i})_{0 \leq i \leq N }$ in the following way:
\begin{equation} \label{ContEulerScheme}\nn
\forall t \in [t_i, t_{i+1}[: \hspace{0.5cm} \what{X}_{t} = \what{X}_{t_{i}} - \frac{1}{2} \sigma^2 (t - t_i) + \sigma(W_t-W_{t_i}).
\end{equation}
It then {\em corrects} the payoff $\tilde{g}(X_T) \mathds{1}_{\zeta > T} $ by considering instead
\begin{equation} \label{payoffwithhittingproba}\nn
\tilde{g}(\what{X}_{t_{N}}) \prod_{i=0}^{N-1} \hat{p}_i
\end{equation}
As shown in \cite{gobet2001euler}, this bias correction brings the convergence rate back to of order $N^{-1}$, which is the rate of weak convergence for the Euler-Maruyama scheme in the absence of killing. Moreover, in this specific Black-Scholes implementation, the simulation is exact, i.e no discretisation error occurs due to constant $\sigma$.
\end{itemize}
We shall next summarise the experiments details and comparison results.
\subsubsection{Set of parameters} \label{sec:dop: Set of parameters}
The numerical experiments are conducted using the following values for the parameters:
$S_0 = 1$, $T = 1$ year, $l = \log(b = 0.8)$, $r = +\infty$ and $\sigma = 20 \%$. For thoroughness, we have considered in-the-money ($K = 1.2$), at-the-money ($K = 1$) and out-the-money ($K = 0.9$) options. To reduce statistical noise, the simulations are run with 1 million Monte Carlo paths. The benchmark price is calculated analytically with formula (\ref{BSDownOutPuPrice}).
As our final results do not show any significant dependency on the moneyness of the option, we shall only report the results for at-the-money (ATM) options. In particular the discrepancy between benchmark prices and the numerical value for ATM down-and-out put options is shown in Figure \ref{Fig_BS_ATMDownOutPutError}. We have not observed any stability issues with any of our $h$-transformation schemes. As discussed earlier, the standard Euler with hitting probability method has no discretisation error. The discrepancy is therefore essentially the statistical noise.
Our numerical results show the rapid convergence of the numerical approximation of prices given by the recurrent and transient transforms via the implicit scheme and demonstrate clearly its effectiveness over the standard Euler scheme without hitting probability correction. This confirms the findings of our theoretical analysis even without satisfying all the conditions of Theorem \ref{t:main}.
Moreover, the prices given by the recurrent and transient transforms are quite comparable as predicted by the theoretical analysis.
Figures \ref{Fig_BS_ATMDownOutPuthRecurrentLogError} and \ref{Fig_BS_ATMDownOutPuthTansientLogError} show the log-log plot of the discrepancy associated to the recurrent and transient transforms respectively for ATM down-and-out put option, respectively. The respective numerical rates of convergence observed are $0.95$ and $0.9$.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.8cm 0cm 0cm}, clip]{Figures/BS_ATMDownOutPutError}
\caption{Absolute discrepancy between the benchmark price for ATM down-and-out put and those
calculated with different numerical schemes when $S_0 = 1$, $K = 1$, $T = 1$ year, $l = \log(b=0.8)$,
$r = + \infty $ and $\sigma = 20 \%$.}
\label{Fig_BS_ATMDownOutPutError}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.7cm 0cm 0cm}, clip]{Figures/BS_ATMDownOutPutRecurrentLogError}
\caption{Log-log plot of the absolute discrepancy for ATM down-and-out put price with recurrent transform numerical scheme when $S_0 = 1$, $K = 1$, $T = 1$ year, $l = \log(b=0.8)$,
$r = + \infty $ and $\sigma = 20 \%$.}
\label{Fig_BS_ATMDownOutPuthRecurrentLogError}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.7cm 0cm 0cm}, clip]{Figures/BS_ATMDownOutPutTransientLogError}
\caption{Log-log plot of the absolute discrepancy for ATM down-and-out put price with transient transform numerical scheme when $S_0 = 1$, $K = 1.0$, $T = 1$ year, $l = \log(b=0.8)$,
$r = + \infty $ and $\sigma = 20 \%$.}
\label{Fig_BS_ATMDownOutPuthTansientLogError}
\end{figure}
\subsection{Down and up out double barrier call option} \label{subsection:Down and up out double barrier call option}
For a down-and-up-out barrier call option, the payoff is given by $\max(S_T - K, 0) \mathds{1}_{\zeta > T}$ where $\zeta :=\inf\{t>0:S_{t} \notin (b, B)$, $0 < b (=e^{\ell}) < B (=e^r)< \infty$, $K$ is the option strike and $T$ the maturity. In Black-Scholes model, with $ b < S_0 < B $, the price can be computed using Ikeda and Kunitomo formula (see Theorem 3.2 in \cite{kunitomo1992pricing}):
\begin{align}\label{IkedakunitomoFormula}
price &= S_0 \sum_{n = - \infty}^{+ \infty} \Bigg \{ \left( \frac{B^n}{b^n} \right) [N(d_1) - N(d_2)]
- \left( \frac{b^{n+1}}{B^n S_0} \right) [N(d_3) - N(d_4)] \Bigg \} \\
& - K \sum_{n = - \infty}^{+ \infty} \Bigg \{ \left( \frac{B^n}{b^n} \right)^{-1} [N(d_1 - \sigma \sqrt{T}) - N(d_2 - \sigma \sqrt{T})]
- \left( \frac{b^{n+1}}{B^n S_0} \right)^{-1} [N(d_3 - \sigma \sqrt{T}) - N(d_4 - \sigma \sqrt{T})] \Bigg \} \nonumber
\end{align}
where
\begin{align*}
d_{1n} &= \frac{ \ln( S_0 B^{2n}/(K b^{2n}) ) + \sigma^2 T/2 }{\sigma \sqrt{T}}, \quad d_{2n} = \frac{ \ln( S_0 B^{2n-1}/(b^{2n}) ) + \sigma^2 T/2 }{\sigma \sqrt{T}}\\
d_{3n} &= \frac{ \ln( b^{2n+2}/(K S_0 B^{2n}) ) + \sigma^2 T/2 }{\sigma \sqrt{T}}, \quad d_{4n} = \frac{ \ln( b^{2n+2}/(S_0 B^{2n+1}) ) + \sigma^2 T/2 }{\sigma \sqrt{T}}
\end{align*}
Note that the option price is expressed as an infinite series invoving weighted normal distribution functions. However, numerical studies in \cite{kunitomo1992pricing} show the convergence of the formula is rapid and it is suggested that it suffices to calculate the leading two or three terms for most cases. Here, we use the Excel spreadsheet provided in \cite{haug2007complete} which computes each series above with $n$ from $-5$ to $5$.
For the standard Euler with hitting probability correction, the no-hitting probability $\hat{p}_i$ is also given as an infinite series in \cite{GobetKilled}\footnote{up to a typographical error.}
\begin{align}
\hat{p}_i &:= \bbP( \forall t \in [t_i, t_{i+1}], \what{X}_{t} \in (\ell,r) | \what{X}_{t_i} = x_i, \what{X}_{t_{i+1}} = x_{i+1})\nn \\
&= \mathds{1}_{ l < x_i, x_{i+1} <r} \sum_{n=-\infty}^{n=+\infty} \left[ e^{ \frac{-2n (r-l)(n(r-l)+ x_{i+1} - x_{i})}{\sigma^2 (t_{i+1} - t_{i})} } - e^{ \frac{-2( n (r-l) + x_{i} -r )( n(r-l) + x_{i+1} - r )}{\sigma^2 (t_{i+1} - t_{i})} } \right] \label{nohitproba_doublenotouch}
\end{align}
The practical studies on this formula again suggest it is perfectly sufficient for numerical purposes to calculate the leading two or three terms in most cases. To be conservative, in our experiments, the $\hat{p}_i$ are estimated using $n$ from $-5$ to $5$.
\subsubsection{Set of parameters} \label{subsubsection:Down and up out double barrier call option Set of parameters}
The numerical experiments are conducted using the following values for the parameters:
$S_0 = 1$, $T = 1$ year, $b = 0.85$, $B = 1.25$ and $\sigma = 20 \%$. For thoroughness, we consider in-the-money ($K = 0.9$), at-the-money ($K = 1$) and out-the-money ($K = 1.05$) options. To reduce statistical noise, the simulations are run with 1 million Monte Carlo paths. The benchmark price is calculated with formula (\ref{IkedakunitomoFormula}) with truncation by keeping terms from $n = -5$ to $n = 5$.
As in the previous study, no significant difference is observed by changing the moneyness of the option. Thus, we we will again report the results pertaining to the ATM options. The discrepancies between benchmark prices and numerical methods for the ATM down-and-up-out call options are shown in Figure \ref{Fig_BS_ATMDoubleBarrierCallError}. We have not observed any stability issues with the recurrent transform method. As discussed, the standard Euler with hitting probability correction has only truncation error in the computation of no hitting probability (\ref{nohitproba_doublenotouch}), which we believe to be negligible. The discrepancy can then be attributed essentially to the statistical noise. As in the previous experiment our numerical results align with the theoretical predictions. In particular Figure \ref{Fig_BS_ATMDoubleBarrierCallLogError} shows the log-log plot of the discrepancy associated to the recurrent transform method for ATM down-and-up-out call options with numerical rate of convergence of $0.81$.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.8cm 0cm 0cm}, clip]{Figures/BS_ATMDoubleBarrierCallError}
\caption{Absolute discrepancy between the benchmark price for ATM double barrier call and those
calculated with different numerical schemes when $S_0 = 1$, $K = 1$, $T = 1$ year, $b = 0.85$, $B = 1.25$ and $\sigma = 20 \%$.}
\label{Fig_BS_ATMDoubleBarrierCallError}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.7cm 0cm 0cm}, clip]{Figures/BS_ATMDoubleBarrierCallLogError}
\caption{Log log plot of the absolute discrepancy for ATM double barrier call price with recurrent transform numerical scheme when $S_0 = 1$, $K = 1$, $T = 1$ year, $b = 0.85$, $B = 1.25$ and $\sigma = 20 \%$.}
\label{Fig_BS_ATMDoubleBarrierCallLogError}
\end{figure}
\subsection{Time-homogeneous hyperbolic local volatility model} \label{subsec:HLV model}
Since the advent of the Black-Scholes option pricing formula, the study of implied volatility has become a central preoccupation for both academics and practitioners. It is well known, actual option prices rarely conform to the predictions of explicit formulas because the idealized assumptions required for it to hold don't apply in the real world. Consequently, implied volatility (the volatility input to the Black-Scholes formula that generates the market European Call or Put price) in general depends on the strike $K$ and the maturity of the option $T$. The collection of all such implied volatilities is known as the volatility surface. For example, the effect that implied volatility $\sigma_{im}(T,K)$ is a decreasing
function of strike is called {\it{skew}} and is usually observed in equity derivatives market. This means that the underlying asset price process cannot be explained using the Black-Scholes
model, for which the implied volatility does not depend on the strike. This motivates the researchers to find a convenient model for the underlying asset to evaluate contingent
claim prices. Local volatility models, either parametric or non-parametric, (see
e.g \cite{Dupire94,DerKa98,Rubi94}), arguably capture the surface of implied volatilities more precisely than other approaches such as stochastic volatility models (see e.g \cite{MadQianRen07,Romo12}). Needless to say, the volatility surface has a significant impact on barrier option valuation. Indeed, the barrier hitting probability depends strongly on the dynamics of the volatility of the spot pricess (see, e.g., \cite{Bossens19}).
For our analysis, we consider the time homogeneous hyperbolic local volatility
model (HLV), which is widely used in quantitative finance community to capture the
market {\it{skew}}. It corresponds to a parametric local volatility-type model in
which the dynamics of the underlying under the risk neutral measure $\bbP$ is given by
\begin{equation} \label{HLVmodel}\nn
dX_t = \sigma(X_t) dW_t, \,\,\,\, X_0=1,
\end{equation}
where
\begin{equation} \label{HLVVol}\nn
\sigma (x) = \nu \Big\{ \frac{(1-\beta+\beta^2)}{\beta} x +\frac{(\beta-1)}{\beta} \big(\sqrt{x^2+\beta^2(1-x)^2}-\beta\big) \Big\}.
\end{equation}
Here $\nu >0$ is the level of volatility, $\beta \in (0,1]$ is the skew
parameter.
First introduced in \cite{Jackel10} it behaves similarly to the Constant Elasticity of Variance (CEV) model and has been used for numerical experiments in, e.g., \cite{HokNGareAntonis18,HokShih2019,hok2021pricing}.
A practical advantage of this model is that zero is not an attainable boundary, which in turn avoids
some numerical instabilities present in the CEV model when the underlying asset price
is close to zero (see e.g. \cite{And00}). It corresponds to the Black-Scholes model for $\beta=1$ and exhibits a skew for the implied volatility surface when $\beta \neq 1$. Figure \ref{figure:HyperbolicLVImpactBeta} illustrates the impact of the parameter $\beta$ on the skew of the volatility surface. We observe that the skew increases significantly with decreasing value of $\beta$. For example with $\nu = 0.3, \, \beta = 0.2$, the difference in volatility between strikes at $50\%$ and at $100\%$ is about $15 \%$.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.45, trim={0.5cm 7cm 1cm 6cm}, clip]{Figures/HyperbolicLVImpactBeta}
\caption{ Impact of the value $\beta$ on the hyperbolic local volatility for fixed volatility level $\nu = 0.3$. }
\label{figure:HyperbolicLVImpactBeta}
\end{figure}
\subsubsection{Down and up out double barrier call option} \label{subsubsection:Down and up out double barrier call option}
In this implementation we shall set $h(x) = (x-l)(r-x)$
and the associated BEM scheme will be then solved using bisection method with Octave vectorization for faster code execution. Consequently the price is approximated by
\begin{equation*} \label{BEMPriceHLV}
price \approx h(x) \bbE^{h,x} \left[ \frac{(\what{X}_{t_{N}} - K)_+}{h(\what{X}_{t_{N}})} e^{ \frac{1}{2} \frac{T}{N} \sum_{n=0}^{N-1} \sigma^2(\what{X}_{t_{n}}) \frac{h''}{h}( \what{X}_{t_{n}} ) } \right]
\end{equation*}
For comparison, we compute also the numerical price given by the standard Euler scheme with hitting probability. The scheme is given by equation (\ref{EulerScheme}) and the no hitting probability formula by (\ref{nohitproba_doublenotouch}), where $\sigma$ is computed using the parametric local volatility function (\ref{HLVVol}). Experiment details and comparison results are described below.
\subsubsection{Set of parameters} \label{sec:hlv: Set of parameters}
The numerical experiments are conducted using the following values for the parameters:
$S_0 = 1$, $\nu = 20 \%$, $\beta = 0.5$, $T = 1$ year, $b = 0.85$, $B = 1.25$. For thoroughness, we consider in-the-money ($K = 0.9$), at-the-money ($K = 1$) and out-the-money ($K = 1.05$) options. The benchmark prices for each numerical method are computed by the method itself with very dense time grid and high number of Monte Carlo paths.
In this case we observed some differences regarding the moneyness of the option in our numerical results. More precisely, the method performed relative poorly for the ATM option. For this reason we report below the results in all three cases and provide an explanation for the seemingly poor performance for the ATM option.
The discrepancies between benchmark prices and numerical methods for ITM, ATM and OTM double barrier call options are shown respectively in Figures \ref{Fig_HLV_ITMUpDownOutCallError}, \ref{Fig_HLV_ATMUpDownOutCallError} and \ref{Fig_HLV_OTMUpDownOutCallError}. We have not observed any stability issues with the recurrent transform scheme. Interestingly, our recurrent transformation has a much smaller error than the explicit Euler method with hitting probability correction when the number of discretisations is reasonably large. More importantly, this outperformance is still valid even if the number of Monte Carlo simulations for the explicit Euler method is increased five times. Having said that, one should still treat such a conclusion with caution as our benchmark price and hitting probabilities are calculated by applying a truncation and, thus, is subject to error. Nevertheless, the {\em outperformance} is still promising as our truncation is no coarser than the common industry practice.
Figures \ref{Fig_HLV_ITMDoubleBarrierCallLogError}, \ref{Fig_HLV_ATMDoubleBarrierCallLogError} and \ref{Fig_HLV_OTMDoubleBarrierCallLogError} show, respectively, the log-log plot of the discrepancy associated to the recurrent transform method for ITM, ATM and OTM double barrier call options. The numerical rate of convergence are respectively $0.91$, $0.63$ and $1$, using $2\times 10^5$ Monte Carlo simulations. Although the rate of convergence for the ATM option is far from the theoretical rate of 1, a closer look at Figure \ref{Fig_HLV_ATMUpDownOutCallError} reveals a clue. Note that the error of approximation converges very rapidly to zero after a few iterations and further discretisations do not significanly alter the already very small error term. This indicates that the observed error in this case can be mostly attributed to the statistical noise and the simple regression to obtain the convergence rate does not work well.
When we run the same experiment for the Euler scheme with hitting probability correction with $2\times 10^5$ Monte Carlo simulations, we observe a similar drop in the performance and the convergence rates are found to be $0.50$, $0.59$ and $0.61$, respectively. However, the convergence rates for the latter scheme increases to $0.83$, $0.83$ and $0.77$, respectively, when the number of simulations are increased five-fold.
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 1.2cm 0cm 0cm}, clip]{Figures/HLV_ITMUpDownOutCallError}
\caption{Absolute discrepancy between the benchmark price and those
calculated by different numerical schemes for ITM double barrier call when $S_0 = 1$, $K = 0.9$, $\nu = 20 \%$, $\beta = 0.5$, $T = 1$ year, $b = 0.85$, $B = 1.25$.}
\label{Fig_HLV_ITMUpDownOutCallError}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.8cm 0cm 0cm}, clip]{Figures/HLV_ATMUpDownOutCallError}
\caption{Absolute discrepancy between the benchmark price for and those
calculated by different numerical schemes for ATM double barrier call when $S_0 = 1$, $K = 1$, $\nu = 20 \%$, $\beta = 0.5$, $T = 1$ year, $b = 0.85$, $B = 1.25$.}
\label{Fig_HLV_ATMUpDownOutCallError}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.8cm 0cm 0cm}, clip]{Figures/HLV_OTMUpDownOutCallError}
\caption{Absolute discrepancy between the benchmark price and those
calculated by different numerical schemes for double barrier call when $S_0 = 1$, $K = 1.05$, $\nu = 20 \%$, $\beta = 0.5$, $T = 1$ year, $b = 0.85$, $B = 1.25$.}
\label{Fig_HLV_OTMUpDownOutCallError}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.7cm 0cm 0cm}, clip]{Figures/HLV_ITMUpDownOutCallLogError}
\caption{Log-log plot of the absolute discrepancy for ITM double barrier call price with H-transform numerical scheme when $S_0 = 1$, $K = 0.9$, $T = 1$ year, $b = 0.85$, $B = 1.25$, $\nu = 20 \%$ and $\beta = 0.5$.}
\label{Fig_HLV_ITMDoubleBarrierCallLogError}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.7cm 0cm 0cm}, clip]{Figures/HLV_ATMUpDownOutCallLogError}
\caption{Log-log plot of the absolute discrepancy for ATM double barrier call price with H-transform numerical scheme when $S_0 = 1$, $K = 1$, $T = 1$ year, $b = 0.85$, $B = 1.25$, $\nu = 20 \%$ and $\beta = 0.5$.}
\label{Fig_HLV_ATMDoubleBarrierCallLogError}
\end{figure}
\begin{figure}[htbp]
\centering
\includegraphics[scale=0.6,trim={0cm 0.7cm 0cm 0cm}, clip]{Figures/HLV_OTMUpDownOutCallLogError}
\caption{Log-log plot of the absolute discrepancy for OTM Double Barrier Call price with H-transform numerical scheme when $S_0 = 1$, $K = 1.05$, $T = 1$ year, $b = 0.85$, $B=1.25$, $\nu = 20 \%$ and $\beta = 0.5$.}
\label{Fig_HLV_OTMDoubleBarrierCallLogError}
\end{figure}
\section{Conclusion} \label{s:conclusion}
We have introduced a novel backward Euler-Maruyama method to increase the weak convergence rate of approximations in the presence of killing. The numerical experiments confirm our theoretical prediction that the convergence rate is of order $1/N$, where $N$ is the number of discretisations. Moreover, the numerical studies suggest that one does not need a large $N$ to obtain a sufficiently close approximations as all numerical studies indicate errors terms diminishing very rapidly with a small number of iterations. The numerical experiments also suggested our method outperforming the {\em Brownian bridge method} in certain cases although such a statement does not currently have any theoretical backing. However, we believe that the method developed in this paper will perform better when applied to a higher order Euler-scheme such as the Milstein scheme. Such investigations are left for future research.
Moreover, a close look into our technical analysis reveals that our convergence result does not depend heavily on the one-dimensional nature of the problem. In particular it is relatively clear how to obtain a version of Theorem \ref{t:invmomnt} in the multidimensional case using well-established potential theoretic arguments. However, our main obstacle in not being able to immediately obtain a multidimensional version of Theorem \ref{t:main} is the absence of a systematic study of recurrent transformations in higher dimensions. Such a study and its applications to the Euler methods for killed diffusions will be the subject of future research.
\bibliographystyle{siam}
|
\section*{Introduction}
Recently, the discriminant has been used to determine the automorphism group of some PI algebras \cite{CPWZ1, CPWZ3}, and solve isomorphism problem \cite{CPWZ2} and Zariski cancellation proplem \cite{BZ, LeWZ, LWZ}.
Despite the usefulness of the discriminant, the computation of the discriminant turns out to be a rather diffculty problem, see \cite{CYZ} for example.
Nguyen, Trampel and Yakimov presented a general method for computing the discriminants of algebras in \cite{NTY}, by associating discriminants of noncommutative algebras with Poisson geometry.
In \cite{LY}, Levitt and Yakimov maked use of techniques from quantum cluster algebras to derive explicit formulas for the discriminants of quantized Weyl algebras at roots of unity.
Almost all these algebras are skew Calabi-Yau algebras which are finitely generated modules over central subalgebras. It worth pointing out that these algebras are Frobenius algebras over commutative Calabi-Yau algebras.
\begin{lem}[Corollary \ref{sCY-over-com-CY-is-Frob-alg}] \label{key-lem}
Let $R$ be an affine Calabi-Yau algebra of dimension $d$ and $A$ be a module-finite $R$-algbera. If $A$ is a skew Calabi-Yau algebra of dimension $d$, then $A$ is a Frobenius $R$-algebra.
\end{lem}
The discriminant of a Frobenius algebra $A$ is the norm of the different of $A$, see Lemma \ref{det(l-multi)}.
Throughout the rest of this paper, $\kk$ is a base field with char $\kk = 0$, and all vector spaces, algebras and Hopf algebras are over $\kk$. Unadorned $\otimes$ means $\otimes_{\kk}$ and $\Hom$ means $\Hom_{\kk}$.
$H$ will stand for a Hopf algebra $(H, \Delta, \varepsilon)$ with bijective antipode $S$. We use the Sweedler notation $\Delta(h) = \sum_{(h)} h_1 \otimes h_2$ for all $h \in H$.
We recommend \cite{Mon} as a basic reference for the theory of Hopf algebras.
We are interested in the following algebra which comes from the noncommutative invariant theory. Let $H$ be a finite-dimensional semisimple Hopf algebra, and $A$ be a Noetherian connected graded Artin-Schelter regular domain \cite{AS87}, which are skew Calabi-Yau algebras by \cite[Lemma 1.2]{RRZ}. Suppose that $H$ acts homogeneously and inner faithfully on $A$ such that $A$ is a left $H$-module algebra.
Then $H$ is called a {\it reflection Hopf algebra} or {\it reflection quantum group} \cite[Definition 3.2]{KKZ2} if the fixed subring $A^H$ is again Artin-Schelter regular.
Kirkman and Zhang \cite{KZ}, introduced some noncommutative version of Jacobian $\mathfrak{j}_{A, H}$, reflection arrangement $\mathfrak{a}_{A, H}$ and discriminant $\delta_{A, H}$ of the $H$-action on $A$, see Definition \ref{Jacb-ref-arrang-disc}.
When $A^H$ is central in $A$ and $H$ is a dual reflection group, then $\delta_{A, H}$ and the noncommutative discriminant have the same prime radical \cite[Theorem 0.7]{KZ}.
Our main result is to relate the noncommutative discriminant to the Jacobian of a general Hopf action.
\begin{thm}[Theorem \ref{main-thm}]\label{intro-main-thm 1}
Suppose that $H$ acts on $A$ as a reflection Hopf algebra, and that $R:=A^H$ is central in $A$. Then the discriminant $d(A, R; \tr) =_{\kk^{\times}} \mathfrak{j}_{A, H}^n$ and $\sqrt{(\delta_{A, H})} = \sqrt{(d(A, R; \tr))}$,
where $n$ is the rank of $R$-module $A$.
\end{thm}
We also study the discriminant of the smash product.
\begin{thm}[Theorem \ref{disc-smash-prod}]\label{intro-main-thm 2}
Suppose that $H$ acts on $A$ as a reflection Hopf algebra, and that $R:=A^H$ is central in $A$. Then the discriminant $d(A\#H, R; \tr) = \mathfrak{j}_{A, H}^{nm}$, where $n$ is the rank of $R$-module $A$ and $m = \dim_{\kk}(H)$.
\end{thm}
The organization of the paper is as follows.
In section \ref{section 1}, we go over some notation and recall some preliminary results. We also describes the discriminant of Frobenius algebra in this section.
In section \ref{section 2}, the definition and basic results about skew Calabi-Yau algebras are recalled first, and Lemma \ref{key-lem} is also proved.
The necessary definition and background for reflection Hopf algebra are in section \ref{section 3}.
In section \ref{section 4}, we prove the Theorem \ref{intro-main-thm 1} which connects the discriminant with the invariant of the Hopf action.
We prove a more general formula regarding discriminants of Hopf Galois extensions from which the Theorem \ref{intro-main-thm 2} follows in section \ref{section 5}.
\section{Preliminaries}\label{section 1}
We will employ the following notation. Let $R$ be a ring, $M$ be an $R$-$R$-bimodule, and $\mu, \nu$ be automorphisms of $R$. Let ${^{\mu}M^{\nu}}$ denote the induced $R$-$R$-bimodule such that ${^{\mu}M^{\nu}} = M$ as an Abelian group, and the module structure given by
$$a \cdot m \cdot b = \mu(a)m\nu(b), \qquad \text{ for all } a, b \in R, \, m \in {^{\mu}M^{\nu}}(=M).$$
If $\mu$ (resp. $\nu$) is the identity map of $R$, then we use $M^{\nu}$ (resp. $^{\mu}M$) instead of ${^{\mu}M^{\nu}}$.
\subsection{Hattori-Stallings trace map and discriminant}
Let $R$ be a ring, and $P$ be a finitely generated projective right $R$-module. Then there is an isomorphism
$$\varphi_P: P \otimes_R \Hom_{R}(P, R) \To \End_R(P)(:= \Hom_R(P, P)), \qquad x \otimes f \mapsto \big(y \mapsto xf(y) \big),$$
and a morphism
$$\psi_P: P \otimes_R \Hom_{R}(P, R) \To R/[R,R], \qquad x \otimes f \mapsto f(x)+[R,R],$$
where $[R, R]$ is the additive subgroup of $R$ generated by the elements $ab-ba$ with $a, b \in R$. Then the {\it Hattori-Stallings map} of $P$ is defined by
$$\tr_{P_R}: = \psi_P \circ \varphi_P^{-1} : \End_R(P) \To R/[R, R].$$
We will write it simply $\tr_P$ or $\tr$ when no confusion can arise. And Hattori-Stallings map has the following properties.
\begin{lem}\cite{Hat, Sta}\label{HS-trace}
Let $P$ be a finitely generated projective right $R$-module.
\begin{enumerate}
\item Let $x_1, \dots, x_n \in P$ and $x_1^*, \dots, x_n^* \in P^*:= \Hom_R(P, R)$ be a dual basis for $P_R$. Then
$$\tr_P(f) = \sum\limits_{i=1}^{n} x_i^*(f(x_i)) + [R, R], \text{ for any }f \in \End_R(P).$$
\item If $f, g \in \End_R(P)$, then $\tr_P(f+g) = \tr_P(f) + \tr_P(g)$.
\item For any $f,g \in \End_R(P)$, then $\tr_P(gf) = \tr_P(fg)$.
\item If $P$ is a free $R$-module of rank $n$, then $\tr_P(\id_P) = n \cdot 1_R + [R, R]$, where $\id_P$ is the identity map of $P$.
\end{enumerate}
\end{lem}
Let $R \to A$ be a ring homomorphism such that $A$ is a finitely generated projective $R$-module.
Left multiplication defines a natural embedding $\iota: A \to \End_R(A), \, a \mapsto a_L$. The composition $\tr_A \iota$ is also called {\it Hattori-Stallings map}, and denoted by $\tr_A$.
\begin{lem}\label{composition-trace}
Retain the notation as above. Let $P$ be a finitely generated projective right $A$-module. Then for any $f \in \End_A(P)$,
$$\tr_{P_R}(f) = \tr_{A}(\tr_{P_A}(f)).$$
\end{lem}
\begin{proof}
Since $\tr_{A}([A, A]) = 0$ by Lemma \ref{HS-trace} (3), then the composition map $\tr_A \circ \tr_{P_A}$ is well defined.
Let $x_1, \dots, x_n \in P$ and $x_1^*, \dots, x_n^* \in \Hom_A(P, A)$ be a dual basis of projective module $P_A$.
Let $y_1, \cdots, y_m \in A$ and $y_1^*, \cdots, y_m^*\in \Hom_R(A, R)$ be a dual basis of projective module $A_R$. For any $x \in P$,
$$\sum_{i,j} x_jy_i y^*_i(x^*_j(x)) = \sum_{j=1}^m x_jx^*_j(x) = x.$$
Hence, $\{x_jy_i\}$ and $\{y^*_ix^*_j\}$ is a dual basis of $P_R$.
Then, for any $f \in \End_A(P)$,
\begin{align*}
\tr_{P_A}(f) & = \sum_{i,j} y^*_i(x^*_j(f(x_jy_i))) + [R, R] & \\
& = \sum_{i,j} y^*_i(x^*_j(f(x_j))y_i) + [R, R] & \\
& = \tr_A(\sum_{j=1}^m x^*_j(f(x_j))) + [R, R] & \text{by Lemma \ref{HS-trace} (1)} \\
& = \tr_A(\tr_{P_A}(f)) + [R, R]. &
\end{align*}
\end{proof}
In this paper, we always consider the following trace map over a commutative ring. Let $R$ be a commutative ring, and $A$ be an $R$-algebra. An $R$-linear map $\tr: A \to R$ is called a {\it trace map} from $A$ to $R$, if $\tr(xy) = \tr(yx)$ for any $x, y \in A$.
Obviously, if $A$ is a finitely generated projective $R$-module, then the Hattori-Stallings map $\tr_{A}: A \to R$ is a trace map from $A$ to $R$. The trace map $\tr_A$ is called {\it Hattori-Stallings trace map}.
Let $R$ be a commutative ring, and $R^{\times}$ be the set of invertible elements in $R$. For any $x, y \in R$, we use the notation $x =_{R^{\times}} y$ to indicate that $x = uy$ for some $u \in R^{\times}$.
\begin{defn}\label{disc-defn}
Let $R$ be a commutative ring, $A$ be an $R$-algebra, and $\tr : A \to R$ be a trace map from $A$ to $R$.
Suppose that $A$ is a free $R$-module with an $R$-basis $\{ x_1, \cdots, x_m \}$. Then the {\it discriminant} of $A$ over $R$ with respect to $\tr$ is defined to be the determinant
$$d(A, R; \tr) =_{R^{\times}} \det([\tr(x_ix_j)]^m_{i, j =1}).$$
\end{defn}
Note that the discriminant $d(A, R; \tr)$ is independent of bases of $A$ up to multiplication by an invertible element in $R$.
\subsection{Frobenius extensions}
Let's recall some definitions about Frobenius extensions.
\begin{defn}
Let $R$ be a (graded) subring of a (graded) ring $A$. Then $R \subseteq A$ is called a {\it (graded) Frobenius extension} if
\begin{enumerate}
\item $A$ is a finitely generated (graded) projective right $R$-module,
\item and there is an (graded) $R$-$A$-bimodule isomorphism $\Theta: A \stackrel{\cong}{\To} \Hom_R(A, R)$.
\end{enumerate}
\end{defn}
Many examples and basic properties of Frobenius extensions can be found in \cite{Kad}.
Let $R \subseteq A$ be a Frobenius extension, and $x_1, \dots, x_n \in A$ and $f_1, \dots, f_n \in \Hom_R(A, R)$ be a dual basis of $A_R$.
Write $\theta = \Theta(1)$.
By definition, $\theta$ is an $R$-$R$-bimodule morphism, and there exists $y_1, \dots, y_n \in A$ such that $f_i = \Theta(y_i) = \theta \cdot y_i$. Then $\sum_{i=1}^n x_i \theta(y_ia) = a$ for any $a \in A$. It is easy to see that $\Theta(\sum_{i=1}^n \theta(ax_i)y_i) = \theta \cdot a$. So $\sum_{i=1}^n \theta(ax_i)y_i = a$ for any $a \in A$.
On the other hand, for any ring extension $R \subseteq A$, if there exists $x_1, \dots, x_n, y_1, \dots, y_n \in A$ and an $R$-$R$-bimodule morphism $\theta: A \to R$ such that for any $a \in A$,
$$\sum_{i=1}^n x_i \theta(y_ia) = a = \sum_{i=1}^n \theta(ax_i)y_i$$
then $A$ is a Frobenius extension of $R$.
Then $(\theta, x_i, y_i)$ is called a {\it Frobenius system}, $\theta$ a {\it Frobenius homomorphism}, $(x_i, y_i)$ a {\it dual basis}, and $\Theta: A \to \Hom_R(A, R), \, a \mapsto \theta \cdot a$ is a {\it right Frobenius isomorphism}. By definition,
\begin{equation}\label{Frob-trace}
\tr: A \To R/[R, R], \qquad a \mapsto \sum_{i=1}^N \theta(y_iax_i) + [R, R]
\end{equation}
is the Hattori-Stallings trace map by Lemma \ref{HS-trace} (1).
Clearly, the definition is left-right symmetric, that is, $R \subseteq A$ is a Frobenius extension if and only if $R^{op} \subseteq A^{op}$ is a Frobenius extension, where $A^{op}$ and $R^{op}$ are the opposite rings of $A$ and $R$, respectively.
Frobenius extension is a transitive notion as follow.
\begin{lem}\label{Frob-trans-lem}
If $R \subseteq A$ and $S \subseteq R$ are Frobenius extensions, then the composite ring extension $R \subseteq A$ is also a Frobenius extension.
\end{lem}
If $R$ is a commutative ring, then $A$ is also called a {\it Frobenius $R$-algebra}.
And there is an automorphism $\mu \in \Aut(A)$ such that the right Frobenius isomorphism
$$\Theta: {^\mu A} \To \Hom_R(A, R), \qquad a \mapsto \theta \cdot a$$
is an $A$-$A$-bimodule morphism, and $\mu$ is called the {\it Nakayama automorphism} of $A$.
The Nakayama automorphism of $A$ is not unique, but unique up to inner automorphisms of $A$.
Since the Hattori-Stallings trace map $\tr: A \to R$ is an $R$-module morphism, there exists $\omega \in A$ such that $\tr = \Theta(\omega) = \theta \cdot \omega$.
Further, if there exists an $A$-$A$-bimodule isomorphism $\Theta: A \to \Hom_R(A, R)$, then $\tr:= \Theta(1)$ is a trace map from $A$ to $R$, and $A$ is called a {\it symmetric Frobenius} $R$-algebra.
It is obvious that $\End_R(P)$ is a symmetric Frobenius $R$-algebra, where $P$ is a finitely generated projective $R$-module
Brown, Gordon and Stroppel proved that many skew Calabi-Yau algebras are Frobenius algebras over their regular central subalgebras in \cite{BGS}
\begin{lem}\label{quotient-Frobenius}
Let $A$ be a Frobenius $R$-algebra, and $S$ be a commutative $R$-algebra. Then $A \otimes_R S$ is a Frobenius $S$-algebra.
\end{lem}
\subsection{Different and discriminant of free Frobenius algebra}
A Frobenius $R$-algebra $A$ is called a {\it free Frobenius} $R$-algebra, if $A$ is a free $R$-module.
\begin{defn}
Let $A$ be a free Frobenius $R$-algebra. For any $a \in A$, we will denote by $\nr(a)$ the determinant of the left multiplication linear transformation $a_L \in \End_R(A)$. And we call $\nr(a)$ the {\it norm} of $a$.
\end{defn}
The following lemma gives a way to compute the discriminant of free Frobenius algebra.
\begin{lem}\label{det(l-multi)}
Let $A$ be a free Frobenius $R$-algebra with a Frobenius system $(\theta, x_i, y_i)$ such that $\{x_i\}_{i=1}^n$ is a basis of free $R$-module $A$. Let $\mu$ be the Nakayama automorphism of $A$. Then
$$\tr = \theta \cdot \omega, \quad \text{ and } \quad d(A, R; \tr) =_{R^{\times}} \nr(\omega),$$
where $\omega = \sum \mu(x_i)y_i$ is called a {\it different} of $A$ over $R$. In particular, the different $\omega$ is a $\mu$-normal element of $A$, that is, $\mu(a) \omega = \omega a$ for any $a \in A$.
\end{lem}
\begin{proof}
Recall that the right Frobenius isomorphism $\Theta: {^\mu A} \to \Hom_R(A, R), \, a \mapsto \theta \cdot a$ is an $A$-$A$-bimodule morphism. Hence $a \cdot \theta = \theta \cdot \mu(a)$ for all $a \in A$.
Since $\tr(a) = \theta(\sum_{i=1}^n y_i a x_i)$ for any $a \in A$, then $\tr = \theta \cdot \omega$ where $\omega = \sum_{i=1}^n \mu(x_i)y_i$. Clearly, $\{y_i\}_{i=1}^n$ is also a basis of free $R$-module $A$. Write $\omega x_i = \sum_{j=1}^n \omega_{ij} y_j$ with $\omega_{ij} \in R$. Since $\theta(y_ix_j) = \delta_{ij}$ by definition,
then
\begin{align*}
d(A, R; \tr) & =_{R^{\times}} \det([\tr(x_ix_j)]_{i,j = 1}^n) \\
& =_{R^{\times}} \det([\theta(\omega x_ix_j)]_{i,j = 1}^n) \\
& =_{R^{\times}} \det([\sum_{k = 1}^n \omega_{ik} \theta(y_kx_j)]_{i,j = 1}^n) \\
& =_{R^{\times}} \det([\omega_{ij}]_{i,j = 1}^n) \\
& =_{R^{\times}} \nr(\omega).
\end{align*}
And, for any $a, b \in A$,
$$(\theta \cdot (\omega a)) (b) = \tr(ab) = \tr(ba) = (a \cdot \theta \cdot \omega)(b) = (\theta \cdot (\mu(a) \omega))(b).$$
It follows that $\Theta(\omega a) = \Theta(\mu(a) \omega)$, thus $\omega a = \mu(a) \omega$ since $\Theta$ is an isomorphism.
\end{proof}
Here is an example to show how to calculate the discriminant of free Frobenius algebras by using Lemma \ref{det(l-multi)}.
\begin{ex}
Recall that the skew polynomial algebra $A:=\kk_{p_{ij}}[x_1, \dots, x_n]$ is generated by $x_i$ and subject to the relations $x_jx_i = p_{ij}x_ix_j$ for all $i < j$, where each $p_{ij}$ is a root of unity in $\kk$. Set $p_{ii} = 1$ for all $1\leq i \leq n$ and $p_{ji} = p_{ij}^{-1}$ for all $1 \leq i < j \leq n$. Let $l_1, \dots, l_n \in \Z_{+}$ such that $p_{ij}^{l_i} = 1$ for all $j$. Then $R:= \kk[x_1^{l_1}, \dots, x_n^{l_n}]$ is a central subalgebra of $A$ where $l_i \in \N$. It is clear that $\{ x_1^{i_1} \cdots x_n^{i_n} \}_{0 \leq i_s < l_s}$ is a basis of $R$-module $A$.
There is an $R$-module morphism $\theta$ defined by, for any $s = 1, \dots, n$ and $0 \leq i_s < l_s$, $$\theta(x_1^{i_1} \cdots x_n^{i_n}) = \begin{cases}
1, & i_s = l_s - 1 \text{ for all } i \\
0, & \text{ otherelse}.
\end{cases}$$
Then $A$ is a free Frobenius $R$-algebra with a Frobenius system $(\theta, x_1^{i_1} \cdots x_n^{i_n}, x_1^{l_1-i_1-1} \cdots x_n^{l_n-i_n-1})$. By a direct computation, the Nakayama automorphism $\mu$ sends $x_i$ to $p_{1i} \cdots p_{i-1 \, i} p_{i+1 \, i} \cdots p_{n \, i} x_i$,
$$\tr =_{\kk^{\times}} \theta \cdot (x_1^{l_1-1} \cdots x_n^{l_n-1}), \text{ and } d(A, R; \tr) =_{\kk^{\times}} (x_1^{l_1-1} \cdots x_n^{l_n-1})^{l_1 \cdots l_n}.$$
\end{ex}
\section{Skew Calabi-Yau algebras} \label{section 2}
First of all, we recall the definition of skew Calabi-Yau algebras.
For any algebra $A$, let
$A^e = A\otimes A^{op}$ be its enveloping algebra. Then a right $A^e$-module $M$ is viewed the same as an $A$-$A$-bimodule by $a \cdot m \cdot b = m(b \otimes a)$.
\begin{defn} \label{defi-of-CY}
An algebra $A$ is called {\it skew Calabi-Yau} of dimension $d$, if
\begin{enumerate}
\item $A$ is {\it homologically smooth}, that is, as an $A^e$-module, $A$ has a finitely generated projective resolution of finite length;
\item there is some $\mu \in \Aut(A)$, such that, as an $A$-$A$-bimodule,
\begin{align}\label{nak-aut}
\Ext^i_{A^e}(A,A^e) \cong
\begin{cases}
0, & i \neq d \\
A^{\mu}, & i = d.
\end{cases}
\end{align}
\end{enumerate}
\end{defn}
This generalises Ginzburg's notion of a Calabi-Yau algebra \cite{Gin} which covers the case where $\mu = \id_A$.
In general, $\mu$ is called a {\it Nakayama automorphism} of $A$ by Brown and Zhang in \cite{BrZ}.
As pointed out in \cite{BGS}, when both usages of the term ``Nakayama automorphism" are in play, they define the same map which is unique up to inner automorphism of $A$, see Lemma \ref{rigid-dualizing} for instance.
If $A$ is Calabi-Yau, then $\mu$ can be chosen as the identity map on $A$.
If $A$ is commutative, then the Nakayama automorphism $\mu$ must be the identity map.
It is well known that the polynomial rings are Calabi-Yau algebras, and their skew group algebras are skew Calabi-Yau algebras, see \cite{WZ} for example.
\subsection{Rigid dualizing complexes and rigid Gorenstein algebras}
In this subsection, the definitions of rigid dualizing complexes and rigid Gorenstein algebras are recalled, and Lemma \ref{key-lem} is also proved.
Let $\D(\Mod A)$ be the derived category of right $A$-modules, and let $\D^*(\Mod A)$, for $* = b, +, -$, or blank, be the full subcategories of bounded, bounded below, bounded above, or unbounded complexes, respectively.
For any complex $X \in \D^{+}(\Mod A^e)$, there is a derived functor
$$\RHom_A(-, X) : \D(\Mod A^e) \To \D(\Mod A^e), \qquad Y \mapsto \RHom_A(Y, X).$$
The dualizing complexes over noncommutative rings were introduced by Yekutieli in \cite{Ye1}.
\begin{defn}
Let $A$ be a (left and right) Noetherian algebra. Then an object $\Omega$ of $\D^b(\Mod A^e)$ is called a {\it dualizing complex} over $A$ if it satisfies the following conditions
\begin{enumerate}
\item $\Omega$ has finite injective dimension over $A$ and $A^{op}$.
\item $\Omega$ has finitely generated cohomology modules over $A$ and $A^{op}$.
\item The natural morphisms $\Phi: A \to \RHom_A(\Omega, \Omega)$ and $\Phi^{op}: A \to \RHom_{A^{op}}(\Omega, \Omega)$ are isomorphisms in $\D(\Mod A^e)$.
\end{enumerate}
\end{defn}
\begin{defn}\cite[Definition 8.1]{V}
Let $A$ be a Noetherian algebra. A dualizing complex $\Omega$ over $A$ is called {\it rigid} if
$$ \RHom_{A^e}(A,{}_A\Omega \otimes \Omega_A) \cong \Omega $$
in $\D(\Mod A^e)$.
\end{defn}
A rigid dualizing complex is unique up to an isomorphism in $\D(\Mod A^e)$ if it exists.
\begin{lem}\cite[Proposition 8.2.(1)]{V}\label{rigid-dual-comp-iso}
Let $A$ be a Noetherian algebra, and $\Omega_1, \Omega_2$ be two rigid dualizing complexes for $A$. Then $\Omega_1 \cong \Omega_2$ in $\D(\mathrm{Mod}A^e)$.
\end{lem}
\begin{defn} \cite[Definition 4.4]{BrZ}\label{defn-rigid-Gorenstein}
A Noetherian algebra $A$ is called {\it rigid Gorenstein} of dimension $d$ if the injective dimension of $_AA$ and $A_A$ are both equal to $d$,
and there is an automorphism $\mu$ satisfying the condition \eqref{nak-aut}.
The automorphism $\mu$ is also called the {\it Nakayama automorphism} of $A$.
\end{defn}
It is clear that a rigid Gorenstein algebra $A$ is skew Calabi-Yau, if $A$ is homological smooth.
By definition, the following lemma can be verified directly.
\begin{lem}\label{rigid-goren-vs-dual-comp}
Let $A$ be a Noetherian algebra. Then $A$ is rigid Gorenstein of dimension $d$ if and only if there is an automorphism $\mu$ of $A$ such that ${}^{\mu}A[d]$ is a rigid dualizing complex for $A$.
\end{lem}
We call an algebra $R$ {\it affine} if it is finitely generated as a $\kk$-algebra. An $R$-algebra $A$ is called a module-finite $R$-algebra if it is finitely generated as an $R$-module.
\begin{lem}\label{rigid-dual-comp-center-finite}
Let $R$ be an affine commutative algebra, and $A$ be a module-finite $R$-algebra. If $R$ is rigid Gorenstein of dimension $d$, then $\RHom_R(A, R[d])$ is a rigid dualizing complex for $A$.
\end{lem}
\begin{proof}
The conclusion follows from the same proof of \cite[Proposition 5.7]{Ye2}.
\end{proof}
The following result was announced in \cite[section 2.5]{BGS}. For the convenience of reader, we present a full proof.
\begin{lem}\label{rigid-dualizing}
Let $R$ is an affine commutative rigid Gorenstein algebra, and $A$ be a module-finite $R$-algebra. If $A$ is a Frobenius $R$-algebra, then $A$ is rigid Gorenstein such that
$$\Hom_R(A, R) \cong {^{\mu}\!A},$$
where $\mu$ is the Nakayama automorphism of $A$ in the Definition \ref{defn-rigid-Gorenstein}.
\end{lem}
\begin{proof}
By Lemma \ref{rigid-dual-comp-center-finite}, $\RHom_{R}(A, R[d])$ is a rigid dualizing complex over $A$, where $d$ is the injective dimension of $R$. By assumption, $A$ is a Frobenius $R$-algebra, that is, $A$ is a projective $R$-module and there exists an automorphism $\mu$ of $A$ such that $\Hom_R(A, R) \cong {^{\mu}A}$ as $A$-$A$-bimodules.
Hence $\RHom_{R}(A, R[d]) \cong {^{\mu}A}[d]$ in $\D(\Mod A^e)$. Then the conclusion follows from Lemma \ref{rigid-goren-vs-dual-comp}.
\end{proof}
\begin{prop}\label{Goren-Frob}
Let $R$ is an affine commutative Calabi-Yau algebra of dimension $d$, and $A$ be a module-finite $R$-algebra. Then $A$ is rigid Gorenstein of dimension $d$ if and only if $A$ is a Frobenius $R$-algebra. Further, if $A$ is Calabi-Yau, then $A$ is a symmetric Frobenius $R$-algebra.
\end{prop}
\begin{proof}
By Lemma \ref{rigid-dualizing}, we only need to prove that $A$ is a Frobenius $R$-algebra if $A$ is rigid Gorenstein of dimension $d$. According to Lemma \ref{rigid-goren-vs-dual-comp} and \ref{rigid-dual-comp-center-finite}, $\RHom_{R}(A, R[d]) \cong {^{\mu}A}[d]$ in $\D(\Mod A^e)$.
Hence $\Ext^i_R(A, R) = \begin{cases}
^{\mu}\!A, & i = 0 \\
0, & i \neq 0.
\end{cases}$
Since $R$ has finite global dimension by definition, then there exists an $R$-module $N$, such that $\Ext^n_R(A, N) \neq 0$, where $n$ is the projective dimension of $A_R$. Let $F$ be a free $R$-module with a surjective $R$-module morphism $F \twoheadrightarrow N$. Then there is a short exact sequence $\Ext^n_R(A, F) \to \Ext^n_R(A, N) \to 0$. Hence $\Ext^n_R(A, F) \neq 0$. Since $R$ is a Noetherian ring and $A$ is a finitely generated $R$-module, it follows that
$$F \otimes_R \Ext^n_R(A, R) \cong \Ext^n_R(A, F) \neq 0.$$
So $n = 0$, that is, $A$ is a projective $R$-module.
Thus $A$ is a Frobenius $R$-algebra.
If $A$ is Calabi-Yau, then the Nakayama automorphism $\mu$ is inner. It follows that $A$ is a symmetric Frobenius $R$-algebra.
\end{proof}
\begin{cor}\label{sCY-over-com-CY-is-Frob-alg}
Let $R$ be an affine Calabi-Yau algebra of dimension $d$ and $A$ be a module-finite $R$-algbera. If $A$ is a skew Calabi-Yau algebra of dimension $d$, then $A$ is a Frobenius $R$-algebra.
\end{cor}
As a consequence of Proposition \ref{Goren-Frob}, we infer the following corollary by using Artin-Tate lemma.
\begin{cor}\label{rigid-Goren-Frob-alg-over-poly-alg}
Let $A$ be an affine rigid Gorenstein algebra which is module-finite over its center. Then $A$ is a Frobenius algebra over a polynomial algebra.
\end{cor}
\subsection{Artin-Schelter regular algebras}
In the following, we recall the definition of Artin-Schelter regular algebras \cite{AS87}, which are skew Calabi-Yau algebras by \cite[Lemma 1.2]{RRZ}.
An algebra $A$ is called {\it connected graded} if
$$A = A_0 \oplus A_1 \oplus A_2 \oplus \cdots$$
and $1 \in A_0 = \kk$, $A_iA_j \subseteq A_{i+j}$ for all $i, j \in \N$.
Write $A_{>0} = A_1 \oplus A_2 \oplus \cdots$ and $\kk = A/A_{>0}$.
A connected graded algebra $A$ is called {\it locally finite} if $\dim_{\kk} (A_i) < + \infty$ for all $i$.
Then the {\it Hilbert series} of $A$ is defined to be $h_A(t) = \sum_{i \in \N} \dim_{\kk} (A_i) t^i$. The Gelfand-Kirillov dimension of a connected $\N$-graded, locally finite algebra $A$ is defined to be
$$\GKdim (A) = \underset{n \to \infty}{\mathrm{lim \, sup}} \frac{\log (\sum_{i=0}^n \dim_{\kk} (A_i))}{\log (n)},$$
see \cite[Chapter 8]{MR}.
\begin{defn}
A Noetherian connected graded algebra $A$ is called {\it Artin-Schelter Gorenstein} (or {\it AS Gorenstein}, for short) of dimension $d$, if the following conditions hold:
\begin{enumerate}
\item $A$ has finite injective dimension $d$ on the left and on the right,
\item $\Ext^i_A(\kk, A) \cong \Ext^i_{A^{op}}(\kk, A) \cong \begin{cases}
0, & i \neq d \\
\kk(l), & i = d \\
\end{cases}$, for some integral $l$, where $\kk:= A/A_{>0}$.
\end{enumerate}
If in addition, $A$ has finite global dimension and finite Gelfand-Kirillov dimension, then $A$ is called {\it Artin-Schelter regular} (or {\it AS regular}, for short) of dimension $d$.
\end{defn}
It is well known that for a Noetherian connected graded algebra $A$, $A$ is AS Gorenstein of dimension $0$ if and only if $A$ is a Frobenius algebra.
Due to \cite[Proposition 8.4]{V}, each Noetherian connected graded AS Gorenstein algebra is rigid Gorenstein.
\begin{lem}\label{AS-gr-free-Frob}
Let $A$ be a Noetherian connected graded AS Gorenstein algebra, $R$ be a central graded subalgebra of $A$. Suppose that $R$ is a graded polynomial algebra, and that $A$ is a finitely generated $R$-module. Then $A$ is a graded free Frobenius $R$-algebra.
\end{lem}
\begin{proof}
By Proposition \ref{Goren-Frob}, $A$ is a Frobenius $R$-algebra. Thus $A$ is graded projective by \cite[Corollary 2.3.2]{NVO}. Since $R$ is also a connected graded algebra, it follows that $A$ is a graded free $R$-module.
Clearly, $\Hom_{R}(A, R)$ is a graded free $A$-module of rank one. So $A$ is a graded free Frobenius $R$-algebra.
\end{proof}
To conclude this section, we consider the following example.
\begin{ex}
Let $A$ be the algebra $\kk \langle x, y \rangle / (y^2x-xy^2, yx^2+x^2y)$, which is a Noetherian AS regular domain of dimension 3 by \cite[(8.11)]{AS87}. It is easily seen that $A$ is finite over the central subalgebra $R$ which is generated by $x^4, y^2, z:=(xy)^2+(yx)^2$. One can check that $R$ is a polynomial algebra. Setting $\deg(x) = \deg(y) = 1$, the Hilbert series of $A$ and $R$ are
$$h_A(t) = \frac{1}{(1-t)^2(1-t^2)}, \qquad h_R(t) = \frac{1}{(1-t^2)(1-t^4)^2}, \qquad \text{ respectively.}$$
As an $R$-module, $A$ is free of rank 16.
By Lemma \ref{AS-gr-free-Frob}, $A$ is a free Frobenius $R$-algebra.
Let $\Theta: {^{\mu}A} \to \Hom_R(A, R)$ be an $A$-$A$-bimodule isomorphism, and $\omega$ be the different of $A$ over $R$. Write $\theta = \Theta(1)$. Thus $\deg(\theta) = \deg(\frac{h_A(t)}{h_R(t)}) = - 6$ and $\deg(\omega) = - \deg(\theta) = 6$.
By \cite[(E1.5.7)]{LMZ}, the Nakayama automorphism $\mu$ sends $x$ to $-x$, $y$ to $y$.
Note that $\omega$ is a $\mu$-normal element by Lemma \ref{det(l-multi)}.
Then, by a straightforward calculation,
$$\omega =_{\kk^{\times}} x^2((xy)^2 - (yx)^2).$$
Let $K$ be the fractional field of $R$. Then $Q:= A\otimes_R K$ is a finite-dimensional division ring over $K$ by Posner's theorem \cite[Theorem 13.6.5]{MR}.
Let $f(X) \in K[X]$ be the characteristic polynomial of left multiplication of $\omega$ in $\End_K(Q)$.
Clearly, $m(X) := X^2 - \omega^2 = X^2 - x^4(z^2 + 4x^4y^4)$ is the monic minimal polynomial of $\omega$ over $K$.
Since $Q$ is a division ring, then $m(X)$ is irreducible in $K[X]$. Note that $\deg(f) = 16$. Thus $m(X)^8 = f(X)$.
According to Lemma \ref{det(l-multi)}, the discriminant
$$d(A, R; \tr) =_{\kk^{\times}} \nr(\omega) =_{\kk^{\times}} f(0) =_{\kk^{\times}} \omega^{16} = (x^4 (z^2+4x^4y^4))^8,$$
which has already been determined in \cite[Example 5.1]{CPWZ1}.
\end{ex}
\section{Reflection Hopf algebra} \label{section 3}
In this section we will recall some concepts for Hopf algebra actions on AS Gorenstein algebras: homological determinant \cite{JZ, KKZ}, Jacobian, reflection arrangement and discriminant \cite{KZ}.
Throughout this section, let $H$ be a finite-dimensional semisimple Hopf algebra, and $A$ be a Noetherian connected graded AS Gorenstein algebra of dimension $d$. Suppose that $H$ acts homogeneously and inner faithfully on $A$ such that $A$ is a left $H$-module algebra.
\subsection{Jacobian, reflection arrangement and discriminant of the Hopf action}
Let $A\#H$ be the corresponding smash product algebra. For any two left $A\#H$-modules $M$ and $N$, we define a left $H$-action on $\Hom_{A^{op}}(M,N)$ induced by the left $H$-actions on $M$ and $N$ by
\begin{equation}\label{H-module-on-Hom}
(h \rhu f) (m) = \sum_{(h)} h_2 \rhu f(S^{-1}(h_1) \rhu m)
\end{equation}
for all $h \in H$, $f \in \Hom_{A^{op}}(M, N)$, $m \in M$.
Then there is an induced $H$-module structure on $\Ext^d_{A^{op}}(\kk, A)$ which is one-dimension vector space.
Thus there is an unique algebra morphism $\eta: H \to \kk$ such that
\begin{equation}\label{hdet-defn}
h \rhu e = \eta(h) e
\end{equation}
for all $h \in H$ and $e \in \Ext^d_{A^{op}}(\kk, A)$.
\begin{defn}\label{hdet-Definition}
Let $\eta$ be defined in \eqref{hdet-defn}. The composite map $\eta \circ S: H \to \kk$ is called the {\it homological determinant} of $H$-action on $A$, and denoted by $\hdet_A$ or $\hdet$.
\end{defn}
Here our definition for homological determinant is not the original definition given in \cite{KKZ}. However, due to \cite[Lemma 5.10 (c)]{KKZ} the original definition is equivalent to Definition \ref{hdet-Definition}.
The fixed subring of the $H$-action on $A$ is defined to be
$$A^H:= \{ a \in A \mid h \rhu a = \varepsilon(h) a, \; \forall \, h \in H \}.$$
For any algebra morphism $\chi: H \to \kk$, we write
$$A^{\chi} = \{ a \in A \mid h \rhu a = \chi(h)a, \; \forall \, h \in H \}.$$
Notice that $\hdet$ can be seen as a group-like element of the dual Hopf algebra $H^*$. Then $\hdet^{-1} := \hdet \circ S$ is the inverse of $\hdet$ in $H^*$.
\begin{defn}\cite[Definition 2.1 and 3.1]{KZ}\label{Jacb-ref-arrang-disc}
Let $A$ be AS Gorenstein, $\hdet: H \to \kk$ be the homological determinant of the $H$-action on $A$ and $R = A^H$.
\begin{enumerate}
\item If $A^{\hdet^{-1}}$ is free of rank one over $R$ on both sides and $A^{\hdet^{-1}} = f_{\hdet^{-1}}R = Rf_{\hdet^{-1}}$, then the {\it Jacobian} of the $H$-action on $A$ is defined to be
$$\mathfrak{j}_{A, H} :=_{\kk^{\times}} f_{\hdet^{-1}} \in A^{\hdet^{-1}}.$$
\item If $A^{\hdet}$ is free of rank one over $R$ on both sides and $A^{\hdet} = f_{\hdet}R = Rf_{\hdet}$, then the {\it reflection arrangement} of the $H$-action on $A$ is defined to be
$$\mathfrak{a}_{A, H} :=_{\kk^{\times}} f_{\hdet} \in A^{\hdet}.$$
\item Suppose that both the Jacobian $\mathfrak{j}_{A, H}$ and the reflection arrangement $\mathfrak{a}_{A, H}$ exist.
The {\it left discriminant} and {\it right discriminant}of the $H$-action on $A$, are defined to be
$$\delta^l_{A, H} :=_{\kk^{\times}} \mathfrak{a}_{A, H}\mathfrak{j}_{A, H} \in R, \qquad \delta^r_{A, H} :=_{\kk^{\times}} \mathfrak{j}_{A, H}\mathfrak{a}_{A, H} \in R, \qquad \text{respectively}.$$
If $\delta^l_{A, H} =_{\kk^{\times}} \delta^r_{A, H}$, then $\delta^l_{A, H}$ is called {\it discriminant} of the $H$-action on $A$, and denote by $\delta_{A, H}$.
\end{enumerate}
\end{defn}
By \cite[Theorem 2.4]{KZ}, the Jacobian $\mathfrak{j}_{A, H}$ exists if and only if $A^H$ is AS Gorenstein.
\begin{defn}\cite[Definition 3.2]{KKZ2}
Suppose that $A$ is a Noetherian AS regular domain. If the fixed subring $A^H$ is again Artin-Schelter regular, then we say that $H$ acts on $A$ as a {\it reflection Hopf algebra}.
\end{defn}
Suppose that $H$ acts on $A$ as a reflection Hopf algebra. Then $A$ is graded free over $A^H$ on both sides by \cite[Lemma 3.3]{KKZ2}. Hence there exists a integral coefficient polynomial $g(t)$ such that $h_A(t) = g(t) h_{A^H}(t)$, where $h_A(t)$ and $h_{A^H}(t)$ are the Hilbert series of $A$ and $A^H$, respectively.
We now recall some important results about Jacobian, reflection arrangement and discriminant of Hopf actions on AS regular algebras.
\begin{thm}\label{Jacob-thm}\cite[Corollary 2.5 and Theorem 3.8]{KZ}
Suppose that $A$ is a Noetherian AS regular domain and $H$ acts on $A$ as a reflection Hopf algebra.
\begin{enumerate}
\item Both $\mathfrak{j}_{A,H}$ and $\mathfrak{a}_{A, H}$ exist.
\item $\deg(\mathfrak{j}_{A,H}) = \deg (h_A(t) h_{A^H}(t)^{-1})$.
\item The discriminant $\delta_{A, H}$ is defined, that is, $\mathfrak{a}_{A, H} \mathfrak{j}_{A, H} =_{\kk^{\times}} \mathfrak{j}_{A, H} \mathfrak{a}_{A, H}$.
\item $\mathfrak{a}_{A, H}$ divides $\mathfrak{j}_{A, H}$, that is, there exists $a, b \in A$ such that $\mathfrak{j}_{A, H} = a \mathfrak{a}_{A, H} = \mathfrak{a}_{A, H} b$.
\end{enumerate}
\end{thm}
It is well known that each commutative AS regular algebra is a graded polynomial algebra. Thus the following lemma is a consequence of Lemma \ref{AS-gr-free-Frob}.
\begin{lem}\label{ref-gr-free-Frob}
Suppose that $H$ acts on $A$ as a reflection Hopf algebra. If $R:=A^H$ is a central subalgebra of $A$, then $A$ is a graded free Frobenius $R$-algebra.
\end{lem}
In \cite{KZ}, Kirkman and Zhang compared the $H$-discriminant in the noncommutative invariant theory (Definition \ref{Jacb-ref-arrang-disc}) to the noncommutative discriminant over a central subalgebra (Definition \ref{disc-defn}), see the following theorem.
\begin{thm}\cite[Theorem 3.10]{KZ}
Suppose that $A$ is a Noetherian AS regular domain and $H$ acts on $A$ as a reflection Hopf algebra. Further assume that
\begin{enumerate}
\item [(a)] $H = (\kk G)^*$ where $G$ is a finite group, and
\item [(b)] $R:= A^H$ is central in $A$.
\end{enumerate}
Then the ideals $(\delta_{A, H})$ and $(d(A, R; \tr))$ have the same prime radical, that is,
$$\sqrt{(\delta_{A, H})} = \sqrt{(d(A, R; \tr))}.$$
\end{thm}
In the next section, we will prove that the above theorem is also true without assumption (a), see Theorem \ref{main-thm}.
\subsection{Reflection group}
If $H$ is a finite-dimensional cosemisimple Hopf algebra over an algebraically closed field which acts inner faithfully on a commutative domain, then $H$ must be a group algebra, see \cite[Theorem 1.3]{EW}. Hence the reflection Hopf algebras which act on commutative AS regular domain, are just the group algebras if $\kk$ is a algebraically closed field of characteristic zero.
We now consider the reflection groups which act on polynomial algebras and fix some notation that will be used in this subsection. Let $V = \kk x_1 \oplus \cdots \oplus \kk x_n$ be a finite-dimensional vector space. For any $\sigma \in \mathrm{GL}(V)$, $\sigma$ is called a {\it reflection} if $\sigma$ is of finite order and fixes a codimension one subspace of $V$. A finite subgroup $G$ of $\mathrm{GL}(V)$, is called a {\it reflection group} if it is generated by reflections.
Now we go over some notation about reflection group. By definition, each reflection in $G$ fixes some hyperplane in $V$. Let $\A(G)$ be the set of these reflection hyperplanes. For any $U \in \A(G)$, denote the stablilizer of $U$ in $G$ by $G_U = \{\sigma \in G \mid \sigma|_U = \id_U \}$. Since $\dim_{\kk} (U) = \dim_{\kk} (V) - 1$, $G_U$ is a cyclic group generated by a reflection $\sigma$. Let $e_U$ be the order of $\sigma$ and $\alpha_U \in V$ be a eigenvector of $\sigma$ with non-unit eigenvalue.
The following results about reflection groups and invariant theory are well known, for details, see \cite{K} and \cite[Chapter 6]{OT} for instance.
\begin{thm}\label{reflec-group-lem}
Let $A$ be the symmetric algebra $S(V) \cong \kk[x_1, \cdots, x_d]$ and $G \subset \mathrm{GL}(V)$ be a reflection group that acts on $A$ as automorphsims. Then
\begin{enumerate}
\item The invariant ring $R:= A^G = \kk[f_1, \cdots, f_d]$ is a graded polynomial subalgebra of $A$.
\item $A$ is a free $R$-module of rank $|G|$.
\item The Jacobian of the $G$-action on $A$ is $\mathfrak{j}_{A,\,\kk\!G} =_{\kk^{\times}} \det\begin{pmatrix}
\frac{\partial f_i}{\partial x_j}
\end{pmatrix}_{i,j = 1}^d =_{\kk^{\times}} \prod \limits_{U \in \A(G)} \alpha_U^{e_U-1}$
\item The reflection arrangement of the $G$-action on $A$ is $\mathfrak{a}_{A,\,\kk\!G} =_{\kk^{\times}} \prod \limits_{U \in \A(G)} \alpha_U$.
\item The discriminant of the $G$-action on $A$ is $\delta_{A,\, \kk\!G} =_{\kk^{\times}} \prod \limits_{U \in \A(G)} \alpha_U^{e_U} \in A^G$.
\end{enumerate}
\end{thm}
\section{Discriminant of reflection Hopf algebra} \label{section 4}
In this section, we compute the discriminant $d(A, A^H; \tr)$ when $H$ acts on $A$ as a reflection Hopf algebra and that $A^H$ is central in $A$. The trick of the proof is to find the different of $A$ over $A^H$ as defined in Lemma \ref{det(l-multi)}.
We will always assume that $H$ is a finite-dimensional semisimple Hopf algebra, and $A$ is a Noetherian connected graded AS regular domain. Suppose that $H$ acts homogeneously and inner faithfully on $A$ as a reflection Hopf algebra, and that $R = A^H$ is a central subalgebra of $A$. Notice that $A$ is a graded free Frobenius $R$-algebra by Lemma \ref{ref-gr-free-Frob}.
To prove the Theorem \ref{intro-main-thm 1}, we need several lemmas to find the different of $A$.
Since the ideal $R_{>0}A = AR_{>0}$ is a left $H$-submodule of $A$, then $\bar{A} := A/(R_{>0}A)$ has a natural left $H$-module algebra structure. And $\bar{A}$ is called the {\it covariant ring} of the $H$-action on $A$.
Clearly, $\bar{A}$ is also a graded Frobenius algebra by Lemma \ref{quotient-Frobenius}. Hence $\bar{A}$ is AS Gorenstein.
\begin{lem}\label{hdet-bar-hdet}
Let $\bar{A} := A/(R_{>0}A)$.
Then $\hdet_A = \hdet_{\bar{A}}$.
\end{lem}
\begin{proof}
For any left $A\#H$-module $M$, we have canonical isomorphisms induced by the adjointness
$$\Hom_{\bar{A}^{op}}(\kk, \Hom_{R^{op}}(\kk, M)) \cong \Hom_{\bar{A}^{op}}(\kk, \Hom_{A^{op}}(\bar{A}, M)) \cong \Hom_{A^{op}}(\kk, M)$$
where the $H$-module structure is given by \eqref{H-module-on-Hom}.
From these isomorphisms, we obtain a convergent spectral sequence of $H$-modules
$$E_2^{pq} = \Ext^p_{A^{op}}(\kk, \Ext^q_{R}(\kk, A)) \Longrightarrow \Ext^{p+q}_{A^{op}}(\kk, A).$$
By hypothesis, $A$ is a free $R$-module, we have $\Ext^i_{R^{op}}(\kk, A) \cong \Ext^i_{R^{op}}(\kk, R) \otimes_R A$ for all $i \in \N$. It follows that
$$\Hom_{\bar{A}^{op}}(\kk, \bar{A}) \cong \Ext^{d}_{A^{op}}(\kk, A)$$
as $H$-modules. By the definition of the homological determinant, $\hdet_A = \hdet_{\bar{A}}$.
\end{proof}
Similar to \eqref{H-module-on-Hom}, $\Hom_R(A, R)$ is also an $H$-module via
$$(h \rhu f) (a) := f(Sh \rhu a),$$
for all $h \in H$, $f \in \Hom_R(A, R)$, $a \in A$.
\begin{lem}\label{lem2}
Let $\theta$ be a homogenous generator of $\Hom_R(A, R)$ as a graded $A$-module with $l = \deg(h_{\bar{A}}(t)) = -\deg(\theta)$. Then $h \rhu \theta = \hdet_{A}(h) \theta$ for all $h \in H$.
\end{lem}
\begin{proof}
The canonical surjective morphism $\pi: \bar{A} \to \kk = \bar{A}/\bar{A}_{>0}$ induces an injective morphism $$\pi^*: \Hom_{\bar{A}^{op}}(\kk, \bar{A}) \to \Hom_{\bar{A}^{op}}(\bar{A}, \bar{A}) = \bar{A}.$$
Since $\bar{A}$ is an AS Gorenstein algebra of dimension 0, then $\Hom_{\bar{A}}(\kk, \bar{A}) \cong \kk(l)$.
Hence
$$\dim_{\kk} (\bar{A}_l) = \dim_{\kk} (\pi^*(\Hom_{\bar{A}^{op}}(\kk, \bar{A})) ) = 1.$$
Let $e$ be a non-zero element of $\bar{A}_l$. By definition of homological determinant, for all $h \in H$,
\begin{equation}\label{Sh-e-hdet}
Sh \rhu e = \hdet_{\bar{A}}(h)e.
\end{equation}
Since $h_A(t) = h_{\bar{A}}(t) h_R(t)$, then $\Hom_R(A, R) \cong A(-l)$ as graded $A$-module.
Thus there exists an algebra homomorphism $\xi: H \to \kk$ such that $h \rhu \theta = \xi(h) \theta$ for all $h \in H$.
Consider the canonical surjective $H$-module morphism
$$\Upsilon: \Hom_R(A, R) \To \Hom_R(A, R) \otimes_R \kk \cong \Hom_{\kk}(\bar{A}, \kk), \qquad f \mapsto \big( \bar{a} \mapsto \overline{f(a)} \big).$$
Write $\bar{\theta} = \Upsilon(\theta)$.
Then
$$\xi(h)\bar{\theta}(e) = \Upsilon(h \rhu\theta)(e) = (h \rhu \Upsilon(\theta))(e) = \bar{\theta}(Sh \rhu e) \stackrel{\eqref{Sh-e-hdet}}{=\!=} \bar{\theta}(\hdet_{\bar{A}}(h) e) = \hdet_{\bar{A}}(h) \bar{\theta}(e).$$
Since $\bar{\theta}$ is a non-zero homogenous element of degree $-l$ in $\Hom_{\kk}(\bar{A}, \kk)$, then $ \bar{\theta}(e) \neq 0$. Hence $\xi = \hdet_{\bar{A}} = \hdet_A$ by Lemma \ref{hdet-bar-hdet}. We have thus proved the lemma.
\end{proof}
\begin{lem}\label{tr-H-mor}
The Hattori-Stallings trace map $\tr: A \to R$ is a graded $H$-module morphism.
\end{lem}
\begin{proof}
Note that $\End_R(A)$ is an $H$-module via
$$(h \rhu F) (a) = \sum_{(h)} h_1 \rhu F(Sh_2 \rhu a),$$
for any $h \in H$, $F \in \End_R(A)$ and $a \in A$.
Clearly, the natural embedding $\iota: A \to \End_R(A), \, a \mapsto a_L$ is also an $H$-module morphism, and $\tr$ is a graded morphism.
To prove that $\tr$ is a $H$-module morphism, we only need to prove that
$$\varphi_A: A \otimes_R \Hom_{R}(A, R) \To \End_R(A), \qquad x \otimes f \mapsto \big(y \mapsto xf(y) \big),$$
and
$$\psi_A: A \otimes_R \Hom_{R}(A, R) \To R, \qquad x \otimes f \mapsto f(x),$$
are $H$-module morphisms.
Since for any $h \in H$, $x, y \in A$, and $f \in \Hom_R(A, R)$
\begin{align*}
\varphi_A(h \rhu (x \otimes f))(y)
& = \varphi_A(\sum_{(h)} h_1 \rhu x \otimes h_2 \rhu f)(y) \\
& = \sum_{(h)} (h_1 \rhu x) (h_2 \rhu f)(y) \\
& = \sum_{(h)} (h_1 \rhu x) f(Sh_2 \rhu y) \\
& = h \rhu \varphi_A(x \otimes f)(y).
\end{align*}
Then $\varphi_A$ is a left $H$-module isomorphism.
Note that $S^2 = \id_H$ since $H$ is semisimple. Then
\begin{align*}
\psi_A(h \rhu (x \otimes f))
& = \psi_A(\sum_{(h)} h_1 \rhu x \otimes h_2 \rhu f) & \\
& = \sum_{(h)} (h_2 \rhu f) (h_1 \rhu x) & \\
& = f((\sum_{(h)} S(h_2) h_1) \rhu x) & \\
& = \varepsilon(h) f(x) & \text{ since } S^2 = \id_H \\
& = h \rhu \psi_A(x \otimes f).
\end{align*}
So $\psi_A$ is a left $H$-module morphism. Therefore $\tr$ is a graded $H$-module morphism.
\end{proof}
In the following, we prove that the Jacobian $\mathfrak{j}_{A, H}$ is a different of $A$ over $R$.
\begin{lem}\label{degree-lem
Retain the notation in the Lemma \ref{lem2} and \ref{tr-H-mor}. Then $\tr =_{\kk^{\times}} \theta \cdot \mathfrak{j}_{A, H}$.
\end{lem}
\begin{proof}
Recall that $\theta$ is a homogenous generator of graded $A$-module $\Hom_R(A, R) (\cong A(-l))$. Since $\tr: A \to R$ is a graded map, then there exists a homogenous element $\omega \in A$ of degree $l$ such that $\tr = \theta \cdot \omega$. It is easy to check that $h \rhu (\theta \cdot \omega) = \sum_{(h)} (h_1 \rhu \theta) \cdot (h_2 \rhu \omega)$ for any $h \in H$. Then we have
\begin{align*}
\theta \cdot (h \rhu \omega) & = \sum_{(h)} \hdet^{-1}(h_1) \hdet(h_2) \theta \cdot (h_3 \rhu \omega) & \\
& = \sum_{(h)} \hdet^{-1}(h_1) (h_2 \rhu \theta) \cdot (h_3 \rhu \omega) & \text{ by Lemma } \ref{lem2} \\
& = \sum_{(h)} \hdet^{-1}(h_1) h_2 \rhu (\theta \cdot \omega) & \\
& = \sum_{(h)} \hdet^{-1}(h_1) h_2 \rhu \tr & \\
& = \hdet^{-1}(h) \tr & \text{ by Lemma } \ref{tr-H-mor} \\
& = \theta \cdot (\hdet^{-1}(h)\omega). &
\end{align*}
It follows that $\omega \in A^{\hdet^{-1}} = R \mathfrak{j}_{A, H}$.
According to Theorem \ref{Jacob-thm} (2), $\deg(\mathfrak{j}_{A,H}) = l$. Thus $\omega =_{\kk^{\times}} \mathfrak{j}_{A, H}$, that is, $\tr =_{\kk^{\times}} \theta \cdot \mathfrak{j}_{A,H}$.
\end{proof}
Now we are ready to prove Theorem \ref{intro-main-thm 1}.
\begin{thm}\label{main-thm}
Suppose that $H$ acts on $A$ as a reflection Hopf algebra, and that $R:=A^H$ is central in $A$. Then
$$d(A, R; \tr) =_{\kk^{\times}} \mathfrak{j}_{A, H}^n \qquad \text{ and } \qquad \sqrt{(\delta_{A, H})} = \sqrt{(d(A, R; \tr))},$$
where $\tr$ is the Hattori-Stallings trace map, and $n$ is the rank of $R$-module $A$.
\end{thm}
\begin{proof}
Without loss of generality, assume that $H \neq \kk$ and $n > 1$.
By Lemma \ref{det(l-multi)} and \ref{degree-lem},
$$d(A, R; \tr) =_{\kk^{\times}} \nr(\mathfrak{j}_{A, H}) = \det((\mathfrak{j}_{A, H})_L).$$
Let $K$ be the fractional field of $R$. Then $Q:= Q(A) = A\otimes_R K$ is a finite-dimensional division ring over $K$ by Posner's theorem \cite[Theorem 13.6.5]{MR}.
Let $f(X) \in K[X]$ be the characteristic polynomial of left multiplication of ${\mathfrak{j}_{A,H}}$ in $\End_K(Q) = M_{n}(K)$, and
$$m(X) = X^r + \lambda_{r-1}X^{r-1} + \cdots + \lambda_0 \in K[X]$$
be the monic minimal polynomial of $\mathfrak{j}_{A,H}$ over $K$.
Since $K[\mathfrak{j}_{A, H}]$ is a subfield of $Q$, it follows that $m(X)$ is irreducible in $K[X]$. Then there is some $k > 0$ such that $m(X)^k = f(X)$.
Notice that $\hdet$ is a group-like element of the dual Hopf algebra $H^*$. Then there exists some $s > 0$ such that $\hdet^s = \varepsilon$ and $\mathfrak{j}_{A, H}^s \in R$, where $\varepsilon$ is the counit of $H$.
Hence $X^s - \mathfrak{j}_{A, H}^s = m(X)^t$ for some $t > 0$. Recall that $\mathrm{char} \kk = 0$.
By comparing their coefficients, it follows that
$$t = 1, \; s = r, \text{ and } \lambda_i = \begin{cases}
0, & i = 1, \dots, r-1 \\
-\mathfrak{j}_{A, H}^r, & i = 0.
\end{cases}$$
Note that $\deg(f(X)) = \rank_R(A) = n$. Hence $n = rk$, and the discriminant of $A$ is
$$d(A, R; \tr) =_{\kk^{\times}} \det(\mathfrak{j}_{A, H}) =_{\kk^{\times}} f(0) =_{\kk^{\times}} m(0)^k =_{\kk^{\times}} (-\mathfrak{j}_{A, H}^r)^{k} =_{\kk^{\times}} \mathfrak{j}_{A, H}^n.$$
By Definition \ref{Jacb-ref-arrang-disc}, $d(A, R; \tr)$ divides $\delta_{A, H}^n$ in $A$, that is, there exists $a, b \in A$ such that $d(A, R; \tr) = a \delta_{A, H}^n = \delta_{A, H}^n b$. Since $A$ is a domain and $d(A, R; \tr), \delta_{A, H}^n \in R$, then $a, b \in R$.
By Theorem \ref{Jacob-thm} (4), $\mathfrak{a}_{A, H}$ divides $\mathfrak{j}_{A, H}$ in $A$. This implies that $\delta_{A, H}$ divides $d(A, R; \tr)$ in $A$, also in $R$.
So the conclusion is verified.
\end{proof}
\begin{rk}
By \cite[Proposition 1.8.(1)]{KWZ}, the rank of free $R$-module $A$ is equal to $\dim_{\kk}(H)$ if $A\#H$ is prime in Theorem \ref{main-thm}.
\end{rk}
\begin{ex}\label{disc-ex}
Let $\kk = \mathbb{C}$. Fix an integral $n \geq 2$. Let $G = \langle x \rangle \times \langle y \rangle$ be the direct product of two cyclic groups of order $n$, and let $p = -e^{\frac{\pi \sqrt{-1}}{n}}, q = e^{\frac{2\pi \sqrt{-1}}{n}}$ in $\kk$.
Let $\sigma$ denote the automotphsim of $\kk G$ given by $\sigma(x^iy^j) = x^jy^i$. Define the semisimple Hopf algebra $H_{2n^2}$ (\cite[section 2]{Pan}) as the factor ring of the Ore extension of $\kk G$:
$$H_{2n^2} = \frac{\kk G[z; \sigma]}{(z^2 - (\frac{1}{n}\sum_{i,j=0}^{n-1} q^{-ij} x^iy^j))},$$
where the Hopf structure of $\kk G$ is extended to $H_{2n^2}$ by setting:
$$\Delta(z) = \frac{1}{n}\sum_{s,t=0}^{n-1} q^{-st} x^sz \otimes y^tz, \qquad \varepsilon(z) = 1, \qquad \text{and} \qquad S(z) = z.$$
For any $0 \leq i, j\leq n-1$, the skew polynomial ring $A:= {\kk \langle u, v \rangle} / {(vu - p^{i^2-j^2}uv )}$ is a left $H$-module algebra via
$$x \rhu u = q^i u, \quad x \rhu v = q^j v, \quad y \rhu u = q^j u, \quad y \rhu v = q^i v, \quad z \rhu u = q^{ij} v , \quad z \rhu v = u.$$
The homological determinant $\hdet: H \to \kk$ is given by
$$\hdet(x) = q^{i+j}, \qquad \hdet(x) = q^{i+j}, \qquad \hdet(z) = - p^{(i+j)^2}.$$
The $H_{2n^2}$-action on $A$ is inner faithfully if and only if $(i^2-j^2, n) = 1$ (\cite[Theorem 3.7]{FKMW}).
Now assume that $(i^2-j^2, n) = 1$, $n$ is odd and $i-j$ is even. Then the fixed subring $A^H$ is the polynomial ring $\kk [u^n + v^n, u^nv^n]$ (\cite[Theorem 3.10]{FKMW}). This implies that $H_{2n^2}$ acts on $A$ as a reflection Hopf algebra. It is clear that $R:=A^H$ is a central subalgebra of $A$.
By a straightforward calculation,
$$\mathfrak{j}_{A, H_{2n^2}} =_{\kk^{\times}} u^{n-1}v^{n-1}(u^n-v^n), \qquad \mathfrak{a}_{A, H_{2n^2}} =_{\kk^{\times}} uv(u^n-v^n).$$
It follows that
$$d(A, A^H; \tr) =_{\kk^\times} (uv)^{2(n-1)n^2} (u^n-v^n)^{2n^2}, \qquad \delta_{A, H_{2n^2}} =_{\kk^{\times}} u^nv^n(u^n-v^n)^2.$$
\end{ex}
We now turn to the formula for the discriminant from classical commutative invariant theory.
Applying the Theorem \ref{main-thm}, we obtain the following corollary.
\begin{cor}\label{Di-fixed-ring}
Let $A$ be the symmetric algebra $S(V)$, $G \subset \mathrm{GL}(V)$ be a finite reflection group and $R = A^G$. Then
$$d(A,R;\tr) =_{\kk^{\times}} \mathfrak{j}_{A,\,\kk\!G}^{|G|}.$$
\end{cor}
Let $\mathcal{S}_n$ be the symmetric group acting on $A := \kk[x_1, \cdots, x_n]$ as permutations of $\{x_i\}_{i=1}^n$ and $A^{\mathcal{S}_n}$ be the invariant subring.
It is a well-known that $A^{\mathcal{S}_n}$ is generated by
$$x_1 + x_2 + \cdots + x_n, \qquad x_1^2 + x_2^2 + \cdots + x_n^2, \qquad \cdots, \qquad x_1^n + x_2^n + \cdots + x_n^n$$
as an algebra.
Then by Theorem \ref{reflec-group-lem}, the Jacobian of $\mathcal{S}_n$-action on $A$ is
$$\mathfrak{j}_{A,\,\kk\!\mathcal{S}_n} = \det
\begin{pmatrix}
1 & x_1 & x_1^2 & \cdots & x_1^{n-1} \\
1 & x_2 & x_2^2 & \cdots & x_2^{n-1} \\
1 & x_3 & x_3^2 & \cdots & x_3^{n-1} \\
\vdots & \vdots & \vdots & \ddots & \vdots \\
1 & x_{n} & x_n^{2} & \cdots & x_{n}^{n-1} \\
\end{pmatrix} = \prod_{i>j}(x_i-x_j).$$
It was asked in \cite[Question 4.7.]{GKM} that whether the discriminant of $A$ over $A^{\mathcal{S}_n}$ respect to $\tr$ is $\mathfrak{j}_{A,\,\kk\!\mathcal{S}_n}^{n!}$. This question was resolved by Liu and Du in \cite{LD}. It also can be seen as a special case of Corollary \ref{Di-fixed-ring}.
\begin{cor}\label{Sym-di-fixed-ring}\cite[Theorem 1.2]{LD}
$d(A, A^{\mathcal{S}_n}; \tr) =_{\kk^{\times}} \prod\limits_{i>j}(x_i-x_j)^{n!}$.
\end{cor}
\section{Discriminant of Hopf-Galois extension} \label{section 5}
In this section, we study the discriminant of Hopf Galois extension, which is applied to the case of smash product.
Let's recall the definition of Hopf Galois extension.
\begin{defn}
Let $H$ be a Hopf algebra and $B$ be a right $H$-comodule algebra. Then the ring extension $B^{\mathrm{co}H} := \{ b \in B \mid \sum_{(b)} b_0 \otimes b_1 = b \otimes 1 \} \subseteq B$ is $H$-{\it Galois} if the morphism
$$\beta: B \otimes_{B^{\mathrm{co}H}} B \To B \otimes H, \qquad b' \otimes b \mapsto \sum_{(b)} b'b_0 \otimes b_1$$
is bijective.
\end{defn}
In this section, let $H$ be a finite-dimensional Hopf algebra and $A:=B^{\mathrm{co}H} \subseteq B$ be an $H$-Galois extension. Let $0 \neq \alpha$ be a left integral of $H^*$, that is, $\sum_{(h)} h_1 \langle \alpha, h_2 \rangle = \langle \alpha, h \rangle $ for all $h \in H$. Recall that $H^*$ is a right $H$-module via $\leftharpoondown$, as follows: if $f \in H^*$, and $h,k \in H$, then $\langle f\!\leftharpoondown\!h, k \rangle = \langle f, kS(h) \rangle$, and there is a left $H$-module isomorphism $H \to H^*, \; h \, \mapsto \, \alpha\!\leftharpoondown\!h$.
Choose $t \in H$ which is satisfying that $\alpha\!\leftharpoondown t = \varepsilon$. Hence $t$ is a right integral of $H$, that is, $th = \varepsilon(h)t$ for all $h \in H$. Notice that for any $h \in H$,
\begin{equation}\label{integral-separable-idempotent}
\sum_{(t)} h S(t_1) \otimes t_2 = \sum_{(t), (h)} h_3 S(t_1) \otimes t_2 S^{-1}(h_2) h_1 = \sum_{(t), (h)} S(t_1 S^{-1}(h_3)) \otimes t_2 S^{-1}(h_2) h_1 = \sum_{(t)} S(t_1) \otimes t_2 h.
\end{equation}
Let $x_i,y_i \in B$ such that
$$\beta(\sum_{i=1}^n x_i \otimes y_i) = \sum_{i=1}^n \sum_{(y_i)} x_i(y_i)_0 \otimes (y_i)_1 = 1 \otimes t,$$
and there is an $A$-$A$-bimodule morphism $$\theta: B \To A, \qquad b \, \mapsto \, \alpha \rhu b := \sum_{(b)} b_0 \langle \alpha, b_1 \rangle.$$
The $H$-Galois extension $A \subseteq B$ is a Frobenius extension, which is proved by Kreimer and Takeuchi (\cite[Theorem 1.7]{KT}).
\begin{lem} \label{H-Galois-Frob
Then $A \subseteq B$ is a Frobenius extension with a Frobenius system $(\theta, x_i, y_i)$.
\end{lem}
\begin{proof}
Clearly, we only need to prove that $(\theta, x_i, y_i)$ is a Frobenius system. For all $b \in B$,
\begin{align*}
\sum_{i=1}^n \theta(bx_i)y_i & = \sum_{i=1}^n \sum_{(b), (x_i)} b_0 (x_i)_0 \langle \alpha, b_1(x_i)_1 \rangle y_i \\
& = \sum_{i=1}^n \sum_{(b), (x_i), (y_i)} b_0 (x_i)_0(y_i)_0 \langle \alpha, b_1(x_i)_1 (y_i)_1 S(y_i)_2 \rangle \\
& = \sum_{(b)} b_0 \langle \alpha, b_1S(t) \rangle = \sum_{(b)} b_0 \langle \alpha \leftharpoondown t, b_1 \rangle \\
& = b.
\end{align*}
We also have that
\begin{eqnarray}\label{H^*-integral-H}
\begin{split}
\langle \alpha, t \rangle & = \langle \alpha \leftharpoondown t, 1 \rangle \langle \alpha, t \rangle = \langle \alpha, S(t) \rangle \langle \alpha, t \rangle = \langle \alpha, S(t)\langle \alpha, t \rangle \rangle = \langle \alpha, S(t) S(\langle \alpha, t \rangle) \rangle \\
& = \sum_{(t)} \langle \alpha, S(t) S(t_1 \langle \alpha, t_2 \rangle) \rangle = \sum_{(t)} \langle \alpha, S(t)S(t_1) \rangle \langle \alpha, t_2 \rangle \\
& \stackrel{\eqref{integral-separable-idempotent}}{=\!=} \sum_{(t)} \langle \alpha, S(t_1) \rangle \langle \alpha, t_2S(t) \rangle = \sum_{(t)} \langle \alpha, S(t_1) \rangle \langle \alpha \leftharpoondown t, t_2 \rangle \\
& = \langle \alpha, S(t) \rangle \\
& = 1.
\end{split}
\end{eqnarray}
It follows that for all $b \in B$,
$$\sum_{i=1}^n x_i \theta(y_ib) = \sum_{i=1}^n\sum_{(b), (y_i)} x_i (y_i)_0 b_0 \langle \alpha, (y_i)_1b_1 \rangle = \sum_{(b)} b_0 \langle \alpha, tb_1 \rangle = b \langle \alpha, t \rangle = b.$$
\end{proof}
The following lemma about the trace map of separable algebra is well known.
\begin{lem}\cite[Theorem 9.31]{R}\label{left-right-mul}
Let $\Lambda$ be a separable algebra. Then $\tr_{\Lambda}(x_L) = \tr_{\Lambda}(x_R)$ for any $x \in \Lambda$, where $x_L$ and $x_R$ are the left and right multiplications by $x$, respectively.
\end{lem}
Now we have a result about the Hattori-Stallings map of Hopf Galois extensions.
\begin{lem}\label{trace-Galois-extension}
Let $H$ be a finite-dimensional semisimple Hopf algebra, and $B$ be a right $H$-comodule algebra. Suppose that $A:= B^{\mathrm{co}H} \subseteq B$ is an $H$-Galois extension. Let $\tr_{B_A}: B \to A/[A,A]$ be the Hattori-Stallings map. Then
$$\tr_{B_A}(b) + [B, B] = (\varepsilon(t) \alpha) \rhu b + [B, B] \qquad \text{ in } \; B/[B, B].$$
Further, if $B$ is prime and $A$ is central in $B$, then $\tr_{B_A}(b) = (\varepsilon(t) \alpha) \rhu b$ for all $b \in B$.
\end{lem}
\begin{proof}
Note that $h \stackrel{\eqref{H^*-integral-H}}{=\!=} hS(\langle \alpha, t \rangle) = \sum_{(t)} hS(t_1 \langle \alpha, t_2 \rangle) \stackrel{\eqref{integral-separable-idempotent}}{=\!=} \sum_{(t)} S(t_1) \langle \alpha, t_2h \rangle$.
For any $h_i \in H$ and $f_i \in H^*$, write $F = \varphi_H(\sum_{i=1}^n h_i \otimes f_i) \in \End_{\kk}(H)$, thus
\begin{equation}\label{trace-Hopf-alg}
\begin{split}
\tr_{H}(F) & = \sum_{i=1}^n \langle f_i, h_i \rangle = \sum_{i=1}^n \sum_{(t)} \langle f_i, S(t_1) \langle \alpha, t_2h_i \rangle \rangle \\
& = \sum_{i=1}^n \sum_{(t)} \langle \alpha, t_2h_i\langle f_i, S(t_1) \rangle \rangle \\
& = \sum_{(t)} \langle \alpha, t_2F(St_1) \rangle.
\end{split}
\end{equation}
Since $H$ is semisimple, then $S^2 = \id_H$ and $H$ is a separable algebra.
Therefore
$\tr_{H}(h_L) = \tr_{H}(h_R)$ by Lemma \ref{left-right-mul}, where $h_L, h_R \in \End_{\kk}(H)$ are the left multiplication and right multiplication by $h \in H$, respectively.
For any $b \in B$,
\begin{align*}
\tr_{B_A}(b) + [B, B] & \stackrel{\eqref{Frob-trace}}{=\!=} \sum_{i=1}^N \theta(y_ibx_i) + [B, B] \\
& = \sum_{i=1}^N \sum_{(b)} (y_i)_0 b_0 (x_i)_0 \langle \alpha, (y_i)_1 b_1 (x_i)_1 \rangle + [B, B] \\
& = \sum_{i=1}^N \sum_{(b)} b_0 (x_i)_0 (y_i)_0 \langle \alpha, (y_i)_1 b_1 (x_i)_1 \rangle + [B, B] \\
& = \sum_{i=1}^N \sum_{(b)} b_0 (x_i)_0 (y_i)_0 \langle \alpha, (y_i)_3 b_1 (x_i)_1 (y_i)_1S(y_i)_2 \rangle + [B, B] \\
& = \sum_{(\alpha)} \sum_{(b)} b_0 \langle \alpha, t_2 b_1 S(t_1) \rangle + [B, B] \\
& \stackrel{\eqref{trace-Hopf-alg}}{=\!=} \sum_{(b)} b_0 \tr_{H}((b_1)_L) + [B, B] \\
& = \sum_{(b)} b_0 \tr_{{H}}((b_1)_R) + [B, B] \\
& \stackrel{\eqref{trace-Hopf-alg}}{=\!=} \sum_{(b), (t)} b_0 \langle \alpha, t_2S(t_1)b_1 \rangle + [B, B] \\
& = (\varepsilon(t)\alpha) \rhu b + [B, B].
\end{align*}
If $B$ is a prime ring and $A$ is central in $B$, then $B$ is a PI prime ring. This implies that the quotient ring $Q(B)$ of $B$ is a central simple algebra by Posner's theorem \cite[Theorem 13.6.5]{MR}.
It follows that $[B, B] \cap A = 0$. So $\tr_{B_A}(b) = (\varepsilon(t) \alpha) \rhu b$ for any $b \in B$.
\end{proof}
The second conclusion of Lemma \ref{trace-Galois-extension} is false when $A$ is not a central subalgebra of $B$, see following example which was given in \cite{KKZ}.
\begin{ex}
Consider the Example \ref{disc-ex} with $n = 2$. Clearly $t = (1+x)(1+y)(1+z)$ is an integral of $H$ with $\varepsilon(t) = 8$.
Recall that $B = \kk\langle u, v \rangle / (vu - iuv)$ is a left $H$-module algebra via
$$x \rhu u = - u, \quad x \rhu v = v, \quad y \rhu u = u, \quad y \rhu v = -v, \quad z \rhu u = v , \quad z \rhu v = u.$$
By \cite[Example 7.4]{KKZ}, the fixed subring $B^H$ is the polynomial ring $\kk[u^2+v^2, u^2v^2]$. Hence $H$ acts on $B$ as a reflection Hopf algebra. But $B^H$ is not a central subalgebra of $B$.
It is clear that $B$ is a free $B^H$-module of rank $8$, with a basis $\{ 1, u, v, u^2, uv, u^3, u^2v, u^3v\}$.
Notice that the quotient ring $Q(B)$ is also an $H$-module algebra by \cite[Theorem 2.2]{SVO}. According to \cite[Theorem 8.3.7]{Mon}, it follows that $Q(B^H) = Q(B)^H \subseteq Q(B)$ is an $H^*$-Galois extension. By a direct computation, $\tr(u^2) \in [Q(B)^H, Q(B)^H] = 0$, but $t \rhu u^2 = 4(u^2+v^2) \neq 0$.
\end{ex}
Next we provide a formula for computing the discriminant of Hopf Galois extension over a central subalgebra.
\begin{lem}\label{Hopf-Galois-disc}
Let $H$ be a finite-dimensional semisimple Hopf algebra, $A:= B^{\mathrm{co} H} \subseteq B$ be a $H$-Galois extension, and $R\;(\subseteq A)$ be a central subalgebra of $B$. Suppose that $A$ is a finitely generated free $R$-module, and that $B$ is a finitely generated free right $A$-module of rank $m$. Then
$$d(B, R; \tr_{B_R}) =_{\kk^{\times}} d(A, R; \tr_{A_R})^m.$$
\end{lem}
\begin{proof}
Let $t$ be a right integral of $H$ with $\varepsilon(t) = 1$, and $\alpha$ be a left integral of $H^*$ with $\langle \alpha, t \rangle = 1$. Let $\{ x_1, \dots, x_m \}$ be a basis of right $A$-module $B$. Since $A \subseteq B$ is an $H$-Galois extension, then there exists $y_1, \dots, y_m \in B$ such that $\beta(\sum_{i=1}^m x_i \otimes y_i) = 1 \otimes t$. Recall that the map $\theta$ is defined by $\theta(b) = \alpha \rhu b$.
By Lemma \ref{H-Galois-Frob}, $B \subseteq A$ is a Frobenius extension with a Frobenius system $(\theta, x_i, y_i)$, that is,
$$\sum_{i=1}^m x_i \theta (y_i b) = b = \sum_{i=1}^m \theta (bx_i)y_i \text{ for all }b \in B.$$
It follows that $B$ is a free $A$-module with a basis $\{ y_i \}_{i=1}^m$, and $\theta(y_ix_j) = \delta_{ij}$ for all $1 \leq i, j \leq m$.
Then
$$\tr: B \To A, \qquad b \mapsto \sum_{i=1}^m \theta(y_ibx_i) + [A, A] = \sum_{i=1}^m \alpha \rhu (y_ibx_i) + [A, A],$$
is the Hattori-Stallings map $\tr_{B_A}$.
By Lemma \ref{trace-Galois-extension}, for all $1 \leq i, j \leq m$,
\begin{equation}\label{eq1}
\tr_{B_A}(y_ix_j) + [B, B] = \alpha \rhu (y_ix_j) + [B, B] = \theta(y_ix_j) + [B, B] = \delta_{ij} + [B, B], \; \text{ in } B/[B, B].
\end{equation}
Since $B \cong A^{\oplus m}$ as right $R$-modules, then $\tr_{A_R}(a) = \frac{1}{m} \tr_{B_R}(a) = 0$ for any $a \in A \cap [B, B]$. For any $b \in B$, since $\tr_{B_A}(b) - \theta(b) \in A \cap [B, B]$ by Lemma \ref{trace-Galois-extension}, then
\begin{equation}\label{eq2}
\tr_{A_R}(\tr_{B_A}(b)) = \tr_{A_R}(\theta(b)) = \tr_{A_R}(\alpha \rhu b).
\end{equation}
Let $z_1, \dots, z_n \in A$ be a basis of free $R$-module $A$.
For any $1 \leq i_1, j_1 \leq m$ and $1 \leq i_2, j_2 \leq n$,
\begin{align*}
\tr_{B_R}(z_{i_2}x_{i_1} y_{j_1}z_{j_2}) & = \tr_{A_R}(\tr_{B_A}(z_{i_2}x_{i_1} y_{j_1}z_{j_2})) \\
& = \tr_{A_R}(\tr_{B_A}(x_{i_1} y_{j_1}z_{j_2}z_{i_2})) \\
& \stackrel{\eqref{eq2}}{=\!=} \tr_{A_R}(\alpha \rhu (x_{i_1} y_{j_1}z_{j_2}z_{i_2})) \\
& = \tr_{A_R}((\alpha \rhu (x_{i_1} y_{j_1}))z_{j_2}z_{i_2}) \\
& \stackrel{\eqref{eq1}}{=\!=} \delta_{i_1j_1} \tr_{A_R}(z_{j_2}z_{i_2}).
\end{align*}
Hence $\det([\tr_{B_R}(z_{i_2}x_{i_1} y_{j_1}z_{j_2})]_{(i_1, i_2), (j_1, j_2)}) = \det([\tr_{A_R}(z_{j_2}z_{i_2})]_{i_2, j_2 = 1}^n)^m$. Since both $\{ z_{i_2}x_{i_1} \}$ and $\{ y_{j_1}z_{j_2} \}$ are basis of $R$-module $B$, then
$$d(B, R; \tr_{B_R}) =_{\kk^{\times}} d(A, R; \tr_{A_R})^m.$$
\end{proof}
Now let's prove the Theorem \ref{intro-main-thm 2}. Retain the notation in the Theorem \ref{main-thm}. Since $A^H$ is a central subalgebra of $A$, it follows that $A^H$ is also a central subalgebra of the smash product $A \# H$.
We infer the following theorem by using Lemma \ref{Hopf-Galois-disc}.
\begin{thm}\label{disc-smash-prod}
Suppose that $H$ acts on $A$ as a reflection Hopf algebra, and that $R:=A^H$ is central in $A$. Let $n$ be the rank of $R$-module $A$ and $m = \dim_{\kk}(H)$. Then
$$d(A\#H, R; \tr) =_{\kk^{\times}} \mathfrak{j}_{A, H}^{nm}.$$
\end{thm}
\section*{Acknowledgments} The author is very grateful to Professor James Zhang for sharing his joint paper \cite{KWZ} with E. Kirkman and R. Won; and especially to his advisor Quanshui Wu for enlightening discussions and unceasing encouragement.
\thebibliography{plain}
\bibitem{AS87} M. Artin and W. F. Schelter, Graded algebras of global dimension 3, Adv. Math. 66 (1987), no. 2, 171--216.
\bibitem{BZ} J. Bell and J. J. Zhang, Zariski cancellation problem for noncommutative algebras. Selecta Math. (N.S.) 23 (2017), no. 3, 1709--1737.
\bibitem{BGS} K. Brown, I. Gordon, C. Stroppel, Cherednik, Hecke and quantum algebras as free Frobenius and Calabi-Yau extensions, J. Algebra 319 (2008), no. 3, 1007--1034.
\bibitem{BrZ} K. A. Brown and J. J. Zhang, Dualising complexes and twisted Hochschild (co)homology for Noetherian Hopf algebras, J. Algebra 320 (2008), no. 5, 1814--1850.
\bibitem{CPWZ1} S. Ceken, J.H. Palmieri, Y.-H. Wang, J.J. Zhang, The discriminant controls automorphism groups of noncommutative algebras, Adv. Math. 269 (2015), 551--584.
\bibitem{CPWZ2} S. Ceken, J. H. Palmieri, Y.-H. Wang, and J. J. Zhang, Invariant theory for quantum Weyl algebras under finite group action. In: Proceedings of symposia in pure mathematics, vol. 92, Lie algebras, Lie superalgebras, vertex algebras and related topics, pp. 119--135 (2016).
\bibitem{CPWZ3} S. Ceken, J. H. Palmieri, Y.-H. Wang, J. J. Zhang, The discriminant criterion and automorphism groups of quantized algebras. Adv. Math. 286 (2016), 754--801.
\bibitem{CYZ} K. Chan, A. A. Young, J. J. Zhang, Discriminant formulas and applications, Algebra Number Theory 10 (2016), 557--596.
\bibitem{EW} P. Etingof, C. Walton, Semisimple Hopf actions on commutative domains, Adv. Math. 251 (2014), 47--61.
\bibitem{FKMW} L. Ferraro, E. Kirkman, W. F. Moore, R. Won, Robert, Three infinite families of reflection Hopf algebras, J. Pure Appl. Algebra 224 (2020), no. 8, 106315, 34 pp.
\bibitem{GKM} J. Gaddis, E. Kirkman, W. F. Moore, On the discriminant of twisted tensor products. J. Algebra 477 (2017), 29--55.
\bibitem{Gin} V. Ginzburg, Calabi-Yau algebras, arXiv:math.AG/0612139.
\bibitem{Hat} A. Hattori, Rank element of a projective module, Nagoya Math. J. 25 (1965) 113--120.
\bibitem{JZ} P. J{\o}rgensen, J. J. Zhang, Gourmet's guide to Gorensteiness, Adv. Math. 151 (2000), 313--345.
\bibitem{Kad} L. Kadison, New Examples of Frobenius Extensions, Univ. Lecture Ser., vol. 14, Amer. Math. Soc., Providence, RI, 1999.
\bibitem{K} R. Kane, Reflection Groups and Invariant Theory. CMS Books in Mathematics, Springer (2001).
\bibitem{KKZ} E. Kirkman, J. Kuzmanovich, and J. J. Zhang, Gorenstein subrings of invariants under Hopf algebra actions, J. Algebra 322 (2009), 3640--3669.
\bibitem{KKZ2} E. Kirkman, J. Kuzmanovich, and J. J. Zhang, Nakayama automorphism and rigidity of dual reflection group coactions, J. Algebra 487 (2017), 60--92.
\bibitem{KWZ} E. Kirkman, R. Won, and J. J. Zhang, Degree bounds for Hopf actions on Artin-Schelter regular algebras, preprint, arXiv:2008.05047, 2020.
\bibitem{KZ} E. Kirkman, J. J. Zhang, The Jacobian, Reflection Arrangement and Discriminant for Reflection Hopf Algebras, Int. Math. Res. Not. IMRN, rnz380, https://doi.org/10.1093/imrn/rnz380.
\bibitem{KT} H. F. Kreimer, M. Takeuchi, Hopf algebras and Galois extensions of an algebra, Indiana Univ. Math. J. 30 (1981) 675--692.
\bibitem{LY} J. Levitt, M. Yakimov, Quantized Weyl algebras at roots of unity, Israel J. Math. 225 (2018) 681--719.
\bibitem{LeWZ} O. Lezama, Y.-H. Wang and J. J. Zhang, Zariski cancellation problem for non-domain noncommutative algebras, Math. Z. 292 (2019) 1269--1290.
\bibitem{LD} Y.-Y. Li, X.-K. Du, Discriminants of polynomial algebras over the symmetric polynomials, Comm. Algebra 48 (2020), no. 8, 3307--3314.
\bibitem{LWZ} D.-M. Lu, Q.-S. Wu, J. J. Zhang, A Morita cancellation problem, Canad. J. Math. 72 (2020), no. 3, 708--731.
\bibitem{LMZ} J.-F. L\"{u}, X.-F. Mao, J.J. Zhang, Nakayama automorphism and applications, Trans. Amer. Math. Soc. 369 (2017) 2425--2460.
\bibitem{MR} J. C. McConnell and J. C. Robson, Noncommutative Noetherian Rings, Revised edition, with the cooperation of L. W. Small, Graduate Studies in Mathematics, V. 30, American Mathematical Society, Providence, RI, 2001.
\bibitem{Mon} S. Montgomery, Hopf Algebras and Their Actions on Rings, CBMS Reg. Conf. Ser. Math., vol. 82, Amer. Math. Soc., Providence, 1993.
\bibitem{NVO} C. N\u{a}st\u{a}sescu, F. van Oystaeyen, Methods of Graded Rings, Lecture Notes in Mathematics, Springer, 2004.
\bibitem{NTY} B. Nguyen, K. Trampel and M. Yakimov, Noncommutative discriminants via Poisson primes, Adv. Math. 322 (2017), 269--307.
\bibitem{OT} P. Orlik, H. Terao, Arrangements of Hyperplanes, Grundlehren der Mathematischen Wissenschaften, vol. 300, Springer-Verlag, Berlin, 1992.
\bibitem{Pan} D. Pansera, A class of semisimple Hopf algebras acting on quantum polynomial algebras, in: Rings, Modules and Codes, in: Contemp. Math., vol. 727, Amer. Math. Soc., Providence, RI, 2019, pp. 303--316.
\bibitem{R} I. Reiner, Maximal Orders, London Mathematical Society Monographs, New Series, V. 28, Oxford University Press, 2003.
\bibitem{RRZ} M. Reyes, D. Rogalski, and J. J. Zhang, Skew Calabi-Yau algebras and homological identities, Adv. Math. 264 (2014), 308--354.
\bibitem{SVO} S. Skryabin, F. Van Oystaeyen, The Goldie Theorem for $H$-semiprime algebras, J. Algebra 305 (2006), 292--320.
\bibitem{Sta} J. Stallings, Centerless groups--an algebraic formulation of Gottlieb's theorem, Topology 4 (1965), 129--134.
\bibitem{V} M. Van den Bergh, Existence theorems for dualizing complexes over non-commutative graded and filtered rings, J. Algebra 195 (1997), 662--679.
\bibitem{WZ} Q.-S. Wu, C. Zhu, Skew group algebras of Calabi-Yau algebras, J. Algebra 340 (2011), 53--76.
\bibitem{Ye1} A. Yekutieli, Dualizing complexes over noncommutative graded algebras, J. Algebra 153 (1992), 41--84.
\bibitem{Ye2} A. Yekutieli, Dualizing complexes, Morita equivalence and the derived Picard group of a ring, J. London Math. Soc. 60 (1999), 723--746.
\end{document} |
\section{Introduction}
Neural machine translation (NMT) systems are currently considered to bridge the gap between human and machine translation \cite{Popel2020,Google}. However, little research has been done to determine whether NMT systems are also very effective in processing multiword units \cite{MON18,ZAN20}, whereas the importance of preformed units in language use is now well established, including in foreign language learning and translation \cite{Baker07,PAW83,SIN91}. The present study addresses this issue by comparing formulaic language in human and neural machine translation. It focuses on a specific category of multiword units, the "habitually occurring lexical combinations" \cite{Laufer11}, such as \textit{dramatic increase}, \textit{depend on}, \textit{out of}, which are not necessarily semantically non-compositional, but are considered statistically typical of the language because they occur "with markedly high frequency, relative to the component words or alternative phrasings of the same expression" \cite{BAL10}. These formulaic sequences (FSs) are analyzed by means of a technique proposed by \cite{Berna07}, improved by \cite{Dur09} and automated by \cite{BG14} under the name \textit{CollGram}\footnote{As one reviewer pointed out, this automation is not an "easily available plug-and-play implementation". However, there is a freely available system that implements it (http://collgram.pja.edu.pl) \cite{LEN16,WOL17}. Some of the indices used can also be easily obtained with the TAALES software \cite{KYL18} which allows the automatic analysis of many other lexical indices. TAALES presents however an important limitation because it only takes into account bigrams that occur at least 51 times in the reference corpus \cite{BE19rfla}, a value much too high for the MI at the heart of the CollGram approach.}.
CollGram rests on two lexical association indices that measure the strength of attraction between the words that compose a bigram, mutual information (MI) and t-score \cite{EVE09}, calculated on the basis of the frequencies of occurrences in a reference corpus \cite{BG14,Dur09}. These two indices are complementary, MI favoring lower-frequency, but strongly-associated, FSs such as \textit{self-fulfilling prophecy}, \textit{sparsely populated} or \textit{sunnier climes} while the t-score favors high-frequency bigrams such as \textit{you know}, \textit{out of} or \textit{more than}. A series of studies have shown that, compared to native speakers, English as a foreign language learners tend to underuse collocations with high MI scores, while overusing those with high t-scores and that exactly the same differences are observed between advanced learners and intermediate learners \cite{BG14,Dur09}. These observations are in agreement with usage-based models of language learning which "hold that a major determining force in the acquisition of formulas is the frequency of occurrence and co-occurrence of linguistic forms in the input" \cite{Dur09}. It is worth noting that the same differences were observed between translated and untranslated texts, but the proposed explanation relies on a tendency towards normalization in translation \cite{Nancy,ConfTrad}. Since neural models also seem to be affected by frequency of use \cite{Koehn17,Li2020}, the hypothesis tested in the present study is that the same effects could be observed when comparing human translations (HTs) and NMTs, namely that NMTs will underuse high MI FSs and overuse high t-score FSs.
\section{Method}
\subsection{Translation Corpus}
The texts used are taken from the journalistic section of the PLECI corpus (uclouvain.be/en/research-institutes/ilc/cecl/pleci.html). It is a sentence-aligned translation corpus of quality newspaper articles written in French and published in \textit{Le Monde diplomatique} and in English in one of the international editions of this same newspaper. Two hundred and seventy-nine texts, published between 2005 and 2012, were used for a total of 570,000 words in the original version and of 500,000 words in the translation.
All original texts were translated into English by three well-known NMT systems: DeepL (deepl.com/translator), Google Translate (translate.google.com) and Microsoft Translator (microsoft.com/translator). Online translators were used for the first two, while the version available in \textit{Office 365} was used for the third. All these translations were performed between March 24 and April 6, 2021.
\subsection{Procedure}
Each translated text was tokenized and POS-tagged by CLAWS7 \cite{Ray03} and all bigrams were extracted. Punctuation marks and any character sequences that did not correspond to a word interrupted the bigram extraction. Each bigram, which did not include any proper name or number according to CLAWS, was then searched for in the 100 million word British National Corpus (BNC\footnote{\cite{Bes16Tal} showed that CollGram produces the same results if another reference corpus, such as COCA (corpus.byu.edu/coca) or WaCKy \cite{BAR09}, is used.}, www.natcorp.ox.ac.uk). When it is present, the corresponding MI and t-score were used to decide whether it is highly collocational or not. Based on \cite{ConfTrad} and \cite{Dur09}, bigrams with a score greater than or equal to 5 for the MI and 6 for the t-score were considered highly collocational. The last step consisted in calculating, for each text and for each association index, the percentage that the bigrams considered as highly collocational represent compared to the total number of bigrams present in the text.
\section{Analyses and Results}
Table 1 shows the average percentages of highly collocational bigrams for the MI and t-score in the four type of translations. The four means for each measure of association were analyzed using the Student's test for repeated measures since the same texts, which are the unit of analysis, were translated by the four translators. All these comparisons were statistically significant ($p < 0.0001$).
\begin{table}
\begin{center}
\caption{Average percentages of highly collocational bigrams for the two indices in the four translation types.}
\begin{tabular}{|l|r|r|r|r|}
\hline
Measure & Human & DeepL & Google & Microsoft \\ \hline
High MI & 11.21 & 10.48 & 10.07 & 10.27 \\
High t-score & 58.76 & 60.60 & 59.49 & 59.89 \\ \hline
\end{tabular}
\end{center}
\end{table}
Table 2 presents the differences between the means as well as two effect sizes. The first is Cohen's $d$, which expresses the size of the difference between the two means as a function of the score variability. According to \cite{Cohen88}, a $d$ of 0.50 indicates a medium effect and that a $d$ of 0.80 a large effect. The second effect size indicates the percentage of texts for which the difference between the two translations has the same sign as the mean difference. A value of 100 means that all texts produced by a given translator have a higher score than those translated by the other one and a value of 50 means that there is no difference.
\begin{figure}
\begin{center}
\includegraphics[width=11cm]{GR1}
\end{center}
\caption{Average percentages of highly collocational bigrams for the two indices.}
\end{figure}
As shown in these tables and in Figure 1, both hypotheses are verified. Compared to HTs, texts translated by the three neural systems contain a significantly smaller percentage of highly collocational bigrams for the MI and a larger percentage of highly collocational bigrams for the t-score. Cohen's $d$s are almost always medium or large and the percentages of texts for which differences are observed are greater than 70\% except in one case.
\begin{table}
\begin{center}
\caption{Differences (row translator minus column translator) and effect sizes for the two indices in the four translation types.}
\begin{tabular}{|l|rrr@{\hspace{0.5em}}|rrr@{\hspace{0.5em}}|rrr@{\hspace{0.5em}}|}
\hline
& \multicolumn{3}{|c}{Human} & \multicolumn{3}{|c|}{DeepL} & \multicolumn{3}{|c|}{Google} \\
& \multicolumn{1}{|c}{D} & \multicolumn{1}{c}{Es} & \multicolumn{1}{c|}{\%} & \multicolumn{1}{|c}{D} & \multicolumn{1}{c}{Es} & \multicolumn{1}{c|}{\%} & \multicolumn{1}{|c}{D} & \multicolumn{1}{c}{Es} & \multicolumn{1}{c|}{\%} \\ \hline
& \multicolumn{9}{|c|}{High MI} \\
DeepL & -0.72 & 0.59 & 73.48 & & & & & & \\
Google & -1.14 & 1.00 & 84.33 & -0.41 & 0.65 & 74.91 & & & \\
Microsoft & -0.94 & 0.77 & 81.00 & -0.21 & 0.35 & 62.72 & 0.20 & 0.36 & 64.52 \\ \hline
& \multicolumn{9}{|c|}{High t-score} \\
DeepL & 1.83 & 0.84 & 80.65 & & & & & & \\
Google & 0.72 & 0.32 & 62.37 & -1.11 & 0.98 & 84.59 & & & \\
Microsoft & 1.13 & 0.51 & 71.33 & -0.70 & 0.62 & 70.97 & -0.41 & 0.42 & 69.18 \\ \hline
\end{tabular}
\end{center}
\end{table}
An analysis of the passages in which the differences between HT and NMT are the largest suggests that the origin lies at least partially in the less literal nature of human translations (see Table 3 for an example).
\begin{table}
\begin{center}
\caption{Example of the four translation types and percentages of highly collocational bigrams for the two indices.}
\begin{tabular}{|l|l|r@{\hspace{0.5em}}|r@{\hspace{0.5em}}|}
\hline
Type & Phrase & \%High MI & \%High t-score \\ \hline
Original & A raison de huit heures par jour & & \\
Human & In an eight-hour day & 67 & 33 \\
DeepL & At eight hours a day & 25 & 100 \\
Google \& Microsoft & At the rate of eight hours a day & 14 & 100 \\
\hline
\end{tabular}
\end{center}
\end{table}
The differences between the three NMT systems are smaller, but still statistically significant. However, they require a different interpretation. When NMTs are compared to HTs (see Figure 1), the patterns of differences are reversed according to the MI or the t-score, as expected. For the NMT systems (see Figure 2), these patterns are identical for both types of collocation. The average percentages of highly collocational bigrams (see Table 1) are always higher in texts translated by DeepL than in those translated by Microsoft and also higher in the latter than in those translated by Google. Only a detailed qualitative analysis could determine whether these results indicate a difference in effectiveness.
\begin{figure}
\begin{center}
\includegraphics[width=11cm]{GR2}
\end{center}
\caption{Average percentages of highly collocational bigrams for the three NMT systems.}
\end{figure}
\section{Discussion and Conclusion}
The reported analyses confirm the hypotheses and thus suggest that, compared to HTs, NMTs more closely resemble texts written by intermediate learners than by advanced learners of English as a foreign language, a result that could be interpreted in the context of a usage-based model of language learning \cite{Dur09}. The NMTs also resemble translated texts more than untranslated texts, but it is not clear that this can be explained by a normalization process. Statistically significant differences, but smaller in terms of effect size, were also observed between the three NMT systems.
It is important to keep in mind that the present study only considers global quantitative properties of MWUs. At no point is the appropriateness in context of the MWUs assessed. It is therefore a very partial approach. However, it has the advantage of not requiring a human qualitative evaluation that is often complicated and cumbersome to set up. Moreover, it is likely that the appropriateness of a MWU is much more important for non-compositional expressions than for the habitually occurring lexical combinations studied here \cite{CON17}.
Another important feature of the approach is that it relies on a native reference corpus to identify highly collocational bigrams for both indices. As already mentioned, research on foreign language learning, but also on the comparison of translated and untranslated texts, has shown that the use of other large reference corpora such as COCA or WaCKy \cite{BAR09} did not change the results \cite{Nancy,Bes16Tal}. One can also wonder whether the use of a comparable reference corpus, rather than a generic one, would have returned different results. In the case of the comparison of translated and untranslated texts, \cite{Nancy} observed that the use of a journalistic corpus, the \textit{Corpus Est Republicain} (115 million words) made available by the Centre National de Ressources Textuelles et Lexicales, produced differences similar to those obtained with the WaCKy corpus.
Before considering taking advantage of these observations to try to improve NMT systems, a series of complementary analyses must be conducted. Indeed, this study has many limitations, such as focusing only on a subcategory of MWUs \cite{MON18}, on a single language pair, and on a single genre of texts. Moreover, a thorough qualitative analysis is essential to better understand the results and evaluate the proposed explanations. As it has been shown in foreign language learning \cite{Bes17}, it would also be interesting to verify that the observed effects are not explained by differences in single-word lexical richness. Finally, the differences between the three NMT systems also require further analysis.
\bibliographystyle{splncs04}
|
\section{Glossary}
\textbf{ABM} - Agent Based Modelling \\
\textbf{ABC} - Approximate Bayesian Computation \\
\textbf{ODD} - Overview, Design, Details \\
\textbf{BDI} - Belief-Desire-Intention \\
\textbf{HCC} - Hamilton City Council \\
\textbf{CBD} - Central Business District in Hamilton, New Zealand \\
\textbf{AW} - Count data collected for the southwest direction at the Anglesea-Ward intersection \\
\textbf{TR} - Count data collected for the northeast direction on Ward St towards Victoria St \\
\textbf{TA} - Count data collected for the southeast direction on Worley Pl \\
\textbf{CPS} - Count data collected for the southeast direction out of Centre Place (South) to Civic Square \\
\newpage
\pagenumbering{arabic}
\setcounter{page}{1}
\section{Introduction}
Agent Based Modelling refers to a class of computational models invoking the dynamic behaviour, reactions and interaction amongst a set of agents in a shared environment (Abar, Theodoropoulos, Lemarinier, O'Hare, 2017). A wide range of real world systems can be modelled using this framework. It is particularly effective in complex systems of multiple heterogeneous, interacting agents. Valuable information can be gathered by observing the aggregate behaviour of a micro level simulation where agents interact with both other agents and the environment. \\
A key component of ABM research is in the post analysis of the model output. Due to its stochastic simulation nature there is a vast flexibility in the quantity and type of data produced by a given ABM. As a result, it is necessary to output only the most relevant data and analyse it using efficient techniques for effectively answering the original set of research questions. In a traditional Bayesian context, there exists a set of random parameters describing the function of an ABM. These parameters are usually inferred by fitting a model to the data and calculating the probability of observing the parameters given the data (\textit{posterior distribution}). However, it is often the case that a complex system has an intractable likelihood, where the probability of the parameters given the data cannot be calculated. \\
In this setting, alternative approaches must be examined to find the posteiror distribution. One such `likelihood free' approach is Approximate Bayesian Computation (ABC). Where observed data can be compared against simulated data, ABC can be used to infer a set of parameters for a model. This turns out to be a suitable method for the analysis of an agent based model, where the likelihood is often intractable. Various examples of analysing an ABM using the ABC algorithm are shown, with the focus being on modelling pedestrians flows in the Hamilton CBD. ABC is used to validate the ABM by approximating the observed data, as well as infer a set of probability parameters for the movement of pedestrians.
\section{Agent Based Modelling}
Agent Based Modelling (ABM) is a computational framework for simulating the behaviours and interactions of autonomous agents. The agents can represent any individual or collective entity within a complex system. They each have a set of properties and behaviours, which are carried out at each time step of the model simulation. The output of the model gives us a means of assessing how the actions of individual entities affect the system as a whole. In a complex system it is often the case that an emergent pattern is seen, but the actions of the agents making up the system is not readily visible. Constructing a model using the ABM framework allows us to understand how the properties and behaviours of individual agents develop this emergent pattern. \\
Joslyn \& Rocha, (2000) define a complex system as ``consisting of a large number of interacting components (agents, processes, etc.) whose aggregate activity is non-linear (not derivable from the summations of the activity of individual components), and typically exhibits hierarchical self-organization under selective pressures". Such systems contain a number of complexities in state space, interactions, behaviour and spatio-temporal structure. A key property is that of emergence. When a large number of agents in a complex system interact in a spatio-temporal structure, properties can be observed which are usually not readily apparent from observing the agents independently. ABM allows us to construct a complex system in such a way that the aggregate behaviour of individual agents can be observed. By constructing such a model on a microscale level, it is often the case that more information can be extracted than viewing the model solely by its aggregate behaviour. \\
ABM has been used across a wide range of scientific disciplines, including ecology, economics, and biology. In the biological sciences, recent advances in computational tools have allowed for the simulation of individual cells in order to observe the aggregate behaviour. One application is the modelling of the chemotactic response of \textit{E.coli} cells to chemo attractant gradients in a 3D environment (Emonet et al, 2005). Representing cells as autonomous agents competing in a spatial environment is well suited for such biological analysis, where the physical observation of the process is either not possible or practical. More recently, ABM has been used in urban planning of city environments. As the dynamic structure of transportation modes evolves and the use of alternative modes increases, is it now vital to understand how traffic flows change across an urban environment. A tool developed by Aschwanden, Wullschleger, Müller, \& Schmitt (2012), allowed for the simulation of a city's transportation network to evaluate greenhouse gas emissions and pedestrian flow (Aschwanden et al, 2012).\\
Much of the phenomena observed in the world can be modelled with an ABM. For example consider the ecological predator-prey model. There are two popular approaches to understanding the dynamics of the change in populations between two species where one predates on the other. One is known as the \textit{Lotka--Volterra} model, developed independently by Lotka (1925) and Volterra (1926). This pair of first-order non linear differential equations describe the change in the population of two species over time.
\begin{align}
\frac{dx}{dt} = \alpha x - \beta x y \\
\frac{dy}{dt} = \delta x y - \gamma y,
\end{align}
where $x$ = the population of the prey species, \\
$y$ = the population of the predator species, \\
$t$ = time, \\
$\frac{dx}{dt}, \frac{dy}{dt}$ represent the instantaneous growth of the two populations, \\
and $\alpha, \beta, \gamma, \delta$ are positive real parameters which describe the interaction between the two species. Each parameter can be adjusted and a solution yielded to find the change in population of two interacting species. While the Lotka-Volterra model has a long history of use in ecology, it is too simplistic to apply to ecosystems where predator competition is involved. In addition, it is not possible for either species in the model to saturate completely. \\
An alternative method to describe predator-prey interaction is that of an agent based model. Consider the interaction between wolf and sheep in a field. First we describe this model by answering a set of key questions. Describing an agent based model in this way enables another researcher to quickly and easily understand its function.
\begin{enumerate}
\item{\textbf{Research Question}} \\
Under what conditions is an equilibrium of the wolf and sheep population levels obtained, when wolves predate on the sheep and sheep consume grass?
\item{\textbf{Agents}} \\
Wolves, Sheep, Grass
\item{\textbf{Agent Properties}} \\
Wolf and Sheep: Energy, Location, Heading. Grass: Amount of grass
\item{\textbf{Agent Behaviours}} \\
Wolf and Sheep: Move, Die, Reproduce. Wolf: Eat sheep. Sheep: Eat Grass. Grass: Grow
\item{\textbf{Parameters}} \\
Num Sheep, Num Wolves, Movement Cost, Energy Gain from grass, energy gain from sheep, grass regrowth rate
\item{\textbf{Time Step}} \\
Sheep \& Wolves: 1. Move, 2. Die, 3. Eat, 4. Reproduce; Grass: 5. Grow
\item{\textbf{Measures}} \\
Sheep and wolf population versus time
\end{enumerate}
The two species can be represented as two sets of agents. Each agent of the set is given relevant properties chosen as having the most influence on deriving the output we want to observe. Both the sheep and wolves are given three shared properties: an energy level, location and heading (direction). There is no limit to the number of properties, but for simplicity purposes, they should be restricted to those necessary to answer the research question. The second step is to describe the environment in which the agents interact. Here the environment is a field with patches of grass. This could be extended to include fences, elevation and other features, but again for simplicity purposes are left out of the first model. When the agents reach the end of the world, they will reappear on the other side of the world. This is known as a `torus shaped' boundary condition, and is a common feature in ABMs. Next, the agent behaviour is described. Both sheep and wolves have the ability to move, eat, reproduce, and die. Where they differ is in what each species eat - wolves will consume sheep while sheep will consume grass. Parameters are then chosen to control various attributes of the model. This allows the observation of changes in the model given varying parameters - the numbers of each population, the amount of grass available, or the reproduction rate can be changed and the aggregate effect of each observed. At each time step (or \textit{tick}, which will be used hereafter), the agents carry out some action. Both the sheep and wolves move, die, eat then reproduce. The grass grows at each tick. The populations of the two species is observed as the aggregate behaviour.
\begin{figure}[H]
\centering
\includegraphics[width=10cm]{Images/WolfSheepDiagram}
\caption{Properties, Agents and Behaviours in the Wolf-Sheep predation model}
\end{figure}
\subsection{Analysis of an ABM}
In the above model there exists a set of parameters which achieve equilibrium in the sheep and wolf populations. This is often found through trial and error. Another, more sophisticated method involves looping through many thousands of simulations, changing the set of parameters each time. The sheep and wolf populations are analysed in each run. The output is some metric describing how close the populations are to sustaining over time. This is demonstrated below. In each run, the parameters are adjusted, the model is run for a set number of time ticks, and the final numbers of both wolf and sheep compared to the initial populations. The data can be analysed with appropriate statistical models to identify stationarity. One such method is to view the two populations as two time series. The oscillation of the species populations can be viewed as seasonality. Given enough simulation time, the difference in population numbers from the start to the end of the time series is compared to determine if the system has reached equilibrium. \\
The BehaviorSpace tool in ABM software NetLogo allows a simulation to be run multiple times with changing parameters. A simple demonstration of this tool for analysis is when the `energy from grass' parameter is changed. This parameter determines the energy that sheep gather from eating grass. Because sheep lose energy from movement, a low amount of energy gained from grass is likely to result in a larger decrease in the sheep population than if a large amount of energy was gained from eating grass. The Wolf-Sheep predation ABM allows this theory to be tested in a simulation based manner, followed by the application of robust statistical analysis methods from the output data to answer questions about the model. Keeping all other parameters fixed, the grass energy parameter was updated. The simulation was run for 1000 ticks and the population of the two species recorded at each tick.
\begin{figure}[H]
\centering
\includegraphics[width=14cm]{Images/WolfSheepPopulation-BehaviorSpace}
\caption{Four runs of Wolf-Sheep ABM with four different grass energy parameters - 1, 4, 7 and 10. Note: The y-axis is free}
\end{figure}
When the grass energy is low, both species die out extremely quickly. This is due to the sheep not gaining enough energy to move, subsequently dying out. The wolves, now with no species to predate, also die out. At a grass energy of four, an equilibrium appears to be reached. The sheep can gain enough energy to continually move, which sustains the populations of the wolves predating them. If the grass energy is changed to 7, the sheep population varies far more. The population increases sharply due to the high energy levels of the sheep (who then reproduce more frequently), which results in a high level of competition for the available grass. Due to this competition, the population drops off to an extremely low level at $\sim$340 ticks. This results in the wolf population dropping to zero from the lack of prey. With no predators remaining, the sheep population increases to a high level and remains at $\sim$500 for the remainder of the simulation. In the last run the grass energy is set to 10. This has a similar effect as the previous parameter, although the sheep population reaches a higher level before remaining constant. \\
While this \textit{`brute-force'} approach is often used to analyse complex systems for the purposes of parameter inference, it is computationally inefficient. When looping through samples of each parameter, much of the simulation time is spent producing data far from the desired outcome. For a set of parameters $\theta$ of dimension $P$, each sampled at N equal intervals $a \times \frac{max(\theta)}{N}, a = \{1,...N\}$, the required number of simulations quickly becomes prohibitively large. Consider the case of the wolf-sheep predation model with 7 parameters. If we would like to sample each parameter at 100 even intervals, the number of simulations to cover all possible combinations becomes:
\begin{align}
\text{Num Simulations} = N^{P} = 1 \times 10^{14}
\end{align}
Clearly this number of simulations is unreasonable. This can be shortened by reducing the number of sampled intervals for each parameter or disregarding some combinations of variables, but the issue remains of a large amount of computation time being wasted sampling parameters which do not produce simulated data close to the desired outcome of the ABM.
\subsection{Equation Based Modelling (EBM)}
While ABM is a 'bottom up' approach focusing on the aggregate behaviour of agents, Equation Based Modelling (EBM) is a top down approach. EBM is based on an interrelation between a series of partial differential equations (Parunak, Savit \& Riolo, 1998). The variability in the system is examined over time and/or space. Validation is enabled by comparing the output of the model to the real world system behaviour. In comparison, ABM allows validation of both the individual and aggregate system behaviour. EBM is suited for modelling physical processes where the behaviour of the components is not as important as that of the overall system. \\
Generally, EBM's are a set of differential equations and parameters. Extending the \textit{Lotka--Volterra} model, time can be eliminated from each equation to produce a single equation, and then solved for a constant quantity $V$:
\begin{align}
\frac{dx}{dt} = \alpha x - \beta x y \\
\frac{dy}{dt} = \delta x y - \gamma y \\
\frac{dy}{dx} = -\frac{y}{x} \frac{\delta x - \gamma}{\beta y - \alpha} \\
\frac{\beta y - \alpha}{y} dy + \frac{\delta x - \gamma}{x} dx = 0 \\
V = \delta x - \gamma \ln(x) + \beta y - \alpha \ln(y)
\end{align}
This model will give the number of two populations $x$ and $y$ given the set of parameters $\alpha$, $\beta$, $\gamma$ and $\delta$. A major limitation of this in ecological models is that neither population can reach zero - they always recover after falling to a low level. However, the more flexible structure of an ABM allows either population to go extinct.
\subsection{Comparison of ABM to EBM}
While Agent Based Modelling is well suited for many classes of complex systems, it is better suited for some contexts than others. In problems with a large number of homogeneous agents, it is often the case that more accurate results can be obtained in a shorter amount of time using an aggregate solution. Tracking the behaviour of individual agents is not always necessary. For example, if we are concerned with the amount of water in a container, it is more useful to track the water level directly and model it using a set of differential equations. Parameters in the equations such as temperature can be adjusted and the effects observed. Where there are only a few interacting agents in a system, a similar approach can be taken by deriving a model with differential equations. One such example is in the behaviour of a tennis ball falling onto different surfaces. Here, the physical behaviours of the model are understood with a rigorous mathematical structure such as kinematic equations. This can be used to developed a set of differential equations for effectively describing the behaviour of the ball given different materials and surfaces.\\
Agent Based Modelling is well suited for systems with many heterogeneous agents interacting in an environment. In many populations, individual agents possess unique properties which are not shared across the entire population. Their behaviours are guided by both the environment, the history of their actions and their current properties. ABM is well suited for a system where it is useful to track individual agents and their actions. In this manner it is much more powerful than using equation based modelling. Where the behaviour of agents relies on their history of interactions, the agents can be modelled as intelligent beings with the ability to learn, reason about situations, and deal with uncertainty. An example of this is in the behaviour of pedestrians in a transportation network. Humans are intelligent beings, with each individual's decision making process different from the rest. The reason for one individual choosing to travel a certain route is likely different to another individual, and the long term behaviours of each pedestrian differ substantially. While it would be impractical to model such a process using EBM, pedestrian modelling is well suited to an ABM approach, allowing for individual actions carried out by several heterogeneous agents.
\subsection{Agent Intelligence}
Recent advances in the field of artificial intelligence have allowed for the construction of agents in an ABM, such that they are able to learn from their past and take an action based on a complex set of variables. One such influential paradigm to enable this is BDI - Belief-Desire-Intention (Singh, Padgham \& Logan, 2016). BDI recognises ``that an agent can be identified as having: a set of beliefs about its environment and about itself; a set of desires which are computational states which it wants to maintain, and a set of intentions which are computational states which the agent is trying to achieve" (O'Hare, Jennings, 1996). More recent developments have expanded on this philosophy, going beyond simple reactive behaviour to embedding cognitive complexity (Abrams, 2013). While many ABMs are not suited to this more complex agent intelligence, the recent advances in modelling highly complex systems allows for the embedding of more advanced levels of agent intelligence to achieve a more realistic simulation.
\subsection{Mathematical Background of ABM}
Although ABM is much less mathematically oriented than EBM, it is important to establish a mathematical framework for representing the system and the agent properties. There exist a number of mathematical formalisations for Agent Based Models. A series of mathematical objects can be developed to represent a theoretical abstraction of agent based simulations. These objects capture the features of simulations and allow for the development of mathematical theory to explain the output of a simulation (Laubenbacher et al, 2007). An ABM can be described as a Markov Chain where the state of the system at time $t$ is given by the state at all nodes in the system: $X_{t} = {x_{i,t}},\; i = 1,...,N, t = 1,...,T$.
The state at a given node $i$ for time $t+1$ is given by
\begin{align}
x_{i,t+1} = f_{i}(X_{t}, \Xi_{t}, \theta)
\end{align}
That is, the state at time $t+1$ in the system is reliant only on the previous state. This is an important feature of an ABM, allowing for the model at each tick of the simulation to make agent decisions and update the environment based only on the current state. Storing every prior state and set of decisions, while updating the current state using this prior data, becomes costly in terms of computation and memory as a system increases in complexity. \\
Perhaps the most common framework for describing agent based simulations is Cellular Automata (CA). They are typically defined over a regular grid such as the two dimensional $\mathbb{Z}^{2}$. Each grid point $(i,j)$ represents a \textit{site} or \textit{node}. Each node has a state $x_{i,j}(t)$, where $t$ denotes a time step. The neighborhood \textit{N} for each site consists of a set of nodes that can influence the future state of the node $x_{i,j}$. Based on the current state $x_{i,j}(t)$ and the current state of all nodes in the neighborhood $N$, a function $f(i,j)$ computes the next state $x_{i,j}(t+1)$ of the site at $(i,j)$. Laubenbacher et al (2007) defines this as:
\begin{align}
x_{i,j}(t+1) = f(i,j)(\bar{x}_{i,j}(t))
\end{align}
where $\bar{x}_{i,j}$ denotes the tuples consisting of all the states $x_{i',j'}(t)$ with $(i',j') \in N$. \\
Another modelling framework is that of \textit{finite dynamical systems}. This framework represents an ABM as a time-discrete dynamical system of a finite state set. It can be seen that the representation of an ABM in this way is mathematically rich enough to allow the derivation of formal results.
\subsubsection*{Finite Dynamical Systems}
A Finite Dynamical System (FDS) is an iteration of a function over a collection of variables. We denote this collection as a nonempty, finite set $X = x_{1}, ... , x_{n}$. There is a single, local function $f_{i}$ associated with each element $x_{i}$ in the set. Each of theses local functions take input from only variables in the `neighborhood' of $x_{i}$. Laubenbacher et al (2007) defined an FDS as a sequential composition of these local functions, forming the dynamical system:
\begin{align}
\Phi = (f_{1},...,f_{n}): X^{n} \to X^{n},
\end{align}
Here, $\Phi$ is an iteration unit which generates the dynamics of the system. From Laubenbacher et al (2007), $\Phi$ is assembled from each local function $f_{i}$, each of the variables can be updated simultaneously:
\begin{align}
\Phi(x_{1},...,x_{n}) = (f_{1}(x_{1},...,x_{n}),...,f_{n}(x_{1},...,x_{n}))
\end{align}
In the above a \textit{parallel dynamical system} is obtained. Each variable $x$ in the system is updated in parallel using a local function in its own neighborhood. Alternatively, a \textit{sequential} dynamical system can be obtained by updating the variables states by a fixed update order (Laubenbacher et al, 2007):
\begin{align}
\Phi_{\pi} = f_{\pi t} \circ f_{\pi n-1} \circ ... \circ f_{\pi 1},
\end{align}
where $\pi$ is a permutation on a set $\{1,...n\}$.
The dynamics of $\Phi$ can be represented as a directed graph on the vertex set $X^{n}$, called the \textit{phase space} of $\Phi$ (Laubenbacher et al, 2007). There is a directed edge from \textbf{v} $\in X^{n}$ to \textbf{w} $\in X^{n}$ if and only if $\Phi(\textbf{v})$ = \textbf{w} (Laubenbacher et al, 2007). \\
An Agent Based Model can be represented using this framework. Agents can be thought of as entities in a finite dynamical system, each carrying a set of configurations, preferences and spatial and/or temporal state information. \textit{Cells} are features of the environment in which the agents carry out behaviours. These cells take on one of a finite number of possible states. Agents interact with a subset of nearby agents in the environment, and update their internal state according to a function at each time step. The neighbors of a cell in the ABM environment form an \textit{adjacency relation}, obtaining a dependency graph of the agents (Laubenbacher et al, 2007). For example in a pedestrian network, the state at time $t$ for a given intersection $I$ is dependent on the states of the intersections in the neighborhood of $I$ at time $t-1$. \\
The agents in an ABM may be updated in a number of ways. These are generally either synchronous, asynchronous, or event-driven (Laubenbacher et al, 2007). The choice of the scheduling system is highly dependent on the system that is being modelled. In the pedestrian model described previously, it is clear that at each time-step (or \textit{tick}) of the simulation, all agents will update; moving through the environment and updating their internal states. This is a \textit{synchronous} system. An asynchronous system is suitable for models where the actions of each agent do not depend on the current state of the agents in its local neighborhood. The choice of such a scheduling system is an important feature in the design of an ABM. The nature of dependency and interaction must be carefully considered in order to design a realistic system.
\subsection{Link to statistical theory}
As the foundation of Agent Based Modelling lies in simulation based on observed data in addition to data output, statistics plays a major role at nearly every stage of the modelling process. Perhaps the most important step in ABM based research lies in the analysis of data from the simulation to derive parameters for understanding the data generating process. Other analysis may include descriptive, predictive, or inferential statistics. These models can include, but are not limited to; spatial, network, survival, or time series analysis. Most ABM frameworks provide a method to import and export data into more robust statistical packages such as R or Python. These packages provide advanced modelling tools which allow the researcher to extract insights from the ABM.
\subsection{Model Design}
To date, there is no standard format for the documentation of an ABM. Limited replicability is an issue in scientific research using ABMs. To maximise the reproducibility of an ABM, a format for their design should be adopted which is popular in the scientific community. By standardising the description of a model in this way, it can be more easily reproduced by another party or revisited by the original developer. One such format is ODD - Overview, Design, Details, first proposed by Grimm et al (2006) as a standard protocol for describing agent based models. It was subsequently reviewed and updated in 2010 (Grimm et al, 2010). ODD describes a set of key aspects of the model:
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/ODD}
\caption{The ODD protocol and the changes from 2006 to the updated 2010 protocol}
\vspace{-1.5em}
\end{figure}
\begin{enumerate}
\item{\textbf{Purpose}} \\
What is the purpose of the model? What are the desired outcomes?
\item{\textbf{Entities, State Variables and Scales}} \\
What entities exist in the model? Agents, environment, collectives, spatial units. How are the entities characterised? What properties do they hold? What are the spatial and temporal resolutions of the model?
\item{\textbf{Process overview and scheduling}} \\
What actions are assigned to each entity, and in which order? How are the state variables updated? How is time modelled - discretely, continuously, or as a continuum where both can occur?
\item{\textbf{Design Concepts}} \\
Emergence, Adaptation, Fitness, Prediction, Sensing, Interaction, Stochasticity, Collectives, Observation.
\item{\textbf{Initialisation}} \\
What is the initial state of the model world? How many entities are created and what are their default properties?
\item{\textbf{Input Data}} \\
Is external data used as input to represent the change in a process over time?
\end{enumerate}
ABMs developed in the course of this dissertation will follow the ODD protocol. For each, thorough documentation is provided to enable reproduction of the model by researchers.
\subsection{ABM Software}
Several ABM toolkits are available to enable the development of agent based model simulations. Perhaps the most popular of these is \textbf{NetLogo}. NetLogo was developed in 1999 by Uri Wilesnky. It uses a philosophy of `low threshold, no ceiling', with a goal of making the software easy to use for beginners while remaining flexible enough to develop advanced models. It contains a number of example models for fields such as network analysis, social science, and biology. All ABM models in this report are developed in NetLogo. The RNetLogo and pyNetLogo libraries in R and Python respectively allow for programmatic, headless control of a NetLogo model. Statistical models were developed in both R and Python, with the simulation element communicating with the NetLogo model for sending commands and receiving output.
\begin{figure}[H]
\centering
\includegraphics[width=10cm]{Images/NetLogo}
\caption{A NetLogo ABM of virus spread through a network}
\end{figure}
\section{Graph Theory}
ABM is commonly used to design networks in a variety of fields, including power grids - Durana et al (2014); social networks - El-Sayed et al (2012); and transport - Huynh et al (2015). Graph Theory underlies much of the construction of these networks. The basis of graph theory is the relationships between a set of entities, or \textit{nodes}. A graph is an ordered pair $G = (V,E)$ comprising a set of vertices or nodes $V$ together with a series of edges $E$, which are two-element subsets of $V$ (Prathik et al, 2016). This turns out to be a natural way of defining an ABM. For example, a model for social network analysis could be set up with users as nodes, communication between users as links, and the direction of the communication as the direction of the links. In the ABM, agents are defined as users. Their parameters may include friend count, post rate, and other metrics related to the social network in question. The environment in which the agents interact is the graph itself. Their behaviours over a series of ticks allow output such as activity levels and friend counts to be analysed on an aggregate level. \\
Consider a simple stochastic ABM represented as a graph (pictured below). In this ABM, agents are placed randomly at nodes. At each tick of the simulation each agent will move to a connected node via the grey lines. The graph is \textit{undirected} - agents can travel to any connected edge from a given node. There are seven nodes and six edges. By designing this ABM network using the logic of graph theory, we can answer route based questions, such as the number of possible ticks it will take for an agent to move from node $6$ to node $0$. Other problems we might want to solve include the shortest possible distance between two nodes, or whether it is possible to return to a node. \\
\begin{figure}[H]
\centering
\includegraphics[width=5cm]{Images/ToyGrid}
\caption{Undirected graph of a stochastic ABM}
\end{figure}
Constructing a network based ABM using the logic of graph theory allows for the formal analysis of the simulation. Consider an ABM consisting of a series of $N$ cities (nodes) and $R < N^{2}-N$ directed roads (links). A question that can be asked of this model is ``does there exist a tour of all $N$ cities stopping at each city exactly once using the given roads?" (Altschuler \& Williams, 2017). This is a route problem known as the \textit{Hamiltonian path problem}. This is an NP-complete problem that is solved in non-deterministic polynomial time. The model can be developed in an ABM structure to set up a simple rule based system for the traversal of a single agent between nodes. Various algorithms based on the graph theory analysis of the problem can be implemented as actions by the agent based on its current state. Setting up the model in this way allows for both abstraction from its mathematical form into one which is easier to visualise, as well as an environment to enable sandbox testing of different graph structures. This simplification is a common thread in the design of ABMs and is a large reason for their widespread use in network analysis.
\section{Approximate Bayesian Computation}
\subsection{Bayesian Inference}
Bayesian inference is a method of statistical inference grounded in Bayes Rule. It states that the probability of some event A, given that event B has occurred, is given by:
\begin{align}
P(A|B) = \frac{P(B|A)P(A)}{P(B)}
\end{align}
In the context of Bayesian parameter estimation, we aim to find the posterior distribution of the parameters given the data:
\begin{align}
p(\theta|x) = \frac{p(x|\theta) p(\theta)} {p(x)},
\end{align}
where $p(\theta|x)$ is the posterior distribution, \\
$p(x|\theta)$ is the likelihood, \\
$p(\theta)$ is the prior, and \\
$p(x)$ is the probability of the data. Often the denominator $p(x)$ involves computing an integral to normalise the posterior to a probability distribution:
\begin{align}
p(x) = \int p(x|\theta)p(\theta)d \theta
\end{align}
In some cases, such as models where a conjugate prior is available, this is straightforward to calculate numerically. If no conjugate prior is available, there are a wide range of computational methods for sampling from the posterior. One of these is Markov chain Monte Carlo (MCMC). MCMC constructs a Markov chain with the target posterior dsitibution as its equilibrium distribution. By sampling from this chain for a long period of time, a sample from the posterior is obtained. A common algorithm for this is known as Metropolis Hastings, developed by Metropolis, Rosenbluth, Rosenbluth, Teller and Teller (1953). Formally, the algorithm uses a proposal distribution $g(x^{'}|x)$ as the conditional probability of accepting a state $x^{'}$ given $x$, and an acceptance ratio $A(x^{'}|x)$ as the probability of accepting the proposed state $x^{'}$.
\begin{align}
P(x^{'}|x) = g(x^{'}|x)A(x^{'}|x), \text{where} \\
A(x^{'}|x)= \text{min}\left(1,\frac{P(x^{'})}{P(x)}\frac{g(x|x^{'})}{g(x^{'}|x)}\right)
\end{align}
MCMC can be used for parameter inference in any class of statistical model where the likelihood $g(x^{'}|x)$ can be evaluated. Consider a simple generalised linear model of the form $\pi = \frac{1}{1 + \exp[-(\beta_{0} + \beta_{1}x_{i})]}$. Here the parameters are the intercept $\beta_{0}$ and a single coefficient $\beta_{1}$. The likelihood follows a Binomial distribution of the form
\begin{align}
L(p|x) = \frac{n!}{x!(n-x)!}p^{x}(1-p)^{n-x}
\end{align}
The use of this likelihood in the calculation of the acceptance probability will construct a Markov chain that converges on the posterior distributions for $\beta_{0}$ and $\beta_{1}$.
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/MCMC_Chain}
\caption{Convergence of the Markov Chain for $B_{0}$, following the initial burn in period}
\end{figure}
For a large class of statistical models, the likelihood is either prohibitively expensive to compute or intractable to calculate. This arises often in complex systems where stochastic processes are involved and as a result, methods such as MCMC cannot be used. An alternative method of approximating the posterior distribution is required for these problems, known as \textit{likelihood free inference}.
\subsection{Likelihood Free Inference}
The likelihood in a statistical model is a function of the parameters given the data, $f(\theta|x)$. In simple models following a known distribution this is easily calculated. However, in complex models the integral often has no closed form solution allowing it to be evaluated in a finite number of operations. An example of this is the \textit{g and k distribution}. \\
The g-and-k distribution is known as a quantile distribution, defined in terms of its inverse cumulative distribution function. It has five parameters - $\theta = \{a,b,c,g,k\}$, and its inverse cumulative distribution function is given by (Drovandi, Pettitt, 2011):
\begin{align}
Q^{gk} (z(p);\theta) = a+b\left(1+c\frac{1-\exp(-gz(p))}{1+\exp(-gz(p))}\right)\left(1+z(p)^{2}\right)^{k}z(p)
\end{align}
For a quantile distribution such as this, the likelihood cannot be calculated analytically, only numerically. In practice, simulating from the distribution to compute the likelihood is much more straightforward than the numerical calculation. We draw from the distribution by simulating values for substitution into the above function. This idea is the basis of likelihood free methods - the acceptance or rejection of samples in a simulation based model. There is ongoing development in these methods due to the advent of big data and the use of simulation models to evaluate parameters. Two such popular methods are known as \textit{Synthetic Likelihood} and \textit{Approximate Bayesian Computation}.
\subsubsection{Synthetic Likelihood}
Bayesian Synthetic Likelihood uses a multivariate normal approximation with $n$, the number of replicated model simulations, as a single tuning parameter (Price et al, 2018). In place of the likelihood of the summary statistic it uses:
\begin{align}
p_{A,n}(S_{y}|\theta) = \mathcal{N}(s_{y}; \mu_{n}(\theta), \Sigma_{n}(\theta))
\end{align}
where $s_{y}$ is a simulated summary statistic and $\mu_{n}(\theta)$ is a known data point for the parameter $\theta$. \\
An alternative form proposed by Wood (2010) uses an auxiliary likelihood based on a multivariate normal approximation. Auxiliary parameters $\mu(\theta)$ and $\Sigma(\theta)$ are used, where $\mu \in \mathbb{R}^{d}$ and $\Sigma$ is a $d \times d$ covariance matrix of a multivariate normal distribution. These parameters are unknown, but are generally simulated from the model based on $\theta$. The estimated auxiliary function is given by Price et al, (2018) as:
\begin{align}
&\mathcal{N}(s_{y}; \mu_{n}(\theta), \Sigma_{n}(\theta)),\text{where} \\
&\mu_{n}(\theta) = \frac{1}{n} \sum_{i=1}^{n}s_{i}, \\
&\Sigma_{n}(\theta) = \frac{1}{n-1}\sum_{i=1}^{n}(s_{i}-\mu_{n}(\theta))(s_{i}-\mu_{n}(\theta))^{T}
\end{align}
Bayesian synthetic likelihood arises when this auxiliary likelihood is combined with a prior distribution on the parameter (Price et al, 2018). Following Drovandi, Pettitt, and Lee (2015), BSL samples from the following target:
\begin{align}
p_{A,n}(\theta|s_{y}) &\propto p_{A,n}(s_{y}|\theta)p(\theta), \text{where} \\
p_{A,n}(s_{y}|\theta) &= \int_{S^{n}}\mathcal{N}(s_{y};\mu_{n}(\theta),\Sigma_{n}(\theta))\prod_{i=1}^{n}p(s_{i}|\theta)ds_{1:n}
\end{align}
This produces an unbiased estimate of $p_{A,n}(s_{y}|\theta)$. The ideal BSL target will be achieved as $n \rightarrow \infty$ (Price et al, 2018).
\subsubsection{Approximate Likelihood by Simulation}
In comparison, ABC non-parametrically approximates the likelihood of the summary statistic as:
\begin{align}
p_{\epsilon,n}(s_{y}|\theta) = \frac{1}{n} \sum_{i=1}^{n}K_{\epsilon}(p(s_{y},s_{i}))
\end{align}
$p(s_{y},s_{i})$ measures the distance between the observed and simulated data with some distance metric. Often this is chosen as the Euclidean distance, $\sum_{i=1}^{n}(s_{y} - s_{i})^{2}$. As with BSL, the ABC framework will converge on the posterior distribution as $n \rightarrow \infty$.
\subsection{ABC Overview}
ABC aims to approximate a posterior distribution without the existence of the likelihood function $P(y|\theta)$. In essence this is achieved by simulating data with a set of prior parameters $\theta^{'}$. The simulated data is then compared with the observed data in some capacity - either in totality or via a set of summary statistics. If the simulated data is deemed close enough to the observed data (using a defined distance measure), the set of sampled prior parameters belongs to the approximated posterior distribution $P(\theta | d(y^{*}, y) \leq \epsilon)$. Formally this can be denoted as
\begin{align}
p(\theta|x^{*}) &= \frac{f(x^{*}|\theta)\pi(\theta)}{p(x^{*})} \\
\approx p_{\epsilon}(\theta|x^{*}) &= \frac{\int f(x|\theta)\pi (\theta)\mathbbm{1}_{\Delta(x,x^{*})\leq \epsilon}dx}{p(x^{*})},
\end{align}
where $\mathbbm{1}_{\Delta(x,x^{*})\leq \epsilon}$ denotes the set of sampled points where the distance measure meets the epsilon threshold. \\
While ABC algorithms are well grounded in mathematical theory, they make a number of assumptions and approximations. These need to be carefully assessed before considering the use of ABC for a given model.
As $\epsilon \rightarrow \infty$ and $N \rightarrow \infty$, $\theta_{sim} = \theta$. Practically, we need to set $\epsilon \neq 0$ to approximate the posterior in a reasonable amount of time. With a high dimensional parameter space, the probability of simulating prior parameters equal to that of the posterior is extremely small. As $\epsilon$ increases, the posterior distribution shifts more towards the prior. A key component of ABC is choosing $\epsilon$ such that the posterior is calculated both accurately and within a reasonable amount of time. One such approach is to run the algorithm a large number of times and consider the top $k\%$ of the sampled parameters as the acceptance area. Another is to run the algorithm multiple times until a desired $k\%$ of $N$ is attained. \\
A second potential issue is in the use of summary statistics. In most cases the complete dataset is high in dimensionality. When comparing the observed and simulated data, most samples will be rejected and the algorithm will need to be run for an impractical amount of time. If the data is reduced to a set of summary statistics such that $dim(s) << dim(y^{*})$, this curse of dimensionality is avoided. However, a poor choice of summary statistics will result in a biased posterior that is not truly representative. Additionally, the credible intervals will be inflated due to a loss of information (``Approximate Bayesian computation," n.d.). This can be resolved by choosing a \textit{sufficient statistic}, which completely explains the original dataset using a smaller subset of statistics.
\subsubsection{Summary Statistics}
When reducing the dimensionality of a sample with a summary statistic, care must be taken to choose summary statistics that produce an unbiased approximation of the posterior distribution. R.A. Fisher (1922) defined a summary statistic as \textit{sufficient} if ``no other statistic which can be calculated from the same sample provides any additional information as to the value of the parameter to be estimated". If the summary statistic is a sufficient statistic, the posterior distribution will be equivalent to the posterior distribution computed with the full dataset, given by:
\begin{align}
f(y^{*}|\theta) \propto f(s(y^{*})|\theta),
\end{align}
where $s(y^{*})$ is a sufficient statistic for the data $y^{*}$. \\
Let $D=\{X_{1},...,X_{n}\}$ be a random sample from a probability distribution with some parameter $\theta$. A summary statistic $S(D)$ is sufficient for a parameter $\theta$ if the conditional probability distribution of the full data $D$ given $S(D);\theta$, does not depend on the parameter $\theta$ (Aeschbacher, Beaumont \& Futschik, 2012).
\begin{align}
\pi(D=d|S(D) = s,\theta) = \pi(D=d|S(D)=s)
\end{align}
In the absence of a sufficient statistic, which is often the case in a complex system, a tradeoff must be found between a loss of information and dimensionality reduction. The incorrect choice of summary statistics will result in a biased posterior which is not representative of the data. Methods exist to find summary statistics which contain the maximum amount of information about the parameters of interest. One such method is \textit{Partial least squares regression}. \\
Partial least squares (PLS) is a projection technique which ``aims to produce linear combinations of covariates which have high covariance with responses and are uncorrelated with each other" (Sisson et al, 2018). In the context of ABC, the covariates are denoted as $z_{1},...,z_{k}$, and the responses as $\theta_{1},...\theta_{p}$. The \textit{i}$^{th}$ PLS component $u_{i} = \alpha_{i}^{T} z$ maximises
\begin{align}
\sum_{j = 1}^{p}\text{Cov}(u_{i},\theta_{j})^{2},
\end{align}
subject to Cov($u_{i},u_{j}$) = 0 for $j < 1$ and a normalisation constraint on $
\alpha_{i}$ such that $\alpha_{i}^{T}\alpha_{i}$ = 1 (Sisson et al, 2018). The resulting components can be viewed as a lower dimensional set of statistics than the original data, and can hence be used in ABC in place of the original data for more efficient inference. An advantage of projection methods such as PLS is in their interpretability. It is easy to understand how maximising the variance of dimensions in a dataset $D$ into a subset $z$ will often result in a sufficient representation of $D$. \\
Another set of techniques to reduce the dimensionality of the data are known as \textit{subset selection methods}. Joyce and Marjoram (2008) propose a step-wise selection approach, where candidate summary statistics are added and/or removed to a subset, and the effect evaluated on the ABC posterior. The rationale behind this is if the set of statistics are sufficient, adding further such statistics will not affect the likelihood of the resulting posterior; however removing statistics will. From Joyce and Marjoram (2008), the technique deems a change to the subset as significant if:
\begin{equation}
\left|\frac{\hat{\pi}_{ABC}(\theta|S^{'}(y_{obs}))}{\hat{\pi}_{ABC}(\theta|S(y_{obs}))}-1 \right|>T(\theta),
\end{equation}
where $\hat{\pi}_{ABC}$ is an estimated posterior density based on the output from rejection ABC (Sisson et al, 2018). \\
There exist many other techniques to reduce a large dataset to a smaller set of summary statistics, in addition to ongoing research into new techniques. Each of them have strengths and weaknesses, and therefore should be carefully evaluated when using them in a particular model.
\subsection{Rejection ABC}
The simplest ABC algorithm, rejection sampling, is a straightforward procedure of simulating data with some given set of parameters and evaluating the data against a set of observed data. The algorithm proceeds as follows:
\begin{algorithm}[H]\caption{ABC Rejection}\label{abc-rej}
\begin{algorithmic}[1]
\State Compute a summary statistic $s(y)$ from the observed data
\State Define a distance measure $d(s(y), s(\hat{y}))$
\State Define an distance threshold $\epsilon$
\For {$i=1$ to $N$}
\State Sample a set of parameters from the prior distribution $\theta^{*} \sim \pi(\theta^{*})$
\State Simulate a dataset given the sampled parameters: $x^{*} \sim \pi(x^{*}|\theta^{*})$
\State Compute a summary statistic $s(\hat{y})$ for the simulated data
\State If $d(s(y), s(\hat{y})) < \epsilon$, keep the parameters $\theta^{*}$ as a sample from $\pi(\theta | x)$, otherwise reject
\EndFor
\State Approximate the posterior distribution $\theta$ from the distribution of accepted parameter values $\hat{\theta}$
\end{algorithmic}
\end{algorithm}
Direct evaluation of the likelihood is not carried out in the above algorithm. For almost any model where data is observed, data can be simulated, and there exists a set of parameter values to be inferred, rejection ABC can be used as a straightforward approach to approximate the posterior distribution. This is achieved by noting that the acceptance probability of a given parameter is proportional to the probability of generating the observed data $y_{obs}$, under the model $p(y|\theta)$ for a fixed parameter vector $\theta$. For a fixed $\theta$, if we generate a dataset from the model $y\sim p(y|\theta)$, then the probability of generating our observed dataset exactly, so that $y=y_{obs}$, is equal to $p(y_{obs}|\theta)$ (Sisson, 2018).
\subsubsection{Regression Adjustment in Rejection ABC}
Regression adjustment is a technique commonly used in Bayesian methods where sampling techniques are proposed to account for discrepancies between simulated and observed summary statistics (Blum, 2017). In the context of ABC, the set of posterior parameters following the simulation are adjusted using weights proportional to the distances between the simulated and summary statistics. This approach gives weighting to parameters which give simulated data closer to the observed data. The parameter values are adjusted by fitting a regression model of the relationship between the posterior parameters and the simulated data (Francious, 2010):
\begin{align}
\theta_{s} = \alpha + \beta(y-y_{s}) + \mathcal{E}_{s}, s = 1,...,N_{\epsilon}
\end{align}
The linear model is fit as above, and the parameters are corrected as follows (Francious, 2010):
\begin{align}
\theta^{*}_{s} = \hat{\alpha} + \mathcal{E}_{s} = \theta_{s} = \hat{\beta}(y-y_{s})
\end{align}
This method can result in significantly improved posterior estimates for rejection ABC. When $y$ is high in dimensionality, non-linear regression adjustment is often favoured, through a number of techniques such as GAM's, ridge regression and feed-forward neural networks (Francious, 2010).
\subsection{ABC-SMC}
A limitation of the rejection algorithm is a low acceptance rate when the prior is very different to the posterior. Beaumont et al (2009) proposed a particle filtering based method known as ABC-SMC. This algorithm alleviates the issue of low acceptance rates by avoiding low rejection rates of the sampling region and gradually evolving towards the target posterior through population filters. In high dimensional data from a complex system this results in a large gain in efficiency. The algorithm proceeds as follows: \\
\begin{algorithm}[H]\caption{ABC-SMC (Beaumont et al, 2009)}\label{abc-smc}
\begin{algorithmic}[1]
\State Initialize threshold schedule $\epsilon_{1} > ... > \epsilon_{T}$
\State Set $t = 1$
\For {$i=1$ to $N$}
\State Simulate $\theta_{i}^{(1)} \sim p(\theta)$ and $x \sim p(x|\theta_{i}^{(1)})$ until $p(x,x_{obs}) < \epsilon_{1}$
\State Set $w_{i} = 1/N$
\EndFor
\For {$t=2$ to $T$}
\For {$i = 1,...,N$}
\State Repeat:
\Indent
\State Pick $\theta_{i}^{*}$ from the $\theta_{j}^{(t-1)}$'s with probabilities $v_{j}^{(t-1)}$,
\State Draw $\theta_{i}^{(t)} \sim K_{\theta,t}(\theta_{i}^{(t)}|\theta_{i}^{*}$ and $x \sim p(x|\theta_{i}^{(t)});$
\EndIndent
\State until $p(x,x_{obs}) < \epsilon_{t}$
\State Compute new weights as
\State \begin{align}
w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}
\end{align}
\State Normalise $w_{i}^{(t)}$ over $i = 1,...,N$
\EndFor
\EndFor
\end{algorithmic}
\end{algorithm}
$K_{\theta,t}$ in step 14 of the algorithm is chosen as a conditional density that serves as a transition kernel to “move” sampled parameters and then appropriately weight accepted values. In contexts of real-valued parameters, for example, $K_{\theta,t}(\theta|\theta^{*})$ might be taken as a multivariate normal or $t$ density centred at or near $\theta^{*}$, and whose scales may decrease as $t$ increases. (Bonassi \& West, 2015). Kernel choice is discussed further in Section 5.5.1.\\
The algorithm constructs $T$ intermediary distributions with increasingly small tolerance schedules. The tolerances $\epsilon$ are chosen such that gradual evolution towards the target posterior is achieved. The algorithm continues until $N$ particles have been accepted in population $T$. The final set of particles is an approximation of the posterior distribution. The inclusion of a weight calculation for each particle in a population enables the sampling from population $t-1$ with probabilities equal to the normalised weights. These weights are calculated such that particles further from the population mean are sampled and refined. \\
The ABC-SMC algorithm addresses the main drawback of rejection ABC in the inefficiency of sampling parameters with a high distance from the posterior, and hence rejecting a large number of samples. The repeated sampling from posterior approximations results in a distribution closer to the posterior distribution (Beaumont, 2010). One drawback exists in the decreasing epsilon tolerance. If the quantile of the distances from which to reduce epsilon is appropriately chosen, the number of accepted samples in each population will not decrease significantly as $\epsilon$ decreases. However, setting this quantile too high will reduce $\epsilon$ such that a larger proportion of samples are rejected, eliminating a key advantage of the SMC approach. This can be addressed by either calculating $\epsilon$ at each population using an adaptive method (described in Section 5.5.3), or including conditional density estimation for the final population sample. \\
An extension to the original SMC algorithm was proposed by Bonassi \& West (2015). A joint kernel $K_{t}(x,\theta|x^{*},\theta^{*})$ is used on the joint distribution of accepted values $(x,\theta)$ to raise the importance of proposals where the simulated data $x_{i}$ is close to $x_{obs}$. This addition is known as ABC-SMC with Adaptive Weights. The algorithm proceeds as follows:
\begin{algorithm}[H]\caption{ABC-SMC with Adaptive Weights (Bonassi \& West, 2015)}\label{abc-smc}
\begin{algorithmic}[1]
\State Initialize threshold schedule $\epsilon_{1} > ... > \epsilon_{T}$
\State Set $t = 1$
\For {$i=1$ to $N$}
\State Simulate $\theta_{i}^{(1)} \sim p(\theta)$ and $x \sim p(x|\theta_{i}^{(1)})$ until $p(x,x_{obs}) < \epsilon_{1}$
\State Set $w_{i} = 1/N$
\EndFor
\For {$t=2$ to $T$}
\State Compute data based weight $v_{i}^{(t-1)} \propto w_{i}^{(t-1)}K_{x,t}(x_{obs}|x_{i}^{(t-1)})$
\State Normalise weights $v_{i}^{(t-1)}$ over $i = 1,...,N$
\For {$i=1$ to $N$}
\State Repeat until $p(x,x_{obs}) < \epsilon_{t}$:
\Indent
\State Pick $\theta_{i}^{*}$ from the $\theta_{j}^{(t-1)}$'s with probabilities $v_{j}^{(t-1)}$,
\State Draw $\theta_{i}^{(t)} \sim K_{\theta,t}(\theta_{i}^{(t)}|\theta_{i}^{*}$ and $x \sim p(x|\theta_{i}^{(t)});$
\EndIndent
\State Compute new weights as
\State \begin{align}
w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}
\end{align}
\EndFor
\State Normalise $w_{i}^{(t)}$ over $i = 1,...,N$
\EndFor
\end{algorithmic}
\end{algorithm}
The added step of updating the data based weights adds computation time, although this is usually negligible in comparison to the simulation time (Bonassi \& West, 2015). The addition of adaptive weights increases the proportion of accepted samples in comparison to Algorithm 2, and hence decreases the overall number of simulations. As the simulations tend to dominate computation time, ABC-SMC with Adaptive Weights tends to be more computationally efficient than ABC-SMC.
\subsubsection{Choice of Pertubation Kernel in ABC-SMC}
From each time step $t = 2,...T$, the weights at population $t$ are calculated using a pertubation kernel:
\begin{align}
w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})},
\end{align}
where $p(\theta_{i}^{(t)})$ is the probability of the sampled parameter given the prior, and \\
$K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})$ is the probability of the sampled parameter given the previous population. \\
A balance needs to be obtained in this kernel such that the parameter space is sufficiently explored, but not so extensively to cause a low acceptance rate (Filippi, 2016). The properties of an optimal kernel are derived from sequential importance sampling theory. Similarity is assessed between two joint distributions $(\theta^{(t-1)},\theta^{(t)})$ where $\theta^{(t-1)} \sim p_{\epsilon_{t-1}}$. $\theta^{(t)}$ is constructed by pertubing $\theta^{(t-1)}$ and accepting it according to some threshold $\epsilon_{t}$, which is reduced at each time step. Resemblance between the two distributions is the first criteria of an optimal kernel. An optimisation problem is solved to balance sufficiently exploring the parameter space while maintaining a high acceptance rate (Filippi, 2016). Filippi (2016) gives this as the solution to:
\begin{align}
& 1.\quad q_{\epsilon_{t-1},\epsilon_{t}}(\theta^{(t-1)},\theta^{(t)}|x) \\
& = \frac{p_{\epsilon_{t-1}}(\theta^{(t-1)}|x)K_{t}(\theta^{(t)}|\theta^{(t-1)})\int f(x|\theta^{(t)})\mathbbm{1}(\Delta(x^{*},x)\leq \epsilon_{t})dx}{\alpha(K_{t},\epsilon_{t-1},\epsilon_{t},x)} \\
\text{and} \\
& 2. \quad q^{*}_{\epsilon_{t-1},\epsilon_{t}}(\theta ^{(t-1)},\theta^{(t)}|x) = p_{\epsilon_{t-1}}(\theta^{(t-1)}|x)p_{\epsilon_{t}}(\theta^{(t)}|x)
\end{align}
This resemblance is in terms of the Kullback - Leibler divergence (Filippi et al, 2013).
\begin{align}
& KL(q_{\epsilon_{t-1},\epsilon_{t}};q^{*}_{\epsilon_{t-1},\epsilon_{t}}) = -Q(K_{t},\epsilon_{t-1},\epsilon_{t},x) + \log \alpha (K_{t},\epsilon_{t-1},\epsilon_{t},x) + C(\epsilon_{t-1},\epsilon_{t},x) \\
\text{where} \\
& Q(K_{t},\epsilon_{t-1},\epsilon_{t},x) = \iint p_{\epsilon_{t-1}}(\theta^{(t-1)}|x) p_{\epsilon_{t}}(\theta^{(t)}|x) \log K_{t}(\theta^{(t)}|\theta^{(t-1)})d\theta^{(t-1)}d\theta^{(t)}
\end{align}
There are multiple choices of a kernel to achieve this balance. As with the selection of summary statistics, each should be carefully considered according to the model to be developed. When using ABC to validate and infer parameters of a complex system, it is vital to optimise the algorithm such that the kernel is not sampling from areas of the parameter space which give rise to output far from that of the observed data. On the other hand, a local pertubation kernel will not move the particles sufficiently and therefore may fail to find the true posterior. \\
The joint proposal distribution in the ABC-SMC algorithm corresponds to sampling a particle from the previous population $t-1$ and pertubing it to obtain a new particle (Filippi et al, 2013). The process typically proceeds as follows:
\begin{enumerate}
\item Sample a particle $\theta_{i}^{(t-1)}$ from the previous population $t-1$ using probabilities $w^{(t-1)}$
\item Pertube this particle to obtain $\theta_{i}^{(t)}$
\item Calculate the weight for the particle as the sum of the previous population weights multiplied by a kernel, comparing the newly pertubed particle to each particle in the previous population
\end{enumerate}
\subsubsection{Component wise pertubation kernel}
From Filippi et al (2013), for each element in the parameter vector $\theta = \{\theta_{1},...,\theta_{n}\}$, each individual component $1 \leq j \leq d$ of the vector is pertubed independently using a Gaussian distributed parameterised by mean $\theta_{j}$ and variance $\sigma^{2}_{j}$. Filippi et al (2013) shows this with the form:
\begin{align}
K_{t}(\theta^{(t)}|\theta^{(t-1)}) = \prod_{j=1}^{d} \frac{1}{\sqrt{2 \pi \sigma_{j}^{(t)}}}\exp{\{ -\frac{(\theta_{j}^{(t)}-\theta_{j}^{(t-1)})^{2}}{2 \sigma_{j}^{(t)2}} \}}
\end{align}
\subsubsection{Multivariate normal pertubation kernel}
It is often the case in models with a large number of parameters that correlation exists between some of the parameters. When using a component-wise pertubation kernel, this can lead to an inadequate reflection of the true posterior (Filippi et al, 2013). We can take into account this correlation by using a multivariate Gaussian distribution, which constructs a covariance matrix for the current population $\Sigma^{(t)}$. Again, using the Kullback-Leibler divergence allows for the calculation of an optimal covariance matrix. From Filippi et al (2013), this yields:
\begin{align}
&\Sigma^{(t)} \approx \sum_{i=1}^{N} \sum_{k=1}^{N_{0}}\omega^{(i,t-1)}\tilde{\omega}^{(k)}(\tilde{\theta}^{(k)}-\theta^{(i,t-1)})(\tilde{\theta}^{(k)}-\theta^{(i,t-1)})^{T}, \text{where} \\
&\{\tilde{\theta}^{(k)}\}_{1 \leq k \leq N_{0}} = \{\theta^{(i,t-1)} s.t \Delta (x^{*},x^{(i,t-1)}) \leq \epsilon_{t}, 1 \leq i \leq N \}
\end{align}
In practice this kernel is a popular choice in sequential sampling models, although many other options exist. Consider a set of parameters which are correlated but in a non-linear way. In this case we may wish to construct a covariance matrix for each particle to take into account the non-linear structure. There are multiple ways to do this, however for the purposes of simplicity we will restrict ourselves to using a Gaussian pertubation kernel without taking into account local correlation. For more information about local pertubation kernels, see Filippi et al (2013). \\
Consider a model where the parameter kernel $w_{i}$ and data based kernel $v_{i}$ (Step 8 of Algorithm 3) are both chosen as a multivariate Gaussian kernel. The data based and parameters weights respectively are updated as:
\begingroup
\large
\begin{align}
&f_{\mathbf{x}}(x_{1},...,x_{k}) = \frac{\exp(-\frac{1}{2}(\mathbf{x-\boldsymbol{\mu}})^{T}\boldsymbol{\Sigma}^{-1}(\mathbf{x-\boldsymbol{\mu}}))}{\sqrt{(2 \pi)^{k}|\boldsymbol{\Sigma}}|},
\end{align}
\endgroup
where $\mathbf{x}$ is a vector of proposed values, $\boldsymbol{\mu}$ is a vector of means of the previous population, and $\boldsymbol{\Sigma}$ is a positive-definite, symmetric covariance matrix.\\
As mentioned previously, this kernel will both explore the parameter space while maintaining a high acceptance rate. Each particle is sampled from the previous population and pertubed using a normal distribution. In the case that the chosen particle is resampled such that the simulated data is closer to the observed data, it will be accepted to the current population. If the observed data is further away and the parameter rejected, the particle from the previous population is `thrown out' and a new particle is resampled. The result is both a reduction in variance and convergence on the posterior mean, with the decreasing epsilon threshold acting to move the particles closer to the posterior. \\
This is demonstrated using a simple example of inferring the mean of a Gaussian distribution. The choice of pertubation kernel here involves finding the probability of the proposed $\mu$ given the prior mean and standard deviation, and dividing this by the probability of the proposed $\mu$ given the mean and standard deviation of the previous population, multiplied by the weights of the previous population. The prior mean is defined as $\theta \sim N(0,10)$. The weights are updated as:
\begin{align}
w_{i}^{(t)} &\propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}, \text{where} \\
p(\theta_{i}^{(t)}) &= f(\mu_{i}^{'(t)}|\mu_{\theta},\sigma_{\theta}), \text{and} \\
K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)}) &= f(\mu_{i}^{'(t)}|\mu^{t-1},\sigma^{t-1})
\end{align}
$p(\theta_{i}^{(t)})$ is the probability of the proposed theta given the prior mean and variance, and \\
$K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})$ is a kernel function which sums the probabilities of the proposed $\theta$ given each particle in the previous population and the variance of the previous population. The function $f$ in the these kernels is the probability density function of a normal distribution. \\
\begin{table}[H]
\centering
\begin{tabular}{cccccc}
\hline
Running Time & Known $\mu$ & Initial Epsilon & Distance Measure & Population Size \\
\hline
201 seconds & 0.086 & 1 & $\frac{1}{N} \times \text{abs}(y^{*}-y)$ & 2500\\
\hline
\end{tabular}
\end{table}
By the seventh population the algorithm has converged on the true parameter. Each subsequent population reduces the variance.
\begin{table}[H]
\centering
\begin{tabular}{rrrrrr}
\hline
& Iteration & $\mu$ & Epsilon & Mean Distance & Mean Loops Per N \\
\hline
1 & 1 & -0.022 & 1.000 & 0.506 & 12.899 \\
2 & 7 & -0.033 & 0.151 & 0.074 & 2.172 \\
3 & 14 & -0.036 & 0.019 & 0.009 & 8.650 \\
4 & 20 & -0.034 & 0.003 & 0.002 & 48.249 \\
\hline
\end{tabular}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/"Normal_ABC-SMC".pdf}
\caption{Progression in the posterior mean with a known $\mu$ = -0.035.}
\end{figure}
\subsubsection{Choice of Epsilon Threshold}
The approach to reducing epsilon at each population is another detail of the ABC-SMC algorithm which impacts on efficiency. Often, $\epsilon$ at each population is adjusted using a quantile based approach (Beaumont et al, 2009). For each corresponding distance vector at population $t-1$, adjust $\epsilon$ by some chosen quantile $\alpha$.
\begin{align}
\alpha\{\Delta (x^{(i,t-1)},x^{*})\}_{1 \leq i \leq N}
\end{align}
Both the choice of initial epsilon and alpha will determine the balance between computational and statistical efficiency. As mentioned previously, $\epsilon = 0$ will produce an exact posterior, but in a complex system with multiple dimensions will run for an impractical length of time. \\
One drawback to the quantile based method is that for a large alpha, the algorithm may fail to converge on the posterior. A remedy of this is to use a threshold-acceptance rate curve (Filippi, 2016). This is achieved with the following algorithm:
\begin{algorithm}[H]\caption{Adaptive method for epsilon threshold choice (S. Filippi, 2016)}\label{adaptive-epsilon}
\begin{algorithmic}[1]
\State For each population $t$,
\Indent
\State Generate a population of pertubed particles
\State Fit a Gaussian mixture model to the pertubed population
\State Estimate \begin{align}
p_{t}(x) = \int q_{t}(\theta)f(x|\theta)d\theta
\end{align}
using the unscented transform independently for each Gaussian mixture
\State Estimate \begin{align}
\alpha_{t}(\epsilon) = \int p_{t}(x)\mathbbm{1}(\Delta(x,x^{*})\leq \epsilon)dx
\end{align}
\EndIndent
\end{algorithmic}
\end{algorithm}
\subsection{Parallelising ABC}
There are three methods of controlling the balance between computational speed and posterior accuracy in the ABC-SMC algorithm - the choice of epsilon in each population, the size of the populations, and the number of populations. If the model complexity is small or the computation time is not a concern, the epsilon array can be set to small values, with a large number of populations and a large number of particles in each population. For a complex system with multiple parameters and high dimensional data, the computation time of the algorithm increases exponentially. The two principal reasons for this are 1). The time to run the simulation with the prior parameters and 2). Looping until the epsilon threshold is reached for each sample of the current population. Adjusting the two settings mentioned above will help to reduce the computation time. \\
An additional measure is that of parallelisation. In the advent of big data there now exist several methods for conducting complex analysis on cluster computing systems. A cluster system comprises of two or more computers working together to perform tasks (ESDS, 2014). They are particularly suited to complex computational tasks which can be divided into many smaller tasks for each computer (node). For the analysis of large datasets it is important to design statistical algorithms which are well suited to this infrastructure. In some cases this is straightforward. In the rejection ABC algorithm, the number of desired loops can be divided between each node and the results merged at the end of the computation. With more complex ABC algorithms with dependencies amongst steps this is less clear. In each population of ABC-SMC there is a dependence on the distance, weight and parameter values from the previous population. Simulations within the current population $t$ can be executed in parallel, and the results sent back to the master node for evaluation until the population threshold $N$ is reached. As the simulation time dominates when using ABC to infer for an ABM, this method of parallelisation can result in a significant decrease in computation time.
\subsection{ABC Inference of a Gaussian Distribution}
Two ABC models were developed to infer the mean and standard deviation of a normal distribution - Rejection ABC and ABC-SMC with Adaptive Weights. The true mean was taken to be approximately 4. A Normal prior $\theta^{1}$ was set for the mean and a Gamma prior $\theta^{2}$ for the standard deviation.
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
True Mean & True SD & Mean Prior $\theta^{1}$ & SD Prior $\theta^{2}$ \\
\midrule
4 & 1.5 & $\sim N(2,3)$ & $\sim Gamma(1,3)$ \\
\bottomrule
\end{tabular}
\caption{Normal Mean and SD Inference Model}
\end{table}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Iterations & $\epsilon$ & Acc Rate & Running Time & $\mu(\theta^{1})$ & $\sigma^{2}(\theta^{1})$ & $\mu(\theta^{2})$ & $\sigma^{2}(\theta^{2})$ \\
\midrule
30000 & 0.5 & 3.5\% & 25s & 3.973 & 0.124 & 1.46 & 0.121 \\
\bottomrule
\end{tabular}
\caption{Rejection ABC model}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/Rejection-Posterior}
\caption{Posterior Distributions of the Rejection ABC Model}
\end{figure}
Rejection ABC with a epsilon of $\epsilon = 0.5$ and $N = 30,000$ results in a high rejection rate of 96.5\%. This can be adjusted through a more informative prior, although in many cases this is not available. Another adjustment is in epsilon. If this is increased, more samples will be accepted with the tradeoff of a less accurate posterior. The acceptance rate of 3.5\% appears to give an accurate posterior.
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}cccc}
\toprule
Populations & Iterations & Epsilon & Running Time \\
\midrule
5 & [16139, 17518, 18857, 20232] & [1, 0.74, 0.56, 0.44, 0.35] & 117s \\
\bottomrule
\end{tabular}
\caption{ABC-SMC model}
\end{table}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
$\mu(\theta^{1})$ & $\sigma^{2}(\theta^{1})$ & $\mu(\theta^{2})$ & $\sigma^{2}(\theta^{2})$ \\
\midrule
4.006 & 0.07 & 1.50 & 0.099 \\
\bottomrule
\end{tabular}
\caption{ABC-SMC posterior estimates}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/SMC-Posterior}
\caption{Posterior Distributions of the ABC-SMC Model}
\end{figure}
The ABC-SMC model has a longer running time, but reduces the variance of both posterior estimates $\mu$ and $\sigma$. The acceptance rate at the final population is 50\%, which is significantly higher than the rejection model. The increase in computation time is due to the multiple populations and increased time spent computing weights. For a complex model, the reduced time spent simulating data will outweigh this. The posterior mean estimates are slightly closer to the true mean.
\subsection{Validation of an ABM using ABC}
A challenge in designing an ABM to represent a complex system is representing the system in an accurate manner. Where there is observed data for a system, an ABM can be said to be validated against such a system if its output (simulated data) is close to the system's observed data. ABC is a suitable approach for this validation. If an ABM is designed with control from a set of parameters, ABC can be used to run the simulation with a set of prior parameters. If the ABC is modelled correctly, it will converge on a set of parameters which will produce simulated data close to the observed data from the system that the ABM is modelled from. In comparison to the `brute force' method described in Section 3.1, significantly less time is spent simulating data using parameters far from the true parameters of the system. Further models will focus on the use of ABC algorithms to infer parameters for an Agent Based Model. While the final pedestrian model is relatively simple in nature, it serves as a basis for the addition of larger amounts of data, a higher dimension of parameters, and a more complex ABM environment.
\section{ABC Inference of an ABM}
A simple stochastic model was created in NetLogo to demonstrate the use of ABC within an ABM. The simulation consists of a stochastic process with seven nodes arranged in a fork pattern (described in Section 4). This is taken to be a pedestrian network where nodes represent intersections and connections between the nodes are paths. All agents begin at the tail node 6 and travel to a connected node at each step. Observed data is first collected by setting all turning parameters to $\tfrac{1}{3}$ with the exception of arriving at Node 0 from 3. The probability of travelling vertically to 0 is set to 0.9. When this direction is taken, the action is denoted as $P(3^{\leftarrow 5}_{\rightarrow 0})$. That is, when the agent has travelled from 5 to 3, it then travels to 0.
\begin{figure}[H]
\centering
\includegraphics[width=5cm]{Images/ToyGrid}
\caption{Directed graph of the Toy CBD model}
\end{figure}
Observed data was taken as an average of counts at Node 0 over ten runs. The known parameters are
\begin{align}
N(\text{Pedestrians}) = 15 \\
P(3^{\leftarrow 5}_{\rightarrow 0}) = 0.9
\end{align}
In reality, the number of pedestrians in any given system is often not known. While the proportional differences between the node counts depends on the directional probabilities, the magnitude of the counts is dependent on the number of pedestrians in the system. The observed data was an average of the count at node zero over ten runs, calculated as $x$. The prior parameters are
\begin{align}
P(3^{\leftarrow 5}_{\rightarrow 0}) \sim Beta(2, 2) \\
N(\text{Pedestrians}) \sim Unif(5,20)
\end{align}
The Beta distribution is a family of continuous probability distributions defined over the interval [0,1]. It is characterised by two parameters $\alpha$ and $\beta$ which control the shape. The expected value and variance of the distribution are defined as
\begin{align}
E[X] = \frac{a}{a+b}, \quad Var[X] = \frac{ab}{(a+b)^{2}(a+b+1)}
\end{align}
It is commonly used as a prior in Bayesian statistics to describe the probability of an event. It is the conjugate prior probability distribution for the Bernoulli, Binomial, Negative Binomial and Geometric distributions. A flat prior can be defined as $Beta(1,1)$. In the following example a prior of $Beta(2,2)$ was used as a wide prior, assuming little knowledge about the true probability. The expected value and variance of the Beta prior is given as
\begin{align}
E[X] &= \frac{a}{a+b} = \frac{2}{4} = \frac{1}{2} \\
Var[X] &= \frac{ab}{(a+b)^{2}(a+b+1)} = \frac{4}{(4)^{2}(5)} = 0.05
\end{align}
\begin{figure}[H]
\centering
\includegraphics[width=7cm]{Images/Beta22}
\caption{The Beta(2,2) prior distribution for the Toy Model.}
\end{figure}
Both Rejection ABC and ABC-SMC were used to infer the Beta parameter. The following algorithms were used:
\begin{algorithm}[H]\caption{ABC Rejection - Toy Model}\label{abc-rej}
\begin{algorithmic}[1]
\State Compute $\frac{1}{n}\sum_{i = 1}^{10}y(100)$, where $y$ is the count at Node 0 after 100 simulation ticks
\State Define a Euclidean distance measure $d(s(y), s(\hat{y})) = (s(y) - s(\hat{y}))^{2}$
\State Define a Beta prior distribution $\theta$ as $P(3^{\leftarrow 5}_{\rightarrow 0}) \sim Beta(2, 2)$
\For {$i=1$ to $1000$}
\State Sample a parameter from the prior distribution $\theta$
\State Simulate a dataset given the sampled parameter: $y^{*} \sim \pi(y^{*}|\theta^{*})$
\State Compute a summary statistic $s(\hat{y})$ for the simulated data
\State Add $d(s(y), s(\hat{y}))$ and $\theta_{i}$ to the distances vector
\EndFor
\State Find $\hat{\theta}$ as the top 1\% of the distances vector by distance
\State Approximate the posterior distribution $\theta$ from the distribution of accepted parameter values $\hat{\theta}$
\end{algorithmic}
\end{algorithm}
\begin{algorithm}[H]\caption{ABC-SMC}\label{abc-smc}
\begin{algorithmic}[1]
\State Compute $\frac{1}{n}\sum_{i = 1}^{10}y(100)$, where $y$ is the count at Node 0 after 100 simulation ticks
\State Set $\epsilon_{1} = 20$ and $t = 1$
\State Define a Beta prior distribution $\theta$ as $P(3^{\leftarrow 5}_{\rightarrow 0}) \sim Beta(2, 2)$
\State Define a Euclidean distance measure $d(s(y), s(\hat{y})) = (s(y) - s(\hat{y}))^{2}$
\For {$i=1$ to $N$}
\State Simulate $\theta \sim p(\theta)$
\State Simulate $x \sim p(x|\theta)$ until $p(x,x_{obs}) < \epsilon_{1}$
\State Set $w_{i} = 1/N$
\EndFor
\For {$t=2$ to $T$}
\State Set $\epsilon_{t}$ as $0.75 \times \frac{1}{N} \sum_{i=1}^{N}t_{i}$
\State Calculate the weighted mean of the previous parameters as $\theta = \sum_{i=1}^{N}\theta^{(1)}_{i} w_{i}$
\For {$i=1$ to $N$}
\State Repeat until $p(x,x_{obs}) < \epsilon_{t}$:
\Indent
\State Pick $\theta$ from the $\theta^{(t-1)}$'s with probabilities $v_{j}^{(t-1)}$,
\State Simulate $x \sim p(x|\theta)$
\EndIndent
\State Compute new weights as
\State \begin{align}
w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}
\end{align}
\EndFor
\State Normalise $w_{i}^{(t)}$ over $i = 1,...,N$
\EndFor
\end{algorithmic}
\end{algorithm}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Prior $g(\theta)$ & Observed Data & Summary Statistic \\
\midrule
$\!\begin{aligned}[t]
&\theta = Beta(2,2) \\
\end{aligned}$ & $\{C_{i}(0)\}, i = 1,...,10$ & $\{\frac{1}{10}\sum_{i=1}^{10}C_{i}(0)\}$ \\
\bottomrule
\end{tabular}
\caption{Setup of the first Toy CBD model}
\end{table}
The NetLogo simulation was controlled using the pyNetLogo library in Python. The Rejection ABC algorithm was programmed in Python.
\begin{figure}[H]
\centering
\includegraphics[width=10cm]{Images/ABC-Python}
\caption{Posterior distribution (green) after 1000 simulations. The Prior Beta distribution is shown in orange.}
\end{figure}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Simulations & Accepted Samples & Mean($\hat{\theta}$) & Running Time (mins) \\
\midrule
10000 & 1\% & 0.92 & 32.2 \\
\bottomrule
\end{tabular}
\caption{Results of ABC simulation}
\end{table}
The posterior distribution appears to converge on the true parameter as epsilon decreases. However the running time is long, and 99\% of samples are rejected. The same model was run using ABC-SMC to assess the difference in efficiency. The settings of the model are
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Populations & Population Size & Initial Epsilon\\
\midrule
5 & 250 & 10\\
\bottomrule
\end{tabular}
\caption{ABC-SMC Settings, Toy Model}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/"Model4".pdf}
\caption[Progression in the posterior mean with a known $\mu$ = 0.9.]{Progression in the posterior mean with a known $\mu$ = 0.9. The true parameter is shown in green, the posterior mean in black, and the posterior median by a dashed line.}
\end{figure}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Simulations & Accepted Samples & Mean($\hat{\theta}$) & Running Time (mins) \\
\midrule
1542 & 250 & 0.848 & 10.7\\
\bottomrule
\end{tabular}
\caption{Results of ABC simulation}
\end{table}
Here the acceptance rate is much higher (6\%). The algorithm converges on the posterior much more quickly than the rejection algorithm. \\
\textbf{Extended Network Model}\\
This model can be extended to inferring parameters for a larger set of nodes. For nodes with multiple possible directions, the Dirichlet distribution can be used as a multivariate generalisation of the Beta prior. The observed data can also be extended to multiple dimensions, where counts are observed at each node in the network. Consider a network with $N$ nodes, each with $K$ edges extending from the node, and $D$ observed counts. The model can be setup as:
\begin{align}
\theta &= \theta_{1},...,\theta_{N}, \text{where}\;\theta_{i} \sim Dirichlet(\alpha_{1},...,\alpha_{K}) \\
Y &= \{C_{i}\}, i = 1,..,N
\end{align}
This model will serve as a framework for modelling the movement of pedestrians in such a network. \\
\textbf{Pedestrian Model Parameters}\\
An intuitive way to describe a pedestrian making a decision for a direction to travel at each intersection is that of a Categorical distribution. Given $N$ possible directions, there is a set of probabilities $P$ for travelling in each direction. The Categorical distribution is a generalisation of the Bernoulli distribution with probability $p$ of outcome 1 and $q = 1-p$ of outcome 2. The generalisation extends the model to $K$ possible categories. The probability of each category or outcome is specified with $p_{1},...,p_{k}$ (Categorical distribution, n.d.).\\
In Bayesian statistics, the Dirichlet distribution is the conjugate prior for the Categorical distribution. In a model where each data point follows a Categorical distribution with an unknown parameter vector \textit{p}, this is treated as a random variable $X$ with a prior Dirichlet distribution. The posterior distribution of the parameter is also Dirichlet. Knowledge of a parameter can be updated by incorporating observations one at a time, following a formally defined mathematical process. The expected value of the posterior distribution is
\begin{align}
E[p_{i} | \mathbb{X}, \alpha] = \frac{c_{i} + \alpha{i}}{N + \sum_{k}\alpha_{k}}
\end{align}
The expected probability of seeing a category $i$ is equal to the proportion of successful occurrences of $i$ out of all total occurrences. \\
\textbf{Dirichlet Distribution} \\
If there are three possible directions at a given intersection $I$, equal probabilities of each direction can be specified by setting each alpha to the same value, giving a symmetric Dirichlet distribution. The size of each alpha specifies the variance. For example, setting the prior distribution $\theta \sim Dirichlet(2,2,2)$ gives a mean and variance of:
\begin{align}
E[X_{i}] &= \frac{\alpha_{i}}{\alpha_{0}}, \alpha_{0} = \sum^{K}_{i=1}\alpha_{i} \\
E[X_{2}] &= \frac{2}{6} = \frac{1}{3} \\
Var(X_{i}) &= \frac{\alpha_{i}(\alpha_{0}-\alpha_{i})}{\alpha^{2}_{0}(\alpha_{0}+1)} = \frac{2(6-2)}{36(6+1)} = 0.0317
\end{align}
\section{Hamilton CBD Pedestrian Model}
\textbf{Research Questions} \\
Traffic modelling is an important aspect of transport engineering. Modelling transport networks aids in understanding hidden phenomena of travel and allows for the testing of infrastructure design. There is a need in modern urban environments to prioritise sustainable modes of transport, of which walking plays a key role. \\
A pedestrian model can be viewed in the context of an Agent Based Model. At each \textit{tick}, pedestrians make a decision to move to a new location using a complex internal thought process. This decision is based on attributes including, but not limited to; the desired destination, structure of the network and characteristics of the built environment. \\
Understanding pedestrian flows is vital is designing an environment for pedestrians such that they reach their destination in a safe and enjoyable manner. To aid in this understanding, data first needs to be collected on where pedestrians are travelling in the network. \\
Pedestrian counters have been setup in the Hamilton CBD at 21 key locations. These counters are situated on store verandahs and use 3D StereoVision cameras, giving them the ability to distinguish the direction a pedestrian is travelling and provide distance and height measurements. Each camera records a total count in two directions in five minute intervals. Currently there is no extensive analysis being conducted with the data from these sensors, apart from tracking the short term and long term trend. Beyond the 21 sensors operated by HCC, there is a long term vision of extending this to more locations to better understand pedestrian flow. The model described below serves as an initial exploration of how a pedestrian model can be developed for Hamilton using count data. The model will aim to answer a key question of pedestrian flows:\\
\textit{What are the probabilities of turning in each possible direction, for each intersection in the Hamilton CBD?} \\
These probabilities are hidden parameters in the network, which result in the counts observed at the pedestrian counters. Using the observed data, we can infer these probabilities parameters using an Agent Based Model and ABC-SMC.
\begin{figure}[H]
\centering
\includegraphics[width=5cm]{Images/Sensor}
\caption{A pedestrian counter located on the verandah outside Crate Clothing, Ward St}
\end{figure}
The model focuses on the four pedestrian counters near the Centre Place shopping centre at the intersection of Ward St and Worley Place. The system is defined as a network with entry/exit points, intersections nodes, and counting nodes. The network is loaded from a shapefile of the Hamilton City walking network (NZTM) and is geospatially consistent with the real world location. The 4 pedestrian counters are included as a certain type of node which counts travel through itself. The additional counters (denoted with a dashed circle below) are not installed counters. However for the purposes of covering all entry and exit points they are included as such, with mock data created according to a best guess. The data from these counters is used to validate the ABM. \\
For simplicity purposes, the network was simplified to two intersections and four counters. The entry to the northern Centre Place building was ignored, but could be added in future models in addition to extending the network to a larger portion of the CBD when the data is available.
\begin{figure}[H]
\centering
\includegraphics[width=9cm]{Images/Path}
\caption{The Centre Place walking network.}
\end{figure}
An Agent Based Model was developed in NetLogo to simulate the counts at the four counters, with validation carried out using an ABC-SMC with Adaptive Weights model. The data for the four existing counters was first explored to understand how the count varies over time at each location.
\begin{table}[H]
\centering
\begin{tabular}{rrlll}
\hline
Count & Location.Direction & Day & Time \\
\hline
14 & Anglesea Ward NE & 2018-07-07 & 09:00:00 \\
36 & Anglesea Ward NE & 2018-07-07 & 10:00:00 \\
40 & Anglesea Ward NE & 2018-07-07 & 11:00:00 \\
56 & Anglesea Ward NE & 2018-07-07 & 12:00:00 \\
\hline
\end{tabular}
\caption{An example of the formatted data from the pedestrian counters}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/CountTimeSeries}
\caption{The pedestrian count from July 7-9, 2018 for the four observed counts to be used in the model}
\end{figure}
For each counter, the count changes significantly over the course of a day. The peak is generally around lunchtime. There is a slight increase in the evening before falling to a minimum level during the early morning hours. All four counters appear to vary significantly from the weekend to Monday. The count during the lunchtime peak was investigated further.
\begin{figure}[H]
\centering
\includegraphics[width=12cm]{Images/CountDailyTotal}
\caption{The average pedestrian count from 12pm-1pm for the four counters to be used in the model}
\end{figure}
All four locations appear to have similar counts over the course of a working week. There is a decrease in the count during Saturday and Sunday, particularly at the Anglesea/Ward counter. Sunday experiences the lowest counts for the week. In terms of magnitude, the Anglesea/Ward counter has the highest foot traffic. 12pm-1pm is a key time to understand pedestrian flows, as many people working in the CBD leave their place of work to eat or shop. Understanding the movement of pedestrians at this time will provide valuable insight into where people choose to travel.
\subsection{ABM Design}
The pedestrian network is represented in NetLogo as a series of nodes and connecting links. This can be viewed as a undirected, acyclic graph with six nodes and five edges. It is not possible to travel back to a node which an agent previously travelled to. The agents (pedestrians) travel between nodes via the links. At each tick of the simulation, the agents choose to travel to a connected node using a set of probabilities. The probabilities at nodes $\{3,4\}$ are the parameters of the ABM which will influence the counts at each exit node $\{5,2,1,0\}$. They are modelled using two symmetric Dirichlet distributions $\sim Dirichlet(t, k)$, where $t$ is the number of categories and $k$ is the concentration hyperparameter, set to be equal for all $t$. For two distributions and three categories this is denoted as:
\begin{align}
\theta_{1} \sim Dirichlet(3, 3, 3) \\
\theta_{2} \sim Dirichlet(3, 3, 3)
\end{align}
\begin{enumerate}
\item{\textbf{Purpose}} \\
To create a valid simulation of the pedestrian flows around the Ward/Worley intersection using observed data.
\item{\textbf{Entities, State Variables and Scales}} \\
The single agents in the network are pedestrians. They have two variables - their current node and a goal node. They travel discretely from one node to another.
\item{\textbf{Process overview and scheduling}} \\
At each tick of the simulation, each pedestrian in the network makes a decision to move to a certain node, and then moves to that node. These movements occur simultaneously.
\item{\textbf{Design Concepts}} \\
There is no interaction between pedestrians. The agents will exit and enter the system according to a survival function.
\item{\textbf{Initialisation}} \\
There are initially a number of agents assigned to entry/exit nodes, with probabilities of assignment proportional to the entry counts at the nodes.
\item{\textbf{Input Data}} \\
The input data is the observed entry counts for each node, used to assign agents to entry/exit nodes at the start of the simulation.
\end{enumerate}
The agents do not return to the node which they came from. There are two possible nodes to travel to at each intersection. Formally, the three directions at an intersection $n$ can be represented as $\{d_{1},d_{2},d_{3}\}$. The corresponding nodes if each respective direction is chosen are $\{n_{1},n_{2},n_{3}\}$. The probability of turning back is eliminated, and hence the remaining probabilities are normalised by dividing each by the sum.
\subsection{Initial Model Analysis}
The simulation is controlled over multiple runs with RNetLogo. Through this package, variables can be sent to and from R. A demonstration is shown below with a simple change in probabilities. The first run is conducted with even probabilities of turning in all directions. The probabilities are then modified with the intention to increase counts in the SW direction at Anglesea/Ward. This is done by changing the probability of a turn towards the Anglesea/Ward node to 0.95. Other possible directions $n$ are set to $\tfrac{0.05}{n}$. The mean count is taken over 10 runs of each simulation.
\begin{figure}[H]
\centering
\includegraphics[width=12cm]{Images/SimulationProbChange}
\caption{Changes in simulated counts after modification of turning probabilities.}
\end{figure}
As shown above, increasing the probability of turning SW to Anglesea/Ward approximately doubles the count across the node, while the count for the three other nodes decreases slightly. \\
\subsection{Observed Data}
The first CBD model will aim to create a validated ABM to accurately simulate the pedestrian movements for a typical weekday at 12pm. To gather the observed data, two months of hourly counts were extracted from August 1 - September 31. The data was subset to weekdays at 12pm and taken as the observed data. The mean of each is counter was set as the summary statistic. \\
For the counters either not installed or without data available, mock data was created according to a best guess. As a result the output from the model does not completely represent the real world system, but remains a valid framework for when the observed data is available. The process to create the mock data is described in the table below. The count from an existing counter is denoted by $C_{x}$, where $x$ is the name given to the counter.
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Node & Function & Count\\
\midrule
5 & $C_{AW} \times 2.2$ & 321 \\
2 & $C_{TR} + C_{CC}$ & 222 \\
0 & $C_{TA} \times 1.8$ & 202 \\
1 & $380$ & 380 \\
\bottomrule
\end{tabular}
\caption{Creation of the observed data for the four counters}
\end{table}
\subsection{Model Design}
At each intersection in a walking network, pedestrians make a choice of a direction to turn. This can be described in general terms by the set $S = \{d_{i}\}, i = 1,...n$, where $n$ is the number of possible directions. The probabilities in this set will vary for each intersection. For simplicity purposes, the backwards direction will be ignored. A Dirichlet prior is used at each intersection. The Dirichlet distribution is a family of continuous multivariate probability distributions (J. Lin, 2016).
\begin{flalign}
f(x_{1},...,x_{K};\alpha_{1},...,\alpha_{K}) = \frac{1}{B(\alpha)}\prod_{i=1}^{K}x_{i}^{\alpha_{i}-1}, \\
B(\alpha) = \frac{\prod_{i=1}^{K}\Gamma(\alpha_{i})}{\Gamma(\sum_{i=1}^{K}\alpha_{i})}
\end{flalign}
The Dirichlet distribution is well suited as a Bayesian prior for a set of probabilities in $k$ choices. The number of parameters is equal to the number of possible directions. The probability of each direction is equal for input into the model, and is then inferred as a parameter using ABC. In total there are 6 nodes - 4 for recording counts and 2 non-recording intersections. Probability distributions are placed over the two intersections $\{3,4\}$. Intersections 3 and 4 in Figure 0.15 have 3 choices of direction. These two directions will vary depending on the node a pedestrian previously came from. \\
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Current Node & Previous Node & Next Nodes & Possible Directions\\
\midrule
3 & 2 & {0,4} & 2 \\
3 & 0 & {2,4} & 2 \\
3 & 4 & {0,2} & 2 \\
4 & 3 & {1,5} & 2 \\
4 & 1 & {3,5} & 2 \\
4 & 5 & {1,3} & 2 \\
\bottomrule
\end{tabular}
\caption{Possible directions for node travel}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=10cm]{Images/Path-Prior}
\caption{Prior Dirichlet distribution at the two intersections and the probability parameters a-f.}
\end{figure}
The aim of the agent based model with ABC validation is to understand the probabilities of a pedestrian turning at certain intersections. It is understood that there is a set of probability distributions which will produce simulated data close to that of the observed data. These probability parameters will assist in understanding the movement of pedestrians around the Centre Place shopping centre, and how this varies at different times of the day. The first model will infer these probabilities for 12pm on a typical weekday. It is expected that the foot traffic will be high during this time as a result of workers in the CBD using their lunch break to go out to eat, shop, or walk. \\
An additional parameter is the number of agents in the system over the hour span. This is defined with a Uniform prior, $\sim Uniform(a,b)$. $a$ and $b$ are chosen according to the observed entry count data and number of ticks in the simulation. The total entry over one hour from 12pm-1pm was calculated as 1021. For 60 ticks representing one hour, this gives an approximate entry count per minute of $\sim$17. However, the number of ticks in the simulation significantly affects the simulated counts. For example, if 100 ticks result in an observed count of 160, at 60 ticks the count will be approximately $\frac{100}{60} \times 160 \approx 267$. There is no single calculation for the number of pedestrians to use in the ABM, as it will be influenced by the design of each network. One method to find it is to set a wide Uniform prior for the number and infer the most likely value with ABC. This highlights a benefit of the ABC-SMC algorithm - even if the Uniform prior does not cover the true parameter, the sampling step will allow for parameters beyond the prior range. This is the method used in the Hamilton CBD pedestrian model. \\
\textbf{Dynamic Entry/Exit}
A more realistic method of simulating pedestrians is to begin with a given number in the system, and use a function at each tick to generate a certain number of agents to enter the system. A parameter $\alpha$ can be set to manage the entry rate such that the simulation closely matches the observed data. This method was not used in the Hamilton CBD model, although it will be investigated further for the extended model.
\subsection{ABC Model}
The ABC-SMC model is defined by four key measures.
\begin{enumerate}
\item Prior distributions of the parameters $\theta$. At each intersection a Dirichlet distribution is defined as a prior with $K$ equal to the number of possible directions.
\item A summary statistic calculated from the observed and simulated data. The output from each simulation will be counts in the exit direction at four nodes. The mean will be calculated for each of these four measures and compared against the mean counts from the observed data at 12pm on a weekday.
\item A distance measure D. This was chosen as Euclidean distance:
\begin{align}
d = \sqrt{\sum_{i}^{N}(x_{i} - x_{i(obs)})^{2}}
\end{align}
\item An initial epsilon $\epsilon$ as a threshold for the distance measure. This is dynamically set during the model simulation using a quantile of the previous population distances.
\end{enumerate}
To generate data $y$, the ABM will be run for 100 ticks. This will represent the pedestrian flow from 12pm-1pm on a weekday. Intersection nodes will be given prior probabilities of turning in each direction, sampled from $g(\theta)$. The generated data is the counts at each counting node. At the end of each simulation the total count at each node is used at the simulated data. The ABC algorithm is given below:
\begin{algorithm}[H]\caption{ABC-SMC}\label{abc-smc}
\begin{algorithmic}[1]
\State Compute the summary statistics as the mean count at 12pm, across all weekdays, for each of the four entry/exit nodes
\State Set $\epsilon_{1} = 350$ and $t = 1$
\State Set $\theta^{1} \sim Dirichlet(3,3,3)$, $\theta^{2} \sim Dirichlet(3,3,3)$ and $\theta^{3} \sim Unif(40,60)$
\State Define a Euclidean distance measure $d = \sqrt{\sum_{i}^{N}(x_{i} - x_{i(obs)})^{2}}$
\For {$i=1$ to $N$}
\State Simulate $\theta_{i}^{(1)} \sim p(\theta^{(1)}), \theta_{i}^{(2)} \sim p(\theta^{(2)}), \theta_{i}^{(3)} \sim p(\theta^{(3)})$
\State Simulate $x \sim p(x|\theta_{i}^{(1)},\theta_{i}^{(2)}),\theta_{i}^{(3)})$ until $p(x,x_{obs}) < \epsilon_{1}$
\State Set $w_{i} = 1/N$
\EndFor
\For {$t=2$ to $T$}
\State Compute data based weights $v_{i}^{(t-1)} \propto w_{i}^{(t-1)}K_{x,t}(x_{obs}|x_{i}^{(t-1)})$
\State Set $\epsilon_{t}$ as $0.75 \times \frac{1}{N} \sum_{i=1}^{N}t_{i}$
\For {$i=1$ to $N$}
\State Repeat until $p(x,x_{obs}) < \epsilon_{t}$:
\Indent
\State Pick $\theta_{i}^{*}$ from the $\theta_{j}^{(t-1)}$'s with probabilities $v_{j}^{(t-1)}$
\State Pertube the sampled particle $\theta_{i}^{*}$
\State Simulate $\theta_{i}^{(1)} \sim p(\theta^{(1)}), \theta_{i}^{(2)} \sim p(\theta^{(2)}), \theta_{i}^{(3)} \sim p(\theta^{(3)})$
\State Simulate $x \sim p(x|\theta_{i}^{(1)},\theta_{i}^{(2)},\theta_{i}^{(3)})$
\EndIndent
\State Compute new weights as $w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}$
\EndFor
\State Normalise $w_{i}^{(t)}$ over $i = 1,...,N$
\EndFor
\end{algorithmic}
\end{algorithm}
\subsection{Agent Behaviour}
At creation of the model a given number of pedestrians $P$ are generated. This number is given in the first ABC population by a wide Uniform prior. By pertubing subsequent particles from the population, the number will converge to the true posterior even if the initial prior does not cover the true value. The agents are assigned to exit nodes according to probabilities proportional to the entry counts at 12pm on a typical weekday:
\begin{align}
P(I) = \frac{C_{I}}{\sum_{i=1}^{4} C_{i}}, i \in \{0,1,2,5\},
\end{align}
where $C_{x}$ is the count at node $x$. \\
At each simulation tick, the agents individually make a decision of an adjacent node to move to using the set of probabilities from the ABC model. At each ABC iteration $1,...N$, sampled probabilities are sent to the ABM and the simulation is run for 100 ticks to represent one hour. When an agent moves to an entry/exit node, the count for that node is updated. The total count at each node after 100 ticks is reported back to the ABC model as the simulated data.
\subsection{Results}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
A & B & C & D & E & F & Num Peds \\
\midrule
0.488 & 0.202 & 0.310 & 0.380 & 0.320 & 0.300 & 27.408 \\
\bottomrule
\end{tabular}
\caption{Posterior Means}
\end{table}
\begin{table}[H]
\vspace*{-0.5 cm}
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Populations & Simulations & Accepted Samples & Running Time (mins) \\
\midrule
10 & 7620 & 3000 & 282 mins \\
\bottomrule
\end{tabular}
\caption{Results of ABC simulation}
\end{table}
\begin{table}[H]
\vspace*{-0.5 cm}
\centering
\begin{tabular}{@{\extracolsep{4pt}}llll}
\toprule
Counter & Observed Count & Simulated Count & Difference \\
\midrule
AW & 321 & 306.041 & 14.959\\
TR & 222 & 224.2908 & -2.2908\\
TA & 202 & 214.0074 & -12.0074\\
CPS & 380 & 393.1164 & -13.1164\\
\bottomrule
\end{tabular}
\caption{Results of ABC simulation}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=14cm]{Images/CBD-Posterior}
\caption{Posterior distributions of each turning probability. The posterior mean is denoted by a dashed black line. The symmetric prior centered on $\frac{1}{3}$ is shown in pink.}
\end{figure}
\textbf{Credible Intervals}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}ccc}
\toprule
A & B & C \\
\midrule
{[}0.315,0.665{]} & [0.105,0.339] & [0.201,0.4300] \\
\bottomrule
\end{tabular}
\caption{95\% Credible Intervals for the parameters at intersection 4}
\end{table}
\begin{table}[H]
\centering
\vspace{-0.5cm}
\begin{tabular}{@{\extracolsep{4pt}}cccc}
\toprule
D & E & F & U \\
\midrule
{[}0.185,0.715{]} & [0.149,0.491] & [0.120,0.421] & [24,31] \\
\bottomrule
\end{tabular}
\caption{95\% Credible Intervals for the parameters at intersection 3 and the number of pedestrians}
\end{table}
\textbf{Prediction Intervals} \\
To calculate a 95\% prediction interval for the observed counts, 1000 samples of each parameter were taken from the posterior distributions. These parameters were used to run 1000 simulations of the pedestrian model in NetLogo. The counts from each simulation were used to calculate the 95\% prediction intervals below. \\
\begin{table}[H]
\centering
\vspace{-0.5cm}
\begin{tabular}{@{\extracolsep{4pt}}cccc}
\toprule
AW & TR & TA & CPS \\
\midrule
{[}234,388{]} & [143,299] & [142,287] & [304,472] \\
\bottomrule
\end{tabular}
\caption{95\% Prediction Intervals for the simulated counts at the four entry/exit nodes}
\end{table}
The algorithm was run for a total of 282 minutes, with a final posterior distribution obtained of 3000 samples at population 10. In the final population, 7,620 simulations were run using sampled probabilities with 39\% of these accepted. The two probabilities A and B in particular have diverged significantly from the prior. A is the probability of turning towards Anglesea Ward, which has a higher count than the two counters in the direction of B. We see that A has a posterior mean of $\mu(A) = 0.488$, in comparison to $\mu(B) = 0.202$. The other probabilities have not shifted significantly from the prior mean, although the variance has reduced. \\
The mean of the simulated counts vs the observed counts are given in table 0.14. They are relatively close, although further improvements can be made by regression adjustment techniques or re-running the model with a modified $\epsilon$ reduction threshold. Further such post analysis is given in the Appendix. Each 95\% prediction interval of the simulated counts in Table 0.17 cover the true observed count. The 95\% credible intervals of the parameters (Table 0.16) are relatively narrow for all parameters except $D$. This is the probability of turning towards the Centre Place intersection from Ward/Worley. The posterior distribution of $D$ appears to be multi-modal. At higher probabilities there is a greater likelihood than that of the prior. \\
\section{Discussion and future work}
The pedestrian model described above serves as a demonstration of using ABC-SMC to validate and infer parameters of a pedestrian ABM. While pedestrian modelling is a common tool used by local government agencies to understand how people use walking as a mode of transportation, there is a challenge in creating the model as an accurate representation. ABC-SMC was found to be an effective tool for validating the simplified Hamilton CBD model such that simulated data closely matches the observed data. Once a validated model has been obtained, the intricacies of the real world system can be viewed through parameter inference. ABC-SMC is also effective for this purpose. It was able to find a precise posterior distribution of probability parameters for turning in each possible direction at the two intersections in the model. \\
As seen in Figure 0.22 of the Appendix, the posterior mean converges to a stable state for some parameters by $\sim$ Population 7, while others have not converged. In addition, the variance is continuously decreasing up to Population 10. This suggests that running the model for more populations will give a more precise posterior. However this will come with further computation time. A balance must be obtained between the precision of the posterior and computation time. Such a balance is a common thread in statistical models such as ABC. \\
While the model ran in a relatively short amount of time, extending the network to include more intersections and observed data will result in an increase in computation time. There remains further research to be conducted in the areas of optimal kernel choice, epsilon threshold, and prior choice. All three significantly affect the computation time. Another option is to increase computing resources. The sequential nature of ABC-SMC does not lend itself well to parallelisation in comparison to other techniques such as ABC-MCMC. However, within populations there is an opportunity to efficiently distribute both the particle pertubation and simulations across a cluster computing network. This was not investigated in the Hamilton CBD model, but will be necessary when extending the model to a larger area of the CBD. \\
Further improvements could be gained using dimensionality reduction methods. If the model is extended to a larger area of the CBD, the dimensionality of the observed data will increase, hence reducing the likelihood of simulating data sufficiently close to the observed data. Methods such as \textit{random projections} could be investigated to reduce the dimensionality of the data and decrease computation time. \\
A vital aspect of developing a useful pedestrian model is in the breadth of data collected in the network. Currently there is limited data collected on pedestrian counts. Ideally, counts would be recorded at all nodes of the CBD network. This would enable the creation of a more realistic model which is able to explain pedestrian flows. The use of the mock data in the Hamilton CBD model means that the parameters inferred from the model are not necessarily the same as the hidden parameters in the real world complex system. HCC is investigating more widespread data collection of pedestrian counts in the CBD. Once this data is available, the extended model can be used to accurately answer questions about pedestrian flows in the Hamilton CBD. \\
While the Hamilton CBD model focuses solely on pedestrian flows, other transportation flows could also be modelled. ABM is well suited to simulating any type of agent based movement through a network. One such example is modelling the traffic flow of vehicles at an intersection, with parameters such as probabilities of turning or average speed through the intersection. Following the development of an ABM to enable this simulation, ABC-SMC can be applied to validate and infer parameters of the model. \\
\section{Glossary}
\textbf{ABM} - Agent Based Modelling \\
\textbf{ABC} - Approximate Bayesian Computation \\
\textbf{ODD} - Overview, Design, Details \\
\textbf{BDI} - Belief-Desire-Intention \\
\textbf{HCC} - Hamilton City Council \\
\textbf{CBD} - Central Business District in Hamilton, New Zealand \\
\textbf{AW} - Count data collected for the southwest direction at the Anglesea-Ward intersection \\
\textbf{TR} - Count data collected for the northeast direction on Ward St towards Victoria St \\
\textbf{TA} - Count data collected for the southeast direction on Worley Pl \\
\textbf{CPS} - Count data collected for the southeast direction out of Centre Place (South) to Civic Square \\
\newpage
\pagenumbering{arabic}
\setcounter{page}{1}
\section{Introduction}
Agent Based Modelling refers to a class of computational models invoking the dynamic behaviour, reactions and interaction amongst a set of agents in a shared environment (Abar, Theodoropoulos, Lemarinier, O'Hare, 2017). A wide range of real world systems can be modelled using this framework. It is particularly effective in complex systems of multiple heterogeneous, interacting agents. Valuable information can be gathered by observing the aggregate behaviour of a micro level simulation where agents interact with both other agents and the environment. \\
A key component of ABM research is in the post analysis of the model output. Due to its stochastic simulation nature there is a vast flexibility in the quantity and type of data produced by a given ABM. As a result, it is necessary to output only the most relevant data and analyse it using efficient techniques for effectively answering the original set of research questions. In a traditional Bayesian context, there exists a set of random parameters describing the function of an ABM. These parameters are usually inferred by fitting a model to the data and calculating the probability of observing the parameters given the data (\textit{posterior distribution}). However, it is often the case that a complex system has an intractable likelihood, where the probability of the parameters given the data cannot be calculated. \\
In this setting, alternative approaches must be examined to find the posteiror distribution. One such `likelihood free' approach is Approximate Bayesian Computation (ABC). Where observed data can be compared against simulated data, ABC can be used to infer a set of parameters for a model. This turns out to be a suitable method for the analysis of an agent based model, where the likelihood is often intractable. Various examples of analysing an ABM using the ABC algorithm are shown, with the focus being on modelling pedestrians flows in the Hamilton CBD. ABC is used to validate the ABM by approximating the observed data, as well as infer a set of probability parameters for the movement of pedestrians.
\section{Agent Based Modelling}
Agent Based Modelling (ABM) is a computational framework for simulating the behaviours and interactions of autonomous agents. The agents can represent any individual or collective entity within a complex system. They each have a set of properties and behaviours, which are carried out at each time step of the model simulation. The output of the model gives us a means of assessing how the actions of individual entities affect the system as a whole. In a complex system it is often the case that an emergent pattern is seen, but the actions of the agents making up the system is not readily visible. Constructing a model using the ABM framework allows us to understand how the properties and behaviours of individual agents develop this emergent pattern. \\
Joslyn \& Rocha, (2000) define a complex system as ``consisting of a large number of interacting components (agents, processes, etc.) whose aggregate activity is non-linear (not derivable from the summations of the activity of individual components), and typically exhibits hierarchical self-organization under selective pressures". Such systems contain a number of complexities in state space, interactions, behaviour and spatio-temporal structure. A key property is that of emergence. When a large number of agents in a complex system interact in a spatio-temporal structure, properties can be observed which are usually not readily apparent from observing the agents independently. ABM allows us to construct a complex system in such a way that the aggregate behaviour of individual agents can be observed. By constructing such a model on a microscale level, it is often the case that more information can be extracted than viewing the model solely by its aggregate behaviour. \\
ABM has been used across a wide range of scientific disciplines, including ecology, economics, and biology. In the biological sciences, recent advances in computational tools have allowed for the simulation of individual cells in order to observe the aggregate behaviour. One application is the modelling of the chemotactic response of \textit{E.coli} cells to chemo attractant gradients in a 3D environment (Emonet et al, 2005). Representing cells as autonomous agents competing in a spatial environment is well suited for such biological analysis, where the physical observation of the process is either not possible or practical. More recently, ABM has been used in urban planning of city environments. As the dynamic structure of transportation modes evolves and the use of alternative modes increases, is it now vital to understand how traffic flows change across an urban environment. A tool developed by Aschwanden, Wullschleger, Müller, \& Schmitt (2012), allowed for the simulation of a city's transportation network to evaluate greenhouse gas emissions and pedestrian flow (Aschwanden et al, 2012).\\
Much of the phenomena observed in the world can be modelled with an ABM. For example consider the ecological predator-prey model. There are two popular approaches to understanding the dynamics of the change in populations between two species where one predates on the other. One is known as the \textit{Lotka--Volterra} model, developed independently by Lotka (1925) and Volterra (1926). This pair of first-order non linear differential equations describe the change in the population of two species over time.
\begin{align}
\frac{dx}{dt} = \alpha x - \beta x y \\
\frac{dy}{dt} = \delta x y - \gamma y,
\end{align}
where $x$ = the population of the prey species, \\
$y$ = the population of the predator species, \\
$t$ = time, \\
$\frac{dx}{dt}, \frac{dy}{dt}$ represent the instantaneous growth of the two populations, \\
and $\alpha, \beta, \gamma, \delta$ are positive real parameters which describe the interaction between the two species. Each parameter can be adjusted and a solution yielded to find the change in population of two interacting species. While the Lotka-Volterra model has a long history of use in ecology, it is too simplistic to apply to ecosystems where predator competition is involved. In addition, it is not possible for either species in the model to saturate completely. \\
An alternative method to describe predator-prey interaction is that of an agent based model. Consider the interaction between wolf and sheep in a field. First we describe this model by answering a set of key questions. Describing an agent based model in this way enables another researcher to quickly and easily understand its function.
\begin{enumerate}
\item{\textbf{Research Question}} \\
Under what conditions is an equilibrium of the wolf and sheep population levels obtained, when wolves predate on the sheep and sheep consume grass?
\item{\textbf{Agents}} \\
Wolves, Sheep, Grass
\item{\textbf{Agent Properties}} \\
Wolf and Sheep: Energy, Location, Heading. Grass: Amount of grass
\item{\textbf{Agent Behaviours}} \\
Wolf and Sheep: Move, Die, Reproduce. Wolf: Eat sheep. Sheep: Eat Grass. Grass: Grow
\item{\textbf{Parameters}} \\
Num Sheep, Num Wolves, Movement Cost, Energy Gain from grass, energy gain from sheep, grass regrowth rate
\item{\textbf{Time Step}} \\
Sheep \& Wolves: 1. Move, 2. Die, 3. Eat, 4. Reproduce; Grass: 5. Grow
\item{\textbf{Measures}} \\
Sheep and wolf population versus time
\end{enumerate}
The two species can be represented as two sets of agents. Each agent of the set is given relevant properties chosen as having the most influence on deriving the output we want to observe. Both the sheep and wolves are given three shared properties: an energy level, location and heading (direction). There is no limit to the number of properties, but for simplicity purposes, they should be restricted to those necessary to answer the research question. The second step is to describe the environment in which the agents interact. Here the environment is a field with patches of grass. This could be extended to include fences, elevation and other features, but again for simplicity purposes are left out of the first model. When the agents reach the end of the world, they will reappear on the other side of the world. This is known as a `torus shaped' boundary condition, and is a common feature in ABMs. Next, the agent behaviour is described. Both sheep and wolves have the ability to move, eat, reproduce, and die. Where they differ is in what each species eat - wolves will consume sheep while sheep will consume grass. Parameters are then chosen to control various attributes of the model. This allows the observation of changes in the model given varying parameters - the numbers of each population, the amount of grass available, or the reproduction rate can be changed and the aggregate effect of each observed. At each time step (or \textit{tick}, which will be used hereafter), the agents carry out some action. Both the sheep and wolves move, die, eat then reproduce. The grass grows at each tick. The populations of the two species is observed as the aggregate behaviour.
\begin{figure}[H]
\centering
\includegraphics[width=10cm]{Images/WolfSheepDiagram}
\caption{Properties, Agents and Behaviours in the Wolf-Sheep predation model}
\end{figure}
\subsection{Analysis of an ABM}
In the above model there exists a set of parameters which achieve equilibrium in the sheep and wolf populations. This is often found through trial and error. Another, more sophisticated method involves looping through many thousands of simulations, changing the set of parameters each time. The sheep and wolf populations are analysed in each run. The output is some metric describing how close the populations are to sustaining over time. This is demonstrated below. In each run, the parameters are adjusted, the model is run for a set number of time ticks, and the final numbers of both wolf and sheep compared to the initial populations. The data can be analysed with appropriate statistical models to identify stationarity. One such method is to view the two populations as two time series. The oscillation of the species populations can be viewed as seasonality. Given enough simulation time, the difference in population numbers from the start to the end of the time series is compared to determine if the system has reached equilibrium. \\
The BehaviorSpace tool in ABM software NetLogo allows a simulation to be run multiple times with changing parameters. A simple demonstration of this tool for analysis is when the `energy from grass' parameter is changed. This parameter determines the energy that sheep gather from eating grass. Because sheep lose energy from movement, a low amount of energy gained from grass is likely to result in a larger decrease in the sheep population than if a large amount of energy was gained from eating grass. The Wolf-Sheep predation ABM allows this theory to be tested in a simulation based manner, followed by the application of robust statistical analysis methods from the output data to answer questions about the model. Keeping all other parameters fixed, the grass energy parameter was updated. The simulation was run for 1000 ticks and the population of the two species recorded at each tick.
\begin{figure}[H]
\centering
\includegraphics[width=14cm]{Images/WolfSheepPopulation-BehaviorSpace}
\caption{Four runs of Wolf-Sheep ABM with four different grass energy parameters - 1, 4, 7 and 10. Note: The y-axis is free}
\end{figure}
When the grass energy is low, both species die out extremely quickly. This is due to the sheep not gaining enough energy to move, subsequently dying out. The wolves, now with no species to predate, also die out. At a grass energy of four, an equilibrium appears to be reached. The sheep can gain enough energy to continually move, which sustains the populations of the wolves predating them. If the grass energy is changed to 7, the sheep population varies far more. The population increases sharply due to the high energy levels of the sheep (who then reproduce more frequently), which results in a high level of competition for the available grass. Due to this competition, the population drops off to an extremely low level at $\sim$340 ticks. This results in the wolf population dropping to zero from the lack of prey. With no predators remaining, the sheep population increases to a high level and remains at $\sim$500 for the remainder of the simulation. In the last run the grass energy is set to 10. This has a similar effect as the previous parameter, although the sheep population reaches a higher level before remaining constant. \\
While this \textit{`brute-force'} approach is often used to analyse complex systems for the purposes of parameter inference, it is computationally inefficient. When looping through samples of each parameter, much of the simulation time is spent producing data far from the desired outcome. For a set of parameters $\theta$ of dimension $P$, each sampled at N equal intervals $a \times \frac{max(\theta)}{N}, a = \{1,...N\}$, the required number of simulations quickly becomes prohibitively large. Consider the case of the wolf-sheep predation model with 7 parameters. If we would like to sample each parameter at 100 even intervals, the number of simulations to cover all possible combinations becomes:
\begin{align}
\text{Num Simulations} = N^{P} = 1 \times 10^{14}
\end{align}
Clearly this number of simulations is unreasonable. This can be shortened by reducing the number of sampled intervals for each parameter or disregarding some combinations of variables, but the issue remains of a large amount of computation time being wasted sampling parameters which do not produce simulated data close to the desired outcome of the ABM.
\subsection{Equation Based Modelling (EBM)}
While ABM is a 'bottom up' approach focusing on the aggregate behaviour of agents, Equation Based Modelling (EBM) is a top down approach. EBM is based on an interrelation between a series of partial differential equations (Parunak, Savit \& Riolo, 1998). The variability in the system is examined over time and/or space. Validation is enabled by comparing the output of the model to the real world system behaviour. In comparison, ABM allows validation of both the individual and aggregate system behaviour. EBM is suited for modelling physical processes where the behaviour of the components is not as important as that of the overall system. \\
Generally, EBM's are a set of differential equations and parameters. Extending the \textit{Lotka--Volterra} model, time can be eliminated from each equation to produce a single equation, and then solved for a constant quantity $V$:
\begin{align}
\frac{dx}{dt} = \alpha x - \beta x y \\
\frac{dy}{dt} = \delta x y - \gamma y \\
\frac{dy}{dx} = -\frac{y}{x} \frac{\delta x - \gamma}{\beta y - \alpha} \\
\frac{\beta y - \alpha}{y} dy + \frac{\delta x - \gamma}{x} dx = 0 \\
V = \delta x - \gamma \ln(x) + \beta y - \alpha \ln(y)
\end{align}
This model will give the number of two populations $x$ and $y$ given the set of parameters $\alpha$, $\beta$, $\gamma$ and $\delta$. A major limitation of this in ecological models is that neither population can reach zero - they always recover after falling to a low level. However, the more flexible structure of an ABM allows either population to go extinct.
\subsection{Comparison of ABM to EBM}
While Agent Based Modelling is well suited for many classes of complex systems, it is better suited for some contexts than others. In problems with a large number of homogeneous agents, it is often the case that more accurate results can be obtained in a shorter amount of time using an aggregate solution. Tracking the behaviour of individual agents is not always necessary. For example, if we are concerned with the amount of water in a container, it is more useful to track the water level directly and model it using a set of differential equations. Parameters in the equations such as temperature can be adjusted and the effects observed. Where there are only a few interacting agents in a system, a similar approach can be taken by deriving a model with differential equations. One such example is in the behaviour of a tennis ball falling onto different surfaces. Here, the physical behaviours of the model are understood with a rigorous mathematical structure such as kinematic equations. This can be used to developed a set of differential equations for effectively describing the behaviour of the ball given different materials and surfaces.\\
Agent Based Modelling is well suited for systems with many heterogeneous agents interacting in an environment. In many populations, individual agents possess unique properties which are not shared across the entire population. Their behaviours are guided by both the environment, the history of their actions and their current properties. ABM is well suited for a system where it is useful to track individual agents and their actions. In this manner it is much more powerful than using equation based modelling. Where the behaviour of agents relies on their history of interactions, the agents can be modelled as intelligent beings with the ability to learn, reason about situations, and deal with uncertainty. An example of this is in the behaviour of pedestrians in a transportation network. Humans are intelligent beings, with each individual's decision making process different from the rest. The reason for one individual choosing to travel a certain route is likely different to another individual, and the long term behaviours of each pedestrian differ substantially. While it would be impractical to model such a process using EBM, pedestrian modelling is well suited to an ABM approach, allowing for individual actions carried out by several heterogeneous agents.
\subsection{Agent Intelligence}
Recent advances in the field of artificial intelligence have allowed for the construction of agents in an ABM, such that they are able to learn from their past and take an action based on a complex set of variables. One such influential paradigm to enable this is BDI - Belief-Desire-Intention (Singh, Padgham \& Logan, 2016). BDI recognises ``that an agent can be identified as having: a set of beliefs about its environment and about itself; a set of desires which are computational states which it wants to maintain, and a set of intentions which are computational states which the agent is trying to achieve" (O'Hare, Jennings, 1996). More recent developments have expanded on this philosophy, going beyond simple reactive behaviour to embedding cognitive complexity (Abrams, 2013). While many ABMs are not suited to this more complex agent intelligence, the recent advances in modelling highly complex systems allows for the embedding of more advanced levels of agent intelligence to achieve a more realistic simulation.
\subsection{Mathematical Background of ABM}
Although ABM is much less mathematically oriented than EBM, it is important to establish a mathematical framework for representing the system and the agent properties. There exist a number of mathematical formalisations for Agent Based Models. A series of mathematical objects can be developed to represent a theoretical abstraction of agent based simulations. These objects capture the features of simulations and allow for the development of mathematical theory to explain the output of a simulation (Laubenbacher et al, 2007). An ABM can be described as a Markov Chain where the state of the system at time $t$ is given by the state at all nodes in the system: $X_{t} = {x_{i,t}},\; i = 1,...,N, t = 1,...,T$.
The state at a given node $i$ for time $t+1$ is given by
\begin{align}
x_{i,t+1} = f_{i}(X_{t}, \Xi_{t}, \theta)
\end{align}
That is, the state at time $t+1$ in the system is reliant only on the previous state. This is an important feature of an ABM, allowing for the model at each tick of the simulation to make agent decisions and update the environment based only on the current state. Storing every prior state and set of decisions, while updating the current state using this prior data, becomes costly in terms of computation and memory as a system increases in complexity. \\
Perhaps the most common framework for describing agent based simulations is Cellular Automata (CA). They are typically defined over a regular grid such as the two dimensional $\mathbb{Z}^{2}$. Each grid point $(i,j)$ represents a \textit{site} or \textit{node}. Each node has a state $x_{i,j}(t)$, where $t$ denotes a time step. The neighborhood \textit{N} for each site consists of a set of nodes that can influence the future state of the node $x_{i,j}$. Based on the current state $x_{i,j}(t)$ and the current state of all nodes in the neighborhood $N$, a function $f(i,j)$ computes the next state $x_{i,j}(t+1)$ of the site at $(i,j)$. Laubenbacher et al (2007) defines this as:
\begin{align}
x_{i,j}(t+1) = f(i,j)(\bar{x}_{i,j}(t))
\end{align}
where $\bar{x}_{i,j}$ denotes the tuples consisting of all the states $x_{i',j'}(t)$ with $(i',j') \in N$. \\
Another modelling framework is that of \textit{finite dynamical systems}. This framework represents an ABM as a time-discrete dynamical system of a finite state set. It can be seen that the representation of an ABM in this way is mathematically rich enough to allow the derivation of formal results.
\subsubsection*{Finite Dynamical Systems}
A Finite Dynamical System (FDS) is an iteration of a function over a collection of variables. We denote this collection as a nonempty, finite set $X = x_{1}, ... , x_{n}$. There is a single, local function $f_{i}$ associated with each element $x_{i}$ in the set. Each of theses local functions take input from only variables in the `neighborhood' of $x_{i}$. Laubenbacher et al (2007) defined an FDS as a sequential composition of these local functions, forming the dynamical system:
\begin{align}
\Phi = (f_{1},...,f_{n}): X^{n} \to X^{n},
\end{align}
Here, $\Phi$ is an iteration unit which generates the dynamics of the system. From Laubenbacher et al (2007), $\Phi$ is assembled from each local function $f_{i}$, each of the variables can be updated simultaneously:
\begin{align}
\Phi(x_{1},...,x_{n}) = (f_{1}(x_{1},...,x_{n}),...,f_{n}(x_{1},...,x_{n}))
\end{align}
In the above a \textit{parallel dynamical system} is obtained. Each variable $x$ in the system is updated in parallel using a local function in its own neighborhood. Alternatively, a \textit{sequential} dynamical system can be obtained by updating the variables states by a fixed update order (Laubenbacher et al, 2007):
\begin{align}
\Phi_{\pi} = f_{\pi t} \circ f_{\pi n-1} \circ ... \circ f_{\pi 1},
\end{align}
where $\pi$ is a permutation on a set $\{1,...n\}$.
The dynamics of $\Phi$ can be represented as a directed graph on the vertex set $X^{n}$, called the \textit{phase space} of $\Phi$ (Laubenbacher et al, 2007). There is a directed edge from \textbf{v} $\in X^{n}$ to \textbf{w} $\in X^{n}$ if and only if $\Phi(\textbf{v})$ = \textbf{w} (Laubenbacher et al, 2007). \\
An Agent Based Model can be represented using this framework. Agents can be thought of as entities in a finite dynamical system, each carrying a set of configurations, preferences and spatial and/or temporal state information. \textit{Cells} are features of the environment in which the agents carry out behaviours. These cells take on one of a finite number of possible states. Agents interact with a subset of nearby agents in the environment, and update their internal state according to a function at each time step. The neighbors of a cell in the ABM environment form an \textit{adjacency relation}, obtaining a dependency graph of the agents (Laubenbacher et al, 2007). For example in a pedestrian network, the state at time $t$ for a given intersection $I$ is dependent on the states of the intersections in the neighborhood of $I$ at time $t-1$. \\
The agents in an ABM may be updated in a number of ways. These are generally either synchronous, asynchronous, or event-driven (Laubenbacher et al, 2007). The choice of the scheduling system is highly dependent on the system that is being modelled. In the pedestrian model described previously, it is clear that at each time-step (or \textit{tick}) of the simulation, all agents will update; moving through the environment and updating their internal states. This is a \textit{synchronous} system. An asynchronous system is suitable for models where the actions of each agent do not depend on the current state of the agents in its local neighborhood. The choice of such a scheduling system is an important feature in the design of an ABM. The nature of dependency and interaction must be carefully considered in order to design a realistic system.
\subsection{Link to statistical theory}
As the foundation of Agent Based Modelling lies in simulation based on observed data in addition to data output, statistics plays a major role at nearly every stage of the modelling process. Perhaps the most important step in ABM based research lies in the analysis of data from the simulation to derive parameters for understanding the data generating process. Other analysis may include descriptive, predictive, or inferential statistics. These models can include, but are not limited to; spatial, network, survival, or time series analysis. Most ABM frameworks provide a method to import and export data into more robust statistical packages such as R or Python. These packages provide advanced modelling tools which allow the researcher to extract insights from the ABM.
\subsection{Model Design}
To date, there is no standard format for the documentation of an ABM. Limited replicability is an issue in scientific research using ABMs. To maximise the reproducibility of an ABM, a format for their design should be adopted which is popular in the scientific community. By standardising the description of a model in this way, it can be more easily reproduced by another party or revisited by the original developer. One such format is ODD - Overview, Design, Details, first proposed by Grimm et al (2006) as a standard protocol for describing agent based models. It was subsequently reviewed and updated in 2010 (Grimm et al, 2010). ODD describes a set of key aspects of the model:
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/ODD}
\caption{The ODD protocol and the changes from 2006 to the updated 2010 protocol}
\vspace{-1.5em}
\end{figure}
\begin{enumerate}
\item{\textbf{Purpose}} \\
What is the purpose of the model? What are the desired outcomes?
\item{\textbf{Entities, State Variables and Scales}} \\
What entities exist in the model? Agents, environment, collectives, spatial units. How are the entities characterised? What properties do they hold? What are the spatial and temporal resolutions of the model?
\item{\textbf{Process overview and scheduling}} \\
What actions are assigned to each entity, and in which order? How are the state variables updated? How is time modelled - discretely, continuously, or as a continuum where both can occur?
\item{\textbf{Design Concepts}} \\
Emergence, Adaptation, Fitness, Prediction, Sensing, Interaction, Stochasticity, Collectives, Observation.
\item{\textbf{Initialisation}} \\
What is the initial state of the model world? How many entities are created and what are their default properties?
\item{\textbf{Input Data}} \\
Is external data used as input to represent the change in a process over time?
\end{enumerate}
ABMs developed in the course of this dissertation will follow the ODD protocol. For each, thorough documentation is provided to enable reproduction of the model by researchers.
\subsection{ABM Software}
Several ABM toolkits are available to enable the development of agent based model simulations. Perhaps the most popular of these is \textbf{NetLogo}. NetLogo was developed in 1999 by Uri Wilesnky. It uses a philosophy of `low threshold, no ceiling', with a goal of making the software easy to use for beginners while remaining flexible enough to develop advanced models. It contains a number of example models for fields such as network analysis, social science, and biology. All ABM models in this report are developed in NetLogo. The RNetLogo and pyNetLogo libraries in R and Python respectively allow for programmatic, headless control of a NetLogo model. Statistical models were developed in both R and Python, with the simulation element communicating with the NetLogo model for sending commands and receiving output.
\begin{figure}[H]
\centering
\includegraphics[width=10cm]{Images/NetLogo}
\caption{A NetLogo ABM of virus spread through a network}
\end{figure}
\section{Graph Theory}
ABM is commonly used to design networks in a variety of fields, including power grids - Durana et al (2014); social networks - El-Sayed et al (2012); and transport - Huynh et al (2015). Graph Theory underlies much of the construction of these networks. The basis of graph theory is the relationships between a set of entities, or \textit{nodes}. A graph is an ordered pair $G = (V,E)$ comprising a set of vertices or nodes $V$ together with a series of edges $E$, which are two-element subsets of $V$ (Prathik et al, 2016). This turns out to be a natural way of defining an ABM. For example, a model for social network analysis could be set up with users as nodes, communication between users as links, and the direction of the communication as the direction of the links. In the ABM, agents are defined as users. Their parameters may include friend count, post rate, and other metrics related to the social network in question. The environment in which the agents interact is the graph itself. Their behaviours over a series of ticks allow output such as activity levels and friend counts to be analysed on an aggregate level. \\
Consider a simple stochastic ABM represented as a graph (pictured below). In this ABM, agents are placed randomly at nodes. At each tick of the simulation each agent will move to a connected node via the grey lines. The graph is \textit{undirected} - agents can travel to any connected edge from a given node. There are seven nodes and six edges. By designing this ABM network using the logic of graph theory, we can answer route based questions, such as the number of possible ticks it will take for an agent to move from node $6$ to node $0$. Other problems we might want to solve include the shortest possible distance between two nodes, or whether it is possible to return to a node. \\
\begin{figure}[H]
\centering
\includegraphics[width=5cm]{Images/ToyGrid}
\caption{Undirected graph of a stochastic ABM}
\end{figure}
Constructing a network based ABM using the logic of graph theory allows for the formal analysis of the simulation. Consider an ABM consisting of a series of $N$ cities (nodes) and $R < N^{2}-N$ directed roads (links). A question that can be asked of this model is ``does there exist a tour of all $N$ cities stopping at each city exactly once using the given roads?" (Altschuler \& Williams, 2017). This is a route problem known as the \textit{Hamiltonian path problem}. This is an NP-complete problem that is solved in non-deterministic polynomial time. The model can be developed in an ABM structure to set up a simple rule based system for the traversal of a single agent between nodes. Various algorithms based on the graph theory analysis of the problem can be implemented as actions by the agent based on its current state. Setting up the model in this way allows for both abstraction from its mathematical form into one which is easier to visualise, as well as an environment to enable sandbox testing of different graph structures. This simplification is a common thread in the design of ABMs and is a large reason for their widespread use in network analysis.
\section{Approximate Bayesian Computation}
\subsection{Bayesian Inference}
Bayesian inference is a method of statistical inference grounded in Bayes Rule. It states that the probability of some event A, given that event B has occurred, is given by:
\begin{align}
P(A|B) = \frac{P(B|A)P(A)}{P(B)}
\end{align}
In the context of Bayesian parameter estimation, we aim to find the posterior distribution of the parameters given the data:
\begin{align}
p(\theta|x) = \frac{p(x|\theta) p(\theta)} {p(x)},
\end{align}
where $p(\theta|x)$ is the posterior distribution, \\
$p(x|\theta)$ is the likelihood, \\
$p(\theta)$ is the prior, and \\
$p(x)$ is the probability of the data. Often the denominator $p(x)$ involves computing an integral to normalise the posterior to a probability distribution:
\begin{align}
p(x) = \int p(x|\theta)p(\theta)d \theta
\end{align}
In some cases, such as models where a conjugate prior is available, this is straightforward to calculate numerically. If no conjugate prior is available, there are a wide range of computational methods for sampling from the posterior. One of these is Markov chain Monte Carlo (MCMC). MCMC constructs a Markov chain with the target posterior dsitibution as its equilibrium distribution. By sampling from this chain for a long period of time, a sample from the posterior is obtained. A common algorithm for this is known as Metropolis Hastings, developed by Metropolis, Rosenbluth, Rosenbluth, Teller and Teller (1953). Formally, the algorithm uses a proposal distribution $g(x^{'}|x)$ as the conditional probability of accepting a state $x^{'}$ given $x$, and an acceptance ratio $A(x^{'}|x)$ as the probability of accepting the proposed state $x^{'}$.
\begin{align}
P(x^{'}|x) = g(x^{'}|x)A(x^{'}|x), \text{where} \\
A(x^{'}|x)= \text{min}\left(1,\frac{P(x^{'})}{P(x)}\frac{g(x|x^{'})}{g(x^{'}|x)}\right)
\end{align}
MCMC can be used for parameter inference in any class of statistical model where the likelihood $g(x^{'}|x)$ can be evaluated. Consider a simple generalised linear model of the form $\pi = \frac{1}{1 + \exp[-(\beta_{0} + \beta_{1}x_{i})]}$. Here the parameters are the intercept $\beta_{0}$ and a single coefficient $\beta_{1}$. The likelihood follows a Binomial distribution of the form
\begin{align}
L(p|x) = \frac{n!}{x!(n-x)!}p^{x}(1-p)^{n-x}
\end{align}
The use of this likelihood in the calculation of the acceptance probability will construct a Markov chain that converges on the posterior distributions for $\beta_{0}$ and $\beta_{1}$.
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/MCMC_Chain}
\caption{Convergence of the Markov Chain for $B_{0}$, following the initial burn in period}
\end{figure}
For a large class of statistical models, the likelihood is either prohibitively expensive to compute or intractable to calculate. This arises often in complex systems where stochastic processes are involved and as a result, methods such as MCMC cannot be used. An alternative method of approximating the posterior distribution is required for these problems, known as \textit{likelihood free inference}.
\subsection{Likelihood Free Inference}
The likelihood in a statistical model is a function of the parameters given the data, $f(\theta|x)$. In simple models following a known distribution this is easily calculated. However, in complex models the integral often has no closed form solution allowing it to be evaluated in a finite number of operations. An example of this is the \textit{g and k distribution}. \\
The g-and-k distribution is known as a quantile distribution, defined in terms of its inverse cumulative distribution function. It has five parameters - $\theta = \{a,b,c,g,k\}$, and its inverse cumulative distribution function is given by (Drovandi, Pettitt, 2011):
\begin{align}
Q^{gk} (z(p);\theta) = a+b\left(1+c\frac{1-\exp(-gz(p))}{1+\exp(-gz(p))}\right)\left(1+z(p)^{2}\right)^{k}z(p)
\end{align}
For a quantile distribution such as this, the likelihood cannot be calculated analytically, only numerically. In practice, simulating from the distribution to compute the likelihood is much more straightforward than the numerical calculation. We draw from the distribution by simulating values for substitution into the above function. This idea is the basis of likelihood free methods - the acceptance or rejection of samples in a simulation based model. There is ongoing development in these methods due to the advent of big data and the use of simulation models to evaluate parameters. Two such popular methods are known as \textit{Synthetic Likelihood} and \textit{Approximate Bayesian Computation}.
\subsubsection{Synthetic Likelihood}
Bayesian Synthetic Likelihood uses a multivariate normal approximation with $n$, the number of replicated model simulations, as a single tuning parameter (Price et al, 2018). In place of the likelihood of the summary statistic it uses:
\begin{align}
p_{A,n}(S_{y}|\theta) = \mathcal{N}(s_{y}; \mu_{n}(\theta), \Sigma_{n}(\theta))
\end{align}
where $s_{y}$ is a simulated summary statistic and $\mu_{n}(\theta)$ is a known data point for the parameter $\theta$. \\
An alternative form proposed by Wood (2010) uses an auxiliary likelihood based on a multivariate normal approximation. Auxiliary parameters $\mu(\theta)$ and $\Sigma(\theta)$ are used, where $\mu \in \mathbb{R}^{d}$ and $\Sigma$ is a $d \times d$ covariance matrix of a multivariate normal distribution. These parameters are unknown, but are generally simulated from the model based on $\theta$. The estimated auxiliary function is given by Price et al, (2018) as:
\begin{align}
&\mathcal{N}(s_{y}; \mu_{n}(\theta), \Sigma_{n}(\theta)),\text{where} \\
&\mu_{n}(\theta) = \frac{1}{n} \sum_{i=1}^{n}s_{i}, \\
&\Sigma_{n}(\theta) = \frac{1}{n-1}\sum_{i=1}^{n}(s_{i}-\mu_{n}(\theta))(s_{i}-\mu_{n}(\theta))^{T}
\end{align}
Bayesian synthetic likelihood arises when this auxiliary likelihood is combined with a prior distribution on the parameter (Price et al, 2018). Following Drovandi, Pettitt, and Lee (2015), BSL samples from the following target:
\begin{align}
p_{A,n}(\theta|s_{y}) &\propto p_{A,n}(s_{y}|\theta)p(\theta), \text{where} \\
p_{A,n}(s_{y}|\theta) &= \int_{S^{n}}\mathcal{N}(s_{y};\mu_{n}(\theta),\Sigma_{n}(\theta))\prod_{i=1}^{n}p(s_{i}|\theta)ds_{1:n}
\end{align}
This produces an unbiased estimate of $p_{A,n}(s_{y}|\theta)$. The ideal BSL target will be achieved as $n \rightarrow \infty$ (Price et al, 2018).
\subsubsection{Approximate Likelihood by Simulation}
In comparison, ABC non-parametrically approximates the likelihood of the summary statistic as:
\begin{align}
p_{\epsilon,n}(s_{y}|\theta) = \frac{1}{n} \sum_{i=1}^{n}K_{\epsilon}(p(s_{y},s_{i}))
\end{align}
$p(s_{y},s_{i})$ measures the distance between the observed and simulated data with some distance metric. Often this is chosen as the Euclidean distance, $\sum_{i=1}^{n}(s_{y} - s_{i})^{2}$. As with BSL, the ABC framework will converge on the posterior distribution as $n \rightarrow \infty$.
\subsection{ABC Overview}
ABC aims to approximate a posterior distribution without the existence of the likelihood function $P(y|\theta)$. In essence this is achieved by simulating data with a set of prior parameters $\theta^{'}$. The simulated data is then compared with the observed data in some capacity - either in totality or via a set of summary statistics. If the simulated data is deemed close enough to the observed data (using a defined distance measure), the set of sampled prior parameters belongs to the approximated posterior distribution $P(\theta | d(y^{*}, y) \leq \epsilon)$. Formally this can be denoted as
\begin{align}
p(\theta|x^{*}) &= \frac{f(x^{*}|\theta)\pi(\theta)}{p(x^{*})} \\
\approx p_{\epsilon}(\theta|x^{*}) &= \frac{\int f(x|\theta)\pi (\theta)\mathbbm{1}_{\Delta(x,x^{*})\leq \epsilon}dx}{p(x^{*})},
\end{align}
where $\mathbbm{1}_{\Delta(x,x^{*})\leq \epsilon}$ denotes the set of sampled points where the distance measure meets the epsilon threshold. \\
While ABC algorithms are well grounded in mathematical theory, they make a number of assumptions and approximations. These need to be carefully assessed before considering the use of ABC for a given model.
As $\epsilon \rightarrow \infty$ and $N \rightarrow \infty$, $\theta_{sim} = \theta$. Practically, we need to set $\epsilon \neq 0$ to approximate the posterior in a reasonable amount of time. With a high dimensional parameter space, the probability of simulating prior parameters equal to that of the posterior is extremely small. As $\epsilon$ increases, the posterior distribution shifts more towards the prior. A key component of ABC is choosing $\epsilon$ such that the posterior is calculated both accurately and within a reasonable amount of time. One such approach is to run the algorithm a large number of times and consider the top $k\%$ of the sampled parameters as the acceptance area. Another is to run the algorithm multiple times until a desired $k\%$ of $N$ is attained. \\
A second potential issue is in the use of summary statistics. In most cases the complete dataset is high in dimensionality. When comparing the observed and simulated data, most samples will be rejected and the algorithm will need to be run for an impractical amount of time. If the data is reduced to a set of summary statistics such that $dim(s) << dim(y^{*})$, this curse of dimensionality is avoided. However, a poor choice of summary statistics will result in a biased posterior that is not truly representative. Additionally, the credible intervals will be inflated due to a loss of information (``Approximate Bayesian computation," n.d.). This can be resolved by choosing a \textit{sufficient statistic}, which completely explains the original dataset using a smaller subset of statistics.
\subsubsection{Summary Statistics}
When reducing the dimensionality of a sample with a summary statistic, care must be taken to choose summary statistics that produce an unbiased approximation of the posterior distribution. R.A. Fisher (1922) defined a summary statistic as \textit{sufficient} if ``no other statistic which can be calculated from the same sample provides any additional information as to the value of the parameter to be estimated". If the summary statistic is a sufficient statistic, the posterior distribution will be equivalent to the posterior distribution computed with the full dataset, given by:
\begin{align}
f(y^{*}|\theta) \propto f(s(y^{*})|\theta),
\end{align}
where $s(y^{*})$ is a sufficient statistic for the data $y^{*}$. \\
Let $D=\{X_{1},...,X_{n}\}$ be a random sample from a probability distribution with some parameter $\theta$. A summary statistic $S(D)$ is sufficient for a parameter $\theta$ if the conditional probability distribution of the full data $D$ given $S(D);\theta$, does not depend on the parameter $\theta$ (Aeschbacher, Beaumont \& Futschik, 2012).
\begin{align}
\pi(D=d|S(D) = s,\theta) = \pi(D=d|S(D)=s)
\end{align}
In the absence of a sufficient statistic, which is often the case in a complex system, a tradeoff must be found between a loss of information and dimensionality reduction. The incorrect choice of summary statistics will result in a biased posterior which is not representative of the data. Methods exist to find summary statistics which contain the maximum amount of information about the parameters of interest. One such method is \textit{Partial least squares regression}. \\
Partial least squares (PLS) is a projection technique which ``aims to produce linear combinations of covariates which have high covariance with responses and are uncorrelated with each other" (Sisson et al, 2018). In the context of ABC, the covariates are denoted as $z_{1},...,z_{k}$, and the responses as $\theta_{1},...\theta_{p}$. The \textit{i}$^{th}$ PLS component $u_{i} = \alpha_{i}^{T} z$ maximises
\begin{align}
\sum_{j = 1}^{p}\text{Cov}(u_{i},\theta_{j})^{2},
\end{align}
subject to Cov($u_{i},u_{j}$) = 0 for $j < 1$ and a normalisation constraint on $
\alpha_{i}$ such that $\alpha_{i}^{T}\alpha_{i}$ = 1 (Sisson et al, 2018). The resulting components can be viewed as a lower dimensional set of statistics than the original data, and can hence be used in ABC in place of the original data for more efficient inference. An advantage of projection methods such as PLS is in their interpretability. It is easy to understand how maximising the variance of dimensions in a dataset $D$ into a subset $z$ will often result in a sufficient representation of $D$. \\
Another set of techniques to reduce the dimensionality of the data are known as \textit{subset selection methods}. Joyce and Marjoram (2008) propose a step-wise selection approach, where candidate summary statistics are added and/or removed to a subset, and the effect evaluated on the ABC posterior. The rationale behind this is if the set of statistics are sufficient, adding further such statistics will not affect the likelihood of the resulting posterior; however removing statistics will. From Joyce and Marjoram (2008), the technique deems a change to the subset as significant if:
\begin{equation}
\left|\frac{\hat{\pi}_{ABC}(\theta|S^{'}(y_{obs}))}{\hat{\pi}_{ABC}(\theta|S(y_{obs}))}-1 \right|>T(\theta),
\end{equation}
where $\hat{\pi}_{ABC}$ is an estimated posterior density based on the output from rejection ABC (Sisson et al, 2018). \\
There exist many other techniques to reduce a large dataset to a smaller set of summary statistics, in addition to ongoing research into new techniques. Each of them have strengths and weaknesses, and therefore should be carefully evaluated when using them in a particular model.
\subsection{Rejection ABC}
The simplest ABC algorithm, rejection sampling, is a straightforward procedure of simulating data with some given set of parameters and evaluating the data against a set of observed data. The algorithm proceeds as follows:
\begin{algorithm}[H]\caption{ABC Rejection}\label{abc-rej}
\begin{algorithmic}[1]
\State Compute a summary statistic $s(y)$ from the observed data
\State Define a distance measure $d(s(y), s(\hat{y}))$
\State Define an distance threshold $\epsilon$
\For {$i=1$ to $N$}
\State Sample a set of parameters from the prior distribution $\theta^{*} \sim \pi(\theta^{*})$
\State Simulate a dataset given the sampled parameters: $x^{*} \sim \pi(x^{*}|\theta^{*})$
\State Compute a summary statistic $s(\hat{y})$ for the simulated data
\State If $d(s(y), s(\hat{y})) < \epsilon$, keep the parameters $\theta^{*}$ as a sample from $\pi(\theta | x)$, otherwise reject
\EndFor
\State Approximate the posterior distribution $\theta$ from the distribution of accepted parameter values $\hat{\theta}$
\end{algorithmic}
\end{algorithm}
Direct evaluation of the likelihood is not carried out in the above algorithm. For almost any model where data is observed, data can be simulated, and there exists a set of parameter values to be inferred, rejection ABC can be used as a straightforward approach to approximate the posterior distribution. This is achieved by noting that the acceptance probability of a given parameter is proportional to the probability of generating the observed data $y_{obs}$, under the model $p(y|\theta)$ for a fixed parameter vector $\theta$. For a fixed $\theta$, if we generate a dataset from the model $y\sim p(y|\theta)$, then the probability of generating our observed dataset exactly, so that $y=y_{obs}$, is equal to $p(y_{obs}|\theta)$ (Sisson, 2018).
\subsubsection{Regression Adjustment in Rejection ABC}
Regression adjustment is a technique commonly used in Bayesian methods where sampling techniques are proposed to account for discrepancies between simulated and observed summary statistics (Blum, 2017). In the context of ABC, the set of posterior parameters following the simulation are adjusted using weights proportional to the distances between the simulated and summary statistics. This approach gives weighting to parameters which give simulated data closer to the observed data. The parameter values are adjusted by fitting a regression model of the relationship between the posterior parameters and the simulated data (Francious, 2010):
\begin{align}
\theta_{s} = \alpha + \beta(y-y_{s}) + \mathcal{E}_{s}, s = 1,...,N_{\epsilon}
\end{align}
The linear model is fit as above, and the parameters are corrected as follows (Francious, 2010):
\begin{align}
\theta^{*}_{s} = \hat{\alpha} + \mathcal{E}_{s} = \theta_{s} = \hat{\beta}(y-y_{s})
\end{align}
This method can result in significantly improved posterior estimates for rejection ABC. When $y$ is high in dimensionality, non-linear regression adjustment is often favoured, through a number of techniques such as GAM's, ridge regression and feed-forward neural networks (Francious, 2010).
\subsection{ABC-SMC}
A limitation of the rejection algorithm is a low acceptance rate when the prior is very different to the posterior. Beaumont et al (2009) proposed a particle filtering based method known as ABC-SMC. This algorithm alleviates the issue of low acceptance rates by avoiding low rejection rates of the sampling region and gradually evolving towards the target posterior through population filters. In high dimensional data from a complex system this results in a large gain in efficiency. The algorithm proceeds as follows: \\
\begin{algorithm}[H]\caption{ABC-SMC (Beaumont et al, 2009)}\label{abc-smc}
\begin{algorithmic}[1]
\State Initialize threshold schedule $\epsilon_{1} > ... > \epsilon_{T}$
\State Set $t = 1$
\For {$i=1$ to $N$}
\State Simulate $\theta_{i}^{(1)} \sim p(\theta)$ and $x \sim p(x|\theta_{i}^{(1)})$ until $p(x,x_{obs}) < \epsilon_{1}$
\State Set $w_{i} = 1/N$
\EndFor
\For {$t=2$ to $T$}
\For {$i = 1,...,N$}
\State Repeat:
\Indent
\State Pick $\theta_{i}^{*}$ from the $\theta_{j}^{(t-1)}$'s with probabilities $v_{j}^{(t-1)}$,
\State Draw $\theta_{i}^{(t)} \sim K_{\theta,t}(\theta_{i}^{(t)}|\theta_{i}^{*}$ and $x \sim p(x|\theta_{i}^{(t)});$
\EndIndent
\State until $p(x,x_{obs}) < \epsilon_{t}$
\State Compute new weights as
\State \begin{align}
w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}
\end{align}
\State Normalise $w_{i}^{(t)}$ over $i = 1,...,N$
\EndFor
\EndFor
\end{algorithmic}
\end{algorithm}
$K_{\theta,t}$ in step 14 of the algorithm is chosen as a conditional density that serves as a transition kernel to “move” sampled parameters and then appropriately weight accepted values. In contexts of real-valued parameters, for example, $K_{\theta,t}(\theta|\theta^{*})$ might be taken as a multivariate normal or $t$ density centred at or near $\theta^{*}$, and whose scales may decrease as $t$ increases. (Bonassi \& West, 2015). Kernel choice is discussed further in Section 5.5.1.\\
The algorithm constructs $T$ intermediary distributions with increasingly small tolerance schedules. The tolerances $\epsilon$ are chosen such that gradual evolution towards the target posterior is achieved. The algorithm continues until $N$ particles have been accepted in population $T$. The final set of particles is an approximation of the posterior distribution. The inclusion of a weight calculation for each particle in a population enables the sampling from population $t-1$ with probabilities equal to the normalised weights. These weights are calculated such that particles further from the population mean are sampled and refined. \\
The ABC-SMC algorithm addresses the main drawback of rejection ABC in the inefficiency of sampling parameters with a high distance from the posterior, and hence rejecting a large number of samples. The repeated sampling from posterior approximations results in a distribution closer to the posterior distribution (Beaumont, 2010). One drawback exists in the decreasing epsilon tolerance. If the quantile of the distances from which to reduce epsilon is appropriately chosen, the number of accepted samples in each population will not decrease significantly as $\epsilon$ decreases. However, setting this quantile too high will reduce $\epsilon$ such that a larger proportion of samples are rejected, eliminating a key advantage of the SMC approach. This can be addressed by either calculating $\epsilon$ at each population using an adaptive method (described in Section 5.5.3), or including conditional density estimation for the final population sample. \\
An extension to the original SMC algorithm was proposed by Bonassi \& West (2015). A joint kernel $K_{t}(x,\theta|x^{*},\theta^{*})$ is used on the joint distribution of accepted values $(x,\theta)$ to raise the importance of proposals where the simulated data $x_{i}$ is close to $x_{obs}$. This addition is known as ABC-SMC with Adaptive Weights. The algorithm proceeds as follows:
\begin{algorithm}[H]\caption{ABC-SMC with Adaptive Weights (Bonassi \& West, 2015)}\label{abc-smc}
\begin{algorithmic}[1]
\State Initialize threshold schedule $\epsilon_{1} > ... > \epsilon_{T}$
\State Set $t = 1$
\For {$i=1$ to $N$}
\State Simulate $\theta_{i}^{(1)} \sim p(\theta)$ and $x \sim p(x|\theta_{i}^{(1)})$ until $p(x,x_{obs}) < \epsilon_{1}$
\State Set $w_{i} = 1/N$
\EndFor
\For {$t=2$ to $T$}
\State Compute data based weight $v_{i}^{(t-1)} \propto w_{i}^{(t-1)}K_{x,t}(x_{obs}|x_{i}^{(t-1)})$
\State Normalise weights $v_{i}^{(t-1)}$ over $i = 1,...,N$
\For {$i=1$ to $N$}
\State Repeat until $p(x,x_{obs}) < \epsilon_{t}$:
\Indent
\State Pick $\theta_{i}^{*}$ from the $\theta_{j}^{(t-1)}$'s with probabilities $v_{j}^{(t-1)}$,
\State Draw $\theta_{i}^{(t)} \sim K_{\theta,t}(\theta_{i}^{(t)}|\theta_{i}^{*}$ and $x \sim p(x|\theta_{i}^{(t)});$
\EndIndent
\State Compute new weights as
\State \begin{align}
w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}
\end{align}
\EndFor
\State Normalise $w_{i}^{(t)}$ over $i = 1,...,N$
\EndFor
\end{algorithmic}
\end{algorithm}
The added step of updating the data based weights adds computation time, although this is usually negligible in comparison to the simulation time (Bonassi \& West, 2015). The addition of adaptive weights increases the proportion of accepted samples in comparison to Algorithm 2, and hence decreases the overall number of simulations. As the simulations tend to dominate computation time, ABC-SMC with Adaptive Weights tends to be more computationally efficient than ABC-SMC.
\subsubsection{Choice of Pertubation Kernel in ABC-SMC}
From each time step $t = 2,...T$, the weights at population $t$ are calculated using a pertubation kernel:
\begin{align}
w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})},
\end{align}
where $p(\theta_{i}^{(t)})$ is the probability of the sampled parameter given the prior, and \\
$K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})$ is the probability of the sampled parameter given the previous population. \\
A balance needs to be obtained in this kernel such that the parameter space is sufficiently explored, but not so extensively to cause a low acceptance rate (Filippi, 2016). The properties of an optimal kernel are derived from sequential importance sampling theory. Similarity is assessed between two joint distributions $(\theta^{(t-1)},\theta^{(t)})$ where $\theta^{(t-1)} \sim p_{\epsilon_{t-1}}$. $\theta^{(t)}$ is constructed by pertubing $\theta^{(t-1)}$ and accepting it according to some threshold $\epsilon_{t}$, which is reduced at each time step. Resemblance between the two distributions is the first criteria of an optimal kernel. An optimisation problem is solved to balance sufficiently exploring the parameter space while maintaining a high acceptance rate (Filippi, 2016). Filippi (2016) gives this as the solution to:
\begin{align}
& 1.\quad q_{\epsilon_{t-1},\epsilon_{t}}(\theta^{(t-1)},\theta^{(t)}|x) \\
& = \frac{p_{\epsilon_{t-1}}(\theta^{(t-1)}|x)K_{t}(\theta^{(t)}|\theta^{(t-1)})\int f(x|\theta^{(t)})\mathbbm{1}(\Delta(x^{*},x)\leq \epsilon_{t})dx}{\alpha(K_{t},\epsilon_{t-1},\epsilon_{t},x)} \\
\text{and} \\
& 2. \quad q^{*}_{\epsilon_{t-1},\epsilon_{t}}(\theta ^{(t-1)},\theta^{(t)}|x) = p_{\epsilon_{t-1}}(\theta^{(t-1)}|x)p_{\epsilon_{t}}(\theta^{(t)}|x)
\end{align}
This resemblance is in terms of the Kullback - Leibler divergence (Filippi et al, 2013).
\begin{align}
& KL(q_{\epsilon_{t-1},\epsilon_{t}};q^{*}_{\epsilon_{t-1},\epsilon_{t}}) = -Q(K_{t},\epsilon_{t-1},\epsilon_{t},x) + \log \alpha (K_{t},\epsilon_{t-1},\epsilon_{t},x) + C(\epsilon_{t-1},\epsilon_{t},x) \\
\text{where} \\
& Q(K_{t},\epsilon_{t-1},\epsilon_{t},x) = \iint p_{\epsilon_{t-1}}(\theta^{(t-1)}|x) p_{\epsilon_{t}}(\theta^{(t)}|x) \log K_{t}(\theta^{(t)}|\theta^{(t-1)})d\theta^{(t-1)}d\theta^{(t)}
\end{align}
There are multiple choices of a kernel to achieve this balance. As with the selection of summary statistics, each should be carefully considered according to the model to be developed. When using ABC to validate and infer parameters of a complex system, it is vital to optimise the algorithm such that the kernel is not sampling from areas of the parameter space which give rise to output far from that of the observed data. On the other hand, a local pertubation kernel will not move the particles sufficiently and therefore may fail to find the true posterior. \\
The joint proposal distribution in the ABC-SMC algorithm corresponds to sampling a particle from the previous population $t-1$ and pertubing it to obtain a new particle (Filippi et al, 2013). The process typically proceeds as follows:
\begin{enumerate}
\item Sample a particle $\theta_{i}^{(t-1)}$ from the previous population $t-1$ using probabilities $w^{(t-1)}$
\item Pertube this particle to obtain $\theta_{i}^{(t)}$
\item Calculate the weight for the particle as the sum of the previous population weights multiplied by a kernel, comparing the newly pertubed particle to each particle in the previous population
\end{enumerate}
\subsubsection{Component wise pertubation kernel}
From Filippi et al (2013), for each element in the parameter vector $\theta = \{\theta_{1},...,\theta_{n}\}$, each individual component $1 \leq j \leq d$ of the vector is pertubed independently using a Gaussian distributed parameterised by mean $\theta_{j}$ and variance $\sigma^{2}_{j}$. Filippi et al (2013) shows this with the form:
\begin{align}
K_{t}(\theta^{(t)}|\theta^{(t-1)}) = \prod_{j=1}^{d} \frac{1}{\sqrt{2 \pi \sigma_{j}^{(t)}}}\exp{\{ -\frac{(\theta_{j}^{(t)}-\theta_{j}^{(t-1)})^{2}}{2 \sigma_{j}^{(t)2}} \}}
\end{align}
\subsubsection{Multivariate normal pertubation kernel}
It is often the case in models with a large number of parameters that correlation exists between some of the parameters. When using a component-wise pertubation kernel, this can lead to an inadequate reflection of the true posterior (Filippi et al, 2013). We can take into account this correlation by using a multivariate Gaussian distribution, which constructs a covariance matrix for the current population $\Sigma^{(t)}$. Again, using the Kullback-Leibler divergence allows for the calculation of an optimal covariance matrix. From Filippi et al (2013), this yields:
\begin{align}
&\Sigma^{(t)} \approx \sum_{i=1}^{N} \sum_{k=1}^{N_{0}}\omega^{(i,t-1)}\tilde{\omega}^{(k)}(\tilde{\theta}^{(k)}-\theta^{(i,t-1)})(\tilde{\theta}^{(k)}-\theta^{(i,t-1)})^{T}, \text{where} \\
&\{\tilde{\theta}^{(k)}\}_{1 \leq k \leq N_{0}} = \{\theta^{(i,t-1)} s.t \Delta (x^{*},x^{(i,t-1)}) \leq \epsilon_{t}, 1 \leq i \leq N \}
\end{align}
In practice this kernel is a popular choice in sequential sampling models, although many other options exist. Consider a set of parameters which are correlated but in a non-linear way. In this case we may wish to construct a covariance matrix for each particle to take into account the non-linear structure. There are multiple ways to do this, however for the purposes of simplicity we will restrict ourselves to using a Gaussian pertubation kernel without taking into account local correlation. For more information about local pertubation kernels, see Filippi et al (2013). \\
Consider a model where the parameter kernel $w_{i}$ and data based kernel $v_{i}$ (Step 8 of Algorithm 3) are both chosen as a multivariate Gaussian kernel. The data based and parameters weights respectively are updated as:
\begingroup
\large
\begin{align}
&f_{\mathbf{x}}(x_{1},...,x_{k}) = \frac{\exp(-\frac{1}{2}(\mathbf{x-\boldsymbol{\mu}})^{T}\boldsymbol{\Sigma}^{-1}(\mathbf{x-\boldsymbol{\mu}}))}{\sqrt{(2 \pi)^{k}|\boldsymbol{\Sigma}}|},
\end{align}
\endgroup
where $\mathbf{x}$ is a vector of proposed values, $\boldsymbol{\mu}$ is a vector of means of the previous population, and $\boldsymbol{\Sigma}$ is a positive-definite, symmetric covariance matrix.\\
As mentioned previously, this kernel will both explore the parameter space while maintaining a high acceptance rate. Each particle is sampled from the previous population and pertubed using a normal distribution. In the case that the chosen particle is resampled such that the simulated data is closer to the observed data, it will be accepted to the current population. If the observed data is further away and the parameter rejected, the particle from the previous population is `thrown out' and a new particle is resampled. The result is both a reduction in variance and convergence on the posterior mean, with the decreasing epsilon threshold acting to move the particles closer to the posterior. \\
This is demonstrated using a simple example of inferring the mean of a Gaussian distribution. The choice of pertubation kernel here involves finding the probability of the proposed $\mu$ given the prior mean and standard deviation, and dividing this by the probability of the proposed $\mu$ given the mean and standard deviation of the previous population, multiplied by the weights of the previous population. The prior mean is defined as $\theta \sim N(0,10)$. The weights are updated as:
\begin{align}
w_{i}^{(t)} &\propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}, \text{where} \\
p(\theta_{i}^{(t)}) &= f(\mu_{i}^{'(t)}|\mu_{\theta},\sigma_{\theta}), \text{and} \\
K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)}) &= f(\mu_{i}^{'(t)}|\mu^{t-1},\sigma^{t-1})
\end{align}
$p(\theta_{i}^{(t)})$ is the probability of the proposed theta given the prior mean and variance, and \\
$K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})$ is a kernel function which sums the probabilities of the proposed $\theta$ given each particle in the previous population and the variance of the previous population. The function $f$ in the these kernels is the probability density function of a normal distribution. \\
\begin{table}[H]
\centering
\begin{tabular}{cccccc}
\hline
Running Time & Known $\mu$ & Initial Epsilon & Distance Measure & Population Size \\
\hline
201 seconds & 0.086 & 1 & $\frac{1}{N} \times \text{abs}(y^{*}-y)$ & 2500\\
\hline
\end{tabular}
\end{table}
By the seventh population the algorithm has converged on the true parameter. Each subsequent population reduces the variance.
\begin{table}[H]
\centering
\begin{tabular}{rrrrrr}
\hline
& Iteration & $\mu$ & Epsilon & Mean Distance & Mean Loops Per N \\
\hline
1 & 1 & -0.022 & 1.000 & 0.506 & 12.899 \\
2 & 7 & -0.033 & 0.151 & 0.074 & 2.172 \\
3 & 14 & -0.036 & 0.019 & 0.009 & 8.650 \\
4 & 20 & -0.034 & 0.003 & 0.002 & 48.249 \\
\hline
\end{tabular}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/"Normal_ABC-SMC".pdf}
\caption{Progression in the posterior mean with a known $\mu$ = -0.035.}
\end{figure}
\subsubsection{Choice of Epsilon Threshold}
The approach to reducing epsilon at each population is another detail of the ABC-SMC algorithm which impacts on efficiency. Often, $\epsilon$ at each population is adjusted using a quantile based approach (Beaumont et al, 2009). For each corresponding distance vector at population $t-1$, adjust $\epsilon$ by some chosen quantile $\alpha$.
\begin{align}
\alpha\{\Delta (x^{(i,t-1)},x^{*})\}_{1 \leq i \leq N}
\end{align}
Both the choice of initial epsilon and alpha will determine the balance between computational and statistical efficiency. As mentioned previously, $\epsilon = 0$ will produce an exact posterior, but in a complex system with multiple dimensions will run for an impractical length of time. \\
One drawback to the quantile based method is that for a large alpha, the algorithm may fail to converge on the posterior. A remedy of this is to use a threshold-acceptance rate curve (Filippi, 2016). This is achieved with the following algorithm:
\begin{algorithm}[H]\caption{Adaptive method for epsilon threshold choice (S. Filippi, 2016)}\label{adaptive-epsilon}
\begin{algorithmic}[1]
\State For each population $t$,
\Indent
\State Generate a population of pertubed particles
\State Fit a Gaussian mixture model to the pertubed population
\State Estimate \begin{align}
p_{t}(x) = \int q_{t}(\theta)f(x|\theta)d\theta
\end{align}
using the unscented transform independently for each Gaussian mixture
\State Estimate \begin{align}
\alpha_{t}(\epsilon) = \int p_{t}(x)\mathbbm{1}(\Delta(x,x^{*})\leq \epsilon)dx
\end{align}
\EndIndent
\end{algorithmic}
\end{algorithm}
\subsection{Parallelising ABC}
There are three methods of controlling the balance between computational speed and posterior accuracy in the ABC-SMC algorithm - the choice of epsilon in each population, the size of the populations, and the number of populations. If the model complexity is small or the computation time is not a concern, the epsilon array can be set to small values, with a large number of populations and a large number of particles in each population. For a complex system with multiple parameters and high dimensional data, the computation time of the algorithm increases exponentially. The two principal reasons for this are 1). The time to run the simulation with the prior parameters and 2). Looping until the epsilon threshold is reached for each sample of the current population. Adjusting the two settings mentioned above will help to reduce the computation time. \\
An additional measure is that of parallelisation. In the advent of big data there now exist several methods for conducting complex analysis on cluster computing systems. A cluster system comprises of two or more computers working together to perform tasks (ESDS, 2014). They are particularly suited to complex computational tasks which can be divided into many smaller tasks for each computer (node). For the analysis of large datasets it is important to design statistical algorithms which are well suited to this infrastructure. In some cases this is straightforward. In the rejection ABC algorithm, the number of desired loops can be divided between each node and the results merged at the end of the computation. With more complex ABC algorithms with dependencies amongst steps this is less clear. In each population of ABC-SMC there is a dependence on the distance, weight and parameter values from the previous population. Simulations within the current population $t$ can be executed in parallel, and the results sent back to the master node for evaluation until the population threshold $N$ is reached. As the simulation time dominates when using ABC to infer for an ABM, this method of parallelisation can result in a significant decrease in computation time.
\subsection{ABC Inference of a Gaussian Distribution}
Two ABC models were developed to infer the mean and standard deviation of a normal distribution - Rejection ABC and ABC-SMC with Adaptive Weights. The true mean was taken to be approximately 4. A Normal prior $\theta^{1}$ was set for the mean and a Gamma prior $\theta^{2}$ for the standard deviation.
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
True Mean & True SD & Mean Prior $\theta^{1}$ & SD Prior $\theta^{2}$ \\
\midrule
4 & 1.5 & $\sim N(2,3)$ & $\sim Gamma(1,3)$ \\
\bottomrule
\end{tabular}
\caption{Normal Mean and SD Inference Model}
\end{table}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Iterations & $\epsilon$ & Acc Rate & Running Time & $\mu(\theta^{1})$ & $\sigma^{2}(\theta^{1})$ & $\mu(\theta^{2})$ & $\sigma^{2}(\theta^{2})$ \\
\midrule
30000 & 0.5 & 3.5\% & 25s & 3.973 & 0.124 & 1.46 & 0.121 \\
\bottomrule
\end{tabular}
\caption{Rejection ABC model}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/Rejection-Posterior}
\caption{Posterior Distributions of the Rejection ABC Model}
\end{figure}
Rejection ABC with a epsilon of $\epsilon = 0.5$ and $N = 30,000$ results in a high rejection rate of 96.5\%. This can be adjusted through a more informative prior, although in many cases this is not available. Another adjustment is in epsilon. If this is increased, more samples will be accepted with the tradeoff of a less accurate posterior. The acceptance rate of 3.5\% appears to give an accurate posterior.
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}cccc}
\toprule
Populations & Iterations & Epsilon & Running Time \\
\midrule
5 & [16139, 17518, 18857, 20232] & [1, 0.74, 0.56, 0.44, 0.35] & 117s \\
\bottomrule
\end{tabular}
\caption{ABC-SMC model}
\end{table}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
$\mu(\theta^{1})$ & $\sigma^{2}(\theta^{1})$ & $\mu(\theta^{2})$ & $\sigma^{2}(\theta^{2})$ \\
\midrule
4.006 & 0.07 & 1.50 & 0.099 \\
\bottomrule
\end{tabular}
\caption{ABC-SMC posterior estimates}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/SMC-Posterior}
\caption{Posterior Distributions of the ABC-SMC Model}
\end{figure}
The ABC-SMC model has a longer running time, but reduces the variance of both posterior estimates $\mu$ and $\sigma$. The acceptance rate at the final population is 50\%, which is significantly higher than the rejection model. The increase in computation time is due to the multiple populations and increased time spent computing weights. For a complex model, the reduced time spent simulating data will outweigh this. The posterior mean estimates are slightly closer to the true mean.
\subsection{Validation of an ABM using ABC}
A challenge in designing an ABM to represent a complex system is representing the system in an accurate manner. Where there is observed data for a system, an ABM can be said to be validated against such a system if its output (simulated data) is close to the system's observed data. ABC is a suitable approach for this validation. If an ABM is designed with control from a set of parameters, ABC can be used to run the simulation with a set of prior parameters. If the ABC is modelled correctly, it will converge on a set of parameters which will produce simulated data close to the observed data from the system that the ABM is modelled from. In comparison to the `brute force' method described in Section 3.1, significantly less time is spent simulating data using parameters far from the true parameters of the system. Further models will focus on the use of ABC algorithms to infer parameters for an Agent Based Model. While the final pedestrian model is relatively simple in nature, it serves as a basis for the addition of larger amounts of data, a higher dimension of parameters, and a more complex ABM environment.
\section{ABC Inference of an ABM}
A simple stochastic model was created in NetLogo to demonstrate the use of ABC within an ABM. The simulation consists of a stochastic process with seven nodes arranged in a fork pattern (described in Section 4). This is taken to be a pedestrian network where nodes represent intersections and connections between the nodes are paths. All agents begin at the tail node 6 and travel to a connected node at each step. Observed data is first collected by setting all turning parameters to $\tfrac{1}{3}$ with the exception of arriving at Node 0 from 3. The probability of travelling vertically to 0 is set to 0.9. When this direction is taken, the action is denoted as $P(3^{\leftarrow 5}_{\rightarrow 0})$. That is, when the agent has travelled from 5 to 3, it then travels to 0.
\begin{figure}[H]
\centering
\includegraphics[width=5cm]{Images/ToyGrid}
\caption{Directed graph of the Toy CBD model}
\end{figure}
Observed data was taken as an average of counts at Node 0 over ten runs. The known parameters are
\begin{align}
N(\text{Pedestrians}) = 15 \\
P(3^{\leftarrow 5}_{\rightarrow 0}) = 0.9
\end{align}
In reality, the number of pedestrians in any given system is often not known. While the proportional differences between the node counts depends on the directional probabilities, the magnitude of the counts is dependent on the number of pedestrians in the system. The observed data was an average of the count at node zero over ten runs, calculated as $x$. The prior parameters are
\begin{align}
P(3^{\leftarrow 5}_{\rightarrow 0}) \sim Beta(2, 2) \\
N(\text{Pedestrians}) \sim Unif(5,20)
\end{align}
The Beta distribution is a family of continuous probability distributions defined over the interval [0,1]. It is characterised by two parameters $\alpha$ and $\beta$ which control the shape. The expected value and variance of the distribution are defined as
\begin{align}
E[X] = \frac{a}{a+b}, \quad Var[X] = \frac{ab}{(a+b)^{2}(a+b+1)}
\end{align}
It is commonly used as a prior in Bayesian statistics to describe the probability of an event. It is the conjugate prior probability distribution for the Bernoulli, Binomial, Negative Binomial and Geometric distributions. A flat prior can be defined as $Beta(1,1)$. In the following example a prior of $Beta(2,2)$ was used as a wide prior, assuming little knowledge about the true probability. The expected value and variance of the Beta prior is given as
\begin{align}
E[X] &= \frac{a}{a+b} = \frac{2}{4} = \frac{1}{2} \\
Var[X] &= \frac{ab}{(a+b)^{2}(a+b+1)} = \frac{4}{(4)^{2}(5)} = 0.05
\end{align}
\begin{figure}[H]
\centering
\includegraphics[width=7cm]{Images/Beta22}
\caption{The Beta(2,2) prior distribution for the Toy Model.}
\end{figure}
Both Rejection ABC and ABC-SMC were used to infer the Beta parameter. The following algorithms were used:
\begin{algorithm}[H]\caption{ABC Rejection - Toy Model}\label{abc-rej}
\begin{algorithmic}[1]
\State Compute $\frac{1}{n}\sum_{i = 1}^{10}y(100)$, where $y$ is the count at Node 0 after 100 simulation ticks
\State Define a Euclidean distance measure $d(s(y), s(\hat{y})) = (s(y) - s(\hat{y}))^{2}$
\State Define a Beta prior distribution $\theta$ as $P(3^{\leftarrow 5}_{\rightarrow 0}) \sim Beta(2, 2)$
\For {$i=1$ to $1000$}
\State Sample a parameter from the prior distribution $\theta$
\State Simulate a dataset given the sampled parameter: $y^{*} \sim \pi(y^{*}|\theta^{*})$
\State Compute a summary statistic $s(\hat{y})$ for the simulated data
\State Add $d(s(y), s(\hat{y}))$ and $\theta_{i}$ to the distances vector
\EndFor
\State Find $\hat{\theta}$ as the top 1\% of the distances vector by distance
\State Approximate the posterior distribution $\theta$ from the distribution of accepted parameter values $\hat{\theta}$
\end{algorithmic}
\end{algorithm}
\begin{algorithm}[H]\caption{ABC-SMC}\label{abc-smc}
\begin{algorithmic}[1]
\State Compute $\frac{1}{n}\sum_{i = 1}^{10}y(100)$, where $y$ is the count at Node 0 after 100 simulation ticks
\State Set $\epsilon_{1} = 20$ and $t = 1$
\State Define a Beta prior distribution $\theta$ as $P(3^{\leftarrow 5}_{\rightarrow 0}) \sim Beta(2, 2)$
\State Define a Euclidean distance measure $d(s(y), s(\hat{y})) = (s(y) - s(\hat{y}))^{2}$
\For {$i=1$ to $N$}
\State Simulate $\theta \sim p(\theta)$
\State Simulate $x \sim p(x|\theta)$ until $p(x,x_{obs}) < \epsilon_{1}$
\State Set $w_{i} = 1/N$
\EndFor
\For {$t=2$ to $T$}
\State Set $\epsilon_{t}$ as $0.75 \times \frac{1}{N} \sum_{i=1}^{N}t_{i}$
\State Calculate the weighted mean of the previous parameters as $\theta = \sum_{i=1}^{N}\theta^{(1)}_{i} w_{i}$
\For {$i=1$ to $N$}
\State Repeat until $p(x,x_{obs}) < \epsilon_{t}$:
\Indent
\State Pick $\theta$ from the $\theta^{(t-1)}$'s with probabilities $v_{j}^{(t-1)}$,
\State Simulate $x \sim p(x|\theta)$
\EndIndent
\State Compute new weights as
\State \begin{align}
w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}
\end{align}
\EndFor
\State Normalise $w_{i}^{(t)}$ over $i = 1,...,N$
\EndFor
\end{algorithmic}
\end{algorithm}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Prior $g(\theta)$ & Observed Data & Summary Statistic \\
\midrule
$\!\begin{aligned}[t]
&\theta = Beta(2,2) \\
\end{aligned}$ & $\{C_{i}(0)\}, i = 1,...,10$ & $\{\frac{1}{10}\sum_{i=1}^{10}C_{i}(0)\}$ \\
\bottomrule
\end{tabular}
\caption{Setup of the first Toy CBD model}
\end{table}
The NetLogo simulation was controlled using the pyNetLogo library in Python. The Rejection ABC algorithm was programmed in Python.
\begin{figure}[H]
\centering
\includegraphics[width=10cm]{Images/ABC-Python}
\caption{Posterior distribution (green) after 1000 simulations. The Prior Beta distribution is shown in orange.}
\end{figure}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Simulations & Accepted Samples & Mean($\hat{\theta}$) & Running Time (mins) \\
\midrule
10000 & 1\% & 0.92 & 32.2 \\
\bottomrule
\end{tabular}
\caption{Results of ABC simulation}
\end{table}
The posterior distribution appears to converge on the true parameter as epsilon decreases. However the running time is long, and 99\% of samples are rejected. The same model was run using ABC-SMC to assess the difference in efficiency. The settings of the model are
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Populations & Population Size & Initial Epsilon\\
\midrule
5 & 250 & 10\\
\bottomrule
\end{tabular}
\caption{ABC-SMC Settings, Toy Model}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/"Model4".pdf}
\caption[Progression in the posterior mean with a known $\mu$ = 0.9.]{Progression in the posterior mean with a known $\mu$ = 0.9. The true parameter is shown in green, the posterior mean in black, and the posterior median by a dashed line.}
\end{figure}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Simulations & Accepted Samples & Mean($\hat{\theta}$) & Running Time (mins) \\
\midrule
1542 & 250 & 0.848 & 10.7\\
\bottomrule
\end{tabular}
\caption{Results of ABC simulation}
\end{table}
Here the acceptance rate is much higher (6\%). The algorithm converges on the posterior much more quickly than the rejection algorithm. \\
\textbf{Extended Network Model}\\
This model can be extended to inferring parameters for a larger set of nodes. For nodes with multiple possible directions, the Dirichlet distribution can be used as a multivariate generalisation of the Beta prior. The observed data can also be extended to multiple dimensions, where counts are observed at each node in the network. Consider a network with $N$ nodes, each with $K$ edges extending from the node, and $D$ observed counts. The model can be setup as:
\begin{align}
\theta &= \theta_{1},...,\theta_{N}, \text{where}\;\theta_{i} \sim Dirichlet(\alpha_{1},...,\alpha_{K}) \\
Y &= \{C_{i}\}, i = 1,..,N
\end{align}
This model will serve as a framework for modelling the movement of pedestrians in such a network. \\
\textbf{Pedestrian Model Parameters}\\
An intuitive way to describe a pedestrian making a decision for a direction to travel at each intersection is that of a Categorical distribution. Given $N$ possible directions, there is a set of probabilities $P$ for travelling in each direction. The Categorical distribution is a generalisation of the Bernoulli distribution with probability $p$ of outcome 1 and $q = 1-p$ of outcome 2. The generalisation extends the model to $K$ possible categories. The probability of each category or outcome is specified with $p_{1},...,p_{k}$ (Categorical distribution, n.d.).\\
In Bayesian statistics, the Dirichlet distribution is the conjugate prior for the Categorical distribution. In a model where each data point follows a Categorical distribution with an unknown parameter vector \textit{p}, this is treated as a random variable $X$ with a prior Dirichlet distribution. The posterior distribution of the parameter is also Dirichlet. Knowledge of a parameter can be updated by incorporating observations one at a time, following a formally defined mathematical process. The expected value of the posterior distribution is
\begin{align}
E[p_{i} | \mathbb{X}, \alpha] = \frac{c_{i} + \alpha{i}}{N + \sum_{k}\alpha_{k}}
\end{align}
The expected probability of seeing a category $i$ is equal to the proportion of successful occurrences of $i$ out of all total occurrences. \\
\textbf{Dirichlet Distribution} \\
If there are three possible directions at a given intersection $I$, equal probabilities of each direction can be specified by setting each alpha to the same value, giving a symmetric Dirichlet distribution. The size of each alpha specifies the variance. For example, setting the prior distribution $\theta \sim Dirichlet(2,2,2)$ gives a mean and variance of:
\begin{align}
E[X_{i}] &= \frac{\alpha_{i}}{\alpha_{0}}, \alpha_{0} = \sum^{K}_{i=1}\alpha_{i} \\
E[X_{2}] &= \frac{2}{6} = \frac{1}{3} \\
Var(X_{i}) &= \frac{\alpha_{i}(\alpha_{0}-\alpha_{i})}{\alpha^{2}_{0}(\alpha_{0}+1)} = \frac{2(6-2)}{36(6+1)} = 0.0317
\end{align}
\section{Hamilton CBD Pedestrian Model}
\textbf{Research Questions} \\
Traffic modelling is an important aspect of transport engineering. Modelling transport networks aids in understanding hidden phenomena of travel and allows for the testing of infrastructure design. There is a need in modern urban environments to prioritise sustainable modes of transport, of which walking plays a key role. \\
A pedestrian model can be viewed in the context of an Agent Based Model. At each \textit{tick}, pedestrians make a decision to move to a new location using a complex internal thought process. This decision is based on attributes including, but not limited to; the desired destination, structure of the network and characteristics of the built environment. \\
Understanding pedestrian flows is vital is designing an environment for pedestrians such that they reach their destination in a safe and enjoyable manner. To aid in this understanding, data first needs to be collected on where pedestrians are travelling in the network. \\
Pedestrian counters have been setup in the Hamilton CBD at 21 key locations. These counters are situated on store verandahs and use 3D StereoVision cameras, giving them the ability to distinguish the direction a pedestrian is travelling and provide distance and height measurements. Each camera records a total count in two directions in five minute intervals. Currently there is no extensive analysis being conducted with the data from these sensors, apart from tracking the short term and long term trend. Beyond the 21 sensors operated by HCC, there is a long term vision of extending this to more locations to better understand pedestrian flow. The model described below serves as an initial exploration of how a pedestrian model can be developed for Hamilton using count data. The model will aim to answer a key question of pedestrian flows:\\
\textit{What are the probabilities of turning in each possible direction, for each intersection in the Hamilton CBD?} \\
These probabilities are hidden parameters in the network, which result in the counts observed at the pedestrian counters. Using the observed data, we can infer these probabilities parameters using an Agent Based Model and ABC-SMC.
\begin{figure}[H]
\centering
\includegraphics[width=5cm]{Images/Sensor}
\caption{A pedestrian counter located on the verandah outside Crate Clothing, Ward St}
\end{figure}
The model focuses on the four pedestrian counters near the Centre Place shopping centre at the intersection of Ward St and Worley Place. The system is defined as a network with entry/exit points, intersections nodes, and counting nodes. The network is loaded from a shapefile of the Hamilton City walking network (NZTM) and is geospatially consistent with the real world location. The 4 pedestrian counters are included as a certain type of node which counts travel through itself. The additional counters (denoted with a dashed circle below) are not installed counters. However for the purposes of covering all entry and exit points they are included as such, with mock data created according to a best guess. The data from these counters is used to validate the ABM. \\
For simplicity purposes, the network was simplified to two intersections and four counters. The entry to the northern Centre Place building was ignored, but could be added in future models in addition to extending the network to a larger portion of the CBD when the data is available.
\begin{figure}[H]
\centering
\includegraphics[width=9cm]{Images/Path}
\caption{The Centre Place walking network.}
\end{figure}
An Agent Based Model was developed in NetLogo to simulate the counts at the four counters, with validation carried out using an ABC-SMC with Adaptive Weights model. The data for the four existing counters was first explored to understand how the count varies over time at each location.
\begin{table}[H]
\centering
\begin{tabular}{rrlll}
\hline
Count & Location.Direction & Day & Time \\
\hline
14 & Anglesea Ward NE & 2018-07-07 & 09:00:00 \\
36 & Anglesea Ward NE & 2018-07-07 & 10:00:00 \\
40 & Anglesea Ward NE & 2018-07-07 & 11:00:00 \\
56 & Anglesea Ward NE & 2018-07-07 & 12:00:00 \\
\hline
\end{tabular}
\caption{An example of the formatted data from the pedestrian counters}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=15cm]{Images/CountTimeSeries}
\caption{The pedestrian count from July 7-9, 2018 for the four observed counts to be used in the model}
\end{figure}
For each counter, the count changes significantly over the course of a day. The peak is generally around lunchtime. There is a slight increase in the evening before falling to a minimum level during the early morning hours. All four counters appear to vary significantly from the weekend to Monday. The count during the lunchtime peak was investigated further.
\begin{figure}[H]
\centering
\includegraphics[width=12cm]{Images/CountDailyTotal}
\caption{The average pedestrian count from 12pm-1pm for the four counters to be used in the model}
\end{figure}
All four locations appear to have similar counts over the course of a working week. There is a decrease in the count during Saturday and Sunday, particularly at the Anglesea/Ward counter. Sunday experiences the lowest counts for the week. In terms of magnitude, the Anglesea/Ward counter has the highest foot traffic. 12pm-1pm is a key time to understand pedestrian flows, as many people working in the CBD leave their place of work to eat or shop. Understanding the movement of pedestrians at this time will provide valuable insight into where people choose to travel.
\subsection{ABM Design}
The pedestrian network is represented in NetLogo as a series of nodes and connecting links. This can be viewed as a undirected, acyclic graph with six nodes and five edges. It is not possible to travel back to a node which an agent previously travelled to. The agents (pedestrians) travel between nodes via the links. At each tick of the simulation, the agents choose to travel to a connected node using a set of probabilities. The probabilities at nodes $\{3,4\}$ are the parameters of the ABM which will influence the counts at each exit node $\{5,2,1,0\}$. They are modelled using two symmetric Dirichlet distributions $\sim Dirichlet(t, k)$, where $t$ is the number of categories and $k$ is the concentration hyperparameter, set to be equal for all $t$. For two distributions and three categories this is denoted as:
\begin{align}
\theta_{1} \sim Dirichlet(3, 3, 3) \\
\theta_{2} \sim Dirichlet(3, 3, 3)
\end{align}
\begin{enumerate}
\item{\textbf{Purpose}} \\
To create a valid simulation of the pedestrian flows around the Ward/Worley intersection using observed data.
\item{\textbf{Entities, State Variables and Scales}} \\
The single agents in the network are pedestrians. They have two variables - their current node and a goal node. They travel discretely from one node to another.
\item{\textbf{Process overview and scheduling}} \\
At each tick of the simulation, each pedestrian in the network makes a decision to move to a certain node, and then moves to that node. These movements occur simultaneously.
\item{\textbf{Design Concepts}} \\
There is no interaction between pedestrians. The agents will exit and enter the system according to a survival function.
\item{\textbf{Initialisation}} \\
There are initially a number of agents assigned to entry/exit nodes, with probabilities of assignment proportional to the entry counts at the nodes.
\item{\textbf{Input Data}} \\
The input data is the observed entry counts for each node, used to assign agents to entry/exit nodes at the start of the simulation.
\end{enumerate}
The agents do not return to the node which they came from. There are two possible nodes to travel to at each intersection. Formally, the three directions at an intersection $n$ can be represented as $\{d_{1},d_{2},d_{3}\}$. The corresponding nodes if each respective direction is chosen are $\{n_{1},n_{2},n_{3}\}$. The probability of turning back is eliminated, and hence the remaining probabilities are normalised by dividing each by the sum.
\subsection{Initial Model Analysis}
The simulation is controlled over multiple runs with RNetLogo. Through this package, variables can be sent to and from R. A demonstration is shown below with a simple change in probabilities. The first run is conducted with even probabilities of turning in all directions. The probabilities are then modified with the intention to increase counts in the SW direction at Anglesea/Ward. This is done by changing the probability of a turn towards the Anglesea/Ward node to 0.95. Other possible directions $n$ are set to $\tfrac{0.05}{n}$. The mean count is taken over 10 runs of each simulation.
\begin{figure}[H]
\centering
\includegraphics[width=12cm]{Images/SimulationProbChange}
\caption{Changes in simulated counts after modification of turning probabilities.}
\end{figure}
As shown above, increasing the probability of turning SW to Anglesea/Ward approximately doubles the count across the node, while the count for the three other nodes decreases slightly. \\
\subsection{Observed Data}
The first CBD model will aim to create a validated ABM to accurately simulate the pedestrian movements for a typical weekday at 12pm. To gather the observed data, two months of hourly counts were extracted from August 1 - September 31. The data was subset to weekdays at 12pm and taken as the observed data. The mean of each is counter was set as the summary statistic. \\
For the counters either not installed or without data available, mock data was created according to a best guess. As a result the output from the model does not completely represent the real world system, but remains a valid framework for when the observed data is available. The process to create the mock data is described in the table below. The count from an existing counter is denoted by $C_{x}$, where $x$ is the name given to the counter.
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Node & Function & Count\\
\midrule
5 & $C_{AW} \times 2.2$ & 321 \\
2 & $C_{TR} + C_{CC}$ & 222 \\
0 & $C_{TA} \times 1.8$ & 202 \\
1 & $380$ & 380 \\
\bottomrule
\end{tabular}
\caption{Creation of the observed data for the four counters}
\end{table}
\subsection{Model Design}
At each intersection in a walking network, pedestrians make a choice of a direction to turn. This can be described in general terms by the set $S = \{d_{i}\}, i = 1,...n$, where $n$ is the number of possible directions. The probabilities in this set will vary for each intersection. For simplicity purposes, the backwards direction will be ignored. A Dirichlet prior is used at each intersection. The Dirichlet distribution is a family of continuous multivariate probability distributions (J. Lin, 2016).
\begin{flalign}
f(x_{1},...,x_{K};\alpha_{1},...,\alpha_{K}) = \frac{1}{B(\alpha)}\prod_{i=1}^{K}x_{i}^{\alpha_{i}-1}, \\
B(\alpha) = \frac{\prod_{i=1}^{K}\Gamma(\alpha_{i})}{\Gamma(\sum_{i=1}^{K}\alpha_{i})}
\end{flalign}
The Dirichlet distribution is well suited as a Bayesian prior for a set of probabilities in $k$ choices. The number of parameters is equal to the number of possible directions. The probability of each direction is equal for input into the model, and is then inferred as a parameter using ABC. In total there are 6 nodes - 4 for recording counts and 2 non-recording intersections. Probability distributions are placed over the two intersections $\{3,4\}$. Intersections 3 and 4 in Figure 0.15 have 3 choices of direction. These two directions will vary depending on the node a pedestrian previously came from. \\
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Current Node & Previous Node & Next Nodes & Possible Directions\\
\midrule
3 & 2 & {0,4} & 2 \\
3 & 0 & {2,4} & 2 \\
3 & 4 & {0,2} & 2 \\
4 & 3 & {1,5} & 2 \\
4 & 1 & {3,5} & 2 \\
4 & 5 & {1,3} & 2 \\
\bottomrule
\end{tabular}
\caption{Possible directions for node travel}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=10cm]{Images/Path-Prior}
\caption{Prior Dirichlet distribution at the two intersections and the probability parameters a-f.}
\end{figure}
The aim of the agent based model with ABC validation is to understand the probabilities of a pedestrian turning at certain intersections. It is understood that there is a set of probability distributions which will produce simulated data close to that of the observed data. These probability parameters will assist in understanding the movement of pedestrians around the Centre Place shopping centre, and how this varies at different times of the day. The first model will infer these probabilities for 12pm on a typical weekday. It is expected that the foot traffic will be high during this time as a result of workers in the CBD using their lunch break to go out to eat, shop, or walk. \\
An additional parameter is the number of agents in the system over the hour span. This is defined with a Uniform prior, $\sim Uniform(a,b)$. $a$ and $b$ are chosen according to the observed entry count data and number of ticks in the simulation. The total entry over one hour from 12pm-1pm was calculated as 1021. For 60 ticks representing one hour, this gives an approximate entry count per minute of $\sim$17. However, the number of ticks in the simulation significantly affects the simulated counts. For example, if 100 ticks result in an observed count of 160, at 60 ticks the count will be approximately $\frac{100}{60} \times 160 \approx 267$. There is no single calculation for the number of pedestrians to use in the ABM, as it will be influenced by the design of each network. One method to find it is to set a wide Uniform prior for the number and infer the most likely value with ABC. This highlights a benefit of the ABC-SMC algorithm - even if the Uniform prior does not cover the true parameter, the sampling step will allow for parameters beyond the prior range. This is the method used in the Hamilton CBD pedestrian model. \\
\textbf{Dynamic Entry/Exit}
A more realistic method of simulating pedestrians is to begin with a given number in the system, and use a function at each tick to generate a certain number of agents to enter the system. A parameter $\alpha$ can be set to manage the entry rate such that the simulation closely matches the observed data. This method was not used in the Hamilton CBD model, although it will be investigated further for the extended model.
\subsection{ABC Model}
The ABC-SMC model is defined by four key measures.
\begin{enumerate}
\item Prior distributions of the parameters $\theta$. At each intersection a Dirichlet distribution is defined as a prior with $K$ equal to the number of possible directions.
\item A summary statistic calculated from the observed and simulated data. The output from each simulation will be counts in the exit direction at four nodes. The mean will be calculated for each of these four measures and compared against the mean counts from the observed data at 12pm on a weekday.
\item A distance measure D. This was chosen as Euclidean distance:
\begin{align}
d = \sqrt{\sum_{i}^{N}(x_{i} - x_{i(obs)})^{2}}
\end{align}
\item An initial epsilon $\epsilon$ as a threshold for the distance measure. This is dynamically set during the model simulation using a quantile of the previous population distances.
\end{enumerate}
To generate data $y$, the ABM will be run for 100 ticks. This will represent the pedestrian flow from 12pm-1pm on a weekday. Intersection nodes will be given prior probabilities of turning in each direction, sampled from $g(\theta)$. The generated data is the counts at each counting node. At the end of each simulation the total count at each node is used at the simulated data. The ABC algorithm is given below:
\begin{algorithm}[H]\caption{ABC-SMC}\label{abc-smc}
\begin{algorithmic}[1]
\State Compute the summary statistics as the mean count at 12pm, across all weekdays, for each of the four entry/exit nodes
\State Set $\epsilon_{1} = 350$ and $t = 1$
\State Set $\theta^{1} \sim Dirichlet(3,3,3)$, $\theta^{2} \sim Dirichlet(3,3,3)$ and $\theta^{3} \sim Unif(40,60)$
\State Define a Euclidean distance measure $d = \sqrt{\sum_{i}^{N}(x_{i} - x_{i(obs)})^{2}}$
\For {$i=1$ to $N$}
\State Simulate $\theta_{i}^{(1)} \sim p(\theta^{(1)}), \theta_{i}^{(2)} \sim p(\theta^{(2)}), \theta_{i}^{(3)} \sim p(\theta^{(3)})$
\State Simulate $x \sim p(x|\theta_{i}^{(1)},\theta_{i}^{(2)}),\theta_{i}^{(3)})$ until $p(x,x_{obs}) < \epsilon_{1}$
\State Set $w_{i} = 1/N$
\EndFor
\For {$t=2$ to $T$}
\State Compute data based weights $v_{i}^{(t-1)} \propto w_{i}^{(t-1)}K_{x,t}(x_{obs}|x_{i}^{(t-1)})$
\State Set $\epsilon_{t}$ as $0.75 \times \frac{1}{N} \sum_{i=1}^{N}t_{i}$
\For {$i=1$ to $N$}
\State Repeat until $p(x,x_{obs}) < \epsilon_{t}$:
\Indent
\State Pick $\theta_{i}^{*}$ from the $\theta_{j}^{(t-1)}$'s with probabilities $v_{j}^{(t-1)}$
\State Pertube the sampled particle $\theta_{i}^{*}$
\State Simulate $\theta_{i}^{(1)} \sim p(\theta^{(1)}), \theta_{i}^{(2)} \sim p(\theta^{(2)}), \theta_{i}^{(3)} \sim p(\theta^{(3)})$
\State Simulate $x \sim p(x|\theta_{i}^{(1)},\theta_{i}^{(2)},\theta_{i}^{(3)})$
\EndIndent
\State Compute new weights as $w_{i}^{(t)} \propto \frac{p(\theta_{i}^{(t)})}{\sum_{j}v_{j}^{(t-1)}K_{\theta,t}(\theta_{i}^{(t)}|\theta_{j}^{(t-1)})}$
\EndFor
\State Normalise $w_{i}^{(t)}$ over $i = 1,...,N$
\EndFor
\end{algorithmic}
\end{algorithm}
\subsection{Agent Behaviour}
At creation of the model a given number of pedestrians $P$ are generated. This number is given in the first ABC population by a wide Uniform prior. By pertubing subsequent particles from the population, the number will converge to the true posterior even if the initial prior does not cover the true value. The agents are assigned to exit nodes according to probabilities proportional to the entry counts at 12pm on a typical weekday:
\begin{align}
P(I) = \frac{C_{I}}{\sum_{i=1}^{4} C_{i}}, i \in \{0,1,2,5\},
\end{align}
where $C_{x}$ is the count at node $x$. \\
At each simulation tick, the agents individually make a decision of an adjacent node to move to using the set of probabilities from the ABC model. At each ABC iteration $1,...N$, sampled probabilities are sent to the ABM and the simulation is run for 100 ticks to represent one hour. When an agent moves to an entry/exit node, the count for that node is updated. The total count at each node after 100 ticks is reported back to the ABC model as the simulated data.
\subsection{Results}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
A & B & C & D & E & F & Num Peds \\
\midrule
0.488 & 0.202 & 0.310 & 0.380 & 0.320 & 0.300 & 27.408 \\
\bottomrule
\end{tabular}
\caption{Posterior Means}
\end{table}
\begin{table}[H]
\vspace*{-0.5 cm}
\centering
\begin{tabular}{@{\extracolsep{4pt}}llccccccc}
\toprule
Populations & Simulations & Accepted Samples & Running Time (mins) \\
\midrule
10 & 7620 & 3000 & 282 mins \\
\bottomrule
\end{tabular}
\caption{Results of ABC simulation}
\end{table}
\begin{table}[H]
\vspace*{-0.5 cm}
\centering
\begin{tabular}{@{\extracolsep{4pt}}llll}
\toprule
Counter & Observed Count & Simulated Count & Difference \\
\midrule
AW & 321 & 306.041 & 14.959\\
TR & 222 & 224.2908 & -2.2908\\
TA & 202 & 214.0074 & -12.0074\\
CPS & 380 & 393.1164 & -13.1164\\
\bottomrule
\end{tabular}
\caption{Results of ABC simulation}
\end{table}
\begin{figure}[H]
\centering
\includegraphics[width=14cm]{Images/CBD-Posterior}
\caption{Posterior distributions of each turning probability. The posterior mean is denoted by a dashed black line. The symmetric prior centered on $\frac{1}{3}$ is shown in pink.}
\end{figure}
\textbf{Credible Intervals}
\begin{table}[H]
\centering
\begin{tabular}{@{\extracolsep{4pt}}ccc}
\toprule
A & B & C \\
\midrule
{[}0.315,0.665{]} & [0.105,0.339] & [0.201,0.4300] \\
\bottomrule
\end{tabular}
\caption{95\% Credible Intervals for the parameters at intersection 4}
\end{table}
\begin{table}[H]
\centering
\vspace{-0.5cm}
\begin{tabular}{@{\extracolsep{4pt}}cccc}
\toprule
D & E & F & U \\
\midrule
{[}0.185,0.715{]} & [0.149,0.491] & [0.120,0.421] & [24,31] \\
\bottomrule
\end{tabular}
\caption{95\% Credible Intervals for the parameters at intersection 3 and the number of pedestrians}
\end{table}
\textbf{Prediction Intervals} \\
To calculate a 95\% prediction interval for the observed counts, 1000 samples of each parameter were taken from the posterior distributions. These parameters were used to run 1000 simulations of the pedestrian model in NetLogo. The counts from each simulation were used to calculate the 95\% prediction intervals below. \\
\begin{table}[H]
\centering
\vspace{-0.5cm}
\begin{tabular}{@{\extracolsep{4pt}}cccc}
\toprule
AW & TR & TA & CPS \\
\midrule
{[}234,388{]} & [143,299] & [142,287] & [304,472] \\
\bottomrule
\end{tabular}
\caption{95\% Prediction Intervals for the simulated counts at the four entry/exit nodes}
\end{table}
The algorithm was run for a total of 282 minutes, with a final posterior distribution obtained of 3000 samples at population 10. In the final population, 7,620 simulations were run using sampled probabilities with 39\% of these accepted. The two probabilities A and B in particular have diverged significantly from the prior. A is the probability of turning towards Anglesea Ward, which has a higher count than the two counters in the direction of B. We see that A has a posterior mean of $\mu(A) = 0.488$, in comparison to $\mu(B) = 0.202$. The other probabilities have not shifted significantly from the prior mean, although the variance has reduced. \\
The mean of the simulated counts vs the observed counts are given in table 0.14. They are relatively close, although further improvements can be made by regression adjustment techniques or re-running the model with a modified $\epsilon$ reduction threshold. Further such post analysis is given in the Appendix. Each 95\% prediction interval of the simulated counts in Table 0.17 cover the true observed count. The 95\% credible intervals of the parameters (Table 0.16) are relatively narrow for all parameters except $D$. This is the probability of turning towards the Centre Place intersection from Ward/Worley. The posterior distribution of $D$ appears to be multi-modal. At higher probabilities there is a greater likelihood than that of the prior. \\
\section{Discussion and future work}
The pedestrian model described above serves as a demonstration of using ABC-SMC to validate and infer parameters of a pedestrian ABM. While pedestrian modelling is a common tool used by local government agencies to understand how people use walking as a mode of transportation, there is a challenge in creating the model as an accurate representation. ABC-SMC was found to be an effective tool for validating the simplified Hamilton CBD model such that simulated data closely matches the observed data. Once a validated model has been obtained, the intricacies of the real world system can be viewed through parameter inference. ABC-SMC is also effective for this purpose. It was able to find a precise posterior distribution of probability parameters for turning in each possible direction at the two intersections in the model. \\
As seen in Figure 0.22 of the Appendix, the posterior mean converges to a stable state for some parameters by $\sim$ Population 7, while others have not converged. In addition, the variance is continuously decreasing up to Population 10. This suggests that running the model for more populations will give a more precise posterior. However this will come with further computation time. A balance must be obtained between the precision of the posterior and computation time. Such a balance is a common thread in statistical models such as ABC. \\
While the model ran in a relatively short amount of time, extending the network to include more intersections and observed data will result in an increase in computation time. There remains further research to be conducted in the areas of optimal kernel choice, epsilon threshold, and prior choice. All three significantly affect the computation time. Another option is to increase computing resources. The sequential nature of ABC-SMC does not lend itself well to parallelisation in comparison to other techniques such as ABC-MCMC. However, within populations there is an opportunity to efficiently distribute both the particle pertubation and simulations across a cluster computing network. This was not investigated in the Hamilton CBD model, but will be necessary when extending the model to a larger area of the CBD. \\
Further improvements could be gained using dimensionality reduction methods. If the model is extended to a larger area of the CBD, the dimensionality of the observed data will increase, hence reducing the likelihood of simulating data sufficiently close to the observed data. Methods such as \textit{random projections} could be investigated to reduce the dimensionality of the data and decrease computation time. \\
A vital aspect of developing a useful pedestrian model is in the breadth of data collected in the network. Currently there is limited data collected on pedestrian counts. Ideally, counts would be recorded at all nodes of the CBD network. This would enable the creation of a more realistic model which is able to explain pedestrian flows. The use of the mock data in the Hamilton CBD model means that the parameters inferred from the model are not necessarily the same as the hidden parameters in the real world complex system. HCC is investigating more widespread data collection of pedestrian counts in the CBD. Once this data is available, the extended model can be used to accurately answer questions about pedestrian flows in the Hamilton CBD. \\
While the Hamilton CBD model focuses solely on pedestrian flows, other transportation flows could also be modelled. ABM is well suited to simulating any type of agent based movement through a network. One such example is modelling the traffic flow of vehicles at an intersection, with parameters such as probabilities of turning or average speed through the intersection. Following the development of an ABM to enable this simulation, ABC-SMC can be applied to validate and infer parameters of the model. \\
|
\section{Introduction}
\setcounter{equation}{0} \vskip .1in
\qquad In this paper, we are interested in studying the
following multi-dimensional inhomogeneous incompressible
magnetohydrodynamic equations with fractional dissipation:
\begin{equation}\label{1.1}
\begin{cases}
\partial_{t}\rho+div(\rho u)=0,\qquad x\in \mathbb{R}^{n},t>0,\\
\partial_{t}(\rho u )+div(\rho u\otimes u)+(-\Delta)^{\alpha}u+\nabla P=(b\cdot\nabla) b, \\
\partial_{t}b+(u\cdot\nabla)b+(-\Delta)^{\beta}b=(b\cdot\nabla)u,\\
\nabla\cdot u=\nabla\cdot b=0, \\
\rho(x,0)=\rho_{0}(x),\qquad u(x,0)=u_{0}(x),\qquad
b(x,0)=b_{0}(x),
\end{cases}
\end{equation}
where $\rho=\rho(x,t)$ represents the density,
$u=(u_{1},u_{2},\cdot\cdot\cdot,u_{n})$ the fluid velocity,
$b=(b_{1},b_{2},\cdot\cdot\cdot,b_{n})$ the magnetic field and
$P=P(x,t)$ the scalar pressure, respectively. Here $\rho_{0},
u_{0},b_{0}$ are the prescribed initial data for the density, the
velocity and the magnetic field with property $\nabla\cdot
u_{0}=\nabla\cdot b_{0}=0.$ The fractional Laplacian operator $(-\Delta)^{\alpha}$ is defined via
the Fourrier transform
$$\widehat{(-\Delta)^{\alpha}f}(\xi)=|\xi|^{2\alpha}\widehat{f}(\xi),$$
where
$$\widehat{f}(\xi)=\frac{1}{(2\pi)^{\frac{d}{2}}}\int_{\mathbb{R}^{d}}e^{-ix\cdot\xi}f(x)\mathrm{d}x.$$
We write $\Lambda=(-\Delta)^{\frac{1}{2}}$ for notational
convenience. The MHD equations are a combination of the
inhomogeneous incompressible Navier-Stokes equation of fluid
dynamics and Maxwell's equation of electromagnetism, where the
displacement current can be neglected (see,
e.g. \cite{K1987,L1996}).
If it is not affected by the magnetic field, namely $b=0$, the
inhomogeneous MHD equations will reduce into inhomogeneous
Navier-Stokes equation, which has been studied by many scholars,
refer to
\cite{AK1972,AK1990,S1990,TA1982,CK2003,CHW2013,HW2015,L2017,WY2018}
and references therein. If the density $\rho$ is a positive
constant, the system \eqref{1.1} reduces to the homogeneous MHD
equations, which have been extensively studied. For instance, G.
Duvaut and J.-L. Lions \cite{DL1972} constructed the Leray-Hopf type
global weak solutions of MHD equations with the finite energy method. M.
Sermange and R. Teman further discussed the properties of these
solutions \cite{ST1983}. Later, the MHD equations have been
extensively studied, please see
\cite{K1989,W1997,HX2005,QH2004,MYZ2007} and references therein.
In particular, C. Cao, J. Wu and B. Yuan \cite{CWY2014} examined
the global regularity of MHD equations with only fractional
Laplace operators $(-\Delta)^{\beta}, \beta>1$ and no dissipation
in $H^{s}(\mathbb{R}^{2}), s>2$.
For the inhomogeneous fluid, it has been also studied by many
authors. It is known that J. Gerbeau and C. Le Bris \cite{GB1997}
established the global existence of the weak solutions by the
finite energy in 3D bound domains. Global existence of
strong solutions with small initial data in Besov spaces was
considered by Abidi-Paicu \cite{AP2008}. Moreover, under the
natural compatibility condition
$$-\mu\Delta u_{0}+\nabla
P_{0}-(b_{0}\cdot\nabla)b_{0}=\sqrt{\rho_{o}}g,(P_{0},g)\in
H^{1}\times L^{2},$$
Chen, Tan, and Wang obtained the unique local
strong solutions and the global existence of strong solutions
under data satisfy some smallness condition in the whole space
$\mathbb{R}^{3}$. L$\ddot{u}$, Xu and Zhong \cite{LXZ2017} proved
the global existence and large time asymptotic behavior of strong
solutions to the inhomogeneous MHD equations with vacuum. Relevant
problems can also be referred to \cite{HW2013,G2014,ZY2015}.
Recently, focuses have been on the magnetohydrodynamic equations
with partial or fractional dissipation (see,
e.g.,\cite{CW2011,W2003,CWY2014,Y2019,YZ2018}) and references therein. For example, Dehua Wang and Zhuan Ye in
\cite{WY2018} proved that if $\alpha\ge \frac12+\frac{n}{4}$ and
$n\ge 3$ then there exists a unique strong solution to the
inhomogeneous incompressible Navier-Stokes equations for large
initial data. When $\alpha=\beta=\frac{1}{2}+\frac{n}{4}$, Ye
\cite{Y2019} got global existence of strong solution to the
multi-dimensional inhomogeneous incompressible MHD equations.
In this paper, inspired by \cite{Y2019}, when
$\alpha+\beta=1+\frac{n}{2}$ satisfying $1\le \beta\le
\alpha\le\min \{\frac{3\beta}{2},\frac{n}{2},1+\frac{n}{4}\}$ and
$\frac{n}{4}<\alpha$ for $n\geq3$, we obtain the global existence
of strong solution to the multi-dimensional inhomogeneous
incompressible MHD equations. Our main result is presented as
follows:
~\\
\begin{theorem}\label{thm1}
Consider the magnetohydrodynamic equations \ref{1.1} with
$\alpha+\beta=1+\frac{n}{2}$ satisfying $1\le \beta\le \alpha\le\min \{\frac{3\beta}{2},\frac{n}{2},1+\frac{n}{4}\}$ and $\frac{n}{4}+\frac{1}{2}\leq\alpha$ for $n\geq3$. Assume that the initial data
$(\rho_{0},u_{0},b_{0})$ satisfy the following conditions
$$0<c_{0}<\rho_{0}\in
L^{\infty}(\mathbb{R}^{n}), \qquad\nabla \rho_{0}\in
L^{\frac{2n}{6\alpha-n}}(\mathbb{R}^{n}),$$
$$\nabla\cdot u_{0}=\nabla\cdot b_{0}=0,\qquad
u_{0}\in\dot{H}^{\alpha}(\mathbb{R}^{n}),\qquad b_{0}\in
H^{\beta}(\mathbb{R}^{n}),\qquad\sqrt{\rho_{0}}u_{0}\in
L^{2}(\mathbb{R}^{n}),$$
where $c_0$ is a given positive constant.
Then the magnetohydrodynamic equations
\eqref{1.1} have a unique global strong solution $(\rho,u,b)$
satisfying for any given $0<T<\infty$
\begin{align}\label{1.2}
\begin{cases}
u\in C([0,T];\dot
H^{\alpha}(\mathbb{R}^{n})),\rho u\in
C([0,T];L^2(\mathbb{R}^{n})), b\in C([0,T];
H^{\beta}(\mathbb{R}^{n})),\\
\rho\in C([0,T];L^q(\mathbb{R}^{n})),
\frac{n}{2\alpha}\leq q<\infty,\\
c_0<\rho\in L^{\infty}(0,T;L^{\infty}(\mathbb{R}^{n})),\nabla\rho\in
L^{\infty}(0,T;L^{\frac{2n}{6\alpha-n}}(\mathbb{R}^{n})),\\
\sqrt{\rho}u,\Lambda^{\alpha}u,t^{\frac{1}{2}}\Lambda^{\alpha}u,\sqrt{\rho}\partial_{t}u\in
L^{\infty}(0,T;L^{2}(\mathbb{R}^{n})),\\
b,\Lambda^{\beta}b,t^{\frac{1}{2}}\Lambda^{\beta}b,\partial_{t}b\in
L^{\infty}(0,T;L^{2}(\mathbb{R}^{n})),\\
\Lambda^{\alpha}u,\Lambda^{2\alpha}u,\sqrt{\rho}\partial_{t}u,\Lambda^{\alpha}\partial_{t}u,\nabla
P\in L^{2}(0,T;L^{2}(\mathbb{R}^{n})),\\
\Lambda^{\beta}b,\Lambda^{2\beta}b,\partial_{t}b,\Lambda^{\beta}\partial_{t}b\in
L^{2}(0,T;L^{2}(\mathbb{R}^{n})).
\end{cases}
\end{align}
Moreover, the solution $(\rho,u,b)$
admits the following decay rates for all $t> 0$
$$\|\Lambda^{\alpha}u\|_{L^{2}}+\|\Lambda^{\beta}b\|_{L^{2}}+\|\sqrt{\rho}\partial_{t}u(t)\|_{L^{2}}+\|\partial_{t}b(t)\|_{L^{2}}\leq
C_{0}t^{-\frac{1}{2}},$$
where $C_{0}$ depends on
$\|\rho_{0}\|_{L^{\infty}},\|\sqrt{\rho_{0}}u_{0}\|_{L^{2}},\|u_{0}\|_{\dot{H}^{\alpha}},\|b_{0}\|_{H^{\beta}}$.
\end{theorem}
\begin{remark}\label{remark1}
For the inhomogeneous incompressible Navier-Stokes equation,
Dehua Wang and Zhuan Ye in \cite{WY2018} proved that if $\alpha\ge
\frac12+\frac{n}{4}$ and $n\ge 3$ then there exists a unique global
strong solution for large initial data. For the case $\alpha=\beta=\frac{1}{2}+\frac{n}{4}$ Zhuan Ye in \cite{Y2019} obtained the unique global strong solution to the inhomogeneous
MHD equations (\ref{1.1}) for large initial data. The novelty of this paper
is that we establish the unique global strong solution under the conditions $\alpha +\beta=1+\frac{n}{2}$,
$1\le \beta\le \alpha\le\min
\{\frac{3\beta}{2},\frac{n}{2},1+\frac{n}{4}\}$ and
$\frac{n}{4}<\alpha$, which is that $\alpha$ and $\beta$ are not
too far but not necessarily equal. when
$\alpha=\beta=\frac{1}{2}+\frac{n}{4}$ we obtain the result of
\cite{Y2019}, therefor Theorem \ref{thm1} generalizes the results
of \cite{Y2019} to the case $\alpha\neq\beta$, and we require the
initial density is bounded below.
\end{remark}
To prove the global well-posedness Theorem \ref{thm1}, we need the local well-posedness result of strong solutions which can
be proved by a standard procedure of approximate scheme. For the proof of this proposition, readers can refer to \cite{Y2019}.
\begin{proposition}\label{proposition1}
$\mathrm{(local\ strong\ solution)}$. Under the assumptions of Theorem
\ref{thm1}. For the initial data $(\rho_0(x), u_0(x), b_0(x))$, there exists a small time $T^{*}$ dependent on $\|\rho_{0}\|_{L^{\infty}},\|\nabla \rho_{0}\|_{
L^{\frac{2n}{6\alpha-n}}},\|\sqrt{\rho_{0}}u_{0}\|_{L^{2}},\|u_{0}\|_{\dot{H}^{\alpha}},\|b_{0}\|_{H^{\beta}}$ such that the MHD equations \eqref{1.1} have a unique strong solution $(\rho, u, b)$ satisfying \eqref{1.2} on $[0,T^*)$.
\end{proposition}
The rest of this paper is organized in four sections. In Sect. 2,
we introduce several important lemmas, which will be used in the paper. In Sect. 3, we give some a priori estimates for the local solutions. In Sect. 4, we are devoted to
proving Theorem \ref{thm1}. Throughout this paper, we will use $C$ denote a finite inessential constant which may be different from line to line, but do not depend on particular solutions or function.
\section{Preliminaries}
\setcounter{equation}{0}
In this section, we
give some lemmas. The first one is the classical Gr\"{o}nwall
inequality, which will be used frequently. The second lemma
is used to prove the uniqueness of strong solutions.
\begin{lemma}\label{lemma1}
Let $X(t)$, $Y(t)$, $\beta(t)$ and $\gamma(t)$ are non-negative
functions, and $\beta(t)$ and $\gamma(t)$ are two
integrable functions over $[a, b]$. If the following differential
inequality holds
$$\frac{\mathrm{d}}{\mathrm{d}t}X(t)+Y(t)\leq\beta(t)+\gamma(t)X(t), \qquad a\leq t
\leq b,$$ then
\begin{align*}
X(t)+\int_{a}^{t}Y(s)\mathrm{d}s\leq
\bigg(X(a)+\int_{a}^{t}\beta(s)\mathrm{d}s\bigg)e^{\int_{a}^{\eta}\gamma(s)\mathrm{d}s}.
\end{align*}
\end{lemma}
\begin{lemma}\label{2.2}$\mathrm{(\cite{L1999})}$
Let $X(t)$, $Y(t)$, $Z(t)$, $\gamma(t)$ and $\eta(t)$ are
non-negative functions. Let $X(t)$ and $Y(t)$ are absolutely
continuous on $[0,T]$ and satisfy
\begin{align*}
\begin{cases}
\frac{\mathrm{d}}{\mathrm{d}t}X(t)\leq AZ^{\frac{1}{2}}(t),\\
\frac{\mathrm{d}}{\mathrm{d}t}Y(t)+Z(t)\leq\gamma(t)Y(t)+\eta(t)X^{2}(t), \\
X(0)=0, \\
\end{cases}
\end{align*}
where A is a positive constant, $\gamma(t)$ and $\eta(t)$ are two
integrable functions over $[0,T]$. Then, the following estimates
hold $$X(t)\leq
AY^{\frac{1}{2}}(0)t^{\frac{1}{2}}e^{\frac{1}{2}\int_{0}^{t}(\gamma(s)+A^{2}s\eta(s))\mathrm{d}s},$$
$$Y(t)+\int_{0}^{t}Z(s)\mathrm{d}s\leq
Y(0)e^{\int_{0}^{t}(\gamma(s)+A^{2}s\eta(s))\mathrm{d}s}.$$ In
particular, if $Y(0)=0$, then we get $$X(t)=Y(t)=Z(t)=0.$$
\end{lemma}
\section{A priori estimates}
\setcounter{equation}{0}
In this section, we establish
some necessary bounds for a strong solution. The
following Lemma \ref{lemma3.1} shows the estimates of $\|\rho(t)\|_{
L^{\infty}(0,T;L^{\infty})}$ and $\|(\sqrt{\rho}u,b)(t)\|_{L^{\infty}(0,T;L^{2})}$.
\begin{lemma}\label{lemma3.1}
Under the assumptions of Theorem \ref{thm1}, the corresponding
solution $(\rho,u,b)$ of the equations \eqref{1.1} admits the
following bounds for any $t>0$
\begin{align}\label{3.1}
\|\rho(t)\|_{
L^{\infty}}\leq\|\rho_{0}\|_{
L^{\infty}},
\end{align}
\begin{align}\label{3.2}
\|(\sqrt{\rho}u,b)(t)\|_{L^{2}}^{2}+2\int_{0}^{t}\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\leq\|(\sqrt{\rho_{0}}u_{0},b_{0})\|_{L^{2}}^{2}.
\end{align}
\end{lemma}
\begin{proof}
We note that \eqref{3.1} follows from the property of transport equation
$\eqref{1.1}_{1}$ and using the divergence free condition $\eqref{1.1}_{4}$. To prove \eqref{3.2}, multiplying the equation
$\eqref{1.1}_{2,3}$ by $(u,b)$, adding the results together and integrating by parts, we have
\begin{align}\label{3.3}
\frac{1}{2}\frac{\mathrm{d}}{\mathrm{d}t}\|(\sqrt{\rho}u,b)(t)\|_{L^{2}}^{2}+\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}=0.
\end{align}
Integrating \eqref{3.3} over $[0,t]$, we arrive at
\eqref{3.2}.
\end{proof}
Next, we calculate the estimates in the
$L^{\infty}(0,T;\dot{H}^{\alpha}(\mathbb{R}^{n}))$-norm of the
velocity field and the $L^{\infty}(0,T;\dot H^{\beta}(\mathbb{R}^{n}))$-norm
of the
magnetic field.
\begin{lemma}\label{lemma3.2}
Under the assumptions of Theorem \ref{thm1}, the corresponding
solution $(\rho,u,b)$ of the equations \eqref{1.1} admits the
following bounds for any $t>0$
\begin{align}\label{3.4}
\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}+\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4}+\int_{0}^{t}\|(\Lambda^{2\alpha}u,\Lambda^{2\beta}b,\sqrt{\rho}\partial_{\tau}u,\partial_{\tau}b)(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\leq
C_{0},
\end{align}
\begin{align}\label{3.5}
t\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}+t\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4}+\int_{0}^{t}\tau\|(\Lambda^{2\alpha}u,\Lambda^{2\beta}b,\sqrt{\rho}\partial_{\tau}u,\partial_{\tau}b)(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\leq
C_{0},
\end{align}
where $C_{0}$ depends only on
$\|\rho_0\|_{L^{\infty}},\|\sqrt{\rho_{0}}u_{0}\|_{L^{2}},\|\Lambda^{\alpha}u_{0}\|_{L^{2}},\|b_{0}\|_{H^{\beta}},$
and $C_{0}(t)$ depends only on the initial data and time $t$.
\end{lemma}
\begin{proof}
First, multiplying $\eqref{1.1}_{2}$ by $\partial_{t}u$ and integrating by parts, we get
\begin{align}\label{3.6}
\frac{1}{2}\frac{\mathrm{d}}{\mathrm{d}t}\|\Lambda^{\alpha}u(t)\|_{L^{2}}^{2}+\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}=-\int_{\mathbb{R}^{n}}(\rho
u\cdot\nabla u)\cdot\partial_{t}u\mathrm{d}x+\int_{\mathbb{R}^{n}}
(b\cdot\nabla b)\cdot\partial_{t}u\mathrm{d}x.
\end{align}
Second, taking the $L^{2}$ inner product of $\eqref{1.1}_{3}$ with $\partial_{t}b$ and integrating by parts, we obtain
\begin{align}\label{3.7}
\frac{1}{2}\frac{\mathrm{d}}{\mathrm{d}t}\|\Lambda^{\beta}b(t)\|_{L^{2}}^{2}+\|\partial_{t}b\|_{L^{2}}^{2}=-\int_{\mathbb{R}^{n}}
(u\cdot\nabla
b)\cdot\partial_{t}b\mathrm{d}x+\int_{\mathbb{R}^{n}}
(b\cdot\nabla u)\cdot\partial_{t}b\mathrm{d}x.
\end{align}
Then, adding the equalities \eqref{3.6} and \eqref{3.7} together, we have
\begin{align}\label{3.8}
\frac{1}{2}\frac{\mathrm{d}}{\mathrm{d}t}\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}
+\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)\|_{L^{2}}^{2}=\sum_{i=1}^{4}I_{i},
\end{align}
where $$I_{1}=-\int_{\mathbb{R}^{n}}(\rho u\cdot\nabla
u)\cdot\partial_{t}u\mathrm{d}x,\qquad I_{2}=\int_{\mathbb{R}^{n}}
(b\cdot\nabla b)\cdot\partial_{t}u\mathrm{d}x,$$
$$I_{3}=-\int_{\mathbb{R}^{n}}
(u\cdot\nabla b)\cdot\partial_{t}b\mathrm{d}x,\qquad
I_{4}=\int_{\mathbb{R}^{n}} (b\cdot\nabla
u)\cdot\partial_{t}b\mathrm{d}x.$$
We use H\"older,
Gagliardo-Nirenberg's inequalities and the a priori estimates \eqref{3.1},
\eqref{3.2} to estimate each term on the right-hand side of
\eqref{3.8} as follows:
\begin{align}\label{3.9}
\mid I_{1}\mid &\leq
C\|\sqrt{\rho}\|_{L^{\infty}}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|u\cdot\nabla
u\|_{L^{2}}\notag\\
&\leq
C\|\rho_{0}\|_{L^{\infty}}^{\frac{1}{2}}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|u\|_{L^{\frac{2n}{n-2\alpha}}}\|\nabla
u\|_{L^{\frac{n}{\alpha}}}\notag\\
&\leq
C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\alpha}u\|_{L^{2}}\|\Lambda^{\beta}
u\|_{L^{2}}\notag\\
&\leq
C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\alpha}u\|_{L^{2}}(\|u\|_{L^{2}}^{1-\frac{\beta}{\alpha}}\|\Lambda^{\alpha}
u\|_{L^{2}}^{\frac{\beta}{\alpha}})\notag\\
&\leq
C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\alpha}u\|_{L^{2}}(\|u\|_{L^{2}}+\|\Lambda^{\alpha}
u\|_{L^{2}})\notag\\
&\leq
C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\alpha}u\|_{L^{2}}(\|\sqrt{\rho}u\|_{L^{2}}+\|\Lambda^{\alpha}
u\|_{L^{2}})\notag\\
&\leq
\frac{1}{2}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}+C\|\Lambda^{\alpha}u\|_{L^{2}}^{2}(1+\|\Lambda^{\alpha}
u\|_{L^{2}}^{2}).
\end{align}
By a similar argument as the estimate (\ref{3.9}), we have
\begin{align}\label{3.11}
\mid I_{3}\mid+\mid I_{4}\mid&\leq
C\|\partial_{t}b\|_{L^{2}}(\|\nabla
b\|_{L^{\frac{n}{\alpha}}}\|u\|_{L^{\frac{2n}{n-2\alpha}}}+\|\nabla
u\|_{L^{\frac{n}{\beta}}}\|b\|_{L^{\frac{2n}{n-2\beta}}})\notag\\
&\leq C\|\partial_{t}b\|_{L^{2}}(\|\Lambda^{\beta}
b\|_{L^{2}}\|\Lambda^{\alpha}u\|_{L^{2}}+\|\Lambda^{\alpha}
u\|_{L^{2}}\|\Lambda^{\beta}b\|_{L^{2}})\notag\\
&\leq \frac{1}{4}\|\partial_{t}b\|_{L^{2}}^{2}+C\|\Lambda^{\alpha}
u\|_{L^{2}}^{2}\|\Lambda^{\beta}b\|_{L^{2}}^{2}.
\end{align}
For the term $I_2$, by a simple calculation to transform the derivative with respect to $t$ from $u(t)$ to $b(t)$, and the similar argument yields
\begin{align}\label{3.10}
I_{2}&=\frac{\mathrm{d}}{\mathrm{d}t}\int_{\mathbb{R}^{n}}(b\cdot\nabla
b)\cdot
u\mathrm{d}x-\int_{\mathbb{R}^{n}}(\partial_{t}b\cdot\nabla
b)\cdot
u\mathrm{d}x-\int_{\mathbb{R}^{n}}(b\cdot\nabla\partial_{t}b)\cdot
u\mathrm{d}x\notag\\
&=\frac{\mathrm{d}}{\mathrm{d}t}\int_{\mathbb{R}^{n}}(b\cdot\nabla b)\cdot
u\mathrm{d}x-\int_{\mathbb{R}^{n}}(\partial_{t}b\cdot\nabla
b)\cdot
u\mathrm{d}x-\int_{\mathbb{R}^{n}}b_{i}\partial_{i}\partial_{t}b_{j}
u_{j}\mathrm{d}x\notag\\
&=\frac{\mathrm{d}}{\mathrm{d}t}\int_{\mathbb{R}^{n}}(b\cdot\nabla b)\cdot
u\mathrm{d}x-\int_{\mathbb{R}^{n}}(\partial_{t}b\cdot\nabla
b)\cdot u\mathrm{d}x+\int_{\mathbb{R}^{n}}b_{i}\partial_{t}b_{j}
\partial_{i}u_{j}\mathrm{d}x\notag\\
&\leq\frac{\mathrm{d}}{\mathrm{d}t}\int_{\mathbb{R}^{n}}(b\cdot\nabla b)\cdot
u\mathrm{d}x+C\|\partial_{t}b\|_{L^{2}}\|\nabla
b\|_{L^{\frac{n}{\alpha}}}\|u\|_{L^{\frac{2n}{n-2\alpha}}}+C\|\partial_{t}b\|_{L^{2}}\|\nabla
u\|_{L^{\frac{n}{\beta}}}\|b\|_{L^{\frac{2n}{n-2\beta}}}\notag\\
&\leq\frac{\mathrm{d}}{\mathrm{d}t}\int_{\mathbb{R}^{n}}(b\cdot\nabla b)\cdot
u\mathrm{d}x+C\|\partial_{t}b\|_{L^{2}}(\|\Lambda^{\beta}
b\|_{L^{2}}\|\Lambda^{\alpha}u\|_{L^{2}}+\|\Lambda^{\alpha}
u\|_{L^{2}}\|\Lambda^{\beta}b\|_{L^{2}})\notag\\
&\leq\frac{\mathrm{d}}{\mathrm{d}t}\int_{\mathbb{R}^{n}}(b\cdot\nabla b)\cdot
u\mathrm{d}x+\frac{1}{4}\|\partial_{t}b\|_{L^{2}}^{2}+C\|\Lambda^{\alpha}
u\|_{L^{2}}^{2}\|\Lambda^{\beta}b\|_{L^{2}}^{2}.
\end{align}
Inserting estimates $\eqref{3.9}-\eqref{3.10}$ into \eqref{3.8}, we obtain
\begin{align}\label{3.12}
\frac{\mathrm{d}}{\mathrm{d}t}(\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}+M(t))
+\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)\|_{L^{2}}^{2}\leq
C\|\Lambda^{\alpha} u\|_{L^{2}}^{2}(\|(\Lambda^{\alpha}
u,\Lambda^{\beta}b)\|_{L^{2}}^{2}+1),
\end{align}
where, by integrating by parts, we use
$$\frac{\mathrm{d}}{\mathrm{d}t}\int_{\mathbb{R}^{n}}(b\cdot\nabla b)\cdot
u\mathrm{d}x=-\frac{\mathrm{d}}{\mathrm{d}t}\int_{\mathbb{R}^{n}}(b\cdot\nabla
u)\cdot b\mathrm{d}x,$$
and we denote
$$M(t)\triangleq\int_{\mathbb{R}^{n}}(b\cdot\nabla
u)\cdot b\mathrm{d}x.$$
On the one hand, we can obtain by direct
calculation
\begin{align}\label{3.13}
\mid M(t)\mid&\leq\|b\|_{L^{2}}\|b\cdot\nabla u\|_{L^{2}}\notag\\
&\leq C\|b_{0}\|_{L^{2}}\|\nabla
u\|_{L^{\frac{n}{\beta}}}\|b\|_{L^{\frac{2n}{n-2\beta}}}\notag\\
&\leq C(\|\Lambda^{\alpha}
u\|_{L^{2}}^{2}+\|\Lambda^{\beta}b\|_{L^{2}}^{2}).
\end{align}
On the other hand, we also obtain
\begin{align*}
\mid M(t)\mid&\leq\|b\|_{L^{\frac{2n}{n-\beta}}}^{2}\|\nabla u\|_{L^{\frac{n}{\beta}}}\\
&\leq C\|\Lambda^{\alpha}
u\|_{L^{2}}\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{2}\\
&\leq \frac{1}{2}\|\Lambda^{\alpha}
u\|_{L^{2}}^{2}+C\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{4},
\end{align*}
which immediately gives
\begin{align}\label{3.14}
M(t)\geq-\frac{1}{2}\|\Lambda^{\alpha}
u\|_{L^{2}}^{2}-\tilde{C}\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{4}.
\end{align}
In order to close the above inequality, we need to deal with
$\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}$. We apply the operator
$\Lambda^{\frac{\beta}{2}}$ on the both sides of the equation $\eqref{1.1}_{3}$ and
multiply the result equation by $\Lambda^{\frac{\beta}{2}}b$ to deduce that
\begin{align}\label{3.15}
\frac{1}{2}\frac{\mathrm{d}}{\mathrm{d}t}\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{2}+\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}}^{2}=-\int_{\mathbb{R}^{n}}
\Lambda^{\frac{\beta}{2}}(u\cdot\nabla
b)\cdot\Lambda^{\frac{\beta}{2}}b\mathrm{d}x+\int_{\mathbb{R}^{n}}
\Lambda^{\frac{\beta}{2}}(b\cdot\nabla
u)\cdot\Lambda^{\frac{\beta}{2}}b\mathrm{d}x.
\end{align}
The first term at the right hand side of \eqref{3.15} can be estimated as follows by the H\"{o}lder and Sobolev inequalities,
\begin{align}\label{3.16}
\int_{\mathbb{R}^{n}} \Lambda^{\frac{\beta}{2}}(u\cdot\nabla
b)\cdot\Lambda^{\frac{\beta}{2}}b\mathrm{d}x&\leq C\|u\cdot\nabla
b\|_{L^{2}}\|\Lambda^{\beta}b\|_{L^{2}}\notag\\
&\leq C\|u\|_{L^{\frac{2n}{n-2\alpha}}}\|\nabla b\|_{L^{\frac{n}{\alpha}}}\|\Lambda^{\beta}b\|_{L^{2}}\notag\\
&\leq
C\|\Lambda^{\alpha}u\|_{L^{2}}\|\Lambda^{\beta}b\|_{L^{2}}^{2}\notag\\
&\leq C\|\Lambda^{\alpha}u\|_{L^{2}}\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}}\notag\\
&\leq
\frac{1}{4}\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}}^{2}+C\|\Lambda^{\alpha}u\|_{L^{2}}^{2}\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{2}.
\end{align}
The second term at the right hand side of \eqref{3.15} is similarly estimated as follows
\begin{align}\label{3.17}
\int_{\mathbb{R}^{n}} \Lambda^{\frac{\beta}{2}}(b\cdot\nabla
u)\cdot\Lambda^{\frac{\beta}{2}}b\mathrm{d}x&\leq C\|b\cdot\nabla
u\|_{L^{\frac{2n}{n+\beta}}}\|\Lambda^{\beta}b\|_{L^{\frac{2n}{n-\beta}}}\notag\\
&\leq C\|b\|_{L^{\frac{2n}{n-\beta}}}\|\nabla
u\|_{L^{\frac{n}{\beta}}}\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}}\notag\\
&\leq
C\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}\|\Lambda^{\alpha}u\|_{L^{2}}\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}}\notag\\
&\leq
\frac{1}{4}\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}}^{2}+C\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{2}\|\Lambda^{\alpha}u\|_{L^{2}}^{2}.
\end{align} Then, inserting inequalities
\eqref{3.16}-\eqref{3.17} into \eqref{3.15}, we have
\begin{align*}
\frac{\mathrm{d}}{\mathrm{d}t}\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{2}+\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}}^{2}\leq
C\|\Lambda^{\alpha}u\|_{L^{2}}^{2}\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{2}.
\end{align*}
By the a priori estimate \eqref{3.2} and the Gr\"{o}nwall
Lemma \ref{lemma1}, we have
\begin{align}\label{3.18}
\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{2}+\int_{0}^{t}\|\Lambda^{\frac{3\beta}{2}}b(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\leq
C_{0}.
\end{align}
Moreover, we also have
\begin{align}\label{3.19}
\frac{\mathrm{d}}{\mathrm{d}t}\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4}\leq
C\|\Lambda^{\alpha}u\|_{L^{2}}^{2}\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{4}.
\end{align}
Multiplying \eqref{3.19} by $\tilde{C}+1$, we get
\begin{align}\label{3.20}
\frac{\mathrm{d}}{\mathrm{d}t}((\tilde{C}+1)\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4})\leq
(\tilde{C}+1)\|\Lambda^{\alpha}u\|_{L^{2}}^{2}\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{4}.
\end{align}
Summing up the estimates \eqref{3.12} and \eqref{3.20}, we have
\begin{align}\label{3.21}
&\quad\frac{\mathrm{d}}{\mathrm{d}t}(\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}+M(t)+(\tilde{C}+1)\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4})
+\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)\|_{L^{2}}^{2}\notag\\&\leq
C\|\Lambda^{\alpha} u\|_{L^{2}}^{2}(\|(\Lambda^{\alpha}
u,\Lambda^{\beta}b)\|_{L^{2}}^{2}+1+\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{4}).
\end{align}
Next, using the lower bound \eqref{3.14} and integrating $\eqref{3.21}$ with respect to time $t$,
we obtain
\begin{align*}
&\quad\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}+\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4}
+\int_{0}^{t}\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\notag\\&\leq
C_{0}+\int_{0}^{t}C\|\Lambda^{\alpha}
u(\tau)\|_{L^{2}}^{2}(\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(\tau)\|_{L^{2}}^{2}+1+\|\Lambda^{\frac{\beta}{2}}b(\tau)\|_{L^{2}}^{4})\mathrm{d}\tau.
\end{align*}
Using the Gr\"{o}nwall Lemma \ref{lemma1} and the a priori estimate \eqref{3.2}, it yields
\begin{align}\label{3.22}
\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}+1+\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4}
+\int_{0}^{t}\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)(\tau)\|_{L^{2}}^{2}\leq
C_{0}.
\end{align}
We can also obtain from estimate \eqref{3.21} by multiplying time $t$ that
\begin{align*}
&\quad\frac{\mathrm{d}}{\mathrm{d}t}(t\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)\|_{L^{2}}^{2}+1+tM(t)+t(\tilde{C}+1)\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4})
+t\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)\|_{L^{2}}^{2}\notag\\&\leq
\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)\|_{L^{2}}^{2}+M(t)+(\tilde{C}+1)\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{4}+Ct\|\Lambda^{\alpha} u\|_{L^{2}}^{2}(\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)\|_{L^{2}}^{2}+1+\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{4})\notag\\
&\leq
C\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)\|_{L^{2}}^{2}+(\tilde{C}+1)\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{4}+Ct\|\Lambda^{\alpha} u\|_{L^{2}}^{2}(\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)\|_{L^{2}}^{2}+1+\|\Lambda^{\frac{\beta}{2}}b\|_{L^{2}}^{4}),
\end{align*}
where in the last line we have applied the estimate \eqref{3.13}. Integrating
the above inequality with respect to time $t$, we have
\begin{align*}
&\quad t\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}+t+tM(t)+t(\tilde{C}+1)\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4}+\int_{0}^{t}\tau\|(\sqrt{\rho}\partial_{\tau}u,\partial_{\tau}b)(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\notag\\&\leq
C_{0}+C\int_{0}^{t}\tau\|\Lambda^{\alpha}
u(\tau)\|_{L^{2}}^{2}(\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(\tau)\|_{L^{2}}^{2}+1+\|\Lambda^{\frac{\beta}{2}}b(\tau)\|_{L^{2}}^{4})\mathrm{d}\tau,
\end{align*}
where we used a Sobolev interpolation inequality,
$$\int_{0}^{t}\|\Lambda^{\frac{\beta}{2}}b(\tau)\|_{L^{2}}^{4}\mathrm{d}\tau\leq\int_{0}^{t}\|b(\tau)\|_{L^{2}}^{2}\|\Lambda^{\beta}b(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\leq
C_{0}.$$
Applying of the lower bound \eqref{3.14}, we can get
\begin{align*}
&\quad t\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}+t+t\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4}+\int_{0}^{t}\tau\|(\sqrt{\rho}\partial_{\tau}u,\partial_{\tau}b)(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\notag\\&\leq
C_{0}+C\int_{0}^{t}\tau\|\Lambda^{\alpha}
u(\tau)\|_{L^{2}}^{2}(\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(\tau)\|_{L^{2}}^{2}+1+\|\Lambda^{\frac{\beta}{2}}b(\tau)\|_{L^{2}}^{4})\mathrm{d}\tau.
\end{align*}
The Gr\"{o}nwall Lemma \ref{lemma1} and the a priori estimate \eqref{3.2} allow us to deduce
\begin{align}\label{3.23}
t(\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)(t)\|_{L^{2}}^{2}+1+\|\Lambda^{\frac{\beta}{2}}b(t)\|_{L^{2}}^{4})+\int_{0}^{t}\tau\|(\sqrt{\rho}\partial_{\tau}u,\partial_{\tau}b)(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\leq C_{0}.
\end{align}
Let us recall the Stokes equations:
\begin{equation}\label{3.24}
\begin{cases}
(-\Delta)^{\alpha}u+\nabla P =(b\cdot\nabla) b-\rho\partial_{t}u -(\rho u\cdot\nabla) u, \\
\nabla\cdot u=0.
\end{cases}
\end{equation}
It is easy to deduce from \eqref{3.24} that
\begin{align}\label{u2alpha}
\|\Lambda^{2\alpha}u\|_{L^{2}}&\leq C\|b\cdot\nabla
b\|_{L^{2}}+C\|\rho\partial_{t}u\|_{L^{2}}+\|\rho u\cdot\nabla
u\|_{L^{2}} \\ \notag
&\leq C\|b\|_{L^{\frac{2n}{n-2\beta}}}\|\nabla
b\|_{L^{\frac{n}{\beta}}}+C\|\sqrt{\rho}\|_{L^{\infty}}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}+C\|\rho\|_{L^{\infty}}\|u\|_{L^{\frac{2n}{n-2\alpha}}}\|\nabla
u\|_{L^{\frac{n}{\alpha}}}\\ \notag
&\leq
C\|\Lambda^{\beta}b\|_{L^{2}}\|\Lambda^{\alpha}b\|_{L^{2}}+C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}+C\|\Lambda^{\alpha}u\|_{L^{2}}\|\Lambda^{\beta}
u\|_{L^{2}}\\ \notag
&\leq
C\|\Lambda^{\beta}b\|_{L^{2}}\|b\|_{L^{2}}^{1-\frac{2\alpha}{3\beta}}\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}}^{\frac{2\alpha}{3\beta}}+C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}+C\|\Lambda^{\alpha}u\|_{L^{2}}\|\Lambda^{\alpha}
u\|_{L^{2}}^{\frac{\beta}{\alpha}}\|u\|_{L^{2}}^{1-\frac{\beta}{\alpha}}\\ \notag
&\leq
C\|\Lambda^{\beta}b\|_{L^{2}}(\|b\|_{L^{2}}+\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}})+C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}+C\|\Lambda^{\alpha}u\|_{L^{2}}(\|\Lambda^{\alpha}u\|_{L^{2}}+\|u\|_{L^{2}}),
\end{align}
which implies
\begin{align*}
\int_{0}^{t}\tau\|\Lambda^{2\alpha}u(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau
&\leq
C\int_{0}^{t}\tau\|\Lambda^{\beta}b(\tau)\|_{L^{2}}^{2}(\|b(\tau)\|_{L^{2}}^{2}+\|\Lambda^{\frac{3\beta}{2}}b(\tau)\|_{L^{2}}^{2})\mathrm{d}\tau+C\int_{0}^{t}\tau\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}\mathrm{d}\tau\notag\\
&\qquad+C\int_{0}^{t}\tau\|\Lambda^{\alpha}u(\tau)\|_{L^{2}}^{2}(\|\Lambda^{\alpha}u(\tau)\|_{L^{2}}^{2}+\|u(\tau)\|_{L^{2}}^{2})\mathrm{d}\tau\notag\\
&\leq
C_{0}{t}+\int_{0}^{t}\tau\|\Lambda^{\beta}b(\tau)\|_{L^{2}}^{2}\|\Lambda^{\frac{3\beta}{2}}b(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\notag\\
&\leq C_{0}(t)+C_{0}\int_{0}^{t}\|\Lambda^{\frac{3\beta}{2}}b(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\notag\\
&\leq C_{0}(t),
\end{align*}
where we have used the a priori estimate \eqref{3.2} and the inequalities \eqref{3.22}- \eqref{3.23}.
Similarly, we can get from the equation $\eqref{1.1}_{3}$ that
\begin{align*}
\|\Lambda^{2\beta}b\|_{L^{2}}&\leq\|\partial_{t}b\|_{L^{2}}+\|b\cdot\nabla
u\|_{L^{2}}+\|u\cdot\nabla b\|_{L^{2}}\notag\\
&\leq
C\|\partial_{t}b\|_{L^{2}}+C\|b\|_{L^{\frac{2n}{n-2\beta}}}\|\nabla
u\|_{L^{\frac{n}{\beta}}}+C\|u\|_{L^{\frac{2n}{n-2\alpha}}}\|\nabla
b\|_{L^{\frac{n}{\alpha}}}\notag\\
&\leq
C\|\partial_{t}b\|_{L^{2}}+C\|\Lambda^{\beta}b\|_{L^{2}}\|\Lambda^{\alpha}
u\|_{L^{2}}+C\|\Lambda^{\alpha}u\|_{L^{2}}\|\Lambda^{\beta}
b\|_{L^{2}}\notag\\
&\leq
C\|\partial_{t}b\|_{L^{2}}+C\|\Lambda^{\beta}b\|_{L^{2}}^{2}+C\|\Lambda^{\alpha}
u\|_{L^{2}}^{2},
\end{align*}
then we get $$\int_{0}^{t}\tau\|\Lambda^{2\beta}b(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau\leq
C_{0}(t).$$
Clearly, we also have
$$\int_{0}^{t}\|(\Lambda^{2\alpha}u,\Lambda^{2\beta}b)(\tau)\|_{L^{2}}^{2}\leq
C_{0}.$$
We thus complete the proof of Lemma \ref{lemma3.2}.
\end{proof}
The following Lemma \ref{lemma3.3} is used for the estimation of high
order derivative estimates for $(u,b)$ .
\begin{lemma}\label{lemma3.3}
Under the assumptions of Theorem \ref{thm1}, the corresponding
solution $(\rho,u,b)$ of the equations \eqref{1.1} admits the
following a priori bounds for any $t>0$
\begin{align}\label{3.25}
t^{k}\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)(t)\|_{L^{2}}^{2}+\int_{0}^{t}\tau^{k}\|(\Lambda^{\alpha}\partial_{\tau}u,\Lambda^{\alpha}\partial_{\tau}b)(\tau)\|_{L^{2}}^{2}\leq
C_{0}(t^{k}),k=0,1,
\end{align}
\begin{align}\label{3.26}
\int_{0}^{t}\|\nabla P\|_{L^{2}}^{2}\mathrm{d}\tau\leq C_{0},
\end{align}
where $C_{0}$ depends only on
$\|\rho_0\|_{L^{\infty}}$, $\|\sqrt{\rho_{0}}u_{0}\|_{L^{2}}$, $\|\Lambda^{\alpha}u_{0}\|_{L^{2}}$ and $\|b_{0}\|_{H^{\beta}}$.
\end{lemma}
\begin{proof}
Differentiating the equation $\eqref{1.1}_{2}$ with respect to $t$ gives
\begin{align}\label{3.27}
\rho\partial_{tt}u+\rho
u\cdot\nabla\partial_{t}u+(-\Delta)^{\alpha}\partial_{t}u+\nabla\partial_{t}P=-\partial_{t}\rho\partial_{t}u-\partial_{t}(\rho
u)\cdot\nabla u+\partial_{t}(b\cdot\nabla b).
\end{align}
Multiplying $\partial_{t}u$ on the both sides of \eqref{3.27} and integrating by parts, we obtain after using the equation
$\eqref{1.1}_{1}$ that
\begin{align}\label{3.28}
\frac{\mathrm{d}}{\mathrm{d}t}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}+\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}^{2}
&=-\int_{\mathbb{R}^{n}}\partial_{t}\rho\cdot\partial_{t}u\cdot\partial_{t}u\mathrm{d}x
-\int_{\mathbb{R}^{n}}\partial_{t}\rho u\cdot\nabla
u\cdot\partial_{t}u\mathrm{d}x\notag\\
&\qquad-\int_{\mathbb{R}^{n}}\rho\partial_{t}u\cdot\nabla
u\cdot\partial_{t}u\mathrm{d}x+\int_{\mathbb{R}^{n}}\partial_{t}(b\cdot\nabla
b)\cdot\partial_{t}u\mathrm{d}x\notag\\
&=-2\int_{\mathbb{R}^{n}}\rho
u\cdot\nabla\partial_{t}u\cdot\partial_{t}u\mathrm{d}x
-\int_{\mathbb{R}^{n}}\rho u\nabla( u\cdot\nabla
u\cdot\partial_{t}u)\mathrm{d}x\notag\\
&\qquad-\int_{\mathbb{R}^{n}}\rho\partial_{t}u\cdot\nabla
u\cdot\partial_{t}u\mathrm{d}x+\int_{\mathbb{R}^{n}}\partial_{t}(b\cdot\nabla
b)\cdot\partial_{t}u\mathrm{d}x\notag\\
&\triangleq\sum_{i=1}^{4}J_{i}.
\end{align}
Next, we estimate the terms on the right hand side one by one. Using H\"older, Gagliardo-Nirenberg and
Young's inequalities, we get
\begin{align*}
\mid
J_{1}\mid&\leq C\|\sqrt{\rho}\|_{L^{\infty}}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\nabla\partial_{t}u\|_{L^{\frac{n}{\beta}}}\|u\|_{L^{\frac{2n}{n-2\beta}}}\notag\\
&\leq C\|\rho_{0}\|_{L^{\infty}}^{\frac{1}{2}}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}\|\Lambda^{\beta}u\|_{L^{2}}\notag\\
&\leq C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}\|u\|_{L^{2}}^{1-\frac{\beta}{\alpha}}\|\Lambda^{\alpha}u\|_{L^{2}}^{\frac{\beta}{\alpha}}\notag\\
&\leq C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}(\|u\|_{L^{2}}+\|\Lambda^{\alpha}u\|_{L^{2}})\notag\\
&\leq
\frac{1}{16}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}^{2}+C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}(\|u\|_{L^{2}}^{2}+\|\Lambda^{\alpha}u\|_{L^{2}}^{2}).
\end{align*}
\begin{align*}
\mid J_{2}\mid&\leq \mid\int_{\mathbb{R}^{n}}\rho u\cdot\nabla
u\cdot\nabla
u\cdot\partial_{t}u\mathrm{d}x\mid+\mid\int_{\mathbb{R}^{n}}\rho
u\cdot u\cdot\nabla^{2}
u\cdot\partial_{t}u\mathrm{d}x\mid+\mid\int_{\mathbb{R}^{n}}\rho
u\cdot u\cdot\nabla u\cdot\nabla\partial_{t}u\mathrm{d}x\mid\\
&\leq
C\|\rho\|_{L^{\infty}}\|u\|_{L^{\frac{2n}{n-2\alpha}}}\|\nabla
u\|_{L^{\frac{n}{\alpha}}}^{2}\|\partial_{t}u\|_{L^{\frac{2n}{n-2\alpha}}}+C\|\sqrt{\rho}\|_{L^{\infty}}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|
u\|_{L^{\frac{n}{\alpha-1}}}^{2}\|\nabla^{2}u\|_{L^{\frac{2n}{4+n-4\alpha}}}\\&\qquad+C\|\rho\|_{L^{\infty}}\|u\|_{L^{\frac{2n}{n-2\beta}}}^{2}\|\nabla
u\|_{L^{\frac{n}{\beta}}}\|\nabla\partial_{t}u\|_{L^{\frac{n}{\beta}}}\\
&\leq
C\|\rho_{0}\|_{L^{\infty}}\|\Lambda^{\alpha}u\|_{L^{2}}\|\Lambda^{\beta}
u\|_{L^{2}}^{2}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}+C\|\rho_{0}\|_{L^{\infty}}^{\frac{1}{2}}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\beta}
u\|_{L^{2}}^{2}\|\Lambda^{2\alpha}u\|_{L^{2}}\\&\qquad+C\|\rho_{0}\|_{L^{\infty}}\|\Lambda^{\beta}u\|_{L^{2}}^{2}\|\Lambda^{\alpha}
u\|_{L^{2}}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}\\
&\leq
C\|\Lambda^{\alpha}u\|_{L^{2}}(\|\Lambda^{\alpha}u\|_{L^{2}}^{2}+\|u\|_{L^{2}}^{2})\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}+C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}(\|\Lambda^{\alpha}
u\|_{L^{2}}^{2}+\|u\|_{L^{2}}^{2})\|\Lambda^{2\alpha}u\|_{L^{2}}\\
&\leq\frac{1}{16}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}^{2}+C\|(u,\Lambda^{\alpha}u)\|_{L^{2}}^{4}\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)\|_{L^{2}}^{2}+C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}\|(u,b,\Lambda^{\alpha}u,\Lambda^{\frac{3}{2}\beta}b)\|_{L^{2}}^{2},
\end{align*}
where we have applied the following estimate
$$\|\Lambda^{2\alpha}u\|_{L^{2}}\leq\|\Lambda^{\beta}b\|_{L^{2}}(\|b\|_{L^{2}}+\|\Lambda^{\frac{3\beta}{2}}b\|_{L^{2}})+\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}+\|\Lambda^{\alpha}u\|_{L^{2}}(\|\Lambda^{\alpha}u\|_{L^{2}}+\|u\|_{L^{2}}),$$
which is proved in the estimate \eqref{u2alpha}.
The term $J_3$ can be similarly estimated as follows
\begin{align*}
\mid J_{3}\mid&\leq
C\|\sqrt{\rho}\|_{L^{\infty}}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\nabla
u\|_{L^{\frac{n}{\alpha}}}\|\partial_{t}u\|_{L^{\frac{2n}{n-2\alpha}}}\\
&\leq
C\|\rho_{0}\|_{L^{\infty}}^{\frac{1}{2}}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}\|\Lambda^{\beta}u\|_{L^{2}}\\
&\leq
C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}\|u\|_{L^{2}}^{1-\frac{\beta}{\alpha}}\|\Lambda^{\alpha}u\|_{L^{2}}^{\frac{\beta}{\alpha}}\\
&\leq
\frac{1}{16}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}^{2}+C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}(\|u\|_{L^{2}}^{2}+\|\Lambda^{\alpha}u\|_{L^{2}}^{2}).
\end{align*}
For the last term $J_4$ we can get that by integration by parts and a similar argument
\begin{align*} \mid
J_{4}\mid&=\mid\int_{\mathbb{R}^{n}}\partial_{t}(b_{i}\partial_{i}b_{j})\partial_{t}u_{j}\mathbb{d}x\mid\\
&=\mid-\int_{\mathbb{R}^{n}}\partial_{t}(b_{i}b_{j})\partial_{t}\partial_{i}u_{j}\mathbb{d}x\mid\\
&\leq
C\|\partial_{t}b\|_{L^{2}}\|b\|_{L^{\frac{2n}{n-2\beta}}}\|\partial_{t}\nabla
u\|_{L^{\frac{n}{\beta}}}\\
&\leq
C\|\partial_{t}b\|_{L^{2}}\|\Lambda^{\beta}b\|_{L^{2}}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}\\
&\leq\frac{1}{16}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}^{2}+C\|\partial_{t}b\|_{L^{2}}^{2}\|\Lambda^{\beta}b\|_{L^{2}}^{2}.
\end{align*}
Inserting all the above estimates into the equality \eqref{3.28} it follows that
\begin{align}\label{3.29}
\frac{\mathrm{d}}{\mathrm{d}t}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}+\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}^{2}\leq&\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}\|(u,b,\Lambda^{\alpha}u,\Lambda^{\frac{3}{2}\beta}b)\|_{L^{2}}^{2}+C\|\partial_{t}b\|_{L^{2}}^{2}\|\Lambda^{\beta}b\|_{L^{2}}^{2}
\notag\\&+C\|(u,\Lambda^{\alpha}u)\|_{L^{2}}^{4}\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)\|_{L^{2}}^{2}.
\end{align}
Moreover, differentiating the equation $\eqref{1.1}_{3}$ with respect to $t$
shows
$$\partial_{tt}b+(u\cdot\nabla)\partial_{t}b+(-\Delta)^{\beta}\partial_{t}b=\partial_{t}(b\cdot\nabla
u)-\partial_{t}u\cdot\nabla b.$$
Multiplying both sides of the above equation by $\partial_{t}b$
and integrating the resulting equality by parts and using a similar argument as deducing the estimate (\ref{3.29}) we obtain
\begin{align*}
\frac{1}{2}\frac{\mathrm{d}}{\mathrm{d}t}\|\partial_{t}b\|_{L^{2}}^{2}+\|\Lambda^{\beta}\partial_{t}b\|_{L^{2}}^{2}&=\int_{\mathbb{R}^{n}}\partial_{t}(b\cdot\nabla
u)\cdot\partial_{t}b\mathrm{d}x-\int_{\mathbb{R}^{n}}\partial_{t}u\cdot\nabla
b\cdot\partial_{t}b\mathrm{d}x\\
&=\int_{\mathbb{R}^{n}}\partial_{t}b\cdot\nabla
u\cdot\partial_{t}b\mathrm{d}x+\int_{\mathbb{R}^{n}}b\cdot\nabla\partial_{t}
u\cdot\partial_{t}b\mathrm{d}x-\int_{\mathbb{R}^{n}}\partial_{t}u\cdot\nabla
b\cdot\partial_{t}b\mathrm{d}x\\
&\leq\|\partial_{t}b\|_{L^{2}}\|\nabla
u\|_{L^{\frac{n}{\beta}}}\|\partial_{t}b\|_{L^{\frac{2n}{n-2\beta}}}+\|b\|_{L^{\frac{2n}{n-2\beta}}}\|\nabla\partial_{t}u\|_{L^{\frac{n}{\beta}}}\|\partial_{t}b\|_{L^{2}}\\
&\qquad+\|\partial_{t}b\|_{L^{2}}\|\partial_{t}u\|_{L^{\frac{2n}{n-2\alpha}}}\|\nabla
b\|_{L^{\frac{n}{\alpha}}}\\
&\leq\frac{1}{16}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}^{2}+\frac{1}{2}\|\Lambda^{\beta}\partial_{t}b\|_{L^{2}}^{2}+\|\partial_{t}b\|_{L^{2}}^{2}(\|\Lambda^{\alpha}u\|_{L^{2}}^{2}+\|\Lambda^{\beta}b\|_{L^{2}}^{2}).
\end{align*}
Summing up the above estimate with the estimate \eqref{3.29} and using $c_{0}\|u\|_{L^{2}}\leq\|\sqrt{\rho}u\|_{L^{2}}$, we get
\begin{align}\label{3.30}
&\quad\frac{\mathrm{d}}{\mathrm{d}t}\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)\|_{L^{2}}^{2}+\|(\Lambda^{\alpha}\partial_{t}u,\Lambda^{\beta}\partial_{t}b)\|_{L^{2}}^{2}\notag\\
&\leq
C\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)\|_{L^{2}}^{2}\|(\sqrt{\rho}u,b,\Lambda^{\alpha}u,\Lambda^{\frac{3}{2}\beta}b)\|_{L^{2}}^{2}+\|(\sqrt{\rho}u,\Lambda^{\alpha}u)\|_{L^{2}}^{4}\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)\|_{L^{2}}^{2}.
\end{align}
Using the Gr\"{o}nwall Lemma \ref{lemma1} and the a priori estimates \eqref{3.2}, \eqref{3.4}, it
yields
$$\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)(t)\|_{L^{2}}^{2}+\int_{0}^{t}\|(\Lambda^{\alpha}\partial_{\tau}u,\Lambda^{\beta}\partial_{\tau}b)(\tau)\|_{L^{2}}^{2}\leq
C_{0}(t).$$
In addition, we can get from the estimate \eqref{3.30} by multiplying time $t$ that
\begin{align*}
&\quad\frac{\mathrm{d}}{\mathrm{d}t}(t\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)\|_{L^{2}}^{2})+t\|(\Lambda^{\alpha}\partial_{t}u,\Lambda^{\beta}\partial_{t}b)\|_{L^{2}}^{2}\notag\\
&\leq\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)\|_{L^{2}}^{2}+
Ct\|(\sqrt{\rho}\partial_{t}u,\partial_{t}b)\|_{L^{2}}^{2}\|(\sqrt{\rho}u,b,\Lambda^{\alpha}u,\Lambda^{\frac{3}{2}\beta}b)\|_{L^{2}}^{2}\\&\qquad+\|(\sqrt{\rho}u,\Lambda^{\alpha}u)\|_{L^{2}}^{4}t\|(\Lambda^{\alpha}u,\Lambda^{\beta}b)\|_{L^{2}}^{2}.
\end{align*}
By Lemma \ref{3.2} and the Gr\"{o}nwall Lemma \ref{lemma1}, we have
\begin{align*}
t\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{2}+t\|\partial_{t}b\|_{L^{2}}^{2}+\int_{0}^{t}\tau\|\Lambda^{\alpha}\partial_{\tau}u\|_{L^{2}}^{2}+\tau\|\Lambda^{\beta}\partial_{\tau}b\|_{L^{2}}^{2}\mathrm{d}\tau
\leq C_{0}.
\end{align*}
It follows from the Stokes equations (\ref{3.24}) that
\begin{align*}
\|\nabla P\|_{L^{2}}&\leq C\|\rho\partial_{t}u\|_{L^{2}}+C\|\rho
u\cdot\nabla u\|_{L^{2}}+C\|b\cdot\nabla b\|_{L^{2}}\\
&\leq
C\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}+C\|\Lambda^{\alpha}u\|_{L^{2}}(\|\Lambda^{\alpha}u\|_{L^{2}}+\|u\|_{L^{2}})+C\|\Lambda^{\beta}b\|_{L^{2}}(\|\Lambda^{\frac{3}{2}\beta}b\|_{L^{2}}+\|b\|_{L^{2}}).
\end{align*}
We thus deduce by the a priori estimates \eqref{3.2}, \eqref{3.4} and the inequality \eqref{3.19} that
$$\int_{0}^{t}\|\nabla P\|_{L^{2}}^{2}\mathrm{d}\tau\leq C_{0}.$$
We thus conclude the proof of Lemma \ref{3.3}.
\end{proof}
The following Lemma \ref{3.4} plays a key role in proving the
uniqueness of a solution.
\begin{lemma}\label{lemma3.4}
Under the assumptions of Theorem \ref{thm1}, the corresponding
solution $(\rho,u,b)$ of the equations \eqref{1.1} admits the
following bounds for any $t>0$
\begin{align}\label{3.31}
\int_{0}^{t}\|\nabla u(\tau)\|_{L^{\infty}}\mathrm{d}\tau\leq
C_{0}(t),
\end{align}
\begin{align}\label{3.32}
\|\nabla\rho(t)\|_{L^{\frac{2n}{6\alpha-n}}}\leq C_{0}(t),
\end{align}
where $C_{0}(t)$ depends only on the initial data and the time $t$.
\end{lemma}
\begin{proof}
First, for any $2<p<\frac{2n}{n-2\alpha}$, we have by the interpolation inequality of Lebesgue spaces
\begin{align}\label{3.34}
\|\rho\partial_{t}u\|_{L^{p}}&\leq\|\rho\partial_{t}u\|_{L^{2}}^{\theta}\|\rho\partial_{t}u\|_{L^{\frac{2n}{n-2\alpha}}}^{1-\theta}\notag\\
&\leq\|\sqrt{\rho}\|_{L^{\infty}}^{\theta}\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{\theta}\|\rho\|_{L^{\infty}}^{1-\theta}\|\partial_{t}u\|_{L^{\frac{2n}{n-2\alpha}}}^{1-\theta}\notag\\
&\leq\|\sqrt{\rho}\partial_{t}u\|_{L^{2}}^{\theta}\|\Lambda^{\alpha}\partial_{t}u\|_{L^{2}}^{1-\theta},
\end{align}
where
$\theta\triangleq1-\frac{n}{2\alpha}+\frac{n}{p\alpha}\in(0,1)$.
Next, by the H\"older and Sobolev's inequalities we have
\begin{align}\label{3.35}
\|u\cdot\nabla u\|_{L^{\frac{2n}{n-2\alpha}}}&\leq
C\|u\|_{L^{\infty}}\|\nabla u\|_{L^{\frac{2n}{n-2\alpha}}}\notag\\
&\leq
C\|\Lambda^{\alpha}u\|_{L^{2}}^{2-\frac{n}{2\alpha}}\|\Lambda^{2\alpha}u\|_{L^{2}}^{\frac{n}{2\alpha}-1}\|\Lambda^{\alpha}u\|_{L^{2}}^{1-\frac{1}{\alpha}}\|\Lambda^{2\alpha}u\|_{L^{2}}^{\frac{1}{\alpha}}\notag\\
&\leq
C\|\Lambda^{\alpha}u\|_{L^{2}}^{3-\frac{n}{2\alpha}-\frac{1}{\alpha}}\|\Lambda^{2\alpha}u\|_{L^{2}}^{\frac{n}{2\alpha}+\frac{1}{\alpha}-1}
\end{align}
Thus, by the interpolation in Lebesgue space, it can be deduced
\begin{align}\label{3.36}
\|\rho u\cdot\nabla u\|_{L^{p}}&\leq C\|\rho u\cdot\nabla
u\|_{L^{2}}^{\theta}\|\rho u\cdot\nabla
u\|_{L^{\frac{2n}{n-2\alpha}}}^{1-\theta}\notag\\
&\leq\|\rho\|_{L^{\infty}}^{\theta}\| u\cdot\nabla
u\|_{L^{2}}^{\theta}\|\rho\|_{L^{\infty}}^{1-\theta}\|
u\cdot\nabla u\|_{L^{\frac{2n}{n-2\alpha}}}^{1-\theta}\notag\\
&\leq
C_{0}(\|\Lambda^{\alpha}u\|_{L^{2}}^{3-\frac{n}{2\alpha}-\frac{1}{\alpha}}\|\Lambda^{2\alpha}u\|_{L^{2}}^{\frac{n}{2\alpha}+\frac{1}{\alpha}-1})^{1-\theta}\notag\\
&\leq
C_{0}(\|\Lambda^{\alpha}u\|_{L^{2}}^{2}+\|\Lambda^{2\alpha}u\|_{L^{2}}^{2})^{1-\theta},
\end{align}
where we have used that
\begin{align*}
\| u\cdot\nabla u\|_{L^{2}}&\leq
C\|u\|_{L^{\frac{2n}{n-2\alpha}}}\|\nabla
u\|_{L^{\frac{n}{\alpha}}}\\
&\leq C\|\Lambda^{\alpha}u\|_{L^{2}}\|\Lambda^{\beta}u\|_{L^{2}}\\
&\leq
C\|\Lambda^{\alpha}u\|_{L^{2}}(\|\Lambda^{\alpha}u\|_{L^{2}}+\|u\|_{L^{2}})\\&\leq
C_{0}.
\end{align*}
Using a similar argument as \eqref{3.36}, it can be obtained that
\begin{align}\label{3.37}
\|b\cdot\nabla
b\|_{L^{p}}\leq
C(\|\Lambda^{\beta}b\|_{L^{2}}^{2}+\|\Lambda^{2\beta}b\|_{L^{2}}^{2})^{1-\theta}.
\end{align}
Next, applying the $L^{p}$-estimate to Stoke equations \eqref{3.24}, we arrive at
\begin{align}\label{3.38}
\|\Lambda^{2\alpha}u\|_{L^{p}}\leq
C\|\rho\partial_{t}u\|_{L^{p}}+C\|\rho u\cdot\nabla
u\|_{L^{p}}+C\|b\cdot\nabla b\|_{L^{p}}.
\end{align}
Now, by the Gagliardo-Nirenberg's inequality, inserting \eqref{3.34}, \eqref{3.36}-\eqref{3.38}, it can be deduced that for $p>\frac{n}{2\alpha-1}$
\begin{align*}
\|\nabla u\|_{L^{\infty}}&\leq C\|\nabla
u\|_{L^{\frac{n}{\beta}}}^{1-\eta}\|\Lambda^{2\alpha}u\|_{L^{p}}^{\eta}\leq
C\|\Lambda^{\alpha}u\|_{L^{2}}^{1-\eta}\|\Lambda^{2\alpha}u\|_{L^{p}}^{\eta}\\
&\leq
C\|\Lambda^{\alpha}u\|_{L^{2}}^{1-\eta}(\|\rho\partial_{t}u\|_{L^{p}}+(\|\Lambda^{\alpha}u\|_{L^{2}}^{2}+\|\Lambda^{2\alpha}u\|_{L^{2}}^{2}+\|\Lambda^{\beta}b\|_{L^{2}}^{2}+\|\Lambda^{2\beta}b\|_{L^{2}}^{2})^{1-\theta})^{\eta},
\end{align*}
where $\eta=\frac{(2+n-2\alpha)p}{p(n+2\alpha)-2n}\in(0,1)$.
Using
Lemma \ref{3.1} and Lemma \ref{3.2}, we
have
\begin{align*}
\int_{0}^{t}\|\nabla u(\tau)\|_{L^{\infty}}\mathrm{d}\tau\leq
C_{0}(t).
\end{align*}
Finally, applying $\nabla$ on the both sides of the equation $\eqref{1.1}_{1}$, we get
$$\partial_{t}\nabla\rho+u\cdot\nabla(\nabla\rho)=-\nabla
u\cdot\nabla\rho.$$
Due to the divergence free condition $\nabla\cdot u=0,$ we have
$$\frac{\mathrm{d}}{\mathrm{d}t}\|\nabla\rho\|_{L^{\frac{2n}{6\alpha-n}}}\leq\|\nabla
u\|_{L^{\infty}}\|\nabla\rho\|_{L^{\frac{2n}{6\alpha-n}}}.$$
Using
the Gronwall Lemma \ref{lemma1} and the a priori estimate \eqref{3.31} it follows that
\begin{align*}
\|\nabla\rho\|_{L^{\frac{2n}{6\alpha-n}}}\leq\|\nabla\rho_{0}\|_{L^{\frac{2n}{6\alpha-n}}}\exp\int_{0}^{t}\|\nabla
u(\tau)\|_{L^{\infty}}\mathrm{d}\tau\leq C_{0}(t).
\end{align*}
We thus complete the proof of Lemma \ref{3.4}.
\end{proof}
\section{Proof of Theorem \ref{thm1}}
\setcounter{equation}{0}
This section aims at the proof of
Theorem \ref{thm1}. Thanks to Lemmas \ref{3.1}-\ref{3.4} and by the local existence
Proposition \ref{proposition1}, we can get the global existence of
strong solutions directly. In the following part, we prove the
continuity and uniqueness of the solution which we have just constructed.
\begin{proof}
Firstly, we prove the time continuity of the solution, namely
\begin{align}\label{4.1} \rho\in
C([0,T];L^{p}(\mathbb{R}^{n})),\frac{n}{2\alpha}\leq p<\infty,
\end{align}
\begin{align}\label{4.2}
\rho u\in C([0,T];L^{2}(\mathbb{R}^{n})).
\end{align}
\begin{align}\label{4.3}
u\in C([0,T];\dot
H^{\alpha}(\mathbb{R}^{n})).
\end{align}
\begin{align}\label{4.4}
b\in C([0,T];
H^{\beta}(\mathbb{R}^{n})).
\end{align}
To prove the
continuity on $[0,T]$, without loss of generality, we only need to prove the continuity at the initial time $t=0$. Since
$\partial_{t}\rho=-u\cdot\nabla\rho,$ it has
\begin{align*}
\|\rho(t)-\rho(0)\|_{L^{\frac{n}{2\alpha}}}&=\|\int_{0}^{t}\partial_{t}\rho(\tau)\mathrm{d}\tau\|_{L^{\frac{n}{2\alpha}}}\\
&=\|\int_{0}^{t}u\cdot\nabla\rho(\tau)\mathrm{d}\tau\|_{L^{\frac{n}{2\alpha}}}\\
&\leq\int_{0}^{t}\|u\cdot\nabla\rho(\tau)\|_{L^{\frac{n}{2\alpha}}}\mathrm{d}\tau\\
&\leq\int_{0}^{t}\|u(\tau)\|_{L^{\frac{2n}{n-2\alpha}}}\|\nabla\rho(\tau)\|_{L^{\frac{2n}{6\alpha-n}}}\mathrm{d}\tau\\
&\leq\int_{0}^{t}\|\Lambda^{\alpha}u(\tau)\|_{L^{2}}\|\nabla\rho(\tau)\|_{L^{\frac{2n}{6\alpha-n}}}\mathrm{d}\tau\\
&\leq C_{0}(t)t,
\end{align*}
where in the last line we have used the a priori estimates \eqref{3.4} and \eqref{3.32}.
By the H\"older inequality, one has
$$\|\rho(t)-\rho(0)\|_{L^{p}}\leq C\|\rho(t)-\rho(0)\|_{L^{\frac{n}{2\alpha}}}^{\frac{n}{2\alpha
p}}\|\rho(t)-\rho(0)\|_{L^{\infty}}^{1-\frac{n}{2\alpha p}}\leq
C_{0}(t)t^{\frac{n}{2\alpha p}},$$
which implies that $\rho$ is
continuous at the original time and satisfies
$\lim_{t\rightarrow 0}\|\rho-\rho_{0}\|_{L^{p}}=0$. To
prove \eqref{4.2}, we first notice that
\begin{align*}
\|\rho
u(t)-\rho u(0)\|_{L^{\frac{2n}{n+2\alpha}}}&=\|\int_{0}^{t}
\partial_{t}(\rho
u)(\tau)\mathrm{d}\tau\|_{L^{\frac{2n}{n+2\alpha}}}\\
&=\|\int_{0}^{t}
\partial_{t}\rho
u(\tau)+\rho\partial_{t}u(\tau)\mathrm{d}\tau\|_{L^{\frac{2n}{n+2\alpha}}}\\
&\leq\int_{0}^{t}\|
\partial_{t}\rho
u(\tau)\|_{L^{\frac{2n}{n+2\alpha}}}\mathrm{d}\tau+\int_{0}^{t}\|\rho\partial_{t}u(\tau)\|_{L^{\frac{2n}{n+2\alpha}}}\mathrm{d}\tau\\
&\leq\int_{0}^{t}\| u\cdot\nabla\rho
u(\tau)\|_{L^{\frac{2n}{n+2\alpha}}}\mathrm{d}\tau+\int_{0}^{t}\|\sqrt{\rho}\sqrt{\rho}\partial_{t}u(\tau)\|_{L^{\frac{2n}{n+2\alpha}}}\mathrm{d}\tau\\
&\leq\int_{0}^{t}\|\nabla\rho
(\tau)\|_{L^{\frac{2n}{6\alpha-n}}}\|u(\tau)\|_{L^{\frac{2n}{n-2\alpha}}}^{2}\mathrm{d}\tau+\int_{0}^{t}\|\rho(\tau)\|_{L^{\frac{n}{2\alpha}}}^{\frac{1}{2}}\|\sqrt{\rho}\partial_{t}u(\tau)\|_{L^{2}}\mathrm{d}\tau\\
&\leq C_{0}(t)\int_{0}^{t}\|\Lambda^{\alpha}u(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau+C_{0}\int_{0}^{t}\|\sqrt{\rho}\partial_{t}u(\tau)\|_{L^{2}}\mathrm{d}\tau\\
&\leq C_{0}(t)t+C_{0}t^{\frac{1}{2}}(\int_{0}^{t}\|\sqrt{\rho}\partial_{t}u(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau)^{\frac{1}{2}}\\
&\leq C_{0}(t)t+C_{0}t^{\frac{1}{2}},
\end{align*}
By the
H\"older inequality, one has
\begin{align*}
\|\rho u(t)-\rho u(0)\|_{L^{2}}&\leq\|\rho
u(t)-\rho_{0}u_{0}\|_{L^{\frac{2n}{n+2\alpha}}}^{\frac{1}{2}}\|\rho
u(t)-\rho_{0}u_{0}\|_{L^{\frac{2n}{n-2\alpha}}}^{\frac{1}{2}}\\
&\leq(C_{0}(t)t+C_{0}t^{\frac{1}{2}})^{\frac{1}{2}}.
\end{align*}
Thus we have that $\rho u$ is continuous at the original time and
satisfies $\lim_{t\rightarrow 0}\|\rho u-\rho u(0)\|_{L^{2}}=0$. To prove \eqref{4.3}, we can obtain by direct
calculation,
\begin{align*}
\|\Lambda^{\alpha}u(t)-\Lambda^{\alpha}u(0)\|_{L^{2}}&=\|\int_{0}^{t}\partial_{\tau}(\Lambda^{\alpha}u)(\tau)\mathrm{d}\tau\|_{L^{2}}\\
&\leq\int_{0}^{t}\|\partial_{\tau}(\Lambda^{\alpha}u)(\tau)\|_{L^{2}}\mathrm{d}\tau\\
&\leq C(\int_{0}^{t}\|\Lambda^{\alpha}\partial_{\tau}u(\tau)\|_{L^{2}}^{2}\mathrm{d}\tau)^{\frac{1}{2}}\cdot t^{\frac{1}{2}}\\
&\leq C_{0}t^{\frac{1}{2}},
\end{align*}
Using a similar argument, we get
\begin{align*}
\|\Lambda^{\beta}b(t)-\Lambda^{\beta}b(0)\|_{L^{2}}\leq C_{0}t^{\frac{1}{2}}
\end{align*}
and
\begin{align*}
\|b(t)-b(0)\|_{L^{2}}
\leq C_{0}t^{\frac{1}{2}}.
\end{align*}
We obtain that
$\|b\|_{H^{\beta}}$ is continuous at the original time and
satisfies $\|b\|_{H^{\beta}}|_{t=0}=\|b_{0}\|_{H^{\beta}}$.
Next, we show the uniqueness of the
solution. Assume that $(\rho^{(1)},u^{(1)},b^{(1)})$ and
$(\rho^{(2)},u^{(2)},b^{(2)})$ are two solutions of the equations
\eqref{1.1} emanating from the same initial data $(\rho_0, u_0, b_0)$, and possess
the properties in Theorem \ref{1.1}. Their difference
$(\tilde{\rho},\tilde{u},\tilde{b})$ denoted by
$$\tilde{\rho}=\rho^{(2)}-\rho^{(1)},\tilde{u}=u^{(2)}-u^{(1)},\tilde{b}=b^{(2)}-b^{(1)}$$
satisfies the following equations
\begin{equation}\label{4.5}
\begin{cases}
\partial_{t}\tilde{\rho}+u^{(2)}\cdot\nabla\tilde{\rho}=-\tilde{u}\cdot\nabla\rho^{(1)},\\
\rho^{(2)}\partial_{t}\tilde{u}+\rho^{(2)}u^{(2)}\cdot\nabla\tilde{u}+(-\Delta)^{\alpha}\tilde{u}+\nabla (P^{(2)}-P^{(1)})\\
=-\tilde{\rho}(\partial_{t}u^{(1)}+u^{(1)}\cdot\nabla u^{(1)})-\rho^{(2)}\tilde{u}\cdot\nabla u^{(1)}+\tilde{b}\cdot\nabla b^{(2)}-b^{(1)}\cdot\nabla\tilde{b}, \\
\partial_{t}\tilde{b}+u^{(2)}\cdot\nabla\tilde{b}+(-\Delta)^{\beta}\tilde{b}=\tilde{b}\cdot\nabla u^{(2)}+b^{(1)}\cdot\nabla\tilde{u}-\tilde{u}\cdot\nabla b^{(1)}.
\end{cases}
\end{equation}
We estimate the difference $(\tilde{\rho},\tilde{u},\tilde{b})$ in
$L^{2}(\mathbb{R}^{n})$ space. Dotting the equations $\eqref{4.5}_{2,3}$ by
$(\tilde{u},\tilde{b})$ and applying the divergence free
condition, we find
\begin{align}\label{4.6}
\frac{1}{2}\frac{\mathrm{d}}{\mathrm{d}t}(\|\sqrt{\rho^{(2)}}\tilde{u}(t)\|_{L^{2}}^{2}+\|\tilde{b}\|_{L^{2}}^{2})+\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}^{2}+\|\Lambda^{\beta}\tilde{b}\|_{L^{2}}^{2}=L_{1}+L_{2}+L_{3}+L_{4},
\end{align}
where
\begin{align*}
&L_{1}=-\int_{\mathbb{R}^{n}}\rho^{(2)}\tilde{u}\cdot\nabla
u^{(1)}\cdot\tilde{u}\mathrm{d}x,\qquad
L_{2}=-\int_{\mathbb{R}^{n}}\tilde{\rho}(\partial_{t}u^{(1)}+u^{(1)}\cdot\nabla u^{(1)})\cdot\tilde{u}\mathrm{d}x,\\
&L_{3}=\int_{\mathbb{R}^{n}}\tilde{b}\cdot\nabla
b^{(2)}\cdot\tilde{u}\mathrm{d}x,\qquad
L_{4}=\int_{\mathbb{R}^{n}}(\tilde{b}\cdot\nabla u^{(2)}-\tilde{u}\cdot\nabla b^{(1)})\cdot\tilde{b}\mathrm{d}x.
\end{align*}
By H\"older inequality, one has
\begin{align}\label{4.7}
L_{1}\leq C\|\nabla
u^{(1)}\|_{L^{\infty}}\|\sqrt{\rho^{(2)}}\tilde{u}\|_{L^{2}}^{2}.
\end{align}
By the H\"older, Sobolev and
Young's inequalities and the estimate \eqref{3.35}, it yields
\begin{align}\label{4.8}
L_{2}&\leq
C\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}\|\tilde{u}\|_{L^{\frac{2n}{n-2\alpha}}}(\|\partial_{t}u^{(1)}\|_{L^{\frac{2n}{n-2\alpha}}}+\|u^{(1)}\cdot\nabla
u^{(1)}\|_{L^{\frac{2n}{n-2\alpha}}})\notag\\
&\leq
C\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}(\|\Lambda^{\alpha}\partial_{t}u^{(1)}\|_{L^{2}}+\|\Lambda^{\alpha}u\|_{L^{2}}^{3-\frac{n}{2\alpha}-\frac{1}{\alpha}}\|\Lambda^{2\alpha}u\|_{L^{2}}^{\frac{n}{2\alpha}+\frac{1}{\alpha}-1})\notag\\
&\leq\frac{1}{16}\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}^{2}+C\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}^{2}(\|\Lambda^{\alpha}\partial_{t}u^{(1)}\|_{L^{2}}^{2}
+\|\Lambda^{\alpha}u\|_{L^{2}}^{6-\frac{n}{\alpha}-\frac{2}{\alpha}}\|\Lambda^{2\alpha}u\|_{L^{2}}^{\frac{n}{\alpha}+\frac{2}{\alpha}-2}).
\end{align}
By a similar argument as deriving $L_{2}$, we obtain
\begin{align}\label{4.9}
L_{3}&\leq C\|\tilde{b}\|_{L^{2}}\|\nabla
b^{(2)}\|_{L^{\frac{n}{\alpha}}}\|\tilde{u}\|_{L^{\frac{2n}{n-2\alpha}}}\notag\\
&\leq
C\|\tilde{b}\|_{L^{2}}\|\Lambda^{\beta}b^{(2)}\|_{L^{2}}\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}\notag\\
&\leq
\frac{1}{16}\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}^{2}+C\|\Lambda^{\beta}b^{(2)}\|_{L^{2}}^{2}\|\tilde{b}\|_{L^{2}}^{2}
\end{align}
and
\begin{align}\label{4.10}
L_{4}&\leq C\|\nabla
u^{(2)}\|_{L^{\infty}}\|\tilde{b}\|_{L^{2}}^{2}+C\|\tilde{b}\|_{L^{2}}\|\nabla
b^{(1)}\|_{L^{\frac{n}{\alpha}}}\|\tilde{u}\|_{L^{\frac{2n}{n-2\alpha}}}\notag\\
&\leq C\|\nabla
u^{(2)}\|_{L^{\infty}}\|\tilde{b}\|_{L^{2}}^{2}+C\|\tilde{b}\|_{L^{2}}\|\Lambda^{\beta}
b^{(1)}\|_{L^{2}}\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}\notag\\
&\leq\frac{1}{16}\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}^{2}+\|\tilde{b}\|_{L^{2}}^{2}(\|\nabla
u^{(2)}\|_{L^{\infty}}+\|\Lambda^{\beta} b^{(1)}\|_{L^{2}}^{2}).
\end{align}
Inserting \eqref{4.7}-\eqref{4.10} into \eqref{4.6}, it leads to
\begin{align*}
&\frac{\mathrm{d}}{\mathrm{d}t}(\|\sqrt{\rho^{2}}\tilde{u}(t)\|_{L^{2}}^{2}+\|\tilde{b}\|_{L^{2}}^{2})+\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}^{2}+\|\Lambda^{\beta}\tilde{b}\|_{L^{2}}^{2}\\
&\leq
C(\|\Lambda^{\alpha}\partial_{t}u^{(1)}\|_{L^{2}}^{2}+\|\Lambda^{\alpha}u\|_{L^{2}}^{6-\frac{n}{\alpha}-\frac{2}{\alpha}}\|\Lambda^{2\alpha}u\|_{L^{2}}^{\frac{n}{\alpha}+\frac{2}{\alpha}-2})\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}^{2}\\
&\qquad+C(\|\nabla u^{(2)}\|_{L^{\infty}}+\|\Lambda^{\beta}
b^{(1)}\|_{L^{2}}+\|\Lambda^{\beta}b^{(2)}\|_{L^{2}}^{2})(\|\tilde{b}\|_{L^{2}}^{2}+\|\sqrt{\rho^{(2)}}\tilde{u}\|_{L^{2}}^{2}).
\end{align*}
In order to close the above inequality, we need to derive the estimate of $\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}$ as follows:
\begin{align*}
\frac{\mathrm{d}}{\mathrm{d}t}\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}^{\frac{n}{2\alpha}}&\leq
C\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}^{\frac{n}{2\alpha}-1}\|\tilde{u}\cdot\nabla\rho^{(1)}\|_{L^{\frac{n}{2\alpha}}}\\
&\leq
C\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}^{\frac{n}{2\alpha}-1}\|\tilde{u}\|_{L^{\frac{2n}{n-2\alpha}}}\|\nabla\rho^{(1)}\|_{L^{\frac{2n}{6\alpha-n}}}\\
&\leq
C\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}^{\frac{n}{2\alpha}-1}\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}\|\nabla\rho^{(1)}\|_{L^{\frac{2n}{6\alpha-n}}},
\end{align*}
which leads to
$$\frac{\mathrm{d}}{\mathrm{d}t}\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}\leq
C\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}\|\nabla\rho^{(1)}\|_{L^{\frac{2n}{6\alpha-n}}}.$$
Now let us denote
\begin{align*}
&X(t)\triangleq\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}},\qquad
Y(t)\triangleq\|\sqrt{\rho^{(2)}}\tilde{u}(t)\|_{L^{2}}^{2}+\|\tilde{b}(t)\|_{L^{2}}^{2},\\
&Z(t)\triangleq\|\Lambda^{\alpha}\tilde{u}\|_{L^{2}}^{2}+\|\Lambda^{\beta}\tilde{b}\|_{L^{2}}^{2},\qquad
A\triangleq\|\nabla\rho^{(1)}\|_{L^{\frac{2n}{6\alpha-n}}},\\
&\gamma(t)\triangleq C(\|\nabla u^{(2)}\|_{L^{\infty}}+\|\Lambda^{\beta}
b^{(1)}\|_{L^{2}}^{2}+\|\Lambda^{\beta}b^{(2)}\|_{L^{2}}^{2}),\\
&\eta(t)\triangleq
C(\|\Lambda^{\alpha}\partial_{t}u^{(1)}\|_{L^{2}}^{2}+\|\Lambda^{\alpha}u\|_{L^{2}}^{6-\frac{n}{\alpha}-\frac{2}{\alpha}}\|\Lambda^{2\alpha}u\|_{L^{2}}^{\frac{n}{\alpha}+\frac{2}{\alpha}-2}),
\end{align*}
which satisfy
\begin{align*}
\begin{cases}
\frac{\mathrm{d}}{\mathrm{d}t}X(t)\leq AZ^{\frac{1}{2}}(t),\\
\frac{\mathrm{d}}{\mathrm{d}t}Y(t)+Z(t)\leq\gamma(t)Y(t)+\eta(t)X^{2}(t), \\
X(0)=0, \\
\end{cases}
\end{align*}
According to the estimates of Lemmas \ref{3.1}-\ref{3.4}, we get
$$\int_{0}^{t}\gamma(\tau)\mathrm{d}\tau\leq C_{0}(t),\qquad
\int_{0}^{t}\tau\eta(\tau)\mathrm{d}\tau\leq C_{0}(t).$$ Thus, it
follows from Lemma \ref{2.2} that
$$\|\sqrt{\rho^{(2)}}\tilde{u}(t)\|_{L^{2}}^{2}+\|\tilde{b}(t)\|_{L^{2}}^{2}=\|(\Lambda^{\alpha}\tilde{u},\Lambda^{\alpha}\tilde{b})(\tau)\|_{L^{2}}^{2}=\|\tilde{\rho}\|_{L^{\frac{n}{2\alpha}}}=0.$$
which implies that
$$\rho^{(2)}\equiv \rho^{(1)},\qquad u^{(2)}\equiv u^{(1)},\qquad
b^{(2)}\equiv b^{(1)} \qquad \mbox{on}\ [0,T],$$
and we prove the uniqueness part of Theorem
\ref{1.1}. The proof of Theorem \ref{1.1} is thus completed.
\end{proof}
\textbf{Acknowledgements} The research of B Yuan was partially
supported by the National Natural Science Foundation of China (No.
11471103).
|
\section{Introduction}
A \emph{circle graph} is an intersection graph of chords on a circle; each vertex corresponds to a chord and two vertices are adjacent whenever their corresponding chords intersect. A class of graphs is \emph{$\chi$-bounded} if there exists some function which bounds the maximum chromatic number of graphs in the class in terms of their clique number $\omega$.
We call such a function a \emph{$\chi$-bounding function}.
Gy{\'a}rf{\'a}s~\cite{gyarfas1985chromatic} proved that circle graphs are $\chi$-bounded and asked~\cite{gyarfas1987problems,gyarfas1985covering} for improved $\chi$-bounding functions. In particular Gy{\'a}rf{\'a}s~\cite{gyarfas1987problems} originally asked if a linear $\chi$-bounding function was possible. This was answered in the negative by Kostochka~\cite{kostochka1988upper} who gave the superlinear lower bound of $\frac{1}{2}\omega (\ln \omega - 2)$. Matching this up to a constant factor, we prove the first $O(\omega \log \omega)$ upper bound.
\begin{theorem}\label{main}
Every circle graph with clique number at most $\omega$ has chromatic number at most $2\omega \log_2 (\omega) +2\omega \log_2(\log_2 (\omega)) + 10\omega$.
\end{theorem}
Theorem~\ref{main} follows a number of improvements to the $\chi$-bounding function over the last 35 years~\cite{gyarfas1985chromatic,kostochka1988upper,kostochka1997covering,daviescircle}. In particular we extend and refine the techniques that were recently introduced by the author and McCarty~\cite{daviescircle} to prove the first polynomial $\chi$-bounding function of $O(\omega^2)$ for circle graphs.
Two other classes generalising circle graphs that are now known to have polynomially $\chi$-bounding functions are interval filament graphs~\cite{daviescircle,krawczyk2017line} and grounded $L$-graphs~\cite{davies2021colouring}. Combining Theorem~\ref{main} with a result in~\cite{krawczyk2017line} improves the best known $\chi$-bounding function for interval filaments graphs from $O(\omega^4)$ to $O(\omega^3\log \omega)$.
There are also many classes that contain circle graphs and are known to be $\chi$-bounded (although they usually have extremely large $\chi$-bounding functions), for the most general examples see~\cite{davies2020vertex,scott2020induced,rok2019coloring,chudnovsky2016induced}, and for more on $\chi$-boundedness see the recent survey by Scott and Seymour~\cite{scott2020survey}.
Circle graphs and their representations are fundamental objects that appear in a diverse range of study. Some examples include knot theory~\cite{bar1995vassiliev,birman1993knot}, bioinformatics~\cite{hofacker1998combinatorics}, quantum field theory~\cite{marie2013chord}, quantum computing~\cite{bravyi2007measurement,van2004graphical}, and data structures~\cite{flajolet1980sequence}. On the more combinatorial side, in addition to discrete and computational geometry, circle graphs and their representations also appear in the study of continued fractions~\cite{touchard1952probleme}, vertex-minors~\cite{geelen2020grid}, matroid representation~\cite{bouchet1987unimodularity}, and in various sorting problems~\cite{golumbic2004algorithmic}. Circle graphs are also deeply related to planar graphs; the fundamental graphs of planar graphs are exactly the class of bipartite circle graphs~\cite{de1984characterization}. Direct applications of colouring circle graphs include finding the minimum number of stacks needed to obtain a given permutation~\cite{even1971queues}, solving routing problems such as in VLSI physical design~\cite{sherwani2012algorithms}, and finding stack layouts of graphs, which also has a number of additional applications of its own (see~\cite{dujmovic2004linear}).
With these applications in mind, it is desirable to have an efficient algorithm for colouring circle graphs. While their clique numbers can be found in polynomial time~\cite{gavril1973}, unfortunately the problem of determining their chromatic number is NP-complete~\cite{garey1980complexity}. So the best that can be hoped for is an efficient approximation algorithm. The proof of Theorem~\ref{main} is constructive and yields a practical polynomial time algorithm for colouring circle graphs with a colouring that is optimal up to at most a logarithmic factor of the chromatic number.
For completeness, we also provide a new simple lower bound construction for the {$\chi$-bounding} function of circle graphs. As a bonus it improves Kostochka's~\cite{kostochka1988upper} lower bound by a factor of 2.
\begin{theorem}\label{lower}
For every positive integer $\omega$ there is a circle graph with clique number at most $\omega$ and chromatic number at least $\omega(\ln \omega - 2)$.
\end{theorem}
For large clique number this leaves a constant factor of about $2\log_2(e) \approx 2.8854$ between the upper and lower bounds. These new upper and lower bounds are remarkably tight, but the difference between the logarithmic bases used in the upper and lower bounds is certainly curious.
For small clique number just one non-trivial tight bound is known; the maximum chromatic number of a triangle-free circle graph is equal to 5~\cite{kostochka1988upper,ageev1996triangle}.
In the next case, the best known upper bound is due to Nenashev~\cite{nenashev2012upper} who proved that $K_4$-free circle graphs have chromatic number at most 30.
By optimizing the proof of Theorem~\ref{main} to the $\omega=3$ case, it is possible to improve this upper bound to 19. We sketch the required modifications after the proof of Theorem~\ref{main}.
The proof of Theorem~\ref{main} is entirely self-contained and covered in the next few sections. In the last section we prove Theorem~\ref{lower}.
\section{Preliminaries}
The proof of Theorem~\ref{main} is essentially by proving a stronger statement on being able to extend certain well-structured partial pre-colourings. This better facilitates an inductive argument and is an idea most famously used in Thomassen's~\cite{thomassen1994every} proof that planar graphs are 5-chooseable. As in~\cite{daviescircle}, we use what we call a pillar assignment to colour our circle graphs. The reason for this is two-fold: pillar assignments provide a convenient way to describe the possible pre-colourings, and they also act as a useful tool for extending the pre-colourings.
However we require a definition of pillar assignments that is different to that of~\cite{daviescircle}.
In~\cite{daviescircle} we used pillar assignments to obtain an improper colouring such that every monochromatic component was a permutation graph.
By exploiting the structure of our improper colouring and using a natural Tur{\'a}n-type lemma on permutation graphs, we were able to bound the number of colours needed in this improper colouring.
Then finally a proper colouring was obtained by refining the improper colouring.
Although significantly easier to do so, obtaining a proper colouring by first going via this improper colouring appears to present a degree of inefficiency in minimising the number of colours used.
So the most significant difference with the notion of pillar assignment that we use is that it provides a proper colouring of the circle graph directly.
This involves colouring certain induced permutation subgraphs in a particular well-structured way.
The purpose of this additional structure in the colouring is to allow for a new Tur{\'a}n-type lemma. Although this lemma is less natural, it is much more specialised to our notion of pillar assignments.
With this new notion of pillar assignment and its tailor-made Tur{\'a}n-type lemma, we are then able to obtain the improved bounds with an inductive argument on extending pillar assignments in a similar way to in~\cite{daviescircle}.
As a step towards proving our required tailor-made Tur{\'a}n-type lemma, we actually prove a tight (and somewhat more abstract) version of the Tur{\'a}n-type lemma on permutation graphs used in~\cite{daviescircle} (see Theorem~\ref{estype}).
For convenience of proving Theorem~\ref{main} we use an interval overlap representation of our circle graphs rather than a chord diagram representation. An \emph{interval system} is a collection of open intervals in $(0,1)$ such that no two share an endpoint. Two distinct intervals $I_1,I_2$ \emph{overlap} if they have non-empty intersection, and neither is contained in the other. The \emph{overlap graph} of an interval system $\mathcal{I}$ is the graph with vertex set $\mathcal{I}$ where two vertices are adjacent whenever their corresponding intervals overlap. It can easily be checked that circle graphs are exactly overlap graphs of interval systems.
Similarly, permutation graphs are exactly the overlap graphs of interval systems $\mathcal{I}$ such that there exists a $p\in (0,1)$ with $p\in I$ for all intervals $I\in \mathcal{I}$.
It is often more convenient to examine properties of a circle graph as equivalent properties of their interval systems. Note that sets of pairwise non-overlapping intervals in an interval system correspond to stable sets in the overlap graph, and sets of pairwise overlapping intervals correspond to cliques.
Given an interval system $\mathcal{I}$, we let $\omega(\mathcal{I})$ be equal to the size of the largest set of pairwise overlapping intervals contained in $\mathcal{I}$.
Equivalently, $\omega(\mathcal{I})$ is equal to the clique number of the overlap graph of $\mathcal{I}$.
Similarly we consider colourings of an interval system with a notion equivalent to that of colourings of their overlap graphs. A proper partial colouring of an interval system $\mathcal{I}$ is an assignment of colours to a subset of the intervals of $\mathcal{I}$ so that no pair of overlapping intervals receive the same colour. We say that a proper colouring of $\mathcal{I}$ is \emph{complete} if every interval of $\mathcal{I}$ is assigned a colour.
For an interval $I\subseteq (0,1)$, let $\ell(I)$ be its leftmost endpoint and let $r(I)$ be its rightmost endpoint. For two intervals $I_1,I_2\subseteq (0,1)$, we use $I_1<I_2$ to denote that $r(I_1) < \ell(I_2)$, and similarly $I_1 > I_2$ to denote that $\ell(I_1) > r(I_2)$.
Given a finite partially ordered set $(X, \preceq)$, and some $x\in X$, the \emph{height} $h(x)$ of $x$ in the partial order is equal to the maximum length of a chain ending in $x$. For a positive integer $k$, we let $[k] = \{1,\dots , k\}$.
We finish this section with a lemma on colouring permutation graphs that is used in our definition of pillar assignments.
In addition to the bound on the number of colours required, we also make use of the described additional properties of this colouring.
\begin{figure}
\centering
\begin{tikzpicture}
\def \w {6} \def \h {.45} \def \s {.5}
\tikzstyle{end} = [draw,circle, inner sep=.05cm]
\tikzstyle{T} = [thick, dashed]
\tikzstyle{One} = [thick]
\newcommand{\drawBase}{
\node[] (A) at (-\w,0) {};
\node[] (B) at (\w,0) {};
\draw[thick] (A) -- (B);
}
\newcommand{\drawI}[4]{
\draw[#4] (#1,0) -- ++(0,#3) -- ++({#2+(-1)*(#1)},0) -- ++(0,-#3);
}
\drawI{-5}{2}{5*\h}{One}
\node[label=below:{1}] at (-5,0.1) {};
\drawI{-3}{3}{3*\h}{One}
\node[label=below:{2}] at (-4,0.1) {};
\drawI{-4}{4}{4*\h}{One}
\node[label=below:{2}] at (-3,0.1) {};
\drawI{-2}{1}{2*\h}{One}
\node[label=below:{1}] at (-2,0.1) {};
\drawI{-1}{5}{\h}{One}
\node[label=below:{3}] at (-1,0.1) {};
\drawBase
\node[end, fill=gray, label=below:{$p$}] at (0,0) {};
\end{tikzpicture}
\caption{The colouring $\phi_p$ of an interval system whose intervals all contain $p$ in the case that $C=\{1,2,3\}$. The colour that the intervals receive is the number appearing below their leftmost endpoint.}
\label{fig:pillA}
\end{figure}
\begin{lemma}\label{permutation colouring}
Let $\mathcal{I}$ be an interval system with $\omega(\mathcal{I})= \omega$ such that all intervals of $\mathcal{I}$ contain some given point $p\in \mathbb{R}$, and let $C\subset \mathbb{N}$ have $|C|= \omega$.
Then there is a proper colouring $\phi_p :\mathcal{I} \to C$ such that if $I_1,\dots, I_k \in \mathcal{I}$ are intervals with $\phi_p (I_1) < \dots < \phi_p (I_k)$ and $\ell(I_1) < \dots < \ell(I_k)$
(or $r(I_1) < \dots < r(I_k)$),
then there exist $k$ pairwise overlapping intervals $I_1^*, \dots I_k^*\in \mathcal{I}$ with $\ell(I_1^*), \dots , \ell(I_k^*) \in [\ell(I_1), \ell(I_k)]$ (or $r(I_1^*), \dots , r(I_k^*) \in [r(I_1), r(I_k)]$ respectively).
\end{lemma}
\begin{proof}
Let $C=\{c_1, \dots , c_{\omega}\}$, where $c_1 < \dots < c_{\omega}$.
Let $\preceq$ be the partial order of $\mathcal{I}$ such that $I \preceq I'$ whenever $\ell(I)< \ell(I')$ and $r(I) < r(I')$ (or $I=I'$). Notice that two intervals overlap exactly when they are comparable in the partially ordered set $(\mathcal{I}, \preceq)$.
For each $I\in \mathcal{I}$, let $\phi_p (I)= c_{h(I)}$.
The colouring $\phi_p$ is exactly the same as a first fit colouring of the intervals of $\mathcal{I}$ when they are ordered according to either their leftmost or rightmost endpoints.
This provides a proper $C$-colouring as the size of the largest chain in $(\mathcal{I}, \preceq)$ is equal to $\omega$. For an example of such a colouring $\phi_p$, see Figure~\ref{fig:pillA}.
It remains to show that this colouring satisfies the desired properties.
Suppose that $I_1,\dots, I_k \in \mathcal{I}$ are such that $\phi_p(I_1) < \dots < \phi_p(I_k)$ and $\ell(I_1) < \dots < \ell(I_k)$.
Let $I_k^*= I_k$ and for each $j<k$ in decreasing order, let $I_j^*$ be the interval with $\ell(I_j)$ maximum, subject to $I_j^* \prec I_{j+1}^*$ and $\phi_p(I_j^*)=\phi_p(I_j)$. Such intervals $I_j^*$ must exist with $\ell(I_j) \le \ell(I_j^*) < \ell(I_{j+1}^*)$ by the choice of colouring $\phi_p$ as if $I'\in \mathcal{I}$ were an interval with $I' \prec I_{j+1}^*$, $\phi_p(I')=\phi_p(I_j)$, and $\ell(I')< \ell(I_{j+1}^*)$, then $I'$ and $I_{j}$ would be non-overlapping, and so $I_{j}$ would overlap with $I_{j+1}^*$ and hence precede $I_{j+1}^*$ in the partial order. Then $I_1^* \prec \dots \prec I_k^*$, and so $I_1^*, \dots I_k^*$ are pairwise overlapping with $\ell(I_1^*), \dots , \ell(I_k^*) \in [\ell(I_1), \ell(I_k)]$ as required.
The other case is very similar.
Suppose that $I_1,\dots, I_k \in \mathcal{I}$ are such that $\phi_p(I_1) < \dots < \phi_p(I_k)$ and $r(I_1) < \dots < r(I_k)$.
As before, let $I_k^*= I_k$ and for each $j<k$ in decreasing order, let $I_j^*$ be the interval with $r(I_j)$ maximum, subject to $I_j^* \prec I_{j+1}^*$ and $\phi_p(I_j^*)=\phi_p(I_j)$.
As before, such intervals $I_j^*$ must exist with $r(I_j) \le r(I_j^*) < r(I_{j+1}^*)$ by the choice of colouring $\phi_p$. So $I_1^* \prec \dots \prec I_k^*$ are again pairwise overlapping with $r(I_1^*), \dots , r(I_k^*) \in [r(I_1), r(I_k)]$ as required.
\end{proof}
\section{Pillar assignments}
We start this section by defining our notion of pillar assignments, the tool we use to colour circle graphs. The colouring in Lemma~\ref{permutation colouring} is crucial to the definition of pillar assignments and thus crucial for colouring our circle graphs. Afterwards we examine some properties of pillar assignments.
A \emph{pillar} of an interval system $\mathcal{I}$ is a point within $(0,1)$ that is distinct from the endpoints of the intervals of $\mathcal{I}$.
For totally ordered pillars $(P,\preceq)$, we say that an interval $I\in \mathcal{I}$ is \emph{assigned} to a pillar $p\in P$ if $p\in I$ and there is no pillar $p'\in P$ such that $p'\in I$ and $p' \prec p$. So every interval is assigned to at most one pillar.
For each pillar $p\in P$, we let $\mathcal{I}_p$ be the intervals of $\mathcal{I}$ that are assigned to $p$.
The \emph{foundation} $F_p$ of a pillar $p\in P$ is the open interval containing $p$ that has its endpoints in $\{p'\in P : p' \prec p\}\cup \{0,1\}$ and contains no pillar $p'\in P$ with $p' \prec p$.
Next we show how to obtain a proper partial colouring of an interval system $\mathcal{I}$ from a collection of totally ordered pillars $(P,\preceq)$.
We refer the reader to Figure~\ref{fig:pillB} for an illustration of a pillar assignment and the colouring obtained from ordered pillars.
For each pillar $p \in P$ in order, we assign a set of colours $C_p\subset \mathbb{N}$ to $p$ and a $C_p$-colouring $\phi_p: \mathcal{I}_p \to C_p$ of the intervals assigned to $p$ as follows.
If $p$ is the first pillar in the total order $\preceq$, then let $C_p= \left\{1,\dots, \omega(\mathcal{I}_p) \right\}$, and let $\psi_p = \phi_p$ be a $C_p$-colouring of $\mathcal{I}_p$ as in Lemma~\ref{permutation colouring}.
Otherwise let $p^*$ be the pillar immediately preceding $p$ in the total order $\preceq$.
Then let $\mathcal{F}_p$ be the intervals of $\mathcal{I}$ that have exactly one endpoint in $F_p$. Let $C_p$ be the set of the smallest $\omega(\mathcal{I}_p)$ positive integers that are not contained in $\psi_{p^*}(\mathcal{F}_p)$.
Then let $\phi_p$ be a $C_p$-colouring of $\mathcal{I}_p$ as in Lemma~\ref{permutation colouring}. Let $\psi_p=\psi_{p^*}\cup \phi_p$. Note that $\psi_p$ remains a proper partial colouring of $\mathcal{I}$ as the intervals of $\mathcal{I}_p$ are all contained in the foundation $F_p$, and so do not overlap with any of the intervals $\psi_{p^*}^{-1}(C_p)$ by the choice of $C_p$.
Then for the last pillar $q$ in the total order $\preceq$, we let $\psi_{(P,\preceq)}=\psi_q$. Another convenient equivalent definition which we often use is $\psi_{(P,\preceq)} = \bigcup_{p\in P} \phi_p$.
\begin{figure}
\centering
\begin{tikzpicture}
\def \w {6} \def \h {.45} \def \s {.5}
\tikzstyle{end} = [draw,circle, inner sep=.05cm]
\tikzstyle{T} = [thick, dashed]
\tikzstyle{One} = [thick]
\newcommand{\drawBase}{
\node[] (A) at (-7.5,0) {};
\node[] (B) at (7.5,0) {};
\draw[thick] (A) -- (B);
}
\newcommand{\drawI}[4]{
\draw[#4] (#1,0) -- ++(0,#3) -- ++({#2+(-1)*(#1)},0) -- ++(0,-#3);
}
\drawBase
\node[end, fill=gray, label=below:{$p_1$}] at (-4,0) {};
\drawI{-7}{-1}{5*\h}{One}
\node[label=below:{1}] at (-7,0.1) {};
\drawI{-6.25}{-3.5}{\h}{One}
\node[label=below:{1}] at (-6.25,0.1) {};
\drawI{-5.5}{-2.5}{2*\h}{One}
\node[label=below:{2}] at (-5.5,0.1) {};
\drawI{-4.75}{-1.5}{4*\h}{One}
\node[label=below:{3}] at (-4.75,0.1) {};
\node[end, fill=gray, label=below:{$p_3$}] at (-2,0) {};
\drawI{-3}{0}{3*\h}{One}
\node[label=below:{5}] at (-3,0.1) {};
\node[end, fill=gray, label=below:{$p_4$}] at (2,0) {};
\drawI{0.5}{2.25}{\h}{One}
\node[label=below:{2}] at (0.5,0.1) {};
\drawI{-0.5}{6.25}{4*\h}{One}
\node[label=below:{2}] at (-0.5,0.1) {};
\drawI{1.25}{4}{3*\h}{One}
\node[label=below:{6}] at (1.25,0.1) {};
\node[end, fill=gray, label=below:{$p_2$}] at (6.75,0) {};
\drawI{5.75}{7}{\h}{One}
\node[label=below:{4}] at (5.75,0.1) {};
\node[end, fill=gray, label=below:{$p_5$}] at (4.25,0) {};
\drawI{2.75}{4.75}{\h}{One}
\node[label=below:{1}] at (2.75,0.1) {};
\drawI{3.5}{5.25}{2*\h}{One}
\node[label=below:{3}] at (3.5,0.1) {};
\end{tikzpicture}
\caption{The colouring $\psi_{(P,\preceq )}$ of an interval system $\mathcal{I}$ for a collection of totally ordered pillars $(P,\preceq )$ with $P=\{p_1,p_2,p_3,p_4,p_5\}$ and $p_1 \prec p_2 \prec p_3 \prec p_4 \prec p_5$. The colour that the intervals receive is the number appearing below their leftmost endpoint. In this example we get that $C_{p_1}=\{1,2,3\}$, $C_{p_2}=\{4\}$, $C_{p_3}=\{5\}$, $C_{p_4}=\{2,6\}$, and $C_{p_5}=\{1,3\}$.}
\label{fig:pillB}
\end{figure}
A \emph{pillar assignment} of an interval system $\mathcal{I}$ is a triple $(P,\preceq, \psi)$ such that $P$ is a set of pillars, $\preceq$ is a total ordering of $P$, and $\psi$ is the proper partial colouring $\psi_{(P,\preceq)}$ of $\mathcal{I}$ as described above.
A pillar assignment $(P,\preceq, \psi)$ is \emph{complete} if every interval of $\mathcal{I}$ contains some pillar of $P$ (or equivalently if $\psi$ colours every interval of $\mathcal{I}$).
For a pillar assignment $(P,\preceq, \psi)$, let $\chi(P,\preceq, \psi)$ be equal to $\left| \bigcup_{p\in P} C_p \right| =|\psi(\mathcal{I})|$, in other words $\chi(P,\preceq, \psi)$ is the number of colours that the pillar assignment $(P,\preceq, \psi)$ uses to colour its interval system $\mathcal{I}$. So if $(P,\preceq, \psi)$ is a complete pillar assignment, then $\chi(\mathcal{I}) \le \chi(P,\preceq, \psi)$. By the above definition and discussion, we have the following.
\begin{lemma}\label{pillarcolouring}
Let $(P,\preceq,\psi)$ be a pillar assignment of an interval system $\mathcal{I}$. Then $\psi$ is a proper partial colouring of $\mathcal{I}$ that colours every interval containing a pillar of $P$, and furthermore if the pillar assignment is complete then $\psi$ is a complete proper colouring of the interval system $\mathcal{I}$, and so $\chi(\mathcal{I}) \le \chi(P,\preceq, \psi)$.
\end{lemma}
Next we analyse the endpoints of chords assigned to a given pillar, and also the endpoints of chords with a given colour in a pillar assignment.
These two lemmas are used in the proof of our tailor-made Tur{\'a}n-type result in Section 4.
An \emph{arch} of a pillar assignment $(P,\preceq, \psi)$ is an open interval with endpoints in $\{0,1\}\cup P$ that contains no pillar of $P$.
\begin{lemma}\label{chordsscomefrom}
Let $(P,\preceq, \psi)$ be a pillar assignment of an interval system $\mathcal{I}$, let $K$ be an arch of $(P,\preceq, \psi)$, and let $\mathcal{I}_K$ be the intervals of $\mathcal{I}$ with exactly one endpoint in $K$. Let $\bigcup _{p\in P} \mathcal{I}_{(K,p)}$ be the partition of $\mathcal{I}_K$ where for each $p\in P$, the intervals $\mathcal{I}_{(K,p)}$ are exactly the intervals of $\mathcal{I}_K$ that are assigned to pillar $p$. Then there is a collection of disjoint intervals $\{K_p : p\in P\}$ contained in $(0,1)\backslash K$ such that for every $p\in P$, the intervals of $\mathcal{I}_{(K,p)}$ have an endpoint within $K_p$.
\end{lemma}
\begin{proof}
Let $K=(k^-,k^+)$. First observe that for each pillar $p\in P$, the intervals of $\mathcal{I}_{(K,p)}$ must all be contained in either $(k^-,1)$ or $(0,k^+)$ depending on if the pillar $p$ is contained in $[k^+,1)$ or $(0,k^-]$.
Now suppose for sake of contradiction that no such collection of disjoint intervals $ \{K_p : p\in P\}$ exist. Then there must exist two distinct pillars $p,p'$ and distinct intervals $I_1, I_2 \in \mathcal{I}_{(K,p)}$, $I'\in \mathcal{I}_{(K,p')}$ such that the endpoints $e_1,e_2.e'$ of $I_1,I_2,I'$ respectively that are contained in $(0,1)\backslash K$ are such that $e_1 < e' < e_2$, and either $e_1 < e' < e_2 < k^-$, or $k^+ < e_1 < e' < e_2$.
Suppose in the first case that $e_1 < e' < e_2 < k^-$. Then $I'\backslash K$ must contain $p'$, and furthermore both $I_1\backslash K$ and $I_2 \backslash K$ must contain $p$. Hence $I_1\backslash K$ contains both $p$ and $p'$. As $I_1$ is assigned to $p$, we see that $p\prec p'$. Then $I'$ does not contain $p$ as $I'$ is assigned to $p'$ and $p\prec p'$. But this contradicts the fact that $I_2\backslash K \subset I'\backslash K$ contains $p$.
The second case that $k^+ < e_1 < e' < e_2$ is argued similarly and we conclude that such a collection of disjoint intervals $ \{K_p : p\in P\}$ exists.
\end{proof}
\begin{lemma}\label{samecolourchords}
Let $(P,\preceq, \psi)$ be a pillar assignment of an interval system $\mathcal{I}$, let $K$ be an arch of $(P,\preceq, \psi)$, and let $\mathcal{I}_K$ be the intervals of $\mathcal{I}$ with exactly one endpoint in $K$.
Let $\bigcup _{p\in P} \mathcal{I}_{(K,p)}$ be the partition of $\mathcal{I}_K$ where for each $p\in P$, the intervals $\mathcal{I}_{(K,p)}$ are exactly the intervals of $\mathcal{I}_K$ that are assigned to pillar $p$.
For each $c\in \psi(\mathcal{I})$, let $\mathcal{I}_{(K,c)}$ be the intervals of $\mathcal{I}_K$ that are coloured $c$ by $\psi$.
Then for each $c\in \psi(\mathcal{I})$, there is a pillar $p\in P$, such that $\mathcal{I}_{(K,c)} \subseteq \mathcal{I}_{(K,p)}$.
\end{lemma}
\begin{proof}
Suppose not, then there must exist intervals $I_1,I_2\in \mathcal{I}_K$ such that $\psi(I_1) = \psi(I_2)$ and $I_1,I_2$ are assigned to distinct pillars $p_1,p_2$. In particular this means that $\phi_{p_1}(I_1)= \phi_{p_2}(I_2)$ as in the definition of the colouring $\psi=\psi_{(P,\preceq)}$.
Without loss of generality, we may assume that $p_1 \prec p_2$.
Then the foundation $F_{p_2}$ of $p_2$ must contain $I_2$, and so $F_{p_2}$ contains $K$ as well.
Hence the foundation $F_{p_2}$ contains an endpoint of $I_1$.
But this now contradicts the choice of $C_{p_2}$ by the definition of the colouring $\psi= \psi_{(P,\preceq)}$.
\end{proof}
Next we define a notion for the degree of an interval $J$ contained within an arch of a pillar assignment $(P,\preceq, \psi)$ of some interval system $\mathcal{I}$. It is this notion of degree that our tailor-made Tur{\'a}n-type result is based on.
For an interval $J$ within an arch of a pillar assignment $(P,\preceq, \psi)$ of an interval system $\mathcal{I}$, the \emph{degree} $d_{(P,\preceq, \psi)}(J)$ of $J$ is equal to the number of colours that intervals of $\mathcal{I}$ with an endpoint in $J$ receive from $\psi$.
As an example, for the pillar assignment $(P,\preceq, \psi)$ depicted in Figure~\ref{fig:pillB}, $d_{(P,\preceq, \psi)}(p_3,p_4)=5$, and $d_{(P,\preceq, \psi)}((p_3,p_4), \{p_1,p_2,p_3\})= 2 + 0 + 1 = 3$.
When the pillar assignment is clear from context we often omit the subscript on the chromatic and clique degrees.
A pillar assignment $(P^*,\preceq^*, \psi^*)$ \emph{extends} a pillar assignment ${(P,\preceq, \psi)}$ if $P\subset P^*$, every pillar of $P$ precedes every pillar of $P^*\backslash P$ in $\preceq^*$ and ${(P^*, \preceq^*)|_P = (P,\preceq)}$, and $\psi^*$ is a proper partial colouring that extends $\psi$. We remark that by definition, the last condition that $\psi^*$ extends $\psi$ is implied by the conditions on $(P^*,\preceq^*)$, because for the interval system $\mathcal{I}$, the colourings $\psi=\psi_{(P,\preceq )}$ and $\psi^*=\psi_{(P^*,\preceq^*)}$ are determined solely by the totally ordered pillars $(P,\preceq )$ and $(P^*,\preceq^*)$ respectively.
We finish this section with a divide and conquer lemma that under favourable conditions allows for a certain extension of a pillar assignment that maintains a low total number of colours used and low degree arches.
\begin{lemma}\label{devide and conquer}
Let $(P,\preceq, \psi)$ be a pillar assignment of an interval system $\mathcal{I}$ with $\omega(\mathcal{I})=\omega$, let $K$ be an arch, let $t$ be a positive integer, and let $Q \subset K$ be a finite collection of pillars such that $d_{(P,\preceq, \psi)}(J) \le t$ for every interval $J$ contained in $K\backslash Q$.
Then there is a pillar assignment $(P^*,\preceq^*, \psi^*)$ extending $(P,\preceq, \psi)$ such that:
\begin{itemize}
\item $P^*=P\cup Q$,
\item $d_{(P^*,\preceq^*, \psi^*)}(J) \le t+ \omega \lceil \log_2(|Q|+1) \rceil$ for every interval $J \subset K\backslash Q$, and
\item $\chi(P^*,\preceq^*, \psi^*) \le \max\{\chi(P,\preceq, \psi), \ d_{(P,\preceq, \psi)}(K) + \omega \lceil \log_2(|Q| + 1) \rceil\}$.
\end{itemize}
\end{lemma}
\begin{proof}
Firstly the result is trivially true if $|Q|= 0$. So from here we argue inductively on $|Q|$.
Let the endpoints of $K$ be $q_0$ and $q_n$, with $q_0<q_n$ and $n=|Q|+1$. Then let the elements of $Q$ be $\{q_1,\dots, q_{n-1}\}$ where $q_1 < \dots <q_{n-1}$.
Consider the pillar assignment $(P',\preceq', \psi')$ extending $(P,\preceq, \psi)$ that is obtained by adding the pillar $q_{\lceil \frac{n-1}{2} \rceil}$ immediately after all the pillars of $P$ in the total ordering $(P,\preceq)$.
Then with respect to the pillar assignment $(P',\preceq', \psi')$, the interval $K$ contains exactly two arches; $K_1=(q_0, q_{\lceil \frac{n-1}{2} \rceil})$, and $K_2=(q_{\lceil \frac{n-1}{2} \rceil}, q_n)$.
By considering the colouring $\phi_{q_{\lceil \frac{n-1}{2} \rceil}} = \psi_{(P',\preceq')} \backslash \psi_{(P,\preceq)}$, we can observe that:
\begin{itemize}
\item $d_{(P',\preceq', \psi')}(K_1), \ d_{(P',\preceq', \psi')}(K_2) \le d_{(P,\preceq, \psi)}(K) + \omega$,
\item $\chi(P',\preceq', \psi') \le {\max\{\chi(P,\preceq, \psi), \ d_{(P,\preceq, \psi)}(K) + \omega \}}$, and
\item ${d_{(P',\preceq', \psi')}(q_i,q_{i-1}) \le t + \omega}$ for every $i\in [n]$.
\end{itemize}
Next note that respect to the colouring, extending the pillar assignment $(P',\preceq', \psi')$ within each of the arches $K_1$ and $K_2$ is independent of the other.
So we may apply the result of the inductive hypothesis twice, once to the pillars $\{q_1,\dots, q_{\lceil \frac{n-1}{2} \rceil -1}\}\subset K_1$, and then to the pillars $\{q_{\lceil \frac{n-1}{2} \rceil +1},\dots q_{n-1}\}\subset K_2$, to obtain a new pillar assignment ${(P^*,\preceq^*, \psi^*)}$ extending $(P',\preceq', \psi')$ (and so also extending $(P,\preceq, \psi)$).
Furthermore the resulting pillar assignment $(P^*,\preceq^*, \psi^*)$ is such that: $P^*=P'\cup \{q_1,\dots, q_{\lceil \frac{n-1}{2} \rceil -1}\} \cup \{q_{\lceil \frac{n-1}{2} \rceil +1},\dots q_{n-1}\} = P \cup Q$, and
for each $i\in [n]$,
\begin{align*}
d_{(P^*,\preceq^*, \psi^*)}(q_{i-1}, q_i)
&\le t+ \omega + \omega \left\lceil \log_2\left( \max \left\{ \left\lceil \frac{n-1}{2} \right\rceil , \ n - \left\lceil \frac{n-1}{2} \right\rceil \right\} \right) \right\rceil \\
&\le t+ \omega \lceil \log_2(n) \rceil \\
&= t+ \omega \lceil \log_2(|Q|+1) \rceil,
\end{align*}
and lastly,
\begin{align*}
\chi(P^*,\preceq^*, \psi^*)
&\le \max\left\{
\begin{aligned}
& \qquad \qquad \qquad \ \chi(P',\preceq', \psi'), \\
& \ \ d_{(P',\preceq', \psi')}(K_1) + \omega \left\lceil \log_2\left( \left\lceil \frac{n-1}{2} \right\rceil \right) \right\rceil, \\
&d_{(P',\preceq', \psi')}(K_2) + \omega \left\lceil \log_2 \left( n - \left\lceil \frac{n-1}{2} \right\rceil \right) \right\rceil
\end{aligned}
\right\} \\
&\le \max\left\{\chi(P,\preceq, \psi), \ d_{(P,\preceq, \psi)}(K) + \omega \lceil \log_2(n) \rceil \right\} \\
&= \max\left\{\chi(P,\preceq, \psi), \ d_{(P,\preceq, \psi)}(K) + \omega \lceil \log_2(|Q|+1) \rceil \right\}.
\end{align*}
Hence $(P^*,\preceq^*, \psi^*)$ provides the desired pillar assignment.
\end{proof}
\section{Extremal results}
In this section we prove the Tur{\'a}n-type lemma that is tailor-made for our notion of pillar assignment and degree (Lemma~\ref{extremal}). The purpose of this is to enable prudent usage of Lemma~\ref{devide and conquer} in the proof of our main result, a strengthening of Theorem~\ref{main} that concerns extending pillar assignments.
The idea of Lemma~\ref{extremal} is based on a Tur{\'a}n-type theorem of Capoyleas and Pach~\cite{capoyleas1992turan} for circle graphs. For an interval system $\mathcal{I}$ and a collection of disjoint intervals $\mathcal{J}$, the Tur{\'a}n-type theorem of Capoyleas and Pach~\cite{capoyleas1992turan} bounds (in terms of $\omega(\mathcal{I})$ and $|\mathcal{J}|$) the number of pairs of distinct intervals $J_1,J_2\in \mathcal{J}$ such that there is an interval of $\mathcal{I}$ with an endpoint in both $J_1$ and $J_2$.
First we need to prove Theorem~\ref{estype}, a theorem in a similar style to that of the Erd\H{o}s-Szekeres theorem~\cite{erdos1935combinatorial}. This result may be of independent interest. Indeed it can be shown that Theorem~\ref{estype} is equivalent to a tight version of the Tur{\'a}n-type lemma used in~\cite{daviescircle}, so it can also be considered an exact permutation graph analogue of the aforementioned Tur{\'a}n-type theorem of Capoyleas and Pach~\cite{capoyleas1992turan}. With a bit more care one can even characterise the extremal examples.
Before stating and proving Theorem~\ref{estype}, we first require two definitions and a simple lemma.
Given some $S\subseteq \mathbb{R}^d$, we define the \emph{strong dominance partial ordering} $\preceq_{sd}$ of $S$ to be the partial order such that $u\preceq_{sd} v$ exactly when each coordinate of $v$ is greater than the corresponding coordinate of $u$ (or $u=v$). Given two sets $A$ and $B$, we let $A \times B$ denote the \emph{Cartesian product} $\{(a,b) : a\in A \text{ and } b\in B\}$, of $A$ and $B$.
\begin{lemma}\label{gridantichain}
Let $a,b$ be positive integers, and let $\preceq_{sd}$ be the strong dominance partial ordering of $[a]\times [b]$.
Then the maximum length of an antichain in $([a]\times [b],\preceq_{sd})$ is equal to $a+b-1$.
\end{lemma}
\begin{proof}
Let $A$ be the antichain $\{(a,j) : j\in [b]\} \cup \{(i,b) : i\in [a-1]\}$, then $|A|=a+b-1$. For each integer $k$ with $1-b \le k \le a -1$, let $C_k=\{(x,y)\in [a]\times [b] : x-y =k \}$. Then $C_{1-b}, \dots , C_{a-1}$ is a chain cover of $[a]\times [b]$ of size $a+b-1$. An antichain contains at most one elements of every chain in a chain cover.
Hence the maximum length of an antichain in $([a]\times [b],\preceq_{sd})$ is equal to $|A|=a+b-1$ as required.
\end{proof}
\begin{theorem}\label{estype}
Let $a, b, n$ be positive integers with $n\le a, b$, and let $\prec_{sd}$ be the strong dominance partial ordering of $[a]\times [b]$.
Let $S\subseteq [a]\times [b]$ be a set containing no chain of length greater than $n$.
Then $|S| \le n(a+b -n)$.
\end{theorem}
\begin{proof}
Let $m$ be the maximum length of a chain contained in $(S,\preceq_{sd})$, and let $A_1,\dots, A_m$ be the antichains cover of $S$ where $A_k=\{(x,y)\in S : h_{(S,\preceq_{sd})}(x,y) =k \}$ for each $k\in [m]$.
Then for each $k\in [m]$, and each $(x,y)\in A_k$, there exists a chain $C_{(x,y)}$ of length $k$ ending in $(x,y)$. This implies that $x,y \ge k$. So for each $k\in [m]$, the antichain $A_k$ is contained in the grid $([a]\backslash[k-1]) \times ([b]\backslash [k-1])$. Then by Lemma~\ref{gridantichain}, $|A_k|\le (a-k+1) + (b -k + 1) -1= a+b -2k +1$ for every $k\in [m]$.
Lastly
\[
|S|
= \sum_{k=1}^{m} |A_k|
\le \sum_{k=1}^{m} \left( a+b -2k + 1 \right)
= m(a+b -m)
\le n(a+b -n)
\]
as desired.
\end{proof}
The bound in this theorem is tight: one extremal example is $\{(x,y)\in [a]\times [b] : x \le n \text{ or } y \le n \}$, which contains no chain of length greater than $n$. The theorem can also be generalised to higher dimensional grids with essentially the same proof. We anticipate that Theorem~\ref{estype} will likely also find further applications in proving improved $\chi$-bounding functions for other classes of geometric intersection graphs.
We now proceed with applying Theorem~\ref{estype} to prove our tailor-made Tur{\'a}n-type lemma.
\begin{lemma}\label{extremal}
Let $(P,\preceq, \psi)$ be a pillar assignment of an interval system $\mathcal{I}$ with $\omega(\mathcal{I})=\omega$, let $K$ be an arch such that $d(K)\ge \omega$, and
let $\mathcal{J}$ be a collection of disjoint open intervals contained within $K$ such that $|\mathcal{J}| \ge \omega$.
Then
\[
\sum_{J\in \mathcal{J}}d(J) \le \omega(d(K) +|\mathcal{J}| - \omega ).
\]
\end{lemma}
\begin{proof}
Let $\mathcal{I}_K$ be the intervals of $\mathcal{I}$ with exactly one endpoint in $K$. Let $\bigcup _{p\in P} \mathcal{I}_{(K,p)}$ be the partition of $\mathcal{I}_K$ where for each $p\in P$, the intervals $\mathcal{I}_{(K,p)}$ are exactly the intervals of $\mathcal{I}_K$ that are assigned to pillar $p$.
Let $P'$ be the set of pillars $p \in P$ such that $\mathcal{I}_{(K,p)}$ is non-empty.
Then by Lemma \ref{chordsscomefrom} there is a collection of disjoint intervals $\{K_p : p\in P'\}$ contained in $(0,1)\backslash K$ such that for every $p\in P'$, the intervals of $\mathcal{I}_{(K,p)}$ have an endpoint within $K_p$.
Let $\preceq_{K}$ be the total ordering of $\{K_p : p\in P'\}$ so that $K_{p_1} \prec_K K_{p_2}$ exactly when either $K_{p_1} < K_{p_2} < K$, or $K < K_{p_1} < K_{p_2}$, or $K_{p_2} < K < K_{p_1}$.
The key property of this total order is that if $p,p'$ are distinct pillars of $P'$ with $p\prec p'$, and $I,I'\in \mathcal{I}_K$ are intervals assigned to $p$ and $p'$ respectively, then $I$ overlaps with $I'$ if the endpoint of $I$ in that is contained in $K$ precedes precedes the endpoint of $I_2$ that is contained in $K$.
Let $C'= \psi(\mathcal{I}_K)$.
For each $c\in C'$, let $\mathcal{I}_{(K,c)}$ be the intervals of $\mathcal{I}_K$ that are coloured $c$ by $\psi$.
By Lemma \ref{samecolourchords}, for each $c\in C'$, there exists a pillar $p\in P'$ such that $\mathcal{I}_{(K,c)} \subseteq \mathcal{I}_{(K,p)}$, and in particular every interval of $\mathcal{I}_{(K,c)}$ has an endpoint in $K_p$.
Now let $\preceq_C$ be the total ordering of $C'$ such that for every $c_1,c_2\in C'$, we have that $c_1 \preceq c_2$ exactly when either there exists a pillar $p\in P'$ such that $\mathcal{I}_{(K,c_1)}, \mathcal{I}_{(K,c_2)} \subseteq \mathcal{I}_{(K,p)}$, and $c_1 \le c_2$, or there exists distinct pillars $p_1,p_2\in P'$ such that $\mathcal{I}_{(K,c_1)} \subseteq \mathcal{I}_{(K,p_1)}$, $\mathcal{I}_{(K,c_2)} \subseteq \mathcal{I}_{(K,p_2)}$ and $p_1 \prec_K p_2$.
Let $f:C' \to [d(K)]$ be the bijection such that $f(c_1)\le f(c_2)$ exactly when $c_1 \preceq_C c_2$.
Now let $\mathcal{J} = \{J_1, \dots , J_{|\mathcal{J}|}\}$ where $J_1 < \cdots < J_{|\mathcal{J}|} $.
Next let $S$ be the set of all elements $(x,y)\in [d(K)] \times [|\mathcal{J}|]$ such that there is an interval $I$ of $\mathcal{I}$ that is coloured $f^{-1}(x)$ by $\psi$, and has an endpoint in $J_y$.
Note that $|S| = \sum_{J\in \mathcal{J}}d(J)$.
Suppose now for sake of contradiction that
\[
\sum_{J\in \mathcal{J}}d(J) > \omega(d(K) +|\mathcal{J}| - \omega ).
\]
Then by Theorem~\ref{estype}, there is a chain $W$ contained in $S$ of length at least $\omega + 1$.
Since this chain is contained in $S$, there must exist colours $c_1 \prec_C \cdots \prec_C c_{\omega + 1}$ contained in $C'$, and integers $1\le x_1 < \cdots < x_{\omega + 1} \le |\mathcal{J}|$ so that for each $j\in [\omega + 1]$, there is an interval $I_j \in \mathcal{I}$ with an endpoint $e_j$ contained in $J_{x_j}$ and $\psi(I_j)=c_j$.
Since $J_{x_1} < \cdots < J_{x_{\omega +1 } }$, we have that $e_1 < \cdots < e_{\omega +1 } $.
Let $p_1,\dots ,p_n\in P'$ be the collection of distinct pillars so that for some integers $0=a_0 < \dots < a_{n-1} < a_n = \omega +1 $, we have that for each $p_i$, the intervals $\mathcal{I}_{p_i}=\{I_j : a_{i-1} < j \le a_i\}$ are all assigned to pillar $p_i$.
Note that $p_1 \prec_{K} \cdots \prec_{K} p_n$ by the definition of the total ordering $(C', \preceq_C)$.
Then by Lemma \ref{permutation colouring} and the definition of the pillar assignment $(P,\preceq, \psi)$, for each $i\in [n]$, there exist pairwise overlapping intervals $I_{a_{i-1}+1}^*, \dots , I_{a_i}^*$ that are all assigned to the pillar $p_i$, and all have an endpoint contained in $[e_{a_{i-1}+1} , e_{a_i}]$.
Since $p_1 \prec_{K} \dots \prec_{K} p_n$, and $[e_1, e_{a_1}] < \dots < [e_{a_{n-1}+1}, e_{\omega +1 }]$, we see that any two intervals of $\{I_1^*,\dots, I_{\omega +1}^*\}$ that are assigned to distinct pillars also overlap.
Hence the intervals $I_1^*,\dots , I_{\omega +1}^*$ pairwise overlap, a contradiction to the fact that $\omega(\mathcal{I})=\omega$.
\end{proof}
\section{Main result}
By Lemma~\ref{pillarcolouring}, the following theorem strengthens and so implies Theorem~\ref{main}, that every circle graph with clique number at most $\omega$ has chromatic number at most $2\omega \log_2 (\omega) +2\omega \log_2(\log_2 (\omega)) + 10\omega$.
\begin{theorem}\label{induction}
Let $\omega\ge 2$ be a positive integer,
let $G$ be a circle graph with clique number at most $\omega$, and let $\mathcal{I}$ be an interval system with overlap graph $G$.
Let $(P,\preceq, \psi)$ be a pillar assignment of $\mathcal{I}$ such that $\chi(P,\preceq, \psi) \le 2\omega \log_2 (\omega) +2\omega \log_2(\log_2 (\omega)) + 10\omega$, and $d(K)_{(P,\preceq, \psi)}\le \omega \log_2 (\omega) + \omega \log_2(\log_2 (\omega)) + 6\omega$ for every arch $K$ of $(P,\preceq, \psi)$.
Then there is a complete pillar assignment $(P^*,\preceq^*, \psi^*)$ of $\mathcal{I}$ extending $(P,\preceq, \psi)$ with ${\chi(P^*,\preceq^*, \psi^*)} \le 2\omega\log_2 (\omega) +2\omega \log_2(\log_2 (\omega)) + 10\omega$.
\end{theorem}
\begin{proof}
The theorem is trivially true if $(P,\preceq, \psi)$ is a complete pillar assignment, so we proceed by induction on the number of intervals that are not coloured by $\psi=\psi_{(P,\preceq)}$.
Let $K$ be an arch of $(P,\preceq, \psi)$ that contains some interval $I$ of $\mathcal{I}$. Then $I$ is not coloured by $\psi$. Let $q^*$ be a pillar contained in $I$.
Let $q_0=\ell (K)$.
Now for each integer $i\ge 1$ in increasing order, if the pillar $q_{i-1}$ was chosen and $d_{(P,\preceq, \psi)}(q_{i-1}, r(K)) > 2\omega$, then we choose the next pillar $q_i \in K$ so that $q_{i} > q_{i-1}$ and $d_{(P,\preceq, \psi)}(q_{i-1}, q_i) = 2\omega$. Note that such a $q_i$ can always be chosen if $d_{(P,\preceq, \psi)}(q_{i-1}, r(K)) > 2\omega$ as incrementally increasing some $q>q_{i-1}$ increases the degree of $(q_{i-1},q)$ by at most 1. Let $n$ be equal to the largest $i$ such that the pillar $q_i$ is chosen, and let $Q=\{q_1, \dots, q_n, q^*\}$.
Then $d_{(P,\preceq, \psi)}(q_{n-1}, r(K)) > 2\omega$.
Let $\mathcal{J}=\{(q_0,q_1),\dots, (q_{n-1},r(K))\}$.
Then $\sum_{J\in \mathcal{J}}d(J) > 2\omega n$. So by Lemma~\ref{extremal},
\[
2\omega n < \sum_{J\in \mathcal{J}}d(J) \le \omega (d(K)+n-\omega)\le \omega (\omega \log_2 (\omega) + \omega \log_2(\log_2 (\omega)) + 5\omega + n).
\]
Hence $n < \omega \log_2 (k) + \omega \log_2(\log_2 (\omega)) + 5\omega$, and so $|Q|< \log_2 (\omega) + \omega \log_2(\log_2 (\omega)) + 5\omega +1$.
Then by Lemma~\ref{devide and conquer} there is a pillar assignment $(P',\preceq', \psi')$ extending $(P,\preceq, \psi)$ such that $P'= P\cup Q$, and for every arch $K'$ of $(P',\preceq', \psi')$ contained in $K$,
\begin{align*}
d_{(P',\preceq', \psi')}(K')
&\le 2\omega + \omega \lceil \log_2 (|Q|+1) \rceil \\
&< 3\omega + \omega \log_2(\omega \log_2 (\omega) +\omega \log_2(\log_2 (\omega)) + 5\omega +2 ) \\
&\le 3\omega + \omega \log_2(8\omega \log_2 (\omega)) \\
&= \omega \log_2(\omega) + \omega \log_2(\log_2 (\omega)) + 6\omega,
\end{align*}
and furthermore
\begin{align*}
\chi(P',\preceq', \psi')
&\le \max\left\{\chi(P,\preceq, \psi), \ d_{(P,\preceq, \psi)}(K) + \omega \lceil \log_2(|Q|+1) \rceil \right\} \\
&\le \max\left\{\chi(P,\preceq, \psi), \ 2\omega \log_2 (\omega) +2\omega \log_2(\log_2 (\omega)) + 10\omega \right\}.
\end{align*}
Hence $(P',\preceq', \psi')$ satisfies the inductive hypothesis. Since $q^*\in Q\subseteq P'$, the interval $I$ is coloured by $\psi'$. As $I$ is not coloured by $\psi$, the number of intervals of $\mathcal{I}$ that are not coloured by $\psi'$ is strictly less than the number of intervals of $\mathcal{I}$ that are not coloured by $\psi$. Hence by induction there exists a complete pillar assignment $(P^*,\preceq^*, \psi^*)$ extending $(P',\preceq', \psi')$ (and thus $(P,\preceq, \psi)$) with $\chi(P^*,\preceq^*, \psi^*) \le 2\omega \log_2 (\omega) +2\omega \log_2(\log_2 (\omega)) + 10\omega$ as required.
\end{proof}
We remark that with more careful arguments it is possible to improve the lower order terms slightly, but we are not aware of a way to improve the leading constant.
To prove that $K_4$-free circle graphs are 19-colourable, one should prove the following modification of Theorem~\ref{induction}. We believe that 19 is still far from optimal and that more specialized arguments could provide significant improvements to this bound. So we only sketch the proof and in particular the required modifications to the proof of Theorem~\ref{induction}.
\begin{theorem}\label{K4}
Let $G$ be a circle graph with clique number at most $3$, and let $\mathcal{I}$ be an interval system with overlap graph $G$.
Let $(P,\preceq, \psi)$ be a pillar assignment of $\mathcal{I}$ such that $\chi(P,\preceq, \psi) \le 19$, and $d(K)_{(P,\preceq, \psi)}\le 13$ for every arch $K$ of $(P,\preceq, \psi)$.
Then there is a complete pillar assignment $(P^*,\preceq^*, \psi^*)$ of $\mathcal{I}$ extending $(P,\preceq, \psi)$ with ${\chi(P^*,\preceq^*, \psi^*)} \le 19$.
\end{theorem}
\begin{proof}[Sketch of proof.]
As before we proceed by induction on the number of intervals that are not coloured by $\psi=\psi_{(P,\preceq)}$.
Let $K$ be an arch of $(P,\preceq, \psi)$ that contains some interval of $\mathcal{I}$.
The pillars $q_1,\ldots ,q_n $ as in the proof of Theorem~\ref{induction} are then chosen so that $d_{(P,\preceq, \psi)}(q_{i-1}, q_i) = 7$. By Lemma~\ref{extremal} it then follows that $n\le 7$. Additionally each pillar $q_i$ can be chosen so that there is an interval $I_i\in \mathcal{I}$ coloured by $\psi$ that overlaps with every interval of $\mathcal{I}$ that is contained in $K$ and contains $q_i$.
Then we let $(P',\preceq', \psi')$ be the pillar assignment extending $(P,\preceq, \psi)$ with $P'= P\cup \{q_1,\ldots ,q_n \}$ as in Lemma~\ref{devide and conquer}.
We can observe that $\omega(\mathcal{I}_{q_i})\le 2$ since every interval of $\mathcal{I}_{q_i}$ overlaps with $I_i$. This observation provides a slight improvement to the bounds obtained from Lemma~\ref{devide and conquer}, in particular, instead of taking $\omega \le 3$ for the resulting bounds, we may instead replace each occurrence of ``$\omega$" with ``2".
Then $\chi(P',\preceq', \psi')\le 19$ and $d_{(P',\preceq', \psi')}(K')\le 7+6=13$ for every arch $K'$ of $(P',\preceq', \psi')$ contained in $K$.
We did not pick a pillar $q^*$ at the start to guarantee that $\psi'$ colours an additional interval of $\mathcal{I}$. However if it happens that $ \psi'$ does not colour an additional interval of $\mathcal{I}$, then for each arch $K'$ of $(P',\preceq', \psi')$ contained in $K$, we would have that $d_{(P',\preceq', \psi')}(K')\le 7$. So in this case we may simply extend $(P',\preceq', \psi')$ by a single such pillar $q^*$ since some such arch $K'$ must contain an interval of $\mathcal{I}$.
The existence of such a complete pillar assignment $(P^*,\preceq^*, \psi^*)$ then follows by induction.
\end{proof}
\section{Lower bound}
In this section we give a simple construction to prove Theorem~\ref{lower}. We find it more convenient to use a chord diagram representation of our circle graphs, rather than the interval overlap representations that were used to prove Theorem~\ref{main} in the previous sections. We allow chords to coincide and consider the chords to be open, so two chords that share an endpoint only intersect if they share both their endpoints.
It can easily be shown that circle graphs are exactly intersection graphs of open chords on a circle where chords can coincide.
The construction is inspired by those given by Kostochka~\cite{kostochka1988upper} for both circle graphs and their complements, as well his proof that the complements of circle graphs are $\chi$-bounded.
With essentially the same arguments, our construction also yields a new proof that there are complements of circle graphs with clique number at most $\omega$ and chromatic number at least $\omega(\ln \omega -O(1))$.
For positive integers $\omega$ and $n$ with $n>3\omega-3$ we define a chord diagram $\mathcal{D}_{n,\omega}$ as follows.
Let $p_1, q_1, p_2, q_2, \dots , p_n , q_n$ be points on a circle in cyclic clockwise order.
Now for each $i\in [n]$, and $j\in [\omega-1]$, let $\mathcal{C}_{i,j}$ consist of exactly $\left\lfloor \frac{\omega}{j+1} \right\rfloor $ coinciding open chords with endpoints $p_i, q_{i+j}$ (taking $i+j$ modulo $n$). Then let $\mathcal{D}_{n,\omega}=\bigcup_{i\in [n]} \bigcup_{j\in [\omega -1]} \mathcal{C}_{i,j}$. For an example, see Figure~\ref{fig:chord}, which illustrates the chord diagram $\mathcal{D}_{17,6}$.
\begin{figure}
\centering
\begin{tikzpicture}
\draw[thick] (0,0) circle (4cm);
\foreach \i in {1,...,17} {
\coordinate (N\i) at (\i*360/17 - 4.5:4cm);
\fill[black] (N\i) circle (0.065 cm);
\coordinate (M\i) at (\i*360/17 + 4.4:4cm);
\fill[black] (M\i) circle (0.065 cm);
}
\foreach \i in {1,...,16} {
\pgfmathparse{\i + 1}
\edef\j{\pgfmathresult}
\draw[ultra thick] (N\i) -- (M\j);
}
\foreach \i in {17} {
\pgfmathparse{\i + 1 - 17}
\edef\j{\pgfmathresult}
\draw[ultra thick] (N\i) -- (M\j);
}
\foreach \i in {1,...,15} {
\pgfmathparse{\i + 2}
\edef\j{\pgfmathresult}
\draw[thick] (N\i) -- (M\j);
}
\foreach \i in {16,17} {
\pgfmathparse{\i + 2 - 17}
\edef\j{\pgfmathresult}
\draw[thick] (N\i) -- (M\j);
}
\foreach \i in {1,...,14} {
\pgfmathparse{\i + 3}
\edef\j{\pgfmathresult}
\draw[thin] (N\i) -- (M\j);
}
\foreach \i in {15,16,17} {
\pgfmathparse{\i + 3 - 17}
\edef\j{\pgfmathresult}
\draw[thin] (N\i) -- (M\j);
}
\foreach \i in {1,...,13} {
\pgfmathparse{\i + 4}
\edef\j{\pgfmathresult}
\draw[thin] (N\i) -- (M\j);
}
\foreach \i in {14,15,16,17} {
\pgfmathparse{\i + 4 - 17}
\edef\j{\pgfmathresult}
\draw[thin] (N\i) -- (M\j);
}
\foreach \i in {1,...,12} {
\pgfmathparse{\i + 5}
\edef\j{\pgfmathresult}
\draw[thin] (N\i) -- (M\j);
}
\foreach \i in {13,14,15,16,17} {
\pgfmathparse{\i + 5 - 17}
\edef\j{\pgfmathresult}
\draw[thin] (N\i) -- (M\j);
}
\end{tikzpicture}
\caption{The chord diagram of $\mathcal{D}_{17,6}$. The thickness of the chords corresponds to the number of chords that coincide.}
\label{fig:chord}
\end{figure}
Now we prove some bounds on the number of chords contained in $\mathcal{D}_{n,\omega}$, as well as the size of the largest set of pairwise intersecting and pairwise disjoint chords in $\mathcal{D}_{n,\omega}$.
\begin{lemma}\label{vertices}
The set of chords $\mathcal{D}_{n,\omega}$ has size greater than $n\omega (\ln \omega - 2)$.
\end{lemma}
\begin{proof}
By definition,
\[
|\mathcal{D}_{n,\omega}| =
\left|\bigcup_{i\in [n]} \bigcup_{j\in [\omega -1]} \mathcal{C}_{i,j} \right| =
\sum_{i=1}^n \sum_{j=1}^{\omega -1} |\mathcal{C}_{i,j}|
= n \sum_{j=1}^{\omega -1} \left\lfloor \frac{\omega}{j+1} \right\rfloor
= n \sum_{j=1}^{\omega} \left\lfloor \frac{\omega}{j} \right\rfloor - n\omega.
\]
Then observe that:
\[
n \sum_{j=1}^{\omega} \left\lfloor \frac{\omega}{j} \right\rfloor - n\omega
\ge n \sum_{j=1}^{\omega} \frac{\omega}{j} - 2n\omega
= n\omega \sum_{j=1}^{\omega} \frac{1}{j} - 2n\omega
> n\omega \ln \omega - 2n\omega
= n\omega (\ln \omega - 2).
\]
Hence the lemma follows.
\end{proof}
\begin{lemma}\label{clique}
There are no $\omega+1$ pairwise intersecting chords contained in $\mathcal{D}_{n,\omega}$.
\end{lemma}
\begin{proof}
It is enough to show that if $C\subseteq \mathcal{D}_{n,\omega}$ is a collection of pairwise intersecting chords, then $|C|\le \omega$.
Let $P$ be the set of endpoints of chords in $C$ that are contained in $\{p_1,\dots p_n\}$, and similarly for $Q$. Then $|P|=|Q|$ as a pair of open chords that share an endpoint only intersect if they share both their endpoints.
Furthermore after possibly rotating the chords of $C$ around the circle, we can assume without loss of generality that $P=\{p_{a_1},\dots ,p_{a_\ell}\}$ and $Q=\{q_{b_1},\dots ,q_{b_\ell}\}$ with $a_1<\dots < a_\ell \le b_1 < \dots < b_\ell$, and that every chord of $C$ has one of $\{p_{a_1},q_{b_1}\}, \dots , \{p_{a_\ell},q_{b_\ell}\}$ as its endpoints. For each $i\in [\ell]$, there are exactly $\left\lfloor \frac{\omega}{(b_i - a_i -1) + 1} \right\rfloor= \left\lfloor \frac{\omega}{b_i - a_i} \right\rfloor$
chords with endpoints contained in $\{p_{a_1},q_{b_1}\}$.
Therefore
\[
|C|\le \sum_{i=1}^{\ell} \left\lfloor \frac{\omega}{b_i - a_i} \right\rfloor
\le \sum_{i=1}^{\ell} \frac{\omega}{b_i - a_i}
\le \sum_{i=1}^{\ell} \frac{\omega}{\ell}
=\omega.\]
\end{proof}
\begin{lemma}\label{stable}
There is no set of $n$ pairwise disjoint chords contained in $\mathcal{D}_{n,\omega}$.
\end{lemma}
\begin{proof}
Let $S$ be a set of pairwise disjoint chords of $\mathcal{D}_{n,\omega}$. Now consider an auxiliary directed graph $G$ on vertex set $\{v_1,\dots, v_n \}$ where there is an edge directed from $v_i$ to $v_j$ whenever $S$ contains a chord with endpoints $p_i$ and $q_j$. First note that $|S|=|E(G)|$ as all the chords with endpoints $p_i$ and $q_j$ intersect.
Now observe that $G$ is outerplanar, with the natural embedding of $v_1,\dots, v_n$ being on the circle in clockwise order and all edges of $G$ directed in the clockwise direction.
In a directed outerplanar graph with such an embedding, all cycles contain a directed path of length 2 in the clockwise direction.
However $G$ has no directed path of length 2 as such a path with internal vertex $v_i$ would imply that $S$ contains a chord with an endpoint $p_i$, and another with the endpoint $q_i$, a contradiction since all such chords of $\mathcal{D}_{n,\omega}$ intersect.
Hence $G$ is a forest, and so $|S|=|E(G)| < |V(G)| = n$ as required.
\end{proof}
We now prove Theorem~\ref{lower}, that for every positive integer $k$ there is a circle graph with clique number at most $k$ and chromatic number at least $k(\ln k - 2)$.
\begin{proof}[Proof of Theorem~\ref{lower}]
For a positive integer $\omega$, choose some $n>3\omega -3$. Let $G_{n,\omega}$ be the intersection graph of the chord diagram $\mathcal{D}_{n,\omega}$, so $G_{n,\omega}$ is a circle graph.
By Lemma~\ref{clique}, the graph $G_{n,\omega}$ has clique number at most $\omega$.
By Lemma~\ref{vertices}, $|V(G_{n,\omega})|>n\omega (\ln \omega - 2)$, and by Lemma~\ref{stable}, the stable sets of $G_{n,\omega}$ all have size less than $n$.
Hence $\chi(G_{n,\omega}) > \frac{n\omega (\ln \omega - 2)}{n} = \omega (\ln \omega - 2)$ as desired.
\end{proof}
\section*{Acknowledgements}
The author thanks the anonymous referee for helpful comments.
\bibliographystyle{amsplain}
|
\section{Introduction}
\label{sec:intro}
We do not know how realistic quantum field theories emerge as a low energy approximation to a complete theory of quantum gravity with a positive cosmological constant.
However, it is likely that QFT contains too many degrees of freedom, even with an ultraviolet cutoff $\Lambda$ well below the Planck scale. In QFT, the maximum entropy localized in a box of size $L$ scales extensively as $S\sim (\Lambda L)^3$, while the holographic principle limits the number of degrees of freedom in quantum gravity to $S\sim M_p^2L^2$. Furthermore, this overabundance of QFT states does not mean that most of the states in quantum gravity have to behave like bulk QFT states. A hot box containing QFT degrees of freedom collapses to a black hole when
$T^4 L^3/\mpl^2 \sim L$, corresponding to an entropy $S\sim (\mpl L)^{3/2} \ll \mpl^2 L^2$.
It could well be that the number of degrees of freedom in the correct quantum theory of gravity that are well-described by bulk quantum field theory is only of order $L^{3/2}$~\cite{Cohen:1998zx,Banks:2019oiz}.
Let us first recall some old ideas for how bulk particles might realize holographic bounds on degrees of freedom~\cite{Thorn:1991fv,tHooft:1993dmi,Susskind:1993aa,Susskind:1994vu}. In~\cite{Susskind:1994vu} particles were modeled as a collection of indivisible partons in light front quantization. The number of partons one should ascribe to a particle grows with the lab frame energy $\epsilon$ and the resolution with which its momentum can be measured: $N_{parton} \sim \epsilon L$, where we describe the momentum resolution as an infrared length scale, $\Delta p= 1/L$. Once the number of partons exceeds some inverse coupling of the microscopic quantum gravity theory, for example the string coupling $g_s^2$, the size of the particle $R$ begins to grow rapidly with each additional parton. It scales as $M_p R \sim (\epsilon L)^{1/(d-1)}$ in $d$ spatial dimensions, so that $M_p R\sim \sqrt{\epsilon L}$ in $d=3$.
When the particle size is so large that it can no longer be localized on length scales of order the inverse energy, it ceases to be point-like and cannot be regarded as an excitation of one independent degree of freedom. However, in the parton model this limit depends on the momentum resolution.
We could interpret the saturation of $R=1/\epsilon$ as supplying a bound on the typical momentum spacing between individual particle degrees of freedom around $\epsilon$,
\begin{align}
1/L_\mathrm{min} = \epsilon^{3}/\mpl^2.
\label{eq:Lminholo}
\end{align}
The spacing grows with energy, rapidly depleting the single particle density of states (DOS) $g(\epsilon)$.
In a box of fixed size $L$, there is an energy scale $\hat\epsilon=(\mpl^2 /L)^{1/3}$ at which the momentum resolution transitions from $1/L$ to $1/L_{min}$. Here the relativistic DOS transitions from ordinary QFT scaling $g\sim L^3\epsilon^2$ to $g\simL_\mathrm{min}^3\epsilon^2$. Most of the degrees of freedom live around $\hat\epsilon$, and the maximum entropy is of order $(L\hat\epsilon)^3\sim (L \mpl)^2$, satisfying the holographic bound. Alternatively, the same result is obtained by counting states according to the scaling $g\sim \partial_\epsilon(L^3/R^3)$ for $R>1/\epsilon$.
We see that the partonic model realizes the holographic principle by a scale-dependent depletion of the independent degrees of freedom, relative to the density of states of an ordinary bulk field theory in a fixed volume.
However, as alluded to above, there is an argument due to Cohen, Kaplan, and Nelson (CKN) that the number of degrees of freedom that can be well-described by bulk QFT might be even smaller than what is implied by holography~\cite{Cohen:1998zx}. CKN interpreted the entropy scaling $S\sim (M_p L)^{3/2}$ as implying a correlation between the UV and IR cutoffs $\Lambda$ and $L$ on QFT: requiring $(\Lambda L)^3 \lesssim ( \mpl L)^{3/2}$, one arrives at the bound
\begin{align}
L \lesssim M_p/\Lambda^2.
\label{eq:CKNrelation}
\end{align}
For a weak scale UV cutoff, $L$ is the order of 1 cm when the bound is saturated. What this IR scale means, however, is unclear. In Ref.~\cite{Cohen:1998zx} it was interpreted as an IR momentum cutoff on Feynman graphs for a given UV cutoff, and recently there has been renewed interest in this interpretation of the bound and its possible implications for precision measurements~\cite{Bramante:2019uub, Cohen:2021zzr, Davoudiasl:2021aih}. In fact this interpretation suggests that the effects of quantum gravity on precision observables are so large that they may be detectable following plausible experimental improvements~\cite{Cohen:1998zx,Bramante:2019uub, Cohen:2021zzr, Davoudiasl:2021aih}.
In this paper we consider a different interpretation, introduced in~\cite{Banks:2019arz}, where $1/L$ is taken to be a bound on a characteristic momentum spacing between independent degrees of freedom that can be well-described by bulk quantum field theory. In other words, $L$ controls a depletion of the single-particle density of states of ordinary QFT, and the depletion may be stronger than what is required by holography alone.
An insightful observation made in~\cite{Banks:1995uh,Cohen:1998zx} was phrased in~\cite{Cohen:1998zx} as follows: ``There is in
fact no evidence that fields at present experimental energies can fluctuate independently over a region as large as our
horizon." Over how large a region {\emph{can}} localized excitations of a typical energy fluctuate independently? This is both an empirical question and a question of principle. In order to localize an excitation of energy $\sim \epsilon$ in, say, a minimal region of size $1/\epsilon$, inside of a much larger region $\sim L$, there must be many independent modes around $\epsilon$ with momentum spacing $\Delta p\sim 1/L$. Since no real experiment is sensitive to arbitrarily small differences in momenta or energy, however, there are only empirical lower bounds on the QFT single-particle density of states. As a matter of principle, we interpret the bound~(\ref{eq:CKNrelation}) as a fundamental \emph{upper} limit on the DOS.
The bound~(\ref{eq:CKNrelation}) suggests that the relativistic DOS is depleted above some energy scale, behaving as
\begin{equation}
g\sim \begin{cases} L^3 \epsilon^2 ~& \epsilon^2 \ll \mpl/L\\
\mpl^3/\epsilon^4 & \epsilon^2 \gg \mpl/L
\end{cases}.
\label{eq:naiveDDOS}
\end{equation}
We can parametrize the scale-dependent depletion in terms of an effective box size at different energy scales, $L_\mathrm{eff}(\epsilon)=\min ( L, \mpl/\epsilon^2)$. This interpretation is similar to the holographic partonic picture described above, but with different scalings, such that $L_\mathrm{eff}$ of Eq.~(\ref{eq:naiveDDOS}) is smaller than the holographic $L_\mathrm{min}$ of Eq.~(\ref{eq:Lminholo}).
In this work we will consider first the empirical question: how well has the single particle density of states been tested at various energy scales? This assessment is independent of any more fundamental motivations about quantum gravity, and represents an interesting, somewhat unconventional axis along which quantum field theory can be tested. Simple estimates can be made based on the sensitivity of detectors, while less trivial estimates arise from precision measurements of observables that involve sums over intermediate states at characteristic energies $\epsilon$. In the latter category we consider atomic spectra and leptonic $g-2$, using finite volume techniques to impose a discretization of the state space. In this way we can associate an empirical lower bound on the IR scale $L_\mathrm{eff}(\epsilon)$ from these measurements. We compare the empirical bounds on $L_\mathrm{eff}$ to (\ref{eq:naiveDDOS}), finding that current precision falls well short of the modifications suggested by these gravitational arguments. Thus this is an interpretation of the CKN bound that does minimal violence to the predictions of ordinary QFT.
We then reexamine the CKN ``hot box" thought experiments using the depleted DOS in Eq.~\eqref{eq:naiveDDOS} and generalize it to other power laws. We note that there are some nonthermal, high occupancy states which would collapse to a black hole in a gravitational theory and which are not removed either by depleting the single-particle DOS or by placing correlated cutoffs on Feynman integrals. Some states must be excised by other effects.
We emphasize that we do not have any concrete proposal for how a fundamental depletion of QFT modes should be implemented, nor do we know how Lorentz invariance and locality should emerge. In Matrix Theory, a theory which realizes the holographic principle yet gives rise to a supergravity theory at long distances, Lorentz invariance and locality of scattering amplitudes are thought to result from delicate cancellations and depend intricately on the BPS nature of the partons~\cite{Banks:1996vh}. We will at least not assume any modification to the relativistic dispersion relations, which provide the most sensitive experimental probes of Lorentz invariance, and our results for $g-2$ and the Lamb shift differ from the predictions of ordinary relativistic QFT by ${\mathcal{O}}(1/\mpl^2)$.
These exercises have curious implications for the cosmological constant problem. The QFT contribution to the total vacuum energy can be written as
\begin{align}
\Delta \rho \sim V^{-1}\int \tilde g (\epsilon) \epsilon d\epsilon
\end{align}
which is quartically divergent for the usual DOS. This expression depends on the graded DOS $\tilde g = (-1)^{F}g$ where $F=0$ (1) for bosons (fermions). Exact supersymmetry solves the cosmological constant problem within quantum field theory alone because it depletes the graded DOS completely, leaving unaffected the ordinary DOS for different species. A few other distinct and fascinating examples in quantum field theory also yield cancellations in the graded DOS~\cite{Dienes:1994np,Cherman:2018mya}. We are instead considering the possibility that the DOS is depleted for each species separately, and that this depletion is intrinsically gravitational -- it disappears in the $M_p\rightarrow\infty$ limit. With the depletion~(\ref{eq:naiveDDOS}), for example, the fine-tuning problem is removed. Moreover, we will conclude that the bounds on the DOS obtained from precision particle physics measurements are far from definitively establishing that the cc problem is a problem, without invoking a substantial extrapolation.
\section{Empirical Probes of the QFT Density of States}
\label{sec:depletion_from_finite_volume}
The density of states enters into the sum over intermediate states in precision processes. For such processes we can estimate the sensitivity to the DOS using finite-volume techniques. Placing a theory in a periodic box of volume $L^3$, the DOS of a massless particle is depleted in a scale-independent way from the continuum to $g\sim \epsilon^2 L^3$. Standard techniques can be used to compute the $L$-dependent effects on the process, typically considered as a power series in $1/L$ for large boxes. Since we are interested in the sensitivity of observables to the DOS at different scales, we proceed as follows.
Given an observable $\calO$ computed in perturbation theory, we isolate in some manner the perturbative corrections to $\calO$ from intermediate states where the individual particles all have some characteristic energy $\epsilon_*$. Call these contributions $\calO_{\epsilon_*}$. Placing the theory in a box of size $L$, we then compute the $1/L$ corrections to $\calO_{\epsilon_*}$, denoted $\calO^L_{\epsilon_*}$. Comparing $\calO^L_{\epsilon_*}$ to the experimental precision with which $\calO$ is known, we can place a lower bound on the box size, $L>L_\calO$. We identify this bound as the current experimental limit on the depleted density of states at $\epsilon_*$, parametrized by the effective length scale $L_\mathrm{eff}$:
\begin{align}
L_\mathrm{eff}(\epsilon_*)>L_\calO.
\end{align}
In other words, the impact of the depletion can be approximated as a finite-volume effect in a box of size $L_\mathrm{eff}(\epsilon_*)$. Corrections
to this estimate depend on $\Delta \epsilon / \epsilon_*$, where $\Delta \epsilon$ is the range of energies allowed to contribute to $\calO_{\epsilon_*}$.
Such estimates can be performed entirely numerically. However, we will find it convenient to take a slightly different approach. We will compute the entire $L$-dependent effects on observables $\calO$ analytically as a series in $1/L$, then inspect the terms to see which intermediate energy scales contribute dominantly to each power of $1/L$.
What these methods lack in sophistication, we hope they make up for in generality: since at best we obtain only conservative, order-of-magnitude bounds on $L_\mathrm{eff}$, they might have some resilience against whatever detailed form the actual depletion takes.
We begin by computing the modification to the Coulomb potential and infer bounds on $L_\mathrm{eff}(\epsilon_\star=\alpha m_e)$ from atomic physics. We then consider state depletion effects on $L_\mathrm{eff}(\epsilon_\star=m_e)$ from $g-2$, since that precisely-known quantity has been of particular interest in the CKN-related literature~\cite{Cohen:1998zx,Banks:2019arz, Bramante:2019uub, Cohen:2021zzr, Davoudiasl:2021aih}. Finally we briefly consider bounds at higher energies based on the measured resolution of detectors.
\subsection{Coulomb Forces and Bound State Energies}
\label{sec:coulomb}
The depletion of single particle states can affect the electromagnetic force in atomic physics.
In standard QFT the Coulomb potential is
\begin{equation}
V(\vec{r}) =-\int \frac{d^3 q}{(2\pi)^3} \frac{e^2}{\vec{q}^2} e^{i\vec{q}\cdot \vec{r}}
= -\frac{e^2}{2\pi^2r} \int_0^\infty d\tilde{q}\; \frac{\sin\tilde{q}}{\tilde{q}}.
\label{eq:qed_pot}
\end{equation}
In old-fashioned perturbation theory, the integral over $q$ corresponds to a sum over
on-shell intermediate states with momentum $\vec{q}$ and energy $E = |\vec{q}|$.
We leave the final integral over $\tilde{q} = qr$ unevaluated in Eq.~(\ref{eq:qed_pot}) to highlight the fact that
the largest contribution comes from modes with $qr \lesssim 1$.
As described above, we model a depletion of the DOS
by putting the system in a box of size $L$.
Following~\cite{Hasenfratz:1989pk,Kronfeld:2002pi} we rewrite the integrand in Eq.~(\ref{eq:qed_pot}) in Schwinger parametrization and discretize
Cartesian momenta $\vec{q}_i \to (2\pi n_i)/L$:
\begin{align}
V(\vec{r}) & = -e^2\int_0^\infty d\rho\frac{1}{L^3}\prod_{i=1}^3\left\{\sum_{n_i=-\infty}^{+\infty}\exp\left(-\rho \left(\frac{2\pi n_i}{L}\right)^2 + i\left(\frac{2\pi n_i}{L}\right)\vec{r}_i\right)\right\} \nonumber\\
& = -\frac{e^2}{L^3} \int_0^\infty d\rho \prod_{i=1}^3\theta_3\left(-\frac{\pi \vec{r}_i}{L},e^{-4\pi^2 \rho/L^2}\right),
\label{eq:finite_volume_potential}
\end{align}
where
\begin{equation}
\theta_3(z,\tau) = \sum_{n=-\infty}^{+\infty} \exp(i\pi n^2 \tau + i2\pi n z)
\label{eq:elliptic_theta_def}
\end{equation}
is the elliptic theta function.
The integral in Eq.~(\ref{eq:finite_volume_potential}) is infrared divergent, which can be seen by expanding the integrand
at $4\pi^2\rho/L^2 \gg 1$:
\begin{equation}
\prod_{i=1}^3\theta_3\left(-\frac{\pi \vec{r}_i}{L},e^{-4\pi^2 \rho/L^2}\right)\approx 1 + 2\left(\cos\frac{2\pi x}{L} + \cos\frac{2\pi y}{L} + \cos\frac{2\pi z}{L} \right)e^{-4\pi^2 \rho/L^2}.
\end{equation}
The constant term can be traced back to the zero modes in the first line of Eq.~\eqref{eq:finite_volume_potential}.
This divergence is spurious and absent in the continuum where the integrand $d^3 q/\vec{q}^2$ is finite as $\vec{q} \to \vec{0}$.
It can be removed by subtracting the zero mode contribution~\cite{Hasenfratz:1989pk},
\begin{align}
V_R(\vec{r}) & = -e^2\int_0^\infty d\rho\frac{1}{L^3}\left[
\prod_{i=1}^3\theta_3\left(-\frac{\pi \vec{r}_i}{L},e^{-4\pi^2 \rho/L^2}\right) - 1\right] \\
& \approx -\frac{e^2}{4\pi r}\left(1 - 2.84 \frac{r}{L} + 2.09\frac{r^3}{L^3} + \dots\right)\,,
\label{eq:regularized_cart_disc}
\end{align}
where in the last line we chose $\vec{r} = r \hat z$ and expanded in $r/L$.\footnote{Note that
because the $\vec{n}$ lattice is not rotationally invariant, this choice of $\vec{r}$ is
not fully generic. Since we do not know how the real depletion of states should be realized, we neglect angular dependence and merely use the finite volume technique to extract the $|\vec{r}|/L$ scaling of the finite-$L$ corrections.}
Even terms are absent in parentheses because $\theta_3$ is an even function of its first argument, and
the numerical result in the final line is obtained by fitting a polynomial to $V_R(\vec{r})/(-e^2/4\pi r)$. These coefficients can also be computed semi-analytically
by splitting the $\rho$ integration into a region with $\rho L^2 \ll 1$ (where one can perform a small $\rho$ expansion but not an $r/L$ expansion),
and another where one can expand in $r/L$; this calculation is presented in the Appendix~\ref{sec:appxA}.
We checked these two approaches agree. For our purposes, all that is important is the powers of $r/L$. The $r\to 0$ limit of Eq.~\eqref{eq:regularized_cart_disc} also matches the results of Ref.~\cite{Hasenfratz:1989pk}.
The leading correction to the potential in Eq.~(\ref{eq:regularized_cart_disc}) is independent of $r$ and thus
does not contribute to energy level splittings. Therefore, from the absence of an $(r/L)^2$ term in~(\ref{eq:regularized_cart_disc}), naively we might conclude that the impact of a depleted density of
states on energy levels starts at $\mathcal{O}((r/L)^3)$. However, our calculation involved a sum over
\emph{all} momenta, and it is not immediately clear whether these corrections are produced primarily by
small momenta, $q \ll 1/r$ (i.e. $n\ll L/(2\pi r)$ modes), or momenta $q \sim 1/r$ (i.e. $n\sim L/(2\pi r)$ modes).
As discussed in Sec.~\ref{sec:depletion_from_finite_volume} we are really interested in scale-dependent depletions, so
we want to isolate the contributions of particular energy regimes to the $L$-dependence. We elect to focus on the highest energy scales that contribute significantly to the observable -- in the present case, the scales $q\sim 1/r$.
We isolate the contribution of $q\sim 1/r$ momenta by considering the difference between the continuum and discrete calculation in
different cells in $\vec{n} = L \vec{q}/(2\pi)$ space. We partition the continuum integration region in Eq.~\eqref{eq:qed_pot} into
unit cubes corresponding to the terms in the discrete sum, such that the differences can be computed
cell-by-cell.
Since the integrand is even
and the entire integration region is symmetric, we add the contributions from all $8$ cells that
are related to each other by parity operations; the set of these 8 cells is denoted by $P_\vec{N}$.
For example, for the cell with the lowest vertex at $\vec{N}$ we find
\begin{equation}
4\pi^2 L\Delta_{\vec{N}} = \sum_{\vec{M}\in P_\vec{N}}\left(\int_{\vec{M}} d^3 n \frac{\cos (2\pi n_z r/L)}{\vec{n}^2} - \frac{\cos (2\pi M_z r/L)}{\vec{M}^2}\right),
\end{equation}
where the integration in the first term is over the cell. Details of this calculation are given in Appendix~\ref{sec:riemann_sum_error}.
For $|\vec{N}|\gg 1$
the integrand is slowly-varying over the unit cube, so the integral can be performed by doing a Taylor expansion around $\vec{N}$.
In the regime of interest $N_i \sim L/(2\pi r) \gg 1$, the result simplifies to
\begin{align}
4\pi^2 L \Delta_{\vec{N}} & \approx \frac{12}{N^4} \cos \left(\frac{2\pi N_z r}{L}\right) \nonumber\\
& + \frac{4(2-N^2 (2\pi r/L)^2)}{3 N^4}\cos \left(\frac{2\pi N_z r}{L}\right) + \frac{16N_z (2\pi r/L)}{3N^4}\sin \left(\frac{2\pi N_z r}{L}\right),
\end{align}
where the first (second) line corresponds to the linear (quadratic) term in the Taylor expansion.
There are $\mathcal{O}(N^3)$ such contributions, so the total finite-volume correction from $N_i \sim L/(2\pi r)$
scales as
\begin{equation}
\Delta_{\vec{N}} \times N^3 \sim \left(\frac{1}{4\pi^2}\right)\left(\frac{r}{L^2} + \frac{r^2}{L^3} + \frac{r^3}{L^4} + \dots\right).
\label{eq:cellscaling1}
\end{equation}
Here we have dropped numerical coefficients and taken the trigonometric functions to be $\mathcal{O}(1)$. Eq.~(\ref{eq:cellscaling1}) is a somewhat surprising result, because the term of order $1/L^2$
is \emph{absent} in the full result in Eq.~(\ref{eq:regularized_cart_disc}).\footnote{Note that the $r$-independent Casimir term in Eq.~\eqref{eq:regularized_cart_disc} is absent from Eq.~\eqref{eq:cellscaling1} because it is generated entirely by very low momenta, $q\sim 1/L$, i.e. $|\vec{n}|\sim 1$.}
We have numerically confirmed this by computing the differences between continuum and discrete contributions to the potential from momenta of order $1/r$.
We conclude that the $1/L^2$ corrections cancel if the depletion of states (effective box size) is energy-\emph{independent}.
If the depletion is instead energy-\emph{dependent}, this cancellation might be spoiled.
Since we do not know the precise functional form of the depletion, it is possible that the leading (additive) $r$-dependent corrections
to the Coulomb potential scale as either $r/L^2$ or $r^2/L^3$. Below we will consider both possibilities in estimating the sensitivity of atomic
level splittings to the depletion scale.
\subsubsection{Finite Volume Effects in Hydrogen}
From the above, we are led to consider corrections to the Coulomb potential of the form
\begin{equation}
\Delta V(r) \sim \frac{e^2}{L} \left(\frac{r}{L}\right)^p,
\label{eq:finite_L_perturbation}
\end{equation}
where $p$ may be 1 or 2. The hydrogen wavefunctions are
\begin{equation}
\psi_{n\ell m} = \frac{c_{n \ell}}{a^{3/2}} \left(\frac{2r}{n a}\right)^\ell L_{n-\ell -1}^{2\ell+1}\left(\frac{2r}{n a}\right) e^{-r/(n a)} Y^m_\ell (\theta,\phi),
\end{equation}
where $a = 1/(\alpha m_e)$, $L^{q}_{p}(x)$ is an associated Laguerre polynomial and $c_{n\ell}$ is a normalization constant.
The shifts to specific energy levels $\delta E_{n\ell}$ can be estimated as
\begin{equation}
\delta E_{n\ell} = \langle n\ell m |\Delta V| n \ell m \rangle = c_{n \ell}^2 \left(\frac{n}{2}\right)^3
\int_0^\infty du\, u^{2+2\ell} \Delta V(a n u/2) \left[L_{n-\ell -1}^{2\ell+1}(u)\right]^2 e^{-u}.
\label{eq:energy_shift}
\end{equation}
One of the most precisely-measured splittings measured is the Lamb shift $\Delta E = E(2S_{1/2}) - E(2P_{1/2})$.
The experimental value is~\cite{Lundeen:1981zz}
\begin{equation}
\Delta E = 1057845(9) \;\mathrm{kHz},
\label{eq:lamb_shift_exp}
\end{equation}
in agreement with theoretical predictions (these depend on the proton radius so the two inconsistent values give
somewhat different predictions~\cite{Eides:2007exa}). While there are slightly more precise experimental extractions of
$\Delta E$ than Ref.~\cite{Lundeen:1981zz}, they rely on combinations multiple energy levels, complicating comparison with theory.
For a direct measurement of $\Delta E$ like~\cite{Lundeen:1981zz} the magnitude of the finite-$L$ correction is simply
\begin{equation}
\delta(\Delta E) = |\delta E_{20} - \delta E_{21}| \sim \frac{e^2}{L} \left(\frac{a}{L}\right)^p.
\end{equation}
Demanding that this shift is less than the experimental uncertainty gives a lower bound on $L$:
\begin{equation}
L_\mathrm{eff}(\mathrm{keV}) \gtrsim \begin{cases}
10^{-3}\,\mathrm{m} & p = 1 \\
10^{-6}\,\mathrm{m} & p = 2,
\end{cases}
\end{equation}
where the characteristic energy is $\epsilon_* \sim \alpha m_e \sim \mathrm{keV}$. For comparison,
the effective box size implied by the CKN DOS at this energy scale is
\begin{equation}
L_{\mathrm{CKN}}(\mathrm{keV}) \sim 10^{14}\,\mathrm{m}.
\end{equation}
\subsection{Anomalous Magnetic Moment of Leptons}
\label{sec:g_minus_2}
The electron anomalous magnetic moment is one of the most precisely measured quantities in particle physics. Previous works have computed the corrections to lepton $g-2$ in a finite volume~\cite{Hasenfratz:1989pk,Davoudi:2018qpl,Banks:2019arz,Cohen:2021zzr}. Since we are interested in energy-dependent effective volumes $L_\mathrm{eff}(\epsilon)$, as above, we will need to modify these computations to isolate just the finite-volume terms that arise from a particular energy scale of the individual particles in the intermediate state.
The ordinary one-loop infinite volume contribution to $g-2$ is~\cite{Schwinger:1948iu}
\begin{align}
a=\frac{\alpha}{2\pi}.
\end{align}
We can rewrite the usual covariant Feynman integral in two useful ways. First, as a $3$-momentum integral,
\begin{align}
a=6\pi\alpha \int \frac{d^3k}{(2\pi)^3}\frac{2k(k-\sqrt{k^2+m_e^2})+m_e^2}{3k^2m_e^2\sqrt{k^2+m_e^2}}.
\label{eq:F20k}
\end{align}
Here $k$ is the $3$-momentum of an internal electron. (All results in this section can be repeated for the muon with the replacement $m_e\rightarrow m_\mu$.) The external electrons are at rest and the external photon momentum is taken to zero. The integrand is dominated by $|k|\lesssim m_e$. In old-fashioned perturbation theory, where the intermediate states are on-shell, the intermediate photon energy is of order $|k|$ and the electron energies are of order $\sqrt{k^2+m_e^2}$. Therefore, when $|k|\sim m_e$, all of the intermediate state particles have energies of order $m_e$. Thus we can estimate a lower bound on the DOS at energies of order $m_e$, $g(m_e)$, by isolating the contribution to $g-2$ from $|k|\sim m_e$ and computing the effects of finite volume on it.
The second useful representation of the one-loop $g-2$ is the Schwinger parametrization,
\begin{align}
a&=\frac{2\sqrt{\pi}\alpha}{ m_e^2}\int_0^\infty \frac{d\rho}{\sqrt{\rho}}\int\frac{d^3k}{(2\pi)^3}f(\rho)e^{-\rho k^2}\nonumber\\
&=\frac{\alpha}{4\pi m_e^2}\int_0^\infty \frac{d\rho}{\rho^2}f(\rho).
\label{eq:F20rho}
\end{align}
Here we have defined for convenience
\begin{align}
f(\rho)&\equiv 4m_e^4\rho^2\int_0^1 dz\, z (1-z)^2 e^{-\rho m_e^2(1-z)^2}\nonumber\\
&=-2+m_e\sqrt{\pi\rho}\,{\rm Erf}(m_e\sqrt{\rho})+2e^{-m_e^2\rho}.
\end{align}
Now we compute the sensitivity of $a$ to the density of states $g(\epsilon)$ by placing the process in a finite box of size $L^3$.
We discretize the momenta, $k\rightarrow 2\pi n/L$, and perform the sum over the $\vec n$ lattice. In the Schwinger parametrization the result can be expressed in terms of theta functions,
\begin{align}
\sum_{n=-\infty}^{\infty} e^{-\rho(2\pi n/L)^2} = \theta_3\left(e^{-4\pi^2\rho/L^2}\right) = \frac{L}{2 \sqrt{\pi\rho}} \theta_3\left(e^{-L^2/4 \rho}\right)
\end{align}
where the two expressions are related by Poisson summation and $\theta_3(\tau) = \theta_3(0,\tau)$ in the definition of Eq.~\eqref{eq:elliptic_theta_def}.
In a finite box the zero mode does not contribute to Feynman sums and must be omitted to avoid a spurious infrared divergence in the integral over $\rho$. Including this subtraction, we have
\begin{align}
a^L&\equiv\frac{2\sqrt{\pi}\alpha}{ m_e^2}\int_0^\infty \frac{d\rho}{\sqrt{\rho}} f(\rho) L^{-3}\left(\theta_3\left(e^{-\frac{4\pi^2\rho}{L^2}}\right)^3-1\right)\nonumber\\
&=\frac{\alpha}{4\pi m_e^2}\int_0^\infty \frac{d\rho}{\rho^2}f(\rho)\left(\theta_3\left(e^{-\frac{L^2}{4\rho}}\right)^3-\frac{8\pi^\frac{3}{2}\rho^\frac{3}{2}}{L^3}\right).
\label{eq:F20rhoL}
\end{align}
We can obtain an approximation to Eq.~(\ref{eq:F20rhoL}) as a series in $1/(m_e L)\ll 1$. Details are given in Appendix~\ref{sec:appxA}; here we give only the result:
\begin{align}
a_L\approx \frac{\alpha}{2\pi}\left( 1-8.91 (m_e L)^{-1} +35.65 (m_e L)^{-2} -59.21 (m_e L)^{-3} \right).
\label{eq:afiniteL}
\end{align}
The leading correction, $-8.91 (m_e L)^{-1}$, is similar in magnitude to the result obtained by Hasenfratz and Leutwyler~\cite{Hasenfratz:1989pk} for the first corrections to the two-point function; the integrand in that case is equivalent to ours in the large-$\rho$ limit of $f(\rho)$.\footnote{$f(\rho)\sim -2+\sqrt{\pi\rho m_e^2}$ at large $\rho$, up to exponentially small corrections. The appearance of $\sqrt{m_e^2}$ in this asymptotic expansion is responsible for the odd powers of $m_e$ appearing in Eq.~(\ref{eq:afiniteL}), despite the fact that the integrand in Eq.~(\ref{eq:F20rhoL}) is an even function of $m_e$. }
The finite $L$ effects on the entire mode sum are of order $L^{-1}$. However, our interest is in the contribution to the finite $L$ effects from modes around $k\sim m_e$. In fact, it is easy to see that the $1/L$ contribution in~Eq.~(\ref{eq:afiniteL}) comes entirely from the very low-momentum part of the mode sum, where $k\sim 1/L$. Finite $L$ effects are equivalent to the error introduced by performing a Riemann sum $\vec k\rightarrow 2\pi \vec n /L$ instead of an integral over $k$.
The error contribution from the momentum bin at $\vec{N}$ (summed over all 8 bins related by parity) is
\begin{equation}
\Delta_{\vec{N}} = \frac{6\pi\alpha}{L^3} \sum_{\vec{M}\in P_\vec{N}}\left[
\int_\vec{M} d^3 n \,g\left(\frac{2\pi n}{m_e L}\right) - g\left(\frac{2\pi M}{m_e L}\right)
\right],
\end{equation}
where $g(k/m_e)$ is the dimensionless form of the integrand in Eq.~\eqref{eq:F20k}.
Repeating the Riemann error analysis of Sec.~\ref{sec:coulomb} yields a total error estimate from the $\mathcal{O}(N^3)$ cells with $N \sim L m_e/(2\pi) \gg 1 $ (corresponding to $k\sim m_e)$
\begin{equation}
\Delta_N \times N^3 \sim \frac{6\pi \alpha}{(m_e L)^2}.
\label{eq:gm2_riemann_error}
\end{equation}
We conclude that the $1/L$ term in Eq.~(\ref{eq:afiniteL}) arises from {\emph{low energy}} modes, rather than typical modes of $k\sim m_e$. On the other hand, generic contributions from $k\sim m_e$ are expected to be $\calO(1/L^2)$ by the Riemann sum argument above.
As before, the summation of all eight cells related by parity is key in obtaining the contribution of $k \sim m_e$ modes.
These conclusions are readily verified numerically, performing sums over low and high momentum modes and comparing to integration over the same $k$-volumes.
Thus, we will use the term of order $1/L^2$ in Eq.~(\ref{eq:afiniteL}) to estimate the effect on $g-2$ of depleting the density of states near $k\sim m_e$. This is in contrast to Ref.~\cite{Banks:2019arz}, which used $1/L$ scaling; as we have just argued,
however, such corrections are associated with low energies rather than $k\sim m_e$.
We are now in a position to convert these corrections into limits on the single particle DOS at $\epsilon \sim m_e$, parametrized by an effective box size $L_\mathrm{eff}(m_e)$, and we can do the same for the muon. For our purposes we will neglect existing discrepancies between experiment and theory. $a_e$ has been measured to about $1\,$ppb and $a_\mu$ to about $0.3\,$ppm. Using the $1/L^2$ scaling for the corrections we find
\begin{align}
L_\mathrm{eff}(m_e)&\gtrsim 10^5 m_e^{-1}\simeq 10\,{\rm nm}\nonumber\\
L_\mathrm{eff}(m_\mu)&\gtrsim 10^4 m_\mu^{-1}\simeq 100\,{\rm fm}.
\end{align}
Note that we would obtain a much stronger bound if we discretized the state space by $1/L$ at all scales; in this case, $a$ is corrected at $\calO(1/L)$.
This is the standard scaling for finite volume corrections to $g-2$ in a fixed box~\cite{Davoudi:2014qua,Banks:2019arz} and was used both in~\cite{Banks:2019arz} and a more recent analysis of the standard correlated UV-IR cutoff interpreation of CKN~\cite{Cohen:2021zzr}.
We are purposefully not using this scaling: as we have seen, most of the effects from a real finite box come from the lowest momenta of intermediate states, where the intermediate photon is much softer than $m_e$. We elect to focus on the highest energy scale accessible to $g-2$, $m_e$, for two reasons: first, this is the scale where all the intermediate state particles are (semi)-relativistic and have energies of similar order; and second, the DOS at higher energies is of greater interest for the cosmological constant problem.
The effective sizes implied by CKN scaling are
\begin{align}
L_{\rm CKN}(m_e)&\simeq 10^{21} m_e^{-1}\simeq 10^5\,{\rm km}\nonumber\\
L_{\rm CKN}(m_\mu)&\simeq 10^{19} m_\mu^{-1}\simeq 20\,{\rm km} .
\end{align}
Clearly we are in no danger of testing these densities.
\subsection{Higher Energies}
The finite volume technique used above for the Lamb shift and $g-2$ could be applied to other precision processes. However, at much higher energies observables are both predicted and measured with much lower precision. Instead we make some simpler qualitative estimates.
Many detectors in high energy physics have energy resolutions of order $0.1-10\%$. For example, the electromagnetic calorimeter at CMS is able to measure electron momenta to order $1\%$ over a range 100 GeV - 1 TeV~\cite{CMS:2018ipm}. Astrophysical observatories have access to even higher energies. For example, IceCube observes PeV neutrinos with an energy resolution of $\sim 20\%$~\cite{IceCube:2013ccs}, while the Pierre Auger Observatory measures $\sim 100$ EeV cosmic rays with
a $7\%$ resolution~\cite{PierreAuger:2020qqz}. This implies an empirical bound on the effective length, $L_\mathrm{eff}({\rm 100\; GeV})\gtrsim 1\;{\rm fm}$,
$L_\mathrm{eff}({\rm 10^6\; GeV})\gtrsim 10^{-5}\;{\rm fm}$ and $L_\mathrm{eff}({\rm 10^{11}\; GeV})\gtrsim 10^{-10}\;{\rm fm}$. These length scales are a factor
of $10^{13}$, $10^9$ and $10^5$ smaller than implied by the CKN-inspired depletion of DOS in Eq.~\eqref{eq:naiveDDOS}.
\section{Hot Boxes and Depleted DOS}
\label{sec:hot_box}
Now we return to the CKN bound, examining the relation between hot box thought experiments and the depleted DOS of Eq.~(\ref{eq:naiveDDOS}) in more detail.
We begin by generalizing Eq.~(\ref{eq:naiveDDOS}) to a family of modified single particle relativistic DOS,
\begin{align}
g(\epsilon) = \epsilon^2 L_\mathrm{eff}(\epsilon)^3,\;\;\; L_\mathrm{eff}(\epsilon) = \min\left(L,M_p^{-1}(M_p/\epsilon)^n\right)
\label{eq:modified_dos}
\end{align}
for some $n>1$. We ignore any ${\cal{O}}(1)$ numbers.
It is also convenient to introduce the transition scale
\begin{align}
\hat \epsilon \equiv M_p/(M_pL)^{1/n}.
\end{align}
We take $n>1$ so that the transition energy satisfies $\hat\epsilon\gg 1/L$ for all systems larger than the Planck length.
For single particle energies $\epsilon < \hat \epsilon $, the density of states is depleted by ordinary finite volume effects related to the physical size of the system under consideration. For
$\epsilon > \hat \epsilon$ it is depleted more strongly. We could further generalize the factors of $M_p$ in Eq.~(\ref{eq:modified_dos}) to some lower scale associated with quantum gravity, if such a scale exists, but for simplicity we will keep it as $M_p$.
Thus we have a one-parameter family of models labeled by the depletion rate parameter $n$. For large $n$, the depletion rate as a function of energy is rapid, but the transition scale is also high. For small $n$, the depletion rate with energy is slow, but the transition scale is low. Primarily we will be interested in $n\sim 1-2$, as we will see below.
Note that since in any experimental system
$L M_p \gg 1$, the transition between standard and depleted density occurs at scales far below $M_p$.
We will also assume a cutoff on QFT at $E\sim M_p$.
Now we estimate the effects of the DOS depletion on hot box gravitational backreaction, and the radiative correction to the cosmological constant, as a function of the depletion rate parameter $n$ in Eq.~(\ref{eq:modified_dos}).
\subsection{Hot Boxes}
The energy and entropy of a thermal state of free particles are
\begin{align}
E &=\int d \epsilon\, \epsilon \,g(\epsilon) f_{\pm}(\beta \epsilon)\nonumber\\
S &=\int d \epsilon\, g(\epsilon) \left[\beta \epsilon f_{\pm}(\beta \epsilon) \pm \log\left(1\pm e^{-\beta \epsilon}\right)\right]\nonumber\\
&= -\int d \epsilon\, g(\epsilon) \left[f_{\pm} \ln f_{\pm} \pm (1\mp f_{\pm})\ln\left(1\mp f_{ \pm}\right)\right]
\end{align}
where $f_{\pm}$ is the Fermi-Dirac (+) or Bose-Einstein (-) distribution function and $\beta=1/T$. We will estimate the energy and the entropy for the depleted density of states in Eq.~(\ref{eq:modified_dos}).
First we consider the Fermi-Dirac case.
For high but subplanckian temperatures $M_p \gg T\gg \hat \epsilon$ the energy scales as
\begin{align}
E & = \int^{\hat \epsilon} d\epsilon\, \frac{\epsilon^3 L^3}{e^{\beta \epsilon} + 1} + \int_{\hat \epsilon} d\epsilon \,\frac{(M_p/\epsilon)^{3n-3}}{e^{\beta \epsilon} + 1} \nonumber\\
& \sim M_p
\begin{cases}
(T/M_p)^{4-3n} & 1< n < 4/3 \\
\ln \left[(L T)/(L M_p)^{1/4}\right] & n = 4/3 \\
(L M_p)^{3-4/n} & n > 4/3,
\end{cases}
\end{align}
where we drop $\mathcal{O}(1)$ factors and take $n>1$ for reasons described above. For $n>4/3$, the energy is dominated by contributions from modes near $\hat \epsilon$. As in CKN we can compare the Schwarzschild scale $E/M_p^2$ to the system size $L$. The bound $L>E/M_p^2$ is satisfied for $n<2$ and saturated for $n=2$.
For the entropy, the scaling behavior is
\begin{align}
S \sim (L M_p)^{3-3/n}.
\end{align}
In the Bose-Einstein case, at high $ M_p \gg T \gg \hat \epsilon$, the energy behaves as
\begin{align}
E & = \int^{\hat \epsilon} d\epsilon\, \frac{\epsilon^3 L^3}{e^{\beta \epsilon} - 1} + \int_{\hat\epsilon} d\epsilon\, \frac{(M_p/\epsilon)^{3n-3}}{e^{\beta \epsilon} - 1} \sim T (L M_p)^{3-3/n}.
\end{align}
again dropping $\mathcal{O}(1)$ factors. This scaling applies for $n>1$, and is different
from the Fermi-Dirac case due to large occupation numbers in low energy modes. Comparing the Schwarzschild scale $E/M_p^2$ to the system size $L$, we find that black holes are not formed for any $T < M_p$ if $n\leq 3/2$.
For $n > 3/2$, however, there is still a bound on the temperatures,
\begin{equation}
T < \frac{M_p}{(LM_p)^{2-3/n}}.
\end{equation}
In fact, for $n=2$ the bound on $T$ obtained in this manner is approximately the same as in the original CKN bound. So in this case, the depletion of the density of states does not automatically eliminate black holes at high temperatures in finite-size bosonic systems.
On the other hand, {\emph{no}} depleted single-particle DOS {\emph{or}} correlated UV-IR cutoff on Feynman integrals can remove black holes formed by non-thermal states of soft bosonic modes with enormous occupation numbers. Some states must be removed in a way that depends on the occupancy. Instead, however, we can ask whether the entropy is reduced in a way consistent with the CKN bound. The entropy is
\begin{align}
S\sim (L M_p)^{3-3/n}\log(\beta \hat \epsilon).
\end{align}
Up to the logarithm, it saturates the $L^{3/2}$ scaling for $n=2$.
From these thought experiments, we conclude that the range $1<n\leq 2$ is of interest, with possibly special roles played by $n=2$ and $n=3/2$. $n=2$, the model used for comparison in Sec.~\ref{sec:depletion_from_finite_volume}, is the more conservative of the two: it corresponds a faster rate of depletion, but it turns on at higher energies, corresponding to a lesser overall depletion at any given scale.
\subsection{Cosmological Constant}
Finally let us consider consider the impact of a depleted DOS on the cosmological constant.
In the power-law models above, the QFT vacuum energy contribution to the cc is finite if $n > 4/3$ and scales as
\begin{align}
\delta\rho&\sim H^{3}\int d \epsilon\, \epsilon \,g(\epsilon) \sim \hat\epsilon^4
\label{eq:cc_correction}
\end{align}
where $H$ is the Hubble scale. Unlike the local observables considered in Sec.~\ref{sec:depletion_from_finite_volume},
the cc does not have a preferred energy scale $\epsilon_*$; rather, $\delta\rho$ is dominated by the most numerous modes
around $\hat \epsilon$.
The relative size of the correction in Eq.~\eqref{eq:cc_correction} is
\begin{equation}
\frac{\delta \rho}{\rho} \sim \left(\frac{\rho}{\mpl^4}\right)^{2/n -1}.
\end{equation}
We see that for $n\leq 2$, the cc appears to be technically natural, i.e. the quantum correction is at most of the size of the
cc itself. While $n>2$ still gives rise to a finite $\delta \rho$, the correction exceeds the observed cc because the
transition scale $\hat\epsilon$ becomes too large.
For $n = 2$, $\hat \epsilon \sim \mathrm{meV}$. We emphasize that we do not interpret this as a transition
energy beyond which QFT breaks down in all experiments. Rather, $\epsilon > \hat \epsilon$ merely marks the energy scale at which the characteristic momentum spacing between independent field modes exceeds $H\sim 10^{-33}$ eV.
Systems much smaller than the horizon size (i.e., laboratory experiments) are sensitive to a different DOS (i.e., different $L$ and $\hat\epsilon$)
and therefore cannot constrain fluctuations over $\sim 1/H$, as emphasized by CKN~\cite{Cohen:1998zx}.
This point of view is in contrast with the idea that
laboratory experiments which measure the gravitation of vacuum fluctuations can be used to justify the standard (UV-sensitive) QFT estimate of the vacuum energy~\cite{Polchinski:2006gy}. In fact, the $(g-2)$ calculation in Sec.~\ref{sec:g_minus_2} shows that even some of the most precise probes of vacuum fluctuations are not sensitive to the depletion of the DOS needed to address the cc fine-tuning problem.
\section{Conclusion}
\label{sec:conclusion}
Quantum field theory provides an accurate description of local observables over an enormous range of energy scales, including high energy collider processes and precision measurements in atomic physics. However, a naive application of QFT to extensive systems runs
into conceptual problems, including the violation of entropy bounds or strong gravitational backreaction even for rather
mundane energy densities and volumes. For example, a $10$ m room filled with $T\sim 10$ GeV plasma is within its own Schwarzschild radius, implying
that nongravitational QFT must break down.
Based on these thought experiments, CKN proposed a correlation between the UV
and the IR cutoffs on QFT~\cite{Cohen:1998zx}.
We have explored an alternative interpretation proposed in~\cite{Banks:2019arz} in which the
independent degrees of freedom are depleted in an energy scale-dependent way.
An analogous depletion has been suggested in partonic models of holography~\cite{Susskind:1994vu}.
We studied a simple phenomenological implementation of a state depletion, motivated by the ``hot box" thought experiments of CKN.
For local observables, the DOS depletion can be viewed as a finite volume effect, where the volume depends on the characteristic
energy scale of the observable. We have applied this reasoning to estimate the corrections to two sensitive probes of QFT, lepton $g-2$ and the hydrogen Lamb shift, finding that despite their incredible precision, these measurements are far from being sensitive to the depletions motivated by quantum gravity. Tests of the DOS are, however, a novel axis for testing QFT. It would be interesting explore other observations that probe the DOS at different energy scales, such as high energy cosmic ray scattering.
An interesting application of these DOS models is the calculation of the QFT vacuum energy contribution to the cosmological constant,
which becomes UV-insensitive if the depletion is rapid enough. For a DOS that saturates the CKN bound, we find that
the cc is technically natural.
The most important questions, unaddressed here, are how Lorentz invariance emerges and whether the QFT entropy scaling $S_{QFT}\sim(M_p L)^{3/2}$ can be motivated by microscopic models analogous to the partonic models of holography. The Holographic Space Time models of Banks and Fischler~\cite{Banks:2013fr,Banks:2018aed,Banks:2020zcr}, for example, have been argued to realize just such a scaling~\cite{tbpc}.
\section*{Acknowledgements}
We thank Tom Banks, Ben Lillard, Aleksey Cherman and Theo Jacobson for useful discussions. PD acknowledges support from the US Department
of Energy under Grant No. DE-SC0015655.
This manuscript has been authored by Fermi Research Alliance, LLC under Contract No. DE-AC02-07CH11359 with the U.S. Department of Energy, Office of Science, Office of High Energy Physics.
|
\section{Introduction}
The \(v\)-function appears in the wild McKay correspondence for quotient varieties \(\AA^d/G\) associated to linear action as a weighting function (see \cite{WY}, \cite{Yas3}). This is a function on the moduli space of \(G\)-\'etale \(K\)-algebras for some local field \(K\) and it is an invariant to study ramification of the algebras. The value of \(v\)-function coincides with the valuation of generator of \textit{the module resolvent} defined by Fr\"ohlich \cite{Fro} (see also \cite[Rem 9.4]{TY}).
As another invariant to study ramification of extensions of local fields, there is \textit{the ramification filtration}, which is a sequence \((G_i)_{i\geq -1}\) of subgroups of Galois group. Yasuda presented the problem whether the \(v\)-function is determined by the ramification filtration or not in \cite[Problem 5.1]{Yas}. The \(v\)-function has been computed in some cases. For the representation of \(p\)-cyclic group over the Laurent power series field \(k((t))\)) of characteristic \(p\), a formula of the \(v\)-function computed from the ramification jump, that is the index satisfying \(G_i\ne G_{i+1}\), in \cite{Yas2}. Similarly, for the representation of \(p^n\)-cyclic group, a formula of the \(v\)-function is determined by the ramification jumps in \cite[Theorem 3.11]{TanYas}. For any permutation action, the \(v\)-function is the same as the Artin conductor, which is determined by the ramification filtration \cite[Theorem 4.8]{WY}.
In this paper, we give a formula of the \(v\)-function for subgroup \(G\subset\mathrm{SL}_2(k)\) isomorphic to \((\mathbb Z/p\mathbb Z)^2\).
\begin{thm}[Main theorem, Theorem \ref{thm:main}]
Let \(k\) be an algebraically closed field of characteristic \(p>0\). Let \(K\) be the Laurent power series field \(k((t))\) and let \(\mathcal O_K\) be the valuation ring of \(K\). Let \(v_K\) be the valuation of \(K\).
For a subgroup \(G\subset\mathrm{SL}_2(k)\) generated by
\[\sigma=\begin{bmatrix}
1&1\\
0&1
\end{bmatrix},\ \tau=\begin{bmatrix}
1&a\\
0&1
\end{bmatrix}\quad(a\in k\backslash\mathbb F_p),\]
we consider the induced \(G\)-representation \(V=\AA_{\mathcal O_K}^2\). For a \(G\)-Galois extension \(L/K\), let \(g_1,g_2\) be the corresponding elements of \(L^\sigma, L^\tau\) by the Artin-Schreier theory. Then
\[
\boldsymbol v_{V}(g_1,g_2)=\ceil{-\frac{\min\{v_K(g_1),pv_K(a^pg_1+g_2)\}}{p^2}}.
\]
\end{thm}
We prove this theorem by direct computation. The \(v\)-function for linear action is computed from \textit{the tuning module}, which is the set of \(G\)-equivariant \(\mathcal O_K\)-linear homomorphisms from the linear part of the coordinate ring of \(V\) to \(\mathcal O_L\). First, we choose a \(K\)-basis of \(L\). In this situation, homomorphisms in the \textit{tuning module} is characterized by the value of \(x_2\), which is second coordinate of \(V\). We determine the sets of the value of \(x_2\) with respect to elements of the tuning module. From this computation, we get an \(\mathcal O_K\)-basis of the tuning module. By the defining formula of \(v\)-function using determinant, we get the formula in the above theorem.
From this formula, we get a counterexample for Yasuda's problem.
\begin{coro}[Corollary \ref{cor:main}]
We keep the notation of the main theorem. Then the value of \(\boldsymbol v_V\) at a \(G\)-extension \(L/K\) is not determined by the ramification filtration of \(G\) associated to \(L/K\).
\end{coro}
We prove this by applying the main theorem to a special sequence of pairs \(g_1,g_2\) parameterized by \(c\in k-\mathbb F_p\) such that every \(L_{g_1,g_2}\) has the same ramification filtration. We can see that if \(c=-a^2\) then the value of \(v\)-function at \(L_{g_1,g_2}\) is different from the one of the other case.
This paper is organized as follows. In section three, we recall the lower and upper ramification filtrations and basic facts about them. In section four, we give the definition of the \(v\)-function. In section five, we show the main theorem and its corollary.
\subsection*{Acknowledgements}
I am grateful to Takehiko Yasuda for teaching me and for his valuable comments. Without his help, this paper would not have been possible. This work was partially supported by JSPS KAKENHI Grant Number JP18H01112.
\section{Notation and Convention}
Throughout the paper, \(k\) denotes an algebraically closed field of characteristic \(p>0\) and \(K\) denotes the Laurent power series field \(k((t))\) and \(\mathcal O_K\) denotes the valuation ring of \(K\) with respect to the normalized valuation \(v_K\).
For a finite group \(G\), a \(G\)\textit{-\'etale} \(K\)-\textit{algebra} \(A\) means an \'etale \(K\)-algebra endowed with \(G\)-action satisfying \(A^G\cong K\) and \(\dim_KA=\sharp G\).
\section{Ramification filtration}
The \textit{ramification filtration} is an invariant used to study the ramification of Galois extension of local field. For details, see \cite{Ser}. Let \(L/K\) be a Galois extension. We denote the Galois group of \(L/K\) by \(G\). Then \(G\) acts on the integral closure \(\mathcal O_L\) of \(\mathcal O_K\) in \(L\).
\textit{The i-th lower ramification group} \(G_i\) of \(G\) is defined by
\[
G_i=\{\sigma\in G\mid v_L(\pi\sigma-\pi)\geq i+1\}
\]
for \(i\geq -1\) where \(\pi\) is an uniformizer of \(\mathcal O_L\). The lower ramification groups give a descending sequence of subgroups of \(G\):
\[G=G_0\supset G_1\supset G_2\supset\cdots\supset G_i\supset G_{i+1}\supset\cdots\]
The sequence is called \text{the lower ramification filtration}.
In general, the lower ramification filtration is not compatible with quotient of group. To fix this problem, we consider \text{the upper ramification group} which is defined as follows. For a real number \(t\geq -1\), we define \(G_t=G_{\ceil t}\). We define a function \(\varphi\) by
\[
\varphi(x)=\int_0^x\frac{dt}{(G_0:G_t)}
\]
where \((G_0:G_t)\) is index of \(G_0/G_t\). Note that \((G_0:G_t)\) means the inverse of the index of \(G_0/G_{-1}\) for \(-1\leq t<0\) as convention. Then \(\varphi\) has its inverse function \(\psi\). We define
\[
G^v=G_{\psi(v)},
\]
which called \textit{the }\(v\)\textit{-th upper ramification group}. As \(\varphi\) is monotonically increasing, the upper ramification groups also gives a descending sequence of subgroups of \(G\):
\[G=G^0\supset G^1\supset G^2\supset\cdots\supset G^i\supset G^{i+1}\supset\cdots\]
This sequence is called \textit{the upper ramification filtration}.
\begin{prop}[Proposition 14, page 74, \cite{Ser}]\label{prop:upper}
The upper ramification filtration is compatible with quotients of the group. Namely, for a normal subgroup \(H\subset G\), we get
\[(G/H)^v=G^vH/H\]
for all \(v\geq -1\).
\end{prop}
\section{The \textit{\textbf{v}}-function}
In this paper, we define the \(v\)-function associated to a linear action. For more detail, see \cite{WY} or \cite{Yas4}. The \(v\)-function is a function from the set of \(G\)-\'etale \(K\)-algebras to \(\frac 1{\sharp G}\mathbb Z\). A \(G\)-\textit{\'etale} \(K\)-\textit{algebra} is a \(K\)-algebra endowed with \(G\)-action satisfying the stable subalgebra of \(G\) is isomorphic to \(K\).
Let \(V\) be an \(n\)-dimensional representation of a finite group \(G\subset\mathrm{GL}_n(k)\) over \(\mathcal O_K\). Note that the following definition can be applied for representaions of subsets of \(\mathrm{GL}_n(\mathcal O_K)\). We denote the coordinate ring of \(V\) by \(\mathcal O_K[x_1,\ldots,x_n]\). Then the linear part \(M=\sum_{i=1}^n\mathcal O_Kx_i\) of \(\mathcal O_K[x_1,\ldots,x_n]\) is the free \(\mathcal O_K\)-module of degree \(n\). For a \(G\)-\'etal \(K\)-algebra \(A\), We define its \textit{tuning module} \(\Xi_{A/K}^V\) by the set of all \(G\)-equivaliant \(\mathcal O_K\)-linear homomorphisms from \(M\) to \(\mathcal O_A\) where \(\mathcal O_A\) is the integral closure of \(\mathcal O_K\) in \(A\):
\[
\Xi_{A/K}^V=\mathrm{Hom}_{\mathcal O_K}^G(M,\mathcal O_A)
\]
Note that \(\Xi_{A/K}^V\) is also a free \(\mathcal O_K\)-module of degree \(n\).
The \(G\)-\'etale \(K\)-algebra \(A\) is written as
\[
A=L_1\oplus L_2\oplus\cdots\oplus L_m
\]
where \(L_i\) are copies of a Galois extension \(L/K\). The \(v\)-function \(\boldsymbol v_V\) is defined by
\[
\boldsymbol v_V(A)=\frac{1}{\sharp G}\mathrm{length}_{\mathcal O_K}\frac{\mathrm{Hom}_{\mathcal O_K}(M,\mathcal O_A)}{\mathcal O_A\cdot\Xi_{A/K}^V}
\]
in \cite[Definition 5.4]{Yas4}. Let \((\varphi_i)_{i=1}^n\subset\Xi_{A/K}^V\) be a \(\mathcal O_K\)-basis of \(\Xi_{A/K}^V\). Then the \(v_V\) is computed by
\begin{align}\label{form}
\boldsymbol v_V(A)=\frac 1{\sharp G}v_L(\det(\varphi_i(x_j))).
\end{align}
\section{Computation of \textit{\textbf v}-function}
We consider a subgroup \(G\) of \(\mathrm{SL} _2(k)\) generated by
\[\sigma=\begin{bmatrix}
1&1\\
0&1
\end{bmatrix},\ \tau=\begin{bmatrix}
1&a\\
0&1
\end{bmatrix}\]
where \(a\in k\backslash\mathbb F_p\).
We denote the subset
\[
\bigoplus_{p\nmid j,\ j>0}kt^{-j}\subset K
\]
by \(J\). Note that \(J\) is a set of representatives of \(K/\mathcal P(K)\). We put
\[
J^{(2)}=\{(g_1,g_2)\in J^2\mid g_1\ne 0,\ g_2\not\in\mathbb F_pg_1\}.
\]
Let \(L/K\) be a \(G\)-extension. Since the fixed fields \(L^\sigma,\ L^\tau\) are \(p\)-cyclic extensions, there exist uniquely \(\alpha,\ \beta\in L\) such that the following conditions holds.
\begin{itemize}
\item \(L^\sigma=K[\alpha]\) and \(L^\tau=K[\beta]\).
\item \(\alpha^p-\alpha,\ \beta^p-\beta\in J\).
\item \(\alpha\cdot\tau=\alpha+1,\ \beta\cdot\sigma=\beta+1\).
\end{itemize}
We denote \(\alpha^p-\alpha,\ \beta^p-\beta\) by \(g_1,\ g_2\), respectively. Then \((g_1,g_2)\in J^2\). In this case, we denote \(L\) by \(L_{g_1,g_2}\).
\begin{prop}\label{prop:paramExt}
We have the one-to-one correspondence:
\[\begin{array}{ccc}
\{G\text{-extensions }L/K\}&\leftrightarrow&J^{(2)}\\
L_{g_1,g_2}&\mapsto&(g_1,g_2)
\end{array}\]
\end{prop}
\begin{proof}
We show that \((g_1,g_2)\in J^{(2)}\), which equivalent to that \(g_1\ne 0,\ g_2\not\in\mathbb F_p g_1\), for a \(G\)-extension \(L_{g_1,g_2}\). If \(g_1=0\), then \(L^\sigma=K\), that contradicts the fact that \(L/K\) is \(G\)-extension. Thus we get \(g_1\ne 0\). If \(g_2\in\mathbb F_pg_1\), then there exists \(0\ne s\in\mathbb F_p\) such that \(g_2=sg_1\). Since \(s\in\mathbb F_p\), we have \(s^p=s\). Hence
\[
(s\alpha)^p-s\alpha=s(\alpha^p-\alpha)=sg_1=g_2.
\]
Therefore, \(s\alpha\) and \(\beta\) are solutions of the equation \(x^p-x=g_2\). Thus \(\beta=s\alpha+t\) for some \(t\in\mathbb F_p\), and hence \(\beta\in L^\sigma\).
That contradicts to that \(L/K\) is \(G\)-extension. Therefore, we have \(g_2\not\in\mathbb F_pg_1\).
\end{proof}
We denote the \(G\)-extension field \(L\) of \(K\) corresponding \((g_1,g_2)\in J^{(2)}\) by \(L_{g_1,g_2}\).
Let \(V\) be the natural representation of \(G\) of rank two over \(\mathcal O_K\). We
denote \(\boldsymbol v_V(L_{g_1,g_2})\) by \(\boldsymbol v_V(g_1,g_2)\). Let \(\mathcal O_K[x_1,x_2]\) be the coordinate ring of \(V\).
\begin{prop}\label{prop:isomTM}
The tuning module \(\Xi_{L/K}^V\) for a \(G\)-extension field \(L\) of \(K\) is isomorphic to
\[
\Theta_L:=\{m\in\mathcal O_L\mid
\ m(\sigma-1)^2=0,\ m(\tau-1)=am(\sigma-1)\}
\]
as an \(\mathcal O_K\)-module by the following maps:
\begin{gather*}
\Xi_{L/K}^V\ni\varphi\mapsto\varphi(x_2)\in\Theta_L\\
\Theta_L\ni m\mapsto(m(\sigma-1))\varphi_1+m\varphi_2\in\Xi_{L/K}^V
\end{gather*}
where \(\varphi_1,\varphi_2\) are \(\mathcal O_K\)-linear homomorphisms from the linear part of \(\mathcal O_K[x_1,x_2]\) to \(O_L\) defined by
\[
\varphi_i(x_j)=\begin{cases}
1&(i=j)\\
0&(i\ne j)
\end{cases}
\]
\end{prop}
\begin{proof}
Let \(\varphi\in\Xi_{L/K}^V\) and let \(m=\varphi(x_2)\). Since \(\varphi\) is \(G\)-equivariant, we get
\begin{gather*}
\begin{split}
m(\sigma-1)&=\varphi(x_2(\sigma-1))\\
&=\varphi(x_1),
\end{split}\\
\begin{split}
m(\sigma-1)^2&=\varphi(x_1(\sigma-1))\\
&=\varphi(0)=0,
\end{split}
\end{gather*}
and
\begin{align*}
m(\tau-1)&=\varphi(x_2(\tau-1))\\
&=\varphi(ax_1)\\
&=am(\sigma-1).
\end{align*}
Thus \(m\in\Theta_L\).
On the other hand, for \(m\in\Theta_L\), we define \(\varphi=(m(\sigma-1))\varphi_1+m\varphi_2\). Since \(m(\sigma-1)^2=0\), we have
\begin{align*}
\varphi(x_1)\sigma&=m(\sigma-1)\sigma\\
&=m((\sigma-1)^2+(\sigma-1))\\
&=m(\sigma-1)\\
&=\varphi(x_1)=\varphi(x_1\sigma)
\end{align*}
and
\begin{align*}
\varphi(x_2)\sigma&=m\sigma\\
&=m(\sigma-1)+m\\
&=\varphi(x_1+x_2)=\varphi(x_2\sigma).
\end{align*}
Since \(m(\tau-1)=am(\sigma-1)\), we have
\begin{align*}
\varphi(x_1)\tau&=m(\sigma-1)\tau\\
&=m((\sigma-1)(\tau-1)+(\sigma-1))\\
&=am(\sigma-1)^2+m(\sigma-1)\\
&=m(\sigma-1)\\
&=\varphi(x_1)=\varphi(x_1\sigma)
\end{align*}
and
\begin{align*}
\varphi(x_2)\tau&=m\tau\\
&=m(\tau-1)+m\\
&=am(\sigma-1)+m\\
&=\varphi(ax_1+x_2)=\varphi(x_2\tau).
\end{align*}
These equations show that \(\varphi\) is \(G\)-equivariant because \(G\) is generated by \(\sigma, \tau\) and \(x_1,x_2\) forms \(\mathcal O_K\)-basis of the linear part of \(\mathcal O_K[x_1,x_2]\). Therefore, \(\varphi\in\Xi_{L/K}^V\).
As above, we have two \(\mathcal O_K\)-linear homomorphisms
\begin{gather*}
\Xi_{L/K}^V\ni\varphi\mapsto\varphi(x_2)\in\Theta_L,\\
\Theta_L\ni m\mapsto(m(\sigma-1))\varphi_1+m\varphi_2\in\Xi_{L/K}^V.
\end{gather*}
These maps are inverse of each other.
\end{proof}
\begin{thm}\label{thm:main}
For a subgroup \(G\subset\mathrm{SL}_2(k)\) generated by
\[\sigma=\begin{bmatrix}
1&1\\
0&1
\end{bmatrix},\ \tau=\begin{bmatrix}
1&a\\
0&1
\end{bmatrix}\quad(a\in k\backslash\mathbb F_p),\]
we consider the \(G\)-representation \(V=\AA_{\mathcal O_K}^2\). For \((g_1,g_2)\in J^{(2)}\), we get
\[
\boldsymbol v_{V}(g_1,g_2)=\ceil{-\frac{\min\{v_K(g_1),pv_K(f)\}}{p^2}}
\]
where \(f=a^pg_1+g_2\).
\end{thm}
\begin{proof}
We put \(L=L_{g_1,g_2}\) for \((g_1,g_2)\in J^{(2)}\). Let \(\alpha,\beta\in L\) be generators of \(L^\sigma, L^\tau\) over \(K\) satisfying \(\alpha\tau=\alpha+1,\ \beta\sigma=\beta+1,\ \alpha^p-\alpha=g_1\), and \(\beta^p-\beta=g_2\). The fixed field \(L^\sigma\) is naturally regarded as a cyclic representation of \(\angles{\tau}\) over \(K\). Since
\[
\alpha^i(\tau-1)=(\alpha+1)^i-\alpha^i=i\alpha^{i-1}+\sum_{l=0}^{i-2}\binom il\alpha^l
\]
for \(i\geq 1\), \(\alpha^i(\tau-1)^j\) is a polynomial of \(\alpha\) degree \(i-j\). In particular, \(\alpha^{p-1}(\tau-1)^{p-1}\ne 0\). Hence the representation matrix of \(\tau\) on \(L^\sigma\) has only one Jordan block. Hence, we can choose \(K\)-basis \((A_i)_{i=0}^{p-1}\) of \(L^\sigma\) which satisfies
\[A_i(\tau-1)=A_{i-1}\quad(1\leq i\leq p-1)\]
and \(A_1=\alpha\). Similarly, we can choose \(K\)-basis \((B_i)_{i=0}^{p-1}\) of \(L^\tau\) which satisfies
\[
B_i(\sigma-1)=B_{i-1}\quad(1\leq i\leq p-1)
\]
and \(B_1=\beta\). Then \((A_iB_j)_{i,j=0}^{p-1}\) is a \(K\)-basis of \(L\).
We compute a \(\mathcal O_K\)-basis of \(\Theta_L\), which defined in Proposition \ref{prop:isomTM}. Let \(m\in\Theta_L\). We can write \(m=\sum_{i=0}^{p-1}\sum_{j=0}^{p-1}c_{ij}A_iB_j\) with \(c_{ij}\in K\). Since \(A_i\in L^\sigma\), we have
\[(A_iB_j)(\sigma-1)=(A_i\sigma)(B_j\sigma)-A_iB_j=A_i(B_j(\sigma-1))=A_iB_{j-1}.\]
Similarly, we have
\[(A_iB_j)(\tau-1)=A_{i-1}B_j.\]
Then we get
\begin{align*}
m(\sigma-1)^2&=\sum_{i=0}^{p-1}\sum_{j=2}^{p-1}c_{ij}A_iB_{j-2}\\
&=\sum_{i=0}^{p-1}\sum_{j=0}^{p-3}c_{i,j+2}A_iB_j
\end{align*}
Since \(m\in\Theta_L\), \(m\) satisfies \(m(\sigma-1)^2=0\). Hence we get
\[
m=\sum_{i=0}^{p-1}(c_{i0}A_i+c_{i1}A_iB_1).
\]
Moreover \(m\) satisfies \(m(\tau-1)=am(\sigma-1)\). We have
\begin{gather*}
\begin{split}
m(\tau-1)&=\sum_{i=0}^{p-1}(c_{i0}(A_i(\tau-1))+c_{i1}(A_iB_1(\tau-1)))\\
&=\sum_{i=1}^{p-1}(c_{i0}A_{i-1}+c_{i1}A_{i-1}B_1)\\
&=\sum_{i=0}^{p-2}(c_{i+1,0}A_i+c_{i+1,1}A_iB_1),
\end{split}\\
\begin{split}
am(\sigma-1)&=a\sum_{i=0}^{p-1}(c_{i0}(A_i(\sigma-1))+c_{i1}(A_iB_1(\sigma-1)))\\
&=\sum_{i=0}^{p-1}ac_{i1}A_iB_0.\\
\end{split}\\
\end{gather*}
Combining these, we get
\[
ac_{i1}=c_{i+1,0}
\]
for \(0\leq i\leq p-2\) and
\[
c_{i1}=0
\]
for \(1\leq i\leq p-1\). These implies that
\[m=c_{00}+c_{i1}(a\alpha+\beta).\]
We put \(\gamma=a\alpha+\beta\) and \(s=v_L(\gamma)\). We have
\begin{align*}
N_{L/L^\sigma}(\gamma)&=\prod_{i=0}^{p-1}\gamma\sigma^i=\prod_{i=0}^{p-1}(\gamma+i)\\
&=\gamma^p-\gamma=(a^p\alpha^p+\beta^p)-(a\alpha+\beta)\\
&=a^p(\alpha+g_1)-a\alpha+(\beta^p-\beta)\\
&=(a^p-a)\alpha+a^pg_1+g_2=(a^p-a)\alpha+f.
\end{align*}
Thus
\[
s=-v_{L^\sigma}((a^p-a)\alpha+f).
\]
Now
\[
v_{L^\sigma}(\alpha)=v_K(N_{L^\sigma/K}(\alpha))=v_K(g_1),
\]
which is not divided by \(p\). Since
\[
v_{L^\sigma}(f)=pv_K(f)\in p\mathbb Z,
\]
we get \(v_{L^\sigma}((a^p-a)\alpha)\ne v_{L^\sigma}(f)\). Hence
\begin{align*}
s&=-v_{L^\sigma}((a^p-a)\alpha+f)\\
&=-\min\{v_{L^\sigma}((a^p-a)\alpha),v_{L^\sigma}(f)\}\\
&=-\min\{v_K(g_1),pv_K(f)\}.
\end{align*}
Note that \(s\not\in p^2\mathbb Z\). Therefore,
\[
m\in\mathcal O_L\Leftrightarrow c_{00}\in\mathcal O_K\text{ and }c_{i1}\in t^{\ceil{\frac s{p^2}}}\mathcal O_K.
\]
Thus \(1,t^{\ceil{\frac s{p^2}}}\gamma\) is an \(\mathcal O_K\)-basis of \(\Theta_L\). This corresponds to an \(\mathcal O_K\)-basis
\[
\varphi_2,\ t^{\ceil{\frac s{p^2}}}\gamma\varphi_1+t^{\ceil{\frac s{p^2}}}\varphi_2
\]
of the tuning module \(\Xi_{L/K}^V\).
By formula \ref{form}, we get
\[
\boldsymbol v_V(L)=\frac 1{p^2}v_L\left(\det\begin{bmatrix}
0&1\\
t^{\ceil{\frac s{p^2}}}&t^{\ceil{\frac s{p^2}}}\gamma
\end{bmatrix}\right)=\ceil{\frac s{p^2}}.
\]
As \(s=-\min\{v_K(g_1),pv_K(f)\}\), we get
\[\boldsymbol v_V(g_1,g_2)=\ceil{-\frac{\min\{v_K(g_1),pv_K(f)\}}{p^2}}.\]
\end{proof}
\begin{coro}\label{cor:main}
We keep the notation of this section. Then the value of \(\boldsymbol v_V\) at a \(G\)-extension \(L/K\) is not determined by the ramification filtration of \(G\) associated to \(L/K\).
\end{coro}
\begin{proof}
In the situation of Theorem \ref{thm:main}, we set \(g_1=t^{-(p^2-1)}\) and \(g_2=ct^{-(p^2-1)}+t^{-1}\) where \(c\in k-\mathbb F_p\). By Theorem \ref{thm:main}, we get
\[
\boldsymbol v_V(g_1,g_2)=\begin{cases}
p&(c\ne -a^2)\\
1&(c=-a^2)
\end{cases}
\]
In particular, \(\boldsymbol v_V(g_1,g_2)\) depends on the value of \(c\).
On the other hand, the upper ramification filtration is compatible with passing to a quotient group. Hence the upper ramification filtration is determined from the ones of all the intermediate fields of \(L/K\) by Proposition \ref{prop:upper}. Any intermediate field is determined from a subgroup of \(\mathbb F_pg_1+\mathbb F_pg_2\) by Artin-Schreier theory. An upper ramification filtration of an intermediate field is determined from the valuations of all elements of the corresponding subgroup of \(\mathbb F_pg_1+\mathbb F_pg_2\). As \(c\not\in\mathbb F_p\), each nonzero element of \(\mathbb F_pg_1+\mathbb F_pg_2\) has valuation \(-(p^2-1)\). Therefore, the ramification filtration of \(L_{g_1,g_2}\) does not depend on \(c\).
\end{proof}
|
\subsubsection*{Declaration of Competing Interests}
{\let\thefootnote\relax\footnote{{* Corresponding author: ROMANET Pierre,
Earthquake and Tsunami Research Division,
National Research Institute for Earth Science and Disaster Resilience,
3-1, Tennodai, Tsukuba, Ibaraki, 305-0006, JAPAN}}}
The authors acknowledge there are no conflicts of interest recorded.
\newpage
\begin{abstract}
One of the most suitable methods for modeling fully dynamic earthquake cycle simulations is the spectral boundary integral element method (sBIEM), which takes advantage of the fast Fourier transform (FFT) to make a complex numerical dynamic rupture tractable. However, this method has the serious drawback of requiring a flat fault geometry due to the FFT approach. Here we present an analytical formulation that extends the sBIEM to a mildly non-planar fault. We start from a regularized boundary element method and apply a small-slope approximation of the fault geometry. Making this assumption, it is possible to show that the main effect of non-planar fault geometry is to change the normal traction along the fault, which is controlled by the local curvature along the fault. We then convert this space--time boundary integral equation of the normal traction into a spectral-time formulation and incorporate this change in normal traction into the existing sBIEM methodology. This approach allows us to model fully dynamic seismic cycle simulations on non-planar faults in a particularly efficient way. We then test this method against a regular boundary integral element method for both rough-fault and seamount fault geometries, and demonstrate that this sBIEM maintains the scaling between the fault geometry and slip distribution.
\end{abstract}
\newpage
\section{Introduction}
The effect of fault geometry on earthquake mechanics is one of the most fundamental questions in seismology. Numerous numerical \citep{aochi2000b,bhat2004,oglesby2005,dunham2011b,mitsui2018,ando2018,wollherr2019,sathiakumar2021} and theoretical \citep{poliakov2002,rice2005,fang2013} studies have made significant advances in improving our understanding of the effect of complex fault geometries and their associated seismogenesis. However, a major limiting factor in the dynamic rupture modeling of complex fault geometries and/or modeling in a complex medium is the computational time required to run such a complex earthquake model.
The boundary integral element method (BIEM) is one approach for obtaining an analytical solution of the stress field in the form of an integral over the history of the slip distribution along the fault. The analytical nature of the BIEM means that it has strong limitations, such as the requirement of a simple medium during simulations. The elasto-dynamic BIEM involves a space--time convolution when modeling planar faults, such that the simulation can be accelerated by calculating the stress in the wavenumber domain via the Fast Fourier Transform (FFT). This appears to have been used for the first time in earthquake mechanics by \citet{andrews1985}, where a Fourier transform was employed over the Green’s function that was discretized in time. \citet{perrin1995} was the first to employ the Fourier transform on the continuous BIEM to find a representation that links the slip and stress on the fault in the wavenumber domain. This method was quickly generalized to other modes and three-dimensional (3D) problems by \citet{geubelle1995}. It has since been greatly improved by \citet{lapusta2000} to run multi-cycle simulations of dynamic rupture and aseismic slip, with a particular improvement being the ability to determine a very efficient way to perform a wavenumber-dependent truncation of the integral. This method is an extremely efficient method for performing numerical simulations of earthquake cycles, and was generalized to simulate a 3D model space in the late 2000s \citep{lapusta2009a}. We will hereafter call this BIEM that uses FFTs the spectral BIEM (sBIEM). This paper will refer only to fully dynamic simulations, although spectral methods also exist for static and quasi-dynamic simulations.
One drawback of the sBIEM is that it is not applicable to non-planar faults due to the requirement of equi-spaced data when using FFT. Therefore, fully dynamic earthquake cycle simulations on non-planar faults require much larger computational costs than those with planar faults. A literature search has indicated that a fully dynamic earthquake cycle simulation on non-planar faults that employs space--time BIEM has not been conducted to date, which is most likely due to the above-mentioned computational constraint. Although the quasi-dynamic approach is a popular approach in earthquake cycle simulations \citep{rice1993,romanet2018,ozawa2020}, it simplifies the wave-mediated stress transfer and yields large differences compared with fully dynamic simulations \citep{lapusta2009a,thomas2014c}. Therefore, more efficient ways to simulate the earthquake cycle via a fully dynamic BIEM that is applicable to non-planar faults are needed.
One way would be to extend the applicability of the sBIEM to non-planar geometries, as mentioned by \citet{heimisson2020}, who suggested that including roughness drag \citep{fang2013} in the sBIEM may allow the ability to account for geometrical effects. Another way would be to introduce normal traction variations along the fault. This approach has been employed successfully in simulating the geometrical variations of a seamount \citep{yang2013} using a classic space--time BIEM; it has since been simulated using sBIEM \citep{schaal2019}. This later approach can be justified via the observation that the main effect of non-planar fault geometry is to change the normal traction along the fault \citep{chester2000,tal2018}, which has been recently demonstrated analytically in the static case \citep{romanet2020, cattania2021}. However, this approach is currently a crude approximation because the normal traction must vary with on-going slip and cannot be chosen randomly. Finally, we note that the sBIEM has been generalized recently to simulate parallel faults in a quasi-dynamic model \citep{barbot2021}.
Here we present an analytical approach that allows us to extend the fully dynamic sBIEM to a non-planar fault geometry. We take advantage of a recently developed planar fault approximation (the small-slope approximation) that retains the zeroth-order effect on the stress for a non-planar geometry while keeping the fault planar \citep{romanet2020}. We only apply this method to an in-plane pure shear fault (mode II), although it can be generalized to other mode of slip (mode I, opening faults). The out-of-plane pure shear case (mode III) corresponds to the case where there is no curvature along the slip direction, such that there is no zeroth-order effect of the geometry on the stress.
\section{Boundary element equations for the small-slope approximation and its spectral representation}
\subsection{The regularized boundary element equation}
A fully dynamic regularized boundary element method for an in-plane pure shear (mode II) fault that is embedded in a two-dimensional (2D) linear elastic medium can be written as \citep{bonnet1999,sato2020,romanet2020}:
\begin{equation}
\begin{split}
&\sigma_{ab}^{\text{el}}(\mathbf{x},t) = \\
&\text{\underline{Gradient of slip:}}\\
&c_{abcd}\int_{0}^{t} \iint _{\Sigma}c_{ijpq}\frac{\partial}{\partial x_q} G_{cp} (\mathbf{x}-\mathbf{y},t-\tau) [n_d (\mathbf{y}) t_j (\mathbf{y}) - n_j(\mathbf{y}) t_d(\mathbf{y}) ] t_i (\mathbf{y}) \left[ \frac{\partial}{\partial y^t} \Delta u^t(\mathbf{y} ,\tau)\right] \mathrm{d}\Sigma \mathrm{d}\tau \\
&\text{\underline{Curvature $\times$ Slip:}}\\
+&c_{abcd}\int_{0}^{t} \iint _{\Sigma}c_{ijpq}\frac{\partial}{\partial x_q} G_{cp}(\mathbf{x}-\mathbf{y},t-\tau)[n_d(\mathbf{y}) t_j(\mathbf{y}) - n_j(\mathbf{y}) t_d(\mathbf{y}) ] n_i (\mathbf{y}) \left[ \kappa^t(\mathbf{y}) \Delta u^t(\mathbf{y},\tau) \right] \mathrm{d}\Sigma \mathrm{d}\tau \\
&\text{\underline{Inertia term:}}\\
-&\rho c_{abcd}\int_{0}^{t}\iint _{\Sigma} \frac{\partial^2}{\partial t^2}G_{ic}(\mathbf{x}-\mathbf{y},t-\tau) n_d (\mathbf{y}) \Delta u^t(\mathbf{y},\tau) t_i \mathrm{d}\Sigma \mathrm{d}\tau,
\label{main_eq}
\end{split}
\end{equation}
where $\sigma_{ab}^{\text{el}}(\mathbf{x},t)$ is the $ab$ component of the elastic stress due to a slip distribution at point $\mathbf{x}= \{x_1,x_2\}$ and time $t$, $c_{ijpq}$ is the $ijpq$ component of the Hooke tensor, $n_d$ and $t_j$ are the $d$ and $j$ components of the normal $\mathbf{n}$ and tangential vector $\mathbf{t}$ along the fault, respectively, $G_{cp}$ is the $cp$ component of the Green’s function for an infinite homogeneous medium, $\frac{\partial}{\partial y^t} \Delta u^t = \left(t_1\frac{\partial}{\partial x_1}+t_2\frac{\partial}{\partial x_2}\right)\Delta u^t$ is the derivative of the shear slip, $\kappa^t \Delta u^t$ is the product of the curvature $\kappa^t $ and shear slip $\Delta u^t$ along the fault, and $\rho$ is the density of the homogeneous medium. Please note that the sub-indices represent the components of a given vector in the global coordinate system (e.g., $x_q$ is the $q$ component of the $\mathbf{x}$ vector). Furthermore, the integrations are performed over a fault that is represented by $\Sigma$, where $\mathbf{y}=\{y_1,y_2\}$ is a vector that belongs to $\Sigma$.
The 2D dynamic Green's functions at position $\mathbf{x}$ and time $t$ from a source point at position $\mathbf{y}$ and time $\tau$ are given by \citet{tada1997}:
\begin{equation}
\begin{split}
G_{ij}(x,y,t,\tau)&=\frac{c_s^2}{2 \pi \mu r^2 \sqrt{(t-\tau)^2-(r/c_p)^2)}}\left(\gamma_i \gamma_j \left[ 2(t-\tau)^2-\frac{r^2}{c_p^2} \right] -\delta_{ij} \left[ (t-\tau)^2-\frac{r^2}{c_p^2} \right] \right) \mathcal{H}\left( t-\tau-\frac{r}{c_p} \right)\\
&-\frac{c_s^2}{2 \pi \mu r^2 \sqrt{2(t-\tau)^2-(r/c_s)^2)}}\left(\gamma_i \gamma_j \left[ 2(t-\tau)^2-\frac{r^2}{c_s^2} \right]- \delta_{ij} (t-\tau)^2 \right) \mathcal{H}\left( t-\tau-\frac{r}{c_s} \right),
\end{split}
\label{green1}
\end{equation}
where:
\begin{equation}
\begin{split}
r(\mathbf{x},\mathbf{y}) &= \sqrt{(x_1-y_1)^2+(x_2-y_2)^2}, \\
\gamma_1(\mathbf{x},\mathbf{y}) &= \frac{(x_1-y_1)}{r(\mathbf{x},\mathbf{y})}, \\
\gamma_2(\mathbf{x},\mathbf{y}) &= \frac{(x_2-y_2)}{r(\mathbf{x},\mathbf{y})},
\end{split}
\end{equation}
$c_p$ and $c_s$ are the compressional and shear wave speeds, respectively, $\mu$ is the shear modulus, and $\delta_{ij}$ and $\mathcal{H}$ are the Kronecker and Heaviside functions, respectively.
\subsection{The small-slope approximation}
\begin{figure}[H
\centering
\includegraphics[width=\textwidth]{./flat_fault.pdf}
\caption{The flat-fault approximation (modified from \cite{romanet2020}, fig. 3). It is possible to simplify the BIEM for the traction along a given fault if the slope between any pair of points along the fault is small. }
\label{flat_fault}
\end{figure}
The motivation for the small-slope approximation derived in \citet{romanet2020} comes from the approximations derived by \citet{saucier1992}, \citet{chester2000}, \citet{dunham2011b}, and \citet{fang2013} for linear perturbation analysis of the fault geometry. Here we consider that the fault slope is sufficiently small to neglect some terms in the BIEM. The stress on the fault and in the medium generally depends on both the slip gradient along the fault and the local curvature of the fault, which is multiplied by the slip along the fault (eq. \eqref{main_eq}).
When we applied the small-slope approximation in the static state, we demonstrated in \citet{romanet2020} that the zeroth-order effect of the normal and shear tractions along a given fault did not depend on both the curvature and gradient terms but only on one of these terms. The normal traction depends mainly on the fault curvature, which is multiplied by the slip along the fault, while the shear traction depends mainly on the slip gradient along the fault.
Previous results and the fact that the Coulomb friction links the shear traction $\tau$ to the normal traction $\sigma_n$ via the friction coefficient $f$ ($\tau=f\sigma_n$) made it possible to obtain a scaling relationship that linked the fault geometry and the shear slip distribution: $\frac{d \Delta u^t}{ \Delta u^t} \propto -f dm $. This scaling means that the relative variation in shear slip $\frac{d \Delta u^t}{\Delta u^t}$ is proportional to the product of the variation in slope along the fault $dm$ and the friction coefficient $f$ (please note that there was a sign mistake in \citet{romanet2020}, coming the expression of the kernels). One limitation of this scaling is that it does not apply near the edge of the fault since the slip gradients are usually very high in this region.
We reiterate that each receiver point $\mathbf{x}= \{x_1,x_2\}$ will be a point where the stress and/or displacement is calculated, and that each source point $\mathbf{y}=\{y_1,y_2\}$ will be a point that creates the interaction with point $\mathbf{x}$ (this is a source point).
We will hereafter make the assumption that the fault lies in the $x_2=0$ plane, as this can be easily generalized to any kind of planar fault. The flat-fault approximation is the zeroth-order approximation that results from the assumption that the slope between any two points along the fault remains small ($\frac{x_2-y_2}{x_1-y_1}<<1$). Some of the following simplifications arise:
\begin{equation}
\begin{split}
r(\mathbf{x},\mathbf{y}) &\simeq \sqrt{(x_1-y_1)^2} ,\\
\gamma_1(\mathbf{x},\mathbf{y}) &\simeq \mathrm{sgn}(x_1-y_1), \\
\gamma_2(\mathbf{x},\mathbf{y}) &\simeq 0 ,\\
\end{split}
\end{equation}
where $\mathrm{sgn}$ is the sign function.
Another simplification comes for the tangential and normal vectors along the fault due to the small-slope assumption:
\begin{equation}
\begin{split}
\mathbf{t} &= \{ \cos (\theta) , \sin (\theta) \} \simeq \{1, 0\},\\
\mathbf{n} &= \{ -\sin (\theta) , \cos(\theta) \} \simeq \{0, 1\},
\end{split}
\end{equation}
where $\theta$ is the angle between the horizontal axis $\mathbf{e}_1$ and the tangent to the fault.
We can obtain the elastic tangential traction $\tau^{\text{el}}$ and the elastic normal traction $\sigma_n^{\text{el}}$ based on the previous equations and by retaining only the zeroth-order effect as follows:
\begin{equation}
\begin{split}
\tau^{\text{el}} &=\mathbf{t}\cdot \overline{\overline{\sigma^{\text{el}}}}\cdot \mathbf{n} \simeq \sigma_{12}^{\text{el}}, \\
\sigma_n^{\text{el}} &=\mathbf{t}\cdot \overline{\overline{\sigma^{\text{el}}}}\cdot \mathbf{n} \simeq \sigma_{22}^{\text{el}}.
\end{split}
\end{equation}
\subsection{Spectral formulation for shear traction}
We employed the assistance of Mathematica to fully develop the boundary element method (eq. \eqref{main_eq}), together with the formulation of the Green's function (eq. \eqref{green1}), and then apply the small-slope assumption to obtain an expression for shear traction $\tau^{\text{el}}$:
\begin{equation}
\begin{split}
&\tau^{\text{el}}(\mathbf{x},t) = \\
-&\int_{0}^{t} \int _{\Sigma} \frac{\partial}{\partial t} \left[ \frac{2c_s^2\mu}{\pi c_p^3(t-\tau)} \frac{c_p^3(t-\tau)^3}{(x_1-y_1)^3}\sqrt{1-\frac{(x_1-y_1)^2}{c_p^2(t-\tau)^2}}\right] \mathcal{H}\left( t-\tau-\frac{ | x_1-y_1|}{c_p} \right) \\
& \qquad \qquad \left[ \frac{\partial}{\partial \xi} \Delta u^t \right] d\Sigma d\tau +\\
+&\int_{0}^{t} \int _{\Sigma} \frac{\partial}{\partial t} \left[ \frac{2\mu}{\pi c_s(t-\tau)}\frac{c_s^3(t-\tau)^3}{(x_1-y_1)^3}\sqrt{1-\frac{(x_1-y_1)^2}{c_s^2(x_1-y_1)^2}} \right] \mathcal{H}\left( t-\tau-\frac{ | x_1-y_1|}{c_s} \right) \\
& \qquad \qquad \left[ \frac{\partial}{\partial \xi} \Delta u^t \right] d\Sigma d\tau \\
+&\int_{0}^{t} \int _{\Sigma} \frac{\partial}{\partial t} \left[ \frac{\mu}{2\pi c_s(t-\tau)}\frac{c_s(t-\tau)}{(x_1-y_1)}\frac{1}{\sqrt{1-\frac{(x_1-y_1)^2}{c_s^2(t-\tau)^2}}} \right] \mathcal{H}\left( t-\tau-\frac{ | x_1-y_1|}{c_s} \right) \\
& \qquad \qquad \left[ \frac{\partial}{\partial \xi} \Delta u^t \right] d\Sigma d\tau \\
-&\int_{0}^{t} \int _{\Sigma} \frac{\mu}{2\pi c_s^2}\frac{\Delta u^t}{\left((t-\tau)^2-\frac{(x_1-y_1)^2}{c_s^2}\right)^{3/2}} \mathcal{H}\left( t-\tau-\frac{ | x_1-y_1|}{c_s} \right) d\Sigma d\tau.
\end{split}
\label{shear}
\end{equation}
The shear traction that is determined in eq. \eqref{shear} is exactly the shear traction that one would find for a flat fault. Note that the last term, which is the inertia term for S waves, is the same as eq. 6 of \citet{cochard1994}; therefore, this term contains the radiation damping term $-\frac{\mu V}{2c_s}$ \citep{rice1993}. The radiation damping term accounts for the instantaneous response of the shear traction to slip velocity. We observe that the first-order perturbation of the fault slope does not change the zeroth-order shear traction. This result, which was obtained via a fully dynamic BIEM, is similar to the static result \citep{romanet2020}, whereby the zeroth-order shear traction depends mainly on the slip gradient along the fault.
Here we employ the spectral formulation that has been developed by \citet{geubelle1995} for the flat-fault case:
\begin{equation}
\tau^{\text{el}}(k,t) = -\mu |k| \int_0^t c^T_{II}(k,\tau)\Delta u^t(k,t-\tau)d\tau,
\end{equation}
where :
\begin{equation}
c_{II}^T(k,x)=\frac{1}{2}\left( \frac{J_1(c_s k x)}{ x}+4c_s k^2 x^2[W(c_p k x)-W(c_s k x)]-4\frac{c_s^2}{c_p} kJ_0(c_p k x )+3c_s k J_0(c_s k x)\right),
\end{equation}
$J_0$ and $J_1$ are the zeroth- and first-order Bessel functions, respectively. The function W is simply the opposite of the Bessel integral
function of the first-order $J_{i_1}$ \citep{humbert1933}:
\begin{equation}
W(x)= -J_{i_1} (x),
\end{equation}
The function $W$ can be written with the help of usual functions as:
\begin{equation}
W(x) =1- xJ_0(x)+J_1(x)-\psi(x),
\end{equation}
where $\psi$ is defined by the following expression:
\begin{equation}
\psi(x) = \frac{\pi}{2}x(J_1(x)H_0(x)-J_0(x)H_1(x)),
\label{psi}
\end{equation}
and $H_0$ and $H_1$ are the zeroth- and first-order Struve functions, respectively.
Integration by parts yields an equation that is more suitable for integration by changing the slip $\Delta u^t$ to the slip rate $\Delta \dot{u}^t$ and explicitly separating the static and dynamics terms (eq 5 in \citet{lapusta2009a}):
\begin{equation}
\tau^{\text{el}}(k,t) = -\underbrace{\mu |k| \left(1-\frac{c_s^2}{c_p^2} \right) \Delta u^t(k,t)}_{\text{Static term}} - \underbrace{\mu |k| \int_0^t C^T_{II}(k,\tau) \Delta \dot{u}^t(k,t-\tau)d\tau}_{\text{Dynamic term}},
\end{equation}
where:
\begin{equation}
\begin{split}
C^T_{II}(t)&= \int c_{II}^T(k,t)dt\\
&= \left(c_s^2 k^2t^2+\frac{c_s^2}{c_p^2}\right)W(c_p k t)-\left(c_s^2 k^2t^2+1\right)W(c_s k t) \\
&-\frac{c_s^2}{c_p^2}J_1(c_p k t)+\frac{1}{2}J_1(c_s k t)\\
&-\frac{c_s^2}{c_p}ktJ_0(c_p k t)+c_s k tJ_0(c_s k t).
\end{split}
\label{Ct}
\end{equation}
$C^T_{II}(t)$ seems to have been integrated numerically in \citet{lapusta2009a}. We are providing an analytical expression for $C^T_{II}(t)$ here (eq. \eqref{Ct}; further details on the calculation are available in Appendix \ref{calculationT}; see also \citet{noda2021}).
We note that the static and dynamic terms cancel each other at $t=0$ when $W(0)=1$, $J_1(0)=0$, and $J_0(0)=1$.
\subsection{Spectral formulation for normal traction}
We have also fully developed the regularized boundary integral equation (eq. \eqref{main_eq}) for normal traction $\sigma_n^{\text{el}}$ using Mathematica, and then applied the small-slope approximation:
\begin{equation}
\begin{split}
&\sigma_n^{\text{el}}(\mathbf{x},t) = \\
&\int_{0}^{t} \int _{\Sigma} \frac{\partial}{\partial t} \left[ \frac{4c_s^2 \mu(t-\tau)}{2\pi(x_1-y_1)^3}\sqrt{(t-\tau)^2-\frac{(x_1-y_1)^2}{c_p^2}}\right] \mathcal{H}\left( t-\tau-\frac{ | x_1-y_1|}{c_p} \right)\left[ \kappa^t (\mathbf{y}) \Delta u^t(\mathbf{y},\tau) \right] d\Sigma d\tau \\
+&\int_{0}^{t} \int _{\Sigma} \frac{\partial}{\partial t} \left[ \frac{c_s^2\lambda^2(t-\tau)}{2\pi c_p^2(x_1-y_1)\sqrt{(t-\tau)^2-\frac{(x_1-y_1)^2}{c_p^2}}} \right] \mathcal{H}\left( t-\tau-\frac{ | x_1-y_1|}{c_p} \right)\left[ \kappa^t (\mathbf{y}) \Delta u^t(\mathbf{y},\tau) \right] d\Sigma d\tau \\
-&\int_{0}^{t} \int _{\Sigma} \frac{\partial}{\partial t} \left[ \frac{4c_s^2 \mu(t-\tau)}{2\pi(x_1-y_1)^3}\sqrt{(t-\tau)^2-\frac{(x_1-y_1)^2}{c_s^2}} \right] \mathcal{H}\left( t-\tau-\frac{ | x_1-y_1|}{c_s} \right) \left[ \kappa^t (\mathbf{y}) \Delta u^t(\mathbf{y},\tau) \right] d\Sigma d\tau \\
+&\int_{0}^{t} \int _{\Sigma} \frac{\partial}{\partial t} \left[ \frac{c_s^2(\lambda+2\mu)(t-\tau)}{2\pi c_s^2(x_1-y_1)\sqrt{(t-\tau)^2-\frac{(x_1-y_1)^2}{c_s^2}}} \right] \mathcal{H}\left( t-\tau-\frac{ | x_1-y_1|}{c_s} \right) \left[ \kappa^t (\mathbf{y}) \Delta u^t(\mathbf{y},\tau) \right] d\Sigma d\tau,
\end{split}
\end{equation}
where $\lambda$ is the second Lam\'{e} parameter. It is possible to write the normal traction in the wavenumber domain in a similar way to the shear traction (see Appendix \ref{calculationN} for the full calculation):
\begin{equation}
\begin{split}
\sigma_n^{\text{el}}(k,t) = i \underbrace{\mu \left(1-\frac{c_s^2}{c_p^2} \right) \mathcal{F}[\kappa^t(x_1)\Delta u^t(x_1,t)]}_{\text{Static term}} + i \underbrace{ \mu\int_0^t C^N_{II}(k,\tau)\mathcal{F}[\kappa^t(x_1)\Delta \dot{u}^t(x_1,t-\tau)] d\tau}_{\text{Dynamic term}},
\end{split}
\end{equation}
where $i$ is the complex number and $\mathcal{F}$ is the Fourier transform.
The kernel has the expression:
\begin{equation}
\begin{split}
C^N_{II}(k,t) &=\left( \left(\frac{c_p^2}{c_s^2}-2\right)^2\frac{c_s^2}{2c_p^2}-\frac{c_s^2}{c_p^2}- c_s^2 k^2 t^2 \right) W(c_p k t ) + \left(1+c_s^2 k^2 t^2 -\frac{c_p^2}{2c_s^2} \right) W(c_s k t ) \\
&+ \left(\frac{c_s^2}{c_p^2}-\left(\frac{c_p^2}{c_s^2}-2\right)^2\frac{c_s^2}{2c_p^2}\right) J_1(c_p k t ) +\left(\frac{c_p^2}{2c_s^2}-1\right)J_1(c_s k t ) \\
&+ \frac{c_s^2}{c_p} k t J_0(c_p k t )- c_s k t J_0(c_s k t ).
\end{split}
\end{equation}
We note that this kernel is a pure imaginary term, the is because the kernel for normal traction is an odd function of position (as opposed to the kernel for shear traction that is an even function of position, hence, in wavenumber domain, the kernel for shear traction is a pure real). The static and dynamic terms perfectly cancel each other at $t=0$, as observed for shear traction.
\section{Model and algorithm}
We use a classic rate and state friction law \citep{dieterich1979a,ruina1983} with an aging law that is coupled with our previously derived sBIEM to perform a fully dynamic earthquake cycle simulation. The algorithm is based mainly on the methodology of \citet{lapusta2000} and \citet{lapusta2009a}. The wavenumber-dependent truncation of the integral is the one described in \citet{lapusta2009a} because we are inducing in-plane pure shear (mode II). The main difference is the adaptive time-stepping algorithm that we employ during the calculation, which is inspired by a Runge-Kutta method.
\subsection{Normal and shear traction calculations}
\begin{figure}[H
\centering
\includegraphics[width=\textwidth]{./kernel.pdf}
\caption{Kernel representation for the shear and normal tractions. Please note that the kernel perfectly cancels the effect of the static term at $\rho=0$. }
\label{kernels}
\end{figure}
The normal and shear traction calculations are done in a similar manner to those in \citet{lapusta2009a}:
\begin{equation}
\begin{split}
\tau^{\text{el}}(k,t) &= -\mu \left(1-\frac{c_s^2}{c_p^2} \right) |k| \Delta u^t(k,t) - \mu |k| \int_0^{T_w} C^T_{II}(k,\tau) \Delta \dot{u}^t(k,t-\tau)d\tau, \\
\sigma_n^{\text{el}}(k,t) &= i \mu \left(1-\frac{c_s^2}{c_p^2} \right) \mathcal{F}[\kappa^t(x_1)\Delta u^t(x_1,t)] + i \mu \int_0^{T_w} C^N_{II}(k,\tau)\mathcal{F}[\kappa^t(x_1)\Delta \dot{u}^t(x_1,t-\tau)] d\tau,
\end{split}
\end{equation}
where $T_w$ represents the time window over which the wavenumber-dependent integration is performed. Both the $C^T_{II}$ and $C^N_{II}$ kernels converge to zero as the argument goes to infinity (fig. \ref{kernels}). This kernel argument for $C^{T}_{II}$ and $C^{N}_{II}$ involves the multiplication of the wavenumber by the time ($k\tau$), such that the argument is large for high wavenumbers, even when a small time $\tau$ is considered. This is why we chose a cut-off wavenumber that was similar to \citet{lapusta2009a}:
\begin{equation}
T_w(k)= \left\{
\begin{array}{ll}
\frac{\eta \Omega }{c_s} & k\le k_c \\
\frac{\eta \Omega}{ c_s }\frac{k_c}{k} & k\ge k_c
\end{array}
\right.
\end{equation}
where $\eta$ is the truncation parameter (set to one in this study), $\Omega$ is the total domain size used in the sBIEM.
Note that the wavenumber-dependent truncation used in \citet{lapusta2000} is not efficient due to the slower convergence of the mode II kernel for the normal and shear tractions compared to the mode III kernel for shear traction \citep{lapusta2009a}. The amplitude for normal traction is around twice the amplitude for shear traction (see fig. \ref{kernels}), such that this approximation may require a higher $k_c$ value than that in the flat-fault case. One way to overcome this could be to introduce two different cutting planes, one for normal traction and one for shear traction. However, we did not think it was essential to incorporate this additional implementation in the code at this stage and we chose a single $k_c=\frac{200}{\eta \Omega}$.
\subsection{Time-adaptive solver}
\begin{figure}[H
\centering
\includegraphics[width=\textwidth]{./flow1.pdf}
\caption{Flow diagram of the adaptive time-step method that was used in this study, which was inspired by the fourth-order Runge-Kutta method (\cite{press1992}).}
\label{time_step}
\end{figure}
The time-adaptive algorithm is different from the \citet{lapusta2000} approach and is inspired by the classic Runge-Kutta fourth-order method \citep{press1992}. Assuming that we want to employ a $dt$-second time step, we first do the classic flow for a full time step $dt$, and compute two smaller, consecutive half time steps $dt/2$ in parallel (fig. \ref{time_step}). The result using the two half time steps is generally more accurate than that for the full time step. We note that the second-order solutions for a full time step and two consecutive half time steps are $u_1^*$ and $u_2^*$, respectively. The exact solution at the next time step for the full time step $u_1(t+dt)$ and the two consecutive half time steps $u_2(t+dt)$ can be written as:
\begin{equation}
\begin{split}
u_1(t+dt) &= \underbrace{u_1^*}_{\text{Second order solution}} +\underbrace{ \phi dt^3}_{\text{lowest order of error}}+ \underbrace{o(dt^4)}_{\text{Higher orders}} \\
and \\
u_2(t+dt) &= \underbrace{u_2^*}_{\text{Second order solution}} + \underbrace{ 2 \phi \left(\frac{dt}{2}\right)^3}_{\text{lowest order of error}}+ \underbrace{o(dt^4)}_{\text{Higher orders}},
\end{split}
\end{equation}
where $\phi$ is a constant over the time step \citep{press1992}. If we compare the two values in eq. 19, it is possible to better understand the error:
\begin{equation}
\begin{split}
\epsilon = u_1(t+dt) -u_2(t+dt)&= \frac{3}{4} \phi dt^3+ o(dt^4),
\end{split}
\end{equation}
which is a measure of the error at each time step. If we now want a given error $\epsilon_0$ at each time step, then we have to adapt the time step $dt_0$ to:
\begin{equation}
\begin{split}
dt_0 = \left(\frac{\epsilon_0}{\epsilon} \right)^{\frac{1}{3}}dt.
\end{split}
\end{equation}
A given time step is considered successful if the error is smaller than the desired value. However, we adapt the error according to the previous equation, and consider a safety factor of $0.9$:
\begin{equation}
\begin{split}
dt_0 = 0.9 \left(\frac{\epsilon_0}{\epsilon} \right)^{\frac{1}{3}}dt.
\end{split}
\end{equation}
In the event that something went wrong during a given time step (e.g., the state became negative, Newton--Raphson did not converge, the normal traction became negative), then the next time step is simply divided by 2:
\begin{equation}
\begin{split}
dt_0 = dt/2.
\end{split}
\end{equation}
We also decided that each time step should not be smaller than a given value:
\begin{equation}
dt_0 =\beta_{\text{min}} \Delta s/c_s,
\end{equation}
where $\beta_{\text{min}}$ is a coefficient that is smaller than one (same parameter as in \citet{lapusta2000}). $\beta_{\text{min}}$ is set to $0.25$ in this study. In the case the time step is already at the minimum value $dt =\beta_{\text{min}} \Delta s/c_s$, and the error made in the time step is greater than the set minimum error $\epsilon>\epsilon_0$, we decide to no not take into account the error and continue to the next time step. If another problem occurs (e.g., non-convergence of the Newton--Raphson algorithm) while the time step is already at the minimum, then the calculation stops.
\subsection{Time step}
The variables (slip: $\Delta u^t$, slip rate: $V$, state: $\theta$, and state rate: $\dot{\theta}$) are updated after the completion of a time step, following the methodology of \citet{lapusta2000}. The only modifications are the estimation of the traction change, which incorporates the normal traction variation, and the associated change in the momentum balance (eq. \eqref{momentum}). This scheme supposedly possesses second-order accuracy in time ($dt$) \citep{lapusta2000}. We note that the first-order estimates possess a 1 subscript ($\Delta u^t_1$, $V_1$, $\theta_1$ and $\dot{\theta}_1$) and the second-order estimates possess a 2 subscript ($\Delta u^t_2$, $V_2$, $\theta_2$ and $\dot{\theta}_2$). The 0 subscript represents the values of $\Delta u^t$, $V$, $\theta$, and $\dot{\theta}$ that are previously known at the beginning of the time step.
\paragraph{(1) Slip and state estimation}
A first estimation of the slip and state at time $t+dt$ is obtained by using the velocity $V_0$ and state rate $\dot{\theta}_0$ at time $t$:
\begin{equation}
\begin{split}
\Delta u^t_1&= \Delta u^t_0 + V_0 dt \\
\theta_1&= \theta_0 + \dot{\theta}_0dt.
\end{split}
\end{equation}
\paragraph{(2) Traction estimation}
The traction is estimated by assuming that the velocity is constant over the time step. Our previous approximations of $\Delta u_1$, and $\theta_1$ allow us to calculate:
\begin{equation}
\begin{split}
\tau^{\text{el}}(k,t) &= -\mu \left(1-\frac{c_s^2}{c_p^2} \right) |k| \Delta u^t_1 \\
&-\mu |k| \int_{dt}^{T_w} C^T_{II}(k,\tau) \Delta \dot{u}^t(k,t-\tau)d\tau \\
&- \Delta \dot{u}^t_1(k,t)\mu |k| \int_{0}^{dt} C^T_{II}(k,\tau)d\tau, \\
\sigma_n^{\text{el}}(k,t) &= i \mu \left(1-\frac{c_s^2}{c_p^2} \right) \mathcal{F}\left[ \kappa^t \Delta \dot{u}^t_1 \right] \\
&+i \mu \int_{dt}^{T_w} C^N_{II}(k,\tau) \mathcal{F}\left[ \kappa^t \Delta \dot{u}^t \right] d\tau \\
&+ \mathcal{F}\left[ \kappa^t \Delta \dot{u}^t_1 \right] i \mu \int_{0}^{dt} C^N_{II}(k,\tau)d\tau.
\end{split}
\end{equation}
The integrals are calculated using a midpoint method.
\paragraph{(3) Slip velocity and state rate estimation}
We solve for the equilibrium using the Newton--Raphson method, and the previous normal and shear traction estimates as follows:
\begin{equation}
\tau^{\text{load}}+\tau^{el} =( \sigma_n^{\text{load}}+\sigma_n^{\text{el}})\left(f_0+a \log \left(\frac{V_1}{V_0}\right)+b\log \left(\frac{\theta V_0}{D_c}\right)\right) ,
\label{momentum}
\end{equation}
where the velocity $V_1$ is the unknown variable, and $\sigma_n^{\text{load}}$ and $\tau^{load}$ are the normal and shear traction loads, respectively.
It is possible to simply update the state rate $\dot{\theta}$ once the velocity is updated using the state evolution law (aging law here) after solving for $V_1$ via eq. 27:
\begin{equation}
\dot{\theta}_1 =1-\frac{\theta_1 V_1}{D_c}.
\end{equation}
\paragraph{Reiteration of steps (1)--(3)}
We repeat steps (1)--(3) using the following values for the initial slip rate $V_0$ and state rate $\dot{\theta}_0$:
\begin{equation}
\begin{split}
V_0 &= \frac{V_0+V_1}{2} \\
\dot{\theta}_0 &= \frac{\dot{\theta}_0+\dot{\theta}_1}{2}.
\end{split}
\end{equation}
We then obtain accurate second-order values for the slip $\Delta u^t_2$, slip velocity $V_2$, state $\theta_2$, and state rate $\dot{\theta}_2$.
\paragraph{Update the final values}
We finally update the new values at $t+dt$, whereby all of the variables are their second-order estimates: $\Delta u^t(t+dt) = \Delta u^t_2$, $V(t+dt) = V_2$, $\theta(t+dt) = \theta_2$, and $\dot{\theta}(t+dt) = \dot{\theta}_2$. We also save the history of $V$ in the spectral domain for $t \in [t,t+dt]$ as $V(t) =\frac{V+V_1}{2}$, following \citet{lapusta2000}.
\section{Comparison with fully dynamic and quasi-dynamic space--time boundary element method}
We decided to test the algorithm against a fully dynamic (fdBIEM) and quasi-dynamic (qdBIEM) BIEMs in the space--time domain. The fdBIEM does not employ any approximations and is used as the reference here. The qdBIEM makes no approximation on the fault geometry but does not account for the wave-propagation in the medium. All of the parameters used in this study are listed in Table \ref{parameters_bend}. The periodic length of the fault in the sBIEM is four times the length of the fault in the qdBIEM and fdBIEM because the sBIEM requires an infinite, periodic fault. A total length of $1.5 \times L$ is constrained with a null slip rate on each side of the fault.
\begin{table*}\centering
\begin{tabular}{@{}lcc@{}}\toprule
Name & symbol & Value \\ \midrule
Reference friction coefficient &$f_0$ & $0.6$ \\
Reference velocity&$V_0$ & $10^{-9}$ m/s \\
Critical slip distance &$D_c$ & $1$ cm \\
Rate and state parameter&$a$ & $0.012$ \\
Rate and state parameter&$b$ & $0.015$ \\ \midrule
Initial normal stress & $\sigma_n$ & $100$ MPa \\
Shear modulus & $\mu $ & $40$ GPa \\
Shear velocity &$c_s$& $3464$ m/s \\
Dilatational velocity &$c_p$ & $6000$ m/s \\ \midrule
Fault length & $L$ & $10.240$ km \\
Resultant nucleation lengthscale$^1$ & $L_{\infty}$ & $5.659$ km \\
Resultant nucleation lengthscale$^2$ & $L_{b}$ & $355$ m \\
Discretization length& $ds$ & $10$ m \\ \midrule
\end{tabular}
\label{parameters_bend}
\caption{Parameters used in the simulation. $^1$ Two times the nucleation lengthscale obtained via \cite{rubin2005}. $^2$ The nucleation lengthscale obtained via \cite{dieterich1992}.}
\end{table*}
\subsection{The seamount case}
We chose a Gaussian geometry to test the effect of a seamount:
\begin{equation}
y_2 = A \exp(-(y_1-7)^2) ,
\end{equation}
where $y_1$ and $y_2$ are given in $km$.
We ran simulations for three different amplitude values $A \in \{0.03, 0.1, 0.3 \}$.
\subsubsection{Results}
Fig. \ref{tmp9} shows the evolution of the shear and normal tractions over time during the rupture for the qdBIEM, fdBIEM, and sBIEM models, under the assumption that the small-slope approximation is respected (case $A = 0.03$; maximum fault slope of $2.6\%$). The qdBIEM simulation is quite different from the fdBIEM and sBIEM simulations. This qdBIEM result is expected because there is no wave propagation and dynamic effects other than the radiation damping term in the model \citep{thomas2014c}. The rupture speed for the qdBIEM is significantly slower, and there is no S-wave at the rupture front. Furthermore, there are no reflected waves after the quasi-dynamic rupture ends. There is no visible difference between the fdBIEM and sBIEM models because the small-slope approximation is a valid assumption in this case. The results are still surprisingly good when we reach the point where the small-slope approximation is no longer a valid assumption (case $A=0.1$: maximum slope = $8.6\%$ (fig. \ref{tmp10}) and case $A=0.3$: maximum slope = $26\%$ (fig. \ref{tmp11})), although it is possible to observe some deviations. It can be seen that the sBIEM is over-estimating the maximum and minimum of the shear and normal tractions. Another noticeable difference is at the rupture tip when the rupture enters the seamount. This difference is probably due to the fact that the small-slope assumption neglects the slip gradient term ($1^{\text{st}}$ order term) in the normal traction calculation. In this simulation, since there is no prior slip on the fault, the situation where the slip gradient is much bigger than the fault curvature that multiplies the slip ($\frac{\partial}{\partial y^t} \Delta u^t \gg \kappa^t \Delta u^t $) arises. Hence, at the tip of the rupture where the slip gradients are high but the slip is small, the gradient term ($1\text{st}$ order term) in the calculation of normal traction is temporary bigger than the curvature that multiplies the slip term ($0^\text{th}$ order term). However, we expect this effect to be mitigated in multi-cycle simulations because the $\kappa^t \Delta u^t$ term will be larger (i.e., there will be prior slip before the rupture).
The final difference is that the sBIEM yields a higher rupture speed. This enhanced rupture speed is clearly visible after the rupture passed the seamount. This difference may be explained by the fact that one of the higher-order terms is the roughness drag \citep{fang2013}, whereby there is an additional shear resistance that opposes movement on the two sides of the fault as soon as the fault becomes non-planar. This additional shear resistance consumes energy that would be otherwise available for the rupture to accelerate. However, this term is a higher-order term that we have neglected here (there is no additional shear resistance due to this seamount in the sBIEM). The final slip distributions for different seamount geometries are shown in fig. \ref{seamount_slip}. The slip distributions from the sBIEM and fdBIEM exhibit a high degree of agreement with each other until the slope reaches $8.6\%$ (fig. \ref{seamount_slip}-a and –b). The qdBIEM exhibits a smaller amount of slip on the fault. The sBIEM and fdBIEM no longer possess a high degree of agreement with each other for higher fault slopes (fig. \ref{seamount_slip}-c). The slip distribution from the sBIEM is significantly higher than that from the fdBIEM, although the general shapes of the slip distributions are similar. This is due to the fact that the sBIEM neglects the first-order term, which is the roughness drag \citep{fang2013}. We note that this is a useful way to show the effect of the roughness drag on a given slip distribution (fig. \ref{seamount_slip}-c).
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{./tmp9_v2.pdf}
\caption{Comparison of the normal and shear traction evolution for a seamount fault geometry obtained via a quasi-dynamic simulation using space--time BIEM (qdBIEM), a fully dynamic simulation using space--time BIEM (fdBIEM), and the method newly developed here; i.e., a fully dynamic simulation using spectral time BIEM (sBIEM). The amplitude of the seamount here is $A=30$ m.}
\label{tmp9}
\end{figure}
\begin{figure}[H
\centering
\includegraphics[width=\textwidth]{./tmp11_v2.pdf}
\caption{Comparison of the normal and shear traction evolution for a seamount fault geometry obtained via a quasi-dynamic simulation using space--time BIEM (qdBIEM), a fully dynamic simulation using space--time BIEM (fdBIEM), and the method newly developed here; i.e., a fully dynamic simulation using spectral time BIEM (sBIEM). The amplitude of the seamount here is $A=300$ m.}
\label{tmp11}
\end{figure}
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{./slip_seamount.pdf}
\caption{a) Final slip distribution for a seamount fault geometry with amplitude $A = 30$ m. b) Final slip distribution for a seamount fault geometry with amplitude $A = 100$ m. c) Final slip distribution for a seamount fault geometry with amplitude $A = 300$ m.}
\label{seamount_slip}
\end{figure}
\subsection{Rough fault}
We also test the rough-fault case. We generate a self-similar geometry using the Fourier transform method \citep{dunham2011b}. The fault profile has a spectral density of:
\begin{equation}
P(k)=(2\pi^3)\alpha^2 k^3,
\end{equation}
where $k$ is the wavenumber. We tried different amplitude-to-wavelength ratio $\alpha \in \{10^{-4},3 \times10^{-4},10^{-3}, 3\times10^{-3}\}$, and we set the minimum wavelength of the roughness to $20\Delta s =200 m$. The maximum slopes of the simulations are $\{ 0.0048, 0.014, 0.048, 0.14\}$, respectively.
\subsubsection{Results}
It is possible to see the normal and shear traction evolution along the fault for one mildly rough fault ($\alpha = 3\times10^{-4}$, maximum slope: $1.4\%$) where the small-slope approximation is valid, as shown in fig. \ref{tmp15}. The observations are very similar to the previous observations for the seamount. The sBIEM and fdBIEM results are in perfect agreement with each other, whereas the qdBIEM results exhibit a much lower rupture speed with no S waves ahead of the rupture. The case where the assumption of a small-slope approximation becomes invalid ($\alpha = 3\times10^{-3}$, maximum slope: $14\%$) is shown in fig. \ref{tmp17}. The sBIEM result is similar to the seamount geometry, whereby the sBIEM slightly over-estimates the rupture speed and the normal and shear tractions at the local extremas. The sBIEM and fdBIEM results are in agreement with each other as long as the small-slope approximation is valid (fig. \ref{rough_slip}-a and -b). However, the sBIEM begins to overestimate the slip compared to the true solution given by the fdBIEM as the small-slope approximation becomes invalid (fig. \ref{rough_slip}-c).
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{./tmp15_v2.pdf}
\caption{Comparison of the normal and shear traction evolution of a rough-fault geometry obtained via a quasi-dynamic simulation using space--time BIEM (qdBIEM), a fully dynamic simulation using space--time BIEM (fdBIEM), and the method newly developed here; i.e., a fully dynamic simulation using spectral time BIEM (sBIEM). The amplitude-to-wavelength ratio is $\alpha=3 \times 10^{-4}$.}
\label{tmp15}
\end{figure}
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{./tmp17_v2.pdf}
\caption{Comparison of the normal and shear traction evolution for a rough-fault geometry via a quasi-dynamic simulation using space--time BIEM (qdBIEM), a fully dynamic simulation using space--time BIEM (fdBIEM), and the method newly developed here; i.e., a fully dynamic simulation using spectral time BIEM (sBIEM). The amplitude-to-wavelength ratio is $\alpha=3 \times 10^{-3}$.}
\label{tmp17}
\end{figure}
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{./slip_rough.pdf}
\caption{a) Final slip distribution for a rough fault with an amplitude-to-wavelength ratio of $\alpha = 3 \times 10^{-4}$. b) Final slip distribution for a rough fault with an amplitude-to-wavelength ratio of $\alpha =10^{-3}$. c) Final slip distribution for a rough fault with an amplitude-to-wavelength ratio of $\alpha = 3 \times 10^{-3}$.}
\label{rough_slip}
\end{figure}
\section{Scaling of slip distribution versus fault geometry}
There is a simple scaling that links the scaled slip gradient with the curvature in this type of 2D in-plane simulation. This scaling was derived analytically by \citet{romanet2020}:
\begin{equation}
\frac{1}{f\Delta u^t}\frac{d}{dy^t}\Delta u^t = -\kappa^t.
\end{equation}
This scaling means that the slip gradient reaches a maximum (minimum) in the areas where the local curvature of the fault geometry is at a minimum (maximum). It also means that the local extrema of the slip correspond to the areas where the fault is locally flat ($\kappa^t=0$).
We computed fully dynamic simulations using fdBIEM (fig. \ref{scaling}) and sBIEM (fig. \ref{scaling_sBIEM}) for different rough faults and different friction coefficients to test this scaling.
The scaling results for several simulations with a friction coefficient of $f=0.6$ and amplitude-to-wavelength ratio $\alpha \in \{10^{-4},3 \times10^{-4},10^{-3}, 3\times10^{-3}\}$ and for one simulation with $f=0.3$ and $\alpha = 3\times10^{-3}$ are shown in figs \ref{scaling} and \ref{scaling_sBIEM}, respectively.
The scaling relationship (figs \ref{scaling}-a and \ref{scaling_sBIEM}-a) seems to be quite robust, although there is a small bias toward a negative gradient. This is due mainly to the fact that we triggered the earthquake artificially on the left part of the fault by adding an initial perturbation on the shear traction (it can be seen at time $t=0$ of the simulation on figs. \ref{tmp9}, \ref{tmp11}, \ref{tmp15}, and \ref{tmp17}). This bias can be understood by looking at the slip distribution in figs \ref{scaling}-b--d and \ref{scaling_sBIEM}-b--d, where the slip in the middle of the fault has an overall decreasing derivative. If we focus on the scaling for the fdBIEM (fig. \ref{scaling}-a), it can be seen that the deviation from the theoretical scaling is slightly higher than that for the sBIEM (fig. \ref{scaling_sBIEM}-a). This is due to the fact that the theoretical scaling was also obtained by applying the small-slope approximation \citep{romanet2020}, as in the sBIEM. The fdBIEM simulation has higher-order terms that make its modeled slip distribution deviate from the theoretical scaling.
One interesting outcome of this scaling is that it is possible (at least theoretically) to invert for the geometry if we know the friction coefficient and slip distribution.
\citet{bruhat2020} attempted to compare the observed slip distribution at the surface with a modeled slip distribution. Here we solve one part of the problem surrounding the scaling of the slip distribution and fault geometry for numerical studies. One important point is that the scaling is not valid close to the edge of the fault, as the slip gradients are high in this region. The edges of the fault should therefore be removed when conducting future analyses to obtain a scaling between the fault geometry and slip distribution.
\begin{figure
\centering
\includegraphics[width=1\textwidth]{./scaling_v2.pdf}
\caption{a) Scaling of the slip distribution versus the curvature obtained using the classic space--time fully dynamic BIEM (fdBIEM). b) Slip distribution for a simulation with $\alpha = 3 \times 10^{-3}$ and $f=0.6$. c) Slip distribution for a simulation with $\alpha = 3 \times 10^{-3}$ and $f=0.6$. d) Slip distribution for a simulation with $\alpha = 3 \times 10^{-3}$ and $f=0.3$.}
\label{scaling}
\end{figure}
\begin{figure
\centering
\includegraphics[width=1\textwidth]{./scaling_sBIEM.pdf}
\caption{a) Scaling of the slip distribution versus the curvature obtained using the newly developed spectral BIEM (sBIEM). b) Slip distribution for a simulation with $\alpha = 3 \times 10^{-3}$ and $f=0.6$. c) Slip distribution for a simulation with $\alpha = 3 \times 10^{-3}$ and $f=0.6$. d) Slip distribution for a simulation with $\alpha = 3 \times 10^{-3}$ and $f=0.3$.}
\label{scaling_sBIEM}
\end{figure}
\section{Seismic cycles}
We run one simulation of an earthquake cycle on a sinusoidal fault (fig. \ref{geometry_cycle}-a) using rate and state friction, and the sBIEM as a proof of concept. The model parameters are the same as those in Table \ref{parameters_bend}, except that the fault is loaded with a constant shear traction loading of $\tau^{\text{load}}= 0.01$ Pa/s along the fault. The loading is therefore completely uniform along the fault, even though the geometry is non-planar; we use this loading to avoid the effect of complex loading on the fault. The final slip distribution of the simulation is shown in fig. \ref{geometry_cycle}-b, where the scaling that links the fault geometry and slip distribution is respected. A particular example is in the center of the fault, where the maximum and minimum slip amounts correspond to a locally flat fault ($\kappa^t = 0$). The slip gradient is at a maximum when the fault has a high curvature ($\kappa^t\gg 1$). The slip rate evolution is shown in fig. \ref{sliprate_cycle}-a. The slip rate has a very complex evolution that produces both slow slip event (event 1 in fig. \ref{sliprate_cycle}-b) and foreshock (event 2 in fig. \ref{sliprate_cycle}-b). The cycle is largely periodic, such that the entire fault is ruptured periodically by a single earthquake (fig. \ref{sliprate_cycle}-c). However, the events that occur prior to the mainshock show both spatial (their location on the fault changes between different main events) and temporal complexity, with an acceleration in the number of events before the mainshock (fig. \ref{sliprate_cycle}-c). This complex behavior of a foreshock sequence along a rough fault has already been noted by \citet{cattania2021}. One interesting point here is that the main event, which is preceded by foreshocks, becomes increasingly complex over time (\ref{sliprate_cycle}-a). This is because shear slip $\Delta u^t$ accumulates on the fault while the geometry is held constant, such that the curvature term $\kappa^t \Delta u^t$ continues to increase. This means that the normal traction variations along the fault continue to increase until the fault opens. Many methods have been employed to avoid this effect, such as loading with backslip \citep{heimisson2020}, placing a threshold on the normal traction \citep{cattania2021}, and including a visco-plastic effect \citep{dunham2011b}. Another possibility here would be to make the fault flatter by decreasing the curvature $\kappa^t$. This effect of a smoother fault with ongoing slip has already been observed on natural faults \citep{sagy2007,brodsky2011}.
\begin{figure}[H]
\centering
\includegraphics[width=0.5\textwidth]{./slip_cycle.pdf}
\caption{Fully dynamic cycle simulation on a sinusoidal fault. a) Geometry of the fault. b) Final slip distribution at the end of the simulation.}
\label{geometry_cycle}
\end{figure}
\begin{figure}[H]
\centering
\includegraphics[width=1\textwidth]{./cycle1.pdf}
\caption{Fully dynamic cycle simulation on a sinusoidal fault. a) Space--time evolution of the slip velocity on the fault. b) Closeup of the space--time evolution of the slip velocity for the $V^{\text{th}}$ event. c) Successive closeups of the $3^{\text{rd}}$ event, with the maximum velocity on the fault over time.}
\label{sliprate_cycle}
\end{figure}
\section{Discussion and conclusion}
We have shown that the small-slope approximation works quite well quantitatively if the fault slope is actually small. We are also able to qualitatively capture the stress variations along the fault due to its non-planarity for the case when the fault slope is not small. We emphasize that the fully dynamic results for the small-slope approximation are much closer to the full solution (space--time fdBIEM) than the qdBIEM results without the small-slope approximation. This implies that the zeroth-order effects of wave-mediated stress transfer are more important than the higher-order effect of fault non-planarity.
\subsection{Limits and future applications of this model}
There are several limitations of this method. One of the most constraining limitations is that this method is restricted to a homogeneous medium. This limitation will remain indefinitely, as we currently do not see a viable way to overcome this restriction. Another restriction is that this method is currently limited to a single fault. However, this does not appear to be a strong restriction because this can potentially be overcome via two different approaches. One is to employ the approach in \citet{barbot2021} and develop the spectral method for multiple parallel faults. The key drawbacks to this approach are that it is still limited to parallel faults and the development of a fully dynamic system may be complex. Another promising approach is to use the spectral method to model only the self-interaction of the faults on themselves, and account for the interaction between faults using the classic space--time BIEM. The key advantage of this approach is that other methods, such as H-matrices \citep{ohtani2011,bradley2014,sato2019}, can be used to accelerate the interaction between faults. This will make the H-matrix extremely efficient because we will get rid of the diagonal of the H-matrix (normally accounting for the self interaction) where compression (the rank reduction) is not possible.
Domain-based methods have also been recently employed for modeling the earthquake cycle with slow tectonic loading on a non-planar fault. Most of the methods employ a coupled static--dynamic method approach. Some methods implement only uni-directional coupling, with the quasi-dynamic model output used as the initial state for the dynamic model \citep{galvez2019}. \citet{kaneko2011} coupled two spectral element methods, and \citep{liu2020} coupled two finite element methods. One recent study \citep{luo2020} adopted an adaptive dynamic relaxation technique to a finite element method, therefore allowing a fully dynamic simulation to be run in one unique finite element method framework.
These methods are more versatile than sBIEM because they allow for non-homogeneous media, free surfaces, complex fault geometries (without any assumptions), and multiple faults. However, these methods introduce absorbing surfaces in the simulations, and generally require much larger computation times than the sBIEM. Another advantage of the sBIEM is that it is a semi-analytical method (analytical in the form of an integral), therefore ensuring the convergence and accuracy of this method. With the exception of \citet{luo2020}, another advantage of the sBIEM over volumetric methods is the seamless transition between the interseismic and coseismic periods. Finally, the development of the sBIEM allows us to better understand the physics of complex fault geometries due to the analytical nature of this method. For example, we are able to analytically show the scaling between the fault geometry and slip distribution via the development of the sBIEM. We are also able to demonstrate that the main influence the fault geometry has on the earthquake cycle is the amount of normal traction on the fault itself. These analytical results could not have been obtained using only the volumetric method. They therefore highlight the need for diverse and complementary numerical methods to tackle a suite fault geometry and interaction scenarios in earthquake cycle simulations.
\subsection{Development of a 3D fully dynamic sBIEM}
We are currently restricted to running the fully dynamic sBIEM in 2D. However, we are currently attempting to further develop this method in 3D using the space--time BIEM developed in \citet{romanet2020}. The 3D problem is much more complex: although the 2D fault geometry is only defined by one curvature, $\kappa^t$, we need to consider the four curvatures and two torsions associated with the slip field on the fault in 3D space \citep{romanet2020}. One reason for this additional complexity is that the slip direction is also allowed to change along the fault plane in 3D, which introduces the curvature due to changes in the slip direction.
\subsection{Conclusion}
Here we have rigourously generalized the spectral boundary element method (sBIEM) for non-planar fault geometries. We have shown that the main effect of non-planar fault geometry in a fully dynamic 2D medium is to modify the normal traction along the fault. We have incorporated this generalized sBIEM into an existing methodology to model the fully dynamic earthquake cycle on a non-planar fault. Finally, we have tested our new method against the classic space--time BIEM to determine the limits of our method. We have demonstrated that this method agrees with the classic BIEM if the small-slope approximation is respected along the fault. The sBIEM continued to yield results that were still in good agreement with the true results once the small-slope approximation was no longer valid, although there was some quantitative difference between the modeled and true results (higher rupture speed, higher slip, and overestimation of the maxima and minima of the normal and shear tractions). One of the most important aspects of this method was the preservation of the scaling between the slip distribution and fault geometry. We hope that this method will provide a fast and convenient way to better understand the effect of the fault geometry on the earthquake cycle.
\section*{Author contribution statement}
P.R. wrote the manuscript, wrote the spectral code, and came up with the original idea of the paper. S.O. wrote the classic boundary integral element code. S.O. and P.R. both participated in producing and discussing the numerical results. Both authors have read and approved the manuscript.
\section*{Acknowledgement}
This work would not have been possible without the support of Satoshi Ide, Robert Viesca, Ryosuke Ando, Tatsuhiko Saito, and Raul Madariaga.
\section*{Data and Resources}
No data were used in this paper.
\clearpage
|
\section{Introduction}
Gastrointestinal endoscopy is widely used for early gastric and colorectal cancer screening, during which a flexible tube with a tiny camera is inserted and guided through the digestive tract to detect precancerous lesions \cite{ali2021deep}.
Identifying and removing adenomatous polyp are routine practice in reducing gastrointestinal cancer-based mortality \cite{jemal2008cancer}.
However, the miss rate of polyp is as high as $27\%$ due to subjective operation and endoscopist fatigue after long duty \cite{ahn2012miss}.
An automatic polyp detection framework is thus desired to aid in endoscopists and reduce the risk of misdiagnosis.
For accurate and robust polyp detection, it is necessary to explore the correlation and complementarity of adjacent frames, to compensate for the possible image corruption or model errors in single images \cite{qadir2019improving}.
Nevertheless, there have been two long-standing and serious challenges in endoscopic video polyp detection:
\begin{figure}[t]
\centering
\includegraphics[width=0.98\textwidth]{paper906_challenge.pdf}
\caption{The easier frame (the first) and typical challenging frames (last six) associated with polyp detection in endoscopic video.
Green arrows point to the polyp and blue arrows point to the internal artifacts that often cause false positives.} \label{fig_challenge}
\end{figure}
{\itshape How to align object features across frames given the complex motion of the endoscopic camera?}
One key difference of endoscopic videos from common videos is the camera-moving instead of the common camera-fixed-object-moving situation.
The complex motion of the endoscopic camera leads to significant background variation between frames.
As a result, the mainstream video methods \cite{zhu2017flow,zhu2017deep} based on optical flow alignment are not suitable, since you do not have a reference, which leads to poor performance of optical flow evaluation \cite{zheng2019polyp}.
Intuitively, attempting a global alignment is both difficult and unnecessary, since the variable background distracts the focus of the network and overwhelms the foreground modeling for feature alignments.
We thus argue that an object-centered and proposal-guided feature alignment is required to mask out background trifles and focus on the concerned foreground variation.
{\itshape How to assemble features of neighborhood frames given the varied image quality resulting from water flow, reflection, bubbles, etc.?}
As shown in Fig.~\ref{fig_challenge}, frames in endoscopic videos are always and inevitably encountered with image corruptions such as water flow, specular reflection, instrument occlusion, bubbles, etc.
These internal artifacts can make the quality of adjacent frames vary considerately.
The \emph{quality}, as a result, should be given equal consideration as the \emph{correlation} between frames, in the stage of adjacent feature aggregation.
We further notice that different internal artifacts are handled by different kernels in convolutional neural networks, and results in varied activation patterns in different channels.
The combination of channel-by-channel selection and position-wise similarity \cite{bertasius2018object,deng2019relation} are thus believed to be necessary for the simultaneous assessment of foreground correlation and feature quality.
We aim to tackle the two challenges with carefully designed spatial alignment and temporal aggregation, and propose the multi-frame collaborative framework named Spatial-Temporal Feature Transformation (STFT).
Spatially, we choose deformable convolution \cite{dai2017deformable} as building blocks for feature alignments, for its adaptability in modeling large variations.
We further enhance its object-centered awareness and avoid background distraction by conditioning the offset prediction of the deformable convolution on the object proposals extracted by the image-based detector.
Temporally, we design a channel-aware attention module that combines both the cosine similarity to model the foreground correlation between frames and the learned per-channel reweighting to estimate the inter-frame quality variation.
The modules achieve a balance of expressiveness and efficiency without much additional computational complexity.
Note that the two components are mutually beneficial in that spatial alignment acts as the prerequisite and temporal aggregation looks for more advantage, which is also demonstrated in experimental results.
The contribution of this work can be summarized as three folds.
Firstly, we present a proposal-guided spatial transformation to enhance the object-centered awareness of feature alignment and mitigate the feature inconsistency between adjacent frames in the camera-moving situation of endoscopic videos.
Secondly, we design a novel channel-aware attention module for feature aggregation that achieves a balance of expressiveness and efficiency and shows superiority over other counterparts in experimental results.
Lastly, we propose an effective multi-frame collaborative framework STFT on top of the two components.
STFT sets new state-of-the-arts on both two challenging endoscopic video datasets and two polyp tasks.
Noticeably, STFT shows a far more significant improvement over still image baselines than other video-based counterparts (for example, $10.6\%$ and $20.6\%$ localization F1-score improvements on the CVC-Clinic and ASUMayo datasets, respectively).
\begin{figure}[t]
\centering
\includegraphics[width=0.95\textwidth]{paper906_framework.pdf}
\caption{Illustration of polyp detection using an image-based baseline (a) and our proposed Spatial-Temporal Feature Transformation (b). See section~\ref{method} for more details.} \label{fig_framework}
\end{figure}
\section{Method} \label{method}
\subsubsection{An Image-based Baseline}
Given the endoscopic video frames $\{I_i\}, i=1, ..., \infty$, a baseline approach for polyp detection is to apply an image-based detector to each frame individually.
We adopt a simple one-stage detector FCOS \cite{tian2019fcos} as our baseline.
As Fig.~\ref{fig_framework}(a), it firstly generates a set of multi-level feature maps with FPN \cite{lin2017feature} over the input image $I_i$.
Then, it outputs static classification scores and regression proposals by classification branch and regression branch respectively.
Each branch is implemented by four convolutional layers, sharing weights between different feature levels.
For level $l$, Let $F_i^l \in \mathbb{R}^{C \times H\times W}$ be the final feature map output by the regression branch.
$G_i=(x_0, y_0, x_1, y_1)$ is the associated ground-truth bounding box, where $(x_0, y_0)$ and $(x_1, y_1)$ denote the coordinates of the left-top and right-bottom corners.
Static proposals are $\{\bm{p}_i\} \in \mathbb{R}^{4 \times H\times W}$, and their regression targets $\{\bm{g}_i\} \in \mathbb{R}^{4 \times H\times W}$ are offsets between $G_i$ and all spatial locations on $F_i^l$.
For each spatial location $(x,y)$, $\bm{g}_i=(l_i, t_i, r_i, b_i)$ is a $4D$ real vector, which represents distances from $(x,y)$ to four boundaries of $G_i$.
It can be formulated as
\begin{equation} \label{eq1}
l_i = x - x_0, t_i = y - y_0, r_i = x_1 - x, b_i = y_1 - y.
\end{equation}
Given the challenging frame with water flow in Fig.~\ref{fig_challenge}, the baseline showed low confidence on the ground-truth and missed polyp detection (see results in Fig.~\ref{fig_qa_image_visu}).
\subsubsection{STFT Architecture}
Given the target frame $I_t$ and its adjacent support frames $\{I_s\}, s=1, ..., N$, our aim is to accurately detect polyp in $I_t$ by using the features from $\{I_s\}$.
Firstly, we generate multi-level feature maps and static prediction results for all frames via the same architecture as the image-based baseline (only the regression branch is shown in Fig.~\ref{fig_framework}(b) for ease of explanation).
At $l$-th feature level, we use predicted static proposals $\{\bm{p}_t\}$ of $I_t$ to guide the spatial transformation of target feature $F_t^l$ (as shown in green in Fig.~\ref{fig_framework}(b)).
Meanwhile, we leverage the difference between $\{\bm{p}_t\}$ and static proposals $\{\bm{p}_s\}$ of each $I_s$ to guide the spatial transformation of each support feature $F_s^l$ to align it with the target (blue operations in Fig.~\ref{fig_framework}(b)).
Then, we model channel-aware relations of all spatially aligned features via a temporal feature transformation module (orange in Fig.~\ref{fig_framework}(b)).
For each level, the temporal transformed features of the classification branch and the regression branch predict offsets for static scores and static proposals, respectively.
The ultimate temporal bounding box are computed in non-linear transformations between static proposals and proposal offsets (red dashed line in Fig.~\ref{fig_framework}(b)), while the ultimate classification scores are obtained by multiplying the static scores and score offsets.
Finally, the predictions from all levels are combined using non-maximum suppression just like FCOS.
\subsubsection{Proposal-guided Spatial Feature Transformation} \label{shape_guided}
Ideally, the feature for a large proposal should encode the content over a large region, while those for small proposals should have smaller scopes accordingly \cite{wang2019region}.
Following this intuition, we spatially transform $F_t^l$ based on proposals $\{\bm{p}_t\}$ to make the feature sensitive to the object.
In practice, the range of each $\bm{p}_t$ is image-level.
In order to generate feature-level offset fields required for each spatial location deformation, we first calculate normalized proposals $\bm{p}_t^*=(l_t^*, t_t^*, r_t^*, b_t^*)$ with
\begin{equation}
l_t^* = \frac{-l_t}{s_l}, t_t^* = \frac{-t_t}{s_l}, r_t^* = \frac{r_t}{s_l}, b_t^* = \frac{b_t}{s_l},
\end{equation}
where $s_l$ is the FPN stride until the $l$-level layer.
We devise a $1\times 1$ convolutional layer $\mathcal N_{o}$ on $\{\bm{p}_t^*\}$ to generate the proposal-guided offset fields and a $3\times 3$ deformable convolutional layer $\mathcal N_{dcn}$ to implement spatial feature transformation, as follows:
\begin{equation}
F_{t}^{l\prime} = \mathcal N_{dcn}(F_t^l, \mathcal N_{o}(\{\bm{p}_t^*\})),
\end{equation}
where $F_{t}^{l\prime}$ is spatial transformed features.
We also perform this spatial transformation scheme on support features $\{F_s^l\}$.
Specially, we propagate predicted proposals from $I_t$ to each $I_s$ and leverage the difference between them to generate offset fields for deformation of each $F_s^l$.
In other words, we make each spatial transformed feature $F_s^{l\prime}$ sensitive to both the object and the difference.
This step plays a key role in improving the recall rate (see Table~\ref{tab_module_design}).
\begin{figure}[t]
\centering
\includegraphics[width=0.95\textwidth]{paper906_attention.pdf}
\caption{Comparisons of different attention mechanisms. (a) Point-wise. (b) Channel-wise. (c) proposed Channel-aware for Temporal Feature Transformation.} \label{fig_attention}
\end{figure}
\subsubsection{Channel-aware Temporal Feature Transformation} \label{met_attention}
Because $I_t$ and $\{I_s\}$ share weights of all layers in our STFT, it can be considered that features of all frames on each channel have been spatially aligned after spatial feature transformation.
On the other hand, based on the principle of deep convolutional network learning, the features of certain channels are bound to be sparse, and their activations are close to zero.
Naturally, we propose channel-aware temporal feature transformation, aiming to mine the most representative channel features in the neighborhood for feature aggregation.
It is implemented by the attention mechanism.
We calculate the channel-aware attention map $A_{ts}^l$ from spatial aligned features $F_t^{l\prime}$ and $\{F_s^{l\prime}\}$ by
\begin{equation}
A_{ts}^l=softmax(\frac{\mathcal R(F_t^{l\prime}) \mathcal R(\{F_s^{l\prime}\})^T}{\sqrt {d_{f}}}) \mathcal R(\{F_s^{l\prime}\}),
\end{equation}
where $\mathcal R$ is the reshape and $T$ is the transpose for matrix multiplication, more details shown in Fig.~\ref{fig_attention}(c).
$d_{f}$ is a scaling factor \cite{vaswani2017attention}.
In our algorithm, $d_{f}$ is equal to $H\times W$ that represents the dimension of each channel feature.
\subsubsection{Target Assignment}
According to Eq.~\ref{eq1}, for each location $(x, y)$, we can obtain the predicted static bounding box $\bm{y}_t=(x-l_t, y-t_t, x+r_t, y+b_t)$ from static proposals $\bm{p}_t$.
In our STFT, if the intersection-over-union between $\bm{y}_t$ and $G_t$ is larger than a threshold ($0.3$ by default), the temporal classification label of $(x, y)$ is assigned to positive and $\bm{p}_t$ is considered a significative proposal guide.
Then, the temporal regression target $\bm{\delta}_t$ for $(x,y)$ is offsets between $\bm{y}_t$ and $G_t$.
$\bm{\delta}_t=({\delta}_{x_0}, {\delta}_{y_0}, {\delta}_{x_1}, {\delta}_{y_1})$ are computed by
\begin{footnotesize}
\begin{equation}
{\delta}_{x_0} = \frac{x_0-(x-l_t)}{w*\sigma}, {\delta}_{y_0} = \frac{y_0-(y-t_t)}{h*\sigma}, {\delta}_{x_1} = \frac{x_1-(x+r_t)}{w*\sigma}, {\delta}_{y_1} = \frac{y_1-(y+b_t)}{h*\sigma},
\end{equation}
\end{footnotesize}
where $w, h$ are the width and height of $\bm{y}_t$, and $\sigma = 0.5$ is the variance to improve the effectiveness of offsets learning.
\subsubsection{Loss Function}
Objects with different sizes are assigned to different feature levels.
Combining outputs from each level, our STFT is easy to optimize in an end-to-end way using a multi-task loss function as follows:
\begin{equation}
\mathcal L = \mathcal L_{cls} + \mathcal L_{reg} + \frac{1}{\mathcal N_{pos}} \sum_{x,y} \mathcal L_{cls}^{\bm{st}} (\mathcal C^{\bm{st}}, \mathcal C^*) + \mathcal L_{reg}^{\bm{st}} \mathbbm{1}_{\{\mathcal C^*>0 \} } (\Delta ^{\bm{st}}, \Delta ^*),
\end{equation}
where $\mathcal L_{cls}$ and $\mathcal L_{reg}$ are the static classification and regression loss respectively \cite{tian2019fcos}.
$\mathcal L_{cls}^{\bm{st}}$ is the temporal classification loss implemented by focal loss and $\mathcal L_{reg}^{\bm{st}}$ is the temporal regression loss implemented by $\mathcal L_1$ loss.
$\mathcal C^{\bm{st}}$ and $\Delta ^{\bm{st}}$ are predicted offsets for scores and proposals by STFT.
$\mathcal C^*$ and $\Delta ^*$ are assigned classification label and regression target.
$\mathbbm{1}_{\{\mathcal C^*>0 \} }$ is the indicator function, being 1 if $\mathcal C^*>0$ and 0 otherwise.
\begin{table}[t]
\caption{Quantitative comparison with SOTA Image-based and Video-based methods on CVC-Clinic and ASUMayo video datasets. The subscript list the relative gains compared to the corresponding Image-based baseline. `$N/A$' denotes not available.}\label{tab_polyp}
\centering
\resizebox{0.95\columnwidth}{!}{
\smallskip\begin{tabular}{p{0.7cm}<{\centering}p{1.1cm}<{\centering}p{0.5cm}<{\raggedright}p{4.4cm}<{\raggedleft}|p{1.5cm}<{\centering}p{1.5cm}<{\centering}p{1.6cm}<{\centering}|p{1.5cm}<{\centering}p{1.5cm}<{\centering}p{1.6cm}<{\centering}}
\toprule[2pt]
\multicolumn{4}{c|}{~} & \multicolumn{3}{c|}{Polyp Detection} & \multicolumn{3}{c}{Polyp Localization} \\
~ & ~ & $\#$ & Methods & Precision & Recall & F1-score & Precision & Recall & F1-score \\ \midrule[1.5pt]
\multirow{10}*{\rotatebox{90}{{\bfseries CVC-Clinic}}} & \multirow{5}*{\tabincell{c}{$Image$ \\ -$based$}} & $1$ & UNet~\cite{ronneberger2015u} $(MICCAI'15)$ & $89.7$ & $75.9$ & $82.2$ & $81.7$ & $72.0$ & $76.5$ \\
~ & ~ & $2$ & Faster R-CNN~\cite{girshick2015fast} $(ICCV'15)$ & $84.6$ & $98.2$ & $90.9$ & $78.5$ & $87.9$ & $82.9$ \\
~ & ~ & $3$ & R-FCN~\cite{dai2016r} $(NIPS'16)$ & $91.7$ & $87.1$ & $89.3$ & $81.4$ & $83.2$ & $82.3$ \\
~ & ~ & $4$ & RetinaNet~\cite{ross2017focal} $(CVPR'17)$ & $93.7$ & $86.2$ & $89.8$ & $87.8$ & $83.1$ & $85.4$ \\
~ & ~ & $5$ & Yolov3~\cite{redmon2018yolov3} $(arXiv'18)$ & $N/A$ & $N/A$ & $N/A$ & $98.3$ & $70.5$ & $82.1$ \\
~ & ~ & $6$ & FCOS~\cite{tian2019fcos} $(ICCV'19)$ & $92.1$ & $74.1$ & $82.1$ & $94.7$ & $70.4$ & $80.8$ \\
~ & ~ & $7$ & PraNet~\cite{fan2020pranet} $(MICCAI'20)$ & $94.8$ & $82.2$ & $88.1$ & $96.7$ & $82.1$ & $88.8$ \\ \cline{3-10}
~ & \multirow{5}*{\tabincell{c}{$Video$ \\ -$based$}} & $3^*$ & FGFA~\cite{zhu2017flow} $(ICCV'17)$ & $\bm{94.5}_{\uparrow2.8}$ & $89.2_{\uparrow2.1}$ & $91.7_{\uparrow2.4}$ & $88.7_{\uparrow7.3}$ & $86.4_{\uparrow3.2}$ & $87.6_{\uparrow5.3}$ \\
~ & ~ & $2^*$ & RDN~\cite{deng2019relation} $(ICCV'19)$ & $91.2_{\uparrow6.6}$ & $91.3_{\downarrow6.9}$ & $91.2_{\uparrow0.3}$ & $88.7_{\uparrow10.2}$ & $85.9_{\downarrow2.0}$ & $87.3_{\uparrow4.4}$ \\
~ & ~ & $1^*$ & OptCNN~\cite{zheng2019polyp} $(ISBI'19)$ & $84.6_{\downarrow5.1}$ & $\bm{97.3}_{\uparrow\bm{21.4}}$ & $90.5_{\uparrow8.3}$ & $74.3_{\downarrow7.4}$ & $\bm{96.4}_{\uparrow\bm{24.4}}$ & $83.9_{\uparrow7.4}$ \\
~ & ~ & $5^*$ & AIPDT~\cite{zhang2020asynchronous} $(MICCAI'20)$ & $N/A$ & $N/A$ & $N/A$ & $90.6_{\downarrow7.7}$ & $84.5_{\uparrow14.0}$ & $87.5_{\uparrow5.4}$ \\
~ & ~ & $2^{**}$ & MEGA~\cite{chen2020memory} $(CVPR'20)$ & $91.6_{\uparrow\bm{7.0}}$ & $87.7_{\downarrow10.5}$ & $89.6_{\downarrow1.3}$ & $91.8_{\uparrow\bm{13.3}}$ & $84.2_{\downarrow3.7}$ & $87.8_{\uparrow4.9}$ \\
~ & ~ & $6^*$ & {\bfseries STFT $(Ours)$} & $91.9_{\downarrow0.2}$ & $92.0_{\uparrow17.9}$ & $\bm{92.0}_{\uparrow\bm{9.9}}$ & $\bm{95.0}_{\uparrow0.3}$ & $88.0_{\uparrow17.6}$ & $\bm{91.4}_{\uparrow\bm{10.6}}$ \\ \midrule[1.2pt]
\multirow{6}*{\rotatebox{90}{{\bfseries ASUMayo}}} & \multirow{3}*{\tabincell{c}{$Image$ \\ -$based$}} & $2$ & Faster R-CNN~\cite{girshick2015fast} $(ICCV'15)$ & $95.8$ & $98.8$ & $97.2$ & $78.4$ & $98.4$ & $87.3$ \\
~ & ~ & $3$ & R-FCN~\cite{dai2016r} $(NIPS'16)$ & $96.1$ & $96.4$ & $96.3$ & $80.1$ & $96.2$ & $87.4$ \\
~ & ~ & $4$ & RetinaNet~\cite{ross2017focal} $(CVPR'17)$ & $98.8$ & $84.0$ & $90.8$ & $91.8$ & $83.8$ & $87.6$ \\
~ & ~ & $6$ & FCOS~\cite{tian2019fcos} $(ICCV'19)$ & $99.5$ & $68.0$ & $80.8$ & $95.7$ & $65.4$ & $77.7$ \\
~ & ~ & $7$ & PraNet~\cite{fan2020pranet} $(MICCAI'20)$ & $98.7$ & $82.3$ & $89.8$ & $94.8$ & $82.1$ & $87.9$ \\ \cline{3-10}
~ & \multirow{3}*{\tabincell{c}{$Video$ \\ -$based$}} & $3^*$ & FGFA~\cite{zhu2017flow} $(ICCV'17)$ & $98.3_{\uparrow\bm{2.2}}$ & $91.4_{\downarrow5.0}$ & $94.8_{\downarrow1.5}$ & $88.2_{\uparrow8.1}$ & $91.1_{\downarrow5.1}$ & $89.6_{\uparrow2.2}$ \\
~ & ~ & $2^*$ & RDN~\cite{deng2019relation} $(ICCV'19)$ & $97.9_{\uparrow2.1}$ & $94.1_{\downarrow4.7}$ & $95.9_{\downarrow1.3}$ & $87.1_{\uparrow\bm{8.7}}$ & $93.7_{\downarrow4.7}$ & $90.3_{\uparrow3.0}$ \\
~ & ~ & $2^{**}$ & MEGA~\cite{chen2020memory} $(CVPR'20)$ & $96.8_{\uparrow1.0}$ & $95.9_{\downarrow2.9}$ & $96.3_{\downarrow0.9}$ & $82.6_{\uparrow4.2}$ & $94.3_{\downarrow4.1}$ & $88.1_{\uparrow0.8}$ \\
~ & ~ & $6^*$ & {\bfseries STFT $(Ours)$} & $\bm{98.9}_{\downarrow0.6}$ & $\bm{97.8}_{\uparrow\bm{29.8}}$ & $\bm{98.3}_{\uparrow\bm{17.5}}$ & $\bm{99.2}_{\uparrow3.5}$ & $\bm{97.4}_{\uparrow\bm{32.0}}$ & $\bm{98.3}_{\uparrow\bm{20.6}}$ \\
\bottomrule[2pt]
\end{tabular}
}
\end{table}
\section{Experiments}
\subsection{Datasets and Settings}
We evaluate the proposed STFT on two public video format polyp detection benchmarks.
(1) CVC-VideoClinicDB~\cite{bernal2018polyp}: 18 video sequences were split into test sets (4 videos, number of \#2, 5, 10, 18; 2484 images) and training sets (the rest 14 videos; 9470 images) following~\cite{zheng2019polyp};
(2) ASU-Mayo Clinic Colonoscopy Video~\cite{tajbakhsh2015automated}: 10 annotated videos containing polyps were split into test sets (4 videos, number of \#4, 24, 68, 70; 2098 images) and training sets (the rest 6 videos; 3304 images).
All methods in our experiments follow the same data partitioning strategy.
We use ResNet-50 \cite{he2016deep} as our backbone and FCOS \cite{tian2019fcos} as our baseline for all experiments.
STFT is trained on $4$ Tesla V100 GPUs by synchronized SGD, with one target frame and $N$ support frames holding in each GPU.
$N$ is limited by GPU memory.
We adopt a temporal dropout~\cite{zhu2017flow}, that is, randomly discard support frames in the neighborhoods $[-9,9]$ around the target frame.
We set $N=10$ in inference but $2$ in training by default.
The model will be deployed on SenseCare \cite{duan2020sensecare}.
For more training details and external experiments, please refer to \url{https://github.com/lingyunwu14/STFT}.
\begin{figure}[t]
\centering
\includegraphics[width=0.9\textwidth]{paper906_result.pdf}
\caption{Qualitative comparison of polyp localization. The green and yellow boxes denote correct and incorrect detections, respectively.} \label{fig_qa_image_visu}
\end{figure}
\subsection{Quantitative and Qualitative Comparison}
Table~\ref{tab_polyp} shows performance comparisons between state-of-the-art methods without any post-processing on two polyp datasets.
Following~\cite{zheng2019polyp}, precision, recall, and F1-score (the harmonic mean of precision and recall) are evaluated on two different tasks: polyp detection and polyp localization.
All compared methods are divided into two groups, image-based and video-based.
The number in front of the method represents the correspondence between video-based methods and image-based methods, such as the static baseline of $\#1^*$ is $\#1$, $\#2$ is the baseline of $\#2^*$ and $\#2^{**}$, STFT's baseline is $\#6$, etc.
Overall, STFT outperforms all SOTAs across both two datasets and two tasks, in the comprehensive metric F1-score.
On the ASUMayo, STFT performs best in all metrics.
On the CVC-Clinic, $\#1^*$ achieves higher recall, but its lower precision means a higher false-positive rate, which is not acceptable in clinical practice.
Second, STFT achieves a larger overall performance gain (F1-score: about $\geq10\%$) relative to its image-level baseline than other video-based methods.
Our baseline $\#6$ shows the lowest recall on two tasks; STFT improves it to a comparable level to the SOTAs and outperforms all methods on the ASUMayo. This suggests that STFT has a strong learning ability to effectively detect polyps.
Moreover, Fig.~\ref{fig_qa_image_visu} provides qualitative comparisons of STFT with the baseline $\#6$ and the flow-based method $\#3^*$.
STFT can precisely locate polyps in various challenging cases, such as water flow, floating content, and bubbles.
\begin{table} [t]
\caption{The effects of each module in our STFT design.}\label{tab_module_design}
\centering
\resizebox{1.0\columnwidth}{!}{
\smallskip\begin{tabular}{p{1.2cm}<{\centering}|p{3.0cm}<{\centering}p{2.2cm}<{\centering}p{2.5cm}<{\centering}p{2.4cm}<{\centering}|p{1.5cm}<{\centering}p{1.5cm}<{\centering}p{1.5cm}<{\centering}}
\toprule[1.5pt]
Methods & Temporal Aggregation? & Channel-Aware? & Spatial Adaptation? & Proposal-Guided? & Precision & Recall & F1 \\
\midrule[1.2pt]
(a) & & & & & $94.7$ & $70.4$ & $80.8$ \\
\hline
(b) & \checkmark & & & & $64.4_{\downarrow30.3}$ & $77.9_{\uparrow7.5}$ & $70.5_{\downarrow10.3}$ \\
(c) & \checkmark & \checkmark & & & $94.6_{\downarrow0.1}$ & $82.5_{\uparrow12.1}$ & $88.2_{\uparrow7.4}$ \\
(d) & \checkmark & \checkmark & \checkmark & & $94.3_{\downarrow0.4}$ & $83.7_{\uparrow13.3}$ & $88.7_{\uparrow7.9}$ \\
(e) & \checkmark & \checkmark & \checkmark & \checkmark & $\bm{95.0}_{\uparrow\bm{0.3}}$ & $\bm{88.0}_{\uparrow\bm{17.6}}$ & $\bm{91.4}_{\uparrow\bm{10.6}}$ \\
\bottomrule[1.5pt]
\end{tabular}
}
\end{table}
\subsection{Ablation Study}
\subsubsection{STFT Module Design}
Table~\ref{tab_module_design} compares our STFT (e) and its variants with the image-based baseline (a).
Metrics are evaluated on the polyp localization task with the CVC-Clinic dataset.
Method (b) is a naive temporal aggregation approach that directly adds adjacent features together.
The F1-score decreases to $70.5\%$.
Method (c) adds our channel-aware transformation into (b) for adaptive weighting.
It obtains an F1-score of $88.2\%$, $17.7\%$ higher than that of (b).
This indicates that it is critical to consider the quality weight of adjacent features.
Method (d) is a degenerated variant of (e).
It uses the original deformable convolution~\cite{dai2017deformable} to achieve spatial adaptation without our proposal-guided.
It has almost no improvement compared to (c).
(e) is the proposed STFT, which adds the proposal-guided spatial transformation module to (d).
It increases the F1-score by $10.6\%$ to $91.4\%$. The improvement for the recall is more significant ($70.4\%$ to $88.0\%$).
This proves that our proposal-guide transformation plays a key role, and STFT effectively mines useful feature representations in the neighborhood.
\begin{table}[t]
\caption{Performance and complexity comparisons in different weighting manners.}\label{tab_as_attention}
\centering
\resizebox{0.95\columnwidth}{!}{
\smallskip\begin{tabular}{p{4.6cm}|p{2.2cm}<{\centering}p{2.8cm}<{\centering}|p{1.8cm}<{\centering}p{1.8cm}<{\centering}p{1.8cm}<{\centering}}
\toprule[1.5pt]
Methods & Params & Complexity & Precision & Recall & F1 \\
\midrule[1.2pt]
STFT-$CosineSimilarity$~\cite{bertasius2018object,zhu2017flow} & - & $\mathcal{O}(NHW)$ & $94.2_{\downarrow0.5}$ & $79.4_{\uparrow7.0}$ & $86.2_{\uparrow5.4}$ \\
STFT-$PointWise$~\cite{fu2019dual} & $\alpha$ & $\mathcal{O}(NH^2W^2)$ & $93.2_{\downarrow1.5}$ & $81.7_{\uparrow11.3}$ & $87.1_{\uparrow6.3}$ \\
STFT-$ChannelWise$~\cite{fu2019dual} & $\beta$ & $\mathcal{O}(NC^2)$ & $\bm{95.2}_{\uparrow\bm{0.5}}$ & $80.5_{\uparrow10.1}$ & $87.3_{\uparrow6.5}$ \\
STFT-$\bm{ChannelAware}$ & - & $\mathcal{O}(NC)$ & $95.0_{\uparrow0.3}$ & $\bm{88.0}_{\uparrow\bm{17.6}}$ & $\bm{91.4}_{\uparrow\bm{10.6}}$ \\
\bottomrule[1.5pt]
\end{tabular}
}
\end{table}
\begin{table}[t]
\caption{Results of using different number of support frames. $^*$ indicates default setting.}\label{tab_as_support_frames}
\centering
\resizebox{0.95\columnwidth}{!}{
\smallskip\begin{tabular}{p{3.2cm}<{\centering}|p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}|p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}}
\toprule[1.5pt]
\# Training Frames & \multicolumn{5}{c}{$2^*$} & \multicolumn{5}{c}{$6$} \\
\# Inference Frames & $2$ & $6$ & $10^*$ & $14$ & $18$ & $2$ & $6$ & $10$ & $14$ & $18$ \\
\midrule[1.2pt]
CVC-Clinc & $91.1$ & $91.3$ & $91.4$ & $\bm{91.5}$ & $91.4$ & $90.3$ & $90.5$ & $90.7$ & $90.6$ & $90.7$ \\
ASUMayo & $98.2$ & $98.2$ & $\bm{98.3}$ & $98.3$ & $98.3$ & $95.6$ & $95.7$ & $95.8$ & $95.8$ & $95.8$ \\
\bottomrule[1.5pt]
\end{tabular}
}
\end{table}
\begin{table}[t]
\caption{Results of using different ratios of annotation frames in training.}\label{tab_as_sparse_training}
\centering
\resizebox{0.95\columnwidth}{!}{
\smallskip\begin{tabular}{p{3.2cm}<{\centering}|p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}p{1.0cm}<{\centering}}
\toprule[1.5pt]
\# Ratios & 1 & 1/2 & 1/4 & 1/6 & 1/8 & 1/10 & 1/12 & 1/14 & 1/16 & 1/18 & 1/20 \\
\midrule[1.2pt]
Detection F1-score & $92.0$ & $92.1$ & $92.6$ & $91.9$ & $91.4$ & $\bm{92.9}$ & $91.2$ & $91.4$ & $90.2$ & $91.2$ & $90.9$ \\
Localization F1-score & $\bm{91.4}$ & $91.3$ & $91.4$ & $91.1$ & $90.8$ & $91.0$ & $90.9$ & $90.5$ & $90.3$ & $90.4$ & $90.3$ \\
\bottomrule[1.5pt]
\end{tabular}
}
\end{table}
\subsubsection{Effectiveness of Channel-Aware} \label{attention}
As noted in Table~\ref{tab_as_attention}, we use various adaptive weighting manners to replace the proposed channel-aware in temporal transformation for comparison.
In existing video detection works\cite{bertasius2018object,zhu2017flow}, calculating cosine similarity is a common weighting method.
Point-wise (in Fig.~\ref{fig_attention}(a)) and Channel-wise (in Fig.~\ref{fig_attention}(b)) are the mainstream attention mechanisms~\cite{fu2019dual}.
Compared with them, Channel-aware has the lowest computational complexity without any hyperparameters.
In addition, Channel-aware achieves the largest gain over the baseline (a) in Table~\ref{tab_module_design}.
\subsubsection{Impact of Support Frame Numbers}
We investigated the impact of different support frame numbers on STFT in Table~\ref{tab_as_support_frames}.
Under the localization F1-score metric on two datasets, training with 2 frames achieves better accuracy (6
frames reach the memory cap).
For inference, as expected, performance improves slowly as more frames are used and stabilizes.
Combining Table~\ref{tab_polyp}, STFT always achieves the highest localization F1-score and is insensitive
to support frame numbers.
\subsubsection{Learning under Sparse Annotation}
It is worth noting that we only use the ground-truth of target frames to optimize all losses of STFT.
Considering that clinical annotation is very expensive, target frames in training set are uniformly sampled to verify the learning capacity of STFT in the case of sparse labeling.
Combining Table~\ref{tab_as_sparse_training} and~\ref{tab_polyp},
STFT shows stable comprehensive performance in both detection and localization tasks.
\section{Conlusion}
We propose Spatial-Temporal Feature Transformation (STFT), an end-to-end multi-frame collaborative framework for automatically detect and localize polyp in endoscopy video.
Our method enhances adaptive spatial alignment and effective temporal aggregation of adjacent features via proposal-guided deformation and channel-aware attention.
Extensive experiments demonstrate the strong learning capacity and stability of STFT.
Without any post-processing, it outperforms all state-of-the-art methods by a large margin across both two datasets and two tasks, in the comprehensive metric F1-score.
\subsection*{Acknowledgments}
This work is partially supported by the funding of Science and Technology Commission Shanghai Municipality No.19511121400, the General Research Fund of Hong Kong No.27208720, and the Research Donation from SenseTime Group Limited.
\bibliographystyle{splncs04}
|
\section{Introduction}
\IEEEPARstart{M}{olecular} emission spectroscopy is crucial for space and atmospheric sciences since it helps us to understand the stellar evolution, star formation, and cosmic chemistry \cite{Waters2006}. In particular, the observation of spectral signatures of molecular species such as the hydroxyl radical OH and atomic oxygen OI at terahertz (THz) frequencies ~\cite{Richter2021} provides valuable information about the Earth's atmosphere and global climate change. Future space and air-borne missions aiming at studying the chemical composition of the atmosphere in the far-infrared or THz spectral region will require reliable, high-resolution heterodyne receivers preferably operating at ambient temperatures \cite{Siegel2007},~\cite{Farrah2019}.
In recent years, quantum-cascade lasers (QCLs) \cite{Koehler2002} have shown unprecedented improvement in performance, thereby making them ideal candidates for local oscillator (LO) sources for THz heterodyne receivers \cite{Richter2015},\textcolor{black}{~\cite{Kloosterman2013}}. However, QCLs are susceptible to frequency instabilities. Hence, it is of utmost importance to stabilize the signal from the QCL to a reference source to eradicate frequency jitters and to limit the phase noise. In 2005, Betz \textit{et al.} \cite{Betz} first demonstrated phase locking of a $3$-THz QCL with a far-infrared gas laser using the intermediate frequency (IF) signal generated by a GaAs Schottky diode mixer. In 2009, Rabanus \textit{et al.} \cite{Rabanus2009} reported phase locking of a $1.5$-THz QCL and the first heterodyne experiment using a phase-locked QCL as an LO source and a hot-electron bolometer (HEB) as a mixer, which requires cryogenic cooling for operation.
Frequency converters that can operate at ambient temperatures enable operation for a long lifetime and eliminate the necessity of bulky cryostats. \textcolor{black}{In 2009, Khosropanah \textit{et al.} demonstrated phase locking of a $2.7$-THz QCL using a superlattice mixer \cite{Khosropanah2009}}. Later in 2013, Hayton \textit{et al.} \cite{hayton2013} reported both, frequency and phase, locking of a $3.4$-THz QCL to a $\times 15$-harmonic signal generated by a superlattice harmonic mixer operating at room temperature. Subsequently, in 2014 they reported phase locking of a $4.7$-THz QCL to a superlattice harmonic mixer, which was cooled to 10~K and resulted in a beat signal with a signal-to-noise ratio (SNR) of 20~dB \cite{khudchenko}.
Schottky diode-based harmonic mixers facilitate a broad IF range as well as a fast response time. Danylov \textit{et al.} \cite{Danylov2015} demonstrated phase locking of a $2.32$-THz QCL using a balanced-Schottky diode $\times 21$-harmonic mixer, which exhibited a conversion loss of about $110$~dB and an SNR of $25$~dB. Nonetheless, with increasing harmonic number, the SNR of the beat signal becomes degraded, thereby making it less suitable for applications that demand high sensitivity. Therefore, it is desirable to have THz harmonic mixers that exhibit a low conversion loss and can generate beat signals with a high SNR for QCL frequency stabilization. Bulcha \textit{et al.} \cite{bulcha2016} designed single-ended Schottky diode harmonic mixers yielding a conversion loss of 30~dB for fourth-harmonic mixing.
Motivated by the performance of Schottky diodes at THz frequencies \cite{imran}, we have designed and developed a $3.5$-THz, $\times 6$-harmonic Schottky diode mixer for QCL frequency stabilization. The harmonic mixer design as well as the fabrication of mixer circuits and blocks were carried out at Chalmers University of Technology, the QCL was fabricated at Paul-Drude-Institut (PDI), and the mixer characterization was performed at the German Aerospace Center (DLR). The article is organized as follows: the design and development of the $\times 6$-harmonic, single-ended Schottky diode mixer are presented in section II. The mixer characterization setup is described in section III. Finally, results from the dc measurements and radio frequency (RF) characterization are presented and discussed in section IV.
\section{Method}
\label{sectionII}
\begin{figure}[!b]
\centering
\includegraphics[width=0.5\textwidth,keepaspectratio]{figures/Figure1_EquivalentCircuit.pdf}
\caption{Harmonic-mixer topology. Equivalent circuit of the $3.5$-THz, $\times$6-harmonic, planar, single-ended Schottky diode mixer. $Z_{\text{RF}}$ and $Z_{\text{LO}}$ are the embedding impedances of the diode at the RF and LO frequency, respectively. Optimization of the circuit elements and waveguide split blocks was carried out to present appropriate embedding impedances to the diode to obtain low mixer conversion loss.}
\label{figure1}
\end{figure}
This section describes the diode modeling, the $\times$6-harmonic mixer design, the integrated-diode fabrication process, the mixer housing fabrication, and, finally, the process of the circuit assembly. First, for the chosen mixer topology, the diode modeling was carried out to evaluate the diode dc parameters. Second, a large-signal, harmonic-balance simulation in the circuit analyzer was set up to determine the diode-embedding impedances at the RF, LO frequency, and IF. Thereafter, a three-dimensional (3D) electromagnetic (EM) model of the waveguide and filter sections was designed using a finite-element method (FEM) solver. Upon optimization, the overall performance of the harmonic mixer was analyzed in terms of the RF and LO return losses as well as the mixer conversion loss \textit{L}. Later, the designed mixer circuit was realized on an ultra-thin, semi-insulating GaAs substrate. Simultaneously, the mixer blocks were manufactured using a high-speed micrometer precision milling tool. Finally, the integrated mixer circuit on the GaAs substrate, the quartz carrier substrate, and the printed circuit board (PCB) were assembled on the E-plane mixer split block.
\subsection{Diode modeling}
\label{sectionIIA}
At $3.5$~THz, the estimated losses in the RF rectangular waveguide WM-64\footnote{RF waveguide name designation. 'W' stands for waveguide, 'M' for metric, and the number is the waveguide width in $\mu$m \cite{Waveguide}.} are expected to be higher than $1$~dB/mm. Hence, it is of utmost importance to find a compact solution that takes into account the high-frequency losses and the narrow-tolerance limit set by the fabrication process. Therefore, a single-ended topology was chosen to realize the $3.5$-THz, $\times$6-harmonic mixer as illustrated in Fig.~\ref{figure1}.
\begin{figure}[!t]
\centering
\includegraphics[width=0.5\textwidth,keepaspectratio]{figures/Figure3_Diode.png}
\caption{Single-ended Schottky diode contact. Top: Illustration of the Schottky contact with the sub-micron anode area (Note: The drawing is not to scale). Bottom: Scanning electron micrograph of a planar air-bridge Schottky diode with a contact area $S = 0.11~\mu$m$^2$. }
\label{figure2}
\end{figure}
A planar, air-bridged Schottky diode with a sub-micron anode area was defined on a semi-insulating GaAs substrate as shown in Fig.~\ref{figure2}. A $50$-nm-thick epilayer with a doping concentration of about $6 \times 10^{17}$~cm$^{-3}$ was chosen in order to operate below the plasma frequency \cite{crowe1992}. For the initial mixer design, a quasi-static, equivalent-lumped-circuit diode model that consists of the diode series resistance ($R_s$), the zero-bias junction capacitance ($C_{j0}$), and a parallel non-linear current source is applied to the single-ended discrete Schottky diode. For a Schottky contact with an area of 0.11~$\mu$m$^2$, a series resistance of about 25~$\Omega$ was calculated using the analytical model which takes into account the undepleted epilayer resistance \cite{crowe1992}, dc spreading resistance in the buffer layer \cite{dickens}, and ohmic contact resistance. The effect of self-heating is not included \cite{Tang2012}. In the junction capacitance model, the first-order fringing effect\textcolor{black}{\cite{Diego2016}} was included as shown below\cite{louhi1994} ,
\begin{equation}
C_j \simeq \frac{\epsilon_l S}{W_{d\text{0}}} \bigg( 1+ 2.5 \bigg( \frac{W_{d\text{0}}}{\sqrt{S}} \bigg) \bigg),
\label{equ1}
\end{equation}
\noindent where $\epsilon_l$ denotes the relative permittivity of the $n$-doped GaAs layer and $S$ the \textcolor{black}{rectangular area of the Schottky contact} . The depletion width $W_{d\text{0}}$ at zero bias is assumed to be equal to the thickness of the \textit{n}-doped semiconductor layer. In the ideal-diode model, an ideality factor $\eta = 1.2$, a saturation current $I_{\text{sat}} = \SI{1}{fA}$, and a built-in potential of \SI{0.85}{V} were assumed.
\subsection{Design of the $\times$6-harmonic mixer}
The embedding impedances of a Schottky diode with a sub-micron anode area were evaluated using a large-signal, harmonic-balance simulation. Using the built-in optimizer in the circuit simulator, the diode-embedding impedances at the RF, IF, and LO frequency were varied to provide a low mixer conversion loss \textit{L}. The out-of-band frequencies were terminated by an open circuit (Z-mixer topology) \cite{Saleh},~\cite{Divya2019}. The RF optimum diode-embedding impedance of the Z-mixer is approximately $Z_{\text{RF}} = (60+j80)~\Omega$ as shown in Fig.~\ref{fig:smith}. \textcolor{black}{At the LO and IF the optimum impedances are approximately $Z_{\text{LO}} = (150+j300)~\Omega$ and 1000~$\Omega$ respectively \cite{Divya2019}}. \textcolor{black}{The predicted conversion loss $L$ from the ideal Z-mixer circuit simulation was about 20~dB for a Schottky contact area of 0.11~$\mu$m$^2$, an LO power = 2~dBm, no dc bias, and the losses from the mixer circuit were excluded.}
\begin{figure}
\centering
\includegraphics[width= 0.75\linewidth]{figures/Smithchart_PGF.pdf}
\caption{RF embedding impedance. The Smith chart shows the optimum RF embedding impedance $Z_{\text{RF}}$ indicated by a red dot and the conversion loss contours (1~dB step) derived from the Z-mixer simulation. The RF embedding impedance presented to the diode in the EM simulation software in the frequency range from 3.4 to 3.6~THz is indicated by blue dots and the center frequency is highlighted by a green dot.}
\label{fig:smith}
\end{figure}
\begin{figure}[!b]
\centering
\includegraphics[width=0.5\textwidth]{figures/Figure4_EMmodel.pdf}
\caption{EM model for the 3.5-THz, $\times$6-harmonic Schottky diode mixer. (a) Full 3D-EM model of the integrated planar Schottky diode realized on a $2$-$\mu$m-thick GaAs substrate, which is suspended on an E-plane split block using beam leads. (b) RF chain consisting of a WM-64 waveguide, dc grounded RF E-plane probe, Schottky diode contact, and RF choke filter. (c) Cross section image of the RF filter channel. }
\label{figure3}
\end{figure}
Based on the topology illustrated in Fig.~\ref{figure1}, a 3D-EM model of the choke filters and matching networks was implemented using a FEM solver (Ansys HFSS) as shown in Fig.~\ref{figure3}(a). The RF waveguide (WM-64), LO waveguide (WM-380) and \textcolor{black}{IF port} were assigned with a waveguide port. A $50$-$\Omega$ lumped port was defined at the Schottky diode junction. To evaluate the circuit performance accurately, multi-frequency adaptive meshing was carried out at the RF and LO frequency. When the solver attains the specified convergence criteria, it continues to refine the mesh for five consecutive adaptive passes, which resulted in a total of about $200\,000$ tetrahedrons. To reduce the computation time, the diagonal horn and the WM-380 LO access waveguide were excluded.
A reduced gold conductivity of about $2 \times 10^{7}$~S/m was assigned to the metal strip lines and waveguide walls \cite{Laman2008}. The GaAs substrate with a relative permittivity $\epsilon_s = 12.9$ and a loss tangent $\tan~\delta = 0.001$ was used in the EM-simulations \cite{Palik1997},~\cite{Grischkowsky}. Additional parasitic elements of the diode were included in the 3D-EM model, including high-frequency losses in the contact mesa due to a limited conductivity of the GaAs buffer layer of about $\sigma = q~\mu~N_{\text{buffer}}$ = \SI{1.5e5}{S/m}. Note: A surface impedance boundary condition was applied to the mesa so fields are not solved inside.
The incoming THz signal from the QCL is coupled to the diode using an RF E-plane probe. \textcolor{black}{For maximum RF energy coupling efficiency to the diode and to present the optimum embedding impedance at the RF}, a diode geometry optimization and an RF backshort tuning were carried out as shown in Fig.~\ref{figure3}(b). Thereafter, an RF choke filter was implemented as a high-low impedance line to prevent the leakage of the RF signal into the LO chain. Fig.~\ref{figure3}(c) shows the cross section of the RF channel with a $2$-$\mu$m-thick GaAs substrate and a $0.5$-$\mu$m-thick gold metalization layer. The corner radii in the RF channel arising from the milling process were taken into account.
\begin{figure}[!t]
\centering
\includegraphics[width=0.95\linewidth]{figures/horn-2.pdf}
\caption{\textcolor{black}{3.5-THz diagonal horn. Top: A polar plot showing the simulated radiation pattern (H-plane) in red and blue lines shows the 3-dB angular width. Bottom: Layout of the diagonal horn antenna used for the 3D-EM model.
}}
\label{fig:horn}
\end{figure}
\begin{figure*}[!t]
\centering
\input{figures/4_VER_sens}
\caption{Robustness of the 3.5-THz, $\times$6-harmonic Schottky diode mixer. A sensitivity analysis showing the influence of the circuit design and diode model parameters listed in Table~\ref{table1}. The following parameters were assigned to the harmonic-balance simulation: RF = 3.5~THz, IF = 5~GHz, LO power = 2 dBm, RF power = \SI{-50}{dBm}, and no dc bias.}
\label{figure4}
\end{figure*}
\begin{table*}[!b]
\center
\begin{threeparttable}[b]
\caption{List of the Circuit Parameters Studied in the Sensitivity Analysis}
\label{table1}
\centering
\begin{tabularx}{\textwidth}{@{}l*{10}{C}c@{}}
\toprule
& RF waveguide width & $a$ = 2$b$ & $64$ $\mu$m \\
& RF waveguide height & $b$ & $32$ $\mu$m \\
& RF backshort & \textit{l} & $30$ $\mu$m \\
Block & RF filter channel width (top) & $a_1$ & $30$ $\mu$m \\
& RF filter channel width (bottom) & $a_2$ & $25$ $\mu$m \\
& RF filter channel height (top) & $b_1$ & $10$ $\mu$m \\
& RF filter channel height (bottom) & $b_2$ & $10$ $\mu$m \\
\midrule
& Series resistance & $R_s$ & $25$ $\Omega$ \\
Diode & Ideality factor & $\eta$ & 1.2 \\
& Schottky junction area & $S$ & 0.11~$\mu$m$^2$ \\
\midrule
GaAs substrate & Relative permittivity & $\epsilon_s$ & 12.9~~\cite{Palik1997} \\
& Substrate thickness & \textit{t} & $2$ $\mu$m \\
\bottomrule
\end{tabularx}
\end{threeparttable}
\end{table*}
The same procedure as described earlier was followed to present the LO optimum embedding impedance to the diode. Thereupon, a hammer head filter that prevents the LO signal to propagate along the IF line was designed. Both, RF and LO, channel dimensions were carefully varied such that it only allows the fundamental, quasi-transverse electromagnetic mode to propagate along the \textcolor{black}{planar circuit}. In addition, the asymmetrical GaAs substrate and the alignment pockets in the waveguide blocks facilitate a precise alignment of the GaAs membrane during the circuit assembly process. Upon optimization of the EM model, the four-port \textit{S}-parameters were imported to the circuit simulator, where the model was analyzed using a large-signal, harmonic-balance simulation with a standard diode model. Finally, the overall mixer performance was evaluated by taking into account the metal losses in the stripline and waveguide. Based on the ideal-diode model described in Section~\ref{sectionIIA} and including the 3D-EM model with parasitic effects as described above, we predict a conversion loss of about 45~dB at 3.5~THz.
The RF feedhorn is based on a standard diagonal horn design described by Johansson and Whyborn \cite{horn} and was verified using an FEM solver. A diagonal horn with an aperture size of $384$$\times$$384~\mu$m$^2$, corresponding to a flare angle of $5.4^\circ$ and length 2.05 mm as shown in Fig.~\ref{fig:horn}, resulted in a simulated directivity of about $23$~dBi. Finally, a three-section Chebyshev impedance transformer was designed to \textcolor{black}{transform the 50-$\Omega$ IF output to $150~\Omega$, which is close to the practical limit of a microstrip line on a Rogers 4003B printed circuit board.} The simulated insertion loss was less than $0.3$~dB in the frequency range from 1.5 to 7~GHz.
\subsection{Sensitivity analysis} \label{sectionIIC}
To check the robustness of the design, a sensitivity analysis was performed. The relative sensitivity coefficient \textit{$S_x^L$} is defined as the ratio of the relative change in the output to the relative change in the input variable \cite{Smith2007}:
\begin{equation}
S_x^L = \frac{\Delta L/L_0}{\Delta x/x_0}
\label{equation}
\end{equation}
where $\Delta L = L_x - L_0$ denotes the change in the conversion loss, $L_0$ the nominal conversion loss, $\Delta x$ the relative variation of the parameter in study, and $x_0$ the nominal value of the parameter.
In this analysis, the design parameters with narrow-tolerance limits and with some influence on the mixer conversion loss were taken into account and are summarized in Table~\ref{table1}. The selected variables were then increased by 10\% of their initial values. The corresponding change in the mixer conversion loss at 3.5~THz was analyzed and is shown in Fig.~\ref{figure4}. \textcolor{black}{Changing the anode area \textit{S} will scale the dc current and also the junction capacitance $C_j$}. Among the critical parameters listed above, an increase of the ideality factor $\eta$ results in a weaker non-linearity and hence a noticeable difference in the mixer conversion loss.
\subsection{Integrated-diode fabrication process}
The integrated mixer circuit \cite{siegel1999} was realized on a GaAs wafer that comprises a 650-$\mu$m-thick, semi-insulating, 3-inch GaAs substrate supporting a 2-$\mu$m-thick, semi-insulating GaAs membrane layer sandwiched between two (Al,Ga)As etch stop layers. The top (Al,Ga)As etch stop layer is followed by a $500$-nm-thick, heavily doped \textit{n}$^{++}$ buffer layer with a doping concentration of \SI{5e18}{cm^{-3}} and a $50$-nm-thick $n$-doped active layer with a doping concentration of \SI{6e17}{cm^{-3}}. All layers are grown by molecular beam epitaxy.
\begin{figure}[!b]
\centering
\includegraphics[width=0.45\textwidth,keepaspectratio]{figures/X6HM35_01.png}
\caption{Integrated mixer circuit. Scanning electron micrograph of the 3.5-THz, $\times$6-harmonic Schottky diode mixer circuit after releasing it from the supporting GaAs substrate.}
\label{figure5}
\end{figure}
Electron beam lithography was used to define each pattern. Firstly, a thin layer of SiO$_2$ is deposited on the membrane, which acts as a protective mask for the active layer during the initial process steps. Secondly, the ohmic and Schottky contacts were formed by deposition of Pd/Ge/Au/Pd/Au and Ti/Pt/Au metal layers, respectively. Next, the mesa was formed by dry etching in a silane based, inductively coupled plasma (ICP). Thereafter, the air bridge connections are formed by evaporation of a $500$-nm-thick gold layer. In the next step, diodes are isolated by a combination of selective and non-selective wet etching through the top (Al,Ga)As etch stop layer and the GaAs membrane down to the bottom (Al,Ga)As etch stop layer. Subsequently, the passive circuitry (beam leads, waveguide probes, and filter structures) are formed by evaporation of a gold film and followed by a lift-off process. Fig.~\ref{figure5} shows the integrated-diode mixer circuitry fabricated at Chalmers University of Technology. Integrated mixer circuits with three different Schottky contact areas (0.11, 0.14, and 0.17 $\mu$m$^2$) in rectangular shape were fabricated.
\begin{figure}[!b]
\centering
\includegraphics[width=0.45\textwidth]{figures/Assembly.pdf}
\caption{Mixer assembly. Optical micrograph of the assembled 3.5-THz, $\times$6-harmonic Schottky mixer showing the RF circuitry and the beam lead punched into the mixer housing that provides the dc ground. }
\label{assembly}
\end{figure}
\vspace{-0.2cm}
\subsection{Mixer housing fabrication}
The mixer was machined in an E-plane split aluminum block using a high-speed, micrometer precision CNC milling tool (KERN Evo). Four guide structures were defined on the top surface of the split block to ensure the precise alignment of the blocks during the assembly process. Care was taken to ensure that the milling tool was well aligned in the spindle using a dial indicator, and the alignment of the block to the spindle axis was calibrated. The sidewall of the mixer block that consists of a diagonal horn aperture was slanted by a $10^\circ$ angle to redirect the reflected incoming signal.
First, the large features such as the PCB cavity, the quartz carrier cavity, as well as the LO waveguide and channel were machined to avoid the risk of leaving the machined chips inside the smaller features. Then, the RF waveguide and RF channel were machined using a 20-$\mu$m end mill tool that has a tolerance of $\pm$ 2 $\mu$m. Thereafter, the RF diagonal feedhorn was machined using a $45^\circ$ chamfering milling tool of $100~\mu$m diameter. To avoid unnecessary reflections caused due to burrs along the edge of machined features, the mixer block was cleaned with an acetone and iso-propanol solution in an ultrasonic bath, etched in an aluminum bath, and, finally, sputtered with a $0.5$-$\mu$m-thick gold layer as shown in Fig.~\ref{assembly}.
\subsection{Circuit assembly}
The quartz carrier substrate and PCB were mounted using a thin layer of conductive silver epoxy glue (Epotec-H20E), which was followed by soldering the IF coaxial connector pin and wire bonding the substrate interfaces. In the next assembly step, the membrane circuit was mounted in the E-plane of the mixer split block and precisely aligned with the aid of a high-magnification (500$\times$) assembly microscope. Thereafter, the RF, dc ground, and the IF beam leads were stamped to the mechanical housing and the IF pad on the quartz carrier substrate, respectively, using a standard ceramic wedge and ultrasonic compression bonding. Finally,\textcolor{black}{the top and bottom half split blocks were aligned using mechanically integrated alignment guide structures in the housing} and tightened with screws as shown in Fig.~\ref{fig:x6hm35}.
\begin{figure}[!t]
\centering
\includegraphics[width=0.45\textwidth]{figures/Figure8_MultiplierMixer.pdf}
\caption{Mixer and LO multiplier chain assembly. Photograph of the assembled 3.5-THz, $\times$6-harmonic mixer and connected with a $600$-GHz, $\times 64$-active-frequency multiplier chain.}
\label{fig:x6hm35}
\end{figure}
\begin{figure} [!t]
\centering
\includegraphics[width=0.5\textwidth]{figures/Figure9_Measurement_Schematic.pdf}
\caption{Illustration of the mixer characterization and QCL phase-locking measurement setup.}
\label{setup}
\end{figure}
\begin{figure} [!t]
\centering
\includegraphics[width=0.5\textwidth]{figures/meas_setup.pdf}
\caption{Harmonic mixer characterisation setup. Photograph of the 3.5-THz, $\times6$-harmonic mixer characterization setup at DLR, Berlin, showing the 3.5-THz QCL in a cryocooler, $\times$6-harmonic mixer, and 600-GHz LO multiplier chain. A dc voltage was applied via a bias-tee.}
\label{setup1}
\end{figure}
\begin{figure} [!b]
\centering
\input{figures/10_LOmultiplier_pwr}
\caption{Power versus frequency. Measured output power from the $600$-GHz, $\times$64-active frequency multiplier chain. At $573$~GHz, the measured output power is approximately \SI{5.6}{dBm}.}
\label{lomulmeasurement}
\end{figure}
\section{Results and Discussion}
Two integrated circuits with Schottky contact areas of 0.11 and 0.14 $\mu$m$^2$ were assembled on mixer modules and characterized, showing similar performance \cite{DivyaIRMMW}. In this section, we will present the results of the mixer with a Schottky contact area of 0.11 $\mu$m$^2$. The experimental results are then compared to large-signal simulations, and finally, a summary of different state-of-the-art mixers available for the QCL frequency stabilization is presented.
\subsection{dc measurements}
Before the release of the integrated mixer circuit from the supporting substrate, on-wafer, four-point dc measurements were performed using an Agilent B1500A semiconductor device parameter analyzer. The diode parameters such as the dc series resistance, ideality factor, and saturation current ($R_\text{s} = 50~\Omega$, $\eta = 1.24$, $I_{\text{sat}} = 9~$fA) were determined by fitting the measurement data to the diode model as shown in Fig.~\ref{fig:IV}. To model the substrate leakage effect, a shunt resistor of about 13~G$\Omega$ was added in parallel to the diode model. The forward breakdown voltage of the diode is around 1.1~V.
\begin{figure}[h]
\centering
\input{figures/IV_compare_A11}
\caption{Diode current-voltage characteristic. Comparison of the diode model and on-wafer dc-measurements of a fabricated $\times6$-harmonic Schottky diode integrated mixer circuit with a Schottky contact area of 0.11~$\mu$m$^2$. Extracted diode parameters are as shown. The measurements were performed with Kelvin probes at room temperature (dark condition). \textcolor{black}{The applied dc-voltage was swept from $-0.9$ to +0.9~V as the maximum current was limited to 1~mA.}}
\label{fig:IV}
\end{figure}
\begin{figure*}[!t]
\centering
\includegraphics[width=\linewidth]{figures/meas_model_v3.pdf}
\caption{Conversion loss as a function of LO power and bias. (a) Measurement: Conversion loss measured at an IF of 200 MHz, an RF of 3.443 THz, and for an LO signal at 573.3 GHz. The measured RF power at the mixer interface was about \SI{-3}{dBm} and the available LO power was about 5.6 dBm at 573 GHz. At low LO powers, the measurement is affected by the noise floor of the system, while at higher powers it is limited by the maximum available LO power. (b) Simulation: Harmonic-balance simulation with an ideal-diode model assigned with parameters extracted from the dc measurements. The contour step is 3~dB.}
\label{fig:cont}
\end{figure*}
\subsection{RF characterization}
The characterization of the 3.5-THz, $\times$6-harmonic mixer was performed using the setup shown in Fig.~\ref{setup1}. \textcolor{black}{The mixer conversion loss was then determined by taking the difference between the input RF power and IF output power. Losses in the cable as well as connectors and the gain of the low noise amplifier's (LNA) were considered.}
\textcolor{black}{The absolute power measurement was carried out using a Thomas Keating power meter at the mixer interface thereby eliminating the need to de-embed the atmospheric attenuation at 3.5~THz. The THz beam from the QCL was amplitude modulated using a mechanical chopper with a frequency of 15 Hz. A TPX lens was used to focus the beam and the power meter head was aligned such that the incoming signal is incident at the Brewster angle. The frequency was determined with high precision ($<$ 1 MHz) by measuring the absorption of the QCL radiation guided through an absorption cell filled with methanol and comparing this spectrum with a reference spectrum of methanol.} The available input RF power at 3.443~THz was \SI{-3}{dBm}. The IF output power was read out from the spectrum analyzer. The input synthesizer frequency was tuned to set the LO frequency as 573.7~GHz, which resulted in a 200-MHz IF signal as shown in Fig.~\ref{fig:beat}. An SNR of 40~dB was achieved at an IF of 200~MHz as shown in Fig.~\ref{fig:beat}. The beat signal was recorded with a resolution bandwidth (RBW) of about 510~kHz and a video bandwidth of 10~kHz.
\begin{figure}[!t]
\centering
\input{figures/ADSBiasCL}
\caption{Model fit. A vertical cross section from the measurement and simulation contours presented in Fig.~\ref{fig:cont}. Conversion loss plotted versus dc bias for an LO pump power of about 5.2~dBm. A conversion null feature arising due to destructive interference is observed at 0.5 V. }
\label{ADSbias}
\end{figure}
\begin{figure} [!b]
\centering
\input{figures/13_Beatsignal}
\caption{Beat signal. The down-converted IF signal generated at 200 MHz by the 3.5-THz, $\times$6-harmonic, single-ended Schottky diode mixer. }
\label{fig:beat}
\end{figure}
\begin{table*}[!t]
\caption{\textcolor{black}{State-of-the-art mixers available for phase locking of QCLs}}
\label{table3}
\begin{tabularx}{\textwidth}{@{}l*{10}{C}c@{}}
\textbf{Frequency} & \textbf{Technology} & \textbf{Harmonic number} & \textbf{Conversion loss} & \textbf{SNR} & \textbf{Resolution bandwidth} & \textbf{Reference} \\
\toprule
\SI{2.32}{THz} & Balanced Schottky-diode mixer & $\times 21$ & $\SI{\sim 110}{dB}$ & \SI{25}{dB} & \SI{1}{kHz}& \cite{Danylov2015} \\
\midrule
\SI{2.69}{THz} & Single-ended Schottky diode mixer & $\times 4$ & \SI{30}{dB} & & & \cite{bulcha2016}\\
\midrule
\textcolor{black}{\SI{2.7}{THz}} & \textcolor{black}{Superlattice diode mixer} & \textcolor{black}{$\times 15$} & & \textcolor{black}{\SI{15}{dB}} & \textcolor{black}{\SI{3}{kHz}} & \textcolor{black}{\cite{Khosropanah2009}} \\
\midrule
\SI{3.4}{THz} & Superlattice diode mixer & $\times 18$ & $\SI{\sim 80}{dB}$ & \SI{30}{dB} & \SI{100}{kHz} & \cite{hayton2013} \\
\midrule
$\mathbf{3.5 THz}$ & \textbf{Single-ended Schottky diode mixer} & $\mathbf{\times 6}$ & $\mathbf{59~dB}$ & $\mathbf{40~dB}$ & $\mathbf{510~kHz}$ & \textbf{This work} \\
\midrule
\SI{4.7}{THz} & Cooled (10 K) superlattice diode mixer & $\times 24$ & & \SI{20}{dB} & \SI{30}{kHz} & \cite{khudchenko} \\
\bottomrule
\end{tabularx}
\end{table*}
In Fig.~\ref{fig:cont}(a), the measured conversion loss of the mixer versus available LO pump power and dc bias is illustrated as a contour plot. The 1-mA current safety limit of the diode defines the upper limit for the dc bias and LO power. The noise in the IF power measurement sets an upper limit of the measurable conversion loss of about 100~dB. A conversion loss roll-off followed by a valley and null is observed. Strong features referred to as conversion nulls appearing at specific bias points for a constant LO power is caused by destructive interference arising from mixing products \cite{Feinaugle2002}. The conversion loss saturates at approximately 59~dB for an LO power higher than 5~dBm.
To understand the mixer performance, a large-signal simulation was performed, and the results are shown in Fig.~\ref{fig:cont}(b). For this simulation, the ideal-diode model described in Section~\ref{sectionIIA} was modified to obtain a good agreement with the measurement results. In addition, a field solution was generated inside the lossy ohmic contact mesa for an accurate simulation of induced currents, which resulted in an additional loss of 5~dB \cite{Tang2011}. Finally, by assuming a loss of 8 dB on the RF side and taking into account a conductor loss of approximately 1~dB in the 11-mm-long LO WM-380 access waveguide in the mixer, we were able to reproduce the measured results of conversion loss versus bias for a constant LO power (5.2 dBm) as shown in Fig.~\ref{ADSbias}. Still, we were not able to fully reproduce the measured conversion loss versus LO power due to the strong interaction created by the large standing waves between the mixer and the last LO multiplier stage.
\textcolor{black}{The 8-dB loss on the RF side has several contributors: optical coupling loss between the QCL beam and the RF diagonal feed horn \cite{goldsmith}, and conductor loss in the waveguide}. However, we believe that a significant part of the discrepancy between model and measurement could be due to possible air gaps in the split plane of the mixer block and substrate loss in the GaAs membrane. At high LO power levels, self-heating effects will contribute to additional loss due to a rather high thermal resistance between the Schottky contact and the waveguide housing. In addition, block fabrication tolerances could result in a degradation as shown in the sensitivity analysis in Section~\ref{sectionIIC}. For instance, the relative permittivity of the GaAs membrane is a critical parameter, which is frequency dependent and expected to be slightly higher at 3.5 THz compared to the low frequency asymptote of $\epsilon_s = 12.9$ \cite{Grischkowsky}.
The results presented in this work are summarized along with other state-of-the-art technologies available for QCL frequency stabilization in Table~\ref{table3}. Although the presented 3.5-THz, $\times$6-harmonic mixer exhibits a higher conversion loss than in the model, the SNR of the IF signal is sufficient \textcolor{black}{for phase locking both 3.5-THz and 4.7 THz QCLs \cite{HeikoIRMMW}.}
\section{Conclusion}
In this paper, we have demonstrated a 3.5-THz, $\times$6-harmonic Schottky diode mixer operating at room temperature for frequency stabilization of a 3.5-THz QCL. We achieved a mixer conversion loss of about 59 dB for an IF signal of 200 MHz providing an SNR better than 40~dB which is more than sufficient to stabilize the QCL to a reference oscillator. The design can be further improved by making sure that the mixer performance is immune to the circuit and block fabrication tolerances especially on the RF side \cite{byron2021} as well as reducing the RF waveguide loss. We also observed that it is essential to optimize the diode geometry \cite{bobby} in order to reduce high-frequency losses, which contribute to the spreading series resistance. For the future, thermal management and the influence of self-heating effects on mixer performance should be addressed. The results show promising prospect for the availability of compact, uncooled, and efficient THz harmonic mixers, which opens up a plethora of opportunities for building air/space-borne heterodyne receivers with a high spectral resolution.
\section{Measurement setup}
The schematic of the harmonic mixer characterization measurement setup is shown in Fig.~\ref{setup}. The QCL developed and fabricated at Paul-Drude-Institut is based on a GaAs/AlAs heterostructure \cite{Schrottke2016}. This materials system allows for THz QCLs with a relatively high wall-plug efficiency and reduced cooling power so that operation in a compact Stirling cooler becomes feasible. For the active region, a hybrid design, which is preferred for continuous-wave operation, is employed. The design has been optimized for emission at $3.5$~THz with a sufficient frequency tuning range. The essential parameters are given in \cite{Schrottke2020}. The resonator is a Fabry-Pérot cavity based on a single-plasmon waveguide with a length of $826~\mu$m, a width of $120~\mu$m, and a height of $10~\mu$m. The QCL is placed in a compact Stirling cooler (AIM SL400) \textcolor{black}{which facilitates thermal stabilization using an internal temperature control for the cold finger inside the cryocooler and a Cernox temperature sensor mounted closely to the QCL. Typical operating temperature of the QCL is around 50 K with temperature stability of about $\pm$ 1 mK.}
A TPX lens was used to focus the incoming THz signal from the QCL onto the integrated diagonal horn of the harmonic mixer. The mixer is pumped by the LO signal generated from the $600$-GHz, $\times$64-cascaded active multiplier chain. It consists of a $\times$8 E-band active multiplier (AMC-12-RNHB1) from Millitech (Smiths Interconnect), followed by a high-power isolator (HMI12-387-69.5-5.0) from HXI, and a cascaded three-stage frequency multiplier chain \textcolor{black}{design from Omnisys Instruments based on Chalmers GaAs Schottky membrane} diode varactor doublers for monolithic microwave integrated circuits. The available output power of the $600$-GHz, $\times$64 active frequency multiplier chain at the waveguide interface was measured using an Erickson power meter (PM5). A waveguide taper transition was used to connect the LO multiplier chain and the power meter, which have WR-1.5\footnote{WR - Rectangular waveguide, the number is the waveguide width in mils multiplied by 10. (1 mils = 1/1000 inch).} and WR-10 waveguide interfaces, respectively. The measured output power from the multiplier chain is corrected for conductor losses in this transition and plotted versus frequency as shown in Fig.~\ref{lomulmeasurement}. The output power generated by the 600-GHz multiplier chain can be controlled by either detuning the bias of the multiplier stages or by reducing the input power from the frequency synthesizer.
The $6^{th}$ harmonic of the LO signal at \SI{3.4424}{THz} is combined with the QCL radiation at \SI{3.4426}{THz} to generate an IF signal at \SI{200}{MHz}. A dc voltage is applied to the mixer via a bias-tee connected to an SMA connector to allow for optimization of the IF signal power. The generated output IF signal is amplified using a low-noise amplifier operating at room temperature (Miteq AFS4 00100600-1310P-4). Finally, the amplified IF signal is detected using a spectrum analyzer. Using a power splitter, part of the signal can be used for frequency stabilization of the QCL.
\section*{Acknowledgment}
The authors wish to acknowledge Dr. E. Saenz, ESTEC, European Space Agency (ESA), Noordwijk, The Netherlands, for excellent supervision of the project and for fruitful discussions. The authors would also like to thank M. Myremark for precision machining of mixer split-blocks, Dr. J. Vukusic for his assistance with gold sputtering on the waveguide housing, Dr. K. Biermann for the growth of the QCLs, as well as W. Anders, A. Riedel, and Dr. A. Tahraoui for sample preparation.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Transactional volume facilitated by branded and domestic payment cards (credit, debit, and prepaid) amounted to \$42.274 trillion in 2019, up 4.2\% over 2018 \cite{Nilson}. Gross fraud losses on these cards reached \$28.65 billion, up 2.9\% from \$27.85 billion in 2018. This amounts to 6.5 cents on every \$100 of payment volume (or 6.5 bps). Further, LexisNexis reports that the payment card industry collectively incurs an additional \$2 for every \$1 of fraud in detection, prevention, and remediation efforts \cite{LexisNexis}. The secular trend in the growth of share of online payments, where fraud rates average 3-4$\times$ those of in-person transactions, is further accelerating these costs.
Approaches to detecting credit card fraud run the gamut of traditional machine learning techniques, including some of the earliest commercial implementations of neural networks \cite{Samaneh}. Yet the field remains active in both research and industry. This can be attributed to the adaptability of fraudsters who have the luxury of testing and learning with an abundance of cheap stolen user data \cite{ITRC} and in an online environment that is ideal for programmatic and anonymous trials. This requires the financial system to constantly update their defenses and employ novel techniques.
Adversarial learning, in which the actions of the fraudsters are explicitly modeled is a relatively new approach to payment card fraud detection. This approach incorporates an adversary’s potential strategies when attempting to improve defenses. In this report we present an adversarial fraud detection and prevention approach using reinforcement learning. We formulate a model for fraud classification from publicly available credit card fraud data and model the fraudster's actions as a Markov Decision Process (MDP). To devise the fraudster's optimal policy we will explore the application of Adaptive Stress Testing to this environment to see what it might offer.
\section{Related Work}
Most work in the area of adversarial learning in payment card fraud credits Liu and Chawla \cite{LiuChawla} as one of the earliest inspirations for this approach. In that work, the authors present a game theoretic approach to email spam detection. Spam detection shares important similarities with payment card fraud including large class imbalances, a similar amount of high-volume observations that can be generated at low cost, and the presence of malicious actors that want to fool the classifier. This work and its predecessors showed that a spam classifier that takes the adversary’s best actions into account greatly increases their model’s predictive power.
In \cite{Beling1} and \cite{Beling2} Beling's teams present a reinforcement learning approach to credit card fraud detection that includes an MDP model of fraudster decisions and an active defense by the card issuer. The authors utilize the learned adversary policy to disrupt the adversary’s learning process, altering classifier probability classification thresholds at regular intervals to effectively limit the amount of successful fraud. One drawback of their work is the artificial action and reward spaces they constructed for the fraudster. In \cite{Beling1} the entire data set is split into 3 bulk clusters using Gaussian Mixture Models and the fraudster is allowed to choose as its action a transaction from the cluster that is most profitable. In \cite{Beling2} the action space is limited to a binary choice of a low \$-amount transaction of a high \$-amount transaction. There is also no accounting for the element of time in fraud detection, which is a critical feature of any payment card fraud detection system (e.g., through the imposition of rate limits on transactions).
Recently, Lee et al. \cite{Lee} have a presented a new approach termed Adaptive Stress Testing (AST) that offers a framework for finding the most likely path to a failure event in a system modeled by an MDP. Discovering failures that are most likely to occur is an intriguing enhancement and offers a natural priority for adding incremental mitigation measures. While there is literature describing the application of AST in areas such as collision avoidance systems for air traffic control \cite{Moss} and autonomous driving \cite{Koren}, we have not found any significant literature on its use in a financial setting.
\section{Problem Statement}
Adversarial learning in fraud prevention has been shown to increase effectiveness over static models that do not account for changing fraudster behavior. Further, reinforcement learning has been demonstrated to be an effective way to learn a fraudster's attack strategy with an eye towards improving defenses. We show how the performance of a fraud detection system can be enhanced using Adaptive Stress Testing to model a fraudster's behavior and mitigating likely strategies they might employ.
\section{Approach}
Figure \ref{ASTSystem} shows the reinforcement learning model of our problem. The system represents an approver of an attempted payment card transaction (typically a card issuer). The system receives a request to authorize a payment from a merchant and classifies it as either fraud or not fraud based on learned historical patterns. The system also applies certain business rules such as limits on the number of accepted daily transactions.
\begin{figure*}[ht]
\centering
\includegraphics[scale=0.5]{ASTSystem}
\caption{Reinforcement learning model for adversarial learning of the payment card fraud detection system.}
\label{ASTSystem}
\end{figure*}
In the AST approach, the learning problem is setup to determine the path of most likely failure (fraud). The agent (fraudster) interacts with the system to learn the 'best' way to commit fraud. In fact this mimics practice closely where it is common for fraudsters to purchase batches of stolen cards test and learn where vulnerabilities are (often with low dollar transaction), and then commit high dollar fraud.
\subsection{The System: A Model for Payment Fraud Detection} \label{systemSection}
Modern payment card fraud detection systems utilize at their core a statistical classifier that is trained on historical transaction data, some of which have been reported as fraud. This will use the combined attributes of the available payment data elements to determine whether to approve or decline a payment authorization request. In addition, these systems will also incorporate business rules such as imposing hard limits on amounts of individual transactions and frequency of transacting (amongst other rules). The systems also lean toward conservatism -- at the first strong indication of potential fraud the account is generally suspended and prevented from further transacting.
In our simplified system model we define the {\bf state} to include 3 variables:
\begin{enumerate}
\item Cumulative approved transaction count on the card: this tracks the usage of the card and correlates with the age of the card.
\item Cumulative daily transaction count on the card: this is a key fraud control parameter and is generally limited to a certain number (say 10) as a stop gap against an undetected fraud run.
\item Indicator if fraud has been detected: this represents the output of the classifier. It is assumed that the first detected instance of fraud results in immediate suspension of the card.
\end{enumerate}
To train a fraud classifier we located a appropriate public dataset on Kaggle with sufficient richness and transparency for our exercise: https://www.kaggle.com/kartik2112/fraud-detection. We reduced this to a set of key payment transaction data fields which are either necessary for modeling purposes or are known (from experience) to have a strong correlation to fraud and are subject to fraudster influence: the payment account number, a merchant category index (one of 14 possible values -- see table \ref{AmtStatsTable}), the transaction amount, and the elapsed time interval since last transaction.
Finally we augment our system with a set of simple {\bf business rules} that reflect common practice:
\begin{enumerate}
\item The card is suspended at the first detection of a fraudulent transaction.
\item The card is suspended if the number of daily transactions exceeds 10 transactions.
\end{enumerate}
\begin{figure*}[ht]
\centering
\includegraphics[scale=0.45]{System}
\caption{The fraud detection system.}
\label{System}
\end{figure*}
The system is depicted graphically in Figure \ref{System}. Note that with these assumptions a fraud episode (using a single payment card) ends whenever the system detects fraud or if the fraudster performs 10 transactions in a single day.
\subsection{The AST Adversarial Model}
Now we detail the actions and rewards of the adversarial agent (fraudster) of figure \ref{ASTSystem}. Table \ref{AmtStatsTable} shows merchant categories available in our dataset and the associated statistics on overall and fraud transaction amounts.
\begin{table}[h!]
{\footnotesize
\begin{center}
\begin{tabular}
{|l||c|c|c||c|c|c||}
\hline
\multicolumn{1}{|c||}{} & \multicolumn{3}{c||}{Overall} & \multicolumn{3}{c||}{Fraud} \\ \hline
Merchant Category & Portion & \$ Mean & \$ Stdev & Portion & \$ Mean & \$ Stdev \\
\hline \hline
entertainment & 7\% & 64 & 64 & 3\% & 510 & 74 \\ \hline
food / dining & 7\% & 51 & 48 & 3\% & 122 & 14 \\ \hline
gas / transport & 10\% & 64 & 16 & 7\% & 12 & 5 \\ \hline
grocery online & 3\% & 54 & 23 & 2\% & 12 & 3 \\ \hline
grocery in person & 9\% & 116 & 52 & 23\% & 313 & 27 \\ \hline
health / fitness & 7\% & 54 & 48 & 2\% & 20 & 2 \\ \hline
home & 9\% & 58 & 48 & 3\% & 258 & 47 \\ \hline
kids / pets & 9\% & 58 & 49 & 3\% & 20 & 3 \\ \hline
misc online & 5\% & 79 & 164 & 13\% & 804 & 87 \\ \hline
misc in person & 6\% & 62 & 134 & 3\% & 193 & 316 \\ \hline
personal care & 7\% & 48 & 49 & 3\% & 26 & 12 \\ \hline
shopping online & 8\% & 83 & 237 & 24\% & 994 & 95 \\ \hline
shopping in person & 9\% & 77 & 232 & 10\% & 887 & 131 \\ \hline
travel & 3\% & 112 & 596 & 0\% & 9 & 2 \\ \hline
\end{tabular}
\caption{Comparison of overall vs fraud payment transaction statistics.}
\label{AmtStatsTable}
\end{center}}
\end{table}
The table shows that fraudsters prefer merchants such as online shopping. This is due to their convenience and the ready availability of high value fencible goods. Fraudsters generally also prefer to accumulate as much fraudulent activity in as short a time period as possible as they know detection is just a matter of time. Fraudsters also generally know the approximate age of a stolen card and therefore can choose the age of a card used in a fraud attempt. These behaviors motivate the following choice of {\bf actions}:
\begin{center}
[card age]$\times$[merchant category]$\times$[amount]$\times$[interval between transaction].
\end{center}
The form of the {\bf reward function} distinguishes AST from other reinforcement learning approaches. It is designed to find failure events as the primary objective, and maximize the path likelihood as a secondary objective \cite{Lee}. We define the following:
\begin{itemize}
\item {\bf Terminal state}: if fraud is detected or if 10 transactions are completed in a single day.
\item $E$ the {\bf event space} of interest: the fraudster is \underline{not} caught.
\item $R_E$ the {\bf reward if the fraudster is successful}: given by the total accumulated fraud amount: $ R_E = \sum_{\mbox{fraud trx}} v_k$ where $v_k$ is the amount of fraud transaction $k$.
\item $d$ the {\bf miss distance}: this represents a penalty for being caught. Through experimentation we find that setting this to a large negative constant works best.
https://www.overleaf.com/project/60b6f393891eed7268032b1f
\item $p(a | s)$ the {\bf likelihood of an action in a given state}: this is modeled from the data set by assuming independence of the action components and examining the histograms of each in the dataset where we find:
{\small
\begin{align}
p(n_{tot} = \mbox{total card trx}) & \sim \mbox{exp}(\lambda=1/(390 \mbox { trx})) \nonumber \\
p(m = \mbox{merch categ}) & \sim \mbox{as in column "Fraud - Portion" of table \ref{AmtStatsTable}} & \nonumber \\
p(v = \mbox{amount} | m) & \sim \mathcal{N}(\mu_i, \sigma^2_i) \quad \mbox{per table \ref{AmtStatsTable}}, & i \in \mbox{\texttt{enum}(merch categ)} \nonumber \\
p(\delta_i = \mbox{interval} | m) & \sim \mathcal{N}(\mu'_i, \sigma'^2_i) \quad \mbox{similar to table \ref{AmtStatsTable} but not shown}, & i \in \mbox{\texttt{enum}(merch categ)} \nonumber \\
\Rightarrow p(a | s) & = p(n_{tot}) \cdot p(m) \cdot p(v_i | m) \cdot p(\delta_i | m) &
\label{psgivenaEq}
\end{align}}
\end{itemize}
With these the reward function is given by
\begin{align}
r(s, a) & = \left\{ \begin{array}{ll}
R_E & \mbox{if } s \mbox{ is terminal and } s \in E \\
-d & \mbox{if } s \mbox{ is terminal and } s \notin E \\
\log(p(a | s)) & \mbox{otherwise}
\end{array} \right.
\label{rewardEq}
\end{align}
To reflect the strong preference of fraudsters for quick profit we employ a discount factor that strongly discounts fraud that takes more than a day to collect. Thus we assume a daily $\gamma = 0.2$.
\section{Experiments}
\subsection{Fraud Classifier}
The dataset comprises approximately 1.2 million training transactions across several thousand accounts, and an approximately 500,000 transaction test set, both with fraud rates under 0.4\%. This represents a highly imbalanced dataset. We utilize the synthetic minority oversampling technique (SMOTE) to mitigate this \cite{Chawla}, \cite{Pozzolo}. We first oversample the fraud transactions in our dataset to where they form 10\% of the samples, then create additional synthetic data such that our final training set is 1/3 fraud and 2/3 non-fraud. This approach helps to improve the classifier’s predictive capabilities \cite{Brownlee}.
For simplicity and transparency, we chose to use a logistic regression model with the limited features detailed in section \ref{systemSection} as our classifier. With this classifier we get the following confusion matrix on our validation dataset:
\begin{itemize}
\item Accuracy: 96.8\% -- these are transactions correctly identified as either fraud or not fraud.
\item Decline rate: 3.85\% -- these are good transactions mis-identified as potential fraud and erroneously declined and represent missed revenue for merchants.
\item Uncaught fraud rate: 0.1\% -- these are fraudulent transactions not caught by the classifier. Of the attempted fraud this represents about 26\% (meaning the classifier catches about 3/4 of attempted fraud).
\end{itemize}
Note that the above values are in line with commercial fraud detection performance.
\subsection{AST Experiments}
We employ algorithm (\ref{alg:AST}) to estimate the Q function associated with this reinforcement learning environment.
\begin{algorithm}[t]
\caption{AST $Q$-learning}
\centering
\label{alg:AST}
\begin{algorithmic}[1]
\Require Action space $\mathcal{A}=$[card age] $\times$ [merch. categ.] $\times$ [amount]$\times$[interval bet transactions], action selection rule $\pi(\cdot; \cdot) \sim U[\mathcal{A}]$, step size $\alpha \in (0,1]$, max daily transactions $T = 10$
\State Initialize $Q(s,a)$ for all $s \in \mathcal{S}, a \in \mathcal{A}$
\For{each episode, $n = 0, \ldots, N$}
\State Initialize the state, $s_0$: agent randomly selects a new or old payment card account to use, daily transactions are set to 0, and the fraud indicator set to 0.
\For{$t = 0, \ldots, T$}
\State $a_t \gets \pi(s_t; Q)$
\State Determine $\log p(s_t | a)$ according to equation (\ref{psgivenaEq})
\State Classify the resultant payment transaction as fraud / no fraud
\State Determine reward $r_t$ according to equation (\ref{rewardEq})
\State Observe next state $x_{t+1}$
\State $Q(x_t,a_t) \gets Q(x_t,a_t) + \alpha (r_t + \gamma \min_{a' \in \mathcal{A}} Q(x_{t+1},a') - Q(x_t,a_t))$
\EndFor
\EndFor
\end{algorithmic}
\end{algorithm}
For our first experiment we discretize the action space as
\begin{itemize}
\item Initial card total transactions: \{10 (new card), 500 (slightly over average age card)\}.
\item Merchant categories: \{entertainment, shopping online, shopping in person\}. These are chosen due to their affinity to fraud activity (fencible products, potential for high \$ ticket items)
\item Amounts: \{\$10, \$100, \$1,000\}
\item Intervals between transactions: \{1 min, 50 min, 150 min\} (all same day transactions)
\end{itemize}
This represents an action space of size $|\mathcal{A}| = 54$. Figure \ref{Qconvergence2} shows the convergence of the $Q$ function as measured by the Frobenius norm of the change over iterations. The resultant most likely fraud path from the learned policy is as shown in Table \ref{policy1}.
\begin{figure*}[ht]
\centering
\includegraphics[scale=0.25]{Qlearning_convergenceSet2.pdf}
\caption{Convergence of the $Q$-function for experiment 1.}
\label{Qconvergence2}
\end{figure*}
\begin{table}[h!]
{\footnotesize
\begin{center}
\begin{tabular}
{|r||l|r|r||l|r|r||}
\hline
\multicolumn{1}{|c||}{} & \multicolumn{3}{c||}{New Card} & \multicolumn{3}{c||}{Middle Age Card} \\ \hline
Daily tran & Category & \$ Amount & Int. (min) & Category & \$ Amount & Int. (min) \\
\hline \hline
1 & Entertainment & 100 & 150 & Shopping online & 100 & 50 \\ \hline
2 & Shopping online & 100 & 150 & Shopping online & 100 & 150 \\ \hline
3 & Shopping online & 100 & 1 & Shopping online & 100 & 50 \\ \hline
4 & Shopping online & 100 & 1 & Shopping online & 100 & 150 \\ \hline
5 & Shopping online & 100 & 1 & Shopping online & 100 & 1 \\ \hline
6 & Shopping online & 100 & 1 & Shopping online & 100 & 50 \\ \hline
7 & Shopping in person & 100 & 50 & Shopping online & 100 & 1 \\ \hline
8 & Shopping in person & 100 & 1 & Shopping online & 100 & 50 \\ \hline
9 & Shopping in person & 100 & 50 & Shopping online & 100 & 150 \\ \hline
10 & Entertainment & 100 & 150 & Entertainment & 100 & 150 \\ \hline
\end{tabular}
\caption{AST most likely fraud path detected for the first experiment (no new business rules).}
\label{policy1}
\end{center} }
\end{table}
Inspection of the results reveals that the fraudster will always revert to a moderate size transaction amount (\$100) and mostly use the online shopping channel. There is a diverse range of intervals utilized. We might intuit from this that the fraud classifier does a good job of detecting "typical" fraud such as large amount transactions. But if a fraudster chose to pursue a repetitive moderate amount transaction strategy the system may not catch it.
It is difficult to modify or shape the logistic regression classifier behavior to attempt to mitigate this fraud strategy. But the business rules are well equipped to handle this. A rule can be added to monitor for long successions of similar transaction sizes. In fact we do this and re-run the experiment and obtain the most likely path strategy of Table \ref{policy2}. Most notably here we see the fraudster must modify the transaction amounts in this case.
\begin{table}[h!]
{\footnotesize
\begin{center}
\begin{tabular}
{|r||l|r|r||l|r|r||}
\hline
\multicolumn{1}{|c||}{} & \multicolumn{3}{c||}{New Card} & \multicolumn{3}{c||}{Middle Age Card} \\ \hline
Daily tran & Category & \$ Amount & Int. (min) & Category & \$ Amount & Int. (min) \\
\hline \hline
1 & Shopping in person & 100 & 150 & Shopping online & 100 & 50 \\ \hline
2 & Shopping online & 1,000 & 150 & Shopping in person & 100 & 150 \\ \hline
3 & Shopping online & 1,000 & 1 & Shopping online & 1,000 & 50 \\ \hline
4 & Entertainment & 1,000 & 1 & Shopping online & 1,000 & 150 \\ \hline
5 & Shopping online & 100 & 1 & Shopping online & 100 & 1 \\ \hline
6 & Shopping online & 1,000 & 50 & Shopping online & 1,000 & 50 \\ \hline
7 & Shopping in person & 100 & 1 & Shopping in person & 100 & 1 \\ \hline
8 & Entertainment & 1,000 & 1 & Shopping online & 100 & 50 \\ \hline
9 & Entertainment & 100 & 150 & Entertainment & 100 & 150 \\ \hline
10 & Shopping in person & 100 & 150 & Entertainment & 1,000 & 150 \\ \hline
\end{tabular}
\caption{AST most likely fraud path detected for the second experiment with rule preventing lengthy successions of similar transaction amounts.}
\vspace{-0.25in}
\label{policy2}
\end{center} }
\end{table}
This second experiment also plants the seed for subsequent study, namely utilizing this framework in an interactive game setting where the fraudster develops a strategy, the system mitigates it, and iterations continue until a more refined fraud detection system is developed.
\vspace{-0.05in}
\section{Conclusions and Future Work}
In this report our contributions include:
\begin{itemize}
\item Casting the Adaptive Stress Testing paradigm as an adversarial learning problem for payment card fraud detection.
\item Creating a simple but realistic payment card fraud detection system that incorporates a statistical classifier and a set of business rules to mitigate fraud and that resembles systems used in practice by card issuers.
\item Showing the most likely fraud path as a sequence of actions that can be taken by a fraudster to maximize their profit and providing an intuitive explanation why it works.
\item Modifying the fraud detection system through the addition of a business rule to prevent the identified strategy and showing that it results in a change in fraudster strategy.
\item Motivating continued study of the use of AST in an interactive game-like setting between the system and fraudster to fine-tune the system's performance.
\end{itemize}
Future work would mainly revolve around exploring the interactive game-setting implementation of this adversarial learning approach. Some areas of specific investigation might include: what is a process for automating a business rule in response to a fraud strategy, and how to we protect against unintended consequences of new business rules. Also, the fraud classifier is ripe for additional sophistication utilizing more data fields and features and more powerful models such as a neural network.
|
\section{Introduction}
In this paper we are concerned with stochastic particle systems on $\mathbb{R}^d\, (d\geq 2)$ with moderate interaction (in the sense of \cite{Oel85, MRC87}) and the so-called \emph{environmental noise}: for any $N\in \mathbb{N}$,
\begin{equation}\label{IPS-0}
{\rm d} X_t^{N,i} = \frac{1}{N}\sum_{j=1}^{N} \big(K\ast V^N \big) \big( X_t^{N,i}- X_t^{N,j} \big)\, {\rm d} t + {\rm d} W\big(t, X_t^{N,i} \big), \quad 1\leq i\leq N,
\end{equation}
where $K$ is a (suitably smoothed) interaction kernel, $V^N$ is some convolution kernel to be specified later and $W(t,x)$ is a space-time noise, white in time and colored in space, modeling some random environment in which the particles are embedded. As a comparison, let us recall that the classical mean field stochastic particle system reads as
\begin{equation}\label{IPS-1}
{\rm d} X_t^{N,i} = \frac{1}{N}\sum_{j=1, j\neq i}^{N} K\big( X_t^{N,i}- X_t^{N,j} \big)\,{\rm d} t + {\rm d} W^i_t,\quad 1\leq i\leq N,
\end{equation}
where $\{W^i_\cdot\}_{i\geq 1}$ is a family of mutually independent standard Brownian motions on $\mathbb{R}^d$. The motivation for considering particle systems with environmental noise comes from Lagrangian point vortex formulation of stochastic Euler equations, see \cite[p.1450]{FGP11} for a heuristic argument. It was stated in the fourth paragraph of \cite[p.1425]{FHM14} that noises on close point vortices should be quite correlated, a fact that might be modeled by environmental noises with suitable spatial covariance. We mention that there are also lots of studies on mean field games with common noise, i.e. there is a common (multiplicative) Brownian noise (independent of $\{W^i\}_{i\geq 1}$) in each equation of \eqref{IPS-1}, see \cite{CDL16, CD18} for systematic treatments. Particle systems with environmental noise (and mean field interaction) have been studied in some recent works under various conditions (see e.g. \cite{CF16, CM20, RM20}); in these papers, however, the noise part was not rescaled with respect to the number of particles and thus the limit equations of empirical measures are stochastic partial differential equations (SPDEs), unlike in the classical case \eqref{IPS-1} where the limit equations are deterministic. Recently, it was shown that some SPDEs with multiplicative noise of transport type, under a suitable scaling of the noise, converge to limit equations with an extra viscous part, see \cite{FL20} for the vorticity form of stochastic 2D Euler equations and \cite{G20} for stochastic linear transport equations. Such ideas have been adapted in \cite{FL21} to the stochastic point vortex system with suitably rescaled environmental noise, showing that the weak limits of empirical measures satisfy the deterministic 2D Navier-Stokes equation; cf. \cite{FL19, FL21a} for scaling limits different from the mean field regime. Our purpose is to seek for a certain rescaling of the noise in \eqref{IPS-0} and prove, for some singular interaction kernels (including the Biot-Savart and repulsive Poisson kernels), strong convergence of mollified empirical measures to solutions of deterministic nonlinear Fokker-Planck equations.
Before stating our hypotheses and main results, we briefly recall some facts on interacting particle systems \eqref{IPS-1} which are widely used to model various phenomena in natural and social sciences. As the number of particles in a system is usually very large, one tries to derive macroscopic equations by studying the limit behavior of empirical measures, often described by some nonlinear PDEs. In the case of Lipschitz interaction kernel, the coupling method was popularized in \cite{Sznitman91} to show the mean field limit and propagation of chaos, namely, particles become independent of each other in the limit. A well known example of singular interaction kernel is the Biot-Savart kernel for point vortices, in which case the limit equation is the vorticity form of 2D Navier-Stokes equation, see e.g. \cite{Osada, Mel00, FHM14}. For particle systems related to other singular kernels, one can refer to \cite{Sznitman86, BT97} for Burgers equation, to \cite{CP16, FJ17, BJW19} for the Keller-Segel model on chemotaxis. In the case of singular interactions, it is often difficult to get quantitative convergence rates of empirical measures, but there are some remarkable progresses in recent years, see for instances \cite{Ser17, JW18, Ser20}. The large deviation principle was proved in \cite{LW20} for the empirical measures, and the long time behavior of the kinetic Fokker-Planck equation with mean field interaction was studied in \cite{GLWZ21}. We refer to the survey \cite{JW17} for more literatures on mean field limits.
Since its introduction by Oelschl\"ager \cite{Oel85}, particle systems with moderate interaction
$${\rm d} X_t^{N,i} = \frac{1}{N}\sum_{j=1}^{N} \big(K\ast V^N \big)\big( X_t^{N,i}- X_t^{N,j} \big)\,{\rm d} t + {\rm d} W^i_t,\quad 1\leq i\leq N$$
have also attracted lots of attention, see e.g. \cite{MRC87, Oel89, Jourdain98, JM98}. In the recent paper \cite{FLO19}, Flandoli et al. developed a semigroup approach which enables them to show uniform convergence of mollified empirical measures; see \cite{FlLeo19, FOS20, ORT20a, ORT20b} for further applications of this method. In particular, Flandoli et al. \cite{FOS20} considered the moderately interacting point vortex system with a cut-off:
\begin{equation}\label{IPS-2}
{\rm d} X_t^{N,i} = F_A\bigg(\frac{1}{N}\sum_{j=1}^{N} \big(K\ast V^N \big)\big( X_t^{N,i}- X_t^{N,j} \big) \bigg)\,{\rm d} t + {\rm d} W^i_t,\quad 1\leq i\leq N,
\end{equation}
where $K$ is now the Biot-Savart kernel and $F_A:\mathbb{R}^2\to \mathbb{R}^2,\, x\mapsto (f_A(x_1), f_A(x_2))$ is a smooth cut-off with threshold $A>0$, and they proved that the smoothed empirical measures converge uniformly to the unique solution of 2D Navier-Stokes equation in vorticity form. Thanks to explicit estimate on solutions to the limit equation, the cut-off does not appear in the limit by choosing a sufficiently large $A>0$. This result was greatly improved in \cite{ORT20b} for singularly interacting particle systems with cut-off, providing quantitative convergence rates.
In the present work, we consider moderately interacting particle systems with singular kernel $K$ and environmental noise $W_N$:
\begin{equation}\label{IPS-3}
{\rm d} X_t^{N,i} = \frac{1}{N}\sum_{j=1}^{N} \big(K_\epsilon \ast V^N \big) \big( X_t^{N,i}- X_t^{N,j} \big)\, {\rm d} t + {\rm d} W_N\big(t, X_t^{N,i} \big), \quad 1\leq i\leq N,
\end{equation}
where $K_\epsilon= K\ast \rho_\epsilon$ for some smoothing kernel $\rho_\epsilon$, and we have written $W_N$ to indicate that the noise will be rescaled along with the number of particles. There are two main differences from \eqref{IPS-2}: the noise in the above system is of environmental type, and the cut-off $F_A$ in the interaction part is replaced by convolution with $\rho_\epsilon$ (see Remark \ref{rem-conv-kernels} below for some comments on the latter). As in \cite{FL21}, for particle systems \eqref{IPS-3} with environmental noise, one difficulty is to show that the noise parts in the equations of empirical measures vanish as $N\to \infty$, a fact that follows easily in the case of independent Brownian noises as in \eqref{IPS-2}. To overcome this difficulty (see Lemma \ref{convratelemma}), we shall make nontrivial use of estimates on Boltzmann entropy obtained in Lemma \ref{upperbound}, where in the proof we need to compute the divergence of the drift vector field corresponding to the interaction part, and it seems difficult to get useful estimates for the cut-off in \eqref{IPS-2}.
\subsection{The precise model}
We first give a more precise form of the noise in the particle system \eqref{IPS-3}. Throughout the paper we assume that the noise $W_N(t,x)$ is white in time, spatially homogeneous and divergence free; define its covariance matrix as
$$Q_N(x-y) = \mathbb{E}[W_N(1,x)\otimes W_N(1,y)],\quad x,y\in \mathbb{R}^d. $$
By general arguments (cf. \cite[Section 1]{LJR02}), there exist (possibly infinitely many) divergence free vector fields $\{\sigma^N_k \}_{k\geq 1}$ on $\mathbb{R}^d$, such that
$$Q_N(x-y)= \sum_k \sigma^N_k(x) \otimes \sigma^N_k(y). $$
We shall assume that $Q_N\in C_b^{2+\delta}(\mathbb{R}^d, \mathbb{R}^{d\times d})$ for some $\delta>0$, then it is not difficult to see that $\sum_k \|\sigma^N_k \|_{C_b^{1+\delta/2}}^2<+\infty$; cf. \cite[Section 2.1]{CF16} for some related discussions. Taking a sequence of independent standard Brownian motions $\{W^k \}_{k\geq 1}$ on some filtered probability space $(\Omega, \mathcal{F}, (\mathcal{F}_t), \mathbb{P})$, we can represent $W_N(t,x)$ as
$$W_N(t,x) = \sum_k \sigma^N_k(x) W^k_t. $$
The above series converge in the mean square sense, locally uniformly in $(t,x)$. Therefore, the stochastic particle system we consider has the precise form: for $1\leq i\leq N$,
\begin{equation}\label{IPS}
{\rm d} X_t^{N,i} = \frac{1}{N}\sum_{j=1}^{N} \big(K_\epsilon \ast V^N \big) \big( X_t^{N,i}- X_t^{N,j} \big)\, {\rm d} t + \sum_k \sigma^N_k \big( X_t^{N,i} \big) \,{\rm d} W^k_t, \quad X_0^{N,i} = X^i_0,
\end{equation}
where $\{X^i_0\}_{i\geq 1}$ is a family of $\mathcal{F}_0$-measurable i.i.d. random variables on $\mathbb{R}^d$. The equation \eqref{IPS} can also be written in the Stratonovich form which coincides with the It\^o form. Thanks to the convolution, the drift coefficient in \eqref{IPS} is smooth with bounded derivatives; this plus the regularity assumptions on the diffusion coefficients implies that the above system generates a stochastic flow of diffeomorphisms on $\mathbb{R}^d$, see \cite[Section 4.6]{Kunita90} and Lemma \ref{density} below for more information on the flow.
As usual, we denote the empirical measure by
\begin{equation*
S_{t}^{N}=\frac{1}{N} \sum_{i=1}^{N} \delta_{X_{t}^{N, i}},
\end{equation*}
and rewrite \eqref{IPS} in the following more compact form: for $1\leq i\leq N$,
\begin{equation}\label{compactform}
{\rm d} X_{t}^{N,i}= \big(K_{\epsilon}\ast V^N\ast S_t^N\big)\big(X_t^{N,i} \big)\, {\rm d} t +\sum_k \sigma^N_k \big(X_{t}^{N,i} \big)\, {\rm d} W_t^k, \quad X_0^{N,i} = X^i_0.
\end{equation}
We will study the mollified empirical measure $\omega_{t}^{N}$ defined as
\begin{equation}\label{mollifiedmeasure}
\omega_{t}^{N}(x):=\left(V^{N}\ast S_{t}^{N}\right)(x)=\int_{\mathbb{R}^d} V^N(x-y)\, {\rm d} S_{t}^{N}(y).
\end{equation}
Under suitable hypotheses on the interaction kernel $K$, on the convolution kernels $\rho_\epsilon, V^N$ and on the covariance function $Q_N$, we will prove that $\omega^N_{\cdot}$ converges, as $N\rightarrow\infty$, in some strong norm to the unique (local) solution of the deterministic nonlinear Fokker-Planck equation:
\begin{equation}\label{PDE}
\left\{\begin{array}{l}
\partial_{t} \omega+ \nabla\cdot ((K \ast \omega) \omega)=\nu \Delta \omega,\\
\omega(0, \cdot)=\omega_{0}(\cdot),
\end{array}\right.
\end{equation}
where $\nu>0$ is a constant and $\omega_0:\mathbb{R}^d\to \mathbb{R}$ is some function. The solution of this equation is understood as follows: given $\omega_0\in L^1\cap L^p(\mathbb{R}^d)$, a function $\omega: [0,T]\times \mathbb{R}^d\to \mathbb{R}$ is called a mild solution of \eqref{PDE} if $\omega \in C\big([0,T], L^1\cap L^p(\mathbb{R}^d)\big)$ and the following identity holds:
\begin{equation}\label{omegat}
\omega_t = e^{\nu t\Delta}\omega_0 - \int_0^t \nabla \cdot e^{\nu (t-s)\Delta} ((K \ast \omega_s) \omega_s)\,{\rm d} s, \quad t\in [0,T].
\end{equation}
Here $\{e^{\nu t\Delta} \}_{t\geq 0}$ is the heat semigroup generated by $\nu \Delta$, see Section \ref{notationsandlemma} below for more details.
\subsection{Hypotheses and main result}
We first state our hypotheses on the interaction kernel $K$. For any $R>0$, denote by $B(R)$ the closed ball in $\mathbb{R}^d$ centered at the origin with radius $R$ and $B(R)^c$ its complement.
\begin{hypothesis}\label{hypothesis0}
We assume that the kernel $K:\mathbb{R}^d \to \mathbb{R}^d$ is smooth away from the origin, with the following properties:
\begin{itemize}
\item[1.] there exists $p>2$ such that $K\in L^{p^{\prime}}(B(1))$, where $p^{\prime}$ is the conjugate number of $p$;
\item[2.] $K\in L^{\infty}(B(1)^{c})$;
\item[3.] The divergence of $K$ is nonnegative in the sense of distribution, namely $\nabla\cdot K \geq 0$.
\end{itemize}
\end{hypothesis}
\begin{example}\label{exa-intera-kernels}
Here are some examples of kernels satisfying the above conditions.
\begin{itemize}
\item The Biot-Savart kernel $K(x)= \frac1{2\pi} \frac{x^\perp}{|x|^2}$ where $x^\perp =(-x_2, x_1)$ for any $x\in \mathbb{R}^2\setminus \{0\}$.
\item The repulsive Poisson kernel $K(x)= C_d \frac{x}{|x|^d},\, x\in \mathbb{R}^d\setminus \{0\}$, where $C_d>0$. Note that the first condition holds with $p>d$ and $\nabla\cdot K(x) = C_d^{\prime}\delta_0$, where $C_d^{\prime}>0$ and $\delta_0$ is the Dirac delta mass at the origin.
\item More generally, let $K(x) = \nabla V_s(x)$, where
$$V_s(x) = \begin{cases}
-|x|^{-s}, & s\in (0,d), \\
\log |x|, & s=0,
\end{cases} \quad x\in \mathbb{R}^d\setminus \{0\} $$
is the Riesz potential. In order that the conditions are fulfilled, we need $s\in [0,d-2]$ and $p>s+2$. When $s=d-2$, it reduces to the repulsive Poisson kernel; when $0<s<d-2$, $\nabla\cdot K(x)=C_{s,d}\frac{1}{|x|^{s+2}}$ for some constant $C_{s,d}>0$.
\end{itemize}
\end{example}
Next we give the conditions on the convolution kernels and the covariance functions $Q_N$. We write $I_d$ for the $d$-dimensional identity matrix. Throughout the paper, we fix a parameter $m>2$.
\begin{hypothesis}\label{hypothesis}
\begin{itemize}
\item[1.] We define the regularized kernel $K_{\epsilon}:=K\ast \rho_{\epsilon}$ with mollifier $\rho_{\epsilon}(x)= \epsilon^{-d}\rho(\epsilon^{-1} x)$, where $\epsilon>0$ and $\rho\in C_c^{\infty}(\mathbb{R}^d,\mathbb{R}_{+})$ is a probability density.
\item[2.] The interaction potential $V^N(x)=N^{d\beta}V(N^{\beta}x)$, where $V\in C_c^{\infty}(\mathbb{R}^d,\mathbb{R}_{+})$ is a probability density and $\beta$ is taken as \begin{equation}\label{hypobetarange}
0<\beta\leq \frac{1}{4m(d+2)}.
\end{equation}
\item[3.] The covariance functions $Q_N\in C_b^{2+\delta}(\mathbb{R}^d, \mathbb{R}^{d\times d})$ satisfy that $Q_N(0) = 2\nu I_d$ for some $\nu>0$, and $Q_N$ corresponds to divergence free vector fields; moreover, for any $r\geq 2$, there exists $C_r>0$ such that $\|Q_N \|^r_{L^r} \leq C_r e^{-2N}$ for any $N\geq 1$.
\end{itemize}
\end{hypothesis}
\begin{remark}\label{rem-conv-kernels}
Here are some comments on the above hypotheses.
\begin{itemize}
\item We need to regularize the singular interaction kernel $K$ by convolution since, in the proof of the main result via the semigroup method, quantities like $\|K_\epsilon \|_\infty$ and $\|\nabla K_\epsilon \|_\infty$ will appear, see e.g. \eqref{kg} and \eqref{kk}. That is also the reason why a cut-off as in \eqref{IPS-2} has been introduced in \cite{FOS20, ORT20b}.
\item The presence of potential $V^N$ is the main feature of moderate interaction; actually, the range of $\beta$ can be slightly larger than \eqref{hypobetarange}; see Remark \ref{betarange} for more details.
\item The last condition on the covariance matrix function may look strange at first sight; it will be used in the proof of Lemma \ref{convratelemma} where we need rapid decrease of $\|Q_N \|_{L^r}$ to cancel certain quantities. Heuristically, we require that the random external force $W_N(t,x)$ has constant trace and exponentially vanishing covariance. We shall give in Section \ref{sectionnoise} an example of such covariance functions in terms of the Kraichnan noise.
\end{itemize}
\end{remark}
Finally we present the assumptions concerning the initial particles $X^{i}_0,\, i\geq 1$. Recall the definition of mollified empirical measure in \eqref{mollifiedmeasure}.
\begin{hypothesis}\label{hypothesis-initial}
\begin{itemize}
\item[1.] Let $\{X^i_0 \}_{i\geq 1}$ be a family of i.i.d. random variables on $\mathbb{R}^d$ with finite moment of order $m(d+1)$ and common density function $\omega_0 \in L^1\cap L^p(\mathbb{R}^d,\mathbb{R}_+)$, where $p>2$ is the same as in Hypothese \ref{hypothesis0}.
\item[2.] Assume $\omega^N_0$ converges to $\omega_0$ with rate $\zeta_N$, i.e
$$\zeta_N:=\big\|\omega^N_0 - \omega_0 \big\|_{L^m(\Omega, L^1\cap L^p)} \rightarrow 0 \quad\text{as}\quad N \rightarrow\infty. $$
\end{itemize}
\end{hypothesis}
\begin{remark}\label{rem-initial}
\begin{itemize}
\item The first condition in Hypotheses \ref{hypothesis-initial} implies, together with the range of $\beta$ in Hypotheses \ref{hypothesis}, that $\{\omega^N_0 \}_{N\geq 1}$ is uniformly bounded in $L^m(\Omega, L^{1}\cap L^{p})$. Indeed, by Sobolev embedding $H^{d(\frac{1}{2}-\frac{1}{p}),2}(\mathbb{R}^d)\subset L^p(\mathbb{R}^d)$, it suffices to show that $\{\omega^N_0 \}_{N\geq 1}$ is uniformly bounded in $L^m\big(\Omega, H^{d(\frac{1}{2}-\frac{1}{p}),2}\big)$; a proof of the latter can be found in \cite[Lemma 6]{FlLeo19} in the special case $\omega_{0}\in C^{\infty}_c(\mathbb{R}^d)$. We shall give in Appendix \ref{boundomega0} a sketched proof for $\omega_0\in L^1\cap L^p$ and $m\leq p =3$.
\item If $\omega_0 \in C_c^1(\mathbb{R}^d)$, then one can prove that $\zeta_N\leq CN^{-\lambda}$ for some $C>0$ and $\lambda>0$. We show such an estimate in the special case $m=p=4$, see Appendix \ref{boundomega0omega}.
\end{itemize}
\end{remark}
Before stating our main result, we remark that, for general interaction kernel as in Hypotheses \ref{hypothesis0}, the limit equation \eqref{PDE} may not have a global solution; however, thanks to the first two conditions in Hypotheses \ref{hypothesis0}, local existence is guaranteed by \cite[Proposition 1.2]{ORT20b}. We shall denote by $T_{max}$ the maximal time of existence of mild solution to \eqref{PDE}.
\begin{theorem}\label{thm-main}
Assume Hypotheses \ref{hypothesis0}, \ref{hypothesis} and \ref{hypothesis-initial}, and take
$$\epsilon = \epsilon(N) \sim \big[(\log N)\wedge (-\log \zeta_N)\big]^{-\frac{p^{\prime}}{2d}}.$$
Then for any $T\in (0,T_{max})$, we have
$$\lim_{N\to \infty} \bigg\| \sup_{t\in [0,T]} \big\| \omega^N_t - \omega_t \big\|_{L^1\cap L^p} \bigg\|_{L^m(\Omega)} =0. $$
\end{theorem}
Unfortunately, we are unable to get a polynomial convergence rate as in \cite[Theorem 1.3]{ORT20b}, even if we assume such a convergence rate for the initial data as in the second item of Remark \ref{rem-initial}. The reason is that we shall actually prove the result in two steps: firstly, prove that the mollified empirical measures $\omega^N$, for $\epsilon= \epsilon(N)$ chosen above, are close to the solution of the nonlinear Fokker-Planck equation with smooth kernel:
\begin{equation}\label{PDE-eps}
\left\{\begin{array}{l}
\partial_t \omega^\epsilon+ \nabla\cdot ((K_\epsilon \ast \omega^\epsilon) \omega^\epsilon)=\nu \Delta \omega^\epsilon,\\
\omega^\epsilon(0, \cdot)=\omega_0(\cdot);
\end{array}\right.
\end{equation}
secondly, prove that the solution $\omega^\epsilon$ tends to that of \eqref{PDE} as $\epsilon \to 0$. The convergence rate of the second step is very slow due to the choice of $\epsilon(N)$.
We close this introduction with the structure of the paper. In Section \ref{sectionpreparations} we make some necessary preparations for the proof of Theorem \ref{thm-main}; in particular, the estimate on Boltzmann entropy in Section \ref{sectionentropy} will play an important role in the sequel. Section \ref{sectioncovariance} contains a key estimate on the covariance of random forces on two different particles. Then, we will prove Theorem \ref{thm-main} in Section \ref{sec-proof-main-thm} by following some ideas of the proof of \cite[Theorem 1.3]{ORT20b}. Finally, we provide in the appendices the estimates on stochastic convolutions which are more complex than those in \cite[Section A.2]{ORT20b}, and some estimates on $\omega^N_0$.
\section{Preparations}\label{sectionpreparations}
We introduce some notations and a generalized Gr\"{o}nwall lemma in Section \ref{notationsandlemma}, then we give in Section \ref{sectionnoise} an example of covariance functions of the noises in \eqref{IPS}; Section \ref{sectionkernel} contains some properties of the regularized interaction kernel; finally, the Boltzmann entropy is introduced in Section \ref{sectionentropy}, together with some useful bounds.
\subsection{Functional setting and a Gr\"{o}nwall lemma}\label{notationsandlemma}
We define the operator:
$$A: \mathcal{D}(A) \subset L^{p}(\mathbb{R}^d) \rightarrow L^{p}(\mathbb{R}^d)$$
as $Af:=\nu \Delta f$, which is the infinitesimal generator of the heat semigroup $\{e^{tA}\}_{t\geq 0}$: for any $f\in L^{p}(\mathbb{R}^d)$,
\begin{equation}\label{semigroup}
\begin{aligned}
\left(e^{t A} f\right)(x)=&\,\int_{\mathbb{R}^d}g_t(x-y)f(y){\rm d} y,
\end{aligned}
\end{equation}
where
\begin{equation*}
\begin{aligned}
g_t(x-y):=\frac{1}{(4 \nu \pi t)^{\frac{d}{2}}} e^{-\frac{|x-y|^{2} }{4 \nu t}}.
\end{aligned}
\end{equation*}
For any $r\in\mathbb{R}$, the Bessel potential operator is given by $(\mathrm{I}-A)^{r/2}$ where $\mathrm{I}$ is the identity operator. The domain of this operator $\mathcal{D}\left((\mathrm{I}-A)^{r / 2}\right)$ is called the Bessel potential space
$$
H^{r, p}\big(\mathbb{R}^{d}\big):=\left\{f \in \mathcal{S}^{\prime}\big(\mathbb{R}^{d}\big): \mathcal{F}^{-1}\left[\left(1+|\cdot|^{2}\right)^{\frac{r}{2}} \mathcal{F} f\right] \in L^{p}\big(\mathbb{R}^{d}\big)\right\},
$$
where $\mathcal{S}^{\prime} \big(\mathbb{R}^{d}\big)$ denotes the space of tempered distributions and $\mathcal{F} f$ is the Fourier transform of $f$. The norm in this space is
$$
\|f \|_{r, p}=\left\|\mathcal{F}^{-1}\left[\left(1+|\cdot|^{2}\right)^{\frac{r }{2}} \mathcal{F} f (\cdot)\right]\right\|_{L^{p}\left(\mathbb{R}^{d}\right)}.
$$
For any $t\in[0,T]$, $\varepsilon>0$ and $q\geq1$, we have the following estimate:
\begin{equation}\label{lpestimate}
\left\|(\mathrm{I}-A)^{\varepsilon} e^{t A}\right\|_{L^{q} \rightarrow L^{q}} \leq \frac{C_{\varepsilon, \nu,T, q}}{t^{\varepsilon}},
\end{equation}
where the details can be found in \cite{PA12}.
Here we quote a generalized Gr\"{o}nwall lemma (see similar statements in \cite[Lemma 7.1.1]{DH06} and \cite[Corollary 2]{HY07}):
\begin{lemma}\label{Gronwall}
Assume $b\geq0$, $\alpha>0$ and $a(t)$ is a nondecreasing locally integrable function on $\left[0,T\right)$, and assume $u(t)$ is nonnegative and locally integrable on $\left[0,T\right)$ with
$$
u(t)\leq a(t)+b\int_{0}^{t}(t-s)^{\alpha-1}u(s){\rm d} s
$$
on this interval. Then
\begin{equation}\label{mittag}
\begin{aligned}
u(t)\leq a(t)\, E_{\alpha} (b\Gamma(\alpha)t^{\alpha} ),\\
\end{aligned}
\end{equation}
where $E_{\alpha}$ is the Mittag-Leffler function defined by $E_{\alpha}(z)=\sum_{k=0}^{\infty}\frac{z^k}{\Gamma(k\alpha+1)}$.
\end{lemma}
For $\alpha=\frac{1}{2}$, \cite{HJ11} gives the identity
\begin{equation*}
E_{\frac{1}{2}}(z)=e^{z^2}\left(1+\frac{2}{\sqrt{\pi}}\int_{0}^{z}e^{-t^2}{\rm d} t\right),
\end{equation*}
then we have the simple estimate
\begin{equation}\label{estimationmittag}
E_{\frac{1}{2}}\left(z\right)\leq 2e^{z^2},
\end{equation}
and \eqref{mittag} becomes
\begin{equation}\label{mittagbound}
\begin{aligned}
u(t)\leq 2a(t)e^{\pi b^2t}.\\
\end{aligned}
\end{equation}
\subsection{Kraichnan type noises}\label{sectionnoise}
We give in this part an example of covariance functions satisfying the last condition in Hypothesis \ref{hypothesis}. Let us consider the following covariance function on $\mathbb{R}^d$: for some constant $\alpha >2$,
\begin{equation}\label{cov}
\begin{aligned}
Q_N(z):=&\,e^{\alpha N}\int_{e^{N}\leq|k|<\infty} \frac{1}{|k|^{d+\alpha}}e^{ik\cdot z}\left(I_d-\frac{k\otimes k}{|k|^2}\right){\rm d} k
\\=&\,\int_{1\leq|k|<\infty} \frac{1}{|k|^{d+\alpha}}e^{ie^Nk\cdot z}\left(I_d-\frac{k\otimes k}{|k|^2}\right){\rm d} k,
\end{aligned}
\end{equation}
where $I_d$ denotes $d\times d$ identity matrix. By symmetry of covariance matrix, we notice that
$$Q_N(0)=\int_{1\leq|k|<\infty}\frac{1}{|k|^{d+\alpha}}\left(I_d-\frac{k\otimes k}{|k|^2}\right){\rm d} k=2\nu I_d$$
for a suitable constant $\nu$ independent of $N$. Then there exists a family of divergence free vector fields $\{\sigma_{k}^{N}\}_{k\geq1}$, such that
\begin{equation}\label{defQN}
Q_N(x-y)=\sum_{k}\sigma_{k}^{N}(x)\otimes\sigma_{k}^{N}(y).
\end{equation}
It is easy to see that
$$
\lim\limits_{N\rightarrow\infty}\left|Q_N(x-y)\right|=0 \quad \mbox{for all } x\neq y.
$$
\begin{remark}\label{intofcov}
Define a matrix-valued function
$$f(k):={\bf 1}_{\{1\leq|k|<\infty\}}\frac{1}{|k|^{d+\alpha}}\left(I_d-\frac{k\otimes k}{|k|^2}\right),$$
and $f_{ij}$ its entries $i,j =1,\ldots,d$. Note that $f_{ij}\in L^{r}(\mathbb{R}^d)$ for any $r\in \left[1,2\right]$. It is well known in Fourier analysis that $ \|\mathcal{F} f \|_{L^{r^{\prime}}}\leq \|f \|_{L^{r}}$, where $r^{\prime}\geq 2$ is the conjugate number of $r$. We can regard the covariance function as a Fourier transform: $ (Q_N(z) )_{ij}= (\mathcal{F} f_{ij} )(-e^Nz)$; then there exists a constant $C_r$ independent of $N$ such that $ \|Q_N \|^{r^{\prime}}_{L^{r^{\prime}}}= e^{-dN} \|\mathcal{F} f \|^{r^{\prime}}_{L^{r^{\prime}}} \leq C_re^{-dN}$.
\end{remark}
\subsection{The regularized interaction kernel}\label{sectionkernel}
Recalling Hypotheses \ref{hypothesis0} and \ref{hypothesis}, we have already defined the regularized kernel $K_{\epsilon}:=K\ast \rho_{\epsilon}$. H\"older's inequality yields
\begin{equation*}
\begin{aligned}
\left|K_{\epsilon}(x)\right|&\,\leq\int_{B(1)}|K(y)|\rho_{\epsilon}(x-y){\rm d} y+\int_{B(1)^{c}}|K(y)|\rho_{\epsilon}(x-y){\rm d} y\\
&\,\leq\left\|\rho_{\epsilon}\right\|_{L^p} \|K \|_{L^{p^{\prime}}(B(1))} +\left\|\rho_{\epsilon} \right\|_{L^1} \sup_{y \in B(1)^{c}}|K(y)|\\
&\,\leq C_{K}\left(\left\|\rho_{\epsilon}\right\|_{L^p} +1\right),
\end{aligned}
\end{equation*}
and hence for any small $\epsilon>0$, $\left\|K_{\epsilon}\right\|_{\infty}\leq C\epsilon^{-d/p^{\prime}}$, where the constant $C$ is independent of $\epsilon$. Similarly,
\begin{equation*}
\begin{aligned}
\left|\nabla K_{\epsilon}(x)\right|&\,\leq\int_{B(1)}|K(y)|\, |\nabla \rho_{\epsilon}(x-y)|{\rm d} y+\int_{B(1)^{c}}|K(y)|\, |\nabla \rho_{\epsilon}(x-y)|{\rm d} y\\
&\,\leq C_{K}\left(\left\|\nabla \rho_{\epsilon}\right\|_{L^{p}}+\left\|\nabla \rho_{\epsilon}\right\|_{L^1}\right),
\end{aligned}
\end{equation*}
which implies that, for any small enough $\epsilon>0$, $\left\|\nabla K_{\epsilon}\right\|_{\infty}\leq C\epsilon^{-1-d/p^{\prime}}$.
Next, for any $f\in L^{1}\cap L^{p}$, we can prove in the same way that
\begin{equation}\label{l1p}
\left\|K_{\epsilon}\ast f\right\|_{\infty}= \left\|K\ast \left(\rho_{\epsilon}\ast f\right)\right\|_{\infty}\leq C_K\left\|\rho_{\epsilon}\ast f\right\|_{L^{1}\cap L^{p}}\leq C_K\left\|f\right\|_{L^{1}\cap L^{p}}.
\end{equation}
\begin{lemma}\label{1stmoment}
Assume Hypotheses \ref{hypothesis} and \ref{hypothesis-initial}; for any $t\in[0,T]$,
$$\mathbb{E}\bigg[\sup_{t \in[0, T]} \big| X_t^{N,i} \big|^{m(d+1)}\bigg] \leq\,C_{m,\nu,d,T}\left(1+\left\|K_{\epsilon}\right\|_{\infty}^{m(d+1)} \right).$$
\end{lemma}
\begin{proof}
By \eqref{IPS},
\begin{equation}\label{absolutevalue}
\begin{aligned}
\big| X_t^{N,i}\big|\leq\,\left| X_{0}^{i}\right|+\int_0^t \frac{1}{N}\sum_{j=1}^{N}\left|\left(K_{\epsilon}\ast V^N\right)( X_s^{N,i}- X_s^{N,j})\right|{\rm d} s+\bigg|\int_0^t \sum_{k}\sigma_{k}^{N}(X_s^{N,i}){\rm d} W_s^k\bigg|.
\end{aligned}
\end{equation}
By Hypotheses \ref{hypothesis-initial} we have $\mathbb{E}\left| X_{0}^{i}\right|^{m(d+1)}\leq C$; moreover,
the second term on the right-hand side of \eqref{absolutevalue} can be estimated as
$$
\mathbb{E}\Bigg[\bigg(\sup_{t \in[0, T]} \int_0^t\frac{1}{N} \sum_{j=1}^{N} \left|\left(K_{\epsilon}\ast V^N\right)( X_s^{N,i}- X_s^{N,j})\right| {\rm d} s \bigg)^{m(d+1)} \Bigg] \leq T^{m(d+1)}\left\|K_{\epsilon}\right\|^{m(d+1)}_{\infty}.
$$
Finally, for the third term, by BDG inequality, we have
$$
\begin{aligned}
\mathbb{E}\Bigg[\sup_{t \in[0, T]} \bigg|\int_0^t \sum_{k}\sigma_{k}^{N}(X_s^{N,i}){\rm d} W_s^k \bigg|^{m(d+1)} \Bigg] \leq&\, C_{m,d}\mathbb{E}\Bigg[ \bigg(\int_0^T \sum_{k} \left| \sigma_{k}^{N}(X_s^{N,i}) \right|^2{\rm d} s \bigg)^{\frac{m(d+1)}{2}} \Bigg]\\ \leq&\,C_{m,d}\left|T \, \mathrm{Tr}\left(Q_N(0)\right)\right|^{\frac{m(d+1)}{2}} \leq\, C_{m,\nu,d,T}.
\end{aligned}
$$
We finish the proof by combining the above estimates.
\end{proof}
\subsection{Boltzmann entropy}\label{sectionentropy}
The Boltzmann entropy $H_N(F)$ of a probability density function $F$ on $\mathbb{R}^{dN}$ is defined as
\begin{equation*}
H_{N}(F)=\frac{1}{N} \int_{\mathbb{R}^{dN}} F(X) \log F(X) \mathrm{d} X,
\end{equation*}
where ${\rm d} X={\rm d} x_1\ldots {\rm d} x_N$ is the Lebesgue measure on $\mathbb{R}^{dN}$. The renormalization by the factor $\frac{1}{N}$ is made so that
\begin{equation}\label{iidotimes}
H_N(f^{\otimes N})=H_1(f),
\end{equation}
where $f^{\otimes N}(X)=f(x_1)\cdots f(x_N)$. The Boltzmann entropy $H_N(F)$ has the following property (see \cite[Proposition 1]{JW17}): if $F$ is invariant under permutations of its variables and $F^{(2)}$ denotes the marginal distribution of $F$ on $\mathbb{R}^{2d}$, then
\begin{equation}\label{F2}
H_{N}(F) \geq H_{2}\big(F^{(2)}\big), \quad \text { for all } N \geq 2 .
\end{equation}
Let $F^N_t$ be the density function on $\mathbb{R}^{dN}$ of the particles $X^N_t=\big(X_{t}^{N,1},\ldots ,X_{t}^{N,N}\big)$ associated to \eqref{IPS}; its existence will be shown shortly in Lemma \ref{density} below. For $X=(x_1,\ldots ,x_N)\in\mathbb{R}^{dN}$, $F_0^N(X)=\omega_0(x_1)\cdots \omega_0(x_N)$, where $\omega_0$ is the probability density of $X_{0}^{N,i}= X^i_0$. We want to prove an estimate on the Boltzmann entropy $H_N(F_t^N)$, for which we need some notations. Define the diffusion vector fields on $\mathbb{R}^{dN}$:
\begin{equation*}
A_k^N(X)=\big(\sigma_{k}^N(x_1),\ldots ,\sigma_{k}^N(x_N)\big)\in\mathbb{R}^{dN},
\end{equation*}
and the drift field $A_{\epsilon}^N(X)=\big(A_{\epsilon}^{N,1}(X),\ldots ,A_{\epsilon}^{N,N}(X)\big)$ is defined as
\begin{equation*}
A_{\epsilon}^{N,i}(X)=\frac{1}{N} \sum_{j=1}^{N} (K_{\epsilon}\ast V^N)\left(x_{i}-x_{j}\right), \quad 1\leq i\leq N.
\end{equation*}
Then the system \eqref{IPS} can be simply written as
\begin{equation*}
\mathrm{d} X_{t}^{N}=A_{\epsilon}^N\left(X_{t}^{N}\right) \mathrm{d} t+\sum_{k} A^N_{k}\left(X_{t}^{N}\right) \mathrm{d} W_{t}^{k}.
\end{equation*}
\begin{lemma}\label{density}
Under our assumptions, if the initial density $F^N_0\in C_c(\mathbb{R}^{dN})$, then for any $p>1$ and $T>0$, there exists $C_{p,T}>0$ such that for all $t\in [0,T]$, it holds
$$F^N_t(X) \leq \|F^N_0\|_\infty C_{p,T} |X|^{-p} \quad \mbox{as } |X|\to \infty. $$
Here $|\cdot|$ is the norm in $\mathbb{R}^{dN}$
\end{lemma}
\begin{proof}
The above SDE defines a stochastic flow of diffeomorphisms $\{\phi_t^N\}_{t\geq0}$, so that $X^N_t= \phi^N_t(X^N_0)$. Let $\mathcal{L}^{dN}$ be the Lebesgue measure on $\mathbb{R}^{dN}$, then we have
$$
(\phi_t^N)_{\#}\mathcal{L}^{dN}=\rho_t^N \mathcal{L}^{dN}\quad \text{and} \quad (\phi_t^N)^{-1}_{\#}\mathcal{L}^d=\tilde{\rho}_t^N\mathcal{L}^{dN},
$$
where $\rho_t^N$ and $\tilde{\rho}_t^N$ are the Radon-Nikodym derivatives; moreover, by \cite[Lemma 4.3.1]{Kunita90}, $\tilde{\rho}_t^N$ admits the explicit expression ($\nabla_{N}=\left(\nabla_{x_1},\ldots ,\nabla_{x_N}\right)$ is the gradient operator on $\mathbb{R}^{dN}$)
$$
\tilde{\rho}_t^N(X)=\exp \bigg(\int_{0}^{t}\big(\nabla_N\cdot A_{\epsilon}^N\big)(\phi_s^N(X))\, {\rm d} s+ \sum_{k} \int_{0}^{t}\big(\nabla_N\cdot A_{k}^N\big)(\phi_s^N(X))\circ{\rm d} W_s^k\bigg).
$$
Since the vector fields $\{A_k^N\}_k$ are divergence free and $\nabla_N\cdot A_{\epsilon}^N \geq 0$ as shown in the proof of Lemma \ref{upperbound} below, one has
$$
\tilde{\rho}_t^N(X)=\exp \bigg(\int_{0}^{t} \big(\nabla_N\cdot A_{\epsilon}^N\big)(\phi_s^N(X))\,{\rm d} s \bigg)\geq 1,
$$
and hence $ \rho_t^N(X)=\big[\tilde{\rho}_t^N\big((\phi_t^N)^{-1}(X)\big) \big]^{-1} \leq 1$. For any test function $f\in C_c(\mathbb{R}^{dN})$,
\begin{equation*}
\begin{aligned}
\mathbb{E} f(X_t^N)& =\mathbb{E} f\big(\phi_t^N(X_0^N)\big) =\mathbb{E}\left[\mathbb{E}\left(f\left(\phi_t^N(X_0^N)\right) \big|\mathcal{F}_0\right)\right]\\
&= \mathbb{E}\left[\mathbb{E}\left(f(\phi_t^N(X))\right)_{X=X_0^N} \right]=\int_{\mathbb{R}^{dN}}\mathbb{E}\big(f(\phi_t^N(X))\big) F_0^N(X)\, {\rm d} X\\
&=\mathbb{E}\left[\int_{\mathbb{R}^{dN}} f(\phi_t^N(X)) F_0^N(X)\, {\rm d} X\right],
\end{aligned}
\end{equation*}
by changing the variable,
\begin{equation*}
\begin{aligned}
\mathbb{E} f(X_t^N) &= \mathbb{E}\left[\int_{\mathbb{R}^{dN}} f\left(Y\right)F_0^N\big((\phi_t^N)^{-1}(Y)\big) \rho_t^N(Y)\, {\rm d} Y\right]\\
&= \int_{\mathbb{R}^{dN}} f(Y) \mathbb{E}\big[F_0^N\big((\phi_t^N)^{-1}(Y)\big) \rho_t^N(Y)\big]\, {\rm d} Y.
\end{aligned}
\end{equation*}
Thus the density function of $X_t^N$ is $F_t^N(Y)= \mathbb{E}\big[F_0^N\big((\phi_t^N)^{-1}(Y)\big) \rho_t^N(Y)\big]$. We have $F_t^N(Y) \leq \mathbb{E}\big[ F_0^N\big((\phi_t^N)^{-1}(Y)\big) \big]$ since $\rho_t^N\leq 1$.
Now we are ready to prove the desired assertion. In fact, fix any $\theta>1$, by \cite[Exercise 4.5.9]{Kunita90}, there exists a positive random variable $\xi$ with finite moments of any order, such that $|\phi^N_t(X)| \leq \xi (1+|X|)^\theta$ for any $X\in \mathbb{R}^{dN}$ and $t\in [0,T]$. Hence,
$$|X|= \big|\phi^N_t\big((\phi^N_t)^{-1}(X)\big) \big| \leq \xi \big(1+ \big|(\phi^N_t)^{-1}(X)\big|\big)^\theta ,$$
which implies $(\xi^{-1} |X|)^{1/\theta} \leq 1+ \big|(\phi^N_t)^{-1}(X)\big| $. Next, assume $F^N_0$ is supported in the ball $B(R_N) \subset \mathbb{R}^{dN}$, then
$$\aligned
F_t^N(X) &\leq \mathbb{E}\big[F_0^N\big((\phi_t^N)^{-1}(X) \big)\big] \leq \|F^N_0\|_\infty\, \mathbb{P}\big(\big|(\phi^N_t)^{-1}(X)\big| \leq R_N \big) \\
&\leq \|F^N_0\|_\infty\, \mathbb{P}\big((\xi^{-1} |X|)^{1/\theta} \leq 1+ R_N \big) = \|F^N_0\|_\infty\, \mathbb{P}\big(\xi \geq |X|(1+R_N)^{-\theta} \big),
\endaligned $$
By Chebyshev's inequality, for any $p>1$,
$$F_t^N(X) \leq \|F^N_0\|_\infty\, \mathbb{E} (\xi^p) \frac{(1+R_N)^{p\theta}}{|X|^p} \quad \mbox{as } |X|\to \infty $$
and the proof is complete.
\end{proof}
For any $ \Phi \in C^{2} (\mathbb{R}^{dN})$, the infinitesimal generator associated to $\{X^N_t\}_{t\geq 0}$ has the form:
\begin{equation*}
\mathcal{L}_{\epsilon} \Phi(X)=\frac{1}{2} \sum_{k}\left\langle A_{k}^N, \nabla_{N}\left\langle A_{k}^N, \nabla_{N} \Phi\right\rangle_{\mathbb{R}^{dN}}\right\rangle_{\mathbb{R}^{dN}}+\left\langle A_{\epsilon}^N, \nabla_{N} \Phi\right\rangle_{\mathbb{R}^{dN}}.
\end{equation*}
Thanks to Hypotheses \ref{hypothesis-initial}, we can easily prove that $H_1(\omega_0)$ is finite. Indeed, we have
$$
\int_{\mathbb{R}^d} \omega_{0} \log \omega_{0}\, {\rm d} x=\int_{\{\omega_{0}\leq1\}} \omega_{0} \log \omega_{0}\, {\rm d} x+\int_{\{\omega_{0}>1\}} \omega_{0} \log \omega_{0}\, {\rm d} x.
$$
The $ L^p$-integrability of $\omega_{0}$ implies the positive part $\int_{\{\omega_{0}>1\}} \omega_{0} \log \omega_{0}\, {\rm d} x$ is bounded from above; moreover, since $\omega_0$ has finite moment of order $m(d+1)$, a similar argument as in Lemma \ref{lowerbound} below shows that the negative part $\int_{\{\omega_{0}\leq1\}} \omega_{0} \log \omega_{0}\, {\rm d} x$ has a lower bound. The following lemma gives an upper bound of Boltzmann entropy.
\begin{lemma}\label{upperbound}
Assume Hypotheses \ref{hypothesis0}, \ref{hypothesis} and \ref{hypothesis-initial}; for all $t>0$,
\begin{equation*}
H_N(F_t^N)\leq H_1(\omega_0)
\end{equation*}
\end{lemma}
\begin{proof}
The computations below are a little formal. To be more rigorous, we should approximate $\omega_0$ by a sequence of smooth and compactly supported functions $\{\omega_{0,n} \}_{n\geq0}$ in $L^p$-norm, and finally use the lower-semicontinuity of $H_N$ with respect to the weak convergence of probability measures. By Lemma \ref{density}, $F^N_t$ is a rapidly decreasing function when $F^N_0 \in C_c^\infty(\mathbb{R}^{dN})$; this partly justifies the integration by parts used below.
Employing the divergence free property of $A_k^N$, the density function $F_t^N$ satisfies the Fokker-Planck equation:
\begin{equation*}
\begin{aligned}
\partial_{t} F_{t}^{N}&\,=\mathcal{L}^{\ast }_{\epsilon} F_{t}^{N}=\frac{1}{2} \sum_{k}\left\langle A_{k}^N, \nabla_{N}\left\langle A^N_{k}, \nabla_{N} F_{t}^{N}\right\rangle_{\mathbb{R}^{dN}}\right\rangle_{\mathbb{R}^{dN}}- \nabla_{N} \cdot\left(F_{t}^{N}A_{\epsilon}^N \right).
\end{aligned}
\end{equation*}
Therefore,
\begin{equation*}
\begin{aligned}
&\partial_{t}\left(F_{t}^{N} \log F_{t}^{N}\right)=\,\left(1+\log F_{t}^{N}\right) \partial_{t} F_{t}^{N} \\
=&\, \frac{1}{2} \sum_{k}\left(1+\log F_{t}^{N}\right)\left\langle A_{k}^N, \nabla_{N}\left\langle A_{k}^N, \nabla_{N} F_{t}^{N}\right\rangle_{\mathbb{R}^{dN}}\right\rangle_{\mathbb{R}^{dN}}
-\left(1+\log F_{t}^{N}\right) \nabla_{N} \cdot\left(F_{t}^{N}\! A_{\epsilon}^N \right).
\end{aligned}
\end{equation*}
Then, by the definition of $H_{N}(F_{t}^{N})$ and integration by parts,
{\small \begin{equation*}
\begin{aligned}
\frac{\mathrm{d}}{\mathrm{d} t} H_{N}(F_{t}^{N}) &\,=\frac{1}{N} \int_{\mathbb{R}^{dN}}\big(1+\log F_{t}^{N}\big) \partial_{t} F_{t}^{N} \mathrm{d} X \\
&\,=-\frac{1}{2N}\! \sum_{k}\! \int_{\mathbb{R}^{dN}}\! \frac{\left\langle A_{k}^N, \nabla_{N} F_{t}^{N}\right\rangle_{\mathbb{R}^{dN}}^{2}}{F_{t}^{N}}\,{\rm d} X +\frac{1}{N}\! \int_{\mathbb{R}^{dN}}\! \big\< F_{t}^{N}\! A_{\epsilon}^N,\nabla_{N} \log F_{t}^{N} \big\>_{\mathbb{R}^{dN}}\, {\rm d} X.\\
\end{aligned}
\end{equation*} }
Let $I_{\epsilon}^N$ be the last quantity on the right-hand side; then
\begin{equation*}
\begin{aligned}
I_{\epsilon}^N=\,\frac{1}{N} \int_{\mathbb{R}^{dN}} \big\< A_{\epsilon}^N,\nabla_{N}F_{t}^{N} \big\>_{\mathbb{R}^{dN}}{\rm d} X=\,-\frac{1}{N} \int_{\mathbb{R}^{dN}}(\nabla_{N}\cdot A_{\epsilon}^N) F_{t}^{N}{\rm d} X. \\
\end{aligned}
\end{equation*}
By Hypotheses \ref{hypothesis0} and \ref{hypothesis}, we have $\nabla\cdot K\geq0$, $\rho_{\epsilon}\geq0$ and $V^N\geq0$, then
\begin{equation*}
\begin{aligned}
\nabla_{N}\cdot A_{\epsilon}^N(X)=&\,\sum_{i=1}^{N}\frac{1}{N}\sum_{j=1}^{N}\nabla\cdot(K_{\epsilon}\ast V^N)(x_i-x_j)\\
=&\,\frac{1}{N}\sum_{i,j=1}^{N} \big((\nabla\cdot K)\ast \rho_{\epsilon}\ast V^N \big)(x_i-x_j)\geq 0.\\
\end{aligned}
\end{equation*}
Then, we have
\begin{equation*}
\begin{aligned}
\frac{\mathrm{d}}{\mathrm{d} t} H_{N}(F_{t}^{N})
&\,=-\frac{1}{2N} \sum_{k} \int_{\mathbb{R}^{dN}} \frac{\left\langle A_{k}^N, \nabla_{N} F_{t}^{N}\right\rangle_{\mathbb{R}^{dN}}^{2}}{F_{t}^{N}} \mathrm{~d} X+I_{\epsilon}^N\leq\,0.
\end{aligned}
\end{equation*}
By Hypotheses \ref{hypothesis-initial} and \eqref{iidotimes}, we obtain $H_N(F_t^N)\leq H_N(F_0^N)= H_1(\omega_0)$ for all $t>0$.
\end{proof}
The following lemma is inspired by \cite[Section 3.1]{HM14}. We prove that the entropy of a joint probability density $F$ on $\mathbb{R}^{2d}$, with finite $k$-th moment, has a uniform lower bound on any subset $B\subset\mathbb{R}^{2d}$; this is crucial for us to prove the estimate on covariance in Section \ref{sectioncovariance}.
\begin{lemma}\label{lowerbound}
Let us fix $k>0$, $F$ be a probability density on $\mathbb{R}^{2d}$ with finite $k$-th moment. Then, for any subset $B\subset \mathbb{R}^{2d}$,
\begin{align*}
\int_{B}\left(F\log F\right)(x,y){\rm d} x{\rm d} y\geq C (k)-\int_{\mathbb{R}^{2d}}F(x,y)\big(|x|^k+|y|^k\big){\rm d} x{\rm d} y,
\end{align*}
where $C(k)$ is a constant.
\end{lemma}
\begin{proof}
Define the function $G_k(x,y):=c_k{\rm exp}\left(-|x|^k-|y|^k\right)$, where $c_k$ is chosen such that $G_k$ is a probability density in $\mathbb{R}^{2d}$. Let $h(z):=z\log z-z+1$; it is easy to see that $h(z)\geq0$ for any $z\in(0,\infty)$. Then,
\begin{equation*}
\begin{aligned}
\int_{B}\left(F\log F\right)(x,y){\rm d} x{\rm d} y=&\,\int_{B}\Big[h\Big(\frac{F}{G_k}\Big)G_k+F-G_k+F\log G_k\Big](x,y){\rm d} x{\rm d} y\\
\geq&\, -1+\int_{B}F(x,y)\big(\log c_k-|x|^k-|y|^k\big){\rm d} x{\rm d} y\\
\geq&\, C(k)-\int_{\mathbb{R}^{2d}}F(x,y)\big(|x|^k+|y|^k\big){\rm d} x{\rm d} y.
\end{aligned}
\end{equation*}
\end{proof}
\section{Estimate on the covariance of random forces}\label{sectioncovariance}
Recall the particle system \eqref{IPS} with environmental noise; we can regard $Q_N\big( X_{s}^{N,i} -X_{s}^{N,j} \big)$ as the covariance of random forces on two particles $X_s^{N,i},\, X_s^{N,j}\ (1\leq i\neq j\leq N)$. In this section, we give an estimate on $\big| Q_N\big( X_{s}^{N,i} -X_{s}^{N,j} \big) \big|$ which will play an important role in proving bounds on the stochastic convolution \eqref{mollifiedzt}, see the proof of Theorem \ref{stochasticconvolution}.
The following lemma asserts that the covariance of random forces on any two distinct particles vanishes as the number of particles goes to $\infty$. Roughly speaking, forces become more and more independent when the number of particles increases. After choosing some $N$-related parameters in our proof, we can compute the convergence rate. We follow some ideas in the proof of \cite[Proposition 3.3]{FL21} and assume $\epsilon$ is fixed in this section.
\begin{lemma}\label{convratelemma}
Under Hypotheses \ref{hypothesis0}, \ref{hypothesis} and \ref{hypothesis-initial}, for any two different particles $X_{\cdot}^{N,i}$ and $X_{\cdot}^{N,j}$ $(i\neq j)$, for some $\ell\geq2$ and any $s\in[0,T]$, we have the following estimate:
\begin{equation}\label{covconv}
\mathbb{E}\left[\big| Q_N\big( X_{s}^{N,i} -X_{s}^{N,j} \big) \big|^{\ell}\right]\leq C\big( 1+\left\|K_{\epsilon}\right\|_{\infty}^{2d} \big) N^{-\frac{1}{2}},
\end{equation}
where $C$ is a constant depending on $\omega_{0},\ell,\nu,d$ and $T$. Note that when $i=j$, $\big| Q_N\big( X_{s}^{N,i} -X_{s}^{N,j} \big) \big| = |Q_N(0) |= |2\nu I_d |=2\nu\sqrt{d}$ is a constant.
\end{lemma}
\begin{proof}
By symmetry, without loss of generality, we can take $i=1$ and $j=2$. For any ball $B(R)\subset\mathbb{R}^d$ centered at origin with radius $R$, we have
\begin{equation*}
\begin{aligned}
\mathbb{E}\left[\left|Q_N(X_{s}^{N,1}-X_{s}^{N,2})\right|^{\ell}%
\right] =&\,\int_{(B(R)^2)^c}\left|Q_N(x_1-x_2)\right|^{\ell
F_s^{2,N}(x_1,x_2){\rm d} x_1{\rm d} x_2 \\
&+\int_{B(R)^2}\left|Q_N(x_1-x_2)\right|^{\ell
F_s^{2,N}(x_1,x_2){\rm d} x_1{\rm d} x_2 \\
=:&\,J_N^{1}+J_N^{2},
\end{aligned}
\end{equation*}
where $F_s^{2,N}$ is the joint density function of $\big(X_s^{N,1},X_s^{N,2}\big)$ and $B(R)^2=B(R)\times B(R)$. For the first term $J_N^1$, we have $|Q_N(z)| \leq \mbox{Tr}(Q_N(0)) =2\nu d$ for any $z\in \mathbb{R}^d$; by Chebyshev's inequality, one has
\begin{equation*}
\begin{aligned}
J_N^{1}\leq&\,C_{\ell,\nu}\int_{\{|x_1|\vee|x_2|\geq R\}}F_s^{2,N}(x_1,x_2){\rm d} x_1{\rm d} x_2 \\ \leq&\,C_{\ell,\nu}\int_{\mathbb{R}^{2d}}\frac{\left|x_1\right|^{2d}+\left|x_2\right|^{2d}}{R^{2d}}F_s^{2,N}(x_1,x_2){\rm d} x_1{\rm d} x_2 \\ \leq&\,\frac{C_{\ell,\nu}}{R^{2d}}\left(\mathbb{E}\left|X_{s}^{N,1}\right|^{2d}+\mathbb{E}\left|X_{s}^{N,2}\right|^{2d}\right).
\end{aligned}
\end{equation*}
Combining with Lemma \ref{1stmoment}, we deduce that
\begin{equation}\label{2dmoment}
\mathbb{E}\big|X_{s}^{N,i}\big|^{2d}\leq C_{\nu,d,T}\big(1+\left\|K_{\epsilon}\right\|_{\infty}^{2d} \big),
\end{equation}
and then
\begin{equation}\label{j1n}
\begin{aligned}
J_N^{1} \leq\,\frac{C_{\ell,\nu,d,T}}{R^{2d}} \big( 1+\left\|K_{\epsilon}\right\|_{\infty}^{2d} \big).
\end{aligned}
\end{equation}
For the second term $J_N^2$, following the method used in the proof of \cite[Proposition 3.3]{FL21}, for some $M>1$, we have
\begin{equation*}
\begin{aligned}
J_N^2 =&\,\int_{B(R)^2\cap\{F_s^{2,N}<M\} }\left|Q_N(x_1-x_2)\right|^{\ell}
F_s^{2,N}(x_1,x_2){\rm d} x_1{\rm d} x_2 \\
&\,+ \int_{B(R)^2\cap\{F_s^{2,N}\geq M\}}\left|Q_N(x_1-x_2)\right|^{\ell
F_s^{2,N}(x_1,x_2){\rm d} x_1{\rm d} x_2 \\
=:&\,J_N^{2,1}+J_N^{2,2}.
\end{aligned}
\end{equation*}
For $J_N^{2,1}$, by Hypotheses \ref{hypothesis},
it holds
\begin{equation}\label{j21n}
\begin{aligned}
J_N^{2,1}\leq&\, M\int_{B(R)^2}\left|Q_N(x_1-x_2)\right|^{\ell}{\rm d} x_1{\rm d} x_2\\
=&\,M\int_{B(R)}{\rm d} x_1\int_{B(R)}\left|Q_N(x_1-x_2)\right|^{\ell}{\rm d} x_2\\ \leq&\,C_dMR^d\left\|Q_N\right\|_{L^{{\ell}}}^{\ell}\leq\,\frac{C_{\ell,d}MR^d}{e^{2N}}.
\end{aligned}
\end{equation}
And for $J_N^{2,2}$, we have
\begin{equation*}
\begin{aligned}
J_N^{2,2}\leq&\,C_{\ell,\nu}\int_{B(R)^2\cap\{F_s^{2,N}\geq M\}
F_s^{2,N}(x_1,x_2){\rm d} x_1{\rm d} x_2 \\
\leq&\,\frac{C_{\ell,\nu}}{\log M}\int_{B(R)^2\cap\{F_s^{2,N}\geq 1\}}\left(F_s^{2,N}\log F_s^{2,N}\right)(x_1,x_2){\rm d} x_1{\rm d} x_2 .
\\
\end{aligned}
\end{equation*}
Recalling the fact that $z\log z\in[-e^{-1},0]$ for all $z\in\left(0,1\right]$, then
\begin{equation*}
\begin{aligned}
J_N^{2,2}\leq&\,\frac{C_{\ell,\nu}}{\log M}\bigg[\int_{B(R)^2}\left(F_s^{2,N}\log F_s^{2,N}\right)(x_1,x_2){\rm d} x_1{\rm d} x_2+e^{-1}\left|B(R)^2\right|\bigg] \\
\leq&\,\frac{C_{\ell,\nu,d}R^{2d}}{\log M}+\frac{C_{\ell,\nu}}{\log M}\bigg[\int_{\mathbb{R}^{2d}}\left(F_s^{2,N}\log F_s^{2,N}\right)(x_1,x_2){\rm d} x_1{\rm d} x_2\\
&\,\qquad\qquad\qquad\qquad-\int_{(B(R)^2)^c}\left(F_s^{2,N}\log F_s^{2,N}\right)(x_1,x_2){\rm d} x_1{\rm d} x_2\bigg].\\
\end{aligned}
\end{equation*}
By \eqref{F2} and Lemma \ref{upperbound}, one has
\begin{equation*}
\begin{aligned}
\int_{\mathbb{R}^{2d}}\left(F_s^{2,N}\log F_s^{2,N}\right)(x_1,x_2){\rm d} x_1{\rm d} x_2&\,=2H_2(F_s^{2,N})\leq 2H_N(F^N_s)\leq 2H_1(\omega_0).
\end{aligned}
\end{equation*}
Applying Lemma \ref{lowerbound} with $k=2d$ and \eqref{2dmoment}, it holds
\begin{equation*}
\begin{aligned}
& -\int_{(B(R)^2)^c}\left(F_s^{2,N}\log F_s^{2,N}\right)(x_1,x_2){\rm d} x_1{\rm d} x_2\\
\leq& -C(2d)+\int_{\mathbb{R}^{2d}}F_s^{2,N}(x_1,x_2) \big( |x_1|^{2d}+|x_2|^{2d} \big){\rm d} x_1{\rm d} x_2\\
\leq& -C(2d)+\mathbb{E}\left|X^{N,1}_s\right|^{2d} +\mathbb{E}\left|X^{N,2}_s\right|^{2d}
\leq C_{\ell,\nu,d,T} \big(1+\left\|K_{\epsilon} \right\|_{\infty}^{2d} \big).
\end{aligned}
\end{equation*}
Thus, we get the estimate
\begin{equation}\label{j22n}
\begin{aligned}
J_N^{2,2}
\leq&\,\frac{C_{\ell,\nu,d}R^{2d}}{\log M}+\frac{C_{\ell,\nu,d,T} \big(1+H_1(\omega_0)+\left\|K_{\epsilon}\right\|_{\infty}^{2d} \big)}{\log M}.
\end{aligned}
\end{equation}
Putting together \eqref{j1n}, \eqref{j21n} and \eqref{j22n}, we deduce that
\begin{equation}\label{sum}
\begin{aligned}
\mathbb{E}\left[\left|Q_N(X_{s}^{N,1}-X_{s}^{N,2})\right|^{\ell} \right]
&\leq \frac{C_{\ell,\nu,d,T}\big( 1+\left\|K_{\epsilon}\right\|_{\infty}^{2d} \big)}{R^{2d}}+\frac{C_{\ell,d}MR^d}{e^{2N}} +\frac{C_{\ell,\nu,d}R^{2d}}{\log M} \\
&\quad +\frac{C_{\ell,\nu,d,T} \big(1+H_1(\omega_0)+\left\|K_{\epsilon}\right\|_{\infty}^{2d} \big)}{\log M}.
\end{aligned}
\end{equation}
We finish the proof by taking $R=R(N)=N^{\frac{1}{4d}}$, $M=M(N)=e^N$.
\end{proof}
\section{Convergence of the mollified empirical measures}\label{sec-proof-main-thm}
The purpose of this part is to prove the main result. We first establish in Section \ref{sectionmollifiedmeasure} an $L^p$-bound on the mollified empirical measure $\omega^N$ defined in \eqref{mollifiedmeasure}, and then we provide the proof of Theorem \ref{thm-main} in Section \ref{sectionproof}.
\subsection{Bounds on the mollified empirical measures}\label{sectionmollifiedmeasure}
For any test function $\phi\in C^2(\mathbb{R}^d)$, by \eqref{compactform} and It\^{o} formula,
\begin{equation*
\begin{aligned}
{\rm d} \phi(X_{t}^{N,i})
=&\, \big(K_{\epsilon}\ast V^N \ast S^N_t \big)( X_{t}^{N,i}) \cdot\nabla\phi(X_{t}^{N,i}){\rm d} t +\sum_{k} \sigma_{k}^{N}(X_{t}^{N,i}) \cdot\nabla\phi(X_{t}^{N,i}) {\rm d} W_t^k\\
&\, +\frac{1}{2}\sum_{k}\mathrm{Tr}\left[\left(\sigma_{k}^{N}\otimes\sigma_{k}^{N}\right)\nabla^2\phi\right](X_{t}^{N,i}){\rm d} t,
\end{aligned}
\end{equation*}
where
$$
\sum_{k}\mathrm{Tr} \left[\left(\sigma_{k}^{N}\otimes\sigma_{k}^{N}\right) \nabla^2\phi\right](X_{t}^{N,i}) =\mathrm{Tr}\big[Q_N(0) \nabla^2\phi(X_{t}^{N,i}) \big]=2\nu\Delta\phi(X_{t}^{N,i}).
$$
Then, the empirical measure $S_t^N$ satisfies
\begin{equation}\label{F}
\begin{aligned}
\<S_t^N,\phi\>
&=\<S_0^N,\phi\> +\int_{0}^{t}\<S_s^N,(K_{\epsilon}\ast V^{N}\ast S_s^N)\cdot\nabla\phi\>{\rm d} s\\
&\quad\, +\nu\int_{0}^{t}\<S_s^N,\Delta\phi\>{\rm d} s+
\sum_{k}\int_{0}^{t}\<S_s^N,\sigma_k^N\cdot\nabla\phi\>{\rm d} W_s^k.
\end{aligned}
\end{equation}
For any $x\in \mathbb{R}^d$, we shall take the test function $\phi_x(y)=V^N(x-y)$ in identity \eqref{F}; notice that
$$\nabla\phi_x(y)=\nabla_yV^N(x-y)=-\nabla_x V^N(x-y).$$
Recall \eqref{mollifiedmeasure} for the mollified empirical measure; then
\begin{equation*}
\begin{aligned}
\omega_{t}^{N}(x)=&\ \omega_{0}^{N}(x) -\int_{0}^{t}\left\langle S_{s}^{N}, \left(K_{\epsilon} \ast \omega_{s}^{N}\right) \cdot \nabla_x V^{N}(x-\cdot)\right\rangle {\rm d} s \\
&\,+\nu \int_{0}^{t} \Delta \omega_{s}^{N}(x) {\rm d} s- \sum_{k} \int_{0}^{t} \big\< S_s^N,\sigma_k^N\cdot\nabla_x V^{N} (x-\cdot) \big\>\, {\rm d} W_{s}^{k}.
\end{aligned}
\end{equation*}
For the sake of clarity, we write:
\begin{equation*}
\begin{aligned}
\left(\nabla V^{N} \ast \left(\left(K_{\epsilon} \ast \omega_{s}^{N}\right) S_{s}^{N}\right)\right)(x)&\,:=\left\langle S_{s}^{N}, \left(K_{\epsilon} \ast \omega_{s}^{N}\right) \cdot \nabla_x V^{N}(x-\cdot)\right\rangle;\\
\left(\nabla V^{N} \ast \left(\sigma_k^N S_{s}^{N}\right)\right)(x)&\,:=\left\langle S_{s}^{N}, \sigma_k^N \cdot \nabla_x V^{N}(x-\cdot)\right\rangle.
\end{aligned}
\end{equation*}
Recall the operator $A=\nu\Delta$ defined in Section \ref{notationsandlemma}; as in \cite{FOS20, ORT20b}, we rewrite the above equation for mollified empirical measures in mild form:
\begin{equation*}
\begin{aligned}
\omega_{t}^{N}=e^{t A} \omega_{0}^{N} &\,-\int_{0}^{t} e^{(t-s) A}\left(\nabla V^{N} \ast \left(\left(K_{\epsilon} \ast \omega_{s}^{N}\right) S_{s}^{N}\right)\right) {\rm d} s \\
&\,-\sum_{k} \int_{0}^{t} e^{(t-s) A}\left(\nabla V^{N} \ast \left(\sigma_k^N S_{s}^{N}\right)\right) {\rm d} W_{s}^{k}.
\end{aligned}
\end{equation*}
By the explicit formula \eqref{semigroup} of semigroup, for any function $f\in H^{1,p}(\mathbb{R}^d)$, one has
\begin{equation}\label{nablaf}
e^{(t-s) A} \nabla f=\nabla e^{(t-s) A} f,
\end{equation}
then we obtain
\begin{equation}\label{mollified}
\begin{aligned}
\omega_{t}^{N}=e^{t A} \omega_{0}^{N} &\,-\int_{0}^{t} \nabla\cdot e^{(t-s) A}\left( V^{N} \ast \left(\left(K_{\epsilon} \ast \omega_{s}^{N}\right) S_{s}^{N}\right)\right) {\rm d} s -Z_t^N,
\end{aligned}
\end{equation}
where
\begin{equation}\label{mollifiedzt}
Z^N_t=\sum_{k} \int_{0}^{t} \nabla\cdot e^{(t-s) A}\left( V^{N} \ast \left(\sigma_k^N S_{s}^{N}\right)\right) {\rm d} W_{s}^{k}.
\end{equation}
Before moving forward, we present an important estimate on the stochastic convolution $Z_t^N$.
\begin{theorem}\label{stochasticconvolution}
Assume Hypotheses \ref{hypothesis0}, \ref{hypothesis} and \ref{hypothesis-initial}.
Then there exist a constant $C=C_{m,T} >0$ and some $\iota>0$ such that for all $N\in\mathbb{N}$,
\begin{equation}\label{Niota}
\bigg\|\sup_{t \in[0, T]} \left\| Z^N_t\right\|_{L^{1}\cap L^{p} (\mathbb{R}^{d} )} \bigg\|_{L^m(\Omega)}\leq C_{m,T}\left\|K_{\epsilon}\right\|_{\infty}^{d+1}N^{-\iota}.
\end{equation}
\end{theorem}
The proof of Theorem \ref{stochasticconvolution} is motivated by \cite[Section A.2]{ORT20b} and follows readily from the two propositions below.
\begin{proposition}\label{supztp}
Under Hypotheses \ref{hypothesis0}, \ref{hypothesis} and \ref{hypothesis-initial}, for $T\in(0,T_{max})$, there exists $C_{m,\delta,T}>0$ such that for any $N\in\mathbb{N}$ and small enough $\epsilon>0$,
\begin{equation}\label{zp}
\bigg\|\sup_{t \in[0, T]}\left\| Z^N_t\right\|_{L^{p} (\mathbb{R}^{d} )} \bigg\|_{L^m(\Omega)}\leq C_{m,\delta,T}\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}}N^{\beta\big(d +2\delta-\frac{d}{p}\big)-\frac{1}{4m}},
\end{equation}
where $\frac{2}{m}<\delta<1$.
\end{proposition}
\begin{proposition}\label{supzt1}
Under Hypotheses \ref{hypothesis0}, \ref{hypothesis} and \ref{hypothesis-initial}, for $T\in(0,T_{max})$, there exists $C_{m,\delta,T}>0$ such that for any $N\in\mathbb{N}$ and any small enough $\epsilon>0$,
\begin{equation}\label{z1}
\bigg\|\sup_{t \in[0, T]}\left\| Z^N_t\right\|_{L^1 (\mathbb{R}^{d} )} \bigg\|_{L^m(\Omega)}\leq C_{m,\delta,T}\left\|K_{\epsilon}\right\|_{\infty}^{d+1}N^{\frac{\beta}{2}(d+ \delta(d+4))-\frac{1}{4m}},
\end{equation}
where $\frac{2}{m}<\delta<1$.
\end{proposition}
The proofs of Propositions \ref{supztp} and \ref{supzt1} are quite technical and make use of the crucial Lemma \ref{convratelemma}; we postpone them to the appendices (see Sections \ref{sectiona3} and \ref{sectiona4}) in order to maintain the readability of the paper.
\begin{proof}[Proof of Theorem \ref{stochasticconvolution}]
Combining \eqref{zp} and \eqref{z1}, for any small enough $\epsilon>0$, we get the result
\begin{equation*
\bigg\|\sup_{t \in[0, T]}\left\| Z^N_t\right\|_{L^{1}\cap L^{p} (\mathbb{R}^{d} )} \bigg\|_{L^m(\Omega)}\leq C_{m,\delta,T}\left\|K_{\epsilon}\right\|_{\infty}^{d+1}N^{\frac{\beta}{2}\big((2d+4\delta-\frac{2d}{p})\vee (d+\delta(d+4)) \big)-\frac{1}{4m}}.
\end{equation*}
If we take any $\delta\in \big(\frac{2}{m}, 1 \big)$ and $\beta$ satisfying
$$0<\beta\leq\frac{1}{4m(d+2)},$$
then we can find some $\iota>0$ such that \eqref{Niota} holds.
\end{proof}
\begin{remark}\label{betarange}
The range of $\beta$ can be slightly larger. In order that the right-hand sides of \eqref{zp} and \eqref{z1} tend to 0 as $N\to \infty$, we need to take a small $\beta$ such that $0<\beta<\frac{1}{2m\big(d+4\delta+d(1-\frac{2}{p})\vee \delta \big)}$, where $\frac{2}{m}<\delta<1$. Now for $0<\beta<\frac{1}{2md+16+2md\big( (1-\frac{2}{p})\vee\frac{2}{m}\big)},$ we can find a suitable $\delta$ such that the estimate \eqref{Niota} holds for some $\iota>0$.
\end{remark}
Now we can establish a uniform bound of the mollified empirical measure $\omega^N$.
\begin{proposition}\label{estimategtN}
Assume Hypotheses \ref{hypothesis0}, \ref{hypothesis} and \ref{hypothesis-initial}; for any $t\in[0,T]$,
\begin{equation*}
\left\|\omega_{t}^{N}\right\|_{L^m(\Omega,L^p(\mathbb{R}^d))} \leq C_{\omega_{0},m,T}\big(1+\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}}\big) \exp\big(C_{\nu,T}\left\|K_{\epsilon} \right\|_{\infty}^2 \big),
\end{equation*}
which is uniform in $N\in\mathbb{N}$.
\end{proposition}
\begin{proof}
Equation \eqref{mollified} yields that
\begin{equation}\label{triangleineq}
\begin{aligned}
\left\|\omega_{t}^{N}\right\|_{L^m(\Omega,L^p)}\leq&\,\left\|e^{t A}\omega_{0}^{N}\right\|_{L^m(\Omega,L^p)} +\left\|Z_t^N\right\|_{L^m(\Omega,L^p)}\\
&\,+\int_{0}^{t}\left\| \nabla \cdot e^{(t-s) A}\left( V^{N} \ast \left(\left(K_{\epsilon} \ast \omega_{s}^{N}\right) S_{s}^{N}\right)\right) \right\|_{L^m(\Omega,L^p)}{\rm d} s.
\end{aligned}
\end{equation}
By Remark \ref{rem-initial}, the first term on the right-hand side of \eqref{triangleineq} can be estimated as
\begin{equation}\label{initialtermestimate}
\left\|e^{t A}\omega_{0}^{N}\right\|_{L^m(\Omega,L^p)}\leq
\left\|\omega_{0}^{N}\right\|_{L^m(\Omega,L^p)}\leq C_{\omega_{0}} .
\end{equation}
Next, by Proposition \ref{supztp}, we have the following estimate on the stochastic convolution:
\begin{equation}\label{martingaltermestimate}
\begin{aligned}
\left\|Z_t^N\right\|_{L^m\left(\Omega,L^p\right)}\leq C_{m,T}\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}}.
\end{aligned}
\end{equation}
It remains to deal with the third term; one has
\begin{equation*}
\begin{aligned}
&\,\int_{0}^{t}\left\| \nabla \cdot e^{(t-s) A}\left( V^{N} \ast \left(\left(K_{\epsilon} \ast \omega_{s}^{N}\right) S_{s}^{N}\right)\right) \right\|_{L^m(\Omega,L^p)}{\rm d} s\\
\leq &\, C\int_{0}^{t}\big\| (\mathrm{I}-A)^{\frac{1}{2}} e^{(t-s) A}\big\|_{L^{p}\rightarrow L^{p}}\left\| V^{N} \ast \left(\left(K_{\epsilon} \ast \omega_{s}^{N}\right) S_{s}^{N}\right) \right\|_{L^m(\Omega,L^p)}{\rm d} s.
\end{aligned}
\end{equation*}
For any $x\in\mathbb{R}^d$,
$$
\left|\left(V^{N} \ast \left(\left(K_{\epsilon} \ast \omega_{s}^{N}\right) S_{s}^{N}\right) \right) (x)\right|
\leq \left\| K_{\epsilon} \ast \omega_{s}^{N}\right\|_{\infty}\left|\left(V^{N} \ast S_{s}^{N}\right) (x)\right|\leq\left\| K_{\epsilon} \right\|_{\infty}\left|\omega_{s}^N (x)\right|,
$$
where the last inequality is due to
\begin{equation}\label{kg}
\left\|K_{\epsilon}\ast \omega_{s}^{N}\right\|_{\infty}=\sup_{x \in\mathbb{R}^d}
\left|\int_{\mathbb{R}^d}K_{\epsilon}(x-y)\omega_{s}^{N}(y){\rm d} y\right|\leq \left\|K_{\epsilon}\right\|_{\infty}\left\|\omega_{s}^{N}\right\|_{L^1}=\left\|K_{\epsilon}\right\|_{\infty}.
\end{equation}
Then by \eqref{lpestimate}, we have
\begin{equation}\label{drifttermestimate}
\begin{aligned}
&\,\int_{0}^{t}\left\| \nabla \cdot e^{(t-s) A}\left( V^{N} \ast \left(\left(K_{\epsilon} \ast \omega_{s}^{N}\right) S_{s}^{N}\right)\right) \right\|_{L^m(\Omega,L^p)}{\rm d} s\\
\leq&\,C_{\nu,T}\left\|K_{\epsilon}\right\|_{\infty}\int_{0}^{t}\frac{1}{\sqrt{t-s}}\left\|\omega_{s}^{N}\right\|_{L^m(\Omega,L^p)}{\rm d} s.
\end{aligned}
\end{equation}
Combining \eqref{initialtermestimate}, \eqref{martingaltermestimate} and \eqref{drifttermestimate}, we obtain
\begin{equation*}
\begin{aligned}
\left\|\omega_{t}^{N}\right\|_{L^m(\Omega,L^p)}\leq C_{\omega_{0}}+C_{m,T}\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}}+C_{\nu,T}\left\|K_{\epsilon}\right\|_{\infty}\int_{0}^{t}\frac{1}{\sqrt{t-s}}\left\|\omega_{s}^{N}\right\|_{L^m(\Omega,L^p)}{\rm d} s.
\end{aligned}
\end{equation*}
Applying Lemma \ref{Gronwall} and estimate \eqref{mittagbound}, we deduce the desired estimate.
\end{proof}
\subsection{Proof of Theorem \ref{thm-main}}\label{sectionproof}
The method we use to prove our main result is inspired by \cite{ORT20b}. Recall the nonlinear Fokker-Planck equation \eqref{PDE-eps} with smooth kernel; in mild formulation it reads as
\begin{equation}\label{tildeomegat}
\omega^{\epsilon}_{t}=e^{tA}\omega_{0}-\int_{0}^{t}e^{(t-s)A}\nabla\cdot\big((K_{\epsilon} \ast \omega^{\epsilon}_s)\omega^{\epsilon}_s\big){\rm d} s=e^{tA}\omega_{0}-\int_{0}^{t}\nabla\cdot e^{(t-s)A}\big((K_{\epsilon} \ast \omega^{\epsilon}_s)\omega^{\epsilon}_s\big){\rm d} s.
\end{equation}
The proof of Theorem \ref{thm-main} can be split into two steps, thanks to the following inequality:
{\small \begin{equation}\label{split}
\bigg\| \sup_{t \in[0, T]} \big\|\omega_t-\omega_{t}^{N} \big\|_{L^{1}\cap L^{p}} \bigg\|_{L^m(\Omega)}\leq\sup_{t \in[0, T]} \left\|\omega_t-\omega^{\epsilon}_{t} \right\|_{L^{1}\cap L^{p}} + \bigg\| \sup_{t \in[0, T]} \big\|\omega^{\epsilon}_{t}-\omega_{t}^{N} \big\|_{L^{1}\cap L^{p}} \bigg\|_{L^m(\Omega)}.
\end{equation} }
The next proposition shows the convergence of the first term on the right-hand side of \eqref{split}, and the estimate on the second term will be done in Proposition \ref{main1} at the end of this section.
\begin{proposition}\label{firstpart}
Under Hypotheses \ref{hypothesis0}, \ref{hypothesis} and \ref{hypothesis-initial}, for any $T\in(0,T_{max})$, the solution of \eqref{PDE-eps} converges to that of \eqref{PDE} in $C\left([0,T];L^{1}\cap L^{p}(\mathbb{R}^d)\right)$, namely
$$
\lim\limits_{\epsilon\rightarrow0}\sup_{t \in[0, T]}\left\|\omega_t-\omega^{\epsilon}_{t}\right\|_{L^{1}\cap L^{p}}=0.
$$
\end{proposition}
\begin{proof}
The mild formulations \eqref{omegat}, \eqref{tildeomegat} and estimate \eqref{lpestimate} imply that
\begin{equation}\label{omegaomgegaeps}
\begin{aligned}
\left\|\omega_t-\omega^{\epsilon}_{t}\right\|_{L^{1}\cap L^{p}}=&\,\left\|\int_{0}^{t}\nabla\cdot e^{(t-s) A} \big( (K\ast \omega_s) \omega_s- (K_{\epsilon}\ast \omega^{\epsilon}_{s}) \omega^{\epsilon}_{s} \big){\rm d} s\right\|_{L^{1}\cap L^{p}}\\\leq&\ C_{\nu,T}\int_{0}^{t}\frac{1}{\sqrt{t-s}}\left\| (K\ast \omega_s) \omega_s- (K_{\epsilon}\ast \omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}\right\|_{L^{1}\cap L^{p}}{\rm d} s.
\end{aligned}
\end{equation}
For the integrand, one has
\begin{equation*}
\begin{aligned}
&\, \left\| (K\ast \omega_s) \omega_s- (K_{\epsilon}\ast \omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}\right\|_{L^{1}\cap L^{p}}\\\leq&\, \left\| (K\ast \omega_s) (\omega_s-\omega^{\epsilon}_{s}) \right\|_{L^{1}\cap L^{p}}+\left\| ((K-K_\epsilon)\ast \omega_s) \omega^{\epsilon}_{s} \right\|_{L^{1}\cap L^{p}}\\
&\,+\left\| (K_\epsilon*(\omega_s-\omega^{\epsilon}_{s}))\omega^{\epsilon}_{s}\right\|_{L^{1}\cap L^{p}}\\\leq&\, \left\| K\ast \omega_s \right\|_{\infty} \left\|\omega_s-\omega^{\epsilon}_{s} \right\|_{L^{1}\cap L^{p}}+\left\| (K-K_\epsilon)\ast \omega_s\right\|_{\infty} \left\|\omega^{\epsilon}_{s} \right\|_{L^{1}\cap L^{p}}\\
&\,+\left\| K_\epsilon*(\omega_s-\omega^{\epsilon}_{s})\right\|_{\infty}\left\|\omega^{\epsilon}_{s}\right\|_{L^{1}\cap L^{p}}.\\
\end{aligned}
\end{equation*}
By \eqref{l1p}, we have $\| K\ast \omega_s \|_{\infty} \leq C_K\|\omega_s \|_{L^1\cap L^p}$ and $\| K_{\epsilon}\ast (\omega_s- \omega^\epsilon_s) \|_{\infty} \leq C_K\|\omega_s -\omega^\epsilon_s \|_{L^1\cap L^p}$; moreover,
$$\| (K-K_\epsilon) \ast \omega_s \|_{\infty}= \|K\ast (\omega_s - \rho_\epsilon \ast \omega_s)\|_\infty \leq C_K\|\omega_s - \rho_\epsilon \ast \omega_s\|_{L^1\cap L^p}.$$
Therefore,
\begin{equation}\label{komega}
\begin{aligned}
&\,\left\| (K\ast \omega_s) \omega_s- (K_{\epsilon}\ast \omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}\right\|_{L^{1}\cap L^{p}}\\
\leq&\, C_K \left\|\omega_s-\omega^{\epsilon}_{s} \right\|_{L^{1}\cap L^{p}}\left(\left\| \omega_s \right\|_{L^{1}\cap L^{p}}+\left\| \omega^{\epsilon}_s \right\|_{L^{1}\cap L^{p}}\right)+C_K\left\| \omega_s-\rho_{\epsilon}\ast \omega_{s}\right\|_{L^{1}\cap L^{p}}\left\| \omega^{\epsilon}_{s} \right\|_{L^{1}\cap L^{p}}\\
\leq&\, C\left\|\omega_s-\omega^{\epsilon}_{s} \right\|_{L^{1}\cap L^{p}}+C\left\| \omega_s-\rho_{\epsilon}\ast \omega_{s}\right\|_{L^{1}\cap L^{p}},
\end{aligned}
\end{equation}
where the last inequality is due to
$$
\left\|\omega\right\|_{C\left([0,T],L^{1}\cap L^{p}(\mathbb{R}^d)\right)}\bigvee \sup_{\epsilon>0}\left\|\omega^{\epsilon}\right\|_{C\left([0,T],L^{1}\cap L^{p}(\mathbb{R}^d)\right)}\leq C<\infty.
$$
Substituting estimate \eqref{komega} into \eqref{omegaomgegaeps} and applying Lemma \ref{Gronwall}, we deduce that
\begin{equation}\label{boundomega}
\begin{aligned}
\sup_{t \in[0, T]}\left\|\omega_t-\omega^{\epsilon}_{t}\right\|_{L^{1}\cap L^{p}}\leq&\, C_T\, \bigg(\sup_{t \in[0, T]}\int_{0}^{t} \frac{1}{\sqrt{t-s}} \left\| \omega_s-\rho_{\epsilon}\ast \omega_{s}\right\|_{L^{1}\cap L^{p}}{\rm d} s \bigg).
\end{aligned}
\end{equation}
By H\"older's inequality, for some $q\in(1,2)$ with its conjugate number $q^{\prime}$,
$$
\begin{aligned}
&\,\sup_{t \in[0, T]}\int_{0}^{t}\frac{1}{\sqrt{t-s}} \left\| \omega_s-\rho_{\epsilon}\ast \omega_{s}\right\|_{L^{1}\cap L^{p}}{\rm d} s\\\leq&\,\sup_{t \in[0, T]}\bigg(\int_{0}^{t}\frac{1}{(t-s)^{\frac{q}{2}}}{\rm d} s\bigg)^{\frac{1}{q}}\left(\int_{0}^{t}\left\| \omega_s-\rho_{\epsilon}\ast \omega_{s}\right\|^{q^{\prime}}_{L^{1}\cap L^{p}}{\rm d} s\right)^{\frac{1}{q^{\prime}}}\\\leq&\,C_{T,q}\left(\int_{0}^{T}\left\| \omega_s-\rho_{\epsilon}\ast \omega_{s}\right\|^{q^{\prime}}_{L^{1}\cap L^{p}}{\rm d} s\right)^{\frac{1}{q^{\prime}}}.
\end{aligned}
$$
It is clear that
$
\lim\limits_{\epsilon\rightarrow0} \left\| \omega_s-\rho_{\epsilon}\ast \omega_{s}\right\|_{L^{1}\cap L^{p}}=0
$
for any $s\in[0,T]$, by dominated convergence theorem, we deduce that
$$
\lim\limits_{\epsilon\rightarrow0}\int_{0}^{T}\left\| \omega_s-\rho_{\epsilon}\ast \omega_{s}\right\|^{q^{\prime}}_{L^{1}\cap L^{p}}{\rm d} s=0.
$$
Combining these results with \eqref{boundomega}, we finish the proof.
\end{proof}
Now we aim to estimate the second part on the right-hand side of \eqref{split}.
Recall the mild formulations \eqref{mollified} and \eqref{tildeomegat}; we have
\begin{equation}\label{estimate}
\begin{aligned}
\left\|\omega^{\epsilon}_{t}-\omega_{t}^{N}\right\|_{L^{1}\cap L^{p}}\leq&\,\left\|e^{tA}\left(\omega_0-\omega_{0}^{N}\right)\right\|_{L^{1}\cap L^{p}}+\left\| Z^N_t\right\|_{L^{1}\cap L^{p}}\\
&+\int_{0}^{t}\left\| \nabla\cdot e^{(t-s) A}\left( (K_\epsilon*\omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}- V^{N}*\left( (K_{\epsilon}\ast \omega^N_s)S_s^N\right)\right)\right\|_{L^{1}\cap L^{p}}{\rm d} s.
\end{aligned}
\end{equation}
The third term on the right-hand side of \eqref{estimate} can be estimated as follows: by \eqref{lpestimate},
\begin{equation}\label{integrandsecond}
\begin{aligned}
&\,\int_{0}^{t}\left\| \nabla\cdot e^{(t-s) A}\left( (K_\epsilon*\omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}- V^{N}*\left( (K_{\epsilon}\ast \omega^N_s)S_s^N\right)\right)\right\|_{L^{1}\cap L^{p}}{\rm d} s\\
\leq&\,C_{\nu,T}\int_{0}^{t} \frac{1}{\sqrt{t-s}}\left\| (K_\epsilon*\omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}- V^{N}*\left( (K_{\epsilon}\ast \omega^N_s)S_s^N\right)\right\|_{L^{1}\cap L^{p}}{\rm d} s.\\
\end{aligned}
\end{equation}
We observe that
\begin{equation*}
\begin{aligned}
& \left\| (K_\epsilon*\omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}- V^{N}\ast\left( (K_{\epsilon}\ast \omega^N_s)S_s^N\right) \right\|_{L^{1}\cap L^{p}} \\
\leq& \left\| (K_{\epsilon}\ast \omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}- (K_{\epsilon}\ast \omega^N_s) \omega^N_s\right\|_{L^{1}\cap L^{p}} +\left\| (K_{\epsilon}\ast \omega^N_s) \omega^N_s- V^{N}\ast \left( (K_{\epsilon}\ast \omega^N_s)S_s^N\right)\right\|_{L^{1}\cap L^{p}}\\
=:&\, L_1+L_2.
\end{aligned}
\end{equation*}
For the first term $L_1$, note that
\begin{equation*}
(K_{\epsilon}\ast \omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}- (K_{\epsilon}\ast \omega^N_s) \omega^N_s=(K_{\epsilon}\ast (\omega^{\epsilon}_{s}-\omega^N_s))\omega^{\epsilon}_{s}+(K_{\epsilon}\ast \omega^N_s)(\omega^{\epsilon}_{s}-\omega^N_s);
\end{equation*}
using the bound $\sup_{\epsilon>0}\left\|\omega^{\epsilon}\right\|_{C([0,T],L^{1}\cap L^{p})}\leq C$ and \eqref{l1p}, it holds
\begin{equation*}
\begin{aligned}
&\, \left\|(K_{\epsilon}\ast (\omega^{\epsilon}_{s}-\omega^N_s))\omega^{\epsilon}_{s}\right\|_{L^{1}\cap L^{p}} \\ \leq&\,\left\|K_{\epsilon}\ast \left(\omega^{\epsilon}_{s}-\omega^N_s\right)\right\|_{\infty}\left\|\omega^{\epsilon}_{s}\right\|_{L^{1}\cap L^{p}} \leq C\left\|K\ast\rho_{\epsilon}\ast \left(\omega^{\epsilon}_{s}-\omega^N_s\right)\right\|_{\infty} \\
\leq & \,C_K\left\| \rho_{\epsilon}\ast \left(\omega^{\epsilon}_{s}-\omega^N_s\right)\right\|_{L^{1}\cap L^{p}}\leq\,C_K\left\| \omega^{\epsilon}_{s}-\omega^N_s\right\|_{L^{1}\cap L^{p}}.
\end{aligned}
\end{equation*}
Next, by \eqref{kg}, we have
\begin{equation*}
\begin{aligned}
\left\|(K_{\epsilon}\ast \omega^N_s)(\omega^{\epsilon}_{s}-\omega^N_s)\right\|_{L^{1}\cap L^{p}}
&\leq\left\|K_{\epsilon}\ast \omega_{s}^{N}\right\|_{\infty}\left\|\omega^{\epsilon}_{s}-\omega^N_s\right\|_{L^{1}\cap L^{p}}\\
& \leq\left\|K_{\epsilon}\right\|_{\infty}\left\|\omega^{\epsilon}_{s}-\omega^N_s\right\|_{L^{1}\cap L^{p}}.
\end{aligned}
\end{equation*}
Thus, for any small enough $\epsilon>0$,
\begin{equation}\label{kk}
\begin{aligned}
L_1
\leq\, \big(C_K+\left\|K_{\epsilon}\right\|_{\infty}\big)\left\|\omega^{\epsilon}_{s}-\omega^N_s\right\|_{L^{1}\cap L^{p}}
\leq\, C\left\|K_{\epsilon}\right\|_{\infty}\left\|\omega^{\epsilon}_{s}-\omega^N_s\right\|_{L^{1}\cap L^{p}},
\end{aligned}
\end{equation}
where the constant $C$ is independent of $\epsilon$.
For the second term $L_2$, we have
$$L_2= \left\|\int_{\mathbb{R}^d} V^N(x-y)\left( (K_{\epsilon}\ast \omega^N_s)(x)- (K_{\epsilon}\ast \omega^N_s)(y)\right)S_s^N({\rm d} y)\right\|_{L^{1}\cap L^{p}}.$$
We observe that
$$
\begin{aligned}
\left| (K_{\epsilon}\ast \omega^N_s)(x)- (K_{\epsilon}\ast \omega^N_s)(y)\right|
&\leq\,\int_{\mathbb{R}^d}\left|K_{\epsilon}(x-z)-K_{\epsilon}(y-z)\right|\omega^N_s(z){\rm d} z \\
&\leq \left\|\nabla K_{\epsilon}\right\|_{\infty}\left|x-y\right|.
\end{aligned}
$$
Therefore, it yields
\begin{equation}\label{yx}
\begin{aligned}
L_2\leq &\,\left\|\int_{\mathbb{R}^d} V^N(x-y)\left| (K_{\epsilon}\ast \omega^N_s)(x)- (K_{\epsilon}\ast \omega^N_s)(y)\right|S_s^N({\rm d} y)\right\|_{L^{1}\cap L^{p}}\\
\leq &\,\left\|\nabla K_{\epsilon}\right\|_{\infty}\left\|\int_{\mathbb{R}^d} V^N(x-y)\left|x-y\right|S_s^N({\rm d} y)\right\|_{L^{1}\cap L^{p}}\\
\leq&\,\frac{C\left\|\nabla K_{\epsilon}\right\|_{\infty}}{N^{\beta}}\left\|\omega_{s}^{N}\right\|_{L^{1}\cap L^{p}},
\end{aligned}
\end{equation}
where the last inequality is because that $V^N$ is supported on $\frac{\mathrm{supp} V}{N^{\beta}}$, where $\mathrm{supp} V$ denotes the support of $V$.
Substituting \eqref{kk} and \eqref{yx} into \eqref{integrandsecond} yields
\begin{equation}\label{secondomegaN}
\begin{aligned}
&\,\int_{0}^{t}\left\| \nabla\cdot e^{(t-s) A}\left( (K_\epsilon*\omega^{\epsilon}_{s}) \omega^{\epsilon}_{s}- V^{N}*\left( (K_{\epsilon}\ast \omega^N_s)S_s^N\right)\right)\right\|_{L^{1}\cap L^{p}}{\rm d} s\\
\leq&\,\frac{C\left\|\nabla K_{\epsilon}\right\|_{\infty}}{N^{\beta}}\int_{0}^{t} \frac{\left\|\omega_{s}^{N}\right\|_{L^{1}\cap L^{p}}}{\sqrt{t-s}} {\rm d} s +C\left\|K_{\epsilon}\right\|_{\infty} \int_{0}^{t}\frac{\left\|\omega^{\epsilon}_{s}-\omega^N_s\right\|_{L^{1}\cap L^{p}}}{\sqrt{t-s}} {\rm d} s.
\end{aligned}
\end{equation}
Combining this estimate with \eqref{estimate} and using the simple inequality $ \big\| e^{tA} \big(\omega_0-\omega_{0}^{N}\big) \big\|_{L^{1}\cap L^{p}}\leq \left\|\omega_0-\omega_{0}^{N} \right\|_{L^{1}\cap L^{p}} $ , we deduce that
$$\aligned
\left\|\omega^{\epsilon}_t-\omega_{t}^{N}\right\|_{L^{1}\cap L^{p}} &\leq \big\|\omega_0 - \omega^N_0 \big\|_{L^1\cap L^p} + \big\| Z^N_t \big\|_{L^1\cap L^p} \\
&\quad + \frac{C \|\nabla K_{\epsilon} \|_{\infty}}{N^{\beta}}\int_{0}^{t} \frac{\left\|\omega_{s}^{N}\right\|_{L^{1}\cap L^{p}}}{\sqrt{t-s}} {\rm d} s +C \|K_{\epsilon} \|_{\infty} \int_{0}^{t}\frac{\left\|\omega^{\epsilon}_{s}-\omega^N_s\right\|_{L^{1}\cap L^{p}}}{\sqrt{t-s}} {\rm d} s.
\endaligned $$
By Lemma \ref{Gronwall},
\begin{equation}\label{omegamittag}
\begin{aligned}
&\,\sup_{t \in[0, T]}\left\|\omega^{\epsilon}_t-\omega_{t}^{N}\right\|_{L^{1}\cap L^{p}} \\
\leq&\,\bigg( \left\|\omega_0-\omega_{0}^{N} \right\|_{L^{1}\cap L^{p}} +\frac{C\left\|\nabla K_{\epsilon} \right\|_{\infty}}{N^{\beta}}\sup_{t \in[0, T]} \int_{0}^{t}\frac{\left\|\omega^N_s\right\|_{L^{1}\cap L^{p}}}{\sqrt{t-s}} {\rm d} s+\sup_{t \in[0, T]}\left\|Z^N_{t}\right\|_{L^{1}\cap L^{p}} \bigg)\\
& \times E_{\frac{1}{2}}\big(C_T\left\|K_{\epsilon}\right\|_{\infty}\big),\\
\end{aligned}
\end{equation}
where, by \eqref{estimationmittag}, one has
\begin{equation}\label{estimationKmittag}
E_{\frac{1}{2}}\left(C_T\left\|K_{\epsilon}\right\|_{\infty}\right)\leq 2\mathrm{exp}\big(C\left\|K_{\epsilon}\right\|_{\infty}^2\big).
\end{equation}
Since $m>2$ and $m^{\prime}:=\frac{m}{m-1}\in(1,2)$, we have
\begin{equation*
\begin{aligned}
&\, \bigg\|\sup_{t \in[0, T]}\int_{0}^{t}\frac{1}{\sqrt{t-s}}\left\|\omega^N_s\right\|_{L^{1}\cap L^{p}}{\rm d} s \bigg\|_{L^m(\Omega)}\\
\leq& \left\|\sup_{t \in[0, T]}\bigg(\int_{0}^{t}\left\|\omega^N_s\right\|^m_{L^{1}\cap L^{p}}{\rm d} s\bigg)^{\frac{1}{m}}\bigg(\int_{0}^{t} \frac{1}{(t-s)^{\frac{m'}2}}\, {\rm d} s\bigg)^{\frac{1}{m^{\prime}}}\right\|_{L^m(\Omega)}\\
\leq&\, C_{T,m} \bigg(\mathbb{E}\int_{0}^{T}\left\|\omega^N_s\right\|^m_{L^{1}\cap L^{p}}{\rm d} s\bigg)^{\frac{1}{m}}
\leq\, C_{T,m} \sup_{t \in[0, T]}\left\|\omega_{t}^{N}\right\|_{L^m(\Omega,L^{1}\cap L^{p})}.
\end{aligned}
\end{equation*}
By Proposition \ref{estimategtN}, for any small enough $\epsilon>0$, we already have
\begin{equation*}
\sup_{t \in[0, T]}\left\|\omega_{t}^{N}\right\|_{L^m(\Omega,L^p)} \leq C\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}}\exp \big(C\left\|K_{\epsilon}\right\|_{\infty}^2 \big) \quad \text{and} \quad\sup_{t \in[0, T]}\left\|\omega_{t}^{N}\right\|_{L^m(\Omega,L^1)}=1,
\end{equation*}
then \begin{equation}\label{estimationsecond}
\begin{aligned}
\bigg\| \sup_{t \in[0, T]}\int_{0}^{t}\frac{1}{\sqrt{t-s}}\left\|\omega^N_s \right\|_{L^{1}\cap L^{p}} {\rm d} s\bigg\|_{L^m(\Omega)}\leq\, C_T\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}} \exp\big( C\left\|K_{\epsilon}\right\|_{\infty}^2 \big).
\end{aligned}
\end{equation}
For the first term in the second line of \eqref{omegamittag}, by Hypotheses \ref{hypothesis-initial},
\begin{equation
\left\|\omega_0-\omega_{0}^{N}\right\|_{L^m(\Omega,L^{1}\cap L^{p})}= \zeta_N\rightarrow 0\quad\text{as}\quad N\rightarrow\infty.
\end{equation}
For the stochastic convolution term in \eqref{omegamittag}, Theorem \ref{stochasticconvolution} yields that
\begin{equation}\label{estimationstocon}
\bigg\| \sup_{t \in[0, T]}\left\| Z^N_t\right\|_{L^{1}\cap L^{p} (\mathbb{R}^{d} )} \bigg\|_{L^m(\Omega)} \leq C\left\| K_{\epsilon} \right\|_{\infty}^{d+1} N^{-\iota},
\end{equation}
where $\iota$ relies on the choice of $\beta$ in the potential function $V^N$. Recall the estimates in Section \ref{sectionkernel}: $\left\| K_{\epsilon} \right\|_{\infty} \leq C\epsilon^{-d/p^{\prime}}$ and $\left\|\nabla K_{\epsilon}\right\|_{\infty}\leq C\epsilon^{-1-d/p^{\prime}}$ for any small enough $\epsilon>0$; combining from \eqref{omegamittag}
to \eqref{estimationstocon}, we deduce that
\begin{equation}\label{mainGronwall}
\begin{aligned}
&\,\bigg\| \sup_{t \in[0, T]}\left\|\omega^{\epsilon}_t-\omega_{t}^{N}\right\|_{L^{1}\cap L^{p}} \bigg\|_{L^m(\Omega)}\\
\leq&\,C\Bigg[ \zeta_N +\frac{\epsilon^{-1-\frac{d}{p^{\prime}}-\frac{d^2}{mp^{\prime}}}}{N^{\beta}} \exp\left(C^{\prime} \epsilon^{-\frac{2d}{p^{\prime}}} \right) +\frac{\epsilon^{-\frac{d(d+1)}{p^{\prime}}}}{N^{\iota}} \Bigg] \exp\left(C^{\prime}\epsilon^{-\frac{2d}{p^{\prime}}}\right).
\end{aligned}
\end{equation}
In conclusion, we obtain the following result.
\begin{proposition}\label{main1}
Assume Hypotheses \ref{hypothesis0}, \ref{hypothesis} and \ref{hypothesis-initial};
for some $\theta>0$ satisfying $C^{\prime}\theta<\mathrm{min}\big\{\frac{\beta}{2},\iota\big\}<1$ where $C^{\prime}$, $\beta$ and $\iota$ are the same as in \eqref{mainGronwall}, we take
\begin{equation*}
\epsilon= \epsilon(N)= \big[(\theta\log N)\wedge (-\theta\log \zeta_N)\big]^{-\frac{p^{\prime}}{2d}}
\end{equation*}
Then for any $T\in(0,T_{max})$ and small $\kappa>0$, the difference between the mollified empirical measure \eqref{mollifiedmeasure} and solution of \eqref{PDE-eps} can be estimated as
\begin{equation}\label{secondpartlimit}
\bigg\|\sup_{t \in[0, T]}\left\|\omega^{\epsilon}_t-\omega_{t}^{N}\right\|_{L^{1}\cap L^{p}} \bigg\|_{L^m(\Omega)}\leq C\big(\zeta_N^{1-C^{\prime}\theta}\vee N^{-(\beta-2C^{\prime}\theta)+\kappa}\vee N^{-(\iota-C^{\prime}\theta)+\kappa} \big).
\end{equation}
\end{proposition}
The proof is obvious since we notice that
$$\exp\left(C^{\prime}\epsilon(N)^{-\frac{2d}{p^{\prime}}}\right) =\exp\left((C^{\prime}\theta\log N)\wedge (-C^{\prime}\theta\log \zeta_N)\right)=N^{C^{\prime}\theta}\wedge \zeta_N^{-C^{\prime}\theta}, $$
and
\begin{equation*
\begin{aligned}
\bigg\| \sup_{t \in[0, T]}\left\|\omega^{\epsilon}_t-\omega_{t}^{N}\right\|_{L^{1}\cap L^{p}} \bigg\|_{L^m(\Omega)}
\leq\, C\Bigg[ \frac{\zeta_N}{\zeta_N^{C^{\prime}\theta}}+\frac{(\theta\log N)^{\frac{1}{2}\big(1+\frac{p^{\prime}}{d}+\frac{d}{m}\big)}}{N^{\beta-2C^{\prime}\theta}}
+\frac{\left(\theta\log N\right)^{\frac{d+1}{2}}}{N^{\iota-C^{\prime}\theta}}\Bigg].
\end{aligned}
\end{equation*}
\begin{proof}[Proof of Theorem \ref{thm-main}]
If we also take $\epsilon=\epsilon(N)\sim \big[(\log N)\wedge (-\log \zeta_N)\big]^{-\frac{p^{\prime}}{2d}}$ in Proposition \ref{firstpart}, it holds that
\begin{equation}\label{firstpartlimit}
\lim\limits_{N\rightarrow\infty}\sup_{t \in[0, T]}\left\|\omega_t-\omega^{\epsilon}_{t}\right\|_{L^{1}\cap L^{p}(\mathbb{R}^d)}=0.
\end{equation}
Therefore, substituting \eqref{secondpartlimit} and \eqref{firstpartlimit} into \eqref{split}, we finish the proof of Theorem \ref{thm-main}.
\end{proof}
\begin{appendix}
\section{Estimates on stochastic convolution}\label{appendixstochastic}
The purpose of this part is to prove Propositions \ref{supztp} and \ref{supzt1} concerning the stochastic convolution $Z_t^N$ defined in \eqref{mollifiedzt}. First, we present a useful lemma, which is a consequence of Garsia-Rodemich-Rumsey's Lemma \cite{GR70} for Banach spaces (see proof in \cite[Theorem A.1]{FK10}).
\begin{lemma}\label{sup}
Let $E$ be a Banach space and $\left(Y^{N}\right)_{N \geq 1}$ a sequence of $E$-valued continuous processes on $[0, T]$. For $m \geq 1$ and $\eta>0$ satisfying $m \eta>1$, we assume that there exist constants $\rho>0$, $C>0$ and a sequence $\left(\chi_{N}\right)_{N \geq 1}$ of positive real numbers such that
$$ \left\|Y_{t}^{N}-Y_{s}^{N}\right\|_{L^m(\Omega,E)} \leq C|t-s|^{\eta} \chi_{N}^{\rho}, \quad \forall s, t \in[0, T],\, \forall N \geq 1.
$$
Then there exists a constant $C_{m, \eta, T}>0$, depending only on $m, \eta$ and $T$, such that for any $ N \geq 1$,
$$
\left(\mathbb{E} \bigg[\sup _{t \in[0, T]}\left\|Y_{t}^{N}-Y_{0}^{N}\right\|_{E}^{m} \bigg] \right)^{\frac{1}{m}} \leq C_{m, \eta, T} \, \chi_{N}^{\rho}.
$$
\end{lemma}
To prove Propositions \ref{supztp} and \ref{supzt1}, we shall apply Lemma \ref{sup} to Banach spaces $E=L^p(\mathbb{R}^d)$ and $E=L^1(\mathbb{R}^d)$.
\subsection{Proof of Proposition \ref{supztp}}\label{sectiona3}
We consider the Banach space $E=L^p(\mathbb{R}^d)$ in Lemma \ref{sup}; recall the expression \eqref{mollifiedzt} of $Z_t^N$, for $p>2$ and for any $s,t\in[0,T]$,
\begin{equation}\label{m1m2p}
\begin{aligned}
&\,\big\|Z_t^N-Z^N_s \big\|_{L^m\left(\Omega,L^p\right)}\\
\leq&\, \bigg\|\sum_{k} \int_{s}^{t} \nabla\cdot e^{(t-\tau) A}\left( V^{N} \ast \left(\sigma_k^N S_{\tau}^{N}\right)\right) {\rm d} W_{\tau}^{k} \bigg\|_{L^m\left(\Omega,L^p\right)}\\
&\,+\bigg\|\sum_{k} \int_{0}^{s} \nabla\cdot e^{(s-\tau) A}\left( e^{(t-s)A}\left(V^{N} \ast \left(\sigma_k^N S_{\tau}^{N}\right)\right)-V^{N} \ast \left(\sigma_k^N S_{\tau}^{N}\right)\right) {\rm d} W_{\tau}^{k} \bigg\|_{L^m\left(\Omega,L^p\right)}\\
=:&\,M_1+M_2.
\end{aligned}
\end{equation}
\noindent In the sequel, we will estimate $M_1$ and $M_2$ respectively.
\smallskip
\noindent\textbf{Step 1. The bound of $M_1$ in \eqref{m1m2p}}. \smallskip
It is easy to show that
\begin{equation}\label{M-1.1}
e^{(t-\tau) A}\left( V^{N} \ast \left(\sigma_k^N S_{\tau}^{N}\right)\right)(\cdot) =\frac{1}{N}\sum_{i=1}^{N} \sigma_{k}^{N}(X_{\tau}^{N,i}) \big(e^{(t-\tau) A} V^{N}\big) \left(\cdot-X_{\tau}^{N,i}\right),
\end{equation}
thus,
$$
\begin{aligned}
M_1=
&\,\bigg\|\sum_{k} \int_{s}^{t} \frac{1}{N}\sum_{i=1}^{N}\nabla\cdot \Big[\sigma_{k}^{N}(X_{\tau}^{N,i})\big(e^{(t-\tau) A} V^{N}\big) \left(\cdot-X_{\tau}^{N,i}\right) \Big]{\rm d} W_{\tau}^{k} \bigg\|_{L^m\left(\Omega,L^p\right)}\\
=&\, \bigg\|\sum_{k} \int_{s}^{t}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot \big( \nabla e^{(t-\tau) A} V^{N}\big)\left(\cdot-X_{\tau}^{N,i}\right) {\rm d} W_{\tau}^{k} \bigg\|_{L^{m}(\Omega,L^{p})}.\\
\end{aligned}
$$
Then applying Sobolev embedding $H^{d(\frac{1}{2}-\frac{1}{p}),2}(\mathbb{R}^d)\subset L^p(\mathbb{R}^d)$, we have
{\small \begin{equation*}
\begin{aligned}
M_1^m
\leq&\, C \mathbb{E}\bigg\|\sum_{k} \int_{s}^{t}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot \! \Big((\mathrm{I}-A)^{\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} \nabla e^{(t-\tau) A} V^{N}\Big)\! \big(\cdot-X_{\tau}^{N,i}\big) {\rm d} W_{\tau}^{k} \bigg\|_{L^2}^m\\
\leq&\, C\mathbb{E}\Bigg[ \sum_{k}\int_{s}^{t} \bigg\|\frac{1}{N} \sum_{i=1}^{N} \sigma_{k}^{N}(X_{\tau}^{N,i}) \cdot \! \Big((\mathrm{I}-A)^{\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} \nabla e^{(t-\tau) A} V^{N}\Big)\! \big(\cdot-X_{\tau}^{N,i}\big) \bigg\|_{L^{2}}^{2} {\rm d} \tau \Bigg]^{\frac{m}{2}}.\\
\end{aligned}
\end{equation*} }
\noindent Define the operator
\begin{equation}\label{operatorlt}
\mathcal{L}_{t,\tau}:=(\mathrm{I}-A)^{\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} \nabla e^{(t-\tau) A}, \quad t>\tau\geq 0;
\end{equation}
by \eqref{defQN}, we have
\begin{equation*}
\begin{aligned}
&\,\sum_{k} \bigg\|\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot\mathcal{L}_{t,\tau}
V^{N} \big(\cdot-X_{\tau}^{N,i}\big) \bigg\|_{L^{2}}^{2}\\
=&\,\sum_{k}\! \int_{\mathbb{R}^d}\! \frac{1}{N^2}\!\! \sum_{i,j=1}^{N} \! \big[\sigma_{k}^{N}(X_{\tau}^{N,i}) \cdot\mathcal{L}_{t,\tau}
V^{N}\! \big(x-X_{\tau}^{N,i}\big)\big] \big[\sigma_{k}^{N}(X_{\tau}^{N,j})\cdot\mathcal{L}_{t,\tau}
V^{N}\! \big(x-X_{\tau}^{N,j}\big) \big]{\rm d} x\\
\leq&\, \frac{1}{N^2}\sum_{i,j=1}^{N}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right| \int_{\mathbb{R}^d}\left| \mathcal{L}_{t,\tau} V^{N} \big(x-X_{\tau}^{N,i}\big)\right|\left|\mathcal{L}_{t,\tau}
V^{N} \big(x-X_{\tau}^{N,j}\big) \right|{\rm d} x,
\end{aligned}
\end{equation*}
which, by Cauchy-Schwarz inequality, is dominated by
$$
\frac{1}{N^2}\sum_{i,j=1}^{N}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|\left\|\mathcal{L}_{t,\tau}
V^{N}\right\|^{2}_{L^2}.
$$
As a result,
\begin{equation}\label{ELL}
\begin{aligned}
\xi_N:= &\,\sum_{k}\int_{s}^{t} \bigg\|\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot\mathcal{L}_{t,\tau}
V^{N}\left(\cdot-X_{\tau}^{N,i}\right) \bigg\|_{L^{2}}^{2} {\rm d} \tau\\
\leq&\, \frac{1}{N^2}\sum_{i,j=1}^{N}\int_{s}^{t}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|\left\|\mathcal{L}_{t,\tau}
V^{N}\right\|^{2}_{L^2}{\rm d} \tau\\
\leq&\,\frac{1}{N^2}\sum_{i,j=1}^{N}\left(\int_{s}^{t}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|^m{\rm d} \tau\right)^{\frac{1}{m}}\left(\int_{s}^{t}\left\|\mathcal{L}_{t,\tau}
V^{N}\right\|^{2m^{\prime}}_{L^2}{\rm d} \tau\right)^{\frac{1}{m^{\prime}}},
\end{aligned}
\end{equation}
where $m^{\prime}$ denotes the conjugate number of $m$. Then, Jensen's inequality yields
\begin{equation}\label{EQL}
\begin{aligned}
M_1^m\leq&\, C\mathbb{E}\left[\xi_N\right]^{\frac{m}{2}}\\ \leq&\,C\mathbb{E}\Bigg[\frac{1}{N^2}\sum_{i,j=1}^{N}\left(\int_{s}^{t}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|^m{\rm d} \tau\right)^{\frac{1}{m}} \Bigg]^{\frac{m}{2}}\left(\int_{s}^{t}\left\|\mathcal{L}_{t,\tau}
V^{N}\right\|^{2m^{\prime}}_{L^2}{\rm d} \tau\right)^{\frac{m}{2m^{\prime}}}\\
\leq&\,\frac{C}{N^2}\sum_{i,j=1}^{N}\mathbb{E}\left[\int_{s}^{t}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|^m{\rm d} \tau\right]^{\frac{1}{2}}\left(\int_{s}^{t}\left\|\mathcal{L}_{t,\tau}
V^{N}\right\|^{2m^{\prime}}_{L^2}{\rm d} \tau\right)^{\frac{m}{2m^{\prime}}}.\\
\end{aligned}
\end{equation}
For $\delta<1$ we have
$$\aligned
\left\|\mathcal{L}_{t,\tau} V^{N}\right\|_{L^2} =&\,\left\|(\mathrm{I}-A)^{\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} \nabla e^{(t-\tau) A} V^{N}\right\|_{L^{2}}\\
=&\,\left\|(\mathrm{I}-A)^{-\frac{\delta}{2}} \nabla e^{(t-\tau) A}(\mathrm{I}-A)^{\frac{\delta}{2}+\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} V^{N}\right\|_{L^{2}};
\endaligned $$
then by \eqref{lpestimate},
\begin{equation}\label{estimatelst}
\begin{aligned}
\left\|\mathcal{L}_{t,\tau} V^{N}\right\|_{L^2} \leq \frac{C_{\delta,\nu,T}}{(t-\tau)^{\frac{1-\delta}{2}}} \left\|V^{N}\right\|_{\delta+d(\frac{1}{2}-\frac{1}{p}), 2} \leq \frac{C_{\delta,\nu,T}}{(t-\tau)^{\frac{1-\delta}{2}}} N^{\beta \big(d+\delta-\frac{d}{p} \big)}.
\end{aligned}
\end{equation}
By Hypotheses \ref{hypothesis}, we have $\frac{2}{m}<\delta<1$ which implies $m^{\prime}(1-\delta)<1$; consequently,
\begin{equation}\label{lst}
\begin{aligned}
\left(\int_{s}^{t}\left\|\mathcal{L}_{t,\tau} V^{N}\right\|^{2m^{\prime}}_{L^2} {\rm d} \tau\right)^{\frac{1}{2m^{\prime}}}
\leq&\, C_{\delta,\nu,T}N^{\beta \big(d+\delta-\frac{d}{p} \big)} \left(\int_{s}^{t} \frac{1}{(t-\tau)^{m^{\prime}(1-\delta)}} {\rm d} \tau\right)^{\frac{1}{2m^{\prime}}}\\
\leq&\, C_{\delta,\nu,T} N^{\beta\big(d+\delta-\frac{d}{p}\big)} \left(t-s\right)^{\frac{1}{2}\left(\delta-\frac{1}{m}\right)}.
\end{aligned}
\end{equation}
Applying Lemma \ref{convratelemma}, we obtain
\begin{equation}\label{NEQ}
\frac{1}{N^2}\sum_{i,j=1}^{N}\left(\mathbb{E}\left[\int_{s}^{t}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|^m{\rm d} \tau\right]\right)^{\frac{1}{2}}\leq C\left(t-s\right)^{\frac{1}{2}}\left\|K_{\epsilon}\right\|_{\infty}^{d}N^{-\frac{1}{4}}.
\end{equation}
Substituting \eqref{lst} and \eqref{NEQ} into \eqref{EQL} yields that
\begin{equation}\label{step1p}
M_1\leq C_{\delta}\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}}N^{\beta\big(d+\delta-\frac{d}{p}\big) -\frac{1}{4m}} (t-s )^{\frac{\delta}{2}}.
\end{equation}
\smallskip
\noindent\textbf{Step 2. The bound of $M_2$ in \eqref{m1m2p}}. \smallskip
Similarly to \eqref{M-1.1}, and using Sobolev embedding theorem, we have
$$\aligned
&\, \bigg\|\sum_{k} \int_{0}^{s} \nabla\cdot e^{(s-\tau) A}\left( e^{(t-s)A}\left(V^{N} \ast \left(\sigma_k^N S_{\tau}^{N}\right)\right)-V^{N} \ast \left(\sigma_k^N S_{\tau}^{N}\right)\right) {\rm d} W_{\tau}^{k} \bigg\|_{L^p} \\
=&\, \bigg\|\sum_{k} \int_{0}^{s}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot \Big[\nabla e^{(s-\tau) A} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N} \Big] \big(\cdot-X_{\tau}^{N,i} \big)\, {\rm d} W_{\tau}^{k} \bigg\|_{L^p} \\
\leq &\, C \bigg\|\sum_{k} \int_{0}^{s}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot \big[\mathcal{L}_{s,\tau} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N} \big]\big(\cdot-X_{\tau}^{N,i} \big)\, {\rm d} W_{\tau}^{k} \bigg\|_{L^2},
\endaligned$$
where the operator $\mathcal{L}_{s,\tau}$ is defined in \eqref{operatorlt}. Hence,
\begin{equation*}
\begin{aligned}
M_2^m\leq&\, C_m \mathbb{E} \bigg\|\sum_{k} \int_{0}^{s}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot \mathcal{L}_{s,\tau} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N}\left(\cdot-X_{\tau}^{N,i}\right) {\rm d} W_{\tau}^{k} \bigg\|_{L^2}^m \\
\leq&\, C'_m \mathbb{E}\Bigg[ \sum_{k}\int_{0}^{s} \bigg\|\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot\mathcal{L}_{s,\tau} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N}\left(\cdot-X_{\tau}^{N,i}\right) \bigg\|_{L^{2}}^{2} {\rm d} \tau \Bigg]^{\frac{m}{2}}.
\end{aligned}
\end{equation*}
Following the ideas in the treatments of \eqref{ELL} and \eqref{EQL}, we replace $V^N$ by $\big(e^{(t-s)A}-\mathrm{I}\big)V^{N}$, integrate from $0$ to $s$ and obtain
\begin{equation*}
\begin{aligned}
&\,\mathbb{E}\Bigg[\sum_{k}\int_{0}^{s} \bigg\| \frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot\mathcal{L}_{s,\tau}
\big(e^{(t-s)A}-\mathrm{I}\big)V^{N}\left(\cdot-X_{\tau}^{N,i}\right) \bigg\|_{L^{2}}^{2} {\rm d} \tau \Bigg]^{\frac{m}{2}}\\
\leq&\,\mathbb{E}\Bigg[\frac{1}{N^2}\! \sum_{i,j=1}^{N}\! \left(\int_{0}^{s}\! \left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|^m{\rm d} \tau\! \right)^{\!\! \frac{1}{m}} \!\! \Bigg]^{\!\frac{m}{2}} \! \bigg[\int_{0}^{s}\! \big\|\mathcal{L}_{s,\tau} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N} \big\|^{2m^{\prime}}_{L^2}\! {\rm d} \tau \bigg]^{\! \frac{m}{2m^{\prime}}}.
\end{aligned}
\end{equation*}
Similarly to the estimate on $M_1$, it yields
\begin{equation*}
\begin{aligned}
M_2
\leq&\,C\Bigg\{\frac{1}{N^2}\sum_{i,j=1}^{N} \mathbb{E}\left[\int_{0}^{s}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|^m{\rm d} \tau\right]^{\frac{1}{2}}\Bigg\}^{\frac{1}{m}} \\
&\, \times \bigg[\int_{0}^{s} \big\|\mathcal{L}_{s,\tau} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N} \big\|^{2m^{\prime}}_{L^2} {\rm d} \tau \bigg]^{\frac{1}{2m^{\prime}}}\\
\leq&\, C\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}}N^{-\frac{1}{4m}} \bigg[\int_{0}^{s} \big\|\mathcal{L}_{s,\tau} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N} \big\|^{2m^{\prime}}_{L^2}{\rm d} \tau \bigg]^{\frac{1}{2m^{\prime}}}.
\end{aligned}
\end{equation*}
To get the same term $\left(t-s\right)^{\frac{\delta}{2}}$ as in the bound of $M_1$, we estimate $M_2$ in two ways. For $f\in H^1(\mathbb{R}^d)$, it holds
\begin{equation}\label{etsestimate1}
\big\|\big(e^{(t-s)A}-\mathrm{I}\big)f \big\|_{L^2}\leq\left\|\nabla f\right\|_{L^2}\sqrt{t-s}.
\end{equation}
Recalling the definition of $\mathcal{L}_{s,\tau}$ in \eqref{operatorlt}, we have
\begin{equation*}
\begin{aligned}
\big\|\mathcal{L}_{s,\tau} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N}\big\|_{L^2} =&\,\left\|(\mathrm{I}-A)^{\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} \nabla e^{(s-\tau) A} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N}\right\|_{L^{2}}\\
=&\,\left\|(\mathrm{I}-A)^{-\frac{\delta}{2}} \nabla e^{(s-\tau) A} \big(e^{(t-s)A}-\mathrm{I}\big)(\mathrm{I}-A)^{\frac{\delta}{2}+\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} V^{N}\right\|_{L^{2}}.\\
\end{aligned}
\end{equation*}
Taking $f=(\mathrm{I}-A)^{\frac{\delta}{2}+\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} V^{N}$, by \eqref{etsestimate1},
\begin{equation*}
\begin{aligned}
&\, \big\|\mathcal{L}_{s,\tau} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N} \big\|_{L^2} \\
\leq&\,\big\|(\mathrm{I}-A)^{-\frac{\delta}{2}} \nabla e^{(s-\tau) A} \big\|_{L^{2}\rightarrow L^{2}} \left\| \nabla(\mathrm{I}-A)^{\frac{\delta}{2} +\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} V^{N}\right\|_{L^{2}}\sqrt{t-s}\\
\leq&\, \frac{C_{\delta,\nu,T}\sqrt{t-s}}{(s-\tau)^{\frac{1-\delta}{2}}}\left\|V^{N}\right\|_{1+\delta+d(\frac{1}{2}-\frac{1}{p}), 2} \leq \frac{C_{\delta,\nu,T}\sqrt{t-s}}{(s-\tau)^{\frac{1-\delta}{2}}} N^{\beta\big(d+1+\delta-\frac{d}{p}\big)}.
\end{aligned}
\end{equation*}
Then,
\begin{equation}\label{M21}
\begin{aligned}
M_2\leq C_{\delta,\nu,T}\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}} N^{\beta\big(d+1+\delta-\frac{d}{p}\big) -\frac{1}{4m}}\sqrt{t-s}
\end{aligned}
\end{equation}
If we use the estimate
\begin{equation}\label{etsestimate2}
\big\|\big(e^{(t-s)A}-\mathrm{I}\big)f \big\|_{L^2} \leq 2 \| f \|_{L^2}
\end{equation}
rather than \eqref{etsestimate1}, still taking $f=(\mathrm{I}-A)^{\frac{\delta}{2}+\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} V^{N}$, then
\eqref{estimatelst} implies that
\begin{equation*}
\begin{aligned}
\big\|\mathcal{L}_{s,\tau} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N} \big\|_{L^2} \leq&\,2\left\|(\mathrm{I}-A)^{-\frac{\delta}{2}} \nabla e^{(s-\tau) A} \right\|_{L^{2}\rightarrow L^{2}}\left\|(\mathrm{I}-A)^{\frac{\delta}{2}+\frac{d}{2}(\frac{1}{2}-\frac{1}{p})} V^{N}\right\|_{L^{2}} \\ \leq&\, \frac{C_{\delta,\nu,T}}{(s-\tau)^{\frac{1-\delta}{2}}} N^{\beta\big(d+\delta-\frac{d}{p}\big)}.
\end{aligned}
\end{equation*}
Thus,
\begin{equation}\label{M22}
M_2\leq C_{\delta,\nu,T}\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}} N^{\beta\big(d+\delta-\frac{d}{p}\big)-\frac{1}{4m}}.
\end{equation}
Combining \eqref{M21} and \eqref{M22}, we deduce by interpolation $M_2=M_2^{\delta}M_2^{1-\delta}$ that
\begin{equation}\label{step2p}
M_2\leq C_{\delta}\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}} N^{\beta\big(d +2\delta-\frac{d}{p}\big) -\frac{1}{4m}} (t-s )^{\frac{\delta}{2}}.
\end{equation}
\smallskip
\noindent\textbf{Step 3. The bound of \eqref{m1m2p}}. \smallskip
Substituting \eqref{step1p} and \eqref{step2p} into \eqref{m1m2p}, we obtain
\begin{equation*}
\begin{aligned}
\left\|Z_t^N-Z^N_s\right\|_{L^m\left(\Omega,L^p\right)}
\leq &\,C_{\delta}\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}} \Big( N^{\beta \big(d+\delta-\frac{d}{p} \big) -\frac{1}{4m}} +N^{\beta\big(d +2\delta-\frac{d}{p}\big) -\frac{1}{4m}}\Big) \left(t-s\right)^{\frac{\delta}{2}}\\
\leq &\,C_{\delta} \left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}} N^{\beta\big(d +2\delta-\frac{d}{p} \big) -\frac{1}{4m}}\left(t-s\right)^{\frac{\delta}{2}}.
\end{aligned}
\end{equation*}
Applying Lemma \ref{sup} with $\eta=\frac{\delta}{2}$ which satisfies $m\eta>1$, we deduce that
\begin{equation*
\bigg\|\sup_{t \in[0, T]}\big\| Z^N_t \big\|_{L^{p}\left(\mathbb{R}^{d}\right)} \bigg\|_{L^m(\Omega)}\leq C_{m,\delta,T}\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}} N^{\beta\big(d +2\delta-\frac{d}{p}\big)-\frac{1}{4m}},
\end{equation*}
where $\frac{2}{m}<\delta<1$ and $\beta$ satisfies $$0<\beta\leq\frac{1}{4m(d+2)}<\frac{1}{4m(d+2\delta-\frac{d}{p})}.$$
\subsection{Proof of Proposition \ref{supzt1}}\label{sectiona4}
Here we consider the Banach space $E=L^1(\mathbb{R}^d)$ in Lemma \ref{sup}; similarly to the proof of Proposition \ref{supztp}, for any $s,t\in[0,T]$,
\begin{equation}\label{m1m21}
\begin{aligned}
&\,\big\|Z_t^N-Z^N_s \big\|_{L^m\left(\Omega,L^1\right)}\\ \leq&\, \bigg\|\sum_{k} \int_{s}^{t} \nabla\cdot e^{(t-\tau) A}\left( V^{N} \ast \left(\sigma_k^N S_{\tau}^{N}\right)\right) {\rm d} W_{\tau}^{k} \bigg\|_{L^m\left(\Omega,L^1\right)}\\
&\,+ \bigg\|\sum_{k} \int_{0}^{s} \nabla\cdot e^{(s-\tau) A}\left( e^{(t-s)A}\left(V^{N} \ast \left(\sigma_k^N S_{\tau}^{N}\right)\right)-V^{N} \ast \left(\sigma_k^N S_{\tau}^{N}\right)\right) {\rm d} W_{\tau}^{k} \bigg\|_{L^m\left(\Omega,L^1\right)}\\
=:&\,\tilde{M}_1 + \tilde M_2.
\end{aligned}
\end{equation}
\smallskip
\noindent\textbf{Step 1. The bound of $\tilde M_1$ in \eqref{m1m21}}. \smallskip
Since $L^1(\mathbb{R}^d)$ is not a UMD Banach space, we will follow the idea in \cite{ORT20b} and multiply the functions by the weight $w(x):= 1+|x|^{\frac{d+1}{2}},\, x\in \mathbb{R}^d$:
$$\aligned
\tilde M_1^m\leq&\, \mathbb{E} \bigg\|\sum_{k} \int_{s}^{t}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot \big(\nabla e^{(t-\tau) A} V^{N}\big)\big(\cdot-X_{\tau}^{N,i} \big) {\rm d} W_{\tau}^{k} \bigg\|_{L^1}^m\\
\leq&\, \mathbb{E}\Bigg\|\frac{1}{w(\cdot)} \sum_{k} \int_{s}^{t}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot w(\cdot) \big(\nabla e^{(t-\tau) A} V^{N}\big)\big(\cdot-X_{\tau}^{N,i}\big) {\rm d} W_{\tau}^{k} \Bigg\|_{L^1}^m .
\endaligned $$
Applying Cauchy-Schwarz inequality, we have
\begin{equation}\label{m1L11}
\begin{aligned}
\tilde M_1^m \leq&\, C_d\, \mathbb{E} \bigg\|\sum_{k} \int_{s}^{t}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot w(\cdot) \big(\nabla e^{(t-\tau) A} V^{N}\big)\left(\cdot-X_{\tau}^{N,i}\right) {\rm d} W_{\tau}^{k} \bigg\|_{L^2}^m \\
\leq&\, C_d\, \mathbb{E}\Bigg[\! \sum_{k}\!\int_{s}^{t}\! \bigg\|\frac{1}{N} \sum_{i=1}^{N} \sigma_{k}^{N}(X_{\tau}^{N,i}) \cdot w(\cdot) \big(\nabla e^{(t-\tau) A} V^{N}\big)\big(\cdot-X_{\tau}^{N,i}\big) \bigg\|_{L^{2}}^{2} {\rm d} \tau\Bigg]^{\frac{m}{2}}.\\
\end{aligned}
\end{equation}
For notational simplicity, we denote $f_{\tau}(x, X_{\tau}^{N,i} ):= w(x) \nabla e^{(t-\tau) A} V^{N}\big(x-X_{\tau}^{N,i}\big)$, $x\in\mathbb{R}^d$; then,
\begin{equation*
\begin{aligned}
\tilde{\xi}_N:=&\,\sum_{k}\int_{s}^{t} \bigg\|\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot f_{\tau}(\cdot, X_{\tau}^{N,i} ) \bigg\|_{L^{2}}^{2} {\rm d} \tau\\
=&\,\sum_{k}\int_{s}^{t}\int_{\mathbb{R}^d}\frac{1}{N^2}\sum_{i,j=1}^{N}\left(\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot f_{\tau}(x, X_{\tau}^{N,i} )\right)\left(\sigma_{k}^{N}(X_{\tau}^{N,j})\cdot f_{\tau}(x, X_{\tau}^{N,j} )\right){\rm d} x{\rm d} \tau\\
\leq&\,\frac{1}{N^2}\sum_{i,j=1}^{N}\int_{s}^{t}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|\left(\int_{\mathbb{R}^d}\left|f_{\tau}(x, X_{\tau}^{N,i} )\right|\left|f_{\tau}(x, X_{\tau}^{N,j} )\right|{\rm d} x\right){\rm d} \tau ,
\end{aligned}
\end{equation*}
where in the last step we have used the identity \eqref{defQN}. H\"older's inequality leads to
$$\aligned \tilde{\xi}_N \leq \frac{1}{N^2}\sum_{i,j=1}^{N}& \left[\int_{s}^{t}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|^m{\rm d} \tau\right]^{\frac{1}{m}} \\
& \times \bigg[ \int_{s}^{t}\left(\int_{\mathbb{R}^d}\left|f_{\tau}(x, X_{\tau}^{N,i} )\right|\left|f_{\tau}(x, X_{\tau}^{N,j} )\right|{\rm d} x\right)^{m^{\prime}}{\rm d} \tau \bigg]^{\frac{1}{m^{\prime}}}.
\endaligned $$
Applying Jensen's inequality, we obtain
$$\begin{aligned}
\tilde{\xi}_N^{\, m/2} \leq \frac{1}{N^2}\sum_{i,j=1}^{N}
&\left[\int_{s}^{t}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|^m{\rm d} \tau\right]^{\frac{1}{2}} \\
&\times\bigg[ \int_{s}^{t}\left(\int_{\mathbb{R}^d}\left|f_{\tau}(x, X_{\tau}^{N,i} )\right| \left|f_{\tau}(x, X_{\tau}^{N,j}) \right| {\rm d} x\right)^{m^{\prime}}{\rm d} \tau \bigg]^{\frac{m}{2m^{\prime}}} .
\end{aligned}$$
Then, by Cauchy-Schwarz inequality,
\begin{equation*
\begin{aligned}
\mathbb{E}\Big[\tilde{\xi}_N^{\, m/2} \Big]
\leq&\,\frac{1}{N^2}\sum_{i,j=1}^{N}\left[\mathbb{E} \int_{s}^{t}\left|Q_N(X_{\tau}^{N,i}-X_{\tau}^{N,j})\right|^{m}{\rm d} \tau \right]^{\frac{1}{2}}\\ &\qquad\qquad\times \left\{\mathbb{E} \bigg[\int_{s}^{t}\left(\int_{\mathbb{R}^d}\left|f_{\tau}(x, X_{\tau}^{N,i} )\right|\left|f_{\tau}(x, X_{\tau}^{N,j} )\right|{\rm d} x\right)^{m^{\prime}}{\rm d} \tau \bigg]^{\frac{m}{m^{\prime}}} \right\}^{\frac{1}{2}}.\\
\end{aligned}
\end{equation*}
Lemma \ref{convratelemma} implies that
{\small \begin{equation}\label{EQL12}
\begin{aligned}
\mathbb{E}\Big[\tilde{\xi}_N^{\, m/2} \Big] \leq \frac{C \|K_{\epsilon} \|_{\infty}^{d} (t-s )^{\frac{1}{2}}}{N^{\frac{1}{4}+2}}\! \sum_{i,j=1}^{N}\! \left\{ \mathbb{E}\bigg[ \int_{s}^{t}\!\! \bigg(\int_{\mathbb{R}^d}\! \big|f_{\tau}(x, X_{\tau}^{N,i} )\big|\, \big|f_{\tau}(x, X_{\tau}^{N,j} )\big|{\rm d} x \bigg)^{\! m^{\prime}} \! {\rm d} \tau \bigg]^{\! \frac{m}{m^{\prime}}}\! \right\}^{\! \frac{1}{2}}.\\
\end{aligned}
\end{equation} }
\noindent To bound \eqref{EQL12}, we observe
\begin{equation}\label{i1}
\begin{aligned}
&\,\mathbb{E}\left[\int_{s}^{t}\left(\int_{\mathbb{R}^d}\left|f_{\tau}(x, X_{\tau}^{N,i} )\right|\left|f_{\tau}(x, X_{\tau}^{N,j} )\right|{\rm d} x\right)^{m^{\prime}}{\rm d} \tau\right]^{\frac{m}{m^{\prime}}}\\
\leq&\,C\mathbb{E}\left\|\int_{\mathbb{R}^d}\left(\left|f_{\tau}(x, X_{\tau}^{N,i} )\right|^2+\left|f_{\tau}(x, X_{\tau}^{N,j} )\right|^2\right){\rm d} x \right\|^{m}_{L^{m^{\prime}}([s,t])}\\
\leq&\,C\mathbb{E}\left\|\int_{\mathbb{R}^d}\left|f_{\tau}(x, X_{\tau}^{N,i} )\right|^2{\rm d} x \right\|^{m}_{L^{m^{\prime}}([s,t])},
\end{aligned}
\end{equation}
where the last inequality is because the processes $X_{\cdot}^{N,i}$ and $X_{\cdot}^{N,j}$ have the same law. Using the fact
$$1+|a+b|^{d+1}\leq C_d(1+|a|^{d+1})(1+|b|^{d+1})$$
and letting $y=x-X_{\tau}^{N,i}$, one has
\begin{equation*}
\begin{aligned}
\int_{\mathbb{R}^d}\left|f_{\tau}(x, X_{\tau}^{N,i} )\right|^2{\rm d} x&\,=\int_{\mathbb{R}^d}\big(1+|x|^{\frac{d+1}{2}} \big)^2 \big|\nabla e^{(t-\tau) A} V^{N}\big(x-X_{\tau}^{N,i}\big)\big|^2{\rm d} x\\
&\,\leq C\int_{\mathbb{R}^d} \big(1+|y+X_{\tau}^{N,i}|^{d+1} \big) \big|\nabla e^{(t-\tau) A} V^{N} (y ) \big|^2{\rm d} y\\
&\,\leq C\big(1+|X_{\tau}^{N,i}|^{d+1} \big)\int_{\mathbb{R}^d}\big(1+|y|^{d+1}\big) \big|\nabla e^{(t-\tau) A} V^{N} (y )\big|^2{\rm d} y.\\
\end{aligned}
\end{equation*}
Therefore,
\begin{equation}\label{Efm}
\begin{aligned}
&\,\mathbb{E}\left\|\int_{\mathbb{R}^d}\left|f_{\tau}(x, X_{\tau}^{N,i} )\right|^2{\rm d} x \right\|^{m}_{L^{m^{\prime}}([s,t])}
\\
\leq&\,C\mathbb{E}\left\|\big(1+|X_{\tau}^{N,i}|^{d+1} \big)\int_{\mathbb{R}^d}\big(1+|y|^{d+1}\big) \big|\nabla e^{(t-\tau) A} V^{N} (y )\big|^2{\rm d} y \right\|^{m}_{L^{m^{\prime}}([s,t])} \\
\leq&\,C\mathbb{E}\bigg[\sup_{\tau \in[s, t]} \big(1+|X_{\tau}^{N,i}|^{m(d+1)} \big)\bigg] \left\|\int_{\mathbb{R}^d}\big(1+|y|^{d+1}\big) \big| \nabla e^{(t-\tau) A} V^{N} (y ) \big|^{2}{\rm d} y\right\|^{m}_{L^{m^{\prime}}([s,t])} \\
\leq &\, C\left\|K_{\epsilon}\right\|_{\infty}^{m(d+1)} \left\|\int_{\mathbb{R}^d}\big(1+|y|^{d+1}\big) \big| \nabla e^{(t-\tau) A} V^{N} (y ) \big|^{2}{\rm d} y\right\|^{m}_{L^{m^{\prime}}([s,t])},
\end{aligned}
\end{equation}
where in the last step we have used Lemma \ref{1stmoment} for any small enough $\epsilon>0$. Combining this estimate with \eqref{EQL12} and \eqref{i1}, we obtain
$$\mathbb{E}\Big[\tilde{\xi}_N^{\, m/2} \Big] \leq \frac{C \|K_{\epsilon} \|_{\infty}^{d+ \frac{m(d+1)}2}} {N^{\frac14}} (t-s )^{\frac{1}{2}} \left\|\int_{\mathbb{R}^d}\big(1+|y|^{d+1}\big) \big| \nabla e^{(t-\tau) A} V^{N} (y ) \big|^{2}{\rm d} y\right\|^{\frac {m}2}_{L^{m^{\prime}}([s,t])} . $$
Recall the definition of $\tilde{\xi}_N$; inserting this estimate into \eqref{m1L11} gives us
\begin{equation*
\begin{aligned}
\tilde M_1 \leq&\, \frac{C\left\|K_{\epsilon}\right\|_{\infty}^{\frac{d}{m}+\frac{d+1}{2}}}{N^{\frac{1}{4m}}} (t-s )^{\frac{1}{2m}} \left\|\int_{\mathbb{R}^d}\big(1+|y|^{d+1}\big) \big| \nabla e^{(t-\tau) A} V^{N} (y )\big|^{2} {\rm d} y\right\|^{\frac{1}{2}}_{L^{m^{\prime}}([s,t])}\\
\leq&\, \frac{C\left\|K_{\epsilon}\right\|_{\infty}^{d+1}}{N^{\frac{1}{4m}}} (t-s)^{\frac{1}{2m}} \left\|\int_{\mathbb{R}^d} \big| \nabla e^{(t-\tau) A} V^{N} (y ) \big|^{2}{\rm d} y\right\|^{\frac{1}{2}}_{L^{m^{\prime}}([s,t])} \\ &\,+\frac{C\left\|K_{\epsilon}\right\|_{\infty}^{d+1} }{N^{\frac{1}{4m}}} (t-s)^{\frac{1}{2m}} \left\|\int_{\mathbb{R}^d}|y|^{d+1} \big| \nabla e^{(t-\tau) A} V^{N} (y ) \big|^{2}{\rm d} y \right\|^{\frac{1}{2}}_{L^{m^{\prime}}([s,t])}.
\end{aligned}
\end{equation*}
We denote the two quantities by $J_1$ and $J_2$. By \eqref{lpestimate},
\begin{equation*
\begin{aligned}
\big\| \nabla e^{(t-\tau) A} V^{N} \big\|_{L^{2}}
=&\,\big\|(\mathrm{I}-A)^{-\frac{\delta}{2}} \nabla e^{(t-\tau) A}(\mathrm{I}-A)^{\frac{\delta}{2}} V^{N} \big\|_{L^{2}}
\\\leq &\, \frac{C_{\delta,\nu,T}}{(t-\tau)^{\frac{1-\delta}{2}}}\left\|V^{N}\right\|_{\delta, 2}
\leq \frac{C_{\delta,\nu,T}}{(t-\tau)^{\frac{1-\delta}{2}}} N^{\beta\left(\frac{d}{2}+\delta\right)},
\end{aligned}
\end{equation*}
the first term $J_1$ can be estimated as
\begin{equation}\label{M1J1}
\begin{aligned}
J_1\leq&\, C_{\delta}\left\|K_{\epsilon}\right\|_{\infty}^{d+1}\left(t-s\right)^{\frac{1}{2m}}N^{\beta\left(\frac{d}{2}+\delta\right)-\frac{1}{4m}}\left(\int_{s}^{t} \frac{1}{(t-\tau)^{m^{\prime}(1-\delta)}} {\rm d} \tau\right)^{\frac{1}{2m^{\prime}}}\\
\leq&\, C_{\delta}\left\|K_{\epsilon}\right\|_{\infty}^{d+1} N^{\beta\left(\frac{d}{2}+\delta\right)-\frac{1}{4m}}\left(t-s\right)^{\frac{\delta}{2}}.
\end{aligned}
\end{equation}
Now let us estimate the second term $J_2$. We will use the following result.
\begin{lemma}\label{y4}
Assume Hypotheses \ref{hypothesis} and $\frac{2}{m}<\delta<1$, then for any $N\in\mathbb{N}$,
$$
\int_{\mathbb{R}^d}|y|^{d+1}\big| \nabla e^{(t-\tau) A} V^{N}(y) \big|^{2}{\rm d} y\leq C_{\delta} N^{\beta(d+2\delta)}\frac{1}{(t-\tau)^{1-\delta}}.
$$
\end{lemma}
We postpone the proof of Lemma \ref{y4} in Section \ref{sectionprooflemma}. Thus, the second term $J_2$ can be estimated as
\begin{equation}\label{M1J2}
\begin{aligned}
J_2\leq&\, C_{\delta}\left\|K_{\epsilon}\right\|_{\infty}^{d+1}\left(t-s\right)^{\frac{1}{2m}}N^{\beta\left(\frac{d}{2}+\delta\right)-\frac{1}{4m}}\left(\int_{s}^{t} \frac{1}{(t-\tau)^{m^{\prime}(1-\delta)}} {\rm d} \tau\right)^{\frac{1}{2m^{\prime}}}\\
\leq&\, C_{\delta}\left\|K_{\epsilon}\right\|_{\infty}^{d+1} N^{\beta\left(\frac{d}{2}+\delta\right)-\frac{1}{4m}}\left(t-s\right)^{\frac{\delta}{2}}.
\end{aligned}
\end{equation}
Therefore, adding \eqref{M1J1} and \eqref{M1J2}, we have
\begin{equation}\label{step11}
\begin{aligned}
\tilde M_1\leq C_{\delta}\left\|K_{\epsilon}\right\|_{\infty}^{d+1} N^{\beta\left(\frac{d}{2}+\delta\right)-\frac{1}{4m}}\left(t-s\right)^{\frac{\delta}{2}}.
\end{aligned}
\end{equation}
\smallskip
\noindent\textbf{Step 2. The bound of $\tilde M_2$ in \eqref{m1m21}}. \smallskip
Similarly to what we have done in Step 1, we adopt the weight $w(x)=1+|x|^{\frac{d+1}{2}}$ so that we can apply BDG-type inequality in $L^2(\mathbb{R}^d)$:
{\small \begin{equation*}\label{m1L1}
\begin{aligned}
\tilde M_2^m\leq&\, \mathbb{E}\bigg\|\sum_{k} \int_{0}^{s}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot \big(\nabla e^{(s-\tau) A} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N}\big) \big(\cdot-X_{\tau}^{N,i}\big) {\rm d} W_{\tau}^{k} \bigg\|_{L^1}^m\\
\leq&\,C_d \mathbb{E}\bigg\| \sum_{k} \int_{0}^{s}\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot w(\cdot) \big(\nabla e^{(s-\tau) A} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N}\big) \big(\cdot-X_{\tau}^{N,i}\big) {\rm d} W_{\tau}^{k} \bigg\|_{L^2}^m\\
\leq&\, C_d \mathbb{E}\Bigg[ \sum_{k}\int_{0}^{s} \bigg\|\frac{1}{N} \sum_{i=1}^{N}\sigma_{k}^{N}(X_{\tau}^{N,i})\cdot w(\cdot) \big(\nabla e^{(s-\tau) A} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N}\big) \big(\cdot-X_{\tau}^{N,i}\big) \bigg\|_{L^{2}}^{2} {\rm d} \tau \Bigg]^{\frac{m}{2}}.\\
\end{aligned}
\end{equation*} }
\noindent We follow the idea for estimating $\tilde M_1$, define
$$g_{\tau}(x, X_{\tau}^{N,i} ):= w(x) \big(\nabla e^{(s-\tau) A}\big(e^{(t-s)A}-\mathrm{I}\big) V^{N}\big)\left(x-X_{\tau}^{N,i}\right)$$
to replace $f_{\tau}(x, X_{\tau}^{N,i} )$ from \eqref{m1L11} to \eqref{Efm} and integrate from $0$ to $s$. Then, we can prove the estimate
\begin{equation}\label{M2}
\begin{aligned}
\tilde M_2
\leq&\,\frac{C\left\|K_{\epsilon}\right\|_{\infty}^{d+1}}{N^{\frac{1}{4m}}}\left\|\int_{\mathbb{R}^d}\big(1+|y|^{d+1}\big) \big| \nabla e^{(s-\tau) A}\big(e^{(t-s)A}-\mathrm{I}\big) V^{N} (y )\big|^{2}{\rm d} y\right\|^{\frac{1}{2}}_{L^{m^{\prime}}([0,s])}.
\end{aligned}
\end{equation}
To continue our proof, we present the following lemma and postpone its proof in Section \ref{sectionprooflemma}.
\begin{lemma}\label{1y4}
Assume Hypotheses \ref{hypothesis} and $\frac{2}{m}<\delta<1$; we take $\kappa$ small enough such that $0<\kappa<1-\delta$, then for any $N\in\mathbb{N}$,
$$
\int_{\mathbb{R}^{d}} \!\big(1+|y|^{d+1}\big) \big|\nabla e^{(s-\tau) A}\big(e^{(t-s)A}-\mathrm{I}\big)V^{N}(y) \big|^{2} {\rm d} y\leq C_{\kappa,\delta} N^{\beta(d+\delta(2d+2-\frac{d-2}{1-\kappa}))} \frac{(t-s)^{\delta}}{(s-\tau)^{1-\frac{\delta}{1-\kappa}}}.
$$
\end{lemma}
Since $\frac{\delta}{1-\kappa}>\frac{1}{m}$, the function $(0,s)\ni \tau \mapsto (s-\tau)^{m^{\prime}(\frac{\delta}{1-\kappa}-1)}$ is integrable; substituting the above estimate into \eqref{M2},
we have
\begin{equation}\label{step21}
\begin{aligned}
\tilde M_2
\leq&\,C_{\kappa,\delta}\left\|K_{\epsilon}\right\|_{\infty}^{d+1}N^{\frac{\beta}{2}(d+ \delta(2d+2-(d-2)))-\frac{1}{4m}}(t-s)^{\frac{\delta}{2}} \bigg(\int_{0}^{s} \frac{1}{(s-\tau)^{m^{\prime}(1-\frac{\delta}{1-\kappa})}} {\rm d} \tau\bigg)^{\frac{1}{2m^{\prime}}}\\
\leq&\, C_{\delta}\left\|K_{\epsilon}\right\|_{\infty}^{d+1}N^{\frac{\beta}{2}(d+ \delta(d+4))-\frac{1}{4m}}(t-s)^{\frac{\delta}{2}}.
\end{aligned}
\end{equation}
\smallskip
\noindent\textbf{Step 3. The bound of \eqref{m1m21}}. \smallskip
\eqref{step11} and \eqref{step21} yield that
\begin{equation}
\begin{aligned}
\big\|Z^N_t-Z^N_s \big\|_{L^m(\Omega,L^1)}\leq&\, C_{\delta} \|K_{\epsilon} \|_{\infty}^{d+1}\Big(N^{\beta\left(\frac{d}{2}+\delta\right)-\frac{1}{4m}}+N^{\frac{\beta}{2}(d+ \delta(d+4))-\frac{1}{4m}}\Big) (t-s)^{\frac{\delta}{2}}\\
\leq&\, C_{\delta} \|K_{\epsilon} \|_{\infty}^{d+1}N^{\frac{\beta}{2}(d+ \delta(d+4))-\frac{1}{4m}}(t-s)^{\frac{\delta}{2}}.
\end{aligned}
\end{equation}
Applying Lemma \ref{sup} and taking $\eta=\frac{\delta}{2}$ satisfying $m\eta>1$, we deduce that
\begin{equation*
\bigg\| \sup_{t \in[0, T]}\left\| Z^N_t\right\|_{L^1\left(\mathbb{R}^{d}\right)} \bigg\|_{L^m(\Omega)}\leq C_{m,\delta,T}\left\|K_{\epsilon}\right\|_{\infty}^{d+1}N^{\frac{\beta}{2}(d+ \delta(d+4))-\frac{1}{4m}},
\end{equation*}
where $\frac{2}{m}<\delta<1$ and $\beta$ satisfies
$$0<\beta\leq\frac{1}{4m(d+2)}<\frac{1}{2m(d+\delta(d+4))}.$$
\subsubsection{Proofs of Lemmas \ref{y4} and \ref{1y4}}\label{sectionprooflemma}
\begin{proof}[Proof of Lemma \ref{y4}]
On the one hand, by the definition \eqref{semigroup} of semigroup $e^{(t-\tau) A}$, and $\int_{\mathbb{R}^d}g_{t-\tau}(y-z){\rm d} z=1$,
\begin{equation*}
\begin{aligned}
\int_{\mathbb{R}^d}|y|^{d+1} \big| \nabla e^{(t-\tau) A} V^{N} (y )\big|^{2}{\rm d} y
\leq&\,\int_{\mathbb{R}^d}|y|^{d+1}\bigg| \int_{\mathbb{R}^d}g_{t-\tau}(y-z) \nabla V^{N} (z ){\rm d} z\bigg|^{2}{\rm d} y\\
\leq&\,\int_{\mathbb{R}^d}|y|^{d+1} \int_{\mathbb{R}^d} \left|\nabla V^{N} (z )\right|^{2}g_{t-\tau}(y-z) {\rm d} z{\rm d} y.
\end{aligned}
\end{equation*}
Notice that $V^N(z)=N^{d\beta}V(N^{\beta}z)$; changing the variable $z^{\prime}=N^{\beta}z$ and by Fubini's theorem,
\begin{equation*}
\begin{aligned}
&\, \int_{\mathbb{R}^d}|y|^{d+1} \big| \nabla e^{(t-\tau) A} V^{N} (y )\big|^{2}{\rm d} y \\
\leq&\,N^{\beta(d+2)}\int_{\mathbb{R}^d}|y|^{d+1} \int_{\mathbb{R}^d} |\nabla V (z^{\prime} ) |^{2}g_{t-\tau} \big(y-N^{-\beta} z^{\prime} \big) {\rm d} z^{\prime}{\rm d} y\\
\leq&\,N^{\beta(d+2)}\int_{\mathbb{R}^d} |\nabla V (z^{\prime} ) |^{2} {\rm d} z^{\prime} \int_{\mathbb{R}^d} \big|y+ N^{-\beta} z^{\prime} \big|^{d+1} g_{t-\tau}(y){\rm d} y.\\
\end{aligned}
\end{equation*}
Since $V\in C_c^{\infty}(\mathbb{R}^d,\mathbb{R}_{+})$ by Hypotheses \ref{hypothesis}, we have
\begin{equation}\label{y2Vn1}
\begin{aligned}
&\,\int_{\mathbb{R}^d}|y|^{d+1} \big| \nabla e^{(t-\tau) A} V^{N} (y )\big|^{2}{\rm d} y\\
\leq&\,CN^{\beta(d+2)}\left(\int_{\mathbb{R}^d} |\nabla V (z^{\prime} ) |^{2} {\rm d} z^{\prime}\int_{\mathbb{R}^d}|y|^{d+1} g_{t-\tau}(y) {\rm d} y+\int_{\mathbb{R}^d} \big| N^{-\beta} z^{\prime} \big|^{d+1} |\nabla V (z^{\prime} ) |^{2} {\rm d} z^{\prime}\right)\\
\leq&\, CN^{\beta(d+2)}\left((t-\tau)^{\frac{d+1}{2}}+N^{-\beta(d+1)}\right)\\
\leq&\, CN^{\beta(d+2)}.
\end{aligned}
\end{equation}
On the other hand, as $\nabla g_{t-\tau}(z)=Cg_{t-\tau}(z)\frac{z}{t-\tau}$, one has
\begin{equation*}
\begin{aligned}
\int_{\mathbb{R}^d}\! |y|^{d+1}\big| \nabla e^{(t-\tau) A} V^{N} (y )\big|^{2}{\rm d} y
=&\,\int_{\mathbb{R}^d}|y|^{d+1}\left|\int_{\mathbb{R}^d}\nabla g_{t-\tau}(y-z) V^{N} (z ) {\rm d} z\right|^{2}{\rm d} y\\
\leq&\,\frac{C}{(t-\tau)^2} \!\int_{\mathbb{R}^d}\! |y|^{d+1}\bigg|\! \int_{\mathbb{R}^d}\!\! |y-z | V^{N} (z )g_{t-\tau}(y-z) {\rm d} z\bigg|^{2}{\rm d} y.
\end{aligned}
\end{equation*}
Cauchy-Schwarz inequality implies
$$
\begin{aligned}
&\left| \int_{\mathbb{R}^d} |y-z | V^{N} (z ) g_{t-\tau}(y-z) {\rm d} z\right|^{2}\\
\leq&\,\left(\int_{\mathbb{R}^d} |y-z |^2g_{t-\tau}(y-z) {\rm d} z\right)\left(\int_{\mathbb{R}^d} |V^{N} (z ) |^2g_{t-\tau}(y-z) {\rm d} z\right)\\
\leq&\, C(t-\tau)\int_{\mathbb{R}^d} |V^{N} (z ) |^2g_{t-\tau}(y-z) {\rm d} z,
\end{aligned}
$$
hence,
\begin{equation*}
\begin{aligned}
\int_{\mathbb{R}^d}|y|^{d+1} \big| \nabla e^{(t-\tau) A} V^{N} (y )\big|^{2}{\rm d} y
\leq&\,\frac{C}{t-\tau}\int_{\mathbb{R}^d}|y|^{d+1} \int_{\mathbb{R}^d} |V^{N} (z ) |^2g_{t-\tau}(y-z) {\rm d} z{\rm d} y
\\\leq&\,\frac{CN^{d\beta}}{t-\tau}\int_{\mathbb{R}^d}|y|^{d+1} \int_{\mathbb{R}^d} | V (z^{\prime} ) |^{2} g_{t-\tau} \big(y- N^{-\beta} z^{\prime} \big) {\rm d} z^{\prime}{\rm d} y\\
\leq&\,\frac{CN^{d\beta}}{t-\tau} \int_{\mathbb{R}^d} | V (z^{\prime} )|^{2}{\rm d} z^{\prime}
\int_{\mathbb{R}^d} \big|y+ N^{-\beta}z^{\prime} \big|^{d+1} g_{t-\tau}(y) {\rm d} y,
\end{aligned}
\end{equation*}
where in the last two steps we have changed variables ($z'= N^\beta z$) and used Fubini's theorem. Then,
\begin{equation}\label{y2Vn2}
\begin{aligned}
&\,\int_{\mathbb{R}^d}|y|^{d+1} \big| \nabla e^{(t-\tau) A} V^{N} (y )\big|^{2}{\rm d} y
\\\leq&\,\frac{CN^{d\beta}}{t-\tau}\left(\int_{\mathbb{R}^d} | V(z^{\prime} ) |^{2} {\rm d} z^{\prime}\int_{\mathbb{R}^d}|y|^{d+1} g_{t-\tau}(y) {\rm d} y + \int_{\mathbb{R}^d} \big|N^{-\beta} z^{\prime} \big|^{d+1} | V(z^{\prime} ) |^{2} {\rm d} z^{\prime}\right)
\\\leq&\,\frac{CN^{d\beta}}{t-\tau}\big( (t-\tau )^{\frac{d+1}{2}} +N^{-(d+1)\beta}\big)\\
\leq&\, CN^{d\beta}(t-\tau)^{-1}.
\end{aligned}
\end{equation}
By interpolating \eqref{y2Vn1} and \eqref{y2Vn2} with powers $\delta$ and $1-\delta$, we complete the proof of Lemma \ref{y4}.
\end{proof}
\begin{proof}[Proof of Lemma \ref{1y4}]
Firstly,
$$
\begin{aligned}
\big|\nabla e^{(s-\tau) A}\big(e^{(t-s)A}-\mathrm{I}\big) V^{N} (y )\big|^{2} \leq\,2\big|\nabla e^{(t-\tau) A} V^{N}(y) \big|^{2} +2\big|\nabla e^{(s-\tau) A} V^{N}(y)\big|^{2}.
\end{aligned}
$$
Hence,
$$
\begin{aligned}
&\,\int_{\mathbb{R}^d}(1+|y|^{d+1}) \big|\nabla e^{(s-\tau) A}\big(e^{(t-s)A}-\mathrm{I}\big) V^{N} (y )\big|^{2} {\rm d} y \\
\leq&\, 2\int_{\mathbb{R}^d}(1+|y|^{d+1}) \Big(\big|\nabla e^{(t-\tau) A} V^{N}(y)\big|^{2} +\big|\nabla e^{(s-\tau) A} V^{N}(y)\big|^{2}\Big) {\rm d} y \\
=&\, 2\int_{\mathbb{R}^d}(1+|y|^{d+1}) \big|\nabla e^{(t-\tau) A} V^{N}(y)\big|^{2}{\rm d} y +2\int_{\mathbb{R}^d}(1+|y|^{d+1}) \big|\nabla e^{(s-\tau) A} V^{N}(y)\big|^{2} {\rm d} y \\
=:&\,B_1+B_2.
\end{aligned}
$$
Recalling \eqref{y2Vn2} in the proof of Lemma \ref{y4}, we already have
\begin{equation*}
\int_{\mathbb{R}^d}|y|^{d+1}\big| \nabla e^{(t-\tau) A} V^{N}\left(y\right)\big|^{2}{\rm d} y\leq CN^{d\beta}(t-\tau)^{-1}.
\end{equation*}
Observe that
$$
\int_{\mathbb{R}^d} \big|\nabla e^{(t-\tau) A} V^{N}(y) \big|^2{\rm d} y= \big\|\nabla e^{(t-\tau) A} V^{N} \big\|_{L^2}^2 \leq C(t-\tau)^{-1} \|V^N \|_{L^2}^2 \leq CN^{d\beta}(t-\tau)^{-1} ,
$$
thus, it holds
$$
B_1 \leq C N^{d\beta}\left(t-\tau\right)^{-1} .
$$
Similarly, we have
$$ B_2 \leq C N^{d\beta}\left(s-\tau\right)^{-1}.$$
Since $\tau<s<t$, one has
\begin{equation}\label{iv1}
\int_{\mathbb{R}^{d}}(1+|y|^{d+1}) \big|\nabla e^{(s-\tau) A} \big(e^{(t-s)A}-\mathrm{I}\big)V^{N}(y)\big|^{2} {\rm d} y \leq C N^{d\beta}\left(s-\tau\right)^{-1}.
\end{equation}
Secondly, applying the gradient on $V^{N}$, one gets
$$
\begin{aligned}
&\, \big|\nabla e^{(s-\tau) A}\big(e^{(t-s)A}-\mathrm{I}\big)V^{N}(y)\big| \\
= &\,\bigg|\int_{\mathbb{R}^d} g_{s-\tau}(y-x) \bigg(\int_{\mathbb{R}^d} g_{t-s}(z) \nabla V^{N}(x-z){\rm d} z-\nabla V^{N}(x) \bigg){\rm d} x\bigg| \\
\leq &\, \int_{\mathbb{R}^d} g_{s-\tau}(y-x) \int_{\mathbb{R}^d} g_{t-s}(z)\left|\nabla V^{N}(x-z)-\nabla V^{N}(x)\right| {\rm d} z {\rm d} x \\
\leq &\, \left\|\nabla^{2} V^{N}\right\|_{\infty} \int_{\mathbb{R}^d} g_{s-\tau}(y-x) \int_{\mathbb{R}^d} g_{t-s}(z)|z| {\rm d} z {\rm d} x.
\end{aligned}
$$
Since $\left\|\nabla^{2} V^{N}\right\|_{\infty}\leq CN^{\beta(d+2)}$, we have
$$
\big|\nabla e^{(s-\tau) A}\big(e^{(t-s)A}-\mathrm{I}\big)V^{N}(y)\big|\leq C N^{\beta(d+2)} \sqrt{t-s}.
$$
Then, for any $\kappa \in (0,1)$,
$$ \begin{aligned}
&\int_{\mathbb{R}^{d}}\big(1+|y|^{d+1}\big)\big|\nabla e^{(s-\tau) A}\big(e^{(t-s)A}-\mathrm{I}\big)V^{N}(y) \big|^{2} {\rm d} y\\
\leq &\, C \big(N^{\beta(d+2)} \sqrt{t-s}\big)^{2(1-\kappa)} \int_{\mathbb{R}^{d}}\big(1+|y|^{d+1}\big) \big|\nabla e^{(s-\tau) A} \big(e^{(t-s)A} -\mathrm{I}\big)V^{N}(y) \big|^{2\kappa} {\rm d} y \\
\leq&\, C \big(N^{\beta(d+2)} \sqrt{t-s}\big)^{2(1-\kappa)}\left\{\int_{\mathbb{R}^d}\big(1+|y|^{d+1}\big) \big|e^{(t-\tau) A} \nabla V^N(y) \big|^{2\kappa} {\rm d} y\right.\\
&\qquad\qquad\qquad\qquad\qquad\qquad\qquad\left. +\int_{\mathbb{R}^d}\big(1+|y|^{d+1}\big) \big|e^{(s-\tau) A} \nabla V^N(y)\big|^{2\kappa} {\rm d} y\right\}.
\end{aligned}
$$
By \eqref{semigroup} and changing variables, we have
$$
\big|e^{(t-\tau)A}\nabla V^{N}(y)\big|\leq N^{\beta}\int_{\mathbb{R}^{d}}g_{t-\tau}\big(y- N^{-\beta}z^{\prime} \big) |\nabla V(z^{\prime}) |{\rm d} z^{\prime},
$$
therefore,
\begin{equation*}
\begin{aligned}
&\,\int_{\mathbb{R}^{d}}\big(1+|y|^{d+1}\big) \big| e^{(t-\tau) A}\nabla V^{N}(y)\big|^{2\kappa} {\rm d} y\\
\leq&\, N^{2\beta\kappa}\int_{\mathbb{R}^{d}} |\nabla V(z^{\prime}) |^{2\kappa}{\rm d} z^{\prime} \int_{\mathbb{R}^{d}}\big(1+ |y+ N^{-\beta} z^{\prime} \big|^{d+1}\big)g^{2\kappa}_{t-\tau}(y){\rm d} y\\
\leq&\, CN^{2\beta\kappa}\int_{\mathbb{R}^{d}} |\nabla V(z^{\prime}) |^{2\kappa}{\rm d} z^{\prime}\int_{\mathbb{R}^{d}} \big(1+ |y |^{d+1} +\big| N^{-\beta}z^{\prime} \big|^{d+1}\big)g^{2\kappa}_{t-\tau}(y){\rm d} y\\
\leq&\, C_{d,\kappa} N^{2\beta\kappa}.
\end{aligned}
\end{equation*}
In the same way, we can deduce that
\begin{equation*}
\begin{aligned}
\int_{\mathbb{R}^{d}}\big(1+|y|^{d+1}\big) \big|e^{(s-\tau) A}\nabla V^{N}(y) \big|^{2\kappa}{\rm d} y
\leq\, C_{d,\kappa} N^{2\beta\kappa}.
\end{aligned}
\end{equation*}
Summarizing the above calculations yields
\begin{equation}\label{iv2}
\int_{\mathbb{R}^{d}}\big(1+|y|^{d+1}\big) \big|\nabla e^{(s-\tau) A}\big(e^{(t-s)A}-\mathrm{I}\big)V^{N}(y) \big|^{2} {\rm d} y\leq C N^{2\beta(d+2-(d+1)\kappa)} (t-s)^{1-\kappa},
\end{equation}
where $C$ is a constant independent of $\tau,s,t$.
Finally, we can interpolate between \eqref{iv1} and \eqref{iv2} with the powers $1-\frac{\delta}{1-\kappa}$ and $\frac{\delta}{1-\kappa}$
$$
\int_{\mathbb{R}^{d}}\!\! \big(1+|y|^{d+1}\big) \big|\nabla e^{(s-\tau) A}\! \big(e^{(t-s)A}-\mathrm{I}\big)V^{N}\! (y) \big|^{2} {\rm d} y\leq C_{\kappa,\delta} N^{\beta(d+\delta(2d+2-\frac{d-2}{1-\kappa}))} \frac{(t-s)^{\delta}}{(s-\tau)^{1-\frac{\delta}{1-\kappa}}}.
$$
Since $\frac{2}{m}<\delta<1$, we can take $\kappa$ small enough such that $\delta<1-\kappa$.
\end{proof}
\section{Estimates on initial data}
\subsection{The boundedness of $\omega_0^N$}\label{boundomega0}
We now give a sketch of proof that $\{\omega^N_0 \}_{N\geq 1}$ is uniformly bounded in $L^m(\Omega, L^{1}\cap L^{p})$, in the special case $m\leq p$. We shall also assume that $p=3$; the same idea works for more general integer $p$, at the price of more complicated computations. Recall that
$$\omega^N_0(x)=V^N\ast S_0^N(x)= \frac1N \sum_{i=1}^{N}V^N(x-X_0^i) \geq 0.$$
Firstly, we have
\begin{align}\label{lm1}
\big\|\omega^N_0 \big\|_{L^m(\Omega, L^1)} = \bigg\{\mathbb{E}\bigg[\int_{\mathbb{R}^d} \frac{1}{N}\sum_{i=1}^{N}V^N(x-X_0^i)\, {\rm d} x\bigg]^m \bigg\}^{\frac1m}=1.
\end{align}
Next, as $m\leq p$, it holds
\begin{equation}\label{jensen}
\begin{aligned}
\big\|\omega^N_0 \big\|_{L^m(\Omega, L^p)} \leq \big\|\omega^N_0 \big\|_{L^p(\Omega, L^p)} =\bigg[\mathbb{E}\int_{\mathbb{R}^d}\bigg(\frac{1}{N}\sum_{i=1}^{N}V^N(x-X_0^i)\bigg)^p{\rm d} x\bigg]^{\frac{1}{p}}.
\end{aligned}
\end{equation}
From now on we take $p=3$. One has
$$
\begin{aligned} &\,\mathbb{E}\bigg(\frac{1}{N}\sum_{i=1}^{N}V^N(x-X_0^i)\bigg)^3\\
=&\, \frac{1}{N^3}\sum_{i=1}^{N}\mathbb{E}\big(V^N(x-X_0^i)^3\big)+\frac{3}{N^3}\sum_{i\neq j}\mathbb{E}\big(V^N(x-X_0^i) \big) \mathbb{E}\big(V^N(x-X_0^j)^2\big)\\
&+\frac{1}{N^3}\sum_{i\neq j\neq k}\mathbb{E}\big(V^N(x-X_0^i) \big)\mathbb{E}\big(V^N(x-X_0^j)\big) \mathbb{E}\big(V^N(x-X_0^k) \big)\\
\leq&\, \frac{1}{N^2}\mathbb{E}\big(V^N(x-X_0^1)^3\big) +\frac{3}{N}\mathbb{E}\big(V^N(x-X_0^1) \big) \mathbb{E}\big(V^N(x-X_0^2)^2\big) +\big[\mathbb{E}\big(V^N(x-X_0^1)\big)\big]^3.
\end{aligned}
$$
By Jensen's inequality,
$$\aligned
\mathbb{E}\big(V^N(x-X_0^1) \big) \mathbb{E}\big(V^N(x-X_0^2)^2\big) &\leq \big[\mathbb{E}\big(V^N(x-X_0^1)^3 \big)\big]^{\frac13} \big[\mathbb{E}\big(V^N(x-X_0^2)^3 \big)\big]^{\frac23} \\
&= \mathbb{E}\big(V^N(x-X_0^1)^3\big),
\endaligned $$
therefore,
$$\mathbb{E}\bigg(\frac{1}{N}\sum_{i=1}^{N}V^N(x-X_0^i)\bigg)^3 \leq \frac4N \mathbb{E}\big(V^N(x-X_0^1)^3\big) + \big[\mathbb{E}\big(V^N(x-X_0^1)\big)\big]^3.$$
We have
$$\aligned \mathbb{E}\big(V^N(x-X_0^1)^3\big) &=\int_{\mathbb{R}^d}N^{3\beta d}V^3(N^{\beta}(x-y))\omega_0(y)\,{\rm d} y =N^{2\beta d}(V^3)^N\ast \omega_{0}(x), \\
\mathbb{E}\big(V^N(x-X_0^1) \big) & =\int_{\mathbb{R}^d}N^{\beta d}V(N^{\beta}(x-y))\omega_0(y)\,{\rm d} y =V^N\ast \omega_{0}(x),
\endaligned $$
where $(V^3)^N$ is a convolution kernel defined similarly as $V^N$ in terms of $V^3$. Thus,
\begin{equation*}\label{e}
\begin{aligned}
\mathbb{E}\bigg(\frac{1}{N}\sum_{i=1}^{N}V^N(x-X_0^i)\bigg)^3
\leq \frac{4}{N^{1-2\beta d}}(V^3)^N\ast \omega_{0}(x) +\big(V^N\ast \omega_{0}(x)\big)^3 .
\end{aligned}
\end{equation*}
By our choice of $\beta$ it holds $1-2\beta d\geq 0$; substituting this estimate into \eqref{jensen} leads to ($p=3$)
$$\aligned
\big\|\omega^N_0 \big\|_{L^m(\Omega, L^3)} &\leq C \bigg[\int_{\mathbb{R}^d} \Big((V^3)^N\ast \omega_{0}(x) +\big(V^N\ast \omega_{0}(x)\big)^3 \Big)\, {\rm d} x\bigg]^{\frac{1}{3}} \\
&= C \Big[ \big\|(V^3)^N\ast \omega_{0} \big\|_{L^1} + \big\|V^N\ast \omega_{0} \big\|_{L^3}^3 \Big]^{\frac{1}{3}} \\
&\leq C\Big[ \big\|(V^3)^N \big\|_{L^1} \|\omega_0 \|_{L^1} + \big\|V^N \big\|_{L^1}^3 \big\|\omega_{0}\|_{L^3}^3 \Big]^{\frac{1}{3}}.
\endaligned $$
Since $\|\omega_0 \|_{L^1}= \big\|V^N \big\|_{L^1}=1$, we finally get
$$\big\|\omega^N_0 \big\|_{L^m(\Omega, L^3)} \leq C\big[ \|V \|_{L^3}^3 + \|\omega_{0}\|_{L^3}^3 \big]^{\frac{1}{3}} \leq C\big[ \|V \|_{L^3} + \|\omega_{0}\|_{L^3} \big]. $$
Combining with \eqref{lm1}, we get the boundedness of $\{\omega^N_0 \}_{N\geq 1}$ in $L^m(\Omega, L^1\cap L^3)$.
\subsection{The distance between $\omega_0$ and $\omega_0^N$}\label{boundomega0omega}
For simplicity, we take $m=p=4$ and assume $\omega_{0}\in C_c^1 (\mathbb{R}^d)$; then
\begin{align*}
\mathbb{E}\big\|\omega_{0}^{N}-\omega_{0}\big\|_{L^4}^4 &= \mathbb{E}\int_{\mathbb{R}^d}\bigg(\frac{1}{N}\sum_{i=1}^{N}V^N(x-X_0^i) -\omega_0(x)\bigg)^4 {\rm d} x \\
&=\frac{1}{N^4}\mathbb{E}\int_{\mathbb{R}^d} \bigg(\sum_{i=1}^{N}\big(V^N(x-X_0^i)-\omega_0(x)\big)\bigg)^4{\rm d} x.
\end{align*}
Introducing the notation $Y_i(x)= V^N(x-X_0^i)-\omega_0(x),\, x\in \mathbb{R}^d$, which are i.i.d. random variables for $ 1\leq i\leq N$; we have
$$\aligned
\mathbb{E}\big\|\omega_{0}^{N}-\omega_{0}\big\|_{L^4}^4 & = \frac{1}{N^4} \mathbb{E} \int_{\mathbb{R}^d} \bigg[\sum_{i=1}^N Y_i(x)^4 + 4\sum_{i\neq j} Y_i(x)^3 Y_j(x)+ 3\sum_{i\neq j} Y_i(x)^2 Y_j(x)^2 \\
&\hskip35pt + 6\sum_{i\neq j\neq k}\! Y_i(x)^2 Y_j(x) Y_k(x) +\! \sum_{i\neq j\neq k\neq l}\! Y_i(x) Y_j(x) Y_k(x) Y_l(x) \bigg] {\rm d} x .
\endaligned $$
We denote the five terms by $I_1,\ldots, I_5$ respectively.
First, we have
$$\aligned
I_1&= \frac{1}{N^3} \int_{\mathbb{R}^d} \mathbb{E} Y_1(x)^4\,{\rm d} x \\
&= \frac{1}{N^3} \int_{\mathbb{R}^d} \mathbb{E} \Big[V^N(x-X_0^1)^4 - 4\omega_0(x)V^N(x-X_0^1)^3 + 6 \omega_0(x)^2 V^N(x-X_0^1)^2 \\
&\hskip60pt -4 \omega_0(x)^3 V^N(x-X_0^1) + \omega_0(x)^4 \Big]\,{\rm d} x ,
\endaligned$$
which is dominated by
$$\frac{1}{N^3} \int_{\mathbb{R}^d} \mathbb{E} \Big[V^N(x-X_0^1)^4 + 6 \omega_0(x)^2 V^N(x-X_0^1)^2 + \omega_0(x)^4 \Big]\,{\rm d} x=: I_{1,1} + I_{1,2} +I_{1,3}. $$
It is clear that $I_{1,3}= \frac1{N^3} \|\omega_0 \|_{L^4}^4$. One has
$$\aligned
I_{1,1} &= \frac{1}{N^3} \int_{\mathbb{R}^d} \int_{\mathbb{R}^d} V^N(x-y)^4 \omega_0(y)\,{\rm d} y{\rm d} x \\
&= \frac1{N^{3-3\beta d}} \int_{\mathbb{R}^d} \omega_0(y)\,{\rm d} y \int_{\mathbb{R}^d} N^{\beta d} V^4(N^\beta(x-y))\,{\rm d} x\\
&= \frac1{N^{3-3\beta d}} \|V\|_{L^4}^4.
\endaligned $$
In the same way,
$$\aligned
I_{1,2} &= \frac{6}{N^3} \int_{\mathbb{R}^d} \omega_0(x)^2 \int_{\mathbb{R}^d} V^N(x-y)^2 \omega_0(y)\,{\rm d} y{\rm d} x \\
&\leq \frac6{N^{3-\beta d}} \|\omega_0\|_\infty \int_{\mathbb{R}^d} \omega_0(x)^2\,{\rm d} x \int_{\mathbb{R}^d} N^{\beta d} V^2(N^\beta(x-y))\,{\rm d} y\\
&= \frac6{N^{3-\beta d}} \|\omega_0\|_\infty \|\omega_0 \|_{L^2}^2 \|V\|_{L^2}^2.
\endaligned $$
To sum up, we obtain
$$I_1 \leq \frac{C}{N^{3-3\beta d}} \big(\|\omega_0 \|_{L^4}^4 + \|V\|_{L^4}^4 + \|\omega_0\|_\infty \|\omega_0 \|_{L^2}^2 \|V\|_{L^2}^2 \big)= \frac{C_{V,\omega_0}}{N^{3-3\beta d}}. $$
Next, by independence of $\{Y_i(x)\}_{i=1}^N$ and Jensen's inequality,
$$\aligned
I_2&= \frac{4}{N^4} N(N-1) \int_{\mathbb{R}^d} \mathbb{E} Y_1(x)^3\, \mathbb{E} Y_2(x)\,{\rm d} x\\
&\leq \frac 4{N^2} \int_{\mathbb{R}^d} \big[\mathbb{E} Y_1(x)^4\big]^{\frac34} \big[\mathbb{E} Y_2(x)^4\big]^{\frac14}\,{\rm d} x \\
&= \frac 4{N^2} \int_{\mathbb{R}^d} \mathbb{E} Y_1(x)^4 \,{\rm d} x \leq \frac{C_{V,\omega_0}}{N^{2-3\beta d}} .
\endaligned $$
Similarly,
$$I_3\leq \frac{C_{V,\omega_0}}{N^{2-3\beta d}}, \quad I_4 \leq \frac{C_{V,\omega_0}}{N^{1-3\beta d}}. $$
Finally, it remains to estimate $I_5$. We have
\begin{align*}
I_5 &=\frac{1}{N^4}\int_{\mathbb{R}^d} \sum_{i\neq j\neq k\neq l } \mathbb{E} Y_i(x)\, \mathbb{E} Y_j(x)\,\mathbb{E} Y_k(x)\,\mathbb{E} Y_l(x)\, {\rm d} x \\
&\leq \int_{\mathbb{R}^d} \big[\mathbb{E} Y_1(x) \big]^4\, {\rm d} x = \int_{\mathbb{R}^d} \big[ V^N\ast \omega_0(x)-\omega_0(x) \big]^4\, {\rm d} x.
\end{align*}
Recall that $\omega_0$ and $V$ are compactly supported; we can find big $R>0$ such that $\omega_0$ and $V^N\ast \omega_0$ vanish outside $B(R)$ for all $N\geq 1$. Thus,
$$I_5 \leq \int_{B(R)} \big[ V^N\ast \omega_0(x)-\omega_0(x) \big]^4\, {\rm d} x.$$
Moreover,
\begin{equation*}\label{L4estimate}
\begin{aligned}
\big|V^N\ast \omega_0(x)-\omega_0(x)\big| & = \bigg|\int_{\mathbb{R}^d}V^N(x-y)(\omega_{0}(y)-\omega_{0}(x))\, {\rm d} y \bigg|\\
&\leq \|\nabla\omega_0\|_\infty \int_{\mathbb{R}^d}N^{\beta d}V(N^{\beta}(x-y))|x-y|\, {\rm d} y\\
& \leq\frac{C_{\omega_{0},V}}{N^{\beta}}\int_{\mathbb{R}^d}N^{\beta d}V(N^{\beta}(x-y))\, {\rm d} y = \frac{C_{\omega_{0},V}}{N^{\beta}} ,
\end{aligned}
\end{equation*}
where the third step is due to that $V$ is compactly supported. As a result, $I_5\leq C/N^{4\beta}$ for some constant $C$ depending also on $R$. Combining the estimates of $I_1,\ldots,I_5$ above, we can find $\lambda>0$ such that
\begin{align*}
\big\|\omega_{0}^{N}-\omega_{0}\big\|_{L^4(\Omega,L^4)}\leq \frac{C}{N^{\lambda}}.
\end{align*}
Regarding the $L^4(\Omega,L^1)$ norm of $\omega_{0}^{N}-\omega_{0}$, we note that the latter is also compactly supported, thus there is some $R>0$ such that
\begin{align*}
\big\|\omega_{0}^{N}-\omega_{0}\big\|_{L^4(\Omega,L^1)}^4 &=\mathbb{E} \bigg[\int_{B(R)} \big|V^N\ast S_0^N(x)-\omega_0(x)\big|\,{\rm d} x \bigg]^4 \\
&\leq C_R \int_{B(R)} \mathbb{E} \big|V^N\ast S_0^N(x)-\omega_0(x)\big|^4 \, {\rm d} x \\
&=\frac{C_R}{N^4} \int_{B(R)} \mathbb{E}\bigg(\sum_{i=1}^{N} Y_i(x) \bigg)^4\, {\rm d} x,
\end{align*}
so we can repeat the above computations to get the same estimate. In conclusion, we obtain the rate of convergence:
\begin{equation*}
\zeta_N:=\big\|\omega^N_0 - \omega_0 \big\|_{L^4(\Omega, L^1\cap L^4)}\leq \frac{C}{N^{\lambda}} \rightarrow 0 \quad\text{as } N \rightarrow\infty.
\end{equation*}
\end{appendix}
\bigskip
\noindent \textbf{Acknowledgements.} The second named author is grateful to the financial supports of the National Key R\&D Program of China (No. 2020YFA0712700), the National Natural Science Foundation of China (Nos. 11931004, 12090014), and the Youth Innovation Promotion Association, CAS (Y2021002).
|
\section{Introduction}
The main focus of this paper is finding a (near) perfect $k$-matching in random graphs with minimum degree $k+1$.
For $k,n,m\in \mathbb{N}$ we let $G_{n,m}^{\delta \geq k+1}$ be the random graph chosen uniformly at random from the set of all graphs on $n$ vertices, with $m$ edges and minimum degree $k+1$. Given a graph $G$, a $k$-matching of $G$ is a set of edges $M\subseteq E(G)$ such that each vertex in $V(G)$ is incident to at most $k$ edges in $M$ (as opposed to a matching of size $k$). Such a matching is called (near) perfect if it is of size $\lfloor kn/2\rfloor$.
When $m=(k+1)n/2$ then $G_{n,m}^{\delta \geq k+1}$ is distributed as a random $(k+1)$-regular graph. In this case, when $n$ is even Robinson and Wormald \cite{RW} showed, via the small cycle conditioning method, that w.h.p.\footnote{We say that a sequence of events $\{\mathcal{E}_n\}_{n\geq 1}$
holds {\em{with high probability}} (w.h.p.\@ in short) if $\lim_{n \to \infty}\Pr(\mathcal{E}_n)=1-o(1)$.} $G_{n,m}^{\delta \geq k+1}$ spans $k+1$ pairwise edge disjoint perfect matchings. However this result cannot be extended to slightly larger values of $m$ as it fails to be true due to the appearance of vertices whose neighborhood contains $k+2$ vertices of degree $k+1$.
The problem of finding a large $k$-matching in $G_{n,m}^{\delta \geq k+1}$ has been studied in the case $k=2$ in \cite{AF}, \cite{F}.
A graph that is known to be distributed as $G_{n',m'}^{\delta\geq k+1}$ for suitable $n',m'$ is the $(k+1)$-core of the random graph $G_{n,p}$. We denote by $G_{n,p}$ the random graph on $n$ vertices where each edge appears independently with probability $p$. The $k$-core of a graph $G$, denoted by $G^{(k)}$, is the unique maximal subgraph of $G$ of minimum degree $k$. {\L}uczak \cite{l} showed that w.h.p. the order of $G_{n,p}^{(k+1)}$ is either zero or linear in $n$. Later, Pittel, Spencer and Wormald \cite{PSW} determined the threshold for the appearance of a non-empty $k$-core of $G_{n,p}$ to be $p=c_k/n$ where $c_k=k+\sqrt{k\log k}+ o(\sqrt{k})$.
In \cite{BKV}, Bollob\'as, Kim and Verstra\"{e}te studied the existence of regular subgraphs in $G_{n,p}$. Let $\psi_k/n$ be the threshold for appearance of a $k$-regular subgraph of $G_{n,p}$. De facto $\psi_k\geq c_k$.
They proved that $\psi_k \leq \gamma_k$ where $\gamma_k=4k+o(k)$.
In addition, they showed that $\psi_k$ is strictly larger than $c_k$ for $k=3$ and conjectured that this statement is true for all $k\geq 3$. On the other hand Pretti and Weigt \cite{PW}, using techniques from statistical physics, predicted the contrary, that is $c_k=\psi_k$ for $k\geq 4$.
Mitsche, Molloy and Pralat \cite{MMP} proved that for sufficiently large $k$, $\psi_k-c_k\leq e^{-k/300}$ while Gao \cite{Gao} proved that if $|p-\psi_k/n|$ is sufficiently small then any $k$-regular subgraph of $G_{n,p}$
must contain all but at most $\epsilon_k n$ vertices of the $k$-core of $G_{n,p}$ for some $\epsilon_k$ that tends to 0 as $k\to \infty$.
Bollob\'as, Kim and Verstra\"{e}te also conjectured that if
$c>c_{k+1}$ then w.h.p. $G_{n,c/n}^{(k+1)}$ spans a $k$-regular subgraph. Chan and Molloy proved that this conjecture is true for all sufficiently large $k$ by showing that $G_{n,c/n}^{(k+1)}$, minus any vertex when $kn$ is odd, spans a $k$-factor for $c>c_k$ \cite{CM}. We completely resolve this conjecture by proving that this conjecture is true for all values of $k\geq 2$.
A $k$-factor of $G$ is a $k$-regular spanning subgraph of $G$. We say that $G$ is $k$-factor critical if $G\setminus \{v\}$ spans a $k$-factor for every $v\in V(G)$. We let $\mathcal{P}_k$ be the set of graphs $G$ that either have a $k$-factor or, in the case that $k|V(G)|$ is odd, are $k$-factor critical.
The main result of this paper is the following Theorem.
\begin{theorem}\label{thm:matchings}
Let $3\leq k+1=O(1)$ and { $(k+1)/2<c=O(1)$}. Then w.h.p. $G_{n,cn}^{\delta \geq k+1} \in \mathcal{P}_k$.
In addition, w.h.p. we can find the corresponding $k$-factor in $O(n)$ time.
\end{theorem}
If non empty, $G_{n,p}^{(k+1)}$ is distributed as $G_{n',m'}^{\delta \geq k+1}$ for some $n',m'$ that satisfy $n'=\Omega(n)$ and $m' \leq |E(G_{n,p})|=\Omega(n)$. Hence as an immediate corollary we have that for $3\leq k=O(1)$ and $0\leq c =O(1)$ w.h.p. either $G_{n,c/n}^{(k+1)}=\emptyset$ or $G_{n,c/n}^{(k+1)}\in \mathcal{P}_k$. In this paper we prove the slightly stronger, hitting time analogue of this corollary.
Denote by $F_0,F_1,....,F_N$, $N=\binom{n}{2}$ the random graph process. That is, $F_0$ is the empty graph on $n$ vertices and $F_i$ is formed by adding to $F_{i-1}$ an edge chosen uniformly at random from the ones that are not present in $F_{i-1}$ for $i\in [n(n-1)/2]$. Let $\sigma_{k+1}=\min\{i:F_i^{(k+1)} \neq \emptyset\}.$
\begin{theorem}\label{cor:matchings}
Let $3\leq k+1=O(1)$. Then w.h.p. $F_i^{(k+1)} \in \mathcal{P}_k$ for $i\geq \sigma_{k+1}$.
\end{theorem}
Our proof approach differs from the one used in \cite{CM} which is driven by verifying a generalized Tutte-like condition. It relies on the application of a randomized algorithm for finding a large $k$-matching, which we call {\sc k-MatchTINF }\@ ($k$-Match Those In Need First).
{\sc k-MatchTINF } goes as follows: Its input is a graph $G$. As it progresses it grows a $k$-matching $M$ while in parallel it removes edges from $G$. At each step it keeps track of a set $Z$ that consists of vertices that are incident to $\ell$ edges in $M$ but to at most $k-\ell$ edges in $G$. Think of these as the {\em{dangerous}} vertices. If dangerous vertices exist then {\sc k-MatchTINF } chooses a random edge $e \in E(G)$ that is incident to a dangerous vertex, otherwise it chooses
a random edge $e \in E(G)$ incident to a vertex $v$ whose $M$-degree is minimized.
Then, it adds $e$ to $M$, removes it from $G$ and deletes the edges incident to any vertex in $G$ which is incident to $k$ edges in $M$.
We will prove that {\sc k-MatchTINF } outputs a matching $M$ of size $kn/2-o(n)$. We will then augment $M$ into a (near) perfect $k$-matching using alternating paths in $O(n)$ time.
We split the rest of the paper as follows: In Section \ref{section:model} we describe the model that we will use to analyze {\sc k-MatchTINF }. A full description of {\sc k-MatchTINF } is given in Section \ref{section:alg} while the main part of its analysis is given in Section \ref{sec:analysis}. In Section \ref{sec:reserve} we show that one may reserve some edges before applying {\sc k-MatchTINF } to $G_{n,m}^{\delta \geq k+1}$ and still get a $k$-matching of size $kn/2-o(n)$. We then use those edges to augment the outputted $k$-matching into a k-factor. This last step takes place in Section \ref{section:matchings}.
\section{Random Sequence Model}\label{section:model}
To analyse $G_{n,m}^{\delta \geq k+1}$ we use a variation of Bollob\'{a}s configuration model \cite{BolCM} which we refer to as the random sequence model. Given $n,m \in \mathbb{N}$ and a sequence of size $2m$, ${\bf x}=(x_1,x_2,...,x_{2m})\in [n]^{2m}$ we define the multigraph $G_{\bf x}$ by $V(G_{\bf x}):=[n]$, $E(G_{\bf x}):=\{\{x_{2j-1},x_{2j}\}:j\in [m]\}$. Thus $G_{\bf x}$ is a graph on $n$ vertices with $m$ edges. The degree of some vertex $v\in [n]$ with respect to the sequence ${\bf x}$ is equal to the number of times it appears in ${\bf x}$, i.e. $d_{\bf x}(v)=|\{i: x_i=v, 1\leq i\leq 2m\}|$. We let $\mathcal{S}_{n,2m}^{\delta \geq k+1}$ be the set of sequences ${\bf x}=(x_1,x_2,...,x_{2m})$ such that $d_{{\bf x}}(i)\geq k+1$ for $i \in [n]$.
If ${\bf x}$ is chosen uniformly at random from $\mathcal{S}_{n,2m}^{\delta \geq k+1}$ then $G_{\bf x}$ is close in distribution to $G_{n,m}^{\delta \geq k+1}$. Indeed, conditioned on $G_{\bf x}$ being simple, the distributions of $G_{\bf x}$ and $G_{n,m}^{\delta \geq k+1}$ are identical. Both are uniform over the simple graphs on $n$ vertices with $m$ edges and minimum degree $k$. Each such graph will correspond to $m!2^m$ sequences in $\mathcal{S}_{n,2m}^{\delta \geq k+1}$.
Similarly to \cite{AF}, \cite{F}, the model that we will use to analyze {\sc k-MatchTINF } will be slightly more complicated than the one above.
For $i \in \mathbb{N}$, a list $L$ of size $i$ is a map from $\{0,1,...,i-1\}$ to $\mathbb{Z}_{\geq 0}$, i.e. $L:\{0,1,...,i-1\} \mapsto \mathbb{Z}_{\geq 0}$.
Given $n,m \in \mathbb{N}$, a list $L^i$ of size $i+2$ for $0\leq i\leq k$ such that $\sum_{i=0}^k\sum_{j=0}^{i+1}L^{i}(j)=n$ and a map $y:[n]\mapsto \{0,1,...,k\} \times \{0,1,...,k,k+1\}$ that maps $L^i(j)$ many elements to $(i,j)$ we let $\bigg(\mathcal{S}_{n,2m}^{L^0,L^1,...,L^k},y(\cdot)\bigg)$ be the set of sequences in $[n]^{2m}$ such that for $i\in [n]$ and ${\bf x} \in \bigg(\mathcal{S}_{n,2m}^{L^0,L^1,...,L^k},y(\cdot)\bigg)$
\begin{itemize}
\vspace{-3mm} \item[(i)] if $y_2(i)\leq y_1(i)$ then the element $i$ appears exactly $y_2(i)$ times in {\bf x},
\vspace{-3mm} \item[(ii)] if $y_2(i) = y_1(i)+1$ then the element $i$ appears at least $y_2(i)$ times in {\bf x}.
\end{itemize}
Hence when $L^i(j) \neq 0$ iff $i=k, j=k+1$ we have,
$$\bigg(\mathcal{S}_{n,2m}^{L^0,L^1,...,L^k},y(\cdot)\bigg)=\mathcal{S}_{n,2m}^{\delta \geq k+1}.$$
{\sc k-MatchTINF }\ (presented later in Section 3) has as an input a graph $G=G_{n,m}^{\delta\geq k+1}$ which we simulate using a sequence in $\mathcal{S}_{n,2m}^{\delta \geq k+1}$. As the algorithm progresses edges are revealed and vertices are matched. To capture the amount of information revealed, or equivalently the current distribution of the graph, we will have to keep track of quantities like ``exactly $L^{k-i}(k-i+1)$ vertices have been matched exactly $i$ times but still have degree at least $k-i+1$" or
``exactly $L^{k-i}(j)$ vertices have been matched exactly $i$ times and have degree $j$" for $0\leq j\leq k-i$".
Let
\begin{equation}\label{eq:fk}
f_k(\lambda)=e^{\lambda}-\sum_{i=0}^{k-1} \frac{\lambda^i}{i!}.
\end{equation}
The next two Lemmas describe a typical element of $\bigg(\mathcal{S}_{n,2m}^{L^0,L^1,...,L^k}, y(\cdot)\bigg)$. Let ${\bf x}$ be an element of $\bigg(\mathcal{S}_{n,2m}^{L^0,L^1,...,L^k}, y(\cdot)\bigg)$ chosen uniformly at random. We know that the vertices (integers) that are mapped by $y(\cdot)$ to $(i_1,i_2)$ with $i_2\leq i_1$ appear exactly $i_2$ times in ${\bf x}$. Let $d_1,d_2,...,d_{n'}$ be the degrees of the rest of the vertices in ${\bf x}$. Lemma \ref{lem:equiv} states that the joint distribution of $d_1,d_2,...,d_{n'}$ is the same as the joint distribution of $\mathcal{P}_1,\mathcal{P}_2,...,\mathcal{P}_{n'}$ where $\mathcal{P}_j$ is a $Poisson(\lambda)$ random variable conditioned on being at least $y_1(j)+1$ for $j\in[n']$, for some universal, well tune, value of $\lambda$. Thereafter in Lemma \ref{lem:degDistributions} we prove concentration of the number of vertices that are mapped by $y(\cdot)$ to $(i,i+1)$ and have degree $j$ for $0\leq i\leq k$ and $i+1\leq j\leq \log^2 n.$
\begin{lemma}\label{lem:equiv}
Let $n,m \in \mathbb{N}$, $L^i$ be a list of size $i+1$ for $0\leq i\leq k$ such that $\sum_{i=0}^k\sum_{j=0}^{i+1}L^{i}(j)=n$. Also let $y:[n]\mapsto \{0,1,...,k\} \times \{0,1,...,k,k+1\}$ be such that $|y^{-1}(i,j)|=L^i(j)$ for $0\leq i \leq k$ and $0\leq j\leq k+1$.
Let ${\bf x}$ be chosen uniformly at random from $\bigg(\mathcal{S}_{n,2m}^{L^0,L^1,...,L^k}, y(\cdot)\bigg)$. Let $R= \sum_{i=0}^k\sum_{j=0}^{i}jL^i(j)$ and assume that
\begin{equation}\label{cond}
2m-R \geq \sum_{i=0}^k (i+1) L^i(i+1).
\end{equation}
Let $\lambda$ be the unique positive real number that satisfies
\begin{equation}\label{eq:lambda}
\sum_{i=0}^{k}\frac{{\lambda}f_{i-1}({\lambda})}{f_i({\lambda})}L^i(i+1)=2m-R.
\end{equation}
For $1\leq i \leq k$ let $\mathcal{P}_{\geq i}$ denote the {\em truncated at $i$ Poisson($\lambda$}) random variable, i.e
$$\Pr(\mathcal{P}_{\geq i}=t)= \frac{e^{-\lambda}\lambda^t/t!}{1-\sum_{j=1}^{k-1}e^{-\lambda}\lambda^j/j!}
=\frac{{\lambda}^t}{t!f_i({\lambda})},\hspace{1in}\text{ for }t\geq i.$$
Let $\{Z_j:j \in [n]\}$ be a set of independent random variables such that,
\begin{itemize}
\vspace{-3mm} \item[(i)] $Z_j$ is distributed as $\mathcal{P}_{ \geq y_2(j)}$ if $y_2(j)=y_1(j)+1$,
\vspace{-3mm} \item[(ii)] $Z_j=y_2(j)$ if $y_2(j)\leq y_1(j)$.
\end{itemize}
Let $\big(\mathcal{S}',y(\cdot)\big)$ be the set of sequences in which element $j\in [n]$ appears $Z_j$ times.
Let ${\bf x}'$ be chosen uniformly at random from $\big(\mathcal{S}',y(\cdot)\big)$. Then, conditioned on the length of ${\bf x}'$, be equal to $2m$, ${\bf x}$ has the same distribution with ${\bf x}'$.
\end{lemma}
\begin{proof}
Denote by $len({\bf x}')$ the length of ${\bf x}'$.
Since conditions (i),(ii) are satisfied by both sequences it is enough to check the case
where $L^i(j)=0$ for $0\leq j \leq i$ and $i\in \{0,1,...,k\}$.
Fix $n,2m \in \mathbb{N}$ and ${\bf x}''\in[n]^{2m}$.
For $\bar{{\bf x}}\in \{{\bf x},{\bf x}',{\bf x}''\}$ let $\mathcal{D}(\bar{{\bf x}})$ be the degree sequence of $\bar{{\bf x}}$. Assume that $d_{{\bf x}''}(v)\geq y_1(v)+1$ for $v\in[n]$ and ${\bf x}''$ has length $2m$ (otherwise $\Pr({\bf x}={\bf x}'')=\Pr({\bf x}'={\bf x}''|len({\bf x}')=2m)=0$).
Observe that if we let
$p_{\mathcal{D}({\bf x}')}=\Pr({\bf x}'={\bf x}''|\mathcal{D}({\bf x}')=\mathcal{D}({\bf x}''), len({\bf x}')=2m)$ and
$p_{\mathcal{D}({\bf x})}=\Pr({\bf x}={\bf x}''|\mathcal{D}({\bf x})=\mathcal{D}({\bf x}''))$
then,
$$p_{\mathcal{D}({\bf x})}=p_{\mathcal{D}({\bf x}')}.$$
Let $\mathcal{S}_d$ be a maximal subset of $\big(\mathcal{S}_{n,2m}^{L^0,...,L^k},y(\cdot)\big)$
with the property that all elements of $\mathcal{S}$ have distinct degree sequences (hence every sequence in $\big(\mathcal{S}_{n,2m}^{L^0,...,L^k},y(\cdot)\big)$ can be obtained via a permutation from a unique sequence in $\mathcal{S}_d$). Then for ${\bf x} \in \mathcal{S}_d$ there are exactly $\frac{(2m)!}{\underset{v\in [n]}{\prod}d_{{\bf x}}(v)!}$ elements in $\big(\mathcal{S}_{n,2m}^{L^0,...,L^k},y(\cdot)\big)$ with the same degree sequence as ${\bf x}$. In addition, conditioned on $len(x')=2m$
the set of possible degree sequences for ${\bf x}'$ is exactly the same as the set of degree sequences of elements of $\mathcal{S}_d$.
Therefore,
\begin{align*}
\Pr({\bf x}={\bf x}'')&= p_{\mathcal{D}({\bf x})}\cdot \Pr(\mathcal{D}({\bf x})=\mathcal{D}({\bf x}''))
\\&= p_{\mathcal{D}({\bf x})}\cdot \left( \frac{(2m)!}{\underset{v\in [n]}{\prod}d_{{\bf x}''}(v)!}\right)
\bigg/
\left( \sum_{{\bf x} \in \big(\mathcal{S}_{n,2m}^{L^0,...,L^k},y(\cdot)\big) } 1\right)
\\&= p_{\mathcal{D}({\bf x})}\cdot \left( \frac{(2m)!}{\underset{v\in [n]}{\prod}d_{{\bf x}''}(v)!}\right)
\bigg/
\left( \sum_{{\bf x} \in \mathcal{S}_d }\frac{(2m)!}{\underset{v\in [n]}{\prod}d_{{\bf x}}(v)!} \right).
\end{align*}
On the other hand,
\begin{align*}
\Pr \bigg({\bf x}'= {\bf x}'' \bigg|\; len({\bf x}') = 2m \bigg)
&= p_{\mathcal{D}({\bf x}')} \cdot \Pr(\mathcal{D}({\bf x}')=\mathcal{D}({\bf x}'')|len({\bf x}')=2m)
\\&= p_{\mathcal{D}({\bf x}')} \cdot \left( \underset{v\in [n]}{\prod}\frac{
e^{-\lambda}\lambda^{d_{{\bf x}''}(v)} }{d_{{\bf x}''}(v)! f_{y_2(v)}(\lambda)} \right) \bigg/ \left( \sum_{{\bf x}' \in \mathcal{S}_d} \underset{v\in [n]}{\prod}
\frac{ e^{-\lambda}\lambda^{d_{{\bf x}'}(v)}}{d_{{\bf x}'}(v)! f_{y_2(v)}(\lambda) }\right)
\\& = p_{\mathcal{D}({\bf x}')} \left( \lambda^{2m} \underset{v\in [n]}{\prod}
\frac{1}{d_{{\bf x}''}(v)!} \right) \bigg/ \left( \lambda^{2m} \sum_{{\bf x}' \in \mathcal{S}_d} \underset{v\in [n]}{\prod}
\frac{1}{d_{{\bf x}'}(v)!} \right)
\\&=\Pr({\bf x}={\bf x}'').
\end{align*}
\end{proof}
We now use Lemma \ref{lem:equiv} to approximate the distribution of the degree sequence of a random element of $\big(\mathcal{S}_{n,2m}^{L^0,...,L^k},y(\cdot)\big)$.
\begin{lemma}\label{lem:degDistributions}
Let ${\bf x}$ be chosen uniformly from $\big(\mathcal{S}_{n,2m}^{L^0,...,L^k},y(\cdot)\big)$. Let $m\leq 100n\log n$ and assume that \eqref{cond} is satisfied. For $0\leq i\leq k$ and $j\geq i+1$ let $ \nu^{i}_j({\bf x})$ be the number of elements $v\in [n]$ such that $y_1(v)=i$ and $d(v)=j$. Then with probability $1-o(n^{-9})$,
$$\bigg|\nu^{i}_j({\bf x})- L^i(i+1) \frac{ \lambda^j}{j! f_i(\lambda)} \bigg| \leq n^{1/2}\log^2 n \text{ for } 0\leq i\leq k \text{ and } i+1 \leq j\leq \log^2 n.$$
\end{lemma}
\begin{proof}
$\lambda$ has been chosen such that $\Pr(\mathcal{P}_{\geq i}=j)= \frac{\lambda^j}{j! f_i(\lambda)}$ Thus, if we let $X$ be
\\alpha $Binomial\left(L^i(i+1), \frac{ \lambda^j}{j! f_i(\lambda)}\right)$ random variable, Lemma \ref{lem:equiv} implies,
\begin{align*}
\Pr\bigg( \bigg|\nu^{i}_j(G_{\bf x})- L^i(i+1) \frac{ \lambda^j}{j! f_i(\lambda)} \bigg| > n^{1/2}\log^2 n \bigg)&
= O(m^{-0.5})
\Pr\big( |X-\mathbb{E}(X)|> n^{1/2}\log^2 n \big)
\\& \leq O(m^{-0.5}) \exp\set{-O(\log^4 n)}
=o(n^{-9.5}),
\end{align*}
where the inequality follows from the Chernoff bound (see Theorem \ref{thm:chernoff}).
Taking union bound over $i,j$ yields the desired result.
\end{proof}
It can be shown, see for example \cite{BCFF},\cite{McK} that for a chosen uniformly at random element $x$ of $\in \big(\mathcal{S}_{n,2m}^{L_0,...,L^k},y(\cdot)\big)$ that if
$m=O(n)$ and $\sum_{i=0}^k\sum_{j=1}^{i}L^i(j)=o(n)$ then,
\begin{equation*}
\Pr(G_{\bf x}\text{ is simple})=\Omega(1).
\end{equation*}
Hence, when $L^0,...,L^{k-1}$, $L^k(0),L^k(1),...,L^k(k)$ are zero and $y$ maps $[n]$ to $(k,k+1)$, choosing a random element of ${\bf x}\in \big(\mathcal{S}_{n,2m}^{L_0,...,L^k},y(\cdot)\big)$ and then generating $G_{\bf x}$ is a good model for generating
$G_{n,m}^{\delta \geq k+1}$ and for any function $f(\cdot)$ such that $f(n)\to 0$ as $n\to \infty$ any property that hold with probability $1-o(f(n))$ for $G_{\bf x}$ also hold with probability $1-o(f(n))$ for $G_{n,m}^{\delta \geq k+1}$.
\subsection{Properties of $G_{n,m}^{\delta\geq k+1}$}
Let $\epsilon>0$ and $(1+\epsilon)kn/2 \leq m =O(n)$. $\lambda$ is defined by \eqref{eq:lambda}. Let $\mathcal{E}$ be an occupancy event in $G_{n,m}^{\delta\geq k+1}$. Denote by $G_{n,m}^{\delta\geq k+1,seq}$ the random graph that is generated from the random sequence model (i.e. from first choosing a random element of $\mathcal{S}_{n,2m}^{\delta\geq k+1}$ and then generating the corresponding graph) and $G_{n,m}^{\delta\geq k+1,Po(\lambda)}$ the random graph that is generated by first generating $n$ independent $ \mathcal{P}_{k+1}(\lambda)$ random variables $P_1,P_2,...,P_n$, then choosing a random sequence in $[n]^{\sum_{i\in [n]} P_i}$ with degree sequence $P_1,P_2,...,P_n$ and finally generating he corresponding graph if $\sum_{i\in [n]} P_i$ is even. Then,
\begin{align}\label{eq:models}
\Pr\big(G_{n,m}^{\delta\geq k+1} \in \mathcal{E}\big) &\leq O(1) \Pr\big(G_{n,m}^{\delta\geq k+1,seq} \in \mathcal{E}\big)= \Pr\bigg(G_{n,m}^{\delta\geq k+1,Po(\lambda)} \in \mathcal{E}\bigg| \sum_{i\in [n]}{P_i}=2m\bigg) \nonumber
\\&\leq O(n^{0.5}) \Pr\big(G_{n,m}^{\delta\geq k+1,Po(\lambda)} \in \mathcal{E}\big).
\end{align}
In the Lemmas that follow we let $G\sim G_{n,m}^{\delta \geq k+1,seq}$.
\begin{lemma}\label{lem:degrees}
$$\Pr\bigg(\Delta(G)> \frac{10\log n}{\log\log n}\bigg) =o( n^{-9}).$$
\end{lemma}
\begin{proof}
\eqref{eq:models} implies,
\begin{align*}
\Pr\bigg(\Delta(G)> \frac{10\log n}{\log\log n}\bigg) &
\leq O(n^{0.5}) \cdot n \Pr\bigg(\mathcal{P}_k(\lambda) > \frac{10\log n}{\log\log n}\bigg)
\\& \leq O(n^{1.5}) \frac{\lambda^{\frac{10\log n}{\log\log n}}}{f_{k+1}(\lambda)(\frac{10\log n}{\log\log n})!} \leq O(n^{1.5})
\bfrac{e\lambda \log\log n}{10\log n}^{\frac{10\log n}{\log\log n}} =o(n^{-9}). \end{align*}
\end{proof}
For the next Lemma we let $\beta\in (0,1)$ be such that $\eqref{eq:beta}$ is satisfied.
\begin{lemma}\label{lem:density}
With probability $1-O(n^{-0.5})$,
\begin{itemize}
\item[(i)] there does not exists a set $S\subset V(G)$ of size $|S|\leq k^{400}$ that spans $|S|+1$ edges in $G$.
\item[(ii)] there does not exists a set $S\subset V(G)$ of size $k^{200}\leq |S| \leq \beta n$ that spans $(1+10^{-10})|S|$ edges in $G$.
\end{itemize}
\end{lemma}
\begin{proof}
{\em{(i):}} For $\ell\geq 0$ let $\Phi(2\ell)$ be the number of ways to partition a $2\ell$ element set into pairs. Then $\Phi(2\ell)=\frac{(2\ell)!}{\ell!2^\ell}$ and
\begin{align*}
\frac{\Phi(2m-2\ell)\Phi(2\ell)}{\Phi(2\ell)}
=\frac{(2\ell)!}{\ell!} \frac{m!(2m-2\ell)!}{(m-\ell)!(2m)!}
\leq (2\ell)^\ell \bfrac{1}{2(2m-2\ell)}^\ell = \bfrac{\ell}{2\ell-2\ell}^\ell.
\end{align*}
For fixed $s \leq 10^{100}$ let $r=r(s)=s+1$. Let $C=k^{400}$.
\eqref{eq:models} implies,
\begin{align}
\Pr&( \exists S\subset V(G): |S| \leq C \text{ and } S \text{ spans $|S|+1$ edges in $G$} )\nonumber
\\&\leq O(n^{0.5}) \sum_{s= 4}^{C} \binom{n}{s} \sum_{\substack{d_1,d_2,...,d_s\geq k+1\\ z_1\leq d_1,...,z_s\leq d_s \\ z_1+...+z_s=2r}}
\prod_{i=1}^s \frac{\lambda^{d_i}}{ d_i! f_{k+1}(\lambda)} \binom{d_i}{z_i}
\frac{\Phi(2m-2r)\Phi(2r)}{\Phi(2m)} \label{exp1}
\\&\leq O(n^{0.5}) \sum_{s= 4}^{C} \binom{n}{s} \frac{\lambda^{2r}}{f_{k+1}^s(\lambda)} \bfrac{r}{2m-2r}^r \sum_{\substack{d_1,d_2,...,d_s\geq k+1\\ z_1\leq d_1,...,z_s\leq d_s\\ z_1+...+z_s=2r}}
\prod_{i=1}^s \frac{\lambda^{d_i-z_i}}{(d_i-z_i)!}
\nonumber
\\&\leq O(n^{0.5}) \sum_{s=4}^C \binom{n}{s} \frac{\lambda^{2r}}{f_{k+1}^s(\lambda)}
\bfrac{r}{2m-2r}^r \sum_{D\geq 2r} \sum_{\substack{z_1,z_2,...,z_s\geq 0\\zeta_1+...+z_s=2r}}
\frac{\lambda^{D-2r}s^{D-2r}}{(D-2r)!} \label{exp2}
\\&= O(n^{0.5}) \sum_{s= 4}^C \binom{n}{s} \frac{\lambda^{2r}}{f_{k+1}^s(\lambda)} \bfrac{r}{2m-2r}^r \sum_{D\geq 2r} \binom{2r+s-1}{s-1} \frac{(\lambda s)^{D-2r}}{(D-2r)!} \nonumber
\\&\leq O(n^{0.5}) \sum_{s= 4}^{C} \bfrac{en}{s}^s \frac{\lambda^{2r}}{f_{k+1}^s(\lambda)} \bfrac{r}{2m-2r}^r
\bfrac{e(2r+s)}{s}^se^{s \lambda } \nonumber
\\&\leq O(n^{0.5}) \sum_{s= 4}^{C} \bfrac{en}{s}^s \frac{\lambda^{2r}}{f_{k+1}^s(\lambda)} \bfrac{r}{2m-2r}^r
10^se^{s \lambda } \nonumber
\\& \leq O(n^{0.5}) \sum_{s=4}^{C}
\bfrac{10e^{1+\lambda} \lambda^{2} rn }{ f_{k+1}(\lambda)s(2m-2r )}^s\bfrac{4\lambda^2r}{2m-2r }^{r -s} \label{rep}
\\& \leq O(n^{0.5}) \sum_{s=4}^{C}
\bfrac{4\lambda^2r}{2m-2r }^{r -s} =O(n^{-0.5}). \nonumber
\end{align}
{\textbf{Explanation of \eqref{exp1}}} We first choose $s$ vertices $v_1,v_2,...,v_s$ in $\binom{n}{s}$ ways. Those vertices will span a subgraph $S$ with $r$ edges.
The degree of $v_i$ in $G$ will be $d_i$, this occurs with probability $\prod_{i=1}^s\frac{\lambda^{d_i}}{d_i! f_k(\lambda)}$, and its degree in $S$ will be $z_i$. Then, for each vertex $v_i$ we choose a set of $z_i$ out of the $d_i$ copies of $v_i$. The last term is the probability that those copies induce $\sum_{i=1}^sz_i/2$ edges when we pass form the sequence in $[n]^{\sum_{i\in [n]}d(i) }$ to the corresponding graph.
To derive \eqref{exp2} we used the following identity. For fixed $z_1,z_2,...,z_s$ if $\sum_{i=1}^s z_i=2r$ and $\sum_{i=1}^s d_i-z_i=D-2r$ then $\sum_{\substack{z_1\leq d_1,...,z_s\leq d_s\\ d_1+...+d_s=D \\ z_1+z_2+...+z_s=2r}}\frac{(D-2r)!}{\prod_{i=1}^s(d_i-z_i)!}= s^{D-2r}$.
Now for $k^{200}\leq s \leq \beta n$ let $r=r(s)=(1+10^{-10})s$.
Similarly to \eqref{rep} we have
\begin{align}
\Pr&( \exists S\subset V(G): k^{200}\leq |S| \leq \beta n \text{ and } S \text{ spans $(1+10^{-10})|S|$ edges in $G$} ) \nonumber
\\& \leq O(n^{0.5}) \sum_{s= k^{200}}^{\beta n}
\bfrac{20e^{1+\lambda} \lambda^{2} rn }{ f_{k+1}(\lambda)s(2m-2r )}^s\bfrac{4\lambda^2r}{2m-2r }^{r -s} =o(n^{-3}). \label{eq:beta}
\end{align}
\end{proof}
\section{The {\sc k-MatchTINF } Algorithm}\label{section:alg}
In this section we will describe and begin to analyze {\sc k-MatchTINF }. Its performance when applied to $G\sim G_{n,m}^{\delta \geq k+1,seq}$ is given by the following Theorem.
\begin{theorem}\label{thm:kGreedy}
Let $k\geq 2$, $(k+1)/2< c=O(1)$ and $G\sim G_{n,cn}^{\delta \geq k+1,seq}$. Then, with probability $1-o(n^{-9})$, {\sc k-MatchTINF } applied to $G$ outputs a $k$-matching $M$ of size at least $kn/2-n^{0.401}$ in $O(n)$ time.
\end{theorem}
\subsection{{\sc k-MatchTINF }}
{\sc k-MatchTINF } will be applied to the (multi)-graph $G\sim G_{n,cn}^{\delta \geq k+1,seq}$. As the algorithm progresses, it makes changes to $G$ and generates a graph sequence $G_0=G \supset G_1 \supset ...\supset G_{\tau}=\emptyset$. In parallel, it grows a $k$-matching $M$. We let $M_0=\emptyset, M_1,M_2,..., M_{\tau}=M$ be the sequence of matchings that are generated. For $v\in [n]$ we let the label of $v$ at time $t$, $l_t(v)\in \{0,...,k\}$, to be equal to $k$ minus the number of edges incident to $v$ in $M_t$ i.e. the number of edges incident to $v$ that we would like to add to $M_t$. For $0\leq t\leq \tau$ we also define,
\begin{itemize}
\item $V=V(G_0)=\{v_1,v_2,...,v_n\}$,
\item $m_t:=|E(G_t)|$,
\item $d_t(v):=d_{G_t}(v)$, for $v\in V$,
\item $d_{M_t}(v):=|\set{ e \in M_t:v \in e} |$, for $v\in V$,
\item $Y_{\ell,j}^t:=\set{v \in [n]: l_t(v)=\ell,\,d_{t}(v)=j}$, $0\leq \ell \leq k, 0\leq j$, i.e. the set of vertices of degree $j$ that are incident to $k-\ell$ edges in $M_t$,
\item $Y_{\ell}^t:=\cup_{j\geq \ell+1} Y_{\ell,j}^t$, for $0\leq \ell \leq k$,
\item $Z_t=\underset{{\ell\in [k], 0\leq j\leq \ell}}{\bigcup} Y_{j,\ell}^t$, the set of ``dangerous" vertices,
\item $\zeta_t = \sum_{\ell=1}^{k} \sum_{j=1}^{\ell} j|Y_{\ell,j}^t| $,
\item $index(t)=max_{v\in V} l_t(v)$,
\item $DF_t =\set{v\in V: index(t)=l_t(v)}$.
\end{itemize}
\noindent
$DF_t$ is the set of {\emph{$M_t$-deficient vertices}} at time $t$, that is the set of vertices whose $M_t$ degree $d_{M_t}(\cdot )$ is minimized.
Observe that if $v\in G_t$ satisfies $v\in Y^t_{\ell,j} \subseteq Z_t$ for some $j\leq \ell$ then there are $k-\ell$ edges incident to $v$ in $M_t$ and $j\leq \ell $ edges incident to $v$ in $G_t$. Thus in the final matching $M$, $v$ can be incident to at most $k-\ell+j\leq k$ edges. In addition, if in the future an edge incident to $v$ in $G_t$ is removed but not added to the matching then, $v$ will be incident to at most $k-1$ edges in $M$. Therefore $Z_t$ consists of {\emph dangerous vertices} whose edges we would like to add to the matching as soon as possible in order to avoid ``accidentally" deleting them. $\zeta_t$ bounds the number of those edges. {\sc k-MatchTINF } tries to match the vertices in $Z_t$ first. If $Z_t$ is empty then {\sc k-MatchTINF } matches a vertex in $DF_t$
\begin{algorithm}[H]
\caption{{{\sc k-MatchTINF }}}
\begin{algorithmic}[1]
\\ Input: $G_0=G$.
\\ $t = 0$.
\While{$E(G_t)\neq \emptyset$}
{
\If{$Z_t \neq \emptyset$}
\\\hspace{10mm} Choose a vertex $v_t \in Z_t$ proportional to its degree.
\\\hspace{10mm} Choose a random neighbor of $v_t$ in $G_t$, $w_t$.
\Else
\\\hspace{10mm} Choose a vertex $v_t\in DF_t$ proportional to its degree.
\\\hspace{10mm} Choose a random neighbor of $v_t$ in $G_t$, $w_t$.
\EndIf
\\\hspace{5mm} Update: $M_{t+1} \gets M_t \cup\{\{v_t,w_t\}\}$,
\\\hspace{5mm} $l_{t+1}(v_t)\gets l_t(v_t)-1$, $l_{t+1}(w_t) \gets l_t(w_t)-1$.
\\\hspace{5mm} $l_{t+1}(u)\gets l_t(u)$ for $u\in V\setminus \{v_t,w_t\}$
\\\hspace{5mm} Delete $\{v_t,w_t\}$ from $G_t$.
\\\hspace{5mm} Delete all the edges incident to any vertex $v$ in $G_t$ that satisfies
$l_{t+1}(v)=0$.
\\\hspace{5mm} Let $Y_{\ell,j}^t=\set{v \in [n]: l_t(v)=\ell,\,d_{G_t}(v)=j}$, $0\leq \ell \leq k, 0\leq j\leq \ell$.
\\\hspace{5mm} Let $Y_{\ell}^t=\set{v \in [n]: l_t(v)=\ell,\,d_{G_t}(v)\geq \ell+1}$, $0\leq \ell \leq k$.
\\\hspace{5mm} Let $G_{t+1}$ be the resultant graph.
\\\hspace{5mm} $t = t+1$. }
\EndWhile
\\ $\tau = t$
\end{algorithmic}
Remove any loops and multiple edges from $M$.
\end{algorithm}
\begin{notation}
We let $e_t=\{v_t, w_t\}$ and $R_t$ be the set of edges deleted at step $t$. We also denote by $\mathcal{H}_t$ the actions taken by {\sc k-MatchTINF } during the first $t$ iteration of the while loop at line 3.
\end{notation}
For $0\leq t <\tau$ and $0\leq \ell \leq k$ we let the list $L_\ell^t$ of size $\ell+2$ be defined by
$$L^t_{\ell}(j)
=
\begin{cases}
|Y^t_{\ell,j}| & \text{ for } 0 \leq j\leq \ell, \\
|Y_\ell^t| & \text{ for } j=\ell+1. \\
\end{cases}
$$
We let $\lambda^t$ be the value of $\lambda$ defined by \eqref{eq:lambda} with $m=m_t$ and lists $L^i=L_i^t$ for $0\leq i\leq k$.
\subsection{Uniformity}
We start by showing that $G_t$ exhibits a Markovian behaviour.
We let $y_t(\cdot):[n]\mapsto \{0,1,...,k\} \times\{0,1,2,...,k+1\}$ be defined as follows.
$$y_t(v):=\begin{cases}
(\ell,j) \text{ if } v\in Y^t_{\ell,j} \text{ with } 0\leq \ell\leq k \text{ and } 0\leq j\leq \ell
\\
(\ell,\ell+1) \text{ if } v\in Y^t_{\ell}, 0\leq \ell\leq k.
\end{cases}
$$
\begin{lemma}\label{lem:uniformity}
For $t\geq 0$, suppose that $G_{t}$ is distributed as $G_{x_{t}}$, where $x_{t}$ is a random member of $\bigg(\mathcal{S}_{n,2m_t}^{L_0^t,L_1^t,...,L_k^t},y_t\bigg)$. Then given $L_0^t,L_1^t,...,L_k^t,e_{t},R_t,y_t$ and $m_t$, $G_{t+1}$ is distributed as $G_{x_{t+1}}$, where $x_{t+1}$ is a random member of $\bigg(\mathcal{S}_{n,2m_{t+1}}^{L_0^{t+1},L_1^{t+1},...,L_k^{t+1}},y_{t+1}\bigg)$.
\end{lemma}
\begin{proof}
For $i=t,t+1$, if the graph $G_{i}$ is distributed as $G_{x_{i}}$, where $x_{i}$ is a random member of $\bigg(\mathcal{S}_{n,2m_i}^{L_0^i,L_1^i,...,L_k^i},y_i\bigg)$ then its distribution is uniform among the the ones that can be generated from $\bigg(\mathcal{S}_{n,2m_i}^{L_0^i,L_1^i,...,L_k^i},y_i\bigg)$.
The statement of the lemma follows from the fact that the pair $e_t,R_t$ defines a bijection between elements of $\bigg(\mathcal{S}_{n,2m_{t+1}}^{L_0^{t+1},L_1^{t+1},...,L_k^{t+1}},y_{t+1}\bigg)$ and elements of
$\bigg(\mathcal{S}_{n,2m_t}^{L_0^t,L_1^t,...,L_k^t},y_t\bigg)$ that may result to an element of $\bigg(\mathcal{S}_{n,2m_{t+1}}^{L_0^{t+1},L_1^{t+1},...,L_k^{t+1}},y_{t+1}\bigg)$ through the removal of $R_t$ and the addition of $e_t$ to $M_t$.
\end{proof}
\subsection{A first analysis}
Let $E_{mult}$ be the set of loops and multiple edges deleted from $M$ at the end of {\sc k-MatchTINF }.
Once {\sc k-MatchTINF } terminates the sets $Y_{\ell,j}^{\tau}$ for $0\leq \ell \leq k$, $1\leq j$ are empty while the set $Y_{\ell,0}^{\tau}$ consists of the vertices that are incident to exactly $k-\ell$ edges in $M\cup E_{mult}$, for $0\leq \ell\leq k$. Thus $|M|+|E_{mult}|=(nk-\sum_{\ell=1}^k(k-\ell)|Y_{\ell,0}^{\tau}|)/2$. A vertex $z$ belongs to some $Y_{\ell,0}^{\tau}$ only if it ``moves" $k-\ell$ times from some set $Y_{\ell',j}^t$, $j\leq \ell'$ to $Y_{\ell',j-1}^t$ (i.e. at time $t$ it belongs to $Y_{\ell',j}^t$ but at time $t+1$ it belongs to $Y_{\ell',j-1}^{t+1}$)
or if it is connected to $w_t$ via a multi-edge in $G_t$.
Let $S_t=\bigcup_{\ell'\in [k]}\bigcup_{1\leq j\leq \ell'} \left( Y_{\ell',j}^t \cap Y_{\ell',j-1}^{t+1} \right)$ and $s_t=|S_t|$. Also let $mult_t$ be the number of multi-edges in $G_t$ incident to $w_t$ counted with multiplicity and $h_t=\mathbb{I}(v_t=w_t)$ i.e. the indicator function of the event $\{e_t$ is a loop$\}$.
Then,
\begin{equation}\label{eq:matching}
M\geq \frac{nk-\sum_{\ell=1}^k(k-\ell)|Y_{\ell,0}^{\tau}|-\sum_{0\leq i < \tau} mult_t -\sum_{0\leq i < \tau} 2h_t}{2} = \frac{kn-\sum_{i=0}^{\tau-1}(s_t+ mult_t+2h_t)}{2}.
\end{equation}
If $index(t) \geq 3$ and $v_t=w_t$ or $v_t\neq w_t$ and $l_t(w_t)\geq 2$ then $R_t=\{e_t\}$ and $S_t=\emptyset$. Otherwise, if $index(t) \geq 3$, $v_t\neq w_t$ and $l_t(w_t)=1$ then $l_{t+1}(w_t)$ is set to zero and the edges incident to $w_t$ are deleted. In such a case $S_t \subseteq Z_t\cap \big(N_{G_t}(w_t) \setminus \{v_t\}\big)$.Therefore if $index(t) \geq 3$ we have,
\begin{align}\label{eq:m1}
\mathbb{E}(s_t+mult_t+2h_t)
&\leq \Pr(l_t(w_t)=1)\mathbb{E}\bigg(\Big|Z_t\cap\Big( N(w_t)\setminus\{v_t\}\Big)\Big|\bigg|l_t(w_t)=1\bigg) +\mathbb{E}( mult_t)+\mathbb{E}( 2h_t) \nonumber
\\&\leq \frac{\zeta_t\log n}{m_t}+\frac{\log^4 n}{m_t}.
\end{align}
At the last inequality we used Lemma \ref{lem:degrees}.
Let
$$\tau'=\min\bigg\{t: m_i\leq n^{0.4+10^{-5}} \text{ or } \zeta_t>\log^6 n \text{ or } Y_{\ell}^t=\emptyset \text{ for }\ell\geq 3 \bigg\}.$$
To prove Theorem \ref{thm:kGreedy} it suffices to prove the following Lemma. Its proof is given in Subsection \ref{subsection:change}.
\begin{lemma}\label{lem:changeZ_t}
With probability $1-o(n^{-9})$, for $t < \tau'$
\begin{equation}\label{eq:changeZ_t}
\text{ if $\zeta_t>0$ then } \mathbb{E}(\zeta_{t+1}-\zeta_t|\mathcal{H}_t)\leq -10^{-5}.
\end{equation}
\end{lemma}
{\textbf{Proof of Theorem \ref{thm:kGreedy}:}}
It follows from \cite{AF} that $\sum_{i=\tau}^{\tau'}s_t=O( n^{0.4+ 10^{-4}})$ with probability $1-o(n^{-9})$ (In \cite{AF} a version of {\sc k-MatchTINF } is analyzed in which Lines 5 and 8 of {\sc k-MatchTINF } are substituted by ``Choose a random vertex $v_t\in Z_t$" and
``Choose a random vertex $v_t\in Y_2$" respectively. This change does not affect the analysis in \cite{AF} which aims to show that if $\zeta_t>0$
then, the expected change in $\zeta_t$ is not positive -it can be zero-. In addition the statements in \cite{AF} are proven to hold w.h.p. instead with probability $1-o(n^{-9})$. One can boost the probability in \cite{AF} to $1-o(n^{-9})$ by substituting Lemma 3.3 of \cite{AF} with Lemma \ref{lem:degDistributions}.)
Lemma \ref{lem:degrees} implies that with probability $1-o(n^{-9})$,
$$|\zeta_{t+1}-\zeta_t|\leq k\Delta(G_t)\leq k\Delta(G)\leq \log n.$$
Therefore,
Azuma-Hoeffding inequality (see Theorem \ref{thm:AH}) gives,
\begin{align*}
\Pr(\exists t: &0\leq t\leq \tau' \leq m \text{ such that } \zeta_t\geq \log^6n)
\\ &\leq \sum_{0\leq t\leq m} \sum_{0\leq t'\leq t}\Pr(\zeta_t\geq \log^6n, \zeta_{t''}\geq 1 \text{ for } t'<t''\leq t \text{ and } 0<\zeta_{t'}\leq \log n)+o(n^{-9})
\\ &\leq m\sum_{0\leq t\leq m}
\exp\bigg\{-\frac{(-\log n + \log^6n+10^{-5}t)^2}{2t\log^2 n} \bigg\}+o(n^{-9})=o(n^{-9}).
\end{align*}
Thus \eqref{eq:matching} \& \eqref{eq:m1} imply,
\begin{align*}
\Pr(M<kn/2-n^{0.401})&\leq \Pr\bigg(\sum_{i=1}^{\tau'} s_t+mult_t+2h_t\geq 0.9 n^{0.401}\bigg)+o(n^{-9})
\\& \leq\sum_{0\leq t\leq m} \exp\bigg\{-\frac{(0.9n^{0.401}-\sum_{m_i=n^{0.4+10^{-5}}}^{m}\frac{\log^7 n+\log^4 n}{m_i} )^2}{2t\log^2 n} \bigg\}+o(n^{-9})
\\&=o(n^{-9}).
\end{align*}
At the application of Azuma-Hoeffding Inequality above we used once more Lemma \ref{lem:degrees} to bound $|(s_{t+1}+mult_{t+1}+2l_{t+1})-(s_t+mult_t+2h_t)|$ by $\Delta(G) \leq \log n$.
\qed
A vertex $u$ enters $Z_{t+1}$ at time $t\leq \tau'$ (i.e $d_{t+1}(u)>0$ and $v\in Z_{t+1}\setminus Z_t$) only if $l_t(w_t)=1$, $w_t\in Y^t_{1}$ and either $u\in \bigg( \bigcup_{\ell\in[k]} Y_{\ell,\ell+1}^t\bigg)\cap\big( N_t(w_t) \setminus\{v_t\}\big)$ or $u$ is connected to $w_t$ via a multiple edge.
Hence, for $t<\tau'$ if $\zeta_t\leq \log^6 n$ then,
\begin{align}
\mathbb{E}(\zeta_{t+1}-\zeta_t|\mathcal{H}_t)
&\leq -\mathbb{I}(\zeta_t>0) \nonumber
\\&+\Pr(l_t(w_t)=1)\mathbb{E} \left( \sum_{\ell=1}^k\ell \Big| Y_{\ell,\ell+1}^t \cap \Big( N(w_t) \setminus\{v_t\} \Big)\Big|\bigg|l_t(w_t)=1\right)+o(1). \label{eq:change_zt}
\end{align}
We will control $\zeta_t$ by showing that $\Pr(l_t(w_t)=1)$ stays sufficiently small throughout the execution of {\sc k-MatchTINF }.
\section{Notation-Preliminaries}
\begin{notation}
We say that a sequence of events $\{\mathcal{E}_n\}_{n\geq 1}$
holds {\em{with sufficiently high probability}} (w.s.h.p.\@ in short) if $\lim_{n \to \infty}\Pr(\mathcal{E}_n)=1-o(n^{-9})$.
\end{notation}
For a function $f(\cdot):[\tau]\mapsto \mathbb{R}$ we let $D_t(f)=f(t+1)-f(t)$.
For $\lambda \geq 0$ and $0\leq \ell \leq k$ we let $Po_{\geq \ell}(\lambda)$ be the truncated at $\ell$ $Poisson(\lambda)$ random variable. Thus
$$\Pr(Po_{\geq \ell}(\lambda)=r)=\frac{e^{-\lambda}\lambda^r}{r!\sum_{i\geq \ell}\frac{e^{-\lambda}\lambda^i}{i!}}=\frac{\lambda^r}{r!f_\ell(\lambda)} \hspace{20mm} \text{ for }\ell, \ell+1, \cdots .$$
We denote the expected value of $Po_{\geq \ell}(x)$ by $\lambda_\ell(x)$. We may write $\lambda_\ell$ in place of $\lambda_\ell(x)$ when the value of $x$ is clear from the context.
We let
$$q_{\ell,r}=q_{\ell,r}(\lambda)=\begin{cases} \frac{r\Pr(Po_{\geq \ell}(\lambda)=r)}{\mathbb{E}(Po_{\geq \ell}(\lambda))}, &r= \ell, \ell+1, \cdots ,
\\0& \text{otherwise}. \end{cases} $$
and
$$q_{\ell,r}^t=q_{\ell,r}(\lambda^t).$$
At time $t$ Lemmas \ref{lem:degDistributions} \& \ref{lem:degrees} imply that $\sum_{v\in {Y_{\ell}^t}} d_t(v)=
|Y_\ell^t|\mathbb{E}(Po_{\geq \ell+1}(\lambda^t))+o(m_t)$ and
that $\sum_{v\in {Y_{\ell,r}^t}} d_t(v)=r|Y_\ell^t|\Pr(Po_{\geq \ell+1}(\lambda^t)=r)+o(m_t)$,
for $\ell\in[k]$ and $r>\ell$.
Thus at time $t$, if $Y_{\ell}^t=\Omega(m_t)$ then, $q_{\ell,r}^t$ equals up to an $o(1)$ additive factor to the probability a vertex chosen from $Y_\ell^t$ proportional to its degree has degree $r$.
For $t\geq 0$, $\ell\in [k+1]$, and $j>0$ we let
$$p^t_{\ell,j} = \frac{j Y_{\ell,j}^t}{2m_t}$$
be the probability that a vertex chosen at proportional to its degree belongs to $Y^t_{\ell,j}$.
We let
$$p^t_\ell =\sum_{j\geq \ell+1} \frac{j Y_{\ell,j}^t}{2m_t},$$
be the probability that a vertex chosen at proportional to its degree belongs to $Y^t_{\ell}$. We also let $p^t\in \mathbb{R}^{k+1}$ be defined by $(p^t)_\ell=p_\ell^t$ for $1\leq \ell \leq k+1$.
Observe that while $m\geq n^{0.4+10^{-5}}$ and $\zeta_t\leq \log^6 n$ we have that
$$\sum_{i=1}^{k}p_k^t=1-o(1).$$
For $2\leq \ell \leq k$ we define the stopping time $\tau_\ell$ by,
$$\tau_\ell=\min\{t: Y_i^t=\emptyset \text{ for } i\geq \ell \text{ or } m_t\leq n^{0.4+10^{-5}} \text{ or } \zeta_t \geq \log^6 n \}.$$
Recall, $\tau'=\min\{t: m_t\leq n^{0.4+10^{-5}} \text{ or } Y_\ell^t=\emptyset \text{ for } 3\leq \ell \leq k+1\}$ and hence $\tau_3\leq \tau'$.
Finally we let $\mathcal{H}_t$ be the $t$-tuple $(h_0,h_1,...,h_{t-1})$ where $h_i=(e_i,R_i,Z^i)$. Thus $\mathcal{H}_t$ encodes the actions taken by the {\sc k-MatchTINF } in the first $t$ steps.
\begin{lemma}\label{lem:lk}
Let $\lambda\geq 0$ and $\ell\geq 1$. At the $t^{th}$ iteration of {\sc k-MatchTINF } we have
$$\mathbb{E}\big[(|N(w_t)|-1) \mathbb{I}( w_t \in Y_\ell^t) \big]= p_\ell^t \lambda_{\ell}^t+o(1).$$
\end{lemma}
\begin{proof}
$ p_\ell^t= \frac{\sum_{v\in Y_\ell^t} d_t(v)}{2m_t}$. Therefore, with $\lambda=\lambda^t$
\begin{align*}
\mathbb{E}\big[(|N(w_t)|-1) \mathbb{I}( w_t \in Y_\ell^t) \big]&
= \sum_{v\in Y_\ell^t} (d_t(v)-1) \frac{ d_t(v) }{ 2m_t}=\sum_{j\geq \ell+1} (j-1) \frac{ j|Y_\ell^t| \frac{ \lambda^j /j!}{ f_{\ell+1}(\lambda )} }{2m_t}+o(1)
\\ &= \frac{|Y_\ell^t| \sum_{i \geq \ell+1} \frac{ i \lambda^i /i!}{f_{\ell+1}(\lambda )} }{2m_t}\frac{ \sum_{j\geq \ell+1} (j-1) j\frac{ \lambda^j/j!}{f_{\ell+1}(\lambda)} }{\sum_{i \geq \ell+1} \frac{ i \lambda^i /i!}{ f_{\ell+1}(\lambda )}}
+o(1)
\\&
= p_\ell^t \frac{ \sum_{j\geq \ell} j\frac{\lambda^j }{j!}}{\sum_{i \geq \ell}\frac{\lambda^i }{i!}} +O(1) = p_\ell^t \lambda_{\ell}^t +o(1).
\end{align*}
The $o(1)$ error terms are due the applications of
Lemmas \ref{lem:degDistributions} \& \ref{lem:degrees} at the second and fourth equalities.
\end{proof}
\begin{lemma}\label{lem:lambdamonotone}
Let $r\geq 1$ and $x\geq 0$. Then,
$$\lambda_{r-1}(x)\leq \lambda_r(x).$$
\end{lemma}
\begin{proof}
\begin{align*}
\lambda_{r-1}(x)
&=\frac{\sum_{i\geq r-1}ix^i/i! f_{r-1}(x) }{\sum_{i\geq r-1} x^i/i! f_{r-1}(x)}
=\frac{x\sum_{i\geq r-2}x^i/i! }{\sum_{i\geq r-1} x^i/i!}
=x+\frac{x^{r-1}/(r-2)! }{\sum_{i\geq r-1}x^i/i!}
\\& =x+\frac{1 }{\sum_{i\geq r-1} x^{i-r+1}(r-2)!/i!} \leq x+\frac{1 }{\sum_{i\geq r} x^{i-r}(r-1)!/i!}=\lambda_r.
\end{align*}
\end{proof}
\begin{lemma}\label{lem:lambdabound}
Let $r\geq 1$ and $x\geq 0$. Then,
$$\max\set{x,r}\leq \lambda_{r}(x) \leq x+r.$$
Hence,
$$\lambda_{r}(x)\leq \lambda_{r-1}(x)+r.$$
\end{lemma}
\begin{proof}
Indeed,
\begin{align*}
\max\set{x,r}\leq \lambda_{r}(x)
=x+\frac{x^{r}/(r-1)! }{\sum_{i\geq r}x^i/i!}=x+r\cdot \frac{x^{r}/r! }{\sum_{i\geq r}x^i/i!}
\leq x+r.
\end{align*}
\end{proof}
\subsection{Large deviation bounds}
In this subsection we collect some standard results which are used throughout the paper, (see e.g. Chapter 22 of \cite{abook}).
\begin{theorem}[Chernoff Bound]\label{thm:chernoff}
$$\Pr\bigg(Binomial(n,p)-np\geq (1+\epsilon)np\bigg) \leq \exp \set{-\frac{\epsilon^2(np)}{3}}.$$
\end{theorem}
\begin{theorem}[McDiarmid's Inequality]\label{McD}
Let $Z=Z(W_1,W_2,...,W_n)$ be a random variable that depends on $n$ independent random variables $W_1,W_2,...,W_n$. Suppose that there exists constants $c_1,c_2,...,c_n$ such that
$$|Z(W_1,W_2,...,W_i,...,W_n)-Z(W_1,W_2,...,W_i',...,W_n)|\leq c_i$$
for all $i\in[n]$ and $W_1,W_2,...,W_n,W_i'$. Then,
$$\Pr(Z-\mathbb{E}(Z)\geq t)\leq 2\exp\set{-\frac{t^2}{2\sum_{i=1}^n c_i}} .$$
\end{theorem}
\begin{theorem}[Azume-Hoeffding Inequality]\label{thm:AH}
Let $\{X_i\}_{i=0}^n$ be a martingale and assume that there exists a sequence $\{c_i\}_{i=1}^n$ such that $|X_i-X_{i-1}|\leq c_i$ for $i \in [n]$. In addition assume that $X_0$ is constant. Then, for $t>0$,
$$\Pr(|X_n-X_0|\geq t) \leq 2\exp\set{-\frac{t^2}{2\sum_{i=1}^n c_i}}.$$
\end{theorem}
\section{Analysis of {\sc k-MatchTINF }}\label{sec:analysis}
The presented analysis of {\sc k-MatchTINF } aims to prove Lemma \ref{lem:changeZ_t} and is driven by \eqref{eq:change_zt}. Given the notation introduced in the previous section \eqref{eq:change_zt} can be rewritten as,
\begin{align}\label{eq:echange_zt}
\mathbb{E}(\zeta_{t+1}-\zeta_t|\mathcal{H}_t)&=-\mathbb{I}(\zeta_t>0)+p_1^t \lambda_1^t \sum_{\ell=1}^k \ell p_\ell^tq_{\ell+1,\ell+1}^t+o(1).
\end{align}
Now let $$t^*=\bfrac{1}{40ck}^{4} n.$$
To bound the RHS of \eqref{eq:echange_zt} we will show that for $d\in\{k+1,k,...,7\}$ we can confine the process $p^{t^*},p^{t^*+1},...,p^{\tau_{d-1}-1}$ inside a polyhedron $B_d \subset \mathbb{R}^{k+1}$ of the form $$B_d=\{x\in \mathbb{R}^{k+1}:x_{i}\geq \alpha_ix_{i-1} \text{ for } 2\leq i\leq d-1\}$$ such that the following properties hold:
\\ \textbf{Property I:} $p^{t^*}\in B_{k+1}$, $p^{t^*}_i\geq \alpha_ip^{t^*}_{i-1}+\epsilon$ for $i\in\{2,3,...,k+1\}$ and some $\epsilon>0$,
\\ \textbf{Property II:} there exists $\epsilon'>0$ such that for $d\in\{k+1,k,...,7\}$, $t^*\leq t\leq \tau_{d-1}-1$ and $i\in\{2,3,...,d-1\}$, if $p^t_i-a_{i}p_{i-1}^t\leq \epsilon '$ and $p^t\in B_d$ then
$$\mathbb{E}[(p^{t+1}_i-a_{i}p_{i-1}^{t+1})-(p^t_i-a_{i}p_{i-1}^t)|\mathcal{H}_t] >0,$$
\\ \textbf{Property III:} for $d\in\{k+1,k,...,3\}$ and $\tau_{d} \leq t < \tau_{d-1}$, if $p^t\in B_d$ then \eqref{eq:changeZ_t} holds.
Property I implies that the process at time $t^*$ lies inside $B_d$ and away from its boundary. Property II will imply that if the process starts inside $B_d$ and away from its boundary then it stays inside $B_d$ until time $\tau_{d-1}$. Thus Properties I \& II will imply that $p^t \in B_d$ for $d=k+1,k,...,7$ and $t^*\leq t\leq \tau_{d-1}$ . Thereafter Property III will imply that \eqref{eq:changeZ_t} is satisfied for $\tau^*\leq t\leq \tau_6$. For $0\leq t\leq \tau^*$ we will argue that $p_1$ is tiny and this will be all that is needed to show that \eqref{eq:changeZ_t} is satisfied. For $\tau_6\leq t \leq \tau'$ we will confine the process in a more careful and calculated way. This part of the proof takes place in the Appendix.
Henceforward to easy the presentation we drop the time index $t$ when it is clear from the context.
\subsection{ Defining $B_d$ }
$B_d$ will be defined by a set of inequalities of the form $x_{i}\geq \alpha_{i}x_{i-1}$ for $2\leq i\leq d-1$. The constants $\alpha_i$ will be independent of $d$, are defined by \eqref{alphas} stated later and we will prove that they lie in the interval $[1.55,1.552]$. Hence if $p^t\in B_d$ then the sequence $p_1^t$, $p_2^t$, $p_3^t$, $\cdots$, $p_{d-1}^t$ increases in a geometric fashion. This will imply that $p_1^t$ will be sufficiently small so that if $\zeta_t>0$ then the RHS of \eqref{eq:echange_zt} is strictly negative. The equations defining $a_i$, $2\leq i\leq d-1$, originate from the calculations related to Property II
.
For $r\in \mathbb{N}^+$ and $\lambda>0$ we let
\begin{align}\label{grl}
g(r,\lambda):=a_r\lambda_{r+1}-(a_r+1)\lambda_{r}+\lambda_{r-1}.
\end{align}
We let $$ \alpha_2:=1.55.$$
and
$$a_2':=\underset{\lambda \geq 0}{sup}\bigg\{
a_{2}-\frac{g(2,\lambda)}{\lambda_{3}}
+\frac{0.55\lambda_1}{(1.55^{3}-1)\lambda_{3}} \bigg[ 3 q_{3,3} - 2 q_{2,2}\bigg]
\bigg\}.$$
For $r\geq 3$ let
$$a_r':=\underset{\lambda \geq 0}{sup}\bigg\{
a_{r}-\frac{g(r,\lambda)}{\lambda_{r+1}}
+\frac{0.55\lambda_1}{(1.55^{r}-1)\lambda_{r+1}} \bigg[ (r+1) q_{r+1,r+1} - rq_{r,r}\bigg]
\bigg\}.$$
We define $a_{r+1}$ by
\begin{equation}\label{alphas}
a_{r+1}:=\begin{cases}
\max\{a_{r},a_r'\}+10^{-5} \hspace{10mm} \text{ for } 2\leq r \leq 24,
\\ \max\{a_{r},a_r'\}+2^{-r} \hspace{10mm} \text{ for } 25\leq r\leq k.
\end{cases}
\end{equation}
For $d\in [k+1]$ we let
$$B_d:=\{ x\in \mathbb{R}^{k+1}: x_r \geq \alpha_r x_{r-1} \text{ for } 2\leq r \leq d-1\}. $$
We now proceed to bound $a_r$ from above for $3\leq r\leq k$. As it can be seen by the equalities defining $a_r$, the whole problem boils down to an optimization problem. For small values of $r$, treated at Lemma \ref{lem:boundsalphasmall}, we resolve this problem computationally. Its proof is presented in Appendix \ref{appendix:boundsalphasmall}. The proof of Lemmas \ref{lem:boundsalphasmall} and \ref{lem:boundsalphalarge} make use of Lemma \ref{lem:lambdaconvex} stated below. Its proof is presented in Appendix \ref{appendix:lambdaconvex}.
\begin{lemma}\label{lem:lambdaconvex}
For $r \geq 2$ and $\lambda\geq 0$ we have that $g(r,\lambda)\geq 0$.
\end{lemma}
\begin{proof}
See Appendix \ref{appendix:lambdaconvex}
\end{proof}
\begin{lemma}\label{lem:boundsalphasmall}
For $2\leq r\leq 24$ we have that $1.55\leq a_{r+1}\leq 1.551$.
\end{lemma}
\begin{proof}
See Appendix \ref{appendix:boundsalphasmall}
\end{proof}
\begin{lemma}\label{lem:boundsalphalarge}
For $r\geq 25$ we have that $1.55\leq a_{r+1}\leq 1.552$.
\end{lemma}
\begin{proof}
Lemma \ref{lem:boundsalphalarge} will follows from the following claim and Lemma \ref{lem:boundsalphasmall}.
\begin{claim}\label{claim:alphas1}
For $r\geq 25$ we have that $a_r'-a_r\leq 2.5\cdot10^{-4}\cdot 1.45^{-r+25}$.
\end{claim}
Claim \ref{claim:alphas1} and Lemma \ref{lem:boundsalphasmall} imply that for $r\geq 25$,
$$1.55=a_2\leq a_{r+1}\leq a_{25}+\sum_{r\geq 25} (2.5\cdot10^{-4}\cdot 1.45^{-r+25}+2^{-r}) \leq 1.551+\frac{2.5\cdot10^{-4}}{1-1/1.45}+2^{-24}\leq 1.552.$$
{\textbf{Proof of Claim \ref{claim:alphas1}:}}
Lemma \ref{lem:lambdaconvex} and $q_{\ell,\ell}\leq 1$ imply that for $r\geq 25$
\begin{align*}
a_r'-a_r&\leq
\underset{\lambda\geq 0}{\sup}\bigg\{ \frac{0.55\lambda_1}{(1.55^{r}-1)\lambda_{r+1}} (r+1)
\bigg\}
\leq \frac{0.55(r+1)}{1.55^{r}-1} \\& \leq \frac{0.55\cdot 26}{1.55^{25}-1}\prod_{i=25}^{r-1}\frac{\frac{i+2}{1.55^{i+1}-1}}{\frac{i+1}{1.55^{i}-1}}
\leq 2.5\cdot10^{-4}\cdot 1.45^{-r+25}.
\end{align*}
At the second inequality we used that $\lambda_1\leq \lambda_{r+1}$, implied by Lemma \ref{lem:lambdamonotone}.
\end{proof}
\subsection{Property III}
In this section we show that for $\tau_d\leq t <\tau_{d-1}$, if $p^t\in B_d$ then \eqref{eq:changeZ_t} holds. We split this statement into a statement concerning large values of $d$ and a statement concerning small values of $d$. We prove the second one in the Appendix. Before proceeding to the proof of the first one we first proof two auxiliary Lemmas.
\begin{lemma}\label{lem:p1}
If $p_t \in B_d$ then,
\begin{equation}\label{eq:p2bound}
p_1\leq \frac{0.55}{1.55^{d-1}-1} \end{equation}
\end{lemma}
\begin{proof}
$p_t \in B_d$ implies that $p_i\geq 1.55^{i-1}p_1$ for $1\leq i\leq d-1$. Therefore,
\begin{align*}
p_1& \leq \frac{p_1}{\sum_{i=1}^d p_i } \leq \frac{p_1}{\sum_{i=1}^{d-1} 1.55^{i-1} p_1} = \frac{0.55}{1.55^{d-1}-1}.
\end{align*}
\end{proof}
\begin{lemma}\label{lem:calcipq}
For $d\in[k+1]$ and $\tau_{d} \leq t \leq \tau_{d-1}-1$, if $p_t\in B_d$ then,
\begin{equation}\label{eq:ipq}
p_1\lambda_1\sum_{i=1}^{d} ip_i q_{i+1,i+1} \leq \frac{0.55d(d+1)}{1.55^{d-1}-1}.
\end{equation}
\end{lemma}
\begin{proof}
\begin{align*}
p_1\lambda_1\sum_{i=1}^{d} ip_i q_{i+1,i+1}& \leq \frac{0.55}{1.55^{d-1}-1} \cdot\sup_{\lambda\geq 0} \bigg\{ \lambda_1 \cdot \sum_{i=1}^{d} i p_i \frac{(i+1)\frac{e^{-\lambda}\lambda^{i+1}}{(i+1)!}}{\lambda-\sum_{j=0}^i \frac{j e^{-\lambda}\lambda^{j}}{j!}}\bigg\}
\\& \leq \frac{0.55}{1.55^{d-1}-1} \cdot \sup_{\lambda\geq 0} \bigg\{ (\lambda+1) \cdot
\sum_{i=1}^{d} i p_i \frac{\lambda^{i}/i!}{e^{\lambda}-\sum_{j=0}^{i-1} \lambda^{j}/j! } \bigg\}
\\& \leq \frac{0.55}{1.55^{d-1}-1}
\cdot \sup_{\lambda\geq 0} \bigg\{
\sum_{i=1}^{d} i p_i \frac{\lambda^{i}/i!+(i+1)\lambda^{i+1}/(i+1)!}{\sum_{j\geq i} \lambda^{j}/j! } \bigg\} \nonumber
\\& \leq \frac{0.55}{1.55^{d-1}-1}
\cdot
\sum_{i=1}^{d} i(i+1) p_i \leq \frac{0.55d(d+1)}{1.55^{d-1}-1} .
\end{align*}
At the first inequality we used \eqref{eq:p2bound} and at the second one Lemma \ref{lem:lambdamonotone} to deduce that $\lambda_1(x) \leq x+1$.
\end{proof}
\begin{lemma}\label{03}
For $11\leq d \leq k+1$ and $\tau_{d} \leq t \leq \tau_{d-1}-1$ if $p^t \in B_d$ then \eqref{eq:changeZ_t} holds.
\end{lemma}
\begin{proof}
Let $\tau_{d} \leq t \leq \tau_{d-1}-1$. Equations \eqref{eq:echange_zt} and \eqref{eq:ipq} imply that if $p^t\in B_d$ then,
\begin{align*}
\mathbb{E}(D_t(\zeta)|\mathcal{H}_t)&\leq -1+\frac{0.55d(d+1)}{1.55^{d-1}-1} +o(1) \leq -0.001.
\end{align*}
\end{proof}
\begin{lemma}\label{02}
For $3\leq d \leq 10$ and $\tau_{d} \leq t \leq \tau_{d-1}-1$ if $p^t \in B_d$ then \eqref{eq:changeZ_t} holds.
\end{lemma}
\begin{proof}
See Appendix \ref{appendix:02}
\end{proof}
\subsection{Confining the process $\{p^t\}_{\tau_d\leq t< \tau_{d-1}}$ inside $B_d$}\label{sub:confine}
In this subsection we show that $p^t \in B_d$ for $t^*\leq t \leq \tau_{d-1}-1$. We start by showing that $p^{t^*}\in B_d$
Thereafter we show that for $t^* \leq t<\tau_{d-1}$ if $p^t\in B_d$ and $p^t$ is close to some hyperplane defining $B_d$ then in expectation $p^{t+1}$ will move away from that hyperplane. We then use a standard martingale argument to argue that the process will never come too close to such a hyperplane and therefore it will never cross it, thus staying inside $B_d$.
Part (i) of Lemma \ref{lem:initial} implies that equation \eqref{eq:changeZ_t} is satisfied for $t\leq t^*$. Its second part implies that $p^{t^*} \in B_d$ for $3\leq d \leq k+1$ while its third part states that starting from $t=t^*$ until the process $\{p^t\}_{t=t^*}^{\tau}$ exits $B_3$ we have that $p_1^t$ is bounded below by a constant.
Recall, $t^*=\bfrac{1}{40ck}^{4} n$.
\begin{lemma}\label{lem:initial}
Let $C_1=p_1^{t^*}$. W.s.h.p.\@,
\begin{itemize}
\item[(i)] $p_1^t \lambda_1^t \sum_{\ell=1}^k \ell p_\ell^tq_{\ell+1,\ell+1}^t\leq 0.5$ for $t\leq t^*$,
\item[(ii)] $C_1=\Omega(1)$ and $p^{t^*}_j-a_j p^{t^*}_{j-1}\geq C_1$ for $2\leq j\leq k$,
\item[(iii)] let $\sigma^*=\min\{\tau_3, \min\{t\geq t^*: p^t \notin B_3\}\}$ then $p_1^t\geq \min\{0.04,C_1/2\}$ for $t^*\leq t\leq \sigma^*$.
\end{itemize}
\end{lemma}
\begin{proof}
See Appendix \ref{appendix:initial}.
\end{proof}
\begin{lemma}\label{lem:lowerconstrains}
Let $3\leq d \leq k+1$ and $2\leq r\leq d-2$. Let $t$ be such that $t\leq \tau_{d-2}-1$. If $p^t \in B_d$, $p_1^t\geq C_1/2$ and
\begin{align}\label{eq:r-}
p^t_{r}-\alpha_r p^t_{r-1} \leq n^{-0.1}
\end{align}
then,
\begin{align}\label{eq:lowerconstrains}
E( D_t(2mp_{r}-\alpha_r 2mp_{r-1}) |\mathcal{H}_t)>10^{-5}2^{-r}C_1.
\end{align}
\end{lemma}
\begin{proof}
$p^t\in B_d$ implies that,
\begin{equation}\label{eq:r+1}
p_{r+1}^t \geq \alpha_{r+1} p_r^t
\end{equation}
Hence,
\begin{align}
&\mathbb{E}[D_t(2mp_{r}-2\alpha_{r} mp_{r-1})| \mathcal{H}_t ] \geq \lambda_{r+1} p_{r+1}-(\lambda_{r}+1)p_r-a_r \lambda_{r}p_r+\alpha_r( \lambda_{r-1}+1)p_{r-1}\nonumber
\\ &\hspace{4mm}+ p_1 \lambda_1 \bigg[- (r+1) p_r q_{r+1,r+1} + \alpha_r r p_{r-1} q_{r,r}\bigg] +o(1) \nonumber
\\ &\geq \lambda_{r+1} a_{r+1} p_{r}
-(\lambda_{r}+1)p_r-a_r \lambda_{r}p_r+( \lambda_{r-1}+1)(p_{r}- o(1)) \label{eq0}
\\ &\hspace{4mm} + p_1 \lambda_1 \bigg[- (r+1) p_r q_{r+1,r+1} + r (p_{r}-o(1)) q_{r,r}\bigg] +o(1) \nonumber
\\& \geq \bigg\{(a_{r+1}-a_r) \lambda_{r+1} +g(r,\lambda)
- p_1 \lambda_1 \bigg[ (r+1) q_{r+1,r+1} - r q_{r,r}\bigg]\bigg\} p_r+o(1) \label{eq1}
\\& \geq \min\{10^{-5},2^{-r}\} \lambda_{r+1} p_r
+o(1) \geq 10^{-5}2^{-r}(r+1)\cdot 1.5^{r-1}p_1 +o(1) \geq 10^{-5}2^{-k}C_1.\label{eq:new01}
\end{align}
At \eqref{eq0} we used \eqref{eq:r-} and \eqref{eq:r+1}. At \eqref{eq:new01} we used the definition of $\alpha_{r+1}$ (see \eqref{alphas}) and $p^t\in B_d$. At the very last inequality we used part(iii) of Lemma \ref{lem:initial}.
{\textbf{Explanation of \eqref{eq0}}}: Let $\ell=index(t)$. $t< \tau_{d-2}$ implies that $\ell\geq d-1$. $v_t\in Z_t \cup Y_{\ell}^t$, thus if $\ell=d-1$ matching $v$ contributes by a non-negative positive amount to the quantity in question else it does not affect it at all.
$w_t \in Y_i^t$ with probability $p_i^t$. Also by Lemma \ref{lem:lk} we have $\mathbb{E}(|N(w_t)| p_i^t \mathbb{I}( w_t \in Y_i^t))= \lambda_{i}+1+o(1)$. Hence for $i\in \{r-1,r,r+1\}$, $w_t\in Y_{i}$ with probability $p_{i}^t$. In such an event it is incident, in expectation, to $\lambda_{i}+1$ edges. Removing $e_t$ removes an edge incident to $w_t$ and moves $w_t$ from $Y_{i}^t$ to $Y_{i-1}^t$. This increases the number of half edges incident to $Y_{i-1}^t$ by $\lambda_{i}$ in expectation (an edge spanned by $Y_{i-1}^t$ counts as two half edges while an edge with only one endpoint in $Y_{i-1}^t$ counts as a single half edge). This explains the first line of \eqref{eq0}. For second line of equality \eqref{eq0} note that $w_t$ belongs to $Y_1^t$ with probability $p_1$. Removing $w_t$ removes an edge from the $\lambda_1 p_i^tq_{i+1,i+1}$ in expectation neighbors of $w_t$ that belong to $Y_{i,i+1}^t$ for $i\in\{r,r+1\}$. Those vertices are now incident to $i$ edges and are transferred to $Y_{i,i}^t$, hence outside $Y_i^t$. As a result the number of half edges incident to $Y_i^t$ is decrease in expectation by $(i+1)p_i^tq_{i+1,i+1}$.
\end{proof}
A statement similar to the one of Lemma \ref{lem:lowerconstrains} but for $r=d-1$ is given by the Lemma \ref{lem:upperconstrain}. For its proof we need the following lemma which we use to approximate the deterministic quantity $\mathbb{I}(\zeta_t=0)$ appearing in the calculation of ${\bf E}(D_t(2mp_{d-1}-\alpha_r 2mp_{d-2})|\mathcal{H}_t).$
\begin{lemma}\label{eq:sumzetas}
W.s.h.p.\@ for $4\leq d\leq k+1$ and $ \tau_d \leq t \leq \tau_{d-1}-\log^8n$,
\begin{align}
\sum_{i=t}^{t+\log^{8}n-1}\mathbb{I}(\zeta_i=0) \geq \sum_{i=t}^{t+\log^{8}n-1} \left(1-p_1^i\lambda_1^i\sum_{j=1}^d j p_j^iq_{j+1,j+1}^i -10^{-10} \right).
\end{align}
\end{lemma}
\begin{proof}
Let $F(\zeta_t)$ be the increase in $\zeta_t$ that may occur after removing $e_t$. Then, $F(\zeta_t)=\zeta_{t+1}=\zeta_{t+1}-\zeta_t$ if $\zeta_t=0$ and $F(\zeta_t)=\zeta_{t+1}-\zeta_t+1$ if $\zeta_t>0$. In addition,
$$\zeta_{t+\log^{8}n} = \zeta_{t}+ \sum_{i=t}^{t+\log^{8}n -1}[F(\zeta_{i })-1+\mathbb{I}(\zeta_{i}=0)] \text{ for } \tau_d \leq t \leq \tau_{d-1}-\log^8n.$$
Hence,
\begin{align*}
\sum_{i=t}^{t+\log^{8}n-1} \mathbb{I}(\zeta_{i}=0)
&= (\zeta_{t+\log^{8}n}- \zeta_{t})
+ \sum_{i=t}^{t+\log^{8}n-1} 1-F(\zeta_{i}).
\\& \geq - \log^6n+
\sum_{i=t}^{t+\log^{8}n-1} 1-F(\zeta_{i}).
\end{align*}
At the last inequality we used that $\zeta_t\leq \log^6 n$ for $t< \tau_{3}$. Now observe that $F(\zeta_t)\neq 0$ iff $w_t\in Y_1^t$. In such a case $F(\zeta_t)=\sum_{v\in N(w_t)\setminus \{v_t\}} \sum_{j=1}^{k+1} j \mathbb{I}( v\in Y_{j,j+1}^t).$ Therefore,
$$F(\zeta_t)\leq (k+1)\Delta(G) \leq \log n$$
and
$$\mathbb{E}(F(\zeta_t)|\mathcal{H}_t)= p_1^t\lambda_1^t\sum_{j=1}^d j p_j^tq_{j+1,j+1}^t+o(1).$$
Thus,
\begin{align*}
&\Pr\left( \sum_{i=t}^{t+\log^{8}n-1}\mathbb{I}(\zeta_t=0) \leq \sum_{i=t}^{t+\log^{8}n-1} \left(1-p_1^i\lambda_1^i\sum_{j=1}^d j p_j^iq_{j+1,j+1}^i -10^{-10}\right)\right)
\\ &\leq \Pr\left( \sum_{i=t}^{t+\log^{8}n-1}1-F(\zeta_i) \leq \sum_{i=t}^{t+\log^{8}n-1} \left(1-\mathbb{E}(F(\zeta_i)|\mathcal{H}_i\right))- 10^{-11}\log^8 n\right)
\\ &= \Pr\left( \sum_{i=t}^{t+\log^{8}n-1}\mathbb{E}(F(\zeta_i)|\mathcal{H}_i )-F(\zeta_i) \leq - 10^{-11}\log^8 n\right)
\leq \exp \left\{- \frac{(10^{-11}\log^8 n)^2}{2\log^2 n\cdot \log^8 n}\right\}=o(n^{-9}).
\end{align*}
The last inequality follows from Azuma-Hoeffding inequality (see Theorem \ref{thm:AH}).
\end{proof}
\begin{lemma}\label{lem:upperconstrain}
Let $7\leq d \leq k+1$. Let $t$ be such that $\tau_d\leq t < \tau_{d-1}-\log^8 n$. If $p^{t+i} \in B_d$, $p_1^{t+i}\geq C_1/2$ and
\begin{align}\label{eq:r-2}
p^{t+i}_{d-1}-\alpha_{d-1} p^{t+i}_{d-2} \leq n^{-0.1}
\end{align}
for $i=0,1,...,\log^8n$ then,
$$ \sum_{i=0}^{\log^{8}n-1}{\bf E}\big[D_{t+i}\big(2mp^{}_{d-1}-\alpha_{d-1}2m p^{}_{d-2} \big) \big|\mathcal{H}_{t+i}\big]\geq 10^{-5}\log^{8} n.$$
\end{lemma}
\begin{proof}
Similarly to the derivation of \eqref{eq1} we have,
\begin{align}
{\bf E}[D_t&(2mp_{d-1}-2\alpha_{d-1} mp_{d-2})| \mathcal{H}_i ] =\lambda_{d} \mathbb{I}(\zeta=0)+\lambda_{d}p_{d} -(\lambda_{d-1}+1)p_{d-1}-a_{d-1} \lambda_{d-1}p_{d-1} \nonumber\\&\hspace{4mm}+ \alpha_{d-1} (\lambda_{d-2}+1)p_{d-2} + p_1 \lambda_1 \bigg[- d p_{d-1} q_{d,d}+ \alpha_{d-1} (d-1) p_{d-2} q_{d-1,d-1}\bigg] +o(1) \nonumber
\\ &\geq \lambda_{d} \mathbb{I}(\zeta=0)+ \lambda_{d} p_{d}-(\lambda_{d-1}+1)p_{d-1}-a_{d-1} \lambda_{d-1}p_{d-1}+(\lambda_{d-2}+1)(p_{d-1}-o(1)) \nonumber
\\ &\hspace{4mm} + p_1 p_{d-1} \lambda_1 \bigg[- d q_{d,d}+(d-1) q_{d-1,d-1}+o(1)\bigg] +o(1) \nonumber
\\& \geq [\mathbb{I}(\zeta=0)+p_{d}-a_dp_{d-1}]\lambda_d
\nonumber \\& \hspace{4mm}
+ \bigg\{(a_{d}-a_{d-1}) \lambda_{d} +g(d-1,\lambda)
- p_1 \lambda_1 \bigg[ d q_{d,d} - (d-1) q_{d-1,d-1}\bigg]\bigg\} p_{d-1}+o(1) .\label{eq12}
\end{align}
We split the rest of the proof of Lemma \ref{lem:upperconstrain} into the following 2 claims.
\begin{claim}\label{claim:stopsmall}
Let $7\leq d \leq 20$. Let $t$ be such that $\tau_d\leq t < \tau_{d-1}-\log^8 n$. If $p^{t+i} \in B_d$, $p_1^{t+i}\geq C_1/2$ and \eqref{eq:r-2} holds for $i=0,1,...,\log^8n-1$ then,
$$ \sum_{i=0}^{\log^{8}n-1}{\bf E}\big[D_{t+i}\big(2mp^{}_{d-1}-\alpha_{d-1}2m p^{}_{d-2} \big) \big|\mathcal{H}_{t+i}\big]\geq 10^{-5} \log^8 n.$$
\end{claim}
{\textbf{Proof:}} See Appendix \ref{appendix:stopsmall}.
\qed
\begin{claim}\label{claim:stoplarge}
Let $21\leq d \leq k+1$. Let $t$ be such that $\tau_d\leq t < \tau_{d-1}-\log^8n$. If $p^{t+i} \in B_d$, $p_1^{t+i}\geq C_1/2$ and \eqref{eq:r-2} holds for $i=0,1,...,\log^8n$ then,
$$ \sum_{i=0}^{\log^{8}n-1}{\bf E}\big[D_{t+i}\big(2mp^{}_{d-1}-\alpha_{d-1}2m p^{}_{d-2} \big) \big|\mathcal{H}_{t+i}\big]\geq 10^{-5}\log^8 n.$$
\end{claim}
{\textbf{Proof:}}
$p^{t}\in B_d$ implies that $p_{d-2}^{t_1}< 1.552/(1+1.552)$ and $p_1^{t_1}\leq \frac{1}{\sum_{i=1}^{d-1}1.55^i} \leq \frac{0.55}{1.55^{d-1}-1}$.
Thereafter \eqref{eq12}, the definition of $a_d$ (see \eqref{alphas}) and Lemma \ref{eq:sumzetas} give,
\begin{align}
\sum_{i=0}^{\log^{8}n-1}&{\bf E}\big[D_{t+i}\big(2mp^{}_{d-1}-\alpha_{d-1} 2mp^{}_{d-2} \big) \big|\mathcal{H}_{t+i}\big]\geq
\sum_{i=t}^{t+\log^{8}n-1}[\mathbb{I}(\zeta_{i}=0)+p_{d-1}^{i}- a_{d} p_{d-2}^{i}]\lambda_{d}^{i} -o(1) \nonumber
\\& \geq \sum_{i=t}^{t+\log^{8}n-1}\bigg[1-p_1^i\lambda_1^i\sum_{j=1}^d jp_j^i q_{j+1,j+1}^i-10^{-10} +o(1) -1.552 \cdot \frac{1.552}{1+{1.552}} \bigg]\lambda_{d}^i \nonumber
\\&\geq \log^8n \bigg[1-\frac{0.55d(d+1)}{1.55^{d-1}-1}-0.95\bigg] \lambda_{d} \geq 10^{-5}\log^8 n.
\label{basic1}
\end{align}
For the first inequality of the last line we used Lemma \ref{lem:calcipq}.
\end{proof}
We are now ready to prove the main Lemma of this subsection.
\begin{lemma}\label{lem:confine}
For $i\in\{2,3,...,k\}$ let $\sigma_i=\min\{t\geq t^*: p_i^t<\alpha_ip_{i-1}^t \text{ or }\zeta_t\geq \log^6 n \text{ or }m_t\leq n^{0.4+10^{-5}} \}$. Then w.s.h.p.\@, \begin{itemize}
\item[(a)] $\sigma_i\leq \sigma_{i-1}$ for $i\in\{3,...,k\}$
\item[(b)] $\tau_{d} \leq \sigma_d$ for $d\in\{6,...,k\}$.
\end{itemize}
\end{lemma}
Lemma \ref{lem:confine} implies that w.s.h.p.\@, $p^t\in B_d$ for $d\in\{7,...,k+1\}$ and $t^*\leq t\leq \tau_{d-1}$. In particular, $p^{\tau_6}\in B_7$.
\begin{proof}
Recall that for $t<t'\leq \tau'$, as all the edges removed at any iteration of {\sc k-MatchTINF } are incident to some vertex, we have
$$2m_{t'}-2m_{t} \leq 2(t'-t)\Delta(G)\leq 2(t'-t)\log n.$$
In addition, for any $t\leq \tau'$ and $i\in [k]$, $p^t_i-p^{t+1}_i\leq 2(i+1)\Delta(G)/2m_{t+1}\leq 2\log n/2m_{t+1}$. Thus,
\begin{align}\label{eq:1001}
\Big|[2m_{t+1}& (p^{t+1}_{i}-\alpha_j p^{t+1}_{i-1})]-
[2m_{t} (p^{t}_{i}-\alpha_j p^{t}_{i-1})]\Big|\nonumber \\&\leq
\Big|2m_{t+1} [(p^{t+1}_{i}-\alpha_j p^{t+1}_{i-1})-(p^{t}_{i}-\alpha_j p^{t}_{i-1})]\Big| + \Big| 2(m_{t}-m_{t+1}) (p^{t}_{i}-\alpha_j p^{t}_{i-1})]\Big| \nonumber
\\& \leq 2m_{t+1} \cdot \frac{6\log n}{2m_{t+1}} +2\log n \cdot 3 \leq 12\log n.
\end{align}
Now let $i\in\{3,...,k\}$ and assume that $\sigma_{i-1}\leq \min\{\sigma_{i-2},\sigma_{i-3},...,\sigma_2\}$. Let $t_1=\sigma_{i-1}$ and $t_2=\max\{t^*,t_1-\log^8 n\}$.
\eqref{eq:1001} implies that
\begin{align}\label{eq:t1t2}
[2m_{t_1} (p^{t_1}_{i-1}-\alpha_{i-1} p^{t_1}_{i-2})]-[2m_{t} (p^{t}_{i-1}-\alpha_j p^{t}_{i-2})]
\leq 12(t-t_1)\log n
\end{align}
for any $t<t_1$.
Hence,
\begin{equation*}\label{eq:cond1}
p^{t}_{i-1}-\alpha_{i-1} p^{t}_{i-2}\leq 12\log^9 n/2m_t +p^{t_1}_{i-1}-\alpha_{i-1} p^{t_1}_{i-2}\leq n^{-0.1}+0\leq n^{-0.1}<p_1^{t^*}
\end{equation*}
for $t \in[t_2,t_1]$ and by Lemma \ref{lem:initial} we have that $t_2>t^*$. Thereafter, if $t_1=\sigma_{i-1} \leq \sigma_i$ then $t\in[t^*,t_1)$ implies that $p^t\in B_{i+1}\subseteq B_3$ and $p_j^t\geq C_1/2$ for $j\in [i]$ and $t\in[t_2,t_1)$ (see Lemma \ref{lem:initial}).
Thus in the event $t_1=\sigma_{i-1} \leq \sigma_i$ then Lemma \ref{lem:lowerconstrains} applies giving,
\begin{align}\label{eq:1003}
\sum_{j=0}^{\log^8n-1}\mathbb{E}[D_{t_2+j}(2m(p_{i-1}-a_{i-1}p_{i-2}))|\mathcal{H}_{t_2+j}] \geq 10^{-5}2^{-k}C_1\log^8 n .
\end{align}
In addition,
\begin{align}\label{eq:1004}
2m_{t_1}(p_{i-1}^{t_1}-a_{i-1}p_{i-2}^{t_1})- 2m_{t_2}(p_{i-1}^{t_2}-a_{i-1}p_{i-2}^{t_2})\leq 0.
\end{align}
Thus \eqref{eq:t1t2}, \eqref{eq:1003}, \eqref{eq:1004} and Azuma-Hoeffding inequality give,
\begin{align*}
\Pr(\exists i\in \{3,2,...,k\}: \sigma_{i-1}<\sigma_i) \leq \sum_{i=3}^k \sum_{t_1\leq 2m_0}\exp\set{ - \frac{(10^{-5}2^{-k}C_1\log^8 n)^2}{ 2\log^8n (12\log n)^2 }} =o(n^{-9}).
\end{align*}
This completes the proof of part (a).
Now assume that there exists $d\in\{6,...,k\}$ such that $\tau_{d} > \sigma_d$ and $\tau_{d'}\leq \sigma_{d'}$ for $d<d'\leq k$. Let $t_1=\sigma_d,$ $t_2=\min\{t^*,t_1-\log^8 n\}$ and $t_3=\min\{t^*,t_2-\log^{10} n\}$.
As in the proof of part (a) we have that $t_2>t_3>t^*$, $p_1^t\geq C_1/2$ and $p^{t}_{d}-\alpha_d p^{t}_{d-1}\leq 12\log^{11} n/2m_t\leq n^{-0.1}$ for $t\in [t_3,t_1)$.
We now consider 2 cases.
\vspace{3mm}
\\\textbf{Case a:} $\tau_{d+1}\leq t_2$. Part (a) implies that $p^t\in B_d$ for $t\in[t_2,t_1)$. Thus Lemma \ref{lem:upperconstrain} applies giving
\begin{align}\label{eq:1002}
\sum_{i=0}^{\log^{8}n-1}{\bf E}\big[D_{t_2+i}\big(2mp^{}_{d-1}-\alpha_{d-1} 2mp^{}_{d-2} \big) \big|\mathcal{H}_{t_2+i}\big]
\geq 10^{-5}\log^{8}n.
\end{align}
In addition
\begin{align}\label{eq:10004}
2m_{t_1}(p_{i-1}^{t_1}-a_{i-1}p_{i-2}^{t_1})- 2m_{t_2}(p_{i-1}^{t_2}-a_{i-1}p_{i-2}^{t_2})\leq 0.
\end{align}
\eqref{eq:1001}, \eqref{eq:1002}, \eqref{eq:10004} together with Azuma-Hoeffding inequality give,
\begin{align*}
\Pr&\bigg(\exists 6\leq d \leq k: \tau_d > \sigma_d \text{ and } \tau_{d+1}\leq \sigma_d-\log^8n\bigg) \nonumber
\\&\leq \sum_{d=6}^k \sum_{t_1\leq 2m_0}\exp\set{ - \frac{ ( 10^{-5}\log^{8}n)^2 }{2 \times \log^{8}n \times (12\log n)^2 }} =o(n^{-9}).
\end{align*}
\vspace{3mm}
\\\textbf{Case b:} $t_2< \tau_{d+1}$.
\eqref{eq:t1t2} implies that $ [2m_{t_1} (p^{t_1}_{i-1}-\alpha_{i-1} p^{t_1}_{i-2})]- [2m_{t_2} (p^{t_2}_{i-1}-\alpha_j p^{t_2}_{i-2})] \geq - 12\log^{9}n$
hence as $ p^{t_3}_{i-1}-\alpha_j p^{t_3}_{i-2} \geq 0$,
\begin{align}\label{eq:t3}
[2m_{t_2} (p^{t_2}_{i-1}-\alpha_{i-1} p^{t_2}_{i-2})]&- [2m_{t_3} (p^{t_3}_{i-1}-\alpha_j p^{t_3}_{i-2})] \leq 12\log^{9}n.
\end{align}
Part (a) and $\sigma_{d+1}\geq \tau_{d+1}$ imply that $p^t\in B_{d+1}$ for $t\in[t_3,t_2]$. Thus Lemma \ref{lem:lowerconstrains} applies giving
\begin{align}\label{eq:10002}
\sum_{i=0}^{\log^{10}n-1}{\bf E}\big[D_{t_3+i}\big(2mp^{}_{d-1}-\alpha_{d-1} 2mp^{}_{d-2} \big) \big|\mathcal{H}_{t_2+i}\big]
\geq 10^{-5}2^{-k}C_1\log^{10}n.
\end{align}
Thus \eqref{eq:1001}, \eqref{eq:10002}, \eqref{eq:t3} and Azuma-Hoeffding inequality give,
\begin{align*}
\Pr&(\exists d\in \{6,2,...,k\}: \tau_d> \sigma_d \text{ and } \tau_{d+1} > \sigma_d-\log^8n\bigg)) \\&\leq \sum_{i=6}^k \sum_{t_1\leq 2m_0}\exp\set{ -\Omega \bfrac{(\log^{10} n)^2}{ 2\log^{10}n (12\log n)^2 }} =o(n^{-9}). \end{align*}
\end{proof}
\subsection{Proof of Lemma \ref{lem:changeZ_t}}\label{subsection:change}
\begin{lemma}\label{01}
Conditioned on $p^{\tau_6}\in B_7$ w.s.h.p.\@ for $\tau_6\leq t<\tau'$,
$$\text{ if $\zeta_t>0$ then } \mathbb{E}(\zeta_{t+1}-\zeta_t|\mathcal{H}_t) \leq -10^{-5}.$$
\end{lemma}
\begin{proof}
See Appendix \ref{appendix:01}.
\end{proof}
{\emph{Proof of Lemma \ref{lem:changeZ_t}.}
Recall that Lemma \ref{lem:changeZ_t} asks to prove that for
$t < \tau'$,
\begin{equation}\label{98}
\text{ w.s.h.p.\@ if $\zeta_t>0$ then,
$\mathbb{E}(\zeta_{t+1}-\zeta_t|\mathcal{H}_t)\leq -10^{-5}$.}
\end{equation}
We partition $[0,\tau')$ to the subintervals $I_0=[0,\tau^*]$, $I_{k+1}=(\tau^*,\tau_k]$, $I_d=(\tau_{d},\tau_{d-1}]$, $\ell=k,k-1,...,7$
and $I_6=[\tau_6,\tau')$. Lemmas \ref{lem:initial} and \ref{01} imply that \eqref{98} is satisfied for $t\in I_0\cup I_6$. Thereafter Lemma \ref{lem:confine} implies that for $d\in\{k+1,k,...,7\}$ and $t\in I_d$ we have that $p^t\in B_d$. Hence Lemmas \ref{03}, \ref{02} apply giving that \eqref{98} is satisfied $t\in \cup_{\ell=k+1}^{7} I_d$ .
\qed
\section{Reserving a set of random edges}\label{sec:reserve}
To prove Theorem \ref{thm:matchings} we use Theorem \ref{thm:kGreedy2}, a variant of Theorem \ref{thm:kGreedy}. Theorem \ref{thm:kGreedy2} states that from $G_{n,cn}^{\delta \geq k+1}$ we can remove a set of fairly random edges such that the residual graph still spans a large $k$-matching. We will later use the removed set of random edges to augment the $k$-matching into a perfect one.
\begin{theorem}\label{thm:kGreedy2}
Let $k\geq 2$, $(k+1)/2< c=O(1)$, $n^{-0.49}\leq p =o(1)$ and $G\sim G_{n,cn}^{\delta \geq k+1}$. Then, w.s.h.p.\@, there exists $V_0\subset V(G)$ of size at most $3cnp$ and $E_p\subset E(G)$ of size at least $\frac{(2cn-(k+1)n)p}{4}$ such that
\begin{itemize}
\item[(i)] Given the set $E(G)\setminus E_p$ the edge set $E_p$ is distributed uniformly at random among all sets of size $|E_p| $ that are disjoint from $E(G)\setminus E_p$ and not incident to $V_0$ and
\item[(ii)] $E(G)\setminus E_p$ spans a $k$-matching $M$ of size at least $kn/2-n^{0.401}$.
\end{itemize}
In addition w.s.h.p.\@ the sets $V_0,E_p$ and $M$ can be generated in $O(n)$ time.
\end{theorem}
\begin{proof}To generate $V_0$ and $E_p$ we implement the following algorithm:
\begin{algorithm}[H]
\caption{{Generate $V_0,E_p$}}
\begin{algorithmic}[1]
\\ Let $E_0$ be a random subset of $E(G)$ where each edge belongs to $E_0$ independently with probability $p$.
\\ Reveal $E_1:=E(G)\setminus E_0$ and set $V_0 :=\{v\in V: v \text{ is incident to at most $k$ edges in }E_1\}.$
\\ Let $E^R_0$ be the set of edges in $E_0$ that are incident to $V_0$. Reveal $E_0^R$ and set $E_p:=E_0\setminus E_0^R$.
\end{algorithmic}
\end{algorithm}
\textbf{Proof of (i):} Clearly, given $V_0$, $E(G)\setminus E_p$ and $|E_p|$, $E_p$ is uniformly distributed among all the edge-sets of size $|E_p|$ that are disjoint from $E(G)\setminus E_p$ and not incident to $V_0$.
Thus it remains to show that
w.s.h.p.\@ $|V_0|\leq 3cnp$ and $|E_p|\geq \frac{(2cn-(k+1)n)p}{4}$.
Now,
$$\Pr(|V_0| \geq 3cnp) \leq \Pr(|E_p| \leq 3cnp/2)=\Pr(Bin(cn,p)\geq 1.5cnp)=o(n^{-9}).$$
At the line above the last equality follows from the Chernoff bound and $p\geq n^{-0.49}$.
To show that $|E_p|\geq \frac{(2cn-(k+1)n)p}{4}$, let $E_L$ be the subset of edges in $E(G)$ that are not incident to vertices of degree $k+1$. Then, $E_L \geq (2cn-(k+1)n)/2$.
An edge $e$ in $E_L$ belongs to $E_0\setminus E_p$ if one of its endpoints has degree $d\geq k+2$ and it is incident to at least $i\geq d-k$ edges in $E_0$ ($e$ is one of those $i$ edges).
Thus,
\begin{align*}
\mathbb{E}(|E_L\cap (E_0 \setminus E_p|))&\leq n \sum_{d\geq k+2}\sum_{i=d-k}^d i \frac{e^{-\lambda}\lambda^d}{d!f_{k+1}(\lambda)} \binom{d}{i}p^{i} \leq n \sum_{d\geq k+2} \frac{e^{-\lambda}\lambda^d}{d!f_{k+1}(\lambda)} (k+2)^2p^{2} \\&\leq (k+2)^2np^{2}.
\end{align*}
In addition by changing the outcome of whether an edge belongs to $E_0$ we may decrease or increase the size of $E_L\cap (E_0 \setminus E_p)$ by at most $2\Delta(G)\leq \log n$. Hence, with $n(c,k)= 2cn-(k+1)n$, McDiarmid's inequality implies,
$$\Pr\bigg(|E_L\cap (E_0 \setminus E_p)| \geq n(c,k)p/12 \bigg) \leq \exp\set{-\frac{\Theta(np)^2
)}{4cn\log^2n}} =o(n^{-9}). $$
Thus,
\begin{align*}
\Pr\big(|E_p| \leq n(c,k)p/4\big)
&\leq \Pr\big(|E_L \cap E_0| \leq n(c,k)p/3 \big)+\Pr\big(E_L\cap (E_0 \setminus E_p) \geq n(c,k)p/12\big )
\\ & \leq \Pr\big(Bin\big(n(c,k)/2,p\big) \leq n(c,k)p/3\big)+o(n^{-9}) =o(n^{-9}).
\end{align*}
\textbf{Proof of (ii):}
We only give a brief sketch of the proof of this part as it is almost identical to the proof of Theorem \ref{thm:kGreedy}.
Let $n_0=|V_0| \leq 3cnp=o(n).$
To construct the $k$-matching we implement {\sc k-MatchTINF }
with the twist that every $k^{-1}(n/n_0)^{0.5}$
other steps we choose $v_t$ out of the vertices in $V_0$ that have positive degree in $G_t$ if such vertices exist.
Thus it suffices to check that in this version of the algorithm \eqref{eq:changeZ_t} is satisfied for $t$ not being a multiple of $k^{-1}(n/n_0)^{0.5}$.
For $t\leq k^{-1} n_0 (n/n_0)^{0.5}$ the set $Y_1^t$ has size at most $2t$ and therefore $p_1^t=o(1).$ \eqref{eq:change_zt} implies \eqref{eq:changeZ_t} is satisfied.
At time $t=k^{-1} n_0 (n/n_0)^{0.5}$ every vertex in $V_0$ is incident to 0 edges in $G_t$ and given $m_t$, $Y_\ell^t$, $0 \leq \ell \leq k$ and $Y_{\ell,j}^t, 0\leq \ell \leq k, 1\leq j\leq k+1$ the degree sequence of $G_t$ is uniform over the proper set of degree sequences. Thus
we can use the exact same techniques to prove that \eqref{eq:changeZ_t} is satisfied for $k^{-1} n_0 (n/n_0)^{0.5} <t<\tau'$.
\end{proof}
\section{Finding a $k$-factor of $G^{\delta \geq k+1}_{n,m}$}\label{section:matchings}
We start with the large $k$-matching $M$ and the sets $V_0$, $E_p$ promised by Theorem \ref{thm:kGreedy2}. We then use the edges in $E_p$ to augment $M$ into a perfect $k$-matching.
To augment a given $k$-matching $M'$ we use augmenting paths. Given a $k$-matching $M'$, we say that the path $P=v_0,e_1,v_1,.....,e_s,v_s$ is $M'$-alternating if its odd indexed edges do not belong to $M'$ whereas its even indexed edges do (here we slightly abuse the traditional definition of alternating paths where
$E(P)\cap M$ consists either of the odd or of the even indexed edges of $P$). We say that $P$ is $M'$-augmenting if it is an $M'$-alternating path of odd length. Hence if $P$ is $M'$-augmenting then $M'\triangle E(P)$ is a $k$-matching of size $|M'|+1$.
Given a graph $G$, a vertex $r\in V(G)$, a $k$ matching $M$ of $G$ and an integer $\ell \in \mathbb{N}$ we let $T=T(r,M,\ell)$ be a random ``alternating tree'' w.r.t $M$, rooted at $r$, of height $2\ell$, that is generated as follows:
We let $L_0=\{r\}$, $E_1$ be a set of 2 random edges incident to $L_0$ that do not lie in $M$ and $L_1$ the endpoints of the edges in $E_1$ that are distinct from $r$. For $2\leq i\leq 2\ell$, given the sets of vertices (levels) $L_0=\{v\},L_1,L_2,...L_{i-1}$, if $i$ is even then we let $L_i$ be the set of vertices in $V(G) \setminus ( {\bigcup}_{j<i} L_{j})$ that are incident to $L_{i-1}$ via an edge in $M$. We let $E_i$ be the corresponding set of edges in $M$. If $i\geq 2$ is odd then every vertex $v\in L_{i-1}$ chooses a random edge $e_v$ incident to it but not in $M$.
We let $E_i=\{e_v: e_v \not\subset \cup_{j=1}^{i-1} L_{j}\}$
and $L_{i}= \{w: \{w,v\}\in E_i \text{ for some } v\in L_{i-1}\}$.
That is $E_i$ consists of the random edges incident to $L_{i-1}$ whose other endpoint does not appear in a smaller indexed level and $L_i$ is the set of those other endpoints.
We also let, $L(T)=\bigcup_{0\leq i\leq \ell} L_i$, $L_{even}(T)=\bigcup_{0\leq i\leq 2\ell} L_{2i}$ and $L_{odd}(T)=L(T) \setminus L_{even}(T)$. Similarly we let $E(T)=\bigcup_{0\leq i\leq \ell} E_i$, $E_{even}(T)=\bigcup_{0\leq i\leq 2\ell} E_{2i}$ and $E_{odd}(T)=E \setminus E_{even}$.
Finally we remove $|E(T)|-(|V(T)|-1)$ edges from $E(T)$ (and their copies in $E_{even}(T)$ and $E_{odd}(T)$) with the restriction that the resultant subgraph is a tree.
Thus, at the alternating tree $T=T(r,M,\ell)$ every vertex of $V(T)$ can be reached from the root $r$ via an alternating path of length at most $2\ell$.
Given $T=T(r,M,\ell)$ we let $ext(T,T(r,M,\ell+\ell'))$ be the tree rooted at $r$ of height $2(\ell+\ell')$ whose first $2\ell$ levels are identical with the corresponding ones of $T$ and for $1\leq i\leq 2\ell'$ its $(2\ell+i)th$ level is generated according to the same rules as the $(2\ell+i)th$ level of $T(r,M,\ell+\ell')$. Thus $ext(T,T(r,M,\ell+\ell'))$ consists of a possible extension of $T$ to an alternating tree w.r.t. $M$, rooted at $r$ and of height $2\ell+2\ell'$.
Let $M$ be a $k$-matching and $v,w\in V(G)$ be two vertices that are incident to at most $k-1$ edges in $M$. Let $\ell \in \mathbb{N}$, $T_v=T(v,M,\ell)$ and $T_u=T(u,M,\ell)$. If there exists $w\in L_{odd}(T_v)$ that is incident to at most $(k-1)$ edges in $M$ then the unique $v$ to $w$ path $P_{v,w}$ defined by $T_v$ is an augmenting path. Otherwise, in the subgraph of $G$ spanned by $V(T_v)$ every vertex in an odd level of $T_v$ has degree at least $k+1\geq 3$ and every vertex at an even level has degree at least 2. In our case, this will imply that the size of $ L_{odd}(T_v) $ is either linear in $n$ or exponential in $\ell$. Finally for $v'\in L_{odd}(T_v)$ and $u'\in L_{odd}(T_u)$ if the paths $P_{v-v'}$, $P_{u'-u}$ are vertex disjoint then the path $P_{v-v'},\{v',u'\},P_{u'-u}$ is $M$-augmenting.
\begin{lemma}\label{thm:matchings_b}
Let $k\geq 2$, $G$ be a graph on $n$ vertices, $V_0\subset V(G)$, $E_p\subset \binom{V(G)}{2}$ such that,
\begin{itemize}
\item[(i)] $G$ has minimum degree $k+1$,
\item[(ii)] $|V_0|=O(n^{0.85})$,
\item[(iii)] $E_p$ is an edge set of size $\Theta(n^{0.85})$ that is uniformly distributed over all subsets of $\binom{V}{2}$ of size $|E_p|$ that contain no edge incident to $V_0$ and are disjoint from $E(G)$,
\item[(iv)] $G$ spans a $k$-matching of size at least $kn/2- n^{0.401}$,
\item[(v)] every set $S\subset V(G)$ of size $|S|\leq k^{400}$ spans at most $|S|$ edges in $G$,
\item[(vi)] every set $S\subset V(G)$ of size $k^{200}\leq |S| \leq 6n^{0.999}$ spans at most $(1+10^{-10})|S|-1$ edges in $G$.
\end{itemize}
Then $(V(G),E(G)\cup E_p)\in \mathcal{P}_k$ with probability $1-o(n^{-8})$. In addition, with the same probability, we can find the corresponding $k$-factor in $O(n)$ time.
\end{lemma}
\begin{proof}
First assume that $kn$ is even.
Let $M_0$ be a maximum $k$-matching of $G$. Condition (iv) of our Lemma implies that $|M|\geq kn/2-n^{0.401}.$ Set $Y_0=E_p$ and let $F_0$ be the set of edges in $\binom{V(G)}{2}$ that are disjoint from $V_0$ and do not lie in $E(G)$.
For $t=1,2,...,n^{0.401}$ with probability $1-o(n^{-10})$ we will construct, in $O(n^{0.59})$ time, a $k$-matching $M_t$ of size at least $\min\{ kn/2, |M_0|+t\}$, a vertex set $V_t \supseteq V_0$ of size at most $|V_0|+2tn^{0.58} \leq n^{0.99}$ and a subset $Y_t \subset Y_0$ of size at least $|Y_0|-tn^{0.25}\geq |Y_0|/2=\Theta(n^{0.85})$.
$Y_t$ will be distributed as a random subset of $F_t$ of size $|Y_t|$ where $F_t$ will be defined to be a superset of the set of edges that are disjoint from $V_t$ and not in $(Y_0\setminus Y_t) \cup E(G)$. Thus with probability $1-o(n^{-9})$, $M_{n^{0.401}}$ is a $k$-factor of $(V(G),E(G)\cup E_p)$ that is constructed in $O(n)$ time.
Let $\ell_1=\log_{k}n^{0.41}$ and $\ell_2=\log_{k}n^{0.589}$. Let $0\leq t\leq n^{0.401}-1$ and suppose that we are given sets $Y_{t},V_{t},F_t$ and $M=M_{t}$ satisfying the above. If $M_t$ is a $k$-factor let $(M_{t+1},Y_{t+1},V_{t+1},F_{t+1})=(M_{t},Y_{t},V_{t},F_t)$. Otherwise let $G_t=G\cup (Y\setminus Y_t)$. W.l.o.g. we may assume that there exist distinct vertices $v,u\in V$ that are incident to at most $k-1$ edges in $M$. If no such vertices exists, then either $M$ is a $k$-factor of $G$ or there exists a vertex $v$ and an edge $\{v,u\}$ such that $v$ is incident to at most $k-2$ edges in $M$ and $\{v,u\}\notin M$. In such a case we can add $\{v,u\}$ to $M$ and remove from $M$ a different edge that is incident to $u$.
Every vertex $w$ chooses a random set of edges $E_w'$ in $G\setminus M_t$ of size $(k+1)-d_{M_t}(w)$. For every alternating tree generated in this iteration, when needed, each vertex $w\in V$ will pick its random edges from $E_w=E_w'\cup M_t(w)$, where $M_t(w)$ is the set of edges in $M_t$ incident to $w$. We let $S_v$ be the set of vertices reachable by $u$ via a path $u=v_0,e_0,v_1,e_1,..v_s$ of length $s\leq 0.1\log_{k+1} n$ where $e_i\in E_{v_i}$ for $i=0,1,...,s-1$. Thus $|S_v| \leq \sum_{i=0}^{0.1\log_{k+1}n} (k+1)^i \leq 2n^{0.1}.$
We now implement the algorithm {\sc GenerateTree}, described below, twice. The first time with $w=v$, $S=S_v$, $S'=\emptyset$, $X=V_t$, $M=M_t$ and the second time with $w=u$, $S=S_u$, $S'=S_u'$, $X=V_t$, $M=M_v$ where the sets $S_u,S_u'$ and $M_v$ depend on the first implementation. If both of the implementations are successful then in both times the algorithm outputs a vertex $w'$, a matching $M_{w'}$ and an alternating tree $T_{w'}$ w.r.t. $M_{w'}$ rooted at $w'$. The tree $T_{w'}$ either spans an $M_{w'}$-augmenting path or (i) its first $0.1\log_{k+1} n$ levels do not intersect $S$ (ii) there will be at least $n^{0.5889}$ many vertices in its even levels that do not belong to $V_t$ and (iii) the set of edges $M_{w'}\triangle M_w$ defines an alternating path w.r.t. $M_w$ from $w$ to $w'$ that does not intersect $S'$. We set $S_u=S_u'=\emptyset$ if $T_{v'}$ spans an $M_{v}$-augmenting path. Otherwise $S_u$ and $S_u'$ consists of the vertices in the first $0.1\log_{k} n$ and $0.02\log_{k}n$ respectively levels of $T_{v'}$. If the algorithm does not output a tree spanning an augmenting path we will then search for an edge from $L_{even}(T_{v'})$ to $L_{even}(T_{u'})$ in $Y_t$. Such an edge will create an augmenting path from $v'$ to $u'$.
\begin{algorithm}[H]
\caption{{\sc GenerateTree}}
\begin{algorithmic}[1]
\\Input: $w$, $M$,$X$, $S$, $S'$.
\\Set $i=1$
\While{ $i\leq n^{0.001}$ }
\\\hspace{5mm} Generate $T_w=T(w,M,\ell_1)$. Let $\bar{T_w}=ext(T_w,T(w,M,\ell_1+0.05\log_{k} n))$.
\\\hspace{5mm} Let $w'$ be a random leaf of $T_w$ and $\bar{T_{w'}}$ be the subtree of $\bar{T_w}$ rooted at $w'$.
\\\hspace{5mm} Let $P$ be the unique $w$ to $w'$ path in $T_w$.
\\\hspace{5mm} Set $M_w:=M\triangle E(P)$
and generate $T_{w'}=ext(\bar{T_{w'}},T(w',M_w,\ell_2))$.
\If{ for some triple $(x,M_x,T_x) \in \{(w,M,\bar{T_w}), (w',M_w,T_{w'})\}$ there exists $y\in L_{odd}(T_{x})$ that is incident to less than $k$ edges in $M_x$}{ return SUCCESS, $x$, $T_x$, $M_x$.}
\ElsIf{ (i) $|L_{even}(T_{w'})\setminus X| \geq n^{0.5889} $ and
(ii) $\cup_{i=0}^{0.1 \log_{k} n-1} L(T_{w'}) \cap S= \emptyset$
\\\hspace{11mm} (iii) $P_{w,w'}$ does not intersect $S'$}{ return SUCCESS, $v',T_{v'}$ and $M_v$.}
\EndIf
\\\hspace{5mm} i=i+1.
\EndWhile
\\ Return FAILURE.
\end{algorithmic}
\end{algorithm}
The proof of Lemma \ref{thm:matchings_b} (displayed after the proofs of the Claims) will follow from Claims \ref{success} and \ref{desiredsets} and the observation that {\sc{GenerateTree}} runs in $O(n^{0.59})$ time. Indeed in each of the $O(n^{0.001})$ iterations each of the alternating trees generated consists of $O(k^{\log_k\ell_2})=O(n^{0.589})$ many vertices yielding an augmentation procedure that constructs a $k$-factor in $O(n^{0.001}\times n^{0.589} \times n^{0.401})=O(n)$ time.
Claim \ref{claim:ineq} describes the rate of growth of an alternating tree that does not span an augmenting path. We will use the corresponding rates in the proofs of Claims \ref{success} and \ref{desiredsets}. We will also make use of the special vertex $z$ appearing in the statement of Claim \ref{claim:ineq} later when proving Lemma \ref{thm:matchings_b} for $kn$ being odd.
\begin{claim}\label{claim:ineq}
Let $M$ be a $k$-matching of $G$ and $T'=T(r,M,h)$ be an alternating tree rooted at some vertex $r$ satisfying $d_M(r)<k$, of height $2h\leq 2\log_k n^{0.999}$. Let $z$ be any vertex of $V(G)\setminus (N(r) \cup \{r\})$ satisfying $d_M(z)=0$ and $T$ be the subtree of $T'$ that we get by pruning $T'$ at $z$. If $T$ does not span an $M$-augmenting path then, for $0\leq i \leq 390$
\begin{equation}\label{eq:smallodd}
k^{i-1} \leq |L_{2i+1}(T)| \leq 2k^{i}
\end{equation}
and
\begin{equation}\label{eq:smalleven}
k^{i} \leq |L_{2i+2}(T)| \leq 2k^{i+1}.
\end{equation}
In addition for $300\leq i \leq h-1$,
\begin{equation}\label{eq:even}
(1-10^{-9}) |L_{2i}(T)| \leq |L_{2i+1}(T)| \leq |L_{2i}(T)|
\end{equation}
and
\begin{equation}\label{eq:odd}
(1-10^{-9})k |L_{2i+1}(T)| \leq |L_{2i+2}(T)| \leq k |L_{2i+1}(T)|.
\end{equation}
\end{claim}
\begin{claim}\label{success}
If $|X|\leq n^{0.99}$, $|S|\leq 4n^{0.1}$, $|S'|\leq 4n^{0.01}$ and $S'$ does not intersect the first $0.1\log_{k} n$ levels of $T_w$ then,
$$\Pr(\text{ {\sc GenerateTree} returns FAILURE})=o(n^{-10}).$$
\end{claim}
\begin{claim}\label{desiredsets}
Conditioned on {\sc GenerateTree} returning SUCCESS at both implementations, with probability $1-o(n^{-10})$ we can generate the desired sets $M_{t+1}$, $V_{t+1}$ and $Y_{t+1}$ in $O(n^{0.59})$ time.
\end{claim}
\noindent{\textbf{Proof of Claim \ref{claim:ineq}}}
$d_M(z)=0$, thus $T=T'\setminus\{z\}$ as every vertex in an even level is reached by an edge in $M$ and the children of a vertex $v\in L_{odd}(T')$ are connected to $v$ via an edge in $M$. Thereafter, the condition that $M$ does not span an augmenting path implies that every vertex in $L_{odd}(T')$ is incident to $k$ edges in $M$. Henceforward we write $L_{odd}(T)$ for $L_{odd}(T')\setminus\{z\}$, $L_{even}(T)$ for $L_{odd}(T')\setminus\{z\}$ and $L_{i}(T)$ for $L_{i}(T')\setminus\{z\}$.
The upper bounds in all of the above inequalities follows from the construction of $T$. With the exception of the root which has 2 children every vertex in $L_{2i}(T)$ has at most 1 child in $L_{2i+1}(T)$ hence $|L_{2i+1}(T)|\leq |L_{2i}(T)|$ for $i\geq 1$. Similarly every vertex in an odd level has at most $k$ children (defined by the edges in $M$) hence $|L_{2i+2}(T)|\leq k|L_{2i+1}(T)|$ for $i\geq 0$.
Let $T_{390}$ be the subtree of $T$ spanned by its first $2\cdot 390 +1$ levels. Observe that since $d_M(z)=0$ and $r$ is not a neighbor of $z$ we have that $z$ does not appear in the first 3 levels of $T'$. Thereafter Condition (v) of Lemma \ref{thm:matchings_b} implies that exactly one of the following occurs (i) there are $2k$ vertices in $L_2(T)$, at most 2 neighbors of $z$ appear in $V(T_{390})$ and $V(T_{390})$ does not span a cycle in $G$,
(ii) there are $2k$ vertices in $L_2(T)$, at most 1 neighbor of $z$ appears in $V(T_{390})$ and $V(T_{390})$ spans at most 1 cycle in $G$,
(iii) there are at least $2k-2$ vertices in $L_2(T)$, at most 1 neighbors of $z$ appear in $V(T_{390})$ and $V(T_{390})$ spans exactly 1 cycle in $G$ which is spanned by the first 3 levels of $T_{390}$.
In all 3 cases, there exists a vertex $r'\in L_2(T)$ such that the subtree of $T_{390}$ rooted at $r'$, say $T_{r'}$, does not contain a neighbor of $z$, does not span a cycle and all the vertices in the odd (even respectively) levels of $T_{r'}$ have $k$ (1 resp.) descendants . \eqref{eq:smallodd} and \eqref{eq:smalleven} follows as both, the $(2i)th$ level and $(2i+1)th$ level of $T_{r'}$ consist of exactly $k^i$ vertices.
We proceed to prove that \eqref{eq:even} holds for $i\geq 390$ by induction. Assume that for $390\leq j \leq i-1$ \eqref{eq:odd} and \eqref{eq:even} hold. In addition, equations \eqref{eq:smallodd}, \eqref{eq:smalleven} hold for $i\leq 390$.
Assume for the sake of contradiction that $(1-10^{-9}) |L_{2i}(T)| > |L_{2i+1}(T)|$ and let $S$ be the subgraph of $G$ spanned by $ \bigcup_{j=0}^{2i+1} L_j(T) \cup\{z\}$. Every vertex in $L_{2i}(T)$ is reached via an edge in $M$ and is incident to an edge in $E(G)\setminus M$ whose other endpoint belongs to $S$. Thus $S$ spans $N= \sum_{j=0}^{2i+1} |L_j(T)|+1$ vertices and at least $M=\sum_{j=1}^{2i+1}|L_j(T)|+(|L_{2i}(T)|-|L_{2i+1}(T))|)\geq \sum_{j=1}^{2i+1} |L_j(T)|+10^{-9}|L_{2i}(T)|+1.$ edges.
Thus,
\begin{align*}
\frac{M}{N}&\geq 1+\frac{ 10^{-9}|L_{2i}(T)|}{4+\sum_{j=1}^{299}(|L_{2j}|+|L_{2j+1}|)+\sum_{j=300}^{i} (|L_{2j}|+|L_{2j+1}|)}
\\&\geq 1+\frac{ 10^{-9}|L_{2i}(T)|}{4+10k^{300}+\sum_{j=300}^{i-1} \frac{2}{[k(1-10^{-9})^2]^{i-j}}|L_{2i}|+2|L_{2i}|}
\\&\geq 1+\frac{10^{-9}|L_{2i}(T)|}{4+4k^{300}+4|L_{2i}|+2|L_{2i}|}
> 1+10^{-10}.
\end{align*}
At the second inequality we used \eqref{eq:smallodd}, \eqref{eq:smalleven} to upper bound
$\sum_{j=1}^{299}(|L_{2j}|+|L_{2j+1}|)$ by $4k^{300}$
and the induction hypothesis to upper bound
$(|L_{2j}|+|L_{2j+1}|)$ by $2/{[k(1-10^{-9})^2]^{i-j}}|L_{2i}|$ for $j<i$. In addition at the third inequality we used that \eqref{eq:smallodd}, \eqref{eq:smalleven} and the induction hypothesis imply that $|L_{2i}|\geq |L_{2\cdot 389}| \geq k^{388}.$
Thus $S$ is a subgraph of $G$ on $|V(S)|\leq 3+\sum_{i=1}^{h-1}4k^{i}+2k^h\leq 6k^h\leq 6n^{0.999}$ many vertices and with $|E(S)|>(1+10^{-10})|V(S)|$ edges contradicting Condition (vi) of Lemma \ref{thm:matchings_b}. Hence \eqref{eq:even} holds. The proof of \eqref{eq:odd} follows in a similar manner as every vertex in an odd level in $T$ is incident to $k$ edges in $M$. \qed
{\textbf{Proof of Claim \ref{success}:}}
Assume that $w,M,X,S,S'$ satisfy the requirements of Claim \ref{success}.
Let $\mathcal{S}$ be the event that {\sc GenerateTree} returns success at line 8. Consider extending $\bar{T_w}$ into $Ext\bar{T}_w=ext(\bar{T_w},T(w,M,\ell_1+\ell_2))$ and let $T_{w'}'$ the subtree of $Ext\bar{T}_w$ rooted at $w'$. Then, $T_{w'}'$ is a subtree of $T_{w'}$.
For a leaf $q \in L_{2\ell_1}(T_w)$ let $T_{w,q}$ be the subtree of $Ext\bar{T}_w$ rooted at $q$. Call such a leaf \emph{good} if (I) there are more than $n^{0.5889}$ vertices in $L_{even}(T_{w,q})$ that do not lie in $X$, (II)
$(\cup_{i=0}^{0.1 \log_{k} n-1} L({T_{w,q}}) )\cap S= \emptyset$ and (III) $q$ is not a descendant of a vertex in $S'\cap V(T_w)$ w.r.t the tree $T_w$.
If $\mathcal{S}$ does not occurs then Claim \ref{claim:ineq} implies that $T_w$ has at least $ [(1-10^{-9})k]^{\ell_1-1}$ and at most $2k^{\ell_1}$ leaves. For each such leaf $q$ the tree $T_{w,q}$ spans at most $4k^{\ell_2}$ vertices in its even levels while all together span at least $[(1-10^{-9})k]^{\ell_1+\ell_2-1}$ vertices in the even levels of $Ext\bar{T}_w$ (as $\ell_1+\ell_2 \leq 0.999\log_k n$).
In addition at most $n^{0.5889}2k^{\ell_1}$ of those vertices are spanned by trees whose root violates Condition (I). Finally $|X| \leq n^{0.99}$. Hence in the event $\mathcal{S}^c$ the number of leaves of $T_w$ that satisfy the Condition (I) is at least
\begin{align*}
\frac{ [(1-10^{-9})k]^{\ell_1+\ell_2-1}-n^{0.99}- n^{0.5889}2k^{\ell_1} }{4k^{\ell_2}}
&\geq \frac{k^{\ell_1 + (\ell_1+\ell_2)\log_k(1-10^{-9})-1}}{4} -n^{0.401}-k^{0.5889\log_k n+ \ell_1-\ell_2}
\\& \geq
\frac{k^{\ell_1-(\ell_1+\ell_2)\cdot \frac{10^{-9}}{\log k} }}{5}-k^{ \ell_1-0.0001\log_k n} \geq \frac{k^{\ell_1-2\cdot 10^{-9}\log_k n }}{6}.
\end{align*}
Thereafter, each vertex in $S$ may belongs to the first $0.1\log_kn$ levels of a single subtree of $\bar{T_w}$ rooted at a vertex at the $(2\ell_1)th$ level of $\bar{T_w}$, hence to the first $0.1\log_kn$ levels of a single tree $T_{w,q}$. Thus at most $|S|\leq 4n^{0.1}$ leaves of $T_w$ do not satisfy Condition (II).
Finally $P_{w,w'}$ intersects $S'$ only if $w'$ is a descendant of a vertex of $S'$ in $T_w$. $S'$ consists of at most $4n^{0.01}$ vertices none of which belongs to the first $0.1\log_{k} n$ levels of $T_w$. Hence, as $S'$ does not intersect the first $0.1\log n$ levels of $T_{w}$, $S'$ may has up to $4n^{0.01} \times2 k^{\ell_1-0.05\log_{k} n} = 2k^{\ell_1-0.04\log_{k} n}$ descendants in the $(2\ell)^{th}$ level of $T_w$.
Thus,
\begin{align*}
\Pr&( \mathcal{S} \text{ or }\{\text{Conditions (i),(ii),(iii) are satisfied}\})= \Pr( w' \text{ is good})
\\& \geq \frac{\frac{k^{\ell_1-2\cdot 10^{-9}\log_k n }}{6} -4n^{0.1}- k^{\ell_1-0.04\log_{k} n}}{2k^{\ell_1}}
\\&\geq \frac{k^{\ell_1-2\cdot 10^{-9}\log_k n }}{20k^{\ell_1}}
= \frac{k^{-2\cdot 10^{-9}\log_k n }}{20}= \frac{n^{-2\cdot 10^{-9}}}{20}.
\end{align*}
Hence,
$$\Pr( GenerateTree \text{ returns FAILURE}) \leq \bigg(1-\frac{n^{-2\cdot 10^{-9}}}{20} \bigg)^{n^{0.001}} \leq \exp \bigg\{-n^{0.0001}\bigg\}=o(n^{-10}).$$
\qed
{\textbf{Proof of Claim \ref{desiredsets}:}}
If at any of the two iterations {\sc{GenerateTree}} returns a tree $T$ and a matching $M$ such that $T$ spans an $M$-augmenting path $P$ then we can let
$M_{t+1}=M\triangle E(P)$ and $(Y_{t+1},V_{t+1},F_{t+1})=(Y_{t},V_{t},F_{t})$.
Assume that the above does not occurs and {\sc{GenerateTree}} returns SUCCESS at both implementations. Recall that at both implementations we set $X=V_t$. In addition at the second implementation $S$ ($S'$ respectively) consist of the vertices in the first $0.1\log n$ ($0.02\log n$ resp.) levels of $T_{v'}$. Thus, since in both implementations the conditions in lines 9, 10 are satisfied, the corresponding outputs $(v',T_{v'},M_v)$ and $ (u',T_{u'},M_u)$ satisfy the following:
\begin{itemize}
\item [(i)] $|M_u|=|M_v|=|M|$ (by construction),
\item[(ii)] the first $0.1\log_{k}n$ levels of $T_{v'},T_{u'}$ do not intersect (as at the second implementation, $S_u$ consists of the vertices that lie in the first $0.1\log_{k}n$ levels of $T_{v'})$),
\item[(iii)] the $M_v$-alternating path $P_{u,u'}$ does not intersect the first $0.02\log_{k}n$ levels of $T_{v'}$ (as at the second implementation, $S_u'$ consists of the vertices that lie in the first $0.02\log_{k}n$ levels of $T_{v'}$) and
\item[(iv)] for $w\in\{v',u'\}$, $T_{w}$ spans in its even levels a set $B_w\subset V$ of size $n^{0.5889}$ that does not intersect $V_t$.
\end{itemize}
For $x \in \{u',v'\}$ and $z\in L_{even}(T_{x})$ denote by $P_{x,z}$ the $x-z$ alternating path defined by $T_{x}$.
Now let $D_1,D_2$ be the set of descendants of $A_1=V(P_{u,u'})$ and $A_2=\cup_{i=0}^{0.02\log_k n-1}L(T_{u'})$ in $T_{v'}$ respectively and let $B_{v'}'=B_{v'}\setminus (D_1 \cup D_2)$. Then, since $|A_1|\leq \log n$, $|A_2|\leq 4n^{0.01}$ and $A_1$ ($A_2$ respectively) does not intersect the first $0.02\log_k n$ ($0.1\log_k n$ resp) levels of $T_{v'}$ we have that,
$$|B_{v'}'| \geq n^{0.5889}-\log_k n\times 4k^{\ell_2-0.01\log_k n}-4n^{0.01}\times 4k^{\ell_2-0.05\log_k n} \geq n^{0.588}.$$
Similarly for $v_1\in B_{v'}'$, as $v_1$ is not a descendant of $A_2$ and therefore $P_{v',v_1}$ does not intersect $A_2$ (i.e. the first $0.02\log_k n$ levels of $T_{u'}$), there exist a set $B_{u',v_1} \subset B_{u'}$ of at least $ n^{0.588}$ vertices in $B_{u'}$ that does not contain a descendant of $V(P_{v',v_1})$ in $T_{u'}$.
Let $R_t=\{\{v_1,u_1\}:v_1\in B_{v'}',u_1\in B_{u',v_1}\}$. For $(v_1,u_1) \in R_t$ observe that $P_{v',v_1}$ is vertex disjoint from both $P_{u,u'}$ and $P_{u',u_1}$. Thus the path $P_{v',v_1},\{v_1,u_1\},P_{u',u_1}$ is $M_u$-augmenting. Therefore, if $(Y_t\cup E(G)) \cap R_t \neq \emptyset$ and $|Y_t\cap R_t|\leq n^{0.25}$ then we can set $V_{t+1}=V_t \cup B_{v'} \cup B_{u'}$, $Y_{t+1}=Y_t\setminus R_t$, $M_{t+1}=M_u \triangle E(P_1,\{v_1,u_1\}P_2)$ and $F_{t+1}=F_t \setminus R_t$ for some edge $\{v_1,u_1\}\in R_t$.
$|R_t|/\binom{n}{2} \geq n^{2\cdot 0.588-2}=n^{-0.824}$ and recall that $|Y_0| \geq |Y_t| \geq |Y_0|/2 = c_0n^{0.85}$ for some $c_0>0$. Thus
\begin{align*}
\Pr(\text{Claim} \ref{desiredsets})&\geq
\Pr(Bin(c_0n^{0.85}, n^{-0.824}) \in [1,n^{0.25}])
=1- o(n^{-10}).
\end{align*}
Where the last equality follows from the Chernoff Bound.
Finally, condition on $\Delta(G)\leq \log n$, the above process takes $O(n^{0.59})$ time as one has to check the edges incident to $B_{v'}$ and identify one that gives rise to an augmenting path.
\qed
At the first application of {\sc GenerateTree} $S=S_v$ consists of at most $4n^{0.1}$ vertices and $S'=\emptyset$ hence Claim \ref{success} applies. If at its first application {\sc GenerateTree} exits at line 8 then at its second application $S=S'=\emptyset$. Else if at its first application {\sc GenerateTree} exits at line 10, then $\cup_{i=1}^{0.1\log_k n-1}L(T_{v'})\cap S_v=\emptyset$ and at the second application of {\sc GenerateTree} we set
$S=S_u=\cup_{i=0}^{0.1\log n}L(T_{v'})$ and $S'=S_u'=\cup_{i=0}^{0.02\log n}L(T_{v'})$. Thus $|S|\leq 4n^{0.1}$, $|S'|\leq 4n^{0.01}$ and $S'$ does not intersect the first $0.1\log_kn$ levels of $T_u$. The later holds as those vertices belong to $S_v$ and $\cup_{i=1}^{0.1\log_k n-1}L(T_{v'})\cap S_v=\emptyset$. In both cases Claim \ref{success} applies. Thus the probability that either of the two implementations returns FAILURE is $o(n^{-10})$. This, together with Claim \ref{desiredsets} finish the proof of Lemma \ref{thm:matchings_b} in the case that $kn$ is even.
In the case that $kn$ is odd let $z\in V$ and $M$ be a maximum matching of $G$. Starting from $M$ we will construct a $k$-matching $M'$ of size at least $|M|-\log^4n$ such that every vertex $v$ at distance at most 3 from $z$ is incident to $k$ edges in $M'$ and $d_{M'}(z)=0$. To do so starting from $M$, remove all the edges incident to a vertex at distance at most 4 from $z$. Then, if there exists a cycle $C$ spanned by the vertices at distance at most 4 from $z$ add $E(C)$ to $M$. Condition (v) of Lemma \ref{thm:matchings_b} implies that at most one such cycle exists. The resulting edge set $M''$ is a $k$-matching satisfying $d_{M''}(z)=0$ and $|M''|\geq |M|-(\Delta(G)+1)^4 \geq |M|-\log^4 n$. Continuing from $M''$ for $i=1,2,3$, for $v$ in the $i^{th}$ neighborhood of $z$, while $d_{M''}(v)<k$ do the following: Pick an edge $e\in E(G)\setminus M''$ incident to $v$ whose other endpoint, say $v'$, is at distance $i+1$ from $z$ and does not lie on $C$. Conditions (i) and (v) of Lemma \ref{thm:matchings_b} imply that either $v$ has at least $k$ neighbors at distance $i+1$ from $z$ or it lies on $C$ and has at least $k-1$ neighbors at distance $i+1$ from $z$. In both cases such a vertex $v'$ exists. Finally set $M''= M''\cup e$.
Let $M'$ be the final edge set $M''$ resulted from the above procedure. Observe that $M'$ is a $k$-matching. Indeed, every vertex $v$ at distance $i\leq 4$ was first matched to at most $m(u)\leq 2 \leq k$ vertices at distance $i-1$ from $z$ and if $i\leq 3$ it was then further matched to $k-m(u)$ additional vertices at distance $i+1$ from $z$. Furthermore $d_{M'}(u)=d_{M}(u)\leq k$ for every vertex $u$ at distance at least 5 from $z$.
Now we can augment $M'$ to a $k$-factor of $G-\{z\}$ exactly as in the case where $kn$ is even. For that observe that for every vertex $v\in G$ we have that $d_{M_i}(v)\leq d_{M_{i+1}}(v)$ for $i\geq 0$. Thus at every iteration the initial vertices $u,v$ will be at distance at least $2$ from $z$ and Claim \ref{claim:ineq} applies.
\end{proof}
\subsection{Proofs of Theorems \ref{thm:matchings} and \ref{cor:matchings}}
{\em Proof of Theorem \ref{thm:matchings}:} Follows from Lemma \ref{thm:matchings_b} where conditions (ii)-(vi) are given by Theorem \ref{thm:kGreedy2} (with $p=n^{-0.15}$) and Lemma \ref{lem:density}.
\qed
For the proof of Theorem\ref{cor:matchings} in place of Lemma \ref{lem:density} we use Lemma \ref{lem:density2} stated below. Recall we denote by $F_0,F_1,...,F_{\binom{n}{2}}$ the random graph process, $V(F_0)=[n]$.
\begin{lemma}\label{lem:density2}
W.h.p, for $ 0\leq i \leq n\log n$
\begin{itemize}
\item[(i)] every set $S \subset [n]$ of size at most $k^{400}$ spans at most $|S|$ edges,
\item[(ii)] every set $S \subset [n]$ of size $k^{200}\leq |S| \leq 4n^{0.999}$ spans at most $(1+10^{-10})|S|$ edges,
\item[(iii)] if $i\geq k^{99}n$ then they do not exists sets $S,T \subset [n]$, such that $n^{0.99}\leq |S| \leq n/k^3$, $|T|\leq k|S|$, $S\cup T$ is connected and $T=N(S)$,
\item[(iv)] if $i\geq k^{99}n$ then the size of the $(k+1)$-core of $F_{i/10}$ is larger than $\big(1-e^{-\frac{i}{40n}}\big)n$.
\end{itemize}
\begin{proof}
If a graph $G$ has a $(k+1)$-core of size at most
$(1-e^{-\frac{i}{40n}})n$ then there exists $S\subset [n]$ of size $|S|=e^{-i/40n}n$ such that there are less than $k$ edges from every $v\in S$ to $V(G)\setminus S$. Thus, with $r=r(s)=(1+10^{-10})s$ and $p=p(n)=\frac{n\log n}{\binom{n}{2}}$,
\begin{align*}
\Pr&(\exists 0 \leq i\leq n\log n \text{ s.t. }F_i
\text{ does not satisfy conditions (i)-(iv)} )
\\& \leq \Pr( F_{n\log n}\text{ does not satisfy conditions (i),(ii)} )
\\&+O(n^{0.5}) \sum_{i=k^{99}n}^{n\log n} \sum_{s=n^{0.99}}^{n/k^3}\sum_{t=0}^{ks} \binom{n}{s+t}\binom{s+t}{s} (s+t)^{s+t-2}\bfrac{2i}{n^2}^{s+t-1} \bigg(1-\frac{2i}{n^2}\bigg)^{(n-s-t)s}
\\&+ 4\sum_{i=k^{99}n}^{n\log n} \binom{n}{e^{-i/40n}n}\bigg( \sum_{j=0}^k \binom{n-e^{-i/40n}n}{j}\bfrac{2(i/10)}{n^2}^j\bigg(1-\frac{2(i/10)}{n^2}\bigg)^{n-e^{-i/40n}n-j} \bigg)^{e^{- i/40n}n}
\\ &\leq 4\sum_{s=4}^{k^{400}}n^s \binom {s^2}{s+1}p^{s+1}
+ 4\sum_{s=k^{200}}^{4n^{0.999}}\binom{n}{s}\binom{s^2}{r} p^r
\\& + n^2\sum_{i=k^{99} n}^{n\log n} \sum_{s=n^{0.99}}^{n/k^3}(2en)^{(k+1)s}\bfrac{2i}{n^2}^{(k+1)s-1} e^{-is/n} + 4\sum_{i=k^{99}n}^{n\log n} \bigg( e^{i/40n+1} (i/n)^ke^{-0.15 i/n} \bigg)^{e^{-i/40n}n}
\\&\leq o(1)+ 4\sum_{s=k^{200}}^{4n^{0.999}} \bfrac{en}{s}^s\bfrac{es^2}{r}^rp^r =o(1)+ 4\sum_{s=k^{200}}^{4n^{0.999}} (enp)^s(eps)^{r-s}=o(1).
\end{align*}
\end{proof}
\end{lemma}
{\em Proof of Theorem\ref{cor:matchings}:}
We will sketch the proof of Theorem \ref{cor:matchings} for the case $kn$ is even. The case $kn$ is odd can be dealt similarly to the corresponding case in Lemma \ref{thm:matchings_b}. We now consider 3 distinct intervals whose union is $\{0,1,...,n(n-1)/2\}$. In all 3 cases we conditioned on the events described by (i)-(iv) of Lemma \ref{lem:density2}.
\noindent \textbf{Case 1:} $0\leq i \leq k^{100}n$. The fact that $F_{i}^{(k+1)}$ is either empty or has order linear in $n$ and it is distributed as $G_{n,m}^{\delta \geq k+1}$ together with Lemma \ref{thm:matchings_b} where we use Theorem \ref{thm:kGreedy2} (with $p=n^{-0.15}$) and Lemma \ref{lem:density2} to verify the underlying conditions imply that w.h.p. $F_i^{(k+1)}\in \mathcal{P}_{k}$ for $0\leq i \leq k^{100}n$.
\noindent \textbf{Case 2:} $k^{100} n\leq i \leq n\log n$. We first reveal the edges of $F_{i/10}$ and then the edges of $F_i$ that are incident to vertices of $F_{i}^{(k+1)}$ that have degree less than $k+1$ in $F_{i/10}$. We let $V_1=V(F_{i/10}^{(k+1)})$ and $R$ be the set of edge in $F_i^{(k+1)}$ that have not been revealed yet. (iv) of Lemma \ref{lem:density2} implies that $|V_1| \geq (1-e^{i/40n})n$. Thereafter since the edges in $E(F_{i})\setminus E(F_{i/10})$ are uniformly distributed among all set of edges spanned by $V(F_i)$, of size $|E(F_{i})\setminus E(F_{i/10})|$, that do not intersect $E(F_{i/10})$ one can show that $R$ consists of at least $0.5i$ edges with probability $1-o(n^{-2})$.
Let $R'\subseteq R$, $v,w\in [n]$ and $M$ be a maximum $k$-matching of $F_{i}^{(k+1)}\setminus R'$ such that $d_M(v), d_M(w)\leq k-1$. In the case that $d_M(v)\leq k-2$ we may let $w=v$. Let $Q_v=Q(v,M,F_{i}^{(k+1)}\setminus R')$ be the set of vertices that are reachable from $v$ via an $M$-alternating path of even length whose first edge does not belong to $M$. Observe that if $z\in N(Q_v)$ then $z$ is incident to some vertex in $Q_v$ via an edge in $M$ and hence $|N(Q_v)| \leq k|Q_v|$. Indeed, assume otherwise. Then there exist $z\in N(Q_v)$ and $u\in Q_v$ such that $\{u,z\} \in E(G)\setminus M$ and $z$ does not have an $M$-neighbor in $Q_v$. The edge $\{u,z\}$ gives rise to an $M$-alternating path $P$ from $v$ to $u$ to $z$.
Now if $d_M(z)=0$ then $P$ is $M$-augmenting contradicting the maximality of $M$. Otherwise there exists some edge $\{z,z'\}\in M$. In such a case the path $P,\{z,z'\},z'$ witnesses the candidacy of $z'$ in $Q_v$ which gives a contradiction.
By considering the $M$-alternating tree rooted at $v$, as done in the proof of Lemma \ref{thm:matchings_b}, we have that $|Q_v|\geq n^{0.99}$. Furthermore, as $|N(Q_v)| \leq k|Q_v|$, Lemma \ref{lem:density2} implies that $|Q_v\cap V_1|\geq n/k^3-e^{-i/40n}n \geq n/k^4.$
For every vertex $u\in Q_v$ the underlying $M$-alternating path $P_{v,u}$ from $v$ to $u$ defines a maximum $k$-matching $M_u=M\triangle E(P_{v,u})$ of $F_{i}^{(k+1)}\setminus R'$ such that $d_{M_u}(u),d_{M_u}(w)\leq k-1$. Now, by using $M_u$ in place of $M$ and $w$ in place of $v$ we can define in a similar manner the set $Q_{v,w}$ (in place of $Q_w$). This gives a set $\mathcal{T}$ of at least $n^2/2k^8$ triples $(u',v',M_{u',v'})$ where $u'\in Q_v \cap V_1$, $v'\in Q_{v,w} \cap V_1$, $M_{u',v'}$ is a maximum $k$-matching of $F_i^{(k+1)}\setminus R'$ and $d_{M_{v',u'}}(v'),d_{M_{v',u'}}(u')\leq k-1$. Thus if $\{u',v'\} \in R'$ then we can augment $M_{u',v'}$ using the edge $\{u',v'\}$.
We then reveal the edges in $R'$ one by one until we reveal an edge $\{u',v'\}$ for which there exists a matching $M'$ with $(u',v',M')\in \mathcal{T}$. We then use $\{u',v'\}$ to augment $M'$. We repeat this process until we either construct a $k$-factor or reveal all the edges in $R$.
The probability that the above process does not produce a perfect $k$-matching is bounded above by
\begin{align*}
\Pr( Bin(0.5i,n^{2}/2k^{8}) \leq kn/2 )=o(n^{-2}).
\end{align*}
\noindent \textbf{Case 3:} $n\log n < i \leq \binom{n}{2}$. Case 2 implies that w.h.p. $F_{n\log n}^{(k+1)} \in \mathcal{P}_k$. Thus, since $F_i\subset F_{i+1}$ for $i\geq 0$ we have,
\begin{align*}
\Pr( \exists i\geq n\log n: F_i^{(k+1)}\notin \mathcal{P}_{k}) \leq \Pr( F_{n\log n} \notin \mathcal{P}_{k})+\Pr( F_{n\log n} \neq F_{n\log n}^{(k+1)})=o(1).
\end{align*}
\qed
|
\section{\label{}}
\section{I. Introduction}
Magnetic solitons with spatial localization and topological protection
have attracted intense attentions in the past decades due to
both academic and industrial interests.
Recently, discussions about chiral magnetic solitons stabilized by the
Dzyaloshinskii-Moriya interaction (DMI) become extraordinarily active.
The most common examples are chiral domain walls (DWs)\cite{Blugel_PRB_2008,EPL_100_57002,ChenG_PRL_2013,ChenG_NatCommun_2017,Linder_PRB_2017,jlu_NJP_2019},
skyrmions/antiskyrmions\cite{Boni_Science_2009,Nagaosa_Nature_2010,Hoffmann_PhysRep_2017,XiB_NanoLett_2019,ZhangXC_JPCM_2020}
and bimerons\cite{Ezawa_PRB_2011,Batista_PRB_2015,Tretiakov_PRB_2019,ShenLC_PRL_2020,ZhangXC_PRB_2020}, etc.
Historically, the bulk DMI (bDMI) was first proposed which should phenomenologically
include an odd term of the spatial gradient
of magnetization as a result of being an antisymmetric exchange coupling\cite{Dzyaloshinsky}.
From the microscopic viewpoint, bDMI comes from the generalization of Anderson's superexchange
theory in the presence of spin-orbit coupling\cite{Moriya}.
Experimentally, it was first proposed to reside in
chiral magnets with non-centrosymmetric B20 structure\cite{Boni_Science_2009,Nagaosa_Nature_2010,Wiesendanger_Nature_2007,Chien_PRL_2012}.
In addtion, the non-collinear magnetic structures observed recently in several Heusler
compounds also suggest its possible existence therein\cite{Meshcheriakova_PRL_2014,Chadov_NatCommun_2016}.
Magnetic heterostructures based on these novel materials with bDMI should open new possibility
of future spintronics devices with chiral magnetic solitons serving as
carriers of information recording and transmission.
In many proposed experiments, magnetic heterostructures are prepared on heavy-metal substrates\cite{Pizzini_JPCM_2015,Pizzini_PRB_2016,Pizzini_EPL_2016,Pizzini_APL_2017,Pizzini_PRB_2019,Jung_srep_2016,Perna_NanoLetters_2018,Pizzini_PRL_2018,Fukami_APL_2019,Choe_PRB_2019,Ohno_nphys_2016,Parkin_NC_2018,Klaui_PRL_2018,Hrabec_Nanotechnology_2019,Lau_AIPAdvances_2019}.
In these setups, the interfacial DMI (iDMI), spin Hall and Rashba spin-orbit torques emerge
thus complicatedly manipulate the motion of chiral DWs in the primary magnetic layer under external currents\cite{Ohno_nphys_2016,Parkin_NC_2018,Klaui_PRL_2018,Hrabec_Nanotechnology_2019,Lau_AIPAdvances_2019,PBH_PRB_2020}.
To explore the effects of pure bDMI on chiral-DW dynamics,
in this work we focus on long and narrow magnetic heterostructures in which chiral magnets
with perpendicular magnetic anisotropy (PMA)
are sandwiched between normal insulating substrates and caplayers.
Once nucleated, chiral DWs can be driven to move longitudinally
by either out-of-plane magnetic fields or in-plane currents.
In principle, both steady and precessional flows can emerge.
However their dividing point, the Walker limit, will be manipulated by the bDMI subtly.
When far beyond the Walker breakdown, the dependence of wall velocity on in-plane magnetic
bias fields is explored.
The resulting curves take parabolic shapes around the compensation point where the total (external plus internal)
in-plane field disappears.
Accordingly, the bDMI strength can be obtained directly from the center shifts of these curves.
The rest of this paper is organized as follows.
In Sec. II the system set up and its modelization are briefly introduced.
Also, the Lagrangian-based collective coordinate model adopted is presented.
Then the chirality of static walls is investigated in Sec. III.
After that, the field-driven and current-driven dynamics of chiral DWs
are systematically studied in Sec. IV and V, respectively.
Finally, concluding remarks are provided in the last section.
\section{II. Model and preparation}
Generally, the magnetic free-energy density $\mathcal{E}_{0}$ of the chiral magnet in a heterostructure
(see Fig. 1) includes four parts:
the exchange part $\mathcal{E}_{\mathrm{ex}}=A(\mathbf{\nabla}\mathbf{m})^2$ ($A$ and $\mathbf{m}$
being the exchange stiffness and magnetization unit vector, respectively),
the Zeeman part $\mathcal{E}_{\mathrm{Z}}=-\mu_0 M_s\mathbf{m}\cdot\mathbf{H}_a$ with
the total external field $\mathbf{H}_a=\mathbf{H}_z+\mathbf{H}_{\perp}$ and the saturation magnetization $M_s$,
the anisotropy part $\mathcal{E}_{\mathrm{ani}}=(\mu_0 M_s^2/2)(-k_{\mathrm{E}}m_z^2+k_{\mathrm{H}}m_y^2)$ where $k_{\mathrm{E}}$ ($k_{\mathrm{H}}$) is the total (crystalline plus shape) anisotropy coefficient in easy (hard) axis (in this work we consider PMA, which is the most common in chiral magnets), and the bDMI contribution $\mathcal{E}_{\mathrm{b}}=D_{\mathrm{b}}\mathbf{m}(\mathbf{r})\cdot[\mathbf{\nabla}\times\mathbf{m}(\mathbf{r})]$
with $D_{\mathrm{b}}$ being the bDMI strength\cite{Bak_JPC_1980}.
The corresponding bDMI-induced effective field then reads
$\mathbf{H}_{\mathrm{b}}(\mathbf{r})=-2D_{\mathrm{b}}(\mathbf{\nabla}\times \mathbf{m})/(\mu_0 M_s)$.
\begin{figure} [htbp]
\centering
\includegraphics[width=0.44\textwidth]{Fig1.eps}
\caption{(Color online) Sketch of a narrow-strip-shaped heterostructure in which a magnet with bDMI and
PMA is prepared on a nonmagnetic substrate.
The magnetization $\mathbf{M}=M_s \mathbf{m}$ can be fully described by its polar and
azimuthal angles ($\theta$ and $\phi$) .
An ``$\uparrow\downarrow$" wall is driven to move in $x-$direction
by either an external in-plane current density $\mathbf{J}_a$ or an out-of-plane field $\mathbf{H}_z$.
In the meantime, an in-plane bias field, $\mathbf{H}_{\perp}=H_{\perp}(\cos\phi_{\perp}\mathbf{e}_x+\sin\phi_{\perp}\mathbf{e}_y)$,
is applied to manipulate the wall's behavior.
}\label{fig1}
\end{figure}
Under out-of-plane magnetic fields and in-plane currents, the Lagrangian $\mathcal{L}$ of this chiral magnet is
\begin{equation}\label{Lagrangian}
\frac{\mathcal{L}}{\mu_0 M_s^2}=-\frac{\cos\theta}{\gamma M_s}\frac{\partial\phi}{\partial t}-\frac{B_J\phi}{\gamma M_s}\frac{\partial\cos\theta}{\partial(\hat{\mathbf{J}}\cdot\mathbf{r})}-\frac{\mathcal{E}_{0}}{\mu_0 M_s^2},
\end{equation}
with the dissipative functional
\begin{equation}\label{Damping_functional}
\frac{\mathcal{F}}{\mu_0 M_s^2}=\frac{\alpha}{2\gamma M_s}\left\{\left[\frac{\partial}{\partial t}-\frac{\beta B_J}{\alpha}\frac{\partial}{\partial(\hat{\mathbf{J}}\cdot\mathbf{r})}\right]\mathbf{m}\right\}^2
\end{equation}
describing the various damping processes\cite{Boulle_PRL_2013,He_EPJB_2013,jlu_PRB_2019,jlu_PRB_2020,jlu_JMMM_2021,jlu_PRB_2021}.
Here $\theta(\mathbf{r},t)$ and $\phi(\mathbf{r},t)$ are the polar and
azimuthal angles of $\mathbf{m}(\mathbf{r},t)$, respectively.
$\alpha$ is the damping constant and $\beta$ is the nonadiabatic spin-transfer torque (STT) coefficient.
$\gamma=\mu_0\gamma_e$ with $\mu_0$ and $\gamma_e$ being the vacuum permeability and electron
gyromagnetic ratio, respectively.
$B_J=\mu_{\mathrm{B}}Pj_a/(e M_s)$, in which $\mu_{\mathrm{B}}$ is the Bohr magneton
and $e(>0)$ is the absolute electron charge.
$j_a$ (with unit vector $\hat{\mathbf{J}}$) is the current density flowing longitudinally
through the chiral magnet with polarization $P$.
The magnetzation dynamics of the chiral magnet is described by the generalized Lagrangian equation,
\begin{equation}\label{EL_equation}
\frac{d}{d t}\left(\frac{\delta\mathcal{L}}{\delta \dot{X}}\right)-\frac{\delta \mathcal{L}}{\delta X}+\frac{\delta\mathcal{F}}{\delta \dot{X}}=0,
\end{equation}
where an overdot means $\partial/\partial t$ and $X$ is any related coordinate.
To explore collective behaviors, we use the Lagrangian-based collective coordinate model
which needs preset ansatz of DWs.
For long and narrow heterostructures, we take the quasi one dimensional (1D) Walker ansatz\cite{Slonczewski_1972,Thiaville_EPL_2005}
\begin{equation}\label{q_phi_Delta_ansatz}
\ln\tan\frac{\vartheta}{2}=\eta\frac{x-q(t)}{\Delta},\quad \phi=\varphi(t)
\end{equation}
in which $q$, $\Delta$, and $\varphi$ are wall center position, wall width and in-plane magnetization angle, respectively.
$\eta=+1(-1)$ is the topological wall charge which corresponds to ``$\uparrow\downarrow(\downarrow\uparrow)$" wall.
For narrow-strip geometry as shown in Fig. 1, the $\mathbf{e}_x$ and $\mathbf{e}_y$ axes respectively
indicate the ``longitudinal (L)" and ``transverse (T)" directions.
For this quasi one-dimensional system, the in-plane component of the effective field from bDMI
becomes $\mathbf{H}_{\mathrm{b}}(x)=2D_{\mathrm{b}}(\nabla_x m_z)\mathbf{e}_y/(\mu_0 M_s)$.
Clearly, $\mathbf{H}_{\mathrm{b}}$ has transverse component proportional to
$\nabla_x m_z$, which is reversed under wall charge reversal $\eta\rightarrow -\eta$.
By setting $X=q$, $\varphi$, $\Delta$ and integrating the resulting
equations along longitudinal direction ($\int_{-\infty}^{+\infty}dx$),
the following closed dynamical equation set is obtained,
\begin{equation}\label{Full_dynamical_equation_bDMI}
\begin{split}
(1+\alpha^2)\dot{\varphi}=&\gamma H_z+(\alpha-\beta)\frac{\eta B_J}{\Delta}-\frac{\alpha\pi\gamma}{2}\left[\frac{k_{\mathrm{H}}M_s}{\pi}\sin 2\varphi\right. \\
&\left. +H_{\perp}\sin(\varphi-\phi_{\perp})+\frac{\eta D_{\mathrm{b}}\cos\varphi}{\mu_0 M_s\Delta}\right], \\
\dot{q}=& -\frac{\eta\Delta}{\alpha}\dot{\varphi}+\frac{\eta\Delta\gamma}{\alpha}H_z-\frac{\beta}{\alpha}B_J, \\
\frac{\alpha\pi}{6\gamma_0}\frac{\dot{\Delta}}{\Delta}=&\frac{2A}{\pi\mu_0 M_s \Delta^2}-\frac{M_s}{\pi}\left(k_{\mathrm{E}}+k_{\mathrm{H}}\sin^2\varphi\right) \\
& +H_{\perp}\cos(\varphi-\phi_{\perp}).
\end{split}
\end{equation}
These are all we need to proceed our investigation.
\section{III. Chirality of static walls}
As the first step, the chirality of static walls selected by bDMI is explored.
When $H_z=0$ and $j_a=0$, the wall keeps static.
Under the Walker profile and in the absence of in-plane bias fields, the total magnetic energy
$E_0/S =\int_{-\infty}^{+\infty}\mathcal{E}_0[\mathbf{M}] dx=2A/\Delta +\mu_0 M_s^2\Delta (k_{\mathrm{E}}+k_{\mathrm{H}}\sin^2\varphi)+\eta\pi D_{\mathrm{b}}\sin\varphi$,
in which $S$ is the cross-sectional area of the chiral magnet.
For static walls, the last equation in Eq. (\ref{Full_dynamical_equation_bDMI}) provides
$\Delta=\Delta_0(1+\kappa\sin^2\varphi)^{-1/2}$
with $\Delta_0=\sqrt{2A/(\mu_0 k_{\mathrm{E}} M_s^2)}$ and $\kappa=k_{\mathrm{H}}/k_{\mathrm{E}}$.
Therefore, one has $E_0/S=2[2A\mu_0 M_s^2(k_\mathrm{E}+k_{\mathrm{H}}\sin^2\varphi)]^{1/2}+\eta\pi D_{\mathrm{b}}\sin\varphi$.
Obviously when bDMI is absent, either $\varphi=0$ or $\varphi=\pi$ provides the minimum of $E_0$
thus the wall takes N\'{e}el-type profile and no chirality is preferred.
However, as $D_{\mathrm{b}}$ appears, the minimization operation of $E_0/S$ provides,
\begin{widetext}
\begin{equation}\label{Static_wall_chirality}
\frac{(E_0)_{\mathrm{min}}}{\pi S D_0}=
\begin{cases}
\sqrt{\left(1+\frac{1}{\kappa}\right)\frac{1}{\kappa}-\left(\frac{D_{\mathrm{b}}}{D_0}\right)^2\frac{1}{\kappa}}\quad & \mathrm{at}\quad \sin\varphi_0=-\eta\mathrm{sgn}(D_{\mathrm{b}})\sqrt{\frac{(D_{\mathrm{b}}/D_0)^2}{(1+\kappa)-\kappa(D_{\mathrm{b}}/D_0)^2}} \quad \mathrm{for} \quad |D_{\mathrm{b}}|\le D_0, \\
\left(1+\frac{1}{\kappa}\right)-\frac{|D_{\mathrm{b}}|}{D_0}\quad & \mathrm{at}\quad \sin\varphi_0=-\eta\mathrm{sgn}(D_{\mathrm{b}}) \quad \mathrm{for} \quad |D_{\mathrm{b}}|>D_0,
\end{cases}
\end{equation}
\end{widetext}
with $D_0\equiv (2 M_s k_{\mathrm{H}}/\pi)\sqrt{2A\mu_0/(k_{\mathrm{E}}+k_{\mathrm{H}})}$
and ``$\mathrm{sgn}$" being the sign function.
This means that for finite bDMI ($|D_{\mathrm{b}}|\le D_0$), the wall profile
is a mixture of N\'{e}el and Bloch types thus shows certain chirality preference through
non-zero $\left\langle m_y \right\rangle$.
While for sufficiently large bDMI ($|D_{\mathrm{b}}|> D_0$), chiral Bloch walls emerge.
This process is shown in Fig. 2 where $\eta=+1$ and $D_{\mathrm{b}}<0$ are taken as an example.
\begin{figure} [htbp]
\centering
\includegraphics[width=0.5\textwidth]{Fig2.eps}
\caption{(Color online) Evolution of (a) minimum total magnetic energy and (b) the corresponding
in-plane angle of chiral DWs as bDMI increases. Four typical ``hard-easy ratio" $\kappa$
are presented. Obviously for a given $\kappa$, there exists a critical bDMI stength $D_0$.
When $|D_{\mathrm{b}}|<D_0$ ($\ge D_0$), the wall shows partial (full) chirality.
}\label{fig2}
\end{figure}
When finite out-of-plane fields and/or in-plane currents are applied, Eq. (\ref{Full_dynamical_equation_bDMI})
implies that there should be two dynamical modes: the steady-flow mode for small driving factors
and the precessional-flow mode for sufficiently large external stimuli.
The dividing point is the ``Walker field" or ``Walker current density", which will be manipulated by the bDMI.
In the following two sections, field- and current-driven dynamics of these chiral DWs
will be respectively investigated.
\section{IV. Field-driven dynamics}
In this section, we focus on the chiral DWs dynamics under pure
out-of-plane driving field $\mathbf{H}_z=H_z\mathbf{e}_z$.
First in the absence of $\mathbf{H}_{\perp}$, the effects of bDMI on
both Walker field and high-field wall behaviors are investigated.
Further manipulations of in-plane bias fields to
chiral walls' velocity under high $H_z$ are then analyzed which provides
applicable procedure of measuring the bDMI strength $D_{\mathrm{b}}$.
\subsection{IV.A Enlarged Walker field}
First we define several quantities for convenience.
They are: the anisotropy field in hard axis $H_{\mathrm{K}}=k_{\mathrm{H}}M_s$,
the original Walker field $H_{\mathrm{W}}^0=\alpha H_{\mathrm{K}}/2$,
the bDMI effective field strength $H_{\mathrm{b}}^0=D_{\mathrm{b}}/(\mu_0 M_s \Delta_0)$,
and the dimensionless coefficient $b=\eta\pi H_{\mathrm{b}}^0/H_{\mathrm{K}}$.
In the absence of $\mathbf{H}_{\perp}$ and $j_a$, the rigid-flow mode requires
$\dot{\varphi}=0$ and $\dot{\Delta}=0$ which leads to
\begin{equation}\label{f_phi_definition}
\frac{H_z}{H_{\mathrm{W}}^0}=f(\varphi)\equiv b\cos\varphi\sqrt{1+\kappa\sin^2\varphi}+\sin 2\varphi.
\end{equation}
For fixed $b$ and $\kappa$, once the maximum absolute value of the function $f$, i.e. $|f(\varphi)|_{\mathrm{max}}$,
is found for $\varphi\in\left[0,2\pi \right)$, the new Walker field then reads
$H_{\mathrm{W}}=H_{\mathrm{W}}^0 |f(\varphi)|_{\mathrm{max}}$.
\hspace*{\fill}
\begin{figure} [htbp]
\centering
\includegraphics[width=0.43\textwidth]{Fig3.eps}
\caption{(Color online) (a) The new Walker field $H_{\mathrm{W}}$ in the presence of bDMI
and (b) the corresponding in-plane angle at which $H_{\mathrm{W}}$ is achieved as functions
of the bDMI effective field strength ($b=\eta\pi H_{\mathrm{b}}^0/H_{\mathrm{K}}$)
and ``hard-easy ratio" $\kappa$. The data are calculated based on the results in Appendix A.
}\label{fig3}
\end{figure}
Before presenting the detailed results, several points need to be clarified:
(i) the sign of $b$ does not affect $|f(\varphi)|_{\mathrm{max}}$ since we always have
$f(b,\varphi)=f(-b,\varphi+\pi)$. Therefore without loss of generality, we set $b>0$.
(ii) if $\kappa$ can be neglected, then after simple algebra we find that
at $\sin\varphi=(-b+\sqrt{b^2+32})/8$ the function $f$ reaches its maximum absolute value
$|f(\varphi,\kappa=0)|_{\mathrm{max}}=\sqrt{(-b^4+80b^2+128)+b(b^2+32)^{3/2}}/8\sqrt{2}$,
which recovers the result in one of our recent works\cite{jlu_NJP_2019}.
However, in real magnetic heterostructures, $\kappa$ is generally the order of 1.
After systematic calculus, the explicit form of $|f(\varphi)|_{\mathrm{max}}$ can be
obtained analytically (see Appendix A).
Based on it, the enlarged Walker field $H_{\mathrm{W}}$ (in the unit of $H_{\mathrm{W}}^0$)
and the corresponding in-plane angle $\varphi_0$ where $H_{\mathrm{W}}$ is achieved
are calculated and plotted in Fig. 3(a) and 3(b), respectively.
As bDMI gradually increases, the Walker field is enlarged and its location,
$\varphi_0$, decreases from $\pi/4$ to 0.
Obviously, the ``hard-easy ratio" $\kappa$ hardly affects $H_{\mathrm{W}}/H_{\mathrm{W}}^0$
however it strongly manipulates its location $\varphi_0$.
When $\kappa \gg 1$ the location of Walker field is nearly unchanged.
This can be easily understood from Eq. (\ref{f_phi_definition}) since now one has
$f(\varphi)\sim (b\sqrt{\kappa}/2+1)\sin 2\varphi$, which achieves its maximum at $\varphi=\pi/4$.
For $|H_z|<H_{\mathrm{W}}$, one should first numerically solve Eq. (\ref{f_phi_definition})
to obtain the in-plane angle $\varphi(H_z)$ thus the wall width $\Delta=\Delta_0(1+\kappa\sin^2\varphi)^{-1/2}$.
Then the wall velocity reads $\dot{q}=\eta\Delta\gamma H_z/\alpha$.
In particular, given a certain chiral magnet with fixed shape (thus fixed $H_{\mathrm{b}}^0$ and $H_{\mathrm{K}}$):
(a) for a given wall topological charge $\eta$, when $\mathbf{H}_z\rightarrow -\mathbf{H}_z$, one has
$\varphi(H_z)\rightarrow \pi-\varphi(H_z)$ leading to unchanged wall width thus opposite wall velocity;
(b) for a given $\mathbf{H}_z$, the $\eta\rightarrow -\eta$ operation results in
$\varphi(H_z)\rightarrow \pi+\varphi(H_z)$. Therefore the wall width is also unchanged and
eventually wall velocity is reversed.
\subsection{IV.B $\langle\dot{q}\rangle$ under $|H_z|\gg H_{\mathrm{W}}$}
When $|H_z|$ exceeds $H_{\mathrm{W}}$, the Walker breakdown takes place
and the wall falls into precessional-flow mode.
Generally the breathing wall width ($\dot{\Delta}\ne 0$) has no explicit expression.
In the simplest approximation, one can still take $\Delta=\Delta_0(1+\kappa\sin^2\varphi)^{-1/2}$.
By integrating the first equation in Eq. (\ref{Full_dynamical_equation_bDMI}) in a full circle, the
precessional period $T_0$ is obtained as
\begin{equation}\label{T_Hz_integration_form}
\bar{\gamma}T_0=\int_{0}^{2\pi}\frac{d\varphi/\sqrt{1+\kappa\sin^2\varphi}}{\frac{H_z-H_{\mathrm{W}}^0\sin 2\varphi}{\sqrt{1+\kappa\sin^2\varphi}}-\frac{\eta\alpha\pi}{2}H_{\mathrm{b}}^0\cos\varphi},
\end{equation}
where $\bar{\gamma}\equiv \gamma/(1+\alpha^2)$ and holds throughout this work.
When bDMI is absent, the integration can be easily calculated.
As bDMI emerges, the situation becomes complicated.
Generally, Eq. (\ref{T_Hz_integration_form}) has no explicit form.
However, in the high-field limit in which $|H_z|\gg \alpha |H_{\mathrm{b}}^0|(H_{\mathrm{W}}^0)$, by using the
approximation $(1-\epsilon)^{-1}\approx 1+\epsilon+\epsilon^2$, Eq. (\ref{T_Hz_integration_form}) gives
\begin{equation}\label{T_Hz_with_2nd_order_terms}
T_0\approx\frac{2\pi}{\bar{\gamma}H_z}\left[1+\frac{\alpha^2\pi^2}{8}\left(1+\frac{\kappa}{4}\right)\left(\frac{H_{\mathrm{b}}^0}{H_z}\right)^2+\frac{\alpha^2}{8}\left(\frac{H_{\mathrm{K}}}{H_z}\right)^2\right].
\end{equation}
Therefore the time-averaged wall velocity is
\begin{equation}\label{v_average_Hz_with_2nd_order_terms}
\langle\dot{q}\rangle_0=\eta\alpha\Delta_0\bar{\gamma}H_z\frac{K_0}{2\pi}\left[1+\frac{\pi^2}{8}\left(1+\frac{\kappa}{4}\right)\left(\frac{H_{\mathrm{b}}^0}{H_z}\right)^2+\frac{1}{8}\left(\frac{H_{\mathrm{K}}}{H_z}\right)^2\right],
\end{equation}
in which $K_0$ is defined in Eq. (\ref{K_0_definition}).
If the velocity dependence on $H_z$ is the main concern,
interestingly Eq. (\ref{v_average_Hz_with_2nd_order_terms}) can be reorganized as
$c(H_z-H_0)^2/H_z+d/H_z$, which is exactly the same as Eq. (9) of our early work in Ref. \cite{jlu_EPL_2009}.
Once again, the correctness of our original roadmap on field-driven DW dynamics is verified.
Alternatively, when we focus on the manipulation of bDMI on walls' drifting velocity, a parabolic $\langle\dot{q}\rangle_0\sim H_{\mathrm{b}}^0$ relationship
emerges which is similar to Eq. (9) in Ref. \cite{Choe_PRB_2019}.
Note that our result here has two advantages:
(a) here the ``$H_{\mathrm{W}}^0\sin 2\varphi$"-term has been preserved thus
leading to the $(H_{\mathrm{K}})^2$ term which is missing in Ref. \cite{Choe_PRB_2019};
(b) the dependence of $\langle\dot{q}\rangle_0$ on the ``hard-easy ratio" $\kappa$ is fully revealed,
which has been totally neglected in most existing literatures.
\subsection{IV.C $\langle\dot{q}\rangle \sim H_{\perp}$ dependence under high $H_z$}
Next we turn on the in-plane bias field
$\mathbf{H}_{\perp}=H_{\perp}(\cos\phi_{\perp}\mathbf{e}_x+\sin\phi_{\perp}\mathbf{e}_y)$.
Generally the Walker field $H_{\mathrm{W}}$ will be further enlarged due to the ``pinning" effect of
$\mathbf{H}_{\perp}$ to the in-plane angle $\varphi$, however the explicit form is mathematically
hopeless due to the mismatch between the symmetries of quadratic anisotropy and linear Zeeman energies.
In this subsection, we focus on $\langle\dot{q}\rangle \sim H_{\perp}$ dependence under
sufficiently large $H_z$ where chiral DWs take precessional motion.
Similarly, in the simplest approximation the wall width is expressed as $\Delta=\Delta_0(1+\kappa\sin^2\varphi)^{-1/2}$.
The period for a full circle is similar with that in Eq. (\ref{T_Hz_integration_form})
except for an additional $-\frac{\alpha\pi}{2}H_{\perp}\sin(\varphi-\phi_{\perp})$ term to the
denominator of integral kernel.
In the following we examine two typical cases, namely longitudinal and transverse in-plane bias fields, to see
the behaviors of $\langle\dot{q}\rangle \sim H_{\perp}$ dependence curve.
For longitudinal in-plane bias fields, $H_{\perp}=H_x$ and $\phi_{\perp}=0$.
For large enough $H_z$, similar calculation provides the new period as
\begin{equation}\label{T_Hz_H_x}
T_x=T_0+\frac{2\pi}{\bar{\gamma} H_z}\frac{\alpha^2\pi^2}{8}\left(\frac{H_x}{H_z}\right)^2,
\end{equation}
thus leads to a new velocity
\begin{equation}\label{v_average_Hz_Hx}
\langle\dot{q}\rangle [H_x]=\langle\dot{q}\rangle_0+\eta\alpha\Delta_0\bar{\gamma} H_z\frac{K_0}{2\pi}\frac{\pi^2}{8}\left(\frac{H_x}{H_z}\right)^2.
\end{equation}
Obviously, for a fixed $H_z$ this $\langle\dot{q}\rangle\sim H_x$ curve
is a parabola going upwards (downwards) with its center locating at $H_x=0$ for $\eta=+1$ ($-1$).
Alternatively for transverse in-plane bias fields, $H_{\perp}=H_y$ and $\phi_{\perp}=\pi/2$.
Similar calculation provides the high-$H_z$ period as
\begin{equation}\label{T_Hz_H_y}
T_y=T_0+\frac{2\pi}{\bar{\gamma} H_z}\frac{\alpha^2\pi^2}{8}\left[\left(\frac{H_y}{H_z}\right)^2-\frac{\eta K_0}{8\pi}\left(1+\frac{\kappa}{4}\right)\frac{H_y}{H_z}\frac{H_{\mathrm{b}}^0}{H_z}\right].
\end{equation}
The resulting averaged wall velocity is
\begin{equation}\label{v_average_Hz_Hy}
\begin{split}
\langle\dot{q}\rangle [H_y]=& \langle\dot{q}\rangle_0+\eta\alpha\Delta_0\bar{\gamma} H_z\frac{K_0}{2\pi}\frac{\pi^2}{8}\left[\left(\frac{H_y-\delta H_y}{H_z}\right)^2 \right. \\
& \left. -\left(1+\frac{\kappa}{4}\right)^2\left(\frac{K_0}{2\pi}\right)^2\left(\frac{H_{\mathrm{b}}^0}{H_z}\right)^2 \right],
\end{split}
\end{equation}
with $\delta H_y=\eta\left(1+\frac{\kappa}{4}\right)\frac{K_0}{2\pi}H_{\mathrm{b}}^0$.
Therefore for a fixed $H_z$ and $\eta=+1$ ($-1$), the $\langle\dot{q}\rangle\sim H_y$ curve
becomes a parabola going upwards (downwards) with its center locating at $H_y=\delta H_y$.
For a given magnetic heterostructure with chiral-magnet central layer, the ``hard-easy ratio" $\kappa$
can be calculated. For a chiral DW with certain wall charge $\eta$, by measuring the
$\langle\dot{q}\rangle\sim H_y$ dependence one can extract out the bDMI strength $D_{\mathrm{b}}$
from the location of parabola center.
Note that in our recent work in Ref. \cite{jlu_PRB_2020}, we have constructed
a general scheme of identifying and quantifying
bDMI in magnetic heterostructures via precessional flow of chiral DWs under in-plane transverse bias fields.
In that scheme, the linearization of trigonometric functions does not lose too many details of the entire circle
since DWs precess almost evenly under large enough out-of-plane driving fields.
However the ``hard-easy ratio" $\kappa$ is totally neglected since generally people use
the static width $\Delta_0$ instead of the real complicated breathing one.
This simplification holds for not too narrow magnetic central layers with strong PMA.
However for those with relatively weak PMA and shrinking width, the importance of $\kappa$
will increase significantly.
This effect manifests itself as the additional factor $\left(1+\frac{\kappa}{4}\right)\frac{K_0}{2\pi}$
in our new $\delta H_y$.
We will revisit this issue in the discussion section later.
\section{V. Current-driven dynamics}
In this section, we turn to in-plane current-driven dynamics of chiral DWs ($H_z=0$ and $j_a\ne 0$).
Parallel deductions will be performed compared with field-driven case in the above section.
Effects of bDMI to both Walker current density and wall behaviors under high currents will be explored.
\subsection{V.A Enlarged Walker current density}
Pioneer works provide us that in the absence of bDMI, the in-plane Walker current density
is $j_{\mathrm{W}}^0=\frac{\Delta_0\gamma H_{\mathrm{W}}^0}{|\alpha-\beta|}\frac{e M_s}{\mu_{\mathrm{B}} P}$.
Without $\mathbf{H}_{\perp}$, the existence condition of rigid-flow mode ($\dot{\varphi}=0$ and $\dot{\Delta}=0$)
turns the first equation in Eq. (\ref{Full_dynamical_equation_bDMI}) to
\begin{equation}\label{g_phi_definition}
\eta\mathrm{sgn}(\alpha-\beta)\frac{j_a}{j_{\mathrm{W}}^0}=g(\varphi)\equiv b\cos\varphi+\frac{\sin 2\varphi}{\sqrt{1+\kappa\sin^2\varphi}}.
\end{equation}
Similarly, for fixed $b$ and $\kappa$ when the maximum absolute value of the function $g$, i.e. $|g(\varphi)|_{\mathrm{max}}$,
is found for $\varphi\in\left[0,2\pi \right)$, the new Walker current density is then obtained as
$j_{\mathrm{W}}=j_{\mathrm{W}}^0 |g(\varphi)|_{\mathrm{max}}$.
Also, the sign of $b$ is irrelevant to $|g(\varphi)|_{\mathrm{max}}$
since $g(b,\varphi)=g(-b,\varphi+\pi)$ always holds.
Therefore we can set $b>0$ to make the analysis simple.
For neglectable $\kappa$, $g(\varphi)\equiv f(\varphi,\kappa=0)$
thus achieves the same maximum as $|f(\varphi,\kappa=0)|_{\mathrm{max}}$ at the same location.
For finite $\kappa$, after defining $x\equiv \sin\varphi$ and introducing
a new function $\mathcal{G}(x)\equiv [g(\varphi)]^2$, one thus has
$|g(\varphi)|_{\mathrm{max}}=\sqrt{|\mathcal{G}(\varphi)|_{\mathrm{max}}}$.
The extremum condition, $d\mathcal{G}/dx=0$, can be transformed into a quartic equation of $x^2$,
whose exact solution is too complicated to write out explicitly.
Alternatively, by numerically searching the maximum of $\mathcal{G}(x)$ for $x\in [-1,1]$,
the new Walker current density $j_{\mathrm{W}}$ (in the unit of $j_{\mathrm{W}}^0$) and the
corresponding $\varphi_0$ where $j_{\mathrm{W}}$ is reached are depicted in Fig. 4(a)
and 4(b), respectively.
For fixed $\kappa$, along with the increase of bDMI $j_{\mathrm{W}}$ is considerably enlarged and
it location $\varphi_0$ decreases from $\pi/4$ to 0 since the first term in Eq. (\ref{g_phi_definition})
becomes dominant.
On the other hand, $\kappa$ hardly changes $j_{\mathrm{W}}$ but strongly affects $\varphi_0$,
even when bDMI is small.
For fixed bDMI when $\kappa\gg 1$ the location $\varphi_0$ rapidly decreases from $\pi/4$ to 0.
This comes from the fact that now Eq. (\ref{g_phi_definition}) provides
$g(\varphi)\sim (b+2/\sqrt{\kappa})\cos\varphi$ which achieve maximum absolute value at
$\varphi_0=0$.
In summary, the huge difference between Fig. 3(b) and 4(b) comes from the subtle distinction
between Eqs. (\ref{f_phi_definition}) and (\ref{g_phi_definition}), especially for finite $\kappa$.
\begin{figure} [htbp]
\centering
\includegraphics[width=0.43\textwidth]{Fig4.eps}
\caption{(Color online) (a) New Walker current density $J_{\mathrm{W}}$ in the unit of
$j_{\mathrm{W}}^0=\frac{\Delta_0\gamma H_{\mathrm{W}}^0}{|\alpha-\beta|}\frac{e M_s}{\mu_{\mathrm{B}} P}$ and (b) the corresponding in-plane angle under in-plane driving current $j_a\mathbf{e}_x$.
All data come from direct numerical searching of the maximum of function $\mathcal{G}(x=\sin\varphi)$
in $(b,\kappa)-$space. The solid curve in (b) comes from $\varphi_0=\arcsin\tilde{x}$ in
Eq. (\ref{b2k_4_cubic_solution}), while that in (a) is $\sqrt{\mathcal{G}(\tilde{x})}$.
}\label{fig4}
\end{figure}
An interesting special case is ``$b^2\kappa=4$", under which
the quartic equation of $x^2$ (coming from $d\mathcal{G}/dx=0$)
is reduced to a cubic equation: ``$\kappa (x^2)^3+(1-2\kappa)(x^2)^2-(4+1/\kappa) x^2 +1=0$".
It's solution
\begin{equation}\label{b2k_4_cubic_solution}
\tilde{x}=\left[\frac{2\kappa-1}{3\kappa}+\frac{4(1+\kappa)}{3\kappa}\cos\frac{\theta+\pi}{3}\right]^{\frac{1}{2}}, \; \theta=\cos^{-1}\frac{\frac{11}{16}-\kappa}{1+\kappa},
\end{equation}
corresponds to the maximum of $\mathcal{G}(x)$.
The resulting new Walker current density is
$j_{\mathrm{W}}=j_{\mathrm{W}}^0\sqrt{\mathcal{G}(\tilde{x})}$, which has been plotted in Fig. 4(a)
by a solid curve.
Correspondingly, the in-plane angle $\varphi_0=\arcsin\tilde{x}$ is depicted in Fig. 4(b).
The high coincidence between numerics and analytics of this special case provide strong cross-validation
for both processing methods.
At last for $|j_a|\le j_{\mathrm{W}}$, the wall takes steady-flow mode
with velocity $\dot{q}=-\frac{\beta}{\alpha} B_J$.
This means that bDMI does not change the wall's mobility under in-plane currents for steady flows.
\subsection{V.B $\langle\dot{q}\rangle$ under $|j_a|\gg j_{\mathrm{W}}$}
As $|j_a|$ exceeds $j_{\mathrm{W}}$, steady-flow mode fails and the wall undergoes precessional flow.
Under similar approximation and integration over a full circle as in Sec. IV.B,
the precession period $T'_0$ is
\begin{equation}\label{T_ja_integration_form}
T'_0=\frac{1}{\bar{\gamma} H_{\mathrm{W}}^0 }\int_{0}^{2\pi}\frac{d\varphi/\sqrt{1+\kappa\sin^2\varphi}}{\sigma\frac{j_a}{j_{\mathrm{W}}^0}-\eta\frac{\pi H_{\mathrm{b}}^0}{H_{\mathrm{K}}}\cos\varphi-\frac{\sin 2\varphi}{\sqrt{1+\kappa\sin^2\varphi}}},
\end{equation}
in which $\sigma\equiv \eta\cdot\mathrm{sgn}(\alpha-\beta)$ and a prime in this section
means quantities in current-driven case.
For high-current limit, after preserving the second-order small quantities we have
\begin{equation}\label{T_ja_with_2nd_order_terms}
T'_0\approx\frac{\sigma}{\bar{\gamma} H_{\mathrm{W}}^0 }\frac{j_{\mathrm{W}}^0}{j_a}\left\{K_0 + \left[\frac{K_0}{2}\left(\frac{\pi H_{\mathrm{b}}^0}{H_{\mathrm{K}}}\right)^2+I_1\right]\left(\frac{j_{\mathrm{W}}^0}{j_a}\right)^2\right\},
\end{equation}
in which the integral $I_1(\kappa)$ is defined in Eq. (\ref{I_1_definition}).
Thus the time-averaged wall velocity is
\begin{equation}\label{v_average_ja_with_2nd_order_terms}
\langle\dot{q}\rangle'_0=-\frac{1+\alpha\beta}{1+\alpha^2}B_J+\frac{(\alpha-\beta)B_J}{\alpha(1+\alpha^2)}
\left[\frac{1}{2}\left(\frac{\pi H_{\mathrm{b}}^0}{H_{\mathrm{K}}}\right)^2+\frac{I_1}{K_0}\right]\left(\frac{j_{\mathrm{W}}^0}{j_a}\right)^2.
\end{equation}
If we focus on the velocity dependence on $j_a$ (thus $B_J$), interestingly even in the
absence of bDMI, our result provides an additional $(j_a)^{-1}$ term except for the well-known
first term on the right hand of Eq. (\ref{v_average_ja_with_2nd_order_terms}).
The appearance of bDMI strengthens this effect.
On the other hand, this term helps to reorganize the $\langle\dot{q}\rangle'_0\sim j_a$ relationship
as $c'(j_a-j_a^0)/j_a+d'/j_a$, which is similar to its counterpart in field-driven
case [see Eq. (\ref{v_average_Hz_with_2nd_order_terms}) and related discussions].
\subsection{V.C $\langle\dot{q}\rangle \sim H_{\perp}$ dependence under large $j_a$}
The in-plane bias field $\mathbf{H}_{\perp}$ is once again turned on to manipulate chiral DWs' dynamics.
Just similar to what we have discussed in Sec. IV.C, the Waker current density will inevitably be affected by $\mathbf{H}_{\perp}$,
however the exact dependence is hard to obtain.
Now we concentrate on the case in which the in-plane current $j_a$ is sufficiently large
that the wall already falls into the precessional-flow mode with
the breathing width $\Delta=\Delta_0(1+\kappa\sin^2\varphi)^{-1/2}$.
The period for a full circle is similar to Eq. (\ref{T_ja_integration_form})
except for an additional ``$-\frac{\pi H_{\perp}}{H_{\mathrm{K}}}\frac{\sin(\varphi-\phi_{\perp})}{\sqrt{1+\kappa\sin^2\varphi}}$" term
to the denominator of the integral kernel.
In the first example, we focus on longitudinal in-plane bias fields ($H_{\perp}=H_x$ and $\phi_{\perp}=0$).
Similar calculation shows that the new period is larger than $T'_0$ by an additional term proportional to $(j_a)^{-3}$, that is,
\begin{equation}\label{T_ja_H_x}
T'_x=T'_0+\frac{\sigma I_2}{\bar{\gamma} H_{\mathrm{W}}^0} \left(\frac{\pi H_x}{H_{\mathrm{K}}}\right)^2 \left(\frac{j_{\mathrm{W}}^0}{j_a}\right)^3,
\end{equation}
in which the integral $I_2(\kappa)$ is defined in Eq. (\ref{I_2_definition}). This leads to a new velocity
\begin{equation}\label{v_average_ja_Hx}
\langle\dot{q}\rangle' [H_x]=\langle\dot{q}\rangle'_0+\frac{\alpha-\beta}{\alpha(1+\alpha^2)}
\left(\frac{\pi H_x}{H_{\mathrm{K}}}\right)^2 \frac{I_2}{K_0}\left(\frac{j_{\mathrm{W}}^0}{j_a}\right)^2 B_J.
\end{equation}
For fixed $H_x$, the extra term in the above equation provides extra contribution to the $j_a^{-1}-$term
in wall's velocity [see Eq. (\ref{v_average_ja_with_2nd_order_terms})].
However for fixed $j_a$, the $\langle\dot{q}\rangle' \sim H_x$ curve is a parabola with its
center locating at $H_x=0$ and its opening direction depends on the relative strength of $\alpha$ and $\beta$.
Next we turn to transverse in-plane bias fields ($H_{\perp}=H_y$, $\phi_{\perp}=\pi/2$).
Similar calculation yields the large-$j_a$ period as
\begin{equation}\label{T_ja_H_y}
T'_y=T'_0+\frac{\sigma}{\bar{\gamma} H_{\mathrm{W}}^0} \left[\left(\frac{\pi H_y}{H_{\mathrm{K}}}\right)^2 I_3 -2\frac{\pi H_y}{H_{\mathrm{K}}}\frac{\eta\pi H_{\mathrm{b}}^0}{H_{\mathrm{K}}} I_4 \right] \left(\frac{j_{\mathrm{W}}^0}{j_a}\right)^3,
\end{equation}
where the integrals $I_{3,4}(\kappa)$ have also been defined in Eq. (\ref{I_2_definition}).
The resulting averaged wall velocity is then
\begin{equation}\label{v_average_ja_Hy}
\begin{split}
\langle\dot{q}\rangle' [H_y]=& \langle\dot{q}\rangle'_0+\frac{\alpha-\beta}{\alpha(1+\alpha^2)}\left\{\frac{\pi^2 I_3}{K_0}\left(\frac{H_y-\delta H'_y}{H_{\mathrm{K}}}\right)^2 \right. \\
& \quad \left. -\left(\frac{\pi H_{\mathrm{b}}^0}{H_{\mathrm{K}}}\right)^2\frac{(I_4)^2}{K_0 I_3} \right\}\left(\frac{j_{\mathrm{W}}^0}{j_a}\right)^2 B_J,
\end{split}
\end{equation}
with $\delta H'_y=\eta(I_4/I_3) H_{\mathrm{b}}^0$.
Now the $\langle\dot{q}\rangle \sim H_y$ curve
becomes a parabola with its center locating at $H_y=\delta H'_y$.
Also, its opening direction has nothing to do with the wall's topological charge,
but only depends on $\mathrm{sgn}(\alpha-\beta)$.
For a given magnetic heterostructure with chiral-magnet central layer,
the ``hard-easy ratio" $\kappa$ (thus $I_3$, $I_4$) can be calculated.
Similar to field-driven case, for a chiral DW with a certain wall charge $\eta$, by measuring the
$\langle\dot{q}\rangle' \sim H_y$ dependence one can also extract out
the bDMI strength $D_{\mathrm{b}}$ from the location of parabola center.
The data from field- and current-driven cases can be cross-checked to confirm the value of bDMI
strength in the underlying magnetic heterostructure.
\section{VI. Discussions}
First of all, we want to address the feasibility of the classical Walker ansatz
in Eq. (\ref{q_phi_Delta_ansatz}) adopted in this work.
In perfect strip-shaped heterostructures, early studies show that DMIs can induce the wall tiling
$\chi$ with respect to $+\mathbf{e}_y$\cite{Boulle_PRL_2013}.
However for real heterostructures with disorders, the walls take complex meandering shape with its magnetization
vector rotating several times along the wall thus show inconspicuous tilting \cite{Pizzini_EPL_2016,Pizzini_PRB_2016,Marrows_PRB_2018}.
This leads to negligible longitudinal component of $\mathbf{H}_{\mathrm{b}}$
which is proportional to $\nabla_y m_z$,
hence explains the feasibility of using 1D Walker ansatz.
Another neglected effect is the magnetization canting $\theta_{\infty}$\cite{jlu_PRB_2016} in domains
by in-plane fields either from intrinsic bDMI or from external exertion.
When both $\chi$ and $\theta_{\infty}$ are considered, a more complicated wall ansatz
\begin{equation}\label{q_phi_chi_Delta_ansatz}
\tan\frac{\vartheta}{2}=\frac{e^R+\tan(\theta_{\infty}/2)}{1+e^R \tan(\theta_{\infty}/2)},\quad \phi=\varphi(t)
\end{equation}
can be proposed with $R\equiv \eta[(x-q)\cos\chi+y\sin\chi]/\Delta$.
By integrating the resulting dynamical equations over infinite strip length and finite width,
the so-called ``$q-\varphi-\chi$"\cite{Boulle_PRL_2013} or ``$q-\varphi-\chi-\Delta$"\cite{Nasseri_JMMM_2017,Nasseri_JMMM_2018} models, emerge.
However they are too complicated to provide clear physical pictures in analyzing chiral wall dynamics.
Second, in steady-flow mode the wall width has explicit expression.
While in precessional-flow mode the wall begins to breath, leading to a time-dependent wall width.
The simple approximation in Sec. IV and V, i.e. $\Delta=\Delta_0(1+\kappa\sin^2\varphi)^{-1/2}$,
is directly fetched from the steady-flow mode and is not the exact solution of $\Delta(t)$.
However in most cases the wall does not change too much in a full circle ($|\dot{\Delta}/\Delta|\ll 1$).
Therefore it can be regarded as a good approximate description of the actual wall width.
Third, under sufficiently large out-of-plane fields or in-plane currents, the chiral walls fall into
the precessional-flow mode. In this work, during a full circle ($0\le \varphi <2\pi$)
the ``Taylor expansion" method
is adopted to get higher order correction (here we preserve to the second order).
Also, the role of ``hard-easy ratio" $\kappa$ is fully revealed,
especially in the center offsets of $\langle\dot{q}\rangle [H_y]$ and $\langle\dot{q}\rangle' [H_y]$ parabolas.
This strategy holds under the assumption that magnetic anisotropic, in-plane bias and bDMI effective fields
are all small compared with out-of-plane driving fields or in-plane currents (through $j_{\mathrm{W}}^0$
which is proportional to $H_{\mathrm{W}}^0$).
Generally, this condition is not hard to achieve thus makes the corresponding measurements feasible.
However for chiral magnets with sufficient large bDMI, to achieve the full parabola quite large
driving fields or currents have to be exerted which may make the structure of chiral domain walls unstable.
This possibility limits the application of our theories presented above.
Alternatively, in our recent work (see Ref. \cite{jlu_PRB_2020}) another approximation
has been adopted: for large enough $H_z$ or $j_a$,
DWs precess almost evenly in a full circle.
After linearization of trigonometric functions in dynamical equations,
the average wall velocity within $\varphi\in[0,1)$ is used to mimic the one over a full circle.
Regarding this approach, we would like to present several comments:
(i) The wall width is always taken as the static one, $\Delta_0$, which is $\kappa$-independent.
This may not affect too much for wide magnetic heterostructures, however in relatively narrow
ones the effects of $\kappa$ could get stronger.
(ii) This approach is not subject to the limitation that all other fields should be small compared with
out-of-plane driving fields or in-plane currents, however it suffers from the
constraint that analytics can only hold not too far away from the dome summits or canyon bottoms.
Therefore, it can not explain the further evolution of wall velocity when in-plane bias fields
go faraway from the centers of domes or canyons.
(iii) After series expansions, an additional absolute linear term emerges
which is the direct consequence of linearization operation.
For example, to compare with Eqs. (\ref{v_average_Hz_with_2nd_order_terms}) and (\ref{v_average_Hz_Hy})
in the present work, the field-driven wall velocity $v_{\mathrm{b,T}}$ in Ref. \cite{jlu_PRB_2020}
can be expanded as
\begin{equation}\label{v_b_T_expansion}
\frac{v_{\mathrm{b,T}}}{\eta\alpha\Delta_0\bar{\gamma} H_z}=1+\frac{\pi}{4\alpha}|\Gamma|+\frac{\pi^2}{12}|\Gamma|^2,
\end{equation}
with $\Gamma\equiv \frac{H_y}{H_z}-\eta\frac{H_{\mathrm{b}}^0}{H_z}-\frac{2}{\pi}\frac{H_{\mathrm{K}}}{H_z}$.
Therefore the domes or canyons in Ref. \cite{jlu_PRB_2020} are generally not parabolas but cones
around the dome summits or canyon bottoms.
However, considering the fact that $\eta\left(1+\frac{\kappa}{4}\right)$ and $I_4/I_3$ approach 1
when $\kappa\rightarrow 0$ and $H_{\mathrm{K}}/H_z$ becomes neglectable for not-too-narrow geometries,
the correctness of both two analytical schemes can be cross-verified.
\section{acknowledgments}
M.L. acknowledges support from the National Natural Science Foundation of China (Grant No. 11947023).
B.X. is supported by the National Natural Science Foundation of China (Grant No. 11774300).
|
\section{Introduction}\label{sec:introduction}
In 1989, Bombieri and Pila developed a very fruitful method to count integral and rational points on various types of geometric objects in ${\mathbb R}^2$, see \cite{Bombieri-Pila}. This method is now called the determinant method and is especially well-suited for proving uniform upper bounds on points of bounded height. For a subset $X\subseteq {\mathbb R}^n$, recall that the counting function is defined as
\[
N(X; B) = \{ x \in X\cap {\mathbb Q} \mid H(x)\leq B\},
\]
where $H$ is the usual naive height. For example, if $f: {\mathbb R}\to {\mathbb R}$ is a transcendental function and $X$ denotes its graph, Bombieri and Pila proved that, for any $\varepsilon>0$, there is a constant $c_\varepsilon$ such that
\[
N(X; B)\leq c_\varepsilon B^\varepsilon.
\]
A vast generalization of this result is the celebrated Pila--Wilkie theorem \cite{PW}. It states that, if $X\subseteq {\mathbb R}^n$ is definable in an o-minimal structure then, for any $\varepsilon> 0$, there exists a constant $c_\varepsilon$ such that
\[
N(X^{\mathrm{trans}} ; B)\leq c_\varepsilon B^\varepsilon.
\]
Here $X^{\mathrm{trans}}$ denotes the transcendental part of $X$, obtained from $X$ by removing all positive-dimensional semialgebraic subsets of $X$. The proof of this result, as well as the original result by Bombieri--Pila, is based heavily on the existence of $C^r$-parametrizations. Such parametrizations were originally developed by Gromov and Yomdin \cite{YY, YY2, gromov}.
In the non-archimedean setting, such parametrization results were first proved in \cite{CCL-PW}, and a corresponding Pila--Wilkie theorem was obtained for subanalytic sets in ${\mathbb Q}_p$. These results were further improved in \cite{CFL}, where a uniform version of this Pila--Wilkie result was proved for subanalytic sets in ${\mathbb Q}_p$ and ${\mathbb F}_p((t))$.
Recently, a new notion of tame geometry for non-archimedean fields was developed by Cluckers, Halupczok, Rideau-Kikuchi and Vermeulen in \cite{CHR} and \cite{CHRV}, and termed Hensel minimality. This tameness generalizes several other well-studied notions, such as the subanalytic structures on ${\mathbb Q}_p$ and ${\mathbb C}((t))$. It is natural to explore Pila--Wilkie type results in this more general context.
We study point-counting in valued fields and prove a Pila--Wilkie type result for transcendental curves definable in a Hensel minimal structure, generalizing results from \cite{CCL-PW} and \cite{CFL}. A new phenomenon with a new notion of dimension over the residue field appears, compared to \cite{CCL-PW} and \cite{CFL}. More precisely, let $K$ be a henselian valued field and let $X$ be a subset of $K^n$ for some $n\geq 0$. Then we define a notion of rational points of bounded height on $X$ and prove a Pila--Wilkie theorem if $X$ is a transcendental curve definable in a Hensel minimal structure on $K$. In \cite{BCN}, Binyamini, Cluckers and Novikov showed that if we take $K={\mathbb C}((t))$ equipped with the subanalytic language, and if $X$ is a definable set in $K^n$, then the set of points of height at most $s$ on $X^{\mathrm{trans}}$ is finite for any $s$. However, in the more general context of Hensel minimality this is no longer true, and we give several examples showcasing this fact. We define a new way of counting rational points of bounded height in this setting, called the \emph{counting dimension} of $X$. It is with this counting dimension that we prove our main result. Let us also mention that the main obstacle in extending these results to higher dimensions is that these parametrization results are only known for curves under Hensel minimality. Especially the higher-dimensional geometry under Hensel minimality has to develop further.
\subsection*{Structure} This article starts by introducing our main definitions in section \ref{sec: main results} of rational points of bounded height and counting dimension as well as stating our main results. In section \ref{sec:notations and background} we recall some relevant material, especially on Hensel minimality and $T_r$-approximation. In section \ref{sec:counting} we focus on transcendental curves and prove our counting theorem. Finally, in section \ref{sec:importance of counting dimension} we propose a new conjecture and show the importance of working with the counting dimension, by exhibiting three examples of transcendental curves with infinitely many points of bounded height.
\subsection*{Acknowledgments} The authors would like to thank Raf Cluckers for suggesting this topic and the various discussions surrounding it.
\section{Main results}\label{sec: main results}
\subsection{Counting in valued fields}\label{sec: counting in valued fields}
Let us be a bit more specific about counting rational points on non-archimedean sets. Let $K$ be a non-archimedean valued field equipped with an ${\mathcal L}$-structure, for some language ${\mathcal L}$ expanding the language of valued fields ${\mathcal L}_{\mathrm{val}} = \{0,1, +, \cdot, {\mathcal O}_K\}$. For $A\subset K$, a set $X\subset K^n$ is called $A$-definable if it is definable in ${\mathcal L}$, using parameters only from $A$. We call a set definable if it is $K$-definable.
Let $X$ be a definable subset of $K^n$. We use a new form of dimension to capture the size of the rational points on $X$, which is related to counting over the residue field. Recall that a \emph{pseudo-uniformizer} $t$ of $K$ is any element $t$ in $K$ with $|t|<1, t\neq 0$.
\begin{defn}
Let $K$ be non-archimedean valued field equipped with an ${\mathcal L}$-structure, for some language ${\mathcal L}$ expanding the language of valued fields. Fix a pseudo-uniformizer $t$ of $K$. Let $N,d,e$ be non-negative integers and let $X$ be a subset of $K^n$. We say that $X$ has \emph{counting dimension at most $(N,d,e)$ (for ${\mathcal L}$)} if there exists a definable function
$$
f : K^n\to {\mathcal O}_K^{d}
$$
such that the map ${{\rm proj}}^d_e\circ f$ has finite fibers on $X$ of size at most $N$, where
$$
{{\rm proj}}^d_e : {\mathcal O}_K^d\to ({\mathcal O}_K/(t^e))^d
$$
is the componentwise reduction of ${\mathcal O}_K$ modulo $t^e$.
\end{defn}
\begin{notn}
We use the notation $\#\text{-}\dim (X)\leq (N,d,e)$ to mean that the counting dimension of $X$ is at most $(N,d,e)$.
\end{notn}
This definition depends on the choice of pseudo-uniformizer $t$ and on the language ${\mathcal L}$. However, we suppress these in notation and always assume a fixed choice of $t$ and ${\mathcal L}$. If $e$ is not an integer, then we say that a set has counting dimension at most $(N,d,e)$ if it has counting dimension at most $(N,d,\lfloor e \rfloor)$.
\begin{remark}\label{rem:counting-dim_discretevalued}
Suppose that $K$ is discretely valued and that the residue field of $K$ is finite, say, with $q$ elements. Let $t$ be a uniformizer of $K$. Then a set $X\subset K^n$ which has counting dimension at most $(N,d,e)$ contains no more than $Nq^{de}$ points. This motivates our choice of terminology of \emph{counting dimension} and its counting aspects related to the size of the residue field.
\end{remark}
From now on, we will assume that $K$ is of equicharacteristic zero. Then there always exists a lift $\tilde{k}\subset K$ of the residue field $k$, \emph{i.e.}\ a subfield of $K$ which maps bijectively to $k$ under the reduction map. Fix also a \emph{pseudo-uniformizer} $t\in K$. For a positive integer $s$, define
\[
\tilde{k}[t]_s = \{\sum_{i=0}^s a_it^i\mid a_i\in \tilde{k}\}.
\]
If $X$ is a subset of $K^n$ we define $X_s$ to be $X\cap \tilde{k}[t]_s^n$. We call $X_s$ the \emph{set of rational points of height at most $s$ on $X$}. The prototypical example to keep in mind is $K=k((t))$ for some characteristic zero field $k$. Here $\tilde{k}[t]_s$ is simply the set of polynomials over $k$ of degree at most $s$. The set $X_s$ is considered as a suitable analogue for the set of rational points of bounded height on $X$, where the height is captured by $s$. We will be interested in bounding the counting dimension of $X_s$, where $X$ is a definable subset of $K^n$.
By a \emph{curve $C\subset K^n$} we mean a set for which there exist a linear projection $p:K^n\to K$ such that $p(C)$ is infinite and such that $p$ has finite fibers on $C$. If the theory of $K$ in ${\mathcal L}$ is 1-h-minimal, see \cite[Def.\,2.3.3]{CHR} or section \ref{sec: henselminimality} below, then by dimension theory \cite[Thm.\,5.3.4]{CHR}, a definable curve in $K^n$ is the same as a set of dimension 1. Call a curve $C\subset K^n$ \emph{transcendental} if every algebraic curve in $K^n$ has finite intersection with $C$.
Let $K$ be a henselian valued field equipped with an ${\mathcal L}$-structure and assume that $\operatorname{Th}_{\mathcal L}(K)$ is 1-h-minimal. Then we say that $\acl=\dcl$ for $K$ if algebraic Skolem functions exist in every model of $\operatorname{Th}_{\mathcal L}(K)$. By this we mean that for any model $K'$ of $\operatorname{Th}_{\mathcal L}(K)$ and any subset $A\subset K'$ we have that $\acl_{K'}(A) = \dcl_{K'}(A)$. Equivalently, for any positive integers $n$ and $m$, if $X\subset K^{n+1}$ is a $\emptyset$-definable set such that the coordinate projection $p: X\subset K^{n+1} \to K^n$ has fibres of cardinality precisely $m>0$, then there exists a $\emptyset$-definable function $f: K^n\to K$ whose graph is contained in $X$.
Our main result is the following analogue of the Pila--Wilkie theorem on the counting dimension of transcendental curves definable in Hensel minimal structures.
\begin{thm}\label{thm:CC-c-dim}
Suppose that $K$ is a henselian valued field of equicharacteristic $0$ equipped with a $1$-h-minimal structure. Fix a pseudo-uniformizer $t$ and a lift of the residue field $\tilde{k}$. Suppose that $\acl=\dcl$ in $K$ and that the subgroup of $b$-th powers in $k^\times$ has finite index, for some integer $b>1$. Let $C\subset {\mathcal O}_K^n$ be a transcendental definable curve. Then for each $\varepsilon>0$ there is a constant $N$ such that for each integer $s\geq 0$
\[
\#\text{-}\dim (C_s) \leq (N,1,1 + \varepsilon\cdot s).
\]
Furthermore, the constant $N$ can be taken to hold uniformly throughout all transcendental members of a given definable family of definable curves.
\end{thm}
The key aspect here is the slow growth of the counting dimension, similar to the Pila--Wilkie theorem in the o-minimal setting \cite[Thm.\,1.10]{PW}. The ideas of the proof are as follows. We use the notion of $T_r$-parametrizations, which form a suitable analogue for $C^r$-parametrizations in the non-archimedean setting.
\begin{enumerate}
\item We apply cell decomposition to find a $T_1$-parametrization of $C$. The existence of such a cell decomposition follows from 1-h-minimality under the extra assumption that $\acl=\dcl$ in $K$, see \cite[Thm.\,5.2.4 Add.\,5]{CHR} or section \ref{sec: henselminimality} below.
\item Using power-substitutions, we may even assume that we have a $T_r$-parametrization. For this, we need that the subgroup of $b$-th powers of $k^\times$ has a finite index in $k^\times$. Here we use 1-h-minimality again, through the use of the Jacobian property and Taylor approximation results, see \cite[Thm.\, 3.2.2, Cor.\, 3.2.7]{CHR} or section \ref{sec: henselminimality} below.
\item We then use an adaptation of the Bombieri--Pila determinant method to catch all rational points in a small ball in a single hypersurface.
\item Finally, the fact that $C$ is transcendental and definable in a 1-h-minimal structure then gives the desired result. Indeed, this will follow from uniform finiteness in 1-h-minimal families, see \cite[Lem.\,2.5.3]{CHR} or section \ref{sec: henselminimality} below.
\end{enumerate}
A mixed characteristic analogue of this result in ${\mathbb Q}_p$ was proven by Cluckers--Halupczok--Rideau-Kikuchi--Vermeulen. Here the notion of rational points of bounded height is defined as follows. For $X$ a subset of ${\mathbb Q}_p^n$ define
\[
X(H) = \{x\in X\cap {\mathbb Z}^n\mid 0\leq x_i\leq H \text{ for all } i \}.
\]
\begin{thm}[{{\cite[Thm.\,4.1.6]{CHRV}}}]\label{thm:QQp-c-dim}
Suppose that $L$ is a finite field extension of ${\mathbb Q}_p$ and carries a $1$-h-minimal structure with $\acl=\dcl$. Let $C\subset L^n$ be a transcendental definable curve.
Then for each $\varepsilon>0$ there is a constant $c$ such that for all $H\geq 1$ we have
\[
\# C(H) \leq cH^\varepsilon.
\]
Furthermore, the constant $c$ can be taken to hold uniformly throughout all transcendental members of a given definable family of definable curves.
\end{thm}
Note the similarity with counting dimension in view of Remark \ref{rem:counting-dim_discretevalued}. We will restrict to equicharacteristic zero. The methods for both proofs are quite similar, one major difference being that the residue field is no longer finite. This is the reason for introducing the counting dimension. Restricting to equicharacteristic zero has the added benefit that Hensel minimality is slightly easier to work with. However, our proof methods readily adapt to the mixed characteristic case as well.
\subsection{Necessity of counting dimension}\label{sec: intro necessity of counting dim}
In the recent work \cite{BCN}, it is shown that if $X$ is a transcendental subanalytic subset of ${\mathbb C}((t))^n$, then $X_s$ is finite for any $s$. In the more general setting of Hensel minimality this is no longer true. In particular, we exhibit several new examples of sets $X$ definable in a Hensel minimal structure such that $X_s$ is infinite. This is why we need the notion of counting dimension in our main theorem.
In more detail, we give three examples of Hensel minimal structures where one cannot do without the counting dimension. We also give a fourth example with a more complicated behaviour. However, we don't know whether this example is Hensel minimal.
\begin{enumerate}
\item The first one is a structure on $K= {\mathbb Q}_p((t))$ in which the exponential
\[
\exp: p{\mathbb Z}_p + t{\mathbb Q}_p[[t]] \to {\mathbb Q}_p((t)): x\mapsto \sum_{i\geq 0}\frac{x^i}{i!}
\]
is definable. The graph $X$ of this exponential is a transcendental set and will provide us with an example for which $X_0$ is infinite. The fact that such 1-h-minimal structure exists follows from \cite[Thm.\, 6.2.1]{CHR}.
\item Our second example is a power-bounded structure on a real closed valued field $K$, which becomes a 1-h-minimal structure by \cite[Thm.\,6.3.4]{CHR}. We ensure that the map $\phi:K_{>0}\to K_{>0}:x\mapsto x^\pi$ is definable in the language. The graph $X$ of this function will be the desired transcendental set. Indeed, we show that $X_0$ is infinite. Note that in this example the value group is non-discrete, which is why we used pseudo-uniformizers in general.
\item Our third example is a structure on ${\mathbb R}((t))$ in which the exponential
\[
\exp: (-1, 1) + t{\mathbb R}[[t]]\to {\mathbb R}((t)): x\mapsto \sum_{i\geq 0}\frac{x^i}{i!}
\]
is definable. The graph of this exponential will be the desired example. In this case, 1-h-minimality of this structure follows from our forthcoming work \cite{CNV}.
\item Our fourth example concerns the graph of a twisted $r$-th power map on ${\mathbb R}((t))$, where $r>0$ is some irrational real number. It is not clear whether this example is definable in a 1-h-minimal structure. However, we prove that the counting dimension of this example is bounded by $(1,1,2)$, and it still adheres to our Theorem \ref{thm:CC-c-dim}.
\end{enumerate}
In all of our examples, the counting dimension of $X$ is eventually constant. We conjecture that this is always true when working in an analytic language on $K$. Section \ref{sec: a conjecture} contains a more precise statement. In general Hensel minimal structures we expect that the counting dimension can indeed grow, and it seems an interesting problem to find an example of a transcendental set $X$ definable in some Hensel minimal structure such that the counting dimension of $X_s$ is not eventually constant.
\section{Notation and background}\label{sec:notations and background}
\subsection{Hensel minimality}\label{sec: henselminimality}
In this section, we record some background material on Hensel minimality. We refer to \cite{CHR} and \cite{CHRV} for further details.
Let ${\mathcal L}$ be a language containing the language of valued fields ${\mathcal L}_{\mathrm{val}} = \{0, 1, +, \cdot, {\mathcal O}_K\}$. Let ${\mathcal T}$ be a complete ${\mathcal L}$-theory whose models are non-trivially valued fields of equi-characteristic zero. Let $K$ be a model of ${\mathcal T}$. We denote by ${\mathcal O}_K$ the valuation ring of $K$ and by $\Gamma_K^\times$ the valuation group. The valuation will be denoted by $|\cdot |: K\to \Gamma_K = \Gamma_K^\times \cup\{0\}$. When using additive notation, we denote the valuation map by $v$. By an open ball we will mean a set of the form $B_{<\lambda}(a) = \{x\in K\mid |x-a|<\lambda\}$, where $a\in K$, $\lambda\in \Gamma_K^\times$. Similarly, a closed ball is a set of the form $B_{\leq \lambda}(a) = \{x\in K\mid |x-a|\leq \lambda\}$. If $B$ is an open ball as above, we denote by $\rad_{\mathrm{op}} B$ its radius $\lambda$, and similarly we use $\rad_{\mathrm{cl}} B$ for $\lambda$ if $B$ is closed ball.
For $\lambda\leq 1$ an element of $\Gamma_K^\times$ let $I_\lambda$ be the ideal $\{x\in K\mid |x|<\lambda\}$. We define $\mathrm{RV}_\lambda^\times$ to be $K^\times/(1+I_\lambda)$. There is a natural map
\[
\operatorname{rv}_\lambda: K^\times \to \mathrm{RV}_\lambda^\times.
\]
We also consider $\mathrm{RV}_\lambda = \mathrm{RV}_\lambda^\times\cup\{0\}$. The map $\operatorname{rv}_\lambda$ extends in the obvious way to $K\to \mathrm{RV}_\lambda$. We will write $\mathrm{RV} = \mathrm{RV}_1$ and $\operatorname{rv}=\operatorname{rv}_1$. The imaginary sort $\mathrm{RV}$ combines information from the residue field and the value group. Indeed, there is a short exact sequence
\[
1\to \left ({\mathcal O}_K/{\mathcal M}_K\right)^\times \to \mathrm{RV}^\times \to \Gamma_K^\times \to 1.
\]
Now let $\lambda\leq 1$ be in $\Gamma_K^\times$ and let $X$ be a subset of $K$. We say that a finite set $C$ \emph{$\lambda$-prepares $X$} if the following holds: for any $x, y\in K$, if
\[
\operatorname{rv}_\lambda(x-c) = \operatorname{rv}_\lambda(y-c), \text{ for all } c\in C
\]
then either $x$ and $y$ are both in $X$, or they are both not in $X$. If $(\xi_c)_c\in \mathrm{RV}_\lambda^{\# C}$ then the set
\[
\{x\in K\mid \operatorname{rv}_\lambda(x-c) = \xi_c \text{ for all }c\in C \}
\]
is said to be a ball \emph{$\lambda$-next to $C$} (if it is disjoint from $C$). Note that if such a set is disjoint from $C$, then it is indeed an open ball. We can rephrase preparing as follows. A finite set $C$ $\lambda$-prepares $X$ if for any ball $B$ $\lambda$-next to $C$, either $B\subseteq X$ or $B\cap X = \emptyset$. Note also that the balls $1$-next to a finite set $C$ are precisely the maximal open balls disjoint from $C$.
Fix $\ell$ a positive integer or $\omega$. The theory ${\mathcal T}$ is said to be \emph{$\ell$-h-minimal} if for any model $K$ of ${\mathcal T}$, any $\lambda\leq 1$ in $\Gamma_K^\times$, any $A\subseteq K$ and any $A'\subseteq \mathrm{RV}_\lambda$ with $\#A'\leq \ell$, every $(A\cup\mathrm{RV}\cup A')$-definable set $X\subseteq K$ can be $\lambda$-prepared by a finite $A$-definable set $C\subseteq K$.
For $\ell=0$, this condition translates to: for any $A\cup \mathrm{RV}$-definable set $X$ there exists a finite $A$-definable set $C$ such that any ball disjoint from $C$ is either contained in $X$, or disjoint from $X$. Note the similarity with o-minimality here, when the open balls are replaced by the open intervals.
The case $\ell=1$ and $\ell=\omega$ are the most important. For most of the paper, we assume the weaker 1-h-minimality.
In mixed characteristic, one has to alter the definition of $\ell$-hensel-minimality slightly by taking into account norms of integers. For example, the set of cubes in ${\mathbb Q}_3$ cannot be 1-prepared by any finite set. However, it is $|3|$-prepared by $\{0\}$. Since we work in equicharacteristic zero in the present paper, we refer to \cite{CHRV} for more details.
\subsection{Consequences of Hensel minimality}\label{sec: consequences hminimality}
For this section, we fix a field $K$ of equicharacteristic zero equipped with an ${\mathcal L}$-structure which is $\ell$-h-minimal, for some $\ell$ in ${\mathbb N}\cup\{\infty\}$. By \cite{CHR}, we may freely add constants from $K$ to the language ${\mathcal L}$ and preserve $\ell$-h-minimality. Many of the results below are formulated only for $\emptyset$-definable objects, but therefore hold just as well for $A$-definable objects, for $A\subset K$.
We now assume that $\ell=1$, so that $\operatorname{Th}_{\mathcal L}(K)$ is 1-h-minimal. Hensel minimality implies tameness results on various definable objects. For functions there is the Jacobian property and Taylor approximation.
\begin{thm}[{{\cite[Cor.\,3.2.6]{CHR}, Jacobian property}}]\label{thm: jacobian property}
Let $f: K\to K$ be a $\emptyset$-definable function. Then there exists a finite $\emptyset$-definable set $C$ such that for every $\lambda\leq 1$ in $\Gamma_K^\times$, every ball $B$ $\lambda$-next to $C$ and every $x_0, x\in B$, $x\neq x_0$, we have that
\begin{enumerate}
\item the derivative $f'$ (as defined in the usual way) exists on $B$ and $\operatorname{rv}_\lambda\circ f'$ is constant on $B$,
\item $\operatorname{rv}_\lambda((f(x)-f(x_0)) / (x-x_0) ) = \operatorname{rv}_\lambda(f')$,
\item for any open ball $B'\subset B$, $f(B')$ is either a point or an open ball.
\end{enumerate}
\end{thm}
Note in particular that (1) implies that $|f'|$ is constant on balls 1-next to $C$, since $\Gamma_K$ is a quotient of $\mathrm{RV}_\lambda$.
The second result we need is about Taylor approximation. For a function $f: X\subset K\to K$ which is $r$-fold differentiable and $x_0\in X$ we define the \emph{$r$-th order Taylor polynomial of $f$ at $x_0$} to be as usual
\[
T_{f, x_0}^{\leq r}(x) = T_{f, x_0}^{<r+1}(x) = \sum_{i=0}^r \frac{f^{(i)}(x_0)}{i!}(x-x_0)^i.
\]
The following result basically states that any definable function can be well approximated by its Taylor polynomial up to some fixed order, at least away from finitely many points.
\begin{thm}[{{\cite[Thm.\,3.2.2]{CHR}, Taylor approximation of order $r$}}]\label{thm: taylor approximation}
Let $f: K\to K$ be a $\emptyset$-definable function and fix a positive integer $r$. Then there exists a finite $\emptyset$-definable set $C$ such that for every ball $B$ 1-next to $C$, $f$ is $(r+1)$-fold differentiable on $B$, $|f^{(r+1)}|$ is constant on $B$ and for $x, x_0\in B$ we have
\[
|f(x)-T_{f, x_0}^{\leq r}(x)| \leq |f^{(r+1)}(x_0)(x-x_0)^{r+1}|.
\]
\end{thm}
We will also need results on cell decomposition. Recall that we say that $\acl=\dcl$ in ${\mathcal T}$ if algebraic Skolem functions exist, meaning that $\acl_K(A) = \dcl_K(A)$ for any set $A\subseteq K$. If ${\mathcal T}$ is 1-h-minimal (resp.\ $\omega$-h-minimal), then by \cite[Prop.\,4.3.3]{CHR} there is an expansion of the language by predicates on cartesian powers of $\mathrm{RV}$ such that the resulting structure is still 1-h-minimal (resp.\ $\omega$-h-minimal) and we have $\acl=\dcl$. In particular, we can typically assume that $\acl=\dcl$ without any problems.
\begin{defn}
Let $A\subset K$ be a parameter set. For $n\geq m$, denote by $\pi_{\leq m}: K^n\to K^m$ the projection on the first $m$ coordinates. Let $X\subset K^n$ be an $A$-definable set. Consider, for $i=1, ..., n$, values $j_i\in \{0,1\}$ and $A$-definable functions $c_i: \pi_{<i}(X)\to K$. Fix also an $A$-definable set
\[
R\subseteq \prod_{i=1}^n (j_i\cdot \mathrm{RV}^\times),
\]
where $0\cdot \mathrm{RV}^\times = \{0\}$. We say that $X$ is an $A$-definable cell if
\[
X = \{x\in K^n \mid \operatorname{rv}(x_i-c_i(\pi_{<i}(x)))_{i=1,...,n}\in R \}.
\]
We call $X$ a cell of type $(j_1, ..., j_n)$. The functions $c_i$ are called the \emph{cell centers}. A \emph{twisted box} of the cell $X$ is a set of the form
\[
\{x\in K^n \mid \operatorname{rv}(x_i-c_i(\pi_{<i}(x)))_{i=1,...,n} = r \},
\]
for $r\in R$.
\end{defn}
By \cite[Thm.\,5.2.4]{CHR}, for a $\emptyset$-definable set $X\subseteq K^n$ there always exists a $\emptyset$-definable \emph{cell decomposition}, \emph{i.e.}\ a partition of $X$ into finitely many $\emptyset$-definable cells $A_\ell$. We will need the following variant. Recall that a function $f: X\subset K^n\to K^m$ is said to be 1-Lipschitz if for all $x, x'\in X$ we have
\[
|f(x)-f(x')| \leq |x-x'|.
\]
Here we use the maximum norm on $K^n$.
\begin{thm}[{{\cite[Thm.\,5.2.4, Add.\,5]{CHR}, Cell decomposition}}]\label{thm:celldecomp.1.lipschitz}
Assume that $K$ carries a 1-h-minimal structure with $\acl=\dcl$. Let $X\subset K^n$ be $\emptyset$-definable. Then there exist a partition of $X$ into finitely many $\emptyset$-definable sets $A_\ell$ such that for every $\ell$ there is some coordinate permutation $\sigma_\ell: K^n\to K^n$ such that $\sigma_\ell(A_\ell)$ is a cell of type $(1, ..., 1, 0, ..., 0)$ and such that each component of each center is 1-Lipschitz.
\end{thm}
\subsection{$T_r$-approximation}\label{sec:Trapprox}
We recall some useful definitions and results from \cite[\S 4.2]{CFL} about $T_r$-approximation. Let $K$ be a henselian valued field of equicharacteristic zero which is 1-h-minimal in some language ${\mathcal L}$ expanding the language of valued fields.
\begin{defn}\label{def: T_r-approximation}
Let $U\subseteq K^m$ be an open set, let $\psi=(\psi_1, ...,\psi_n):U\to \mathcal{O}_K^n$ be a function, and let $r>0$ be an integer. We say that $\psi$ satisfies \emph{$T_r$-approximation} if for each $y\in U$ there is an $n$-tuple $T_{y}^{<r}$ of polynomials with coefficients in $\mathcal{O}_K$ and of degree less than $r$ that satisfies
\begin{equation}
|\psi(x)-T_{y}^{<r}(x)|\leq |x-y|^r \qquad \text{for all }\; x\in U.
\end{equation}
Let $X$ be a definable subset of $K^p$ of dimension $m$. We say that a definable family $(\varphi_i)_{i\in I}$ of functions $\varphi_i:U_i\to X_i\subseteq \mathcal{O}_K^n$ is a \emph{$T_r$-parametrization of $X$} if $X=\bigcup_{i\in I}X_i$ and each $\varphi_i$ is surjective and satisfies $T_r$-approximation.
\end{defn}
\begin{defn}\label{def: Notations}
Let $\alpha=(\alpha_1,...,\alpha_m)\in {\mathbb N}^m$ and define $|\alpha|=\alpha_1+\cdots +\alpha_m$. We define the following sets:
\begin{itemize}
\item $\Lambda_m(k):=\{\alpha\in {\mathbb N}^m;\; |\alpha|=k\}$,
\item $\Delta_m(k):=\{\alpha\in {\mathbb N}^m;\; |\alpha|\leq k\}$,
\item $L_m(k):=\#\Lambda_m(k)$ and $D_m(k):=\#\Delta_m(k)$
\end{itemize}
\end{defn}
Note that $L_m(k)$ (resp.\ $D_m(k)$) is the number of monomials of degree exactly (resp.\ at most) $k$ in $m$ variables.
Fix an integer $d$ and define, for all integers $n$ and $m$ such that $m<n$ the following integers.
\begin{equation}\label{eq: def mu r V e}
\begin{aligned}
\mu(n,d) &=D_n(d) \qquad& r(m,d)&=\min\{x\in {\mathbb Z}; \; D_m(x-1)\leq \mu < D_m(x)\}\\
V(n,d) &=\sum_{k=0}^d k L_n(k) \qquad & e(n,m,d) &=\sum_{k=1}^{r-1} kL_m(k)+r(\mu-D_m(r-1)).
\end{aligned}
\end{equation}
To apply the determinant method, we need the following lemma, which is a simple adaptation from \cite[Lem.\,3.3.1]{CCL-PW}.
\begin{lem}\label{lem:determinant.estimate}
Let $K$ be a henselian field of equicharacteristic $0$. Let $t$ be a pseudo-uniformizer of $K$. Fix integers $\mu, r$ and $U$ an open subset of $K^m$ which is contained in a product of $m$ closed balls of valuative radius $\rho v(t)$, where $\rho\geq 0$ is an integer. Fix $x_1, ..., x_\mu\in U$ and functions $\psi_1, ..., \psi_\mu: U\to K$. Assume that the $\psi_i$ satisfy $T_r$-approximation on $U$ for some integer $r$ with
\[
D_m(r-1)\leq \mu < D_m(r).
\]
Then
\[
v(\det (\psi_i(x_j))_{i,j}) \geq \rho v(t) e.
\]
\end{lem}
\begin{proof}
Straightforward adapation from \cite[Lem.\,3.3.1]{CCL-PW}.
\end{proof}
\section{Bounding rational points on h-minimal curves} \label{sec:counting}
In this section we prove Theorem \ref{thm:CC-c-dim}. Throughout, let $K$ be an equicharacteristic zero henselian valued field, equipped with a 1-h-minimal ${\mathcal L}$-structure, for some language ${\mathcal L}$ expanding the language of valued fields. Fix a lift $\tilde{k}$ of the residue field and fix a pseudo-uniformizer $t$.
The following Lemma is an adapted version of \cite[Lem.\,5.1.3]{CFL}. We use it to catch the rational points of bounded height in a small ball in a single hypersurface.
\begin{lem}
\label{lem: Lemma 5.1.3 revisited}
Fix integers $d, m, n$ with $m<n$ and consider $r,V, e$ as defined in equation \ref{eq: def mu r V e}. Let $s$ be a positive integer. Let $U\subseteq {\mathcal O}_K^m$ and suppose $\psi=(\psi_1,..., \psi_n): U\to {\mathcal O}_K^n$ satisfies $T_r$-approximation. For $\alpha>\frac{sV}{e}$ a positive integer, denote by $p: {\mathcal O}_K^m\to ({\mathcal O}_K/(t^\alpha))^m$ the projection map. Then for any fibre $B$ of $p$, the image $\psi(B\cap U)_s$ is contained in an algebraic hypersurface of degree at most $d$. Moreover, $V/e$ goes to $0$ as $d$ goes to infinity.
\end{lem}
\begin{proof}
Let $B\subseteq {\mathcal O}_K^m$ be a product of closed balls of valuative radius $\alpha v(t)$, i.e.\ a fibre of the map $p$, and take points $P_1, ..., P_\mu$ in $\psi(B\cap U)_s$. Take $x_i\in B\cap U$ such that $\psi(x_i)=P_i$. Consider the determinant
\[
\Delta = \det ((\psi(x_i))^j)_{1\leq i\leq \mu, j\in \Delta_n(d)}.
\]
For $j\in \Delta_n(d)$, the notation $(y_1, ..., y_n)^j$ is to be interpreted as $\prod_i y_i^{j_i}$. Since $\psi$ satisfies $T_r$-approximation, Lemma \ref{lem:determinant.estimate} gives that ${\rm ord}_t(\Delta)\geq \alpha e$. Since the $P_i$ are in $\tilde{k}[t]^n_s$, if $\Delta$ were non-zero then ${\rm ord}_t \Delta \leq sV$. But $\alpha > \frac{sV}{e}$ so that $\Delta=0$.
Now we use the determinant method. Since $\Delta=0$, the $\mu$ vectors $((\psi(x_i))^j)_j$ are linearly dependent. This implies that there exists some algebraic hypersurface of degree at most $d$ passing through all of the points $\psi(x_i)$. Since this holds for any $\mu$ points in $\psi(B\cap U)_s$ we can find such a hypersurface containing all of $\psi(B\cap U)_s$. The last fact follows from an easy explicit calculation, see e.g.\ \cite[p.\ 212]{P1}.
\end{proof}
To move from a $T_1$-parametrization to a $T_r$-parametrization for curves we will use power substitutions.
\begin{lem}\label{lem: T1 to Ts}
Let $X\subseteq K$ and let $f: X\to {\mathcal O}_K$ be a $\emptyset$-definable $1$-Lipschitz function. Fix a positive integer $r$. Then there exists a finite $\emptyset$-definable set $C$ such that the following holds. Let $B$ be a ball $1$-next to $C$ containedin ${\mathcal O}_K$, say $1$-next to $c\in C$. For $a,b\in {\mathcal O}_K$ consider the map $p_r: K\to K: x\mapsto a(x-c)^r+b$. If $D$ is any open ball not containing $0$ with $p_r(D)\subseteq B$ then $f\circ p_r$ satisfies $T_r$-approximation on $D$ with respect to its Taylor polynomial. Moreover, for $y\in D$ and $j=1, ..., r$ there is the bound
\[
|\partial^j(f\circ p_r)(y)| \leq |y|^{r-j}.
\]
\end{lem}
\begin{proof}
Use Theorem \ref{thm: jacobian property} and Theorem \ref{thm: taylor approximation} to find a finite $\emptyset$-definable set $C$ such that $f$ satisfies Taylor approximation up to order $r$ on balls $1$-next to $C$ and such that the first $r$ derivatives of $f$ satisfy the Jacobian property on balls $1$-next to $C$. Without loss of generality, let $c=0$, $a=1$ and $b=0$ and fix $x_0\in D$. Then $x_0^r\in B$ and $\rad_{\mathrm{op}} B = |x_0|^r$ since $B$ is $1$-next to $0$. The fact that $f$ is $1$-Lipschitz gives that
\[
|f'(x_0^r)|\leq 1.
\]
By the Jacobian property, the first $r$ derivatives of $f$ all have a constant norm on $B$. Thus for $i\leq r$,
\[
f^{(i)}(B) \subseteq \{y\in K\mid |y| = |f^{(i)}(x_0^r)|\},
\]
and hence $\rad_{\mathrm{op}} f^{(i)}(B)\leq |f^{(i)}(x_0^r)|$. On the other hand, the Jacobian property yields that
\[
|f^{(i)}(x_0^r)| = \frac{\rad_{\mathrm{op}} f^{(i-1)}(B)}{\rad_{\mathrm{op}} B} \leq \frac{|f^{(i-1)}(x_0^r)|}{|x_0^r|}.
\]
Using induction and the fact that $f$ is $1$-Lipschitz this gives for $1\leq i\leq r$ that
\begin{equation}\label{eq:bound.derivative}
|f^{(i)}(x_0^r)x_0^{r(i-1)}| \leq 1.
\end{equation}
Let $x\in D$. Then $x^r$ is in the same ball $1$-next to $0$ as $x_0^r$ and so $|x^r|=|x_0^r|$. Since both $f$ and $p_r$ have Taylor approximation up to order $r$ on their respective domains $B$ and $D$ we can conclude by \cite[Lem.\,3.2.7]{CCL-PW}.
\end{proof}
We need one more projection lemma to reduce to the planar case. Let us call a set in $K^2$ \emph{non-algebraic up to degree $d$} if it has a finite intersection with every algebraic curve of degree at most $d$.
\begin{lem}\label{lem:projection}
Let $C\subset K^n$ be a definable transcendental curve and fix a positive integer $d$. Then there exists a finite definable partition of $C$ into sets $C_i$, together with coordinate projections $\pi_i: C_i\to K^2$ such that $\pi_i|_{C_i}$ is a bijection onto its image, and $\pi_i(C_i)$ is non-algebraic up to degree $d$.
\end{lem}
\begin{proof}
By the cell decomposition theorem \ref{thm:celldecomp.1.lipschitz}, we may partition $C$ into finitely many definable sets $C_i$ such that after a coordinate permutation, $C_i$ is a $(1, 0, ..., 0)$ cell with $1$-Lipschitz centers. (We may disregard the finitely many $(0, ..., 0)$-cells since there are just points). In other words, $C_i$ is the graph of a map
\[
\phi: P\to K^{n-1}: x\mapsto (\phi_1(x), ..., \phi_{n-1}(x)),
\]
where all $\phi_j$ are $1$-Lipschitz, and $P\subset K$ is a $1$-cell. Denote by $A_j\subset P$ the set of $x\in P$ such that in some neighbourhood of $x$, the graph of $\phi_j$ is non-algebraic up to degree $d$. Then the $A_j$ are definable sets, and they cover $P$, since else $\phi$ would not be transcendental. Thus we can further partition $C_i$ into the graphs of $\phi$ over every $A_j$. Over $A_j$ projection onto the first and $j$-th coordinate gives the desired conclusion.
\end{proof}
\begin{remark}
The use of this lemma can be avoided by working with cylinders over $X$ for each possible projection $K^n\to K^2$, see \cite[p.\,45]{CCL}.
\end{remark}
With this, we can prove our main result. The strategy of the proof is as follows. Using cell decomposition, we represent $C$ as a finite union of graphs of 1-Lipschitz functions. Let us focus on one such function. After a power substitution, we can assume that this function satisfies $T_r$-approximation. Then Lemma \ref{lem: Lemma 5.1.3 revisited} gives a hypersurface catching all rational points on $C$ of height at most $s$. The fact that $C$ is transcendental then gives the desired conclusion.
\begin{proof}[Proof of Theorem \ref{thm:CC-c-dim}]
Recall the definition of $V, e$ and $r$ from equation \ref{eq: def mu r V e} and recall that $V/e$ goes to zero as $d$ goes to infinity, by Lemma \ref{lem: Lemma 5.1.3 revisited}. Take $d$ such that
\[
\frac{V}{e} < \varepsilon.
\]
Up to enlarging $r$ if necessary, we may assume that $r$ is a power of $b$. By applying Lemma \ref{lem:projection} we may assume without loss of generality that $C$ is a planar curve in ${\mathcal O}_K^2$ which is non-algebraic up to degree $d$.
Using the cell decomposition theorem \ref{thm:celldecomp.1.lipschitz} we obtain finitely many sets $P_i$ whose union is $C$ such that every $P_i$ is, after a coordinate permutation, a $(1,0)$-cell or a $(0, 0)$-cell with $1$-Lipschitz centers. The $(0,0)$-cells are just singletons, so let us focus on one of the $(1,0)$-cells, say $P_\ell$. After a coordinate transformation and a translation we may assume that $P_\ell$ is the graph of a $1$-Lipschitz map
\[
\phi: P\subset {\mathcal O}_K \to {\mathcal O}_K,
\]
where $P$ is a cell with center $0$. The group of $r$-th powers in $k^\times$ has finite index in $k^\times$, since $r$ is a power of $b$. Let $a_1, ..., a_m\in {\mathcal O}_K^\times$ reduce to representatives for the cosets of $(k^\times)^r$ in $k^\times$. For $i=1, ..., m$ and $j=0, ..., r-1$ let
\[
D_{i,j} = \{y\in K\mid a_i t^j y^r \in P\}.
\]
Then the finitely many maps
\[
p_{i,j}: D_{i,j}\to P : y\mapsto a_i t^j y^r
\]
cover $P\cap \tilde{k}[t]$. Now by Lemma \ref{lem: T1 to Ts}, we can find a further subdivision of $P$ such that the $\phi\circ p_{i,j}$ are all $T_r$ on open balls contained in $D_{i,j}$. We prove that actually $\phi\circ p_{i,j}$ even has $T_r$-approximation on all of $D_{i,j}$. So let $x,y\in D_{i,j}$. Since $D_{i,j}$ is a cell with center $0$, if $\operatorname{rv}(x) = \operatorname{rv}(y)$ then $x$ and $y$ are in the same ball contained in $D_{i,j}$ and we are done. So assume that $\operatorname{rv}(x)\neq \operatorname{rv}(y)$. Then
\begin{align*}
\qquad|\phi(a_it^jx^r) - T_{\phi\circ p_{i,j}, y}^{<r}(x)| \leq \max\{|\phi(a_it^jx^r) - \phi(a_it^jy^r)|, |\phi(a_it^jy^r) - T_{\phi\circ p_{i,j}, y}^{<r}(x)|\}.
\end{align*}
For the first term, use that $\phi$ is $1$-Lipschitz to obtain
\[
|\phi(a_it^jx^r) - \phi(a_it^jy^r)| \leq |x^r - y^r| \leq \max\{|x|^r, |y|^r\} = |x-y|^r,
\]
since $\operatorname{rv}(x)\neq \operatorname{rv}(y)$. For the second term, we use the bound provided by Lemma \ref{lem: T1 to Ts} to get that
\begin{align*}
|\phi(a_it^jy^r) - T_{\phi\circ p_{i,j}, y}^{<r}(x)| &\leq \max_{\ell=1, ..., r-1} \left|\frac{\partial^\ell(\phi\circ p_{i,j})(y)}{\ell!}(x-y)^\ell\right| \\
&\leq \max_{\ell=1, ..., r-1}|y|^{r-\ell}|x-y|^\ell \leq |x-y|^r.
\end{align*}
So $\phi\circ p_{i,j}$ satisfies $T_r$-approximation on all of $D_{i,j}$. In conclusion, the maps
\[
\psi_{ij}: D_{ij}\to C: y\mapsto (p_{ij}(y), \phi(p_{ij}(y))
\]
all have $T_r$-approximation and their images cover $P_\ell\cap \tilde{k}[t]$. By our construction, we may apply Lemma \ref{lem: Lemma 5.1.3 revisited} with $\alpha = 1+s\varepsilon$. This yields that $\psi_{ij}(P\cap B)_s$ is contained in an algebraic hypersurface $X$ of degree $d$, for any closed ball $B\subset {\mathcal O}_K$ of valuative radius $\alpha v(t)$. Since $\psi_{ij}(D_{ij})$ is contained in $C$, and since $C$ is non-algebraic up to degree $d$, this intersection $X\cap C$ is finite. Even more, by uniform finiteness in 1-h-minimal families (Lemma \cite[Lem.\,2.5.2]{CHR}), the intersection of $X$ with $C$ is uniformly bounded (over all such $X$) by some integer $N$. Thus the counting dimension of $C_s$ is bounded by
\[
(NN', 1, 1+\varepsilon\cdot s),
\]
where $N'$ is the total number of sets $D_{ij}$ required in the cell decomposition for $C$.
Finally, to prove a uniform upper bound on counting dimension in definable families, assume that $(C_y)_y$ is a definable family of transcendental curves, for $y\in Y\subseteq K^m$ with $Y$ definable. Then the above proof can easily be made uniform in $C_y$. Indeed, by Lemma \ref{lem:projection} we can assume that every $C_y$ is a planar curve which is non-algebraic up to degree $d$. The number of cells needed in a cell decomposition for $C_y$ can be bounded uniformly in $y$, by taking a cell decomposition for
\[
\bigcup_{y\in Y} \{y\}\times C_y.
\]
Similarly, the intersection of an algebraic curve of degree at most $d$ with any $C_y$ is finite, and thus uniformly bounded by \cite[Lem.\,2.5.2]{CHR}. These two facts give the desired conclusion.
\end{proof}
\section{Importance of counting dimension}\label{sec:importance of counting dimension}
We give three examples showing the necessity of counting dimension in 1-h-minimal theories. We give a fourth example where the behaviour of the counting dimension is more complicated, with the caveat that we don't know whether this example is 1-h-minimal.
\subsection{A $p$-adic analytic field}\label{sec: padic example}
We construct an example showing that $X_0$ can be infinite. Let $K = {\mathbb Q}_p((t))$ and consider the valuation
\[
v: K^\times \mapsto {\mathbb Z}^2: \sum_{i\geq N} a_i t^i \mapsto (N,v_p(a_N)) \text{ if } a_N\neq 0.
\]
Here ${\mathbb Z}^2$ is considered with the lexicographic order, where $(i,j)> (i',j')$ if $i>i'$ or $i=i'$ and $j>j'$. The valuation ring is ${\mathcal O}_K = {\mathbb Z}_p + t{\mathbb Q}_p[[t]]$ with maximal ideal ${\mathcal M}_K = p{\mathbb Z}_p + t{\mathbb Q}_p[[t]]$. We may expand the language ${\mathcal L}$ by function symbols from a separated analytic structure ${\mathcal A}$ as in \cite{CLip} and where $K$ is equipped with ${\mathcal A}$-analytic structure. We can take the exponential
\[
\exp: {\mathcal M}_K \to K: x \mapsto \sum_n \frac{x^n}{n!},
\]
to belong to ${\mathcal A}$. The theory of $K$ in this larger language is $\omega$-h-minimal by \cite[Cor.\,6.2.7]{CHR}). Now consider the coarsening $v'$ of $v$ with respect to the convex subgroup ${\mathbb Z}\times \{0\}\subseteq {\mathbb Z}^2$. By \cite[Cor.\,4.2.4]{CHR} the resulting theory is still $\omega$-h-minimal. The coarsened valuation ring is ${\mathcal O}_K' = {\mathbb Q}_p[[t]]$ with maximal ideal ${\mathcal M}_K' = t{\mathbb Q}_p[[t]]$. We take $t$ as (pseudo-)uniformizer and ${\mathbb Q}_p\subset {\mathbb Q}_p((t))$ as a lift of the residue field. Let $X$ be the graph of the exponential function. We claim that this is a transcendental set. Indeed, suppose that $f(x,y)\in K[x,y]$ is a non-zero polynomial such that $f(x,\exp x) = 0$ for infinitely many $x\in {\mathcal M}_K$. We take such an $f$ of minimal degree. By h-minimality \cite[Lem.\,2.5.2]{CHR}, there is then an open ball $B\subset {\mathcal M}_K$ on which this holds. Moreover, $\exp$ is differentiable on ${\mathcal M}_K$ with derivative $\exp$. Write $f(x,y) = \sum_{i=0}^d f_i(x)y^i$. Define the polynomial
\[
g(x,y) = \sum_{i=0}^d f_i'(x)y^i + \sum_{i=0}^{d-1} (i-d)f_i(x)y^i.
\]
This polynomial is non-zero and has degree strictly smaller than $f$ and for $x\in B$ we have
\[
g(x, \exp x) = \dfrac{\partial}{\partial x} (f(x, \exp x)) - df(x, \exp x) = 0.
\]
This is the desired contradiction, showing that $X$ is a transcendental set.
If $x\in p{\mathbb Z}_p$ then $x\in {\mathcal M}_K$ and $v'(x)=0$. But also $v'(\exp (x))=0$ and so
\[
\{(x, \exp x) \mid x \in p{\mathbb Z}_p\} = X_0.
\]
In particular $X_0$ is infinite. The counting dimension of $X_0$ is $(1,1,1)$. Indeed, the map $X_0\to {\mathcal O}_K': (x, \exp x)\mapsto x$ followed by projection ${\mathcal O}_K' \to {\mathcal O}_K'/{\mathcal M}_K' = {\mathbb Q}_p$ has finite fibres on $X_0$. Even more, if $x$ is an element of ${\mathcal M}_K\cap {\mathbb Q}_p[t]$ which is not in $p{\mathbb Z}_p$ then automatically $\exp x$ is not in ${\mathcal M}_K\cap {\mathbb Q}_p[t]$. Thus for any positive integer $s$, $X_0=X_s$ and the counting dimension becomes constant equal to $(1,1,1)$.
\subsection{Convex valued fields}\label{sec: convex valued field example}
Denote by ${\mathcal L}_\mathrm{omin}$ the language of ordered rings. For any real number $r$, let $f_r$ denote the function ${\mathbb R}_{>0}\to {\mathbb R}_{>0}: x\mapsto x^r$ and consider the expansion ${\mathcal L}$ of ${\mathcal L}_\mathrm{omin}$ where we have a function symbol for every $f_r$. It is known that the theory of ${\mathbb R}$ in ${\mathcal L}$ is o-minimal. Let $K$ be a proper elementary extension of ${\mathbb R}$. Then we may turn $K$ into a valued field by taking for ${\mathcal O}_K$ the convex closure of ${\mathbb R}$. Note that the theory ${\mathcal T}$ is power-bounded, so by \cite[Thm.\, 7.2.4]{CHR} the theory of $K$ in the language ${\mathcal L}\cup\{{\mathcal O}_K\}$ is 1-h-minimal. Let $t$ be a pseudo-uniformizer of $K$ and denote by $\tilde{k}$ a lift of the residue field. Then $\tilde{k}$ is again a real closed field. For example, $K$ might be the field of Hahn series ${\mathbb R}((t^{\mathbb R}))$ with pseudo-uniformizer $t$ and $\tilde{k}={\mathbb R}$.
Now let $X$ be the graph of the function $K_{>0}\to K_{>0}: x\mapsto x^\pi$. This is a definable set by our choice of language. Clearly, this is also a transcendental set. But $X_0$ is simply the graph of $x\mapsto x^\pi$ on $\tilde{k}$, which certainly contains this graph on ${\mathbb R}$. In particular, this set is infinite. Again, note that $X_s = X_0$ for any $s\geq 0$ so that the counting dimension of $X_s$ is equal to $(1,1,1)$ for any $s$.
\subsection{A real analytic field}\label{sec: real analytic example}
Consider the field ${\mathbb R}((t))$ in the language of ordered valued fields. Let ${\mathcal B}$ be the full Weierstrass system as in \cite[Sec.\, 3.1]{CLip}, where
\[
B_{n,\alpha} = A_{n,\alpha}(({\mathbb Z})).
\]
Here, $ A_{n,\alpha}(({\mathbb Z}))$ is defined by
\[
A_{n,\alpha}(({\mathbb Z}))=\{\sum_{i\in I}f_it^i \mid f_i\in A_{n,\alpha}, I\subset {\mathbb Z} \textnormal{ well ordered}\},
\]
where $A_{n, \alpha}$ is the ring of real power series in ${\mathbb R}[[\xi_1,...,\xi_n]]$ with radius of convergence $>\alpha$. This forms a real Weierstrass system as defined in \cite[Def.\,3.1.1]{CLip}. We may equip ${\mathbb R}((t))$ with real analytic ${\mathcal B}$-structure as in \cite[Def.\,3.2.3]{CLip}. In forthcoming work \cite{CNV}, we prove that the theory of ${\mathbb R}((t))$ is $\omega$-h-minimal in a corresponding language ${\mathcal L}_1$ expanding the language of valued fields and such that ${\mathcal L}_1$ contains symbols for all elements of the Weierstrass system ${\mathcal B}$. Now, by our choice of ${\mathcal B}$ the exponential
\[
\exp: (-1, 1) + t{\mathbb R}[[t]]\to {\mathbb R}((t))
\]
is definable. Here $(-1, 1)$ denotes the interval in ${\mathbb R}$ (and not in ${\mathbb R}((t))$). Denote by $X$ the graph of $\exp$, this is clearly a transcendental set. We use ${\mathbb R}\subset {\mathbb R}((t))$ as a lift of the residue field and $t$ as our choice of (pseudo-)uniformizer. Then $X_0$ is infinite, since if $x$ is in $(-1, 1)$ then $\exp(x)$ is again real. The counting dimension of $X_0$ is $(1,1,1)$. Indeed, the reduction map
\[
X\to {\mathcal O}_K/(t): (x, \exp x) \mapsto x \bmod t
\]
has fibres of cardinality $1$ on $X_0$. In fact, if $x$ is in ${\mathbb R}[t]_s$ but not in ${\mathbb R}$ then $\exp(x)$ is never in ${\mathbb R}[t]$. Thus for any $s\geq 0$ we have $X_s = X_0$ and the counting dimension remains constant.
\subsection{A twisted power map}\label{sec: twisted power map}
In this section we give an example of a transcendental set in a non-Archimedean valued field for which the rational points keep growing. However, the counting dimension is in fact bounded, and the example adheres to our Theorem \ref{thm:CC-c-dim}. We do not know whether this example lives in some 1-h-minimal structure.
Let $K={\mathbb R}((t))$ and let $r\in {\mathbb R}_{>0}$ be irrational with $r>1/2$. We define the \emph{twisted $r$-th power map} $\tau_r: {\mathbb R}\llbracket t\rrbracket\to {\mathbb R}\llbracket t\rrbracket$ in the following way. Let $\tau_r(0) = 0$. If $u$ is a unit in $ {\mathbb R}\llbracket t\rrbracket$, define $\tau_r(u) = (u^2)^r$ via the usual series expansion. If $x\neq 0$ is in $t{\mathbb R}\llbracket t\rrbracket$ then let $m$ be the integer $\lfloor 2rv(x)\rfloor$ and defined $\tau_r(x) = t^m (u^2)^r$, where $u = xt^{-v(x)}$. The map $\tau_r$ is locally analytic everywhere except at $0$.
Let $X$ be the graph of $\tau_r$. We use again $t$ as a uniformizer for $K$, and ${\mathbb R}$ as a lift of the residue field. The set of rational points on $X$ is precisely
\[
\{(0,0)\}\cup\{(at^n, t^{\lfloor 2rn\rfloor} (a^2)^r) \mid a\in {\mathbb R}^\times, n\in {\mathbb Z}_{\geq 0}\}.
\]
Hence it is clear that the sets $(X_s)_s$ keep growing as $s$ becomes larger and larger. Let $n$ be a positive integer, then the counting dimension of $X_{\lfloor 2rn \rfloor}$ is bounded by $(n+1,1,1)$. Indeed the definable map
\[
{\mathbb R}\llbracket t \rrbracket^2\to {\mathbb R}\llbracket t \rrbracket: (x,y)\mapsto \begin{cases}
xt^{-v(x)} & \text{ if } v(x)\leq n \\
0 & \text{ else}
\end{cases}
\]
followed by reduction modulo $t$ has fibres of cardinality at most $n+1$ on $X_{\lfloor 2rn \rfloor}$. However, we claim that the counting dimension of $X_{\lfloor 2rn \rfloor}$ is also bounded by $(1,1,2)$ for any positive integer $n$. To see this, consider the map
\[
f: {\mathbb R}\llbracket t \rrbracket^2\to {\mathbb R}\llbracket t \rrbracket: (x,y)\mapsto \begin{cases}
v(x) + xt^{-v(x)+1} & \text{ if } v(x)\leq n \\
0 & \text{ else}.
\end{cases}
\]
Note that this map is definable. Then the map $f$ followed by reduction modulo $t^2$ has fibres of cardinality at most $1$ on $X_{\lfloor 2rn \rfloor}$. In other words, the counting dimension of $X_{\lfloor 2rn \rfloor}$ is bounded by $(1,1,2)$.
Thus the set $X$ adheres to our Theorem \ref{thm:CC-c-dim}. However, it should be stressed that we don't know whether $X$ is definable in any 1-h-minimal structure on ${\mathbb R}((t))$.
\subsection{A conjecture}\label{sec: a conjecture}
Let $C$ be a transcendental curve definable in a 1-h-minimal structure on $K$. Theorem \ref{thm:CC-c-dim} tells us that for any $\varepsilon>0$ there is some constant $N>0$ such that for any $s\geq 0$ we have
\[
\#\text{-}\dim C_s \leq (N,1, 1+\varepsilon \cdot s).
\]
However, in all of the above examples, the counting dimension eventually becomes constant. We conjecture that this always happens if we are dealing with a language built up from analytic functions. So let $K$ be an equicharacteristic zero valued field in one of the following settings.
\begin{enumerate}
\item Either $K$ comes from an equicharacteristic zero coarsening of an analytic structure as in example \ref{sec: padic example}, or
\item $K$ is ${\mathbb R}((\Gamma))$ for some non-zero ordered abelian group $\Gamma$, and is equipped with real analytic ${\mathcal B}$-structure, for some real Weierstrass system ${\mathcal B}$. In this case, we consider $K$ in the language ${\mathcal L}_{1}$ coming from \cite{CNV}.
\end{enumerate}
In both cases, the resulting theory is $\omega$-h-minimal by \cite[Sec.\,6]{CHR} resp. \cite{CNV}.
\begin{conj}
In the setting above, fix a lift $\tilde{k}$ of the residue field and a pseudo-uniformizer $t$. Let $X\subset K^n$ be a definable set. Then there exist integers $(N,d,e)$ such that for any integer $s$, we have
\[
\#\text{-}\dim(X^{\mathrm{trans}}_s)\leq (N,d,e).
\]
\end{conj}
It seems reasonable that we can even take $d=\dim X$ in the above conjecture.
\bibliographystyle{amsplain}
|
\subsection{Additional results}\label{sec:appendix_1}
\begin{proof}[Proof of Lemma~\ref{lem:sepsetsizeMAG}]
We prove the case of $\eta=3$ by enumerating all possible configurations of $G_\gamma(i,j)$ in the extended neighborhood of $i$
and constructing a small $m$-separator for each one.
Since $G$ is a MAG, $i$ and $j$ cannot be ancestors of each other. Without loss of generality, we suppose
$i\notin \mathrm{an}(G,j)$.
We use the following three facts.
\begin{enumerate}
\item Let $D_{G_\gamma(i,j)}(u,v)$ be the shortest path distance
in the local graph, and let $N_k=\{v\in V_\gamma(i,j): D_{G_\gamma(i,j)}(v,i)=k\}$ for each $k=1,2,\ldots, \gamma$. Then for each $k\leq\gamma$, there are at most $\eta$ paths from $i$ to $N_k$. Hence,
$|\mathrm{ne}(G_\gamma(i,j),u)|\leq \eta$.
\item Consider the two set of edges $e_k^b=\{(u,v):u\in \mathrm{adj}(G_\gamma(i,j),v), u\in N_k, v\in N_{k+1}\}$ and
$e_k^m=\{(u,v):u\in \mathrm{adj}(G_\gamma(i,j),v), u, v\in N_{k}\}$. For each $k\leq \gamma$, every node in $N_k$ has at least one edge in $e^b$ or $e^m$ (it cannot be a ``deadend"), and $|e^b_k|+|e^m_k|\leq \eta$.
\item In the MAG $G$, if $(u,v)$ are non-adjacent, then there is no inducing path between them, i.e., no path on which every node is a collider and ancestor of $u$ or $v$.
\end{enumerate}
The details are given in the Supplementary Material.
\end{proof}
\begin{proof}[Proof of Lemma~\ref{lem:searchingpool}]
\md{By Lemma~\ref{lem:localsep}, it suffices to consider two nodes $i$ and $j$ that are non-adjacent in $G$ and show that $V_\gamma(i,j)\setminus\{i,j\}\subseteq J_\gamma(i,j,C)$.}
By definition, any $v\in V_\gamma(i,j)\setminus \{i,j\}$ lies on a short path between $i,j$,
so
$
D_G(i,v)+D_G(j,v)\leq \gamma.
$
Since $i,j$ are not adjacent,
we know $C=C_{-ij}$ is a supergraph of $G$.
Hence,
$D_{C_{-ij}}(i,v)\le D_G(i,v)$ and $D_{C_{-ij}}(j,v)\le D_G(j,v)$, which implies
$
D_{C_{-ij}}(i,v)+D_{C_{-ij}}(j,v)\leq \gamma,
$
and $v\in V_\gamma(i,j)\setminus\{i,j\}\subseteq J_\gamma(i,j,C)$.
\end{proof}
To prove Theorem~\ref{thm:consistencylfci},
we first show an error bound for sample partial correlations.
\begin{lemma}\label{lem:estimate}
Assume $W=(W_1,\ldots, W_p)$ is a zero-mean random vector with covariance matrix $\Sigma$ such that each $W_i/\Sigma_{ii}^{1/2}$
is sub-Gaussian with parameter $\sigma$.
Assume
$\sigma$ is
bounded, and the minimal eigenvalue of all $(\eta+2)\times (\eta+2)$ submatrices of $\Sigma$
are bounded below by $\lambda_{\min}>0$. If for $\zeta>0$ and $\epsilon>0$ satisfying
$\epsilon < 16(\eta+2)\lambda_{\min}^{-2}\max_i(\Sigma_{ii})(1+4\sigma^2))$ we have
\begin{equation}
n\geq \{\log (p^2+p)-\log (2\zeta)\}128(1+4\sigma^2)^2\max_i(\Sigma_{ii})^2(\eta+2)^2\left(\lambda_{\min}^{-1}+\lambda_{\min}^{-2}\left(1+2/\epsilon\right)\right)^2,
\end{equation}\label{eq:samplecomplex}
then the empirical partial correlation obtained from $n$ samples satisfies
\begin{equation}\label{eq:rhobound}
\PP{\max_{i\neq j, |S|\leq\eta}\big| \rho(i,j|S)-\widehat\rho(i,j|S) \big|\geq \epsilon}\leq
\zeta.
\end{equation}
\end{lemma}
\begin{proof}
Set $\delta = \epsilon \lambda_{\min}^2/[(\epsilon+\epsilon\lambda_{\min}+2)(\eta+2)]$. Our choice of $\delta$
satisfies $\delta\in (0,8\max_i(\Sigma_{ii})(1+4\sigma^2))$.
Then by Lemma 1 in \cite{ravikumar2011}, we obtain the following inequality,
\begin{equation*}
\mathbb{P}\left(|\widehat\Sigma_n(i,j) - \Sigma(i,j) |>\delta\right)\leq 4\exp\left\{-\frac{n\delta^2}{128(1+4\sigma^2)^2\max_i(\Sigma_{ii})^2} \right\}
\end{equation*}
With the stated $n$, we have $\mathbb{P}\left(|\widehat\Sigma_n(i,j) - \Sigma(i,j) |>\delta\right)\leq 2\zeta/(p^2+p)$. A union bound over all the entries yields $\mathbb{P}\left(\|\widehat\Sigma_n - \Sigma \|_\infty>\delta\right)\leq \zeta$.
By
Lemma 4 of \cite{harris2013},
for all $i,j$ and $|S|\leq \eta$,
$\|\widehat\Sigma_n - \Sigma \|_\infty\leq \delta$ implies
$|\rho(i,j|S)-\widehat\rho(i,j|S)|<\epsilon$.
Therefore \eqref{eq:rhobound} holds.
\end{proof}
\begin{proof}[Proof of Theorem~\ref{thm:consistencylfci}]
By Lemma~\ref{lem:orient}, if all condition independence tests
for conditioning set $|S|\leq \eta$ make correct decisions,
then the output of lFCI is sound, and under Assumption~\ref{ass:localdiscpaths} the output is complete.
We aim to show that this is true on a high probability event.
First suppose we make conditional independence decisions by rejecting the null if only if $|\widehat \rho(i,j|S)|>\lambda/2$, where $\lambda$ is from Assumption~\ref{ass:faith}.
Define the following event,
\[
A=\left[\max_{i\neq j, |S|\leq\eta}\big| \rho(i,j|S)-\widehat\rho(i,j|S) \big|\leq \lambda/2\right].\]
By Lemma~\ref{lem:estimate}, for any $\zeta>0$, with $n=\Omega((\log p)^{1/(1-2c)})$ we have $
\PP{A}>1-\zeta$.
Given $A$, it holds that for all $i$, $j$ and $|S|\leq\eta$, $|\widehat \rho(i,j|S)|> \lambda/2$ if and only if
$|\rho(i,j|S)|>\lambda$. Therefore,
with high probability,
all the
conditional independence decisions are correct
and the output is sound.
The completeness result follows Lemma~\ref{lem:orient}.
Next, suppose we make conditional independence decisions by comparing z-transformed partial correlations to normal quantiles.
It is shown in Appendix A of \citet{harris2013}
that this approach is equivalent to the thresholding rule with the following significance levels,
\[\alpha_n=2\left(1-\Phi\left(0.5\sqrt{n-3}\log\left(\frac{1+\lambda/3}{1-\lambda/3}\right)\right)\right).\]
\end{proof}
\begin{proof}[Proof of Corollary~\ref{cor:consistencyrpc}]
Under the assumptions, there are always small neighborhood-based separators between non-adjacent nodes (see the proof for
Lemma~\ref{lem:sepsetsize}),
and therefore the approximate-rPC, like rPC, consistently
recovers correct skeletons.
The orientation step is also sound and complete (See proof of Lemma~\ref{lem:orient} for $\mathcal{R}_0$ -- $\mathcal{R}_3$.)
\end{proof}
We next show theoretical guarantees for Algorithm~\ref{alg:lFCI_mb} with estimated Markov blanket.
\begin{theorem}\label{thm:consistencyforlfcimb}
Under Assumptions~ \ref{ass:gxlocalsep}, \ref{ass:faith}, \ref{ass:cov}, \ref{ass:vanishtrekweight},
and suppose $n=\Omega((\log p)^{1/(1-2c})$.
Suppose
$\gamma$ is large enough such that $\mathrm{mb}_\gamma(G,v)=\mathrm{mb}(G,v)$ for all $v\in V$.
Suppose there exists a sequence
$\tau_{n,p}\to 0$ such that the
estimated precision matrix satisfies $\norm{\widehat \Theta-\Theta}_\infty\leq \tau_{n,p}$
with high probability.
Also assume $\min_{i\in\mathrm{adj}(G,j)}|\Theta_{ij}|\geq 2\tau_{n,p}$.
Then
there exists a sequence $\alpha_n\to 0$ such that Algorithm~\ref{alg:lFCI_mb} consistently learns a PAG for $[G]$.
Moreover,
if Assumption~\ref{ass:localdiscpaths} holds,
then it
consistently learns the maximally informative PAG.
\end{theorem}
\begin{remark}
To estimate the precision matrix, we can use in particular
generalized score matching
\citep{lin2016, Yu2019} or equivalently
the SCIO algorithm \citep{Liu2015},
which satisfies
$
\norm{\widehat\Theta-\Theta}_\infty=O_p\left(\sqrt{s_p\log (p)/n}\right),
$
where $s_p=\max_{i\in V}|\mathrm{mb}_\gamma(G,i)|$.
\end{remark}
\begin{proof}[Proof of Theorem~\ref{thm:consistencyforlfcimb}]
Under stated assumptions on precision and beta-min,
with high probability,
$
\left\{(i,j):i\in \mathrm{adj}(G,j)\right\}
\subseteq \left\{(i,j): (i,j)\in \text{supp}(\widehat \Theta)\right\}\subseteq
\left\{(i,j):i\in \mathrm{mb}_\gamma(G,j)\right\}.
$
The rest of this proof is identical to Theorem~\ref{thm:consistencylfci},
with $\eta$ replaced by $\eta-1$, following Lemma~\ref{lem:mb}.
\end{proof}
\section{Simulations with local-graph separation oracle}
\label{sec:simoracle}
\changemarker{
In this section we investigate the performance of population version of FCI, FCI+ and lFCI.
We use the exact same settings as the simulation study in Section~\ref{sec:experiments}.
We run FCI and FCI+ with oracle $m$-separations, and lFCI with oracle $\gamma$-local-separations, with $\gamma=6$. The experiment is repeated 50 times. In the power-law setting with $p=100$,
FCI is ususally much more computationally burdensome than FCI+ and lFCI. Due to this limitation, we only report the runs in which FCI terminated within 8 hours. Results are shown in Table~\ref{tab:oracle}.}
\changemarker{
Performances of the methods are evaluated by the proportion of cases in which the true (unique) maximally informative PAG is recovered.
Computational costs are compared based on the total number of CI tests and
the maximal reach levels.
We also check Assumption~\ref{ass:vanishtrekweight} directly with $\rho^*=\max_{(i,j)\notin E}\min_{S\in\mathcal{S}_{\eta,\gamma}(i,j)}|\rho(i,j|S)|$ and report the median over all cases.
Note that FCI/FCI+ are exact algorithms, meaning they recover the maximally informative PAG in all cases, because $m$-separations always
correspond to zero partial correlations. lFCI/lFCI\_mb are not guaranteed to be complete if Assumption~\ref{ass:vanishtrekweight} is violated --- though their outputs are correct PAGs, they are sometimes not maximally informative.
The proposed methods show improvement on the computational aspects: the number of tests are consistent over different graph generating schemes, whereas FCI/FCI+ could suffer in power-law cases.
The maximum
\as{reach level} ($m_{\mathrm{reach}}$) confirms the results in Section~\ref{sec:localseparation} --- in most cases the local separators are indeed as small as 3}.
\begin{table}[t]
\centering\footnotesize\setlength{\tabcolsep}{2pt}
\begin{tabular}{cccccccccccccc}
& & \multicolumn{4}{c}{ER} & \multicolumn{4}{c}{PL} & \multicolumn{4}{c}{WS} \\
& $p$ & FCI & FCI+ & lFCI & lFCImb & FCI & FCI+ & lFCI & lFCImb & FCI & FCI+ & lFCI & lFCImb \\
\multicolumn{1}{c}{\multirow{3}{*}{\%Recovered}} & 20 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 \\
\multicolumn{1}{c}{} & 50 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 \\
\multicolumn{1}{c}{} & 100 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 & 1 \\
\multicolumn{1}{c}{\multirow{3}{*}{$\rho^*$}} & 20 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\
\multicolumn{1}{c}{} & 50 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & $0$ \\
\multicolumn{1}{c}{} & 100 & 0 & 0 & 0.004 & $0$ & 0 & 0 & 0.009 & 0 & 0 & 0 & 0.001 & $0$ \\
log(\#CI) & 20 & 8.3 & 6.7 & 6.3 & 5.7 & 10.9 & 9.3 & 6.2 & 5.7 & 6.6 & 6.1 & 5.8 & 5.3 \\
& 50 & 10.4 & 8.1 & 8.2 & 7.4 & 17.1 & 13.1 & 7.7 & 7.0 & 8.5 & 7.7 & 7.6 & 6.9 \\
& 100 & 11.9 & 8.9 & 8.9 & 8.2 & 15.2 & 12.1 & 8.9 & 8.2 & 9.8 & 8.8 & 8.9 & 8.2 \\
$m_{\text{reach}}$ & 20 & 4.9 & 4.0 & 2.9 & 1.6 & 8.7 & 7.9 & 2.4 & 1.3 & 4 & 3 & 3 & 1 \\
& 50 & 6.2 & 5.2 & 3.2 & 2.0 & 13.6 & 12.5 & 2.8 & 1.4 & 5 & 4 & 3 & 2 \\
& 100 & 6.9 & 6.0 & 3.2 & 1.8 & 12.7 & 12.7 & 2.7 & 1.3 & 6 & 5 & 3 & 2
\end{tabular}
\caption{Average performance of population version of FCI, FCI+, lFCI and lFCImb with graphs of size $p\in \{20,50,100\}$ and fixed $\gamma=6$. }
\label{tab:oracle}
\end{table}
\subsection{Local separation and local paths}
Our algorithm, presented in Section~\ref{sec:method}, is \md{based on a \textit{local separation property} that holds for many common networks. The property yields} that short $m$-connecting paths between non-adjacent nodes can be blocked by small sets.
A sufficient condition for the local separation property is the \emph{local path property},
\changemarker{which involves a length and a path count parameter.
These will be specified later for specific graphs.}
\begin{definition}[$(\eta,\gamma)$-local path property]\label{def:localpathproperty}
Let $\eta,\gamma\ge 1$ be integers. An undirected graph $G$ satisfies the $(\eta,\gamma)$-local path
property if for any two non-adjacent nodes, there are at most $\eta$
paths between them with length no longer than $\gamma$.
\end{definition}
\as{While it does not restrict the total number of paths, }
the $(\eta,\gamma)$-local path property implies that the number of short paths between non-adjacent nodes is bounded.
\changemarker{
Many random graph processes
generate sequences of undirected graphs with increasing vertex set size $p$ that (for process-specific $\eta$ and $\gamma$) satisfy the $(\eta,\gamma)$-local-path property with probability tending to 1 as $p\to\infty$.
Examples include Erd{\H{o}}s-Renyi graphs \citep{bollobas2001, anandkumar12a}, power-law random graphs
with strongly finite mean \citep{chung2006, dembo2008, dommers2010}, and $\Delta$-regular random graphs \citep{mckay2004}.
Surprisingly, in all these cases, the constants can be chosen as $\eta=2$ and $\gamma=O(\log p)$}.
Local separation \md{in} undirected graphs does not naturally extend to directed and mixed graphs, since $m$-separation is not implied by undirected graph separation. To overcome this issue, \citet{arjun2018} consider a directed ``local separator" between two nodes as the smallest set that blocks all short $d$-connecting paths between them.
However, this ``local separator" may unblock a large number of long $d$-connecting paths (see Figure~\ref{fig:localpathvsgraph}).
This is particularly problematic when edges amongst ``local separator" nodes form \md{dense} structures.
As a consequence, \md{consistency of} rPC requires strong assumptions on the data-generating distributions (under which the ``local separators" act like true separators).
In this work, we mitigate this limitation by focusing instead on subgraphs induced by nodes on short paths.
\begin{definition}[Local graph]\label{def:localgraph}
For a graph $G=(V,E)$ and two nodes $i,j\in V$,
\md{let $P(G,i,j)$ be the set of all paths between $i$ and $j$,
and let $P_\gamma(G,i,j)$ be the set of those that are not longer than $\gamma$.
The \textit{$\gamma$-local graph of $\{i,j\}$}, denoted $G_\gamma(i,j)$, is the subgraph of $G$
induced by the set $V_\gamma(i,j)=\{v\in V: v\in \pi \text{ for some }\pi\in P_\gamma(G,i,j)\}$.
}
\end{definition}
\md{The motivation for our definition is that subgraphs better capture causal relations than subsets of paths. Moreover,} \changemarker{
$m$-separators in local graphs are interpretable.}
\begin{figure}[t]
\centering
\begin{tikzpicture}[
> = stealth,
shorten > = 1pt,
auto,
node distance = 1cm,
semithick,
scale=.8
]
\node[c1] (i) at(-.5,0) {$i$};
\node[c1] (j) at(4.5,0) {$j$};
\node[c1] (1) at(.75,0.7) {1};
\node[c1] (2) at(3.25,0.7) {2};
\node[c1] (3) at(2,0) {3};
\node[c1] (4) at(.75,-0.7) {4};
\node[c1] (5) at(3.25,-0.7) {5};
\draw[->] (1) -- (i);
\draw[->] (1) -- (3);
\draw[->] (2) -- (3);
\draw[->] (2) -- (j);
\draw[->] (3) -- (i);
\draw[->] (3) -- (j);
\draw[->] (4) -- (i);
\draw[->] (4) -- (3);
\draw[->] (5) -- (3);
\draw[->] (5) -- (j);
\end{tikzpicture}
\caption{\md{A graph $G$ with $G=G_\gamma(i,j)$ for $\gamma=3$; every node lies on a path of length at most three between $i$ and $j$. The set $\{2,3,5\}$ is a $\gamma$-local-graph separator.}
\md{In contrast, the definition of
\citet{arjun2018} makes the set $\{3\}$ a $\gamma$-``local separator" of $(i,j)$, although there are 4 ``local but not short" paths (e.g., $i-1-3-2-j$) that are d-connected given $\{3\}$.}
}\label{fig:localpathvsgraph}
\end{figure}
\begin{definition}[$\gamma$-local-graph separator]\label{def:localseparator}
\md{Let $i,j$ be two nodes in a MAG $G=(V,E)$. A $\gamma$-local-graph separator of $(i,j)$ is a subset
$S\subset V_\gamma(i,j)$
that
$m$-separates $i$ and $j$ in $G_\gamma(i,j)$. }
\end{definition}
\changemarker{A local-graph separator is a genuine $m$-separator in the subgraph: It blocks not only short, but also long paths in the local graph; see Figure~\ref{fig:localpathvsgraph}.
However, a set that $m$-separates $i,j$ in $G_\gamma(i,j)$ does not necessarily $m$-separate them in $G$
(see Figure~\ref{fig:ex1}). Hence, local-graph separations are not necessarily reflected in the independence model $\mathcal{I}(G)$.
Nevertheless, the next result shows the existence of local-graph separators is equivalent to absence of edges.
\begin{lemma}\label{lem:localsep}
Let $G=(V,E)$ be a MAG, and let $\gamma\ge 1$ be any integer.
Two nodes $i,j$ are non-adjacent in $G$ if and only if they are $\gamma$-local-graph separated
by some set $S_\gamma$.
\end{lemma}
\begin{proof}
By definition of MAGs, nodes $i,j$ are non-adjacent in $G$ if and only if there exists a set $S$ that blocks all paths between $i,j$ in $G$. If such a set exists, we write $S_\gamma=S\cap V_{\gamma}(i,j)$. Since $S\setminus S_\gamma$ is disjoint from $V_\gamma(i,j)$, all paths between $i$ and $j$ in the subgraph $G_\gamma(i,j)$ must be blocked by $S_\gamma$, and hence $S_\gamma$ is a local separator. The other direction is trivial.
\end{proof}
Though local-graph separators might be less informative than $m$-separators in the full graph, they usually have bounded size even in graphs with unbounded node degrees.
Local separators can be useful in such cases, as the minimal $m$-separators in the full graphs might be large}.
\subsection{Graphs with small local-graph separators}
The computational and sample complexities of PC and FCI algorithms depend on the maximum size of
$m$-separators in the underlying graph.
\md{The applicability of the algorithms
is thus limited to settings where the neighborhood-based D-SEP sets are all small.
However, this does usually not hold in the presence of nodes with large degree (cf.~Appendix~\ref{sec:simoracle}), which are common to many real-world networks.}
Nevertheless, such networks are often still sparse, in the sense of having small $\gamma$-local-graph separators. The algorithm proposed in this paper exploits this weaker notion of sparsity to offer sample and computational complexities that depend only on the maximum size of $\gamma$-local-graph separators, i.e., on
\md{
\[
L(G,\gamma) = \max_{(i,j)\notin E}\min_{S\in \mathcal{S}_\gamma(i,j)} |S|,
\]
where $\mathcal{S}_\gamma(i,j)$ is the set of all $\gamma$-local separators of nodes $i,j$ in a mixed graph $G=(V,E)$.}
\md{If a DAG $G$ has
maximal in-degree
at most $\Delta>0$, }
then for arbitrary $\gamma\in\mathbb{N}$, it holds that
$
L(G,\gamma)\leq \Delta.
$
We next show that a similar upper bound holds more generally, as long as the DAG satisfies the local-path property, which allows for potentially unbounded node degrees.
\begin{lemma}\label{lem:sepsetsize}
If the skeleton of a DAG $G$ satisfies the $(\eta,\gamma)$-local path property,
then it holds that $L(G,\gamma)\leq\eta.$
\end{lemma}
\begin{proof} \md{
Fix any non-adjacent nodes $i$ and $j$.
Since $G$ is acyclic, two nodes cannot be ancestors of each other in $G$ or any subgraph.
Without loss of generality,
suppose $i\notin \mathrm{an}(G,j)$, and let
$S =
\mathrm{pa}(G_\gamma(i,j),i)
$.
Then paths between $i$ and $j$ in graph $G_\gamma(i,j)$ either have a non-collider included in $\mathrm{pa}(G_\gamma(i,j),i)$, or have a collider that is not in $\mathrm{pa}(G_\gamma(i,j),i)$. Thus,
$\mathrm{pa}(G_\gamma(i,j),i)$
is a $d$-separator.
Since $G_\gamma(i,j)$ is induced by \smallchangemarker{$P_\gamma(G,i,j)$}, for each $v\in \mathrm{ne}(G_{\gamma}(i,j),i)$, the edge $(i,v)$
must lie on at least one short path between $i$ and $j$.
Therefore, $\eta\geq
|\mathrm{ne}(G_{\gamma}(i,j),i)|\geq|S|$.}
\end{proof}
Lemma~\ref{lem:sepsetsize} suggests that in many large random DAGs,
the maximum node-degree of the local-path graph can be small
while the maximum node-degree may be large.
As a corollary to the construction we employed in the proof, the ``approximation" of rPC in \cite{arjun2018} is in fact an exact algorithm if the local path property holds (see Corollary~\ref{cor:consistencyrpc}).
The problem is more complicated for \md{MAGs, which may have large minimal separators even with bounded degree (with bidirected edges $m$-separation of non-adjacent nodes generally requires consideration of non-neighboring nodes).}
Thus, compared with PC, the FCI theory requires an additional assumption on the size of
possible-$d$-separation sets. The theory for RFCI imposes a similar limit on the size of separators in the initial step \citep{colombo2012}.
\md{The FCI+ theory exploits an assumption of bounded node degree to avoid additional assumptions on the size of bidirected components} \citep{claassen2013}.
\changemarker{However, these results either prohibit the existence of generic hub nodes with large degrees or have sub-par sample and computational complexities}.
\as{In contrast, the size of minimal local-separation sets is determined by short paths in $G_\gamma(i,j)$. Thus, by utilizing local-graph separators, and under the additional assumptions discussed in Section~\ref{sec:analysis}, our framework achieves improved computational and sample complexity.}
Next we show that as long as the skeleton of a MAG has small number of short paths, the size of the \changemarker{local-}separators is controlled:
\begin{lemma}\label{lem:sepsetsizeMAG}
If the skeleton of a MAG $G$ satisfies the $(\eta,\gamma)$-local path property
with $\eta\leq 3$,
then
$L(G,\gamma)\leq\eta. $
\end{lemma}
\begin{proof}
This lemma is proved by enumeration of all possible graph configurations. Details are given in Appendix~\ref{sec:appendix}.
\end{proof}
Lemma~\ref{lem:sepsetsizeMAG} covers most common random graphs. For instance, for Erd{\H{o}}s-Renyi graphs, power-law graphs with strongly finite mean, and $\Delta$-regular graphs, it holds with $\eta\leq2$.
As we discuss in Section~\ref{sec:method}, for these graphs, we only need to search for separators of size up to 2.
Our next result shows that
\md{we can further reduce the size of separator
by restricting focus on pairs of nodes
in \emph{local Markov blankets}.} The
\emph{Markov blanket} of node $i$ in a MAG $G$, denoted $\mathrm{mb}(G,i)$, \changemarker{is the minimal set of vertices that separates $i$ from all other vertices}.
Concretely, it is the union of vertices connecting to $i$ through either an edge, or a \md{collider path} (i.e., a path on which all non-endpoints are colliders). The $\gamma$-local
Markov blanket
$\mathrm{mb}_\gamma(G,i)$ is the union of vertices connecting to $i$ through either an edge or
a \md{collider path of length at most} $\gamma$.
\begin{lemma}\label{lem:mb}
Let $G=(V,E)$ be a MAG, and define
\[
L^{\text{mb}}(G,\gamma) = \max_{(i,j)\notin E, i\in \mathrm{mb}_\gamma(G,j)} \;\min_{S\in \mathcal{S}_\gamma(i,j)}|S|.
\]
If the skeleton of $G$ satisfies the $(\eta,\gamma)$-local path property with $\eta\leq 4$, then
\[
L^{\text{mb}}(G,\gamma)\leq \max(0,\eta-1).
\]
\end{lemma}
\begin{proof}
Suppose $i\notin \mathrm{adj}(G,j)$ but $i\in \mathrm{mb}_\gamma(G,j)$. Then $i$ and $j$ must be connected via a \md{collider path} $\pi$.
There must be a node on $\pi$, call it $u$, that is not ancestral to $i$ and $j$, because
$\pi$ would otherwise \md{prevent $m$-separation of $i$ and $j$},
which contradicts $G$ being a MAG.
\md{Let $G_\gamma^{-u}(i,j)$ be} the subgraph of $G_\gamma(i,j)$ \md{induced by the complement of $u$}.
Every minimal separator of $(i,j)$ in $G_\gamma^{-u}(i,j)$ also minimally
separates $i$ and $j$ in $G_\gamma(i,j)$ \citep[see, e.g.,][]{Zander2019}.
It is easy to see that $G_\gamma^{-u}(i,j)$ has at most $\eta-1$ many short paths between $i$ and $j$. Hence, the result follows from Lemma~\ref{lem:sepsetsizeMAG}.
\end{proof}
More generally, our framework accommodates
hybrid graphs, consisting of a ``global" graph with small maximal degree, and a ``local" graph with bounded local-paths, paralleling the class of undirected hybrid graphs defined in \citet{chung2006}.
As a concrete example, the Watts-Strogatz (or small-world) graph consists of the union of a $d$-dimensional regular graph and an Erd{\H{o}}s-Renyi random graph
\citep{watts1998}.
\begin{theorem}\label{prop:hybridMAG}
Let $G=(V,E)$ be a MAG. For any two non-adjacent nodes $i$ and $j$, let $M_{ij}$ be the set of nodes that do not lie on any path in $P(G,i,j)$ that uses a bidirected edge.
\smallchangemarker{Suppose} for each pair of non-adjacent nodes $i,j$, there exists a set $M\subseteq M_{ij}$
such that
the subgraph of $G$ induced by $M\cup\{i,j\}$ has node-degree no
larger than $\Delta$, and the subgraph of
$G$ induced by $V\setminus M$ satisfies the
local path property with some $\eta_0\leq 3$ and
some $\gamma$. Let $\eta=\eta_0+\Delta$. The following statements hold,
\[ L(G,\gamma)\leq\eta \quad\text{and}\quad
L^{\text{mb}}(G,\gamma)\leq \max(0,\eta-1).
\]
\end{theorem}
\begin{proof}
Let $i,j$ be non-adjacent nodes in $G$.
Without loss of generality,
let $i\notin \mathrm{an}(G,j)$.
Let $G^1$ and $G^2$ be the subgraphs induced by $M\cup\{i,j\}$ and $V\setminus M$, respectively.
Let $S^1 = \mathrm{pa}(G^1,i)$, and let $S^2$ be a $\gamma$-local-graph separator of $(i,j)$ in
$G^2$.
We have $P(G,i,j)=P(G^1,i,j)\sqcup P(G^2,i,j)$ where $\sqcup$ stands for disjoint union.
Thus, $S^1\sqcup S^2$ is a $\gamma$-local-graph separator of $(i,j)$.
By Lemma~\ref{lem:sepsetsizeMAG},
$|S^1|+|S^2|\leq \Delta+\eta_0$. Lemma~\ref{lem:mb} gives the Markov blanket result.
\end{proof}
\section{Introduction}\label{sec:intro}
\input{introduction.tex}
\section{Preliminaries}\label{sec:prelims}
\input{preliminaries.tex}
\section{Local Separation in Large Random Graphs}\label{sec:localseparation}
\input{localseparation.tex}
\section{A Local FCI Algorithm (lFCI)}\label{sec:method}
\input{method.tex}
\section{Consistency of the lFCI Algorithm}\label{sec:analysis}
\input{theory.tex}
\section{Numerical Experiments}\label{sec:experiments}
\input{simulation.tex}
\section{Application: Gene Regulatory Network Inference}\label{sec:application}
\input{application.tex}
\section{Discussion}\label{sec:disc}
\input{disc.tex}
\bibliographystyle{apalike}
\subsection{Conditional independence testing}
\subsection{lFCI}\label{sec:lFCI}
To learn \md{a MAG $G=(V,E)$},
PC/FCI adopt the following \md{strategy}.
Starting with a complete
undirected graph $C$, they first search for separating sets of size $\ell=0$: If two nodes are independent given a set of size 0 (i.e., marginally independent), the corresponding edge in $C$ is removed.
\md{Iteratively increasing the value of $\ell$ by one, the algorithm visits all pairs $(i,j)$ adjacent in $C$} and searches amongst all sets $S\subseteq J(i,j,C)$ with $|S|=\ell$, where $J(i,j,C)\subseteq V\setminus\{i,j\}$ is a current \emph{search pool}. \md{If a conditional independence $i\independent j|S$ is found, the edge $i-j$ is removed from $C$.}
The algorithm \md{stops when $\ell$ exceeds the maximum size of the sets in the search pool.}
\md{(In rPC, the iterations are stopped early at a specified level for $\ell$.)}
The value of $\ell$ at
termination
is
the \emph{reach level}, denoted $m_{\textnormal{reach}}$.
With a conditional independence oracle, PC terminates at
\md{$m_{\textnormal{reach}}(\textnormal{PC}) \le d_{\max}-1$,}
where $d_{\max}$ is the maximum node degree; the reach level of the second step of FCI is the maximum size of p-D-SEP sets.
Our lFCI algorithm follows a similar strategy but with two key differences.
The first difference is the construction of the search pool, $J(i,j,C)$.
Given a working skeleton $C$ that is a supergraph of $\text{skel}(G)$,
a construction of $J(i,j,C)$ is valid if each pair of non-adjacent nodes $(i,j)$ is separated by some subset of $J(i,j,C)$.
\smallchangemarker{PC/FCI} adopt a neighborhood-based strategy: PC uses
$J_{\textnormal{PC}}(i,j,C)=\left(\mathrm{adj}(i,C)\cup \mathrm{adj}(j,C)\right)\setminus\{i,j\}$, and
FCI uses $J_{\textnormal{PC}}$ in its first step and $J_{\textnormal{FCI}}(i,j,C)= \textnormal{p-D-SEP}(i,j)$ in its second step.
In contrast,
inspired by the local separation property,
our lFCI algorithm \changemarker{adopts a local-graph-based strategy, in which we form an alternative search pool that is guaranteed to contain a local separator by including the nodes that are \emph{close} to both $i$ and $j$. Figure~\ref{fig:searchpool} exemplifies the difference between neighborhood-based and local-graph-based searches}.
More concretely,
let $D_G(i,j) =
\min_{\pi\in P(G,i,j)}|\pi|$ be the shortest-undirected-path distance between nodes $i$ and $j$ in $G$, with $D_G(i,j) = \infty$ if $P(G,u,v)=\emptyset$.
Writing $C_{-ij}$ for the working skeleton $C$ with edge $i-j$ removed, we define
\begin{equation}\label{eq:pool}
J_{\gamma}(i,j,C)=\left\{ k\in V\setminus \{i,j\}: D_{C_{-ij}}(i,k)+ D_{C_{-ij}}(j,k)\leq\gamma \right\}.
\end{equation}
\as{While otherwise distinct, the idea of searching among nodes that lies on connecting paths is related to the path modification of FCI in FCI$_{\text{path}}$ \citep{colombo14a}, which uses a different search pool, $J_{\text{FCI}_\text{path}}(i,j,C)=J_{\text{FCI}}(i,j,C)\cap J_p(i,j,C)$}.
The following lemma shows that $J_{\gamma}(i,j,C)$ is a superset of $V_\gamma(i,j)$ from Definition~\ref{def:localgraph} and is hence a valid search pool.
\changemarker{
\begin{lemma}\label{lem:searchingpool}
Let $G$ be a MAG, and let $C$ be a super-graph of $\text{skel}(G)$.
Two nodes $i,j$ are non-adjacent in $G$ if and only if they are $\gamma$-local-graph separated by a subset of
$J_\gamma(i,j,C)$.
\end{lemma}}
The second innovation in our approach lies in its termination criterion.
\md{The complexities of \md{PC and FCI} are determined by their reach levels $m_{\textnormal{reach}}$, which scale with the maximum degree $d_{\max}$ of the graph.}
\md{As a result,} these values can be very large if the graph includes hub nodes. In particular, when considering sequences of structure learning problems where a few nodes are allowed to have $O(p)$ many neighbors, PC and FCI (and also FCI+) cannot terminate in polynomial time.
Our approach \md{offers a strategy to circumvent this problem by early termination} when searching on local graphs.
\md{Indeed, sparse graphs may still satisfy the conditions in Theorem~\ref{prop:hybridMAG} for bounded $\eta$.
The reach level of our local-graph-based approach}
is then at most $\eta$, so $O(1)$.
\md{Therefore, through its focus on local graphs},
our lFCI algorithm may enjoy polynomial-time complexity even in graphs with hub nodes---settings that become problematic for PC and FCI.
\changemarker{
We emphasize that an ad hoc early stopping (or ``anytime") version of PC and FCI avoids the computational issue \citep{spirtes2001} but will generally result in false discoveries. Indeed, even if the conditions in Theorem~\ref{prop:hybridMAG} hold,
the smallest neighborhood-based D-SEP set is not necessarily small; compare Figure~\ref{fig:searchpool}}.
\begin{figure}[t]
\centering
(a)
\begin{tikzpicture}[
> = stealth,
shorten > = 1pt,
auto,
node distance = 1cm,
semithick,scale=0.
]
\tikzstyle{every state}=[
draw = black,
thick,
fill = white,
minimum size = 4mm
]
\node[c1] (1) at(0,0) {1};
\node[k2] (2) at(1,1) {2};
\node[k2] (3) at(2.3,1.5) {3};
\node[c1] (4) at(2.3,0.3) {4};
\node[k2] (5) at(1.7,-0.3) {5};
\node[c1] (6) at(1.7,-1.5) {6};
\node[c1] (7) at(3,-1) {7};
\node[c1] (8) at(4,0) {8};
\node[k2] (9) at(0,2.2) {$a$};
\node[c1] (12) at(4,2.2) {$b$};
\node[c11] (10) at(1,2.2) {};
\node[c11] (11) at(2,2.2) {};
\node[c11] (13) at(3,2.2) {};
\draw[<->,line width= 1] (1)--(2);
\draw[<->,line width= 1] (3)--(2);
\draw[<->,line width= 1] (7)--(8);
\draw[<->,line width= 1] (6)--(7);
\draw[->,line width= 1] (2)--(4);
\draw[->,line width= 1] (3)--(4);
\draw[->,line width= 1] (7)--(5);
\draw[->,line width= 1] (6)--(5);
\draw[->,line width= 1] (5)--(1);
\draw[->,line width= 1] (4)--(8);
\draw[<-,line width= 1] (1)--(9);
\draw[<-,line width= 1] (8)--(12);
\draw[<-,line width= 1] (9)--(10);
\draw[<->,line width= 1] (10)--(11);
\draw[->,line width= 1] (11)--(13);
\draw[->,line width= 1] (13)--(12);
\end{tikzpicture}\qquad
(b)
\begin{tikzpicture}[
> = stealth,
shorten > = 1pt,
auto,
node distance = 1cm,
semithick,scale=0.
]
\tikzstyle{every state}=[
draw = black,
thick,
fill = white,
minimum size = 4mm
]
\node[c1] (1) at(0,0) {1};
\node[k2] (2) at(1,1) {2};
\node[k2] (3) at(2.3,1.5) {3};
\node[k2] (4) at(2.3,0.3) {4};
\node[k2] (5) at(1.7,-0.3) {5};
\node[k2] (6) at(1.7,-1.5) {6};
\node[k2] (7) at(3,-1) {7};
\node[c1] (8) at(4,0) {8};
\draw[<->,line width= 1] (1)--(2);
\draw[<->,line width= 1] (3)--(2);
\draw[<->,line width= 1] (7)--(8);
\draw[<->,line width= 1] (6)--(7);
\draw[->,line width= 1] (2)--(4);
\draw[->,line width= 1] (3)--(4);
\draw[->,line width= 1] (7)--(5);
\draw[->,line width= 1] (6)--(5);
\draw[->,line width= 1] (5)--(1);
\draw[->,line width= 1] (4)--(8);
\end{tikzpicture}\qquad
(c)
\begin{tikzpicture}[
> = stealth,
shorten > = 1pt,
auto,
node distance = 1cm,
semithick,scale=0.
]
\tikzstyle{every state}=[
draw = black,
thick,
fill = white,
minimum size = 4mm
]
\node[c1] (1) at(0,0) {1};
\node[k2] (2) at(1,1) {2};
\node[k2] (4) at(2.3,0.3) {4};
\node[k2] (5) at(1.7,-0.3) {5};
\node[k2] (7) at(3,-1) {7};
\node[c1] (8) at(4,0) {8};
\draw[<->,line width= 1] (1)--(2);
\draw[<->,line width= 1] (7)--(8);
\draw[->,line width= 1] (2)--(4);
\draw[->,line width= 1] (7)--(5);
\draw[->,line width= 1] (5)--(1);
\draw[->,line width= 1] (4)--(8);
\end{tikzpicture}
\caption{
\md{Search strategies of FCI and lFCI: (a) True
$G$, (b) local-graph $G_{4}(1,8)$, (c) local-graph
$G_{3}(1,8)$.
Search pools $J_{\text{FCI}}(1,8)$,
$J_4(1,8)$ and $J_3(1,8)$ are shaded.
FCI discovers the separator $\{a,2,3,5\}$ in $G$ (differs from minimal separator $\{a,4,5\}$).
For both $\gamma=3,4$, lFCI discovers the local-graph separator $\{4,5\}$ (small but only correct in the local graph).
Note that
FCI cannot be early-stopped at reach level 2 even if we
ignore the path $(1,a,\ldots,b,8)$.
}}
\label{fig:searchpool}
\end{figure}
Our lFCI proposal is summarized in Algorithm~\ref{alg:lFCI}. Starting with a complete graph $C$ and level $\ell=0$,
lFCI traverses every edge $(i,j)$ and \md{searches for a conditional independence $i\independent j|S$ given subsets $S\in J_\gamma(i,j,C)$} of size $|S|=\ell$.
If a conditional independence is found the edge is removed from $C$.
The level $\ell$ is increased after checking all edges, and the algorithm terminates when
$\ell$ hits the reach level $m_\textnormal{reach} = \eta$, which is picked \md{in advance with a view towards potential underlying graph structure (similar to how node degrees are bounded in other algorithms)}.
Throughout the search, we keep track of the shortest-path-distances between nodes, but only update them after completing the $\ell$-th level. This makes the algorithm \textit{order-independent}, i.e., the output does not depend on the order in which edges are tested
\citep[see, e.g.,][]{colombo14a}.
\subsection{Tuning parameters}
Given Lemma~\ref{lem:searchingpool}, $\gamma$ acts as a tuning parameter that controls the breadth of the search in our algorithm.
Theoretically, $\gamma$ should be
small enough
such that the underlying graph $G$ has small $\gamma$-local-graph separators,
yet large enough such that paths \smallchangemarker{not contained in $G_\gamma$} contribute little to total effects in the graphical model.
\changemarker{
Theorem~\ref{prop:hybridMAG} notes that
many random graphs
satisfy $L(G,\gamma)\leq\eta$
with $\gamma=O(\log p)$ with high probability as the number of nodes $p\to\infty$.
Due to this fact, \md{our later analysis allows (but does not require)} $\gamma$ to grow with $p$, in which case
distributional conditions may be weakened for larger graphs.}
\md{We note that in our later simulations lFCI terminates early, and its performance is rather insensitive to our choice of $\gamma$, see Section 4 of the Supplementary Material.}
The maximum size of separating sets, $\eta$, is
a tuning parameter that controls the depth of the search and allows lFCI to terminate
\smallchangemarker{
at smaller levels}
than PC/FCI.
\md{Choosing $\eta$ is akin to an a priori choice of the maximum node degree in other algorithms, recall Theorem~\ref{prop:hybridMAG}.}
\begin{algorithm}[t]
\caption{lFCI}
\SetKwInOut{Input}{Input}
\SetKwInOut{Output}{Output}
\Input{Tests of conditional independences $i\independent j|S$,\\
maximum separating set size $\eta$, locality parameter $\gamma$.}
\Output{A partial ancestral graph $C$}
$C,C_{\textnormal{old}}\gets$ complete undirected graph over $[p]$\;
Initialize $\textnormal{SEP}\gets \varnothing$ and
$\ell\gets -1$\;
\Repeat{\textsc{\upshape$\ell> \eta$}}{
$\ell\gets\ell+1$\;
\Repeat{\textsc{\upshape all ordered pairs of $(i,j)$ has been checked}}{
Select a (new) ordered pair of nodes $(i,j)$ that are adjacent in $C$\;
\Repeat{\textsc{\upshape $(i,j)$ is deleted or \smallchangemarker{all subsets of $J_\gamma(i,j,C_{\text{old}})$ with size $\ell$ are checked}}}{
Choose a (new) $S\subseteq J_\gamma(i,j,C_{\textnormal{old}})$ with $|S|=\ell$\;
\lIf{
$i\independent j|S$
}{
Delete edge $(i,j)$ from $C$, and
record $\textnormal{SEP}(i,j)\gets S$
}
}
}
$C_{\textnormal{old}}\gets C$\;
}
Orient edges in $C$ using the SEP sets, by the modified rules in Section~\ref{sec:orient}\;
\Return A PAG $C$.
\label{alg:lFCI}
\end{algorithm}
\subsection{Orientation rules}\label{sec:orient}
After inferring the skeleton using conditional independence tests,
we orient as many edges as possible
to obtain a PAG representation
of the Markov equivalence class of MAGs.
\changemarker
Given the undirected skeleton of the true MAG
and a collection of minimal separators,
the orientation procedure proposed in \citet{zhang2008}
applies
eleven deterministic rules to obtain the maximally informative PAG}.
In other words, the population version of FCI is sound (i.e., never returns a wrong result) and complete (i.e., the output is maximally informative in the sense of discovering all causal relations common to the graphs in the equivalence class).
\changemarker{
\as{However, these properties are \emph{not}}
guaranteed if we apply the rules directly with local-separation,
because
the local separators are usually not $m$-separators.}
\begin{figure}[btp]
\centering
\begin{tikzpicture}[
> = stealth,
shorten > = 1pt,
auto,
node distance = 1cm,
semithick, scale=0.8
]
\node[c1] (i) at(0,0) {$i$};
\node[c1] (j) at(6,-1) {$j$};
\node[c1] (1) at(1.5,0.2) {$w$};
\node[c1] (2) at(3,0.4) {$u$};
\node[c1] (3) at(4.5,0.4) {$v$};
\node[c1] (4) at(6,0.2) {$x$};
\node[c1] (5) at(7.5,0) {$y$};
\draw[<->] (i) -- (1);
\draw[<->] (2) -- (1);
\draw[<->] (2) -- (3);
\draw[<->] (4) -- (3);
\draw[<->] (4) -- (5);
\draw[->] (1) -- (j);
\draw[->] (2) -- (j);
\draw[->] (3) -- (j);
\draw[->] (4) -- (j);
\draw[->] (5) -- (j);
\end{tikzpicture}
\caption{
\changemarker{\md{Nodes}
$i$ and $j$ are $m$-separated given
$\{w,u,v,x,y\}$ and
all other non-adjacent pairs are marginally $m$-separated.
There is a discriminating path $(i,w,u,v,x,y,j)$ for $y$.
In FCI, the edge $y\to j$ is oriented correctly.
For $\gamma=5$, the $\gamma$-local separator of $(i,j)$ is $\{w,u,v,x\}$, with which the discriminating path rule outputs
$y\leftrightarrow j$, which is inconsistent with the truth.}}
\label{fig:rule4}
\end{figure}
\changemarker{Surprisingly, however, soundness under local-separation can be achieved with only a single change to Zhang's Rule $\mathcal{R}_4$, which pertains to \textit{discriminating paths}. Furthermore, completeness can be achieved under an additional condition on these discriminating paths.
A path between $i$ and $j$, $\pi=(i,\ldots, x,y,j)$, is a discriminating path for $y$ if $\pi$ includes at least three edges;
$y$ is adjacent to $j$ on $\pi$; $i$ is not adjacent to $j$; and every vertex between $i$ and $y$ is a collider on $\pi$ as well as a parent of $j$.
An example of the failure of the unmodified discrimination path rule (Rule $\mathcal{R}_4$) is given in Figure~\ref{fig:rule4}.
The original \citep{zhang2008} and the modified versions may be contrasted as follows}:
\begin{enumerate}
\item[$\mathcal{R}_4:$] If $\pi$ is a discriminating path between $i$ and $j$ for $y$, and $y\mo{\moveX{-1}$\ \multimapinv\ $ \moveX{1.5}$\star$} j$, then if $y\in S(i,j)$, orient
$y\mo{\moveX{-1}$\ \multimapinv\ $ \moveX{1.5}$\star$} j$ as $y\to j$; otherwise orient the triple $(x,y,j)$ as $x\leftrightarrow y\leftrightarrow j$.
\item[$\mathcal{R}_4':$] If $\pi$ is a discriminating path between $i$ and $j$ for $y$, and $y\mo{\moveX{-1}$\ \multimapinv\ $ \moveX{1.5}$\star$} j$, then if $v\in S(i,j)$, orient
$y\mo{\moveX{-1}$\ \multimapinv\ $ \moveX{1.5}$\star$} j$ as $y\to j$;
\changemarker{if $y\notin S(i,j)$ and
all vertices in $\pi$ are contained in the $\gamma$-local-graph of $(i,j)$},
then orient $(x,y,j)$ as $x\leftrightarrow y\leftrightarrow j$; otherwise orient $y\mo{\moveX{-1}$\ \multimapinv\ $ \moveX{1.5}$\star$} j$ as $y\mathrlap{\multimapinv}\to j$.
\end{enumerate}
\changemarker{
Rule $\mathcal{R}_4'$ avoids wrong decisions when local-graph separators do not provide enough information.
The original and modified rules give the same output
under
the following condition.}
\begin{assumption}[Local discriminating paths]\label{ass:localdiscpaths}
Let $G$ be a MAG and $\gamma$ be an integer.
Denote $\Pi^D(G,i,j,y)$ as the set of discriminating paths between $i$ and $j$ for $y$ in $G$.
If $\Pi^D(G,i,j,y)\neq \emptyset$ for the triple $(i,j,y)$,
then there exists $\pi\in \Pi^D(G,i,j,y)$ such that $\pi\subset G_\gamma(i,j)$.
\end{assumption}
\changemarker{
In the next lemma we show soundness and completeness of population lFCI.}
\changemarker{
\begin{lemma}\label{lem:orient}
Let $G$ be a MAG. Let the lFCI parameters $\eta$
and $\gamma$ be integers such that $\gamma>2$
and $L(G,\gamma)\leq \eta$.
Then with a local-graph separation oracle,
lFCI outputs a PAG for $[G]$.
If in addition Assumption~\ref{ass:localdiscpaths} holds,
then the lFCI output is the
maximally informative PAG.
\end{lemma}}
\begin{proof}
\changemarker{
By Lemma~\ref{lem:localsep}, the output of the skeleton step is correct.
In FCI, Zhang's orientation rules $\mathcal{R}_0$ (unshielded triple rule) and $\mathcal{R}_4$ (discriminating path rule) introduce arrowheads using the separation sets, whereas the rest of the rules, $\mathcal{R}_1-\mathcal{R}_3$ and $\mathcal{R}_5-\mathcal{R}_{10}$, only depend on the results of $\mathcal{R}_0$ and $\mathcal{R}_4$.
Therefore, the orientation phase is sound if all arrowheads introduced by $\mathcal{R}_0$ and $\mathcal{R}_4$ are correct, and complete if $\mathcal{R}_0$ and $\mathcal{R}_4$ introduce as many arrowheads as possible. For details of the rules, see \citet{zhang2008}.}
\changemarker{
First we consider $\mathcal{R}_0$, which orients
an unshielded triple $(i,j,k)$ into a v-structure if $j$ is not in the separator for $(i,k)$. In lFCI,
if $j$ is not in the $\gamma$-local separator,
then $(i,j,k)$ must be a marginally blocked path in both $G$ and $G_{\gamma}(i,k)$. Thus, $\mathcal{R}_0$ produces the same output using local- and full-graph-separators.
Next we show $\mathcal{R}_4'$ is sound. Indeed,
if $\pi$ is a discriminating path between $i$, $j$ for $y$ and $y\in S_\gamma(i,j)$, then the last edge on $\pi$ must be oriented as $y\to j$ to avoid unblocking $\pi$. If $y\notin S_\gamma(i,j)$ and $\pi$ is contained in the local-graph, then $\mathcal{R}_4'$ is the same as $\mathcal{R}_4$ in $G_\gamma(i,j)$;
otherwise, $\mathcal{R}_4'$ simply avoids making wrong decisions. We conclude that by Theorem 1 of \citet{zhang2008}, the orientation phase of lFCI using local-separators is sound.}
\changemarker{Under the additional condition, if $(i,j,y)$ can be oriented using a full-graph separator by $\mathcal{R}_4$, then there is a discriminating path in $G_\gamma(i,j)$ such that the same orientation is made by $\mathcal{R}_4'$. Therefore, the lFCI output is identical to that of FCI, which is maximally informative.
}
\end{proof}
\subsection{Computational complexity}\label{sec:algandcomputation}
As discussed in Section~\ref{sec:lFCI}, the computational advantages of lFCI over FCI,
RFCI
and FCI+
stem from two key differences:
(i) the use of a local-graph-based strategy ($J_\gamma$) instead of
the neighborhood-based strategy ($J_{\textnormal{FCI}}$); and
(ii) searching up to sets of size $\eta$.
As a result, lFCI achieves computational complexity $O(p^{\eta+2})$, which
is the same as that of rPC \citep{arjun2018}.
In contrast, the worst case computational complexity of FCI is
exponential and FCI+ has computational complexity $O(p^{d_{\max}+2})$. Though FCI+ offers polynomial complexity when $d_{\max}$ is bounded \citep{claassen2013}, it becomes inefficient in the setting of power-law graphs with highly connected hub nodes, when $d_{\max}=O(p^a)$ for some $a>0$ \citep{molloy1995}. For these graphs, FCI+ offers exponential complexity $O(p^{p^a+2})$, compared with $O(p^4)$ for lFCI.
\subsection{Initialization with Moral Graph}\label{sec:lFCImb}
\begin{algorithm}[t]
\caption{lFCI$_{\text{mb}}$: lFCI with moral graph step}
\SetKwInOut{Input}{Input}
\SetKwInOut{Output}{Output}
\Input{Tests of conditional independences $i\independent j|S$,\\
maximum separating set size $\eta$, locality parameter $\gamma$.}
\Output{A partial ancestral graph $C$}
$C\gets$ estimated local moral graph\;
Run the edge removal loop in Algorithm~\ref{alg:lFCI} for search set size $l=1,\ldots,\eta-1$\;
Orient edges in $C$ using the SEP sets, by the modified rules in Section~\ref{sec:orient}\;
\Return A PAG $C$.
\label{alg:lFCI_mb}
\end{algorithm}
Following the observation from Lemma~\ref{lem:mb}, in Algorithm~\ref{alg:lFCI_mb} we propose a modified version of lFCI that utilizes local Markov blankets for improved computational and sample complexities.
Concretely, instead of starting with a complete graph $C$, Algorithm~\ref{alg:lFCI_mb} starts with an estimated \textit{local moral graph}.
The moral graph of a MAG $G$ is the undirected graph in which two nodes \md{$i,j$ are adjacent whenever one node is in the $G$-Markov blanket of the other, say $j\in\mathrm{mb}(G,i)$. Accordingly, the local moral graph is the undirected graph obtained by taking instead the $\gamma$-local Markov blankets, $\mathrm{mb}_\gamma(G,i)$. For large enough $\gamma$, these two notions coincide as the local moral graph differs from the moral graph only if the shortest path between two nodes is longer than $\gamma$ and only includes bidirected edges.} \changemarker{
This is unlikely in large common random graphs if we allow $\gamma$ to increase with $p$; see Section 6 of the Supplementary Material.}
Consequently, we simply employ the moral graph, which in the models we treat later can be estimated by the support of the inverse covariance matrix.
In our simulation study, we used
score matching to estimate the precision matrix in high dimensions \citep{lin2016, Yu2019}, which here coincides with the SCIO algorithm \citep{Liu2015}.
Initializing $C$ as an estimated moral graph may significantly recude the size of the search pools $J_\gamma(i,j,C)$. Moreover, this additional step allows Algorithm~\ref{alg:lFCI_mb} to terminate at level $\eta-1$ instead of $\eta$ (Lemma \ref{lem:mb}).
For Erd{\H{o}}s-Renyi graphs, power-law graphs with strong finite mean, and $\Delta$-regular graphs, the algorithm can then stop after checking separating sets of size 0 and 1 only.
However, these improvements require slightly more restrictive conditions in theoretical analysis (see Appendix~\ref{sec:appendix}).
We will explore the performance of Algorithm~\ref{alg:lFCI_mb} in Section~\ref{sec:experiments}.
\section{Additional results}\label{sec:supplement_1}
\begin{definition}[PAG]\label{def:pag}
Let $G=(X\cup L\cup Z,E)$ be a DAG, and
$H$ be a simple graph with vertex set $X$ and edges of the type
$\to$, $\mathrlap{\multimapinv}\to$, $\multimapboth$, $\leftrightarrow$,
$-$, or $\multimapinv$.
Then $H$ is a PAG representing $G$ if and only if the following four conditions
hold:
\begin{enumerate}
\item The absence of an edge between two vertices $i$ and $j$ in $H$ implies that
there exists a subset $Y \subseteq X \setminus \{i, j \}$
such that $i$ and $j$
are $m$-separated given $(Y\cup Z)$.
\item The presence of an edge between two vertices $i$ and $j$ in $H$ implies that $i$ and $j$
are $m$-connected given
$(Y\cup Z)$
for all subsets $Y \subseteq X \setminus \{i, j \}$.
\item If an edge between $i$ and $j$ in $H$ has an arrowhead at $j$, then $j \notin \mathrm{an}(G, i\cup Z )$.
\item If an edge between $i$ and $j$ in $H$ has a tail at $j$, then $j \in \mathrm{an}(G, i \cup Z)$.
\end{enumerate}
\end{definition}
\section{Additional Proofs}
\begin{proof}[Proof of Lemma 3]
\begin{figure}[ht]
\centering
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c1] (u) at(1,0) {};
\node[]()at(1.5,0){$\ldots$};
\draw[->,line width= 1] (i) -- (u);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[] at (0.3,0) {$\star$};
\node[]()at(1.5,0){$\ldots$};
\draw[-,line width= 1] (i) -- (u);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c4] (u) at(1,0) {};
\node[]()at(1.5,0){$\ldots$};
\draw[<->,line width= 1] (i) -- (u);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c3] (v) at(2,0) {};
\node[]()at(2.5,0){$\ldots$};
\draw[<->,line width= 1] (i) -- (u);
\draw[->,line width= 1] (u) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c1] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\draw[dotted,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (u);
\draw[->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\draw[dotted,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (u);
\draw[<-,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c4] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\draw[dotted,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c3] (x) at(3,0) {};
\node[]()at(3.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\draw[dotted,line width= 1] (x) -- (w);
\draw[dotted,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (v) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c2] (y) at(3,0) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(3.5,0){$\ldots$};
\draw[dotted,line width= 1] (y) -- (w);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (v) -- (w);
\draw[<-,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c4] (y) at(3,0) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(3.5,0){$\ldots$};
\draw[dotted,line width= 1] (y) -- (w);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c5] (y) at(3,0) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(3.5,0){$\ldots$};
\draw[dotted,line width= 1] (y) -- (w);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c3] (x) at(3,0) {};
\node[c2] (y) at(3,-1) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(3.5,0){$\ldots$};
\node[]()at(3.5,-1){$\ldots$};
\draw[dotted,line width= 1] (y) -- (w);
\draw[dotted,line width= 1] (x) -- (w);
\draw[dotted,line width= 1] (x) -- (y);
\draw[->,dotted,line width= 1] (w) -- (v);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (v) -- (x);
\draw[<-,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c3] (x) at(3,0) {};
\node[c5] (y) at(3,-1) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(3.5,0){$\ldots$};
\node[]()at(3.5,-1){$\ldots$};
\draw[dotted,line width= 1] (y) -- (w);
\draw[dotted,line width= 1] (x) -- (w);
\draw[dotted,line width= 1] (x) -- (y);
\draw[->,dotted,line width= 1] (w) -- (v);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (v) -- (x);
\draw[<->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c3] (x) at(3,0) {};
\node[c4] (y) at(3,-1) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(3.5,0){$\ldots$};
\node[]()at(3.5,-1){$\ldots$};
\draw[dotted,line width= 1] (y) -- (w);
\draw[dotted,line width= 1] (x) -- (w);
\draw[dotted,line width= 1] (x) -- (y);
\draw[->,dotted,line width= 1] (w) -- (v);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (v) -- (x);
\draw[<->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c1] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c1] (x) at(2,-1) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,-1){$\ldots$};
\draw[dotted,line width= 1] (w) -- (v);
\draw[dotted,line width= 1] (x) -- (v);
\draw [dotted] (w) to [out=-60,in=60] (x);
\draw[<->,line width= 1] (i) -- (u);
\draw[->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (u) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c1] (x) at(2,-1) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,-1){$\ldots$};
\draw[dotted,line width= 1] (w) -- (v);
\draw[dotted,line width= 1] (x) -- (v);
\draw [dotted] (w) to [out=-60,in=60] (x);
\draw[<->,line width= 1] (i) -- (u);
\draw[<-,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (u) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c5] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c1] (x) at(2,-1) {};
\draw[dotted,line width= 1] (w) -- (v);
\draw[dotted,line width= 1] (x) -- (v);
\draw [dotted] (w) to [out=-60,in=60] (x);
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,-1){$\ldots$};
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[->,line width= 1] (u) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c5] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c5] (x) at(2,-1) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,-1){$\ldots$};
\draw[dotted,line width= 1] (w) -- (v);
\draw[dotted,line width= 1] (x) -- (v);
\draw [dotted] (w) to [out=-60,in=60] (x);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[<->,line width= 1] (u) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c5] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c2] (x) at(2,-1) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,-1){$\ldots$};
\draw[dotted,line width= 1] (w) -- (v);
\draw[dotted,line width= 1] (x) -- (v);
\draw [dotted] (w) to [out=-60,in=60] (x);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[<-,line width= 1] (u) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(2,0) {};
\node[c3] (w) at(2,1) {};
\node[c2] (x) at(2,-1) {};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,-1){$\ldots$};
\draw[dotted,line width= 1] (w) -- (v);
\draw[dotted,line width= 1] (x) -- (v);
\draw [dotted] (w) to [out=-60,in=60] (x);
\draw[<->,line width= 1] (i) -- (u);
\draw[<-,line width= 1] (u) -- (v);
\draw[->,line width= 1] (u) -- (w);
\draw[<-,line width= 1] (u) -- (x);
\end{tikzpicture}
\caption{Local graph configurations with $\eta=3$ and $|\mathrm{ne}(G_\gamma(i,j),i)|=1$.
A separator (not necessarily minimal) is marked with shade.
Marked edge represents the pattern of $G_\gamma(i,j)$, while absence of an edge represents the absence pattern of $G_\gamma(i,j)$.
Ellipses between nodes means this edge is allowed to occur in $G_\gamma(i,j)$,
as long as it agrees with the MAG property and local-path property.
The square shape represents a node with no outgoing edge (except the marked ones). The diamond shape represents a node that controls whether the separator is minimum --- if this node is not ancestor of $j$, then smaller separator exists. }
\label{fig:eta=3.1}
\end{figure}
\begin{figure}[ht]
\centering
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c1] (u) at(1,0) {};
\node[c1] (v) at(1,1) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[->,line width= 1] (i) -- (u);
\draw[->,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[<-,line width= 1] (i) -- (u);
\draw[<-,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[-,line width= 1] (i) -- (u);
\draw[-,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c1] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[->,line width= 1] (i) -- (u);
\draw[<-,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c1] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[->,line width= 1] (i) -- (u);
\draw[-,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c4] (v) at(1,1) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[<-,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c1] (y) at(2,1){};
\node[c1] (x) at(2,0){};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.3,0){$\star$};
\node[]()at(1.7,0){$\star$};
\draw[dotted,line width= 1] (v) -- (w);
\draw[dotted,line width= 1] (y) -- (u);
\draw[-,line width= 1] (x) -- (u);
\draw[<-,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[<-,line width= 1] (u) -- (v);
\draw[->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c2] (y) at(2,1){};
\node[c1] (x) at(2,0){};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.3,0){$\star$};
\node[]()at(1.7,0){$\star$};
\draw[dotted,line width= 1] (v) -- (w);
\draw[dotted,line width= 1] (y) -- (u);
\draw[-,line width= 1] (x) -- (u);
\draw[<-,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[<-,line width= 1] (u) -- (v);
\draw[<-,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c5] (y) at(2,1){};
\node[c1] (x) at(2,0){};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.3,0){$\star$};
\node[]()at(1.7,0){$\star$};
\draw[dotted,line width= 1] (v) -- (w);
\draw[dotted,line width= 1] (y) -- (u);
\draw[-,line width= 1] (x) -- (u);
\draw[<-,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[<-,line width= 1] (u) -- (v);
\draw[<->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c1] (y) at(2,1){};
\node[c1] (w) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (y) -- (w);
\draw[->,line width= 1] (v) -- (w);
\draw[<-,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[<-,line width= 1] (u) -- (v);
\draw[->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (w) at(2,1) {};
\node[c1] (x) at(2,0){};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.3,0){$\star$};
\node[]()at(1.7,0){$\star$};
\draw[dotted,line width= 1] (v) -- (x);
\draw[dotted,line width= 1] (u) -- (w);
\draw[-,line width= 1] (x) -- (u);
\draw[->,strike through,line width= 1] (v) -- (u);
\draw[<-,line width= 1] (i) -- (u);
\draw[->,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (w) at(2,1) {};
\node[c1] (x) at(2,2){};
\node[]()at(2.5,2){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\draw[->,line width= 1] (v) -- (x);
\draw[dotted,line width= 1] (x) -- (w);
\draw[->,strike through,line width= 1] (v) -- (u);
\draw[<-,line width= 1] (i) -- (u);
\draw[->,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (w) at(2,1) {};
\node[c2] (x) at(2,2){};
\node[]()at(2.5,2){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\draw[<-,line width= 1] (v) -- (x);
\draw[dotted,line width= 1] (x) -- (w);
\draw[->,strike through,line width= 1] (v) -- (u);
\draw[<-,line width= 1] (i) -- (u);
\draw[->,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (w) at(2,1) {};
\node[c5] (x) at(2,2){};
\node[]()at(2.5,2){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\draw[<->,line width= 1] (v) -- (x);
\draw[dotted,line width= 1] (x) -- (w);
\draw[->,strike through,line width= 1] (v) -- (u);
\draw[<-,line width= 1] (i) -- (u);
\draw[->,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (w) at(2,1) {};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\draw[dotted,line width= 1] (u) -- (w);
\draw[<-,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (w);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c2] (x) at(2,2){};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (x) -- (y);
\draw[dotted,line width= 1] (u) -- (w);
\draw[dotted,line width= 1] (u) -- (x);
\draw[<-,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (y);
\draw[<-,line width= 1] (v) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c1] (x) at(2,2){};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (x) -- (y);
\draw[dotted,line width= 1] (u) -- (w);
\draw[dotted,line width= 1] (u) -- (x);
\draw[<-,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (y);
\draw[->,line width= 1] (v) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c5] (x) at(2,2){};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (x) -- (y);
\draw[dotted,line width= 1] (u) -- (w);
\draw[dotted,line width= 1] (u) -- (x);
\draw[<-,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (y);
\draw[<->,line width= 1] (v) -- (x);
\end{tikzpicture}
\caption{Local graph configurations with $\eta=3$ and $|\mathrm{ne}(G_\gamma(i,j),i)|=2$.
(continues in Figure~\ref{fig:eta=3.2b}).
A separator (not necessarily minimal) is marked with shade.
Marked edge represents the pattern of $G_\gamma(i,j)$, while absence of an edge represents the absence pattern of $G_\gamma(i,j)$.
Ellipses between nodes means this edge is allowed to occur in $G_\gamma(i,j)$,
as long as it agrees with the MAG property and local-path property.
The square shape represents a node with no outgoing edge (except the marked ones). The diamond shape represents a node that controls whether the separator is minimum --- if this node is not ancestor of $j$, then smaller separator exists.}
\label{fig:eta=3.2}
\end{figure}
\begin{figure}[t]
\centering
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c4] (u) at(1,0) {};
\node[c1] (v) at(1,1) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\draw[dotted,line width= 1] (v) -- (u);
\draw[<->,line width= 1] (i) -- (u);
\draw[->,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c1] (v) at(1,1) {};
\node[c3] (w) at(2,0) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\draw[dotted,line width= 1] (v) -- (u);
\draw[dotted,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (u);
\draw[->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (w);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c1] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c1] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[dotted,line width= 1] (u) -- (y);
\draw[dotted,line width= 1] (u) -- (t);
\draw[dotted,line width= 1] (y) -- (t);
\draw[->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (y);
\draw[->,line width= 1] (v) -- (t);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c1] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c2] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[dotted,line width= 1] (u) -- (y);
\draw[dotted,line width= 1] (u) -- (t);
\draw[dotted,line width= 1] (y) -- (t);
\draw[->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (y);
\draw[<-,line width= 1] (v) -- (t);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c1] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c5] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[dotted,line width= 1] (u) -- (y);
\draw[dotted,line width= 1] (u) -- (t);
\draw[dotted,line width= 1] (y) -- (t);
\draw[->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (y);
\draw[<->,line width= 1] (v) -- (t);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (x) at(2,0){};
\node[c3] (y) at(2,1){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\draw[dotted,line width= 1] (x) -- (y);
\draw[dotted,line width= 1] (u) -- (y);
\draw[dotted,line width= 1] (x) -- (v);
\draw[dotted,line width= 1] (u) -- (v);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (x);
\draw[->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (x) at(2,0){};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(1.5,1){$\ldots$};
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (x);
\draw[->,,line width= 1] (v) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (x) at(2,0){};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(1.5,1){$\ldots$};
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (u);
\draw[->,line width= 1] (u) -- (x);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (x) at(2,0){};
\node[c3] (w) at(2,1){};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,1){$\ldots$};
\draw[dotted,line width= 1] (x) -- (v);
\draw[dotted,line width= 1] (w) -- (u);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,strike through,line width= 1] (v) -- (u);
\draw[->,line width= 1] (u) -- (x);
\draw[->,line width= 1] (v) -- (w);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (x) at(2,0){};
\node[c3] (y) at(2,1){};
\node[c1] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (x);
\draw[->,line width= 1] (v) -- (t);
\draw[->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (x) at(2,0){};
\node[c3] (y) at(2,1){};
\node[c2] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (x);
\draw[<-,line width= 1] (v) -- (t);
\draw[->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (x) at(2,0){};
\node[c3] (y) at(2,1){};
\node[c5] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (x);
\draw[<->,line width= 1] (v) -- (t);
\draw[->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c1] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (t) -- (y);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (y);
\draw[->,line width= 1] (v) -- (t);
\draw[->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c2] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (t) -- (y);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (y);
\draw[<-,line width= 1] (v) -- (t);
\draw[->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c5] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (t) -- (y);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (y);
\draw[<->,line width= 1] (v) -- (t);
\draw[->,line width= 1] (v) -- (y);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c4] (u) at(1,0) {};
\node[c4] (v) at(1,1) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\draw[dotted,line width= 1] (v) -- (u);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c2] (u) at(1,0) {};
\node[c4] (v) at(1,1) {};
\node[c3] (w) at(2,0) {};
\node[]()at(1.5,1){$\ldots$};
\node[]()at(2.5,0){$\ldots$};
\draw[dotted,line width= 1] (v) -- (u);
\draw[dotted,line width= 1] (v) -- (w);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (u) -- (w);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c4] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c1] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[dotted,line width= 1] (u) -- (y);
\draw[dotted,line width= 1] (u) -- (t);
\draw[dotted,line width= 1] (y) -- (t);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (y);
\draw[->,line width= 1] (v) -- (t);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c4] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c2] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[dotted,line width= 1] (u) -- (y);
\draw[dotted,line width= 1] (u) -- (t);
\draw[dotted,line width= 1] (y) -- (t);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (y);
\draw[<-,line width= 1] (v) -- (t);
\end{tikzpicture}
\begin{tikzpicture}[> = stealth,shorten > = 1pt,auto,node distance = 1cm, semithick ]
\tikzstyle{every state}=[draw = black,thick,fill = white,minimum size = 1mm]
\node[label=$i$,c1] (i) at(0,0) {};
\node[c4] (u) at(1,0) {};
\node[c2] (v) at(1,1) {};
\node[c3] (y) at(2,1){};
\node[c5] (t) at(2,2){};
\node[]()at(2.5,1){$\ldots$};
\node[]()at(1.5,0){$\ldots$};
\node[]()at(2.5,2){$\ldots$};
\draw[dotted,line width= 1] (u) -- (v);
\draw[dotted,line width= 1] (u) -- (y);
\draw[dotted,line width= 1] (u) -- (t);
\draw[dotted,line width= 1] (y) -- (t);
\draw[<->,line width= 1] (i) -- (u);
\draw[<->,line width= 1] (i) -- (v);
\draw[->,line width= 1] (v) -- (y);
\draw[<->,line width= 1] (v) -- (t);
\end{tikzpicture}
\caption{Local graph configurations with $\eta=3$ and $|\mathrm{ne}(G_\gamma(i,j),i)|=2$.
A separator (not necessarily minimal) is marked with shade.
Marked edge represents the pattern of $G_\gamma(i,j)$, while absence of an edge represents the absence pattern of $G_\gamma(i,j)$.
Ellipses between nodes means this edge is allowed to occur in $G_\gamma(i,j)$,
as long as it agrees with the MAG property and local-path property.
The square shape represents a node with no outgoing edge (except the marked ones). The diamond shape represents a node that controls whether the separator is minimum --- if this node is not ancestor of $j$, then smaller separator exists.}
\label{fig:eta=3.2b}
\end{figure}
\begin{enumerate}
\item $|\mathrm{ne}(G_{\gamma}(i,j),i)|=1$. (Figure~\ref{fig:eta=3.1}) Denote the only neighbor as $u$. If $i\to u$ or
$i\leftrightarrow u$ but
$u\notin \mathrm{an}(G_{\gamma}(i,j),j)$, then $S_\gamma(i,j)=\emptyset$. If $i\leftarrow u$ or $i-u$, then $S_\gamma(i,j)= \{u\}$.
If $i\leftrightarrow u$ and
$u\in \mathrm{an}(G_{\gamma}(i,j),j)$, then there must be an
edge $u\to w$ and $w\in \mathrm{an}(G_{\gamma}(i,j),j)$.
If $\mathrm{ne}(G_\gamma(i,j),u)=\{i,w\}$
then $S_\gamma(i,j)=\{u\}$. Now discuss cases with additional neighbors.
\begin{enumerate}
\item If $\mathrm{ne}(G_\gamma(i,j),u)=\{i,w,v\}$, we have $S_\gamma(i,j)=\{u\}$ if
$u\to v$ or $u\leftrightarrow v$ but
$v\notin \mathrm{an}(G_{\gamma}(i,j),j)$; also $S_\gamma(i,j)=\{u,v\}$ if
$u\leftarrow v$ or $u\leftrightarrow v$
and $v\in\mathrm{an}(G_{\gamma}(i,j),j)$ and $v$ has exactly one neighbor other than $u$ (it is allowed to be $w$).
If $v$ has 2 neighbors other than $u$, and neither is child of $v$, then $v\notin \mathrm{an}(G_{\gamma}(i,j),j)$, which is covered in the previous case.
Now suppose $v\to x$ and there is also an edge $v\mo{$\star-$ \moveX{1.5}$-\star$} y$,
in which case $|e^b_2|+|e^m_2|=3$. We have $S_\gamma(i,j)=\{u,v,y\}$ if
$v\leftarrow y$ or $v\leftrightarrow y$ and $y\in \mathrm{an}(G_{\gamma}(i,j),j)$, and otherwise $S_\gamma(i,j)=\{u,v\}$.
\item If $\mathrm{ne}(G_\gamma(i,j),u)=\{i,w,v,x\}$, then $|e^b_2|=3$ and
$S_\gamma(i,j)\subseteq \{u,v,x\}$.
\end{enumerate}
\item $|\mathrm{ne}(G_{\gamma}(i,j),i)|=2$. Denote the neighbors as $u$ and $v$. We discuss the direction of the two edges
$i\mo{$\star-$ \moveX{1.5}$-\star$} u$ and $i\mo{$\star-$ \moveX{1.5}$-\star$} v$.
If the directions are $(\to,\to)$ , then $S_\gamma(i,j)=\emptyset$.
If $(\leftarrow,\to)$, then $S_\gamma(i,j)= \{u\}$.
If $(\leftarrow,\leftarrow)$ or $(-,\leftarrow)$ or $(-,-)$, then $S_\gamma(i,j)=\{u,v\}$.
\begin{enumerate}
\item If $(\leftrightarrow, \leftarrow)$, then we need to discuss neighbors of $u$, too.
If $u\in \mathrm{adj}(G_{\gamma}(i,j),v)$, then $u \mo{$\star-$ \moveX{1.5}$-\star$} v$ is a merging edge, and by Fact 2, $u$ and $v$ have in total no more than 2 bearing edges of order 2.
If $u$ is not ancestral to $i$ or $j$, then $S_\gamma(i,j)=\{v\}$.
The case of $u\notin \mathrm{an}(G_{\gamma}(i,j),\{i,j\})$ is trivial.
If $u\in \mathrm{an}(G_{\gamma}(i,j),\{i,j\})$,
then $u$ has at least one outgoing edge.
If the outgoing edge is $u\to v$ (second row of Figure~\ref{fig:eta=3.2}), there are two sub-cases. If $v$ has an bearing edge of order 2, then $u$ has only one other neighbor, call it $x$,
and we condition on $x$ if and only if $u\leftarrow x$ or $u\leftrightarrow x$ and $x\in \mathrm{an}(G_{\gamma}(i,j),j)$. If $v$ has no bearing edge, then $u$ can have at most 2 other neighbors. However, these bearing edges must not have arrow at $u$, due to the inducing path interpretation of MAG. Therefore we do not need to condition on these additional neighbors.
If the outgoing edge is
not $u\to v$ (third row of Figure~\ref{fig:eta=3.2}), then there is some edge $u\to w$.
If $v$ has an bearing edge of order 2, then $u$ no other neighbor than $\{i,u,w\}$.
If $v$ has no bearing edge, then $u$ could have one additional neighbor, call it $x$, and we condition on $x$ if and only if $u\leftarrow x$ or $u\leftrightarrow x$ and $x\in \mathrm{an}(G_{\gamma}(i,j),j)$.
If $u\notin \mathrm{adj}(G_{\gamma}(i,j),v)$ (fourth row of Figure~\ref{fig:eta=3.2}),
then $u$ has at most two additional neighbors.
If none of them are child of $u$, then $u\notin \mathrm{an}(G_{\gamma}(i,j),\{i,j\})$ and $S_\gamma(i,j)=\{v\}$; If
$u\to w$, $u\mo{$\star-$ \moveX{1.5}$-\star$} x$ then we condition on $x$ if and only if $u\leftarrow x$ or $u\leftrightarrow x$ and $x\in \mathrm{an}(G_{\gamma}(i,j),j)$.
\item if $(\leftrightarrow, \to)$, the situations are simpler since we never condition on $v$. Since $v$ must have either a bearing edge or a merging edge,
$u$ can have at most 2 bearing edges. If $u\in \mathrm{an}(G_\gamma(i,j),j)$, then one of the edges is $u\to w$. As for the other one, $u\mo{$\star-$ \moveX{1.5}$-\star$} x$, we condition on $x$ if and only if $u\leftarrow x$ or $u\leftrightarrow x$ and $x\in \mathrm{an}(G_{\gamma}(i,j),j)$.
\item If $(\leftrightarrow, \leftrightarrow)$:
If neither of $u$ and $v$ are ancestral to $j$,
then $S_\gamma(i,j)=\emptyset$.
If both are ancestral to $j$ (row 2-3 and first 2 figures of row 4 in Figure~\ref{fig:eta=3.2b}), then they each has
a outgoing edge.
Then by Fact 2, there is at most one other bearing edge.
WLOG, suppose $u$ has
$u\to w$ and $u\mo{$\star-$ \moveX{1.5}$-\star$} x$.
Then $S_\gamma(i,j)= \{u,v,x\}$ if $x\in \mathrm{an}(G_{\gamma}(i,j),\{u,j\})$ and
otherwise $S_\gamma(i,j)= \{u,v\}$.
If $u$ is ancestral to $j$ and $v$ is not,
then still $u$ has one outgoing edge and at most
one other edge.
Then $S_\gamma(i,j)= \{u,x\}$ if $x\in \mathrm{an}(G_{\gamma}(i,j),\{u,j\})$ and
otherwise
$S_\gamma(i,j)= \{u\}$.
\end{enumerate}
\item $|\mathrm{ne}(G_{\gamma}(i,j),i)|=3$. Denote the three neighbors of $i$ as $u,v,w$. By Fact 2, they each has at most one bearing edge. Therefore we do not need to look further, and $S_\gamma(i,j)\subseteq\{u,v,w\}$.
\end{enumerate}
\end{proof}
The following proof is similar to Lemma 2 of \cite{arjun2018} with slight modification, we show the proof here for completeness.
\begin{proof}[Proof of Lemma~5.7]
We write
\begin{align*}
\Sigma &= (I-B)^{-1}\Omega(I-B)^{-\top}\\
&= \left(\sum_{r=0}^{p-1} B^r\right)\Omega\left(\sum_{r=0}^{p-1} B^r\right)^\top\\
&= \left(\sum_{r=0}^\gamma B^r+\sum_{r=\gamma+1}^{p-1} B^r\right)\Omega\left(\sum_{r=0}^\gamma B^r+\sum_{r=\gamma+1}^{p-1} B^r\right)^\top
\end{align*}
Denote $\Lambda_H = \sum_{r=0}^\gamma B^r$ and
$R_\gamma =\sum_{r=\gamma+1}^\infty B^r=\sum_{r=\gamma+1}^{p-1} B^r$.
By the directed $\beta$-summability assumption,
we have $\norm{\Lambda_H}\leq \frac{1-\beta^{\gamma+1}}{1-\beta}$
and $\norm{R_\gamma}\leq \frac{\beta^{\gamma+1}-\beta^{p}}{1-\beta}$.
Now we can bound the difference between $\Sigma$ and
the local approximation version $\Sigma_H:= \Lambda_H\Omega \Lambda_H^\top$, which only
contains paths no longer than $\gamma$.
\begin{align*}
\norm{\Sigma-\Sigma_H} &=
\norm{\Lambda_H \Omega R_\gamma^\top +
R_\gamma \Omega \Lambda_H^\top +
R_\gamma\Omega R_\gamma^\top }\\
&\leq \norm{\Omega}\left(2\norm{
\Lambda_H}\norm{R_\gamma} + \norm{R_\gamma}^2\right)\\
&\leq \norm{\Omega}\left(
2 \frac{(1-\beta^{\gamma+1})\beta^{\gamma+1}}{(1-\beta)^2} + \frac{\beta^{2\gamma+2}}{(1-\beta)^2}
\right)\\
&= \norm{\Omega}\frac{\beta^{\gamma+1}(2-\beta^{\gamma+1})}{(1-\beta)^2}
\end{align*}
We write
$\gamma*=\log(\beta)^{-1}\left(\log M - \log2-\log\norm{\Omega} - \log(\eta+2) -\log(1+3/\lambda)
\right)-1$.
We invoke the error propagation lemma from \citet{harris2013}.
For any non-adjacent pair $(i,j)$ and a set
$S\subseteq V\setminus \{i,j\}$ with
$|S|\leq \eta$,
whenever $\gamma\geq\gamma^*$, it holds that
\[
|\rho(i,j|S)-\rho_H(i,j|S)|\leq\lambda
\]
where $\rho_H$ is the partial correlation
obtained from $\Sigma_H$.
Since $\Sigma_H$ only composes of short paths,
$\rho_H(i,j|S_\gamma)=0$ for every
local-graph separator $S_\gamma$.
Therefore $|\rho(i,j|S_\gamma)|<\lambda$.
\end{proof}
\section{Treks}\label{sec:appendix_treks}
In this section we provide an algebraic explanation of Assumption 5.
In particular, we review the trek representation of partial correlation in linear SEM. The representation clarifies that conditional dependence in a linear SEM is tied to existence of paths/treks in the graph underlying the model. This allows us to argue that conditional dependence is typically induced by short versus long treks, which in turn provides the basis for exploiting small local separators in our algorithms.
To simplify the discussion, we present the following results assuming there is no
selection variables in the graph.
Let $G$ be a mixed graph without undirected edges. We define a \textit{trek} from node $i$ to $j$ as a tuple $\tau=(P_L,P_M,P_R)$,
where $P_L$ is a directed path from some node $s$ to $i$,
and $P_R$ is a directed path
from some node $t$ to $j$,
and $P_M$ is either one bidirected edge $s\leftrightarrow t$ or the empty set when $s=t$.
We define the
\emph{trek monomial} as $m_\tau=\beta^L \omega_{s,t} \beta^R$, where $\beta^L=\prod_{k\to l\in P_L}\beta_{kl}$ and $\beta^R=\prod_{k\to l\in P_R}\beta_{kl}$.
Moreover,
for sets $C$ and $D$ with $|C|=|D|=k$, we define
a \textit{trek system} $T$ from $C$ to $D$ as a set of $k$ treks whose initial nodes exhaust
$C$ and final nodes exhaust $D$.
With abuse of notation we write $T$ as a tuple of collections of paths $(P_L,P_M,P_R)$,
and define the \textit{trek system monomial} as the product of trek monomials in the system, i.e., $m_T=\prod_{\tau\in T}m_\tau$.
Each trek system determines a permutation of the initial and final nodes, which we call the sign of the system.
Let $\mathcal{T}(C,D)$ denote the collection of all trek systems from $C$ to $D$.
By the Cauchy–Binet determinant expansion, we have,
\begin{align}
\det \Sigma(C,D)& =\sum_{R,S\subset V, |R|=|S|=k} \det\left((I-B)^{-\top}\right)_{C,R} \det\Omega_{R,S}\det \left((I-B)^{-1}\right)_{S,D} \\
&= \sum_{T\in \mathcal{T}(C,D)}\sign(T)m_T.\label{eq:trekdecomp}
\end{align}
We say a trek system $T$ has \textit{sided intersection} if two paths in $P_L$, $P_R$, or $P_M$ have shared nodes.
If $T$ is a trek system between $C$ and $D$ with sided intersections, then its weight $m_T$ is cancelled in the summation in \eqref{eq:trekdecomp}, \citep[for a proof, see][]{sullivant2010}.
In other words, the summation in \eqref{eq:trekdecomp}
only needs to run over trek systems without sided intersections.
Consequently,
$\det\left(\Sigma(i\cup S, j\cup S)\right)=0$
if and only if every system of treks from $i\cup S$ to $j\cup S$ has a sided intersection.
The later condition is also called \textit{$t$-separation}.
For Gaussian SEMs, in which conditional
independence is characterized by
zero partial correlation, this means
$W_i\independent W_j|W_S$ if and only if
$\sum_{T\in \mathcal{T}(i\cup S,j\cup S)}\sign(T)m_T=0$.
We will show next that Assumption 5 can be expressed
as a condition on trek weights. Let $G=(V,E)$ be a MAG.
For non-adjacent nodes $i,j\in V$, and
$S\subseteq V(G_\gamma)\setminus\{i,j\}$,
we denote $\mathcal{T}_\gamma(i, j,S)$ as the collection of trek systems from $i\cup S$ to $j\cup S$ in $G_\gamma(i,j)$, and
$\mathcal{T}^C_\gamma(i , j, S) := \mathcal{T}(i\cup S , j\cup S) \setminus \mathcal{T}^C_\gamma(i , j, S) $.
By our definition, $\mathcal{T}^C_\gamma(i , j, S) $ only contains treks that goes through a node outside $G_\gamma(i,j)$.
\begin{lemma}\label{prop:trekdecomp}
Let $G$ be a MAG. Under Assumption 3,
if there exists $\beta\in(0,1)$ such that
\[
\max_{i\notin\mathrm{adj}(G,j)}\min_{S_\gamma\in \mathcal{S}_{\eta,\gamma}(i,j)}\left|\sum_{T\in \mathcal{T}^C_\gamma(i,j, S_\gamma)}\sign(T)m_T\right|=O(\beta^\gamma),
\]
where $\mathcal{S}_{\eta,\gamma}(i,j)$ is the collection of $\gamma$-local-graph separators of size at most $\eta$,
then Assumption 5 holds.
\end{lemma}
\begin{proof}
By Definition 4, if a set $S_\gamma$ is a $\gamma$-local-separator
of $(i,j)$, then it is a separator of $i$ and $j$ in $G_\gamma(i,j)$, so all
trek systems between $i\cup S_\gamma$ and $j\cup S_\gamma$
have sided intersections in $G_\gamma(i,j)$,
and hence also in $G$.
Following \citet{draisma2013}, we only need to take summation over trek systems without sided intersection in $G$.
Therefore,
\begin{align*}
\sum_{T\in \mathcal{T}(i,j, S_\gamma)}\sign(T)m_T&=
\sum_{T\in \mathcal{T}_\gamma(i,j, S_\gamma)}\sign(T)m_T+\sum_{T\in \mathcal{T}^C_\gamma(i,j, S_\gamma)}\sign(T)m_T\\
&= \sum_{T\in \mathcal{T}^C_\gamma(i,j, S_\gamma)}\sign(T)m_T.
\end{align*}
Now denote $\Sigma(i,j|S_\gamma)$ as the $(i,j)$-th entry of the conditional variance matrix given $S_\gamma$. We have
\begin{align*}
\rho(i,j|S_\gamma) &= \frac{\Sigma(i,j|S_\gamma)}{\sqrt{ \Sigma(i,i|S_\gamma)\Sigma(j,j|S_\gamma) }}= \frac{\sum_{T\in \mathcal{T}(i,j, S_\gamma)}\sign(T)m_T}{\det(\Sigma(S_\gamma,S_\gamma))} \frac{1}{\sqrt{ \Sigma(i,i|S_\gamma)\Sigma(j,j|S_\gamma) }}.
\end{align*}
By the fact that $\Sigma(j,j|S_\gamma) \geq \Sigma(j,j|V\setminus\{j\})= 1/\omega_{jj}$,
and $\det(\Sigma(S_\gamma,S_\gamma))\geq M^{-\eta}$ under Assumption 3, we have $|\rho(i,j|S_\gamma)|=O(\beta^\gamma).$
\end{proof}
\section{Choice of $\gamma$}\label{sec:choiceofparameter}
Recall the simulation study in Section 6. We randomly generate
Erd{\H{o}}s-Renyi graphs and power-law graphs with $p = |V|=200$ nodes and average node degree 2.
Edge weights are drawn uniformly from $\pm [.1, 1]$, and $n=100$ observations are generated by the \texttt{rmvDAG} function.
We randomly choose $q=0.2 p$ nodes as latent variables, and the rest as observed. We include no selection variables.
We run lFCI with $\gamma=\{2,3,4,5,6,7,8,p/2,p-1\}$, and
$\alpha=\{10^{-15,},10^{-9},10^{-8},10^{-7},\cdot10^{-6},10^{-3},\cdot10^{-5},10^{-4},10^{-3},10^{-2}\}$.
We repeat the experiment 100 times for each $\alpha$, and compare the
true positive and false positive discoveries of the skeleton of the true PAG.
Figure~\ref{fig:gamma_sensitivity} suggests that as long as $\gamma$ is large enough, the algorithm yields almost identical outputs.
The only exception is the case of power-law graph with
$\gamma=2$, in which the algorithm appears to be too aggressive, and the performance is sub-par on a part of the pROC curve.
We also point out that in the ``many false positive" part of the curves (i.e., to the right end), methods with smaller $\gamma$ tends to perform better, since they perform fewer tests.
However, that region is only relevant for ``discovery''. In general, we recommend using $\gamma=O(\log |V|)$.
\section{Simulations with standardized
normal coefficients}\label{sec:longtreksim}
\begin{figure}[t]
\centering
\includegraphics[width=0.35\linewidth]{figures/gamma_er=200_n=100.pdf}
\includegraphics[width=0.35\linewidth]{figures/gamma_pl=200_n=100.pdf}
\caption{pROC curves of Algorithm 1 with different choices of $\gamma$ performed on ER graphs (left) and power-law graphs (right).
}
\label{fig:gamma_sensitivity}
\end{figure}
In this section, we aim to provide evidence that Assumption 5 is satisfied in many
common large networks when data is standardized.
The fact that in many common scenarios
the SEM corresponding to the standardized data has almost all coefficients less than 1
is demonstrated in a simulation
study in Appendix B of \cite{arjun2018}.
We further conjecture that the sum of long
trek weights are also minimal,
by showing the covariance matrix is well
approximated using only short treks.
For this purpose, we generate a random
ER or power-law graph
and draw edge weights from either a
uniform distribution on $(-10,10)$
or a normal distribution with mean 0 and
standard deviation $3$.
We intentionally choose wide ranges for the
coefficient to allow large fluctuation in the network.
Then a SEM in the form of (2) is
constructed with this weighted adjacency matrix
$B$ and random error variance $\Omega$,
where $\Omega$ is a diagonal matrix
with diagonal entries drawn from a uniform distribution on $(1,2)$.
We denote $\Sigma=(I-B)^{-1}\Omega(I-B)^{-\top}$
and
$\widetilde \Sigma$
as its standardized version,
where $\widetilde \Sigma_{ij}=\Sigma_{ij}/\sqrt{\Sigma_{ii}\Sigma_{jj}}$ for each $(i,j)$-entry.
The standardized data can be seem as
drawn from another SEM corresponding to the same
graph $G$, but with different set of parameters
$(\widetilde B,\widetilde \Omega)$, which satisfies
$\widetilde{\Sigma} = (I-\widetilde B)^{-1}\widetilde \Omega
(I-\widetilde B)^{-\top}$.
We compute the maximal entry-wise difference between $\widetilde \Sigma$ and its short-trek approximation $\widetilde\Sigma_\gamma =
(\sum_{k=0}^\gamma \widetilde B)\widetilde \Omega(\sum_{k=0}^\gamma \widetilde B)^\top$.
We define $d_\gamma := \max_{i,j}(|\widetilde\Sigma-\widetilde\Sigma_\gamma{}|_{i,j})$
and report the smallest $\gamma$ such that $ d_\gamma \leq 10^{-4}$ over 100 iterations. We use the quantity $d_\gamma$ as a surrogate to
check Assumption 5 because we have shown in the proof of Lemma~5.7 that
$\norm{\widetilde\Sigma-\widetilde\Sigma_\gamma}=O(\beta^\gamma)$ is
a sufficient condition of Assumption 5.
\begin{figure}[t]
\centering
\includegraphics[width=0.9\linewidth]{figures/long_trek.png}
\caption{Values of $\min \{\gamma: d_\gamma\leq 10^{-4}\}$ for various settings of ER and power-law graphs, with edge weights drawn from either Uniform $(-10,10)$ or $N(0,3^2)$, and $n=100,200,500$.
The minimal $\gamma$ values scale with $\log p$.}
\label{fig:long_trek}
\end{figure}
Figure~\ref{fig:long_trek} demonstrates
$d_\gamma$ is indeed very small in most settings with $\gamma\approx \log p$.
The results suggest that Assumption 5 is indeed plausible for standardized data.
\section{Simulations with local moral graphs}\label{sec:localmbsim}
In this section we demonstrate that with large enough $\gamma$, the $\gamma$-local moral graphs usually coincide with moral graphs.
Following the simulation settings in Section 6, in the numerical study below, we generate random DAGs with
$p\in\{100,200,500\}$ nodes and average node degree $2$.
Similarly, we also use $\gamma=5,6,7$ for $p=100,200,500$ and randomly choose $q=0.2p$ nodes as latent nodes, and compute the skeleton of the MAG over the observed ones. We do not introduce selection variables, simply because undirected edges do not contribute to the difference between local and non-local Markov blankets.
We compute the moral graph and $\gamma$-local moral graph for each MAG over 200 simulation iterations, and report the proportion of cases when local moral graph is different from the moral graph.
The results are reported in Table~\ref{tab:localMB}.
We see for the choice of $\gamma$ used in our simulations, almost all local moral graphs are identical to the moral graphs. This is especially likely to be true for power-law graphs, since they tends to have smaller diameter.
\begin{table}[t]
\centering
\begin{tabular}{cccc}
& Erd\H{o}s-Renyi & Power Law & Watts-Strogatz \\
$p=100$, $\gamma=5$ & 0.99 & 1.00 & 0.96 \\
$p=200$, $\gamma=6$ & 0.99 & 1.00 & 0.97 \\
$p=500$, $\gamma=7$ & 0.99 & 1.00 & 0.97
\end{tabular}
\caption{Proportion of random graphs (out of 200 iterations) with $\gamma$-local moral graph equal to moral graph. }
\label{tab:localMB}
\end{table}
\section{Search Pools}
The graph in Figure~\ref{fig:lfcimoretests} is
an example in which lFCI may needs to perform more conditional independence tests than FCI.
\begin{figure}[btp]
\centering
\begin{tikzpicture}[
> = stealth,
shorten > = 1pt,
auto,
node distance = 1cm,
semithick
]
\node[c1] (x) at(0,0.6) {x};
\node[c1] (y) at(4,0.6) {y};
\node[c1] (1) at(1,0) {1};
\node[c1] (2) at(2,0) {2};
\node[c1] (3) at(3,0) {3};
\draw[->] (x) -- (y);
\draw[->] (x) -- (1);
\draw[->] (1) -- (2);
\draw[->] (2) -- (3);
\draw[->] (3) -- (y);
\end{tikzpicture}
\caption{
No edge is removed at level 0. At level 1,
if the edge $(x,y)$ is checked after
removing $(x,2)$ and $(2,y)$, then FCI
performs less CI tests than lFCI (with $\gamma=5$), because the node $2$ is local to $x$ and $y$ but not in their neighborhoods.
}
\label{fig:lfcimoretests}
\end{figure}
\newpage
\bibliographystyle{apalike}
\subsection{Linear Structural Equation Models}
Let $G=(V,E)$ be a MAG with vertex set $V=\{1,\dots,p\}$. Let $W=(W_1,\ldots, W_p)$ be an associated random vector.
The linear structural equation model given by $G$ assumes that
$W$ solves an equation system of the form
\begin{equation}\label{eq:SEM}
W = B W + \epsilon,
\end{equation}
where $B=(\beta_{i,j})\in\mathbb{R}^{p\times p}$ is a matrix
of unknown parameters with $\beta_{ij}\not=0$ only if $j\to i$ is an edge in $G$. The random vector $\epsilon=(\epsilon_1,\dots,\epsilon_p)$ is comprised of stochastic noise with positive definite covariance matrix $\VV{\epsilon}=\Omega=(\omega_{i,j})$. It can be partitioned into two independent subvectors $\epsilon_{\text{un}(G)}$ and $\epsilon_{V\setminus \text{un}(G)}$. Here, $\epsilon_{\text{un}(G)}$ is assumed to satisfy the global Markov property for the undirected subgraph induced by the undirected part $\text{un}(G)\subseteq V$, and $\epsilon_{V\setminus \text{un}(G)}$ satisfies the global Markov property for the subgraph formed by the bidirected edges among nodes in $V\setminus \text{un}(G)$; compare, e.g., \cite{drton:richardson:2008}. In particular, $\epsilon_i$ and $\epsilon_j$ are marginally independent when $i,j\notin\text{un}(G)$, and conditionally independent given all other errors when $i,j\in\text{un}(G)$. Consequently, the error covariance matrix
$\Omega$ can be permuted into block-diagonal form with two blocks. One block has an inverse whose support is given by the undirected edges of $G$, and the other block has its support given by the bidirected edges of $G$ \citep[Section 8]{richardson2002}.
Let $I$ be the identity matrix.
Since $G$ is a MAG, it does not contain any directed cycles.
Thus $I-B$ is invertible, and \eqref{eq:SEM} has a unique solution $W$ with covariance matrix
\begin{equation}\label{eq:vardecomp}
\Sigma:=\VV{W} = (I-B)^{-1} \Omega (I-B)^{-\top}.
\end{equation}
\changemarker{Conditional independences in the linear SEM correspond exactly to zero \emph{partial correlations}. For nodes $i$ and $j$, and $S\subseteq V\setminus\{i,j\}$, the partial correlation of $W_i$ and $W_j$ given $W_S$ is
$$
\rho(i,j|S) = \Sigma(i,j|S)/\sqrt{ \Sigma(i,i|S)\Sigma(j,j|S) },$$
where
$\Sigma(i,j|S)=\Sigma(i,j)-\Sigma(i,S)\Sigma(S,S)^{-1}\Sigma(S,j)$.
Given a sample of $n$ independent observations generated from the distribution of $W$, the corresponding \emph{sample partial correlations} $\widehat \rho(i,j|S)$ are obtained by replacing $\Sigma$ by the sample covariance matrix $\widehat\Sigma_n$.
In order to test $i\independent j|S$ in a practical run of the lFCI algorithm, we test the vanishing of $\rho(i,j|S)$ and reject the conditional independence if $\sqrt{n-|S|-3}\left|g\big(\widehat \rho(i,j|S)\big)\right|>\Phi^{-1}(1-\alpha_n/2)$, where $g(\rho)=\frac{1}{2}\log\left(\frac{1+\rho}{1-\rho}\right)$ is Fisher's z-transform, $\Phi$ is the normal cdf, and $\alpha_n\in(0,1)$ is a significance level.}
\subsection{Consistency}
As discussed in Section~\ref{sec:localseparation}, our algorithm requires an assumption on the size of $\gamma$-local-graph separators.
\changemarker{
\begin{assumption}[Local-separation Property]\label{ass:gxlocalsep}
The MAG $G$
satisfies
$
L(G,\gamma)\leq \eta
$ for the lFCI parameters $\eta$ and $\gamma$.
\end{assumption}}
\changemarker{As shown in Section~\ref{sec:localseparation}, many common random graphs satisfy Assumption~\ref{ass:gxlocalsep} with $\eta=O(1)$ and $\gamma = O(\log p)$ with high probability as the number of nodes $p\to\infty$}.
If the graph satisfies the requirements of Theorem~\ref{prop:hybridMAG},
then Assumption~\ref{ass:gxlocalsep} holds with $\eta=\eta_0+\Delta$.
We also require an assumption on the covariance matrix to establish large sample consistency of estimated conditional correlations in high dimensions.
\begin{assumption}[Covariance/precision matrix]\label{ass:cov}
The random vector
$W=(W_1,\ldots, W_p)$
follows
a linear SEM of the form
\eqref{eq:SEM}, with sub-Gaussian errors $\epsilon$. Moreoever, the spectral norms of all $(\eta+2)\times(\eta+2)$ submatrices of its covariance matrix $\Sigma$
are bounded as
\[
\max_{A\subseteq [p], |A|\leq \eta+2} \left( \norm{\Sigma_{A,A}}, \norm{(\Sigma_{A,A})^{-1}} \right) \leq M < \infty.
\]
\end{assumption}
As in \citet{arjun2018}, we assume a faithfulness condition that is less restrictive than the $\lambda$-strong faithfulness assumption that appears, e.g., in \cite{colombo2012}.
\begin{definition}[$(\eta,\lambda)$-strong-path-faithfulness]
Given $\eta>0$ and $\lambda \in (0, 1)$, a distribution $P$ is
$(\eta,\lambda)$-strong-path-faithful to a MAG
$G = (V, E)$ if both of the following conditions hold:
\begin{enumerate}
\item[(i)] $\min \{|\rho(i, j | S)|: (i, j) \in E, S \subset V \setminus
\{i, j\} , |S| \leq \eta\} > \lambda$, and
\item[(ii)] $\min \{|\rho(i, j | S)| : (i, j, S) \in N_G\} > \lambda$,
where $N_G$ is the set of triples $(i, j, S)$ such that $i$ and $j$ are not adjacent, but for some $k \in V$, $(i, j, k)$ is an unshielded triple, and
$i$ and $j$ are not $m$-separated given $S$.
\end{enumerate}
\end{definition}
\begin{assumption}[Path faithfulness and Markov property]\label{ass:faith}
The joint distribution $P$ of the random vector
$W$ is
$(\eta,\lambda)$-strong-path-faithful to the MAG $G$ with $\lambda = \Omega(n
^{-c} )$ for $c \in (0, 1/2)$.
\end{assumption}
\changemarker{The next assumption captures the local point of view underlying our algorithm and posits
small partial correlations
given local separators.}
\begin{assumption}[Local partial correlation]\label{ass:vanishtrekweight}
Let $\mathcal{S}_{\eta,\gamma}(i,j)$ denote the collection of $\gamma$-local-graph separators of
$(i,j)$ with size at most $\eta$. It holds that
\[
\changemarker{\max_{(i,j)\notin E}\min_{S\in \mathcal{S}_{\eta,\gamma(i,j)}}\left|\rho(i,j|S)\right| \leq\lambda.}
\]
\end{assumption}
As we now show this assumption holds under a directed $\beta$-walk-summability condition.
This condition mirrors the
walk-summable condition for undirected graphs, which holds for a large class
of networks \citep{malioutov2006}.
\begin{assumption}[Directed $\beta$-summability]\label{ass:summable}
The joint distribution $P$ of the random vector $W$ belongs
to a linear SEM in the form \eqref{eq:SEM},
in which the weighted adjacency matrix $B$ satisfies
$\norm{B}\leq \beta<1$, where $\norm{\cdot}$ denotes the spectral norm.
\end{assumption}
If the norm of the error covariance matrix $\Omega$
is bounded, then
directed $\beta$-summability implies Assumption~\ref{ass:vanishtrekweight}. We state this in the following lemma, which is a slightly modified version of Lemma~2 in \cite{arjun2018}.
\changemarker{
\begin{lemma}\label{lem:summableimpliesvanish}
If Assumptions~\ref{ass:gxlocalsep}, \ref{ass:cov}, \ref{ass:faith},
\ref{ass:summable} are satisfied,
$\norm{\Omega}$ is bounded,
and $\gamma$ is larger than some constant $\gamma^*(\eta,M,\lambda,\norm{\Omega})$,
then Assumption~\ref{ass:vanishtrekweight} is also satisfied.
\end{lemma}}
\changemarker{To further justify Assumption~\ref{ass:vanishtrekweight}, we conducted
simulation studies (see Appendix~\ref{sec:simoracle} and Section~SM5 of the Supplementary Material) which show that in a number of natural settings}, Assumption~\ref{ass:vanishtrekweight} is likely to hold.
We now establish our main consistency result.
\changemarker{
\begin{theorem}\label{thm:consistencylfci}
Suppose Assumptions~\ref{ass:gxlocalsep}, \ref{ass:cov}, \ref{ass:faith}, \ref{ass:vanishtrekweight} hold,
and $n=\Omega((\log p)^{1/(1-2c)})$ for $c\in(0,1/2)$ from Assumption~\ref{ass:faith}. Then
there exists a sequence of
significance levels
$\alpha_n\to 0$ such that Algorithm~\ref{alg:lFCI} consistently learns a PAG for $[G]$ from an i.i.d.~sample of size $n$.
Moreover,
if Assumption~\ref{ass:localdiscpaths} holds,
then the consistently learned PAG is maximally informative.
\end{theorem}}
The sample complexity of lFCI established in Theorem~\ref{thm:consistencylfci}
offers considerable improvement over the worst-case sample complexity of the FCI \changemarker{and RFCI} algorithms for graphs with unbounded \changemarker{size of D-SEP sets and the FCI+ algorithm for graphs with large node degrees}.
As a corollary, we also improve the
theory of reduced PC \citep{arjun2018} for DAG learning:
we derive the correctness of reduced PC and its ``approximate version"
under the local path condition (Definition~\ref{def:localpathproperty}).
The sample complexity is also improved by applying an alternative error propagation computation; see Appendix~\ref{sec:appendix} for details.
\changemarker{
\begin{corollary}\label{cor:consistencyrpc}
Suppose $G$ is a DAG whose skeleton satisfies the $(\eta,\gamma)$-local path property.
Under Assumptions~\ref{ass:cov},
\ref{ass:faith},
\ref{ass:vanishtrekweight} and
assuming $n=\Omega((\log p)^{1/(1-2c)})$,
there exists a sequence of
significance levels $\alpha_n\to 0$ such that rPC and the approximate rPC both consistently learn the CPDAG of $G$ from an i.i.d.~sample of size $n$.
\end{corollary}}
\subsection{Treks and $m$-separation}
This section relies on the
\textit{trek representation}
\citep{wright1934,sullivant2010,draisma2013} of covariance matrix $\Sigma$.
To simplify the discussion, we present the following results assuming there is no
selection variables in the graph, and therefore $G$ is a MAG without undirected edges.
In a mixed graph $G$, we define a \textit{trek} from node $i$ to $j$ as a tuple $\tau=(P_L,P_M,P_R)$,
where $P_L$ is a directed path from some node $s$ to $i$,
and $P_R$ is a directed path
from some node $t$ to $j$,
and $P_M$ is either one bidirected edge $s\leftrightarrow t$ (when $P_L$ and $P_R$ possesses no undirected edge) or the empty set when $s=t$.
We call $i$ the \textit{initial node}, $j$ the \textit{final node}, and $s$ (or $\{s,t\}$) the \textit{top node(s)}.
We define the
\emph{trek monomial} as $m_\tau=\beta^L \omega_{s,t} \beta^R$, where $\beta^L=\prod_{k\to l\in P_L}\beta_{kl}$ and $\beta^R=\prod_{k\to l\in P_R}\beta_{kl}$,
and
let $\mathcal{T}(i,j)$ denote the set of all trek from $i$ to $j$.
Moreover,
for sets $C$ and $D$ with $|C|=|D|=k$, we define
a \textit{trek system} $T$ from $C$ to $D$ as a set of $k$ treks whose initial nodes exhaust
$C$ and final nodes exhaust $D$.
With abuse of notation we write $T$ as a tuple of collections of paths $(P_L,P_M,P_R)$.
We define the \textit{trek system monomial} as the product of trek monomials in the system, i.e., $m_T=\prod_{\tau\in T}m_\tau$.
Each trek system determines a permutation of the initial and final nodes, and we define the the sign of this trek system as the
sign of the its permutation.
Let $\mathcal{T}(C,D)$ denote the collection of all trek systems from $C$ to $D$.
By the Cauchy–Binet determinant expansion, we have,
\begin{align}
\det \Sigma(C,D)& =\sum_{R,S\subset V, |R|=|S|=k} \det\left((I-B)^{-\top}\right)_{C,R} \det\Omega_{R,S}\det \left((I-B)^{-1}\right)_{S,D} \\
&= \sum_{T\in \mathcal{T}(C,D)}\sign(T)m_T.\label{eq:trekdecomp}
\end{align}
We say a trek system $T$ has \textit{sided intersection} if two paths in $P_L$, $P_R$, or $P_M$ have shared nodes.
If $T$ is a trek between $C$ and $D$ with sided intersections, then its trek system weight $m_T$ is cancelled in the summation in \eqref{eq:trekdecomp}, \citep[for a proof, see][]{sullivant2010}.
In other words, the summation in \eqref{eq:trekdecomp}
only needs to run over all trek systems without sided intersections.
Consequently,
$\det\left(\Sigma(i\cup S, j\cup S)\right)=0$
if and only if every system of treks from $i\cup S$ to $j\cup S$ has a sided intersection.
The later condition is also called \textit{$t$-separation}.
For Gaussian SEMs, in which conditional
independence is characterized by
zero partial correlation, this means
$W_i\independent W_j|W_S$ if and only if
$\sum_{T\in \mathcal{T}(i\cup S,j\cup S)}\sign(T)m_T=0$.
We will show next that Assumption~\ref{ass:vanishtrekweight} can be expressed
as a condition on trek weights. Let $G=(V,E)$ be a MAG.
For non-adjacent nodes $i,j\in V$, and
$S\subseteq V(G_\gamma)\setminus\{i,j\}$,
we denote $\mathcal{T}_\gamma(i, j,S)$ as the collection of trek systems from $i\cup S$ to $j\cup S$ in $G_\gamma(i,j)$, and
$\mathcal{T}^C_\gamma(i , j, S) := \mathcal{T}(i , j, S) \setminus \mathcal{T}^C_\gamma(i , j, S) $.
By our definition, $\mathcal{T}^C_\gamma(i , j, S) $ only contains treks with an edge not in $G_\gamma(i,j)$.
\begin{lemma}\label{prop:trekdecomp}
Let $G=(V,E)$ be a MAG. Under Assumption~\ref{ass:cov},
if
\[
\max_{i\notin\mathrm{adj}(G,j)}\min_{S_\gamma\in \mathcal{S}_{\eta,\gamma}(i,j)}\left|\sum_{T\in \mathcal{T}^C_\gamma(i,j, S_\gamma)}\sign(T)m_T\right|=O(\beta^\gamma),
\]
where $\mathcal{S}_{\eta,\gamma}(i,j)$ is the collection of $\gamma$-local-graph separators of size at most $\eta$,
then Assumption~\ref{ass:vanishtrekweight} is satisfied.
\end{lemma}
\begin{proof}
By Definition~\ref{def:localseparator}, if a set $S_\gamma$ is a $\gamma$-local-separator
of $(i,j)$, then it is a separator of $i$ and $j$ in $G_\gamma(i,j)$, so all
trek systems between $i\cup S_\gamma$ and $j\cup S_\gamma$
have sided intersections in $G_\gamma(i,j)$,
and hence also in $G$.
Following \citet{sullivant2010} and \citet{draisma2013}, we only need to take summation over trek systems without sided intersection in $G$.
Therefore,
\begin{align*}
\sum_{T\in \mathcal{T}(i,j, S_\gamma)}\sign(T)m_T&=
\sum_{T\in \mathcal{T}_\gamma(i,j, S_\gamma)}\sign(T)m_T+\sum_{T\in \mathcal{T}^C_\gamma(i,j, S_\gamma)}\sign(T)m_T\\
&= \sum_{T\in \mathcal{T}^C_\gamma(i,j, S_\gamma)}\sign(T)m_T.
\end{align*}
Now denote $\Sigma(i,j|S_\gamma)$ as the $(i,j)$-th entry of the conditional variance matrix given $S_\gamma$. We have
\begin{align*}
\rho(i,j|S_\gamma) &= \frac{\Sigma(i,j|S_\gamma)}{\sqrt{ \Sigma(i,i|S_\gamma)\Sigma(j,j|S_\gamma) }}= \frac{\sum_{T\in \mathcal{T}(i,j, S_\gamma)}\sign(T)m_T}{\det(\Sigma(S_\gamma,S_\gamma))} \frac{1}{\sqrt{ \Sigma(i,i|S_\gamma)\Sigma(j,j|S_\gamma) }}.
\end{align*}
By the fact that $\Sigma(j,j|S_\gamma) \geq \Sigma(j,j|V\setminus\{j\})\geq 1/\omega_{jj}$,
and $\det(\Sigma(S_\gamma,S_\gamma))\geq M^{-\eta}$ under Assumption~\ref{ass:cov}, we have $|\rho(i,j|S_\gamma)|=O(\beta^\gamma).$
\end{proof}
|
\section{Introduction}
We consider a locally compact Hausdorff groupoid $G$ which is graded over a discrete group $\Gamma$. The grading is implemented by a continuous homomorphism $c\colon G\to \Gamma$. In particular, the fibre $G_e\coloneqq c^{-1}(\{e\})$ over the identity $e$ is an open and closed subgroupoid of $G$. Understanding $G_e$ and its $\mathrm{C}^*$\nobreakdash-algebras can lead to a better understanding of $G$ and its $\mathrm{C}^*$\nobreakdash-algebras. For example, Spielberg proved in \cite[Proposition~1.3]{Spielberg-LMS} that for an \'etale groupoid $G$ \and an amenable group $\Gamma$, if $G_e$ is amenable then so is $G$; the converse follows from \cite[Corollary~5.3.22]{A-DR}. Renault and Williams have generalised Spielberg's result to locally compact Hausdorff groupoids that are second-countable \cite{RW-TAMS}.
When $G$ is \'etale, it follows from \cite{CDR, RRS} that the reduced $\mathrm{C}^*$\nobreakdash-algebra $\mathrm{C}^*_\rr(G)$ is graded in the sense of \cite[Definition~19.2]{Exel's book} and that the conditional expectation implementing the grading is faithful. A crucial ingredient in the proof is that inclusion of $C_c(G_e)$, the continuous and compactly supported complex-valued functions on the fibre $G_e$, extends to an injective homomorphism of $\mathrm{C}^*_\rr(G_e)$ into $\mathrm{C}^*_\rr(G)$ (see, for example, \cite[Lemma~3]{RRS}).
That inclusion also extends to an injective homomorphism with respect to the full norms was proven, again only for \'etale groupoids, by Kaliszewski, Quigg, and Raeburn in \cite[Theorem~6.2]{KQR}. The strategy of \cite{KQR} was to build a pre-Hilbert $C_c(G_e)$-bimodule $X_0$ from $C_c(G)$, and to show that left multiplication by $C_c(G)$ extends to give a homomorphism $L$ of $\mathrm{C}^*(G)$ into the $\mathrm{C}^*$\nobreakdash-algebra $\mathcal{L}(X)$ of adjointable operators on the completion $X$ of $X_0$. Several norm inequalities then show that inclusion is isometric on $C_c(G)$, and hence extends to an isometric homomorphism. A modern take on the clever proof in \cite{KQR} is that even for non-\'etale groupoids, a ``pre-representation'' of $C_c(G)$ as operators on $X_0$ extends to an $I$-norm bounded homomorphism \cite[Corollary~6.2]{BHM}.
Here we generalise \cite[Theorem~6.2]{KQR} and \cite[Lemma~3]{RRS} to non-\'etale groupoids with a Haar system. Our techniques depend on the existence of a two-sided approximate identity $\{e_\mu\}$ for $\mathrm{C}^*(G)$ in $C_c(G)$ with $\lVert e_\mu\rVert\le 1$. To get such an approximate identity we invoke \cite[Proposition~1.49]{Dana's book}, which assumes that the unit space $G^{(0)}$ of $G$ is paracompact. Therefore we assume that our groupoids are second-countable locally compact Hausdorff: then so are their unit spaces and hence these spaces are paracompact as needed. Our main theorem is the following.
\begin{thm} \label{thm-inclusions}
Let $G$ be a second-countable locally compact Hausdorff groupoid with a Haar system. Let $\Gamma$ be a discrete group and let $c\colon G\to\Gamma$ be a continuous homomorphism. Set $G_e\coloneqq c^{-1}(\{e\})$. Define $i\colon C_c(G_e)\to C_c(G)$ by
\[
i(f)(x)=\begin{cases}f(x)&\text{if $x\in G_e$}\\
0&\text{else}.
\end{cases}
\]
Then $i$ extends to injective homomorphisms $i_\ff\colon \mathrm{C}^*(G_e)\to \mathrm{C}^*(G)$ and $i_\rr\colon \mathrm{C}^*_\rr(G_e)\to \mathrm{C}^*_\rr(G)$.
\end{thm}
We then show in \cref{cor-app} that both $\mathrm{C}^*(G)$ and $\mathrm{C}^*_\rr(G)$ are topologically graded with conditional expectations induced by restriction of functions to $G_e$. Finally, we discuss what we know about the full and reduced $\mathrm{C}^*$\nobreakdash-algebras of the associated Fell bundles.
In a preliminary version of this paper, our results in the reduced setting were weaker. However, after posting the paper on the ArXiv, we learned about the more general results for semigroup actions on a groupoid in \cite[Theorem~5.8]{BM} (the full inclusion) and \cite[Lemma~8.1]{BEM} (the reduced inclusion). Although \cite{BEM} and \cite{BM} have standing assumptions that the groupoids are strongly graded (see \cite[Theorem~3.14]{BM}), the proof techniques used in \cite[Theorem~5.8]{BM} and \cite[Lemma~8.1]{BEM} can be applied to more general graded groupoids. In particular, we were able to adapt the proof of \cite[Lemma~8.1]{BEM} to our setting and thereby strengthen our results.
\section{Set-up} \label{sec-set-up}
Throughout, $G$ is a second-countable locally compact Hausdorff groupoid with a left Haar system $\lambda = \{\lambda^u : u\in G^{(0)}\}$, $\Gamma$ is a discrete group, and $c\colon G\to \Gamma$ is a continuous homomorphism (sometimes called a \emph{cocycle}). For $\gamma\in\Gamma$, we set $G_\gamma \coloneqq c^{-1}(\{\gamma\})$. We \emph{choose} the Haar system on the subgroupoid $G_e$ of $G$ to be the restriction $\{\lambda^u|_{G_e} : u\in G^{(0)}\}$ of $\lambda$. We write just $\lambda^u$ for $\lambda^u|_{G_e}$.
We refer to \cite[Section~1.4]{Dana's book} for the definitions of the full and reduced $\mathrm{C}^*$\nobreakdash-algebras $\mathrm{C}^*(G)$ and $\mathrm{C}^*_\rr(G)$, respectively. We write $q^G\colon\mathrm{C}^*(G)\to \mathrm{C}^*_\rr(G)$ for the quotient map from the full $\mathrm{C}^*$\nobreakdash-algebra $\mathrm{C}^*(G)$ to the reduced $\mathrm{C}^*$\nobreakdash-algebra $\mathrm{C}^*_\rr(G)$ of $G$. To distinguish the norms we use $\lVert\cdot\rVert_\rr$ for the norm on $\mathrm{C}^*_\rr(G)$ and just $\lVert\cdot\rVert$ for the norm on $\mathrm{C}^*(G)$.
Let $a\in C_c(G)$. For each $\gamma\in\Gamma$, we set $a_\gamma\coloneqq a|_{G_\gamma}$. Since $G_\gamma$ is open and closed, $a_\gamma$ is continuous on $G_\gamma$ with compact support. There exists a finite subset $F$ of $\Gamma$ such that $\cup_{\gamma\in F} G_\gamma$ is an open cover of the support $\operatorname{supp}(a)$ of $a$, and we write $a=\sum_{\gamma\in\Gamma} a_\gamma$, remembering that there are only finitely many nonzero summands since $a_\gamma$ is zero unless $\gamma\in F$.
\section{Isometric inclusions}
In this section we prove \cref{thm-inclusions}, using ideas from \cite[Theorem~6.2]{KQR}. In \cite{KQR}, Kaliszewski, Quigg, and Raeburn construct a groupoid equivalence between a subgroupoid of the skew-product groupoid $G\times_c\Gamma$ and $G_e$, invoke the Equivalence Theorem of \cite{MRW} to make $C_c(G)$ into a pre-Hilbert $C_c(G_e)$-module $C_c(G)$, and show that left multiplication by $C_c(G)$ acts by bounded adjointable operators on the completion $X$ of $C_c(G)$. Our first observation, in \cref{prop-right-Hilbert} below, is that we do not need to invoke the Equivalence Theorem to get $X$: informed by the \'etale result, we write down analogous formulae for an action and an inner product, and verify that they work.
\begin{prop} \label{prop-right-Hilbert}
Let $a,b\in C_c(G)$ and write $a=\sum_{\gamma\in \Gamma}a_\gamma, \ b=\sum_{\gamma\in \Gamma}b_\gamma$ where $a_\gamma\coloneqq a|_{G_\gamma}, \ b_\gamma\coloneqq b|_{G_\gamma}$, and let $g\in C_c(G_e)$. For $\gamma\in \Gamma$, let $i$ be the natural inclusion of elements of $C_c(G_\gamma)$ in $C_c(G)$ by extension by zero. For $\gamma\in \Gamma$, define
$a_\gamma^*$ and $a_\gamma^*b_\gamma$ by
\begin{equation} \label{eq-defn-restricted-inv-conv}
a_\gamma^*(y)=\overline{a_\gamma(y^{-1})}\quad\text{and}\quad a_\gamma^*b_\gamma(x)\coloneqq\int_{G} i(a_\gamma)^*(z) \, i(b_\gamma)(z^{-1}x)\, \mathrm{{d}}\lambda^{r(x)}(z),
\end{equation}
where $x\in G_e$ and $y\in G_{\gamma^{-1}}$.
Then the formulae
\begin{gather}
(a\cdot g)(x)=\int_{G_e} a(xn) \, g(n^{-1})\, \mathrm{{d}}\lambda^{s(x)}(n) \quad \text{ for } x \in G, \ and \label{eq-action}\\
\langle a\,,\, b\rangle=\sum_{\gamma\in\Gamma} a_\gamma^*b_\gamma \label{eq-innerproduct},
\end{gather}
give $C_c(G)$ the structure of an inner product $C_c(G_e)$-module with $\langle a\,,\, a\rangle\ge 0$ in both $\mathrm{C}^*_\rr(G_e)$ and $\mathrm{C}^*(G_e)$.
\end{prop}
\begin{proof}
For $\gamma \in \Gamma$, the support of the involution $i(a_\gamma)^*$ and the convolution $i(a_\gamma)^* * i(b_\gamma)$ are in $G_{\gamma^{-1}}$ and $G_e$, respectively, and \labelcref{eq-defn-restricted-inv-conv} are the formulae for their restrictions to $G_{\gamma^{-1}}$ and $G_e$. Similarly, $i(g)$ has support in $G_e$ and the formula \labelcref{eq-action} is the formula for the convolution in $C_c(G)$ of $a$ and $i(g)$.
Let $a\in C_c(G)$ and $g, h\in C_c(G_e)$. Since $C_c(G)$ is a $*$-algebra with respect to convolution and involution by \cite[Proposition~1.34]{Dana's book}, it follows, first, that $a\cdot g=a*i(g)$ is again in $C_c(G)$ and, second, that
\[a\cdot (gh)=a*i(g*h)=a*\big(i(g)*i(h)\big) =\big(a*i(g)\big)*i(h)=(a\cdot g)\cdot h.\] Thus \labelcref{eq-action} gives an action of $C_c(G_e)$ on $C_c(G)$.
Next we check that \labelcref{eq-innerproduct} is an inner product. Linearity in the second variable follows from the linearity of convolution in $C_c(G)$, the linearity of $i$, and the linearity of restriction of functions to $C_c(G_e)$. Since $g\in C_c(G_e)$ we have
\[
\langle a\,,\, b\cdot g\rangle
=\sum_{\gamma\in\Gamma} a_\gamma^*(b_\gamma\cdot g).
\]
Thus, to see that $\langle a\,,\, b\cdot g\rangle=\langle a\,,\, b\rangle g$, it suffices to show that $a^*(b\cdot g)=(a^*b)g$ when $a,b\in C_c(G)$ with support in $G_\gamma$, and, again, this follows from the associativity of convolution in $C_c(G)$.
We have $\langle a\,,\, b\rangle^* = \left(\sum_{\gamma \in \Gamma} a_\gamma^*b_\gamma \right)^{\!*} = \sum_{\gamma \in \Gamma} b_\gamma^*a_\gamma = \langle b\,,\, a\rangle$. Since a sum of positive elements is positive, we get that $\langle a\,,\, a\rangle=\sum_{\gamma \in \Gamma} a_\gamma^*a_\gamma$ is positive in both $\mathrm{C}^*_\rr(G)$ and $\mathrm{C}^*(G)$. Moreover, if a sum of positive elements is zero, then the summands must be zero, and so $\langle a\,,\, a\rangle=0$ implies that $a=0$ in both $\mathrm{C}^*_\rr(G)$ and $\mathrm{C}^*(G)$. Thus \labelcref{eq-innerproduct} is an inner product.
\end{proof}
We will indicate in which $\mathrm{C}^*$\nobreakdash-algebra the inner product $\langle \cdot\,,\, \cdot\rangle$ of \labelcref{eq-innerproduct} is taking values using subscripts: $\langle \cdot\,,\, \cdot\rangle_{\mathrm{C}^*(G_e)}$ and $\langle \cdot\,,\, \cdot\rangle_{\mathrm{C}^*_\rr(G_e)}$. Of course, if $a,b\in C_c(G)$, then $\langle a\,,\, b\rangle_{\mathrm{C}^*(G_e)}=\langle a\,,\, b\rangle_{\mathrm{C}^*_\rr(G_e)}$.
\begin{cor} \label{cor-right-Hilbert}
There are completions $X$ and $Y$ of $C_c(G)$ such that $X$ is a right-Hilbert $\mathrm{C}^*(G_e)$-module and $Y$ is a right-Hilbert $\mathrm{C}^*_\rr(G_e)$-module, with formulae for the actions and inner products given by \labelcref{eq-action,eq-innerproduct}. Let $q^{G_e}\colon \mathrm{C}^*(G_e)\to \mathrm{C}^*_\rr(G_e)$ be the quotient map and consider the closed submodule
\[
X_{\ker q^{G_e}} \coloneqq\{ b\in X : \langle a\,,\, b\rangle_{\mathrm{C}^*(G_e)}\in \ker q^{G_e}\text{\ for all\ }a\in X\}
\]
of $X$.
Then $Y$ is the quotient $X/X_{\ker q^{G_e}}$.
\end{cor}
\begin{proof}
By \cref{prop-right-Hilbert}, $C_c(G)$ is an inner-product $C_c(G_e)$-module. By, for example, \cite[Lemma~2.16]{tfb}, the completion $X$ in the norm $\lVert a\rVert_{\mathrm{C}^*(G_e)}\coloneqq \lVert\langle a\,,\, a\rangle_{\mathrm{C}^*(G_e)}\rVert^{1/2}$ induced by the norm on $\mathrm{C}^*(G_e)$ is a Hilbert $\mathrm{C}^*(G_e)$-module. Similarly, $Y$ is obtained by completing $C_c(G)$ using $\lVert a\rVert_{\mathrm{C}^*_\rr(G_e)}\coloneqq \lVert\langle a\,,\, a\rangle_{\mathrm{C}^*_\rr(G_e)}\rVert^{1/2}$. That $Y=X/X_{\ker q^{G_e}}$ follows from the Rieffel correspondence \cite[Theorem~3.22]{tfb}.
\end{proof}
The following observation is probably well known.
\begin{lem} \label{lem-op-descends}
Let $J$ be a closed ideal of a $\mathrm{C}^*$\nobreakdash-algebra $A$. Let $X$ be a right-Hilbert $A$-module and consider the closed submodule
\[X_J \coloneqq\{ y\in X : \langle x\,,\, y\rangle_{A}\in J\text{\ for all\ }x\in X\}.\]
If $T\in\mathcal{L}(X)$, then $T(X_J)\subset X_J$.
\end{lem}
\begin{proof}
Fix $y\in X_J$. Then $\langle x\,,\, y\rangle_A\in J$ for all $x\in X$. Thus \[
\langle T(y)\,,\, T(y)\rangle_A=\langle T^*T(y)\,,\, y\rangle_A\in J.
\]
By \cite[Lemma~3.23]{tfb} we have $X_J = \{x\in X : \langle x\,,\, x\rangle_A\in J\}$. Thus $T(y)\in X_J$.
\end{proof}
Next we show that left multiplication by $C_c(G)$ acts by bounded adjointable operators on $X$. We start with a technical observation.
\begin{lem} \label{lem-ilt}
Suppose that $\{a_n\}\subset C_c(G)$ and that $a_n\to 0$ as $n\to\infty$ in the inductive limit topology on $C_c(G)$. Then $\langle a_n\,,\, a_n\rangle_{\mathrm{C}^*(G_e)} \to 0$ and $\langle a_n\,,\, a_n\rangle_{\mathrm{C}^*_\rr(G_e)} \to 0$ in the inductive limit topology on $C_c(G_e)$ as $n \to \infty$.
\end{lem}
\begin{proof}
Let $K$ be a compact subset of $G$ such that $\operatorname{supp} (a_n)\subset K$ for all $n$. Then there exists a finite subset $F$ of $\Gamma$ such that $K\subset\cup_{\gamma\in F} G_\gamma$. Write $a_n=\sum_{\gamma\in \Gamma} (a_n)_\gamma$, where each $\operatorname{supp}((a_n)_\gamma)\subset G_\gamma$. Indeed, each $(a_n)_\gamma$ has support in the compact set $K_\gamma\coloneqq K\cap G_\gamma$. Notice that $(a_n)_\gamma\to 0$ uniformly, and then so does the convolution product $(a_n)_\gamma^*(a_n)_\gamma$ with support in the compact set $K_\gamma^{-1}K_\gamma$. Thus
\[
\langle a_n\,,\, a_n\rangle_{\mathrm{C}^*(G_e)}=\sum_{\gamma\in \Gamma}(a_n)_\gamma^*(a_n)_\gamma=\sum_{\gamma\in F}(a_n)_\gamma^*(a_n)_\gamma\to 0
\]
uniformly on the compact subset $\cup_{\gamma\in F} K_\gamma^{-1}K_\gamma$ of $G_e$.
\end{proof}
\begin{prop} \label{prop-L}
Let $X$ be the right-Hilbert $\mathrm{C}^*(G_e)$-bimodule of \cref{cor-right-Hilbert}. Then there exists a homomorphism $L\colon \mathrm{C}^*(G)\to \mathcal{L}(X)$ such that $L_a(b)=a * b$ for $a\in C_c(G)\subset \mathrm{C}^*(G)$ and $b\in C_c(G)\subset X$.
\end{prop}
\begin{proof}
We will show that $L\colon C_c(G)\to\mathcal{L}(C_c(G))$ is a pre-representation of $C_c(G)$ on $X$ as defined in \cite[Definition~5.1]{BHM}. By \cite[Corollary~6.2]{BHM} this gives an $I$-norm bounded representation $L\colon C_c(G)\to \mathcal{L}(X)$, which then extends to give a homomorphism $L\colon \mathrm{C}^*(G)\to\mathcal{L}(X)$. (We think this is the modern take on the work Kaliszewski, Quigg, and Raeburn do to prove their \cite[Theorem~6.2]{KQR}.)
We check the three items in \cite[Definition~5.1]{BHM}. For the first, we need to fix $b,d\in C_c(G)$ and show that $a\mapsto \langle b\,,\, L_a(d)\rangle_{\mathrm{C}^*(G_e)}$ is continuous in the inductive limit topology. Let $K$ be a compact subset of $G$ and suppose that $a_n,a\in C_c(G)$ have support in $K$ and that $a_n\to a$ uniformly on $K$. Then
\begin{align*}
\lVert\langle b\,,\, L_{a_n}(d)\rangle_{\mathrm{C}^*(G_e)}-&\langle b\,,\, L_a(d)\rangle_{\mathrm{C}^*(G_e)}\rVert^2
\\
&=\lVert\langle b\,,\,(a_n-a)d\rangle_{\mathrm{C}^*(G_e)} \rVert^2\\
&=\lVert \langle b\,,\,(a_n-a)d\rangle_{\mathrm{C}^*(G_e)}^* \, \langle b\,,\,(a_n-a)d\rangle_{\mathrm{C}^*(G_e)} \rVert\\
&\le \lVert \langle b\,,\,b\rangle_{\mathrm{C}^*(G_e)} \rVert \lVert \langle (a_n-a)d\,,\,(a_n-a)d\rangle_{\mathrm{C}^*(G_e)} \rVert
\end{align*}
using the Cauchy--Schwarz inequality. Since $(a_n-a)d\to 0$ in the inductive limit topology on $C_c(G)$, \cref{lem-ilt} implies that $\langle (a_n-a)d\,,\,(a_n-a)d\rangle_{\mathrm{C}^*(G_e)}\to 0$ in the inductive limit topology on $C_c(G_e)$. Now $\langle (a_n-a)d\,,\,(a_n-a)d\rangle_{\mathrm{C}^*(G_e)} \to 0$ in $\mathrm{C}^*(G_e)$, and it follows that
\[
\lVert\langle b\,,\, L_{a_n}(d)\rangle_{\mathrm{C}^*(G_e)}-\langle b\,,\, L_a(d)\rangle_{\mathrm{C}^*(G_e)}\rVert\to 0.
\]
Thus $a\mapsto \langle b\,,\, L_a(d)\rangle_{\mathrm{C}^*(G_e)}$ is continuous in the inductive limit topology.
For the second, we need to show that for $a_1, a_2, b, d\in C_c(G)$ we have
\[
\langle L_{a_1}(b)\,,\, L_{a_2}(d)\rangle_{\mathrm{C}^*(G_e)}=\langle b\,,\, L_{a_1^*a_2}(d)\rangle_{\mathrm{C}^*(G_e)},
\]
which is precisely the calculation on the middle of page~431 in the proof of \cite[Theorem~6.2]{KQR}.
For the third, we need to see that $\{L_a(b) : a,b\in C_c(G)\}$ is dense in $X$. Since $G_e$ has paracompact unit space, there exists an approximate identity $\{ e_\mu\}\subset C_c(G_e)$ for $\mathrm{C}^*(G_e)$ such that each $ e_\mu$ has norm at most $1$ \cite[Proposition~1.49]{Dana's book}. Fix $a\in C_c(G)$ and $\epsilon>0$. Since $C_c(G)$ is dense in $X$, it suffices to show that $\lVert a i(e_\mu)-a\rVert_{\mathrm{C}^*(G_e)}<\epsilon$ eventually. There exists a finite subset $F$ of $\Gamma$ such that $a_\gamma\coloneqq a|_{G_\gamma}\ne 0$ implies $\gamma\in F$. Since $F$ is finite, there exists $\mu_0$ such that
\[
\mu \ge \mu_0 \implies \lVert a_\gamma^*a_\gamma e_\mu-a_\gamma^*a_\gamma\rVert<\frac{\epsilon^2}{2\lvert F \rvert} \ \text{ for all } \gamma\in F.
\]
Now, for $\mu \ge \mu_0$,
\begin{align*}
\lVert ai( e_\mu) -a\rVert_{\mathrm{C}^*(G_e)}^2
&=\Big\lVert\sum_{\gamma\in \Gamma} (ai( e_\mu)-a)_\gamma^* \, (ai( e_\mu)-a)_\gamma \Big\rVert\\
&=\Big\lVert\sum_{\gamma\in F} e_\mu^* a_\gamma^*a_\gamma e_\mu- e_\mu^* a_\gamma^*a_\gamma - a_\gamma^*a_\gamma e_\mu +a_\gamma^*a_\gamma \Big\rVert\\
&\le\sum_{\gamma\in F} \Big(\lVert e_\mu^*\rVert \lVert a_\gamma^*a_\gamma e_\mu -a_\gamma^*a_\gamma\rVert + \lVert a_\gamma^*a_\gamma-a_\gamma^*a_\gamma e_\mu \rVert\Big)\\
&<\sum_{\gamma\in F}\frac{\epsilon^2}{\lvert F \rvert}=\epsilon^2.
\end{align*}
Thus $L\colon C_c(G)\to\mathcal{L}(C_c(G))$ is a pre-representation of $C_c(G)$ on $X$, as needed, and so it extends to a homomorphism $L\colon \mathrm{C}^*(G)\to\mathcal{L}(X)$.
\end{proof}
We can now prove the first part of \cref{thm-inclusions}. We set
\[
B_e\coloneqq\overline{\{a\in C_c(G) : \operatorname{supp} (a)\subset G_e\}}\subset \mathrm{C}^*(G).
\]
\begin{prop} \label{prop-part1}
Let $L\colon \mathrm{C}^*(G)\to\mathcal{L}(X)$ be the homomorphism of \cref{prop-L}. Then $L|_{B_e} \colon B_e\to \mathcal{L}(X)$ is injective and inclusion $i\colon C_c(G_e)\to C_c(G)$ extends to an isometric isomorphism $i_\ff\colon \mathrm{C}^*(G_e)\to B_e$.
\end{prop}
\begin{proof}
Since $i$ is a homomorphism which is isometric with respect to the $I$-norms, it extends to a norm-decreasing homomorphism $i_\ff\colon \mathrm{C}^*(G_e)\to \mathrm{C}^*(G)$. Fix $f\in C_c(G_e)$. Then we have $\lVert i(f)\rVert\le \lVert f\rVert$ for $f\in C_c(G_e)$. Thus we need to show that $\lVert i(f)\rVert\ge \lVert f\rVert$ for $f \in C_c(G_e)$. Notice that for $g\in C_c(G_e)$, we have
\[
\lVert i(g)\rVert_{\mathrm{C}^*(G_e)}^2 = \Big\lVert \sum_{\gamma \in \Gamma} i(g)_\gamma^* \, i(g)_\gamma \Big\rVert = \big\lVert i(g)_e^* \, i(g)_e \big\rVert = \lVert g^*g \rVert = \lVert g \rVert^2.
\]
Now fix $f\in C_c(G_e) \setminus \{0\}$. Then $i(f)^*/\lVert f \rVert$ has norm $1$ in $X$, and
\begin{align*}
\lVert L_{i(f)}\rVert
&=\sup\{\lVert i(f)b\rVert_{\mathrm{C}^*(G_e)} : b\in X, \, \lVert b\rVert_{\mathrm{C}^*(G_e)}\le 1\}\\
&\ge \lVert i(f)i(f)^*\rVert_{\mathrm{C}^*(G_e)}/\lVert f \rVert = \lVert i(ff^*)\rVert_{\mathrm{C}^*(G_e)}/\lVert f \rVert =\lVert ff^*\rVert / \lVert f \rVert = \lVert f \rVert.
\end{align*}
By \cref{prop-L}, $L$ is norm-decreasing, and so $\lVert f \rVert\le \lVert L_{i(f)} \rVert \le \lVert i(f) \rVert \le \lVert f \rVert$, giving equalities throughout. Thus $i$ extends to an isometric isomorphism as claimed, and $L$ is isometric on $B_e$.
\end{proof}
Fix $u \in G^{(0)}$. Set $Gu\coloneqq\{x\in G : s(x)=u\}$ and let $\lambda_u$ be the push forward of $\lambda^u$ under inversion, so that
\[
\int_G a(x)\, \mathrm{{d}}\lambda_u(x)=\int_G a(x^{-1})\, \mathrm{{d}}\lambda^u(x)
\]
for $a\in C_c(G)$. Then the regular representation $\pi_u\colon \mathrm{C}^*(G) \to B\big(L^2(Gu), \lambda_u\big)$ is given for $a\in C_c(G)$ and $h\in C_c(Gu)$ by $\pi_u(a)h = a * h$; that is, by the convolution formula \cite[page~18]{Dana's book}. Let $\pi_u^e$ denote the regular representation of $\mathrm{C}^*(G_e)$ on $L^2((G_e)u, \lambda_u)$.
Let $\gamma\in \Gamma$. Since $G_\gamma$ is open and closed, we can view $L^2((G_\gamma)u, \lambda_u)$ as a closed subspace of $L^2(Gu, \lambda_u)$.
We can now prove the second part of \cref{thm-inclusions}. We set
\[
A_e\coloneqq\overline{\{a\in C_c(G) : \operatorname{supp} (a)\subset G_e\}}\subset \mathrm{C}^*_\rr(G).
\]
\begin{prop}\label{prop-part2}
We have $\ker q^{G_e} = \ker (q^G\circ i_\ff)$, and inclusion $i\colon C_c(G_e) \to C_c(G)$ extends to an isomorphism $i_\rr\colon \mathrm{C}^*_\rr(G_e) \to A_e$.
\end{prop}
\begin{proof}
The idea of this proof comes from \cite[Lemma~8.1]{BEM}. Fix $u\in G^{(0)}$. Then $Gu=\bigsqcup_{\gamma\in\Gamma} (G_\gamma)u$, and it follows that the map $U\colon L^2(Gu,\lambda_u) \to \bigoplus_{\gamma\in \Gamma} L^2((G_\gamma)u,\lambda_u)$ defined by $U(h)=(h|_{(G_\gamma)u})_{\gamma\in \Gamma}$ is an isomorphism. A calculation shows that for $a\in C_c(G_e)$ we have $U\pi_u(i_\ff(a))U^*=\bigoplus_{\gamma\in\Gamma}\pi_u^\gamma(a)$, where $\pi_u^\gamma\colon C_c(G_e)\to B\big(L^2\big((G_\gamma)u,\lambda_u\big)\big)$ is given by
\[
(\pi_u^\gamma(a)h)(x)=\int_G i(a)(y) \, h(y^{-1}x)\, d\lambda^{r(x)}(y)
\]
for $a\in C_c(G_e)$ and $h\in L^2\big((G_\gamma)u,\lambda_u\big)$.
Define $z_{u,e} \coloneqq u$, and for each $\gamma\in \Gamma {\setminus} \{e\}$ with $(G_\gamma)u \ne \varnothing$, choose $z_{u,\gamma} \in (G_\gamma)u$. Then for each $\gamma \in \Gamma$, $x\mapsto x z_{u,\gamma}$ is a homeomorphism of $(G_e)r(z_{u,\gamma})$ onto $(G_\gamma)u$ which induces an isomorphism $V_\gamma\colon L^2\big((G_\gamma)u,\lambda_u\big)\to L^2\big((G_e)r(z_{u,\gamma}),\lambda_{r(z_{u,\gamma})}\big)$. Another calculation shows that $V_\gamma \, \pi_u^\gamma(a) \, V_\gamma^*=\pi_{r(z_{u,\gamma})}^e(a)$, and therefore,
\begin{align*}
\lVert i_\ff(a) \rVert_r &= \sup\!\big\{ \lVert \pi_v(i_\ff(a)) \rVert : v \in G^{(0)} \big\} \\
&= \sup\!\big\{ \sup\{ \lVert \pi_v^\gamma(a) \rVert : \gamma \in \Gamma \} : v \in G^{(0)} \big\} \\
&= \sup\!\big\{ \sup\!\big\{ \big\lVert \pi_{r(z_{v,\gamma})}^e(a) \big\rVert : \gamma \in \Gamma \big\} : v \in G^{(0)} \big\} \\
&= \sup\!\big\{ \lVert \pi_v^e(a) \rVert : v \in G^{(0)} \big\} \\
&= \lVert a \rVert_r.
\end{align*}
It follows that $i$ extends to an injective homomorphism of $\mathrm{C}^*_\rr(G_e)$ onto $A_e$, and that $\ker(q^G\circ i_\ff)=\ker q^{G_e}$.
\end{proof}
This completes the proof of \cref{thm-inclusions}.
\section{Application to topologically graded \texorpdfstring{$\mathrm{C}^*$}{C*}-algebras}
We now show that in the situations of \cref{thm-inclusions}, the groupoid $\mathrm{C}^*$\nobreakdash-algebras $\mathrm{C}^*(G)$ and $\mathrm{C}^*_\rr(G)$ are topologically graded. We start by recalling the definitions of \emph{grading} and \emph{topological grading}.
Let $A$ be a $\mathrm{C}^*$\nobreakdash-algebra. Following \cite[Definition~16.2]{Exel's book}, we say that \emph{$A$ is graded over $\Gamma$} if there exists a collection $\{A_\gamma : \gamma\in \Gamma\}$ of closed subspaces of $A$ such that
\begin{enumerate}
\item \label{grading3} for all $\beta,\gamma\in \Gamma$ we have $A_\beta A_\gamma\subset A_{\beta\gamma}$ and $A_\gamma^*=A_{\gamma^{-1}}$;
\item \label{grading2} $\operatorname{span}\{A_\gamma : \gamma\in \Gamma\}$ is dense in $A$; and
\item \label{grading1} the subspaces $\{A_\gamma : \gamma\in \Gamma\}$ are linearly independent.
\end{enumerate}
Each $A_\gamma$ is called a \emph{grading subspace}.
In \cite[Definition~19.2]{Exel's book}, $A$ is said to be \emph{topologically graded over $\Gamma$} if there exists a collection $\{A_\gamma : \gamma\in \gamma\}$ of closed subspaces of $A$ satisfying \labelcref{grading3} and \labelcref{grading2}, and there exists a bounded linear map $P\colon A\to A$ such that $P=\operatorname{id}$ on $A_e$ and $P=0$ on $A_\gamma$ when $\gamma\ne e$. If $A$ is topologically graded, then \labelcref{grading1} holds and $P$ is a conditional expectation onto $A_e$ by \cite[Theorem~19.1]{Exel's book}.
We obtain the following corollary of \cref{thm-inclusions}.
\begin{cor} \label{cor-app}
Let $G$ be a second-countable locally compact Hausdorff groupoid with a Haar system. Let $\Gamma$ be a discrete group and let $c\colon G\to\Gamma$ be a continuous homomorphism. For $\gamma\in\Gamma$, set $G_\gamma\coloneqq c^{-1}(\{\gamma\})$,
\[
A_\gamma\coloneqq\overline{\{f\in C_c(G) : \operatorname{supp} f\subset G_\gamma\}}\subset \mathrm{C}^*_\rr(G),
\]
and
\[
B_\gamma\coloneqq \overline{\{f\in C_c(G) :\operatorname{supp} f\subset G_\gamma\}}\subset \mathrm{C}^*(G).
\]
The $\mathrm{C}^*$\nobreakdash-algebras $\mathrm{C}^*_\rr(G)$ and $\mathrm{C}^*(G)$ are topologically graded with grading subspaces $\mathcal{A}\coloneqq\{A_\gamma : \gamma\in\Gamma\}$ and $\mathcal{B}\coloneqq\{B_\gamma : \gamma\in\Gamma\}$, respectively. In both cases, the conditional expectation is induced by restriction of functions.
\end{cor}
We start by showing that restriction of functions gives linear contractions from $C_c(G)$ to $C_c(G_e)$ which are suitably bounded.
\begin{prop} \label{prop-QP}
There are linear contractions
\[Q_\ff\colon \mathrm{C}^*(G) \to \mathrm{C}^*(G_e) \ \text{ and } \ Q_\rr\colon \mathrm{C}^*_\rr(G) \to \mathrm{C}^*_\rr(G_e)\] such that $Q_\ff(a)=a|_{G_e}=Q_\rr(a)$ for $a\in C_c(G)$, and $q^{G_e}\circ Q_\ff=Q_\rr\circ q^G$.
\end{prop}
\begin{proof}
Fix $a\in C_c(G)$. Since $G_e$ is closed, $a|_{G_e}$ is continuous and has compact support. Let $L\colon \mathrm{C}^*(G)\to\mathcal{L}(X)$ be the homomorphism of \cref{prop-L}. We will show that
\begin{equation*}
\lVert a|_{G_e} \rVert \le \lVert a \rVert_{\mathrm{C}^*(G_e)}\le \lVert L_a \rVert;
\end{equation*}
then $\lVert a|_{G_e} \rVert \le \lVert a \rVert$, and it follows that restriction extends to a bounded linear map $Q_\ff\colon \mathrm{C}^*(G) \to \mathrm{C}^*(G_e)$ of norm at most $1$.
Since $\sum_{\gamma\in\Gamma} a_\gamma^*a_\gamma\ge a_e^*a_e\ge 0$, we have
\[
\lVert a \rVert_{\mathrm{C}^*(G_e)}^2=\Big\lVert \sum_{\gamma\in\Gamma} a_\gamma^*a_\gamma \Big\rVert\ge \lVert a_e^*a_e\rVert=\lVert a|_{G_e}\rVert^2,
\]
giving the first inequality. Let $\{e_\mu\}$ be an approximate identity in $C_c(G_e)$ for $\mathrm{C}^*(G_e)$ such that $\lVert e_\mu \rVert \le 1$ for all $\mu$ \cite[Proposition~1.49]{Dana's book}. Then $\lVert i(e_\mu) \rVert_{\mathrm{C}^*(G_e)} \le 1$, and hence
\begin{align*}
\lVert L_a\rVert^2
&\ge \big\lVert L_a(i(e_\mu)) \big\rVert_{\mathrm{C}^*(G_e)}^2\\
&= \lVert a i(e_\mu)\rVert_{\mathrm{C}^*(G_e)}^2\\
&=\lVert e_\mu^*\langle a\,,\, a\rangle_{\mathrm{C}^*(G_e)}e_\mu\rVert\\
&= \Big\lVert e_\mu^*\Big( \sum_{\gamma\in\Gamma} a_\gamma^*a_\gamma\Big) e_\mu \Big\rVert \\
&\to \Big\lVert \sum_{\gamma\in\Gamma} a_\gamma^*a_\gamma \Big\rVert
=\lVert a\rVert^2_{\mathrm{C}^*(G_e)}.
\end{align*}
Thus $\lVert a\rVert_{\mathrm{C}^*(G_e)}\le \lVert L_a\rVert$, giving the second inequality. Thus restriction extends to a linear contraction $Q_\ff\colon \mathrm{C}^*(G) \to \mathrm{C}^*(G_e)$, as claimed.
Next, we will show that $\lVert a|_{\mathrm{C}^*(G_e)}\rVert_\rr\le \lVert a\rVert_\rr$. Fix $u \in G^{(0)}$. Let $W$ be the orthogonal projection of $L^2(Gu, \lambda_u)$ onto $L^2((G_e)u, \lambda_u)$. A calculation shows that $\pi_u^e(a|_{G_e})=W\pi_u(a)W$.
Thus
\[
\big\lVert \pi_u^e\big(a|_{G_e}\big) \big\rVert= \big\lVert W \pi_u(a) W\big\rVert \le \lVert \pi_u(a) \rVert,
\]
since $W$ is a projection. Since $u$ was fixed, this gives $\big\lVert a|_{G_e} \big\rVert_r \le \lVert a \rVert_r$. Thus restriction extends to a linear contraction $Q_\rr\colon \mathrm{C}^*_\rr(G) \to \mathrm{C}^*_\rr(G_e)$.
Since $q^{G_e}\circ Q_\ff$ and $Q_\rr\circ q^G$ agree on $C_c(G)$, it follows by continuity that $q^{G_e}\circ Q_\ff=Q_\rr\circ q^G$.
\end{proof}
\begin{proof}[Proof of \cref{cor-app}]
Let $\alpha,\beta\in\Gamma$ and let $a, b\in C_c(G)$ with $\operatorname{supp}(a) \subset G_\alpha$ and $\operatorname{supp}(b) \subset G_\beta$. For $x\in G$, if $(a*b)(x)\ne 0$, then there exists $y\in\operatorname{supp}(a)$ such that $y^{-1}x\in \operatorname{supp}(b)$; that is, $x\in \operatorname{supp}(a)\operatorname{supp}(b)\subset G_\alpha G_\beta\subset G_{\alpha\beta}$. It follows that $A_\alpha A_\beta\subset A_{\alpha\beta}$ and $B_\alpha B_\beta\subset B_{\alpha\beta}$. Further, $a^*$ has support in $G_{\alpha^{-1}}$, and it follows that $A_\alpha^*=A_{\alpha^{-1}}$ and $B_\alpha^*=B_{\alpha^{-1}}$.
We write $a=\sum_{\gamma\in \Gamma} a_\gamma$ where $a_\gamma\coloneqq a|_{G_\gamma}$. There is a finite subset $F$ of $\Gamma$ such that $a_\gamma\ne 0$ implies $\gamma\in F$. Then $a=\sum_{\gamma\in \Gamma} a_\gamma=\sum_{\gamma\in F} i_\gamma(a_\gamma)$, where each $i_\gamma$ is the inclusion map from $C_c(G_\gamma)$ to $C_c(G)$, and so each $i_\gamma(a_\gamma)$ is an element of $C_c(G)$ with support in $G_\gamma$. Thus $C_c(G)$ is a subset of both $\operatorname{span} \{A_\gamma : \gamma\in \Gamma\}$ and $\operatorname{span} \{B_\gamma : \gamma\in \Gamma\}$, which are thus dense in $\mathrm{C}^*_\rr(G)$ and $\mathrm{C}^*(G)$.
\Cref{prop-QP} gives linear contractions $Q_\rr\colon \mathrm{C}^*_\rr(G) \to \mathrm{C}^*_\rr(G_e)$ and $Q_\ff\colon \mathrm{C}^*(G) \to \mathrm{C}^*(G_e)$ such that $Q_\rr(a)=a|_{G_e}=Q_\ff(a)$ for $a\in C_c(G)$. Composing with the isometric homomorphisms $i_\rr\colon \mathrm{C}^*_\rr(G_e)\to \mathrm{C}^*_\rr(G)$ and $i_\ff\colon \mathrm{C}^*(G_e)\to \mathrm{C}^*(G)$ of \cref{thm-inclusions} gives contractions $P_\rr\coloneqq i_\rr\circ Q_\rr\colon\mathrm{C}^*_\rr(G)\to \mathrm{C}^*_\rr(G)$ and $P_\ff\coloneqq i_\ff\circ Q_\ff\colon\mathrm{C}^*(G)\to \mathrm{C}^*(G)$. In particular, $P_\rr=\operatorname{id}$ on $A_e$ and $P_\rr=0$ on $A_\gamma$ when $\gamma\ne e$; similarly, $P_\ff=\operatorname{id}$ on $B_e$ and $P_\ff=0$ on $B_\gamma$ when $\gamma\ne e$. It follows that $P_\rr$ and $P_\ff$ are conditional expectations, and that $\mathrm{C}^*_\rr(G)$ and $\mathrm{C}^*(G)$ are topologically graded.
\end{proof}
\begin{rmk}
Let $G$ be an \'etale groupoid and let $\Gamma$ be an amenable group with a unital subsemigroup $S$. Suppose that $c\colon G \to \Gamma$ is an unperforated cocycle. Then \cite[Theorem~4.6]{CF2021} finds conditions on $G$ and $c$ that are equivalent to realising $\mathrm{C}^*_\rr(G)$ naturally as a covariance algebra of a product system over $S$ in the sense of \cite{Sehnem2019}. In that case $\mathrm{C}^*_\rr(G)$ is topologically graded.\end{rmk}
Recall that a conditional expectation $P$ is \emph{faithful} if $P(a^*a)=0$ implies $a=0$. If $G$ is \'etale, then restriction of functions to $G^{(0)}$ induces a faithful conditional expectation $E_\rr\colon \mathrm{C}^*_\rr(G) \to \mathrm{C}^*_\rr(G)$ (see, for example, the footnote on page~116 of \cite{RRS}), and it follows that $P_\rr$ is also faithful because
\[
0=P_\rr(a^*a) \implies 0=(E_\rr \circ P_\rr)(a^*a)=E_\rr(a^*a) \implies a=0.
\]
Note that if $\mathrm{C}^*(G) \ne \mathrm{C}^*_\rr(G)$, then the conditional expectation $E\colon \mathrm{C}^*(G) \to \mathrm{C}^*(G)$ induced by restriction of functions to $G^{(0)}$ is not faithful, and neither is the conditional expectation $P_\ff\colon \mathrm{C}^*(G) \to \mathrm{C}^*(G)$. In the non-\'etale setting, we do not know whether or not $P_\rr$ is faithful. We investigate further.
\begin{prop} \label{prop-tilde L}
Let $X$ and $Y$ be the right-Hilbert bimodules of \cref{cor-right-Hilbert}, let $q\colon X\to Y$ be the quotient map, and let $L\colon \mathrm{C}^*(G)\to\mathcal{L}(X)$ be the homomorphism of \cref{prop-L}.
\begin{enumerate}
\item There are homomorphisms $\pi\colon \mathcal{L}(X)\to \mathcal{L}(Y)$ and $\widetilde L\colon\mathrm{C}^*_\rr(G)\to \mathcal{L}(Y)$ such that $\pi(T)(q(x))= q(T(x))$ for $T \in \mathcal{L}(X)$ and $x\in X$, and $\pi\circ L=\widetilde{L}\circ q^G$. In particular, $\widetilde{L}_a(b) = a * b$ for all $a, b \in C_c(G)$.
\item The homomorphism $\widetilde L$ is isometric on $A_e$.
\end{enumerate}
\end{prop}
\begin{proof}
By \cref{lem-op-descends}, $\pi(T)$ is well-defined by the formula $\pi(T)(q(x))= q(T(x))$. It follows from the Rieffel correspondence (in particular, see \cite[bottom line of page~55]{tfb}) that $\pi$ is $*$-preserving, and it is straightforward to check that $\pi$ is a homomorphism. We claim that $\ker q^G\subset \ker (\pi\circ L)$. It then follows that there is a homomorphism $\widetilde L\colon\mathrm{C}^*_\rr(G)\to \mathcal{L}(Y)$ such that $\pi\circ L=\widetilde{L}\circ q^G$.
For the claim, let $a\in \ker q^G$. Let $Q_\ff\colon \mathrm{C}^*(G)\to\mathrm{C}^*(G_e)$ and $Q_\rr\colon \mathrm{C}^*_\rr(G)\to\mathrm{C}^*_\rr(G_e)$ be the contractions of \cref{prop-QP}. Let $b\in C_c(G)$ and notice that we have $Q_\ff(b^*b)=\langle b\,,\, b\rangle_{\mathrm{C}^*(G_e)}$. Let $\{a_n\}\subset C_c(G)$ such that $a_n\to a$ in $\mathrm{C}^*(G)$. Then
\[
\langle L_a(b)\,,\, L_a(b)\rangle_{\mathrm{C}^*(G_e)} = \lim_{n\to\infty} \langle L_{a_n}(b)\,,\, L_{a_n}(b)\rangle_{\mathrm{C}^*(G_e)} =\lim_{n\to\infty}Q_\ff((a_nb)^*(a_nb))=Q_\ff(b^*a^*ab)
\]
because all the operations involved are continuous. Since $b^*a^*ab\in\ker q^G$ we have
\[
(q^{G_e}\circ Q_\ff)(b^*a^*ab) = (Q_\rr\circ q^G)(b^*a^*ab)=0,
\]
by \cref{prop-QP}. Thus $\langle L_a(b)\,,\, L_a(b)\rangle_{\mathrm{C}^*(G_e)} = Q_\ff(b^*a^*ab)\in\ker q^{G_e}$. Now
\begin{align*}
\lVert\pi(L_a)(q(b))\rVert^2_{\mathrm{C}^*_\rr(G_e)}&=\lVert q(L_a(b))\rVert^2_{\mathrm{C}^*_\rr(G_e)}\\
&=\big\lVert\langle q(L_a(b))\,,\, q(L_a(b))\rangle_{\mathrm{C}^*_\rr(G_e)}\rVert_\rr\\
\intertext{which, using the Rieffel correspondence again, is}
&=\lVert q^{G_e}\big(\langle L_a(b)\,,\, L_a(b)\rangle_{\mathrm{C}^*(G_e)}\big)\rVert_\rr,\\
&=0.
\end{align*}
Thus $\pi(L_a)(b)=0$ for all $b\in C_c(G)$. Since $C_c(G)$ is dense in $X$ we have $\pi(L_a)=0$, and $a\in \ker (\pi\circ L)$. This gives $\widetilde L\colon\mathrm{C}^*_\rr(G)\to \mathcal{L}(Y)$ such that $\pi\circ L=\widetilde{L}\circ q^G$. In particular, $\widetilde{L}_a(b) = a*b$ for all $a, b \in C_c(G)$.
To see that $\widetilde{L}$ is isometric on $A_e$ it suffices (by \cref{prop-tilde L}) to show that $\ker (\pi\circ L)\cap B_e\subset \ker q^G$. Fix $a\in \ker(\pi\circ L)\cap B_e$. Let $b\in C_c(G)$. Then $0=\pi(L_a)(q(b))=q(L_a(b))$; that is, $L_a(b)\in X_{\ker q^{G_e}}$. Recall from \cref{prop-QP} that restriction extends to a contraction $Q_\rr\colon \mathrm{C}^*_\rr(G) \to \mathrm{C}^*_\rr(G_e)$. Since $G$ has paracompact unit space, there exists an approximate identity $\{ e_\mu\}$ for $C_c(G_e)$ in the inductive limit topology by \cite[Proposition~1.49]{Dana's book}. We have
\[
e_\mu^*i_\ff^{-1}(a) e_\mu=Q_\ff\big( i(e_\mu^*)a i(e_\mu)\big)=\big\langle i(e_\mu)\,,\, L_a( i(e_\mu))\big\rangle_{\mathrm{C}^*(G_e)}\in\ker q^{G_e},
\]
since $L_a( i(e_\mu))\in X_{\ker q^{G_e}}$. By taking limits we get that $i_\ff^{-1}(a)\in \ker q^{G_e}$, and then $a\in i_\ff(\ker q^{G_e})\subset \ker q^G$. Now $\widetilde{L}|_{A_e}$ is isometric.
\end{proof}
\begin{lem} \label{lemma-kernel}
Let $L\colon \mathrm{C}^*(G)\to \mathcal{L}(X)$ and $\widetilde{L}\colon \mathrm{C}^*_\rr(G)\to \mathcal{L}(Y)$ be the homomorphisms of \cref{prop-L,prop-tilde L}. We have
\[
\ker\widetilde{L} = \{a\in \mathrm{C}^*_\rr(G) : P_\rr(a^*a)=0\} \quad\text{and}\quad \ker L = \{a\in \mathrm{C}^*(G) : P_\ff(a^*a)=0\}.
\]
\end{lem}
\begin{proof}
We prove $\ker\widetilde{L}=\{a\in \mathrm{C}^*_\rr(G) : P_\rr(a^*a)=0\}$; for $\ker L$, just replace $P_\rr$ by $P_\ff$ and $\widetilde{L}$ by $L$ in the argument below.
By \cref{prop-part2}, inclusion extends to a homomorphism $i_\rr\colon \mathrm{C}^*_\rr(G_e) \to \mathrm{C}^*_\rr(G)$. Fix $\alpha \in \Gamma$. We start by showing that for all $b \in C_c(G)$ with support in $G_\alpha$ and $a \in \mathrm{C}^*_\rr(G)$, we have
\begin{equation} \label{eq-Ruy}
i_\rr\big(\langle b\,,\widetilde{L}_a(b)\rangle_{\mathrm{C}^*_\rr(G_e)}\big)=b^*P_\rr(a)b.
\end{equation}
(We got the idea for this from \cite[Proposition~17.12]{Exel's book}.) First let $a,b\in C_c(G)$ with $\operatorname{supp}(b)\subset G_\alpha$. Then
\[
\langle b\,,\widetilde{L}_a(b)\rangle_{\mathrm{C}^*_\rr(G_e)}=\langle b\,,\\ab\rangle_{\mathrm{C}^*_\rr(G_e)}=\sum_{\gamma\in\Gamma}b_\gamma^*(ab)_\gamma=b_\alpha^*(ab)_\alpha=b_\alpha^*a_eb_\alpha
\]
and $i_\rr(b_\alpha^*a_eb_\alpha)=b^*P_\rr(a)b$.
Now consider $a\in \mathrm{C}^*_\rr(G)$ and choose $\{a_n\}\subset C_c(G)$ such that $a_n\to a$. Then
\[i_\rr\big(\langle b\,,\widetilde{L}_a(b)\rangle_{\mathrm{C}^*_\rr(G_e)}\big)=\lim_{n\to\infty}i_\rr\big(\langle b\,,\widetilde{L}_{a_n}(b)\rangle_{\mathrm{C}^*_\rr(G_e)}\big)=\lim_{n\to\infty}b^*P_\rr(a_n)b=b^*P_\rr(a)b,
\]
giving \labelcref{eq-Ruy}. To see that $\{a\in \mathrm{C}^*_\rr(G) : P_\rr(a^*a)=0\}=\ker\widetilde{L}$, we observe that
\begin{align*}
b^*P_\rr(a^*a)b=i_\rr\big(\langle b\,,\widetilde{L}_{a^*a}(b)\rangle_{\mathrm{C}^*_\rr(G_e)}\big)=i_\rr\big(\langle \widetilde{L}_{a}(b)\,,\widetilde{L}_{a}(b)\rangle_{\mathrm{C}^*_\rr(G_e)}\big).
\end{align*}
Thus
\begin{align*}
\widetilde{L}_{a}=0 &\iff \widetilde{L}_{a}(b)=0 \text{ for all $b\in C_c(G)$}\\
&\iff \widetilde{L}_{a}(b)=0 \text{ for all $b\in C_c(G)$ with $\operatorname{supp}(b)\subset G_\alpha$ for some $\alpha\in\Gamma$}\\
&\iff 0=b^*P_\rr(a^*a)b \text{ for all $b\in C_c(G)$ with $\operatorname{supp}(b)\subset G_\alpha$ for some $\alpha\in\Gamma$}\\
&\iff 0= P_\rr(a^*a),
\end{align*}
by using an approximate identity contained in $C_c(G)$ at the last step.
\end{proof}
Notice that the collections $\mathcal{A}$ and $\mathcal{B}$ of \cref{cor-app} are Fell bundles, in the sense of \cite[Definitions~16.25 and 17.6]{Exel's book}. If $P_\rr$ is faithful, then by \cite[Proposition~19.8]{Exel's book} the reduced $\mathrm{C}^*$\nobreakdash-algebra $\mathrm{C}^*_\rr(G)$ is isomorphic to the reduced $\mathrm{C}^*$\nobreakdash-algebra $\mathrm{C}^*_\rr(\mathcal{A})$ of the Fell bundle $\mathcal{A}$. However, in general, all we can say is the following:
\begin{prop} \label{prop-bundles A and B}
Let $L$ and $\widetilde L$ be the homomorphisms of \cref{prop-L,prop-tilde L}, and let $\mathcal{A}$ and $\mathcal{B}$ be the Fell bundles of \cref{cor-app}. Then $\mathrm{C}^*_\rr(\mathcal{A})$ is isomorphic to the range of $\widetilde L$, $\mathrm{C}^*_\rr(\mathcal{B})$ is isomorphic to the range of $L$, and $\mathrm{C}^*(\mathcal{B})$ is isomorphic to $\mathrm{C}^*(G)$.
\end{prop}
\begin{proof}
The First Isomorphism Theorem gives an isomorphism of $\mathrm{C}^*(G)/\ker L$ onto the range of $L$. Fix $\gamma \in \Gamma$ and $b \in B_\gamma$. Then $b^*b \in B_e$, and since $L|_{B_e}$ is isometric, we have
\[
\lVert L_b \rVert^2 = \lVert L_b^* L_b \rVert = \lVert L_{b^*b} \rVert = \lVert b^* b \rVert = \lVert b \rVert^2.
\]
Hence $L|_{B_\gamma}$ is isometric for all $\gamma \in \Gamma$. It follows that $B_\gamma/\ker L|_{B_\gamma}=B_\gamma$. Thus $\mathrm{C}^*(G)/\ker L$ has grading $\mathcal{B}=\{B_\gamma : \gamma \in \Gamma\}$. By \cref{lemma-kernel} we have $\ker L=\{b\in \mathrm{C}^*(G) : P_\ff(b^*b)=0\}$. Since any element of a $\mathrm{C}^*$\nobreakdash-algebra can be written as a sum of positive elements, it follows that there is a conditional expectation $\widetilde P_\ff$ on $\mathrm{C}^*(G)/\ker L$ defined by $\widetilde P_\ff(b+\ker L) \coloneqq P_\ff(b)$. Since $\widetilde P_\ff$ is faithful, $\mathrm{C}^*(G)/\ker L$ (and hence the range of $L$) is isomorphic to $\mathrm{C}^*_\rr(\mathcal{B})$ by \cite[Proposition~19.8]{Exel's book}. Similarly, $\mathrm{C}^*_\rr(\mathcal{A})\cong \operatorname{range} \widetilde{L}$.
Next we verify that $\mathrm{C}^*(G)$ has the universal property of $\mathrm{C}^*(\mathcal{B})$. For each $\gamma\in\Gamma$, let $\operatorname{id}_\gamma\colon B_\gamma\to \mathrm{C}^*(G)$ be the identity map. Then $\{\operatorname{id}_\gamma : \gamma\in\Gamma\}$ is a representation of $\mathcal{B}$ in $\mathrm{C}^*(G)$ which generates $\mathrm{C}^*(G)$ in the sense that $\operatorname{span}\{\operatorname{id}_\gamma(b) : \gamma\in \Gamma, b\in B_\gamma\}$ is dense in $\mathrm{C}^*(G)$.
Let $\{\pi_\gamma : \gamma \in \Gamma\}$ be a representation of $\mathcal{B}$ in a $\mathrm{C}^*$\nobreakdash-algebra $D$. We need to show that there is a homomorphism $\pi\colon \mathrm{C}^*(G)\to D$ such that $\pi\circ\operatorname{id}_\gamma=\pi_\gamma$ for all $\gamma\in\Gamma$. For $a\in C_c(G)$, define $\pi\colon C_c(G)\to D$ by $\pi(a)=\sum_{\gamma\in\Gamma}\pi_\gamma(a_\gamma)$. It is straightforward to check that $\pi$ is a $*$-homomorphism. We will argue that $\pi$ is continuous in the inductive limit topology, and hence extends to give a homomorphism $\pi\colon \mathrm{C}^*(G)\to D$. Then since $\pi\circ\operatorname{id}_\gamma$ and $\pi_\gamma$ agree on $C_c(G)$, they agree on $\mathrm{C}^*(G)$.
By \cref{thm-inclusions}, $i_\ff\colon \mathrm{C}^*(G_e)\to B_e$ is an isometric isomorphism, and we can identify $B_e$ with $\mathrm{C}^*(G_e)$. Then $\pi_e\colon \mathrm{C}^*(G_e)\to D$ is a homomorphism on a groupoid $\mathrm{C}^*$\nobreakdash-algebra, and hence is $I$-norm bounded on $C_c(G_e)$. We claim that each $\pi_\gamma$ is $I$-norm bounded as well. For $a\in B_\gamma\cap C_c(G)$ we have
\[
\lVert\pi_\gamma(a)\rVert^2=\lVert\pi_\gamma(a)^*\pi_\gamma(a)\rVert=\lVert\pi_e(a^*a)\rVert\le \lVert a^*a\rVert_I\le \lVert a^*\rVert_I\lVert a\rVert_I=\lVert a\rVert_I^2
\]
because the $I$-norm is submultiplicative by \cite[page~16]{Dana's book}.
Now suppose that $a, a_n\in C_c(G)$ with support in a compact subset $K$ of $G$ and that $a_n\to a$ as $n\to\infty$. Fix $\epsilon>0$. Write
\[
a=\sum_{\gamma\in\Gamma}a_\gamma \ \text{ and } \ a_n=\sum_{\gamma\in \Gamma} (a_n)_\gamma.
\]
Let $F$ be a finite subset of $\Gamma$ such that if $a_\gamma\ne 0$ or $(a_n)_\gamma\ne 0$, then $\gamma\in F$. For every $\gamma\in F$ we have $(a_n)_\gamma\to a_\gamma$ uniformly on $K$ and hence $\lVert(a_n)_\gamma-a_\gamma\rVert_I\to 0$. Since $F$ is finite, there exists $N$ such that $n>N$ implies that $\lVert(a_n)_\gamma-a_\gamma\rVert_I <\epsilon/\lvert F \rvert$ for all $\gamma\in F$. Then for $n>N$ we have
\begin{align*}
\lVert\pi(a_n)-\pi(a)\rVert&=\Big\lVert\pi\Big(\sum_{\gamma\in \Gamma}\big((a_n)_\gamma-a_\gamma\big)\Big)\Big\rVert
\le \sum_{\gamma\in F}\big\lVert \pi_\gamma\big( (a_n)_\gamma-a_\gamma \big) \big\rVert\\
&\le \sum_{\gamma\in F}\big\lVert\big( (a_n)_\gamma-a_\gamma \big)\big\rVert_I
\le \sum_{\gamma\in F} \epsilon/\lvert F \rvert=\epsilon.
\end{align*}
Thus $\pi$ is continuous in the inductive limit topology and hence extends as claimed. Now $\mathrm{C}^*(G)$ has the universal property of $\mathrm{C}^*(\mathcal{B})$, and hence they are isomorphic.
\end{proof}
\begin{rmk}
That $\mathrm{C}^*_\rr(\mathcal{A})$ and $\mathrm{C}^*_\rr(\mathcal{B})$ are isomorphic to the ranges of $\widetilde L$ and $L$, respectively, is no surprise. For example, by definition, $\mathrm{C}^*_\rr(\mathcal{A})$ is the range of the regular representation $\Lambda\colon \mathrm{C}^*(\mathcal{A})\to \mathcal{L}(\ell^2(\mathcal{A}))$, where $\ell^2(\mathcal{A})$ is a Hilbert bimodule isomorphic to $Y$ and $\Lambda$ is implemented by left multiplication.
\end{rmk}
\begin{qu}
Suppose that $G$ is \'etale. The conditional expectation $P_\rr$ is faithful on $\mathrm{C}^*_\rr(G)$, and hence $\mathrm{C}^*_\rr(G)\cong\mathrm{C}^*_\rr(\mathcal{A})$ by \cite[Proposition~19.8]{Exel's book}. What happens if $G$ is not \'etale?
\end{qu}
To sum up, we give the following commutative diagram where $\rho$ is implemented by $\{q^G|_{B_\gamma} : \gamma \in \Gamma\}$ and $\pi$ is the homomorphism of \cref{prop-tilde L}. We do not in general know when either of the two bottom horizontal arrows are isomorphisms.
\[
\begin{diagram}
\dgARROWLENGTH=0.8\dgARROWLENGTH
\node{\mathrm{C}^*(\mathcal{B})\cong\mathrm{C}^*(G)}\arrow{e}\arrow{s,r}{\rho}
\node{\operatorname{range} L\cong\mathrm{C}^*_\rr(\mathcal{B})}
\arrow{se,r}{\pi}
\\
\node{\mathrm{C}^*(\mathcal{A})}\arrow{e}
\node{\mathrm{C}^*_\rr(G)}\arrow{e}
\node{\operatorname{range}\widetilde L\cong \mathrm{C}^*_\rr(\mathcal{A}).}
\end{diagram}
\]
\vspace{2ex}
|
\section{Introduction}\label{SecIntro}
With the growing number of Internet of Things (IoT) devices and services, huge amounts of data are being generated at the wireless edge.
We also observe a rapid increase in the Artificial Intelligence (AI)-driven applications deploying increasingly complex machine learning (ML) models to gather intelligence from data.
While this is traditionally carried out by a cloud server, offloading such massive amounts of data at the wireless network edge to a cloud server is prohibitive in terms of communications cost and may violate privacy concerns.
Instead, a new paradigm, referred to as \textit{federated learning} (FL), offers pushing the network intelligence to the edge by elevating edge computing capabilities in distributed networks.
FL allows distributed devices to train a global ML model collaboratively with the help of a parameter server (PS) without sharing the raw data \cite{DCKonecnyFederated}.
With FL, the PS keeps track of the global model and shares it with the devices for training using their local data.
After training the global model, the devices transmit their updates to the PS, which uses them to update the global model.
FL comes with its own challenges in practical settings including communications over unreliable links in both PS-to-device and device-to-PS directions.
Several studies have addressed this challenge through limiting the communication requirements, particularly in the device-to-PS direction \cite{DCKonecnyFederated,McMahan2017CommunicationEfficientLO,KonecnyFLBeyondData}.
However, these studies ignore the underlying communication channels and consider rate-limited bit-pipes as communication links.
Recently a new line of research, namely \textit{federated edge learning} (FEEL), has been created considering the physical layer characteristics of the underlying wireless network in the FL framework \cite{MohammadDenizDSGDCS,FLTWCMohammadDenizFading,KaibinParallelWork,YangFedLearOverAirComp}.
Several studies have employed over-the-air computation by using the superposition property of the multiple access channel (MAC) in the device-to-PS direction and have shown its advantages in guaranteeing reliable communications of the updates from the devices to the PS \cite{MohammadDenizDSGDCS,KaibinParallelWork,YangFedLearOverAirComp,FLTWCMohammadDenizFading,MohTolDenSanjVinceBlindFL,CohenAnalogGDDL,RaviCommEffFLGaussian}.
FEEL should be tolerant to the drop of any devices during the training.
This arises from the fact that the devices share the channel resources, and typically a huge number of devices can be potentially used for training, in which case each device may have access to only a limited amount of channel resources for transmission.
Also, wireless devices may stop participating in the training at any time for various reasons including lack of power, lack of network coverage, and privacy concerns.
Therefore, several studies consider FEEL with partial device participation sharing the limited resources for various selection techniques \cite{YangArafaVinceAgeBasedFL,YuxuanFLRedundantData,HowardVinceSchedulingsFL,FLTWCConvergenceMohammadDenizSanjVince}.
Recent studies have focused on noisy PS-to-device channel, as well as transmission of a compressed global model to the devices to reduce the communication footprint \cite{MohammadFLConvNoisyDownlink,JinHyunAhnFLNoisyDownlink,ExpandingRedClientResFL,DoubleSqueezeTangConf,mohammadDenizSanjVinceQuanUpdates}.
Papers \cite{JinHyunAhnFLNoisyDownlink,MohammadFLConvNoisyDownlink} investigated analog transmission of the global model to the devices with \cite{MohammadFLConvNoisyDownlink} providing convergence guarantees.
Compressing the global model at the PS may lead to a coarse estimate, which is due to the high average-to-peak ratio of the entries of global model vector and its high empirical variance \cite{mohammadDenizSanjVinceQuanUpdates}.
To overcome this challenge, \cite{ExpandingRedClientResFL} employs a random linear projection of the global model at the PS before the compression, \cite{DoubleSqueezeTangConf} performs error compensation before compressing the global model, and \cite{mohammadDenizSanjVinceQuanUpdates} introduces compression of the global model updates with respect to the last global model estimate available at the devices, which is shown to outperform the other two approaches.
In this paper, we build upon our approach in \cite{mohammadDenizSanjVinceQuanUpdates} and focus on digital transmission of the global model updates at the PS.
We extend the scheme in \cite{mohammadDenizSanjVinceQuanUpdates} to the partial device participation scenario by considering transmission of different messages to different devices in the PS-to-device direction, where the devices are selected for participation in each training iteration based on their downlink channels.
Specifically, the PS transmits compressed global model updates to the participating devices based on the last global model estimates available at the devices where the rates are set to be within the capacity region of the underlying wireless fading broadcast channel from the PS to the devices.
The number of participating devices directly impacts the performance of FEEL, since the devices share the limited channel resources, and fewer participating devices leads to better estimates of the information exchanged in the network between different nodes.
On the other hand, fewer participating devices reduces the data usage in each training iteration.
Numerical results show that partial device participation based on the downlink channels can significantly improve the performance of FEEL.
\textit{Notation}: We denote the set of real and complex numbers by $\mathbb{R}$ and $\mathbb{C}$, respectively.
We let $[i] \triangleq \{ 1, \dots, i \}$.
Vectors of length $i$ with all zero and one entries are denoted by $\boldsymbol{0}_i$ and $\boldsymbol{1}_i$, respectively.
We denote a circularly symmetric complex Gaussian distribution with real or imaginary component with variance $\sigma^2/2$ by $\mathcal{C N} \left( 0,\sigma^2 \right)$.
We represent the cardinality of a set or the magnitude of a complex value by $\left| \cdot \right|$, and the $l_2$ norm of a vector $\boldsymbol{x}$ by $\left\| \boldsymbol{x} \right\|_2$.
For a set $\cal S$ of real values, ${\rm{indmax}}_{K} \mathcal{S}$ returns a $K$-element set of indices of $\mathcal{S}$ with the largest values.
We also let
$(a)^+ \triangleq \max \{a, 0\}$, and for any event $A$, $\mathds{1}(A)=1$, if event $A$ is true, and $\mathds{1}(A)=0$, otherwise.
\section{System Model}\label{SecProbFormul}
We consider FEEL across $M$ devices, where device $m$ has access to dataset $\mathcal{B}_m$ of size $B_m = \left| \mathcal{B}_m \right|$.
The devices use their local datasets to train a global model $\boldsymbol{\theta} \in \mathbb{R}^d$ with the help of a parameter server (PS) in order to minimize loss function $F \left( \boldsymbol{\theta} \right) = \sum\nolimits_{m=1}^{M} \frac{B_m}{B} F_m(\theta)$,
where $B \triangleq \sum\nolimits_{m=1}^{M} B_m$, and $F_m \left( \boldsymbol{\theta} \right) = \frac{1}{B_m} \sum\nolimits_{\boldsymbol{u} \in \mathcal{B}_m} f \left(\boldsymbol{\theta}, \boldsymbol{u} \right)$ is the loss function at device $m$ with $f$ denoting an empirical loss function.
\subsection{FEEL System}
Minimization of loss function $F$ is carried out iteratively using the local datasets at the devices with the PS having access to the global model.
At each iteration, the global model is shared with the devices and updated locally using the data at the devices.
The devices then transmit their local model updates to the PS responsible for updating the global model.
The algorithm continues until the convergence of the global model, or lack of participating devices for training.
The downlink (PS-to-device) and uplink (device-to-PS) connections are wireless, and a noisy transmission over wireless medium takes place during each downlink and uplink communication round.
During iteration $t$, the PS shares the global model $\boldsymbol{\theta} (t)$ with the devices, and they perform a $\tau$-step stochastic gradient descent (SGD) to update the global model using their local data.
Let $\widehat{\boldsymbol{\theta}}_m (t)$ denote the noisy estimate of the global model $\boldsymbol{\theta} (t)$ at device $m$, $m \in [M]$.
For the $i$-th step SGD algorithm, device $m$ selects a random subset of its local data, denoted by $\boldsymbol{\xi}_m^i (t)$, and updates the model as follows:
\begin{align}\label{EQTauStepSGD}
\boldsymbol{\theta}_m^{i+1} (t) = \boldsymbol{\theta}_m^i (t) - \eta^i_m (t) \nabla F_m \left( \boldsymbol{\theta}_m^i (t), \boldsymbol{\xi}_m^i (t) \right),\, \mbox{$i \in [\tau]$},
\end{align}
where $\boldsymbol{\theta}_m^1 (t) = \widehat{\boldsymbol{\theta}}_m (t)$, $\eta^i_m (t)$ denotes the learning rate, and $\nabla F_m \left( \boldsymbol{\theta}_m^i (t), \boldsymbol{\xi}_m^i (t) \right)$ is the stochastic gradient which provides an unbiased estimate of the true gradient $\nabla F_m \left( \boldsymbol{\theta}_m^i (t) \right)$.
Device $m$ sends its model update $\Delta \boldsymbol{\theta}_m (t) = \boldsymbol{\theta}_m^{\tau+1} (t) - \boldsymbol{\theta}_m^{1} (t)$ to the PS, computed after performing the $\tau$-step SGD, where we denote the estimate of $\Delta \boldsymbol{\theta}_m (t)$ at the PS by $\Delta \widehat{\boldsymbol{\theta}}_m (t)$.
The PS then updates the global model as follows:
\begin{align}
\boldsymbol{\theta} (t+1) =\boldsymbol{\theta} (t) + \frac{1}{M} \sum\nolimits_{m=1}^{M} \Delta \widehat{\boldsymbol{\theta}}_m \left( t \right).
\end{align}
FEEL needs to address the partial device participation case, when only a subset of the devices participate in the training at each iteration.
First, we need to consider the fact that some of the wireless devices might stop participating in the training for various reasons.
Furthermore, due to the limited wireless resources shared among the participating devices, the information that can be conveyed using each link may be limited after allocating the channel resources.
In this paper, we adopt partial device participation, where at iteration $t$ only a subset of devices $\mathcal{K} (t) \subset [M]$ with size $K = \left| \mathcal{K} (t) \right|$ is chosen by the PS to participate in the training.
Accordingly, the PS updates the global model after receiving the local model updates from the participating devices as
\begin{align}
\boldsymbol{\theta} (t+1) =\boldsymbol{\theta} (t) + \frac{1}{K} \sum\nolimits_{k \in \mathcal{K} (t)} \Delta \widehat{\boldsymbol{\theta}}_k \left( t \right).
\end{align}
\subsection{Wireless Medium}\label{SubSecWirelessMed}
Each iteration includes two communication phases over downlink, where the PS shares the global model with the devices, and uplink, where the participating devices transmit their local updates to the PS.
Here we model the downlink and uplink communication channels.
\noindent \textbf{Downlink channel.}
We assume that the downlink is a parallel fading broadcast channel with $s^{\rm{dl}}$ sub-channels.
We denote the channel gains vector from the PS to device $m$ at iteration $t$ by $\boldsymbol{h}^{\rm{dl}}_m (t) = [{h}^{\rm{dl}}_{m, 1} (t), ..., {h}^{\rm{dl}}_{m, {s^{\rm{dl}}}} (t)] \in \mathbb{C}^{s^{\rm{dl}}}$ with each entry independent and identically distributed (iid) according to $\mathcal{CN} (0, (\sigma^{\rm{dl}})^2)$, and the additive noise vector at device $m$ by $\boldsymbol{z}^{\rm{dl}}_m (t) \in \mathbb{C}^{s^{\rm{dl}}}$ with each entry iid according to $\mathcal{CN} (0, 1)$.
We assume that the PS has channel state information (CSI) about the downlink, and each device has the CSI of its link, and we impose an average power constraint $P^{\rm{dl}}$ at the PS.
\noindent \textbf{Uplink channel.}
We model the uplink channel with a parallel fading multiple access channel (MAC) with $s^{\rm{ul}}$ sub-channels.
The channel gains vector from device $m$ to the PS at iteration $t$ is denoted by $\boldsymbol{h}^{\rm{ul}}_m (t) = [{h}^{\rm{ul}}_{m, 1} (t), ..., {h}^{\rm{ul}}_{m, {s^{\rm{ul}}}} (t)] \in \mathbb{C}^{s^{\rm{ul}}}$ with each entry iid according to $\mathcal{CN} (0, (\sigma^{\rm{ul}})^2)$.
We also denote the additive noise vector at the PS by $\boldsymbol{z}^{\rm{ul}}_m (t) \in \mathbb{C}^{s^{\rm{ul}}}$ with each entry iid according to $\mathcal{CN} (0, 1)$.
The channel input at each device is limited to an average transmit power constraint $P^{\rm{ul}}$, and the PS has full CSI, while each device knows its CSI.
\section{Communications Protocol}
We consider digital communications of the information from the PS and the devices, where each node compresses its message and transmits it at a rate below its channel capacity.
We first present the channel capacities of the downlink and uplink, and then introduce the quantization technique used for compression.
For the ease of presentation, we drop the dependency of the channels on the iteration count $t$.
\subsection{Downlink Channel Capacity}
Recall that the downlink is a parallel fading broadcast channel with $s^{\rm{dl}}$ sub-channels.
Let us consider serving an arbitrary subset of the devices $\mathcal{K} \subset [M]$ of size $K$.
First, we focus on a fading broadcast channel with a single sub-channel, i.e., $s^{\rm{dl}}=1$, where the PS serves the $K$ devices.
We denote the channel gain from the server to device $k$ by ${h}^{\rm{dl}}_k$ and the channel gains vector by $\boldsymbol{h}^{\rm{dl}}$.
This yields a degraded broadcast channel with a well known capacity \cite{BergmansDegradedBCCapacity}.
Without loss of generality, let $\mathcal{K} = [K]$, and $| {h}^{\rm{dl}}_1 | \le | {h}^{\rm{dl}}_2 | \le \cdots \le | {h}^{\rm{dl}}_K |$.
For some non-negative values $\alpha_k$, $\forall k \in \mathcal{K}$, such that $\sum\nolimits_{k=1}^{K} \alpha_k = 1$, the boundary of the capacity region $\mathcal{C}^{\rm{dl}}_{\mathcal{K}, b} (\boldsymbol{h}^{\rm{dl}}, P^{\rm{dl}})$ is given by
\begin{align}
& \mathcal{C}^{\rm{dl}}_{\mathcal{K}, b} (\boldsymbol{h}^{\rm{dl}}, P^{\rm{dl}}) = \Big\{ [C_1, ..., C_K]^T: \nonumber\\
& \; C_k = \log_2 \Big( 1+\frac{\alpha_k \left| {h}^{\rm{dl}}_k \right|^2 P^{\rm{dl}}}{1+ \sum\nolimits_{j=k+1}^{K} \alpha_j \left| {h}^{\rm{dl}}_j \right|^2 P^{\rm{dl}}} \Big), \; k \in \mathcal{K} \Big\}.
\end{align}
Accordingly, the capacity region of the parallel fading broadcast channel is given by \cite{ParallelGaussianBCTse}
\begin{align}
\mathcal{C}^{\rm{dl}}_{\mathcal{K}} (P^{\rm{dl}}) = \bigcup\limits_{\{P^{\rm{dl}}_1, ..., P^{\rm{dl}}_{s^{\rm{dl}}}\}:\sum\limits_{i=1}^{s^{\rm{dl}}} P^{\rm{dl}}_i = P^{\rm{dl}}} \sum\limits_{i=1}^{s^{\rm{dl}}} \mathcal{C}^{\rm{dl}}_{\mathcal{K}, b} (\boldsymbol{h}^{\rm{dl}}_i, P^{\rm{dl}}_i),
\end{align}
where $\boldsymbol{h}^{\rm{dl}}_i \triangleq [{h}^{\rm{dl}}_{1,i}, ..., {h}^{\rm{dl}}_{K,i}]$, for $i \in [s^{\rm{dl}}]$.
The optimal rate and power allocation across sub-channels to maximize the sum-capacity is given by \cite{ParallelGaussianBCTse}
\begin{subequations}
\begin{align}
&C^{\rm{dl}}_{k, i} = \begin{cases}
\log_2 \Big( 1 + \Big( \frac{| h_{k, i}^{\rm{dl}}|^2}{\lambda} -1\Big)^+ \Big), & \mbox{if $| h_{k, i}^{\rm{dl}}| = \max\limits_{k' \in \mathcal{K}} | h_{k', i}^{\rm{dl}}|$},\\
0, & \mbox{otherwise},
\end{cases} \\
& P^{\rm{dl}}_{i} = \Big( \frac{1}{\lambda} - \frac{1}{\max\limits_{k \in \mathcal{K}} | h_{k, i}^{\rm{dl}}|^2} \Big)^+,
\end{align}
\end{subequations}
where $\lambda$ is chosen to satisfy the power constraint $\sum\nolimits_{i=1}^{s^{\rm{dl}}} {P}_{i}^{\rm{dl}} = {P}^{\rm{dl}}$,
and the capacity of the channel to device $k$ is given by $C_{\mathcal{K}, k}^{\rm{dl}} = \sum\nolimits_{i=1}^{s^{\rm{dl}}} C^{\rm{dl}}_{k, i}$, $k \in \mathcal{K}$.
The optimal solution provided above dictates that in each sub-channel the information for no more than a single user, the one with the best channel quality in that sub-channel, is broadcast.
Also, the power allocation across different sub-channels follows a water-filling solution.
\subsection{Uplink Channel Capacity}
The uplink is modelled by a parallel fading MAC with $s^{\rm{ul}}$ sub-channels.
We first consider $s^{\rm{ul}}=1$, where $K$ devices in $\mathcal{K}$ share the wireless medium to communicate with the PS.
We denote the channel gains vector by $\boldsymbol{h}^{\rm{ul}} = [{h}^{\rm{ul}}_1, ..., {h}^{\rm{ul}}_K]$, where ${h}^{\rm{ul}}_k$ is the channel gain from device $k$ to the PS.
For an average power $P^{\rm{ul}}_k$ at device $k$ and $\boldsymbol{P}^{\rm{ul}} \triangleq [P_1^{\rm{ul}}, ..., P_K^{\rm{ul}}]$, the capacity region of the above fading MAC is given by
\begin{align}
& \mathcal{C}^{\rm{ul}}_{\mathcal{K}, b} (\boldsymbol{h}^{\rm{ul}}, \boldsymbol{P}^{\rm{ul}}) =\Big\{ [C_1, ..., C_K]^T:\nonumber\\
& \sum\nolimits_{k \in \mathcal{S}} C_k \le \log_2 \Big( 1 + \sum\nolimits_{k \in \mathcal{S}} \left| {h}^{\rm{ul}}_k \right|^2 P^{\rm{ul}}_k \Big),\; \forall \mathcal{S} \subset \mathcal{K} \Big\}.
\end{align}
The capacity region of the parallel fading MAC is then given by \cite{ParallelGausianMACCapTse}
\begin{align}
\mathcal{C}^{\rm{ul}}_{\mathcal{K}} (P^{\rm{ul}}) = \bigcup\limits_{\quad \scriptstyle\{ P_{k,1}^{\rm{ul}},...,P_{k,{s^{\rm{ul}}}}^{\rm{ul}}\} :\hfill\atop
\scriptstyle\sum\nolimits_{i = 1}^{{s^{\rm{ul}}}} {P_{k,i}^{\rm{ul}}} = {P^{\rm{ul}}},\forall k \in \mathcal{K}\hfill} {\sum\limits_{i = 1}^{{s^{\rm{ul}}}} } \mathcal{C}^{\rm{ul}}_{\mathcal{K}, b} (\boldsymbol{h}^{\rm{ul}}_i, \boldsymbol{P}_i^{\rm{ul}}),
\end{align}
where $\boldsymbol{h}^{\rm{ul}}_i \triangleq [{h}^{\rm{ul}}_{1,i}, ..., {h}^{\rm{ul}}_{K,i}]$ and $\boldsymbol{P}^{\rm{ul}}_i \triangleq [{P}^{\rm{ul}}_{1,i}, ..., {P}^{\rm{ul}}_{K,i}]$, $i \in [s^{\rm{ul}}]$.
Assuming a total power constraint $\sum\nolimits_{k=1}^{K} \sum\nolimits_{i=1}^{s^{\rm{ul}}} P_{k,i}^{\rm{ul}} = K P^{\rm{ul}}$, the optimal power allocation across sub-channels to maximize the sum-capacity is given by \cite{ParallelGausianMACCapTse}
\begin{align}
P_{k,i}^{\rm{ul}} =
\begin{cases}
\Big( \frac{1}{\lambda} - \frac{1}{\left| h_{k, i}^{\rm{ul}}\right|^2} \Big)^+, & \mbox{if $| h_{k, i}^{\rm{ul}}| = \max\limits_{k' \in \mathcal{K}} | h_{k', i}^{\rm{ul}}|$},\\
0, & \mbox{otherwise},
\end{cases}
\end{align}
where $\lambda$ is chosen to satisfy $\sum\nolimits_{k=1}^{K} \sum\nolimits_{i=1}^{s^{\rm{ul}}} P_{k,i}^{\rm{ul}} = K P^{\rm{ul}}$.
Accordingly, the sum capacity is given by
\begin{align}
C^{\rm{ul}}_{\mathcal{K}, \rm{sum}} = \sum\nolimits_{i=1}^{s^{\rm{ul}}} \log_2 \Big( 1 + \Big( \frac{\max\nolimits_{k \in \mathcal{K}} | h_{k, i}^{\rm{ul}}|^2}{\lambda} -1\Big)^+ \Big),
\end{align}
and for a symmetric rate allocation, the capacity of each device is given by $C_{\mathcal{K}, k}^{\rm{ul}} = C^{\rm{ul}}_{\mathcal{K}, \rm{sum}}/K$, $\forall k \in \mathcal{K}$.
Similar to the downlink transmission, with the uplink transmission, at each sub-channel the power is allocated to only a single device with the best channel condition in that sub-channel.
We note that, besides its CSI, each device needs to know the indices of the sub-channels that it has the best channel conditions among all the devices (the sub-channels that it uses for transmission), and we assume that this information is provided by the PS.
\begin{remark}
For the above capacity analysis, we have assumed slow fading and coding across several blocks with invariant channel gains.
This provides an upper bound on the capacity of the downlink and uplink channels presented in Section \ref{SubSecWirelessMed}.
\end{remark}
\subsection{Quantization Technique}
We follow the stochastic quantization technique presented in \cite{mohammadDenizSanjVinceQuanUpdates}.
Let $\boldsymbol{x} \in \mathbb{R}^d$ be a vector with the $i$-th component denoted as $x_i$.
We define $x_{\rm{max}} \triangleq \max \{ |\boldsymbol{x}| \}$ and $x_{\rm{min}} \triangleq \min \{ |\boldsymbol{x}| \}$.
For a quantization level $q \ge 1$, we define, for $i \in [d]$,
\begin{align}
& {Q} \left({x}_i, q\right) \triangleq {\rm{sign}} \left( {x}_i \right) \cdot \Big( x_{\rm{min}} \nonumber\\
& \qquad \qquad \quad + \left(x_{\rm{max}} - x_{\rm{min}} \right) \cdot \varphi \Big( \frac{\left| {x}_i \right| - x_{\rm{min}}}{x_{\rm{max}} -x_{\rm{min}}}, q \Big) \Big),
\end{align}
where $\varphi$ is a stochastic quantization function defined next.
Let $x \in \mathbb{R}$ such that $0 \le x \le 1$ and $q \ge 1$, and $l \in \{ 0, 1, ..., q-1\}$ be an integer such that $x \in [l/q, (l+1)/q)$.
We define
\begin{align}
\varphi \left( x, q \right) \triangleq \begin{cases}
l / q, & \mbox{with probability $1 - x q + l$},\\
(l+1) / q, & \mbox{with probability $x q - l$}.
\end{cases}
\end{align}
We further define the vector quantization as $\boldsymbol{Q}(\boldsymbol{x}, q) \triangleq [Q({x}_1, q), \cdots, Q({x}_d, q) ]^T$.
With this quantization approach, each vector $\boldsymbol{x}$ is represented by a total number of
\begin{align}
R_q = 64 + d \left( 1 + \log_2(q+1) \right) \mbox{ bits}.
\end{align}
\section{Downlink Device Selection Technique}
Here we present our FEEL approach with device selection in the downlink.
We extend our work in \cite{mohammadDenizSanjVinceQuanUpdates} by allowing the PS to broadcast different messages to different devices that enables partial device participation at each training iteration.
At each iteration, the PS selects a subset of the devices and broadcasts different versions of the global model to the selected devices with a rate vector within the capacity region $\mathcal{C}^{\rm{dl}}(P^{\rm{dl}})$.
The global model estimate at device $m$ at iteration $t$ is denoted by $\widehat{\boldsymbol{\theta}}_m (t)$, and if $m \in \mathcal{K} (t)$, i.e., device $m$ is selected to participate in the training at iteration $t$, it performs the $\tau$-step SGD algorithm.
It then quantizes the local model update $\Delta {\boldsymbol{\theta}}_m \left( t \right)$, along with error compensation, and transmits it to the PS with a rate no larger than $C^{\rm{ul}}_m$, $m \in [M]$.
In the following, we elaborate the downlink and uplink transmission.
\subsection{Downlink Transmission}
At iteration $t$, the PS first selects $K$ devices with the largest $\sum\nolimits_{i=1}^{s^{\rm{dl}}} \big\| \boldsymbol{h}^{\rm{dl}}_m (t) \big\|^2_2$, $\forall m \in [M]$; that is,
\begin{align}
\mathcal{K} (t) = {\rm{indmax}}_{K} \Big\{ \sum\nolimits_{i=1}^{s^{\rm{dl}}} \big\| \boldsymbol{h}^{\rm{dl}}_1 (t) \big\|^2_2, ..., \sum\nolimits_{i=1}^{s^{\rm{dl}}} \big\| \boldsymbol{h}^{\rm{dl}}_M (t) \big\|^2_2 \Big\}.
\end{align}
The PS aims to transmit $\boldsymbol{\theta} (t) - \widehat{\boldsymbol{\theta}} (t_k)$ to device $k \in \mathcal{K}(t)$ over the downlink, where $t_k$ denotes the iteration index during which device $k$ was selected last time, and it is initialized with $t_k = 0$.
We will show that, with the proposed approach, the PS knows about $\widehat{\boldsymbol{\theta}} (t_k)$ as side information and can remove this information from the current global model $\boldsymbol{\theta} (t)$, $\forall k \in \mathcal{K} (t)$.
For a set of selected devices $\mathcal{K}(t)$ with the downlink capacity region $\mathcal{C}^{\rm{dl}}_{\mathcal{K}(t)} (P^{\rm{dl}})$, the PS quantizes $\boldsymbol{\theta} (t) - \widehat{\boldsymbol{\theta}} (t_k)$ to a limited rate and broadcasts it to device $k$, $\forall k \in \mathcal{K}(t)$, such that the resultant rate vector is within $\mathcal{C}^{\rm{dl}}_{\mathcal{K}(t)} (P^{\rm{dl}})$.
Accordingly, the PS broadcasts $\boldsymbol{Q} (\boldsymbol{\theta} (t) - \widehat{\boldsymbol{\theta}}_k (t_k), q^{\rm{dl}}_k(t))$ to device $k$, where $q^{\rm{dl}}_k(t)$ is chosen as the largest integer satisfying $R_{q^{\rm{dl}}_k(t)} \le C_{\mathcal{K}(t), k}^{\rm{dl}}$, $\forall k \in \mathcal{K}(t)$.
Therefore, the rate vector $[R_{q^{\rm{dl}}_1(t)}, ..., R_{q^{\rm{dl}}_{K}(t)}]^T$ is within $\mathcal{C}^{\rm{dl}}_{\mathcal{K}(t)} (P^{\rm{dl}})$, and device $k$ can successfully decode $\boldsymbol{Q} (\boldsymbol{\theta} (t) - \widehat{\boldsymbol{\theta}}_k (t_k), q_k(t))$, $\forall k \in \mathcal{K}(t)$.
After receiving $\boldsymbol{Q} (\boldsymbol{\theta} (t) - \widehat{\boldsymbol{\theta}}_k (t_k), q^{\rm{dl}}_k(t))$, device $k$ obtains an estimate of global model $\boldsymbol{\theta} (t)$ through, for $k \in \mathcal{K}(t)$,
\begin{align}
\widehat{\boldsymbol{\theta}}_k (t) = \widehat{\boldsymbol{\theta}}_k (t_k) + \boldsymbol{Q} (\boldsymbol{\theta} (t) - \widehat{\boldsymbol{\theta}}_k (t_k), q^{\rm{dl}}_k(t)),
\end{align}
which is equivalent to $\widehat{\boldsymbol{\theta}}_k (t) = {\boldsymbol{\theta}} (0) + \sum\nolimits_{i =1}^{t} \mathds{1}(\mathcal{K} (i)) \boldsymbol{Q} \big(\boldsymbol{\theta} (i) - \widehat{\boldsymbol{\theta}}_k (i_k), q^{\rm{dl}}_k(i)\big)$, where we assumed that $\widehat{\boldsymbol{\theta}}_k(0) = \boldsymbol{\theta}(0)$, $\forall k$, and for any time index $i$, we denote the last time device $k$ was selected by $i_k$.
Accordingly, the PS knows about $\widehat{\boldsymbol{\theta}}_k (t)$ since it has knowledge about $\boldsymbol{Q} (\boldsymbol{\theta} (t) - \widehat{\boldsymbol{\theta}}_k (t_k), q^{\rm{dl}}_k(t))$, $\forall k, t$.
\subsection{Uplink Transmission}
After computing $\widehat{\boldsymbol{\theta}}_k (t)$, device $k \in \mathcal{K}(t)$ performs the $\tau$-step SGD algorithm as given in \eqref{EQTauStepSGD} and obtains $\Delta \boldsymbol{\theta}_k (t)$, which is quantized and transmitted over the MAC through error compensation.
Specifically, device $k \in \mathcal{K}(t)$ transmits $\boldsymbol{Q}\big( \Delta \boldsymbol{\theta}_k (t) + \boldsymbol{\delta}_k (t), q^{\rm{ul}}_k(t) \big)$, where $q^{\rm{ul}}_k(t)$ is chosen as the largest integer satisfying $R_{q^{\rm{ul}}_k(t)} \le C_{\mathcal{K}(t), k}^{\rm{ul}}$.
The error accumulation vector $\boldsymbol{\delta}_k (t)$ is then updated as
\begin{align}
\boldsymbol{\delta}_k (t+1) = \Delta \boldsymbol{\theta}_k (t) + \boldsymbol{\delta}_k (t) - \boldsymbol{Q}\big( \Delta \boldsymbol{\theta}_k (t) + \boldsymbol{\delta}_k (t), q^{\rm{ul}}_k(t) \big),
\end{align}
where $\boldsymbol{\delta}_k (0) = \boldsymbol{0}_d$.
After receiving $\boldsymbol{Q}\big( \Delta \boldsymbol{\theta}_k (t) + \boldsymbol{\delta}_k (t), q^{\rm{ul}}_k(t) \big)$, $\forall k \in \mathcal{K}(t)$, the PS updates the global model as
\begin{align}
\boldsymbol{\theta} (t+1) = \sum\nolimits_{m = 1}^M \frac{B_m}{B} \big( \boldsymbol{Q}\big( \Delta \boldsymbol{\theta}_k (t) + \boldsymbol{\delta}_k (t), q^{\rm{ul}}_k(t) \big) + \widehat{\boldsymbol{\theta}}_k (t) \big).
\end{align}
\begin{remark}
By selecting a larger number of devices, each device obtains a coarser estimate of the global model from the PS and sends a less accurate estimate of its local model update to the PS.
This is due to the resource sharing nature of digital transmission over both downlink and uplink.
On the other hand, having a larger number of devices participating in the training, the global model is updated using a larger portion of the entire dataset.
Therefore, we need to optimize the number of participating devices to obtain the best performance.
\end{remark}
\begin{remark}
In \cite{mohammadDenizSanjVinceQuanUpdates}, the same version of the global model update with respect to the last model estimate available at the devices is broadcast to all the devices.
This requires that all the devices know about the last global model estimate in order to recover an estimate of the global model.
We have relaxed this requirement by allowing the devices to receive different versions of the global model updates with respect to the last global model estimate available at each device which enables partial device participation.
\end{remark}
\section{Numerical Experiments}\label{SecExperiments}
We evaluate the performance of the proposed algorithm and compare it with the approach in \cite{mohammadDenizSanjVinceQuanUpdates} for image classification of the MNIST dataset \cite{LeCunMNIST} using ADAM optimizer \cite{ADAMDC}.
We train a convolutional neural network with 5 layers including two $5 \times 5$ convolutional layers with ReLU activation and same padding and 32 and 64 channels, respectively, each followed by a $2 \times 2$ max pooling layer, and a softmax output layer.
We assume non-iid data distribution across the devices where each device has access to the samples from only a single class.
We first split the data samples at each class to $M/10$ disjoint groups (assuming that $M$ is divisible by 10), and allocate each group to a unique device.
We measure the performance as the accuracy with respect to the test samples, referred to as the \textit{test accuracy}, versus the iteration count $t$.
We consider $M=100$ devices, $s^{\rm{dl}} = 10^7$ and $s^{\rm{ul}} = 5 \times 10^6$ downlink and uplink sub-channels, respectively, and channel variances $(\sigma^{\rm{dl}})^2 = (\sigma^{\rm{ul}})^2=10$.
We set the power constraints for downlink and uplink to relatively high values $P^{\rm{dl}} = 10^5$ and $P^{\rm{ul}} = 10^3$, respectively, which is to make sure that in the case of full device participation, i.e., when $K = M$, the PS and the devices can transmit at least one bit of information.
\begin{figure}[t!]
\centering
\centering
\includegraphics[scale=0.575,trim={15.5pt 5pt 44pt 34pt},clip]{Fig_accuracy.eps}
\caption{Performance comparison of the proposed scheme with different $K$ values and the approach in \cite{mohammadDenizSanjVinceQuanUpdates} for non-iid data.}
\label{Fig}
\end{figure}
In Fig. \ref{Fig}, we investigate the impact of the number of selected devices on the performance for $K \in \{5, 10, 40, 100\}$.
We observe that selecting all the devices leads to unstable accuracy performance and low convergence rate and accuracy level.
This is due to the fact that the information in both downlink and uplink are communicated less accurately when all the devices participate in the training.
On the other hand, when a small subset of the devices is selected, i.e., $K= 5$, the performance suffers from lack of data usage for updating the global model at each iteration, which in particular deteriorates the performance in the case of non-iid data.
As a result, we observe that selecting a moderate number of devices $K=40$ leads to a relatively good performance in terms of final accuracy level, convergence rate, and stability.
We have further included the performance of the scheme introduced in \cite{mohammadDenizSanjVinceQuanUpdates}, where all the devices are selected at each iteration, and the quantized global model update is broadcast to all the devices with the same rate accommodating the worst device's channel capacity.
We observe that, in the full device participation case, sending the global model update with different rates to different devices based on their channel qualities, as performed by the proposed scheme, can slightly improve the performance.
\section{Conclusions}\label{SecConc}
We have studied FEEL with noisy bandwidth-limited downlink and uplink channels and investigated the advantages of device selection based on downlink channel conditions.
For the downlink, we have adopted digital transmission of the global model updates from the PS to the devices, where the PS broadcasts different messages to different devices.
Accordingly, we have designed a FEEL framework with partial device participation based on the downlink channel conditions.
The PS broadcasts different global model updates to different participating devices according to the last global model estimate available at the devices.
The participating devices update the global model estimate according to their local data and send the quantized local model updates to the PS, which updates the global model using the local model updates received from the devices.
Partial device participation enhances the resources allocated to the underlying links and leads to a more accurate information exchange over both the downlink and uplink.
On the other hand, the data usage reduces when fewer devices participate in the training.
Numerical experiments have shown that partial device participation based on the downlink channel improves the performance while the full device participation case suffers significantly from inaccurate information exchange.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
It is well-known that, given any direction starting from the origin of the complex plan, the set of all Borel-summable series in this direction forms a differential algebra; see \cite[Proposition 1.3.4.2]{Ma} or \cite[Theorem 36]{Ba}. This is not the same for the summability with respect to the power series solutions of $q$-difference equations. Indeed, if $q>1$ and \begin{equation}
\label{equation:Eqx}
\hat E_q(x)=\sum_{n\ge 0}(-1)^nq^{n(n-1)/2}x^n\,,
\end{equation}
the divergent power series $\hat E_q(x)$ is $Gq$-summable of only one level but its square $\hat E_q(x)^2$ is $Gq$-summable of two levels; see \cite[\S4.3.8]{Zhang1} and \cite[Th\'eor\`eme 2.2.1]{MZ}. The first purpose of this paper is to obtain a linear $q$-difference equation for every positive power of the power series $\hat E_q(x)$. This will allow one to see the different level of summability for each of these corresponding power series.
In what follows, let $q$ be a given nonzero complex number, and let $\sigma_q$ be the associated $q$-difference operator defined by $\sigma_qf(x)=f(qx)$. By direct computation, one finds the series defined by \eqref{equation:Eqx} in the above satisfies term by term the following linear $q$-difference equation :
\begin{equation}
\label{equation:Euler}
(x\sigma_q+1)y=1\,.
\end{equation}
Now, write \eqref{equation:Euler} into the form $x\sigma_qy=1-y$ and then square both sides. As $(\sigma_qy)^2=\sigma_q(y^2)$, one obtains that
$
x^2\sigma_q(y^2)-y^2=1-2y
$. By using again \eqref{equation:Euler}, one gets the following equation:
$$
(x\sigma_q+1)(x^2\sigma_q-1)(y^2)=x+1-2(x\sigma_q+1)y\,,
$$
what implies that
\begin{equation}
\label{equation:E2} (x\sigma_q+1)(x^2\sigma_q-1)\hat E_q(x)^2=x-1\,.
\end{equation}
We shall explain how to obtain a linear $q$-difference equation for $\hat E_q(x)^n$. For doing that, we shall start by recalling some non-commutative rings of $q$-difference operators and then arrive at a $n$-th order such operator associated with any given $n$-th power of a power series solution of some first order non-homogenous $q$-difference equation. See Theorem \ref{thm:fn} in \S~\ref{sec:thm} and its generalisation stated in Theorem \ref{thm:gen} in \S~\ref{sec:gen}. Section \ref{sec:proof} is reserved to the proofs of Theorem \ref{thm:fn} and two related Lemmas. In the last section, we shall apply, respectively, both Theorems \ref{thm:fn} and \ref{thm:gen} to the above-mentioned power series $\hat E_q(x)$ and an other $q$-analog $\hat E(x;q)$ of the classic Euler series. At the end of the paper will be outlined some results about the summability of both $\hat E_q(x)$ and $\hat E(x;q)$ when $q>1$; see Theorem \ref{thm:summability}.
Throughout the present paper, we shall limit ourself to the $q$-summation method studied in our previous works \cite{Zhang1} and \cite{MZ}, by means of a $q$-Laplace integral involving the multivalued function $e^{\log^2x/2\ln q}$. There exists another summation, using a Jacobi theta function; see \cite{RSZ}. Comparing both summations can be seen as part of Stokes analysis, and this would be interesting to find identities on the associated special functions.
\section{Notation and statements}\label{sec:thm}
As usual, we will denote by $\CC\{x\}$ or $\CC[[x]]$ the integral domain constituting of the germs of holomorphic functions at $x=0$ in the complex plan or that of the power series of indeterminate $x$, respectively. Their respective corresponding field of fractions will be denoted by $\CC[x^{-1}]\{x\}$ or $\CC[x^{-1}][[x]]$. One has $\CC\{x\}\subset\CC[[x]]$, as well as $\CC[x^{-1}]\{x\}\subset\CC[x^{-1}][[x]]$, in a natural way via the classic Taylor or Laurent series.
Let $R$ be one of the above-mentioned $\CC$-vector spaces $\CC\{x\}$, $\CC[[x]]$, $\CC[x^{-1}]\{x\}$ and $\CC[x^{-1}][[x]]$. By replacing $x$ with $qx$,
the $q$-difference operator $\sigma_q$ acts as being an automorphism over $R$. Let $\sigma_q^{k}=\sigma_{q^k}$ for any integer $k$; in particular, $\sigma_q^0$ is simply the identity map on $R$. We will denote by $R[\sigma_q]$ the set of the (linear) $q$-difference operators whose coefficients belong to $R$, {\it i.e.} $L\in R[\sigma_q]$ if $L=\sum_{k=0}^na_k\sigma_q^k$, where $a_k\in R$. By identifying each element of $R$ with the corresponding multiplication map in $R$, the set $R[\sigma_q]$ constitutes itself a non-commutative ring for the compoisition of operators. Given $L_1$, $L_2\in R[\sigma_q]$, we will write $L_1L_2$ in stead of $L_1\circ L_2$.
Furthermore, we will denote by $\nu_0(f)\in\ZZ\cup\{\infty\}$ the valuation of any given element $f$ of the field $ \CC[x^{-1}][[x]]$ ``at $x=0$''. This means that (i) $\nu_0(f)=\infty$ iff $f$ is the identically vanishing series, and (ii) $v_0(f)=\nu\in\ZZ$ iff $f\equiv c\,x^{\nu}$ $\bmod$ $x^{\nu+1}\,\CC[[x]]$ for some nonzero complex number $c$.
Throughout the whole section, $P$ will be some given nonzero power series belon\-ging to the field $\CC[x^{-1}][[x]]$. Define the associated family of power series $\{P_n\}_{n\ge 0}$ as follows: $P_0=0$, $P_1=P$, and
\begin{equation}
\label{equation:Pn}P_n=\sum_{k=0}^{n-1}(-x\sigma_q)^kP\quad\textrm{for}\quad n\ge 2.
\end{equation}
By noticing that $(-x\sigma_q)^kP=(-x)^k\,q^{k(k-1)/2}\,\sigma_q^kP$, it follows from
\eqref{equation:Pn} that, for any pair $(n,\ell)\in\ZZ_{\ge 0}\times\ZZ_{>0}$,
\begin{align*}
P_{n+\ell}-P_{n}&=\sum_{k=n}^{n+\ell-1}(-x)^k\,q^{k(k-1)/2}\,\sigma_q^kP\\
&\equiv (-1)^n\,c\,q^{n\nu+n(n-1)/2}x^{\nu+n}\ \bmod\ x^{\nu+n+1}\,\CC[[x]]\,,
\end{align*}
where $c\not=0$ and $\nu=\nu_0(P)\in\ZZ$.
This implies that
\begin{equation}
\label{equation:Pmn}P_m\not= P_{n}\qquad \textrm{if}\qquad m\not=n.
\end{equation}
Given any positive integer $n\ge 1$, let $\{L_{n,k}^P\}_{1\le k\le n}\subset\left(\CC[x^{-1}][[x]]\right)[\sigma_q]$ be the associated family of $q$-difference operators defined in the following manner:
\begin{align}
\label{equation:Ln1}L_{n,1}^P&=\frac{1}{P_1}\left(x^n\sigma_q-(-1)^n\right)=\frac{1}{P}\left(x^n\sigma_q-(-1)^n\right);\\ \label{equation:Lnk}
L_{n,k+1}^P&=\frac{1}{P_{k+1}}\left(x^{n-k}\sigma_q-(-1)^{n-k}\right)\,L_{n,k}^P,\quad 1\le k<n\,.
\end{align}
Specifically, letting $k=n$, one gets the following form of the $n$-th order $q$-difference operator $L_{n,n}^P\in\left(\CC[x^{-1}][[x]]\right)[\sigma_q]$:
\begin{equation}
\label{equation:Ln}
L_{n,n}^P=\frac{1}{P_n}\left(x\sigma_q+1\right)\frac{1}{P_{n-1}}\left(x^2\sigma_q-1\right)\cdots\frac{1}{P_1}\left(x^n\sigma_q-(-1)^n\right)\,.
\end{equation}
\begin{theorem}\label{thm:fn}
Let $n$ be an integer $\ge 1$, let $P$, $f\in\CC[x^{-1}][[x]]$ with $P\not=0$, and suppose that the following $q$-difference equation is satisfied:
\begin{equation}
\label{equation:f}
x\sigma_qf+f=P\,.
\end{equation}
Then:
\begin{equation}
\label{equation:fn}
L_{n,n}^P(f^n)=(-1)^{n(n-1)/2}\,,
\end{equation}
where $L_{n,n}^P$ is the $q$-difference operator defined by \eqref{equation:Ln}.
\end{theorem}
Theorem \ref{thm:fn}
will be proved with the help of the following lemmas.
\begin{lemma}\label{lem:Akj}
Let $(n,k)\in \ZZ^2$ such that $1\le k\le n$, and let $P$, $f$ be as in Theorem \ref{thm:fn}. For ${0\le j\le k}$, define $A_{k;j}\in\CC[x^{-1}][[x]]$ by
\begin{equation}
\label{equation:Akj}
A_{k;j}=\prod_{\substack{\ell\not=j\\ 0\le\ell\le k}}\left( P_j-P_\ell\right).
\end{equation}
One has:
\begin{equation}
\label{equation:Lnkf}
L_{n,k}^P(f^n)=(-1)^{k(2n-k+1)/2}\sum_{j=0}^k\frac{1}{A_{k;j}}\left(f-P_j\right)^n\,.
\end{equation}
\end{lemma}
\begin{lemma}
\label{lem:sym} Let $n$ be a nonnegative integer, $\mathfrak{C}$ an extension field of $\CC$, and let $(\alpha_0,\alpha_1,...,\alpha_n)\in\mathfrak{C}^{n+1}$ such that $\alpha_j\not=\alpha_{\ell}$ for $j\not=\ell$. Define the $(n+1)$-uplet $ (a_0,a_1,...,a_n)\in\mathfrak{C}^{n+1}$ as follows:
$$
a_{j}=\prod_{\substack{\ell\not=j\\ 0\le\ell\le n}}\left( \alpha_j-\alpha_\ell\right)
$$
($a_0=1$ if $n=0$).
The following identity holds in the ring $\mathfrak{C}[T]$ of the polynomial functions over $\mathfrak{C}$:
\begin{equation}
\label{equation:Faj}
\sum_{j=0}^n\frac{1}{a_j}\,(T-\alpha_j)^n=(-1)^{n}\,.
\end{equation}
\end{lemma}
\section{Proofs}\label{sec:proof}
\begin{proof}[\bf Proof of Lemma \ref{lem:Akj}] To simplify the presentation, we will write $L_{n,k}$ in stead of $L_{n,k}^P$, and set
$\displaystyle\epsilon_{n,k}=(-1)^{k(2n-k+1)/2}$.
One has:
\begin{equation}
\label{equation:ekj}
\epsilon_{n;k+1}=(-1)^{n-k}\,\epsilon_{n,k}\,.
\end{equation}
Let us proceed by induction on $k$.
For $k=1$, since $P_1=P$, one has:
$$\epsilon_{n,1}=(-1)^n;\quad
A_{1;0}=-P\,,\quad A_{1;1}=P\,.$$
Thus, \eqref{equation:Ln1} implies that
$$L_{n,1}(f^n)=\frac{1}{P}\left(x^n\sigma_q(f^n)-(-1)^nf^n\right)\,.
$$
At the same time, by considering \eqref{equation:f}, one gets that
$$
x^n\sigma_q (f^n)=(x\sigma_q f)^n=(P-f)^n\,;
$$
In this way, it follows that
$$
L_{n,1}(f^n)=\frac{\epsilon_{n,1}}{P}\left((f-P)^n-f^n\right)\,,
$$
that is exactly what wanted in \eqref{equation:Lnkf}
for $k=1$.
Now, suppose that equality \eqref{equation:Lnkf} holds for some integer $k$ between $1$ and $n-1$. By using relation \eqref{equation:Lnk}, one can express $L_{n,k+1}(f^n)$ as follows:
\begin{equation}
\label{equation:Lk+1}
L_{n,k+1}(f^n)=\frac{\epsilon_{n,k}}{P_{k+1}}\sum_{j=0}^k\left(B_{n,k;j}-C_{n,k;j}\right)\,,
\end{equation}
where
\begin{equation}
\label{equation:B} B_{n,k;j}=x^{n-k}\sigma_q\left(\frac{1}{A_{k;j}}\left(f-P_j\right)^n\right)
\end{equation}
and
\begin{equation}
\label{equation:C} C_{n,k;j}=\frac{(-1)^{n-k}}{A_{k;j}}\left(f-P_j\right)^n.
\end{equation}
In view of \eqref{equation:Pn}, one finds that $x\sigma_qP_j=P-P_{j+1}$, hence:
$$x\sigma_q(f-P_j)=x\sigma_q f-x\sigma_qP_j=(P-f)-(P-P_{j+1})=-(f-P_{j+1}).
$$
Thus, it follows that
$$
B_{n,k;j}=\frac{\left(x\sigma_q(f-P_j)\right)^n}{x^k\sigma_qA_{k;j}}=\frac{(-1)^n}{x^k\sigma_qA_{k;j}}(f-P_{j+1})^n\,.
$$
By using the expression of $A_{k;j}$ given in \eqref{equation:Akj}, one has :
$$
x^k\sigma_qA_{k;j}=\prod_{\substack{\ell\not=j\\ 0\le\ell\le k}}\left(x\sigma_q( P_j-P_\ell)\right)=(-1)^k\prod_{\substack{\ell\not=j\\ 0\le\ell\le k}}\left( P_{j+1}-P_{\ell+1}\right).
$$
This is to say that
\begin{equation*}
\label{equation:Akj+1}
x^k\sigma_qA_{k;j}=\frac{(-1)^k}{P_{j+1}}\,A_{k+1,j+1}\,.
\end{equation*}
So, one can write \eqref{equation:B} as follows:
\begin{equation}
\label{equation:Bkj+1}
B_{n,k;j}=\frac{(-1)^{n-k}P_{j+1}}{A_{k+1;j+1}}(f-P_{j+1})^n\,.
\end{equation}
Rewrite \eqref{equation:Lk+1} into the following form:
\begin{equation}
\label{equation:Lk+1a}
L_{n,k+1}(f^n)=\frac{\epsilon_{n,k}}{P_{k+1}}\left(\sum_{j=0}^{k-1}\left(B_{n,k;j}-C_{n,k;j+1}\right)+B_{n,k;k}-C_{n,k;0}\right)\,.
\end{equation}
Let $j<k$; one has:
$$A_{k+1,j+1}=(P_{j+1}-P_{k+1})\,A_{k,j+1}.
$$
Replace $j$ by $j+1$ in \eqref{equation:C}, and make use of \eqref{equation:Bkj+1}. One gets that
$$
B_{n,k;j}-C_{n,k;j+1}=\frac{(-1)^{n-k}P_{k+1}}{A_{k+1;j+1}}(f-P_{j+1})^n\,.
$$
Furthermore, one sees that $A_{k+1;0}=-P_{k+1}\,A_{k;0}$.
By letting $j=k$ and $j=0$ in \eqref{equation:Bkj+1} and \eqref{equation:C} respectively, one has:
$$
B_{n,k;k}=\frac{(-1)^{n-k}P_{k+1}}{A_{k+1;k+1}}(f-P_{k+1})^n$$
and
$$
C_{n,k;0}=-\frac{(-1)^{n-k}P_{k+1}}{A_{k+1;0}}(f-P_0)^n\,.
$$
Thus, in view of \eqref{equation:ekj}, equality \eqref{equation:Lk+1a} implies that
$$
L_{n,k+1}(f^n)=\epsilon_{n,k+1}\,\sum_{j=0}^{k+1}\frac{1}{A_{k+1;j}}\left(f-P_j\right)^n\,,
$$
which corresponds to
\eqref{equation:Lnkf} in which $k$ was replaced by $k+1$.
\end{proof}
\begin{proof}[\bf Proof of Lemma \ref{lem:sym}] We give here two proofs.
{\it Proof by induction --}
If $n=0$, as $a_0=1$, equality \eqref{equation:Faj} becomes evident.
Suppose that \eqref{equation:Faj} holds for some index $n\ge 0$, and consider an $(n+2)$-uplet $(\alpha_0,...,\alpha_{n+1})$ where, as before, $\alpha_j\not=\alpha_\ell$ if $j\not=\ell$. Set
$$
\mathcal{P}(T)=\sum_{j=0}^{n+1}\frac{1}{\tilde a_j}\,(T-\alpha_j)^{n+1},
\quad \tilde a_j=\prod_{\substack{\ell\not =j\\ 0\le \ell\le n+1}}(\alpha_j-\alpha_\ell)
.$$
Let $k$ be an integer such that $0\le k\le n+1$. If one writes $$\displaystyle
a_{k;j}=\prod_{\substack{\ell\not =k,\ell\not =j\\ 0\le \ell\le n+1}}(\alpha_j-\alpha_\ell)
\,,$$ one has $a_{k;j}=\tilde a_j/(\alpha_j-\alpha_k)$ for $j\not=k$, what implies that
\begin{equation}
\label{equation:Pk}
\mathcal{P}(\alpha_k)=-\sum_{\substack{j\not =k\\ 0\le j\le n+1}}\frac{1}{a_{k;j}}\,(\alpha_k-\alpha_j)^{n}.
\end{equation}
By applying the induction hypothesis to the $(n+1)$-uplet $(\alpha_0,...,\alpha_{k-1},\alpha_{k+1},...\alpha_{n+1})$ appeared in the right hand side of \eqref{equation:Pk}, one obtains that $\mathcal{P}(\alpha_k)=(-1)^{n+1}$.
As $\mathcal{P}$ is a polynomial with $\deg \mathcal{P}\le n+1$, one finds that $\mathcal{P}(T)=(-1)^{n+1}$ identically.
\medskip
{\it Proof by Lagrange polynomials\footnote{We would like to thank our friend and collaborator J. Sauloy for this elegant proof.} --} Let $\mathbb{K}=\mathfrak{C}(T)$ be the field of the rational functions over $\mathfrak{C}$. Let $X$ be a new indeterminate, and set
$$F(X) = (T - X)^n,\quad \Lambda_j(X) = \prod_{\substack{\ell\not =j\\ 0\le \ell\le n}}(X- \alpha_\ell)\,.
$$
By noticing that $F(X)\in\mathbb{K}[X]$ be such that $\deg F = n < n+1$, the Lagrange interpolation formula \cite[Chap. IV, \S 2, p. 26]{Bourbaki} implies that
$$
F(X) = \sum_{j=0}^n\frac{ F(\alpha_j)}{a_j} \Lambda_j(X)\,.
$$
And now one compares the coefficients of $X^n$ for both sides of the above equality. As that of $\Lambda_j$ is equal to 1, one finds that
$$
(-1)^n =\sum_{j=0}^n\frac{F( \alpha_j)}{a_j}= \sum_{j=0}^n\frac{(T - \alpha_j)^n}{a_j},
$$
which is exactly the expected identity \eqref{equation:Faj}.
\end{proof}
\begin{proof}[\bf End of the proof of Theorem \ref{thm:fn}]
In view of Lemma \ref{lem:Akj}, letting $k=n$ in \eqref{equation:Lnkf} yields that
$$
L_{n,n}^P\left(f^n\right)=(-1)^{n(n+1)/2}\sum_{j=0}^n\frac{1}{A_{n;j}}\left(f-P_j\right)^n\,,
$$
where
$$
A_{n;j}=\prod_{\substack{\ell\not=j\\ 0\le\ell\le n}}\left( P_j-P_\ell\right).
$$
By
\eqref{equation:Pmn}, one knows that $P_j\not=P_\ell$ for $j\not=\ell$. Thus, by applying Lemma \ref{lem:sym} with $\mathfrak{C}=\CC[x^{-1}][[x]]$, $X=f$ and $\alpha_j=P_j$, one gets that
$$
\sum_{j=0}^n\frac{1}{A_{n;j}}\left(f-P_j\right)^n=(-1)^{n}.
$$
This permits to finish the proof of Theorem \ref{thm:fn}.
\end{proof}
\section{One generalisation of Theorem \ref{thm:fn}}\label{sec:gen}
Instead of \eqref{equation:f}, let us consider the following slightly more general $q$-difference equation:
\begin{equation}
\label{equation:ab}
\alpha\,\sigma_qy+y=\beta\,,
\end{equation}
where both $\alpha$ and $\beta$
are nonzero power series belonging to the field $\CC[x^{-1}][[x]]$. In the same spirit as in \eqref{equation:Pn}, define the sequence $\{\beta_n\}_{n\ge 0}$ in $\CC[x^{-1}][[x]]$ as follows:
\begin{equation}
\label{equation:beta}
\beta_0=0;\qquad \beta_n=\sum_{k=0}^{n-1}\left(-\alpha\,\sigma_q\right)^k\beta\,,\quad n\ge 1\,.
\end{equation}
\begin{proposition}
\label{prop:ab} For any given positive integer $n$, the following conditions are equivalent.
\begin{enumerate}
\item $\beta_j\not= 0$ for any positive integer $j$ such that $0< j\le n$.
\item $\beta_j\not=\beta_\ell$ for any couple of integers $(j,\ell)$ such that $0\le \ell<j\le n$.
\end{enumerate}
\end{proposition}
\begin{proof}
Indeed, by \eqref{equation:beta}, it follows that
\begin{equation}
\label{equation:betajk}
\beta_j-\beta_\ell=\sum_{k=\ell}^{j-1}\left(-\alpha\,\sigma_q\right)^k\beta=(-\alpha\,\sigma_q)^{\ell}\beta_{j-\ell}\,.
\end{equation}
As $\alpha\not=0$, l'operator $(-\alpha\,\sigma_q)$ is an automorphism on the $\CC$-vector space $\CC[x^{-1}][[x]]$. So, this is the same for its $\ell$-th power or iteration $(-\alpha\,\sigma_q)^{\ell}$. This implies the equivalence between the conditions stated in Proposition \ref{prop:ab}.
\end{proof}
Given a nonzero $f\in\CC[x^{-1}][[x]]$, one remembers that $\nu_0(f)$ denotes the valuation of $f$ at $x=0$, that is the lowest degree of the terms of $f$.
By using \eqref{equation:beta}, one obtains that, for $n>0$:
$$
\nu_0(\beta_n)=\left\{
\begin{array}{ll}
\nu_0(\beta)&\textrm{if}\ \nu_0(\alpha)>0;\\
(n-1)\nu_0(\alpha)+\nu_0(\beta)&\textrm{if}\ \nu_0(\alpha)<0.
\end{array}
\right.
$$
This gives the following statement for $\alpha$, $\beta\in\CC[x^{-1}][[x]]\setminus\{0\}$.
\begin{remark}
\label{rem:ab} Both conditions considered in Proposition \ref{prop:ab} are necessarily fulfilled if $\nu_0(\alpha)\not=0$.
\end{remark}
\begin{theorem}
\label{thm:gen} Let $n\in\ZZ_{>0}$, and let $\alpha$, $\beta$ and $f\in\CC[x^{-1}][[x]]$. Suppose that $f$ satisfies the $q$-difference equation in \eqref{equation:ab} and that $\beta_j\not= 0$ for any positive integer $j$ such that $0< j\le n$. One has:
\begin{equation}
\label{equation:abfn}
L_{n}^{\alpha,\beta}(f^n)=(-1)^{n(n-1)/2}\,,
\end{equation}
where $L_{n}^{\alpha,\beta}$ is the $n$-th order $q$-difference operator defined by
\begin{equation}
\label{equation:abL}
L_{n}^{\alpha,\beta}=\frac{1}{\beta_n}\left(\alpha\,\sigma_q+1\right)\frac{1}{\beta_{n-1}}\left(\alpha^2\,\sigma_q-1\right)\cdots \frac{1}{\beta_1}\left(\alpha^n\,\sigma_q-(-1)^n\right)\,.
\end{equation}
\end{theorem}
\begin{proof} Replace $(k,P)$ with $(n,\beta)$ in \eqref{equation:Akj}, and define:
$$A_{n;j}=\prod_{\substack{\ell\not=j\\ 0\le\ell\le n}}\left(
\beta_j-\beta_\ell\right)\,,\quad 0\le j\le n.
$$
By taking into account Proposition \ref{prop:ab}, it follows that $A_{n;j}\not=0$. Thus, one might proceed in the same way as for the proof of Theorem \ref{thm:fn}. We omit the details.
\end{proof}
\section{About the summability of the powers of $q$-Euler series}\label{sec:Rq}
Let us come back to the power series $\hat E_q(x)$ defined by \eqref{equation:Eqx}, which satisfies the $q$-difference equation stated in \eqref{equation:Euler}. Letting $P=1$, Theorem \ref{thm:fn} implies immediately the following result.
\begin{remark}
Given any integer $n\ge 2$, the $n$-th power $\hat E_q(x)^n$ satisifies the following identity:
\begin{equation}
\label{equation:Eulern}
\left(x\sigma_q+1\right)\,
\frac1{P_{n-1}}\,\left(x^2\sigma_q-1\right)\,...(x^n\sigma_q-(-1)^n)\hat E_q(x)^n=(-1)^{n(n-1)/2}\,P_n\,,
\end{equation}
where $P_k= 1-x+...+q^{(k-1)(k-2)}(-x)^{k-1}$ for $1\le k\le n$.
In particular, when $n=2$, as $P_2=1-x$, \eqref{equation:Eulern} takes the form of \eqref{equation:E2}.
\end{remark}
Furthermore, it might be amusing to notice that, if $q=1$, one has $\displaystyle\hat E_1(x)=\frac{1}{1+x}$ and, in this case, the above identity in \eqref{equation:Eulern} is simply equivalent to the following elementary relation:
$$
\prod_{k=1}^n\frac{x^k-(-1)^k}{\sum_{j=0}^{k-1}(-x)^j}=(-1)^{n(n-1)/2}\,(x+1)^n\,.
$$ This observation related with the specific case of $q=1$ may be also made for Theorem \ref{thm:gen}, by assuming, for example, both $\alpha$ and $\beta$ to belong to the field $\CC[x^{-1}]\{x\}$ of the germs of meromorphic functions at $x=0$ in $\CC$ or to the sub-field $\CC(x)$ of the rational functions over $\CC$.
Our next remark goes to another $q$-analog of the following so-called {Euler series}:
\begin{equation}
\label{equation:serieEuler}
\hat E(x) = \sum_{n\ge 0}(-1)^n\,n!\,x^{n+1}\,.
\end{equation}
This power series is divergent for all $x\in\CC\setminus\{0\}$ but Borel-summable in every direction excepted $\RR^-$. It satisfies the following first order ODE:
\begin{equation}
\label{equation:eqEuler}
(x\,\delta+1) y=x, \quad \delta=x\partial_x=x\frac{d\ }{dx}.
\end{equation}
Letting $Y=\hat E(x)^2$, one can check that
\begin{equation}
\label{equation:eqEuler2}
(x\,\delta+1-x)\,(x\,\delta+2)Y=2x^2.
\end{equation}
Indeed, if $y=\hat E(x)$, one deduces from \eqref{equation:eqEuler} that $x\delta(y^2)=2x\,y\,\delta y=2y(x-y)=2xy-2y^2$. This means that $(x\delta+2)(y^2)=2x\,y$. Thus, applying again \eqref{equation:eqEuler} yields that
$\displaystyle
(x\,\delta+1)\,\frac{1}{2x}\,(x\,\delta+2)\,y^2=x\,.
$ In this way, one gets \eqref{equation:eqEuler2}, using the identity $\displaystyle(x\,\delta+1)\,\frac{1}{2x}=\frac{1}{2x}\,(x\,\delta+1-x)$ in the non-commutative ring $\CC(x)[\delta]$ of the differential operators over $\CC(x)$.
Besides, the correspondances
$\displaystyle
n \leftrightarrow \frac{1-q^n}{1-q}$ and $\displaystyle n! \leftrightarrow \frac{(1-q)...(1-q^n)}{(1-q)^n}
$ suggest one to consider
the following $q$-analog of the Euler series:
\begin{equation}
\label{equation:Exq}
\hat E(x;q)=x+
\sum_{n\ge 1}(-1)^n\frac{(1-q)...(1-q^n)}{(1-q)^n}x^{n+1}.
\end{equation}
This can be written in term of a basic hypergeometric series as follows:
$$\hat E(x;q)=\displaystyle x\,{}_2\phi_1(q,q;0;q,-\frac{x}{1-q})=x\,{}_2\phi_0(q^{-1},q^{-1};-;q^{-1},\frac{x}{1-q^{-1}}).
$$
See \cite[(1.2.22), p. 4]{GR} for the general definition of ${}_r\phi_s(...;...;q,z)$.
Let $\displaystyle \delta_q=\frac{\sigma_q-1}{q-1}=x\,\Delta_q$, where $\Delta_q$ is defined in \cite[p. 488, (10.2.3)]{AAR}. By observing that
$\displaystyle n=\frac{\delta x^n}{x^n}$ and $\displaystyle \frac{1-q^n}{1-q}=\frac{\delta_q x^n}{x^n}$, a direct computation shows that
$\hat E(x;q)$ satisfies the $q$-analog of \eqref{equation:eqEuler} as follows:
$\displaystyle
(x\,\delta_q+1)y=x\,.
$ If one writes
\begin{equation}
\label{equation:ab1}\alpha=\frac{x}{q-1-x}\,,\quad \beta=(q-1)\,\alpha\,,
\end{equation}it follows from the above that
\begin{equation}
\label{equation:Eulerq}\left(\alpha\,\sigma_q+1\right)\hat E(x;q)=\beta\,.
\end{equation}
\begin{remark}
\label{rem:qEuler2} Let $\alpha$ be as in \eqref{equation:ab1}. The following identity holds in the field $\CC[x^{-1}][[x]]$:
\begin{equation}
\label{equation:qEuler2a}\left(\alpha\,\delta_q+\frac{1}{q-1-x}\right)\,\left(\alpha\,\delta_q-\frac1x+\frac{1}{q-1-x}\right)\hat E(x;q)^2=\alpha\,(\sigma_q\alpha-1)\,.
\end{equation}
Moreover, when $q\to1$, \eqref{equation:qEuler2a} is reduced into the following equivalent form of \eqref{equation:eqEuler2}:
\begin{equation}
\label{equation:eqEuler2a}
\left(\delta+\frac{1}{x}\right)\,\left(\delta+\frac{2}{x}\right)\hat E(x)^2=2\,.
\end{equation}
\end{remark}
To obtain \eqref{equation:qEuler2a}, one can apply \eqref{equation:beta} for $n=1$ and $n=2$, where $\alpha$ and $\beta$ are defined by \eqref{equation:ab1}. This gives that
$$\beta_1=(q-1)\,\alpha,\quad \beta_2=\beta-\alpha\,\sigma_q\beta=(q-1)\,\alpha\,\left(1-\sigma_q\alpha\right)\,.
$$
Thus, it follows from applying Theorem \ref{thm:gen} to \eqref{equation:Eulerq} that $\hat E(x;q)^2$ satisfies the following $q$-difference equation:
\begin{equation}
\label{equation:Euler2La}
L\left(\hat E(x;q)^2\right)=\alpha\,(\sigma_q\alpha-1)\,,
\end{equation}
where
\begin{equation}
\label{equation:Euler2L}
L=\frac{1}{(q-1)^2}\,\left(\alpha\,\sigma_q+1\right)\,\left(\alpha\,\sigma_q-\frac{1}{\alpha}\right)\,.
\end{equation}
By replacing $\sigma_q$ with $(q-1)\delta_q+1$ in \eqref{equation:Euler2L}, one gets that
\begin{equation*}
\label{equation:Euler2Lb}
L=\left(\alpha\,\delta_q+\frac{1+\alpha}{q-1}\right)\,\left(\alpha\,\delta_q+\frac{\alpha^2-1}{(q-1)\,\alpha}\right).
\end{equation*}
As $\displaystyle\alpha+1=\frac{q-1}{q-1-x}$ and $\displaystyle\alpha^2-1=\frac{(q-1)(2x-q+1)}{(q-1-x)^2}$, one deduces immediately \eqref{equation:qEuler2a} from \eqref{equation:Euler2La}. The limit equation form given in \eqref{equation:eqEuler2a} can be obtained from \eqref{equation:qEuler2a} by noticing both limits $\alpha\to-1$ and $\delta_q\to\delta$ for $q\to1$.
In the rest of this paper, we will suppose that $q>1$ even if, in most cases, the hypothesis $|q|>1$ may be really enough; see \cite{Ro} and \cite{RSZ}. Let us recall some results about the summability of power series solutions of $q$-difference equations. Given any linear $q$-difference operator $L$ of the following form:
$$
L=\sum_{j=0}^na_j\sigma_q^j\in\CC\{x\}[\sigma_q]\,,\quad a_0a_n\not=0\,,
$$
one definies its associated Newton polygon $\mathcal{NP}(L)$ as being the convex hull of the set $\{(j,m):m\ge \nu_0(a_j)\}$ in the strip $[0,n]\times [0,+\infty)$.
By following \cite[(3.1.2)]{MZ} and \cite[Proposition 5.14]{Zhang1}, one knows that,
if $\mathcal{NP}(L)$ admits only integer slopes, saying $\kappa_1\le \kappa_2\le ...\le \kappa_n$, then there exist $\nu\in\ZZ$, $\left(h_1, h_2, ..., h_n\right)\in\left(1+x\CC\{x\}\right)^n$ and $(c_0,c_1, ..., c_n)\in\left(\CC\setminus\{0\}\right)^{n+1}$ such that
\begin{equation}
L=c_0\,x^\nu\,h_1\,\left(x^{\kappa_1}\sigma_q+c_1\right)\,h_2\,\left(x^{\kappa_2}\sigma_q+c_2\right)\,...\,h_n\,\left(x^{\kappa_n}\sigma_q+c_n\right)\,.
\end{equation}
Furthermore, let $K^+=\ZZ_{>0}\cap\{\kappa_j:1\le j\le n\}$, and define $\vec k$ as follows:
\begin{equation}
\vec k=\left\{
\begin{array}{ll}\emptyset
&\textrm{if}\quad K^+=\emptyset\\
(k_1,...,k_m)& \textrm{if}\quad K^+=\{k_\ell: 1\le \ell\le m\} \ \textrm{and}\ k_1<...<k_m\,.
\end{array}
\right.
\end{equation}
By considering \cite[\S~3.3.5]{MZ}, it follows that any power series $\hat f\in\CC[[x]]$ such that $L(\hat f)\in\CC\{x\}$ remains convergent or is $Gq$-summable of order $\vec k=(k_1,...k_m)\in\ZZ_{>0}^m$ depending on whether $\vec k=\emptyset$ or not.
\begin{theorem}\label{thm:summability}
Given any integer $n\ge 2$, the $n$-th power $\hat E_q(x)^n$ is $Gq$-summable of order $(1,2,...,n)$.
And this is the same for $\hat E(x;q)^n$.
\end{theorem}
\begin{proof}
This follows from taking into account \eqref{equation:Eulern} or applying Theorem \ref{thm:gen} to \eqref{equation:Eulerq} with the help of Remark \ref{rem:ab}.
\end{proof}
Applying \cite[Theorem 36]{Ba} or \cite[Proposition 1.3.4.2]{Ma} implies that every power $\hat E(x)^n$ of the Euler series is Borel-summable at the same level, contrarily to what happens in the case of their respective $q$-analog $\hat E(x;q)^n$; see Theorem \ref{thm:summability} in the above. Furthermore, thanks to \cite[Theorem 3.15]{DVZ}, one knows that the $Gq$-sum of $\hat E(x;q)$ tends toward the Borel-sum of $\hat E(x)$ when $q\to 1^+$. In our coming work \cite{DZ}, it would be shown that, given one generic direction $d$ and two power series $\hat f_1$ and $\hat f_2$ such that $L_j(\hat f_j)\in\CC\{x\}$ for some $L_j\in\CC\{x\}[\sigma_q]$, where $j=1$ or $2$, the $Gq$-sum of $\hat f_1\hat f_2$ along $d$ is equal to the product of the $Gq$-sum of $\hat f_1$ along $d$ with that of $\hat f_2$. In this way, one would obtain that the $Gq$-sum of $\hat E_q(x)^n$ or $\hat E(x;q)^n$ can be really expressed as the $n$-th power of that of $\hat E_q(x)$ or $\hat E(x;q)$, respectively.
|
\section{Introduction}
For the Cabibbo-Kobayashi-Maskawa (CKM) matrix element $|V_{ub}|$,
there have been the long-standing inconsistent determinations
from the inclusive and exclusive $b$-hadron decays~\cite{review,pdg},
which might indicate the existence of new physics~\cite{Kang:2013jaa,
Feldmann:2015xsa,Crivellin:2009sd,Buras:2010pz,Crivellin:2014zpa,
Hsiao:2017umx,Hsiao:2015mca,Hsiao:2018zqd,Kim:2017dfr}.
For a careful examination,
the exclusive $B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell$ decay
can provide another path to determining $|V_{ub}|$, where
$\ell$ represents an electron or a muon.
Nonetheless, although $B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell$
has been observed many times~\cite{Behrens:1999vv,
Hokuue:2006nr,Sibidanov:2013rkk,delAmoSanchez:2010af},
it is essentially $B^{-}\to\rho^0 \ell^{-}\bar\nu_\ell$ along with $\rho^0\to\pi^+\pi^-$,
instead of a genuine four-body decay.
Recently, BELLE has newly reported the measurement of the branching fractions of
$B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell$
with the full $\pi\pi$ invariant mass ($M_{\pi\pi}$) spectrum~\cite{Beleno:2020gzt}.
In addition to the resonant processes of $B^{-}\to R\ell^{-}\bar\nu_\ell,R\to\pi^{+}\pi^{-}$
with $R=\rho^0$ and $f_2\equiv f_2(1270)$, the non-resonant contribution is also found.
Explicitly, we present the branching fractions as~\cite{Beleno:2020gzt,pdg,thesis}
\begin{eqnarray}\label{data1}
&&{\cal B}_{\text{T}}(B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell)
=(22.7^{+1.9}_{-1.6}\pm 3.4)\times 10^{-5
\,,\nonumber\\
&&{\cal B}_{\rho}(B^{-}\to\rho^0\ell^{-}\bar\nu_\ell,\rho^0\to\pi^{+}\pi^{-})
=(15.8\pm 1.1)\times 10^{-5
\,,\nonumber\\
&&{\cal B}_{f_2}(B^{-}\to f_2\ell^{-}\bar\nu_\ell,f_2\to\pi^{+}\pi^{-})
=(1.8\pm 0.9^{+0.2}_{-0.1})\times 10^{-5
\,,\nonumber\\
&&{\cal B}_{\text{N}}(B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell)
=(5.1\pm 4.3)\times 10^{-5}\,,
\end{eqnarray}
where ${\cal B}_{\text{T,N}}$
denote the total and non-resonant branching fractions, respectively,
while ${\cal B}_{\rho}\simeq{\cal B}(B^{-}\to\rho^0\ell^{-}\bar\nu_\ell)\times{\cal B}(\rho^0\to\pi^+\pi^-)$
is from PDG~\cite{pdg}.
By excluding ${\cal B}_{\rho,f_2}$ from ${\cal B}_{\text{T}}$,
we estimate ${\cal B}_{\text{N}}$ in Eq.~(\ref{data1}).
As depicted in Fig.~\ref{semi}, $B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell$
proceeds through the resonant and non-resonant $B\to \pi\pi$ transitions, respectively,
with the lepton-pair produced from the emitted $W$-boson.
One has been enabled to parameterize
the resonant $B\to\rho(f_2),\rho(f_2)\to\pi\pi$ transition~\cite{Cheng:2020ipp}.
Despite the theoretical attempts~\cite{Kang:2013jaa,Lee:1992ih,
Fajfer:1998yc,Hsiao:2017nga,Chua:2002pi,Chua:2004mi,
Boer:2016iez,Cheng:2019hpq,Feldmann:2018kqr,
Cheng:2017smj,Hambrock:2015aor,Hsiao:2019ann},
the non-resonant $B\to\pi\pi$ transition is still poorly understood.
With the full $\pi\pi$ invariant mass spectrum provided
for the first time, the information on the non-resonant $B\to\pi\pi$ transition form factors
($F_{\pi\pi}$) becomes available. Hence, we propose to
newly extract $|V_{ub}|$ and $F_{\pi\pi}$, by which we will be able to study ${\cal B}_{\text{N}}$.
We will also study the angular distribution and its asymmetry
to be compared to the future measurements.
\begin{figure}[t]
\centering
\includegraphics[width=3.2in]{semi_Btopipienu1.eps}
\includegraphics[width=3.2in]{semi_Btopipienu2.eps}
\caption{$B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell$ with
(a) non-resonant and (b) resonant contributions.}\label{semi}
\end{figure}
\section{Theoretical Framework}
The semileptonic $B^-\to\pi^+\pi^-\ell^-\bar \nu_\ell$ decay
is observed with the full $M_{\pi\pi}$ spectrum,
which indicates the existence of the non-resonant contribution~\cite{Beleno:2020gzt}.
Moreover,
the simulation is performed to seek the resonances
that contribute to $B^-\to\pi^+\pi^-\ell^-\bar \nu_\ell$.
It turns out that only a dominant peak and a small bump
are observed, which correspond to $B^-\to \rho^0\ell\bar \nu,f_2\ell\bar \nu$,
respectively, with $\rho^0,f_2\to \pi^+\pi^-$.
Therefore, the total amplitude of $B^-\to \pi^+\pi^-\ell^-\bar \nu_\ell$
can be written as
\begin{eqnarray}\label{amp1}
{\cal M}_{\text T}
&=&{\cal M}_{\text N}(B^-\to \pi^+\pi^-\ell\bar \nu_\ell)
+{\cal M}_{\rho}(B^-\to \rho^0\ell^-\bar \nu_\ell,\rho^0\to \pi^+\pi^-)\nonumber\\
&+&{\cal M}_{f_2}(B^-\to f_2\ell^-\bar \nu_\ell,f_2\to \pi^+\pi^-)\,,\nonumber\\
{\cal M}_{\text {N(R)}}
&=&\frac{G_F V_{ub}}{\sqrt 2}\langle \pi^+\pi^-|\bar u\gamma_\mu(1-\gamma_5)b|B^-\rangle_{\text{N(R)}}\,
\bar u_\ell\gamma^\mu(1-\gamma_5)v_\nu\,,
\end{eqnarray}
with $R=(\rho,f_2)$. The matrix elements of the (non-)resonant $B$ meson to $\pi\pi$ transitions
can be parameterized as~\cite{Pais:1968zza,Lee:1992ih}
\begin{eqnarray}\label{ff1}
&&\langle \pi^+(p_a)\pi^-(p_b)|\bar u\gamma_\mu(1-\gamma_5)b|B^-\rangle_N\nonumber\\
&=&
h\epsilon_{\mu\nu\alpha\beta}p_B^\nu p^\alpha (p_b-p_a)^\beta
+irq_\mu+iw_+ p_\mu+iw_-(p_b-p_a)\,,\nonumber\\
&&\langle \pi^+(p_a)\pi^-(p_b)|\bar u\gamma_\mu(1-\gamma_5)b|B^-\rangle_{\rho(f_2)}\nonumber\\
&=&
\langle \pi^+\pi^-|\rho(f_2)\rangle \frac{i}{(t-m_{\rho(f_2)}^2)+im_{\rho(f_2)}\Gamma_{\rho(f_2)}}
\langle \rho(f_2)|\bar u\gamma_\mu(1-\gamma_5)b|B^-\rangle\,,
\end{eqnarray}
with $p=p_b+p_a$, $q=p_B-p=p_\ell+p_\nu$, $(s,t)\equiv (q^2,p^2)$, and
the form factors $F_{\pi\pi}=(h, r, w_{\pm})$.
The matrix elements of $B\to \rho(f_2)$ transition
are written as~\cite{Wang:2010ni,Cheng:2010yd,Zuo:2021kui}\\
\begin{eqnarray}\label{ff2}
\langle \rho(f_2)|\bar u\gamma_\mu b|B\rangle&=&\epsilon_{\mu\nu\alpha\beta}
\epsilon^{(\prime)\nu}p_B^{\alpha}p_{\rho(f_2)}^{\beta}
\frac{2V_1^{(\prime)}}{m_{B}+m_{\rho(f_2)}}\;,\nonumber\\
\langle \rho(f_2)|\bar u\gamma_\mu \gamma_5 b|B\rangle
&=&i\bigg[\epsilon^{(\prime)}_\mu
-\frac{\epsilon^{(\prime)}\cdot p_B}{s}q_\mu\bigg](m_B+m_{\rho(f_2)})A_1^{(\prime)}
+ i\frac{\epsilon^{(\prime)}\cdot p_B}{s}q_\mu(2m_{\rho(f_2)})A_0^{(\prime)}\nonumber\\
&-&i\bigg[(p_B+p_{\rho(f_2)})_\mu-
\frac{m^2_B-m^2_{\rho(f_2)}}{s}q_\mu \bigg](\epsilon^{(\prime)}\cdot p_B)
\frac{A_2^{(\prime)}}{m_B+m_{\rho(f_2)}}\;,
\end{eqnarray}
with $\epsilon^{\prime\mu}\equiv \epsilon^{\mu\nu}p_{B\nu}/m_B$ and
the form factors $F_{\rho(f_2)}=(V_1^{(\prime)}, A_{0,1,2}^{(\prime)})$, where
$\epsilon^\nu$ and $\epsilon^{\mu\nu}$ are the polarization vector and tensor, respectively.
To describe the $\rho^0,f_2\to \pi^+\pi^-$ decays,
$\langle \pi\pi|\rho,f_2\rangle$ in Eq.~(\ref{amp1})
are given by~\cite{Cheng:2020ipp,Kim:2017dfr,Suzuki:1993zs}
\begin{eqnarray}
\langle \pi\pi|\rho\rangle&=&g_1 \epsilon\cdot (p_b-p_a)\,,\;\nonumber\\
\langle \pi\pi|f_2\rangle&=&g_2\epsilon^{\mu\nu}p_{a\mu}p_{b\nu}\,,
\end{eqnarray}
where $g_{1,2}$ are strong coupling constants. To sum over
the vector and tensor spins for $\rho$ and $f_2$, respectively,
as the intermediate states in the resonant $B\to\pi\pi$ transitions,
we use the following identities~\cite{Wang:2010ni,Cheng:2010yd,Zuo:2021kui},
\begin{eqnarray}
\Sigma\epsilon_\mu \epsilon^*_{\mu'}
&=&M_{\mu\mu'}\,,\nonumber\\
\Sigma\epsilon_{\mu\nu} \epsilon^*_{\mu'\nu'}
&=&{1\over 2}M_{\mu\mu'}M_{\nu\nu'}+{1\over 2}M_{\mu\nu'}M_{\nu\mu'}
-{1\over 3}M_{\mu\nu}M_{\mu'\nu'}\,,
\end{eqnarray}
with $M_{\mu\mu'}=-g_{\mu\mu'}+p_\mu p_{\mu'}/p^2$.
The form factors in Eqs.~(\ref{ff1},\,\ref{ff2}) are momentum-dependent, modelled
in the single-pole or double-pole forms~\cite{Wang:2010ni,Cheng:2010yd,Zuo:2021kui}:
\begin{eqnarray}\label{p_depent}
F_\rho(s)&=&\frac{F_\rho(0)}{1-s/m_V^2}\,,\nonumber\\
F_{f_2}(s)&=&\frac{F_{f_2}(0)}{(1-s/m_B^2)^2}\,,\nonumber\\
F_{\pi\pi}(t)&=&\frac{F_{\pi\pi}(0)}{1-a\,(t/m_B^2)+b\,(t/m_B^2)^2}\,,
\end{eqnarray}
where $F_{\rho,f_2}(s)$ have been studied in QCD models, whereas
$(a,b,F_{\pi\pi}(0))$ need to be extracted in the global fit.
\begin{figure}[t]
\centering
\includegraphics[width=3.0 in]{kinematics.eps}
\caption{The angular variables $(\theta_{M}, \theta_{L},\phi)$
in the four-body $B^-\to\pi^+\pi^-\ell^-\bar \nu_\ell$ decay.}\label{4body}
\end{figure}
For the four-body decay channel $B^-(p_B)\to \pi^+(p_a)\pi^-(p_b)\ell^-(p_\ell)\bar \nu_\ell(p_\nu)$,
one has to integrate over
the kinematic variables $(s,t,\theta_M,\theta_L,\phi)$ in the phase space.
See Fig.~\ref{4body},
$\theta_{M(L)}$ is the angle between $\pi^+$ and $\pi^-$ ($\ell^-$ and $\bar \nu_\ell$)
moving directions in the $\pi^+\pi^-$ ($\ell^-\bar \nu_\ell$) rest frame.
In addition,
the angle $\phi$ is between the $\pi^+\pi^-$ and $\ell^-\bar \nu_\ell$ planes,
defined by $\vec{p}_{a,b}$ and $\vec{p}_{\ell,\bar \nu_\ell}$, respectively,
in the $B$-meson rest frame.
Then, the partial decay width reads~\cite{Geng:2011tr,Geng:2012qn}
\begin{eqnarray}\label{dGamma}
d\Gamma=\frac{|{\cal M}|^2}{4(4\pi)^6 m_B^3}X
\alpha_M\alpha_L\, ds\, dt\, d\text{cos}\,\theta_M\, d\text{cos}\,\theta_L\, d\phi\,,
\end{eqnarray}
where $X$, $\alpha_{M}$ and $\alpha_{L}$ are defined by
\begin{eqnarray}
X&=&\bigg[\frac{1}{4}(m_B^2-s-t)^2-st\bigg]^{1/2}\,,\nonumber\\
\alpha_{M}&=&\frac{1}{t}\lambda^{1/2}(t,m_{\pi}^2,m_{\pi}^2)\,,\nonumber\\
\alpha_{L}&=&\frac{1}{s}\lambda^{1/2}(s,m_{\ell}^2,m_{\bar \nu}^2)\,,
\end{eqnarray}
with $\lambda(a,b,c)=a^2+b^2+c^2-2ab-2bc-2ca$.
The allowed ranges for $(s,t)$ and the angular variables
($\theta_M,\theta_L,\phi$) are given by
\begin{eqnarray}
(m_{\ell}+m_{\bar \nu_\ell})^2&\leq& s\leq (m_{B}-\sqrt{t})^2\,,\;\;\nonumber\\
4m_\pi^2&\leq& t\leq (m_B-m_{\ell}-m_{\bar \nu_{\ell}})^2\,,\nonumber\\
0&\leq& \theta_{M,L}\leq \pi\,,\;\;\nonumber\\
0&\leq& \phi\leq 2\pi\,,
\end{eqnarray}
with $m_{\ell}+m_{\bar \nu_\ell}\simeq 0$.
From Eq. (\ref{dGamma}), we define the angular distribution asymmetry as
\begin{eqnarray}\label{AFB}
{A}_{\theta_M}\equiv\frac{\int^{+1}_0\frac{d\Gamma}{d\cos\theta_{M}}d\cos\theta_M
-\int^0_{-1}\frac{d\Gamma}{d\cos\theta_M}d\cos\theta_M}{\int^{+1}_0\frac{d\Gamma}{d\cos\theta_M}
d\cos\theta_M+\int^0_{-1}\frac{d\Gamma}{d\cos\theta_M}d\cos\theta_M}\;,
\end{eqnarray}
where $d\Gamma/d\cos\theta_M$ is the angular distribution.
\begin{table}[t!]
\caption{The $B$ to $(\rho, f_2)$ transition form factors
with $M_V=7.0$~GeV in Eq.~(\ref{p_depent})~\cite{DelDebbio:1997ite,Cheng:2010yd}.
Here, we present $\sqrt 2 F_{\rho^0}=F_{\rho}$ for the $B$ to $\rho^0$ transition.}\label{tab1}
\begin{tabular}{|c|ccc|}
\hline
&$V_1^{(\prime)}$& $A_1^{(\prime)}$ & $A_2^{(\prime)}$ \\
\hline
$\sqrt 2 F_{\rho^0}(0)$
&$0.35^{+0.06}_{-0.05}$ & $0.27^{+0.05}_{-0.04}$ & $0.26^{+0.05}_{-0.03}$ \\
$F_{f_2}(0)$
&$(0.18\pm 0.02)$ & $(0.13\pm 0.02)$ & $(0.12\pm 0.02)$\\
\hline
\end{tabular}
\end{table}
\newpage
\section{Numerical analysis}
In the numerical analysis,
we perform the minimum $\chi^2$-fit, in order to extract
$|V_{ub}|$, $F_{\pi\pi}$ and $\delta_{1,2}$ as the free parameters,
where $\delta_{1(2)}$ is the relative phase for ${\cal A}_{\rho(f_2)}$.
The equation of the $\chi^2$-fit is given by
\begin{eqnarray}\label{fitEQ}
\chi^2&=&
\bigg(\frac{{\cal B}_{\rho\,th}-{\cal B}_{\rho\,ex}}{\sigma_{\rho\,ex}}\bigg)^2+
\bigg(\frac{{\cal B}_{f_2\,th}-{\cal B}_{f_2\,ex}}{\sigma_{f_2\,ex}}\bigg)^2
\,\nonumber\\
&&+
\sum_{i} \bigg(\frac{\frac{d{\cal B}^i_{th}}{dM_{\pi\pi}}-\frac{d{\cal B}^i_{ex}}{dM_{\pi\pi}}}{\sigma_{ex}^i}\bigg)^2
+\sum_{j} \bigg(\frac{F_{\rho(f_2)}^j-F_{th\,\rho(f_2)}^j}{\delta F_{th\,\rho(f_2)}^j}\bigg)^2\,,
\end{eqnarray}
where $d{\cal B}/dM_{\pi\pi}$ denotes the partial branching ratio, and
$\sigma_{ex}$ ($\delta F_{th}$) the uncertainty from the observation (form factor).
${\cal B}_{\rho(f_2)\,th}$ and $d{\cal B}_{th}/dM_{\pi\pi}$
are the theoretical inputs from the amplitudes in Eq.~(\ref{amp1}), and
the experimental inputs are given in Eq.~(\ref{data1}) and Fig.~\ref{fig:spectrum}.
We take $F_\rho$ and $F_{f_2}$ in Table~\ref{tab1} as the initial values in Eq.~(\ref{fitEQ}),
together with $|g_1|=5.98$ and $|g_2|=18.56$~GeV$^{-1}$~\cite{Hsiao:2019ait,Suzuki:1993zs}.
Subsequently, we extract that
\begin{eqnarray}\label{fit1}
&&
|V_{ub}|=(3.31\pm 0.61)\times 10^{-3}\,,\nonumber\\
&&
a=(0.96\pm 0.93)\times m_B^2,\;
b=(1.84\pm 0.87)\times m_B^4,\;\nonumber\\
&&
h(0)=1.90\pm 0.43\,,\,
w_+(0)=6.16\pm 3.41\,,\,
w_-(0)= 3.67\pm 1.79\,,\nonumber\\
&&
(\delta_1,\delta_2)=(-111.6\pm 29.3,0.0\pm 1.4)^\circ\,\nonumber\\
&&
\chi^2/n.d.f=1.1\,,
\end{eqnarray}
with $n.d.f=7$ the number of degrees of freedom.
The form factors $V_1^{(\prime)}$ and $A_{1,2}^{(\prime)}$
are fitted to slightly deviate from their initial inputs in Table~\ref{tab1},
given by
\begin{eqnarray}\label{fit2}
&&
(V_1(0),A_1(0),A_2(0))=(0.35\pm 0.06,0.29\pm 0.04,0.28\pm 0.04)\,,\nonumber\\
&&
(V'_1(0),A'_1(0),A'_2(0))=(0.18\pm 0.02,0.11\pm 0.02,0.14\pm 0.02)\,.
\end{eqnarray}
Nonetheless, $r$ and $A_0^{(\prime)}$ in Eqs.~(\ref{ff1}, \ref{ff2})
are not involved in the global fit, since they have been vanishing
with $q_\mu\bar u_\ell\gamma^\mu(1-\gamma_5)v_\nu=0$
in the amplitudes, where the lepton pair is nearly massless.
Using the fit results in Eqs.~(\ref{fit1},\ref{fit2}), we obtain
\begin{eqnarray}\label{result1}
&&{\cal B}_{\text{T}}(B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell)
=(19.6\pm 7.9^{+7.5+0.7}_{-5.4-0.1})\times 10^{-5}\,,\nonumber\\
&&{\cal B}_{\rho}(B^{-}\to\rho^0\ell^{-}\bar\nu_\ell,\rho^0\to\pi^{+}\pi^{-})
=(15.8\pm 6.4^{+7.1}_{-5.7})\times 10^{-5}\,,\nonumber\\
&&{\cal B}_{f_2}(B^{-}\to f_2\ell^{-}\bar\nu_\ell,f_2\to\pi^{+}\pi^{-})
=(2.6\pm 1.1^{+1.2}_{-0.9})\times 10^{-5}\,,\nonumber\\
&&{\cal B}_{\text{N}}(B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell)
=(3.5\pm 1.4^{+4.3}_{-2.4})\times 10^{-5}\,,
\end{eqnarray}
where the first errors are from $|V_{ub}|$,
the second ones from the form factors, and
the third error for ${\cal B}_T$ from the relative phase $\delta_1$.
Moreover, we draw the partial branching fractions as the functions of
$M_{\pi\pi}$ and $\cos\theta_M$ in Fig.~\ref{fig:spectrum} and Fig.~\ref{AD}, respectively.
We also calculate the angular distribution asymmetries,
given by
\begin{eqnarray}\label{result2}
&&
{A}_{\theta_M,\text{T}}(B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell)
=(1.3\pm 8.9^{+0.8}_{-2.5})\%\,,\nonumber\\
&&
{A}_{\theta_M,\rho}(B^{-}\to\rho^0\ell^{-}\bar\nu_\ell,\rho^0\to\pi^{+}\pi^{-})
=(0.20\pm 0.04)\%\,,\nonumber\\
&&
{A}_{\theta_M,f_2}(B^{-}\to f_2\ell^{-}\bar\nu_\ell,f_2\to\pi^{+}\pi^{-})
=(0.31\pm 0.08)\%\,,\nonumber\\
&&
{A}_{\theta_M,\text{N}}(B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell)
=(-43.0\pm 22.3)\%\,,
\end{eqnarray}
where the first errors come from the uncertainties of the form factors, and
the second error for ${A}_{\theta_M,\text{T}}$ is from the relative phase $\delta_1$.
\begin{figure}[t!]
\centering
\includegraphics[width=3.8in]{spectrumA.eps}
\caption{The $\pi\pi$ invariant mass spectrum, where
the solid curve that takes into account the all contributions
explains the data points from BELLE~\cite{Beleno:2020gzt}.
On the other hand, the dashed (dotted) and dot-dashed curves depict
the contributions from $B^-\to\rho(f_2)\ell\bar \nu,\rho(f_2)\to \pi^+\pi^-$, and
non-resonant $B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell$, respectively.}\label{fig:spectrum}
\end{figure}
\section{Discussions and Conclusions}
\begin{figure}[t!]
\centering
\includegraphics[width=3.8in]{spectrumB.eps}
\caption{Angular distributions of $B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell$,
where the solid, dashed, dotted and dot-dashed curves
represent the same contributions as those in Fig.~\ref{fig:spectrum}.}\label{AD}
\end{figure}
We study $B^-\to\pi^+\pi^-\ell\bar \nu$, in order to explain
the $\pi\pi$ invariant mass spectrum observed by BELLE~\cite{Beleno:2020gzt}.
In Fig.~\ref{fig:spectrum},
the curves for $B^-\to(\rho^0,f_2)\ell\bar \nu,(\rho^0,f_2)\to \pi^+\pi^-$
are shown to barely fit the first three data points in the spectrum.
Nonetheless, the non-resonant $B^-\to\pi^+\pi^-\ell\bar \nu$
raises the contribution as the dot-dashed curve describes. As a result,
the solid curve that takes into account the resonant and non-resonant contributions
is able to explain the data, with $\chi^2/d.o.f=1.1$ that presents a reasonable fit.
The relative phase
$\delta_1=-111.6^\circ$ causes a destructive interference
between the non-resonant $B^-\to \pi^+\pi^-\ell\bar \nu$ and
$B^-\to\rho^0\ell\bar \nu,\rho^0\to\pi^+\pi^-$.
As a demonstration, we turn off $\delta_1$ and obtain ${\cal B}_T=22.2\times 10^{-5}$.
By contrast, $\delta_2$ is fitted to be zero, in accordance with
the fact that the non-resonant contribution is tiny in the range of $M_{\pi\pi}>1$~GeV,
barely having the interference with $B^-\to f_2\ell\bar \nu,f_2\to\pi^+\pi^-$.
It turns out that ${\cal B}_{\text{N}}=(3.5\pm 1.4^{+4.3}_{-2.4})\times 10^{-5}$
is given for the first time.
Also importantly, we determine $|V_{ub}|=(3.31\pm 0.61)\times 10^{-3}$
from the first genuine four-body semileptonic $B\to\pi\pi\ell\bar \nu$ decay,
instead of $B^-\to \rho^0\ell\bar \nu,\rho^0\to\pi^+\pi^-$.
For the angular distribution asymmetries, we obtain
${A}_{\theta_M,\rho(f_2)}=0$, showing the symmetric distributions as
the curves in Fig.~\ref{AD}.
By contrast, $|{A}_{\theta_M,\text{N}}|$ is as large as $40\%$.
This is due to the main contributions from the form factors
$w_+(p_b+p_a)_\mu$ and $w_-(p_b-p_a)$.
With $p_b+p_a=(2E_b,\vec{0})$ and $p_b-p_a=(0,2\vec{p}_b)$
in the $\pi^+(p_a)\pi^-(p_b)$ rest frame (see Fig.~\ref{4body}),
the projection of $w_\mp(p_b\mp p_a)$ onto the four-momentum of the lepton pair system
causes a $\cos\theta_M$-(in)dependent term,
such that their interference leads to the large angular distribution asymmetry.
In summary, we have studied the semileptonic $B^-\to\pi^+\pi^-\ell\bar \nu$ decay.
With the full $\pi\pi$ invariant mass spectrum observed by BELLE,
we have determined $|V_{ub}|=(3.31\pm 0.61)\times 10^{-3}$ agreeing with
the other exclusive determinations. Besides, we have extracted
the non-resonant $B\to\pi\pi$ transition form factors, by which
we have predicted the non-resonant branching fraction
${\cal B}_{\text{N}}(B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell)
=(3.5\pm 1.4^{+4.3}_{-2.4})\times 10^{-5}$. We have also predicted
the non-resonant angular distribution asymmetry
${A}_{\theta_M,\text{N}}(B^{-}\to\pi^{+}\pi^{-}\ell^{-}\bar\nu_\ell)
=(-43.0\pm 22.3)\%$ to be checked by the future measurements.
\section*{ACKNOWLEDGMENTS}
This work was supported by National Science Foundation of China (No. 11675030).
|
\section{Introduction}
Arguably, individuals form groups to achieve more ambitious goals than they could achieve alone~\citep{allportInfluenceGroupAssociation1920,caporaelPartsWholesEvolutionary2001}. Yet, for groups to proverbially become more than the sum of their parts, they need to organize into effective structures: division of labor~\cite{rozasLoosenControlLosing2021}, structures of information flow and the structure of interpersonal relations~\citep{akdereEconomicsSocialCapital2008}, as well as a well internalized organizational culture are crucial for group performance.
Not surprisingly then, the structure of online collaboration teams and peer production systems, such as Free/Open Source Software (FOSS) or Wikipedia, have often been analyzed to pinpoint those structural properties that determine the quality of group work. Bipartite, collaboration networks (e.g.~co-editing of Wikipedia articles or co-contributions to files in FOSS projects) are the most likely targets of such analysis, as they show how contributors interact with each other when performing the actual tasks. For example, longer path lengths in co-edition networks of groups of editors on English Wikipedia are related to lower performance of the group~\citep{plattNetworkStructureEfficiency2018}. In FOSS projects, contributors self-organize into subgroups working on similar subsets of files in a bottom-up manner~\citep{palazziOnlineDivisionLabour2019}, by performing spontaneously self-chosen and self-defined tasks~\citep{chelkowskiInequalitiesOpenSource2016}, or self-select to tasks (e.g.~modules) in a well-defined hierarchy of labor division~\citep{mozillaRolesLeadership2021Special}.
However, a long-standing line of research on group work in offline settings shows that task-related structuring of the group is not enough for high performance. Task-related group interaction is accompanied by affiliation-related interaction~\citep{balesEquilibriumProblemSmall1953,balesHowPeopleInteract1955}. The task (instrumental) domain of group dynamics drives the group to differentiate, while the affiliation processes (affective domain) focus on integration and promote uniformity~\citep{balesHowPeopleInteract1955}.
Affiliation processes are important not only for the wellbeing of group members: group cohesion is positively related to performance~\citep{bealCohesionPerformanceGroups2003,evansGroupCohesionPerformance1991}. While instrumental, task-related activities can be organized by procedures and rules, social bonding within the group crucially relies on interpersonal communication. In organizations, coordination of work often happens in informal communication, alongside formal structures of management~\citep{beerDecisionControlMeaning1994}. Thus, the structure of interpersonal communication within online peer production groups - specifically, its cohesiveness - should affect the groups’ performance.
In this work, we focus on communication using direct messages within collaborating groups on the English Wikipedia. We used a mixed-methods approach - quantitative social network analysis and qualitative analysis of interviews - to analyze Wikipedia’s topic oriented editor groups: Wikiprojects. By reconstructing networks of direct messages and interviewing core members from selected projects we were able to elucidate how interpersonal interaction, and specifically affiliation related communication, impacts quality of group work. We show that high quality of group work is related to communication networks with strong ties, which also exhibit integrated connection structure, straying off the typical leader – followers, star-like motifs. We also found that direct messaging is associated with motivational messages and outreach, and with tapping on the group’s social capital. Taken together, our results suggest that communication structures that allow for complex integration of resources and knowledge distributed across specialized contributors within the group are conducive to group efficiency.
\section{Background and related work}
Quality of Wikipedia has been a topic in both public and academic discourse since its inception~\citep{jemielniakCulturalDiversityQuality2017,shafeeEvolutionWikipediaMedical2017,smith2020situating}. On the one hand, its popularity combined with lack of professional oversight over the content, raised concerns of possible misinformation of the general public~\citep{lanierDigitalMaoismHazards2006}. On the other hand, the process of bottom up encyclopedic content creation raised interest in self-organization possibilities afforded by new media~\citep{shirkyHereComesEverybody2008}. Thus, understanding how quality products emerge from bottom up social processes is both important for the public at large as well as for theoretical advancement of systems research.
With the growth of Wikipedia, and with refinement of its peer production process, the understanding of self-organized quality control has been accumulating~\citep{nemotoSocialCapitalIncreases2011,plattNetworkStructureEfficiency2018,qinInfluenceNetworkStructures2015}. Most importantly, Wikipedia’s peer review process and quality scores awarded to articles provide an opportunity to quantify the effects of distributed work and allow comparisons against a single scale of quality ratings.
\subsection{Quality in peer production}
For the average reader of Wikipedia, the quality grades of Featured Article (thereafter referred to as FA) or Good Article (GA) – a star or a plus sign, respectively, displayed at the top of the page – might be unnoticeable, but for Wikipedia editors they are cherished marks of accomplishment. Many editors list the FA and GAs they contributed to on their Wikipedia profile pages. The review process that awards those ratings is in many respects similar to academic reviews: the criteria for each rank of article quality are listed explicitly, and each submission is reviewed by independent editors whose remarks are then incorporated into the article. The difference lies in that at the end of the process, a discussion unfolds, and any editor can voice their opinion on whether the article is worthy of a particular quality mark; the ensuing decision is consensus based\footnote{%
\url{https://en.wikipedia.org/wiki/Wikipedia:Featured_article_review}
}.%
The universal criteria (well-known and applicable to all candidate articles) as well as independent review process makes these quality ratings suitable for a quality measurement of peer produced work.
The availability of such quality measures has spurred much investigation into what constitutes quality work. Interestingly, quality criteria differ among language versions of Wikipedia, pointing to possible differences in quality perceptions across cultures~\citep{jemielniakCulturalDiversityQuality2017}. On one hand, particular features of articles that predict well how close they are to being awarded a higher quality grade, can be identified. For example, classifiers trained on previously assessed articles can tell how close an article is to a certain quality rank~\citep{warncke2013tell}. On the other hand, the process of article production can also be investigated to pinpoint those properties that enable some articles to improve in quality much faster than others.
In standard organizations’ production process, quality is ensured, among others, through a careful division of labor among employees with appropriate expertise. In online peer production systems, contributors self-select to tasks~\citep{benklerCoasePenguinLinux2002}, and thus it has been suggested that composition of the editor base impacts quality of Wikipedia articles. \citet{sydow2017diversity} have found that articles edited by contributors of rich and broad background – i.e. those that in their history have edited many varied articles – are more likely to reach FA status. This might not only be an effect of broader subject expertise of these editors but also of a process of \enquote{creative abrasion} wherein editors with varied knowledge and experience engage in discussions to resolve their differences, which leads to article improvement~\citep{arazyInformationQualityWikipedia2011}. Whilst some abrasion might be positive and promote quality, too much of conflict can also be detrimental~\citep{arazyStayWikipediaTask2013}. It seems there is an optimal level of diversity of contributors working on an article and that it is moderated by the size of the group: smaller groups can be less diverse and still deliver high quality articles~\citep{robertCrowdSizeDiversity2015}.
Diversity might be a factor positively impacting quality, but combining diverse inputs requires processes of coordination, which are recognized as a crucial aspect of quality control in standard organizations~\citep{beerViableSystemModel1984}. In online social systems coordination is peer produced in a similar manner to product development~\citep{benklerCoasePenguinLinux2002}. That is, contributors self-select to perform coordination tasks. Not surprisingly, coordination plays a part in creating quality articles on Wikipedia: even such simple coordination as splitting into core and periphery roles (defined as editors who submit the bulk of content vs. editors who make minor additions) increases the chances for FA status~\citep{kitturHarnessingWisdomCrowds2008}. Interestingly, without such a split, simple increase in the number of editors did not lead to improved quality (ibid.).
Finally, an important factor impacting quality is engagement. In standard organizations motivation and conscientiousness can be promoted by various incentives, including financial ones. In online peer production other incentives are at play: ranging from reputation, to self-development, to socializing~\citep{oregExploringMotivationsContributing2008}. Engagement can be induced or sustained by interactions with other, well-socialized members of the community: welcoming messages, assistance and constructive criticism increase commitment of new editors on Wikipedia and increase the chances for their prolonged contribution~\citep{choiSocializationTacticsWikipedia2010}. Such motivational activities are mostly carried out by sending direct messages, i.e. editing a newcomer’s personal talk page~\citep{zhu2011identifying}. Whilst core community members send more such messages per person, in total peripheral members deliver the bulk of engagement related direct messaging, contributing to the shared leadership within Wikipedia~(ibid.). Interestingly, within the thematic oriented groups on Wikipedia (Wikiprojects) task related and feedback related direct messages are initiated more often by peripheral members while socializing aimed messages are sent more often by core members~(ibid.). This suggests that just as it happens in offline groups~\citep{balesHowPeopleInteract1955}, in online peer production communities social and task leadership is divided to a degree.
\subsection{Direct communication in group work}
Interpersonal, one-on-one communication not only affects motivation of group members but it is also the vehicle for much coordination in standard organizations. Whilst formal oversight and management are important for policy and top-level management, coordination of tasks is often carried out in informal meetings or communication~\citep{beerDecisionControlMeaning1994}. Dyadic relationships and communication play a role in maintaining motivation, engagement and cohesiveness of a group~\citep{lidenDyadicRelationships2016}, contributing to the affective domain within the group~\citep{balesHowPeopleInteract1955}. Through dyadic interactions, members of the group transmit emotional support and share task-related resources~\citep{omilion-hodgesContextualizingLMXWorkgroup2013}. Direct communication also warrants social learning, i.e. learning that occurs through observation and direct instruction of more experienced team members~\citep{singh2013social}.
In digital collaboration, personal messages have also been identified as impacting group work. For example, informal, direct communication among distributed workers helps to build bonds and ensures effective information flow~\citep{hindsUnderstandingConflictGeographically2005}. The importance of direct communication in distributed teams is corroborated by the fact that activity on user pages on the English Wikipedia continued to grow in spite of declining number of edits on article pages~\citep{nemotoSocialCapitalIncreases2011}. Moreover, disassortative direct communication network structures – i.e.~linkages between hubs and periphery of the networks – are prevalent among Wikipedia’s Wikiproject teams and mild disassortativity is related to higher quality of articles that these projects curate~\citep{rychwalskaQualityPeerProduction2020}.
\subsection{Summary and hypotheses}
The effectiveness of an online collaboration group – i.e.~the quality of its products – can~thus be related to both its task related structuration that ensures proper task performance and to interpersonal relations (affiliation processes) that allow coordination and promote engagement~\citep{balesEquilibriumProblemSmall1953}. The former has been extensively studied in both Wikipedia and FOSS by investigating division of labor and (co-)contribution patterns (e.g.~\cite{arazyFunctionalRolesCareer2015,plattNetworkStructureEfficiency2018}). Relation building and motivational structures, on the other hand, have been much less investigated; yet offline theory and research of group processes as well as initial investigations into the role of personal messaging indicate that it plays a crucial role in group effectiveness. Specifically, the content of direct communication has been shown to impact motivation to contribute~\citep{choiSocializationTacticsWikipedia2010} and to relate to relational leadership~\citep{zhu2011identifying}, however the structure of such communication may also play a role.
On Wikipedia this structure can be gleaned from direct messages sent between editors and analyzed as a network~\citep{rychwalskaQualityPeerProduction2020}. If indeed direct messages are a vehicle for building and maintaining engagement,
\textbf{(H1)} successful collaborating groups will exchange a larger volume of such messages than unsuccessful ones. Moreover, if they are a means for self-regulation and coordination
\textbf{(H2)}, direct communication structure of successful teams will allow for both local, specialized information sharing as well as global integration of information within the group~\citep{kleinEmergenceInformativeHigher2020}. Finally, if they serve as a vehicle for group integration
\textbf{(H3)} direct messages will link a larger part of the group (rather than some selected group members) within successful groups than unsuccessful ones. To test these three hypotheses we have designed an exploratory study into the communication structure of thematic groups on English Wikipedia: Wikiprojects, and into its impact on the effects of group work: quality of articles. For each project we have reconstructed a network of direct messaging and measured the related properties: average node strength, network degeneracy and determinism (components of effective information as defined by~\citet{kleinEmergenceInformativeHigher2020}), and fraction of project editors that take part in direct communication network. We related these network properties to the quality of articles within the relevant project’s scope and we found that direct communication networks with high effective information and strong links are related to more effective group work. To investigate in depth the role of such cohesive communication networks in Wikiprojects’ work and with results of our quantitative analysis in mind, we designed semi-structured interviews that we then carried out with selected members of two projects: the one that was most successful with regard to producing quality articles (Tropical Cyclones), and one that was the fastest growing project in 2020 (COVID-19). We found that direct messaging is crucial for feedback on individual work and that one-on-one communication networks play a part in tapping on the groups’ social capital.
\section{Methods}
We conducted a Thick Big Data analysis~\citep{jemielniakThickBigData2020} of collaboration on English Wikipedia. Thick Big Data is a novel mixed-method approach, allowing for combining quantitative analysis of large datasets with deep, qualitative inquiry. In our case, the analysis relied on combining qualitative interviews with heavily engaged Wikiproject participants and network analysis of direct communication within the projects.
\subsection{Wikiprojects}
As our unit of analysis we have chosen English Wikipedia’s Wikiprojects. These are groups of editors that work together on encyclopedic articles related to a specific topic\footnote{%
\url{https://en.wikipedia.org/wiki/Wikipedia:WikiProject}
}.%
For example, there is a project on Military History, on Michael Jackson or on the Simpsons. Projects vary in scope (i.e.~the number of articles they curate), depending both on the breadth of the subject as well as on its popularity among Wikipedians (the more editors are interested in a particular topic, the more articles they will create and the better the coverage of this topic on Wikipedia). There is one thing all projects share, though: they all strive to improve the quality of articles within their scope. To achieve this goal they use various methods of coordination - from discussion on article importance, to editathons and drives to improve articles, to templates and preparing manuals of style, among others. Each Wikiproject has a dedicated space on the so-called project namespace on Wikipedia. In there, the goals, rules and procedures, as well as current information on the project are displayed~(Fig.~\ref{fig:wp-diagram}). These spaces also include talk pages that are used for discussion of current issues within the project.
\begin{figure}[!t]
\centering
\includegraphics[width=\textwidth]{figures/wp-diagram}
\caption{Screenshots from the Wikipedia coordination space for Wikiproject Military History: (a.) the front page, delineating the goal of the project; (b.) fragment of a section with pending tasks for members to work on; (c.) quality statistics for the project; and (d.) fragment of the member list where Wikipedians can join the project.}
\label{fig:wp-diagram}
\end{figure}
\subsection{Data gathering and network construction}
Source code of all user talk pages on English Wikipedia was collected via Wikipedia API\footnote{%
\url{https://en.wikipedia.org/w/api.php}
during the first half of February 2021 (the process ended on February 11) using the \textit{CirrusDoc} query endpoint. Simultaneously, information on all quality assessments of articles available in the main encyclopedia (so-called main namespace) was extracted using the \textit{AllPages} query method of Wikipedia API (the process ended on February 12). Inconsistent naming of Wikiprojects was standardized. The extraction process spanned several days as in both cases a high level of auto-throttling was used in order not to consume too much of Wikipedia API bandwidth.
Next, we defined sets of Wikipedia editors associated with individual projects as all editors who left at least one signed message on one of the project pages (but not talk pages) belonging to a given Wikiproject. Crucially, project pages also include lists of project members which consist of (usually) user signatures. Hence, we included all editors properly signed on member lists as well as all who contributed in a detectable way to creation of project pages of a given Wikiproject. This second case is important as not all editors active within a project choose to sign up to member lists. We consciously did not include all editors who contributed to the encyclopedic articles curated by projects, as such lists would include many accidental editors, not collaborating within the projects.
Then, we used a discussion parser tailored for Wikipedia talk pages~\citep{talagaSztalWikitalkparserInitial2021} to extract all discussion threads from talk pages of all users who were identified as Wikiproject editors. The threads selected by the parser included template based messages (such as warnings, barnstars, welcome messages, etc.) but did not include mass messaging, such as newsletters.
Finally, the discussion threads were used to define undirected weighted links between pairs of editors who left messages on each other’s user pages with weights corresponding to the number of interactions between them. We chose to use undirected links as it is usually very hard to keep track of messages and their replies due to many different communication customs used on Wikipedia. For instance, in some cases an original question left on a user’s talk page may be answered by the user on that exact same page while in other cases the reply may be left on the talk page of the editor asking the original question. This is why we prefer to consider any message between two users as an instance of an undirected interaction between them.
We used the above approach to recreate a total of 1625 networks. However, for downstream analyses we used only a subset of projects with at least 5 editors being present in the direct communication network. This filtering step was necessary as most structural network metrics are not really meaningful for smaller networks as they are constrained to take values from only a very small and discrete set. Moreover, projects with no FA/GA pages were also excluded: having produced no quality output these projects may well comprise a different population and hence would not help us address our research questions on impact of interpersonal communication on group efficiency. After these two filtering steps the initial set of 1625 direct communication networks was reduced to 997 observations of undirected networks.
\subsection{Interviews: choice of respondents and procedure}
For the purpose of our qualitative part, we conducted four interviews: two with early participants from Wikiproject Covid-19, and two with early participants from Wikiproject Tropical Cyclones. We reached out to eight of the early editors listed on the Wikiprojects’ pages. We focused on those who are still active and who allow contact by email. Four people finally agreed to an interview. The interviews took about one hour each, and were conducted via Google Meet platform (with video). All interviews were recorded with consent and transcribed. The interviews were loosely structured and open-ended~\citep{ciesielskaQualitativeMethodologiesOrganization2018}. The questions were grouped into a few themes that reflected our hypotheses: engagement, project coordination, and communication within the project. The sample questions included:
\begin{itemize}
\item \textbf{Engagement and outreach}
\begin{itemize}
\item How did the project start?
\item What makes a successful wikiproject?
\item How are the new members recruited and on-boarded?
\end{itemize}
\item \textbf{Project coordination, division of tasks and governance}
\begin{itemize}
\item Why do you participate, and how do you choose what to do?
\item What does the leadership of the project look like?
\item What could you tell about the changes in coordination of the project over the years?
\end{itemize}
\item \textbf{Communication}
\begin{itemize}
\item How do project members communicate?
\end{itemize}
\end{itemize}
\begin{table}[h]
\centering
\caption{Interviewee list}
\begin{tabular}{lll}
User & Active since & Project \\
\hline
Interviewee 1 & 2007 & COVID-19 \\
Interviewee 2 & 2006 & Tropical Cyclones \\
Interviewee 3 & 2005 & Tropical Cyclones \\
Interviewee 4 & 2003 & COVID-19 \\
\hline
\end{tabular}
\label{tab:interviewees}
\end{table}
\section{Results – network analysis}
\subsection{Analytical strategy and measures}
Our hypotheses are centered on the impact of communication structure on the capacities of a group to deliver high quality products by collaboration. By reviewing extant findings on quality work in peer production we pinpointed that direct, one-on-one communication can bring in group integration, engagement and complex coordination patterns, all required to produce complex artifacts of high quality such as featured Wikipedia articles. However, these theoretical concepts can be measured in multiple ways and for the results to be meaningful a lot depends on proper operationalization.
\subsection{Group integration}
Following the results of~\citet{zhu2011identifying} we assume that both peripheral and core members are involved in leadership behaviors aimed at affiliation processes. Thus an important aspect of quality Wikiproject work would be to encourage communication between as many members of the group as possible. This can be measured as the fraction of project members that are included in the direct communication network.
\subsection{Engagement-building strong ties}
Following the work of~\citet{balesHowPeopleInteract1955} we assume that affective processes within a group are important for group effectiveness. Moreover we accept, after~\citet{oregExploringMotivationsContributing2008} that engagement of group members results in sustained, high quality contributions, and after~\citet{zhu2011identifying} that direct messages can be used to raise such engagement. Thus we might conclude that a simple network measure reflecting the number of communication links between project members (e.g. average node degree) would capture the extent to which such a network can transmit motivational messages. However, affective processes within a group are not the same as information transfer. For example, informing all group members about a task requires only one message per member. Not surprisingly, such processes on Wikipedia are automated – Wikiprojects use newsletter or mass-messaging to spread information broadly. However, raising motivation and building strong social ties requires reciprocity and perseverance; that is, multiple communication acts – messages – are conducive to a stronger relationship. Therefore, average volume of messages per node (i.e.~average node strength) – rather than average degree – would be a better measure of Wikiprojects’ capacity to build engagement.
\subsection{Complex coordination: Determinism, Degeneracy and Effective Information in networks}
Finally, following~\citet{nowakFunctionalSynchronizationEmergence2017} we assume that complex functions in social systems require complex coordination patterns between elements. Theoretical work by~\citet{tononi1998complexity} showed that structures that are capable of complex coordination need to have local specialization and global integration. Examples of such complex coordination can be found in brain imaging studies and neural modelling~\citet{tononi1994measure}. These concepts from information theory have recently been adapted into network measures of determinism (local specialization) and degeneracy (reverse of global integration)~\citep{kleinEmergenceInformativeHigher2020}. Both can be used to assess a social system’s capability to coordinate in a complex manner.
We follow~\citet{kleinEmergenceInformativeHigher2020} in our approach to quantifying structure and organization of the direct communication networks through the lenses of determinism, degeneracy and effective information. Here we review the main definitions.
A graph $G = (V, E)$ consists of a set of $n = |V|$ vertices and a set of $m = |E|$ links connecting selected pairs of vertices. Moreover, each link $(i, j) \in E$ has a weight $w(i, j) \in \mathbb{N}^+$ indicating the number of interactions between $i$ and $j$ and moreover $w(i, j) = w(j, i)$ for all $i, j = 1, \ldots, n$. Each graph can be represented by a $n \times n$ adjacency matrix $\mathbf{A}$ such that $a_{ij} = w(i, j) = a_{ji}$ if $(i, j) \in E$ and $0$ otherwise. Then, from any $\mathbf{A}$ a directed transition matrix $\mathbf{W}$ can be derived by dividing each row by the strength (sum of weights) of the corresponding node (rows with zeros only are left without change). This way values in each row are non-negative and sum up to $1$ so they can be interpreted as a valid probability distribution over possible next positions of a random walker starting at node $i$.
Then, determinism (local specialization of connections) of a graph G is defined as:
\begin{equation}\label{eq:det}
\ensuremath{\text{Det}}(G) = \log_2{n} - \frac{1}{n}\sum_{i=1}^n H(w_i)
\end{equation}
where $H(w_i) = \sum_j w_{ij}\log_2{w_{ij}}$ is Shannon entropy over the $i$-th row of the transition matrix $\mathbf{W}$ (isolated nodes are ignored in the calculation). Thus, determinism is the average certainty associated with the next move of a random walker placed randomly somewhere on the network. It is maximized when each node is connected to only one other node and minimized when each node connects to all other nodes. Hence, it is a measure of how specific local connections of nodes are on average.
Degeneracy of a graph G is defined quite similarly but in terms of Shannon entropy of the average over rows of W:
\begin{equation}\label{eq:deg}
\ensuremath{\text{Deg}}(G) = \log_2{n} - H\left(\frac{1}{n}\mathbf{1}_n^\top\mathbf{W}\right)
\end{equation}
where $\mathbf{1}_n$ is a vector of ones of length $n$ (again, isolated nodes are ignored). Thus, degeneracy is a measure of how concentrated the connectivity of $G$ is around a small subset of nodes. It is maximized when all nodes are linked to only a single hub and minimized when on average each node is visited equally often. In other words, it is a measure of the global integration of $G$. Example, artificial networks with representing structures of low and high degeneracy are presented in Fig. 2.
\begin{figure}[!t]
\centering
\includegraphics[width=.495\textwidth]{figures/ei_1-1}
\hfill
\includegraphics[width=.495\textwidth]{figures/ei_2-1}
\caption{%
Examples of networks with low and high measures of degeneracy; more examples can be found in~\citet{kleinEmergenceInformativeHigher2020}, figure 2.
}
\end{figure}
Both $\ensuremath{\text{Det}}$ and $\ensuremath{\text{Deg}}$ have well-defined maximum values of $\log_2{n}$ so they can be normalized in the range $[0, 1]$ simply by dividing by $\log_2{n}$. Last but not least, they allow to define a quantity known as effective information which describes the overall structure of $G$ in terms of local specificity and global integration:
\begin{equation}\label{eq:ei}
\ensuremath{\text{EI}}(G) = \ensuremath{\text{Det}}(G) - \ensuremath{\text{Deg}}(G)
\end{equation}
The above definition of effective information mimics closely the theory of integrated information of~\citet{tononi1998complexity} and can be seen as a measure of non-trivial, complex structural organization in networks.
\subsection{Group size}
Acknowledging previous work on quality in peer production that focused on task processes within a group – e.g.~the composition of teams in terms of expertise or size of the collaborating teams~\citep{wilkinson2007cooperation} – we chose the size of the contributor group (i.e.~number of project members) as a control variable. By controlling for size of the projects we can assess whether affiliation processes contribute to group efficiency when controlling for task-related processes.
\subsection{Quality of group work}
The quality of group work that we aimed to relate to the properties of communication networks can be approximated by the quality tags assigned to articles by the Wikipedia community. The two ranks that are assessed by the whole community with respect to the same criteria are FA and GA (other ranks can have different criteria depending on the Wikiproject and the review process for them is carried out within projects). The numbers of FAs and GAs for each project are highly correlated ($r_{\text{Pearson}} = .92, p < .0001$) and thus they can be combined into a single measure of quality. However, projects differ vastly in their scope – i.e.~the number of articles that they curate – and we can expect that larger projects would naturally have a larger number of quality articles. For example, more articles within a thematic area can draw in more contributors interested in the various subtopics, who would self-select to work on the relevant articles. Moreover, the number of articles within a project’s scope is the cap on the number of possible quality articles. Thus an absolute value of quality articles will lead to a quality ranking with the top filled with projects of very large scope.
On the other hand, normalizing the quality score by the number of articles within a project’s scope (i.e.~the quality score becomes the fraction of high quality articles within all project’s articles) privileges smaller projects. In the most extreme case, a project curating only one article can achieve a hundred percent efficiency in producing quality articles with relatively little effort. Since the distribution of projects’ scope is highly skewed (most curate few articles), using such normalization would unduly lower the quality ranking of the largest projects.
We can thus consider a family of quality scores indexed by a parameter $p \in [0, 1]$ such that the quality score for a project $x$ is $Q_p(x) = N_Q(x)/n^p$ where $N_Q(x)$ is the number of FA+GA pages curated by $x$. Within this family the two cases described above constitute the extreme cases. A~quality score with no normalization by the projects’ scope is given by $Q_0$ and quality score normalized with the number of articles within scope is given by $Q_1$ . To~construct our response variable we have chosen the middle case in this family of quality rankings: $Q_{1/2}$ . In~effect, we normalize the number of quality articles not by the absolute number of articles within a project’s scope but rather by the size class of the project’s scope. Indeed, the square root of size serves as variance-stabilizing transformation and as such attenuates the effects of the highly heterogeneous distribution of project sizes while not discarding this information completely. An additional confirmation of the validity of this approach is given by the fact that $Q$-score with $p=1/2$ has almost perfectly log-normal distribution. Table~\ref{tab:descriptives} lists descriptive statistics for the chosen measures.
\begin{table}[!h]
\centering
\caption{Descriptive statistics of project measures}
\begin{tabular}{lcc}
Variable & Mean (SD) & Median \\
\hline
Quality & 1.172 (1.684) & .652 \\
Fraction in communication network & .512 (.173) & .503 \\
Determinism & .761 (.093) & .782 \\
Degeneracy & .265 (.139) & .238 \\
Average connection strength & 30.094 (39.185) & 17.143 \\
Number of project members & 136.39 (249.98) & 61 \\
\hline
\end{tabular}
\label{tab:descriptives}
\end{table}
\subsection{Modelling quality}
To verify if group integration (fraction of project contributors within communication network), engagement building social ties (average node strength), and communication structure allowing for complex coordination (determinism and degeneracy) impact the quality of artifacts produced by peer production groups, we tested a linear regression model with all the above variables as predictors, quality score normalized by the square root of articles within scope as the response variable and number of editors listed within the project as control variable (Table~\ref{tab:model},~Model~1). Quality score, number of users within the project and average node strength were approximately log-normally distributed so we used their log transforms in the model. The model explained 23\% of variance in the quality scores of Wikiprojects ($F(5, 991) = 59.66, p < .001$). All predictors except the fraction of users within the communication network were significant. We tested a model (Table~\ref{tab:model},~Model~2) without the non-significant predictor, and the decrease in variance explained was not significant ($F(4, 991) = .178, p > .05$). The model without fraction of project members within the communication network also explained 23\% of the variance in quality scores ($F(4, 992) = 74.6, p < 0.001$).
\begin{table}[h]
\begin{threeparttable}
\centering
\caption{Effects of network structure on quality}
\begin{tabular}{lccc}
Predictor & Model 1 & Model 2 & Model 3 \\
\hline
Fraction in communication network & -.093 (.22) & & \\
Determinism & 1.313$^*$ (.54) & 1.33$^*$ (.54) & \\
Degeneracy & -.665$^*$ (.30) & -.71$^*$ (.28) & \\
Average connection strength (log) & .285$^{***}$ (.04) & .278$^{***}$ (.04) & .246$^{***}$ (.03) \\
Number of project members (log) & .315$^{***}$ (.04) & .32$^{***}$ (.04) & .347$^{***}$ (.03) \\
Effective information & & .667$^*$ (.28) \\
Constant & -3.369$^{***}$ (.38) & -3.41$^{***}$ (.37) & -2.994$^{***}$ (.18) \\
\hline
R$^2$ & .231 & .231 & .23 \\
\hline
\end{tabular}
\label{tab:model}
\begin{tablenotes}
\small
\item Note: Linear regression coefficients; standard errors in parentheses; $^{***}: p \leq .001$, $^*: p \leq .05$
\end{tablenotes}
\end{threeparttable}
\end{table}
Note that the regression coefficients for determinism and degeneracy are similar but with opposite signs. We can confirm this with a test of linear hypothesis: $H_0: b_{\text{deg}}+b_{\text{det}} = 0\ (F(2, 992) = 2.11, p > .05)$. The opposite impact of degeneracy (global integration) and determinism (local specialization) is indeed proposed to characterize complex systems. The measure of effective information, defined as $\ensuremath{\text{EI}}(G) = \ensuremath{\text{Det}}(G) – \ensuremath{\text{Deg}}(G)$~\citep{kleinEmergenceInformativeHigher2020,tononi1998complexity} describes how much information is integrated within a complex system and can be used as an estimate of the system’s complexity. It has even been suggested as an approximation of the level of consciousness of a system~\citep{tononi2012integrated}.
We tested a simplified model with degeneracy and determinism predictors replaced with effective information (Table~\ref{tab:model},~Model~3). All predictors were significant, the model explained 23\% of variance in quality scores $(F(3,993) = 98.65, p < .001)$, and in that was not significantly different from the model with degeneracy and determinism $(F(2, 992) = 2.11, p > .05)$. Example networks, depicting various levels of effective information are presented in Fig.~\ref{fig:wp-networks}. Thus we can conclude that effective information of the communication structure within Wikiprojects plays a significant role as a factor facilitating production of high-quality content on Wikipedia.
\begin{figure}[!t]
\centering
\includegraphics[width=\textwidth]{figures/plt2-1}
\caption{%
Sample Wikiproject communication structures, varying in degeneracy, determinism and position in the quality ranking.
}
\label{fig:wp-networks}
\end{figure}
\section{Results – interviews}
\subsection{Analytical strategy}
Our quantitative analysis of the structure of one-on-one communication networks within Wikiprojects indicated that quality of their collective output grows with the strength of the ties between Wikiproject members, with the specialization of local connections (i.e.~when project members have specific partners with whom they communicate more than with others), and with integration of information among all group members (i.e.~when the connections in the network do not coincide on a limited set of nodes but rather the information spreads among all parts of the communication network). To further verify these findings and to gain an in-depth understanding of why such communication structures form and in what way they contribute to group collaboration, we interviewed selected Wikiproject members. We focused our analyses of this qualitative data on the uses of direct communication within group work and its role in fostering engagement and in coordinating group work. The choice of an established, highly successful Wikiproject provided us with information on how direct communication contributes to success. Wikiproject Tropical Cyclones ranked as the project with highest quality of collective output. The choice of a fast-growing project allowed us to understand what processes lead to the formation of particular patterns of communication. Wikiproject COVID-19 was started on 15.03.2020 and by February 2021 had accumulated 1375 articles and gathered 274 participants.
\subsection{The role of direct communication}
At the moment of founding, a new project’s communication is concentrated within the project’s coordination page and thus easily accessible to all prospective members. In the case of our analyzed COVID-19 project, the quick growth in interest and participation resulted in a fast flow of information: \enquote{You also just saw lots of people contributing to those initial discussions on the main project talk page. There were so many discussions being started and ideas being floated (\ldots) that it's almost overwhelming to follow.} (Interviewee 1)
This flood of discussions resulted in diversification of communication channels. More specific discussions (pertaining e.g.~to the epidemics development in specific regions) migrated, in an organic manner, to the talk pages related to specific encyclopedic articles: \enquote{a lot of the discussion that you saw early on on the project talk page has migrated to the article space} (I1). This left the project’s main coordination space as a place for more general discussions: \enquote{the number of discussions being generated has of course declined a lot but it [is] still active. You still have editors asking thoughtful questions and soliciting feedback on specific pages.} and \enquote{\ldots I feel like it's still being used as a space for new information}. (I1) Interestingly, this early diversification of information points to an important role of direct messages posted on users’ talk pages.
Interviewee 1 said that he himself had little time to engage in interpersonal communication but that it was a common vehicle to provide feedback and corrections to the fast paced growth of contributions to the articles the project curated. \enquote{There were a lot of people who probably felt that their contributions to edit to Wikipedia were reverted [but] their additions were just relocated. (\ldots) Moving those requests to other spaces, I'm sure there was a lot of back and forth between editors on their talk page.} (I1) It seems that in this case direct messages were used as corrective feedback and explanation of actions taken by other editors. Importantly, \enquote{back and forth} exchanges took place, confirming our intuition that direct messages are used often not as a simple transfer of information but as a vehicle to build common understanding of the situation of group work: what are the accepted actions (norms) and what an article should look like (goals). In this, such messages might have reduced the discouragement of editors whose contributions were not accepted as they were but rather were moved to other articles.
Direct messages very often play the role of positive feedback as well. Such messages may take the form of a standardized text filled in with particular information (i.e.~a~filled in template), which can be pasted onto a user’s talk page using semi-automated tools such as the Twinkle Wikipedia add-on. A specific form of such templates are barnstars, acknowledgements and other awards which take the form of an image together with a personalized text message: \enquote{If someone writes a good article or like, they really show that initiative, they'll probably get a couple barnstars from a few different users.} (I3) More personalized feedback is delivered via messages written especially for the occasion. Interviewee 4: \enquote{I'd rather say thank you in my own words. I'd rather go and write, you know, thanks for your help with that. It was really useful.} In addition, the \enquote{thank you} function (an option available when viewing the edits contributed to a specific article) is an automated tool frequently used to give positive feedback, once an editor makes a good input (Interviewees 1 and 4). In contrast to personalized messages, such \enquote{thank yous} are not visible on the user talk page, but rather appear as a notification in the user profile. This gives editors a range of options to provide feedback that ranges from automated to very personalized, amplifying their capability to build social ties of different strength.
Negative feedback also ranges from more to less personal. Interviewee 4: \enquote{I also use twinkle to issue warnings and notifications. To people, I don't know. (\ldots) But for people I know I'm more likely to use a talk page message.} The templates available in the Twinkle tool allow users to provide depersonalized feedback and also to speed up the communication. This presumably allows to streamline task-related work. However, as the above quote shows, when there is already a relationship between users (a stronger social tie), a personalized message proves a better option: it might invite a reply and thus a deliberation on the shared understanding of norms and goals of the group. Thus, direct communication differs depending on the closeness of the interlocutors, with personalized messages inviting reciprocity and thus increasing the strength of the social tie.
The role of personalized, one-on-one communication is even more vivid when projects engage in soliciting new editors and in socializing them with the group. Communication on user talk pages is a way to establish sustainable relationships between more experienced users and newly joined members: \enquote{(\ldots) I tell them to leave me a talk page message [as a] part of their training. So again, they get the experience of doing that and I capture their username. So it's quite a cheating way of gathering everybody's username.} (I4). After leaving their name on each other's talk pages the editors are no longer anonymous strangers – they establish a personal, one-on-one channel of information exchange.
Experienced editors teach new project members about what needs to be edited and what makes a good edit. Interviewee 4 provides a detailed description of such training: \enquote{(\ldots) I train a lot of new people and I watch their early edits and I use welcome templates purely because it's a lot easier than trying to remember all the links that you want to give them for help pages and so on. (\ldots) And I always look for their first proper edits outside of their sandbox and leave a thank [you] with the thank [you] mechanism. Partly to thank them and encourage them but also so that they see how that works.}
Over time and with increasing volume of communication, relationships tend to transcend from task into more socio-emotional realm. This is accompanied by further diversification of communication channels. Interviewee 3: \enquote{A lot of it [is] user talk pages, there's a Facebook group among a couple users, we're all Facebook friends. (\ldots) there's an IRC Channel. There's also a Discord channel. So there's lots of different ways that the users will talk to each other. And it's become a bit of like socializing as well. Like there's some users I talk to almost every day. (\ldots) In a way, they've become almost a family of sorts.} Interviewee 4: \enquote{Off-Wiki friendships develop, and they obviously develop sometimes within projects. And you can tell people are making reference to things that they've talked about in email or that they met in a purple gun for a coffee or had a pizza or whatever}. Such strong, social bonds impact collaboration, for example: \enquote{I'm probably more likely to help if it's somebody I've met and work[ed] with previously than if it's just a name on a talk page, I'm not saying I wouldn't help and I'm not saying it's the only reason that I would help, but it's certainly encourages me to get involved.} (I4)
In sum, throughout a project's existence, collaboration is coordinated via various channels of communication that serve different communicative purposes. Direct messages on users’ talk pages often serve to invite and socialize new members and to provide feedback to encourage further contributions. Stronger relationships are enacted through more personalized messages, presumably to invite reciprocal and more prolonged exchanges.
\subsection{Organization and coordination of group work}
Interviewee 1 defines Wikiproject as \enquote{a single space where lots of editors (\ldots) come together and really work to bring some consistency across} thus underscoring the importance of coordination of work within the group. Good projects differ from bad projects in the extent to which they are able to maintain \enquote{an active community (\ldots), engagement with the wider community and an outreach} by organizing and announcing editathons, campaigns and competitions (I4). Thus, the distinction between successful and unsuccessful projects has a lot to do with how the project is connected to the wider Wikipedia community: \enquote{Good projects (\ldots) interact with the rest of the community to help people to understand the technicalities, to reach out to people who are working in that sort of area and involve them. And the bad projects see themselves as being the custodians, the ring fences, the owners of stuff} (I4). From this we can understand that good projects are able to tap on resources available in the community, while bad projects remain a specialized, closed group of contributors.
This understanding of success as an ability to mobilize distributed resources into a single effort is also reflected in how the work within projects is organized. When asked about division of labor and coordination of tasks, the interviewees underscore the bottom-up, organic manner in which such processes take place. In the newly formed COVID-19 project editors try to \enquote{find their niche, their dedicated space within the project (\ldots), saying: I want to focus on this or I'm gonna sign up to focus on [COVID-19] case counts in Italy or Spain (\ldots)} (I1). Similarly, our interviewee from the Tropical Cyclone projects reminiscens: \enquote{I~remember these users (\ldots) just took the initiative to make standardized info boxes, eventually getting standardized [hurricane] track maps, making sure that all the different hurricane articles look pretty much the same, that they were high quality, that they were referenced, that they weren’t using blogs for information.} (I3) In a sense, \enquote{the division of labor (\ldots) kind of became self-evident} (I3).
At the same time they notice that there is little in the way of formal roles or leaders that would serve as coordinators: \enquote{(\ldots) People just wanted to help organize the movement's efforts, (\ldots) so that editors weren't just thoroughly confused about where they were supposed to be adding new information. I wish I had a more clear answer for you on leadership. (\ldots) I'm sure there were people who stepped up and, you know, really took initiative.} (I1) \enquote{I haven't seen any sort of more formal structure. The only [projects] that tend to have a more formal structure are the ones where there is a user group off Wiki. So Wikiproject Medicine has the medicine foundation with a board and fundraising (\ldots)} (I4). In effect, the within project coordination becomes seamless and implicit, as users self-select to fill in where others left work to be done: \enquote{It's almost an informal collaboration, like we know what's expected so it's not exactly coordination} (I3).
In the case of established projects, this smooth collaboration might be an effect of experience, of editors internalizing their specific roles in the group effort. \enquote{Over [the] years we've collaborated and discussed (\ldots) and in the new [hurricane] season articles (\ldots) people can look back at other years and realize oh that's what we've done, so that's how it happens (\ldots).} (I3) It’s an effect of \enquote{past years’ work, coordination, reviewing the good articles, setting the standards, making sure that all the articles look the same}. (I3) The project works like well-oiled machinery, where the members are specialized in their tasks but at the same time rely on others to fulfill theirs.
Communication plays an important role in making such a system work. Project members specialized in certain areas (e.g.~making maps for hurricane tracking) naturally communicate with each other, but they also need to reach out farther - within and across projects - to tap on resources and skills they do not possess. Interviewee 4: \enquote{I go to the project page and find somebody, and then go and talk on their talk page. (\ldots) If I need to go and ask for some advice or get a second opinion (\ldots), you might have a source that I want to look something up for me.} Whilst direct messaging might be one of the choices for such advice seeking, other means of communication may be used. \enquote{I will private message them or leave them a message on their talk page. And in one or two cases, contact them off Wiki: a couple of them I know by email, or by Facebook. And I might just say, do you have this paper? Or I'm trying to find out this person's date of birth. Can you look it up in one of your sources for me?} (I4)
Such resource seeking might also happen on a project’s page to increase the visibility of the request or in situations when the editor does not have a personal relationship with anyone with fitting expertise. Interviewee 4: \enquote{you use your social capital, to use the jargon, to get help and to help other people. (\ldots) There are a few Wikiprojects that I go to when I have a question. (\ldots) If ever I'm writing a biography of somebody and they have some experience in the military (\ldots), the Military History project is a good place to go and check. (\ldots) Ask people to look things up in resources that they may have subscriptions to. (\ldots) Make sure I've got the terminology correct, things like that. (\ldots) There's a UK Railway project or rather a route and international railway project and that's simply a good place where you can go and get technical information and get people to look stuff up. Being sources for you.}
Project members also notify each other when they notice something that might be of interest to somebody. Interviewee 4: \enquote{I also tend to drop things into projects (\ldots) if I think they'll be of interest. So if I see something in the news and I can't write about it, but I think somebody might be interested and I know it's an active project in an area that I'm interested in, then I'll go and leave something on a talk page.}
Thus it seems members of Wikiprojects treat each other as a reliable source of information. Interviewee 2: \enquote{I've got access to Discord Channel, I've got access to the IRC, I can just generally ask: can you just take a look at this article? See what you think? [Am I going ] in the right direction. Am I wrong?} However, information exchange relies on previous experience with a particular Wikipedian and mutual trust. Interviewee 4: \enquote{If you (\ldots) use the [project] talk page to ask a question, you know which group of people will be replying and indeed, you know which ones you can rely on if you get an answer. (\ldots) You think: well, I've interacted with them often enough and seen their interaction with other people. Often up, I know they have a level of expertise and they're reliable and they [are] trustworthy in terms of the technical response. And indeed more generally.}
In sum, Wikiproject’s divide and integrate their work through a bottom-up self-selection to tasks. Experience in collaboration helps them develop procedures for implicit coordination of tasks and allows them to build strong ties that result in trust and reliance on each other. Moreover, project members specialize in specific tasks and learn where to seek advice and help when they need information or skills beyond their own expertise. Communication within and across projects helps to connect such specialists; however trust is crucial to rely on such sources. In this, Wikiproject’s display a high level of social capital: even if project members do not know something, they proverbially \enquote{know who knows} and are able - through their stronger (personal relationship) or weaker (through projects or initiatives they know) ties - to tap on this knowledge.
\subsection{Summary of results}
Our quantitative investigation into Wikiprojects’ direct communication structure showed that strength of the relationships within the group - as measured by the average number of messages sent over the social ties - correlates with higher quality products of collaboration. By interviewing selected members of an established and a growing Wikiproject we confirmed that direct messages can serve as a channel for socializing new project members and for sending positive and corrective feedback. Other popular means of communication within Wikipedia - such as project talk pages - are used for setting the agenda for future work or soliciting less personal feedback from a broader group of project members.
Moreover, our interviewees differentiated between automated and personalized messages: those framed as a standardized warning or acknowledgment of work were used for contacting distant or altogether unknown relations, while personalized messages were written for the strong and close connections. Thus, not only the volume of communication but also the form of messages can convey how close the interlocutors are. In sum, personalized, direct communication seems to complement more official, group communication channels by providing a vehicle to build strong social ties that facilitate affective processes within the group. In contrast, the fraction of group members that take part in direct communication did not play a part in group efficiency. We may conclude that what matters is the quality of relationships, not their span.
The other important result from the network analysis is that successful Wikiprojects have a direct communication structure that allows for complex coordination: for sharing of information locally, between project members clustered into small groups, and at the same time globally across such groups rather than by a single coordination center. In interviews, Wikiproject participants shared that they preferably seek advice from and offer help to those whom they trust and whose expertise they are aware of; thus they operate within a close circle of strong social ties. At the same time, they are skilled at using group level communication (e.g.~project talk pages) to acquire information that their closest relations do not possess. In effect, whilst locally they might communicate with a restricted number of collaborators, globally, it is easy for any resource or information to traverse the network. Thus both quantitative and qualitative analyses converge to show that complex patterns of information integration and coordination within Wikiprojects are related to better group performance.
\section{Discussion}
In our studies we attempted to verify how affiliation processes (affective domain) complement task-related coordination (instrumental domain) within groups collaborating online in the course of producing high quality output of collective effort. As argued by early influential research on group interaction~\citep{balesEquilibriumProblemSmall1953,balesHowPeopleInteract1955}, group dynamics must be studied in the context of these two conflicting developmental tendencies within the group, as they create inherent challenges that determine how the group will operate~\citep{balesAnalysisSmallGroup1950,balesPhasesGroupProblemsolving1951}.
The first type of challenges pertains strictly to the group task and how effective the group is in its achievement (instrumental domain). The second type of challenges relates to the extent to which group members are able to maintain close social ties and sustain group cohesion (expressive domain). Tensions caused by the instrumental challenges are reduced through division of resources and labor, and establishment of status and authority hierarchies within the group. On the other hand, tensions within the expressive domain induce behaviors that are focused on integration of opinions, and uniformity among group members. Moreover, according to~\citet{mcgrathGroupsInteractionPerformance1984}, affective processes have a regulatory (reinforcing and directing) function in relation to task behavior. Thus, a group is a system in a dynamical equilibrium between the conflicting drives for cohesion and differentiation~\cite{balesEquilibriumProblemSmall1953}. With the growing ubiquity of virtual collaboration - a tendency which the pandemics has strengthened and possibly calcified - it is important to understand how this balance can be achieved even when groups collaborate solely via new media. Wikipedia is a renowned success case of such technology mediated collaboration.
A growing body of work investigates task related coordination on Wikipedia. An influential study has found that implicit coordination - in the form of division of contributors into a highly productive core and periphery - was related to higher quality of articles, more so than the number of editors or explicit coordination in the form of discussions on the article talk pages~\citep{kitturHarnessingWisdomCrowds2008}. Other studies, however, found that numbers matter: both a higher number of editors, as well as a higher number of edits correlated with high quality~\citep{wilkinson2007cooperation}. An explanation of this discrepancy might be that it is important who comprises such a high number of editors. For example, varied background and diversified experience in editing~\citep{sydow2017diversity}, longer tenure, and willingness to perform multiple roles (functional tasks within article editing,~\citet{liuWhoDoesWhat2011}) positively impact quality of the articles on which editors work.
Explicit coordination has also been proven to matter. The structure of communication on Wikiproject talk pages impacts projects’ efficiency (measured as number of edits to articles): again, existence of a core of editors with high numbers of discussion posts and high values of betweenness centrality in the discussion network, was beneficial. Thus both implicit (division into core and periphery) as well as explicit (discussions) task related coordination is correlated with higher efficiency in pursuing collective goals. There is much less known, however, about the affiliation processes in online collaborative environments. Our study fills this gap.
First, interviews’ analysis showed that Wikipedians diversify their communication, depending on the communicative goal (task or affiliation related) and strength of relationship. The preferred task-related coordination space are talk pages - both of encyclopedic articles and of Wikiprojects. The affective processes, on the other hand, take place on user talk pages where Wikipedians post direct messages to one another, or outside of Wikipedia, on various social media sites. While such direct messages can have multiple goals (e.g.~they can also convey task related information) they are a dominant place to send general feedback (both positive and negative) which may help sustain engagement of contributors as well as socialize them with the collaborating group. Feedback messages were previously identified as types of leadership behaviors on Wikipedia - transactional leadership (positive feedback) and aversive leadership (negative feedback)~\citep{zhu2011identifying}. Our results enhance these findings by showing that feedback is preferentially provided via direct messaging.
Moreover, our quantitative network analysis also confirmed that direct communication impacts the effects of group work: high average volume of direct messages was correlated with higher quality of Wikiprojects’ output. Thus our results are in line with the so far scarce studies on effects of direct messaging on Wikipedia’s collaboration: that articles benefit from their contributors engaging in private messaging in addition to discussions on articles~\citep{parkCommunicationBehaviorOnline2016}, and that direct communication structure that allows linkages across and within contributors from core and periphery relates to higher quality of project output~\citep{rychwalskaQualityPeerProduction2020}. The results presented here go beyond these previous findings by showing that high intensity of affective processes is beneficial for effectiveness of online group collaboration. This result, combined with previous studies on task related coordination, shows that online groups, just like their offline counterparts, need to find a balance between affiliation and instrumental processes within the group. Understanding the interplay between affective and instrumental processes is important given that even on a such task focused community as Wikipedia, personal likes and dislikes may drive editing dynamics in a negative way (e.g.~into edit warring), wherein affiliation with particular others may be more important than the quality of contributions~\citep{lernerFreeEncyclopediaThat2020}.
Arguably, the most important and novel contribution of our paper, however, is that direct communication structure that allows for complex information integration within the group is related to higher quality of articles curated by Wikiprojects. That is, in successful projects, a particular individual’s contacts are relatively deterministic: she has a select group of relationships with whom she tends to communicate much more often than with others. On the other hand, in these successful projects, there is little determinism on the global, group-wide scale: if a particular piece of information or a resource is acquired by any member of the group, the next steps of its way across the group are on average quite unpredictable. In this way the effective mode of operation is that, locally, information is processed within circles of individuals and globally, there are sufficient connections distributed over the entire network to allow the information to spread rather than to be captured by a limited set of individuals. The interviews further elaborate on this result from network analysis: project members build strong trust and expertise based ties by history of previous interactions, but they also have multiple connections to others with different expertise through weaker relations. Such weak ties can exist within and across projects, as evidenced by our network analysis and interviews, respectively.
Our finding that global information integration (lack of a well determined sink for information or a finite coordination center) is beneficial for group effectiveness does not preclude the existence of a core of project contributors. Indeed, the distributions of both the number of messages sent as well as of degree centrality of Wikiprojects’ members tend to be highly skewed and heavy-tailed, suggesting that there are members who communicate more intensively than others and whom we might call “core”. What our results suggest, however, is that in online collaboration groups the core should not strive to be a pipeline for information and resource spread.
Specifically, globally integrated dynamics might be beneficial for more complex tasks, such as upgrading an article to a high quality rank. \citet{qinInfluenceNetworkStructures2015} have shown that the number of edits to articles within a projects’ scope is positively related to existence of leadership behaviors such as dominance in project talk page discussions (measured by betweenness centrality), which might suggest that centralized communication is favorable for Wikiprojects. However, mere adding of edits is a much simpler task than promoting an article to featured status. Indeed, \citet{nemotoSocialCapitalIncreases2011} have shown that promotion of articles to lower ranks of quality requires more centralized leadership (as measured by group degree centrality of direct communication networks) with less cohesive connections (measured by average clustering coefficient) than promotion to FA status. In this most complex task, cohesiveness was more important than centralized leadership. Our results show that this difference might be due to a larger press on global integration of information in such complex tasks. The practical implication of this finding is that in management of online collaboration, project members who are central in communication should strive to maintain redundant ties with the periphery, and encourage links across the periphery, so that the core of the group does not become a bottleneck in information integration or resource mobilization.
Such redundant connectivity across specialized local groups might be important specifically in online collaboration environments which are often characterized by high fluidity in membership. In standard organizations, maintenance of a skilled workforce can be achieved by, e.g.~financial incentives. Such solutions are not available in volunteer-based peer production and this often results in high turnover of contributors. For example, on Wikipedia, contributor career paths are volatile and unpredictable: editors switch between various functions and roles as they gain experience and self-select to favorite tasks. Some might take a long \enquote{Wikibreak} or even leave the community for good. At the same time the global proportions of functional roles are quite stable, implying that when individuals abandon certain roles, others take their place spontaneously~\citep{arazyTurbulentStabilityEmergent2016}. Our interviewees confirm that role uptake is organic and spontaneous. In such a working environment, no person in the direct communication network should be irreplaceable. Redundancy, not only in local, usually dense, ties but also in those weak, wide-spanning connections is critical to maintain sufficient levels of coordination in Wikiprojects, given the possibly fluctuating membership. In effect, our results suggest that complex tasks undertaken by online collaborating teams are benefited by communication structures that are characterized by specificity in local connections together with wide-reaching, integrative global links.
Such connectivity structure - and indeed the measures for effective information - might be related to high social capital of a group: \enquote{the sum of actual and potential resources embedded within, available through, and derived from the network of relationships possessed by an individual or social unit}~\citep[p.~243]{nahapietSocialCapitalIntellectual1998}. Social capital of a group is often defined in terms of bonding - i.e.~the cohesiveness of ties within a network. In offline teams an established network of close relationships within a social system increases commitment~\citep{brassBeingRightPlace1984,colemanFoundationsSocialTheory1994} and a higher density of connections leads to a higher likelihood of collective endeavors~\citep{putnamTuningTuningOut1995}. On Wikipedia, such social capital brought to an article and accumulated by previous collaboration, results in higher article quality~\citep{nemotoSocialCapitalIncreases2011}. Strong connections in a network of co-contributions to sentences within an article - also a measure of bonding capital - are also related to higher quality~\citep{liuWhoDoesWhat2011}. However, such capital is different from bridging capital of individuals that can be accrued by occupying a structural hole~\citep{jacksonTypologySocialCapital2020}.
Bridging capital is highest for individuals when they are unique intermediaries between parts of a network~\citep{jacksonTypologySocialCapital2020}. In offline studies on social capital an important role in communication networks is played by the so-called gatekeepers - a small number of key group members with expertise of how to find relevant information within a system~\citep{su2011multidimensional}. These gatekeepers are crucial for the group to work efficiently and that crucial position gives them power and control. Yet, for the group their uniqueness might be detrimental - they are a bottleneck in group coordination. As discussed above, in online systems that attempt complex tasks requiring specialized knowledge or skills, and which are characterized by high fluidity in membership, gatekeepers could prove disastrous: if they reduce their activity or simply are overwhelmed by amount of work, the whole group task (i.e.~FA~candidate article) might fail. Our results suggest that successful online teams are characterized by a communication structure that lacks any such gatekeepers. Future research might investigate whether complexity of the task (i.e.~comparison between different quality grades of articles), size of the team, as well as fluctuations in membership impact what communication structures are effective for an online peer production group.
\section{Limitations}
Without a doubt Wikipedia is one of the greatest success stories of collaborative knowledge production with no tangible financial incentives. As such it should be studied as this can reveal factors responsible for its unique growth and success. However, for the very same reasons our results should not be generalized to other similar platforms without additional considerations. Wikipedia may differ in important and unique ways from an average collaborative peer-production platform which can affect the scope of generalizability of our results. Studies similar to ours but based on data from other platforms need to be conducted in order to assess this.
Furthermore, in this study we focused exclusively on the structure of direct communication networks. It may be of interest to replicate similar analyses for other communication layers in the Wikipedia ecosystem, in particular discussions on article talk pages in the so-called main namespace as well as those on pages of individual Wikiprojects (project namespace). Moreover, correlations between communication structures at these different layers may provide additional insights and could be studied with methods developed for multilayer networks~\citep{boccalettiComplexNetworksStructure2006a}.
Last but not least, we used time-aggregated networks and even though this simplification was still enough to reveal several structural properties linked to quality of output of Wikiprojects it did not capture the full richness of our data. Therefore, it may be worthwhile to also study dynamic properties of communication within Wikiproject. However, one should also note that for many smaller projects available data may be too sparse to allow reliable dynamic analyses leading to significantly smaller sample sizes than the one we considered here.
\section{Acknowledgments}
This work was supported by the Polish National Science Centre through grant 2017/27/B/HS6/00626.
\printbibliography
\end{document}
|
\section{Introduction}
Noncommutative graded isolated singularities are defined by Ueyama \cite[Definition 2.2]{Uey2013}.
A noetherian connected graded algebra $B$ is called a {\it graded isolated singularity} if the associated noncommutative projective scheme $\mathrm{Proj} (B)$ (in the sense of \cite{AZ1994}) has finite global dimension. See \cite{CKWZ2018, BHZ2018, GKMW2019, CKZ2020} for some examples of graded isolated singularities.
Let $A$ be a noetherian Artin-Schelter regular algebra and $G$ be a finite subgroup of $\Aut_{\mathrm{gr}}(A)$. To prove a version of the noncommutative Auslander theorem, an invariant called the {\it pertinency} of the $G$-action on $A$ is introduced in \cite{BHZ2018} and \cite{BHZ2019}. We recall it here.
The {\it pertinency} of the $G$-action on $A$ \cite[Definition 0.1]{BHZ2019} is defined to be
$$\mathbf{p}(A, G):= \GKdim(A) - \GKdim(A\#G/(e_0)),$$
where $(e_0)$ is the ideal of the skew group algebra $A\#G$ generated by $e_0 := 1 \# \frac{1}{|G|} \sum_{g \in G} g$.
Then, by \cite[Theorem 3.10]{MU2016}, $A^G$ is a graded isolated singularity if and only if $\mathbf{p}(A, G) = \GKdim(A)$. Unlike in the commutative cases, it is difficult to determine when the invariant subalgebra is a graded isolated singularity.
Let $\kk$ be an algebraically closed field of characteristic zero.
Let $A = \kk_{-1}[x_0, \dots, x_{n-1}] \,(n \geqslant 2)$ be the ($-1$)-skew polynomial algebra, which is generated by $\{x_0, \dots, x_{n-1}\}$ and subject to the relations
$$x_ix_j = (-1) x_jx_i\,(\forall i \neq j).$$
Let $G:=C_n$ be the cyclic group of order $n$ acting on $A$ by permuting the generators of the algebra cyclically; namely, $C_n$ is generated by $\sigma = (0 \, 1 \, 2 \, \cdots \, n-1)$ of order $n$ that acts on the generators by
$$\sigma x_i = x_{i+1}, \; \forall \, i \in \Z_n:= \Z/n\Z.$$
In \cite[Theorem 0.4]{CYZ2020}, Chan, Young and Zhang prove the following result on graded isolated singularities.
\begin{thm}\label{CYZ-thm}
If either $3$ or $5$ divides $n$, then $\mathbf{p}(A, G) < \GKdim A = n$. Consequently, the invariant subalgebra $A^G$ is not a graded isolated singularity.
\end{thm}
Based on this theorem and \cite[Theorem 0.2]{CYZ2020}, Chan, Young and Zhang give the following conjecture \cite[Conjecture 0.5]{CYZ2020}.
\begin{conj}\label{conj}
The invariant subalgebra $A^G$ is a graded isolated singularity if and only if $n$ is not divisible by $3$ or $5$.
\end{conj}
To prove Conjecture \ref{conj} is true, it suffices to prove the following theorem, which is the main result in this note.
\begin{thm}\label{main-thm}
If $n$ is not divisible by $3$ or $5$, then $\mathbf{p}(A, G) = \GKdim A = n$. As a consequence, $A^G$ is a graded isolated singularity.
\end{thm}
\section{Preliminaries}
Before giving a proof of Theorem \ref{main-thm}, let us recall some notations and results in \cite{CYZ2020}.
Let $\omega$ be a primitive $n$th root of unity. For any $\gamma = 0, 1, \dots, n-1 \in \Z_n$, let
$$b_{\gamma} := \frac{1}{n} \sum_{i=0}^{n-1} \omega^{i\gamma} x_i \in A \subseteq A \# C_n.$$
Then $b_{\gamma}$ is an $\omega^{- \gamma}$-eigenvector of $\sigma$.
Let
$$e_{\gamma} := \frac{1}{n} \sum_{i=0}^{n-1} (\omega^{\gamma} \sigma)^{i} \in \kk C_n \subseteq A\#C_n,$$
which are idempotent elements.
Suppose $\deg(x_i) = 1$ and $\deg(e_i) = 0$ for all $i \in \Z_n$.
As usual, $[-,-]$ denotes the graded commutator of the graded ring $A\#C_n$, that is, $[u,v] = uv - (-1)^{\deg(u)\deg(v)} vu$ for any homogeneous elements $u,v \in A\#C_n$.
\begin{lem}\cite[Lemma 1.1]{CYZ2020}
The graded algebras $A$ and $A\#C_n$ can be presented as
$$A \cong \frac{\kk \langle b_0, \dots, b_{n-1} \rangle}{([b_0, b_k] - [b_l, b_{k-l}])}\, \text{ and }\, A \# C_n \cong \frac{\kk \langle b_0, \dots, b_{n-1}, e_0, \dots, e_{n-1} \rangle}{(e_{\alpha}b_{\gamma} - b_{\gamma}e_{\alpha-\gamma}, e_ie_j-\delta_{ij}e_i, [b_0, b_k] - [b_l, b_{k-l}])}$$
respectively, where $\delta_{ij}$ is the Kronecker delta and indices are taken modulo $n$.
\end{lem}
For each $j \in \Z_n$, let
$$c_j := [b_k, b_{j-k}] = b_kb_{j-k} + b_{j-k}b_k = \frac{2}{n^2}\sum_{i=0}^{n-1}\omega^{ij}x_i^2.$$
Then $c_j$ is an $\omega^{-j}$-eigenvector of $\sigma$.
For any vector $\mathbf{i} = (i_0, \dots, i_{n-1}) \in \N^n$,
we use the following notations:
$$\mathbf{b^i} = b_0^{i_0} \cdots b_{n-1}^{i_{n-1}} \,\textrm{ and }\, \mathbf{c^i} = c_0^{i_0} \cdots c_{n-1}^{i_{n-1}}.$$
Let $R_{\gamma}$ be the subspace of $A$ spanned by
the elements $\mathbf{b^ic^j}$ such that $\sum_{s=0}^{n-1} (i_s+j_s)s = \gamma \mod n$; that is, $R_{\gamma}$ consists of $\omega^{-\gamma}$-eigenvectors of $\sigma$. This gives an $R_0$-module decomposition
$$A = R_0 \oplus R_1 \oplus \cdots \oplus R_{n-1}.$$
\begin{defn}
\begin{enumerate}
\item Let $\Phi_n:= \{ k \mid c_k^{N_k} \in (e_0) \text{ for some } N_k \geq 0 \}$, where $(e_0)$ is the two-sided ideal of $A\#C_n$ containing $e_0$.
\item Let $\phi_2(n) := \{ k \mid 0 \leq k \leq n-1, \gcd(k, n) = 2^{w} \text{ for some } w \geq 0 \}$.
\item Let $\Psi_{j}^{[n]}:= \{ i \mid c_i^N \in R_jA \text{ for some } N \geq 0 \}$.
\item \cite[Definition 5.2 and Lemma 5.3(1)]{CYZ2020} We say $n$ is {\it admissible} if, for any $i$ and $j$, $i \in \Psi_j^{[n]}$, or equivalently, $\GKdim (A\#C_n/(e_0)) = 0$.
\item Let $\overline{A} := A/\langle c_k \mid k \in \Phi_n \rangle$, and $\overline{\Psi}_{j}^{[n]}:= \{ i \mid c_i^N \in \overline{R}_j\overline{A} \text{ for some } N \geq 0 \}$ where $\overline{R}_j = \frac{R_j + \langle c_k \mid k \in \Phi_n \rangle}{\langle c_k \mid k \in \Phi_n \rangle} \subseteq \overline{A}$.
\end{enumerate}
\end{defn}
Let $\Z_n^{\times}$ be the set of invertible elements in $\Z_n$.
\begin{lem}\label{lem1}
\begin{enumerate}
\item \cite[Definition 6.1]{CYZ2020} $\Phi_n$ is a special subset of $\Z_n$, that is, $k \in \Phi_n$ if and only if $\lambda k \in \Phi_n$ for all $\lambda \in \Z_n^{\times}$.
\item \cite[Proposition 2.3]{CYZ2020} $\phi_2(n) \subseteq \Phi_n$.
\end{enumerate}
\end{lem}
The following proposition follows from the proof of \cite[Proposition 6.6]{CYZ2020}.
\begin{prop}\label{prop1}
Let $n \geq 2$ such that $3, 5 \nmid n$. If $1, \dots, n-1 \in \overline{\Psi}_1^{[n]}$, then $0 \in \overline{\Psi}_1^{[n]}$.
\end{prop}
\begin{prop}\cite[Proposition 6.8]{CYZ2020}\label{prop2}
Let $n \geq 2$. Suppose that
\begin{enumerate}
\item every proper factor of $n$ is admissible, and
\item for each $0 \leq i \leq n-1$, $i \in \overline{\Psi}_1^{[n]}$.
\end{enumerate}
Then $n$ is admissible.
\end{prop}
\section{Proof of the Theorem \ref{main-thm}}\label{sec2}
\begin{proof}[Proof of Theorem \ref{main-thm}]
We prove it by induction on $n$. Assume that every proper factor of $n$ is admissible.
By Proposition \ref{prop2}, it suffices to prove that
$$\text{ for each } 0 \leq i \leq n-1, \; i \in \overline{\Psi}_1^{[n]}.$$
If this is not true, that is, there is $ 0 \leq m \leq n-1$ such that $m \notin \overline{\Psi}_1^{[n]}$. Then we may assume that
\begin{enumerate}
\item $m \neq 0$, by Proposition \ref{prop1};
\item $m \mid n$, by Lemma \ref{lem1} (2) as $\Z_n^{\times} \subseteq \phi_2(n) \subseteq \Phi_n$;
\item $m > 5$, by Lemma \ref{lem1} (2) and assumption $3,5 \nmid n$.
\end{enumerate}
Write $n = mq$ with $q>1$.
Since $c_m$ is an eigenvector of $\sigma$, then $C_n$ acts on the localization $A[c_m^{-1}]$, and $A[c_m^{-1}] \# C_n / (e_0) \cong (A \# C_n / (e_0))[c_m^{-1}]$.
Let
$$\widetilde{A} = \frac{\kk \langle b_0, \dots, b_{m-1} \rangle}{([b_0, b_k] - [b_l, b_{k-l}] \mid l, k \in \Z_m)}$$
be a subalgebra of $A$,
and $\widetilde{R}_{\gamma}$ be the subspace of $\widetilde{A}$ spanned by the elements $\mathbf{b^ic^j}$ such that $\sum_{s=0}^{m-1} (i_s+j_s)s = \gamma \mod m$.
For any $\mathbf{b^ic^j} = b_0^{i_0} \cdots b_{m-1}^{i_{m-1}}c_0^{j_0} \cdots c_{m-1}^{j_{m-1}} \in \widetilde{R}_1$ with
$$\sum_{s=0}^{m-1} (i_s + j_s)s = mk + 1 \text{ for some } k \geq 0,$$
then there exists $l > 0$ such that $(l-1)q \leq k < lq$.
Hence $\mathbf{b^ic^j}c_{m}^{lq-k} \in R_1A$, and $\mathbf{b^ic^j} \in R_1A[c_m^{-1}]$. It follows that
$$\widetilde{R}_1\widetilde{A} \subseteq R_1A[c_m^{-1}].$$
Write $\widetilde{\omega} = \omega^q$. Note that $\widetilde{A} \cong \kk_{-1}[\widetilde{x}_0, \dots, \widetilde{x}_{m-1}]$ via $b_{\gamma} \mapsto \frac{1}{m} \sum_{i=0}^{m-1}\widetilde{\omega}^{i \gamma} \widetilde{x_i}$. Then the cyclic group $C_m$ of order $m$ acts on $\widetilde{A}$ by permuting the generators of the algebra cyclically; namely, $C_m$ is generated by $\widetilde{\sigma} = (012 \cdots m-1)$ of order $m$ that acts on the generators by
$$\widetilde{\sigma} \widetilde{x_i} = \widetilde{x_{i+1}}, \; \forall \, i \in \Z_m.$$
Then $\widetilde{R}_{\gamma}$ consists of $\widetilde{\omega}^{-\gamma}$-eigenvectors of $\widetilde{\sigma}$.
By assumption, $m$ is admissible, so for any $0 \leq i \leq m-1$, there exists $N_i$ such that
$$c_i^{N_i} \in \widetilde{R}_1\widetilde{A} \subseteq R_1A[c_m^{-1}].$$
Let $\Gamma$ be the right ideal $R_1A[c_m^{-1}] + \sum\limits_{\exists \, N_k, \, {c_k^{N_k}} \in R_1A[c_m^{-1}]} c_kA[c_m^{-1}]$ of $A[c_m^{-1}]$. Next we prove that $\Gamma = A[c_m^{-1}]$.
The following proof is quite similar to the proof of \cite[Porposition 6.6]{CYZ2020}.
~\\
Claim 1. Let $0 \leq j < \frac{m-1}{2}$. If $c_m^sb_j \in \Gamma$ for some $s>0$, then $c_m^{s+1}b_{j+1} \in \Gamma$.
\begin{proof}[Proof of Claim 1]
First of all, $b_{j+1}b_{m-j} \in \widetilde{R}_1\widetilde{A} \subseteq R_1A[c_m^{-1}]$ since $(j+1) + (m-j) = 1 \mod m$.
Due to $c_m^sb_j \in \Gamma$, then
\begin{align*}
\Gamma \ni & [b_{j+1}b_{m-j}, c_m^sb_j] \\
& = c_m^sb_{j+1}b_{m-j}b_j - c_m^sb_jb_{j+1}b_{m-j} \\
& = c_m^{s}b_{j+1}b_{m-j}b_j + c_m^sb_{j+1}b_jb_{m-j} - c_m^sc_{2j+1}b_{m-j} \\
& = c_m^{s+1}b_{j+1} - c_m^sc_{2j+1}b_{m-j}.
\end{align*}
Since there exists $N_{2j+1} > 0$ such that $c_{2j+1}^{N_{2j+1}} \in \widetilde{R}_1\widetilde{A}$ for $2j+1 < m$, then $c_m^{s+1}b_{j+1} \in \Gamma$.
\end{proof}
~\\
Claim 2. Suppose that $m = 2k +1$. If $c_m^sb_k \in \Gamma$, then $c_m^{s+2}b_{k+2} \in \Gamma$.
\begin{proof}[Proof of Claim 2]
Note that $b_{k+1}b_{k+2}b_{m-1} \in \widetilde{R}_1\widetilde{A} \subseteq \Gamma$ as $(k+1) + (k+2) + (m-1) = 1 \mod m$.
\begin{align*}
\Gamma \ni & [c_m^sb_k, b_{k+1}b_{k+2}b_{m-1}] \\
& = c_m^sb_kb_{k+1}b_{k+2}b_{m-1} + c_m^sb_{k+1}b_{k+2}b_{m-1}b_k \\
& = c_m^sb_kb_{k+1}b_{k+2}b_{m-1} + c_m^sc_{3k} b_{k+1}b_{k+2} - c_m^sb_{k+1}b_{k+2}b_kb_{m-1} \\
& = c_m^sb_kb_{k+1}b_{k+2}b_{m-1} + c_m^sc_{3k} b_{k+1}b_{k+2} - c_m^sc_{m+1}b_{k+1}b_{m-1} + c_m^sb_{k+1}b_kb_{k+2}b_{m-1} \\
& = c_m^{s+1} b_{k+2}b_{m-1} + c_m^sc_{3k} b_{k+1}b_{k+2} - c_m^sc_{m+1}b_{k+1}b_{m-1}.
\end{align*}
Since $c_{m+1}c_m^{q-1} \in R_1 A$, then $c_{m+1} \in R_1A[c_m^{-1}]$. Hence $c_m^{s+1} b_{k+2}b_{m-1} + c_m^sc_{3k} b_{k+1}b_{k+2} \in \Gamma$.
\begin{align*}
\Gamma \ni & [c_m^{s+1} b_{k+2}b_{m-1} + c_m^sc_{3k} b_{k+1}b_{k+2}, b_1] \\
& = c_m^{s+1} b_{k+2}b_{m-1}b_1 - c_m^{s+1} b_1b_{k+2}b_{m-1} + c_m^sc_{3k} b_{k+1}b_{k+2}b_1 - c_m^sc_{3k} b_1b_{k+1}b_{k+2} \\
& = c_m^{s+2} b_{k+2} - c_m^{s+1} b_{k+2}b_1b_{m-1} - c_m^{s+1} b_1b_{k+2}b_{m-1} \\
& \;\; + c_m^sc_{3k} b_{k+1}b_{k+2}b_1 + c_m^sc_{3k} b_{k+1}b_1b_{k+2} - c_m^sc_{3k} c_{k+2}b_{k+2} \\
& = c_m^{s+2} b_{k+2} - c_m^{s+1} c_{k+3}b_{m-1} + c_m^sc_{3k} c_{k+3} b_{k+1} - c_m^sc_{3k} c_{k+2}b_{k+2}.
\end{align*}
By assumption $m > 5$, so $k > 2$. Since $k+2 < k+3 < 2k+1 = m$, $c_{k+2}, c_{k+3} \in \Gamma$ by assumption. It follows that $c_m^{s+2} b_{k+2} \in \Gamma$.
\end{proof}
~\\
Claim 3. $c_m^{m-1} \in \Gamma$.
\begin{proof}[Proof of Claim 3]
Assume that $m$ is even. Starting with $b_1$, and applying Claim 1 ($\frac{m}{2}-1$) times, we get $c_m^{\frac{m}{2}-1} b_{\frac{m}{2}} \in \Gamma$. Hence $c_m^{m-1} = [c_m^{\frac{m}{2}-1} b_{\frac{m}{2}}, c_m^{\frac{m}{2}-1} b_{\frac{m}{2}}] \in \Gamma$.
If $m = 2k+1$ is odd, then by applying Claim 1 ($k-2$) and ($k-1$) times we get $c_m^{k-2} b_{k-1}$ and $c_m^{k-1} b_{k}\in \Gamma$ respectively. By applying Claim 2 we get $c_m^{k+1} b_{k+2} \in \Gamma$.
Therefore,
$c_m^{2k} = [c_m^{k-2} b_{k-1}, c_m^{k+1} b_{k+2}] \in \Gamma.$
\end{proof}
By Claim 3, $\Gamma = A[c_m^{-1}]$. Recall that $\Gamma = R_1A[c_m^{-1}] + \sum\limits_{\exists \, N_k, \, {c_k^{N_k}} \in R_1A[c_m^{-1}]} c_kA[c_m^{-1}]$. It is not difficult to see that $A[c_m^{-1}] = R_1A[c_m^{-1}]$.
So there exists $N \geq 0$ such that $c_m^N \in R_1A$,
which is a contradiction (as $m \notin \overline{\Psi}_1^{[n]}$). This implies $\overline{\Psi}_1^{[n]} = \{0, 1, \dotsm, n-1 \}$, that is, $n$ is admissible.
Hence $\GKdim(A\#C_n / (e_0)) = 0$, and $\mathbf{p}(A, G) = n$.
\end{proof}
\section*{Acknowledgments} The author is very grateful to Professor Quanshui Wu and James Zhang who read the paper and made numerous helpful suggestions.
\bibliographystyle{siam
|
\section{INTRODUCTION}
Pipelines networks are the fulcrum of the oil and gas industries and of gas and water mains. These pipes must be periodically inspected to guarantee the safety and proper functioning of the plants. However, inspection is usually a long, expensive and tedious procedure that requires the shut-down of the whole plant and, in the specific case of industrial pipelines, the removal of the insulation around the pipes. With metal pipes, the inspection is currently performed from the outside using ultrasonic or magnetic probes that measure the wall thickness. Unfortunately, these inspection methods provide limited information about the state of pipes due to very low resolution and noisy data and require the removal of the insulation.
Currently, Pipeline Inspection Gauges, or PIGs, are used to inspect the pipelines from the inside. However, while PIGs do not require a full shut down of the plant, they cannot be used to inspect networks with complex topologies, e.g. sharp corners, T-junctions and vertical sections.
In the last two decades, inspection robotics has focused on designing new robotic prototypes for in-pipe inspection. However, especially in the case of small diameter pipes, the mechatronics of these robots is complex, costly and with low operability \cite{Abdellatif2018MechatronicsDO}. While the design of these in-pipe robots has quickly progressed, many steps have yet to be taken to navigate and inspect complex pipes autonomously. In-pipe inspection robots operate in highly constrained environments, with limited sensing equipment, without or with limited knowledge of the pipeline-network structures beforehand and unpredictable situations due to the contact dynamics and slippage as different fluids and media can be present in the pipes during the inspection. Furthermore, these robots are often composed of multiple joints, and multiple actuators have to be simultaneously controlled, making the design of an autonomous, robust and adaptable navigation system challenging.
Reinforcement Learning \cite{sutton_reinforcement_2018}, or RL, has proven to be a valuable solution for many robotics challenges and tasks such as mobile robot navigation, dexterous manipulation through robotic arms, and bipedal robot locomotion \cite{kober2013reinforcement}. However, when the task requires the execution of a sequence of complex skills on a long temporal horizon, Reinforcement Learning algorithms tend to struggle \cite{nachum2018data}.
Hierarchical Reinforcement Learning, or HRL, takes advantage of the hierarchical policy decomposition to exploit underlying problem structures and simplify the learning of complex tasks. The hierarchical decomposition can be either defined by using prior knowledge \cite{sutton1999between}, \cite{heess2016learning}, \cite{florensa2017stochastic}, \cite{Frans2017MetaLS}, or can be automatically learned during training \cite{nachum2018data}, \cite{vezhnevets2017feudal}, \cite{bacon2016optioncritic}. While the latter category of algorithm does not require expert knowledge for defining the hierarchy, the autonomous discovery of the options often leads to sub-optimal policies if additional regularizers are not used during the learning phase \cite{florensa2017stochastic}, \cite{bacon2016optioncritic}.
\begin{figure*}[ht!]
\centering
\includegraphics[width=0.55\linewidth,page=3]{figs/framework2.pdf}
\caption{Proposed Hierarchical Reinforcement Learning architecture for the autonomous navigation of the PIRATE robot.}
\label{fig:HRL_framework_intro}
\end{figure*}
We propose a Hierarchical Reinforcement Learning framework for autonomous navigation of multi-actuated, complex robots for in-pipe inspection. This is shown in Figure \ref{fig:HRL_framework_intro}. In particular, we focus on the pipe inspection robot called PIRATE \cite{dertien2011development}, but the approach can be easily adapted to many different snake-like pipe inspection robots. The framework combines expert knowledge for determining the hierarchy of the policies with simple auxiliary reward functions for ensuring the optimal behaviour of the sub-policies. To the best of the authors' knowledge, this is the first time a robust and flexible control solution employing Reinforcement Learning for the autonomous navigation of snake-like pipe inspection robots with a clamping mechanism is presented.
In this paper, we aim at addressing the following research questions:
\begin{enumerate}
\item What is a good hierarchy for learning robust and generalizable policies for the pipeline inspection robot PIRATE?
\item What are the benefits of such a hierarchical decomposition of the policy?
\item How do the learned policies compare to human-expert control?
\end{enumerate}
The paper is organized as follows: Section \ref{sec:background} presents the theoretical background and Section \ref{sec:related work} briefly surveys the state of art of in-pipe inspection robotics. Then Section \ref{sec:methodology} explains the methodology followed in this research, followed by Section \ref{sec:experimental_design} showing the experimental design. Section \ref{sec:experimental_results} presents and discusses the results of the experiments. Eventually, Section \ref{sec:conclusions} concludes the paper.
\section{BACKGROUND} \label{sec:background}
\subsection{Reinforcement Learning}
Reinforcement Learning \cite{sutton_reinforcement_2018} is the Machine Learning branch dealing with the problem of optimal sequential decision-making. In the Reinforcement Learning framework, an agent tries to learn the optimal behavior for solving a given problem by interacting with an unknown environment. The interaction can be formally studied by means of Markov Decision Processes, or MDPs. An MDP is a tuple $\langle \mathcal{S}, \mathcal{A}, \text{T}, \text{R} \rangle$ where $\mathcal{S}$ corresponds to the set of states, $\mathcal{A}$ to the set of actions, $\text{T}: \mathcal{S} \times \mathcal{A} \longrightarrow [0, 1]$ to the transition function determining the evolution of the states and $\text{R}:\mathcal{S} \times \mathcal{A}\longrightarrow \mathbb{R}$ is the reward function. The goal of a Reinforcement Learning agent is the maximisation of the total cumulative reward $\sum_{t=0}
^{T} \lambda^t r_t$, where $r_t$ is the scalar reward obtained for taking the action $a_t$ in the state $s_t$ at time step $t$, and $\lambda \in [0, 1]$ is the discount factor weighting the importance of future rewards.
\subsubsection{Proximal Policy optimisation}
Proximal Policy optimisation, or PPO, \cite{Schulman2017ProximalPO} is an actor-critic policy gradient method that improves Trust Region Policy optimisation algorithm, or TRPO, \cite{schulman2015trust}, by relaxing its hard constraints. PPO replaces such constraints of TRPO by using loss functions for training the policy neural network. We use the variant of PPO with the clipped objective function, shown in Equation (\ref{PPOloss}), for its popularity, but the proposed framework is not strictly dependent on it.
\begin{equation}
\mathcal{L}_{clip}(\theta) = \mathbb{E}[\min(\zeta_t(\theta)\hat{A}_t, \textit{clip}(\zeta_t(\theta), 1-\epsilon,1+\epsilon)\hat{A}_t]
\label{PPOloss}
\end{equation}
where $\zeta_t(\theta)=\frac{\pi_{\theta}(a_t|s_t)}{\pi_{\theta old}(a_t|s_t)}$ corresponds to the probability ratio of the current policy and the old policy, $\hat{A}_t$ the estimation of the advantage function, $\epsilon$ is the clipping coefficient and $\theta$ the parameters' vector of the policy.
\subsection{Hierarchical Reinforcement Learning}
Hierarchical Reinforcement Learning algorithms aim at exploiting the structure of the problems by learning hierarchically-structured policies, efficiently solving complex tasks, and improving the generalization of the learned behaviors. In this context, the MDP model is often extended to Semi-Markov Decision Process, or SMDP, model \cite{howard1971dynamic} to take into account the temporal dimension introduced by the abstract actions. A SMDP is a tuple $\langle \mathcal{S}, \mathcal{A}_a, \mathcal{B}, \text{T}, \text{R} \rangle$ where $\mathcal{S}$ is the set of states, $\mathcal{A}_a$ is the set of abstract actions, $\mathcal{B}$ is the set of all possible duration of the abstract actions, $\text{T}: \mathcal{S} \times \mathcal{A}_a \times \mathcal{B} \longrightarrow [0, 1]$ is the transition function and $\text{R}:\mathcal{S} \times \mathcal{A}_a \times \mathcal{B} \longrightarrow \mathbb{R}$ is the reward function.
\section{RELATED WORK}
Exploiting structures and hierarchies is one of the most important challenges for scaling RL algorithms to more complex real-world problems. A famous Hierarchical Reinforcement Learning approach is the so-called Option framework \cite{sutton1999between}, \cite{stolle2002learningoptions}. Options are temporally extended abstract actions corresponding to the set of skills the agent need to learn in order to solve tasks. In this framework, above the options, we always find a high-level policy, learning to select the best option for the given context. Options can be either hand-crafted based on prior knowledge, as in \cite{heess2016learning}, \cite{florensa2017stochastic}, \cite{Frans2017MetaLS}, or can be automatically learned during training, as in the option-critic framework proposed by \cite{bacon2016optioncritic}. In the latter case, however, regularization, e.g. entropy maximisation, has to be often employed to prevent the learning of sub-optimal options.
A different approach is followed by HIRO \cite{nachum2018data}, and FuN \cite{vezhnevets2017feudal}, where the high-level policy does not select anymore which abstract action to actuate, but, instead, determines abstract goals for the low-level policies. Similar to the option framework, the abstract goals are chosen with a lower frequency than the actions chosen by the low-level policies.
In our work, we want to exploit the high amount of prior knowledge we have about the robot's mechanics and motion and about the navigation task in the structured pipeline networks. Therefore we find the option framework the most suitable for this scenario.
\section{AUTONOMOUS PIPELINE INSPECTION ROBOTS} \label{sec:related work}
In the last two decades, many innovative and different designs of in-pipe inspection robots have been proposed. According to \cite{surveypiperobots2017}, most of these robots use wheels for locomotion, have modular and snake-like bodies, and clamp inside the pipes. These three elements, when combined, allow the maximum flexibility of usage in different pipeline structures with vertical sections, junctions and corners.
To the category of modular and snake-like robots belongs MAKRO \cite{Rome1999TowardsAS}, a sewer inspection robot with an articulated body and multiple wheels. This robot, however, cannot clamp itself in the pipes, which significantly reduces the range of its usage.
Another example is the robot proposed in \cite{Choi2002RoboticSW} for inspection of urban gas pipelines. The robot has complicated mechanics with many joints and wheels, and it can clamp inside the pipe, allowing travelling even vertical sections.
In \cite{Selvarajan2019DesignAD} a bio-inspired snake robot is designed and presented. However, while the control principle is introduced, no actual test in complex pipes is shown.
Eventually, the PipeTron \cite{Debenest2014PipeTronS} and the PIRATE \cite{dertien2011development} are snake-like robots with wheel-based locomotion and the ability to clamp inside the pipes. These features allow these two robots to be very flexible in terms of the range of use and functionalities.
Differently from the previously cited works, KANTARO \cite{Nassiraei2007ConceptAD} employs wheels for locomotion. Its body is simple, allowing easier movements through junctions and reductions of the pipe diameters. The motion of this robot is, however, limited to planar pipeline networks without vertical sections. A similar design is used in \cite{Abdellatif2018MechatronicsDO} with the addition of a traction system for improving locomotion.
While the designs of these robots have greatly progressed in the past year, autonomous inspection is still a big open challenge \cite{Rome1999TowardsAS}. Especially for the complex snake-like robots with clamping mechanisms, the control and navigation are very complicated, and no fully autonomous and robust solutions for navigating complex pipeline networks with sharp corners and vertical sections are yet present.
\subsection{PIRATE Robot}
The PIRATE robot \cite{dertien2011development} is designed to travel through pipes having different diameters, vertical sections and sharp corners.
The PIRATE robot has six actuated joints $J_{1,\dots,6}$ and six actuated wheels $w_{1,\dots,6}$, as shown in Figure \ref{fig:schematic_pirate}.
\begin{figure}[h!]
\centering
\includegraphics[width=0.75\linewidth]{figs/schematicpirate.png}
\caption{Schematic drawing of the PIRATE robot. $w_i$ indicates the $i^{th}$-wheels, $J_i$ the $i^{th}$-joints and $V$ the vision sensor. Figure reproduced and adapted from \cite{dertien2011development}.}
\label{fig:schematic_pirate}
\end{figure}
The robot is composed of two (inverted) V-shape sections ($w_{1, 2, 3}$ and $w_{4, 5, 6}$) that allow its clamping inside the pipes. Each joint and wheel can be either controlled through position or velocity set-points fed to low-level (PID) controllers running on embedded boards. The robot is equipped with absolute encoders for measuring the joints and wheels' rotation and with inertial measurement units (IMU) for measuring acceleration and orientation.
Moreover, the robot perception is enhanced with cameras for visual inspection and with Light Detection and Ranging (LiDAR) sensors for navigation.
\section{METHODOLOGY} \label{sec:methodology}
\subsection{Reinforcement Learning for the PIRATE Robot} \label{subsec: state_action_space}
\subsubsection{The Action Space}
The action space $\mathcal{A} \in \mathbb{R}^{12}$ is chosen to be continuous to be able to execute smoother and more advanced manoeuvres. For this reason, the Reinforcement Learning algorithm chosen is PPO, similarly to \cite{Frans2017MetaLS}.
Each wheel $w_{1,\dots,6}$ and each clamping joint $J_{1,2,4,5}$ are controlled using velocity commands, while the rotational joint $J_3$ and the vision-sensor joint $J_6$ are controlled using position commands, as shown in Table \ref{tab_1}. Our experiments have found beneficial the position control of the rotation joint $J_3$ and the vision-sensor joint $J_6$ for achieving more accurate motion. These two joints are critical for the orientation procedure of the robot with respect to corners\footnote{Due to its mechanics, the PIRATE robot requires a specific relative orientation with respect to the pipe corners in order to navigate through it.}, and for their detection, respectively.
\begin{table} [h!]
\centering
\scalebox{1.0}{
\begin{tabular}{ ||c|c|c|| }
\hline
Control Mode & \textit{velocity} & \textit{position} \\
\hline
Action space & $J_{1,2,4,5}, w_{1, \dots, 6} $& $J_3, J_6$ \\
\hline
\end{tabular}}
\caption{Control modes for the PPO policy, \textit{velocity} corresponds to the velocity control of the actuators, while \textit{position} to the position control.}
\label{tab_1}
\end{table}
\subsubsection{The State Space}
We compare and analyse two alternative state spaces: the \textit{kinematic} and the \textit{visual}. The \textit{kinematic} state-set includes all the kinematic information such as the positions $q_{J_{1,\dots,6}}$, orientations $o_{J_{1,\dots,6}}$ and velocities $v_{J_{1,\dots,6}}$ of the joints in the space, the positions $p_{w_{1,\dots,6}}$ and velocities $v_{w_{1,\dots,6}}$ of the wheels in the space, and the previous actions taken $a_{t-1}$. The \textit{visual} state-set extends the \textit{kinematic} one with external perception, i.e. 3D depth images $i_d$.
It is worth mentioning that the absolute positions, orientations of the robot in the space can be estimated, for example, by means of any Simultaneous Localization and Mapping algorithm \cite{thrun2002probabilistic}. However, for the sake of simplicity, we assume to have a good estimate available. Moreover, wheels and joints relative positions and velocities can be measured using the onboard sensors (encoders and IMUs).
\subsubsection{The Reward Function}
For a generic inspection task, the goal is to inspect as much of the pipeline as possible. Thus the reward function that the agent tries to maximise is proportional to the forward distance travelled by the robot. The reward function is shown in Equation (\ref{reward_distance}).
\begin{equation}
\text{R}(s_t, a_t) = d_t - d_{t-1}
\label{reward_distance}
\end{equation}
where $d_t$ corresponds to the absolute position of the robot at time-step $t$ and $d_{t-1}$ to the position at time-step $t-1$ with respect to the origin of the chosen reference frame. This reward function encourages the agent to drive the robot forward in the pipeline.
\subsection{Hierarchical RL and Policy Decomposition} \label{sec:HRL}
\begin{figure}[h!]
\centering
\includegraphics[width=1.0\linewidth]{figs/hierarchial_schematic.png}
\caption{Hierarchical decomposition of the policies.}
\label{fig:hrl_policy}
\end{figure}
While the task of learning to navigate might be easy for differential-drive mobile robots, for complex multi-actuated robots in constraint environments, this is not the case. In particular, moving through a straight section or a corner of the pipeline networks requires complicated coordination of actuators over long sequences of atomic actions. However, the high-level control is relatively straightforward, and all pipe inspection robots share the same needs of either travelling through straight pipes or moving through corners and junctions.
We can exploit such a structure by hierarchically decomposing the Reinforcement Learning policy into a \textit{Master} policy and three \textit{sub-policies}.
\subsubsection{Master Policy and Sub-Policies}
We introduce a two-level hierarchical policy architecture, inspired by the Option framework \cite{sutton1999between}, where the \textit{Master} policy chooses which of the three sub-policies to deploy to maximise the reward function, in Equation (\ref{reward_distance}). Each sub-policy corresponds to a specific skill the agent requires to navigate through the pipeline networks, namely clamping and driving, and entering and exiting a corner, as shown in Figure \ref{fig:hrl_policy}.
The \textit{Clamp Drive} sub-policy is responsible for clamping the robot in the pipes and drive through straight sections. Due to the robot's mechanics, driving and clamping are dependent actions, and the robot cannot travel any pipe without first clamping its body in it. The \textit{Enter Turn} sub-policy is in charge of driving the first V-shape of the robot through the corner, while \textit{Exit Turn} completes the turning procedure and clamps the robot in the new pipe segment, as shown in Figure \ref{fig:turning_subpolicies}. The turning procedure is the most challenging to learn. Thus we split this task into two different skills.
\begin{figure}[!h]
\centering
\begin{subfigure}{0.45\textwidth}
\centering
\includegraphics[width=1.0\textwidth]{figs/enter-turn-schematic.png}
\captionsetup{justification=centering}
\caption{\textit{Enter Turn}}
\label{fig:enter}
\end{subfigure}
\begin{subfigure}{0.45\textwidth}
\centering
\includegraphics[width=0.70\textwidth]{figs/outward_turn_schematic.png}
\captionsetup{justification=centering}
\caption{\textit{Exit Turn}}
\label{fig:outward}
\end{subfigure}
\captionsetup{justification=centering}
\caption{Motion of the PIRATE robot through a corner.}
\label{fig:turning_subpolicies}
\end{figure}
The \textit{Master} policy tries to learn to choose the correct abstract action, or skill, for the circumstance. This policy receives observation only when a specific sub-policy has finished its execution, i.e. after 30 time-steps or when an early stopping condition is met (e.g. when the goal is reached) in our case. Because the \textit{Master} policy picks action with a lower frequency than the sub-policies, it is even more important that such policy receives good observations from the environment. Otherwise, it is not able to choose the best sub-policy to enable. For example, if the depth camera is pointing at the ceiling or the bottom of the pipe, and no clear view of the pipe is present, the \textit{Master} policy has no way to know if the robot is close to a corner and what is its orientation. However, the hierarchical decomposition of the task allows us to define auxiliary reward functions for each of the sub-policies that can speed up the learning of the skills and consequently of the task. This is discussed in Section \ref{subsubsec:rew_aux}.
Another advantage of the policy decomposition is the possibility to constrain the action spaces of each sub-policy. This decomposition, again, allows learning better policies more efficiently. The choice of the different action spaces is shown in Table \ref{tab_2}. While the \textit{Clamp Drive} policy keeps the action space defined in Table \ref{tab_1}, while the \textit{Enter Turn} and \textit{Exit Turn} disable the front-wheels rotation and back-wheel rotation respectively. These wheels are not needed for moving through corners and junctions. Moreover, the control mode of joints is switched to position control, except for joints $J_1$ and $J_5$ respectively\footnote{The joints $J_1$ and $J_5$ need to hold the clamping of their V-shapes of the robot, and in our experiments, we have discovered velocity control mode optimal for such task.}, for more accurate manoeuvring.
\begin{table} [h!]
\centering
\scalebox{1.0}{
\begin{tabular}{ ||c|c|c|c|| }
\hline
Control Mode & \textit{velocity} & \textit{position} & \textit{N/A} \\
\hline
\textit{Clamp Drive} & $J_{1,2,4,5}, w_{1, \dots, 6} $& $J_3, J_6$ & - \\
\textit{Enter Turn} & $J_1, w_{1,2,3}$ & $J_{2,\dots,6}$ & $w_{4,5,6}$\\
\textit{Exit Turn} & $J_5, ,w_{4,5,6}$ & $J_{1,2,3,4,6}$& $w_{1,2,3}$ \\
\hline
\end{tabular}}
\caption{Action space and control modes for the different sub-policies. \textit{velocity} corresponds to velocity control of the actuators, \textit{position} to position control and \textit{N/A} if the actuator is not used by the sub-policy.}
\label{tab_2}
\end{table}
This choice of hierarchy is driven by the nature of the task, the robot's knowledge, and the topology of the pipeline networks. However, it can be easily adapted to different pipe inspection robots, given the similarities of tasks and mechanics of such robots. The three sub-policies define three different high-level skills the agent has to learn to navigate any pipe. In general, one could think of lower-level sets of skills, such as, for example, two independent clamping and unclamping policies for the V-shapes or one policy for actuating all the wheels independently of the joints. However, this would be detrimental to the overall performance. Due to the robot mechanics, most of the low-level atomic skills are dependent on each other, e.g. if both V-shapes are clamped, the PIRATE robot cannot actuate the joint $J_3$. Thus the \textit{Master} policy would need to learn an even more complex sequence of commands. Moreover, with a finer discretisation of the skills, the \textit{Master} policy task would become more complex as it is harder to distinguish which skill to use in each state. The proposed hierarchy trades off the task-complexity for the \textit{Master} policy and the sub-policy.
\subsubsection{Auxiliary Reward Functions for the Sub-Policies}\label{subsubsec:rew_aux}
To specialise the sub-policy and to quickly learn the skills, we define a \textit{clamping} reward that promotes clamping. This is particularly useful in the \textit{Clamp Drive} policy. Additionally, we employ a \textit{depth-camera} reward for promoting the proper orientation of the depth camera in the direction of the pipe axis to obtain more and better information about the pipe network.
\section{Experimental Design} \label{sec:experimental_design}
\begin{figure*}[!ht]
\centering
\begin{subfigure}{0.49\textwidth}
\centering
\includegraphics[width=0.9\textwidth]{figs/static.png}
\captionsetup{justification=centering}
\caption{}
\label{fig:singleRLstatic}
\end{subfigure}
\begin{subfigure}{0.49\textwidth}
\centering
\includegraphics[width=0.9\textwidth]{figs/dynamic.png}
\captionsetup{justification=centering}
\caption{}
\label{fig:singleRLdynamic}
\end{subfigure}
\captionsetup{justification=centering}
\caption{Cumulative reward during training of the PPO policy with different observation groups in the case of \textit{static} environment (Figure \ref{fig:singleRLstatic}) and \textit{dynamic} (Figure \ref{fig:singleRLdynamic}). The solid line represents the average cumulative reward, while the shaded area its standard deviation.}
\label{fig:singleRLobs}
\end{figure*}
\subsection{Autonomous Navigation in Pipeline Networks}
The goal of the experiments is to learn an optimal navigation policy for manoeuvring the PIRATE robot in an unknown a priori pipeline network. In this work, we focus on the navigation problem in pipeline networks composed of straight sections and \SI{90}{\degree} bends with different smoothness, either 1D and 2D\footnote{Pipe corners are classified by indicating the smoothness of the corner with respect to the diameter of the pipe D}. We assume that the agent does not know the position of the end-point of the inspection mission, but it can detect it once the robot reaches it. This scenario represents a generic inspection mission. The robot has to autonomously navigate until a problem, e.g. a crack or corrosion in the pipe wall and a consequent reduction of the wall thickness, is found.
We train and test the agents in a \textit{static} pipeline, i.e. the pipeline is not changing over training nor testing. In a \textit{dynamic} pipeline, i.e. the pipeline network is randomly changing configuration in each training episode. The possible changes occurring in the pipeline are changes in the direction of the corners and relative distance among them.
\subsection{Simulation Environment}
We test the approach in the simulation environment V-REP \cite{coppeliaSim} using a model of the PIRATE robot. V-REP allows for realistic physical simulations and allows learning transferrable policies to real robots \cite{james2017transferring}. Bullet physical engine \cite{erickson2019assistive} is used. Moreover, the Ray framework and the RLlib library \cite{moritz_ray_2018} are used for developing the HRL framework. OpenAI Gym \cite{1606.01540} support is available in RLlib, and this is used to build the RL environment. OpenAI Gym provides a framework to build a custom RL environment. RLlib communicates with V-REP by using PyRep \cite{james2019pyrep}. Furthermore, RLlib uses the TensorFlow library for building neural network models. The PPO implementation of RLlib is used for training the agents.
\subsection{State Space and Neural Network Architectures}
We first study the effect of the two different state-sets, introduced in Section \ref{subsec: state_action_space}, on the performances of a single PPO agent, with action space defined in Table \ref{tab_1}, when trained on a \textit{static} and a \textit{dynamic} pipe configuration.
\subsubsection{Network Architecture}
In the case of the \textit{kinematic} state-set, the policy and the value function networks share a single fully connected layer of dimension 128 with tanh activation. The features are then fed to two identical branches composed of two fully connected layers of dimensions 128 and 64, respectively, with tanh activations. The output layer for the policy network has the dimension of the action space, while it has dimension 1 for the value function network.
When the \textit{visual} state-set is employed, the depth images are initially separated from the kinematic information of the state vector and pre-processed by two convolutional layers, with 5 and 10 filters, respectively, of size $5 \times 5$, and stride 2, and by a fully-connected layer. These features, extracted from the depth images, are then concatenated to the other elements of the state vector and fed to the same architecture used by the \textit{kinematic} state-set. A similar architecture is successfully employed in \cite{james2017transferring}.
In the case of the \textit{visual} state-set, we also study the use of a recurrent architecture, adding a single LSTM layer to the \textit{visual} architecture, after the concatenation of the features from the depth images and the other components of the state vector.
\subsection{RL vs HRL}
To assess the value of the hierarchical policy architecture, we compare the single PPO agent with the HRL agent trained proposed hierarchical approach on both \textit{static} and \textit{dynamic} pipeline networks using the \textit{visual} observation group.
\subsubsection{Training Regime of the HRL Method} \label{sec:trainingRegime}
We test two different training approaches for the HRL architecture: simultaneous optimisation of the four policies and independent optimisation of the policies. In simultaneous optimisation, the \textit{Master} policy and the sub-policies are optimised at the same time in the same environment. In contrast, in the independent optimisation procedure, the sub-policies are first trained in specialised environments\footnote{For example, a specialised environment for the \textit{Clamp Drive} sub-policy is composed of only straight pipes.} and, only once optimised, the master policy is trained.
\section{RESULTS AND DISCUSSIONS} \label{sec:experimental_results}
\begin{figure*}[ht]
\centering
\begin{subfigure}{0.45\textwidth}
\centering
\includegraphics[width=1\textwidth]{figs/hrl_sum.png}
\captionsetup{justification=centering}
\caption{}
\label{fig:results_comparison}
\end{subfigure}
\begin{subfigure}{0.45\textwidth}
\centering
\includegraphics[width=0.95\textwidth]{figs/5pipesystem.png}
\captionsetup{justification=centering}
\caption{}
\label{fig:eval}
\end{subfigure}
\captionsetup{justification=centering}
\caption{Comparison of HRL with sub-policy pre-training (red), HRL with joint optimisation of the sub-policies (blue) and single PPO agent (green).
The training results are shown in Figure \ref{fig:results_comparison} where
the average reward (solid line) and the standard deviation (shaded area) are presented. The evaluation pipeline network is shown in Figure \ref{fig:eval}.}
\label{fig:HRL-final}
\end{figure*}
\subsection{Different Observation Groups}
We first present the results obtained with the single PPO agent (SRL) with the two different observation groups in the \textit{static} and \textit{dynamic} environments. For each observation group, four independent experiments are performed, and the results are shown in Figure \ref{fig:singleRLobs}.
While the \textit{visual} state set is sufficient for completing the task\footnote{Considering the length of the pipes, a cumulative reward value above 35 means that the task is solved.} of navigating a 3-junctions pipe in the \textit{static} environment, see Figure \ref{fig:singleRLstatic}, it is not enough in the \textit{dynamic} case in which the three junctions randomly change position and orientation each training episode, as shown in Figure \ref{fig:singleRLdynamic}. The agent observing the depth images outperforms the one relying only on the kinematic information. Thus, we can conclude that it is not possible to learn a policy that drives the robot through the pipes by only looking at the kinematic information.
Moreover, in the \textit{dynamic} case, the \textit{kinematic} state-set generates catastrophic forgetting, as shown in Figure \ref{fig:singleRLdynamic}, where the performances of the policy start decreasing the more the training goes on. Surprisingly, in the \textit{dynamic} environment with only three junctions, even the \textit{visual} state-set does not allow sufficient policy improvements to reach the end of the pipe. The single PPO agent cannot learn a robust policy to deal with a random pipe-network configuration. Eventually, the \textit{visual} policy with LSTM does not improve the performances either in the \textit{static} case or in the \textit{dynamic} one. By including information on the positions and velocities of all the wheels and joints and depth information about the pipe network, the state vector already contains all the information needed to determine the state of the environment and, consequently, choose the best actions.
\subsection{Comparison of the RL and HRL Performances}
We now present the results obtained using the HRL framework proposed in Section \ref{sec:HRL} in a \textit{dynamic} 5-junctions pipe network. In particular, we compare HRL with pre-training of the sub-policies in different and specialised environments (HRL VISUAL) with the joint optimisation of all the policies (HRL SIMUL), as described in Section \ref{sec:trainingRegime}, and the single PPO (SRL VISUAL). The \textit{visual} state-set is used by all the agents. The average cumulative rewards obtained during training in the 5-junctions \textit{dynamic} environment are shown in Figure \ref{fig:results_comparison}. Again, four independent experiments are performed for each curve in the plot. Both HRL agents outperform PPO, but while HRL VISUAL consistently solves the task,
HRL SIMUL struggles to achieve the same performance. The independent training of the sub-policies has a positive influence on the overall performances of the HRL-agent.
After the training phase, the performances of the agents are evaluated in unseen a priori environments. In Figure \ref{fig:eval}, we show the evaluation in a challenging and randomly generated pipeline with five junctions. We report in Table \ref{tab:compareresults} the distance travelled in meters by the different agents.
The single PPO agent (SRL VISUAL) can steer the robot only through the first corner and cannot advance more. The second corner requires the use of the rotation joint ($J_3$) to orient the front V-shape of the robot in the correct direction, but the PPO agent struggles to learn that. The proper re-orientation of the front is found one of the critical and most challenging manoeuvres for advancing through the pipe corners. The HRL agents perform better than PPO, but while the HRL with pre-training (HRL VISUAL) can steer the robot through all the five junctions, the HRL with simultaneous optimisation (HRL SIMUL) cannot make the robot escaping the fourth corner. The fourth corner requires great precision and robustness for each sub-policy, as it requires the re-orientation of the front modules of the robot while travelling upside down. This manoeuvre is more challenging to achieve when jointly training all the policies together. Again the policy with LSTM does not seem to improve the performance compared to the non-recurrent policy.
A video of our experiments can be found at: \url{https://youtu.be/H9IxZ1NYga4}.
\subsection{Comparison with Human Control}
The PIRATE robot can be driven through the pipes by a human operator \cite{dertien2011development}, but only in the case of transparent pipes that allow the operator to see the robot constantly.
However, this operation is not practical in real scenarios when the operators can only rely on onboard sensors to control the robot.
To show the benefits of the use of Reinforcement Learning for controlling such pipe inspection robots, we try to manually control the robot in the same task of navigating through the pipe in Figure \ref{fig:eval}. For fairness of comparison, the operator cannot see through the pipes and can rely on the same action space of the RL agents (Table \ref{tab_1}) and the information contained in the \textit{visual} state-set, i.e. depth-camera images and kinematic information.
When relying only on depth-camera images and kinematic information, a human struggles to complete the 5-junctions task, in Figure \ref{fig:eval}, even after many trials. In Table \ref{tab:compareresults} we record the best trails.
It is worth mentioning that a human operator may eventually solve the task for a fixed pipeline configuration. However, in the general inspection settings, the pipe configuration can change depending on the inspection task and can be even more complex. Thus, the human control of the robot does not seem a viable solution in this context.
\begin{table}[h!]
\centering
\scalebox{1.0}{
\begin{tabular}{||c|c||}
\hline
Method & Dist. traveled (m) \\
\hline
SRL VISUAL & 2.02 \\
HRL SIMUL & 4.83 \\
HRL VISUAL & $6.60^*$ \\
HUMAN & 4.88 \\
\hline
\end{tabular}}
\caption{Distance travelled in meters by different approaches in the evaluation environment in Figure \ref{fig:eval}. Only the HRL with pre-trained sub-policies (HRL VISUAL) completes the task.}
\label{tab:compareresults}
\end{table}
\subsection{Transferring the Policies to the Real Robot}
Because the experiments are conducted in simulated environments, the transfer of the learned policies to the real robot is an important aspect that has to be further investigated in future work.
The proposed HRL framework has proven to be robust against perturbations of the observations, e.g. additive noise on sensory readings, and can generalize to different and untrained pipe configurations.
Moreover, while earlier research showed that policies, learned in virtual environments, relying on RGB images, are troublesome to transfer to the real-world \cite{matas2018simtoreal}, in our experiments, the agents only use a depth camera to perceive the environment and onboard sensory readings (encoders and IMUs) to obtain information of the robot's kinematic. Eventually, the agents' actions are position and velocity set-points for the robot's actuators. These set-points are then fed to low-level controllers that are in charge of tracking such reference values. By avoiding direct torque control of the actuators and by assuming well-tuned low-level controllers with similar performances to the one present on the actual robot, the difference in the dynamics between simulation and real-world is mitigated \cite{kober2013reinforcement}.
\section{CONCLUSIONS} \label{sec:conclusions}
We presented a two-layers HRL framework for autonomous navigation of the snake-like pipe inspection robot PIRATE in pipeline networks with different topologies.
We showed that the proposed hierarchical decomposition of the policies is necessary for solving the navigation problem of such robots in pipes with multiple junctions and with random configurations.
The hierarchical decomposition allows learning a robust set of skills, and it is crucial for the generalization of the policy to unseen a priori pipeline networks. Moreover, with the proposed decomposition, the \textit{Master} policy can learn different inspection missions if retrained with a different reward function and without the need of retraining the sub-policies.
Eventually, when the sub-policies are pre-trained separately in specialised environments, the hierarchical framework outperforms human-controlled operations.
\section*{APPENDIX}
\subsection{Hyperparameters Tuning}
Three independent grid-search experiments are performed to find a good set of hyperparameters. This is shown in Table \ref{tab-hyper}.
\begin{table} [h!]
\centering
\scalebox{1.0}{
\begin{tabular}{ ||c|| }
\hline
Experiment 1 \\
\hline
Learning rate \\
{[}1e-4,1e-5*,1e-6{]} \\
\hline
Experiment 2 \\
\hline
Clip, Lambda, Entropy-coefficient \\
{[}0.1,0.2*{]}, {[}0.99*,0.95{]} , {[}0.005*,0.01{]} \\
\hline
Experiment 3 \\
\hline
Train-batch-size, Mini-batch-size \\
{[}500,1000*,2000{]}, {[}300*,100{]} \\
\hline
\end{tabular}}
\caption{Hyperparameters ranges used in the grid search experiments. * indicates the value used in the experiments presented in the paper.}
\label{tab-hyper}
\end{table}
\section*{ACKNOWLEDGMENT}
Nicolò Botteghi has received funding from Smart Tooling. Smart Tooling is an Interreg Flanders-Netherlands project sponsored by the European Union focused on automation in the process industry: making maintenance safer, cheaper, cleaner, and more efficient by developing new robot prototypes and tools.
|
\section{Acknowledgements}
\section{Practical Implementation}\label{practical}
\begin{figure}
\centering
\includegraphics[scale=0.35]{figs/GUI.jpg}
\caption[Interface of the LoadGAN Application.]{Interface of the LoadGAN application.}
\label{gui}
\end{figure}
\subsection{LoadGAN - Open source application}\label{ch7_gui}
All the code developed as part of this project is publicly available online at \cite{appendix}. This GitHub repository contains the code used to create and train the generative models for each of the levels as well as the fully trained models which can be directly used to generate new synthetic load data. In addition to the raw code, we created an application for the generation of multi-resolution time-series data, called LoadGAN, which can be used via a graphical user interface (GUI).
LoadGAN allows a user to generate unique synthetic data tailored to a specific application by leveraging all of the features of the generative scheme. Figure~\ref{gui} shows the settings which are available for the targeted generation of synthetic load data. Multiple profiles can be generated simultaneously by specifying the number of mainly residential and mainly industrial loads in a system. The sampling resolution of the synthetic data is entered as number of samples over sampling period; as an example, Fig.~\ref{gui} shows a resolution of 1 sample/10 minutes, as specified by IEC 61000-4-30. As described in the previous section, the aggregation to a specific resolution can be achieved by computing the mean, minimum or maximum value over the sampling period; the user can select the desired aggregation type. The temporal length of the generated data can be specified from a few seconds to one entire year. Finally, the user can select the season to be used as label for the generation of the week-long profiles. When creating a full year of data, this setting will be overridden and the data will be generated based on the correct sequence of seasons, starting in winter (January 1st). The synthetic data generated is saved in .csv format and the destination folder and file name can be modified by the user. The application also computes the estimated file size based on the currently selected settings before the data is generated.
\subsection{Validation of synthetic data}
In Section~\ref{loadmodelling}, the generative models for each level have been validated by performing several tests on the synthetic data generated by them. These tests showed that the synthetic load profiles retain the characteristics of the real data and they can successfully be used for power system applications. The last step in validating the compete multi-resolution generative scheme consists in verifying that it can correctly create realistic load data at any resolution. By testing synthetic data at a sampling rate different from any of the four that were initially chosen for the four aggregation levels, we can effectively validate the techniques used for the aggregation of profiles from different levels as well as the re-sampling process to obtain a specific resolution.
The validation procedure consists in training a load forecasting algorithm solely on synthetically generated data and then testing it on the real data, similarly to what described in \cite{Pinceti2021PESGM} for the week-long profiles. In this case, we test time-series load data sampled at 1 sample/10 minutes: to generate this data, profiles from Level 2 and 3 need to be combined together and then down-sampled to the chosen resolution. A long-short term memory (LSTM) network with four layers and 36 units per layer is trained to predict the load value at a given point in time, based on the previous six hours of data (that is, the previous 36 samples). The algorithm is trained on a dataset of about 8000 six-hours-long profiles synthetically generated using the LoadGAN application. The trained model is then tested on 1000 new synthetic profiles as well as 1000 profiles from real load data; to evaluate the performance, the absolute percentage difference between the actual and predicted value is computed. From the results shown in Table~\ref{ch7_forecasttable}, it can be noted that the characteristics of the forecasting error when tested on the two datasets match very closely. This means that although the model was only trained on synthetic data, it effectively captures the behavior of the real data.
\begin{table}[]
\centering
\caption[Comparison of the Forecasting Error Between Generated and Real Load Data, Sampled at 1 Sample/10 Minutes.]{Comparison of the forecasting error between generated and real load data, sampled at 1 sample/10 minutes.}
\label{ch7_forecasttable}
\begin{tabular}{|l|c|c|}
\hline
\multirow{2}{*}{\textbf{Testing Dataset}} & \multicolumn{2}{l|}{\textbf{Percentage Error}} \\ \cline{2-3}
& \begin{tabular}[c]{@{}c@{}}Mean \end{tabular} & \begin{tabular}[c]{@{}c@{}}Std. Dev.\\ \end{tabular} \\ \hline
\multicolumn{1}{|c|}{Synthetic} & 2.15 & 2.35 \\ \hline
\multicolumn{1}{|c|}{Real} & 2.08 & 1.58 \\ \hline
\end{tabular}
\end{table}
\section{Conclusion}
A complete scheme for the generation of time-series load data is proposed. To capture load behaviors at different time-scales, the generative framework leverages multiple models (GANs, cGANs, and PCA-based models). By appropriately combining these models, realistic load data of any time length and resolution can be generated. Each of these models is extensively tested and the aggregation scheme is carefully designed to produce high-quality, realistic time-series data. All of these components have been compiled into a simple open-source graphical interface that, along with the trained generative models, allows an end-user to quickly generate any amount of synthetic load data based on selectable parameters.
More broadly, the generative scheme we designed represents a flexible framework which can be tuned to capture an even larger number of interesting load characteristics. For example, the generation of representative load scenarios is crucial to ensure the reliability of our fast-evolving electrical grid. The ability of the proposed generative scheme to learn and subsequently generate data conditioned on different load characteristics could be leveraged for the efficient modeling of loads with varying degrees of penetration of electrical vehicles and/or distributed energy resources.
\section{Load Modelling}\label{loadmodelling}
In this section, the down-sampling of the time-series data and the generative models used are described for each level.
\subsection{Level 1 --- 30-second-long profiles}
At the lowest level, the load profiles are chosen to be 30 seconds long and sampled at the PMU rate of 30 samples per second. In order to be able to feed this data to the learning algorithm, each profile is individually normalized by dividing it by its average load value.
\begin{figure}
\centering
\includegraphics[scale=0.3]{figs/30sec_comp.png}
\caption{Comparison between two real 30-second-long profiles (left) and two synthetic 30-second-long profiles (right).}
\label{30sec_comp}
\end{figure}
The behavior of the 30-seconds-long profiles is learned and modelled using a basic GAN as described in Section \ref{cgan}. Given the temporal nature of the load data, the generator and discriminator are both represented by 1-dimensional (1D) convolutional neural networks of similar complexity. The discriminator uses a 1D convolutional layer to extract a spectral representation of the input profile and two fully-connected layers to decide if the profile is real or synthetic. Similarly, the generator takes the random vector of noise as input and it passes first through three fully-connected layers and then through two 1D transpose convolutional layers which perform an upscaling to the final output profile. The detailed architecture of the GAN used is shown in Fig.~\ref{30secGAN}.
In order to ensure a robust and successful training of the GAN, the generator and discriminator are trained following an iterative process. For each batch in an epoch, the discriminator is trained twice for each update of the generator. This gives the discriminator a slight edge, in turn forcing the generator to improve the quality of the synthetic profiles. For a visual representation of the results of the training process, Fig.~\ref{30sec_comp} shows a comparison between two real and two synthetically generated 30-second-long profiles. It is to be noted that while the generated data captures the behavior of the real data, the generator does not simply copy real profiles but instead creates completely new samples.
To quantitatively verify that the synthetic data retains the characteristics of real loads, two statistical tests are performed. First, the Wasserstein distance, a metric that measures the distance (or similarity) between two distributions, is used to compare the real and synthetic data. The Wasserstein distance between the distribution of real loads and that of the generated profiles is measured after each epoch during the training process. Figure~\ref{30sec_wd} shows this quantity as a function of the epoch number: at the beginning, the distance is relatively high, while as training progresses the distance drops and approaches zero. This means that the generator is correctly capturing the distribution of the real data. The second metric used is the power spectral density (PSD) which allows to observe the temporal characteristics of the profiles. Figure~\ref{30sec_psd} shows a comparison between the PSD of real and synthetic data, verifying that they both present the same overall behavior.
\begin{figure}
\centering
\includegraphics[scale=0.8]{figs/30sec_wd.png}
\caption{Wasserstein distance between real and generated 30-seconds-long data as a function of the epochs.}
\label{30sec_wd}
\end{figure}
\begin{figure}
\centering
\includegraphics[scale=0.8]{figs/30sec_psd.png}
\caption{Power spectral density comparison between real (blue) and synthetic (orange) 30-seconds-long datasets.}
\label{30sec_psd}
\end{figure}
\subsection{Level 2 --- Hour-long profiles}\label{hour_long}
The profiles at this level are sampled at 1 sample every 30 seconds for a length of one hour; this results in each sequence being 120 samples long. Each point is computed as the average load over the 30 second period. The normalization of each profile is performed by dividing by the average load over the one hour period and by de-trending the resulting sequence. The de-trending step is necessary because, at this resolution and time length, the load data presents two main patterns: slow, large-amplitude trends and smaller, faster load variations. The slower trends represent the overall change in load consumption from one hour to the next; these are fully captured by the hourly data from the third level and for this reason they do not need to be modeled here. By de-trending the signals, we extract the faster time-scale load changes which happen at a sub-minute scale. For each hour-long profile, the de-trending is performed by fitting a $4^{th}$ degree polynomial to the data from two hours before the selected hour to two hour after. Then, the fitted curve is subtracted from the hour-long profile. Figure~\ref{hour_detrend} illustrates the polynomial fitting and de-trending steps. This process allows to better capture the real trend by taking into consideration the behavior of the load before and after the hour to be normalized. As shown in the next section, this guarantees a more realistic output when generating large amounts of synthetic data.
\begin{figure}
\centering
\includegraphics[scale=0.5]{figs/hour_detrend.png}
\caption{Example of the de-trending process for hour-long profiles. A polynomial line is fitted to 5 hours of data (top) and then subtracted from the hour to be normalized (bottom).}
\label{hour_detrend}
\end{figure}
\begin{figure}
\centering
\includegraphics[scale=0.3]{figs/hour_comp.png}
\caption{Comparison between two real hour-long profiles (left) and two synthetic hour-long profiles (right).}
\label{hour_comp}
\end{figure}
The profiles at this level are modelled using a similar GAN to the one described in the previous section. Most of the hyper-parameters (such as those related to the loss function, learning rate and decay rate) are directly transferred from the 30-seconds-long GAN and only required minimum adjusting. The same training strategy is also used here: the discriminator is updated twice as often as the generator in order to achieve a more robust training convergence.
The synthetic hour-long data resulting from the trained GAN is validated following the same procedure as described for the 30-seconds-long profiles in the previous section. The detailed results as well as the GAN architecture can be found in the Appendix \cite{appendix}. For a visual comparison, Fig.~\ref{hour_comp} shows randomly selected examples of real and synthetic hour-long profiles.
\subsection{Level 3 --- Week-long profiles}
At this level, the time-series load profiles are computed to be one week long and sampled at 1 sample per hour. Each sample represents the average load over the corresponding one hour period. Each week-long profile is also normalized by dividing it by its corresponding average weekly load.
To model the load profiles at this level, we use the cGAN we developed in \cite{Pinceti2021PESGM}. The generation of week-long synthetic data is conditioned on two labels simultaneously: the load type (mainly residential or mainly industrial) and the season. In \cite{Pinceti2021PESGM}, we showed that the 1-dimensional convolutional neural networks chosen for the generator and the discriminator allowed for the successful training of the cGAN. The quality of the resulting synthetic data was verified based on the statistical tests used in the previous two sections as well as downstream applications. The synthetic data was successfully used to train a load forecasting algorithm and to perform AC optimal power flow on a test system. The complete validation results for the cGAN can be found in \cite{Pinceti2021PESGM} as well as in the Appendix \cite{appendix}.
\subsection{Level 4 --- Year-long profiles}
The year-long profiles from the top level, which have a resolution of 1 sample per week, capture the long-term monthly and seasonal patterns. For each load, one year of data is down-sampled by computing the average weekly load, resulting in a profile 52 samples long. Since 12 loads are available over two years, a total of 24 year-long profiles are obtained. At this time-scale and resolution, residential and industrial loads present very different behaviors: the former show distinct peaks during summer and winter, while the latter are more constant throughout the year.
Given the limited diversity and complexity of the load profiles at this level, along with the small number of real profiles available, the generative model presented in \cite{pincetiPESGM19} is used. This approach is based on using singular value decomposition (SVD) as a way to extract prototypical load patterns from the real data and subsequently generate new, realistic data by taking linear combinations of them. This model, while simpler than the GANs used for the other levels, is sufficient to capture the main behaviors of these loads and it should be preferred given its higher interpretability. In fact, \cite{GAN_PCA} shows that methods based on principal component analysis (such as the SVD-based approach used here), under certain conditions, can fully describe Gaussian data. Given the highly averaged nature of the load profiles at this level, it is reasonable to assume for this to apply to the year-long time-series data.
\begin{figure}
\centering
\includegraphics[scale=0.38]{figs/year_comp.png}
\caption{Comparison between real (left) and generated (right) year-long profiles for mainly residential loads (top) and mainly industrial loads (bottom).}
\label{year_rescomp}
\end{figure}
Two independent models are learned for the two types of loads (mainly residential and mainly industrial). Each dataset has size of $12 \times 52$ (12 profiles, each with 52 samples). Given a load matrix $L \in \mathbb{R}^{12\times52}$, singular value decomposition is performed as follows:
\begin{equation}
L=U \Sigma V^T
\end{equation}
where the rows of $V^T$ correspond to the prototypical load patterns and the singular values in the diagonal matrix $\Sigma$ represent their respective weights. Thus, each load profile is a linear combination of the weighted yearly patterns based on their unique coefficients in each row of the $U$ matrix. To generate new, realistic profiles, first the distributions of each of the 12 columns of the coefficient matrix $U$ are learned. Then, a new coefficient vector is sampled and multiplied by $\Sigma V^T$. This process is performed independently for mainly residential and mainly industrial loads. Figure~\ref{year_rescomp} shows a comparison between real and generated profiles for the two load types.
\section{Multi-resolution synthetic data}\label{combining}
Using the trained generative models for each aggregation level, it is possible to generate synthetic data for any time-length and any time-resolution by combining multiple profiles together. In particular, to obtain longer times, several profiles at a given level are concatenated together. Furthermore, to obtain a specific resolution, profiles at different levels can be combined together. In Sections~\ref{horcomb} and \ref{vercomb} these two types of aggregation are described and some examples are shown. Section~\ref{anyres} presents a method to obtain any specific user-defined time-resolution without being limited to the predefined resolutions of the four original aggregation levels.
\subsection{Concatenating load profiles}\label{horcomb}
At each level, a trained generative model creates profiles of fixed length, based on the length of the real profiles used for training. To obtain a longer time duration, multiple profiles from a given level need to be concatenated together. For example, if four weeks of data are required, the cGAN for Level 3 is used to generate four individual week-long profiles which are then concatenated together to obtain the final time-length. Depending on the specific scenario, attention needs to be paid to ensure that the correct load characteristics are maintained; for example, the load type and season labels must be consistent when generating the four week-long profiles.
While this approach is very straightforward and it naturally follows from the load aggregation structure chosen, it presents one challenge: ensuring continuity at the seam between two concatenated profiles. Because consecutive profiles are generated independently, concatenating them could result in some degree of mismatch between the end of one profile and the start of the next one.
For the profiles at Level 3 (week-long profiles), a linear filter is used to smoothen the seam between two profiles. The linear filter is applied to the last two points of one profile and the first two points of the following one. Moreover, the filter is chosen to have a size of five; that means that each point is adjusted as a linear combination of itself and the previous two and following two values, that is
\begin{equation}
x_{k}^{\text{new}} = \sum_{i=-2}^{2} \beta_{i} x_{k+i}
\end{equation}
where, $x_k$ is the sample to which the filter is applied, $x_{k}^{\text{new}}$ is the new, filtered value and $\beta$ is the vector of filter weights. The specific values of the filter are learned from the real load dataset by solving the following least-square problem:
\begin{equation}
X_{[-2,-1,1,2]}\ \beta_{[-2,-1,1,2]} = 0.5X_k
\end{equation}
where, $X_{[-2,-1,1,2]}$ is a matrix in which each row represents the two previous values and two following values of an entry $x_k$ and $\beta_{[-2,-1,1,2]}$ are the corresponding filter values. $X_k$ is the column vector of all values $x_k$ and using the factor 0.5 corresponds to fixing the value of $\beta_0 = 0.5$.
\begin{figure}
\centering
\includegraphics[scale=0.49]{figs/filter_summer_2.png}
\caption{Worst-case example of discontinuity between two concatenated summer profiles. The blue curve shows the load values before the filter is applied and the orange curve shows the filtered values which eliminate the discontinuity. The vertical line indicates the time coordinate of the last sample of the previous profile.}
\label{filter_summer}
\end{figure}
Figure~\ref{filter_summer} shows an example of the discontinuity that can be observed when concatenating two profiles from Level 3. The blue points represent the load values before applying the filter; the red curve shows the values after the linear filter is used. It can be seen that without the filter there is a sharp discontinuity at the seam between the two weeks; applying the filter results in a more regular load behavior. It is to be noted that the example shown represents a worst case scenarios, where the discontinuity is relatively large; in most cases, the concatenation does not result in a detectable discontinuity.
\begin{figure}
\centering
\includegraphics[scale=0.40]{figs/30sec_concat_examples.jpg}
\caption{Examples of concatenation of 30-second-long profiles from Level 1. Each plot shows two seconds of data at 30 sample/second obtained by concatenating two separate profiles. The first 30 samples represent the end of one profile and the second 30 samples are the beginning of the following profile. The vertical line indicates the last sample of the previous profile. In all cases, it can be seen that the concatenation does not produce any recognizable discontinuity.}
\label{30sec_concat_examples}
\end{figure}
At Levels 1 and 2, it was observed that concatenating profiles does not yield the same discontinuity issues as observed for Level 3. This behavior is to be expected because at these time scales the load fluctuations are much smaller compared to the hourly changes in the week-long profiles and the behavior of the loads is less regular and predictable. For these reasons, the load change between two consecutive profiles at Level 1 or 2 is indistinguishable from the normal load behavior. To better illustrate this, Fig.~\ref{30sec_concat_examples} shows four separate examples of concatenation of profiles from Level 1. Each plot shows two seconds of data at 30 sample/second obtained by concatenating two separate profiles. The first 30 samples represent the end of one profile and the second 30 samples are the beginning of the following profile. In all cases, it can be seen that the concatenation does not produce any recognizable discontinuity. While visual inspection of several generated profiles provided a qualitative confirmation of this phenomena, a statistical analysis is performed to further verify this observation. In particular, the percentage difference between the last sample of a profile and the first sample of the following profile is measured for a dataset of real data and a dataset of synthetically generated data. Table~\ref{concat_analysis} shows a comparison of the mean and standard deviation of the percentage difference observed in the real and synthetic datasets, for both profiles at Level 1 and Level 2. The results of this statistical analysis confirm that a linear filter is not required to concatenate profiles from the two bottom levels since no significant difference can be observed between the seams of real profiles and generated profiles.
\begin{table}[]
\centering
\caption[Comparison of the Percentage Difference Between Consecutive Samples in Real and Generated Data, for Level 1 and Level 2.]{Comparison of the percentage difference between consecutive samples in real and generated data, for Level 1 and Level 2.}
\label{concat_analysis}
\begin{tabular}{|c|c|c|c|}
\hline
\multicolumn{1}{|l|}{\multirow{2}{*}{\textbf{Aggregation Level}}} & \multicolumn{1}{l|}{\multirow{2}{*}{\textbf{Dataset}}} & \multicolumn{2}{l|}{\textbf{Percentage Difference}} \\ \cline{3-4}
\multicolumn{1}{|l|}{} & \multicolumn{1}{l|}{} & \begin{tabular}[c]{@{}c@{}}Mean\\ {[}\%{]}\end{tabular} & \begin{tabular}[c]{@{}c@{}}Std. Dev.\\ {[}\%{]}\end{tabular} \\ \hline
\multirow{2}{*}{Level 2} & Real & 0.59 & 0.49 \\ \cline{2-4}
& Synthetic & 0.47 & 0.33 \\ \hline
\multirow{2}{*}{Level 1} & Real & 0.17 & 0.14 \\ \cline{2-4}
& Synthetic & 0.13 & 0.27 \\ \hline
\end{tabular}
\end{table}
\subsection{Combining profiles at different resolutions}\label{vercomb}
In the previous section, we showed how synthetic load data of any length can be obtained by concatenating multiple profiles. In order to capture behaviors at different time-scales and to generate data at a specific resolution it is necessary to also combine profiles from different levels. For example, if we are interested in hourly load data over an entire year, first 52 week-long profiles must be concatenated (following the correct seasons) to get the desired resolution (1 sample/hour) and secondly, they must be combined with one year-long profile from the fourth level to capture the long-term seasonal behavior of the load. The process of combining different levels follows directly from the aggregation scheme which was adopted initially to down-sample the load profiles at different resolutions. The steps to combine the different levels are as follows.
(i) \textit{Combining Levels 4 and 3.} The profiles from Level 4 (year-long profiles at 1 sample/week) capture the slow and long term changes in energy demand across months and years, while Level 3 (week-long profiles at 1 sample/hour) captures the daily load behavior. The real dataset of week-long profiles was normalized by dividing each profile by their average weekly load; at the same time, each point in the year-long profiles was computed as the average demand during any given week. This means that to combine the two levels together, each week-long profile must be scaled by the corresponding value in the year-long profile. The scaling is performed by multiplying the week-long profile at week $i$, defined as $X_2^i$, by the factor $x_{1,i} / \text{mean}(X_2^i)$, where $x_{1,i}$ is the value corresponding to the $i^{th}$ week from the year-long profile $X_1$. By doing so, the week-long profile is effectively normalized so that its average equals the corresponding value of the year-long profile.
(ii) \textit{Combining Levels 3 and 2.} For resolutions up to 1 sample every 30 seconds, the profiles from Level 3 need to be combined with profiles from Level 2 (hour-long profiles at 1 sample/30 seconds). The process of combining the hour-long profiles with a week-long profile consists of two steps: 1) scaling the hour-long profiles and 2) adding the polynomial trend. As we showed in Section~\ref{hour_long}, the last step in creating the hour-long profiles consisted in normalizing them by dividing by the average hourly load. For this reason, when generating the synthetic data, we first scale each hour-long profile by the corresponding value in the week-long profile following the same procedure as with Levels 4 and 3 above. Secondly, a polynomial trend is added to each hour-long profile in order to capture the slower load variations that can be observed from the week-long profile. The trend is computed by fitting a $4^{th}$ degree polynomial to the points in the week-long profile, from two hours before the hour of interest to two hours after.
\begin{figure}
\centering
\includegraphics[scale=0.26]{figs/hour_combine3.jpg}
\caption{Illustration of the process to combine profiles from Level 3 and 2. Plot a) shows 5 hours of data at Level 3, where each point represents the average hourly load. The orange curve represents the fitted 4-degree polynomial for hour number 0 which is obtained by fitting the data representing 2 hours before and two hours after the hour of interest (hour 0 in this case). Plot b) shows 5 hour-long profiles which have been concatenated to obtain 5 hours worth of data a 1 sample every 30 seconds. Plot c) shows the result of combining the profiles together.}
\label{hour_combine}
\end{figure}
This particular process is illustrated in Fig.~\ref{hour_combine}: in this example, 5 hours of data are generated by combining 5 hours from Level 3 and 5 hour-long profiles from Level 2. Since each point in Fig.~\ref{hour_combine}(a) represents the average hourly load, each of the 5 hour-long profiles are first scaled based on the corresponding average values and they are then concatenated to obtain five hours of consecutive data. To capture the overall behavior observed in the Level 3 profile, the polynomial trend must be added. For example, for the hour at time 0 hour-long profile, a polynomial curve (shown in orange in Fig.~\ref{hour_combine}(a)) is fitted to the five points representing two hours before and two hours after hour 0. This trend is then added to the hour-long profile and the resulting time-series is shown in plot c). By repeating this process for each hour, the overall envelope of the load is modeled.
At this point, it is also possible to demonstrate the validity of the polynomial trend approach by comparing it to a simpler, linear approach. Figure~\ref{hour_combine_example} shows six hours of data obtained by combining one profile from Level 3 and six profiles from Level 2. The blue curve represents the data combined using the polynomial approach, while in orange is the result of combining the profiles using a linear trend computed between two consecutive hours. It can be seen that using a $4^{th}$ degree polynomial yields a very smooth and natural behavior; on the other hand, the linear approach results in very sharp load changes where different hour-long profiles are concatenated together.
\begin{figure}
\centering
\includegraphics[scale=0.3]{figs/hour_combine_example.png}
\caption[Combining Levels 3 and 2: Comparison Between Polynomial and Linear Approach.]{Combining Levels 3 and 2: comparison between polynomial and linear approach.}
\label{hour_combine_example}
\end{figure}
(iii) \textit{Combining Levels 2 and 1.} The process of combining these two levels is the same as in case (i). The 30-second-long profiles of Level 1 were originally obtained by normalizing the real data by dividing them by their average value; at the same time, each point in the Level 2 profiles represents the average load over a 30 seconds period. Thus, the generated 30-second-long profiles are scaled by the corresponding value in the hour-long profiles to which they are combined with.
\subsection{Generating load profiles at arbitrary resolutions}\label{anyres}
To make the multi-resolution generative scheme we designed applicable to the largest number of use cases and applications, a user should not be limited to the four predetermined sampling resolutions which were used to disaggregate the data. To obtain a specific resolution, first, a synthetic load profile is generated by aggregating profiles from different levels as described in Section~\ref{vercomb} in such a way that the resulting time-series will have a resolution which is higher than that requested; then, the generated data is down-sampled to the exact resolution necessary. For example, a common sampling rate for load measurements is 1 sample/10 minutes as specified by the standard IEC 61000-4-30 \cite{iec61000-4-30}. As this resolution falls between that of the week-long profiles (1 sample/hour) and hour-long profiles (1 sample/30 seconds), the synthetic data will be generated by aggregating profiles down to sampling rate of Level 2 and the resulting output is then down-sampled to achieve the correct resolution.
The down-sampling is achieved by computing either the average, minimum, or maximum load over the desired sampling period. The choice of down-sampling metric depends on the specific resolution needed as well as the user requirements. For example, if daily load values are needed, the synthetic data will be generated at the week-long level at 1 sample/hour and then the values over a 24 hour period will be aggregated. Depending on the analysis for which the data is needed, the maximum daily value could be considered in order to provide a worst case scenario or the mean or minimum values could be computed to represent lighter load conditions.
\section{Introduction}\label{intro}
Traditionally, power system research has been based on the development of simplified physical models and the study of their interactions within a system. As a result, a large number of software tools now exists to perform virtually any type of power system analysis \cite{software}. However, the field of machine learning (ML) is experiencing a rapid growth resulting in increased applicability to many fields. For this reason, a large part of the research work within power systems currently focuses on the application of novel ML algorithms and data-driven analysis tools. This change in direction represents a major shift: moving away from physics-based device models to a data-centric analysis of system behaviors.
Unfortunately, one of the recognized issues which is hindering this process is the lack of widely available datasets of real power system measurements and data. In \cite{sharingdata}, the authors present a review of the current data sharing policies within the electric industry, highlighting several severe limitations as well as the value of increased collaboration. Similarly, the authors of \cite{PFENNINGER2017211} argue that power system data needs to be open and accessible in order to facilitate higher quality research and more effective policy solutions to tackle the challenges of an evolving grid. Moreover, they show that in terms of openness, the energy sector lags behind other industries. Another critical aspect is the fact that open availability of data and models reduces the doubling of work and efforts \cite{MEDJROUBI201714,PFENNINGER2017211} and allows to more effectively build on previous research.
Within this context, large efforts have been undertaken to generate realistic power system models which can be used in place of the proprietary, real-world models. Different approaches have been proposed and resulted in the creation of numerous large-scale grid models, both at the transmission and the distribution level. For example, researchers at Texas A\&M University have created realistic synthetic grids which attempt to capture the characteristics of real geographical regions \cite{birchfield,birchfiled2,birchfield3}, while \cite{eran} presents an automated algorithm to produce large numbers of models on demand, based on the statistical properties of real network graphs. While synthetic grid models are increasingly being used as the basis for many research projects, one of the drawbacks that limits their usefulness is the fact that they often only provide a fixed operating point. Most power system studies as well as any machine learning-based application rely on the availability of large datasets of measurements to capture the complex behaviors of electrical systems. For this reason, the ability to map time-series data to a specific grid model is crucial to enable the development of new and improved applications.
The goal of this work is to develop an open source tool for the generation of synthetic time-series bus-level load data at varying sampling rates and for different time lengths. We focus on the time-varying characteristics of system loads as they represent one of the major variables driving power system behaviors and depend on phenomena which is external to the electrical system itself (consumer habits, weather, etc.). Moreover, while load data is used for virtually every power system study, the requirements in terms of sampling rate and time length vary based on the specific application. Thus, our objective is to create a complete and universal tool which can generate synthetic load data at any scale, starting from the available PMU speed of 30 samples per second.
Different methods for the generation of time-series load data have been previously proposed. For example, \cite{hanyue} presents a bottom-up approach in which each bus-level load is obtained as a combination of typical load curves describing different types of customers (residential, commercial, etc.). This approach was used to generate time-series load data for the synthetic grid models developed at Texas A\&M \cite{birchfield}. The limitations of this method are twofold: first, it can only be applied to models for which geographical and demographical information is available and second, because it uses a limited number of base profiles, the generated data is limited in diversity and variability. These limitations can be overcome by adopting data-driven approaches which leverage large amounts of real data. Examples of these have been proposed for the generation of renewable scenarios \cite{baosen}, consumer level smart-meter data \cite{smartmeterdata,consumer} and net load time-series data \cite{zonal1}, but never for bus-level loads at the transmission level. Moreover, these existing techniques are limited in scope since they can only generate data for limited time-horizons and at a fixed sampling rate.
\begin{figure}
\centering
\includegraphics[scale=0.38]{figs/overview3.png}
\caption[Overview of the Generative Scheme.]{Overview of the complete generative scheme illustrating the four down-sampling levels and their respective generative models.}
\label{overview}
\end{figure}
\subsection*{Contributions}
We designed a complete generative framework which can create any number of unique bus-level load profiles at sampling resolutions from 30 Hz to one sample per year and for any time length ranging from a few seconds to a year. We leverage a proprietary dataset of over 70 Terabytes of phasor measurements to learn and model the behavior of system loads from sub-second to yearly time-scales. Based on the different temporal characteristics of the loads, two main types of generative models are used: generative adversarial networks (GANs) and principal component analysis (PCA). Via a process of data down-sampling and aggregation at different levels, we train independent generative models to capture the characteristics of these distinct load profiles. This process can be summarized in four steps:
\begin{enumerate}[(I)]
\item The raw PMU data (voltages and currents) is used to compute power consumption at different load buses;
\item The PMU-speed load data is down-sampled at four different levels:
\begin{enumerate}[1)]
\item 30-second-long profiles at 30 samples/second
\item hour-long profiles at 1 sample/30 seconds
\item week-long profiles at 1 sample/hour
\item year-long profiles at 1 sample/week
\end{enumerate}
\item A generative model is trained individually for each level;
\item The synthetic data generated using the trained models is combined to obtain any desired time-length and sampling resolution.
\end{enumerate}
Figure~\ref{overview} shows an overview of the complete generative scheme. The four aggregation levels have been chosen as a compromise between having profiles of comparable size at each level while dividing the data in such a way that each level captures different and independent behaviors. In fact, the first and second levels from the bottom model the fast time-scale load variations, the third level captures the daily load changes, while the fourth level captures yearly seasonality. Nonetheless, regardless of the choice of aggregation levels, the final generative scheme can create data at any arbitrary resolution from the highest limit of 30 samples/second (the raw PMU sampling rate) to any lower sampling rate.
The remainder of the paper is organized as follows. In Section~\ref{over} an overview of GANs and the dataset used is presented. Section~\ref{loadmodelling} describes the details of the generative models used and how they are trained. The process of combining the generative models to obtain specific sampling resolutions and time lengths is shown in Section~\ref{combining}, while Section~\ref{practical} describes the design of the open-source generative tool and its validation. Supporting documents, including the Appendix, source code, and additional figures, can be found at \cite{appendix}.
\section{Overview}\label{over}
\subsection{Conditional Generative Adversarial Networks}\label{cgan}
The proposed generative framework builds upon previous results on the generation of synthetic time-series load data. In particular, it relies on the use of GANs \cite{goodfellow2014generative} and conditional GANs (cGANs) \cite{mirza2014conditional}. This machine learning-based class of generative models consists of two networks, a discriminator and a generator, competing against each other with the goal of iteratively improving their performance. In particular, the discriminator is trained to distinguish between real data and synthetically generated data, while the generator aims at creating synthetic data which cannot be discerned from the real one. A cGAN represents a modification of this basic framework, where the generator is trained to learn the conditional distribution of the data. By using conditioning labels to describe specific characteristics of the real data, the generation of the synthetic data can be controlled and targeted towards specific classes of data. For example, in the context of time series load data, unique behaviors can be observed based on the characteristics of each load, resulting in different data distributions. Using cGANs allows to model these different characteristics by learning the conditional distribution of the data.
In \cite{Pinceti2021PESGM}, we showed how a cGAN can be trained to learn the behavior of power system loads and subsequently generate realistic time-series load data conditioned on two labels: the time of the year and the load type. The basic architecture of the cGAN used is shown in Fig.~\ref{condGAN}. The resulting model was tested extensively to verify that the synthetic data produced by the cGAN correctly captured the characteristics of the real load data. In this work, we build upon those preliminary results to develop several generative models which can be combined to create time-series data at varying resolutions and varying time-lengths.
\begin{figure}
\includegraphics[scale=0.2]{figs/condGAN.png}
\caption{Architecture of a conditional generative adversarial network.}
\label{condGAN}
\end{figure}
\subsection{Dataset Description}
The goal of the generative scheme is to create synthetic load data to be used for a large number of diverse downstream applications. To achieve this, the training data must be able to capture load behaviors at every time resolution to provide a complete assessment of the characteristics of different system loads. In this work, we leverage a large dataset of real phasor measurement data (upwards of 70 Terabytes) obtained from a major US electric utility. This data was collected for two consecutive years from almost 500 phasor measurement units (PMUs). Based on the system topology and placement of the PMUs, 12 fully monitored load buses were identified. Using the complex current and voltage measurements on each line, the net power injection (corresponding to the load demand at that bus) was computed. The availability of time-series load data measured at 30 samples per second for multiple consecutive years allows for the observation of load behaviors at different time-scales.
\begin{figure}
\centering
\includegraphics[scale=0.33]{figs/30secGAN.png}
\caption{Architecture of the GAN for the 30-seconds-long profiles.}
\label{30secGAN}
\end{figure}
Given its size and extent, the dataset used captures several distinct types of load behaviors which need to be correctly modelled by the generative scheme to create realistic and diverse synthetic data. Two main factors determine the characteristics of the load profiles: the type of load and the time of the year. Based on the percentage composition of each load in terms of residential, commercial, and industrial components, the loads have been grouped into two classes: mainly industrial loads and mainly residential loads. This classification is the result of the fact that loads present very distinct behaviors depending on their composition; it was observed that loads where the main component was either residential or commercial showed very similar behaviors, with the demand varying very smoothly and regularly. On the other hand, mainly industrial loads behaved more unpredictably resulting in irregular profiles. A similar difference is observed based on the time of the year; for example, the daily consumption during summer follows a very regular and smooth curve, while in winter the loads fluctuate more and present several peaks during the day. As described in the next section, depending on the time-scale under study, these elements have varying influence on the observed load behaviors. Nonetheless, it is important that the generative models used are able to capture these differences in load characteristics in order to generate realistic data for each type of load.
|
\section{Introduction}
\label{introduction}
In \cite{Cap}, \v{C}ap, Schichl, and Van\v{z}ura were led to define the notion of a twisted tensor product of algebras over a field as an answer to the following question from noncommutative differential geometry:
\begin{quotation}
Given two algebras that represent noncommutative spaces, what is an appropriate representative of a noncommutative product of those spaces?
\end{quotation}
This paper is motivated by a related question in noncommutative projective geometry. If $A$ is a noetherian graded $\k$-algebra, finitely generated in degree 1, the noncommutative projective scheme $(\hbox{Proj } A, \mathcal{O})$ is, by definition, the quotient category $\hbox{Proj } A ={\rm GrMod}(A)/{\rm Tors}(A)$ of graded right modules, modulo torsion modules, with $\mathcal{O}$ the image of $A_A$ in $\hbox{Proj } A$. In light of Serre's theorem in commutative algebraic geometry, the category $\hbox{Proj } A$ can be considered as the category of quasi-coherent sheaves on an imagined noncommutative scheme.
In this context, we say $\hbox{Proj } A$ (or just $A$) is a \emph{quantum projective space} if $A$ is a quadratic Artin-Schelter regular algebra; more precisely, if $A$ has global dimension $n+1$, then we say that $\hbox{Proj } A$ (or $A$) is a quantum $\P^n$. We raise the following natural question:
\begin{quotation}
Which quantum projective spaces are isomorphic to graded twisted tensor products of other quantum projective spaces?
\end{quotation}
It is not hard to show that every quantum $\P^1$ is a graded twisted tensor product of $\k[x]$ and $\k[y]$. One of our main results in this paper is the determination of all of the quantum $\P^2$'s that are isomorphic as graded algebras to graded twisted tensor products of the ``classical'' $\P^1$, $\k[x,y]$, with $\k[z]$. This builds upon results in \cite{CG3}, where all graded twisted tensor products of $\k[x,y]$ with $\k[z]$ were classified up to a notion of equivalence stronger than that of graded algebra isomorphism.
An intriguing aspect of Artin-Schelter regular algebras is the extent to which their algebraic properties are encoded geometrically. To every quantum $\P^2$, one can associate a subscheme $E\subset \P^2$ and an automorphism $\sigma:E\to E$ which determine the algebra up to isomorphism. In characterizing which quantum $\P^2$'s are graded twisted tensor products of $\k[x,y]$ and $\k[z]$, we also determine this geometric data.
The first classification results on quantum $\P^2$ are due to Artin and Schelter in \cite{AS} and Artin-Tate-van den Bergh in \cite{ATVI}. These results provide a ``generic'' classification up to algebra isomorphism which has subsequently been refined through the work of many authors; we refer the reader to \cite{IM} for details. In characteristic 0, a classification of three-dimensional quadratic Artin-Schelter regular algebras up to isomorphism and Morita equivalence has recently been completed \cite{IM, Mat} using the theory of \emph{geometric algebras} developed in \cite{Mori} and \cite{MU}. Though we do not assume ${\rm char}\ \k=0$ in this paper, we adopt the naming conventions introduced by these authors, in which the types of algebras are differentiated according to the geometric data $(E,\sigma)$, see Section \ref{preliminaries}. Detailed mappings from the classification of \cite{CG3} to types from \cite{IM} are provided in Sections 3, 4, and 5.
\begin{thm}[Theorem \ref{point scheme of T(g, h)}, Theorem \ref{ReducibleSummary}, Theorem \ref{OreSummary}]
\label{introTypes1}
Assume ${\rm char}\ \k \neq 2$. Let $T$ be an Artin-Schelter regular graded twisted tensor product of $\k[x,y]$ and $\k[z]$.
\begin{enumerate}
\item If $T$ is of type $EC$, then the point scheme $E$ is an elliptic curve, and the automorphism $\sigma$ is multiplication by $-1$ in the group law on $E$. ($T$ is of type $B$.)
\item If $T$ is not of type $EC$, then $T$ belongs to one of the following types:
$$P_1, P_2, S_1, S_1', S_2, S_2', T_1, T', WL_1, WL_2, WL_3, TL_1, TL_2, TL_4, NC_2.$$
\end{enumerate}
Moreover, each type listed above is the type of an Artin-Schelter regular graded twisted tensor product of $\k[x,y]$ and $\k[z]$.
\end{thm}
Comparing Theorem \ref{introTypes1} to the results of \cite{IM, Mat} shows that, in characteristic 0, not all quantum $\P^2$'s can be expressed as graded twisted tensor products of $\k[x,y]$ and $\k[z]$, even up to graded Morita equivalence. We summarize this comparison as follows.
\begin{thm}
\label{introTypes2}
Assume ${\rm char}\ \k =0$. Let $A$ be a three-dimensional quadratic Artin-Schelter regular algebra.
\begin{enumerate}
\item (Remarks \ref{T(g,h) remark}, \ref{complete reducible cases}, \ref{complete Ore types}) If $A$ belongs to one of the following types: $$EC \text{ (subtype $B$), } S'_2, T_1, WL_2, WL_3, TL_4, NC_2, $$ then $A$ is isomorphic to a graded twisted tensor product of $\k[x,y]$ and $\k[z]$.
\item (Remark \ref{complete Ore cases}) If $A$ belongs to one of the following types: $$P, S, S', T, T', WL, TL,$$ then $A$ is graded Morita equivalent to a graded twisted tensor product of $\k[x,y]$ and $\k[z]$.
\item If $A$ is of type $CC$, then $A$ is not graded Morita equivalent to a graded twisted tensor product of $\k[x,y]$ and $\k[z]$.
\end{enumerate}
\end{thm}
Not every Morita equivalence class of quantum $\P^2$'s contains a graded twisted tensor product of $\k[x,y]$ and $\k[z]$. By \cite[Theorem 3.2]{IM}, the only ones that do not are of Type NC, CC or EC. However, the unique isomorphism class of Type CC is a graded Ore extension of the Jordan plane, and every algebra of Type $NC_1$ is a graded Ore extension of a skew polynomial algebra $\k_{a}[x,y]$. Since graded Ore extensions are twisted tensor products, Theorem \ref{introTypes2} and the preceding observations imply that every quantum $\P^2$ that is not of type EC is graded Morita equivalent to a twisted tensor product (in fact, a graded Ore extension) of \emph{some} quantum $\P^1$ with $\k[z]$.
In the last section of the paper, we prove there are quantum $\P^2$'s that are not (Morita equivalent to) graded twisted tensor products of \emph{any} quantum $\P^1$ with $\k[z]$. Our results in this direction concern the three-dimensional Sklyanin algebras $S(a,b,c)$, see Section \ref{Sklyanins} for the relevant definitions. We argue first, using noncommutative algebraic geometry, that $\k_{-1}[x,y]$ is the only quantum $\P^1$ that can arise as a subalgebra of $S(a,b,c)$, when the point scheme of $S(a,b,c)$ is an elliptic curve, and this can only occur when $a=b$.
\begin{thm}[Theorem \ref{not a skew polynomial ring}, Proposition \ref{not a Jordan plane}]
\label{introSklyanin1}
Assume ${\rm char}\ \k\neq 2,3$. Let $S(a,b,c)$ be a three-dimensional Sklyanin algebra of type EC.\ Then $S(a,b,c)$ contains a subalgebra isomorphic to a quantum $\P^1$ if and only if $a=b$. The only quantum $\P^1$ contained in $S(a,a,c)$ is $\k_{-1}[x,y]$.
\end{thm}
Thus, when ${\rm char}\ \k\neq 2,3$, a Sklyanin algebra of type EC is graded Morita equivalent to a graded twisted tensor product of a quantum $\P^1$ with $\k[z]$ only if it is graded Morita equivalent to $S(1,1,c)$ where $c\neq 0$ and $(3c)^3\neq (2+c^3)^3$.
Finally, we show that, in characteristic 0, every three-dimensional Sklyanin algebra of type EC that contains a subalgebra isomorphic to $\k_{-1}[x,y]$ is a graded twisted tensor product of $\k_{-1}[x,y]$ and $\k[z]$.
\begin{thm}[Theorem \ref{P(a,b) is an S(1,1,c)}]
\label{introSklyanin2}
Assume ${\rm char}\ \k=0$. A three-dimensional Sklyanin algebra $S(1,1,c)$ of type EC is isomorphic as a graded algebra to a twisted tensor product $P(a)$ for some $a\in \k-\{0,1\}$.
\end{thm}
The outline of the paper is as follows. Definitions and notation related to twisted tensor products and types of Artin-Schelter regular algebras are given in Section 2. In particular, the three main families of graded twisted tensor products from \cite{CG3} are described. In Sections 3, 4, and 5, algebras from these three families are classified up to isomorphism, and the associated geometric data is computed. Finally, results related to the three-dimensional Sklyanin algebras of type EC are the subject of Section 6.
\section{Preliminaries}
\label{preliminaries}
In this paper we work with algebras over a field $\k$. We assume throughout that $\k$ is algebraically closed and ${\rm char}\, \k\neq 2$. The tensor product of $\k$-vector spaces $V$ and $W$ is denoted $V\tensor W$, and when $V$ and $W$ are ${\Bbb N}$-graded, the space $V\tensor W$ is graded by the formula
$$(V\tensor W)_m=\bigoplus_{k+\ell=m} V_k\tensor W_{\ell}.$$ We write $V^*$ for the linear dual of the $\k$-vector space $V$.
By a \emph{graded $\k$-algebra}, we mean a connected, ${\Bbb N}$-graded, locally finite-dimensional $\k$-algebra, generated in degree 1. We require morphisms of graded algebras and vector spaces to preserve degree.
We call a graded $\k$-algebra $A$ \emph{quadratic} if there exists a finite dimensional $\k$-vector space $V$ and a subspace $R\subseteq V\tensor V$ such that $A\cong T(V)/\langle R\rangle$ as graded algebras, where $T(V)$ is the tensor algebra.
\subsection{Graded twisted tensor products}
Let $A$ and $B$ be graded $\k$-algebras. A \emph{graded twisted tensor product} of $A$ and $B$ is a triple $(C,i_A, i_B)$ where $C$ is a graded $\k$-algebra and $i_A:A\to C$ and $i_B:B\to C$ are graded algebra inclusions such that the $\k$-linear map $A\tensor B\to C$ given by $a\tensor b\mapsto i_A(a)i_B(b)$ is an isomorphism. In this paper we are primarily concerned with the setting where $A=\k[x,y]$, $B=\k[z]$, and $C$ is a quadratic algebra.
A graded twisted tensor product imparts the structure of an associative algebra to $A\tensor B$, implicitly determining a product map $(A\tensor B)^{\tensor 2}\to A\tensor B$. The product can be described somewhat more directly via the notion of a twisting map. Given any $\k$-linear map $\t:B\tensor A\to A\tensor B$, one can define $\mu_{\t}:(A\tensor B)^{\tensor 2}\to A\tensor B$ by $\mu_{\t}=(\mu_A\tensor\mu_B)(1\tensor \t\tensor 1)$. However, $\mu_{\t}$ does not define an associative product, in general.
A (unital) \emph{graded twisting map} for $A$ and $B$ is a graded $\k$-linear map $\t:B\tensor A\to A\tensor B$ such that $\t(1\tensor a)=a\tensor 1$, $\t(b\tensor 1)=1\tensor b$, and
$$\t(\mu_B\tensor \mu_A)=(\mu_A\tensor \mu_B)(1\tensor \t\tensor 1)(\t\tensor\t)(1\tensor \t\tensor 1)$$
where $\mu_A$ and $\mu_B$ denote the product maps on $A$ and $B$, respectively. This condition is precisely what is required for $\mu_{\t}$ to satisfy associativity.
\begin{prop}{\cite[Proposition 2.3]{C-G}}
Let $A$ and $B$ be graded algebras and $\t:B\tensor A\to A\tensor B$ a graded $\k$-linear map. Then $\t$ is a graded twisting map if and only if $(A\tensor B,\mu_{\t})$ is an associative graded $k$-algebra.
\end{prop}
In particular, if $\t:B\tensor A\to A\tensor B$ is a graded twisting map, the graded algebra $A\tensor_{\t} B=(A\tensor B,\mu_{\t})$, together with the canonical inclusions of $A$ and $B$, is a graded twisted tensor product of $A$ and $B$. If $A\tensor_{\t} B\cong A\tensor_{\t'} B$ as graded $\k$-algebras, it does not necessarily follow that $\t=\t'$. In \cite{Cap}, the authors define a notion of isomorphism that uniquely identifies twisted tensor products by their twisting maps. In \cite{CG3}, we classified quadratic twisted tensor products $\k[x,y]\tensor_{\t} \k[z]$ up to a notion of equivalence weaker than that of \cite{Cap}, yet stronger than graded algebra isomorphism. The precise definitions of these notions are not needed in this paper.
By \cite[Theorem 1.2]{C-G}, a quadratic twisted tensor product $\k[x,y]\tensor_{\t} \k[z]$ is uniquely determined by $\t(z\tensor x)$ and $\t(z\tensor y)$, and by \cite[Proposition 2.5]{C-G} we have
$$C=\k[x,y]\tensor_{\t}\k[z]\cong \k\langle x,y,z\rangle/\langle xy-yx, zx-\t(zx), zy-\t(zy)\rangle.$$
Here $\t(zx)$ and $\t(zy)$ are the images of $\t(z\tensor x)$ and $\t(z\tensor y)$ in $\k\langle x,y,z\rangle$ under the obvious identification with $T(C_1)$. A main result from \cite{CG3} is the following, which does not require any restrictions on the characteristic of $\k$.
\begin{thm}{\cite[Theorem 1.4]{CG3}}
\label{old classification}
Let $\k$ be an algebraically closed field. A quadratic twisted tensor product of $\k[x,y]$ and $\k[z]$ is equivalent to one determined by
\begin{align*}
\t(zx)&=ax^2+bxy+cy^2+dxz+eyz+fz^2\\
\t(zy)&=Ax^2+Bxy+Cy^2+Dyz
\end{align*}
where $e, f, A\in \{0,1\}$.
\end{thm}
We alert the reader to a small notational shift from \cite{CG3}: in \cite[Theorem 1.4]{CG3} we wrote $E$ instead of $D$ in the $\t(zy)$ equation. In this paper $E$ always refers to a point scheme, as defined below. When comparing results of this paper with corresponding results in \cite{CG3} one should replace $D$ with $E$.
We divided the algebras of Theorem \ref{old classification} into three families: \emph{Ore type} (when $f=0$), \emph{reducible type} (when $f=1, A=0$) and \emph{elliptic type} (when $f=1, A=1$). Not all values of the other parameters yield twisted tensor products; complete descriptions are provided at the beginning of the section in which a family is discussed.
\subsection{Noncommutative projective geometry}
\label{nc proj geom}
We review some basic definitions and results from \cite{ATVI} and \cite{Mori}. Let $A = T(V)/\langle R \rangle$ be a quadratic algebra. An element $f\in T_d(V)$ determines a multilinear form $\tilde{f}:(V^*)^{\times d}\to \k$. Let $\Gamma = \Gamma(A) \subseteq \P(V^*) \times \P(V^*)$ denote the scheme of zeros of the multilinearizations of the elements of $R$. Let ${\rm pr}_i : \P(V^*) \times \P(V^*) \to \P(V^*)$ for $i = 1, 2$ denote the canonical projections. Let $E_i$ be the scheme-theoretic image of $\Gamma$ under ${\rm pr}_i$. We denote ${\rm pr}_i|_{\Gamma}$ by $\pi_i: \Gamma \to E_i$.
\begin{defn}\label{def semi-standard}
We say that the algebra $A$ is \emph{semi-standard} if $E_1$ and $E_2$ are equal as subschemes of $\P(V^*)$.
\end{defn}
If the algebra $A$ is semi-standard, let $E = E_1 = E_2$. Then one may view $\Gamma$ as the graph of a correspondence $E \to E$ via the closed immersion $(\pi_1, \pi_2): \Gamma \to E \times E$.
\begin{defn}\label{def nondegenerate}
Let $A$ be a semi-standard algebra. We say that $A$ is \emph{nondegenerate} if $\Gamma$ is the graph of a scheme automorphism $\sigma: E \to E$. Otherwise we say that $A$ is \emph{degenerate}.
\end{defn}
If $A$ is semi-standard and nondegenerate, then we call the scheme $E$ the \emph{point scheme of $A$}. In \cite{ATVI} it is shown that the point scheme parametrizes the so-called point modules of $A$. We refer the reader to \cite{ATVI} for the definition of a point module of a graded algebra.
The pair $(E, \sigma)$ encodes important information about the algebra $A$. We use the notion of a \emph{geometric algebra} developed in \cite{Mori}. Let $i : E \to \P(V^*)$ be the natural embedding, and set $\L = i^* \O_{\P(V^*)}$. There is a natural map of $\k$-vector spaces: $${\mu}: H^0(E, \L) \tensor H^0(E, \L) \to H^0(E, \L \tensor_{\O_E} \sigma^* \L).$$
\begin{defn}\label{def geometric algebra}\cite[Definition 4.3]{Mori}
Let $A = T(V)/\langle R \rangle$ be a quadratic algebra. We say that $A$ is \emph{geometric} if there is a pair $(E, \sigma)$, where $E \subset \P(V^*)$ is a closed subscheme and $\sigma:E \to E$ is an automorphism such that:
\begin{itemize}
\item[(i)] $\Gamma$ is the graph of $\sigma$,
\item[(ii)] $R = \ker \ {\mu}$ under the canonical identification $H^0(E, \L) = V$.
\end{itemize}
\end{defn}
We make frequent use of the following well-known result.
\begin{thm}\label{geometric algebra isomorphism} \cite[Remark 4.9]{Mori} Suppose that $A$ and $A'$ are geometric algebras associated to $(E, \sigma)$ and $(E', \sigma')$, respectively. Then $A \cong A'$ as graded $\k$-algebras if and only if $A_1 = A_1'$ and there is a scheme automorphism $\psi$ of $\P(A_1)$ which restricts to an isomorphism $\psi: E \to E'$ such that the following diagram commutes.
$$\xymatrix{&E \ar[r]^-{\psi} \ar[d]^(.445){\sigma} & E' \ar[d]^(.4){\sigma'} \\ &E \ar[r]^-{\psi} & E'
}
$$
\end{thm}
Some care must be taken in using the ``if direction'' of Theorem \ref{geometric algebra isomorphism} when the schemes $E, E'$ are not reduced. In the sequel, we do not use this part of the theorem in such cases.
In \cite{AS} the following notion of regularity for graded $\k$-algebras was introduced.
\begin{defn}\label{def AS regular}
\cite{AS}
A finitely-presented graded $\k$-algebra $A$ is \emph{Artin-Shelter regular (AS-regular) of dimension $d$} if:
\begin{itemize}
\item[(i)] the global dimension of $A$ is $d$;
\item[(ii)] the Gelfand-Kirillov dimension of $A$ is finite;
\item[(iii)] $A$ is Gorenstein: $\hbox{\rm Ext}^n_A(\k, A) = 0$ if $n \ne d$, and $\hbox{\rm Ext}^d_A(\k, A) \cong \k$.
\end{itemize}
\end{defn}
Let us now restrict to the case we study in this paper and assume that $A = T(V)/\langle R \rangle$ is a quadratic algebra with $\dim_{\k} V = \dim_{\k} R = 3$. In \cite{ATVI} it is shown that if $A$ is AS-regular, then $A$ is semi-standard and nondegenerate. Not all semi-standard, nondegenerate quadratic algebra are AS-regular, however. Following \cite{ATVI} we say that $A$ is \emph{exceptional} if the point scheme $E$ is the union of a line and a conic in $\P^2$ and the automorphism $\sigma: E \to E$ interchanges these components. In \cite[Proposition 4.11]{ATVI} it is proven that an exceptional algebra is not AS-regular. Finally, by \cite[Theorem 1, Theorem 6.8]{ATVI}, every quadratic AS-regular algebra of global dimension $3$ is geometric.
Suppose that $R \subset V \tensor V$ has $\{r_1, r_2, r_3\}$ as a $\k$-basis. Using $x_i, y_i, z_i$, $i = 0, 1$, as coordinates on the $i+1$st factor of $\P(V^*) \times \P(V^*)$, we can factor the multilinearizations $\widetilde{r_1}, \widetilde{r_2}, \widetilde{r_3}$ in two ways:
\begin{equation}
\label{MandN}
M \begin{bmatrix} x_1 \\ y_1 \\ z_1 \end{bmatrix} = \begin{bmatrix} \widetilde{r_1} \\ \widetilde{r_2} \\ \widetilde{r_3} \end{bmatrix} , \qquad \begin{bmatrix} x_0 & y_0 & z_0 \end{bmatrix} N = \begin{bmatrix} \widetilde{r_1} & \widetilde{r_2} & \widetilde{r_3} \end{bmatrix},
\end{equation}
where $M$ is a $3 \times 3$ matrix with entries consisting of linear forms in $x_0, y_0, z_0$ and $N$ is a $3 \times 3$ matrix with entries consisting of linear forms in $x_1, y_1, z_1$. Then it is straightforward to prove that the set of closed points of the scheme $E_1$ is the zero locus of $\det M$, $\mathcal Z(\det M)$, in $\P^2$. Similarly, the set of closed points of $E_2$ is equal to $\mathcal Z(\det N)$ in $\P^2$. When $A$ is semi-standard, we often identify corresponding coordinate functions by suppressing the subscripts. It is easy to show that a semi-standard algebra is nondegenerate if and only if the rank of the matrix $M$ is $2$ at every closed point of $E$. Moreover, the automorphism $\sigma: E \to E$ can be computed on closed points by taking the cross product of two linearly independent rows of $M$; see \cite[Section 1]{ATVI}, for example.
For each AS-regular twisted tensor product in our classification, $A$, we determine the pair $(E, \sigma)$ for a particular representative of the graded isomorphism class of $A$. We adopt the terminology of \cite{MU} and \cite{IM} to describe the types of pairs that are possible. In \cite{MU} and \cite{IM} the ground field, $\k$, is assumed to be algebraically closed with ${\rm char } \, \k =0$. Though we assume only that $\k$ is algebraically closed and ${\rm char } \, \k \ne 2$, these are sufficient for our purposes.
\begin{itemize}
\item Type ${\rm P}$: $E = \P^2$; $\sigma \in {\rm Aut}_{\k} \P^2 \cong {\rm PGL}_3(\k)$,
\item Type ${\rm S}_1$: $E$ is a triangle; $\sigma$ stabilizes each component,
\item Type ${\rm S}_2$: $E$ is a triangle; $\sigma$ interchanges two components,
\item Type ${\rm S}_3$: $E$ is a triangle; $\sigma$ cyclically permutes the components,
\item Type ${\rm S}_1'$: $E$ is a union of a line and a conic meeting at two points; $\sigma$ stabilizes each component and the intersection points,
\item Type ${\rm S}_2'$: $E$ is a union of a line and a conic meeting at two points; $\sigma$ stabilizes each component and interchanges the intersection points,
\item Type ${\rm T}_1$: $E$ is a union of three lines meeting at one point; $\sigma$ stabilizes each component,
\item Type ${\rm T}_2$: $E$ is a union of three lines meeting at one point; $\sigma$ interchanges two components,
\item Type ${\rm T}_3$: $E$ is a union of three lines meeting at one point; $\sigma$ cyclically permutes the components,
\item Type ${\rm T}'$: $E$ is a union of a line and a conic meeting at one point; $\sigma$ stabilizes each component,
\item Type ${\rm CC}$: $E$ is a cuspidal cubic curve,
\item Type ${\rm NC}$: $E$ is a nodal cubic curve,
\item Type ${\rm WL}$: $E$ is a union of a double line and a line,
\item Type ${\rm TL}$: $E$ is a triple line,
\item Type ${\rm EC}$: $E$ is an elliptic curve.
\end{itemize}
Note that some of the schemes described here are reducible and/or non-reduced. Furthermore, \cite{IM} divides these types into subtypes: Type P into Type ${\rm P}_i$ for $i = 1, 2, 3$; Type NC into Type ${\rm NC}_i$ for $i = 1, 2$; Type WL into Type ${\rm WL}_i$ for $i = 1, 2, 3$; and Type TL into Type ${\rm TL}_i$ for $i = 1, 2, 3, 4$.
In \cite[4.13]{ATVI}, the authors identified four subtypes of Type EC, denoted $A, B, E,$ and $H$, which were defined in terms of the automorphism $\sigma$. In \cite{Mat}, Matsuno completed the classification of algebras of Type EC up to graded algebra isomorphism in characteristic 0, showing that there are no additional subtypes.
\section{Elliptic-type twisted tensor products}
\label{elliptic type ttps}
Since we assume ${\rm char}\ \k\neq 2$, \cite[Lemma 5.2]{CG3} implies that any elliptic-type twisted tensor product is isomorphic to an algebra in the family
$$T(g,h)=\dfrac{\k\langle x,y,z\rangle}{\langle xy-yx, zy+yz-x^2-gy^2, z^2+hy^2\rangle}\quad g, h\in \k.$$
In this section we show that all algebras in this family are semi-standard and nondegenerate. We describe the associated point schemes and describe the distinct graded algebra isomorphism classes in this family.
Our results for elliptic-type twisted tensor products are summarized in Table \ref{EllipticTable} and the following theorem.
\begin{table}[h]
\caption{Mapping of elliptic-type TTP cases}
\label{EllipticTable}
\begin{tabular}{|c|c|c|c|c|}
\hline
TTP Case & Subcase & Algebra & Condition & Type\\
\hline
\multirow{4}{*}{$T(g,h)$} & \multirow{2}{*}{$h(g^2+4h)\neq 0$} & $T(g^2/h)$ & $g^2/h \notin\{ 0, -4\}$ & \multirow{2}{*}{EC, subtype B} \\
\cline{3-4}
&&$T(0,1)$ &&\\
\cline{2-5}
& $h\neq 0=g^2+4h$ & $T(-4)$ & & $NC_2$\\
\cline{2-5}
& $h= 0$ & $T(g,0)$ & $g\in\{0,1\}$ & exceptional\\
\hline
\end{tabular}
\end{table}
\begin{thm}
\label{point scheme of T(g, h)}
Every elliptic-type twisted tensor product is isomorphic as a graded algebra to $T(g,h)$ for some $g,h\in\k.$ The algebras listed in Table \ref{EllipticTable} are pairwise non-isomorphic, and the table gives the types of AS-regular algebras.
\end{thm}
The proof of Theorem \ref{point scheme of T(g, h)} is at the end of this section.
In \cite{CG3}, we characterized when the algebras $T(g,h)$ are AS-regular. The first result in this section elaborates on that characterization, and describes the point scheme of $T(g,h)$ and the associated automorphism.
\begin{prop}
\label{T(g,h) is semistandard nondegenerate}
The algebra $T(g,h)$ is semi-standard and nondegenerate for any $g,h\in \k$. Moreover, $T(g,h)$ is AS-regular if and only if $h\neq 0$.
The point scheme of $T(g, h)$ is $$E=\mathcal Z(hy^3+x^2z-yz^2+gy^2z)\subset \P^2.$$
The automorphism $\sigma : E \to E$ switches the points $[1:0:0]$ and $[0:0:1]$. If $h\neq 0$, $\sigma([x:y:z]) = [xz: yz: -hy^2]$ if $y \ne 0$.
If $h=0$, $\sigma$ interchanges the line $z=0$ and the conic $x^2-yz+gy^2 = 0$.
\end{prop}
\begin{proof}
The matrices $M$ and $N$ defined in equation (\ref{MandN}) are $$M = \begin{bmatrix} -y_0 & x_0 & 0 \\ -x_0 & z_0 - gy_0 & y_0 \\ 0 & hy_0 & z_0 \end{bmatrix}, \ \ N = \begin{bmatrix} y_1 & -x_1 & 0\\ -x_1 & -gy_1+z_1 & hy_1 \\ 0 & y_1 & z_1 \end{bmatrix}.$$ If we identify coordinate functions by suppressing subscripts, one checks that $$\det M = hy^3+x^2z - yz^2+g y^2z = -\det N.$$ It follows that $T(g, h)$ is semi-standard. It is easy to prove that $\hbox{rank}(M) \geq 2$ at all points of $\P^2$, so $T(g, h)$ is nondegenerate. By \cite[Theorem 6.2]{CG3}, the algebras $T(g,h)$ are AS-regular if and only if $h\neq 0$.
The descriptions of $\sigma([x:y:z])$ when $h\neq 0$ and $h=0$ are obtained by taking the cross product of appropriate rows in $M$.
\end{proof}
The algebras $T(g,0)$ are \emph{exceptional} in the sense of \cite[Section 4.9]{ATVI}. We prove that up to isomorphism, there are only two such algebras in the family $T(g,h)$.
\begin{prop}
\label{T(1,0) and T(0,0)}
If $g\neq 0$, $T(g,0)\cong T(1,0)$. Moreover, $T(1,0)\ncong T(0,0)$.
\end{prop}
\begin{proof}
The first statement follows by rescaling $z\mapsto gz$ and $x\mapsto \sqrt{g}x$. For the second statement, suppose there is an isomorphism $\varphi:T(1,0)\to T(0,0)$. It is easy to check that, up to rescaling, $z$ is the only degree-1 element of $T(0,0)$ that squares to 0. Thus we may assume $\varphi(z)=z$.
It is also straightforward to check that if $u,v\in T(0,0)_1$ are linearly independent and commute, then $u,v\in{\rm span}_{\k}\{x,y\}$. Thus $\varphi(x)=\a_1x+\b_1y$ and $\varphi(y)=\a_2x+\b_2y$ for $\a_1,\a_2,\b_1,\b_2\in\k$. Now, a direct calculation shows that $\varphi(zy+yz-x^2-y^2)=0$ implies $\varphi(x)$ and $\varphi(y)$ are linearly dependent, a contradiction.
\end{proof}
For the remainder of the section, we assume $h\neq 0$. As shown above, all algebras $T(g,h)$ are AS-regular in this case.
When $h\neq 0$, the closed points of $E$ describe the projectivization of a plane cubic curve. After the transformation $x\mapsto y$, $y\mapsto -x$, $z\mapsto hz$, we see that $E$ can be described in Weierstrass form by $$y^2z=x^3-gx^2z-hxz^2.$$
Following the formulae in \cite[III.1]{Sil}, the discriminant of the curve obtained by setting $z=1$ is $\Delta(g,h) = 16h^2(g^2+4h)$. Thus we see that $E$ is the projectivization of an elliptic curve if and only if $g^2+4h\neq 0$. Furthermore, the $j$-invariant of this elliptic curve is $j(g,h) = \dfrac{16^2(g^2+3h)^3}{h^2(g^2+4h)}$.
Setting $\ell=g^2/h$ yields the expression $j(\ell)=\dfrac{16^2(\ell+3)^3}{\ell+4}$, which is sometimes more convenient.
Recall that the $j$-invariant classifies elliptic curves up to isomorphism, see \cite[Proposition III.1.4 (b)]{Sil}.
The next result characterizes $T(g,h)$ when $E$ is a singular curve; the case where $E$ is an elliptic curve is described below.
\begin{prop}
\label{nodal cubic}
If $h\neq 0$ and $g^2+4h=0$, then $E$ is a nodal cubic curve, and the automorphism $\sigma$ fixes the node. (type $NC_2$)\\
In this case, $T(g,h)$ is isomorphic as a $\k$-algebra to
$$\dfrac{\k\langle x,y,z\rangle}{\langle xz-2yx+zy, zx-2xy+yz, y^2+x^2\rangle}.$$
\end{prop}
\begin{proof}
Using the description of $E$ as $\mathcal Z(hy^3+x^2z-yz^2+gy^2z)$ from Theorem \ref{T(g,h) is semistandard nondegenerate}
we see that
if $h\neq 0$ and $g^2+4h=0$, then $E$ is the projectivization of a nodal cubic curve: $$x^2z=\dfrac{y(2z-gy)^2}{4}$$
Evidently the node is $[0:2:g]$, and by Theorem \ref{T(g,h) is semistandard nondegenerate} we see that $\sigma([0:2:g])=[0:2g:-4h]=[0:2:g]$ since $g\neq 0$.
Let $A$ denote the algebra specified in the statement of the Proposition. The map determined by: $x\mapsto \a_1(x-y)$, $y\mapsto \a_2(x+y+z)$, $z\mapsto -3x-3y+z$ where $\a_2=-g/2h$ and $\a_1^2=-8g/h$, is an isomorphism $T(g, h) \to A$.
\end{proof}
It remains to consider the case where the discriminant $\Delta(g,h)\neq 0$. Our next result shows that in this case, $T(g, h)$ is a Type EC, subtype B algebra.
\begin{thm}
\label{sigma is multiplication by -1}
Suppose that $\Delta(g,h) \ne 0$, so that $E$ is a nonsingular cubic curve. There exists an element $O \in E$ such that for the corresponding group law on $E$, the automorphism $\sigma: E \to E$ is given by $\sigma(P)+P=O$ for all $P\in E$.
\end{thm}
\begin{proof}
It is straightforward to check that a point $[x_0:1:z_0]\in E$ is a fixed point of $\sigma$ if and only if $x_0^2=2z_0-g$ and $z_0^2=-h$. Let $O\in E$ be any fixed point of $\sigma$. Consider the corresponding group law on $E$, see \cite[III.2]{Sil} for example.
The line $y=0$ intersects $E$ in $e_1=[1:0:0]$ and $e_3=[0:0:1]$, and $\sigma$ interchanges these points. We claim that $e_1+e_3=O$ in the group law.
To see this, first observe that $y=0$ is tangent to $E$ at $e_3$. The line $L$ through $e_3$ and $O=[x_0:1:z_0]$ is $x=x_0y$. The point $e_1$ is not on $L$, and $L$ is not tangent to $E$ at $e_3$, so we can write $e_1+e_3=[x_0:1:z_1]$. The condition that $e_1+e_3$ lies on $\mathcal Z(hy^3+x^2z-yz^2+gy^2z)$, and the fact that $x_0^2=2z_0-g$ and $z_0^2=-h$ implies
$$ z_1^2-2z_0z_1+z_0^2 = (z_1-z_0)^2 = 0.$$
Thus $z_1=z_0$ and $e_1+e_3=0$ as desired.
The argument above also proves that $x=x_0y$ is the tangent line to $E$ at $O$. Since we assumed only that $O$ was a fixed point of $\sigma$ on $E$, if $[x_1:1:z_1] \in E$ is any other fixed point of $\sigma$, the tangent line at that point is $x=x_1y$.
Let $P = [x_1: 1: z_1] \in E-\{e_1,e_3\}$ be arbitrary. Then $\sigma(P) = [x_1 z_1: z_1: -h]$. If $\sigma(P)\neq P$, then $z_1^2 \ne -h$. The line through $P$ and $\sigma(P)$ is $x - x_1 y=0$, and $e_3$ is the third point of intersection between this line and $E$. The line through $e_3$ and $O$ is tangent to $E$ at $O$, so $P + \sigma(P) = O$.
If $\sigma(P)=P$, then as observed above, the tangent line to $E$ at $P$ is the line $x -x_1 y=0$. The calculation then proceeds as before, yielding $P+\sigma(P) = O$.
\end{proof}
Next we classify the algebras $T(g,h)$ with $h\neq 0$ up to graded algebra isomorphism.
\begin{prop}
\label{isomorphism type of T(g,h)}
If $h\neq 0$ and $h' \ne 0$, then $T(g,h)\cong T(g',h')$ if and only if $g^2h'=(g')^2h$.
\end{prop}
\begin{proof}
Assume that $g^2h'=(g')^2h$. If $g \ne 0$, then the map determined by $x \mapsto \a x$, $y \mapsto \b y$, $z \mapsto z$, where $\a^2 = \b$ and $\b = g'/g$ is an isomorphism $T(g, h) \to T(g', h')$. If $g = 0$, then the map determined by $x \mapsto \a x$, $y \mapsto \b y$, $z \mapsto z$, where $\a^2 = \b$ and $\b^2 = h'/h$ is an isomorphism $T(g, h) \to T(g', h')$.
Suppose, conversely, that $\varphi:T(g',h')\to T(g,h)$ is an isomorphism.
A calculation, using the bases $\{x^2, xy, xz, y^2, yz, zx\}$ in degree $2$, shows that commuting, linearly independent degree-1 elements of $T(g,h)$ lie in ${\rm span}_{\k}\{x,y\}$. Thus there is no loss of generality in assuming that
$$
\varphi(x)=\a_1x+\b_1y,\quad
\varphi(y)=\a_2x+\b_2y,\quad
\varphi(z)=\a_3x+\b_3y+z.
$$
Then
\begin{align*}
0=\varphi(z^2+h'y^2)&=(\a_3^2+\b_3+h'\a_2^2)x^2+2(\a_3\b_3+h'\a_2\b_2)xy\\
&\quad +(\b_3^2+g\b_3-h+h'\b_2^2)y^2+\a_3(xz+zx),
\end{align*}
so we have
$$\a_3=0\quad \b_3=-h'\a_2^2\quad \a_2\b_2=0\quad \b_3^2+g\b_3+h'\b_2^2-h=0.$$
Since $\a_3=0$, the coefficient of $xz$ in $\varphi(zy+yz-x^2-g'y^2)$ is $\a_2$, so $\a_2=0$, $\b_3=0$, and $h'\b_2^2=h$. Bearing these in mind, we have
$$\varphi(zy+yz-x^2-g'y^2)=(\b_2-\a_1^2)x^2-2\a_1\b_1xy+(g\b_2-g'\b_2^2-\b_1^2)y^2.$$
We cannot have $\a_1=0$, else $\b_2=0$ and $\varphi(y)=0$, so $\b_1=0$ and $g\b_2=g'\b_2^2$. Since $\b_2\neq 0$, we have
$h'\b_2^2=h$ and $g'\b_2=g$, and the result follows.
\end{proof}
\begin{rmk}
\label{T(g,h) remark}
Proposition \ref{isomorphism type of T(g,h)} motivates the following further simplification. For $\ell\in \k^*$, we define
$$T(\ell)=\k\langle x,y,z\rangle/\langle xy-yx, zy+yz-x^2-\ell y^2, z^2+\ell y^2\rangle.$$
When $gh\neq 0$, it is easily shown that $T(g,h)\cong T(g^2/h)$ by rescaling $x\mapsto \sqrt{g/h}x$ and $y\mapsto gy/h$. Proposition \ref{isomorphism type of T(g,h)} then implies $T(\ell)\cong T(\ell')$ if and only if $\ell=\ell'$.
Recall that the $j$-invariant of the point scheme of $T(\ell)$ is given by $j(\ell)=\dfrac{16^2(\ell+3)^3}{\ell+4}$. Setting $l = 0$ we see that $j(0) = 12^3$. The point scheme of $T(0,1)$ has $j=12^3$; we ``compactify" the family of algebras $T(\ell)$, $\ell \in \k^*$ by defining $T(0) = T(0,1)$. (The algebra obtained by setting $\ell=0$ in the presentation above is $T(0,0)$, which is not AS-regular.)
The $j$-invariant does not completely characterize the isomorphism type of the algebra $T(\ell)$. Setting $t=\ell+3$ and considering the discriminant of the polynomial $t^3-(j/16^2)(t+1),$
we see that for a fixed elliptic curve $E$, or equivalently for a fixed value of $j$, there are three isomorphism classes of algebras $T(g,h)$ with point scheme equal to $E$ whenever $j\notin \{0, 12^3\}$, two when $j=12^3$, and one when $j=0$.
Comparing the above to \cite[Proposition 3.10]{Mat} shows that in characteristic 0, every quadratic AS-regular algebra of type EC, subtype B, is isomorphic to a graded twisted tensor product of $\k[x,y]$ and $\k[z]$. By \cite[Theorem 3.1]{IM}, there is only one isomorphism class of type $NC_2$ algebras, and Proposition \ref{nodal cubic} shows these algebras are graded twisted tensor products of $\k[x,y]$ and $\k[z]$.
\end{rmk}
We conclude with a proof of Theorem \ref{point scheme of T(g, h)}.
\begin{proof}[Proof of Theorem \ref{point scheme of T(g, h)}]
Every elliptic-type twisted tensor product is isomorphic to $T(g,h)$ by \cite[Lemma 5.2]{CG3}. Proposition \ref{T(g,h) is semistandard nondegenerate} shows that $T(g,h)$ is AS-regular if and only if $h\neq 0$.
The algebras $T(g,0)$ are classified in Proposition \ref{T(1,0) and T(0,0)}.
When $h\neq 0$, the graded algebra isomorphism classes of $T(g,h)$ are described in Proposition \ref{isomorphism type of T(g,h)}. This classification is described in terms of the family $T(\ell)$, $\ell\neq 0$, in Remark \ref{T(g,h) remark}. The types of AS-regular algebras in the family $T(g,h)$ are characterized in Proposition \ref{nodal cubic} and Theorem \ref{sigma is multiplication by -1}.
\end{proof}
\section{Reducible-type twisted tensor products}
\label{reducible type ttps}
In this section, $T$ denotes a quadratic twisted tensor product of reducible type, in \emph{normal form} \cite[Section 4]{CG3}. The results below classify $T$ up to graded algebra isomorphism. When $T$ is AS-regular, we identify its type. We assume ${\rm char}\ \k\neq 2$.
By \cite[Theorem 4.9]{CG3} $T\cong \k\langle x,y,z\rangle/I$ where $I$ is the graded ideal of $\k\langle x,y,z\rangle$ generated by the elements
$$xy-yx, zx-ax^2-bxy-cy^2-dxz-eyz-z^2, zy-Bxy-Cy^2-Dyz,$$
such that $(a, d)$ is not a zero of certain polynomials $f_n(t,u)$ for all $n \geq 1$, and the parameters satisfy one of the following cases:
\begin{itemize}
\item[R(i):] $a = B(1-d-B)$, $b = c = e=C = D = 0$;
\item[R(ii):] $e=B = C = 0$, $D = 1$;
\item[R(iii):] $d = -1$, $B = 2$, $e=C = 0$, $D = -1$;
\item[R(iv):] $a = B(1-d-B)$, $b = 1-d-2B$, $c=-1$, $C = 1$, $e=D = 0$;
\item[R(v):] $e=0$, $d= D= -1$, $B = 2$, $C = 1$.
\item[R(vi):] $e=1$, $d=D=0$, $a=B(1-B)$, $b=C-B-2BC$, $c=-C(1+C)$;
\item[R(vii):] $B=C=0$, $e=d=D=1$.
\end{itemize}
We use the polynomials $f_n(t,u)$ in the proof of Proposition \ref{non-regular classification} below. We note here that $f_1(t,u)=1-t$, so $a \ne 1$.
By \cite[Theorem 6.2]{CG3}, no algebras in cases R(i), R(iv), R(vi) are AS-regular. After two preliminary results, the analyses in this section are divided into two subsections, according to whether or not $T$ is AS-regular.
The results are summarized in Table \ref{ReducibleTable} and the following theorem.
\begin{table}[h]
\caption{Mapping of reducible-type TTP cases not isomorphic to an Ore-type TTP}
\label{ReducibleTable}
\setlength\tabcolsep{2pt}
\begin{tabular}{|c|c|c|c|}
\hline
TTP Case & Subcase & Algebra & Type\\
\hline
\multirow{2}{*}{R(iii)} & $b^2-4ac+4c=0$ & $U$ & $S_2$\\
\cline{2-4}
&$b^2-4ac+4c\neq 0$& $U'$ & $S_2'$\\
\hline
\multirow{2}{*}{R(i)} & $B+d=0$ & $R_0$ & \multirow{4}{*}{not AS-regular} \\
\cline{2-3}
& \multirow{2}{*}{$B+d\neq 0$} & \multirow{2}{*}{$R(q)$} & \\
\cline{1-1}
\multirow{2}{*}{R(iv)} & & &\\
\cline{2-3}
& $B+d= 0$ & $R_1$ & \\
\hline
\end{tabular}
\end{table}
\begin{thm}
\label{ReducibleSummary}
Every reducible-type twisted tensor product is isomorphic as a graded algebra to one of the algebras listed in Table \ref{ReducibleTable}, or to a twisted tensor product of Ore type. The algebras listed in Table \ref{ReducibleTable} are pairwise non-isomorphic, and the table gives the types of the AS-regular algebras.
\end{thm}
The proof of Theorem \ref{ReducibleSummary} can be found at the end of the section.
\begin{rmk}
\label{complete reducible cases}
By \cite[Theorem 3.1]{IM}, in characteristic 0, the isomorphism classes of Type $S_2$ AS-regular algebras are parametrized by points of $\P^1$, but there is only one isomorphism class of Type $S'_2$. We show in Section 5 that no other graded twisted tensor products of $\k[x,y]$ and $\k[z]$ are of Type $S_2$.
\end{rmk}
The first lemma, and the theorem that follows, show that only case R(iii) contains AS-regular algebras not isomorphic to a graded Ore extension of $\k[x,y]$. (Ore-type twisted tensor products are discussed in Section \ref{ore type ttps}.)
\begin{lemma}
\label{reduction to case (iii)} The following hold.
\begin{itemize}
\item[(1)] Any twisted tensor product from case R(v) is isomorphic as a graded algebra to an algebra from case R(iii).
\item[(2)] Any twisted tensor product from case R(vii) is isomorphic to an algebra from case R(ii).
\item[(3)] Any twisted tensor product from case R(ii) is isomorphic to an Ore-type twisted tensor product.
\end{itemize}
\end{lemma}
\begin{proof}
For (1), the map sending $x\mapsto x-y/2$ and fixing $y$ and $z$ identifies a case R(v) algebra with one from case R(iii).
For (2), the map sending $z\mapsto z-y/2$ and fixing $x$ and $y$ identifies a case R(vii) algebra with one from case R(ii).
For (3), If $T$ is a reducible-type twisted tensor product from case R(ii) with $a=0$ and $d=1$, then the map interchanging $x$ and $z$, fixing $y$, identifies $T$ with the Ore-type algebra with relations
$$xy-yx, zy-yz, zx+x^2+cy^2-xz-byz.$$
If $T$ is any other reducible-type twisted tensor product from case R(ii), the map sending $x\to x+\a z$ and fixing $y$ and $z$ where $\a$ satisfies $a\a^2+(d-1)\a+1=0$ identifies a case R(ii) algebra with the algebra with relations
$$xy-yx, zy-yz, (1-a\a)zx-ax^2-bxy-cy^2-(d+a\a)xz-b\a yz.$$
Note that this algebra is an Ore-type twisted tensor product provided that $1-a\a \ne 0$. If $a = 0$, then this is clear. Suppose that $a \ne 0$. Let $\d = (d-1)^2-4a$ be the discriminant of $at^2+(d-1)t+1$. If $\d \ne 0$, then $a\a^2+(d-1)\a+1=0$ has two distinct solutions and we may choose $\a \ne a^{-1}$. Suppose that $\d = 0$ and $\a = a^{-1}$ is the unique solution of $a\a^2+(d-1)\a+1=0$. One checks that $a = 1$, but this contradicts the fact that $T$ is a twisted tensor product.
\end{proof}
\begin{thm}
\label{semistandard reducible type}
Let $T$ be a reducible-type twisted tensor product in normal form. Consider the following statements.
\begin{enumerate}
\item $a+d\neq 0\neq D$,
\item $T$ is AS-regular of dimension 3,
\item $T$ is semi-standard.
\end{enumerate}
Then $(1)\Rightarrow (2)\Rightarrow (3) \Rightarrow D\neq 0$. If $T$ is semi-standard and $a+d=0$, then $T$ is isomorphic as a graded algebra to an Ore-type twisted tensor product.
\end{thm}
\begin{proof}
The implication $(1)\Rightarrow (2)$ follows from \cite[Theorem 6.2(2)]{CG3}, and $(2)\Rightarrow (3)$ is immediate. Assume $T$ is semi-standard. The matrices $M$ and $N$ of equation (\ref{MandN}) for a reducible-type algebra are
$$M=\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0-ax_0 & -bx_0-cy_0 & -dx_0-ey_0-z_0\\
0 & z_0-Bx_0-Cy_0 & -Dy_0
\end{bmatrix}$$
and
$$N=\begin{bmatrix}
y_1 & -ax_1-by_1-dz_1 & -By_1\\
-x_1 & -cy_1-ez_1 & -Cy_1-Dz_1\\
0 & x_1-z_1 & y_1
\end{bmatrix}.
$$
Suppressing subscripts we have
\begin{align*}
\det M &= -y( (aD-dB)x^2+(bD-eB-dC)xy+(cD-eC)y^2\\
&\quad +(d-B-D)xz+(e-C)yz+z^2),\\
\det N &= y( (B-a)x^2 +(C-b)xy -cy^2 +(D-d-B)xz -(e+C)yz -Dz^2).
\end{align*}
Since $T$ is semi-standard, we have $\det M=k\det N$ for some $k\in \k$. Examining the coefficients of $yz^2$, we see that $D\neq 0$, so $T$ belongs to case R(ii), R(iii), R(v), or R(vii).
If $T$ is an algebra from case R(iii) or R(v), then $d=-1$. Since $f_1(a,d)=1-a\neq 0$, it follows that $a+d\neq 0$.
If $T$ is from case R(ii) or R(vii), then $T$ is isomorphic to an Ore-type twisted tensor product by Lemma \ref{reduction to case (iii)}.
\end{proof}
\subsection{Twisted tensor products from case R(iii)}
In case R(iii), $a+d\neq 0$, and Theorem \ref{semistandard reducible type} implies that
all algebras in this family are AS-regular. If $T$ is an algebra from case R(iii), the matrix $M$ is
$$\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0-ax_0& -bx_0-cy_0 & x_0-z_0\\
0 & z_0-2x_0 & y_0
\end{bmatrix},$$
so the point scheme of $T$ is
$$E=\mathcal Z(y(z^2-2xz+(2-a)x^2-bxy-cy^2)).$$
The automorphism, which has order 2, is
$$\sigma([x:y:z])=\begin{cases} [x:y:2x-z] & y\neq 0\\ [z-x:0:z-ax] & y=0\\ \end{cases}.$$
As ${\rm char}\ \k\neq 2$, the quadratic form $z^2-2xz+(2-a)x^2-bxy-cy^2$ is reducible if and only if its discriminant, $b^2-4ac+4c=0$.
Despite the number of parameters, there are only two graded algebra isomorphism classes of case R(iii) algebras, according to whether or not $b^2-4ac+4c=0$, as the next result shows. This result also clarifies the action of $\sigma$ on $E$. We define the two algebras as follows. Let
$$U=\k\langle x,y,z\rangle/\langle xy-zx, yx-xz, y^2+z^2\rangle,$$
and
$$U'=\k\langle x,y,z\rangle/\langle xy-zx, yx-xz, x^2+y^2+z^2\rangle.$$
\begin{prop}
\label{S_2',S_2}
Let $T$ be a twisted tensor product from case R(iii). Let $s = b^2-4ac+4c$.
\begin{itemize}
\item[(1)] If $s \ne 0$, then $T$ is isomorphic to the algebra $U'$.
\item[(2)] If $s = 0$, then $T$ is isomorphic to the algebra $U$.
\end{itemize}
\end{prop}
\begin{proof}
For (1), let $\a_2=2(1-a)\sqrt{-2/s}$ and let $\a_1=\dfrac{b\a_2}{2(1-a)}$. Since $a\neq 1$, we have $\a_2\neq 0$. Define a graded algebra homomorphism $\varphi:\k\langle x,y,z\rangle\to \k\langle x,y,z\rangle$ by
\begin{align*}
\varphi(x) &= \a_1x+y+z\\
\varphi(y) &= \a_2x\\
\varphi(z) &= \a_1x+(1+\sqrt{a-1})y+(1-\sqrt{a-1})z.
\end{align*}
Since $\a_2\neq 0$, and $a-1\neq 0$, the map $\varphi$ is clearly bijective in degree 1, and hence is an isomorphism. It suffices to prove that that $\varphi$ is a $\k$-linear isomorphism from the quadratic relations space of $T$ to that of $U'$. For ease of notation we define $\b_3=1+\sqrt{a-1}$ and $\d_3=1-\sqrt{a-1}$. By direct calculation we see that
$$\varphi(xy-yx)=\a_2(yx+zx-xy-xz)$$
and
$$\varphi(zy-2xy+yz)=\a_2\left[(\b_3-2)yx-\b_3zx+\b_3xy-(\b_3-2)xz\right].$$
Since $\b_3\neq 1$, these two images span the same subspace as $yx-xz$ and $zx-xy$. We consider $\varphi(zx-ax^2-bxy-cy^2+xz-z^2)$ modulo these two relations, and show that it is a nonzero scalar multiple of $x^2+y^2+z^2$. To that end,
\begin{align*}
\varphi(zx-z^2) &= (1-\b_3)(\a_1x+\b_3y+\d_3z)(y-z)\\
&=(1-\b_3)(\a_1xy-\a_1xz+\b_3y^2-\b_3yz+\d_3zy-\d_3z^2),\\
\varphi(-ax^2) &= -a(\a_1^2x^2+2\a_1xy + 2\a_1xz + y^2+yz+zy+z^2),\\
\varphi(-bxy) &= -b\a_2( \a_1x^2+xz+xy), \\
\varphi(-cy^2) &= -c\a_2^2x^2, \\
\varphi(xz) &= ( \a_1x+y+z)(\a_1x+\b_3y+\d_3z),\\
&=\a_1^2x^2+\a_1(1+\b_3)xy+\a_1(1+\d_3)xz+\b_3y^2+\d_3yz\\
&\quad +\b_3zy+\d_3z^2.
\end{align*}
Examining the coefficients of the sum of the terms above, and noting that $1-\b_3=\d_3-1$, we see that the coefficients of $xy$ and $xz$ both equal $(2-2a)\a_1-b\a_2$, which vanishes by definition of $\a_1$. The coefficients of $yz$ and $zy$ both equal $\b_3^2-2\b_3+2-a$, which vanishes by definition of $\b_3$. The coefficients of $y^2$ and $z^2$ both equal $2-2a$, and the coefficient of $x^2$ is $(1-a)\a_1^2-b\a_2\a_1-c\a_2^2.$ Using the definitions of $\a_1$ and $\a_2$, it is straightforward to show this expression also equals $2-2a$.
The proof of (2) is similar. Let $\d_1=\dfrac{b}{2(1-a)}$. Define a graded algebra homomorphism $\varphi:\k\langle x,y,z\rangle\to \k\langle x,y,z\rangle$ by
\begin{align*}
\varphi(x) &= \d_1x+y+z\\
\varphi(y) &= x\\
\varphi(z) &= \d_1z+(1+\sqrt{a-1})x+(1-\sqrt{a-1})y.
\end{align*}
One then checks that this map induces the desired isomorphism $T\to U$. The details are left to the reader.
\end{proof}
In light of Lemma \ref{reduction to case (iii)} and Proposition \ref{S_2',S_2}, there are only two isomorphism classes of AS-regular twisted tensor products of reducible type that do not contain Ore-type twisted tensor products. The next result shows these isomorphism classes are distinct, and characterizes their types.
\begin{prop}
\label{reduced-type case (iii)}
The algebras $U$ and $U'$ are AS-regular.
\begin{itemize}
\item[(1)] The point scheme of $U'$ is a union of a line and an irreducible conic, meeting at two points. The automorphism $\sigma$ stabilizes the components and interchanges the intersection points. (type $S_2'$)
\item[(2)] The point scheme of $U$ is a union of three lines meeting in three points, and $\sigma$ interchanges two of the lines, fixing $y=0$. (type $S_2$)
\end{itemize}
In either case, the automorphism $\sigma$ has order 2.
\end{prop}
\begin{proof}
By Proposition \ref{S_2',S_2}, both $U$ and $U'$ are isomorphic to case R(iii) algebras, which are all AS-regular by Theorem \ref{semistandard reducible type}.
First consider the algebra $U'$. The associated matrix $M$ of equation (\ref{MandN}) is
$$
\begin{bmatrix}
-z_0 & x_0 & 0\\
y_0 & 0 & -x_0\\
x_0& y_0& z_0
\end{bmatrix},
$$
so the point scheme is $E=\mathcal Z(x(2yz+x^2))$, a union of a line and an irreducible conic. The line $x=0$ intersects the conic $2yz+x^2 = 0$ in $[0:1:0]$ and $[0:0:1]$. The automorphism $\sigma$ is given by $$\sigma([x:y:z]) = \begin{cases} [x: z: y] & x\neq 0\\ [0: -z: y] & x=0.\\ \end{cases}$$
So $\sigma$ stabilizes the components of $E$, interchanges $[0:1:0]$ and $[0:0:1]$, and has order 2.
Next consider the algebra $U$. The matrix $M$ of equation (\ref{MandN}) is
$$
\begin{bmatrix}
-z_0 & x_0 & 0\\
y_0 & 0 & -x_0\\
0 & y_0& z_0
\end{bmatrix},
$$
thus the point scheme is $E=\mathcal Z(xyz)$, a union of three lines. The automorphism $\sigma$ is given by
\begin{align*}
\sigma([0:y:z]) &= [0: -z: y]\\
\sigma([x:0:z]) &= [x: z: 0]\\
\sigma([x:y:0]) &= [x:0:y],
\end{align*}
so $\sigma$ stabilizes $x=0$ while interchanging $y=0$ and $z=0$. The automorphism $\sigma$ has order 2.
\end{proof}
\subsection{Twisted tensor products from cases R(i), R(iv), R(vi)}
Recall that, as noted above, none of the reducible-type algebras in cases R(i), R(iv) and R(vi) are AS-regular. It appears that the algebras in each respective case may depend, even up to isomorphism, on two parameters. However, we show that, up to isomorphism, the algebras in cases R(i), R(iv) and R(vi) constitute a 1-parameter family of algebras and two isolated algebras.
\begin{lemma}
\label{case (vi) is (i) or (iv)}
Any twisted tensor product from case R(vi) is isomorphic to an algebra from case R(i) or case R(iv).
\end{lemma}
\begin{proof}
The defining relations of a twisted tensor product $T$ from case R(vi) are
$$xy-yx, zy-Bxy-Cy^2, zx-ax^2-bxy-cy^2-yz-z^2,$$ where $a = B(1-B)$, $b = C-B-2BC$, $c = -C(1+C)$.
The map fixing $x$ and $y$, sending $z\mapsto z+Cy$ is an isomorphism from $T$ to the algebra $T'$ with relations
$$xy-yx, zy-Bxy, zx-ax^2+B(1+C)xy-(1+C)yz-z^2.$$
If $C=-1$, this algebra belongs to case R(i) ($d = 0$). Otherwise, the map sending $y\mapsto y/(1+C)$, $z\mapsto z-y$ and fixing $x$ is an isomorphism from $T'$ to an algebra from case R(iv) ($d = 0$).
\end{proof}
For $d, B, q \in \k$ we define
\begin{align*}
&T_{(i)}(d,B)=\k\langle x,y,z\rangle/\langle xy-yx, zy, (1-B)zx-(d+B)xz-z^2\rangle, \\
&T_{(iv)}(d,B)=\k\langle x,y,z\rangle/\langle xy-yx, zy, (1-B)zx-(d+B)xz-yz-z^2\rangle, \\
&R(q)=\k\langle x,y,z\rangle/\langle xy-yx, zy, qzx-xz-z^2\rangle, \\
&R_0 = \k\langle x,y,z\rangle/\langle xy-yx, zy, zx-z^2\rangle, \\
&R_1 = \k\langle x,y,z\rangle/\langle xy-yx, zy, zx-yz-z^2\rangle.
\end{align*}
We omit the straightforward verification of the following lemma.
\begin{lemma}
\label{R(q) are distinct}
As graded algebras, $R(q)\cong R(q')$ if and only if $q=q'$. Furthermore, for all $q \in \k$, the algebras $R(q)$, $R_0$ and $R_1$ are pairwise non-isomorphic.
\end{lemma}
We note that for any $\l \in \k$, $\l \ne 0$, $R_1 \cong \k\langle x,y,z\rangle/\langle xy-yx, zy,zx-\l yz-z^2\rangle,$ so one could also view $R_0$ and $R_1$ as members of a 1-parameter flat family.
\begin{prop}
\label{non-regular classification}
An algebra $T$ is a twisted tensor product from case R(i) or R(iv) if and only if it is isomorphic as a graded algebra to one of $R(q)$, $q \in \k$, $R_0$, or $R_1$.
\end{prop}
\begin{proof}
First, let $T$ be a twisted tensor product from case R(i) or case R(iv). If $T$ is from case R(i), then the map that fixes $x$ and $y$ and sends $z \mapsto Bx+z$ is an isomorphism $T \to T_{(i)}(d,B)$. If $T$ is from case R(iv), then the map that fixes $x$ and $y$ and sends $z \mapsto Bx+y+z$ is an isomorphism $T \to T_{(iv)}(d,B)$.
If $B+d\neq 0$, the map given by $x\mapsto x+y$, $y\mapsto -(d+B)y$, $z\mapsto z$ is an isomorphism $T_{(iv)}(d,B)\rightarrow T_{(i)}(d,B)$. Rescaling $x$ by $1/(d+B)$ and fixing $y$ and $z$ gives an isomorphism between $T_{(i)}$ and $R(q)$, where $q = (1-B)/(B+d)$.
If $B+d=0$, the requirement that $a=B(1-d-B)$ implies $a=B$, and since $a \ne 1$, it follows that $B\neq 1$. Then one sees that $T_{(i)}(d,B) \cong R_0$ and $T_{(iv)}(d,B) \cong R_1$ by isomorphisms fixing $y$ and $z$ and sending $x \mapsto (1/(1-B))x$.
For the converse, we first note that by \cite[Lemma 3.3]{CG3}, $f_n(a,-a)=(1-a)^n$ for all $n\ge 0$. Thus choosing $a=-d\neq 1$ guarantees $(a,d)$ is not a zero of any $f_n(t,u)$. Now it is clear that $R_0$ and $R_1$ are isomorphic to case R(i) and R(iv) twisted tensor products where, for example, $a=B=-d=0$. Similarly, $R(0)$ is isomorphic to a twisted tensor product from case R(i) where $B=1$ and $a=d=0$.
If $q\in \k^*$, put $d=1/q$ and $a=B=0$. One can show that in this case $f_n(a,d)=1$ for all $n\ge 0$, so there exists a case R(i) twisted tensor product isomorphic to $R(q)$.
\end{proof}
We conclude this section with the proof of Theorem \ref{ReducibleSummary}.
\begin{proof}[Proof of Theorem \ref{ReducibleSummary}]
By Lemma \ref{reduction to case (iii)}(2,3), the algebras in cases R(ii) and R(vii) are isomorphic to Ore-type twisted tensor products. Lemma \ref{reduction to case (iii)}(1) and Lemma \ref{case (vi) is (i) or (iv)} imply that among the remaining cases, it suffices to classify R(i), R(iii), and R(iv).
Proposition \ref{S_2',S_2} shows that every algebra in case R(iii) is isomorphic to $U$ or $U'$. Proposition \ref{reduced-type case (iii)} shows these algebras are non-isomorphic and AS-regular, and identifies their types as $S_2$ and $S_2'$, respectively.
By \cite[Theorem 6.2]{CG3}, no algebras in case R(i) or R(iv) are AS-regular. These algebras are classified up to graded algebra isomorphism as $R(q)$, $R_0$, or $R_1$ in Proposition \ref{non-regular classification}, and are pairwise non-isomorphic by Lemma \ref{R(q) are distinct}.
\end{proof}
\section{Ore-type twisted tensor products}
\label{ore type ttps}
In this section, let $T$ denote a quadratic twisted tensor product of Ore type, in normal form. The results below classify $T$ up to isomorphism of graded algebras. If $T$ is AS-regular, we identify its type, as in \cite{IM}. We continue to assume ${\rm char}\ \k\neq 2$.
We begin by recalling the description of Ore-type twisted tensor products from \cite{CG3}. By \cite[Theorem 4.3]{CG3}, $T\cong \k\langle x,y,z\rangle/I$ where $I$ is the graded ideal of $\k\langle x,y,z\rangle$ generated by the elements
$$xy-yx, zx-ax^2-bxy-cy^2-dxz-eyz, zy-Ax^2-Bxy-Cy^2-Dyz,$$
such that $A, e\in \{0,1\}$ and $a, b, c, d, B, C, D\in \k$ belong to one of the following cases.
\begin{enumerate}
\item[O(1):] $e=0$, $A\in \{0,1\}$, and if $A=0$, then $C\in \{0,1\}$. Furthermore, one of the following holds:
\begin{enumerate}
\item[(i)] $d=D=1$,
\item[(ii)] $d\neq 1=D$, $A=B=C=0$,
\item[(iii)] $d=1\neq D$, $a=b=c=0$,
\item[(iv)] $d\neq 1\neq D$, $A=c=0$, $a=B(d-1)/(D-1)$, $b=C(d-1)/(D-1)$.
\end{enumerate}
\vspace{0.25cm}
\item[O(2):] $e=1$, $d=D$ and one of the following holds:
\begin{enumerate}
\item[(i)] $d=1$, $A=B=C=0$,
\item[(ii)] $d\neq 1$, $A=0$, $B=a=(b-C)(d-1)$, $c=C/(d-1)$.
\end{enumerate}
\end{enumerate}
By \cite[Proposition 4.2]{CG3} every Ore-type twisted tensor product is a graded Ore extension of $\k[x,y]$. If $T$ is in normal form, $T\cong \k[x,y][z; \nu, \d]$ where
\begin{align*}
\nu(x) &= dx+ey & \d(x)&=ax^2+bxy+cy^2\\
\nu(y) &= Dy & \d(y) &= Ax^2+Bxy+Cy^2.
\end{align*}
\begin{thm}
\label{Ore types are semistandard}
An Ore-type twisted tensor product $T$ is semi-standard, and the following are equivalent.
\begin{enumerate}
\item $T$ is nondegenerate,
\item $T$ is AS-regular,
\item $\nu$ is invertible.
\end{enumerate}
\end{thm}
To facilitate the proof, and for use below, we record the matrices $M$ and $N$ of equation (\ref{MandN}) of Section 2 and their determinants for an Ore-type twisted tensor product.
$$
M=\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0-ax_0 & -bx_0-cy_0 & -dx_0-ey_0\\
-Ax_0 & z_0-Bx_0-Cy_0 &-Dy_0
\end{bmatrix}$$
$$
N=\begin{bmatrix}
y_1 & -ax_1-by_1-dz_1 & -Ax_1-By_1\\
-x_1 & -cy_1-ez_1 & -Cy_1-Dz_1\\
0 & x_1 & y_1
\end{bmatrix}
$$
\begin{align*}
\det M &=
dAx^3+(dB+eA-aD)x^2y+(eB+dC-bD)xy^2\\
&\quad +(eC-cD)y^3+(D-d)xyz-ey^2z\\
\det N &=
Ax^3+(B-a)x^2y+(C-b)xy^2-cy^3+(D-d)xyz-ey^2z
\end{align*}
\begin{proof}
The fact that $T$ is semi-standard, that is, $\det M= k\det N$ for some $k\in\k^*$, is easily verified in each case listed above.
The statement (3)$\Rightarrow$(2) follows from \cite[Theorem 6.2(i)]{CG3}, and (2)$\Rightarrow$(1) is \cite[Theorem 5.1]{ATVI}. Thus it suffices to prove (1)$\Rightarrow$(3).
If either $x$ or $y$ is nonzero, then $N$ clearly has rank 2. If $x=y=0$, then we may assume $z=1$ and $N$ becomes
$$\begin{bmatrix}
0 & -d & 0\\
0 & -e & -D\\
0 & 0 & 0
\end{bmatrix}$$
which has rank 2 if and only if $dD\neq 0$. This condition implies the endomorphism $\nu:\k[x,y]\to \k[x,y]$ is bijective in degree 1, so $\nu$ is an isomorphism.
\end{proof}
The analysis of the cases O(1)(i,ii,iii,iv), O(2)(i,ii) is more involved than for the reducible-type twisted tensor products of Section \ref{reducible type ttps}. Consequently, following two preliminary results, this section is divided into four subsections. Our classification results are summarized in Table \ref{OreTable}, and in the following theorem. Double lines in Table \ref{OreTable} delineate the four subsections.
\begin{table}[h]
\caption{Mapping of Ore-type TTP cases}
\label{OreTable}
\setlength\tabcolsep{2pt}
\begin{tabular}{|c|c|c|c|c|}
\hline
TTP Case & Subcase & Algebra & Condition & IM-type\\
\hline
\multirow{7}{*}{O(1)(i)}& \begin{tabular}{c}$A=0\neq B-a$\\ $(C-b)^2\neq 4c(a-B)$ \end{tabular} & $T(\a, \b, \gamma)^*$ & $\a+\b+\gamma\neq 0$ & $T_1$\\
\cline{2-5}
&\multirow{2}{*}{\begin{tabular}{c}$A=0\neq B-a$\\ $(C-b)^2=4c(a-B)$ \end{tabular}} & \multirow{2}{*}{$W(\gamma,\epsilon)$} & $\epsilon=0$ & $WL_2$\\
\cline{4-5}
&&& $\epsilon=1$ & $WL_3$\\
\cline{2-5}
&\multirow{3}{*}{\begin{tabular}{c|c}\multirow{3}{*}{\begin{tabular}{c}$A=0$\\$a=B$\\$C-b=0\neq c$ \end{tabular}} & $a=b=0$\\ \cline{2-2} & $a\neq 0$\\ \cline{2-2} & $a=0\neq b$ \end{tabular}} & $L(0,0)$& & $TL_1$\\
\cline{3-5}
&& $L(1,0)$& & $TL_2$\\
\cline{3-5}
&& $L(0,1)$& & $TL_4$\\
\cline{2-5}
&\multirow{2}{*}{\begin{tabular}{c}$A=0= B-a$\\ $C-b=0=c$ \end{tabular}} & $P(\epsilon)$ & $\epsilon=1$& $P_2$\\
\cline{3-5}
&& $P(\epsilon)$ & $\epsilon=0$ & \multirow{2}{*}{$P_1$}\\
\cline{1-4}
\noalign{\vskip\doublerulesep\vskip-\arrayrulewidth}
\cline{1-4}
\multirow{3}{*}{O(1)(iv)}&\multirow{3}{*}{$C=0$}& \multirow{3}{*}{$S(d,D)^{**}$} & $d=D\notin \{0,1\}$ & \\
\cline{4-5}
&&& $dD=0$ & not AS-regular\\
\cline{4-5}
&&& $d\neq D$, $d,D\notin\{0,1\}$ & \multirow{2}{*}{$S_1$}\\
\cline{1-4}
\noalign{\vskip\doublerulesep\vskip-\arrayrulewidth}
\cline{1-4}
\multirow{3}{*}{O(1)(ii)}&& \multirow{3}{*}{$S'(d,\epsilon)$} & $d\neq 0=\epsilon$ & \\
\cline{4-5}
&&&$d\neq 0$, $\epsilon=1$ & $S'_1$\\
\cline{4-5}
&&& $d=0$ & not AS-regular\\
\hline
\hline
O(2)(i) & $a\neq 0$ & $W$ && $T'$\\
\hline
\multirow{2}{*}{O(2)(ii)} && \multirow{2}{*}{ $W(d)$ }& $d\notin\{0,1\}$ & $WL_1$\\
\cline{4-5}
&&& $d=0$ & not AS-regular\\
\hline
\end{tabular}
*isomorphism classes of $T(\a,\b,\gamma)$ are parametrized by points $[\a:\b:\gamma]\in \P^2$ up to permutation of coordinates.
**isomorphism classes of $S(d,D)$ are parametrized by pairs $(d,D)$ up to permutation of coordinates.
\end{table}
\begin{thm}
\label{OreSummary}
Every Ore-type twisted tensor product is isomorphic as a graded algebra to one of the algebras listed in Table \ref{OreTable}. The algebras listed in Table \ref{OreTable} are AS-regular and are pairwise non-isomorphic, except as noted. The table gives the types of the AS-regular algebras.
\end{thm}
The proof of Theorem \ref{OreSummary} can be found at the end of this section.
\begin{rmk}
\label{complete Ore types}
Comparing the algebras listed in Table \ref{OreTable} with those of \cite[Theorem 3.1]{IM} shows that when ${\rm char}\ \k=0$, all algebras of types $T_1, WL_2, WL_3,$ and $TL_4$ are isomorphic to Ore-type twisted tensor products of $\k[x,y]$ and $\k[z]$.
\end{rmk}
We begin our classification of Ore-type twisted tensor products up to graded algebra isomorphism with case O(1). Recall that case O(1) has $e=0$. We start with a few simple observations.
\begin{lemma}\
\label{Ore case (1)(iii)}
\begin{enumerate}
\item Any twisted tensor product from case O(1)(iii) is isomorphic as a graded algebra to one from case O(1)(ii).
\item Any twisted tensor product from case O(1)(iv) is isomorphic to one from case O(1)(iv) with $C=0$.
\end{enumerate}
\end{lemma}
\begin{proof}
Given a twisted tensor product from case O(1)(iii), the isomorphism that interchanges $x$ and $y$ and fixes $z$ yields an algebra from case O(1)(ii).
Given an algebra from case O(1)(iv) with $C=1$, the isomorphism that fixes $x$ and $y$ and maps $z\mapsto z+y/(1-D)$ yields an algebra from case O(1)(iv) with $C=0$.
\end{proof}
\subsection{Twisted tensor products from case O(1)(iv)}
\label{case (1) (iv)}
For $d, D \in \k$, $d\neq 1\neq D$, define $$S(d,D)=\k\langle x,y,z\rangle/\langle xy-yx, zx-dxz, zy-Dyz\rangle.$$
The definition of $S(d,D)$ obviously makes sense for all values of $d$ and $D$. The restrictions are imposed to avoid redundancies with other families of algebras defined below, and to align with the values permitted in the corresponding case O(1)(iv).
\begin{prop}
\label{case (1)(iv)}
Any twisted tensor product from case O(1)(iv) is isomorphic as a graded algebra to an algebra from the family $S(d, D)$. Conversely, $S(d,D)$ is a twisted tensor product belonging to case O(1)(iv).
\end{prop}
\begin{proof}
Given a twisted tensor product $T$ from case O(1)(iv), by Lemma \ref{Ore case (1)(iii)}, we may assume $C=0$, so the relations of $T$ are
$$xy-yx, zx-ax^2-dxz, zy-Bxy-Dyz,$$
where $a(D-1)=B(d-1)$. In this case, $d\neq 1\neq D$. The map that fixes $x$ and $y$, and sends $z$ to $\lambda x+z$ where $\lambda = \dfrac{a}{1-d}=\dfrac{B}{1-D}$ is an isomorphism from $T$ to $S(d,D)$.
The converse is immediate from the description of case O(1)(iv).
\end{proof}
\begin{prop}
\label{S(d,D) point scheme}
The algebra $S(d,D)$ is AS-regular if and only if $dD\neq 0$. When $S(d,D)$ is AS-regular, the point scheme $E$ and associated automorphism $\sigma$ are as follows.
\begin{itemize}
\item[(1)] If $d=D$, $E=\P^2$ and the automorphism $\sigma$ is diagonal. (type $P_1$)
\item[(2)] If $d\neq D$, $E$ is the union of three distinct lines, and the automorphism $\sigma$ stabilizes these lines. (type $S_1$)
\end{itemize}
In either case, the order of $\sigma$ is the least common multiple of the orders of $d, D\in \k^*$.
Moreover, the algebras $S(d,D)$ and $S(d',D')$ are graded isomorphic if and only if $(d',D') \in \{(d,D), (D,d)\}$.
\end{prop}
\begin{proof}
The statement that $S(d,D)$ is AS-regular if and only if $dD\neq 0$ follows from Proposition \ref{case (1)(iv)} and Theorem \ref{Ore types are semistandard}.
The matrix $M$ for $S(d,D)$ is
$$\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0 & 0 & -dx_0\\
0 & z_0 & -Dy_0
\end{bmatrix}.$$
The point scheme of $S(d,D)$ is $E=\mathcal Z((D-d)xyz)$, which is reduced, and the automorphism $\sigma$ is given by
$$\sigma([x:y:z])=\begin{cases} [dx:dy:z] & x\neq 0\\ [0:Dy:z] & x=0\\ \end{cases}.$$ Statements (1), (2) and the statement regarding the order of $\sigma$ are now clear.
The characterization of graded algebra isomorphism classes of the $S(d,D)$ is a special case of \cite[Example 4.10]{Mori}, so the proof is omitted.
\end{proof}
\subsection{Twisted tensor products from cases O(1)(ii), O(1)(iii)}
\label{case (1) (ii)}
By Lemma \ref{Ore case (1)(iii)} (1) there is no loss of generality in analyzing case O(1)(ii). For $\epsilon, d \in \k$ such that $\epsilon\in \{0,1\}$ and $d\neq 1$, we define: $$S'(d,\epsilon)=\k\langle x,y,z\rangle/\langle xy-yx, zy-yz, zx-dxz+\epsilon y^2\rangle.$$
As in the preceding subsection, we have imposed a restriction on $d$ to avoid redundancy and to align with the values permitted in the corresponding case.
\begin{prop}
\label{case (1)(ii)}
Any twisted tensor product from case O(1)(ii) is isomorphic as a graded algebra to an algebra from the family $S'(d,\epsilon)$. Conversely, $S'(d,\epsilon)$ is a twisted tensor product belonging to case O(1)(ii).
\end{prop}
\begin{proof}
Given a twisted tensor product $T$ from case O(1)(ii), the relations of $T$ are
$$xy-yx, zy-yz, zx-ax^2-bxy-cy^2-dxz,$$
where $d\neq 1$. The graded algebra map which fixes $x$ and $y$ and sends $z$ to $\lambda x+\mu y+z$, where $\lambda=\dfrac{a}{1-d}$ and $\mu=\dfrac{b}{1-d}$, is an isomorphism from $T$ to the algebra with relations $xy-yx, zy-yz, zx-dxz+cy^2$. If $c\neq 0$, rescaling $y$ yields the algebra $S'(d,1)$.
The converse is immediate from the description of case O(1)(ii).
\end{proof}
\begin{prop}
\label{S_1 types}
An algebra $S'(d,\epsilon)$ is AS-regular if and only if $d\neq 0$.
If $S'(d,\epsilon)$ is AS-regular, then the point scheme $E$ and associated automorphism $\sigma$ are as follows.
\begin{itemize}
\item[(1)] If $\epsilon=0$, $E$ is a union of three distinct lines, and $\sigma$ stabilizes the components. (type $S_1$)
\item[(2)] If $\epsilon\neq 0$, $E$ is a union of a line and a conic meeting at two points, and $\sigma$ stabilizes the components and the intersection points. (type $S'_1$)
\end{itemize}
In either case, the order of $\sigma$ is the order of $d\in \k^*$.
The algebras $S'(d,\epsilon)$ and $S'(d',\epsilon')$ are isomorphic if and only if $\epsilon'=\epsilon$ and $d'=d$ or, when $d\neq 0$, $d'=d^{-1}$. Moreover, $S'(d,0)$ is not isomorphic to an algebra belonging to the family $S(d', D')$.
\end{prop}
\begin{proof}
By definition of $S'(d,\epsilon)$, the matrix $M$ is
$$\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0 & \epsilon y_0 & -dx_0\\
0 & z_0 & -y_0
\end{bmatrix}.$$
Proposition \ref{case (1)(ii)}
and Theorem \ref{Ore types are semistandard} imply that $S'(d,\epsilon)$ is AS-regular if and only if $d\neq 0$. In this case
the point scheme is $E=\mathcal Z((1-d)xyz+\epsilon y^3)$, which is reduced since $d\neq 1$, and the automorphism $\sigma$ is given by
$$\sigma([x:y:z])=\begin{cases} [x:y:z] & y\neq 0 \\ [dx:0:z] & y= 0\\ \end{cases}.$$ The description of the point scheme of $S'(d,\epsilon)$ and the automorphism $\sigma$ follows.
Next, we characterize $S'(d,\epsilon)$ up to graded algebra isomorphism. For the ``if'' part of the statement, observe that if $d\neq 0$, then $S'(d,\epsilon)\cong S'(d^{-1},\epsilon)$ via the isomorphism given by switching $x$ and $z$ and rescaling $y\mapsto \sqrt{-d}y$.
Conversely, suppose $S'(d,\epsilon)\cong S'(d', \epsilon')$. Since $S'(d, \epsilon)$ is AS-regular if and only if $d\neq 0$, we need only consider two cases: $dd'\neq 0$ and $d=d'=0$. First assume $dd'\neq 0$ so $S'(d,\epsilon)$ and $S'(d',\epsilon')$ are AS-regular of dimension 3, and thus are geometric algebras. By considering types, the first part of the Proposition implies $\epsilon=\epsilon'$.
Let $\psi:\P^2\to \P^2$ be an automorphism such that $\psi\sigma=\sigma'\psi.$ Since $d\neq 1$, $\sigma$ and $\sigma'$ restrict to non-identity maps on $y=0$. As $\sigma$ and $\sigma'$ are the identity when $y\neq 0$, $\psi$ stabilizes the $y=0$ component.
Let $[\psi_{ij}]\in GL_3$ be a matrix representing $\psi$, up to scaling. Since $\psi$ stabilizes the line $y=0$, we have $\psi_{21}=\psi_{23}=0$. Since $\sigma$ and $\sigma'$ fix $[1:0:0]$ and $[0:0:1]$, the condition $\psi\sigma=\sigma'\psi$ implies
$$[d'\psi_{11}:0:\psi_{31}]=[\psi_{11}:0:\psi_{31}]\quad\text{and}\quad [d'\psi_{13}:0:\psi_{33}]=[\psi_{13}:0:\psi_{33}].$$
Since $d'\neq 1$, we have $\psi_{11}\psi_{31}=\psi_{13}\psi_{33}=0$, and since $\psi$ is invertible, we have $\psi_{11}\psi_{33}\neq \psi_{13}\psi_{31}$. So either $\psi_{11}=\psi_{33}=0$ or $\psi_{13}=\psi_{31}=0$. In the former case, $\psi_{13}\neq0\neq\psi_{31}$, and evaluating $\psi\sigma=\sigma'\psi$ at $[1:0:1]$ yields
$$[\psi_{13}:0:d\psi_{31}]=[d'\psi_{13}:0:\psi_{31}],$$
whence $d'=d^{-1}$. A similar argument in the case $\psi_{13}=\psi_{31}=0$ yields $d=d'$. This completes the characterization of $S'(d,\epsilon)$ in the case $dd'\neq 0$.
For the case $d=d'=0$, note that the relation $zx=0$ holds in $S'(0,0)$. It is easy to check that products of linear elements in $S'(0,1)$ are always nonzero, hence $S'(0,\epsilon)\cong S'(0,\epsilon')$ implies $\epsilon=\epsilon'$.
Finally, observe that if the definition of $S(d,D)$ is extended to allow $D=1$, then $S'(d,0)=S(d,1)$. The fact that $S'(d,0)\ncong S(d',D')$ for $D'\neq 1$ is therefore a consequence of \cite[Example 4.10]{Mori}.
\end{proof}
\subsection{Twisted tensor products from case O(1)(i)}
\label{case (1) (i)}
Among the algebras from case O(1), it remains to consider case O(1)(i). Recall that in this case $d=D=1$; that is, the ring endomorphism $\nu$ defining the Ore-extension $T$ is the identity. So, by Theorem \ref{Ore types are semistandard}, the algebra $T$ is AS-regular. As such, the classification in this case is aided by consideration of the possible point schemes. The following reduction simplifies the point scheme calculations.
\begin{lemma}
\label{case (1)(i) reduction}
Any twisted tensor product from case O(1)(i) is isomorphic to one from case O(1)(i) with $A=0$.
\end{lemma}
\begin{proof}
Suppose $T$ is a twisted tensor product from case O(1)(i) with $A=1$.
Let $p(t)=ct^3+(b-C)t^2+(a-B)t-1\in \k[t]$.
If $p(t)$ is non-constant, let $\lambda\in \k$ be a zero of $p(t)$. Then the linear map $x\mapsto x$, $y\mapsto \l x+y$, $z\mapsto z$ determines an isomorphism of $T$ with $T'=\k\langle x,y,z\rangle/I'$ where $I'$ is generated by
$$xy-yx, zx-(a+b\l+c\l^2)x^2-(b+2c\l)xy-cy^2-xz,$$
$$zy-(B+(2C-b)\l-2c\l^2)xy-(C-c\l)y^2-yz.$$
Rescaling $y$, if necessary, this presentation satisfies the conditions of case O(1)(i).
If $p(t)$ is constant, then $c=b-C=a-B=0$. Interchanging $x$ and $y$ yields the isomorphic algebra with relations
$$xy-yx, zx-bx^2-axy-y^2-xz, zy-bxy-ay^2-yz.$$
Rescaling $y$ if necessary, this presentation satisfies the conditions of case O(1)(i).
\end{proof}
If $T$ is an algebra from case O(1)(i) with $A=0$, then the point scheme of $T$ is
$$E=\mathcal Z(y\left[ (B-a)x^2+(C-b)xy-cy^2\right]).$$
The automorphism $\sigma$ is given by $$\sigma([x:y:z])=\begin{cases} [x:y:z+Bx+Cy] & y\neq 0\\ [x:0:ax+z] & y=0\\ \end{cases}.$$
We see that whenever $E$ consists of multiple components, the automorphism $\sigma$ stabilizes the components, and the components intersect in a single point $[0:0:1]$.
When the quadratic form $$Q(x,y)=(B-a)x^2+(C-b)xy-cy^2$$ is a product of distinct linear factors, $E$ is either a union of three lines (when $a\neq B$), or the union of the double line $y^2=0$ and another line. We describe the three line case next.
For $\a, \b, \gamma \in \k$ such that $\a+\b+\gamma \ne 0$, define $$T(\a,\b,\gamma)=
\dfrac{\k\langle x,y,z\rangle}{\langle xy-yx, xz-zx-\b x^2+(\b+\gamma)xy, yz-zy-\a y^2+(\a+\gamma)xy \rangle}.$$
\begin{prop}
\label{T_1 types}
An algebra $T$ is a twisted tensor product from case O(1)(i) with $A=0$ and $B-a\neq 0\neq (C-b)^2-4c(a-B)$ if and only if $T$ is isomorphic to an algebra from the family $T(\a,\b,\gamma)$.
\end{prop}
\begin{proof}
Suppose $T$ is an algebra as hypothesized in the statement. Choose $\rho \in \k$ such that
$(a-B)^2+(4(a-B)c-(b-C)^2)\rho^2=0$ and let $\l=\dfrac{B-a+(b-C)\rho}{2(B-a)}$.
Then $x\mapsto x+\l y$, $y\mapsto \rho y$, $z\mapsto z$ determines an isomorphism from $T$ to an algebra $T(\a,\b,\gamma)$ where $\a=-(C\rho+B\l)$, $\b=-a$, and $\gamma =B(1+\l)+C\rho$.
Conversely, it is straightforward to check that when $\a+\b+\gamma\neq 0$, the algebra $T(\a,\b,\gamma)$ belongs to case O(1)(i) and satisfies the stated conditions.
\end{proof}
\begin{prop}
\label{point scheme of T_1}
The algebra $T(\a,\b,\gamma)$ is AS-regular. The point scheme of $T(\a,\b,\gamma)$ is a union of three distinct lines meeting at a point. The automorphism $\sigma$ stabilizes the components (type $T_1$), and the order of $\sigma$ is the least common multiple of the additive orders of $\a, \b, \gamma$ in $\k$.
Moreover, $T(\a,\b,\gamma)\cong T(\a',\b',\gamma')$ if and only if the coordinates of the point $[\a': \b': \gamma']\in \P^2$ are a permutation of those of $[\a:\b:\gamma]$.
\end{prop}
\begin{proof}
As noted above, AS-regularity of $T(\a,\b,\gamma)$ follows from Theorem \ref{Ore types are semistandard}, since the automorphism $\nu$ is the identity.
The matrix $M$ is
$$\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0+\b x_0 & -(\b+\gamma)x_0 & -x_0\\
-(\a+\gamma)x_0 & z_0+\a x_0 &-y_0
\end{bmatrix},$$
so the point scheme of is $E=\mathcal Z((\a+\b+\gamma)xy(x-y))$, which is reduced, and the automorphism is
\begin{align*}
\sigma([0:y:z])&=[0:y:z+\a y]\\
\sigma([x:0:z])&= [x:0:z+\b x]\\
\sigma([x:x:z])&= [x:x:z-\gamma x].
\end{align*}
Noting that the lines $x=0$, $y=0$, and $x=y$ intersect in $[0:0:1]$, the first part of the Corollary follows.
Since the algebras $T(\a,\b,\gamma)$ are AS-regular of dimension 3, they are geometric algebras. Suppose $T(\a,\b,\gamma)\cong T(\a',\b',\gamma')$ and let $\sigma'$ be the automorphism of the point scheme $E'$ of $T(\a', \b',\gamma')$. Then there exists an automorphism $\psi:\P^2\to \P^2$ such that $\psi\sigma=\sigma'\psi$, and $\psi$ acts by a permutation on the triple of lines ($x=0$, $y=0$, $x=y$). Applying the inverse of this permutation to the triple $(\a, \b, \gamma)$ yields $(\a', \b', \gamma')$ up to a scalar. We verify this only in the case of a 3-cycle, the other cases follow by similar, and easier, arguments.
Assume that $\psi$ cyclically permutes the lines: $(x=0)\rightarrow (y=0)\rightarrow (x=y)\rightarrow (x=0)$. Let $[\psi_{ij}]\in GL_3$ represent the transformation $\psi$ up to rescaling. Without loss of generality we may assume
$$[\psi_{ij}] = \begin{bmatrix} 1 & -1 & 0\\ 1 & 0 & 0 \\ \psi_{31} & \psi_{32} & \psi_{33}\\ \end{bmatrix}$$
where $\psi_{33}\neq 0$. Evaluating the commutativity relation $\psi\sigma=\sigma'\psi$ at $[0:1:0]$, $[1:0:0]$ and $[1:1:0]$ yields
$$\b'=-\a\psi_{33},\quad \gamma'=-\b\psi_{33},\quad \a'=-\gamma\psi_{33}.$$
Hence $[\a':\b':\gamma']=[\gamma:\a:\b]$ as desired.
Conversely, suppose that $[\a: \b: \gamma] \in \P^2$ and $\a+\b+\gamma \ne 0$. Let $E$, $E'$ denote the point schemes of $T(\a, \b, \gamma)$, $T(\gamma,\a,\b)$, with automorphisms $\sigma$, $\sigma'$, respectively. Define $\psi \in {\rm Aut}(\P^2)$ by the matrix $$[\psi_{ij}] = \begin{bmatrix} 1 & -1 & 0\\ 1 & 0 & 0 \\ 0 & 0 & -1\\ \end{bmatrix}.$$ Then one checks that $\psi \sigma = \sigma' \psi$, so, by Theorem \ref{geometric algebra isomorphism}, $T(\a, \b, \gamma) \cong T(\gamma, \a, \b)$. Similarly, $T(\a, \b, \gamma)$ is isomorphic to $T(\a', \b', \gamma')$ whenever $(\a', \b', \gamma')$ is any permutation of $(\a, \b, \gamma)$.
\end{proof}
When $B-a=0\neq C-b$, the quadratic form $Q(x,y)$ has distinct linear factors, one of which is $y$. These algebras are isomorphic to those where the form is a perfect square and are considered below.
\begin{lemma}
\label{case (1)(i) reduction 2}
A twisted tensor product from case O(1)(i) with $A=0$ and $B-a=0\neq C-b$ is isomorphic to an algebra from case O(1)(i) with $A=0$ and $B-a\neq 0=(C-b)^2-4(a-B)c$.
\end{lemma}
\begin{proof}
An isomorphism is given by the mapping $x\mapsto y+\b x$, $y\mapsto x$, $z\mapsto z$, where $(C-b)\b-c=0$.
\end{proof}
When $Q(x,y)$ is the nonzero perfect square $[2(B-a)x+(C-b)y]^2$, the point scheme of $T$ is either the union of this double line with $y=0$, or the triple line $y^3=0$. The next proposition simplifies the description of $T$ in the former case.
For $\gamma \in \k$ and $\epsilon \in \{0,1\}$, define $$W(\gamma,\epsilon)=
\dfrac{\k\langle x,y,z\rangle}{\left\langle xy-yx, zx-xz+\epsilon x^2+\gamma xy, zy-yz+\epsilon xy+(1+\gamma)y^2\right\rangle}.$$
\begin{prop}
\label{e=0 double lines}
An algebra $T$ is a twisted tensor product from case O(1)(i) with $A=0$ and $B-a\neq 0=(C-b)^2-4(a-B)c$ if and only if $T$ is isomorphic to an algebra from the family $W(\gamma, \epsilon)$.
\end{prop}
\begin{proof}
Suppose $T$ is an algebra as hypothesized in the statement. The defining relations of $T$ are
$$xy-yx, zx-ax^2-bxy-cy^2-xz, zy-Bxy-Cy^2-yz.$$
Let $\b$ be the unique solution to $(B-a)t^2+(C-b)t-c=0.$ It follows that $2(B-a)\b+(C-b)=0$.
The map sending $x\mapsto x+\b y$ and fixing $y$ and $z$ defines an isomorphism of $T$ to the algebra $T'$ with relations
$$xy-yx, zx-xz-ax^2-\l xy, zy-yz-Bxy-\l y^2,$$
where $\l=C+\b B$.
If $\l \neq 0$, the map $x\mapsto -\dfrac{y}{a-B}$, $y\mapsto -\dfrac{x}{\l}$, $z \mapsto z$ defines an isomorphism from $T'$ to the algebra $W(\gamma, 1)$, where $\gamma = B/(a-B)$.
If $\l =0$, then $x\mapsto -\dfrac{y}{a-B}$, $y\mapsto -x$, $z \mapsto z$ defines an isomorphism from $T'$ to the algebra $W(\gamma, 0)$, where $\gamma = B/(a-B)$.
Conversely, for any $\gamma \in \k$ and $\epsilon \in \{0,1\}$, $W(\gamma,\epsilon)$ satisfies the conditions of case O(1)(i) with $A=0$, $B-a=0\neq C-b$. The result follows from Lemma \ref{case (1)(i) reduction 2}.
\end{proof}
We use the following result to characterize isomorphism classes of Ore-type algebras in the cases where the point scheme is not reduced.
Recall that if $\l \in \k^*$ and $\varphi: B \to B'$ is an isomorphism of graded $\k$-algebras, then the map $\varphi_{\l}: B \to B'$, given by $\varphi_{\l}(b) = \l^i b$ for all $b \in B_i$, is also an isomorphism of graded $\k$-algebras. We refer to $\varphi_{\l}$ as a scaling of $\varphi$.
\begin{prop}
\label{Ore isomorphism}
Let $A$ be a graded $\k$-algebra. Let $A[z, \nu, \d]$, $A[w, \nu', \d']$ be graded Ore extensions with $\deg z = \deg w = 1$. Let $\varphi:A[z;\nu,\d]\to A[w;\nu',\d']$ be a graded $\k$-algebra isomorphism.
\begin{itemize}
\item[(1)] If $\varphi(A)=A$, then there exists a scaling of $\varphi$, $\varphi_{\l}$, such that $\varphi_{\l}\nu=\nu'\varphi_{\l}$ and $\varphi_{\l}\d=\d'\varphi_{\l}$.
\item[(2)] If $A=\k[x,y]$ and $Z(A[w;\nu',\d'])_1=0$ then $\varphi(A)=A$.
\end{itemize}
\end{prop}
\begin{proof}
Assume that $\varphi(A)=A$. Since $\varphi$ is surjective and degree-0, there exists $k\in \k^*$ such that $\varphi(z)=a' + kw$ for $a'\in A_1$. Scaling $\varphi$, if necessary, we may assume that $k=1$. Then for any homogeneous $a\in A_i$ we have
\begin{align*}
0 &=\varphi(za-\nu(a)z-\d(a))\\
&=(a'+w)\varphi(a)-\varphi(\nu(a))(w+a')-\varphi(\d(a))\\
&=[\nu'(\varphi(a))-\varphi(\nu(a))]w+a'\varphi(a)-\varphi(\nu(a))a'+\d'(\varphi(a))-\varphi(\d(a)).
\end{align*}
Since $A[w;\nu',\d']$ is a free left $A$-module on the basis $\{w^i\}$, $A$ is graded, $\deg \nu= 0$, and $\deg \d = \deg \d' = 1$, the first statement follows.
Now let $A=\k[x,y]$ and suppose that $Z(A[w;\nu',\d'])_1=0$.
Let $\nu'(x)=m_{11}x+m_{12}y$ and $\nu'(y)=m_{21}x+m_{22}y$.
Write $\varphi(x)=\a_1x+\b_1y+\gamma_1w$ and $\varphi(y)=\a_2x+\b_2y+\gamma_2w$.
Then
\begin{align*}
0=\varphi(xy-yx)&=[(\a_2\gamma_1-\a_1\gamma_2)(m_{11}-1)+(\b_2\gamma_1-\b_1\gamma_2)m_{21}] xw\\
&+[(\a_2\gamma_1-\a_1\gamma_2)(m_{12})+(\b_2\gamma_1-\b_1\gamma_2)(m_{22}-1)] yw\\
&+(\a_2\gamma_1-\a_1\gamma_2)\d'(x) + (\b_2\gamma_1-\b_1\gamma_2)\d'(y).
\end{align*}
Let $r = \a_2\gamma_1-\a_1\gamma_2$ and $s = \b_2\gamma_1-\b_1\gamma_2$. It follows from the calculation above and direct computation that $rx+sy$ is in $Z(A[w;\nu',\d'])_1$, hence $r = s = 0$.
Thus both $\{(\a_1,\a_2),(\gamma_1,\gamma_2)\}$ and $\{(\b_1,\b_2),(\gamma_1,\gamma_2)\}$ are linearly dependent. If $\varphi(A) \not\subset A$, then $(\gamma_1,\gamma_2)\neq (0,0)$ and $\{\varphi(x),\varphi(y)\}$ is linearly dependent, a contradiction.
\end{proof}
\begin{prop}
\label{double line algebras}
The algebras $W(\gamma,\epsilon)$ and $W(\gamma',\epsilon')$ are isomorphic if and only if $\epsilon'=\epsilon$ and $\gamma'=\gamma$.
\end{prop}
\begin{proof}
First, if $\epsilon=1$, or $\epsilon=0$ and $\gamma\notin\{0,-1\}$, then $\d(x) = -\epsilon x^2-\gamma xy$ and $\d(y) = -\epsilon xy-(1+\gamma)y^2$ are linearly independent, and so $Z(W(\gamma,\epsilon))_1=0$. These $W(\gamma, \epsilon)$ are not isomorphic to $W(0,0)$ or $W(-1,0)$ because $x$ or $y$ (respectively) is the unique central element in degree 1, up to scaling. Moreover, $W(0,0)$ and $W(-1,0)$ are not isomorphic since it is clear that $W(0,0)/\langle x \rangle$ is not isomorphic to $W(-1,0)/\langle y \rangle$. Henceforth we assume that $\epsilon=1$, or $\epsilon=0$ and $\gamma\notin\{0,-1\}$.
Suppose there is an isomorphism $\varphi:W(\gamma,\epsilon)\to W(\gamma',\epsilon')$. Then $\d(x)$ and $\d(y)$ are linearly independent elements of $W(\gamma,\epsilon)$ as are their counterparts $\d'(x)$ and $\d'(y)$ in $W(\gamma',\epsilon')$. By Proposition \ref{Ore isomorphism} we may write $\varphi(x)=\a_1x+\b_1y$ and $\varphi(y)=\a_2x+\b_2y$, and we may assume that $\varphi$ commutes with $\d$ and $\d'$. Equating coefficients of $x^2$, $xy$ and $y^2$ in $\varphi(\d(x))=\d'(\varphi(x))$ and $\varphi(\d(y))=\d'(\varphi(y))$ yields the following:
\begin{align*}
\a_1(\epsilon\a_1+\gamma\a_2) &= \a_1\epsilon' & \a_2(\epsilon\a_1+(1+\gamma)\a_2) &= \a_2\epsilon'\\
\b_1(\epsilon\b_1+\gamma\b_2) &= \b_1(1+\gamma') & \b_2(\epsilon\b_1+(1+\gamma)\b_2) &= \b_2(1+\gamma')
\end{align*}
$$2\epsilon\a_1\b_1+\gamma(\a_1\b_2+\a_2\b_1) =\a_1\gamma'+\b_1\epsilon' $$
$$2(1+\gamma)\a_2\b_2+\epsilon(\a_1\b_2+\a_2\b_1) =\a_2\gamma'+\b_2\epsilon'.$$
Suppose that $\epsilon=0$ and $\epsilon'=1$. Considering the first two equations, we see that $\a_1=0$. The fifth and second equations then imply that $\b_1=0$, so $\varphi(x)=0$, a contradiction. Thus we must have $\epsilon=\epsilon'$.
When $\epsilon=\epsilon'=0$, then $\a_2=0$ by the second equation, so $\a_1\neq 0\neq \b_2$, else $\varphi$ is not surjective. The fourth and fifth equations jointly imply that $\b_2=1$, so $\gamma=\gamma'$.
When $\epsilon=\epsilon'=1$, we also have $\a_2=0$. If $\a_1\neq 0$, this follows from the first pair of equations. If
$\a_1=0$, then $\b_1\neq 0$ and $(1+\gamma)\a_2=1$. The fifth equation then simplifies to $\gamma\a_2=1$, which implies that $\a_2 = 0$. A straightforward check shows that $\a_2=0$ implies $\gamma=\gamma'$.
\end{proof}
\begin{prop}
\label{double line point scheme}
The algebra $W(\gamma,\epsilon)$ is AS-regular. The point scheme of $W(\gamma,\epsilon)$ is the union of a line and a double line. The automorphism $\sigma$ stabilizes the components, and
\begin{itemize}
\item[(1)] if $\epsilon=0$, then $\sigma$ restricts to the identity on the double line (type $WL_2$);
\item[(2)] if $\epsilon=1$, then $\sigma$ has order ${\rm char}\ \k$ on the double line. (type $WL_3$)
\end{itemize}
\end{prop}
\begin{proof} The algebra $W(\gamma,\epsilon)$ is AS-regular by Proposition \ref{e=0 double lines} and Theorem \ref{Ore types are semistandard}. The matrix $M$ is
$$
\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0+\epsilon x_0 & \gamma x_0 & -x_0\\
0 & z_0+\epsilon x_0+(1+\gamma)y_0 &-y_0
\end{bmatrix}$$
so the point scheme is $E=\mathcal Z(xy^2)$ and the automorphism is
\begin{align*}
\sigma([0:y:z])&=[0:y:z+(1+\gamma)y]\\
\sigma([x:0:z])&=[x:0:z+\epsilon x].
\end{align*}
The result follows immediately.
\end{proof}
For $\epsilon_1, \epsilon_2\in \{0,1\}$ we define
$$L(\epsilon_1,\epsilon_2)=\dfrac{\k\langle x,y,z\rangle}{\langle xy-yx, zx-xz+\epsilon_1xy+\epsilon_2x^2, zy-yz+x^2+\epsilon_1y^2+\epsilon_2xy\rangle}.$$
\begin{prop}
\label{triple lines}
An algebra $T$ is a twisted tensor product from case O(1)(i) with $A=0$ and $B-a=C-b=0\neq c$ if and only if $T$ is isomorphic to one of $L(0,0), L(0,1),$ or $L(1,0)$, no two of which are isomorphic.
\end{prop}
\begin{proof}
Suppose $T$ is an algebra as hypothesized in the statement. If $a\neq 0$, then $x\mapsto y-(b/\sqrt{ac})x$, $y\mapsto \sqrt{a/c}x$, $z\mapsto -az$
determines an isomorphism from $T$ to $L(1,0)$.
If $a=b=0$, then $x\mapsto -cy$, $y\mapsto x$, $z\mapsto z$ determines an isomorphism from $T$ to $L(0,0)$.
If $a=0\neq b$, then $x\mapsto (c/b)y$, $y\mapsto x$, $z\mapsto -bz$ determines an isomorphism from $T$ to $L(0,1)$. Conversely, it is clear that $L(0,0)$, $L(0,1)$ and $L(1,0)$ are algebras from case O(1)(i) of the stated form.
To see that the three algebras are pairwise non-isomorphic, first note that the degree-1 generator $x\in L(0,0)$ is central, and $L(1,0)$ and $L(0,1)$ contain no central elements in degree 1. By Proposition \ref{Ore isomorphism}, any isomorphism $\varphi:L(1,0)\to L(0,1)$ must restrict to an automorphism of $\k[x,y]$ and commute with the respective derivations. An easy direct calculation in degree 1 shows that no such $\varphi$ exists.
\end{proof}
\begin{prop}
\label{triple line point scheme}
The algebras $L(0,0)$, $L(0,1)$, and $L(1,0)$ are AS-regular, and the point scheme of each is a triple line. The order of the automorphism $\sigma$ is the order of $\epsilon_1$ in the additive group $(\k, +)$.
\end{prop}
\begin{proof} The algebras $L(0,0)$, $L(0,1)$, and $L(1,0)$ are AS-regular by Proposition \ref{triple lines} and Theorem \ref{Ore types are semistandard}. The matrix $M$ is
$$
\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0+\epsilon_2x_0 & \epsilon_1x_0 & -x_0\\
x_0 & z_0+\epsilon_2x_0+\epsilon_1y_0 &-y_0
\end{bmatrix}$$
so the point scheme of $T$ is $E=\mathcal Z(x^3)$ and the automorphism $\sigma$ is given by
$\sigma([0:y:z])=[0:y:z+\epsilon_1y].$ The result follows.
\end{proof}
\begin{rmk}
\label{triple line types}
The presentations of $L(0,0)$, $L(1,0)$, and $L(0,1)$ align with those of Types $TL_1, TL_2,$ and $TL_4$ given in \cite[Theorem 3.1]{IM}., respectively. We remark that $\sigma$ is the identity on closed points for both $L(0,0)$ and $L(0,1)$.
\end{rmk}
For $\epsilon \in \{0, 1\}$ define $$P(\epsilon)=\k\langle x,y,z\rangle/\langle xy-yx, zx-\epsilon x^2-xz, zy-\epsilon xy-yz\rangle.$$
\begin{prop}
\label{full P^2 cases}
An algebra $T$ is a twisted tensor product from case O(1)(i) with $B-a=C-b=c=0$ if and only if $T$ is isomorphic to $P(\epsilon)$.
\end{prop}
\begin{proof}
Suppose $T$ is an algebra as hypothesized in the statement. The defining relations of $T$ are
$$xy-yx, zx-ax^2-bxy-xz, zy-axy-by^2-yz.$$
If $a=b=0$, then clearly $T=P(0)$.
If $a\neq 0$, then the change of variables $x\mapsto x-(b/a)y$, $y \mapsto y$, $z\mapsto az$ is an isomorphism from $T$ to the algebra $P(1)$.
If $a=0\neq b$, then interchanging $x$ and $y$ yields an algebra of the form just considered.
Conversely, the algebras $P(0)$ and $P(1)$ clearly satisfy the conditions specified in this subcase of case O(1)(i).
\end{proof}
\begin{prop}
\label{point scheme is P2}
The algebras $P(0)$ and $P(1)$ are AS-regular. The point scheme of each is $\P^2$. The automorphism $\sigma$ is the identity for $P(0)$, and for $P(1)$ the order of $\sigma$ is the characteristic of $\k$.
\end{prop}
\begin{proof} The algebras $P(0)$ and $P(1)$ are AS-regular by Proposition \ref{full P^2 cases} and Theorem \ref{Ore types are semistandard}. The matrix $M$ is
$$
\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0-\epsilon x_0 & 0 & -x_0\\
0 & z_0-\epsilon x_0 &-y_0
\end{bmatrix}$$
so the point scheme of $P(\epsilon)$ is $\mathcal Z(0)=\P^2$ and the automorphism $\sigma$ is given by
$\sigma([x:y:z])= [x:y:z-\epsilon x]$.
\end{proof}
\subsection{Twisted tensor products from cases O(2)(i), O(2)(ii)}
\label{case (2}
Now we turn our attention to algebras from case O(2). Recall that in this case $e=1$. Define
$$W=\k\langle x,y,z\rangle/\langle xy-yx, zx-xz+x^2+yz, zy-yz\rangle.$$
\begin{prop}
\label{case (2)(i)}
Any twisted tensor product from case O(2)(i) with $a=0$ is isomorphic to an algebra from case O(1)(i).
Any twisted tensor product from case O(2)(i) with $a\neq 0$ is isomorphic to $W$.
\end{prop}
\begin{proof}
Let $T$ be a twisted tensor product from case O(2)(i). The defining relations of $T$ are
$$xy-yx, zx-ax^2-bxy-cy^2-xz-yz, zy-yz.$$
If $a=0$, the map determined by $x\mapsto -z$, $y\mapsto y$, and $z\mapsto x-cy+bz$ is an isomorphism from $T$ to the algebra with relations
$$xy-yx, zx-xy-xz, zy-yz,$$
which belongs to case O(1)(i).
If $a\neq 0$, the isomorphism given by $x\mapsto -x$, $y\mapsto y$, $z\mapsto az-cy+bx$ identifies $T$ with the algebra $W$ defined above.
\end{proof}
\begin{prop}
\label{point scheme of W}
The algebra $W$ is AS-regular. The point scheme of $W$ is the union of a line and an irreducible conic. The components meet at a single point, and $\sigma$ stabilizes the components (type $T'$). The order of $\sigma$ is ${\rm char}\ \k$.
\end{prop}
\begin{proof} By Proposition \ref{case (2)(i)} and Theorem \ref{Ore types are semistandard}, $W$ is AS-regular.
The matrix $M$ is
$$
\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0+x_0 & 0 & -x_0+y_0\\
0 & z_0 &-y_0
\end{bmatrix}$$
so the point scheme of $W$ is $\mathcal Z(y(x^2+yz))$. The components intersect in the point $[0:0:1]$, and the automorphism is given by
$$\sigma([x:y:z])=\begin{cases} [x:y:z] & y\neq 0\\ [x:0:x+z] & y=0\\ \end{cases}.$$ The result follows.
\end{proof}
For $d\in \k$, $d\neq 1$,
define
$$W(d)=\k\langle x,y,z\rangle/\langle xy-yx, zx-dxz-yz, zy-dyz\rangle.$$
\begin{prop}
\label{case (2)(ii)}
A twisted tensor product $T$ belongs to case O(2)(ii) if and only if $T$ is isomorphic to $W(d)$ for some $d\neq 1$.
Moreover, the algebras $W(d)$ and $W(d')$ are isomorphic if and only if $d'=d$.
\end{prop}
\begin{proof}
If $T$ is a twisted tensor product from case O(2)(ii), then the map $x \mapsto x$, $y \mapsto y$, $z \mapsto z+\l x-cy$, where $\l=\dfrac{a}{1-d}$, is an isomorphism from $T$ to an algebra in the family $W(d)$. Conversely, it is clear that $W(d)$ is an algebra from case O(2)(ii).
For the last statement, since $d\neq 1$, one checks that $Z(W(d))_1=0$, so by Proposition \ref{Ore isomorphism}, an isomorphism $\varphi:W(d)\rightarrow W(d')$ would restrict to an automorphism of $\k[x,y]$ that commutes with $\nu$ and $\nu'$. As the Jordan forms of $\nu_1$ and $\nu'_1$ are indecomposable, the condition $\varphi\nu=\nu'\varphi$ implies that $d=d'$.
\end{proof}
\begin{prop}
\label{point scheme of W(d)}
The algebra $W(d)$ is AS-regular if and only if $d\neq 0.$ If $W(d)$ is AS-regular, then the point scheme is the union of a line and a double line. The automorphism $\sigma$ restricts to the identity on the reduced line. When restricted to the double line, the order of $\sigma$ is the additive order of $d\in\k$. (type $WL_1$)
\end{prop}
\begin{proof} By Proposition \ref{case (2)(ii)} and Theorem \ref{Ore types are semistandard}, $W(d)$ is AS-regular if and only if $d\neq 0$. The matrix $M$ is
$$
\begin{bmatrix}
-y_0 & x_0 & 0\\
z_0 & 0 & -dx_0-y_0\\
0 & z_0 &-dy_0
\end{bmatrix}$$
so the point scheme of $W(d)$ is $\mathcal Z(y^2z)$. The automorphism $\sigma$ is given by
\begin{align*}
\sigma([x:0:z]) &=[dx:0:z] \\
\sigma([x:y:0]) &=[x:y:0],
\end{align*}
and the result follows.
\end{proof}
We conclude this section with a proof of Theorem \ref{OreSummary}.
\begin{proof}[Proof of Theorem \ref{OreSummary}]
First we consider case O(1)(i). In this case, every algebra is AS-regular by Theorem \ref{Ore types are semistandard}. Lemma \ref{case (1)(i) reduction} shows there is no loss of generality in assuming $A=0$. We further divide case O(1)(i) into two subcases. Algebras from case O(1)(i) with $A=0\neq B-a$ are classified up to isomorphism as $T(\a,\b,\gamma)$ or $W(\gamma,\epsilon)$ in Propositions \ref{T_1 types} and \ref{e=0 double lines}. Proposition \ref{point scheme of T_1} shows that $T(\a,\b,\gamma)$ is of Type $T_1$, and Proposition \ref{double line point scheme} shows that $W(\gamma,\epsilon)$ is of Type $WL_2$ when $\epsilon=0$, and Type $WL_3$ when $\epsilon=1$.
Continuing with case O(1)(i), when $A=0=B-a$, Lemma \ref{case (1)(i) reduction 2} shows that no generality is lost in assuming $b=C$. Case O(1)(i) algebras with $A=B-a=C-b=0$ are classified up to isomorphism as $L(0,0), L(0,1), L(1,0)$, or $P(\epsilon)$ in Propositions \ref{triple lines} and \ref{full P^2 cases}. Proposition \ref{triple line point scheme} and Remark \ref{triple line types} show that $L(0,0), L(1,0),$ and $L(0,1)$ are AS-regular of Type $TL_1$, $TL_2$, and $TL_4$, respectively. Proposition \ref{point scheme is P2} proves that $P(\epsilon)$ is AS-regular of Type $P_1$ when $\epsilon=0$, and Type $P_2$ when $\epsilon=1$.
Algebras from case O(1)(ii) are isomorphic to algebras from the family $S'(d,\epsilon)$ by Proposition \ref{case (1)(ii)}. Proposition \ref{S_1 types} shows $S'(d,\epsilon)$ is AS-regular if and only if $d\neq 0$, and that the AS-regular algebras in this family are of Type $S_1$ when $\epsilon=0$, and Type $S'_1$ when $\epsilon=1$.
By Lemma \ref{Ore case (1)(iii)}(1), every algebra from case O(1)(iii) is isomorphic to an algebra from case O(1)(ii).
For case O(1)(iv), Lemma \ref{Ore case (1)(iii)}(2) shows that no generality is lost in assuming $C=0$. These algebras are isomorphic to algebras from the family $S(d,D)$ by Proposition \ref{case (1)(iv)}. Proposition \ref{S(d,D) point scheme} shows $S(d,D)$ is AS-regular if and only if $dD\neq 0$, and proves that the AS-regular algebras in this family are of Type $P_1$ when $d=D$, and of Type $S_1$ when $d\neq D$. Proposition \ref{point scheme is P2} shows that the Type $P_1$ algebras isomorphic to $S(d,D)$ are not isomorphic to the algebra $P(0)$. Proposition \ref{S_1 types} shows that the Type $S_1$ algebras isomorphic to $S(d,D)$ are not isomorphic to Type $S_1$ algebras from the family $S'(d,0)$.
In case O(2)(i), Proposition \ref{case (2)(i)} shows that no generality is lost in assuming that $a\neq 0$ and shows that all algebras in this family are isomorphic to the algebra $W$. Proposition \ref{point scheme of W} establishes that $W$ is AS-regular of Type $T'$.
Finally, algebras from case O(2)(ii) are isomorphic to algebras from the family $W(d)$ by Proposition \ref{case (2)(ii)}. Proposition \ref{point scheme of W(d)} shows that $W(d)$ is AS-regular if and only if $d\neq 0$, and that the regular algebras in this family are of Type $WL_1$.
\end{proof}
\begin{rmk}\
\label{complete Ore cases}
\cite[Theorem 3.2]{IM} characterizes quadratic AS-regular algebras of non-EC type up to Morita equivalence. Types $P, T, T', WL, TL$, each of which include algebras from Theorem \ref{OreSummary}, consist of a single Morita equivalence class. For Type $S$, \cite[Theorem 3.2]{IM} implies that every Morita equivalence class contains an algebra with $\b=\gamma=1$, $\a\neq 0,1$. Such an algebra is the twisted tensor product $S'(\a,0)$ (see Subsection \ref{case (1) (ii)}). Similarly for Type $S'$, every Morita class contains an algebra with $\b=1$ and $\a\neq 0,1$. After interchanging $x$ and $y$ and rescaling $y$, we obtain the twisted tensor product $S'(1/\a,1)$.
\end{rmk}
\section{Graded Twisted Tensor Products and Sklyanin Algebras}
\label{Sklyanins}
As the preceding sections show, the only graded twisted tensor products of $\k[x,y]$ and $\k[z]$ whose point schemes are elliptic curves are the algebras $T(g,h)$ ($h\neq 0$) of Section \ref{elliptic type ttps}. These algebras belong to subtype B in the classification schemes of \cite{ATVI} and \cite{Mat}. It is therefore natural to ask whether other subtypes of type-EC AS-regular algebras are graded twisted tensor products of the form $A\tensor \k[z]$, where $A$ is a two-dimensional quadratic AS-regular algebra. We answer this question for the well-known family of three-dimensional Sklyanin algebras.
By definition, a \emph{three-dimensional Sklyanin algebra} is any algebra of the form
$$S(a,b,c) = \dfrac{\k\langle x,y,z\rangle}{\langle ayz+bzy+cx^2, azx+bxz+cy^2, axy+byx+cz^2\rangle}$$
such that $[a:b:c]\in \P^2 - \mathcal{D}$, where $$\mathcal{D} = \{[1:0:0], [0:1:0], [0:0:1]\} \cup \{[a:b:c] : a^3 = b^3 = c^3\}.$$ This family is defined over a field $\k$ of any characteristic. It is well known that $S(a,b,c)$ is AS-regular if and only if $[a:b:c] \notin \mathcal{D}$. If $[a: b: c] \in \mathcal{D}$, the algebra $S(a,b,c)$ is referred to as a \emph{degenerate Sklyanin algebra}. Let $$S_1 = \dfrac{\k\langle u, v, w \rangle}{\langle u^2, v^2, w^2 \rangle}, \qquad S_2 = \frac{\k\langle u, v, w \rangle}{\langle uv, vw, wu \rangle}.$$ Smith \cite{Smith} proved that if $[a:b:c] \in \mathcal{D}$ and ${\rm char \ } \k \neq 3$, then $S(a, b, c) \cong S_1$ if $a = b$ and $S(a, b, c) \cong S_2$ if $a \ne b$.
The point scheme of the Sklyanin algebra $S(a,b,c)$ is
$$E= \mathcal Z((a^3+b^3+c^3)xyz-(abc)(x^3+y^3+z^3)),$$
which describes an elliptic curve if and only if $abc\neq 0$ and $(3abc)^3\neq (a^3+b^3+c^3)^3$. When $E$ is an elliptic curve, the automorphism of $E$ can be described as translation by $[a:b:c]$ in the group law, where the identity element is $O_E = [1:-1:0]$ (see \cite[p. 38]{ATVI}).
In this section we are concerned mainly with those $S(a,b,c)$ whose point scheme is an elliptic curve. We say that $S(a,b,c)$ is of type EC if this is the case.
If $S(a,b,c)\cong A\tensor \k[z]$, then $S(a,b,c)$ contains a subalgebra isomorphic to $A$, generated in degree 1. We begin by characterizing which $S(a,b,c)$ of type EC contain a one-generated subalgebra isomorphic to a skew polynomial ring $\k_q[r,s]$, $q \in \k^*$, or the Jordan plane $\k\langle r,s \rangle/\langle rs-sr+s^2\rangle$.
\subsection{Three-dimensional Sklyanin algebras containing a quantum $\P^1$}
If $A=T(V)/\langle R\rangle$ is a quadratic algebra, the \emph{quadratic dual} algebra is defined to be the algebra $A^!=T(V^*)/\langle R^{\perp}\rangle$ where $R^{\perp}\subset V^*\tensor V^*$ is the orthogonal complement to $R$ with respect to the natural pairing. Note that $(A^!)^!$ is canonically isomorphic to $A$. We establish a few facts about the schemes $\Gamma(S(a,b,c)^!)$. Let $e_1 = [1:0:0]$, $e_2 = [0:1:0]$, $e_3 = [0:0:1]$.
\begin{prop}
\label{dualPointScheme}
Let $A = S(a,b,c)$ be a three-dimensional Sklyanin algebra.
\begin{itemize}
\item[(1)] If $c \neq 0$, then $\Gamma(A^!)$ is the empty scheme.
\item[(2)] $\Gamma(S(a, -a, 0)^!)$ is the empty scheme.
\item[(3)] $\Gamma(S_1^!) = \{e_1 \times e_1, e_2 \times e_2, e_3 \times e_3\}.$
\end{itemize}
\end{prop}
\begin{proof} (1) Assume that $c \neq 0$. Since $\Gamma(A^!)$ is a projective scheme it is quasi-compact; as such, to prove the result, it suffices to show that $\Gamma(A^!)$ has no closed points. Since $c \ne 0$, we can write the defining relations of $A^!$ as
$$ax^2-cyz\qquad ay^2-czx\qquad az^2-cxy\qquad
bx^2-czy\qquad by^2-cxz\qquad bz^2-cyx.$$
Multilinearizing these relations, we see that a closed point
$$[x_0:y_0:z_0]\times [x_1:y_1:z_1]\in \Gamma(A^!)$$ satisfies
\begin{align*}
ax_0x_1-cy_0z_1 &= 0 \quad (E_1) & bx_0x_1-cz_0y_1 &= 0 \quad (E_2)\\
ay_0y_1-cz_0x_1 &= 0 \quad (E_3) & by_0y_1-cx_0z_1 &= 0 \quad (E_4)\\
az_0z_1-cx_0y_1 &= 0 \quad (E_5)& bz_0z_1-cy_0x_1 &= 0 \quad (E_6).
\end{align*}
First assume $a = 0$. Since $[a:b:c] \notin \mathcal{D}$, we have $bc \ne 0$. It is easy to check that no point in $\P^2\times \P^2$ satisfies all of the equations $(E_i)$. The case $b=0$ is analogous.
Now assume that $ab \neq 0$. Let $s: \P^2 \times \P^2 \to \P^8$, $$s([x_0: y_0: z_0],[x_1: y_1: z_1]) = \begin{bmatrix} x_0x_1 & x_0y_1 & x_0z_1 \\ y_0x_1 &y_0y_1 & y_0z_1 \\ z_0x_1 & z_0y_1 & z_0z_1 \end{bmatrix}$$ be the Segre embedding. Let $w_{ij}$, $1 \leq i, j \leq 3$ be coordinates on $\P^8$. Recall that the image $s(\P^2 \times \P^2)$ is the subscheme of $\P^8$ cut out by the $2 \times 2$ minors of the matrix $[w_{ij}]$. Equations $(E_i)$, $1 \leq i \leq 6$ show that the closed points of $s(\Gamma(A^!))$ are the rank-1 matrices of the form $$M = \begin{bmatrix} c w_{11} & aw_{33} & bw_{22} \\ b w_{33} & cw_{22} & aw_{11} \\ a w_{22} & bw_{11} & cw_{33} \end{bmatrix}.$$ Let $M_{ij}$, $1 \leq i, j \leq 3$, denote the minors of $M$. If $M \in s(\Gamma(A^!))$, then
consideration of the equations $w_{ii}M_{ii}=0$, for $i=1,2,3$
shows that $w_{11}^3 = w_{22}^3 = w_{33}^3$. Note that since ${\rm rank}(M) = 1$, $w_{11}w_{22}w_{33} \neq 0$. Furthermore, consideration of $cw_{33}M_{33}=0$, $bw_{11}M_{32}=0$, and $aw_{22}M_{31}=0$
shows that $$a^3 w_{11}w_{22}w_{33} = b^3 w_{11}w_{22}w_{33} = c^3 w_{11}w_{22}w_{33}.$$ Since $w_{11}w_{22}w_{33} \neq 0$ we conclude that $a^3 = b^3 = c^3$. This contradicts the assumption that $S(a,b,c)$ is a three-dimensional Sklyanin algebra.
For (2), the algebra $S(a, -a, 0)$ is the polynomial algebra on three variables. Its quadratic dual is an exterior algebra, and it is straightforward to check that there are no closed points in $\Gamma(S(a, -a, 0)^!)$.
For (3), a closed point $[x_0: y_0: z_0] \times [x_1:y_1:z_1] \in \Gamma(S_1^!)$ satisfies $$x_0y_1 = y_0x_1 = z_0x_1 = x_0z_1 = z_0y_1 = y_0z_1 =0.$$ It is then straightforward to verify that $\Gamma(S_1^!) = \{e_1 \times e_1, e_2 \times e_2, e_3 \times e_3\}.$
\end{proof}
The following theorem characterizes the $S(a,b,c)$ of type EC that contain a one-generated skew polynomial ring.
\begin{thm}
\label{not a skew polynomial ring}
Let $S(a,b,c)$ be a three-dimensional Sklyanin algebra of type EC. Assume that ${\rm char}\ \k\neq 2,3$.
\begin{itemize}
\item[(1)] If $r, s\in S(a,b,c)_1$ are linearly independent and $rs=qsr$ for $q\in \k^*$, then $q=-1$ and $a=b$.
\item[(2)] If the algebra $S(1,1,c)$ is of type EC, then there exist $r, s \in S(1,1,c)_1$ that are linearly independent and $rs = -sr$. More precisely, up to scaling in each component independently, the set of such pairs $(r, s)$ is in one-to-one correspondence with the closed points of the scheme $\Gamma(S(-c,-c,2))$.
\end{itemize}
\end{thm}
\begin{proof}
(1) Suppose that $r, s\in S(a,b,c)_1$ are linearly independent and $rs=qsr$ for some $q\in \k^*$. Since $abc\neq 0$, there is no loss of generality in assuming $a=1$. We write $r=\a_1x+\b_1y+\gamma_1z$ and $s=\a_2x+\b_2y+\gamma_2z$ for $\a_i, \b_i, \gamma_i\in \k$. The equation $rs=qsr$ implies the following identities hold in $\k$:
\begin{align*}
& (1-q)\a_1\a_2-c\b_1\gamma_2+qc\gamma_1\b_2=0 \quad (E_1) \\
& (1-q)\b_1\b_2-c\gamma_1\a_2+qc\a_1\gamma_2=0 \quad (E_2)\\
& (1-q)\gamma_1\gamma_2-c\a_1\b_2+qc\b_1\a_2=0 \quad (E_3)\\
& (1+bq)\b_1\a_2-(q+b)\a_1\b_2=0 \quad (E_4)\\
& (1+bq)\a_1\gamma_2-(q+b)\gamma_1\a_2=0\quad (E_5)\\
& (1+bq)\gamma_1\b_2-(q+b)\b_1\gamma_2=0 \quad (E_6).
\end{align*}
We refer to this set of equations as \emph{system $(E)$}. We view system $(E)$ as the defining equations of $\Gamma(A)$, where $A$ is the quotient of $\k\langle x, y, z \rangle$ by the relations:
\begin{align*}
&(1-q)x^2 - cyz+qczy, \qquad (1-q)y^2 - czx+qcxz, \qquad (1-q)z^2 - cxy+qcyx, \\
&(1+bq)yx-(q+b)xy, \qquad (1+bq)xz-(q+b)zx, \qquad (1+bq)zy-(q+b)yz.
\end{align*} Then we identify $r$ and $s$ with components of a closed point $p\in\Gamma(A)$. Observe that under this identification, if $p\in \Delta(\P^2)$, where $\Delta : \P^2 \to \P^2 \times \P^2$ is the diagonal embedding, then $r$ and $s$ are linearly dependent. We consider several cases.
First, if $q=1$, then $A = \k[x,y,z]$ is the polynomial ring on three variables. Since $\Gamma(\k[x,y,z])=\Delta(\P^2)$, any $r$ and $s$ whose coefficients satisfy system $(E)$ must be linearly dependent, a contradiction.
We assume henceforth that $q\neq 1$.
If $1+bq = q+b = 0$, then $q = -1$ and $b = 1$, and we have the conclusion of (1). So we assume, henceforth, that $1+bq \neq 0$, or $b+q \neq 0$. Under this assumption it is clear that the six defining relations of $A$ are linearly independent. Consider the quadratic dual $A^!$; one checks that $A^! = S(1+bq, q+b, c(1+q)).$
It is possible that this algebra is a degenerate Sklyanin algebra.
If $q = -1$ and $b \neq 1$, then Proposition \ref{dualPointScheme}(2) shows that system $(E)$ has no solutions, a contradiction. Hence, for the remainder of the proof, we assume that $q \neq -1$. If we suppose that $A^!$ is not a degenerate Sklyanin algebra, then Proposition \ref{dualPointScheme}(1) shows that system $(E)$ has no solutions, a contradiction.
Finally, we rule out the possibility that $A^!$ is a degenerate Sklyanin algebra. Suppose that this is the case. Note that $c(1+q) \neq 0$, and recall that $1+bq \neq 0$, or $b+q \neq 0$, so $[1+bq: b+q: c(1+q)] \notin \{e_1, e_2, e_3\}$. Hence, without loss of generality, $$(1+bq)^3 = (b+q)^3 = (c(1+q))^3 = 1.$$ If $1+bq = b+q$, then $A^! \cong S_1$, and Proposition \ref{dualPointScheme}(3) implies that $\Gamma(A)$ is contained in $\Delta(\P^2)$, so $r$ and $s$ are linearly dependent, a contradiction. If $1+bq \ne b+q$, then $A^! \cong S_2$. Let $\a = 1+bq$, $\b = b+q$, $\gamma = c(1+q)$. Define elements of $S(1, b,c)$ by $$r = \a^{-1}x+\b^{-1}y+\gamma^{-1}z, \qquad s = \b^{-1}x+\a^{-1}y+\gamma^{-1}z, \qquad t = \a\b\gamma x+ \a\b\gamma y+ z.$$ It is easy to check that $\{r, s, t\}$ is linearly independent and, using system $(E)$, $$rs - qsr = rt-qrt = st - qts = 0.$$ Hence $S(1,b,c) \cong S(1, -q, 0)$. However, the point scheme of the algebra $S(1, -q, 0)$ is not an elliptic curve, a contradiction.
For (2), we assume $S(1,1,c)$ is a Sklyanin algebra of type EC. Therefore $c\neq 0$ and $(3c)^3\neq (2+c^3)^3$, so $$(2+c^3)^3-(3c)^3 = (c^3-1)^2(c^3+8) \neq 0.$$ Setting $a=b=1=-q$, we see that the algebra $A$ defined above is $S(-c,-c,2)$. This algebra is a degenerate Sklyanin if and only if $c^3 = -8$, so $S(-c,-c,2)$ is a three-dimensional Sklyanin algebra. Moreover, $S(-c,-c,2)$ is also of type EC; for if $(6c^2)^3=(8-2c^3)^3$, then $$(6c^2)^3-(8-2c^3)^3 = 8(c^3-1)(c^3+8)^2 = 0,$$ which contradicts the assumption that $S(1,1,c)$ is of type EC. The automorphism of the point scheme of $S(-c,-c,2)$ is translation by $[-c:-c:2]$ in the group law with identity element $[1:-1:0]$, hence, no closed points of $\Gamma(S(-c,-c,2))$ lie on $\Delta(\P^2)$. We conclude that for every point $$[\a_1:\b_1,\gamma_1] \times [\a_2: \b_2: \gamma_2] \in \Gamma(S(-c,-c,2)),$$ if $r = \a_1 x+\b_1y+\gamma_1z$ and $s = \a_2 x+\b_2y+\gamma_2z$ are elements in $S(1,1,c)_1$, then $r$ and $s$ are linearly independent and $rs = -sr$. Conversely, a pair $(r,s)$ of such $r$ and $s$, up to scaling in each component independently, determines a unique closed point in $\Gamma(S(-c,-c,2))$.
\end{proof}
\begin{rmk}
The condition in Theorem \ref{not a skew polynomial ring} (2): $S(1,1,c)$ is of type EC is not necessary for the existence of stated $r$ and $s$. For example, if $c^3=-8$, then $S(1,1,c)$ is not of type EC, and $A = S(-c,-c,2)$ is a degenerate Sklyanin algebra. By \cite{Smith}, provided ${\rm char}\ \k\neq 3$, $A\cong \k\langle u, v, w\rangle/\langle u^2, v^2, w^2\rangle$. One checks that $A$ is semi-standard, and $\Gamma(A)$ is a nonempty, non-identity relation on $E=\mathcal Z(uvw)$. Thus $\Gamma(A)$ is not contained in $\Delta(\P^2)$, and one can use the isomorphism in \cite{Smith} to find linearly independent $r, s \in S(1,1,c)_1$ such that $rs=-sr$.
\end{rmk}
\begin{prop}
\label{counting S(1,1,c)}
Assume ${\rm char}\ \k\neq 2,3$ and let $j\in \k$. The number of distinct isomorphism classes of algebras $S(1,1,c)$ of type EC whose point scheme $E$ has j-invariant $j(E)=j$ is:
\begin{itemize}
\item three, if $j\neq 0, 12^3$,
\item one, if $j=0$,
\item two, if $j=12^3$.
\end{itemize}
\end{prop}
\begin{proof}
Observing that the automorphism $\sigma$ of the point scheme of $S(1,1,c)$ is translation by $[1:1:c]$, a point of order 2, the proof is identical to that of \cite[Proposition 3.10]{Mat}, with the obvious necessary change from type B to type A.
\end{proof}
We complete our characterization of when an algebra $S(a,b,c)$ of type EC contains a two-dimensional AS-regular subalgebra by showing that no three-dimensional Sklyanin algebras contain a Jordan plane generated in degree 1.
\begin{prop}
\label{not a Jordan plane}
Let $S(a,b,c)$ be a three-dimensional Sklyanin algebra such that $abc\neq 0$. Assume ${\rm char}\ \k\neq 2, 3$. If $r, s\in S(a,b,c)_1$ satisfy $rs=sr-s^2$, then $r$ and $s$ are linearly dependent.
\end{prop}
\begin{proof}
Suppose $r, s\in S(a,b,c)_1$ satisfy $rs=sr-s^2$, and $abc\neq 0$. Without loss of generality, we assume $a=1$ and write $r=\a_1x+\b_1y+\gamma_1z$ and $s=\a_2x+\b_2y+\gamma_2z$ for $\a_i, \b_i, \gamma_i\in \k$.
Examining the coefficients of $x^2$, $y^2$, $z^2$ in the equation $rs=sr-s^2$ implies the following identities hold in $\k$:
\begin{align*}
\a_2^2-c\b_1\gamma_2+c\gamma_1\b_2-c\b_2\gamma_2&=0\qquad (E_1)\\
\b_2^2-c\gamma_1\a_2+c\a_1\gamma_2-c\a_2\gamma_2&=0\qquad (E_2)\\
\gamma_2^2-c\a_1\b_2+c\b_1\a_2-c\a_2\b_2&=0\qquad (E_3).
\end{align*}
The linear combination $\a_2(E_1)+\b_2(E_2)+\gamma_2(E_3)$ yields
\begin{equation}
\label{eqn3}
\a_2^3+\b_2^3+\gamma_2^3-3c\a_2\b_2\gamma_2=0.
\end{equation}
Examining the coefficients of $zy$, $xz$, $yx$ in the equation $rs=sr-s^2$ implies:
\begin{align*}
(1+b)\gamma_1\b_2-(1+b)\b_1\gamma_2+(1-b)\b_2\gamma_2&=0\qquad (E'_1)\\
(1+b)\a_1\gamma_2-(1+b)\gamma_1\a_2+(1-b)\a_2\gamma_2&=0\qquad (E'_2)\\
(1+b)\b_1\a_2-(1+b)\a_1\b_2+(1-b)\a_2\b_2&=0\qquad (E'_3).
\end{align*}
The linear combinations $c(E'_i)-(1+b)(E_i)$ for $i=1,2,3$ show:
$$(1+b)\a_2^2=2c\b_2\gamma_2,\qquad
(1+b)\b_2^2=2c\a_2\gamma_2,\qquad
(1+b)\gamma_2^2=2c\a_2\b_2.$$
If $b=-1$, then since $c\neq 0$, these equations imply that at least two of $\a_2, \b_2, \gamma_2$ are zero. It then follows from $(E_1)$, $(E_2)$, $(E_3)$ that all of $\a_2, \b_2, \gamma_2$ are zero, so $s=0$. Suppose that $b+1\neq 0$. Note that the last three displayed equations show that $$(1+b)\a_2^3=2c\a_2\b_2\gamma_2 = (1+b)\b_2^3 = (1+b)\gamma_2^3.$$ Thus $\a_2^3=\b_2^3=\gamma_2^3$ and equation (\ref{eqn3}) implies
$3(1-b)\a_2^3=0.$ If $\a_2=0$, then $s=0$. If $b=1$, equations $(E'_1)$, $(E'_2)$, $(E'_3)$ simplify and show that all minors of
$$\begin{bmatrix} \a_1 & \b_1 & \gamma_1\\ \a_2 & \b_2 & \gamma_2\\ \end{bmatrix}$$
vanish, whence $r$ and $s$ are linearly dependent.
\end{proof}
\subsection{Certain twisted tensor products as AS-regular algebras of type A}
We introduce a one-parameter family of algebras, $P(a)$, $a\in \k$. When $a\neq 1$, a member of this family is both a graded twisted tensor product of $\k_{-1}[r,s]$ and $\k[t]$, and an AS-regular algebra. When $a\neq 0,1$, $P(a)$ is of type EC, subtype A. We show that every algebra in the family $S(1,1,c)$ of Sklyanin algebras is isomorphic to some $P(a)$, and hence is a graded twisted tensor product of $\k_{-1}[r,s]$ and $\k[t]$.
Assuming that ${\rm char}\ \k\neq 2$, for any $a \in \k$, we define
$$P(a)=\dfrac{\k\langle r,s,t\rangle}{\langle rs+sr, tr+rt-t^2-ar^2, t(r-s)+(r-s)t+2s^2\rangle}.$$
\begin{prop}
\label{TTP conditions for P(a,b)}
The algebra $P(a)$ is a graded twisted tensor product of $\k_{-1}[r,s]$ and $\k[t]$ if and only if $a\neq 1$. Moreover, when $a\neq 1$, $r^2, s^2,$ and $t^2$ are central.
\end{prop}
\begin{proof}
Order monomials in the free algebra by left-lexicographic order via $r<s<t$. Then in degree 2, the Gr\"obner basis for the defining ideal of $P(a)$ is $\{sr+rs, ts-tr+st-rt-2s^2, t^2-tr-rt+ar^2\}.$
Resolving the overlaps $tsr$, $t^3$, and $t^2s$ via the Diamond Lemma yields two additional cubic Gr\"obner basis elements:
$$trs+tr^2-str+rtr+2rs^2 \qquad (1-a)tr^2-(1-a)r^2t.$$
If $a=1$, we have $\dim_{\k} P(a)_3=11$. However, any graded twisted tensor product of $\k_{-1}[r,s]$ and $\k[t]$ has the same Hilbert series as $\k_{-1}[r,s]\tensor_{\k} \k[t]$, namely $(1-z)^{-3}$. Thus $a\neq 1$ is necessary for $P(a)$ to be a graded twisted tensor product, and we assume this condition holds for the remainder of the proof. It is now straightforward to check that the newly-introduced overlaps $t^2rs$, $t^2r^2$, and $trsr$ resolve, hence
$$sr+rs, \qquad ts-tr+st-rt-2s^2, \qquad t^2-tr-rt+ar^2, $$
$$trs+r^2t-str+rtr+2rs^2, \qquad tr^2-r^2t $$
constitutes a Gr\"obner basis for the defining ideal of $P(a)$, and
$$\{r^is^j(tr)^kt^{\epsilon}\ |\ i,j,k\ge 0, \epsilon\in\{0,1\} \}$$
is a $\k$-basis for $P(a)$. An easy counting argument shows the Hilbert series of $P(a)$ is $(1-z)^{-3}$. It is also easy to check that $r^2, s^2,$ and $t^2$ are central.
To complete the proof, we show that $\{ r^is^jt^k\ |\ i,j,k\ge 0\}$ is a spanning set for $P(a)$. Let $U$ be the $\k$-linear subspace of $P(a)$ spanned by $\{ r^is^jt^k\ |\ i,j,k\ge 0\}$. Given an arbitrary monomial $m \in P(a)$ in the generators $r, s, t$, we need to show that $m \in U$. Since $r$ and $s$ skew commute and $t^2$ is central, it suffices to show that $tr^is^j \in U$ for all $i, j \geq 0$. Observe that the defining relations show that $tr$ and $ts$ are both in $U$. Write $i = 2q+p$, $j = 2q'+p'$ for some integers $p, p', q, q'$ with $p, p' \in \{0,1\}$. Using the fact that $r^2$ and $s^2$ are central, we have $$tr^is^j = tr^{2q}r^p s^{2q'} s^{p'} = r^{2q} s^{2q'} tr^ps^{p'}.$$ If $p = 0$, it is clear that the last expression is in $U$. If $p = 1$, then note that
$ trs^{p'} = (ar^2-rt+t^2)s^{p'} \equiv rts^{p'} \equiv 0 \pmod{U}.$
\end{proof}
\begin{prop}
\label{AS- regular for P(a,b)}
The algebra $P(a)$ is AS-regular if and only if $a\neq 1$.
\end{prop}
\begin{proof}
Let $S = P(a)$ and let $F=\k\langle r, s, t\rangle$ be the free algebra. The defining quadratic relations of $P(a)$ are: $$f_1 = rs+sr, \quad f_2 = tr+rt-t^2-ar^2, \quad f_3 = t(r-s)+(r-s)t+2s^2.$$
We have $M [r \ s \ t]^T = [f_1 \ f_2 \ f_3]^T$, where $$M = \begin{bmatrix} s & r & 0 \\ t-ar & 0 & r-t \\ t & 2s-t & r-s\end{bmatrix}.$$
Let $E$ be the closed subscheme of $\P^2$ determined by $\det M$. Recall that $S$ is nondegenerate provided that the rank of $M$ is equal to $2$ at every closed point of $E$. Let us write $M(p)$ for the matrix $M$ evaluated at a closed point $p \in E$. If $[r:s:t] \in E$, $r \ne 0$ or $s \ne 0$, and $r\ne s$ or $r\ne t$, then it is clear that ${\rm rank \ } M(r:s:t) = 2$. If $r = s = 0$, the second and third rows of $M(0:0:1)$ show that ${\rm rank \ } M(0:0:1) = 2$. At the point $[1:1:1] \in E$, $$M (1:1:1)= \begin{bmatrix} 1 & 1 & 0 \\ 1-a & 0 & 0 \\ 1 & 1 & 0\end{bmatrix},$$ so the condition $a\neq 1$ is equivalent to ${\rm rank \ } M(1:1:1) = 2$. We conclude that $S$ is nondegenerate if and only if $a\neq 1$.
Assume that $a\neq 1$. We now show that $S$ is a standard algebra. Let
$$
P=\begin{bmatrix}
a(s-r) & t-2s+ar & s-t\\
t-2s+ar & -2t+4s-2r & t-2s+ r\\
s-t & t-2s+ r & s-r\\
\end{bmatrix}
$$
and define $r_1, r_2, r_3\in F$ via $P[r\ s\ t]^T=[r_1\ r_2\ r_3]^T$. Note that $P=P^T$ so the algebra $F'=F/\langle r_1, r_2, r_3\rangle$ is standard. We shall prove that $F'=P(a)$. Since $P$ is symmetric, it suffices to show that the entries of $[r\ s\ t]P$ span the defining quadratic relations of $P(a)$.
One checks that
$$[r\ s\ t]P=\begin{bmatrix}f_1 & f_2 & f_3\end{bmatrix}\begin{bmatrix} a & -2 & 1\\
1 & -1 & 0\\
-1 & 2 & -1
\end{bmatrix}.$$
Moreover, the determinant of the last matrix is equal to $a-1$. Hence $[r\ s\ t]P$ spans the quadratic relations of $P(a)$. Therefore $S$ is standard. We conclude by \cite[Theorem 1]{ATVI} that $S$ is AS-regular of dimension 3.
\end{proof}
\begin{prop}
\label{point scheme of P(a,b)}
Assume ${\rm char}\ \k\neq 2, 3$. Let $a\in \k$ such that $a\neq 1$.
\begin{itemize}
\item[(1)] The point scheme of $P(a)$ is an elliptic curve if and only if $a \neq 0$.
\item[(2)] The automorphism of the point scheme of $P(a)$ has order 2.
\item[(3)] Every elliptic curve, up to isomorphism, is the point scheme of some $P(a)$.
\end{itemize}
\end{prop}
\begin{proof}
The condition $a \neq 1$, by Proposition \ref{AS- regular for P(a,b)}, guarantees that $P(a)$ is AS-regular, and so the point scheme of $P(a)$ and its associated automorphism are defined.
The matrix $M$ for $P(a)$ is given in the proof of Proposition \ref{AS- regular for P(a,b)}. One then checks that the point scheme of $P(a)$ is given by $E_{a}= \mathcal Z(F)$, where
$$F = \det M = ar^3-ar^2s-2rs^2+2rst+2s^2t-rt^2-st^2.$$
We note that $\frac{\partial F}{\partial t}=2(r+s)(s-t)$, and it follows that the only points satisfying $F=\frac{\partial F}{\partial t}=0$ are $[0:0:1]$, $[1:1:1]$ and $[x:y:y]$ where $ax^2=y^2$. One readily checks that none of these points are singular when $a(a-1)\neq 0$. Conversely, if $a = 0$, then $[1:0:0]\in E_a$ is singular. Therefore (1) holds.
The associated automorphism $\sigma_{a}$ of $E_{a}$ interchanges $[0:0:1]$ and $[1:1:1]$, and for $r\neq s$, computing the cross product of the first and third rows of $M$ shows
$$\sigma_{a}([r:s:t])=[r:-s:(2s^2-rt-st)/(r-s)].$$
It follows from an easy computation that $\sigma_{a}$ has order 2.
For (3), suppose that $a(a-1) \neq 0$ so that the point scheme of $P(a)$ is the elliptic curve given by $F = 0$. A Weierstrass equation of this curve is
$$Y^2Z+2XYZ-4(a-1)YZ^2=X^3+(4-a)X^2Z-4(a-1)XZ^2.$$
Using the formulae in \cite[III.1]{Sil} one checks that the $j$-invariant is given by
$$j_{a}=\frac{16(a^2+14a+1)^3}{a(a-1)^4}.$$
Since $\k$ is algebraically closed, this expression realizes every value in $\k$. It is well known that the $j$-invariant parametrizes elliptic curves up to isomorphism, see \cite[Proposition III.1.4(b)]{Sil} for example, hence (3) follows.
\end{proof}
\begin{rmk}
\label{sigma_a is translation}
Suppose that $a\in \k$ satisfies $a(a-1) \neq 0$. Let $E_a$ denote the point scheme of the algebra $P(a)$. Then $E_a$ is an elliptic curve by Proposition \ref{point scheme of P(a,b)} (1). Let us define, for use below, points $O = [0:0:1]$, $P = [1:1:1]$ of $E_a$, and take $O$ as the identity element for the group law on $E_a$, for all $a$. It is then straightforward, albeit tedious, to check that the automorphism $\sigma_a$ is translation by the point $P$.
\end{rmk}
\begin{thm}
\label{classifying P(a)}
If $a(a-1)\neq 0$, then $P(a)\cong P(a')$ if and only if $a' \in \{a, 1/a\}$.
\end{thm}
\begin{proof}
Assume that $a \in \k$ and $a(a-1)\neq 0$. Then $P(a)$ is AS-regular of type EC, and $P(a)$ is a geometric algebra. Clearly $P(a)\ncong P(a')$ if $a'\in\{0,1\}$, so suppose $P(a)\cong P(a')$ for $a'(a'-1)\neq 0.$
By Theorem \ref{geometric algebra isomorphism}, it suffices to characterize projective equivalences $\psi:E_a\to E_{a'}$ such that $\psi\sigma_a = \sigma_{a'}\psi$. Let $\psi$ be such an equivalence.
The point $O = [0:0:1]$ is a flex point for both $E_a$ and $E_{a'}$. It is well known that a projective equivalence preserves the set of flex points and that the set of flex points is equal to the set of $3$-torsion points. Hence $\psi(O)$ is a 3-torsion point for $E_{a'}$. Since translation by any 3-torsion point extends to an automorphism of $\P^2$, see \cite[Lemma 5.3]{Mori} for example, the map $\psi' = \t_{-\psi(O)} \psi: E_a \to E_{a'}$, where $\t_{-\psi(O)}$ is translation on $E_{a'}$ by the point $-\psi(O)$, is a projective equivalence. Moreover, by Remark \ref{sigma_a is translation}, $\sigma_{a'}$ is a translation and one checks that $\psi'\sigma_a = \sigma_{a'} \psi'$. Therefore there is no loss of generality in assuming $\psi(O)=O$, and that $\psi$ is represented (up to scale) by an invertible matrix of the form
$$\begin{bmatrix}
a_{11} & a_{12} & 0\\
a_{21} & a_{22} & 0\\
a_{31} & a_{32} & 1
\end{bmatrix}.$$
Since $\sigma_a([0:0:1])=[1:1:1]$, we see $\psi([1:1:1]) = [1:1:1]$ and it follows that $$a_{11}+a_{12}=a_{21}+a_{22}=a_{31}+a_{32}+1.$$
For the remainder of the proof we consider the action of $\psi$ on $p\in E_a-\{O,P\}.$
It is easy to check that $[0:0:1]$ and $[1:1:1]$ are the only points on $E_a$ with $r=s$, and $[0:0:1]$ is the only point where $r+s=0$. Thus $p=[r:s:t]$ with $(r-s)(r+s)\neq 0$. The equation $\psi\sigma_a = \sigma_{a'}\psi$ implies that there exists a scalar $K_{p} \neq 0$ such that
\begin{align*}
& a_{11}r-a_{12}s=K_{p}(a_{11}r+a_{12}s) &\qquad &(E_1) \\
& a_{21}r-a_{22}s = -K_{p}(a_{21}r+a_{22}s) &\qquad &(E_2) \\
& a_{31}r-a_{32}s+(2s^2-rt-st)/(r-s)=K_{p}(2S^2-RT-ST)/(R-S) &\qquad &(E_3),
\end{align*}
where $R=a_{11}r+a_{12}s,$ $S=a_{21}r+a_{22}s$, and $T=a_{31}r+a_{32}s+t$. (The conditions $a_{11}+a_{12} = a_{21}+a_{22}$ and $\psi$ is invertible ensure that $R-S \neq 0$.) Since $a_{11}+a_{12}=a_{21}+a_{22}$, subtracting $(E_2)$ from $(E_1)$ yields
$$(a_{11}-a_{21})(r+s)=K_{p}[(a_{11}+a_{21})r+(a_{12}+a_{22})s].$$
Since $\psi$ is invertible and $r+s\neq 0$, the left side is nonzero, hence
$$K_{p}=\dfrac{(a_{11}-a_{21})(r+s)}{(a_{11}+a_{21})r+(a_{12}+a_{22})s}.$$
Now equation $(E_1)$ can be rewritten as $a_{11}a_{21}r^2-a_{12}a_{22}s^2 =0$. Since this homogeneous equation holds for all $p\in E_a-\{O,P\}$, we have $a_{11}a_{21}=a_{12}a_{22}=0$. Thus either (i) $a_{12}=a_{21}=0$, $a_{11}=a_{22}\neq 0$, and $K_{p}=1$, or (ii) $a_{11}=a_{22}=0$, $a_{12}=a_{21}\neq 0$, and $K_{p}=-1$.
In case (i), since equation $(E_3)$ holds for all $p\in E_a-\{O,P\}$, we see that $a_{31}=0$ and $a_{32} = a_{11}-1$. Then $\psi([r:s:t]) = [a_{11}r: a_{11}s: (a_{11}-1)s+t]$. Using the assumption that $[r:s:t] \in E_a$, the condition $\psi([r:s:t])\in E_{a'}$ is equivalent to $$(a'a_{11}^2-a)r^3-(a'a_{11}^2-a)r^2s-(a_{11}^2-1)rs^2+(a_{11}^2-1)s^3 = 0.$$
This equation holds for all $p\in E_a-\{O,P\}$ if and only if $a = a'$ and $a_{11}^2 = 1$.
Similarly, in case (ii), considering $(E_3)$ yields $a_{31}=a_{12}$ and $a_{32}=-1$. So $\psi([r:s:t]) = [a_{12}s: a_{12}r: a_{12}r-s+t]$. Using $[r:s:t] \in E_a$, the condition $\phi([r:s:t])\in E_{a'}$ is equivalent to $$(a_{12}^2-a)r^3-(a_{12}^2-a)r^2s - (a'a_{12}-1)rs^2+ (a'a_{12}^2-1)s^3 = 0.$$ This equation holds for all $p\in E_a-\{O,P\}$ if and only if $a_{21}^2=a$ and $a'a=1$.
The result follows.
\end{proof}
\begin{cor}
\label{counting P(a)}
For $j\in \k$, the number of distinct isomorphism classes of algebras $P(a)$ such that $a(a-1)\neq 0$ and the point scheme $E_a$ has j-invariant $j_a=j$ is:
\begin{itemize}
\item[(1)] three, if $j\neq 0, 12^3$,
\item[(2)] one, if $j=0$, and
\item[(3)] two, if $j=12^3$.
\end{itemize}
\end{cor}
\begin{proof}
Recall that for $a(a-1)\neq 0$, the j-invariant of the elliptic curve $E_a$ is given by $j_{a}=16(a^2+14a+1)^3/a(a-1)^4.$
Observe that $j_a=j_{1/a}$, so solutions to $j_a=j$ occur in mutually inverse pairs. By Theorem \ref{classifying P(a)}, each pair corresponds to a single isomorphism class in the family $P(a)$.
If $j = 0$, then the equation $j_a = 0$ has two distinct solutions, so (2) follows.
If $j\neq 0$, define a polynomial $$f_j(x) = (x^2+14x+1)^3 - (j/16)x(x-1)^4 \in \k[t].$$ Observe that $j_a = j$ if and only if $a$ is a zero of $f_j(x)$. It is readily checked that
$$(x^2+14x+1)f'_j(x)-6(x+7)f_j(x)=(j/16)(x-1)^3(x+1)(x^2-34x+1).$$
Since $j\neq 0$ and $f_j(1)\neq 0$, if $f_j(x)$ has a multiple root at $x=a$, then we have $(a+1)(a^2-34a+1)=0$. For such an $a$, $f_j(a)=0$ implies $j=12^3$, so (1) follows. For (3), observe that $j_a=12^3$ implies $(a+1)^2(a^2-34a+1)^2=0$.
\end{proof}
AS-regular algebras whose point schemes are elliptic curves have recently been classified up to isomorphism by Itaba and Matsuno in characteristic 0. In \cite[Theorem 4.9]{IM}, the authors provide a classification of geometric algebras whose point schemes are elliptic curves. However, not all algebras listed in \cite[Theorem 4.9]{IM} are AS-regular. In \cite[Theorem 3.13]{Mat} (see also \cite[Remark 3.9]{Mat}) Matsuno completes the classification. We draw attention in particular to the family of algebras
$$R(a,b,c) = \frac{\k \langle x, y, z \rangle}{\langle axz+bzy+cyx, azx+byz+cxy,ay^2+bx^2+cz^2\rangle}$$
where $[a:b:c]\in \P^2$ is a point on $E_{\l}=\mathcal Z(x^3+y^3+z^3-3\l xyz)$, $\l^3\neq 1$ such that $abc\neq 0$. When the $j$-invariant of $E_{\l}$ is not equal to $0$ or $12^3$, then these are the Type B algebras of \cite[Table 1]{Mat}; also see \cite[Theorem 4.9]{IM}.
\begin{lemma}\label{center of R(a,b,c)}
Let $[a:b:c]\in E_{\l}$, $\l^3\neq 1$, such that $abc \ne 0$. If $\dim_{\k} R(a,b,c)_3 = 10$, then $\dim_{\k} Z(R(a,b,c))_2 = 2$.
\end{lemma}
\begin{proof}
We calculate a Gr\"obner basis to degree 3. Order monomials in the free algebra $\k\langle x, y, z \rangle$ using left-lexicographic order based on $x < y < z$. Without loss of generality assume that $c = 1$, and write the defining relations of $R(a,b,c)$ as:
$$z^2+ay^2+bx^2\qquad zy+b^{-1}yx+ab^{-1}xz\qquad zx+a^{-1}byz+a^{-1}xy.$$
Then the overlaps in degree $3$ are: $z^3, z^2y, z^2x$. Resolving these yields:
\begin{align*}
&a^{-2}(b^3-a^3)[y^2z-a^2b^{-2}x^2z+b^{-1}yxy-ab^{-2}xyx], \\
&b^{-2}(1-b^3)[yx^2-x^2y], \\
&a^{-2}(1-a^3)[xy^2-y^2x],
\end{align*}
respectively.
There are twelve cubic monomials in the free algebra $\k\langle x, y, z \rangle$ that do not contain $z^2$, $zx$ or $zy$ as a submonomial. Assuming that $\dim_{\k} R(a,b,c)_3 = 10$, there must be exactly two linearly independent Gr\"obner basis elements in degree 3. Therefore exactly one of: $b^3-a^3$, $1-b^3$, $1-a^3$ must be zero. We consider cases.
\noindent{\bf Case 1:} $b^3-a^3 = 0\ne (1-b^3)(1-a^3)$.
The Gr\"obner basis in degree 3 is spanned by: $yx^2-x^2y$ and $y^2x-xy^2$. It is straightforward to check that $\{a^2b^{-2}x^2+y^2, xy+yx\}$ is a basis for $Z(R(a,b,c))_2$.
\noindent{\bf Case 2:} $1-b^3 = 0\ne (b^3-a^3)(1-a^3)$.
The Gr\"obner basis in degree 3 is spanned by: $y^2z-a^2b^{-2}x^2z+b^{-1}yxy-ab^{-2}xyx$ and $y^2x-xy^2$. It is easy to check that $\{xy-axz+byz, y^2\}$ is a basis for $Z(R(a,b,c))_2$.
The remaining case is analogous to Case 2.
\end{proof}
\begin{thm}
\label{P(a,b) is an S(1,1,c)}
Let $\k$ be an algebraically closed field of characteristic $0$. When $a(a-1)\neq 0$, the twisted tensor product $P(a)$ is isomorphic as a graded algebra to a three-dimensional Sklyanin algebra $S(1,1,c)$ of type EC. Moreover, every algebra $S(1,1,c)$ of type EC is isomorphic to some $P(a)$ with $a(a-1)\neq 0$.
\end{thm}
\begin{proof}
Assume $a(a-1)\neq 0$. Proposition \ref{TTP conditions for P(a,b)} ensures that $P(a)$ is a twisted tensor product of $\k_{-1}[x,y]$ and $\k[t]$. Moreover, by Proposition \ref{AS- regular for P(a,b)} and Proposition \ref{point scheme of P(a,b)}, $P(a)$ is AS-regular, its point scheme is an elliptic curve and the associated automorphism has order 2.
Combining \cite[Theorem 4.9]{IM}, \cite[Remark 3.9]{Mat}, and \cite[Theorem 3.13]{Mat}, it follows that $P(a)$ is isomorphic to a Sklyanin algebra $S(a',b',c')$ or to one of the algebras $R(a',b',c')$ defined above. We note that the Type E and Type H algebras in \cite[Table 1]{Mat} are ruled out, as the automorphisms for those types do not have order 2.
Since $\dim_{\k} P(a)_3=10$ and $\dim_{\k} Z(P(a))_2=3$, Lemma \ref{center of R(a,b,c)} implies $P(a)$ must be isomorphic to a three-dimensional Sklyanin algebra $S(a',b',c')$. Since $P(a)$ is of type EC, so is $S(a',b',c')$. Since $P(a)$ contains a subalgebra isomorphic to $\k_{-1}[r,s]$, Theorem \ref{not a skew polynomial ring}(1) implies $P(a)$ is isomorphic to $S(1,1,c)$.
Finally, the statement that every $S(1,1,c)$ of type EC is isomorphic to some $P(a)$ with $a(a-1) \neq 0$ follows directly from Proposition \ref{counting S(1,1,c)} and Corollary \ref{counting P(a)}.
\end{proof}
\bibliographystyle{plain}
|
\section{Introduction}
High precision measurements of electroweak observables represent powerful tests of the the Standard Model (SM) to obtain hints of new physics~\cite{pdgreview}.
The $K^+ \rightarrow l^+ \nu_l$ ($K_{l2}$) decay, which is one of \color{black}the simplest decays \color{black} among the $K^+$ decay channels, is a clean and sensitive channel to perform such tests.
Lepton universality signifies identical coupling constants \color{black}for \color{black} the three lepton generations, and \color{black} it \color{black} is a basic assumption in the SM.
Although each $K_{l2}$ decay width can be described using the $K_{l2}$ hadronic form factor with a few percent accuracy, this form factor can be canceled out by forming the ratio of the \color{black} electronic \color{black} $K^+ \rightarrow e^+ \nu$ ($K_{e2}$) and muonic $K^+\rightarrow \mu^+ \nu $ ($K_{\mu2}$) decay channels ($R_{K}$).
In the $R_K$ determination, the radiative $K^+ \to e^+ \nu \gamma$ decay, which is the $K_{e2}$ decay accompanied with photon emission, has to be taken into account.
There are two $K_{e2\gamma}$ processes~\cite{biji,rev_mod}: the internal bremsstrahlung (IB) process, $K_{e2\gamma}^{\rm IB}$, mostly with low-energy photon emission, and the structure dependent (SD) process, $K_{e2 \gamma}^{\rm SD}$, with high-energy photon emission roughly in the same and opposite directions of the $e^+$ motions, respectively.
In order to compare the experimental value with the SM prediction, the IB process has to be included in the $K_{e2}$ sample (\color{black}$K_{e2(\gamma)}$=$K_{e2}+K_{e2\gamma}^{\rm IB}$ \color{black}) because it is impossible to experimentally separate the IB process from the $K_{e2}$ decay.
The SM prediction, $R_{K}^{ \rm SM}=(2.477\pm0.001)\times 10^{-5}$, can be calculated with excellent accuracy~\cite{RK_theo1, RK_theo2, RK_theo3, RK_theo4}, and this makes it possible to search for new physics effects by a precise $R_{K}$ measurement~\cite{NA62-2013, KLOE2009}.
On the other hand, the SD process, which has a large hadronic uncertainty, is regarded as a background \color{black}for $R_{K}$ \color{black}and has to be subtracted from the observed $e^+$ events. The $K_{e2(\gamma)}$ branching ratio is strongly suppressed down to $\sim$$10^{-5}$ due to the helicity suppression mechanism of the weak charged current.
The SD process is not subject to the above helicity suppression, and the \color{black}$K_{e2\gamma}^{\rm SD}$ branching ratio \color{black} is comparable to that of $K_{e2(\gamma)}$.
The SD process is sensitive to the electroweak structure of the kaon and has been the subject of extensive theoretical studies~\cite{biji,rev_mod, chiPT-2004, chiPT-2008}.
\color{black}In the NA62 experiment~\cite{NA62-2013}, \color{black}which produced the result with the smallest uncertainty, \color{black}in-flight kaon decays in a \color{black}74\color{black}~GeV/$c$ beam with a momentum \color{black} spread of $\pm1.4$ GeV/$c$ (rms) \color{black} were used, and the decay particle momentum region from 15 to 65 GeV/$c$ was investigated. \color{black}
The $K_{\mu2}$ and $K_{e2 \gamma}^{\rm SD}$ decays were the main background sources in the $K_{e2(\gamma)}$ sample.
\color{black}On the other hand, low energy kaons from $\phi \to K^+ K^-$ decays were used in the preceding KLOE experiment~\color{black}\cite{KLOE2009}, \color{black} and the experimental result was dominated by the statistical uncertainty. \color{black}
The NA62 and KLOE results were obtained to be $ R_K=(2.488 \pm 0.007_{\rm{stat}} \pm 0.007_{\rm{sys}})\times 10^{-5}$ and $R_K=(2.493 \pm 0.025_{\rm{stat}} \pm 0.019_{\rm{sys}}) \times 10^{-5}$, respectively, \color{black}and both \color{black} are consistent with the SM prediction within the uncertainties.
It should be noted that the branching ratio for $K_{e2 \gamma}^{\rm SD}$ reported by the KLOE group was used in the NA62 analysis, and this SD contribution was subtracted from the observed $K_{e2(\gamma)}$ samples.
Therefore, an experimental check of the SD branching ratio with a systematically different approach from KLOE is important.
In this letter, we present a new measurement of the branching ratio for the $K_{e2 \gamma}^{\rm SD}$ decay relative to that of the $K_{e2(\gamma)}$ decay, Br($K_{e2\gamma}^{\rm SD}$)/Br($K_{e2(\gamma)}$), performed with the J-PARC E36 experiment, which is also aiming at testing lepton universality violation with a precise $R_K$ measurement~\cite{E36-proposal,KAON2013}.
\begin{figure}
\includegraphics[width=.99\textwidth]
{img/kl2setc4f.eps}
\caption{Schematic cross sectional side view (right) and end view (left) of the E36 detector configuration. Charged particles from TGT were \color{black}momentum analyzed \color{black}by reconstructing the particle trajectory using three MWPCs, C2, C3, and C4, as well as by TGT and SFT. Particle identification was carried out using AC, PGC and by measuring the time-of-flight between the TOF1 and TOF2 counters. The photon energy and hit position were measured by the CsI(Tl) calorimeter.}
\label{figset}
\end{figure}
\section{Experimental details}
\subsection{A stopped $K^+$ beam using the J-PARC K1.1BR beam line}
In contrast to the previous $R_K$ measurements, the E36 experiment used a stopped $K^+$ beam in conjunction with a 12-sector iron-core superconducting toroidal spectrometer~\cite{toro} and a highly segmented CsI(Tl) calorimeter~\cite{E246-CsI(Tl)2000}.
Schematic cross sectional side and end views of the detector configuration are shown in Fig.~\ref{figset}.
Because of the rotational symmetry of the 12 identical gaps in the spectrometer and the large directional acceptance of the $\pi^0$ detector, spectra distortions due to detector acceptance are cancelled and systematic uncertainties are greatly suppressed~\cite{E246-2003}.
The experimental apparatus was originally constructed for the KEK-PS E246/E470 experiments: a search for $T$-violating muon polarization in $K^+ \rightarrow \pi^0 \mu^+ \nu$ decay~\cite{e246} and spectroscopic studies of various $K^+$ decay channels~\cite{spectros}.
The experiment was performed \color{black}in 2015 \color{black} at the J-PARC Hadron Experimental Facility using a 780~MeV/$c$ separated $K^+$ beam provided by the K1.1BR beam line\color{black}~\cite{doombos}.
A $K/\pi $ ratio of $\sim$1 was obtained by means of an electrostatic separator system. \color{black}
The $K^+$ beam was discriminated from pion background by a Fitch-type Cherenkov counter (BC)~\cite{Fitch}.
An efficiency of more than 99\% with a small $\pi$ mis-trigger probability of $<$1\% was achieved for the $K^+$ identification.
The typical $K^+$ beam intensity was $1.0 \times 10^6$ in a 2-s spill duration and 6-s repetition rate.
\color{black}In total $4.5 \times 10^5$ spills \color{black} were used for the physics production runs. \color{black}
The kaons were slowed down by a degrader and stopped in an active target (TGT), which consisted of 256 3.1$\times$3.1~mm$^2$ thin scintillating bars of 20-cm length forming a cylindrical bundle with a 5.6-cm diameter, located at the center of the detector assembly.
The $K^+$ stopping efficiency was typically $\sim$0.25 relative to BC $K^+$ triggering, and the $K^+$ stopping profile had a round shape with a Gaussian-like distribution with $\sigma_z$ of $\sim$4 cm in the beam direction.
\subsection{Momentum determination of charged particles by the Toroidal spectrometer}
$K_{e2 \gamma}^{\rm SD}$ and $K_{e2(\gamma)}$ \color{black}candidates \color{black} were identified by analyzing the $e^+$ momentum ($p$) with the 12-sector spectrometer taken under the same trigger and DAQ conditions and, in addition, detecting the photon in the CsI(Tl) calorimeter for $K_{e2 \gamma}^{\rm SD}$.
\color{black}The trigger condition for event readout was a hit in both TOF counters and in TGT in addition to the $K^+$ beam particle identification by BC. \color{black}
The data were collected at a central magnetic field of $B=1.5$~T, which was optimized for the positron momenta in the region of 220$-$250 MeV/$c$.
Charged particles from TGT were tracked and momentum-analyzed by reconstructing the particle trajectory using multi-wire proportional chambers (MWPCs) located at the entrance (C2) and exit (C3 and C4) of the magnet gap, as well as by TGT and a spiral fiber tracker (SFT) made of scintillating fiber bundles~\cite{E36SFT-2015,tabata_SFT} surrounding TGT.
The momentum was corrected for the energy loss in TGT assuming that all particles were muons, therefore the $\pi^+$ and $e^+$ momenta after the correction were slightly shifted from their true values.
The momentum spectrum before imposing the PID analysis is shown in Fig.~\ref{fig.mom}~(a).
Two peaks due to the $K_{\mu2}$ and $K^+\rightarrow \pi^+ \pi^0$ ($K_{\pi 2}$) decays are clearly visible, \color{black}although the $K_{\pi2}$ events are reduced due to \color{black} the \color{black}lower spectrometer acceptance. \color{black}
The momentum resolution \color{black}was \color{black}$\sigma_p=2.0$~MeV/$c$ at 236~MeV/$c$.
The $K^+$ decay time, defined as the \color{black}time of the \color{black}$e^+$ signal at the TOF1 counter, was required to be more than 1.5~ns later than the $K^+$ arrival time determined by BC.
Small time-of-flight corrections from BC to TGT, and TGT to TOF1 were accounted for on average.
\color{black}The fraction of in-flight $K^+$ decays and any other prompt backgrounds were suppressed down to 0.1\%. \color{black}
\begin{figure}[hbtp]
\includegraphics[width=\textwidth]{./img/Fig2.eps}
\caption{
(a) and (b) are the momentum spectra corrected for the energy loss in TGT before and after imposing the positron selection PID, respectively, \color{black}before requiring the photon detection by CsI(Tl). \color{black}
The peak structure due to the predominant $K_{\mu2}$ and $K_{\pi 2}$ decays is seen at 236 MeV/$c$ and 205 MeV/$c$, respectively, in (a).
\color{black}The $K_{\pi2}$ decay is \color{black} reduced due to
\color{black}
the momentum acceptance of the spectrometer.
\color{black}
The $K_{e2(\gamma)}$ and $K_{e3}$ decays, as well as the remaining $K_{\mu2}$ events due to $\mu^+$ mis-identification are presented in (b).
The $K_{e2(\gamma)}$ peak is observed with a tail structure in the lower momentum region due to the emission of internal and external bremsstrahlung before entering the spectrometer.
The momentum in (b) was scaled so that the $K_{e2(\gamma)}$ peak position is at 247 MeV/$c$, and consequently the $K_{\mu2}$ peak position appears at 233 MeV/$c$.
\color{black}The $e^+$ momentum below 225 MeV/$c$ is \color{black} not usable \color{black} for the $K_{e2\gamma}^{\rm SD}$ and $K_{e2(\gamma)}$ decays due to the \color{black} high \color{black} $K_{e3}$ contribution. \color{black}
\color{black}The $K_{e2\gamma}^{\rm SD^+}$, $K_{e2(\gamma)}$, $K_{e3}$ and $K_{\mu2}$ decays determined by simulation calculations are also shown in (b). \color{black}
}
\label{fig.mom}
\end{figure}
\subsection{Particle identification}
Particle identification (PID) of $\mu^+$, $\pi^+$, and $e^+$ was carried out in each of the 12 sectors using \color{black}three independent PID systems -- \color{black}an aerogel Cherenkov counter (AC)~\cite{E36AC-2015}, a lead-glass Cherenkov counter (PGC)~\cite{E36PGC-2015}, and by measuring the time-of-flight (TOF) between the TOF1 and TOF2 plastic scintillation counters \color{black}with timing resolutions of 250 ps and 100 ps, respectively. \color{black}
The AC and TOF1 surrounded TGT while TOF2 was located about 90~cm behind C4 \color{black}resulting in a typical path length of 2.7~m from TOF1. \color{black}
The PGC was placed just after TOF2 at the end of the spectrometer.
Figure~\ref{fig.pid} shows the $e^+$ efficiency (solid/red) and the $\mu^+$ rejection probability (dotted/black) at the momentum of 247~MeV/$c$ and 236~MeV/$c$, respectively, as functions of the (a) AC, (b) PGC, and (c) $M_{\rm TOF}^2$ cut points.
The $e^+$ efficiency \color{black}for each PID system \color{black}was obtained by pre-selecting $e^+$ from the $K^+ \rightarrow \pi^0 e^+ \nu$ ($K_{e3}$) and in-flight $K_{e3}$ decays for the momentum region higher than the $K_{e3}$ endpoint momentum (228~MeV/$c$) by \color{black} using tighter PID conditions than nominally for the other two PID systems. \color{black}
The $\mu^+$ rejection probability was determined using $\mu^+$s from the $K_{\mu2}$ decays.
Positrons were selected by setting thresholds for AC and PGC at channel 100 and 140, respectively.
Also, the mass-squared of the charged particle ($M_{\rm TOF}^2$) obtained from the TOF, momentum, and path length was required to be $M_{\rm TOF}^2<4000$~(MeV$^2/c^4$).
\color{black}For the AC, PGC, and $M_{\rm TOF}^2$ efficiency determinations, the cut points of (${\rm PGC}>150$, $M_{\rm TOF}^2<3000$~MeV$^2/c^4$), (${\rm AC}>290$, $M_{\rm TOF}^2<3000$~MeV$^2/c^4$), and (${\rm AC}>290$, ${\rm PGC}>150$) were used, and the $\mu^+$ impurity was estimated to be less than 0.5\%. \color{black}
These positron selection cuts, as shown in Fig.~\ref{fig.pid}, were chosen to remove most of the $K_{\mu 2}$ backgrounds with a $\mu^+$ rejection probability of \color{black}(99.934$\pm0.002_{\rm stat}$)\%, while \color{black} maintaining \color{black} a reasonable $e^+$ efficiency of (75.2$\pm0.4_{\rm stat}$)\%. \color{black}
This was determined to minimize the total uncertainty in the $K_{e2\gamma}^{\rm SD}$ branching ratio measurement from the $K_{\mu2}$ subtraction.
Since the pulse height of the PGC counter increased with increasing $e^+$ momentum and \color{black} the path length depended on the charged particle momentum, this introduced a momentum dependence in the PGC and $M_{\rm TOF}^2$ detection efficiency. On the other hand, the AC efficiency was nearly constant in the observed momentum region.
\color{black}The momentum dependence of the three PID elements \color{black} was \color{black} measured from 200 to 250 MeV/$c$ in order to correct for \color{black} this effect. \color{black}
The black/solid line in Fig~\ref{fig.mom}~(b) shows the charged-particle momentum spectrum with the positron PID condition applied \color{black} and without constraints from the CsI(Tl). \color{black}
The $K_{e2(\gamma)}$, $K_{e2\gamma}^{\rm SD}$, and $K_{e3}$ decays, as well as the remaining $K_{\mu2}$ events due to $\mu^+$ mis-identification are \color{black}observed, and the momentum \color{black}was slightly scaled so that the $K_{e2(\gamma)}$ peak position is at 247 MeV/$c$.
The $K_{e2(\gamma)}$ peak has a tail structure in the lower momentum region \color{black}due to the emission of internal and external bremsstrahlung before entering the spectrometer.
The contribution of $K_{e2(\gamma)}$ events with high energy bremsstrahlung emission was outside of the spectrometer acceptance.
\color{black} By applying variable cut conditions to suppress $K_{\mu2}$, \color{black}it could be confirmed that there was no $K_{e3}$ tail beyond 230 MeV/$c$. \color{black}
\begin{figure}[hbtp]
\includegraphics[width=\textwidth]{./img/Fig3.eps}
\caption{
The $e^+$ detection efficiency (solid/red lines) and $\mu^+$ rejection probability (dashed/black lines) \color{black}for $p_{e^+}=247$ MeV/$c$ and $p_{\mu^+}=$ 236 MeV/$c$, \color{black} as functions of the (a) AC, (b) PGC, and (c) $M_{\rm TOF}^2$ cut points. \color{black} The cut points adopted for each detector are also shown\color{black}. As for possible momentum dependence, see the text.
}
\label{fig.pid}
\end{figure}
\subsection{Photon measurement by the CsI(Tl) calorimeter}
The photon detector, \color{black}a barrel \color{black}of 768 CsI(Tl) crystals, covered $\sim$70\% of the total solid angle~\cite{E246-2003}.
There were 12 holes for outgoing charged particles to enter the spectrometer and 2 holes for the beam entrance and exit. Each crystal has a length of 25~cm and covers 7.5$^{\circ}$ in both the polar and azimuthal direction.
The photon energy and hit position were obtained by summing the energy deposits and calculating the energy-weighted centroid of participating crystals in the Moliere spread.
To read out the CsI(Tl) calorimeter, VF48 Flash ADCs~\cite{fADC} were employed to record the waveform data in order to resolve pulse-pileup events with high efficiency. The hardware threshold was set at $\sim$17~MeV to limit the event size.
The CsI(Tl) energy and timing resolutions of a single module at 105~MeV were $\sigma_{E}/E \approx 2.6$\% and $\sigma_t= 10.7$~ns~\cite{E36-CsI-2018}, respectively, and the position resolution was obtained as $\sigma_{\rm pos}=7.6$~mm.
Accidental backgrounds were reduced by choosing a timing window of $\pm 50$ ns.
In addition, some of the photons that passed through the holes in the CsI(Tl) calorimeter into the spectrometer sectors were detected by gap shower counters (GSC), which are sandwich detectors of plastic scintillators and lead plates that will allow us to perform \color{black} a supplemental $K_{e2\gamma}^{\rm SD}$ study by detecting the radiative photons. \color{black}
\section{Analysis}
\subsection{Overview of the \boldmath{$Br(K_{e2 \gamma}^{\rm SD})/Br(K_{e2(\gamma)})$} determination}
In the present study, the SD branching ratio, $Br(K_{e2\gamma}^{\rm SD})$ normalized to that of $K_{e2(\gamma)}$ decay, $Br(K_{e2(\gamma)})$, was determined from the ratio of the $K_{e2\gamma}^{\rm SD}$ and $K_{e2(\gamma)}$ yields, corrected for the detector acceptance as
\color{black}\begin{eqnarray}
\frac{Br(K_{e2\gamma}^{\rm SD})}{Br(K_{e2(\gamma)})}
= \frac{N(K_{e2\gamma}^{\rm SD}) }{ N(K_{e2(\gamma)})} \cdot R_\Omega =
\frac{N(K_{e2\gamma}^{\rm SD}) }{ N(K_{e2(\gamma)})}\cdot
\frac{\Omega(K_{e2(\gamma)})}{\Omega(K_{e2\gamma}^{\rm SD})}, \label{brform}
\end{eqnarray} \color{black}
where $N$ is the number of the accepted events and $R_\Omega$ is the ratio of the overall acceptances $\Omega$ for $K_{e2(\gamma)}$ and $K_{e2\gamma}^{\rm SD}$, respectively, obtained by a Monte Carlo simulation.
In contrast to the previous KLOE experiment which determined $Br(K_{e2 \gamma}^{\rm SD})$ relative to $Br(K_{\mu 2})$, the present experiment was able to disentangle both the number of $N(K_{e2(\gamma)})$ and $N(K_{e2 \gamma}^{\rm SD})$ events directly from the charged particle momentum spectra.
The spectrum in Fig.~\ref{fig.mom}~(b) was decomposed by simulating the spectrum of each contributing process and fitting the linear combination to the measured spectrum.
\color{black}To further constrain $Br(K_{e2\gamma}^{\rm SD})$, separate spectra were obtained for events with 1 and 2 photons detected in the CsI(Tl) calorimeter and for events without conditions on the number of photons; these were fit simultaneously with the ratio $Br(K_{e2\gamma}^{\rm SD}/Br(K_{e2(\gamma)})$ and the yields of $K_{e2\gamma}^{\rm SD}$ and $K_{\mu2}$ decay as free parameters.
The fit makes use of the $R_{\Omega}$ values from the MC simulation. \color{black}
Our method has the following advantages
: (1) charged particles from the $K_{e2(\gamma)}$ and $K_{e2\gamma}^{\rm SD}$ decays are $e^+$ with \color{black}similar momenta\color{black}, and the PID efficiency up to a small $p$ dependence cancels out; (2) since the $K_{e2(\gamma)}$ decay produces a peak at 247~MeV/$c$ in the momentum spectrum, as shown in Fig.~\ref{fig.mom}~(b), the $K_{e2(\gamma)}$ yield can be \color{black}accurately determined, and, at the same time, the $K_{e2(\gamma)}$ events are largely \color{black}suppressed by requiring a photon hit in the CsI(Tl) calorimeter for the $K_{e2 \gamma}^{\rm SD}$ selection; (3) the CsI(Tl) acceptance can be determined using the two photons from the $K_{\pi2}$ decay; (4) other systematic uncertainties from imperfect reproducibility of the experimental conditions such as tracker inefficiencies, detector misalignment, DAQ deadtime, etc. are also cancelled out in the ratio determination.
\subsection{Detector acceptance}
The detector acceptance for the $K_{e2\gamma}^{\rm SD}$ decays was calculated by a GEANT4-based Monte Carlo simulation assuming the theoretical scheme of vector and axial-vector transitions~\cite{biji,rev_mod}.
The simulation data were generated assuming the Dalitz density,
\begin{eqnarray}
\frac{d^2\Gamma(K_{e2\gamma}^{\rm SD})}{dx dy}
= \frac{G_F^2 \alpha m_K^5 \sin^2\theta_c}{64 \pi^2}
\times [ (V+A)^2 f_{\rm{SD^+}} + (V-A)^2 f_{\rm{SD^-}} ],
\end{eqnarray}
where $G_F$ is the Fermi constant, $\alpha$ is the fine structure constant, $m_K$ is the kaon mass, and $\theta_c$ is the Cabibbo angle.
The form factors $V$ and $A$ represent the vector and axial-vector transitions, respectively. The kinematical density distribution for both helicity terms $f_{\rm{SD^+}}$ and $f_{\rm{SD^-}}$ can be described as
\begin{eqnarray}
f_{\rm{SD^+}} = (x+y-1)^2(1-x) {~~\rm{and}~~} &&f_{\rm{SD^-}} = (1-y)^2(1-x),
\end{eqnarray}
by ignoring small ${\cal O}(m_e/m_K)$ contributions, where ${x=2E_\gamma/m_K}$ and ${y=2E_e/m_K}$ are dimensionless photon and $e^+$ energies, respectively, and $m_e$ is the positron mass.
It should be noted that the SD$^-$, IB, and IB/SD$^+$ interference are negligibly small in the high-momentum $e^+$ region \color{black}$230<{p}<250\rm{~MeV}$/$c$ and in the large ($e^+, \gamma$) opening angle region~\cite{biji}. \color{black}
Here, $V$ was assumed to have the momentum transfer dependence ${V=V_0 [1 +\lambda(1-x)]}$, while $A$ was constant, according to the Chiral Perturbation Theory (ChPT) model at ${\cal O}(p^6)$~\cite{chiPT-2004,chiPT-2008}.
\color{black}The $\lambda$ and $A/V_0$ parameters were taken to be $\lambda=0.3\pm0.1$ and $A/V_0=0.4\pm0.1$\footnote{\color{black} The difference of the $A/V_0$ value obtained by the ${\cal O}(p^4)$ and ${\cal O}(p^6)$ calculations is adopted as a systematic uncertainty.}\color{black}, respectively, which is the current theoretically conceivable range of ChPT ${\cal O}(p^6)$ model calculations~\cite{rev_mod}.
\color{black}The $K_{e2(\gamma)}$ decay with the IB component, calculated including re-summation of the decay probability for multiple photon emission~\cite{IB_Gatti}, and the $K_{\mu2}$ decay were also generated using the same simulation code. \color{black}
\subsection{Accidental backgrounds in the CsI(Tl) calorimeter}
Since the CsI(Tl) calorimeter surrounded the beam axis, it was exposed to a high rate of scattered beam particles and accidental backgrounds in the calorimeter contributed to the raw $K_{e2 \gamma}^{\rm SD^+}$ event samples.
This accidental background was included in the simulation \color{black} in order \color{black}to reproduce the actual experimental conditions.
We used the experimental background events and merged them with the simulation data as follows.
Since the $K_{\mu2}$ decays with $p_{\mu}=236$~MeV/$c$ did not have accompanying photons, the CsI(Tl) signals which coincide with the $K_{\mu2}$ decays within the timing window of $\pm 50$ ns can be treated as pure accidental backgrounds.
The fraction of the radiative $K^+\to\mu^+\nu\gamma$ decay is negligibly small and causes no effect in this background study.
The $K_{\mu2}$ events were selected only by the momentum and PID analyses, and these CsI(Tl) signals were merged with the simulation data of the $K_{e2\gamma}^{\rm SD^+}$, $K_{e2(\gamma)}$, and $K_{\mu 2}$ decays.
It should be noted that the ratio of the single-cluster and zero-cluster $K_{\mu 2}$ events was \color{black}$\epsilon =$(18.85$\pm0.03_{\rm stat}$)\%. \color{black}
The validity of this simulation method was checked using two photons ($E_{\gamma1}>E_{\gamma2}$) from the $\pi^0$ decay in ${K^+\to\pi^+ \pi^0}$ tagged by the $\pi^+$ with $200<p_\pi<210~{\rm MeV}/c$ and the photon energy higher than 21 MeV.
Also, events with large shower leakage from the calorimeter were rejected by requiring $E_{\gamma1}+E_{\gamma 2}>120$ MeV.
Figure~\ref{fig.kpi2} shows the experimental spectra (dots) of (a) $E_{\gamma1}$, (b) $E_{\gamma2}$ , (c) opening angle between the two photons, and (d) invariant mass ($M_{\gamma\gamma}$), together with the simulation data.
The contribution from the $\pi^0$ decay and events with at least one accidental background hit in the two clusters are shown as the dotted (blue) and dashed (green) histograms, respectively. The solid (red) histogram is obtained by summing the two components and normalizing to the experimental yield.
The results of the simulation are in good agreement with the experimental data, which indicates a good understanding of the photon measurement by the CsI(Tl) calorimeter.
Also, the detection efficiencies of \color{black}all CsI(Tl) modules \color{black}were determined using the $K_{\pi 2}$ events. Using the information of the $\pi^+$ and one of the two photons, the second photon energy and direction were calculated, and the existence of the actual photon cluster was checked.
\begin{figure}[hbtp]
\includegraphics[width=\textwidth]{./img/Fig4.eps}
\caption{
$K_{\pi2}$ spectra compared with the MC simulation taking into account the accidental backgrounds in the CsI(Tl) calorimeter.
(a) and (b) are the photon energy distributions ($E_{\gamma 1}>E_{\gamma2}$),
(c) is the opening angle between the $\pi^+$ and $\pi^0$,
and (d) is the invariant mass $M_{\gamma\gamma}$.
The black dots are the experimental data. The contribution from the $\pi^0$ decay and events with at least one of the two clusters being accidental are shown as the dotted (blue) and dashed (green) histograms, respectively, and the solid (red) histogram is obtained by summing the two components.
}
\label{fig.kpi2}
\end{figure}
\begin{figure}[hbtp]
\includegraphics[width=\textwidth]{./img/Fig5.eps}
\caption{
Charged-particle momentum spectra with requiring (a) one photon cluster and (b) two photon clusters in coincidence with the $e^+$ track, and (c) charged particles without any CsI(Tl) constraint.
The dots (black) are the experimental data. The solid (green), dashed (blue), and dashed-dotted (magenta) lines are the $K_{e2\gamma}^{\rm SD^+}$, $K_{e2(\gamma)}$, and $K_{\mu2}$ decays, respectively, determined by simulation calculations.
The thick-red lines are the fitted results obtained by adding all the decay contributions.
The events are shown only for the fitted momentum range.
}
\label{fig.nocsi}
\end{figure}
\subsection{\boldmath{$K_{e2\gamma}^{\rm SD^+}$} event selection}
\color{black}In order to relatively enhance the $K_{e2 \gamma}^{\rm SD^+}$ events
and suppress the $K_{\mu2}$ background events, \color{black} photon hits in the CsI(Tl) calorimeter were required.
Due to pile-up of the accidental backgrounds in the CsI(Tl), the accepted $K_{e2 \gamma}^{\rm SD^+}$ events included 2-cluster events in the calorimeter with a ratio of \color{black}the $\epsilon$ probability obtained using $K_{\mu2}$ events \color{black} compared with 1-cluster events.
Since event loss in the 1-cluster data and the appearance of the 2-cluster events were taken into account in the simulation, the $K_{e2 \gamma}^{\rm SD^+}$ branching ratio can be derived by comparing the experimental data with the simulation for both the 1-cluster and 2-cluster events simultaneously.
The $K_{e2 \gamma}^{\rm SD^+}$ decays with 1-cluster in the CsI(Tl) were obtained using the following procedure.
The photon energy and the opening angle between the $e^+$ and $\gamma$ were required to be ${E_{\gamma}>21\;{\rm MeV}}$ and ${\cos\theta_{e\gamma}<-0.8}$.
This $E_{\gamma}$ cut point was a little higher than the hardware threshold to remove effects from small gain variations of each CsI(Tl) module.
Assuming the $K^+ \to e^+ \nu \gamma$ decay kinematics, the missing-mass-squared was calculated as $M^2_{\rm miss}=(m_K - E_e - E_\gamma )^2 - ( {\bf p_e} + {\bf p_\gamma} )^2 $ where ${\bf p}$ is the momentum vector.
The accepted interval was imposed to be $-4000 < M^2_{\rm miss} < 8000~{\rm MeV}^2/c^4$.
The momentum spectrum is shown in Fig.~\ref{fig.nocsi}~(a) indicated by the dots.
Here, a small contribution from $K_{\mu2}$ with an accidental hit remained after the $K_{e2\gamma}^{\rm SD^+}$ selection cuts.
\color{black}On the other hand, the $K_{e2(\gamma)}$ events with an accidental hit were efficiently removed by the $K_{e2\gamma}^{\rm SD^+}$ selection cuts, and the fraction is negligibly small. \color{black}
The decays in the 2-cluster data were selected in a similar manner.
If one of the two clusters satisfied the conditions for the 1-cluster analysis, the event was adopted as a $K_{e2\gamma}^{\rm SD^+}$ decay and
the associated CsI(Tl) cluster was chosen as the true photon event, as shown in Fig.~\ref{fig.nocsi}~(b).
It should be noted that the $K_{\mu2}$ surviving fraction relative to the $K_{e2\gamma}^{\rm SD^+}$ yield in the 2-cluster data is approximately twice that observed in the 1-cluster data because there are two photon candidates in the 2-cluster analysis.
\subsection{\boldmath{$Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$} determination}
The $Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ value was obtained to be $1.14\pm0.07$ \color{black} for the Prun data set (as defined below; see Table~\ref{branch.result.summary}) \color{black} by simultaneously fitting the momentum spectra of the events with 1-cluster, 2-cluster, and without any CsI(Tl) constraint using the simulation data of the $K_{e2 \gamma}^{\rm SD^+}$, $K_{e2(\gamma)}$, and $K_{\mu2}$ decays, as shown in Fig.~\ref{fig.nocsi}~(a)(b)(c).
\color{black}Here, value of $\epsilon$ obtained with the $K_{\mu2}$ events was used as a constraint in the fit. \color{black}
The solid (green), dotted (blue), and dashed-dotted (magenta) lines are the decomposed $K_{e2 \gamma}^{\rm SD^+}$, $K_{e2(\gamma)}$, and $K_{\mu2}$ events.
The thick-red line is the fit result obtained by adding all the decay contributions.
The fitting regions of $p>$ 230, 232, and 240 MeV/$c$ for the events with 1-cluster, 2-cluster, without any CsI(Tl) constraint, respectively, \color{black} were chosen to reduce the effects from the $K_{\mu 2}$ subtraction to minimize the uncertainty of $K_{e2\gamma}^{\rm SD^+}$ \color{black} by eliminating most of the $K_{\mu 2}$ events.
\color{black}Note that it is very difficult to reproduce these surviving $K_{\mu2}$ events after the PID selection and the $M^2_{\rm miss}$, cos$\theta_{e\gamma}$, $E_{\gamma}$ cuts by the simulation. \color{black}
The $Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ result as well as the accepted $K_{e2\gamma}^{\rm SD^+}$ and $K_{e2(\gamma)}$ yields \color{black}used in the fitting \color{black} and the associated $R_\Omega$ values are given in Table~\ref{branch.result.summary} under the heading "Prun" (physics run), along with the statistical uncertainties from the fits.
The statistical uncertainty of $R_\Omega$ obtained from the MC calculation was less than $10^{-3}$. \color{black}
The events in Fig.~\ref{fig.nocsi}~(a) were used for an event selection validity check.
Figure~\ref{fig.1gamma} shows the distribution of (a) $E_{\gamma}$, (b) cos$\theta_{e \gamma}$, and (c) $M_{\rm miss}^2$.
The $K_{\mu2}$ background fraction in Fig.~\ref{fig.1gamma} was successfully suppressed down to $\sim$2\% of the $K_{e2\gamma}^{\rm SD^+}$ yield \color{black}in the fitted momentum range\color{black}.
The experimental data (dots) are in good agreement with the simulation (thick-solid/red), indicating a correct understanding of the $K_{e2 \gamma}^{\rm SD^+}$ acceptance.
The decomposed $K_{e2 \gamma}^{\rm SD^+}$ (solid/green) and $K_{\mu2}$ (dashed-dotted/magenta) contributions are also shown.
\begin{table}[htbp]
\center
\caption{
Results of the individual counts $N$, acceptance ratio $R_{\Omega}$, and $Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ values with statistical uncertainties obtained by simultaneously fitting the events with 1-cluster, 2-cluster, and without any CsI(Tl) constraint for Prun and Crun.
An error-weighted average of the Prun and Crun results was adopted as the final result. Also, \color{black} $N(K_{e2(\gamma)})$, $N(K_{e2 \gamma}^{\rm SD^+})$, $N(K_{\mu2})$ in the fitting regions of $p>$ 230, 232, and 240 MeV/$c$ for the events with 1-cluster, 2-cluster, without any CsI(Tl) constraint, respectively, are given. \color{black}
}
\begin{tabular}{llccc}
\hline
&Run period & Prun & Crun & Combined\\
\hline
Without CsI(Tl) constraint&$N(K_{e2(\gamma)})$ & $2353\pm55$ & $330\pm21$ & $2684\pm59$\\
&$N(K_{e2\gamma}^{\rm SD^+})$ & $355\pm19$ & $44\pm7$ & $399\pm20$ \\
\hline
1 cluster
&$N(K_{e2\gamma}^{\rm SD^+})$ & $432\pm24$ & $56\pm9$ & $488\pm26$\\
&$N(K_{\mu 2})$ & $11\pm16$ & $11\pm7$ & $22\pm17$\\
&\color{black}$R_{\Omega_1}$ & 6.22 & 5.83 & \\
\hline
2 cluster&$N(K_{e2 \gamma}^{\rm SD^+})$ & $77\pm4$ & $9\pm1$ & $86\pm4$\\
&$N(K_{\mu 2})$ & $3\pm5$ & $3\pm3$ & $6\pm6$\\
&\color{black}$R_{\Omega_2}$ & 34.8 & 38.4 &\\
\hline
Results&$\chi^2/dof$ & 36.7/43 & 51.7/43 & \\
&$N(K_{e2 \gamma}^{\rm SD^+})$ & $509\pm28$ & $65\pm10$ & $574\pm30$\\
&$N(K_{\mu 2})$ & $14\pm17$ & $14\pm8$ & $28\pm19$\\
&$Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$& $1.14\pm0.07$ & $1.0\pm0.2$ & $1.12\pm0.07$\\
\hline
\end{tabular}
\label{branch.result.summary}
\end{table}
\begin{figure}[hbtp]
\includegraphics[width=\textwidth]{./img/Fig6.eps}
\caption{
The $K_{e2 \gamma}^{\rm SD^+}$ spectra with the 1-cluster requirement: (a) $E_{\gamma}$, (b) cos$\theta_{e \gamma}$, and (c) $M_{\rm miss}^2$.
The $K_{e2 \gamma}^{\rm SD^+}$ events were selected by imposing $p>230$~MeV/$c$, $-4000<M_{\rm miss}^2<8000~{{\rm MeV^2}/c^4}$, and cos$\theta_{e \gamma}<-0.8$ to suppress the $K_{e3}$ and $K_{\mu2}$ contributions.
The black dots are the experimental data.
The solid (green) and dashed-dotted (magenta) histograms are the simulation data of $K_{e2 \gamma}^{\rm SD^+}$ and $K_{\mu2}$ with accidental backgrounds, respectively.
The thick-red line is the total simulation result obtained by adding each component.
}
\label{fig.1gamma}
\end{figure}
In this experimental study, one of the key issues is the treatment of the accidental background in the CsI(Tl) calorimeter and the $K_{\mu2}$ background that survives after the PID analysis.
\color{black}In order to validate this analysis method, the data taken during the commissioning runs dedicated to $K^+$ beam and PID detector tuning were used as systematic-control data (Crun), in which the amount of $K_{\mu2}$ background was larger. \color{black}
As a result, the surviving $K_{\mu2}$ fraction in the Crun data was a factor of $\sim$3 higher than in the Prun data.
These data samples were independently analyzed using the same analysis codes adopted for the Prun data.
The $e^+$ momentum spectra were obtained using the same PID condition for events with the 1-cluster, 2-cluster, and without \color{black} any \color{black} CsI(Tl) constraint, as shown in Fig.~\ref{fig.SCrun}~(a), (b), and (c), respectively, indicated by the dots.
The $Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ ratio was derived to be $1.0\pm 0.2$, which is consistent with the result using the Prun data in spite of the larger number of $K_{\mu 2}$ background events.
The solid (green), dashed (blue), and dashed-dotted (magenta) lines in Fig.~\ref{fig.SCrun} are the $K_{e2\gamma}^{\rm SD^+}$, $K_{e2(\gamma)}$, and $K_{\mu2}$ decays, respectively, obtained from the simulation.
The thick-red line is the fit result obtained by adding all the decay contributions. The details of the analysis result are summarized in Table~\ref{branch.result.summary}.
In addition to the Crun analysis described above, a separate study was performed with the Prun data.
The cuts were tightened to remove \color{black} most of the $K_{\mu2}$ background events \color{black}and relaxed to accept the genuine $K_{e2\gamma}^{\rm SD^+}$ events with higher efficiency, although the statistical uncertainties were significantly enlarged.
The $Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ values determined by these PID conditions were consistent with those obtained using the optimized PID conditions within uncertainties, indicating \color{black} the \color{black} good reproducibility of the PID analysis in the simulation.
\begin{figure}[hbtp]
\includegraphics[width=\textwidth]{./img/Fig7.eps}
\caption{
Charged particle momentum spectra for the Crun data
with requiring the (a) 1-cluster and (b) 2-cluster in the CsI(Tl) calorimeter
and (c) without \color{black} any \color{black} CsI(Tl) constraint.
The black dots are the experimental data.
The solid (green), dashed (blue), and dashed-dotted (magenta) lines are the $K_{e2\gamma}^{\rm SD^+}$, $K_{e2(\gamma)}$, and $K_{\mu2}$ decays, respectively, determined by simulation calculations.
The thick-red lines are the fitted result obtained by adding all decay contributions.
}
\label{fig.SCrun}
\end{figure}
\begin{table}[htbp]
\center
\caption{Summary of the systematic uncertainties for the
$Br(K_{e2 \gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ ratio determination. }
\begin{tabular}{l r}
\hline
Source & Systematic uncertainty \\ \hline
Hole size of CsI(Tl) calorimeter & 0.017\\
CsI(Tl) misalignment & $<0.001$\\
Imperfect reproducibility of photon angular distribution & $<0.001$\\
Accidental backgrounds in CsI(Tl) & 0.004\\
Photon energy threshold of CsI(Tl) & 0.007\\
Photon energy calibration of CsI(Tl) & $<0.001$\\%$<0.0008$\\
Photon timing window & 0.009\\
CsI(Tl) detection efficiency & 0.012\\
AC detection(\color{black}PID) \color{black} efficiency & 0.007\\
PGC detection(\color{black}PID) \color{black} efficiency & 0.007\\
TOF detection(\color{black}PID) \color{black} efficiency & 0.019\\
$K_{\mu2}$ background subtraction & 0.015\\
$K_{e2\gamma}^{\rm SD^+}$ form factor & 0.011\\
$K^+$ stopping distribution
& 0.003\\
Material thickness in the central parts
& $<0.001$\\
Positron momentum resolution & 0.002\\
Magnetic field & 0.002\\
In-flight kaon decay & 0.002\\
\hline
Total & 0.036\\
\hline
\end{tabular}
\label{sys.error.summary}
\end{table}
\section{Systematic uncertainties}
In the present work, the $Br(K_{e2 \gamma}^{\rm SD^+})$ value relative to $Br(K_{e2(\gamma)})$ was obtained by calculating the ratio of the $K_{e2\gamma}^{\rm SD^+}$ and $K_{e2(\gamma)}$ yields, as defined in Eq.~\ref{brform}.
\color{black}The charged particle analysis was \color{black} first \color{black} performed, then the photon measurement was required for the further $K_{e2 \gamma}^{\rm SD^+}$ selection. \color{black}
Therefore, the dominant contributions to the systematic uncertainty are due to the ambiguity of the radiative photon measurement in the $K_{e2 \gamma}^{\rm SD^+}$ decay.
The systematic uncertainties for the $Br(K_{e2 \gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ determination are summarized in Table~\ref{sys.error.summary}.
The imperfect reproducibility of the CsI(Tl) hole structure \color{black}alignment \color{black}with the 12 spectrometer gaps in the simulation can introduce a systematic uncertainty through a change in the photon acceptance.
This effect was estimated by considering the maximum conceivable hole size change of 2~mm.
Since the accidental backgrounds were concentrated in the energy region below 30~MeV, these events are very sensitive to the photon energy cut point.
The cut point was changed from 18~MeV to \color{black}40~MeV\color{black}, and the $Br(K_{e2 \gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ change was interpreted as the uncertainty from this cut point effect.
Although the CsI(Tl) accidental backgrounds were taken into account in the simulation, the CsI(Tl) timing window was relaxed to accept more accidental events.
The timing window of $\pm 50$~ns was intentionally increased up to $\pm 60$~ns, and the $Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ change was adopted as the systematic uncertainty.
\color{black}However, if the window was tightened to reduce the accidental backgrounds, the genuine CsI(Tl) events were also rejected and the systematic effect could not be studied. \color{black}
To check effects from the background intensity fluctuation, the beam background data obtained using the $K_{\mu2}$ events were separated into 4 subsets using time series of the experimental period and \color{black} the \color{black} $Br(K_{e2 \gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ was determined for each background sample.
The variance of the average value was used to estimate this effect.
The momentum dependence of the PID detectors from 200 to 250~MeV/$c$ was measured using the $K_{e3}$ and in-flight $K_{e3}$ events and taken into account in the simulation.
However, its statistical uncertainty introduced a possible change in the efficiency correction, which was regarded as a systematic effect in the efficiency correction.
Also, the statistical uncertainty of the CsI(Tl) efficiency obtained using the $K_{\pi2}$ events was treated as a systematic effect of the photon measurement by the CsI(Tl) calorimeter.
The E36 simulation started from $K^+$ decays at rest and we did not take into account in-flight $K^+$ decay in the simulation, \color{black}because it was not possible to accurately reproduce the $K^+$ stopping process.
The fraction of the in-flight decays was reduced to less than 0.1\% by the TOF1 timing cut.
The variation of results observed when this cut was enforced was used as the contribution to the systematic error from this effect. \color{black}
\color{black}In particular, the $K_{e3}$ decays with non-Gaussian tails were carefully checked with and without the $\pi^0$ requirement using the CsI(Tl) calorimeter. \color{black}
Because the $K_{\mu2}$ backgrounds were subtracted from the observed $K_{e2(\gamma)}$ and $K_{e2\gamma}^{\rm SD^+}$ samples, a mis-understanding of the response function for the $K_{\mu 2}$ momentum determination would introduce a systematic uncertainty.
This effect was estimated by changing the PID conditions around the selected windows.
\color{black}Also, using the MC calculation, \color{black} the effects from \color{black} the $K_{\mu2}$ decays followed by in-flight $\mu^+$ decay were obtained to be negligible\color{black}; they \color{black}can be mainly removed by the tracking information for the momentum determination with additional reduction by the AC and $M_{\rm TOF}^2$ cuts. \color{black}
Since the ($e^+$, $\gamma$) angular correlation and photon energy distributions depend on the $K_{e2 \gamma}^{\rm SD^+}$ form factor, the detector acceptance was affected by the $\lambda$ parameter.
\color{black}The $Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ shift due to a parameter change of $\Delta\lambda=0.1$~\cite{rev_mod} was interpreted as systematic uncertainty. \color{black}
\color{black}Although effects from a $A/V_0$ uncertainty were not serious, the detector acceptance was calculated by varying $\Delta (A/V_0)=0.1$ and treated as a systematic uncertainty. \color{black}
In addition, effects from a misunderstanding of the $K^+$ stopping distribution and TGT thickness, inaccuracy of the $K^+$ vertex position and $e^+$ momentum determinations, etc. were evaluated, but these effects were common for the $K_{e2(\gamma)}$ and $K_{e2\gamma}^{\rm SD^+}$ decays and cancelled out in their ratio.
The total size of the systematic uncertainty in the $Br(K_{e2\gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})$ determination was thus obtained by adding each item in quadrature to be
0.036.
\section{Result}
The $K_{e2\gamma}^{\rm SD^+}$ branching ratio
relative to the $K_{e2(\gamma)}$ decay was determined using the Prun and Crun analysis results with \color{black}a total of $574\pm 30$ $K_{e2\gamma}^{\rm SD^+}$ events, \color{black}and an error-weighted average of these values was adopted as the final result by adding the total size of the systematic uncertainties,
$Br(K_{e2 \gamma}^{\rm SD^+})/Br(K_{e2(\gamma)})=1.12\pm0.07_{\rm{stat}}\pm0.04_{\rm{syst}}$.
The $Br(K_{e2 \gamma}^{\rm SD^+})$ value relative to the $K_{\mu2}$ decay can be expressed as
\begin{eqnarray}
\frac{Br(K_{e2 \gamma}^{\rm SD^+})}{Br(K_{\mu2})}=\frac{Br(K_{e2 \gamma}^{\rm SD^+})}{Br(K_{e2(\gamma)})} \times
\frac{Br(K_{e2(\gamma)})}{Br(K_{\mu2})}= \frac{Br(K_{e2 \gamma}^{\rm SD^+})}{Br(K_{e2(\gamma)})} \times R_K^{\rm SM}
\end{eqnarray}
using the $R_K^{\rm SM}$ prediction.
Therefore, the $Br(K_{e2 \gamma}^{\rm SD^+})/Br(K_{\mu2})$ value is derived to be $(2.77 \pm 0.17_{\rm{stat}} \pm 0.10_{\rm{syst}}) \times10^{-5}$.
Next, the partial fraction of the $K_{e2 \gamma}^{\rm SD^+}$ branching ratio in the phase space region ($p>200$~MeV/$c$, $E_{\gamma}>10$~MeV) is obtained by correcting for the phase space reduction \color{black}calculated assuming the form factor parameters used in the analysis,
\begin{eqnarray}
\color{black}R_{\gamma}=\color{black}
\frac{Br(K_{e2\gamma}^{\rm SD^+},
~{p>200~{\rm MeV}/c},
~{E_\gamma>10~{\rm MeV}})}{Br(K_{\mu2})}
=(1.85 \pm 0.11_{\rm{stat}} \pm 0.07_{\rm{syst}})
\times10^{-5},
\end{eqnarray}
\color{black}where the systematic effect of this phase space reduction due to the form factor uncertainty is estimated to be 0.007$\times 10^{-5}$ and is already included.
\color{black}This result is almost 25\% ($\sim$2.5$\sigma$) higher than the result\color{black}, $(1.483 \pm 0.066_{\rm{stat}} \pm \color{black}0.013\color{black}_{\rm{syst}})\times 10^{-5}$, reported in the previous experimental study~\cite{KLOE2009} which supported \color{black}the theoretical models of ChPT-${\cal O}(p^4)$, $R_{\gamma}=1.477\times10^{-5}$~\cite{biji}, and ChPT-${\cal O}(p^6)$~\cite{chiPT-2008}. \color{black}On the other hand, the present result is in agreement with the recent lattice calculation, $(1.74 \pm 0.21)\times 10^{-5}$~\cite{lattice_cal}. \color{black}
\section*{Acknowledgements}
We would like to express our gratitude to all members of the J-PARC Accelerator, Cryogenic, and Hadron Experimental Facility groups for their support.
\color{black} A. Kobayashi has made some very major contributions to the data analysis for this experiment and the entire collaboration approves its submission as his doctoral dissertation at Chiba University.
\color{black}
The present work was supported by JSPS KAKENHI Grant numbers JP26287054, JP15K05113, JP22340059, and JP23654088 in Japan; by NSERC (SAPPJ-2017-00034) and NRC (TRIUMF) in Canada; by Department of Energy (DOE) DE-SC0003884, DE-SC0013941, US National Science Foundation (NSF) PHY-1505615 in the United States; and by Russian Science Foundation Grant No. 14-12-00560 in Russia.
|
\section{\@startsection{section}{1}%
\z@{4\linespacing\@plus\linespacing}{\linespacing}%
{\bfseries\centering}}
\def\introsection{\@startsection{section}{1}%
\z@{3\linespacing\@plus\linespacing}{\linespacing}%
{\bfseries\centering}}
\def\subsection{\@startsection{subsection}{2}%
\z@{1.25\linespacing\@plus.7\linespacing}{.5\linespacing}%
{\normalfont\bfseries}}
\def\subsectionsinline{\def\subsection{\@startsection{subsection}{2}%
\z@{1\linespacing\@plus.7\linespacing}{-.5em}%
{\normalfont\bfseries}}}
\def\def\rem##1{\relax}\def\refrem##1{\relax}{\def\rem##1{\relax}\def\refrem##1{\relax}}
\def\qed\vskip1.5em{\qed\vskip1.5em}
\newenvironment{qedequation}{%
\pushQED{\qed}%
\incr@eqnum
\mathdisplay@push
\st@rredfalse \global\@eqnswtrue
\mathdisplay{equation}%
}{%
\endmathdisplay{equation}%
\mathdisplay@pop
\ignorespacesafterend
\popQED\@endpefalse
}
\makeatother
\theoremstyle{definition}
\newtheorem{definition}[equation]{Definition}
\newtheorem{example}[equation]{Example}
\newtheorem{problem}[equation]{\color{blue}Problem}
\newtheorem{exercise}[equation]{Exercise}
\newtheorem{question}[equation]{\color{blue}Question}
\newtheorem{project}[equation]{\color{blue}Project}
\newtheorem{construction}[equation]{Construction}
\newtheorem{task}[equation]{\color{blue}Task}
\newtheorem{otask}[equation]{\color{green}Obsolete Task}
\newtheorem*{definition*}{Definition}
\newtheorem*{example*}{Example}
\newtheorem*{problem*}{\color{blue}Problem}
\newtheorem*{exercise*}{Exercise}
\newtheorem*{question*}{\color{blue}Question}
\newtheorem*{project*}{\color{blue}Project}
\newtheorem*{construction*}{Construction}
\theoremstyle{remark}
\newtheorem{note}[equation]{Note}
\newtheorem{notation}[equation]{Notation}
\newtheorem{remark}[equation]{Remark}
\newtheorem{data}[equation]{Data}
\newtheorem*{note*}{Note}
\newtheorem*{notation*}{Notation}
\newtheorem*{remark*}{Remark}
\newtheorem*{data*}{Data}
\theoremstyle{plain}
\newtheorem{theorem}[equation]{Theorem}
\newtheorem{corollary}[equation]{Corollary}
\newtheorem{lemma}[equation]{Lemma}
\newtheorem{proposition}[equation]{Proposition}
\newtheorem{conjecture}[equation]{Conjecture}
\newtheorem{claim}[equation]{Claim}
\newtheorem{proposal}[equation]{Proposal}
\newtheorem{conclusion}[equation]{Conclusion}
\newtheorem{hypothesis}[equation]{Hypothesis}
\newtheorem{assumption}[equation]{Assumption}
\newtheorem*{theorem*}{Theorem}
\newtheorem*{corollary*}{Corollary}
\newtheorem*{lemma*}{Lemma}
\newtheorem*{proposition*}{Proposition}
\newtheorem*{conjecture*}{Conjecture}
\newtheorem*{claim*}{Claim}
\newtheorem*{proposal*}{Proposal}
\newtheorem*{conclusion*}{Conclusion}
\newtheorem*{hypothesis*}{Hypothesis}
\newtheorem*{assumption*}{Assumption}
\newenvironment{proof*}[1][\proofname]{
\begin{proof}[#1]}{ \renewcommand\qedsymbol{\relax}
\end{proof}}
\numberwithin{equation}{section}
\newcommand{\rem}[1]{\marginnote%
[$\bf\color{blue}\Rightarrow$]{$\bf\color{blue}\Leftarrow$}\relax[{\tiny
\color{blue}\bf #1}]}
\definecolor{refkey}{rgb}{0,.6,.4}
\newcommand{\refrem}[1]{\marginnote%
[$\bf\color{refkey}\Rightarrow$]{$\bf\color{refkey}\Leftarrow$}\relax[{\tiny
\color{refkey} \bf #1}]}
\renewcommand{\:}{\colon}
\renewcommand{\AA}{{\mathbb A}}
\newcommand{{\hat A}}{{\hat A}}
\DeclareMathOperator{\Aut}{Aut}
\newcommand{{\mathbb C}}{{\mathbb C}}
\newcommand{{\mathbb C\mathbb P}}{{\mathbb C\mathbb P}}
\DeclareMathOperator{\Conf}{Conf}
\DeclareMathOperator{\Diff}{Diff}
\newcommand{\mathbb E}{\mathbb E}
\newcommand{\mathbb F}{\mathbb F}
\DeclareMathOperator{\End}{End}
\DeclareMathOperator{\Free}{Free}
\newcommand{{\mathbb H}}{{\mathbb H}}
\DeclareMathOperator{\Hom}{Hom}
\DeclareMathOperator{\id}{id}
\DeclareMathOperator{\Ker}{Ker}
\DeclareMathOperator{\Map}{Map}
\DeclareMathOperator{\Met}{Met}
\newcommand{{\mathbb N}}{{\mathbb N}}
\newcommand{{\mathbb P}}{{\mathbb P}}
\DeclareMathOperator{\pt}{pt}
\newcommand{{\mathbb Q}}{{\mathbb Q}}
\newcommand{{\mathbb R\mathbb P}}{{\mathbb R\mathbb P}}
\newcommand{{\mathbb R}}{{\mathbb R}}
\newcommand{\mathbb T}{\mathbb T}
\DeclareMathOperator{\Spin}{Spin}
\DeclareMathOperator{\Tor}{Tor}
\DeclareMathOperator{\Trs}{Tr\rule[-165000sp]{0pt}{0pt} _s}
\DeclareMathOperator{\Tr}{Tr}
\DeclareMathOperator{\tr}{tr}
\DeclareMathOperator{\trs}{tr\rule[-165000sp]{0pt}{0pt} _s}
\newcommand{{\mathbb Z}}{{\mathbb Z}}
\DeclareMathOperator{\ch}{ch}
\newcommand{\raise.5ex\hbox{$\chi$}}{\raise.5ex\hbox{$\chi$}}
\newcommand{S^1}{S^1}
\DeclareMathOperator{\coker}{coker}
\newcommand{{\overline\partial}}{{\overline\partial}}
\DeclareMathOperator{\free}{free}
\DeclareMathOperator{\ind}{ind}
\newcommand{^{-1}}{^{-1}}
\DeclareRobustCommand{\rule[-165000sp]{0pt}{0pt}}{^{\vphantom{1*\prime y\vee M}}}
\newcommand{_{\vphantom{1*\prime y}}}{_{\vphantom{1*\prime y}}}
\DeclareMathOperator{\rank}{rank}
\newcommand{\res}[1]{\negmedspace\bigm|\rule[-165000sp]{0pt}{0pt}_{#1}}
\newcommand{\Res}[1]{\negmedspace\Bigm|\rule[-165000sp]{0pt}{0pt}_{#1}}
\newcommand{\raise3.5pt\hbox{\boxed{ }}}{\raise3.5pt\hbox{\boxed{ }}}
\DeclareMathOperator{\tor}{tor}
\newcommand{\zmod}[1]{{\mathbb Z}/#1{\mathbb Z}}
\newcommand{\zmod{n}}{\zmod{n}}
\newcommand{\zmod2}{\zmod2}
\newcommand{\theprotag}[2]{#2~#1}
\newcommand{\lhook\joinrel\longrightarrow}{\lhook\joinrel\longrightarrow}
\DeclareMathOperator{\SO}{SO}
\DeclareMathOperator{\Sp}{Sp}
\let\O\relax
\DeclareMathOperator{\O}{O}
\DeclareMathOperator{\U}{U}
\DeclareMathOperator{\SU}{SU}
\DeclareMathOperator{\GL}{GL}
\DeclareMathOperator{\SL}{SL}
\DeclareMathOperator{\PSL}{PSL}
\DeclareMathOperator{\PGL}{PGL}
\DeclareMathOperator{\PSU}{PSU}
\DeclareMathOperator{\PU}{PU}
\renewcommand{\thesubsection}{\thesection.\arabic{subsection}}
\usepackage[all,2cell]{xy}\renewcommand{S^1}{\ensuremath{S^1}}
\usepackage[colorlinks,backref=page,citecolor=refkey]{hyperref}
\let\O\relax\DeclareMathOperator{\O}{O}
\DeclareMathOperator{\Bord}{Bord}
\DeclareMathOperator{\Cliff}{Cliff}
\DeclareMathOperator{\Det}{Det}
\DeclareMathOperator{\Ell}{Ell}
\DeclareMathOperator{\Euler}{Euler}
\DeclareMathOperator{\Fix}{Fix}
\DeclareMathOperator{\Fred}{Fred}
\DeclareMathOperator{\Imm}{Im}
\DeclareMathOperator{\Line}{Line}
\DeclareMathOperator{\Sign}{Sign}
\DeclareMathOperator{\Sym}{Sym}
\DeclareMathOperator{\Todd}{Todd}
\DeclareMathOperator{\Vect}{Vect}
\DeclareMathOperator{\Vol}{Vol}
\DeclareMathOperator{\ad}{ad}
\DeclareMathOperator{\curv}{curv}
\DeclareMathOperator{\hol}{hol}
\DeclareMathOperator{\image}{image}
\DeclareMathOperator{\ord}{ord}
\DeclareMathOperator{\pfaff}{pfaff}
\DeclareMathOperator{\pr}{pr}
\DeclareMathOperator{\sign}{sign}
\DeclareMathOperator{\spec}{spec}
\newcommand{\mathfrak{A}_{\mathscr{P}}}{\mathfrak{A}_{\mathscr{P}}}
\newcommand{B\!\SO}{B\!\SO}
\newcommand{\Bord_{\langle d,d+1 \rangle}}{\Bord_{\langle d,d+1 \rangle}}
\newcommand{\Cliff_{\pm n}}{\Cliff_{\pm n}}
\newcommand{\Cliff_{-n}}{\Cliff_{-n}}
\newcommand{\Cliff_{+n}}{\Cliff_{+n}}
\newcommand{\Cliff_{n}}{\Cliff_{n}}
\newcommand{\Fred_n}{\Fred_n}
\newcommand{\mathbf{Man}_n}{\mathbf{Man}_n}
\newcommand{\PP\mathscr{H}}{{\mathbb P}\mathscr{H}}
\newcommand{\RR/\ZZ}{{\mathbb R}/{\mathbb Z}}
\newcommand{\RR^n}{{\mathbb R}^n}
\newcommand{\mathbf{Set}}{\mathbf{Set}}
\newcommand{\Vect_k}{\Vect_k}
\newcommand{\partial X}{\partial X}
\newcommand{\mathscr{C}_{\mathscr{P}}}{\mathscr{C}_{\mathscr{P}}}
\newcommand{\et}[1]{\eta \rule[-165000sp]{0pt}{0pt} _{#1}}
\newcommand{\evo}[2]{e^{-i(t_{#1}-t_{#2})H/\hbar}}
\newcommand{\hooklongrightarrow}{\lhook\joinrel\longrightarrow}
\newcommand{^{\textnormal op}}{^{\textnormal op}}
\newcommand{^{(q)}}{^{(q)}}
\newcommand{\mathcal{A}}{\mathcal{A}}
\newcommand{\mathscr{B}}{\mathscr{B}}
\newcommand{\mathscr{C}}{\mathscr{C}}
\newcommand{\mathscr{E}}{\mathscr{E}}
\newcommand{\mathscr{G}}{\mathscr{G}}
\newcommand{\mathscr{H}}{\mathscr{H}}
\newcommand{\mathcal{L}}{\mathcal{L}}
\newcommand{\mathscr{M}}{\mathscr{M}}
\newcommand{\mathcal{O}}{\mathcal{O}}
\newcommand{\mathscr{P}}{\mathscr{P}}
\newcommand{\mathscr{S}}{\mathscr{S}}
\newcommand{\mathscr{F}}{\mathscr{F}}
\newcommand{\sect}[1]{\mathcal{L}(#1)}
\newcommand{\mathfrak{A}}{\mathfrak{A}}
\newcommand{\widetilde{D}}{\widetilde{D}}
\newcommand{\widetilde{E}}{\widetilde{E}}
\newcommand{\widetilde{G}}{\widetilde{G}}
\newcommand{\widetilde{X}}{\widetilde{X}}
\newcommand{\tilde{c}}{\tilde{c}}
\newcommand{\widetilde{\sH}}{\widetilde{\mathscr{H}}}
\newcommand{\xia}[1]{\xi \rule[-165000sp]{0pt}{0pt} _{#1}}
\newcommand{\zeta \mstrut _\Delta }{\zeta \rule[-165000sp]{0pt}{0pt} _\Delta }
\renewcommand{\Im}{\Imm}
\renewcommand{\Re}{\text{Re}}
\renewcommand{\SS}{\mathbb{S}}
\begin{document}
\abovedisplayskip18pt plus4.5pt minus9pt
\belowdisplayskip \abovedisplayskip
\abovedisplayshortskip0pt plus4.5pt
\belowdisplayshortskip10.5pt plus4.5pt minus6pt
\baselineskip=15 truept
\marginparwidth=55pt
\makeatletter
\renewcommand{\tocsection}[3]{%
\indentlabel{\@ifempty{#2}{\hskip1.5em}{\ignorespaces#1 #2.\;\;}}#3}
\renewcommand{\tocsubsection}[3]{%
\indentlabel{\@ifempty{#2}{\hskip 2.5em}{\hskip 2.5em\ignorespaces#1%
#2.\;\;}}#3}
\renewcommand{\tocsubsubsection}[3]{%
\indentlabel{\@ifempty{#2}{\hskip 5.5em}{\hskip 5.5em\ignorespaces#1%
#2.\;\;}}#3}
\def\@makefnmark{%
\leavevmode
\raise.9ex\hbox{\fontsize\sf@size\z@\normalfont\tiny\@thefnmark}}
\def\textsuperscript{\tiny\color{red},}{\textsuperscript{\tiny\color{red},}}
\def\footref#1{$\textsuperscript{\tiny\ref{#1}}$}
\makeatother
\setcounter{tocdepth}{2}
\title[Atiyah-Singer Index Theorem]{The Atiyah-Singer Index Theorem}
\author[D. S. Freed]{Daniel S.~Freed}
\thanks{This material is based upon work supported by the National Science
Foundation under Grant Number DMS-2005286.}
\address{Department of Mathematics \\ University of Texas \\ Austin, TX
78712}
\email{<EMAIL>}
\dedicatory{In memory of Michael Atiyah}
\date{July 7, 2021}
\begin{abstract}
The Atiyah-Singer index theorem, a landmark achievement of the early 1960s,
brings together ideas in analysis, geometry, and topology. We recount some
antecedents and motivations; various forms of the theorem; and some of its
implications, which extend to the present.
\end{abstract}
\maketitle
{\small
\defReferences{References}
\renewcommand{\tocsection}[3]{%
\begingroup
\def\tmp{#3
\ifx\tmpReferences
\indentlabel{\phantom{1}\;\;} #3%
\else\indentlabel{\ignorespaces#1 #2.\;\;}#3%
\fi\endgroup}
\tableofcontents
}
\section{Introduction}\label{sec:1}
Consider the Riemann sphere ${\mathbb C\mathbb P}^1={\mathbb C}\cup\{\infty \}$. Let
$\{z_i\}_{i=1}^N\subset {\mathbb C\mathbb P}^1$ be a finite set, and to each $i\in \{1,\dots
,N\}$ suppose a nonzero integer~$n_i$ is given. A classical problem asks for
a meromorphic function~$f$ with a zero or pole at each~$z_i$. If $n_i>0$,
then $z_i$~is a zero of multiplicity~$n_i$; if $n_i<0$, then $z_i$~is a pole
of order~$|n_i|$. The solution is straightforward. Namely,
$f(z)=c\prod(z-z_i)^{n_i}$ is a rational function, unique up
to the constant~$c\in {\mathbb C}\setminus \{0\}$. In other words, now
allowing~$f\equiv 0$, the solutions form a one-dimensional complex vector
space. If we replace~${\mathbb C\mathbb P}^1$ by a closed Riemann surface of positive genus,
then there is an obstruction to existence of a meromorphic function with
specified zeros and poles. For example, an elliptic curve can be realized as
a quotient $E={\mathbb C}/({\mathbb Z}+{\mathbb Z}\tau )$ of the complex line by the full lattice
generated by~$1,\tau $ for some~$\tau \in {\mathbb C}$ with $\Im\tau >0$. A
meromorphic function on~$E$ lifts to a doubly periodic function on~${\mathbb C}$, and
the single constraint on the zeros and poles of a meromorphic function is
$\sum n_iz_i\in {\mathbb Z}+{\mathbb Z}\tau $. Proceeding from~$E$ to a
general closed Riemann surface~$X$, we encounter more constraints. In fact,
the constraints form a vector space whose dimension is the genus of~$X$, a
topological invariant. Meromorphic functions are solutions to the
Cauchy-Riemann equation, a linear elliptic partial differential equation.
The solutions and obstructions to this elliptic PDE are ``counted'' via
topology. In a more general form, this is the classical Riemann-Roch
theorem.
The Atiyah-Singer index theorem, formulated and proved in 1962--3, is a vast
generalization to arbitrary elliptic operators on compact manifolds of
arbitrary dimension. The Fredholm index in question is the dimension of the
kernel minus the dimension of the cokernel of a linear elliptic operator.
The Atiyah-Singer theorem computes the index in terms of topological
invariants of the operator and topological invariants of the underlying
manifold. The theorem weaves together concepts and results in algebraic
topology, algebraic geometry, differential geometry, and linear analysis; its
ramifications go far beyond, in number theory, representation theory,
operator algebras, nonlinear analysis, and theoretical physics. Furthermore,
index theory itself is a sprawling enterprise. The basic Atiyah-Singer
theorem spawned numerous generalizations and novel pathways. This paper---a
tribute to Michael Atiyah---naturally focuses on aspects of his work and his
influence. Even thus restricted, we can only skim the surface of this rich
story.
There are antecedents of the index theorem from algebraic geometry and
topology on the one hand, and from analysis on the other. We discuss these
in turn in~\S\ref{sec:2} and~\S\ref{sec:3}. The basic Atiyah-Singer theorem
is the subject of~\S\ref{sec:4}. The first proof is based on cobordism and
in broad outline follows Hirzebruch's proofs of his signature and
Riemann-Roch theorems. The second proof is based on $K$-theory; it is
inspired by Grothendieck's Riemann-Roch theorem. In~\S\ref{sec:5} we take up
some of the extensions and variations of the basic theorem. These include an
equivariant index theorem, the index theorem for parametrized families of
operators, the index theorem for manifolds with boundary, and a few more. At
this point our exposition makes a transition from global topological
invariants of general linear elliptic operators to local geometric invariants
of Dirac operators. Heat equation methods are the subject of~\S\ref{sec:6},
the first application being a local index theorem. New geometric invariants
of Dirac operators appear in~\S\ref{sec:7}. In~\S\ref{sec:8} we turn to
physics, which was Atiyah's focus after the mid 1980's and which provided an
unanticipated playground for the circle of ideas surrounding the index
theorem. We focus on anomalies in quantum theory, a subject to which Atiyah
and Singer made an early contribution.
Each section of this paper has more introductory material, which we recommend
even to the casual reader. Also, a lecture based on this paper may be viewed
at~\cite{F1}.
Michael had great mathematical and personal charisma. His writings capture
his vibrancy, as did his lectures, some of which are available online. He
wrote many wonderful expository articles about the index theorem, especially
of the early period; you will enjoy perusing them.
I warmly thank Simon Donaldson, Charlie Reid, and Graeme Segal for their
careful reading of and comments on an earlier version.
\section{Antecedents and motivations from algebraic geometry and topology}\label{sec:2}
Enumerative problems in algebraic geometry often lead to integers that have a
topological interpretation. A classical example is the Riemann-Roch formula,
which is our starting point in~\S\ref{subsec:2.1}. The higher dimensional
generalization was taken up by Fritz Hirzebruch in the early 1950's, as we
recount in~\S\ref{subsec:2.3}. A few years later Alexander Grothendieck
extended Hirzebruch's theorem to a relative version, that is, to proper maps
of complex manifolds. In the process he introduced $K$-theory for sheaves.
His ideas, briefly presented in~\S\ref{subsec:2.2}, play a fundamental role
in variations of the Atiyah-Singer index theorem a decade later.
More immediately, as Graeme Segal writes in this volume~\cite{Seg4}, Atiyah
and Hirzebruch transported Grothendieck's $K$-theory over to algebraic
topology. Raoul Bott's computation of the stable homotopy groups of Lie
groups, which took place during the same period as Hirzebruch's and
Grothendieck's work on the Riemann-Roch theorem, is the cornerstone of their
theory. Crucial for the index theorem are the resulting integrality
theorems, of which we mention a few in~ \S\ref{subsec:2.4}. This led to a
question---Why is the ${\hat A}$-genus an integer for a spin manifold?---which
in early 1962 was the immediate catalyst for Atiyah and Singer's
collaboration.
\subsection{The Riemann-Roch theorem}\label{subsec:2.1}
Let $X$ be a smooth projective curve over~${\mathbb C}$, i.e., a one-dimensional
closed complex submanifold of a complex projective space. A divisor~$D$ is a
finite set of points on~$X$ with an integer~$\ord_x(D)$ attached to each
point~$x\in D$. A divisor determines a holomorphic line bundle on~$X$; let
$\sect D$~denote the space of holomorphic sections of this bundle. We can
describe~$\sect D$ as the space of meromorphic functions on~$X$ which have a
pole of order~ $\le \ord_x(D)$ at each~$x\in X$. A basic problem in the
theory of curves is: Compute the dimension of~$\sect D$. While this is quite
difficult in general, there is a {\it topological\/} formula for $\dim\sect D
- \dim\sect{K-D}$, where $K$~is a \emph{canonical divisor} of~$X$. (The zero
set of a holomorphic 1-form, weighted by the orders of the zeros, is a
canonical divisor.)
\begin{theorem}[Riemann-Roch]\label{thm:2}
Let $X$~be a smooth projective curve and let $D$~be a divisor on~$X$. Then
\begin{equation}\label{eq:1}
\dim\sect D - \dim\sect{K-D} = \deg(D) -g + 1.
\end{equation}
\end{theorem}
\noindent
Here $g$~is the genus of the curve~$X$, its fundamental topological
invariant, which is defined to be $\frac{1}{2}\rank H^1(X;{\mathbb Z})$. Also,
$\deg(D)=\sum \ord_x(D)$~is the sum of the integers which define the
divisor~$D$. If $\deg(D) > 2g-2$, it can be shown that $\sect{K-D}=0$, so
that in that case \eqref{eq:1}~ provides a complete solution to the problem
of computing $\dim\sect D$. Theorem~\ref{thm:2} is the classical
Riemann-Roch\footnote{Riemann~\cite{Ri} proved the inequality $\dim\sect D
\ge \deg(D) -g + 1$, and then Roch~\cite{Ro} proved the more
precise~\eqref{eq:1}. Sadly, Roch died of tuberculosis at the age of~26,
just months after the 39~year-old Riemann succumbed to tuberculosis.}
formula. The Atiyah-Singer index theorem is a vast generalization
of~\eqref{eq:1}, as we will see.
Let us immediately note one consequence of the Riemann-Roch formula. Take
$D=\mathcal{O}$ to be the trivial divisor consisting of no points. Then $\sect
{\mathcal{O}}$~is the space of constant functions and $\sect K$~is the space of
holomorphic differentials. We deduce from~\eqref{eq:1} that the latter has
dimension~$g$. It follows that $g$~is an integer, i.e., $\rank H^1(X;{\mathbb Z})$
is even. Therefore, one-half the Euler number~$\Euler(X)$ is an integer, our
first example of an {\it integrality theorem}. The proof is noteworthy:
$1-\Euler(X)/2$~is an integer because it is the dimension of a vector space,
namely~$\mathcal{L}(K)$.
In the last decade of the $19^{\textnormal{th}}$~century, Noether, Enriques,
and Castelnuovo generalized the Riemann-Roch inequality and equality to
algebraic surfaces; see~\eqref{eq:4} below.
\subsection{Hirzebruch's Riemann-Roch and Signature
Theorems}\label{subsec:2.3}
We skip far ahead to the years 1945--1954 and the work of young Hirzebruch,
based on two important developments in geometry. The first, initiated by
Leray, is the theory of sheaves. The second are the results in Thom's
thesis, particularly those concerning bordism\footnote{Thom, Hirzebruch, and
many others use `cobordism' in place of `bordism'; Atiyah~\cite{A10}
clarified the relationship.} groups of smooth manifolds.
We state two of Hirzebruch's main results, which are recounted in~\cite{H1}.
Let $X$~be a nonsingular projective variety of complex dimension~$n$ and
$V\to X$~a holomorphic vector bundle. (In our discussion of curves we used
divisors; recall that a divisor determines a holomorphic line bundle, which
makes the link to our formulation here.) Then the cohomology
groups~$H^q(X,V)$ are defined via sheaf theory: $H^0(X,V)$~is the vector
space of holomorphic sections of $V\to X$, and $H^q(X,V)$ for $q\ge1$ are
derived from resolutions of the sheaf of holomorphic sections of $V\to X$.
The cohomology groups are finite dimensional, which can be proved using the
theory of elliptic differential operators and Dolbeault's theorem. (See
\S\S\ref{subsec:3.1}--\ref{subsec:3.2}.) The {\it Euler characteristic\/} is
defined as the alternating sum
\begin{equation}\label{eq:3}
\chi (X,V) = \sum\limits_{q=0}^n\, (-1)^q \dim H^q(X,V).
\end{equation}
As for the case $n=1$ of Riemann surfaces, one often wants to compute $\dim
H^0(X,V)$, but in general $\dim H^0(X,V)$~ depends on more than topological
data. On the other hand, the Euler characteristic~$\chi (X,V)$ does have a
topological formula in terms of the Chern classes~$c_j(X)$ and~$c_k(V)$. The
special case $\dim X = \rank V = 1$ is the classical Riemann-Roch
formula~\eqref{eq:1}. For $X$~a smooth projective algebraic surface ($n=2$)
and $V\to X$~the trivial bundle of rank~$1$, the result is commonly known as
Noether's formula:
\begin{equation}\label{eq:4}
\chi (X) = \frac{1}{12}\bigl( c_1^2(X) + c_2(X)\bigr) [X].
\end{equation}
In~\eqref{eq:4} the Chern classes are evaluated on the fundamental class
of~$X$ given by the natural orientation. The presence of~12 in the
denominator gives an integrality theorem for the Chern numbers of a
projective surface.
The solution to the Riemann-Roch problem for all~$X,V$---that is, the
computation of~\eqref{eq:3}---is one of Hirzebruch's signal achievements.
Hirzebruch's formula is expressed in terms of the Todd polynomials and the
Chern character. Suppose that the tangent bundle $TX=L_1\oplus \dots \oplus
L_n$ splits as a sum of line bundles, and set $y_i = c_1(L_i) \in
H^2(X;{\mathbb Z})$. Then the {\it Todd class\/} is
\begin{equation}\label{eq:5}
\Todd(X) = \prod_{i=1}^n \frac{y_i}{1-e^{-y_i}}.
\end{equation}
This is a cohomology class of (mixed) even degree. Similarly, if $V=K_1\oplus
\dots \oplus K_r$ is a sum of line bundles, with $x_i = c_1(K_i)$, then the
{\it Chern character\/} is
\begin{equation}\label{eq:6}
\ch(V) = \sum\limits_{i=1}^r \,e^{x_i}.
\end{equation}
The splitting principle in the theory of characteristic classes allows us to
extend these definitions to ~$TX\to X$ and~$V\to X$ which are not sums of
line bundles.
\begin{theorem}[Hirzebruch-Riemann-Roch]\label{thm:1}
Let $X$~be a projective complex manifold and let $V\to X$ be a holomorphic
vector bundle. Then
\begin{equation}\label{eq:7}
\chi (X,V) = \Todd(X)\ch(V)[X].
\end{equation}
\end{theorem}
Hirzebruch's second main theorem, which is a step in the proof of
Theorem~\ref{thm:1}, is now called Hirzebruch's Signature Theorem. Let~$X$
be a closed oriented real differentiable manifold of dimension~$4k$ for some
positive integer~$k$. Then there is a nondegenerate symmetric bilinear
pairing on the middle cohomology~$H^{2k}(X;{\mathbb R})$ given by the cup product
followed by evaluation on the fundamental class:
\begin{equation}\label{eq:8}
\begin{aligned} H^{2k}(X;{\mathbb R}) \otimes H^{2k}(X;{\mathbb R}) &\longrightarrow
\quad\;\;\,{\mathbb R}\\ \alpha _1 \quad \;\; \otimes \quad\;\; \alpha_2 \quad\quad
&\longmapsto
(\alpha _1
\smallsmile \alpha_2 )[X]\end{aligned}
\end{equation}
The signature~$\Sign(X)$ of this pairing is called the signature of~$X$.
(The term `index' is used in place of `signature' in older literature.)
Hirzebruch defines the $L$-class as the polynomial in the Pontrjagin
classes of~$X$ determined by the formal expression
\begin{equation}\label{eq:9}
L(X) = \prod_{i=1}^{2k} \frac{y_i}{\tanh y_i},
\end{equation}
where $y_i, -y_i$ are the \emph{Chern roots} of the complexified tangent
bundle.\footnote{The total Pontrjagin class $p(X) = 1 + p_1(X) +
p_2(X)+\cdots $ is defined by the expression $\prod(1 + y_i^2)$.} This is
analogous to~\eqref{eq:5}: one first defines~$L(X)$ in case $TX\otimes {\mathbb C}\to
X$~splits as a sum of complex line bundles.
\begin{theorem}[Hirzebruch Signature Theorem]\label{thm:3}
The signature of a closed oriented smooth manifold~$X$ is
\begin{equation}\label{eq:10}
\Sign(X) = L(X)[X].
\end{equation}
\end{theorem}
\noindent
Hirzebruch's proof uses Thom's bordism theory~\cite{T1} in an essential
way. Both sides of~\eqref{eq:10} are invariant under oriented bordism and
are multiplicative; for the signature, the former is a theorem of
Thom~\cite[\S IV]{T2}. Therefore, it suffices to verify~\eqref{eq:10} on a
set of generators of the (rational) oriented bordism ring, which had been
computed by Thom. The even projective spaces~${\mathbb C\mathbb P}^{2n}$ provide a convenient
set of generators, and the proof concludes with the observation that the
$L$-class is characterized as evaluating to~1 on these generators. The Todd
class enters the proof of Theorem~\ref{thm:1} in a similar manner---its value
on all projective spaces~${\mathbb C\mathbb P}^n$ is 1 and it is characterized by this
property.
\subsection{Grothendieck's Riemann-Roch theorem}\label{subsec:2.2}
The Riemann-Roch-Hirzebruch theorem was extended in a new direction by
Grothendieck~\cite{BS} in 1957. A decisive step was Grothendieck's
introduction of $K$-theory in algebraic geometry. Let $X$~be a smooth
algebraic variety. Define $K(X)$~as the free abelian group generated by
coherent algebraic sheaves on~$X$, modulo the equivalence $\mathscr{F} \sim \mathscr{F}'
+ \mathscr{F}''$ if there is a short exact sequence $0 \to \mathscr{F}' \to \mathscr{F} \to
\mathscr{F}'' \to 0$. One can replace `coherent algebraic sheaves' by `holomorphic
vector bundles' in this definition, and one fundamental result is that the
group~$K(X)$ is unchanged. Thus Chern classes and the Chern character are
defined for elements of~$K(X)$. (Grothendieck refines these to take values
in the {\it Chow ring\/} of~$X$.) If $f\:X\to Y$ is a morphism of varieties,
and $\mathscr{F}$~a sheaf over~$X$, then $R^qf_*(\mathscr{F})$ ~is the sheaf on ~$Y$
associated to the presheaf $U\mapsto H^q(f^{-1} (U),\mathscr{F})$. The assignment
\begin{equation}\label{eq:11}
f_! \: \mathscr{F}\longmapsto \sum (-1)^q R^qf_*(\mathscr{F}) \in K(Y)
\end{equation}
extends to a homomorphism of abelian groups $f_!\: K(X)\longrightarrow K(Y)$,
as can be seen from the long exact sequence in sheaf cohomology.
Now let $f\:X\to Y$ be a {\it proper\/} morphism between
nonsingular irreducible quasiprojective varieties. There is a
pushforward~$f_*$ in cohomology (or on the Chow rings).
\begin{theorem}[Grothendieck-Riemann-Roch]\label{thm:4}
For $z\in K(X)$ we have
\begin{equation}\label{eq:12}
\Todd(Y)\ch\bigl(f_!(z)\bigr) = f_*\bigl( \Todd(X)\ch(z)\bigr).
\end{equation}
\end{theorem}
\noindent
This reduces to Hirzebruch's Theorem~\ref{thm:1} upon taking $Y$ to be a
point and $z$~the $K$-theory class of a holomorphic vector bundle.
One route to the Todd class is the special case in which $f\:X\to Y$ is the
inclusion of a divisor and $z$~is the class of the structure sheaf~$\mathcal{O}_X$.
Then $R^qf_*(\mathcal{O}_X)=0$ for~$q\ge 1$ and $R^0f_*(\mathcal{O}_X)$~is $\mathcal{O}_X$~extended
by zero to~$Y$. Let $L\to Y$~be the line bundle defined by the divisor~$X$.
Observe that $f^*(L)\to X$~is the normal bundle to~$X$ in~$Y$. The exact
sequence of sheaves
\begin{equation}\label{eq:13}
0 \longrightarrow L^{-1} \longrightarrow \mathcal{O}_Y \longrightarrow
f_!\mathcal{O}_X \longrightarrow 0
\end{equation}
leads to the equality
\begin{equation}\label{eq:14}
f_!\mathcal{O}_X = \mathcal{O}_Y - L^{-1}
\end{equation}
in~$K(Y)$.
Set $y=c_1(L)$. Then from~\eqref{eq:14},
\begin{equation}\label{eq:15}
\ch\bigl( f_!(\mathcal{O}_X)\bigr) = 1 - e^{-y}.
\end{equation}
On the other hand
\begin{equation}\label{eq:16}
f_*\bigl(\ch(\mathcal{O}_X)\bigr) = f_*(1) = y.
\end{equation}
Thus $f_*\circ \ch = \ch \circ f_!$ up to the Todd class of~$L$. To check
Theorem~\ref{thm:4} in this case, rewrite~\eqref{eq:12} using the exact
sequence
\begin{equation}\label{eq:127}
0\longrightarrow TX\longrightarrow f^*TY\longrightarrow
f^*L\longrightarrow 0
\end{equation}
of vector bundles on~$X$ and the multiplicativity of the Todd genus:
\begin{equation}\label{eq:128}
\begin{split} \ch\bigl(f_!(z) \bigr) &= f_*\left(
\frac{\Todd(X)}{f^*\Todd(Y)}\,\ch(z) \right) \\ &= f_*\left(
\frac{1}{f^*\Todd(L)}\,\ch(z) \right) \\ &=
\frac{1}{\Todd(L)}\,f_*\bigl(\ch(z) \bigr).\end{split}
\end{equation}
This is what we checked in~\eqref{eq:15} and \eqref{eq:16} for~$z=[\mathcal{O}_X]$.
It is instructive at this stage to consider the inclusion of the zero section
$f\:X\to E$ in a rank~$k$ vector bundle~$\pi \:E\to X$. Then the
sheaf~$f_!\mathcal{O}_X=R^0f_*\mathcal{O}_X $ fits into the exact sequence
\begin{equation}\label{eq:17}
0 \longrightarrow \pi ^*{\textstyle\bigwedge} ^kE^* \longrightarrow \pi
^*{\textstyle\bigwedge} ^{k-1}E^* \longrightarrow \cdots \longrightarrow \pi
^*E^* \longrightarrow \mathcal{O}_E \longrightarrow f_!\mathcal{O}_X \longrightarrow 0
\end{equation}
of sheaves over~$E$. (Compare~\eqref{eq:13}.) Here $E^*$~is the (sheaf of
sections of the) dual bundle to~$\pi \:E\to X$, and the arrows
in~\eqref{eq:17} at~$e\in E$ are contraction by~$e$. Thus in~$K(E)$ we have
\begin{equation}\label{eq:18}
f_!(\mathcal{O}_X) = {\textstyle\bigwedge} ^{\bullet }(E^*),
\end{equation}
where ${\textstyle\bigwedge} ^{\bullet
}(E^*)=\sum\limits_{}(-1)^k{\textstyle\bigwedge} ^kE^*$ in $K$-theory.
Note that $\pi \:E\to X$ is the normal bundle to~$X$ in~$E$.
\subsection{Integrality theorems in topology}\label{subsec:2.4}
One consequence of the Riemann-Roch-Hirzebruch Theorem~\ref{thm:1} is that
the characteristic number on the right hand side of~\eqref{eq:7}, which {\it
a priori\/} is a rational number, is actually an integer. This integer is
identified as a sum and difference of dimensions of vector spaces by the left
hand side. On the other hand, the right hand side is defined for any almost
complex manifold. Hirzebruch was led to ask (as early as 1954) whether the
{\it Todd genus\/} $\Todd(X)[X]$ of an almost complex manifold (much less a
non-algebraic complex manifold) is an integer~\cite{H3}. He also asked
analogous questions for real manifolds. Define the {\it
${\hat A}$-class\/}\footnote{Hirzebruch had previously defined an $A$-class
which differs from the ${\hat A}$-class by a power of~2, hence the
notation~${\hat A}$.} of a real manifold~$X^{4k}$ by the formal expression
\begin{equation}\label{eq:22}
{\hat A}(X) = \prod_{i=1}^{2k} \frac{y_i/2}{\sinh y_i/2},
\end{equation}
where $y_i$~are the Chern roots. This is a polynomial in the Pontrjagin
classes. Then the Todd class of an almost complex manifold can be expressed
as
\begin{equation}\label{eq:23}
\Todd(X) = e^{c_1(X)/2} {\hat A}(X).
\end{equation}
In particular, $\Todd(X)$ depends only on the Pontrjagin classes and the
first Chern class. It is reasonable to speculate that it was~\eqref{eq:23}
which motivated Hirzebruch to introduce the ${\hat A}$-class. Furthermore,
since the second Stiefel-Whitney class~$w_2$ is the mod~2 reduction of~$c_1$,
Hirzebruch asked: if a real manifold~$X^{4k}$ has $w_2(X)=0$, i.e., if $X$~is
a spin manifold, then is ${\hat A}(X)[X]$ an integer?\footnote{In~\cite{H3}
Hirzebruch only asks a less sharp divisibility question (Problem~7 of that
paper). The more precise form came later, along with the more general
question: If a closed real manifold~$X$ admits an element~$c\in H^2(X;{\mathbb Z})$
whose reduction mod~2 is~$w_2(X)$, and $\Todd(X)$~is defined by~\eqref{eq:23}
(with $c$~replacing $c_1(X)$), then is $\Todd(X)[X]$ an integer?} This was
proved true (initially up to a power of~2 in~\cite{BH2}) by Borel and
Hirzebruch~\cite{BH3} in the late 1950's using results of Milnor on
cobordism~\cite{Mi1}.
The integrality proved, the obvious question presented itself:
\begin{equation}\label{eq:24}
\textnormal{What is the integer~${\hat A}(X)[X]$?}
\end{equation}
A first answer to this question came from within algebraic topology, though
not from traditional Eilenberg-MacLane cohomology theory. When Atiyah and
Hirzebruch learned about Grothendieck's work, they immediately set out to
investigate possible ramifications in topology. The first step was to define
$K$-theory for arbitrary CW complexes~$X$~\cite{AH1}. The definition is as
for algebraic varieties, but with `topological vector bundles' replacing
`coherent algebraic sheaves.' The basic building blocks of topology are the
spheres, and the calculation of~$K(S^n)$ quickly reduces to that of the
stable homotopy groups of the unitary group. By a fortunate coincidence Bott
had just computed (in 1957) these homotopy groups~\cite{B1}, ~\cite{B2}. His
{\it periodicity theorem\/} became the cornerstone of the new topological
$K$-theory. What results is a cohomology theory which satisfies all of the
Eilenberg-MacLane axioms save one, the dimension axiom. Thus was born
``extraordinary cohomology.'' $K$-theory is the subject of Graeme Segal's
paper in this volume~\cite{Seg4}.
Returning to the Grothendieck program, Atiyah and Hirzebruch formulated a
version of Riemann-Roch for smooth manifolds ~\cite{AH2}, ~\cite{H2}. Let
$f\:X\to Y$ be a smooth map between differentiable manifolds, and
suppose $f$~is `oriented' in the sense that there exists an element~$c\in
H^2(X;{\mathbb Z})$ with
\begin{equation}\label{eq:19}
c\equiv w_2(X) - f^*w_2(Y) \pmod2.
\end{equation}
Recall that Grothendieck's theorem~\eqref{eq:12} is stated in terms of a map
$f_!\:K(X)\to K(Y)$. In the topological category we cannot push forward
vector bundles, as we could sheaves in the algebraic category, so a new
construction is needed.\footnote{The definition of~$f_!$ was not given in the
original paper~\cite{AH2}; missing was the Thom class in $K$-theory, which is
closely related to the symbol of the Dirac operator. The Dirac operator
enters the story in the collaboration of Atiyah and
Singer~(\S\ref{subsec:4.1}), and then the $K$-theory Thom class and Thom
isomorphism appear in~\cite[\S12]{ABS}. See also the discussion
in~\cite[\S1]{Seg4}.} Here we restrict our attention to embeddings of complex
manifolds to simplify the presentation.\footnote{General case: Embed a closed
manifold~ $X$ in a sphere, and so factor an arbitrary map $f\:X \to Y$ into
an embedding followed by a projection: the composition $X \to S^N\times Y \to
Y$. Bott Periodicity calculates the ``shriek map'' $K(S^N\times Y) \to
K(Y)$. For embeddings of real manifolds (with an orientation of the normal
bundle) Clifford multiplication on spinors replaces ~\eqref{eq:20}.} Then
\eqref{eq:14} ~ and ~\eqref{eq:18}~ motivate the definition of~$f_!$. Let
$\pi \:E \to X$ be the normal bundle of~$X$ in~$Y$. By the tubular
neighborhood theorem, we can identify~$E$ with a neighborhood~$U$ of~$X$
in~$Y$. The {\it Thom complex\/} ~${\textstyle\bigwedge} ^{\bullet }E^*\to
E$ is defined on the total space of~$E$ by contraction
(compare~\eqref{eq:17}):
\begin{equation}\label{eq:20}
0 \longrightarrow \pi ^*{\textstyle\bigwedge} ^kE^*
\xrightarrow{\;\;\iota (e)\;\;} \pi
^*{\textstyle\bigwedge} ^{k-1}E^* \longrightarrow \cdots \longrightarrow
\pi ^*E^* \xrightarrow{\;\;\iota (e)\;\;} E\times {\mathbb C} \longrightarrow 0.
\end{equation}
Notice that \eqref{eq:20} is exact for~$e\not= 0$, so the resulting
$K$-theory element is supported on~$X$. By the tubular neighborhood theorem
it is also defined on~$U$, and extension by zero yields the desired
element~$f_!(1) \in K(Y)$. If $V \to X$ is a vector bundle, then $f_!(V)$~is
defined by tensoring~\eqref{eq:20} with~$\pi ^*V$.
The Atiyah-Hirzebruch Riemann-Roch theorem for smooth manifolds states
\begin{equation}\label{eq:21}
\ch\bigl(f_!(z)\bigr) \Todd(Y) = f_*\bigl( \ch(z)\Todd(X)\bigr), \qquad
z\in K(X).
\end{equation}
Once $f_!$~is defined, the proof is an exercise that compares Thom
isomorphisms in K-theory and cohomology. Specialize now to $Y=\pt$, and
suppose~$w_2(X)=0$. Choose the orientation class~$c\in H^2(X;{\mathbb Z})$ to be
zero. Then for $z=0$ in~\eqref{eq:21} we deduce, in view of~\eqref{eq:23},
that ${\hat A}(X)[X] = f_!(1)\in K(\pt)\cong {\mathbb Z}$ is an integer. This argument
by Atiyah-Hirzebruch provided a new proof of the integrality theorem
for~${\hat A}$, and also a topological interpretation of the
integer~${\hat A}(X)[X]$, so a first answer to~\eqref{eq:24}.
Still, that explanation was not considered satisfactory. As reported by
Atiyah~\cite{A1}, Hirzebruch realized that the signature is the difference in
dimensions of spaces of harmonic differential forms, and he asked for a
similar analytic interpretation of the ${\hat A}$-genus ${\hat A}(X)[X]$. Thus
when Singer arrived for a sabbatical stay in Oxford in January, 1962, the
first question Atiyah asked him was, ``Why is the A-roof genus an integer for
a spin manifold?'' Singer~\cite{S1} responded, ``Michael, why are you asking
me that question? You know the answer to that.'' But Atiyah was looking for
something deeper, and he immediately had Singer hooked. By March the duo was
in possession of the Dirac operator and the index formula. Then, nine months
after that initial conversation, Atiyah and Singer completed the first proof
of their eponymous index theorem.
\section{Antecedents in analysis}\label{sec:3}
The Atiyah-Singer index theorem brings the worlds of algebraic geometry and
algebraic topology together with the worlds of differential geometry and
global analysis. Our introduction to the latter in~\S\ref{subsec:3.1} begins
with foundational theorems about harmonic differential forms and their
relationship to cohomology. Geometric elliptic differential operators on
Riemannian manifolds play a central role. We take up more general elliptic
operators in~\S\ref{subsec:3.2}, where we also recall basic facts about
Fredholm operators. The Fredholm index, an integer-valued deformation
invariant of a Fredholm operator, is the eponymous character of index theory.
In~\S\ref{subsec:3.3} we give the reader an inkling of the activity around
indices of elliptic operators during the years 1920--1963.
\subsection{de Rham, Hodge, and Dolbeault}\label{subsec:3.1}
We begin with the de Rham and Hodge theorems, which exemplify the relationship
between elliptic linear differential equations and topology. Let $X$~be a
smooth $n$-dimensional manifold, and consider the complex of differential
forms
\begin{equation}\label{eq:25}
\Omega ^0(X) \xrightarrow{\;\;d\;\;} \Omega ^1(X)
\xrightarrow{\;\;d\;\;} \cdots \xrightarrow{\;\;d\;\;} \Omega ^n(X),
\end{equation}
where $d$~is the exterior derivative of Elie Cartan. The de Rham cohomology
vector spaces are defined as the quotients
\begin{equation}\label{eq:26}
H^q_{\text{DR}}(X) = \frac{\quad\,\ker \,[d\: \Omega ^q(X) \to \Omega
^{q+1}(X)]}{\image \,[d\: \Omega ^{q-1}(X) \to \Omega ^q(X)]},\qquad
0\le q\le n.
\end{equation}
The theorem de Rham proved in his 1931 thesis~\cite{deR} states that for
each~$q$ there is a natural isomorphism
$H^q_{\text{DR}}(X)\xrightarrow{\;\;\cong \;\;} H^q(X;{\mathbb R})$ of the de Rham
cohomology with real cohomology defined via singular cochains. (This is
modern language; de Rham proved that there is a closed form with specified
periods, unique modulo exact forms.) Notice that $H^q_{\text{DR}}(X)$~is
defined using a differential operator, whereas $H^q(X;{\mathbb R})$~comes from
topology. Hodge, motivated by questions in algebraic geometry, proved that
on a {\it closed Riemannian\/} manifold there is a unique ``best'' form in
each cohomology class. Namely, on an oriented Riemannian manifold~$X$ Hodge
defined a duality operation $*\: \Omega ^q(X)\to \Omega ^{n-q}(X)$, and for
closed manifolds he argued~\cite{Hod} that in each de Rham cohomology class
there is a unique form~$\omega $ satisfying
\begin{equation}\label{eq:27}
d\omega =0,\qquad d(*\omega )=0.
\end{equation}
These {\it harmonic\/} differential forms are solutions to the elliptic
Hodge-Laplace equation
\begin{equation}\label{eq:31}
\Delta \omega = (dd^*+d^*d)\omega =0,
\end{equation}
which on a closed manifold is equivalent to the pair of
equations~\eqref{eq:27}. The number of linearly independent solutions---the
dimension of the vector space~$\mathscr{H}^q(X)$ of solutions---equals a topological
invariant, the Betti number $b_q=\dim H^q(X;{\mathbb R})$. There is a stronger
statement, namely an isomorphism $\mathscr{H}^q(X)\xrightarrow{\;\cong
\;}H^q(X;{\mathbb R})$. Neither statement generalizes to arbitrary elliptic
differential operators; rather, the index theorem in this situation computes
the alternating sum of dimensions of spaces of harmonic forms, a familiar
topological invariant:
\begin{equation}\label{eq:32}
\sum\limits_{q=0}^n (-1)^q\dim\mathscr{H}^q(X) = \Euler(X),
\end{equation}
where $\Euler(X)$~is the Euler number of~$X$. (Compare~\eqref{eq:3}.)
We can express the left hand side of~\eqref{eq:32} as the index of an
elliptic operator, namely
\begin{equation}\label{eq:77}
d+d^*\:\Omega ^{\textnormal{even}}(X)\longrightarrow \Omega
^{\textnormal{odd}}(X).
\end{equation}
Its formal adjoint is $d+d^*\:\Omega ^{\textnormal{odd}}(X)\to \Omega
^{\textnormal{even}}(X)$, and we identify the cokernel of~\eqref{eq:77} with
the kernel of the adjoint. If $\dim X$~is even, then a different
$\zmod2$-grading\footnote{The grading $\Omega ^{\bullet }(X,{\mathbb C})= \Omega
^+(X,{\mathbb C})\oplus \Omega ^-(X,{\mathbb C})$ is the eigenspace decomposition of the
involution~$\tau $ on~$\Omega ^{\bullet }(X,{\mathbb C})$ defined by $\tau (\omega )=
i^{p(p-1)+\ell }*\omega $, where $\dim X=2\ell $.} on complex differential
forms $\Omega ^{\bullet }(X,{\mathbb C})$ leads to another elliptic
operator~\cite[\S6]{AS3}
\begin{equation}\label{eq:78}
d+d^*\:\Omega ^+(X,{\mathbb C})\longrightarrow \Omega ^-(X,{\mathbb C}),
\end{equation}
the \emph{signature operator}, whose index on a closed manifold of dimension
divisible by~4 is the signature of the pairing~\eqref{eq:8}.
Let $X$~be a closed $n$-dimensional complex manifold and $V\to X$ a
holomorphic vector bundle. Then the sheaf cohomology groups~$H^q(X,V)$ used
in~\S\ref{subsec:2.3} are isomorphic to the cohomology groups of the
${\overline\partial}$-complex
\begin{equation}\label{eq:33}
\Omega ^{0,0}(X,V)\xrightarrow{\;\;{\overline\partial}\;\;}\Omega
^{0,1}(X,V)\xrightarrow{\;\;{\overline\partial}\;\;}\cdots \xrightarrow{\;\;{\overline\partial}\;\;}
\Omega ^{0,n}(X,V),
\end{equation}
as was proved by Dolbeault. If $\dim X=1$ then \eqref{eq:33}~reduces to a
single elliptic operator, and for $V\to X$ the line bundle associated to a
divisor~$D$ on~$X$ the vector space~$\mathcal{L}(D)$ of~\S\ref{subsec:2.1} is
naturally isomorphic to the kernel of~${\overline\partial}$. If $X$~is K\"ahler, then
Hodge theory implies that the Dolbeault cohomology vector spaces are
isomorphic to vector spaces of complex harmonic differential forms. Putting
these theorems together, we deduce that on a K\"ahler manifold the
holomorphic Euler characteristic~\eqref{eq:3} is the alternating sum of
dimensions of spaces of harmonic forms. Hirzebruch's Riemann-Roch
Theorem~\ref{thm:1} is a topological formula for this analytic quantity:
\begin{equation}\label{eq:35}
\sum\limits_{q=0}^n \dim\mathscr{H}^{0,q}(X) = \chi (X,V)=\Todd(X)\ch(V)[X].
\end{equation}
As mentioned at the end of~\S\ref{sec:2}, the Signature Theorem can also be
interpreted in terms of harmonic differential forms.
\subsection{Elliptic differential operators and the Fredholm
index}\label{subsec:3.2}
We set up the index problem on a closed $n$-manifold~$X$. Let $E^0,E^1\to X$
be vector bundles over ~$X$, and suppose $P\:C^{\infty}(X,E^0) \to
C^{\infty}(X,E^1)$ is a linear differential operator of order~$m$. In local
coordinates $x^1,\dots ,x^n$ on~$X$, for $u\in C^{\infty}(X,E^0)$ a smooth
section of $E^0\to X$ we have
\begin{equation}\label{eq:28}
Pu = a^{i_1i_2\dots i_m} \frac{\partial^mu}{\partial x^{i_1}\partial
x^{i_2}\cdots \partial x^{i_m}} + \text{lower order terms},
\end{equation}
where $a^{i_1i_2\cdots i_m}$ is a bundle map~$E^0\to E^1$ depending
symmetrically on the~$i_j$, and we sum over the indices~$1\le i_j\le n$.
This highest order term transforms as a tensor under coordinate
changes, so it defines a global bundle map
\begin{equation}\label{eq:29}
\sigma (P)\: \Sym^m(T^*X) \otimes E^0\longrightarrow E^1,
\end{equation}
called the {\it symbol} of~$P$. View $\sigma (P)$ as a homogeneous
polynomial of degree~$m$ in~$T^*X$ with values in~$\Hom(E^0,E^1)$. The
differential operator~$P$ is {\it elliptic\/} if its symbol is invertible;
that is, if for each $x\in X$ and nonzero~$\theta \in T^*_xX$, the linear map
$\sigma (P)(\theta ,\dots ,\theta )\:E^0_x\to E^1_x$ ~is invertible. It
follows from elliptic theory that $P$~has finite dimensional kernel and
cokernel. (This relies on the \emph{compactness} of~$X$.) The
(\emph{Fredholm}) \emph{index} of~$P$ is
\begin{equation}\label{eq:30}
\ind P = \dim\ker P - \dim\coker P.
\end{equation}
Elliptic theory proves that the extension of~$P$ to appropriate Sobolev
spaces is a \emph{Fredholm operator}. Recall that a Fredholm operator
$H^0\to H^1$ is a bounded linear operator between Hilbert spaces which has
closed range, finite dimensional kernel, and finite dimensional cokernel.
(The definition generalizes to Banach spaces and beyond.) The index of a
Fredholm operator is defined\footnote{A linear map $T\:V^0\to V^1$ between
finite dimensional vector spaces is an element of $(V^1)\otimes (V^0)^*$, so
it stands to reason that the sign in~\eqref{eq:30} should have been the
opposite: the dual---or minus---is the domain, not the codomain. The usual
sign convention causes headaches down the road, for example in the theory of
determinants. On the other hand, one could argue for the usual sign
convention by rewriting a single operator as a 2-term complex in degrees~0
and~1, and then the usual sign for the index (as in~\eqref{eq:3}) reduce to~
\eqref{eq:30}.} by~\eqref{eq:30}. The space $\Hom(H^0,H^1)$ of continuous
linear maps has a Banach space structure defined by the operator norm, and
the open subspace $\Fred(H^0,H^1)\subset \Hom(H^0,H^1)$ of Fredholm operators
has nontrivial homotopy groups of unbounded degree. In particular, the index
\begin{equation}\label{eq:34}
\ind \:\pi _0\Fred(H^0,H^1)\longrightarrow {\mathbb Z}
\end{equation}
is an isomorphism. In other words, the numerical index is a complete
deformation invariant of a single Fredholm operator. Furthermore, the action
of compact operators by translation preserves the subspace of Fredholm
operators, hence the index is invariant under this translation.
Elliptic theory implies that the lower order terms of an elliptic
differential operator~\eqref{eq:28} on a smooth manifold are compact relative
to the highest order term, which is essentially the symbol~\eqref{eq:29}. It
follows that the index of an elliptic differential operator is an invariant
of its symbol. Furthermore, a continuous path of elliptic differential
operators induces a continuous path of Fredholm operators and of symbols (in
suitable topologies). The index is unchanged under such deformations and, in
fact, only depends on the homotopy class of the symbol. The Atiyah-Singer
index theorem provides a formula for the index in terms of the homotopy class
of the symbol.
\subsection{Index problems for elliptic operators}\label{subsec:3.3}
There is a long and rich history of index theorems for linear elliptic
problems in the first half of the $20^{\textnormal{th}}$~century. Many are
subsumed by the Atiyah-Singer index theorem and its extension to manifolds
with boundary~(\S\ref{subsec:5.2}). The articles by Agranovich~\cite{Agr}
and Seeley~\cite{Se1} are excellent guides to this history. The first index
theorem is contained in a 1920~paper of Fritz Noether~\cite{N}. (This is
credited in modern references such as~\cite{E,AM}.) Moreover, this paper
seems to be the origin of the Fredholm index. In fact, in the older
literature the following terminology that is sometimes used: a linear
operator is said to obey the `Noether property' if it is Fredholm, in which
case `Fredholm' is reserved for an operator of index zero (which then
satisfies the ``Fredholm alternative'').
One case of Noether's work is an index formula for Toeplitz operators. Let
$S^1\subset {\mathbb C}$ be the unit circle and $f\:S^1\to {\mathbb C}^\times $ a smooth
nonzero complex-valued function. The Toeplitz operator $T_f\:\mathscr{H}\to \mathscr{H}$ is
defined on the Hilbert space~$\mathscr{H}$ of $L^2$~holomorphic functions on the
closure~$\overline{\Omega }$ of the unit disk~$\Omega \subset {\mathbb C}$. By
Fourier series $\mathscr{H}$~sits as a subspace in $\widetilde{\sH}=L^2(S^1,{\mathbb C})$. Let
$i\:\mathscr{H}\hookrightarrow \widetilde{\sH}$ be the inclusion and $\pi
\:\widetilde{\sH}\twoheadrightarrow\mathscr{H}$ the orthogonal projection. Then $T_f=\pi \circ
M_f\circ i$ is the compression of the multiplication operator $M_f\:\widetilde{\sH}\to
\widetilde{\sH}$ to~$\mathscr{H}$.
\begin{theorem}[Noether, 1920]\label{thm:32}
$T_f$~is Fredholm with index minus the winding number of~$f$.
\end{theorem}
\noindent
The reader may wish to compute the index explicitly for $f_n(z)=z^n$, $n\in
{\mathbb Z}$. Theorem~\ref{thm:32}~was rediscovered by Gohberg-Krein~\cite{GK}, and
there are index theorems for Toeplitz operators in arbitrary dimensions, for
example in Boutet de Monvel~\cite{BdM}.
In 1960, Gelfand~\cite{G} observed that the index is a homotopy invariant,
and he posed the general problem of computing a topological formula for the
index. It seems that Atiyah and Singer were unaware of these events in
Russia when they embarked on the journey which led to the index theorem,
though they became aware of them during a visit by Smale to Oxford~\cite{A1}.
Gelfand's paper, and some of its antecedents which solve special cases of the
index problem, are cited at the beginning of the Atiyah-Singer announcement
of their general index theorem~\cite{AS1}.
\section{The index theorem and proofs}\label{sec:4}
We arrive at the Atiyah-Singer index theorem for a single elliptic operator.
It was announced in~\cite{AS1} in~1963. Atiyah-Singer's first proof
(\S\ref{subsec:4.2}), modeled on Hirzebruch's cobordism proofs of his
signature and Riemann-Roch theorems, was not written up by them but rather
was published in Palais~\cite{Pa} as a series of pieces by many contributors
in a volume which remains a valuable reference. The second proof
(\S\ref{subsec:4.4}), modeled more on Grothendieck, appeared in ~1968 in the
first~\cite{AS2} of a series of papers by Atiyah and Singer. Subsequent
papers treat variations and generalizations. We begin in~\S\ref{subsec:4.1}
with the Dirac operator in Riemannian geometry. It is the analogue of Dirac's
operator in Lorentz geometry, and it is central in many contexts in geometry
and physics as well as in general index theory. In a different direction,
pseudodifferential operators play an important role in both proofs of the
index theorem; we give a brief introduction in~\S\ref{subsec:4.3}.
In~\S\ref{subsec:4.5} we list a few early applications of the index theorem.
\subsection{The Dirac operator}\label{subsec:4.1}
In~1928, Dirac~\cite{D} introduced his equation as part of his relativistic
theory of electrons. Dirac worked on Minkowski spacetime. The analogue of
Dirac's line of inquiry for Euclidean space~$\mathbb E^n$ with standard coordinates
$x^1,\dots ,x^n$ asks for a first-order differential operator
\begin{equation}\label{eq:36}
D = \gamma ^1\frac{\partial }{\partial x^1} +\cdots+\gamma
^n\frac{\partial }{\partial x^n}
\end{equation}
whose square is the Laplace operator
\begin{equation}\label{eq:37}
\Delta =-\left\{ \left(\frac{\partial }{\partial x^1}\right)^2 + \cdots
+ \left(\frac{\partial }{\partial x^n}\right)^2 \right\} .
\end{equation}
(In Minkowski spacetime the elliptic Laplace operator~\eqref{eq:37} is
replaced by the hyperbolic wave operator.) Assume that $\gamma ^1,\dots
,\gamma ^n$~are constant functions on~$\mathbb E^n$. Then the differential
equation
\begin{equation}\label{eq:38}
D^2=\Delta
\end{equation}
is equivalent to the system of algebraic equations
\begin{equation}\label{eq:39}
\gamma ^i\gamma ^j + \gamma ^j\gamma ^i = -2\delta ^{ij} = \begin{cases}
-2,&i=j;\\\phantom{-}0,&i\neq j,\end{cases}\qquad 1\le i,j\le n.
\end{equation}
There are no scalar solutions if~$n\ge2$, but there are matrix solutions.
Let\footnote{To define the closely related Clifford algebra~$\Cliff_{+n}$, change
the $-$~ sign in relation~\eqref{eq:39} to a $+$~sign. Both Clifford
algebras appear in~\S\ref{subsec:5.6}.} $\Cliff_{-n}$, the \emph{Clifford
algebra}~\cite{Cl,Ca,BW,Ch,ABS}, be the unital algebra over~${\mathbb R}$ generated
by $\gamma ^1,\dots ,\gamma ^n$ subject to the relations~\eqref{eq:39}. A
matrix solution to~\eqref{eq:39} defines a $\Cliff_{-n}$-module. The \emph{spin
group}~$\Spin_n$ is a double cover of the special orthogonal group~$\SO_n$,
and $\Spin_n$~ is a subgroup of the units in~ $\Cliff_{-n}$, much as $\SO_n$~is a
subgroup of the units in the algebra of $n\times n$~real matrices. Clifford
modules restrict to special representations of~$\Spin_n$ called \emph{spin}
or \emph{spinor} representations.
Why does the spin group enter the quest to identify the integer
${\hat A}(X)[X]$? One key is the formula~\eqref{eq:22} for the ${\hat A}$-genus.
Assuming $n$~is even, the group~ $\Spin_n$ has two distinguished inequivalent
irreducible complex representations~$\SS^0,\SS^1$, and the difference of the
characters of~$\SS^0$ and~$\SS^1$ is an upside down variant of the
${\hat A}$-genus~\eqref{eq:22}, namely
\begin{equation}\label{eq:40}
\prod\limits_{i=1}^{n/2}\frac{\sinh y_i/2}{1/2},
\end{equation}
where now $y_1,\dots ,y_n$ are a basis of characters of a maximal torus
of~$\Spin_n$. Second, the spin condition was known to be related to the
integrality of the ${\hat A}$-genus, as explained in~\S\ref{subsec:2.4}.
Perhaps these considerations led Atiyah and Singer to construct the Dirac
operator on a Riemannian spin manifold. Observe too that on a Riemannian
manifold the square of the first-order differential operator $d+d^*$ is the
Hodge-Laplace operator~\eqref{eq:31}, so in that sense $d+d^*$ is already a
Dirac operator. On a K\"ahler manifold, the same holds for ${\overline\partial} + {\overline\partial}^*$.
\emph{The} Dirac operator on an even dimensional Riemannian spin
manifold~$X^n$ is a main character in the index theorem, so we give the
definition here. Let $\SO(X)\to X$ be the principal $\SO_n$-bundle whose
fiber at~$x\in X$ consists of oriented isometries ${\mathbb R}^n\to T_xX$. The spin
structure is a double cover $\Spin(X)\to\SO(X)$ together with a compatible
principal $\Spin_n$-bundle structure on the composition $\Spin(X)\to\SO(X)\to
X$. Use the complex spin representations~$\SS^0,\SS^1$ to construct
associated complex vector bundles $\SS^{0}_X,\SS^{1}_X\to X$; sections of
these vector bundles are called \emph{spinors} or \emph{spinor fields}. The
Levi-Civita connection on~$X$ induces a covariant derivative~$\nabla $ on
each spinor bundle. The Dirac operator is
\begin{equation}\label{eq:41}
D_X = c\circ \nabla \:C^{\infty}(X,\SS^0_X)\longrightarrow
C^{\infty}(X,\SS^1_X),
\end{equation}
where $c$~is Clifford multiplication, induced from a $\Spin_n$-equivariant
linear map ${\mathbb R}^n\otimes \SS^{0}\to\SS^{1}$. There is also a Clifford
multiplication ${\mathbb R}^n\otimes \SS^1\to \SS^0$, and both together give
$\SS^0\oplus \SS^1$ the structure of a $\Cliff_n$-module. This construction
is not quite canonical, since the irreducible representations~$\SS^0,\SS^1$
are only determined uniquely up to tensoring by a line.
In~\S\ref{subsec:5.6} we introduce the Clifford linear Dirac operator, which
is canonical.
The de Rham~\eqref{eq:25} and Dolbeault~\eqref{eq:33} operators have similar
descriptions, and so \eqref{eq:32}~ and \eqref{eq:35} ~ motivate a
conjectural index formula for the Dirac operator. Let $\mathscr{H}^{\pm}(X)$ be the
complex vector spaces of \emph{harmonic spinors}, i.e., solutions~$\psi $ to
$D\psi =0$. The conjectured index formula is
\begin{equation}\label{eq:42}
\dim\mathscr{H}^+(X) - \dim\mathscr{H}^-(X) = {\hat A}(X)[X].
\end{equation}
For an investigation into various aspects of harmonic spinors, see the DPhil
thesis~\cite{Hi} of Atiyah's student Nigel Hitchin.
\subsection{First proof: cobordism}\label{subsec:4.2}
Let $X$~be a closed oriented manifold; $E^0,E^1\to X$ complex vector bundles;
and $P\:C^{\infty}(X,E^0)\to C^{\infty}(X,E^1)$ an elliptic differential
operator. The \emph{analytic index} of~$P$ is the Fredholm index defined
in~\eqref{eq:30}. The \emph{topological index}---in cohomological form---is
the following. Ellipticity implies that the symbol~$\sigma (P)$
in~\eqref{eq:29} restricted to the nonzero vectors $T^*X\setminus 0$ is an
isomorphism. Therefore, $\sigma (P)$~defines a relative $K$-theory class in
$K^0(T^*X,\,T^*X\setminus 0)$. The Chern character maps $K$-theory to
rational cohomology, and then the inverse of the Thom isomorphism
\begin{equation}\label{eq:43}
\phi \:H^{\bullet }(X;{\mathbb Q})\xrightarrow{\;\;\cong \;\;} H^{\bullet +\dim
X}(T^*X,\,T^*X\setminus 0;\,{\mathbb Q})
\end{equation}
brings us to the cohomology of the base~$X$. The \emph{topological index} is
the cup product of the Todd class of the complexified tangent bundle with the
image of~$\sigma (P)$ under the Chern character and Thom isomorphism. The
index theorem asserts that the analytic and topological indices are equal.
\begin{theorem}[Atiyah-Singer Index Theorem~\cite{AS1}]\label{thm:5}
The index of~$P$ is
\begin{equation}\label{eq:44}
\ind P = \bigl(\Todd(TX\otimes {\mathbb C})\smallsmile \phi ^{-1} \ch \sigma
(P)\bigr)[X].
\end{equation}
\end{theorem}
\noindent
In the remainder of this section we sketch the main ideas which enter the
proof of Theorem~\ref{thm:5}.
\begin{remark}[]\label{thm:6}
The $K$-theoretic formula for the index (\S\ref{subsec:4.4}) is more natural
and lends itself to many generalizations. This fits with Atiyah's philosophy
that $K$-theory, based on linear algebra, is more elementary than cohomology.
Certainly it is the form of algebraic topology which most closely matches
linear differential operators.
\end{remark}
Now to the proof. At the end of~\S\ref{subsec:3.2} we indicated that the
analytic index depends only on the homotopy class of the symbol~$\sigma (P)$.
Atiyah-Singer introduce the abelian group
\begin{equation}\label{eq:45}
\Ell(X) = K^0(T^*X,\,T^*X\setminus 0)
\end{equation}
of elliptic symbol classes. It is a module over the ring~$K^0(X)$, by tensor
product, and the \emph{cyclic} module $K^0(X)\sigma _0$ generated by the symbol
class of the signature operator is a subgroup of finite index. This reduces
the problem on a fixed manifold~$X$ to the signature operator twisted by a
vector bundle $W\to X$. However, to carry through this argument one needs
that every element of~$\Ell(X)$ is the symbol of an elliptic operator, and
furthermore if the symbols of elliptic operators~$P_0,P_1$ define the same
element of~$\Ell(X)$, then there is a homotopy~$P_0\sim P_1$.
\emph{Differential} operators are too rigid for these properties to hold, and
a critical move in the proof is the introduction of \emph{pseudodifferential}
operators, which we discuss briefly in the next section.
\begin{remark}[]\label{thm:7}
If $X$~is a spin manifold, then $\Ell(X)$ is the cyclic $K^0(X)$-module
generated by the symbol of the Dirac operator. This fact is an expression of
Bott periodicity, as realized in $K$-theory.
\end{remark}
Bordism enters the proof at this stage. For the signature operator twisted
by a vector bundle $W\to X$, both sides of~\eqref{eq:44} are viewed as
functions of a pair~$(X,W)$, where we only use the equivalence class $[W]\in
K^0(X)$. A crucial step is the proof that each side is a bordism invariant
of~$(X,W)$. This is straightforward for the cohomological formula on the
right hand side. For the analytic index, suppose $(X,W)$ is the boundary of
a pair~$(Y,U)$, where $Y$~is a compact oriented manifold and $U\to Y$ a
complex vector bundle. Atiyah-Singer introduce an elliptic differential
operator~$D_U$ on~$Y$ whose boundary operator on~$X$ is the twisted signature
operator. They specify a \emph{local} elliptic boundary condition, and prove
(i)~$\ind_YD_U = \ind_X D_W$ and (ii)~$\ind_YD_U=0$. With bordism invariance
in hand, it remains to compute a basis for the rational vector space of
bordism classes of pairs~$(X,W)$ and verify~\eqref{eq:44} for those.
The journey from this rough sketch to a complete proof is replete with
interesting detours in analysis, geometry, and topology.
\subsection{Pseudodifferential operators}\label{subsec:4.3}
Let $P$~be a differential operator of order~$m$ on~${\mathbb R}^n$, as
in~\eqref{eq:28}. Its action on a smooth function~$u$ of compact support is
conveniently written in terms of the Fourier transform~$\hat{u}$:
\begin{equation}\label{eq:46}
Pu(x) = (2\pi )^{-n}\int_{{{\mathbb R}^n}^*} p(x,\xi )\,\hat{u}(\xi )\,e^{i\langle
x,\xi \rangle} \,d\xi ,\qquad x\in {\mathbb R}^n,
\end{equation}
where for each~$x\in {\mathbb R}^n$ the function $p(x,\xi )$ is a polynomial of
degree~$m$ in~$\xi \in {{\mathbb R}^n}^*$. A generalization, going back to
Mikhlin~\cite{Mik} and Calder\'on-Zygmund~\cite{CZ}, allows more general
(total) symbols~$p$, with uniform bounds on the behavior of~$p$ and its
derivatives as $|\xi |\to\infty $. One motivation comes from elliptic
operators: a parametrix---an approximate inverse---is a linear operator of
this form. Also, these operators have a Schwartz kernel which is smooth away
from the diagonal, and this leads to good properties. (The Schwartz kernel
of a differential operator is zero off the diagonal.) The theory of
pseudodifferential operators, and their globalization to smooth manifolds, is
treated in papers of Seeley~\cite{Se2,Se3}, H\"ormander~\cite{Ho2,Ho3},
Kohn-Nirenberg~\cite{KN}, and Palais-Seeley~\cite{PS} among others. This is
only a very small sample of the extensive literature.
If $P$~is a differential operator of order~$m$, so $p(x,\xi )$~is a
degree~$m$ polynomial in~$\xi $ for each~$x$, then the \emph{principal} or
\emph{top order} symbol of~$P$ is the homogeneous polynomial of degree~$m$
given as
\begin{equation}\label{eq:47}
\sigma (P)(x,\xi ) = \lim\limits_{\lambda \to\infty }\frac{p(x,\lambda
\xi )}{\lambda ^m}.
\end{equation}
Restrict to pseudodifferential operators with symbol~$p$ for which the
limit~\eqref{eq:47} exists. Then the principal symbol is defined, in global
form~\eqref{eq:29} on a smooth manifold, and ellipticity is as before
invertibility of the principal symbol. The surjectivity and continuity of
the principal symbol map on elliptic pseudodifferential operators are crucial
ingredients in the proof of the index theorem.
We remark that in the Atiyah-Bott~\cite{AB1} and Atiyah-Singer~\cite{AS2,AS4}
papers on index theory, the global theory of pseudodifferential operators is
expanded further.
\subsection{A few applications}\label{subsec:4.5}
One immediate consequence of the Atiyah-Singer Index Theorem~\ref{thm:5} is
the index formula for the Dirac operator~\eqref{eq:42}. This provides an
\emph{analytic} interpretation of the ${\hat A}$-genus of a spin manifold, hence
an answer to~\eqref{eq:24}.
Several additional consequences are described in~\cite{AS1}. As already
mentioned, Hirzebruch's Signature Theorem~\ref{thm:3} is a special case. So
is the Hirzebruch-Riemann-Roch Theorem~\ref{thm:1}, but the more flexible
techniques of Atiyah-Singer prove it for arbitrary closed complex manifolds,
a powerful generalization from projective algebraic manifolds. Finally, for
systems of elliptic operators on~$X$---for $E^0,E^1\to X$ trivial vector
bundles---the index vanishes given appropriate inequalities between~$\dim X$
and $\rank E^0=\rank E^1$, a result which connects Theorem~\ref{thm:5} to the
PDE literature of the period. In particular, the index vanishes for an
elliptic operator acting on a single function.
As new index theorems proliferate, so too do applications, as we will see
in~\S\ref{sec:5}.
\subsection{Second proof: $K$-theory}\label{subsec:4.4}
Recall the pushforward~\eqref{eq:11} which occurs in Grothendieck's version
of the Riemann-Roch theorem. Let $X$~be a compact projective variety. For
the special case of the unique map $f\:X\to\pt$, the pushforward
$f_!\:K(X)\to K(\pt)\cong {\mathbb Z}$ computes the Euler characteristic~\eqref{eq:3}
of a holomorphic vector bundle $V\to X$. According to the Dolbeault Theorem,
the sheaf cohomology groups are isomorphic to the cohomology groups of the
${\overline\partial}$-complex~\eqref{eq:33}. For smooth manifolds and smooth maps,
Atiyah-Hirzebruch found a \emph{topological pushforward} in one of their
first works on $K$-theory, and it is designed to match Grothendieck's~$f_!$
in this situation. (See the text surrounding~\eqref{eq:19}.) There is also
an analytic interpretation. Namely, on a K\"ahler manifold~$X$ the Dolbeault
cohomology group~$H^{0,q}_{{\overline\partial}}(X,V)$ is isomorphic to the kernel of the
elliptic operator ${\overline\partial} + {\overline\partial}^*$ on $(0,q)$-forms, hence the Euler
characteristic~\eqref{eq:3} is the index of
\begin{equation}\label{eq:48}
{\overline\partial}+{\overline\partial}^*\:\Omega ^{0,\textnormal{even}}(X,V) \longrightarrow \Omega
^{0,\textnormal{odd}}(X,V).
\end{equation}
That index is an \emph{analytic pushforward} of $V\to X$ under the map~$f$.
The Riemann-Roch-de Rham-Hodge-Dolbeault-Hirzebruch theorems imply the
equality of analytic and topological pushforwards.
The $K$-theory form of the Atiyah-Singer Index Theorem is a generalization
for arbitrary elliptic (pseudo)differential operators. Recall
from~\S\ref{subsec:4.2} that the ``homotopy class'' of the symbol~$\sigma
(P)$ of an elliptic differential operator~$P$ on a smooth manifold~$X$ is an
element $[\sigma (P)]\in K^0(T^*X, T^*X\setminus 0)$. Atiyah-Singer define two
homomorphisms
\begin{equation}\label{eq:49}
\ind\:K^0(T^*X, T^*X\setminus 0)\longrightarrow {\mathbb Z}.
\end{equation}
The \emph{analytic index} a-ind takes a symbol class~$\sigma $ to the
index~$\ind P$ of any elliptic pseudodifferential operator~$P$ with $[\sigma
(P)]=\sigma $. The \emph{topological index} t-ind is similar to the
topological pushforward. It is based on the Thom isomorphism in $K$-theory,
which in turn rests on Bott periodicity.
\begin{theorem}[Atiyah-Singer~1967]\label{thm:8} a-ind = t-ind.
\end{theorem}
\noindent
This is equivalent to the cohomological Theorem~\ref{thm:5}, but as we will
see in~\S\ref{sec:5} the naturalness of the $K$-theory formulation and proof
lend themselves to many generalizations.
Theorem~\ref{thm:8} is the subject of~\cite{AS2}. There is a concise summary
of the proof idea in~\S1 of that paper, though the actual proof follows a
slightly different arc. In essence, Atiyah-Singer uniquely characterize
``index homomorphisms''~\eqref{eq:49} by a short list of axioms, which they
verify a-ind and t-ind satisfy. Beyond normalization axioms, two main
properties of the index feature in the proof. An \emph{excision axiom}
extends the index to compactly supported symbols on arbitrary (potentially
noncompact) manifolds~$U$, at least if $U$~is embeddable in a compact
manifold, by asserting the independence of the index of the extension by zero
of a compactly supported symbol on~$U$ to a symbol on an ambient compact
manifold. A \emph{multiplicative axiom} tells a product formula for
(twisted) product symbols. A robust global theory of pseudodifferential
operators is used at this point in the proof.
\section{Variations on the theme}\label{sec:5}
After the initial Atiyah-Singer work, index theory branched out in multiple
directions. Atiyah was at the center of many of these developments, which we
can only touch upon in this section. We begin in~\S\ref{subsec:5.1} with
Atiyah-Bott's generalization of the classical Lefschetz fixed point theorem
to elliptic complexes. Its manifold applications include a geometric proof
of Weyl's character formula in the theory of compact Lie groups. The link
between the Atiyah-Singer $K$-theoretic framework for index theory and the
index theory for elliptic operators which preceded it is the extension of the
Atiyah-Singer theorem to compact manifolds with boundary, carried out jointly
with Bott as we recount in~\S\ref{subsec:5.2}. The basic Atiyah-Singer
theorem applies to complex elliptic operators. There is an important
refinement~(\S\ref{subsec:5.3}) to {real} elliptic operators which,
naturally, links to the real version of $K$-theory introduced by Atiyah at
this time. There is a \emph{canonical} real Dirac operator on a Riemannian
spin manifold---perhaps not as oft-used as it deserves to be---so we take
the opportunity in~\S\ref{subsec:5.6} to expose it. Grothendieck's dictum to
do geometry over a base, not just over a point, leads to an index theorem
for families of elliptic operators. As Grothendieck's philosophy promises,
this theorem, described in~\S\ref{subsec:5.4}, appears often in geometry and
physics. Finally, in~\S\ref{subsec:5.5} we introduce an index theorem of
Atiyah's which launched an entirely new branch of the subject, though not one
he himself pursued.
\subsection{Equivariant index theorems}\label{subsec:5.1}
Recall the classical Lefschetz fixed point theorem. Let $X$~be a smooth
compact manifold and $f\:X\to X$ a diffeomorphism with isolated fixed points.
The subset $\Fix(f)\subset X$ is then finite, and our aim might be to compute
its cardinality. But the cardinality is not a deformation invariant---under
deformation pairs of fixed points undergo birth and death---hence there is
not a topological formula. However, if we count with signs, weighting each
$x\in \Fix(f)$ by\footnote{under the assumption that $df_x$~has no nonzero
fixed vectors for all~$x\in \Fix(f)$}
\begin{equation}\label{eq:50}
\epsilon _x=\sign\det(1-df_x)\,\in \{-1,+1\},
\end{equation}
then the Lefschetz fixed point theorem asserts
\begin{equation}\label{eq:51}
\sum\limits_{x\in \Fix(f)}\epsilon _X = \sum\limits_{q=0}^{\dim X}
(-1)^q\Tr\Bigl( f^*\res{H^q(X;{\mathbb R})} \Bigr) ,
\end{equation}
where the right hand side is the alternating sum of traces
of~$f$ acting on the $q^{\textnormal{th}}$~real cohomology.
In~1965, Atiyah and Bott formulated and proved a generalization to elliptic
operators and elliptic complexes. Let $X$~be a closed manifold; $E^0,E^1\to
X$ vector bundles; $f\:X\to X$ a diffeomorphism with isolated fixed points;
$f^i\:E^i\to E^i$, $i=0,1$, lifts of~$f$; and $P\:C^{\infty}(X,E^0)\to
C^{\infty}(X,E^1)$ an elliptic differential operator which commutes
with~$f^i$. Define
\begin{equation}\label{eq:52}
\nu _x = \frac{\Tr\Bigl( f^0\res{E^0_x} \Bigr) - \Tr\Bigl(
f^1\res{E^1_x} \Bigr) }{\bigl| \det(1-df_x) \bigr| },\qquad x\in
\Fix(f).
\end{equation}
\begin{theorem}[Atiyah-Bott~\cite{AB1}]\label{thm:9}
We have
\begin{equation}\label{eq:53}
\sum\limits_{x\in \Fix(f)}\nu _x = \Tr\Bigl(f^0\res{\ker P}\Bigr) -
\Tr\Bigl( f^1\res{\coker P}\Bigr).
\end{equation}
\end{theorem}
\noindent
We will not comment on the proof here, which also involves
pseudodifferential operators, but instead tell some applications.
In their proof of the index theorem modeled after
Grothendieck~(\S\ref{subsec:4.5}), Atiyah-Singer~\cite{AS2} incorporate the
action of a \emph{compact} Lie group~$G$ on an elliptic operator~$P$ on a
compact manifold~$X$. The Atiyah-Bott setup overlaps in case their
diffeomorphism~$f$ of~$X$ generates a (compact) torus of diffeomorphisms. In
the Atiyah-Singer case, since $G$~commutes with~$P$, it acts on~$\ker P$ and
$\coker P$, so the formal difference---the index---is a virtual
representation of~$G$. Hence it defines a class in the representation
ring~$R(G)$. On the other hand, the symbol~$\sigma (P)$ also commutes
with~$G$, and so it defines a class in \emph{equivariant $K$-theory}, an
important extension of topological $K$-theory which was investigated by
Atiyah's student Graeme Segal in his DPhil thesis~\cite{Seg1}. The topological
index t-ind, executed in equivariant $K$-theory, also produces an element
of~$R(G)$. The equivariant extension of Theorem~\ref{thm:8} identifies these
elements of~$R(G)$. Atiyah-Segal~\cite{ASeg} apply the localization theorem
in equivariant $K$-theory~\cite{Seg1} to derive a Lefschetz-type formula, and
in particular they recover Theorem~\ref{thm:9} in case $f$~generates a
compact Lie group (torus) of diffeomorphisms.
These various Lefschetz formul\ae\ have many applications; those
contemporaneously realized with the theorems are presented in~\cite{AB2}
and~\cite{AS3}. Here is a small sample. Let $X$~be a connected closed
complex manifold with $H^q(X;\mathcal{O}_X)=0$ for~$q>0$; then any holomorphic map
$f\:X\to X$ has a fixed point. In a different direction, let $G$~be a
compact connected Lie group and $T\subset G$ a maximal torus. Then
Theorem~\ref{thm:9} applied to the action of a generic element of~$T$ on a
holomorphic line bundle $\mathscr{L}\to G/T$ over the flag manifold leads to
the Weyl character formula. On a compact Riemannian manifold~$X$ one deduces
strong consequences of the generalized Lefschetz theorems using the signature
operator. For example, Atiyah-Bott-Milnor prove that two $h$-cobordant lens
spaces are isometric. Some number theoretic aspects of the Lefschetz formula
for the signature operator are described in the Atiyah-Bott and Atiyah-Singer
papers. These ideas are elaborated much further by
Hirzebruch-Zagier~\cite{HZ}, who explore this Lefschetz signature theorem not
only for lens spaces, but also for projective spaces, Brieskorn varieties,
and algebraic surfaces. They find deep relations with cotangent sums, the
Dedekind eta function, modular forms, and real quadratic fields, among other
number theoretic objects of interest. This link between Lefschetz-type
invariants and number theory is central to the developments in the 1970s, as
we take up in~\S\ref{sec:7}.
\subsection{Index theorem on manifolds with boundary}\label{subsec:5.2}
As discussed in~\S\ref{subsec:3.3}, the study of linear elliptic equations
traditionally takes place on a domain~$\Omega \subset \AA^n$ with smooth
boundary, in which case \emph{elliptic boundary conditions} need be imposed.
($\AA^n$~is the standard real affine $n$-dimensional space.) For the
second-order Laplace operator~\eqref{eq:37} on~$\overline{\Omega }$, the
\emph{Dirichlet problem} is the system of equations
\begin{equation}\label{eq:54}
\begin{aligned} \Delta u&=0 \\ u\res{\partial \Omega }&=f\end{aligned}
\end{equation}
for a prescribed function~$f$ on~$\partial \Omega $. The second equation
in~\eqref{eq:54} is a \emph{local} boundary condition for~$\Delta $: at each
point~$x\in \partial \Omega $ it depends only on~$u(x)$. More generally, a
local boundary condition may depend on a finite set of derivatives of~$u$
at~$x$. Lopatinski~\cite{Lo} gave a general criterion for a local boundary
condition to be elliptic; see~\cite[\S20.1]{Ho1}, for example.
Not all elliptic operators admit local elliptic boundary conditions.
Consider the first-order ${\overline\partial}$-operator on functions $u\:\overline{\Omega
}\to{\mathbb C}$ where $\Omega \subset {\mathbb C}$ is the unit disk. The kernel of~${\overline\partial}$
consists of holomorphic functions on~$\overline\Omega $, an infinite
dimensional vector space, as expected in the absence of elliptic boundary
conditions. For this operator there do not exist \emph{local} elliptic
boundary conditions: the Cauchy-Riemann equations on a disk are ill-posed.
(As we will see in~\S\ref{subsec:7.2}, there are \emph{global} boundary
conditions. Also, if we consider the ${\overline\partial}$-operator on sections of a
vector bundle---as, for example, when studying deformations of holomorphic
disks in a symplectic manifold with boundary on a Lagrangian
submanifold---then there do exist local boundary conditions.) The
topological nature of the existence question for local elliptic boundary
conditions was brought out in work of Atiyah-Bott~\cite{AB3,A2}. Again,
$K$-theory is the natural home for the obstruction. In fact, their work led
to a new proof of the Bott Periodicity Theorem~\cite{AB4}. Let $X$~be a
compact manifold with boundary, and suppose $\sigma \in
K^0(T^*X,\,T^*X\setminus 0)$ is an elliptic symbol class. The obstruction to
local elliptic boundary conditions is the restriction of~$\sigma $
to~$K^0(T^*X\res{\partial X})$, and if the obstruction vanishes then local
elliptic boundary conditions lift~$\sigma $ to an appropriate relative
$K$-theory group. Atiyah-Bott-Singer prove an index theorem for elliptic
operators with local elliptic boundary conditions. The topological index
easily extends to the lifted relative elliptic symbol, and the topological
index of that lifted symbol computes the analytic index of the elliptic
boundary value problem.
\subsection{Real elliptic operators}\label{subsec:5.3}
Consider the operator $D=d/dx$ acting on real-valued functions on~${\mathbb R}/2\pi
{\mathbb Z}$, i.e., on $2\pi $-periodic functions $u\:{\mathbb R}\to{\mathbb R}$. Integration by
parts shows that $D$~is (formally) skew-adjoint. It is an example of a
\emph{real} Dirac operator. A closely related Dirac operator is $D'=d/dx$
acting on twisted functions on the circle, or equivalently $u\:{\mathbb R}\to{\mathbb R}$
which satisfy $u(x+2\pi )=-u(x)$ for all~$x\in {\mathbb R}$. Observe $\ker
D\cong {\mathbb R}$ consists of constant functions, whereas $\ker D'=0$. A
skew-adjoint operator has integer index zero in the sense of~\eqref{eq:30}.
But for skew-adjoint Fredholm operators~$P$, the mod~2 dimension $\dim \ker
P\pmod2$ is a deformation invariant: skew-adjointness implies that nonzero
eigenvalues move in pairs as $P$~deforms, so in particular $\dim\ker P$ can
jump only by even numbers.\footnote{The spectrum of a Fredholm operator need
not be discrete; still, the assertion about the kernel is valid.}
For the Dirac operators~$D,D'$ on the circle, this \emph{mod~2 index}
distinguishes the two spin structures, which we have rendered here in a
concrete form.
The symbol~$p(x,\xi )$ of a \emph{real} elliptic operator~$P$ on~${\mathbb R}^n$, as
a function of $\xi \in {{\mathbb R}^n}^*$, is essentially the Fourier transform of a
real-valued function; see~\eqref{eq:46}. Thus $p$~is a complex-valued
function which satisfies the reality condition
\begin{equation}\label{eq:55}
p(x,-\xi )=\overline{p(x,\xi )}.
\end{equation}
The global symbol~$\sigma (P)$ on a manifold~$X$ is a map of complex vector
bundles~\eqref{eq:29}, and the reality condition~\eqref{eq:55} globalizes to
a complex conjugate isomorphism of the vector bundles which covers the
$(-1)$-involution on~$T^*X$ and commutes with~$\sigma (P)$. This idea led
Atiyah to develop Real $K$-theory~\cite{A3}; see~\cite[\S8]{Seg4}. Building
on this, Atiyah-Singer~\cite{AS5} proved an index theorem for real elliptic
operators. This index theorem covers mod~2 indices, such as the invariant
on~$S^1$ mentioned above, and other cases as well. For example, the natural
integer invariant of the real Dirac operator in dimension four is one-half
the integer index, which leads to an analytic proof of a theorem of
Rokhlin~\cite{Roh}: the signature of a closed spin 4-manifold is divisible
by~16. These real index theorems are illuminated by Clifford algebras, as
explained in~\S\ref{subsec:5.6}.
\begin{remark}[]\label{thm:10}
By design, the $K$-theory proof~(\S\ref{subsec:4.4}) is suited to prove
generalizations of Theorem~\ref{thm:8}, such as the real index theorem. For
the mod~2 indices I am unaware of other proofs, whereas for integer indices
there are other approaches, such as the heat equation methods we survey
in~\S\ref{sec:6}.
\end{remark}
\subsection{Index theorems for Clifford linear operators}\label{subsec:5.6}
Let $X$~be a Riemannian spin manifold of dimension~$n$, and $\Spin(X)\to X$
the principal $\Spin_n$-bundle which encodes the Riemannian spin structure;
see~\S\ref{subsec:4.1}. Recall the Clifford algebras~$\Cliff_{\pm n}$ with
generators~$\gamma ^1,\dots ,\gamma ^n$ and relations
\begin{equation}\label{eq:79}
\gamma ^i\gamma ^j + \gamma ^j\gamma ^i = \pm 2\delta ^{ij} = \begin{cases}
\pm 2,&i=j;\\\phantom{\pm}0,&i\neq j,\end{cases}\qquad 1\le i,j\le n.
\end{equation}
Use the ``mixing construction'' to form the vector bundle
\begin{equation}\label{eq:80}
S_X=\Spin(X)\times \rule[-165000sp]{0pt}{0pt} _{\Spin_n}\Cliff_{+n}\longrightarrow X,
\end{equation}
where $\Spin_n\subset \Cliff_{+n}$ acts on~$\Cliff_{+n}$ by left multiplication. The
fibers of $S_X\to X$ are $\zmod2$-graded \emph{right} $\Cliff_{+n}$-modules, since
right and left multiplication commute. Then since $\Cliff_{-n}$~is the
($\zmod2$-graded) opposite algebra to~$\Cliff_{+n}$, the fibers of $S_X\to X$ are
$\zmod2$-graded \emph{left} $\Cliff_{-n}$-modules. Furthermore, $S_X\to X$ inherits a
covariant derivative from the Levi-Civita connection. The Dirac
operator~\eqref{eq:41} acts on sections of $S_X\to X$, where we use the
embedding ${\mathbb R}^n\hookrightarrow \Cliff_{+n}$ as the span of $\gamma ^1,\dots ,\gamma
^n$ to define Clifford multiplication. Then $D_X$~is a skew-adjoint Fredholm
operator (on suitable Sobolev spaces), it is odd with respect to the grading,
and it graded commutes with the left $\Cliff_{-n}$-action.
\begin{remark}[]\label{thm:14}
\
\begin{enumerate
\item This \emph{Clifford linear Dirac operator} appears in~\cite[\S
II.7]{LM}, attributed to Atiyah-Singer.
\item As for any irreducible representation, the spin
representations~$\SS^{0},\SS^1$ in~\S\ref{subsec:4.1} are only determined up to
tensoring with a line, as already remarked there. By contrast, the
construction of $S_X\to X$ and~$D_X$ are canonical for Riemannian spin
manifolds. We have traded the irreducible representations~$\SS^0,\SS^1$ for
the canonical representation~$\Cliff_{+n}$ equipped with a canonical commuting
algebra of operators.
\item One can complexify~$\Cliff_{+n}$ and so $S_X\to X$ to construct a canonical
complex Dirac operator, but the real Dirac operator contains more refined
information.
\item If $V\to X$ is a real vector bundle with covariant derivative, we can
form a twisted Dirac operator~$D_X(V)$ on sections of $S_X\otimes V\to X$; it
too commutes with the left $\Cliff_{-n}$-action.
\end{enumerate}
\end{remark}
The kernel and cokernel of~$D_X(V)$ are finite dimensional $\Cliff_{-n}$-modules, so
by~\cite{ABS} their formal difference---the index---represents an element of
the real $K$-theory group~$KO^{-n}(\pt)$. This is the \emph{analytic
pushforward} of~$V$. The spin structure orients the map $f\:X\to \pt$ for
real $K$-theory---see~\eqref{eq:19} for the analogous situation in complex
$K$-theory---and the \emph{topological pushforward} is $f_![V]\in
KO^{-n}(\pt)$. The index theorem for Dirac operators asserts the equality of
these pushforwards. The $KO$-groups of a point are computed from Bott
periodicity. Let $O_\infty $~be the stable orthogonal group. Then
for~$n\ge1$,
\begin{equation}\label{eq:81}
KO^{-n}(\pt)\cong \pi _{n-1}O_\infty \cong \begin{cases} {\mathbb Z},&n\equiv
0\pmod8;\\ \zmod2,&n\equiv 1\pmod8;\\ \zmod2,&n\equiv 2\pmod8;\\ 0,&n\equiv
3\pmod8;\\ {\mathbb Z},&n\equiv 4\pmod8;\\ 0,&n\equiv 5\pmod8;\\ 0,&n\equiv
6\pmod8;\\ 0,&n\equiv7\pmod8.\end{cases}
\end{equation}
($KO^0(\pt)\cong {\mathbb Z}$ is also correct.) The mod~2 index for~$n=1$ discussed
in~\S\ref{subsec:5.3} is a special case.
In~\cite{AS6}, written in 1969, Atiyah-Singer study spaces~$\Fred_n(\mathscr{H}_n)$,
$n\in {\mathbb Z}$, of odd skew-adjoint Fredholm operators acting on real and complex
$\zmod2$-graded Hilbert spaces~$\mathscr{H}_n$ equipped with a $\Cliff_{n}$~action; the
operators graded commute with~$\Cliff_{n}$. The Clifford linear Dirac operator is
an example. The main result is that the spaces~$\Fred_n(\mathscr{H}_n)$ form a spectrum
in the sense of homotopy theory, and Atiyah-Singer identify it with the
$KO$-~and $K$-theory spectra in the real and complex cases, respectively.
This generalizes the relationship between $K$-theory and Fredholm operators
in earlier work of J\"anich~\cite{J}. It also gives an alternative
construction of the analytic index of the Clifford linear Dirac operator.
Finally, the periodicity of Clifford algebras~\cite{ABS} leads to another
proof of Bott periodicity; see also~\cite{Kar,Wo}.
\subsection{Families index theorem}\label{subsec:5.4}
Recall that Grothendieck, in his Riemann Roch Theorem~\ref{thm:4}, considers
proper morphisms $f\:X\to S$, not just a single variety $X\to\pt$.
Similarly, Atiyah-Singer~\cite{AS4} generalize Theorem~\ref{thm:8} to proper
fiber bundles $f\:X\to S$ equipped with a family~$P$ of elliptic
(pseudo)differential operators along the fibers. On suitable function
spaces, $P$~is a continuous family of Fredholm operators parametrized by~$S$,
and the analytic index is the homotopy class of this family. Since Fredholm
operators form a classifying space for $K$-theory~\cite{J,A4,AS6}, the
analytic index lies in~$K^{\bullet }(S)$. The topological index
construction, executed in the fiber bundle~$f$, also leads to an element
of~$K^{\bullet }(S)$. The \emph{index theorem for families} is the equality
of the analytic and topological indices.
There is also a families version of the Clifford linear story
of~\S\ref{subsec:5.6}, which we illustrate.
\begin{example}[]\label{thm:24}
Let $f\:X\to S$ be a proper fiber bundle with fibers of odd dimension~$n$.
Suppose a relative Riemannian spin structure\footnote{A \emph{relative spin
structure} is a spin structure on the vertical tangent bundle $T(X/S)\to X$.
A \emph{relative Riemannian structure} is an inner product on this vector
bundle together with a horizontal distribution on the fiber bundle~ $f$.} is also
given. In \emph{complex} $K$-theory there is a pushforward
\begin{equation}\label{eq:82}
f_!\:K^0(X)\longrightarrow K^{-n}(S).
\end{equation}
If $V\to X$ is a complex vector bundle with covariant derivative, we form the
family~$D_{X/S}(V)$ of complex Clifford linear Dirac operators parametrized
by~$S$. The analytic index is the homotopy class of the map $S\to\Fred_{-n}$
given by the Dirac operators, where $\Fred_{-n}$ is the space of Fredholm
operators introduced at the end of~\S\ref{subsec:5.6}, a classifying space
for~$K^{-n}$. The index theorem asserts that the analytic index equals
$f_![V]$. The ``lowest piece'' of the index is captured by composing with a
natural map
\begin{equation}\label{eq:83}
K^{-n}(S)\longrightarrow H^1(S;{\mathbb Z}),
\end{equation}
which may be considered a determinant map. Recalling that a class
in~$H^1(S;{\mathbb Z})$ is determined by its periods on maps $\varphi \:S^1\to S$,
in other words by its values on $\varphi _*[S^1]\in H_1(S)$, since
$H^1(S;{\mathbb Z})$ is torsionfree, we compute the image of $\ind D_{X/S}(V)$
under~\eqref{eq:83} by base changing via~$\varphi $ to a fiber bundle
$X_\varphi \toS^1$ equipped with a vector bundle $V_\varphi \to X_\varphi $.
Then $X_\varphi $~is an even dimensional closed Riemannian spin manifold, and
the integer period we seek is the numerical index $\ind D\rule[-165000sp]{0pt}{0pt} _{X_\varphi
}(V_\varphi )\in {\mathbb Z}$.
\end{example}
\begin{remark}[]\label{thm:15}
\
\begin{enumerate
\item The family of Clifford linear Dirac operators $D_{X/S}(V)$ gives rise
to a family of self-adjoint Dirac operators on an ungraded Hilbert space, a
formulation which appears more frequently; see \cite[\S3]{APS3}, for example.
\item A cohomology class in~$H^1(S;{\mathbb Z})$ is a homotopy class of maps $S\to
\RR/\ZZ$. A \emph{geometric} invariant of the family~$D_{X/S}(V)$---the
Atiyah-Patodi-Singer $\eta $-invariant---promotes this homotopy class to a
specific map, as we will see in~\S\ref{subsec:7.3}.
\item Although we stated these topological constructions for Dirac
operators, they generalize in various ways to families of elliptic
pseudodifferential operators.
\end{enumerate}
\end{remark}
A situation in which one encounters a family of \emph{linear} elliptic
equations is linearization of solutions to a \emph{nonlinear} elliptic
equation. The abstract setup is a nonlinear Fredholm map $F\:\mathscr{B}\to\mathscr{C}$
between infinite dimensional Hilbert manifolds. Sometimes $F$~is equivariant
for the action of an infinite dimensional Lie group~$\mathscr{G}$ and is only
Fredholm modulo~$\mathscr{G}$. One is then interested in the moduli space, or
stack,~$\mathscr{M}=F^{-1} (c)/\mathscr{G}$ for some~$c\in \mathscr{C}$. If $F$~is a nonlinear
elliptic operator on a closed manifold, mapping between functions spaces,
then its linearizations~$dF_b$ at~$b\in F^{-1} (c)$ fit together to a family
of linear elliptic operators parametrized by~$\mathscr{B}$. The index of this family
computes the (virtual) tangent bundle to~$\mathscr{M}$ and yields useful information
about~$\mathscr{M}$. This general plan is used by Atiyah-Hitchin-Singer~\cite{AHS}
to investigate the instanton equations on a 4-manifold (see Donaldson's
paper~\cite[\S2]{Do} in this volume) and it has been used since in many other
problems in geometric analysis.
\begin{remark}[]\label{thm:11}
The image of the families index under the Chern character $\ch\:K^{\bullet
}(S)\to H^{\bullet }(S;{\mathbb Q})$ is a cruder invariant than the $K$-theory index,
but often it contains information of interest. It can be computed by a
topological analogue of~\eqref{eq:12}, and it is accessible via heat equation
methods~\cite{Bi2}, whereas the more powerful $K$-theory index is not, as far
as we know.
\end{remark}
The Atiyah-Hitchin-Singer work is the first of many applications of the
families index theorem to quantum field theory and string theory, and to
mathematical problems arising from that physics. We take up an additional
example in~\S\ref{sec:8}.
\subsection{Coverings and von Neumann algebras}\label{subsec:5.5}
As should be clear by now, Atiyah used the index theorem as a launching pad
for mathematical adventures in many directions. One which proved
particularly fruitful involves von Neumann algebras~\cite{A5}.
Atiyah~\cite{A1} comments:
\begin{quote}
In particular I learnt from Singer, who had a strong background in
functional analysis, about von Neumann algebras of type~II with their
peculiar real-valued dimensions. We realized that $K$-theory and index
theory could be generalized in this direction, but it was not clear at first
if such a generalization would really be of any interest. However in one
particularly simple case, that of a manifold with an infinite fundamental
group, it became clear that the ideas of von Neumann algebras were quite
natural and led to concrete non-trivial results. This was the content of my
talk~\cite{A5} at the meeting in honour of Henri Cartan. Since I was not an
expert on von Neumann algebras I attempted in this presentation to give a
simple, elementary and essentially self-contained treatment of the results.
Later on in the hands of Alain Connes, the world expert on the subject, these
simple ideas were enormously extended and developed into a whole theory of
linear analysis for foliations.
\end{quote}
\noindent
And in the hands of Connes, Kasparov and many others into index theory and
$K$-theory for $C^*$-algebras. An influential conference talk indeed!
The situation in~\cite{A5} is an unramified Galois covering $\pi \:\widetilde{X}\to X$
with Galois group~$\Gamma $ acting freely on~$\widetilde{X}$, and a $\Gamma $-invariant
elliptic operator~$\widetilde{D}$ on~$\widetilde{X}$. There is an induced elliptic operator~$D$
on~$X$, and we assume $X$~is compact. For example, $X$~could be a closed
Riemann surface and $\widetilde{X}$~its universal cover which, if the genus of~$X$ is
~$\ge2$, is isomorphic to the unit disk~$\Omega $. If $\widetilde{D}$~is the
${\overline\partial}$-operator, then $\ker\widetilde{D}$~is the \emph{infinite dimensional} space of
holomorphic functions on~$\Omega $. In general, if $\Gamma $~is infinite
then $\ker\widetilde{D}$ and $\coker\widetilde{D}$~are infinite dimensional, whereas $\ker D$~and
$\coker D$~are finite dimensional, the latter since $X$~is assumed compact.
So $\ind D$~is well-defined. Atiyah introduces a $\Gamma $~invariant
measure on~$\widetilde{X}$ and the von Neumann algebra~$\mathfrak{A}$ of bounded linear
operators on $L^2(\widetilde{X},\widetilde{E}^0)$ for $\widetilde{E}^0\to\widetilde{X}$ the vector bundle on whose
sections $\widetilde{D}$~is defined. Orthogonal projection onto~$\ker\widetilde{D}$ lies in the
von Neumann algebra, and its von Neumann trace, a real number, is defined to
be the $\Gamma $~dimension of~$\ker\widetilde{D}$. Repeating for~$\coker\widetilde{D}$, Atiyah
defines a real-valued index $\ind_\Gamma \widetilde{D}$.
\begin{theorem}[Atiyah~\cite{A5}]\label{thm:12}
$\ind_\Gamma \widetilde{D} = \ind D$.
\end{theorem}
\noindent
Atiyah's account of this theorem, as stated earlier, was a catalyst for
index theory on noncompact spaces, singular spaces, and beyond.
\section{Heat equation proof}\label{sec:6}
Beginning in the late~1960's the expanding circle of ideas emanating from the
basic Atiyah-Singer index theorem took a more analytic turn. The focus
shifted beyond the kernel of elliptic operators to include higher
eigenvalues. This led first to a \emph{local} version of the index theorem
and then to local \emph{geometric} invariants (as opposed to \emph{global
topological} invariants). We treat the former in this section and the latter
in the next.
We begin in~\S\ref{subsec:6.1} with two basic constructs to collate higher
eigenvalues into a single function: the $\zeta $-function and the trace of
the heat operator. (They are analogues of basic objects in analytic number
theory.) The local index theorem, proved first in special cases by Vijay
Patodi and then in general by Peter Gilkey, is the subject
of~\S\ref{subsec:6.2}. This work was completed in the early 1970's. In the
1980's several new proofs of the local index theorem led to a deeper
understanding of the origins of the ${\hat A}$-genus in the index formula for
Dirac operators. In~\S\ref{subsec:6.3} we briefly summarize these
contributions by Ezra Getzler, Edward Witten, Jean-Michel Bismut, Nicole
Berline, Michele Vergne, and of course Michael Atiyah.
\subsection{Heat operators, zeta functions, and the index}\label{subsec:6.1}
Let $\Delta $~be a nonnegative self-adjoint operator on a Hilbert
space~$\mathscr{H}$. We seek to define the \emph{heat operator}
\begin{equation}\label{eq:56}
H_t=e^{-t\Delta },\qquad t\in {\mathbb R}^{>0},
\end{equation}
and the \emph{$\zeta $-function}
\begin{equation}\label{eq:57}
\zeta \mstrut _\Delta (s)=\Tr\Delta ^{-s},\qquad s\in {\mathbb C}.
\end{equation}
Both are well-defined if $\mathscr{H}$~is finite dimensional, and they are related by
the Mellin transform
\begin{equation}\label{eq:58}
\Tr\Delta ^{-s} = \frac{1}{\Gamma
(s)}\int_{0}^{\infty}\frac{dt}{t}\,t^s\,\Tr\bigl(e^{-t\Delta } \bigr).
\end{equation}
If $\Delta $~is a nonnegative self-adjoint second-order elliptic operator on
a closed manifold~$X$, then the heat operator~$H_t$ in~\eqref{eq:56} is
exists by basic elliptic theory. It is a \emph{smoothing operator}: $H_t$~
maps distributions to smooth functions. For example, if $\delta _y$~is the
Dirac $\delta $-distribution at~$y\in X$, then\footnote{Our notation assumes
$\Delta $~is an operator acting on functions. A small modification
incorporates vector bundles.}
\begin{equation}\label{eq:59}
h_t(x,y) = \left( e^{-t\Delta }\delta _y \right)\!(x),\qquad x\in X,
\end{equation}
is a smooth function of~$t,x,y$ called the \emph{heat kernel}. If $\Delta
$~is the scalar Laplace operator attached to a Riemannian metric on~$X$---the
Laplace-Beltrami operator---then intuitively $h_t(x,y)$~is the amount of heat
at~$x$ after time~$t$ given an initial distribution~$\delta _y$ of heat.
Heat flows with infinite propagation speed and instantly diffuses:
$h_t(x,y)>0$ for all~$t,x,y$. The properties of physical heat flow inform
intuition about the large and small time behavior of the heat operator of a
general nonnegative self-adjoint second-order differential operator~$\Delta $
acting on sections of a vector bundle $E\to X$. As $t\to\infty $ the heat
operator~$e^{-t\Delta }$ converges (in the uniform topology) to projection
onto~$\ker \Delta $. As $t\to0$ the heat operator converges (in the strong
operator topology) to the identity operator. A more precise version of the
small~$t$ behavior is the subject of an influential 1948 paper of
Minakshisundarum and Pleijel~\cite{MP} in case $\Delta $~is the
Laplace-Beltrami operator; Seeley~\cite{Se4} extends their results to more
general elliptic pseudodifferential operators. As $t\to0$ the heat
kernel~$h_t(x,y)$ converges exponentially to zero if~$x\neq y$, and on the
diagonal there is an asymptotic expansion
\begin{equation}\label{eq:60}
h_t(x,x)\sim t^{-n/2}\sum\limits_{k=0}^{\infty}A_k(x)t^i\qquad
\textnormal{as $t\to0$},
\end{equation}
where $A_k$~are smooth functions on~$X$. For~$x\in X$, the value of
$A_k(x)\in \End E_x$ depends only on a finite jet of the total symbol of the
differential operator~$\Delta $ at~$x$. If $\Delta $~is canonically
associated to a Riemannian metric, then $A_k(x)$~depends on a finite jet of
the metric at~$x$; the order of the jet grows with~$k$.
For elliptic operators~$\Delta $ on compact manifolds of the type discussed
in the previous paragraph, the $\zeta $-function~\eqref{eq:57} exists and
$\zeta \mstrut _\Delta $~is a holomorphic function of~$s$ for $\Re (s)>\!>0$. The asymptotic
expansion~\eqref{eq:60} of the heat kernel~$h_t$ is equivalent, via the
Mellin transform~\eqref{eq:58}, to a meromorphic extension of~$\zeta \mstrut _\Delta $ to the
entire complex $s$-line, which in fact is what is proved in~\cite{MP,Se4}.
Now suppose $P\:C^{\infty}(X,E^0)\to C^{\infty}(X,E^1)$ is a first-order elliptic
operator on a closed $n$-manifold~$X$ equipped with complex vector bundles
$E^0,E^1\to X$. Assume metrics everywhere so that the formal adjoint
$P^*\:C^{\infty}(X,E^1)\to C^{\infty}(X,E^0)$ is defined; it too is a first-order
elliptic operator. Then
\begin{equation}\label{eq:61}
\ind P = \dim\ker P^*P - \dim\ker PP^*,
\end{equation}
and each of $P^*P,\,PP^*$ is a nonnegative self-adjoint second-order elliptic
differential operator. For~$\lambda \ge0$, let $\mathscr{E}^0_\lambda \subset
C^{\infty}(X,E^0)$ be the $\lambda $-eigenspace of~$P^*P$ and $\mathscr{E}^1_\lambda
\subset C^{\infty}(X,E^1)$ the $\lambda $-eigenspace of~$PP^*$. Then
for~$\lambda >0$,
\begin{equation}\label{eq:62}
P\res{\mathscr{E}^0_\lambda }\:\mathscr{E}^0_\lambda \longrightarrow \mathscr{E}^1_\lambda
\end{equation}
is an isomorphism. Therefore, for any function $\chi
\:{\mathbb R}^{\ge0}\to{\mathbb R}^{\ge0}$ such that $\chi (0)=1$ and $\chi (\lambda
)\searrow0$ sufficiently rapidly as $\lambda \to\infty $,
\begin{equation}\label{eq:63}
\ind P = \sum\limits_{\lambda \in \spec P^*P}\chi (\lambda ) -
\sum\limits_{\lambda \in \spec PP^*}\chi (\lambda ).
\end{equation}
For $\chi (\lambda )=\lambda ^{-s}$ with $\Re(s)>\!>0$, we obtain a formula
for the index which appears in Atiyah-Bott~\cite[\S8]{AB1}:
\begin{equation}\label{eq:64}
\ind P = \Tr \zeta \rule[-165000sp]{0pt}{0pt} _{P^*P}(s) - \Tr \zeta \rule[-165000sp]{0pt}{0pt} _{PP^*}(s).
\end{equation}
In fact \eqref{eq:64}~holds for all~$s\in {\mathbb C}$, due to the meromorphic
continuation of zeta functions. Atiyah-Bott note that~$s=0$ is a
particularly good argument in view of explicit integral formulas~\cite{Se4}
in terms of the symbol of~$P$. (Another motivation for setting~$s=0$: for an
operator $P\:\mathscr{H}^0\to\mathscr{H}^1$ between finite dimensional Hilbert spaces, the
value at~$s=0$ is $\dim \mathscr{H}^0 - \dim \mathscr{H}^1$.) But while the explicit
formulas are local, they involve high derivatives of the symbol, whereas the
characteristic class formula~\eqref{eq:44} for the index only involves a few
derivatives when written in terms of Chern-Weil polynomials of the
curvature. It is this mismatch which remained a mystery for several years.
In place of $\zeta $-functions, the trace of the heat kernel is commonly used
in~\eqref{eq:63}. This corresponds to $\chi (\lambda
)= e^{-t\lambda }$, $t>0$. Then for all~$t>0$, we have
\begin{equation}\label{eq:65}
\ind P = \Tr e^{-tP^*P} - \Tr e^{-tPP^*}.
\end{equation}
In fact, one can prove the right hand side is constant in~$t$ by
differentiation, and evaluation as~$t\to\infty $ reproduces~\eqref{eq:65}.
On the other hand, let~$t\to0$ and use the asymptotic expansion~\eqref{eq:60}
to obtain
\begin{equation}\label{eq:66}
\ind P = \int_{X}\tr\left[ A^0_{n/2}(x) - A^1_{n/2}(x) \right] \,|dx|,
\end{equation}
where $A^0_k(x),A^1_k(x)$~are the heat coefficients for~$P^*P,PP^*$ acting on
the vector spaces~$E^0_x,E^1_x$, respectively. As is true for the $\zeta
$-function, the formulas for~$A^i_{n/2}(x)$ involve many derivatives of the
symbol of~$P$ at~$x$, so seem inaccessible as a means of proving the index
formula.
\subsection{The local index theorem}\label{subsec:6.2}
For the Laplace-Beltrami operator~$\Delta $ on an $n$-dimensional Riemannian
manifold~$X$, the first coefficient~$A_0$ in~\eqref{eq:60} is the constant
function $1/(4\pi )^{n/2}$. This reflects the solution to the classical heat
equation in Euclidean space, and it implies Weyl's law for the asymptotic
growth of the eigenvalues of~$\Delta $, which only depends on~$n$ and
$\Vol(X)\sim\int_{X}A_0(x)\,|dx|$. Weyl's law, which does not depend on the
heat kernel expansion, was one motivation for Mark Kac~\cite{K} to ask
in~1966: To what extent do the eigenvalues of~$\Delta $ determine the
Riemannian manifold~$X$? Kac focused on domains in the Euclidean
plane~$\mathbb E^2$, though the more general question is implicit.
McKean-Singer~\cite{MS} immediately took this up, and they determined the
next few coefficients~$A_1,A_2$ in the heat kernel expansion, thereby proving
a conjecture of Kac-Pleijel. (There are contemporaneous independent results
by de Bruijn, Arnold, and Berger.) In particular, $A_1$ is a multiple of the
scalar curvature. For~$n=2$, McKean-Singer observe a cancellation which
holds at each point of~$X$, and they conjecture a similar result in all
dimensions. Namely, let $\Delta ^{(q)}$~denote the Laplace operator on
differential $q$-forms, $h_t^{(q)}$~the associated heat kernel, and $A_k^{(q)}$ the
heat coefficients. The McKean-Singer conjecture is that for all~$x\in X$ the
limit
\begin{equation}\label{eq:67}
\lim\limits_{t\to0}\;\sum\limits_{q=0}^n\,(-1)^q\tr h_t^{(q)}(x,x)
\end{equation}
exists and, furthermore, for $n$~even it equals the Gauss-Bonnet-Chern
integrand which integrates to the Euler number of~$X$. From~\eqref{eq:60}
the existence of the limit is equivalent to the cancellation
\begin{equation}\label{eq:68}
\sum\limits_{q=0}^n(-1)^q\tr A_k^{(q)}(x)=0,\qquad k<\frac n2,\quad x\in
X.
\end{equation}
The alternating sum for~$k=n/2$ equals the limit~\eqref{eq:67}. McKean-Singer
prove that the limit exists and vanishes for $n$~odd, and they compute the
limit for~$n=2$.
In~1970 Patodi~\cite{P1} proved the McKean-Singer conjecture via a virtuoso
direct computation. He immediately~\cite{P2} applied his methods to prove
the Riemann-Roch Theorem~\ref{thm:1} for K\"ahler manifolds. A few years
later, Gilkey used different methods in his PhD thesis~\cite{Gi1}---scaling
plays a crucial role---and proved the corresponding theorem for
twisted signature operators. By standard topological arguments this implies
the Atiyah-Singer Index Theorem~\ref{thm:5}; see~\S\ref{subsec:4.2}.
Subsequently, Atiyah-Bott-Patodi~\cite{ABP} gave a proof of Gilkey's Theorem
and of the resulting proof of the index theorem. We recount Gilkey's main
result.
Gilkey investigates differential forms built canonically from a Riemannian
metric. Using modern terminology to economize, let $\mathbf{Man}_n$~be the category of
smooth $n$-manifolds and local diffeomorphisms. Consider the functors
(sheaves)
\begin{equation}\label{eq:69}
\begin{aligned} \Met\:\mathbf{Man}_n^{\textnormal op}&\longrightarrow \mathbf{Set} \\ \Omega
^q\:\mathbf{Man}_n^{\textnormal op}&\longrightarrow \mathbf{Set}\end{aligned}
\end{equation}
where if $M$~is a smooth $n$-manifold, then $\Met(M)$~is the set of
Riemannian metrics on~$M$ and $\Omega ^q(M)$~is the set of differential
$q$-forms. We seek natural transformations
\begin{equation}\label{eq:70}
\omega \:\Met\longrightarrow \Omega ^q.
\end{equation}
Roughly speaking, these are assignments of differential forms to Riemannian
metrics covariant under coordinate changes. More poetically, they are
differential forms on~$\Met$. Even for~$q=0$ the classification problem is
intractable: any smooth function of the scalar curvature gives a natural
function of the Riemannian metric. Now introduce scaling. We say $\omega
$~is \emph{homogeneous of weight~$k$} if
\begin{equation}\label{eq:71}
\omega (\lambda ^2g)=\lambda ^k\omega (g)\qquad \textnormal{for all
$\lambda \in {\mathbb R}^{>0}$}.
\end{equation}
We say $\omega $~is \emph{regular} if in any local coordinate system
$x^1,\dots ,x^n$ it takes the form
\begin{equation}\label{eq:72}
\omega (g)(x) = \sum\limits_{I}\sum\limits_{\alpha
}^{\textnormal{finite}}\sum\limits_{i,j=1}^n \omega ^{i,j}_{I,\alpha
}(x)\, \frac{\partial ^{|\alpha |}g_{ij}}{\partial x^{\alpha
_1}\cdots\partial x^{\alpha _n}} \,dx^{i_1}\wedge \cdots\wedge
dx^{i_q},
\end{equation}
where $I=(i_1,\dots ,i_q)$ with $1\le i_1<\cdots< i_q\le n$, and $\alpha
=(\alpha _1,\dots ,\alpha _n)$ with $\alpha _k\in {\mathbb Z}^{\ge0}$. The $\omega
^{ij}_{I,\alpha }$~are smooth functions. Crucially, only a finite set
of~$\alpha $ appears.
\begin{theorem}[Gilkey~\cite{Gi1}]\label{thm:13}
A natural differential form~\eqref{eq:70} which is regular and homogeneous
of nonnegative weight is a polynomial in the Chern-Weil forms of the
Pontrjagin classes.
\end{theorem}
\noindent
The nonzero forms have weight zero.
The proof of Gilkey's Theorem~\ref{thm:13} in~\cite{ABP} uses Weyl's
theorem~\cite{W} on invariants of the orthogonal group. Atiyah-Bott-Patodi
apply Theorem~\ref{thm:13} to the signature operator~$P$ on a Riemannian
manifold~$X$. Resuming the notation of~\S\ref{subsec:6.1}, the vanishing of
positive weight forms implies
\begin{equation}\label{eq:73}
\tr\bigl[A^0_k(x) - A^1_k(x) \bigr]=0,\qquad k<\frac n2,\quad x\in X.
\end{equation}
This cancellation result implies, as in~\eqref{eq:68}, the existence of
\begin{equation}\label{eq:74}
\lim\limits_{t\to0}\;\bigl[\tr h^0_t(x,x) - \tr h^1_t(x,x) \bigr],
\end{equation}
and Theorem~\ref{thm:13} tells that the limit is a polynomial in Pontrjagin
forms. The precise polynomial---the $L$-genus~\eqref{eq:9}---is determined
as in Hirzebruch's original proof by computing enough examples. The road
from here to the \emph{global} index theorem follows established lines. It
is the \emph{local} index theorem---the existence and identification of the
limit~\eqref{eq:74}---which leads to future developments.
\subsection{Postscript: Whence the ${\hat A}$-genus?}\label{subsec:6.3}
Different conceptual understandings of the cancellation~\eqref{eq:73} and of
the limiting value~\eqref{eq:74} were achieved in the first half of the
1980's. The setting is (generalized) Dirac operators, where basic properties
of Clifford algebras yield the cancellation. The limit is the Chern-Weil
${\hat A}$-form, a polynomial in the Pontrjagin forms, whose appearance is
derived from various sources. In these works the ${\hat A}$-genus appears by
direct argument. We give a brief resum\'e.
One route to the ${\hat A}$-genus passes through Mehler's formula for the heat
kernel of the harmonic oscillator~\cite[p.~19]{GJ}, which Getzler~\cite{Ge2}
employs in his proof of the local index theorem. He uses a homothety which
not only scales time and space, but also scales the Clifford algebra
variables in the Dirac operator~\eqref{eq:41}. His technique was in part
inspired by contemporary physics proofs of the index
theorem~\cite{Wi1,Ag,FW,Ge1} using supersymmetric quantum mechanics.
At a conference in honor of Laurent Schwartz, Atiyah~\cite{A6} exposed
Witten's idea to derive the index theorem by applying the Duistermaat-Heckman
exactness of stationary phase theorem~\cite{DH} to the free loop space of a
compact Riemannian manifold. (During that period Atiyah-Bott~\cite{AB5}
placed the Duistermaat-Heckman result in the context of localization in
equivariant cohomology.) In this proof the ${\hat A}$-genus enters by
regularizing a certain infinite product, as it does in the supersymmetric
quantum mechanics proof~\cite[\S1.2.4]{Wi2}.
Inspired by Atiyah's account, Bismut~\cite{Bi1} executed a proof of the index
theorem using Wiener measure on loop space and Malliavin calculus. In this
way he deals with integrals over loop space rigorously. The heat kernel is
represented in terms of Wiener measure with the aid of Lichnerowicz's
formula, which expresses the Dirac Laplacian in terms of the covariant
Laplacian. The localization to point loops as~$t\to0$ is natural in this
probabilistic approach. The variable~$t$ represents the total time during
which a Brownian path exists, and as the time tends to zero, only constant
loops have a significant probability of occurring. The evaluation of the
integral over these point loops is accomplished using a formula of Paul
L\'evy~\cite{L}, who considers a Brownian curve in the plane conditioned to
close after time~$2\pi $. Then the characteristic function of the area~$S$
enclosed by the random curve (expectation value of~$e^{izS}$, $z\in {\mathbb C}$)
is~$\pi z/\sinh \pi z$. This same calculation appears in Bismut's work, only
there the curvature of~$X$ replaces~$z$, and once again the ${\hat A}$-genus is
obtained.
The ${\hat A}$-genus arises quite differently in a proof of the index theorem
due to Berline and Vergne~\cite{BV}. Let $G$~be a Lie group with Lie
algebra~$\frak{g}$. Then a standard formula in the theory of Lie groups
asserts that the differential of the exponential map~$\exp\:\frak{g}\to G$
at~$a\in \frak{g}$ is
\begin{equation}\label{eq:76}
d\exp_a = \frac{1-e^{-\ad a}}{\ad a} = J (\ad a),
\end{equation}
where the power series which defines~$J$ is the multiplicative inverse of the
power series which defines the Todd genus~\eqref{eq:5}. It was a mystery
whether the occurrence of the Todd genus in~\eqref{eq:76} is related to the
index theorem. Berline and Vergne noticed that if $X$~is a Riemannian
manifold, and $\O(X)$~the principal bundle of orthonormal frames, then the
differential of the Riemannian exponential map on~$\O(X)$ is given by a
similar formula. Precisely, there is a natural isomorphism $T_p\O(X)\cong
\RR^n\oplus\frak{o}(n) $ via the Levi-Civita connection, and the differential
of the exponential map $\exp\:\RR^n\oplus\frak{o}(n)\to \O(X)$ at~$p\in \O(X)$,
evaluated on~$a\in \frak{o}(n)$, is
\begin{equation}\label{eq:75}
\begin{aligned} &d\exp_a\res{\RR^n} = \exp(-a)\,J \bigl( \langle
\Omega _p/2,a\rangle\bigr).\\ &d\exp_a\res{\frak{o}(n)}=J
(\ad a);
\end{aligned}
\end{equation}
In this formula the Riemann curvature~$\Omega $, which takes values
in~$\frak{o}(n)$, is contracted with~$a$ using the Killing form. The result
is a 2-form, which can be identified as an element of~$\frak{o}(n)$. To
prove the index theorem Berline and Vergne work on the frame bundle~$\O(X)$,
not on the base~$X$. To compensate for the introduction of extra degrees of
freedom in the fiber direction, they must study the behavior of the heat
kernel along the fiber. It is at this stage, in the small time limit, where
\eqref{eq:75}~appears. Ultimately, that is how the ${\hat A}$-genus enters
their proof.
\section{Geometric invariants of Dirac operators}\label{sec:7}
Up to this point index theory produced \emph{global topological} invariants
of elliptic operators; their natural home is topological $K$-theory.
Beginning with work of Atiyah-Patodi-Singer announced in~1973, index theory
took a turn towards \emph{local differential geometric}
invariants.\footnote{The natural home for the geometric invariants is
\emph{differential} $K$-theory, but that is a more recent development beyond
the scope of this article.} Furthermore, the focus shifted from general
elliptic pseudodifferential operators to Dirac operators. Heat equation
methods provide the fundamental tools to construct invariants.
The three papers~\cite{APS1,APS2,APS3} of Atiyah-Patodi-Singer introduce the
$\eta $-invariant of a Dirac operator. Its definition is parallel to that of
an $L$-function in analytic number theory. Their first main theorem, which
we recount in~\S\ref{subsec:7.3}, is an index theorem for a Dirac operator on
a compact Riemannian spin manifold with boundary. A key ingredient in the
story are new \emph{global} elliptic boundary
conditions~(\S\ref{subsec:7.2}); local elliptic boundary conditions are
obstructed in most cases, as Atiyah-Bott had discovered a decade earlier.
The $\eta $-invariant solves a problem which served as one motivation for
their work, namely the computation of the signature defect, and this is our
point of departure in~\S\ref{subsec:7.1}. The Atiyah-Patodi-Singer papers
contain many more important theorems, such as the index theorem for flat
bundles, which we do not cover here.
Another view of the $\eta $-invariant is the subject of~\S\ref{subsec:7.4}.
Characteristic numbers of vector bundles over closed oriented manifolds---the
integers obtained by pairing products of Chern and Pontrjagin classes of a
vector bundle with the fundamental class of the base manifold---are primary
integer-valued topological invariants. The associated $\RR/\ZZ$-valued secondary
differential geometric invariants had been introduced by Chern and Simons a
few years prior. Similarly, integer-valued $K$-theory characteristic
numbers, which by the index theorem are indices of Dirac operators, are
primary topological invariants. The associated secondary differential
geometric quantity is the Atiyah-Patodi-Singer $\eta $-invariant. The next
geometric invariant of a Dirac operator, or family of Dirac operators, is the
determinant. The underlying theory was developed in the 1980's, as we
recount in~\S\ref{subsec:7.5}. It is an important ingredient in the
application to physics we take up in~\S\ref{sec:8}.
\subsection{The signature defect}\label{subsec:7.1}
Recall the classical Gauss-Bonnet theorem. Let $X$~be a closed Riemannian
2-manifold and $K\:X\to{\mathbb R}$ its Gauss curvature. Then the Euler number
of~$X$ is the curvature integral
\begin{equation}\label{eq:84}
\Euler(X) = \int_{X}\frac{K}{2\pi }\,d\mu _X,
\end{equation}
where $d\mu _X$~is the Riemannian measure. If now $X$~is compact with
boundary, then there is a boundary contribution from the geodesic curvature
$\kappa \:\partial X\to{\mathbb R}$, namely
\begin{equation}\label{eq:85}
\Euler(X) = \int_{X}\frac{K}{2\pi }\,d\mu _X + \int_{\partial X}\frac{\kappa
}{2\pi }\,d\mu _{\partial X}.
\end{equation}
If a neighborhood of~$\partial X$ in~$X$ is isometric to the cylinder $[0,\epsilon
)\times \partial X$ with its product metric for some~$\epsilon >0$, then the
boundary term vanishes.
Now let $X$~be a closed oriented Riemannian 4-manifold. The Signature
Theorem~\ref{thm:3} implies
\begin{equation}\label{eq:86}
\Sign(X) = \int_{X}\omega ,
\end{equation}
where $\omega $~is the Chern-Weil 4-form of the rational characteristic
class~$p_1/3$. If $X$~is compact with boundary, and even if we assume
the Riemannian metric is a product near the boundary, which we do,
formula~\eqref{eq:86} need not hold. Set~$Y=\partial X$. Then the \emph{signature
defect}~\cite[\S10.3]{A7}
\begin{equation}\label{eq:87}
\alpha (Y)=\Sign(X) - \int_{X}\omega
\end{equation}
depends only on the closed oriented Riemannian 3-manifold~$Y$, as follows
easily from~\eqref{eq:86}. Atiyah-Patodi-Singer~\cite{APS1} argue that
$\alpha $~is a smooth function of the Riemannian metric, is odd under
orientation-reversal, and is \emph{not} of the form $\int_{Y}\eta $ for some
natural 3-form~$\eta $ in the metric (since the signature defect is not
multiplicative under finite covers).
A concrete instance of the signature defect studied by Hirzebruch~\cite{H4}
in the early 1970s was a prime motivation for Atiyah-Patodi-Singer. Let
$K={\mathbb Q}(\sqrt d)$ be a real quadratic number field---$d\in {\mathbb Z}^{>1}$ is
assumed square-free---and let $\mathcal{O}\subset K$ be the ring of integers. The
two square roots of~$d$ give two embeddings $K\hookrightarrow {\mathbb R}$, thus an
embedding
\begin{equation}\label{eq:88}
G=\PSL_2(\mathcal{O})\hooklongrightarrow \PSL_2({\mathbb R})\times \PSL_2({\mathbb R}).
\end{equation}
Let ${\mathbb H}$~be the upper half plane. The quotient
\begin{equation}\label{eq:89}
X^0(K) = \bigl({\mathbb H}\times {\mathbb H}\bigr)\bigm/ G
\end{equation}
is a \emph{Hilbert modular surface}. The group~$G$ may act with finite
stabilizers, i.e., $X^0(K)$~may be an orbifold which is not a smooth
manifold. It is noncompact; $X^0(K)$~has a finite set of ends in bijection
with the ideal class group of~$K$. Truncate each end to construct a compact
orbifold with boundary; each boundary component is a fiber bundle with
base~$S^1$ and fiber $S^1\times S^1$. Also, cut out a neighborhood of
each orbifold point to obtain a smooth compact manifold~$X(K)$ with boundary;
the additional boundary components are lens spaces. The signature
defect~\eqref{eq:87} at lens space boundaries was known~\cite[\S10.3]{A7}
from the equivariant signature theorem~\S\ref{subsec:5.1}.
Hirzebruch~\cite[p.~222]{H4} computed the signature defect at the other
boundaries via a desingularization of the cusp singularity in the cone on the
boundary. The formula is a simple expression in terms of a continued
fraction associated to the singularity. On the other hand, Shimizu~\cite{Sh}
introduced an $L$-function associated to the ideal class which corresponds to
the end. Hirzebruch~\cite[p.~231]{H4} proves that the signature defect at
the cusp is the value of that $L$-function at~$s=1$, up to a numerical
factor.
There is a generalization of this story to totally real number fields of
arbitrary degree. For the general case Hirzebruch conjectured that the
signature defect at a cusp singularity is again a value of the Shimizu
$L$-function. This conjecture was proved independently by
Atiyah-Donnelly-Singer~\cite{ADS} and by M\"uller~\cite{Mu} in~1982--3.
\subsection{Global boundary conditions}\label{subsec:7.2}
To compute the signature defect~\eqref{eq:87} in general, it is natural to
consider the signature operator~\eqref{eq:78} on a compact manifold with
boundary. But we must impose an elliptic boundary condition, and for the
signature operator the topological obstruction to \emph{local} elliptic
boundary conditions~(\S\ref{subsec:5.2}) is nonzero. Atiyah-Patodi-Singer
overcome this obstruction by a novel maneuver: they introduce \emph{global}
elliptic boundary conditions that exist for any generalized Dirac operator,
including the signature operator. These global boundary conditions are now
ubiquitous in the theory and applications of Dirac operators on manifolds
with boundary.
As a first example, consider the ${\overline\partial}$-operator on the closure of the unit
disk $\Omega \subset {\mathbb C}_z$, as in~\S\ref{subsec:5.2}. The kernel consists
of holomorphic functions on~$\overline\Omega $; a dense subspace is the space
of polynomials, the linear span of $\{z^n:n\in {\mathbb Z}^{\ge0}\}$. This is an
infinite dimensional vector space. An elliptic boundary condition must cut
it down to a finite dimensional subspace. Fix $a\in {\mathbb R}\setminus
{\mathbb Z}^{\ge0}$. Let $\mathscr{H}_a$ denote the subspace of smooth functions
$u\:\overline\Omega \to{\mathbb C}$ such that the Fourier expansion
of~$u\res{\partial \Omega }$ has vanishing Fourier coefficient
of~$e^{im\theta }$ if~$m>a$, where we write $z=e^{i\theta }$ on~$\partial
\Omega $. Then the restriction of~${\overline\partial}$ to~$\mathscr{H}_a$ has finite dimensional
kernel and cokernel, and it extends to a Fredholm operator on suitable
Sobolev completions. In other words, restriction to $\mathscr{H}_a$ is an elliptic
boundary condition. But because of the Fourier transform in its definition,
it is not local; compare~\eqref{eq:54}.
This example generalizes to a Dirac operator~$D_X$ on a compact Riemannian
manifold~$X$ with boundary. Assume the metric is a product near~$Y=\partial X$, and
so decompose
\begin{equation}\label{eq:90}
D_X = \sigma \frac{\partial }{\partial t} + D_Y
\end{equation}
near the boundary. Here $t$~is the length coordinate on geodesics normal
to~$Y=\partial X$, the algebraic operator~$\sigma $ is Clifford multiplication
by~$dt$, and $D_Y$~is a Dirac operator on~$Y$. Then the operator $A_Y=\sigma
^{-1} D_Y$ is self-adjoint. Let
\begin{equation}\label{eq:91}
\bigoplus\limits_{\lambda \in \spec (A_Y)} \!\!\mathscr{E}_\lambda
\end{equation}
be the spectral decomposition of spinors on~$Y$. For each $a\in {\mathbb R}\setminus
\spec(A_Y)$, the Atiyah-Patodi-Singer global boundary condition restricts to
the subspace of spinors on~$X$ whose restriction to~$Y$ lies in the
completion of $\oplus _{\lambda <a}\mathscr{E}_\lambda $. In fact,
Atiyah-Patodi-Singer choose~$a=0$, as do we in what follows. If $0\in
\spec(A_Y)$, then one must take into account $\ker D_Y$ separately, as
in~\eqref{eq:92} below.
\subsection{The Atiyah-Patodi-Singer $\eta $-invariant}\label{subsec:7.3}
With elliptic boundary conditions in hand, Atiyah-Patodi-Singer proceed to
compute $\ind D_X$ for a general Dirac operator on a compact manifold with
boundary. The problem splits into two pieces: a cylinder near~$\partial X$ and
$X\setminus \partial X$. On the cylinder they use the spectral
decomposition~\eqref{eq:91} and the product metric
decomposition~\eqref{eq:90} to convert~$D_X$ to a family of ordinary
differential operators parametrized by $\spec(A_Y)$. On the complement
of~$\partial X$ they use heat kernel methods, as in the local index
theorem~(\S\ref{subsec:6.2}). Gluing the two regions via a partition of
unity, they prove the following.
\begin{theorem}[Atiyah-Patodi-Singer~\cite{APS1}]\label{thm:16}
Let $X$~be a compact Riemannian manifold with boundary, and assume the
Riemannian metric is a product in a neighborhood of~$\partial X$. Let $D_X$ be a
generalized Dirac operator. Then with respect to the global boundary
conditions,
\begin{equation}\label{eq:92}
\ind D_X = \int_{X}\omega \;-\; \frac{\et{\partial X} + h\rule[-165000sp]{0pt}{0pt} _{\partial X}}{2},
\end{equation}
where $\omega $~is the Chern-Weil form of the ${\hat A}$-genus, $\et{\partial X}$~is
the $\eta $-invariant, and $h\rule[-165000sp]{0pt}{0pt} _{\partial X}=\dim\ker D_{\partial X}$.
\end{theorem}
\noindent
To define the $\eta $-invariant on~$Y=\partial X$, let $A_Y=\sigma^{-1} D_Y$ and form
\begin{equation}\label{eq:93}
\eta (s) = \sum\limits_{\lambda \in \spec(A_Y)\setminus \{0\}}
(\sign\lambda )\,|\lambda |^{-s},\qquad \Re(s)>\!>0.
\end{equation}
This is a Riemannian version of an $L$-function, an echo of the
number-theoretic $L$-function in the signature defect on a Hilbert modular
surface, and a variation on the Riemannian version~\eqref{eq:57} of a $\zeta
$-function. The infinite sum in~\eqref{eq:93} converges for $\Re(s)>\!>0$,
there is a meromorphic continuation\footnote{Notably, $\eta (s)$~is
holomorphic for $\Re(s)>-1/2$.} to the complex $s$-line, and $s=0$~is a
regular point. Define $\et Y=\eta (0)$. We remark that the main theorem
in~\cite{APS1} applies to more general first-order elliptic differential
operators.
The index theorem~\ref{thm:16} simplifies for the signature
operator~\eqref{eq:78}. Let $X$~be a compact oriented Riemannian
$4k$-manifold with product metric near~$\partial X$. The symmetric bilinear
form~\eqref{eq:8} is nondegenerate restricted to the image of
$H^{2k}(X,\partial X;{\mathbb R})$ in $H^{2k}(X;{\mathbb R})$, and $\Sign(X)$~is its signature.
\begin{corollary}[Atiyah-Patodi-Singer~\cite{APS1}]\label{thm:17}
In this situation,
\begin{equation}\label{eq:94}
\Sign(X) = \int_{X}\omega \;-\;\et{\partial X},
\end{equation}
where $\omega $~is the Chern-Weil form of the $L$-genus, and $\et{\partial X} $~is
the $\eta $-invariant of the self-adjoint operator on $\Omega
^{\textnormal{even}}(\partial X)$ given by $(-1)^{k+q+1}(*d-d*)$ on~$\Omega ^q(\partial X)$.
\end{corollary}
\noindent
In particular, $-\eta $~is the signature defect~\eqref{eq:87}. Note that
the signature defect is a \emph{spectral invariant} of a natural differential
operator on~$\partial X$, a property which is not apparent from its definition.
\begin{remark}[]\label{thm:18}
The signature defect also plays a star role in two of Atiyah's later
papers~\cite{A8,A9}.
\end{remark}
The $\eta $-invariant is our first example of a \emph{geometric} invariant of
a Dirac operator. To illustrate, recall Example~\ref{thm:24}. Let $Y\to S$
be a proper fiber bundle of odd relative dimension equipped with a relative
Riemannian spin structure. From this geometric data we obtain a family of
self-adjoint Dirac operators parametrized by~$S$. The lowest piece of the
topological index is a \emph{homotopy class} of maps $S\to\RR/\ZZ$. The
expression
\begin{equation}\label{eq:95}
\xia{Y/S} = \frac{\et{Y/S} + h\rule[-165000sp]{0pt}{0pt}
_{Y/S}}{2}\!\!\!\!\pmod1\:S\longrightarrow \RR/\ZZ
\end{equation}
from~\eqref{eq:92} refines the homotopy class to a specific map, the
geometric invariant in question. Also, Theorem~\ref{thm:16} implies that the
differential of~\eqref{eq:95} is
\begin{equation}\label{eq:96}
d\xia{Y/S} = \int_{Y/S}\omega ,
\end{equation}
where $\omega $ is the differential form in~\eqref{eq:92}. This is a kind of
``curvature'' formula for the geometric invariant~$\xia{Y/S}$; there is an
analogue for other geometric invariants of Dirac operators.
Atiyah-Patodi-Singer~\cite[\S7]{APS3}, in collaboration with Lusztig, gave
another analytic computation of the homotopy class of the map $S\to\RR/\ZZ$. For
any loop $S^1\to S$ they prove the winding number of the composite $S^1\to
S\to \RR/\ZZ$ is the \emph{spectral flow} of the pullback family of Dirac
operators parametrized by~$S^1$. The spectral flow counts with sign the
integer jumps in the $\xi $-invariant~\eqref{eq:95} as we travel
around~$S^1$. Alternatively, the union of the spectra of the Dirac
operators is a closed subset $C \subset S^1\times {\mathbb R}$; the spectral flow is
the intersection number of~$C$ with~$S^1\times \{0\}$.
\begin{example}[]\label{thm:25}
The simplest nontrivial spectral flow occurs for the family of complex
self-adjoint Dirac operators
\begin{equation}\label{eq:100}
D_s = \sqrt{-1} \frac{d}{dx} + s,\qquad 0\le s\le 1,
\end{equation}
acting on~${\mathbb R}/2\pi {\mathbb Z}$ with coordinate~$x$. The operator~$D_1$ is
isomorphic to~$D_0$: conjugate by the multiplication
operator~$e^{\sqrt{-1}x}$. The union of spectra~ $C\subset S^1\times {\mathbb R}$
~is a helix.
\end{example}
\subsection{Secondary geometric invariants}\label{subsec:7.4}
The most elementary secondary invariant is the total geodesic curvature of a
curve in a Riemannian 2-manifold; it appears in the Gauss-Bonnet
formula~\eqref{eq:85}. The associated primary topological invariant is the
Euler number. The generalizations below are more akin to the mod~${\mathbb Z}$
reduction of the total geodesic curvature, which is---up to a sign---the
holonomy of the Levi-Civita connection.
Let $G$~be a Lie group with finitely many components, $\pi \:P\to X$ a
principal $G$-bundle, and $\Theta \in \Omega ^1(P;\mathfrak{g})$ a connection
form. Let $p\in \bigl(\Sym^k\mathfrak{g}^* \bigr)^G$ be an Ad-invariant
polynomial on the Lie algebra~$\mathfrak{g}$. As we have already used,
Chern-Weil associate to this data a closed differential form $p(\Omega )\in
\Omega ^{2k}(X)$ that depends only on the curvature~$\Omega $ of~$\Theta $.
Furthermore, it is natural in the connection~$\Theta $. Its de Rham
cohomology class $\bigl[p(\Omega )\bigr]\in H^{2k}(X;{\mathbb R})$ is independent
of~$\Theta $, so is an invariant of the principal bundle~$\pi $. If $G$~is
compact, which we now assume, then this invariant is derived from a
characteristic class $c_p\in H^{2k}(BG;{\mathbb R})$ in the cohomology of the
classifying space of~$G$. In~1972, Chern-Simons~\cite{CS} introduced a
secondary geometric invariant attached to a refinement of~$c_p$ to an
integral cohomology class $c\in H^{2k}(BG;{\mathbb Z})$. (Refinements exist only if
the periods of~$c_p$ are integers.) In this situation, the primary
${\mathbb Z}$-valued invariant is a characteristic number of a principal bundle $\pi
\:P\to X$ over a $2k$-dimensional closed oriented manifold. The secondary
$\RR/\ZZ$-valued \emph{Chern-Simons invariant} is defined for $\pi \:Q\to Y$ with
connection~$\Theta $, where $Y$ is a closed oriented $(2k-1)$-dimensional
manifold. The secondary $\RR/\ZZ$-valued invariant depends on the connection,
whereas the primary ${\mathbb Z}$-valued invariant is topological.
\begin{example}[]\label{thm:19}
For~$N\in {\mathbb Z}^{\ge3}$ let $p_1\in H^4(B\!\SO_N;{\mathbb Z})$ be the universal first
Pontrjagin class of a principal $\SO_N$-bundle. Working intrinsically---that
is, with the tangential geometry of manifolds---the ${\mathbb Z}$-valued primary
invariant of a closed oriented 4-manifold~$X$ is
\begin{equation}\label{eq:97}
p_1(W)[W].
\end{equation}
The secondary invariant~$\Gamma (Y)$ on a closed oriented Riemannian
3-manifold~$Y$ is the Chern-Simons invariant of its Levi-Civita connection. In
this case~\cite[\S6]{CS}, $\Gamma (Y)$~is a conformal invariant and an
obstruction to the existence of a conformal immersion $Y\to\mathbb E^4$, where
$\mathbb E^4$~ is Euclidean 4-space.
\end{example}
\begin{remark}[]\label{thm:20}
The Chern-Simons invariant finds a natural expression in \emph{differential
cohomology} \cite{ChS,F2,HS}, which unifies the primary and secondary
invariants in a single framework.
\end{remark}
The Atiyah-Patodi-Singer $\eta $-invariant is a secondary invariant analogous
to the Chern-Simons invariant, but in index theory rather than the theory of
characteristic classes. Let $Y$~be a spin Riemannian manifold and $\pi
\:Q\to Y$ a principal $G$-bundle with connection. Whereas the Chern-Simons
story begins with an integral cohomology class $c\in H^{\bullet
}(BG;{\mathbb Z})$, to define the $\eta $-invariant we begin with a
complex\footnote{There is a refinement to real representations and real
$KO$-theory.} linear representation $\rho \:G\to\Aut(V)$; the isomorphism
class of~$\rho $ is an element of the equivariant $K$-theory group
$K^0_G(\pt)$. From the beginning we see the Chern-Simons invariant pertains to
integer cohomology, while the $\eta $-invariant pertains to $K$-theory. Form
the Dirac operator on~$Y$ coupled to the associated vector bundle $V_Q\to Y$
with its inherited covariant derivative. Then the $\RR/\ZZ$-valued invariant
\begin{equation}\label{eq:98}
\xia Y(V) = \frac{\et Y(V) + h\rule[-165000sp]{0pt}{0pt} _Y(V)}{2}\pmod1
\end{equation}
depends smoothly on the Riemannian metric and the connection on~$\pi
$.\footnote{For the special case of the signature operator, in which the
kernel---the harmonic forms---have cohomological significance, the
${\mathbb R}$-valued invariant is smooth. (It appears in~\eqref{eq:94}.)} The
corresponding primary invariant is the ${\mathbb Z}$-valued index of the twisted
Dirac operator on manifolds of dimension $\dim Y+1$ equipped with a principal
$G$-bundle.
\begin{remark}[]\label{thm:21}
To obtain a non-topological invariant, we must have $\dim Y$ odd. The $\eta
$-invariant also leads to new and interesting topological invariants in even
dimensions, for example on unoriented manifolds with a pin
structure~\cite{Gi2}.
\end{remark}
\begin{example}[]\label{thm:22}
Consider $\dim Y=3$ as in Example~\ref{thm:19}, but now assume $Y$~is a
closed spin Riemannian manifold. The expression~\eqref{eq:98} for the
standard Dirac operator (no principal $G$-bundle) is the $\RR/\ZZ$-valued
secondary invariant of the index of the Dirac operator on a closed spin
4-manifold~$X$, which by the index theorem~\eqref{eq:42} is
\begin{equation}\label{eq:99}
\ind D_X = -\frac{1}{24}\,p_1(TW)[W].
\end{equation}
The difference with~\eqref{eq:97} is the rational factor. The integrality of
the ${\hat A}$-genus (recall~\eqref{eq:24}) implies \eqref{eq:99}~is an integer.
Turning to the secondary invariants~$\Gamma (Y)$ and~$\xia Y$, since they are
$\RR/\ZZ$-valued we cannot multiply~$\Gamma (Y)$ by a non-integral rational
number like~$-1/24$; instead we clear denominators and compare $-24\xia Y$
with~$\Gamma (Y)$. In the case at hand they agree; a similar comparison in
more general circumstances leads to a spin bordism invariant. In any case,
we see that the $\eta $-invariant is a more subtle invariant than the
Chern-Simons invariant. Put differently, the secondary invariants based on
$K$-theory contain refined information over those based on integer
cohomology. This echoes the stronger topological information derived from
integrality of the primary invariants; see~\S\ref{subsec:2.4}.
\end{example}
\begin{remark}[]\label{thm:23}
\
\begin{enumerate
\item As a concrete illustration of this extra power,
Atiyah-Patodi-Singer~\cite[\S4]{APS2} use the $\eta $-invariant of the
signature operator to refine the Chern-Simons obstruction to conformal
embeddings $Y^3\to\mathbb E^4$. Also, they show how to use $\eta $-invariants to
construct the Adams $e$-invariant, an invariant of framed bordism.
\item The primary indices and secondary $\eta $-invariants are unified in
the framework of differential $K$-theory; compare Remark~\ref{thm:20}.
See~\cite{FL} and the references therein.
\item The Atiyah-Patodi-Singer $\eta $-invariant appears in many contexts in
geometry and beyond. It also, together with other characters in topological
and geometric index theory, makes many appearances in theoretical physics:
quantum field theory, string theory, and condensed matter theory.
\end{enumerate}
\end{remark}
\subsection{Determinants of Dirac operators}\label{subsec:7.5}
Before proceeding to Dirac operators, consider a second-order Laplace
operator~$\Delta $ on a closed manifold~$X$, as in~\S\ref{subsec:6.1}. Then
$\Delta $~has a discrete spectrum consisting of eigenvalues $0\le\lambda
_1\le\lambda _2\le\cdots$, repeated with multiplicity. Formally, the
determinant of~$\Delta $ is
\begin{equation}\label{eq:101}
\det\Delta \;\textnormal{``$=$''} \;\prod\limits_{m=1}^{\infty}\lambda _m.
\end{equation}
(Assume $\lambda _1>0$ or omit the zero eigenvalues to avoid $\det\Delta
=0$.) Of course, this infinite product diverges. For example, if $X=S^1$
and $\Delta $~is the usual scalar Laplace operator, then up to a constant the
infinite product is $\prod_{m=1}^{\infty}m^2$ after omitting the zero
eigenvalue. One way to impart a value to this infinite product, pioneered by
Ray-Singer~\cite{RS} in~1971 and following a technique familiar in complex
analysis~\cite{JL}, is to use the analytic continuation of the $\zeta
$-function~\eqref{eq:57}, which is defined as
\begin{equation}\label{eq:102}
\zeta \mstrut _\Delta (s) = \sum\limits_{m=1}^{\infty}\lambda ^{-s},\qquad s\in {\mathbb C},
\end{equation}
for $\Re (s)>\!>0$. Then in the region of absolute convergence of the
infinite sum, we differentiate
\begin{equation}\label{eq:103}
-\zeta_{\Delta }'(s) = \sum_{m=1}^{\infty}\lambda ^{-s}\log\lambda ,
\end{equation}
and then use the regularity of the analytic continuation of~$\zeta \mstrut _\Delta $ at~$s=0$ to
define
\begin{equation}\label{eq:104}
\det\Delta := e^{-\zeta_{\Delta }'(0)} .
\end{equation}
For the scalar Laplace operator on~$S^1$, the elliptic $\zeta $-function
defined in~\eqref{eq:102} reduces to the Riemann $\zeta $-function, up to a
constant.
The first-order Dirac operator~\eqref{eq:41} is not self-adjoint; its domain
and codomain are different. A finite dimensional model is a linear operator
\begin{equation}\label{eq:105}
T\:V^0\longrightarrow V^1
\end{equation}
between different vector spaces~$V^0,V^1$. There is an induced map
${\textstyle\bigwedge} ^qT\:{\textstyle\bigwedge} ^qV^0\to
{\textstyle\bigwedge} ^qV^1$ on each exterior power. If $\dim V^0=\dim V^1$,
then the induced map for $q=\dim V^i$ is the determinant
\begin{equation}\label{eq:106}
\det T\:\Det V^0\longrightarrow \Det V^1,
\end{equation}
where $\Det V^i = {\textstyle\bigwedge} ^{\dim V^i}(V^i)$ is the determinant
line. If $V^0=V^1$, then the operator~$\det T$ is multiplication by the
numerical determinant. But in general\footnote{If $\dim V^0\neq \dim V^1$,
define $\det T=0$.} $\det T$~is an element of a line, namely the
1-dimensional vector space
\begin{equation}\label{eq:123}
\Hom(\Det V^0,\Det V^1)
\end{equation}
called the \emph{determinant line}. The determinant construction generalizes
to Fredholm operators~\eqref{eq:105}, where now $V^0,V^1$ are typically
infinite dimensional. The formula~\eqref{eq:123} does not make sense if
$V^0,V^1$ are infinite dimensional; rather, the determinant line is defined
using the finite dimensionality of the kernel and cokernel. Quillen~\cite{Q}
constructs a determinant line bundle $\pi \:\Det\to \Fred$ over the space of
Fredholm operators together with a continuous section $\det\:\Fred\to \Det$.
It is the next topological invariant of Fredholm operators after the
numerical index~\eqref{eq:34}.
Let $f\:X\to S$ be a proper fiber bundle with fibers of even dimension~$n$,
and assume $f$~is endowed with a relative Riemannian spin structure, as in
Example~\ref{thm:24}. For a complex vector bundle $V\to X$ with covariant
derivative, the index of the resulting family~$D_{X/S}(V)$ of complex
Clifford linear Dirac operators is computed by the pushforward
\begin{equation}\label{eq:107}
f_!\:K^0(X)\longrightarrow K^{-n}(S).
\end{equation}
The numerical index is the image of~$f_![V]$ under $K^{-n}(S)\to H^0(S;{\mathbb Z})$.
Parallel to~\eqref{eq:83}, the next lowest piece of the topological index is
computed by a natural map
\begin{equation}\label{eq:108}
\Det\:K^{-n}(S)\longrightarrow H^2(S;{\mathbb Z}).
\end{equation}
The index theorem for families implies that the \emph{topological}
equivalence class of the Fredholm determinant line bundle
\begin{equation}\label{eq:109}
\Det D_{X/S}(V)\longrightarrow S
\end{equation}
is $\Det f_![V]\in H^2(S;{\mathbb Z})$.
There is a \emph{geometric} refinement of this topological piece of the
index. Its analytic expression is a hermitian connection and compatible
covariant derivative on the determinant line bundle~\eqref{eq:109}. The
\emph{Quillen metric}~\cite{Q} is constructed using the $\zeta $-function
determinant~\eqref{eq:104}, and the covariant derivative uses a similar---but
somewhat more subtle---$\zeta $-function~\cite{BiF1}. The isomorphism class
of a line bundle with covariant derivative is determined by its holonomy
around loops. Base change along a loop $\varphi \:S^1\to S$ gives rise to a
fiber bundle $X_\varphi \to S^1$ and vector bundle $V_\varphi \to X_{\varphi
}$. The bounding spin structure on~$S^1$ combines with the relative spin
structure on~$X_\varphi /S^1$ to produce a spin structure on~$X_\varphi $.
Choose an arbitrary metric~$g\rule[-165000sp]{0pt}{0pt} _{S^1}$ on~$S^1$, and let $X_\varphi
(\epsilon )$ be the manifold~$X_\varphi $ with Riemannian metric $g\rule[-165000sp]{0pt}{0pt}
_{S^1}\,/\,\epsilon ^2\,\oplus \,g\rule[-165000sp]{0pt}{0pt} _{X_\varphi /S^1}$. (The direct
sum is with respect to the horizontal distribution in the relative Riemannian
structure.) Then the holonomy around the loop~$\varphi $ is~\cite{BiF2}
\begin{equation}\label{eq:110}
\hol_\varphi \Det D_{X/S}(V) = \lim\limits_{\epsilon \to0}e^{-2\pi i\xia
{X_\varphi (\epsilon )}(V)},
\end{equation}
where the exponent is the Atiyah-Patodi-Singer $\eta
$-invariant~\eqref{eq:98}. This holonomy formula was inspired by Witten's
global anomaly~\cite{Wi3}. The curvature of the determinant line bundle is
\begin{equation}\label{eq:111}
\curv\Det D_{X/S}(V) = 2\pi i\int_{X/S}\omega ,
\end{equation}
where $\omega $~is the Chern-Weil form that represents
${\hat A}(X/S)\smallsmile\ch(V)$; compare~\eqref{eq:96}.
\begin{remark}[]\label{thm:26}
\
\begin{enumerate
\item The \emph{adiabatic limit} in~\eqref{eq:110} was introduced
in~\cite{Wi3}. Other geometric interpretations of Witten's global anomaly
formula were given in~\cite{Che,S2}.
\item The holonomy formula~\eqref{eq:110} may be regarded as a Fubini
theorem relating the geometric invariants~$\eta $ and~$\Det$, once one knows
that the holonomy of a line bundle $L\to S^1$ is the exponentiated $\eta
$-invariant of $D_{S^1}(L)$.
\item As in Remark~\ref{thm:23}(2), the isomorphism class of the determinant
line bundle with its metric and covariant derivative can be computed by a
pushforward in differential $K$-theory. This refines the topological index
theorem which computes the topological isomorphism class of~\eqref{eq:109} as
$\Det f_![V]$.
\end{enumerate}
\end{remark}
\section{Anomalies and index theory}\label{sec:8}
In part inspired by Is Singer's advocacy of theoretical physics as a fertile
ground for geometers, beginning in the late~1970's Michael Atiyah turned his
attention to geometric problems in quantum field theory and, later, string
theory. Simon Donaldson's paper~\cite{Do} in this volume covers the burst of
activity in the late~1970's and early~ 1980's emanating from the Yang-Mills
equations. The Atiyah-Singer index theorem is a part of that story, but I
will restrict my exposition here to Atiyah's work in the late 1980's on
anomalies and on his axiomatization of topological field theory.
We begin in~\S\ref{subsec:8.1} by arguing that anomalies are an expression of
the projective (as opposed to linear) nature of quantum theory. The
geometrical and topological link between anomalies and index theory was
initiated in a joint paper of Atiyah-Singer, which we summarize
in~\S\ref{subsec:8.3}. Atiyah's axioms for topological field theory, and
their relationship to bordism in algebraic topology, are the subjects
of~\S\ref{subsec:8.2}. We conclude in~\S\ref{subsec:8.4} by mentioning the
modern point of view on anomalies, which ties together the two aforementioned
Atiyah works. The specialization to spinor fields brings in topological and
geometric index theorems as well, all synthesized in a general anomaly
formula which draws on many of the Atiyah papers we have discussed.
\subsection{Projectivity and symmetries in quantum mechanics}\label{subsec:8.1}
Anomalies are often said to be the failure of a classical symmetry to hold in
a corresponding quantum system. More precisely, a quantum symmetry is
projective and the anomaly is the obstruction to linearization. Quantum
theory is inherently projective, and the anomaly---in a more general sense
than a notion tied to symmetry---encodes the projectivity of a quantum
system.
A quantum mechanical system is specified\footnote{There is a more general
framework for quantum theory using $C^*$-algebras, but for this exposition
the simpler context suffices.} by a triple of data~$(\mathscr{P},p,H)$. The
space~$\mathscr{P}$ is a projective space, the projectivization~$\PP\mathscr{H}$ of a complex
separable Hilbert space~$\mathscr{H}$, but $\mathscr{H}$~is not singled out. One way to
define~$\mathscr{P}$ is to fix~$\mathscr{H}_0$ and let $\mathscr{C}_{\mathscr{P}}$~be the groupoid whose objects
are pairs~$(\mathscr{H},\theta )$ of a Hilbert space and a projective linear
isomorphism $\theta \:\PP\mathscr{H}_0\to \PP\mathscr{H}$. Morphisms $(\mathscr{H},\theta )\to
(\mathscr{H}',\theta ')$ are linear isometries $\mathscr{H}\to \mathscr{H}'$ whose projectivization
commutes with~$\theta ,\theta '$; they form a torsor over the unitary group
$\mathbb T\subset {\mathbb C}^{\times }$ of unit norm scalars. The basepoint~$\mathscr{H}_0$ is
\emph{not} part of the structure. Define $\mathscr{P}$ as the limit of~$\PP\mathscr{H}$ over
all $(\mathscr{H},\theta )\in \mathscr{C}_{\mathscr{P}}$. Also, define the $*$-algebra~$\mathfrak{A}_{\mathscr{P}}$ (of
observables) as the limit of~$\End\mathscr{H}$ over $(\mathscr{H},\theta )\in \mathscr{C}_{\mathscr{P}}$.
($\End\mathscr{H}$~is the algebra of bounded linear operators on~$\mathscr{H}$; for
simplicity, we omit unbounded operators from this exposition.) The
projective space~$\mathscr{P}$ is the space of \emph{pure states} of the quantum
system. Embed $\mathscr{P}\hookrightarrow \mathfrak{A}_{\mathscr{P}}$ as rank one orthogonal projections.
Then mixed states are convex combinations of pure states. The function
\begin{equation}\label{eq:112}
\begin{aligned} p\:\mathscr{P}\times \mathscr{P}&\longrightarrow \;\;[0,1] \\
L_1,L_2&\longmapsto |\langle \psi _1,\psi _2
\rangle|^2,\qquad \psi _i\in L_i\end{aligned}
\end{equation}
is used to compute transition probabilities. To define~$p$, choose
$(\mathscr{H},\theta )\in \mathscr{C}_{\mathscr{P}}$ and identify~$\mathscr{P}$ with~$\PP\mathscr{H}$; then $L_i\subset \mathscr{H}$
is a line and $\psi _i\in L_i$ is a unit norm vector. The
\emph{Hamiltonian}~$H$ is a self-adjoint element of~$\mathfrak{A}_{\mathscr{P}}$, usually assumed to
have spectrum bounded below.
Fix $(\mathscr{H},\theta )\in \mathscr{C}_{\mathscr{P}}$. Let $G(\mathscr{H})$~be the infinite-dimensional Lie
group with identity component the group~$U(\mathscr{H})$ of unitary automorphisms
of~$\mathscr{H}$ and off-identity component the torsor of antiunitary automorphisms.
A basic theorem of Wigner asserts that the sequence of Lie group
homomorphisms
\begin{equation}\label{eq:113}
1\longrightarrow \mathbb T\longrightarrow
G(\mathscr{H})\xrightarrow{\;\;q\;\;}\Aut(\PP\mathscr{H},p)\longrightarrow 1
\end{equation}
is a group extension: $q$~is surjective. Let $G$~be a Lie group of
symmetries of~$(\mathscr{P},p)$, i.e., a homomorphism $G\to \Aut(\mathscr{P},p)$. By
pullback, we obtain a group extension
\begin{equation}\label{eq:114}
1\longrightarrow \mathbb T\longrightarrow G_{\mathscr{H}}\longrightarrow G\longrightarrow
1
\end{equation}
and a $\zmod2$-grading $\epsilon \:G\to \zmod2$. The $\zmod2$-grading is independent
of~$(\mathscr{H},\theta )$, as is the isomorphism class of the
extension~\eqref{eq:114}. The $\zmod2$-graded group extension~\eqref{eq:114}
can be called the \emph{anomaly}; it measures the projectivity of the
symmetry.
\begin{remark}[]\label{thm:27}
\
\begin{enumerate
\item If $(\mathscr{P},p,H)$ has a classical limit, and the symmetry persists in the
limit, then it is the Lie group~$G$ which acts on the classical system. The
passage from~$G$ to~$G_\mathscr{H}$ is what was referenced in the first paragraph of
this section.
\item Suppose given a family of quantum systems with parameter manifold~$S$,
so in particular a fiber bundle $\mathscr{P}\to S$ of projective Hilbert spaces. In
some physical situations one wants to ``integrate over~$S$'' to form a new
quantum mechanical system. If we write $\mathscr{P}\to S$ as the projectivization of
a vector bundle $\mathscr{E}\to S$ of Hilbert spaces, then the state space of the
integrated system is the space of $L^2$~sections of $\mathscr{E}\to S$, assuming a
measure on~$S$. The anomaly is the obstruction to lifting $\mathscr{P}\to S$ to a
vector bundle, a necessary first step to integrate out~$S$. On the other
hand, in the absence of integrating out~$S$ the anomaly is not an obstruction
but rather a feature of a family of quantum systems, useful in many
contexts.
\item The isomorphism class of the central extension~\eqref{eq:114} lives in
the cohomology group $H^2(G;\mathbb T)$. (The type of cohomology depends on the
type of group. Nothing is lost here by assuming that $G$~is a finite group.)
If we drop a cohomological degree, then $H^1(G;\mathbb T)$ is the group of
1-dimensional unitary representations. Therefore, the projectivity measured
in~\eqref{eq:114} is obtained via a 2-step procedure starting with linear
actions of~$G$ on~$\mathscr{H}$: (1)~replace~$\mathscr{H}$ by a 1-dimensional vector space,
and (2)~interpret 1-dimensional representations of~$G$ cohomologically and
raise the cohomological degree by~1. We will see an analogous procedure in
quantum field ~(\S\ref{subsec:8.4}).
\end{enumerate}
\end{remark}
Let $t_0<t_1<\cdots< t_{n+1}$ be real numbers, thought of as points on the
affine time line, and let $A_1,\dots ,A_n\in \mathfrak{A}_{\mathscr{P}}$. Fix initial and final
pure states $L_0,L_{n+1}\in \mathscr{P}$. A basic quantity of interest in quantum
mechanics is the probability\footnote{If the linear operator $\evo{n+1}n
A_n\cdots\evo21 A_1\evo10$ is zero on~$L_0$, the probability is zero.}
\begin{equation}\label{eq:115}
p\bigl(L_{n+1}\,,\, \evo{n+1}n A_n\cdots\evo21 A_1\evo10 L_0 \bigr),
\end{equation}
where $\hbar$~is Planck's constant. Physical questions may be phrased in
terms of these probabilities. Fix $(\mathscr{H},\theta )\in \mathscr{C}_{\mathscr{P}}$, identify
$\mathscr{P}\approx \PP\mathscr{H}$, and choose unit norm vectors $\psi _0\in L_0$ and
$\psi _{n+1}\in L_{n+1}$. The \emph{amplitude}, or \emph{correlation
function}, of this data is the complex number
\begin{equation}\label{eq:116}
\bigl\langle \psi _{n+1}\,,\, \evo{n+1}n A_n\cdots\evo21 A_1\evo10 \psi _0
\bigr\rangle_{\mathscr{H}} .
\end{equation}
More invariantly, the data $L_0,L_{n+1},t_0,\dots ,t_{n+1},A_1,\dots ,A_n$
determine a hermitian line~$\mathcal{L}$, and the amplitude is an element of~$\mathcal{L}$
whose norm is the probability~\eqref{eq:115}.
\begin{remark}[]\label{thm:28}
The fact that the amplitudes of~$(\mathscr{P},p,H)$ lie in a line~$\mathcal{L}$ without a
distinguished basis element is another aspect of the projectivity of quantum
mechanics. The lines~$\mathcal{L}$ form a line bundle over a parameter space of
data. These line bundles are part of the anomaly of the quantum mechanical
system, a counterpart for correlation functions of the projective bundles in
Remark~\ref{thm:27}(2).
\end{remark}
The context for anomalies sketched in this section is soft, much as is
index theory for general Fredholm operators. Quantum field theory brings in
the geometry of Wick-rotated spacetimes, and in that context anomalies also
exhibit more geometry, much as does index theory for Dirac operators. This
is more than an analogy in the case of fermionic fields, to which we now
turn.
\subsection{Spinor fields and anomalies in quantum field theory}\label{subsec:8.3}
Geometric links between anomalies for spinor fields and index theory were
forged in a 1984 paper of Atiyah-Singer~\cite{AS7}. (Other contemporaneous
papers, such as \cite{AgW,AgG,Lt2} also brought index polynomials into the
theory of anomalies.) The setup is gauge theory in physics. (By that time
Atiyah had already achieved many results in mathematical gauge theory; see
the article~\cite{Do} by Donaldson in this volume.) We first summarize
their work and then relate it to the geometric picture of anomalies.
Let $n$~be an even positive integer and $X$~a closed Riemannian spin manifold
of dimension~$n$. Suppose $P\to X$ is a principal bundle with structure
group a compact Lie group~$G$. Let $\mathcal{A}$~be the infinite dimensional affine
space of connections on $P\to X$, and let $\mathscr{G}$~be the group of gauge
transformations: automorphisms of $P\to X$ which act as the identity on~$X$.
Then $\mathscr{G}$~acts on~$\mathcal{A}$. Assume $X$~is connected, fix a
basepoint~$p_0\in P$, and let $\mathscr{G}_0\subset \mathscr{G}$ be the subgroup of gauge
transformations which fix~$p_0$. Then $\mathscr{G}_0$~acts freely on~$\mathcal{A}$, and in
the sequence
\begin{equation}\label{eq:117}
\frac{\mathcal{A}\times P}{\mathscr{G}_0}\xrightarrow{\;\;\pi
\;\;}\frac{\mathcal{A}}{\mathscr{G}_0}\times X
\xrightarrow{\;\;\pr_1\;\;}\frac{\mathcal{A}}{\mathscr{G}_0} ,
\end{equation}
$\pi $~is a principal $G$-bundle and $\pr_1$~is a product fiber bundle with
fiber~$X$. To a unitary representation of~ $G$ we associate a vector bundle
to~$\pi $. This data determines a topological index
\begin{equation}\label{eq:118}
\ind\in K^{-2n}(\mathcal{A}/\mathscr{G}_0)\cong K^0(\mathcal{A}/\mathscr{G}_0).
\end{equation}
Atiyah-Singer construct closed differential forms which represent
$\ch(\ind)\in H^{\bullet }(\mathcal{A}/\mathscr{G}_0;{\mathbb R})$ as follows. Fix a bi-invariant
Riemannian metric on~$G$. Then for each connection~$A\in \mathcal{A}$, the
manifold~$P$ has a Riemannian metric which makes the projection $P\to X$ a
Riemannian submersion in which the horizontal subspaces of the connection are
orthogonal to the fibers. Use the $L^2$~metric on~$\mathcal{A}$ to form a warped
product metric on~$\mathcal{A}\times P$. Then $\mathscr{G}_0\times G$ acts by isometries,
and a connection on~$\pi $ results by taking orthogonals to the $G$-orbits on
the quotient by~$\mathscr{G}_0$. The associated vector bundle inherits a covariant
derivative, so there is a family of Dirac operators on~$X$ parametrized
by~$\mathcal{A}/\mathscr{G}_0$, and the index theorem for families (\S\ref{subsec:5.4})
implies that ind in~\eqref{eq:118} equals its analytic index. The Chern-Weil
procedure produces the desired differential forms from the differential
geometric data. In particular, $\ch_1(\ind)\in H^2(\mathcal{A}/\mathscr{G}_0;{\mathbb R})$ is
represented by
\begin{equation}\label{eq:119}
\int_{X}\omega
\end{equation}
for a $(2n+2)$-form~$\omega $ on $(\mathcal{A}/\mathscr{G}_0)\times X$. Atiyah-Singer
transgress~$\omega $ to a $(2n+1)$-form on $\mathscr{G}_0\times X$, and it is this
differential form which appears in the contemporaneous physics literature as
the anomaly of a spinor field in quantum field theory. They also relate
their result to determinants. In particular, they interpret the cohomology
class $c_1(\ind)\in H^2(\mathcal{A}/\mathscr{G}_0;{\mathbb Z})$ of~\eqref{eq:119} as the isomorphism
class of the determinant line bundle of the family of Dirac operators on~$X$
parametrized by~$\mathcal{A}/\mathscr{G}_0$.
The determinant, or more generally pfaffian, of a Dirac operator arises
directly in Wick-rotated quantum field theories with spinor fields, as we now
sketch in a general context. Let $n$~be a positive integer, $G$~a compact
Lie group, and $\rho $~a representation of~$G$. Suppose
\begin{equation}\label{eq:120}
P\xrightarrow{\;\;\pi \;\;}X\xrightarrow{\;\;f\;\;}S
\end{equation}
is a principal $G$-bundle~$\pi $ with connection and a proper fiber
bundle~$f$ of relative dimension~$n$, the latter equipped with a relative
Riemannian spin structure. As in~\S\ref{subsec:5.4}, this data produces a
family of Dirac operators~$D_{X/S}$ parametrized by~$S$. The Feynman
integral over the spinor field~$\psi $ is an infinite dimensional variant of
a standard Gaussian integral:
\begin{equation}\label{eq:121}
\int_{\mathscr{S}_s} e^{-(\psi ,D_s\psi )}.
\end{equation}
For each~$s\in S$ we are meant to integrate over the infinite dimensional
vector space~$\mathscr{S}_s$ of spinor fields. The Dirac operator~$D_s$ appears in
the exponent, which is a skew-symmetric bilinear form
on~$\mathscr{S}_s$.\footnote{Physicists begin with a relativistic theory on Minkowski
spacetime in Lorentz signature, and then they Wick rotate to Riemannian
manifolds. What emerges naturally is the bilinear form in the exponent.} By
analogy with finite dimensional integrals, \eqref{eq:121}~is defined to be
$\pfaff D_s$, the pfaffian of the Dirac operator. In special cases, such as
the Atiyah-Singer setup above, the pfaffian reduces to a determinant, and we
make that simplification here. Then the result of the
integral~\eqref{eq:121} is the section $\det D_{X/S}$ of the determinant line
bundle
\begin{equation}\label{eq:122}
\Det D_{X/S}\longrightarrow S,
\end{equation}
as in~\S\ref{subsec:7.5}.
\begin{remark}[]\label{thm:29}
\
\begin{enumerate
\item The integral~\eqref{eq:121} is an example of a correlation function in
Feynman's approach to quantum field theory. The fact that it is an element
of a complex line, rather than a complex number, is precisely the situation
of anomalous amplitudes discussed in~\S\ref{subsec:8.1}. Here the
determinant line bundle~\eqref{eq:122}, including its metric and covariant
derivative, is the anomaly.
\item The universal parameter space~$S$, for a fixed manifold~$X$, is the
space of Riemannian metrics and $G$-connections on~$X$. In a quantum field
theory one often wants to integrate over the metric or connections or both.
The anomaly is an obstruction to doing so.
\end{enumerate}
\end{remark}
The anomaly is the obstruction to a trivialization of~\eqref{eq:122}. The
topological first Chern class of the index discussed by Atiyah-Singer
(cf.~\cite{S3}) obstructs a nonzero section, but one needs something
sharper. In~\cite{F3} the anomaly is identified as the obstruction to a
\emph{flat} section, relative to the natural connection~\cite{BiF1}. This
leads to an interpretation of the 2-form~\eqref{eq:119} computed by
Atiyah-Singer as the curvature of this natural connection. Physicists call
this local obstruction to a flat section the \emph{local anomaly}; the
holonomy is the \emph{global anomaly} of Witten~\cite{Wi3}. Indeed, the
developments in geometric index theory recounted in~\S\ref{subsec:7.5} were
directly inspired by this geometry of anomalies.
\begin{remark}[]\label{thm:33}
The anomaly as an obstruction to lifting a bundle of projective spaces
to a vector bundle (Remark~\ref{thm:27}(2)) is measured by the next invariant
in geometric index theory after the determinant line bundle---the Dirac
gerbe~\cite{Lt1,Bu}. We refer the reader to~\cite{FS,Seg2,NAg}.
\end{remark}
\subsection{Topological field theory and bordism}\label{subsec:8.2}
Atiyah's engagement with quantum field theory went well beyond the index
theorem. One particularly influential paper~\cite{A11} sets out axioms for
\emph{topological} quantum field theories, parallel to axioms introduced
previously by Segal~\cite{Seg3} for 2-dimensional conformal field theories.
One key impetus was Witten's quantum Chern-Simons theory~\cite{Wi4}, which
places the Jones invariants of knots in a manifestly 3-dimensional framework.
But there were many other examples too that Atiyah abstracted into his
axioms. His paper~\cite{A11} is dedicated to Thom, and indeed bordism theory
is very much at the forefront. Atiyah~\cite{A12} writes the following about
this paper:
\begin{quote}
Because mathematicians are frightened by the Feynman integral and are
unfamiliar with all the jargon of physicists there seemed to me to be a need
to explain to mathematicians what a topological quantum field theory really
was, in user-friendly terms. I gave a simple axiomatic treatment (something
mathematicians love) and listed the examples that arise from physics. The
task of the mathematician is then to construct, by any method possible, a
theory that fits the axioms. I like to think of this as analogous to the
Eilenberg-Steenrod axioms of cohomology, where one can use simplicial, Cech
or de Rham methods to construct the theory. This last is closest to physics
but the others have some advantages. In the quantum field theory context,
where things are vastly more difficult, the combinatorial approach is so far
the only one that has been made to work (for the Jones polynomials).
\end{quote}
\noindent
Here we give a concise version of the axioms.
As motivation, recall the signature of a closed oriented manifold of
dimension~$4k$ for some $k\in {\mathbb Z}^{\ge0}$. As used crucially in the proof of
Theorem~\ref{thm:3}, the signature is a \emph{bordism invariant}, that is, a
homomorphism of abelian groups
\begin{equation}\label{eq:124}
\Sign\:\Omega _{4k}(\SO)\longrightarrow {\mathbb Z},
\end{equation}
where $\Omega _{4k}(\SO)$ is Thom's bordism group of closed oriented
$4k$-manifolds. A topological field theory is a ``categorified bordism
invariant''. Fix a nonnegative integer~$d$. (The relation to~$n$
in~\S\ref{subsec:8.3} is $n=d+1$.) Let $\Bord_{\langle d,d+1 \rangle}$ be the following category,
first introduced by Milnor~\cite{Mi2}. The objects are closed $d$-manifolds.
If $Y_0,Y_1$ are two such, then a morphism $Y_0\to Y_1$ is represented by a
compact $(d+1)$-manifold~$X$ with boundary partitioned as $\partial X=Y_0\amalg
Y_1$. In other words, $X$~is a bordism from~$Y_0$ to~$Y_1$. Diffeomorphic
bordisms rel boundary represent the same morphism. Composition glues
bordisms and disjoint union of manifolds provides a symmetric monoidal
structure.
\begin{remark}[]\label{thm:30}
\
\begin{enumerate
\item If we declare objects $Y_0,Y_1$ of~$\Bord_{\langle d,d+1 \rangle}$ to be equivalent if there
exists a morphism $Y_0\to Y_1$, then the set of equivalence classes is the
bordism group~$\Omega _d$. In this sense, $\Bord_{\langle d,d+1 \rangle}$ ``categorifies''~$\Omega
_d$.
\item A small variation yields bordism categories with tangential structure,
such as an orientation.
\end{enumerate}
\end{remark}
We can now state the axioms. Let $k$~be a field and let $\Vect_k$~be the
category of $k$-vector spaces and linear maps. (In quantum theories,
$k={\mathbb C}$.) The operation of tensor product defines a symmetric monoidal
structure on~$\Vect_k$.
\begin{definition}[Atiyah~\cite{A11}]\label{thm:31}
A \emph{topological field theory} is a symmetric monoidal functor
\begin{equation}\label{eq:125}
F\:\Bord_{\langle d,d+1 \rangle}\longrightarrow \Vect_k.
\end{equation}
\end{definition}
\noindent
This definition is sometimes referred to as the \emph{Atiyah-Segal Axiom
System}, and with suitable modifications and extensions it is believed to
apply widely to field theories in mathematics and physics. The viewpoint in
these axioms is very different from what one sees in physics texts. The
Atiyah-Segal Axiom System has provided a generation of mathematicians with a
point of entry to this physics, they are the structure upon which many
mathematical developments have been built, and they have illuminated
geometric aspects of quantum field theories in physics as well.
To illustrate Definition~\ref{thm:31}, we show how to extract numerical
invariants of a normally framed knot $K\subset M$ in a closed 3-manifold~$M$
from a field theory~$F$ with~$d=2$. Let $X$~be the 3-manifold obtained
from~$M$ by removing an open tubular neighborhood of~$K$. The result is a
bordism $X\:\partial X\to \emptyset ^2$ from~$\partial X$ to the empty
2-manifold. A normal framing of~$K$ provides an isotopy class of
diffeomorphisms $\partial X\approxS^1\times S^1$. Hence the value of the
field theory~$F$ on~$X$ is a linear map
\begin{equation}\label{eq:126}
F(X)\:V\longrightarrow k,
\end{equation}
where $V=F(S^1\times S^1)$ is the vector space attached to the standard
2-torus. For each vector~$\xi \in V$, which may be viewed as a ``label''
attached to~$K$, we obtain a numerical invariant~$F(X)(\xi )$. The Jones
invariants of knots are of this type. This is one of the key observations
in~\cite{Wi4}.
\subsection{Synthesis}\label{subsec:8.4}
We conclude by bringing together the Atiyah-Singer work on anomalies
(\S\ref{subsec:8.3}), the Atiyah-Segal Axiom System for quantum field
theory (\S\ref{subsec:8.2}), and the index theorems in~\S\S\ref{sec:4},
\ref{sec:5}, \ref{sec:7}.
One starting point is Remark~\ref{thm:29}(2), which tells that an anomaly
must be trivialized to construct a quantum field theory by integrating over
certain fields, such as metrics or connections. (Such integrals are
problematic analytically, but the anomaly and trivializations are
mathematically well-defined.) Now if the resulting quantum field theory is
to be \emph{local}---and locality is a characteristic feature of quantum
field theories, then the trivializations of the anomaly must be coherent in
the background data~\eqref{eq:120}. That coherence is precisely what is
expressed in the Atiyah-Segal Axiom System and its extensions. This is one
line of reasoning which leads to the realization that an anomaly itself is a
quantum field theory,\footnote{This is not quite universally true: The
anomaly of an $n$-dimensional field theory may not be a full
$(n+1)$-dimensional theory, but may only be defined on manifolds of
dimension~$\le n$.} albeit of a very special type. For the spinor field
in~\S\ref{subsec:8.3}, the determinant lines in the fibers of~\eqref{eq:122}
are 1-dimensional state spaces in an $(n+1)$-dimensional field theory. This
\emph{anomaly theory} is \emph{invertible}, but is not necessarily
topological. (An invertible field theory~\eqref{eq:125} factors through the
subgroupoid $\Line_k\subset \Vect_k$ of lines and invertible linear maps.)
\begin{remark}[]\label{thm:34}
We arrive at the same picture by following the ideas of~\S\ref{subsec:8.1}.
Namely, a field theory in the form~\eqref{eq:125} is a \emph{linear}
representation of bordism, but quantum theory is \emph{projective} and the
anomaly measures the projectivity. Furthermore, Remark~\ref{thm:27}(3) gives
a roadmap to locate this measurement. Here the bordism category plays the
role of the group~$G$. First, replace~$\Vect_k$ by the category of 1-dimensional
vector spaces and invertible linear maps. What results is an
\emph{invertible} field theory. Second, we interpret an invertible field
theory cohomologically and raise the cohomological degree by~1. The
cohomological interpretation was introduced in~\cite{FHT};
see~\cite[\S5]{FH}. We arrive at the same conclusion: the anomaly, or
measurement of projectivity, of a field theory is an invertible
$(n+1)$-dimensional field theory.\footnote{More precisely, an $n$-dimensional
field theory is a representation of a bordism category~$\mathscr{B}$. Following the
logic of this paragraph, the anomaly is defined on the \emph{same} bordism
category~$\mathscr{B}$, so it is a ``once-categorified invertible $n$-dimensional
field theory'', as indicated in the previous footnote. Typically, the
anomaly extends to a full invertible $(n+1)$-dimensional field theory, but
that is not required.}
\end{remark}
This already brings together the aforementioned 1980s work of Atiyah, but we
can go much further. Whereas a general field theory is a functor between
symmetric monoidal categories, an invertible field theory can be formulated
in stable homotopy theory, as a map of spectra. The domain, rather than a
bordism category, is a bordism spectrum of the type\footnote{This statement
is for unitary theories.} introduced by Thom. (We remark that
Atiyah~\cite{A10} put bordism and cobordism in the context of generalized
homology theories.) For spinor fields the domain spectrum is $M\!\Spin$ or a
close variant. The general formula for the anomaly of a spinor
field~\cite[Conjecture~9.70]{FH}---conjectural as a mathematical assertion
until more foundations are laid---brings in the Atiyah-Bott-Shapiro map
$M\!\Spin\to KO$, as well as all of the aforementioned ingredients. Implicit
in it are the various topological and geometric index invariants and index
theorems that we have surveyed in this article.
\bigskip\bigskip
\providecommand{\bysame}{\leavevmode\hbox to3em{\hrulefill}\thinspace}
\providecommand{\MR}{\relax\ifhmode\unskip\space\fi MR }
\providecommand{\MRhref}[2]{%
\href{http://www.ams.org/mathscinet-getitem?mr=#1}{#2}
}
\providecommand{\href}[2]{#2}
|
\subsubsection*{Acknowledgements}
We acknowledge the variable star observations from the
AAVSO International Database contributed by observers
worldwide and used in this research.
This work was financially supported by Grants-in-Aid
for JSPS Fellows for young researchers (M.~Kimura and
K.~Isogai).
\subsubsection*{Author Contributions}
K.N. and Y.W. led the campaign.
K.N. performed optical data analysis and compiled all optical data.
M.K., N.K., and K.I. performed optical data analysis.
M.K., T.K., D.N., and M.S. contributed to science discussions.
M.K. performed multi-wavelength data analysis.
Other authors than those mentioned above performed optical
observations.
K.N., M.K., and Y.W. wrote the manuscript.
T.K. supervised this project.
K.N., M.K., T.K., W.Y., M.S., J.U., C.G., D.D., M.R., R.P., F.H.,
E.M. and C.L. improved the manuscript.
All authors have read and approved the manuscript.
\subsubsection*{Competing Interests}
The authors declare that they have no competing
financial interests.
\subsubsection*{Author Information}
Correspondence and requests for materials should be addressed to
K.N. \\ (<EMAIL>).
\newpage
\section*{METHODS}
\section{Detailed methods of optical observations and analyses}
After the onset of the 2018 outburst of ASASSN-18ey,
the VSNET collaboration team \citep{VSNET} started a worldwide
photometric campaign.
Time-resolved CCD photometry was carried out at 32 sites
using 32 telescopes with apertures of dozens of centimeters.
We also used the public AAVSO data\footnote{http://www.aavso.org/data-download/}.
We corrected for bias and flat-fielding in the usual manner,
performed standard aperture photometry, and measured
magnitudes of ASASSN-18ey relative to local comparison
stars whose magnitudes were measured by A.~Henden (sequence
15167RN) from the AAVSO Variable Star Database \citep{APASS}\footnote{http://www.aavso.org/}.
We applied small zero-point corrections to some observers'
measurements.
The typical exposure time was 50 seconds.
All of the observation times were converted to Barycentric
Julian Date (BJD).
We performed the period analyses with the phase dispersion
minimization method (PDM) \citep{PDM}. In the analyses,
the global trend of the light curves is subtracted by
locally weighted polynomial regression (LOWESS:
\citet{LOWESS}). The 1$\sigma$ errors are calculated
via the method in \citep{fer89error,Pdot2}.
The robustness of the PDM results is confirmed by
a variety of bootstraps. We made 100 samples, each containing
50\% of the observations chosen at random,
and performed the PDM analyses for each sample.
The bootstrap results correspond to the 90\%
confidence intervals of $\theta$ statistics.
The $O-C$ diagram in Figure 2 shows the time difference
of the superhump periods on each superhump cycle, and
the linear and non-linear slopes represent the constant
and varying periods, respectively.
The positive linear slope before
BJD 2,458,291.7 in ASASSN-18ey means that the period was
constant and slightly longer than the assumed period
during stage A (see also the top panel of Fig.~2a).
The period suddenly dropped at BJD 2,458,291.7 and
gradually increases during stage B.
We first made a template profile from superhumps
during BJD 2.458,279--2,458,405 (corresponds to 2018 June 9--2018 October 13)
by folding them with
the period estimated by PDM, and fitted superhumps
at each cycle with the template to estimate the time
of the superhump maxima ($O$).
After that, the $O-C$ is calculated by subtracting
the assumed fix period ($C$) $\times$ the superhump cycle
($E$) from $O \times E$.
The resultant times are given in Extended Data Table 2.
\section{Overall optical behavior}
We show all of our optical photometric data during
the main outburst in Figure 5.
The optical light curves show a complex behavior.
They show a rapid rise at the onset of the outburst and
a steep decay just after that. Then, radio flares
were detected and actually sub-second optical flaring
that is likely related to synchrotron emission was also
discovered \citep{utt18atel11423,gan18atel11437,tet18atel11440,rus18atel11533,tru18atel11539}.
These nonthermal components would affect the optical light
curves when stage A superhumps began to develop.
The fast optical variability induced by synchrotron emission
was observed commonly in the hard state among
some of black-hole transients \citep{gan08gx339,alf18v404cyg}.
Actually the optical flux was scattered with respect to
the X-ray flux especially in the hard state \citep{shi19j1820},
which cannot be predicted from the correlation between
the optical and X-ray flux originating from the irradiated
accretion disk \citep{rus06OIRandXrayCorr}.
The optical luminosity increased again since several days
before the transition from stage A to stage B.
Around that time, the radio activity was quenching,
which was coincident with the hard-to-soft X-ray
spectral transition \citep{tet18atel11831,bro18atel11887}.
The optical rise at the onset of the superhumps may be consistent
with the sudden increase of the amount of angular momentum loss
due to the tidal instability, and seem to resemble the light variations
reproduced by numerical simulations in the past \citep{ich94bxhn}.
\begin{figure}[htbp]
\centering
\begin{minipage}[c]{1\hsize}
\centering\includegraphics[width=120mm]{figureED1.ps}
\end{minipage}
\caption{\textbf{Multi-color light curves of ASASSN-18ey.} The blue, green, pink, and purple points represent the light curves of $B$-band - 1mag, $V$-band, $R$-band + 1mag, and $I$-band + 2mag, respectively. The horizontal and vertical axis represent BJD-2,458,190 and Magnitude, respectively.}
\label{lc}
\end{figure}
\section{SU UMa/WZ Sge-type stars and time evolution of their superhumps}
Dwarf novae (DNe) are a subtype of cataclysmic variables
(CVs) and are semi-detached binaries composed of a white
dwarf (the primary) and a late-type main-sequence star
(the secondary). There is an accretion disk around
the primary. Because of the thermal-viscous instability in the disk,
episodic abrupt increases of luminosity occur, which
are called ``outbursts'' \citep{war95book,osa96review}.
SU UMa-type DNe are a subclass of DNe
and show superoutbursts in addition to normal outbursts
with amplitudes of 2--5 mag and several-days durations.
Superoutbursts have $\sim$6-mag large amplitudes and
$\sim$2-weeks long durations, and moreover, small-amplitude
variations called ``superhumps'' with slightly longer periods
than that of orbital humps.
Superoutbursts and superhumps are believed to be
the representation of the tidal instability \citep{whi88tidal,osa89suuma}.
Superhumps can be classified into three stages
as to variations of periods and amplitudes:
stage A, stage B, and stage C.
During stage A, the period is constant and the amplitude
increases with time. During stage B, the period is
varying and the amplitude gradually decreases.
During stage C, the period is constant but shorter than
the one during stage A, and the amplitude increases.
WZ Sge-type stars are an extreme subclass of DNe and
belong to SU UMa-type DNe. Their mass accretion rate
is extremely small, and hence, the frequency of outbursts
is very low. The intervals between outbursts are typically
larger than 5 years. The two main observational features
characterizing WZ Sge-type stars are early superhumps and
rebrightenings.
Early superhumps are observed immediately after
the superoutburst and their period is almost equal to
the orbital one. Rebrightenings are sudden flux increases
observed just after superoutbursts.
The period variation of superhumps is known to depend on
the mass ratio of binary systems.
Figure 6 shows the $O-C$ diagram of superhumps
in three systems, ASASSN-16dt, WZ Sge, and SW UMa.
Their mass ratios are 0.036(2), 0.078(3), and 0.100(3),
respectively.
The smaller the mass ratio is, the longer
the stage A duration is and the shorter the stage C duration
is \citep{kat15wzsge}.
The superhumps are excited by the strong tidal dissipation
at the 3:1 resonance \citep{whi88tidal}. The accretion disk
becomes elliptical, and then, the eccentric accretion disk
precesses \citep{hir90SHexcess}.
The stage A superhumps are considered to represent the pure
precession of the outermost ring of the accretion disk.
The eccentricity wave propagates inwards with time and
the pressure effect becomes significant. When the superhumps
enter stage B and the superhump period is not determined
only by the dynamical precession, since the pressure effect is not
negligible \citep{kat13qfromstageA,lub92SH,hir93SHperiod,mon01SH}.
\begin{figure}[htbp]
\centering
\begin{minipage}[c]{0.32\hsize}
\centering\includegraphics[width=60mm]{ocamp_a16dt.ps}
\end{minipage}
\begin{minipage}[c]{0.32\hsize}
\centering\includegraphics[width=60mm]{ocamp_wzsge.ps}
\end{minipage}
\begin{minipage}[c]{0.32\hsize}
\centering\includegraphics[width=60mm]{ocamp_swuma.ps}
\end{minipage}
\caption{\textbf{Typical period and amplitude variations of SU UMa-type stars during outburst.} $O-C$ curves (upper panel), amplitudes of superhumps (middle panel) and light curves (lower panel) of SW UMa, WZ Sge and ASASSN-16dt. Each horizontal axis in units of BJD and cycle number is common to each of all column panels. The error bars represent 1$\sigma$ statistic errors.}
\label{oc}
\end{figure}
\section{Estimation of black-hole masses with stage A superhumps}
The method for estimating the binary mass ratio from
the stage A superhump period and the orbital period has been
developed in the study of SU UMa Sge-type stars.
At the growing stage of superhumps (stage A), the superhumps
are considered to represent the dynamical precession at the
3:1 resonance radius \citep{osa13v1504cygKepler}.
Here the growth time of superhumps is defined as the time
until the eccentricity fully develops only at the 3:1
resonance radius.
The fractional superhump excess $\varepsilon^{\ast}$
is defined as,
$\varepsilon^{\ast} \equiv 1-P_{\rm orb}/P_{\rm SH}$,
and $\varepsilon^{\ast}$ of stage A superhumps
is expressed by considering the dynamical precession as follows:
\begin{equation}
\varepsilon^{\ast} = \frac{q}{\sqrt{1+q}} \left[\frac{1}{4} \frac{1}{\sqrt{r}} b_{3/2}^{(1)} \right],
\label{omega_pr}
\end{equation}
where $r$ is the dimensionless radius normalized by
the binary separation. Here, $b_{3/2}^{(1)}$ is
the Laplace coefficient \citep{hir90SHexcess,kat13qfromstageA}.
By substituting the 3:1 resonance radius, which is defined
as $3^{(-2/3)} (1+q)^{-1/3}$, to equation (\ref{omega_pr}),
$\varepsilon^{\ast}$ depends only on the binary mass ratio $q$
\citep{kat13qfromstageA}. We can estimate the binary mass ratio
only by measurements of the orbital and stage A superhump periods.
In addition, we estimated the binary mass ratio in ASASSN-18ey
only with the duration of stage A superhumps.
Since superhumps are growing during stage A, the duration of
stage A represents the growth time of the superhumps.
In addition, it was predicted theoretically that
the growth time of superhumps depends on $q^{-2}$ \citep{lub91SHb}.
The relation between $q$ and the duration of
stage A for WZ Sge-type objects was confirmed by using
the observational data and the above method and Figure 3
shows the result \citep{kat13qfromstageA}.
This relation is independent of the nature of
the primary star, and hence, applicable for
black-hole binaries.
The mass-ratio estimation by the empirical relation
between the stage B superhumps and the superhump
excess \citep{pat01SH,pat05SH}
have used for a long time in many works including
the very recent work \citep{tor19j1820}.
However, this method has some uncertainty because
the periods of the stage B superhumps are
variable as shown in Figure 6.
Also, it is revealed that this method easily underestimate
the binary mass ratio \citep{nak13j2112j2037}.
The method thus not suitable for the accurate estimation
of black-hole masses.
\section{Spectral energy distribution modelling}
Figure 7 shows the multi-wavelength SEDs
on July 8th (BJD 2,458,359) and August 19th (BJD 2,458,307)
in 2018 when the source was simultaneously observed
in the X-ray, ultraviolet (UV) and optical bands.
The X-ray spectrum is extracted from simultaneous
\textit{Swift}/XRT data (ObsIDs 00010627076 and 00088657009)
which were taken in the WT mode. The data are processed
through the pipeline processing tool \texttt{xrtpipeline}.
We select 1.0--10.0 keV XRT data.
The UV flux is obtained from the Swift/UVOT images in
the same ObsID as those of XRT through the standard tool
\texttt{uvot2pha} provided by the Swift team.
The optical flux is averaged per date.
\begin{figure}[htbp]
\centering
\begin{minipage}[c]{0.49\hsize}
\centering\includegraphics[width=90mm]{SED1-180708-deabs-norm1-re.ps}
\end{minipage}
\begin{minipage}[c]{0.49\hsize}
\centering\includegraphics[width=90mm]{SED2-180819-deabs-norm1-re.ps}
\end{minipage}
\caption{\textbf{Simultaneous,
extinction-corrected multi-wavelength SEDs of ASASSN-18ey.}
The broad-band spectra on (a) BJD 2,458,307 (corresponds to 2018 July 7)
and (b) BJD 2,458,349 (corresponds to 2018 August 18).
The blue, purple, and green crosses show
\textit{Swift} XRT, \textit{Swift} UVOT, and our optical data.
The optical fluxes are averaged over the intervals, and
the error bars represent their standard errors.
The optical and $UV$ flux are deredden, and the X-ray flux
are deabsorbed.
The errors of X-ray and $UV$ data represent 1$\sigma$
confidence intervals.
The dashed and dotted lines show the contribution of
emissions from the irradiated disk with Comptonisation and
from the companion star, respectively. }
\label{sed}
\end{figure}
We fit the multi-wavelength spectra with the model
\texttt{phabs*redden*(optxrplir+bbodyrad)}.
The model \texttt{optxrplir} can simultaneously deal with
the emission from an irradiated standard accretion disk and
Comptonization component at the inner region. The hot corona
which emits Comptonized photons is assumed to be located
around the central object, and it extends to $r_{\rm corona}$.
The standard disk exists outside the hot corona and
its outer part is reprocessed by X-rays emitted from
the inner part of the disk and the corona.
The models \texttt{phabs} and \texttt{redden} are implemented
to correct interstellar absorption and extinction.
The $N_H$ is fixed to 1.5$\times$10$^{21}$
cm$^{-2}$~ \citep{utt18atel11423}, and $E(B-V)$ is estimated to
be 0.29 in fitting both of the two spectra.
With the model \texttt{bbodyrad}, we express the maximum
contribution of the donor star to the optical flux, although
it is less than 1\% compared with the contribution from
the outer accretion disk. We assume a K-type
main-sequence star as a donor star with a temperature of
4,130 K, and that the donor star fills its Roche-lobe \citep{all73quantities}.
According to Gaia data release 2, the distance to ASASSN-18ey
is $3.06^{+1.54}_{-0.82}$ kpc \citep{gan19gaiadistance}.
In addition, we fix $kT_{\rm pl}$ in
\texttt{optxrplir} to 100 keV, since it is difficult to
constrain the parameter without hard X-ray data.
Although \texttt{optxrplir} can treat low-temperature
Comptonization component, we do not add it.
The black-hole mass is estimated to be 6.7 $M_{\odot}$ in
fitting simultaneously the two spectra, and we fix it to
that value when fitting each spectrum separately.
Then we assume the inclination angle is 60 deg.
The best-fit values of $\log (L/L_{\rm Edd})$ and $r_{\rm corona}$
in units of $R_{\rm g}$, $\log (R_{\rm out}/R_{\rm g})$, and
$f_{\rm out}$ are $-$0.70, 13, 5.1, and 0.088 as for ObsID
00010627076, and $-$0.95, 7, 5.1, and 0.14 as for ObsID
00088657009, respectively.
Here, $L_{\rm Edd}$ is the Eddington luminosity, and
$R_{\rm g}$ is the gravitational radius, respectively.
The estimated disk radius is slightly less than the 3:1
resonance radius, and appropriate as the disk radius after
the onset of stage B superhumps \citep{ich93SHmasstransferburst}.
The estimated $f_{\rm out}$ can be expected from the theoretical
model of canonical irradiation on June 8th. Then the irradiated
flux is more than 3--5 larger than the underlying disk flux
expected from the standard temperature distribution.
This means X-ray irradiation governs the emission
from the outer disk.
The small-amplitude superhumps can be reproduced
only by tidal dissipation as described in the main text.
Although it is considered that the superhumps should not be
reproduced only by the intrinsic luminosity of the viscous
disk because of huge X-ray irradiation in black-hole
binaries \citep{has01BHXNSH}, the actual irradiated flux
in ASASSN-18ey was much smaller than expected in that study.
Actually, the 14.9 $V$-band magnitude of the viscous disk
on BJD 2,458,307 (corresponds to 2018 July 7) is
comparable to the initial magnitude
on the date of the discovery of this outburst, which means
the temperature at the outer part of the underlying viscous
disk is high enough to keep the hot state by itself.
Although the origin of the superhump amplitudes in ASASSN-18ey,
which are much larger than those of the past superhump candidates
observed in other black-hole binaries \citep{odo96BHXNSH,uem02j1118} is unclear,
the hot surface area that is excited by tidal dissipation would
be much larger because of the large disk expected from its long
superhump period (see also Table 1), and
the change in the vertical structure at the outer disk could
be amplified via X-ray irradiation
since X-ray irradiation makes the outer disk rim
flared up \citep{cun76irradiation}.
\section{Variations of color indices}
We investigated the variations of color indices during
BJD 2,458,302--2,458,310 (corresponds to 2018 July 2--2018 July 10), about a week after the onset of
stage B superhumps.
We estimated the $B-V$ and $V-R$ colors by approximating
the simultaneous $V$-band magnitude to the $B$ and $R$ magnitudes
with linear interpolation and averaged them with each of
the stage A and stage B superhumps.
The results are shown in Figure 8.
Although a slight color change is observable as for dwarf novae
during stage B superhumps \citep{neu17j1222}, no appreciable
color variations were detected in ASASSN-18ey during
this time interval.
The origin of color variations in dwarf novae is considered
to be due to the enhanced viscous heating at the outer disk,
and therefore, the color variation would not appear in black-hole
binaries due to strong X-ray irradiation (Figure 7).
Actually, our SED analyses suggest strong irradiation near
this time period.
In addition, no color variations in superhump candidates were
confirmed also in GS 1124$-$68, another black-hole
binary \citep{bai92gumus}.
\begin{figure}[htbp]
\centering
\begin{minipage}[c]{0.49\hsize}
\centering\includegraphics[width=90mm]{phave-shA.ps}
\end{minipage}
\begin{minipage}[c]{0.49\hsize}
\centering\includegraphics[width=90mm]{phave-shB.ps}
\end{minipage}
\caption{\textbf{Phase-averaged profiles of superhumps.} (a) Stage A superhump profile during BJD 2,458,279--2,458,295, and (b) stage B superhump profile during BJD 2,458,302--2,458,310. As for stage B superhumps, we focus on the time interval when the multi-color light curves are obtained in order to plot the $B-V$ and $V-R$ color variations together. The light curves are folded with the averaged period of each stage after subtracting the global trend of the light variations. The error bars represent 1$\sigma$ statistic errors.}
\label{phave}
\end{figure}
\begin{table*}[htb]
\caption{Objects Showing Superhumps during Outburst in Black-Hole Binaries.}
\label{tab:listsuperhump}
\begin{center}
\scalebox{0.9}{
\begin{tabular}{cccccc}
\hline
Object Name & Orbital Period [d] & Superhump Period [d] & $M_1$ [$M_\odot$] & Donor$^{*}$ & $q=M_2/M_1$ \\ \hline
GS 2000$+$25 & 0.344098(5)$^{[1]}$ & 0.3474(3)$^{[2]}$ & 8.5(1.5)$^{[3]}$ & K3--6/5$^{[4]}$ & 0.03--0.25$^{[3]}$ \\
(QZ Vul) & & & & & \\
GS 1124$-$68 & 0.4333(6)$^{[5]}$ & 0.4376(10)$^{[2]}$ & 6.95(60)$^{[6]}$ & K3--4/5$^{[7]}$ & 0.09--0.17$^{[6]}$ \\
(Nova Musca) & & & & & \\
GRO J0422$-$32 & 0.2121600(2)$^{[8]}$ & 0.2157(12)$^{[2]}$ & 3.57(34)$^{[9]}$ & M0--2/5$^{[9]}$ & 0.1093(86)$^{[9]}$ \\
(V518 Per) & & & & & \\
XTE J1118$+$480 & 0.169930(4)$^{[10, 11]}$ & 0.170529(6)$^{[12]}$ & 6.0--7.7$^{[11]}$ & K5/5$^{[13]}$ & 0.05$^{[14]}$ \\
(KV UMa) & & & & & \\
GRS 1716$-$249 & -- & 0.6127$^{[15]}$ & $>$4.9$^{[15]}$ & M0-5/5$^{[16]}$ & -- \\
(V2293 Oph) & & & & & \\
GRS 1009$-$45 & 0.285206(14)$^{[17]}$ & 0.1996$^{[18]}$ & 4.4$^{[17]}$ & K7-M0/5$^{[17]}$ & 7.3(0.8)$^{[17]}$ \\
(MM Vel) & & & & & \\
XTE J1859$+$226 & 0.274(2)$^{[19]}$ & 0.38385(73)$^{[20]}$ & $>$5.4$^{[19]}$ & G5$^{[21]}$ & -- \\
(V406 Vul) & & & & & \\
MAXI J1820$+$070 & -- & 0.688907(9) & -- & -- & $\sim$0.1 \\
(ASASSN-18ey) & & & & & \\
\hline
\multicolumn{6}{l}{$^{*}$ Spectral type.}\\
\multicolumn{6}{l}{\parbox{500pt}{
References: [1] \citet{che93qzvul}, [2] \citet{odo96BHXNSH}, [3] \citet{oro03BHB}, [4] \citet{har96qzvul}, [5] \citet{rem92gumus}, [6] \citet{gel01gumus}, [7] \citet{cas97gumus}, [8] \citet{web00v518perTiO}, [9] \citet{gel03v518per}, [10] \citet{wag01j1118}, [11] \citet{mcc01j1118mass}, [12] \citet{uem02j1118} , [13] \citet{gel06kvuma}, [14] \citet{gon14a0620kvuma}, [15] \citet{mas96grs1716SH}, [16] \citet{cha02IRobsBH}, [17] \citet{fil99mmvel}, [18] \citet{mas97mmvel}, [19] \citet{cor11j1859}, [20] \citet{uem04j1859}, [21] \citet{fil01j1859}
}} \\
\end{tabular}
}
\end{center}
\end{table*}
\section{Black-hole binaries showing superhump candidates in the past}
There are several transient black-hole binaries that
have shown superhump candidates during outburst.
However, the observational quality is not enough to
surely confirm whether they are superhumps and
the period variation characteristic to superhumps
observed in SU UMa stars were not detected.
We discuss each object in which superhump candidates were
observed during outburst as follows and list these objects
and their properties in Table 1.
The first suggestion that transient black-hole binaries
may exhibit superhumps similar to those seen in SU UMa stars
was made after the 1988 outburst in GS 2000+25 (QZ Vul) \citep{cha91qzvul}.
They argued that the observed hump profile was not caused
by ellipsoidal variations.
Additionally, X-ray heating of the donor star was ruled out
because no color variations were observed in these humps.
Moreover, geometrical effects of the outer accretion disk
were also excluded because of the expected low inclination.
However, the number of data points were less than several hundred,
and they did not demonstrate they are clearly superhumps \citep{cha91qzvul}.
After that work, the orbital period was measured by
other authors \citep{che93qzvul}, which proved the estimated superhump period was
slightly longer than the orbital period \citep{odo96BHXNSH}.
In the 1991 outburst of GS 1124$-$68, similar humps to
those observed in GS 2000$+$25 with a period slightly longer
than the orbital period were found \citep{bai92gumus},
and then, they were suggested to be superhumps as discussed
in GS 2000$+$25 \citep{cha91qzvul}. However, the coverage
of the data is sparse and the total length of the observations
was only a few days during the outburst which typically
continues for more than 100 days.
The data were reanalyzed after their work, and
the period of these humps were estimated to be
shorter \citep{odo96BHXNSH}. Since the data quality is thus
not at all convincing, it is difficult to distinguish
the superhump period that they argued from the orbital period
measured by other authors \citep{rem92gumus}.
Two types of optical variability were discovered
in GRO J0422$+$32 (V518 Per), another black-hole binary,
during its 1992--1993 outburst. The observed dip-type
variations with a shorter period and another kind of
variations with a longer period were considered to be
the orbital modulations and superhumps, respectively \citep{kat95v518per}.
The data used in this paper had been the densest one
among the data taken in the above three systems prior
to our work, and they succeeded to estimate the superhump period
within a 0.5\% accuracy.
They noticed the hump period changed with time during
outburst, but did not confirm if this feature originated
from the actual period change of superhumps, and interpreted
the period decrease as being due to the appearance of
the orbital modulations.
Soon after that work, the hump periods at the late stage
of the outburst and in quiescence were estimated
by \citep{che95v518per}, and they were identical with each other.
The authors hence regard them as orbital modulations.
Also, the periods were comparable to the hump period
at the latter stage of the outburst in \citep{kat95v518per}.
Several years later, XTE J1118$+$480 (KV UMa), a newly
discovered X-ray transient, showed during its 2000 outburst
optical modulations having periods slightly longer than
the orbital period \citep{uem02j1118,wag01j1118,mcc01j1118spec}.
The hump period was estimated within the 0.05\% accuracy,
and thus, they clearly detected the existence of superhumps
during outburst for the first time by using their extensive data.
Since the hump profile was not easily explained by the orbital
periods, the detected continuous period decreases strongly suggested
the variations are superhumps.
In this object, the period variations of superhump candidates
were detected for the first time among black-hole binaries.
However, the authors were not able to classify the superhumps into
each stage, so the certain detection of humps quite similar
to those observed in SU UMa stars was not completed.
This is because they did not obtain the data of the initial
stage of superhumps, and because the detailed definition of
the stages of superhumps was established in 2009 \citep{Pdot}
even in SU UMa stars.
Also, this system is not classical because it did not enter
the canonical spectral state evolution of outbursts
in comparison with many other black-hole transients
\citep{tan96XNreview,che97BHXN}.
Therefore our study is the first one showing the absolute
discovery of superhumps in normal transient black-hole
X-ray binaries.
In addition, the superhump modulations were also confirmed
in the rebrightenings in 2005 \citep{zur06j1118}.
Although the observational data were sparse due to
the dimness of the outbursts, there are three other objects
possibly showing superhumps during outburst.
It is unclear because of their unknown orbital periods, but
it was argued that superhump-like modulations were found
in GRS 1716$-$249 and GRS 1009$-$45 during
outburst \citep{mas96grs1716SH,mas97mmvel}.
Additionally, coherent optical variations appeared in
XTE J1859$+$226, which have possibly a longer period
than the orbital one \citep{zur02j1859,uem04j1859},
though the period is much longer than the orbital period
lately measured by the optical photometry of ellipsoidal
modulations in quiescence \citep{cor11j1859}.
As described above, it is not rare that superhumps
are observed during outburst in black-hole binaries.
The most plausible model of the origin of superhumps is
the precession of the eccentric disk exerted by the tidal
instability, which is triggered in small mass-ratio binary
systems. The condition is considered to be $q \lesssim
0.25$ \citep{whi88tidal,osa89suuma,osa02wzsgehump}.
Generally, most of the black-hole low-mass X-ray binaries would
satisfy this condition. However, the optical outbursts in this kind of
objects are usually dim due to their distance, and hence,
this may have prevented universal detections of superhumps
in black hole X-ray binaries.
Nevertheless, the current development of optical telescopes
and observational networks will enable us to detect superhumps
in many transient black-hole binaries.
\newcommand{\noop}[1]{}
|
\section*{Introduction}
Computation of differential invariants of (unparametrized) curves
was an important topic in XIX-th century mathematics.
Besides Frenet-Serret formulas for Euclidean spaces, curves
were extensively studied in projective spaces.
In particular, Klein and Lie derived special ODEs describing projective invariant classes of curves in the plane \cite{KlL} and Halphen
computed the invariants that govern projective equivalence \cite{H},
see \cite{KoL} for a modern approach and review.
Wilczynski \cite{W} derived a
complete set of invariants for such curves in any dimension,
starting from the Laguerre-Forsyth normal form for linear ODEs.
Invariants of curves were derived in various non-metric geometries,
for instance in conformal, Grassmannian and others \cite{B,F,G}.
Fundamental invariants for some classes of curves in generalized flag varieties
were computed by Doubrov and Zelenko \cite{DZ}. This approach was based on
the moving frame method and the theory of parabolic geometries.
In particular, it covered general curves in projective spaces
and integral curves in the $G=G_2$ flag varieties for split algebraic
$G_2=G_2^*$, namely homogeneous space $G/P$ with some parabolic subgroup $P$.
The goal of this paper is to revisit the case of curves in $M=G_2/P$
based on the theory of differential invariants for which we refer
the reader to \cite{KL}
(we assume the curves are regular, so that its velocity never vanishes).
The algebra of such (absolute rational) invariants depends on the type of 1-jet of a curve, and we compute the Hilbert function counting
the number of differential invariants for every type.
Then we concentrate on the two poles, corresponding to the minimal
and the maximal orbits of the action of $G$ on $J^1(M,1)=\mathbb{P}TM$.
For integral curves, representing minimal orbits, we obtain
the invariants differently and more explicitly than in \cite{DZ}.
For generic curves, representing maximal orbits, our results are
apparently new.
We give more details to the case $M=G_2/P_1$ (labelling of the
parabolic subgroups corresponds to the Bourbaki numeration),
where our tool is the canonical conformal structure associated to
the (2,3,5) distribution by Nurowski. In the flat case that we discuss,
it corresponds to another homogeneous representation
$M=SO(3,4)/P_1$
(here $P_1$ is the subgroup of $B_3$ naturally extending the previous $P_1$)
induced by the inclusion $G_2\subset SO(3,4)$.
We also discuss differential invariants of curves in other
$G_2$ flag varieties with a different choice of the parabolic, namely $G_2/P_{12}$ and $G_2/P_2$, but since the formulae are large we
do not provide full details there.
It turns out that there is a transformation (multiple-valued to one side)
between generic curves in $G_2/P_1$ and $G_2/P_2$ based on the twistor
correspondence via $G_2/P_{12}$ and the geometry of those spaces.
For minimal integral curves (no restriction for $G_2/P_1$ but
corresponding to triple root Petrov type in the case $G_2/P_2$)
such a transformation is known as the prolongation,
but it does not exist for all curves. The transformation we propose
for generic curves (it is $1:1$ to one side and $1:2$ to the other)
allows to reduce computation of invariants to those of $G_2/P_1$.
On historical side we note that two realisations of $G_2$ corresponding
to homogeneous spaces $G_2/P_1$ and $G_2/P_2$ were obtained in 1893 by
E.~Cartan \cite{C} and F.~Engel \cite{E}. An interplay between these
models is a base for the above mentioned correspondence.
We also note that the method developed in this paper is applicable to
obtain differential invariants of curves in curved geometries of type $(G_2,P)$, as we will briefly discuss in the conclusion,
though we do not provide any explicit formulae for those.
It would be interesting to extend the results
to parabolic geometries of general type $(G,P)$.
\medskip
Maple computations supporting the results of this paper, and
containing some large formulae, can be found in a supplement
to the arXiv submission.
\bigskip
\textsc{Acknowledgment.}
The research leading to these results has received funding from the Norwegian Financial Mechanism 2014-2021 (project registration number 2019/34/H/ST1/00636), the Polish National Science Centre (NCN) (grant number 2018/29/B/ST1/02583), and the Troms\o{} Research Foundation (project ``Pure Mathematics in Norway'').
\section{Invariants of curves in $M^5=G_2/P_1$}\label{S1}
Associated with $P_1$ is the gradation of $\g=\op{Lie}(G_2)$ of depth 3
\begin{equation}\label{g2p1}
\g=\g_{-3}\oplus\g_{-2}\oplus\g_{-1}\oplus\g_0\oplus\g_1\oplus\g_2\oplus\g_3
\end{equation}
with $\dim\g_{\pm1}=\dim\g_{\pm3}=2$, $\dim\g_{\pm2}=1$ and
$\g_0=\mathfrak{gl}_2$. The filtration $\g^i=\oplus_{j\ge i}\g_j$
is invariant with respect to $\fp=\g^0$ and its Lie group
$P_1= GL_2\ltimes\exp(\fp_+)$, which is equal to $\op{Stab}_o(G_2)$,
$o=[P_1]$, for the $G_2$ action on the 5-dimensional homogeneous space $M=G_2/P_1$.
We identify $T_oM$, as well as tangent spaces at other points of $M$,
with $\m=\g/\fp$ and it will be convenient to interpret it as
$\g_-=\g_{-3}\oplus\g_{-2}\oplus\g_{-1}$ though the gradation is not
$P_1$ invariant. Furthermore $\g^{-1}\op{mod}\fp$ defines a $G_2$ invariant rank 2 distribution $\Pi$ on $M$ with growth vector $(2,3,5)$, which
exhibits ranks of the derived distributions $\Pi^2=[\Pi,\Pi]$ and $\Pi^3=[\Pi,\Pi^2]=TM$.
We use the coordinates $(x,y,p,q,z)$ on $M$ obtained from the
model Monge equation $y''=(z')^2$ with local $G_2$ symmetry.
Namely, denoting $y'=p$ and $y''=q$ the distribution $\Pi$
is induced from the Cartan distribution in jets and has the following expression:
\begin{equation}\label{Pi}
\Pi=\langle \p_x+p\p_y+q\p_p+q^2\p_z,\p_q\rangle.
\end{equation}
The $G_2$ invariant conformal structure $[g]$ is given by the representative
\begin{equation}\label{conf}
g=q^2dx^2-2q\,dx\,dp+6p\,dx\,dq-3\,dx\,dz-6\,dy\,dq+4\,dp^2.
\end{equation}
Let $J^k(M,1)$ denote the space of $k$-jets of unparametrized regular
curves (for details on jet-spaces we refer to \cite{KL0}).
These will be represented as parametrized curves $\gamma:I\to M$
modulo the right action of the pseudogroup $\op{Diff}_\text{loc}(\R)$
of reparametrizations.
A 0-jet is just $\gamma(0)\in M$, while 1-jet is $\dot\gamma(0)\neq0$
up to rescaling. Thus $J^0(M,1)=M$
and $J^1(M,1)=\mathbb{P}TM$. The fiber of the latter bundle over $o\in M$
will be identified with $(T_oM\backslash\{0\})/\R_\times\simeq\mathbb{P}\m$,
on which $P_1$ acts.
A general curve, transversal to the foliation $\{x=\op{const}\}$,
can be parametrized as $y=y(x)$, $p=p(x)$, $q=q(x)$, $z=z(x)$.
This introduces an affine chart in $J^k(M,1)$ with coordinates
$x,y,p,q,z$ and $y_i,p_i,q_i,z_i$ for $1\leq i\leq k$.
The action of $G_2$ will be expressed in these coordinates, as well as
the invariants of the action. We note that the orbits of $G_2$
in $J^k(M,1)$ are bijective with the orbits of $P_1$ on $J^k_o(M,1)$,
and we begin with a discussion of $k=1$ case.
\subsection{Action and orbits of $P_1$ on 1-jet}
It is convenient to describe the action on the vector space $\m$,
and then pass to the corresponding projective space (here
when describing the $P$ action we use linear coordinates on $\m$,
and then return to the coordinates on $M$ used before).
A basis $e_1,e_2$ of $\g_{-1}$ induces bases $e_3=[e_1,e_2]$ of
$\g_{-2}$ and $e_4=[e_1,e_3]$, $e_5=[e_2,e_3]$ of $\g_{-3}$.
Thus we get a basis of $\m\simeq\oplus_{i=-3}^{-1}\g_i$.
This introduces coordinates $v_i$ on $\m$ considered as a
graded nilpotent Lie algebra
\[
v= v_1e_1+v_2e_2+v_3e_3+v_4e_4+v_5e_5\in \mathfrak{m}\,,
\]
and hence also on $\exp(\m)\simeq M$ via the exponential map. Note that
the unity $o$ corresponds to 0 and the inverse of $g\in\exp(\m)$ is $-g$.
(The Lie bracket on $\m$ induces the group structure on $\exp(\m)$ by the Baker-Campbell-Hausdorff formula that is finite
due to nilpotency of $\m$.)
In these coordinates the canonical conformal structure \eqref{conf}
has constant coefficients:
\begin{equation}\label{conf2}
\langle v,w\rangle = v_1w_5+v_5w_1-v_2w_4-v_4w_2+v_3w_3.
\end{equation}
Indeed, this is a unique (up to scale) left-invariant metric on $M$ that
is also invariant with respect to semi-simple part of the reductive
component $GL_2$ of $P_1$ (this preserves the grading on $\m$) and
has weight 4 with respect to its center:
\[
\langle\op{Ad}_{g}(v),\op{Ad}_{g}(w)\rangle=\langle v,w\rangle
\quad\forall\,g\in\exp(\m)
\quad\text{ and }\quad
\langle Av,Aw\rangle=(\det A)^2\langle v,w\rangle\quad \forall\,A\in GL_2\,.
\]
To obtain $P_1$ action on $\m=\g/\fp$ we derive first the action of
$\fp_+$ using the root diagram of $\g$. We choose the basis $f_i$
of $\fp_+\simeq\m^*$ dual to $e_i$\,: these are the root vectors
indicated near the corresponding roots on the diagram below
(gradation is shown by a family of parallel lines). Their commutator
relations are $[f_1,f_2]=f_3$, $[f_1,f_3]=f_4$, $[f_2,f_3]=f_5$.
\begin{center}
\begin{tikzpicture}
\draw[gray, xshift=9mm, yshift=12mm] (150:2) to (150:-2);
\draw[gray, xshift=3mm, yshift=4mm] (150:2) to (150:-2);
\draw[gray, xshift=6mm, yshift=8mm] (150:2) to (150:-2);
\draw[gray] (150:2) to (150:-2);
\draw[gray, xshift=-3mm, yshift=-4mm] (150:2) to (150:-2);
\draw[gray, xshift=-6mm, yshift=-8mm] (150:2) to (150:-2);
\draw[gray, xshift=-9mm, yshift=-12mm] (150:2) to (150:-2);
\draw[<->] (0:1)node[right]{$f_1$} to (0:-1) node[left]{$e_1$};
\draw[<->] (120:1)node[above]{$f_2$} to (120:-1)node[below]{$e_2$};
\draw[<->] (60:1)node[above]{$f_3$} to (60:-1)node[below]{$e_3$};
\draw[<->] (30:{sqrt(3)})node[above]{$f_4$} to (30:-{sqrt(3)}) node[below]{$e_4$};
\draw[<->] (90:{sqrt(3)})node[above]{$f_5$} to (90:-{sqrt(3)}) node[below]{$e_5$};
\draw[<->] (150:{sqrt(3)}) to (150:-{sqrt(3)});
\end{tikzpicture}
\end{center}
Brackets between basis elements in $ \mathfrak{p}_+ $ and $ \mathfrak{m} $ correspond, up to scale, to vector summation of the corresponding root vectors in the root diagram: $[e_\alpha,e_\beta]=k_{\alpha\beta}e_{\alpha+\beta}$.
The factors $k_{\alpha\beta}$ can be fixed by the condition
that the metric is invariant under $\fp_+$:
\[
\langle\op{ad}_{f_i}v,w\rangle+\langle v,\op{ad}_{f_i}w\rangle=0.
\]
The diagram implies that $\g_3=\langle f_4,f_5\rangle$ acts trivially on
$\m$ and $\fp_+$ acts trivially on $\g_{-1}$. The remaining commutation relations are as follows.
\[
\begin{array}{lll}
[f_1,e_3] = e_2, & [f_2,e_3] = -e_1, & [f_3,e_3] = 0,\\[2mm]
[f_1,e_4] = e_3, & [f_2,e_4] = 0, & [f_3,e_4] = e_1,\\[2mm]
[f_1,e_5] = 0, & [f_2,e_5] = e_3, & [f_3,e_5] = e_2.
\end{array}
\]
Thus the action of $\exp(\fp_+)$ is encoded through the action of
$\rho=\exp(s_1f_1+s_2f_2+s_3f_3)$ with real parameters
$s_1,s_2,s_3$ as follows:
\begin{multline*}
\rho(v_1,v_2,v_3,v_4,v_5)=\hspace{17pt}\\
\hspace{17pt}\bigl(v_1-s_2v_3+(s_3-s_1s_2)v_4-\tfrac12s_2^2v_5,
v_2+s_1v_3+\tfrac12s_1^2v_4+(s_3+s_1s_2)v_5,
v_3+s_1v_4+s_2v_5,v_4,v_5\bigr).
\end{multline*}
With these at hand we can now compute that,
under the action of $P_1$, a general point
$v_1e_1+v_2e_2+v_3e_3+v_4e_4+v_5e_5\in\m\setminus\{0\}$ can be mapped
to one of the following 5 representatives:
\begin{itemize}
\item $e_5\pm e_1$ if $(v_4,v_5)\neq(0,0)$ and $2v_1v_5-2v_2v_4+v_3^2\gtrless0$,
\item $e_5$ if $(v_4,v_5)\neq(0,0)$ and $2v_1v_5-2v_2v_4+v_3^2=0$,
\item $e_3$ if $v_4=v_5=0$ and $v_3\neq0$,
\item $e_1$ if $v_3=v_4=v_5=0$.
\end{itemize}
Associated to the conformal structure \eqref{conf2} is the null cone
\[
N= \left\{v_1e_1+v_2e_2+v_3e_3+v_4e_4+v_5e_5 \in \mathfrak{m}\,\,\middle|\,\, 2v_1v_5-2v_2v_4+v_3^2=0\right\}\,.
\]
Its relation to the distributions $\Pi$ and $\Pi^2$ is the following:
\[
N\cap\Pi^2 = \Pi\,.
\]
Each of the 5 points above and the singular orbit 0 represent orbits
of the action of $P_1$ on $\m$. Therefore there are 5 orbits of
the action of $P_1$ on $\mathbb{P}\m$.
\begin{center}
\begin{tikzpicture}[scale=0.5]
\draw[left color=gray!50, right color=gray!50, middle color=white] (3.88,-3.88) to (0,0) to (-3.88,-3.88) arc (165:375:4.02 and 1);
\draw[fill=gray!50] (-4.45, 3.5) to (4, -4.95) to (4.1, -3.2) to (-4.1, 4.95) to cycle;
\draw[left color=gray!50, right color=gray!50, middle color=white] (3.82,3.82) to (0,0) to (-3.82,3.82);
\draw[bottom color=gray!60, top color=white] (0,4.01) ellipse (3.88 and 1);
\draw[dashed] (-3.82,-3.82) arc (165:15:3.88 and 0.8);
\draw[black!80, line width=0.5mm] (-4.3,4.3) to (4,-4);
\draw[densely dotted] (0,3) to (0,6) (0,-5.2) to (0,-6);
\draw[fill] (0,4.5) circle (0.2);
\draw[fill] (4.5,0) circle (0.2);
\draw[fill=white] (-3,-3) circle (0.2);
\draw[fill=white] (-3,2.5) circle (0.2);
\draw[fill=white] (3,-3) circle (0.2);
\draw[fill=white] (0,0) circle (0.2);
\node at (-4.7,-4){$ N $};
\node at (-4.5,2.6){$ \Pi^2 $};
\node at (-4.7,4.3){$\Pi $};
\node[fill=white] at (-4.7,0){$ \mathfrak{m}$};
\end{tikzpicture}
\end{center}
The points $e_5\pm e_1$ represent 2 open orbits, separated by the null cone
(both orbits connected, the above 3D picture is just an analogy).
The other orbits are (projectivizations of)
$\Pi\setminus\{0\}\ni e_1$, $\Pi^2\setminus\Pi\ni e_3$,
$N\setminus\Pi\ni e_5$.
\subsection{Number of invariants}\label{S12}
Define $s_k$ to be the transcendence degree of the field of
rational differential invariants of the $G_2$ action on $J^k(M,1)$.
By \cite{KL} this value is equal to codimension of the regular orbit
of the action, and so $s_k$ can be interpreted as the number of
invariants of order $k$. By the preceeding computations, $s_0=s_1=0$.
Hilbert function is defined as $h_k=s_k-s_{k-1}$ and it can be interpreted
as the number of invariants of pure order $k$.
We will consider curves of a fixed type $\texttt{t}$ of their 1-jet.
In other words, we assume that at any point 1-jet of the curve belongs
to the same $P_1$ orbit in $\mathbb{P}\m$.
If $d_\texttt{t}$ is dimension of the orbit, then such curves are
given by $4-d_\texttt{t}$ equations of the first order.
Geometrically this specifies a submanifold $\E_\texttt{t}\subset J^1(M,1)$
of codimension $4-d_\texttt{t}$, and prolongations
$\E^k_\texttt{t}:=\E^{(k-1)}_\texttt{t}\subset J^k(M,1)$ form a tower
of bundles with the rank of $\pi_{k,k-1}:\E^{k}_\texttt{t}\to\E^{k-1}_\texttt{t}$ equal
to $d_\texttt{t}$.
Because $G_2$ is finite-dimensional, we will occasionally have $h_k=d_\texttt{t}$ for $k\gg1$.
Let us consider the case of open orbits in $J^1(M,1)$.
Even though there are two types of such, the count is the same because
under complexification these become one orbit and the action is algebraic.
Due to transitivity we can fix 0-jet to be $a_0=(0,0,0,0,0)$
in $(x,y,p,q,z)$ coordinates. A generic 1-jet $a_1$ over $a_0$
can be represented by $(y_1,p_1,q_1,z_1)=(0,0,0,-1)$;
note that $z_1=+1$ for the other open orbit but we will focus on the first.
Denote by $\fp^{(k)}$ the prolongation of the isotropy $\fp$ of
the point $o=a_0$ in $\g$. The action in the fibers of $\pi_{k,k-1}$ for
$k>1$ is affine, so we can restrict to usage of Lie algebras (not groups).
Denote the isotropy subalgebra at the point $a_1$ by
$$
\op{stab}_{a_1}=\{v\in\fp^{(1)}\,:\,v(a_1)=0\}
$$
and by $\op{stab}_{a_1}^k$ its prolongations to $k$-jets.
As an abstract Lie algebra, $\op{stab}({a_1})$ is solvable and
it is defined by the following structure relations
\begin{gather*}
[s_1,s_2]=s_2,\quad [s_1,s_3]=s_3,\quad [s_1,s_4]=s_4,\\
[s_1,s_5]=2s_5,\quad [s_2,s_4]=3s_5,\quad [s_3,s_4]=4s_5.
\end{gather*}
The action of $\op{stab}_{a_1}^2$ on $\pi_{2,1}^{-1}(a_1)\simeq\R^4(y_2,p_2,q_2,z_2)$
is generated by the following vector fields
\[
\p_{p_2}-z_2\p_{q_2}+4y_2\p_{z_2},\quad
\p_{q_2},\quad \p_{z_2},\quad p_2\p_{p_2}+2q_2\p_{q_2}+z_2\p_{z_2},
\quad 3y_2\p_{p_2}+4p_2\p_{q_2}
\]
and so the orbits have dimension 3.
We have one invariant $I_2\!\!'=y_2$ in $\pi_{2,1}^{-1}(a_1)$.
Let $a_2=(I_2\!\!',0,0,0)\in J^2(M,1)$ be a point above $a_1$
(the expression for $I_2\!\!'$ is invariant only above $a_1$).
The isotropy algebra of $a_2$ is a 2-dimensional solvable subalgebra
$\op{stab}_{a_2}\subset\fp^{(2)}$. Its prolongation to 3-jets,
namely to $\pi_{3,2}^{-1}(a_2)\simeq\R(y_3,p_3,q_3,z_3)$, has generators
\[
3y_3\partial_{p_3} + (3y_2z_3 + 4p_3)\partial_{q_3} - 12y_2y_3\partial_{z_3}\,,\quad
y_3\partial_{y_3} + 2p_3\partial_{p_3} + 3q_3\partial_{q_3} + 2z_3\partial_{z_3}\,,
\]
and so we get 2 independent invariants in $\pi_{3,2}^{-1}(a_2)$.
The isotropy algebra of a generic point in 3-jet is already trivial,
so there will be 4 more independent invariants for every jet of order $k\ge4$.
The count of invariants for other types $\texttt{t}$ of 1-jet
is performed similarly, so we omit the details.
Summarizing, the Hilbert function $h_k$ counting
differential invariants is given in the table:
\[
\begin{array}{|c|cccccccccccl|}
\hline
\texttt{t}\quad \diagdown\quad k & 0 & 1 & 2 & 3 & 4 & 5 & 6 & 7 & 8 & 9 & 10 & \dots\\\hline
TM\backslash (N \cup \Pi^2)& 0 & 0 & 1 & 2 & 4 & 4 & 4 & 4 & 4 & 4 & 4 & 4 \\
N\backslash\Pi^2 & 0 & 0 & 0 & 1 & 2 & 3 & 3 & 3 & 3 & 3 & 3 & 3\\
\Pi^2\backslash\Pi & 0 & 0 & 0 & 0 & 0 & 1 & 2 & 2 & 2 & 2 & 2 & 2\\
\Pi\backslash \left\{ 0 \right\} & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 1 & 1\\\hline
\end{array}
\]
\medskip
Let us observe from the first two rows that for the corresponding
$\texttt{t}$-types there is dimensional freedom for the group
to act freely on the level of 2- and 3-jets, respectively, yet there
appear invariants. The situation with the last two rows is what could
be expected in a general position.
In what follows we will focus on two particular cases: curves with minimal
and maximal $\texttt{t}$-types of 1-jet (last and first rows) for
which we describe the algebra of differential invariants explicitly.
These algebras of differential invariants will be denoted by
$\mathcal{A}_\imath$ and $\mathcal{A}_g$ respectively.
\subsection{Invariants of integral curves}
\label{section_integral_curves1}
Consider curves in $M$ tangent to $\Pi$. For such there are no absolute differential invariants up to jet-order 9, and the first invariant
arises in order 10. There are however relative differential invariants:
such functions $R$ of order $k$ satisfy $L_vR=\alpha(v)R$ for
$v\in\g^{(\infty)}$ and $\alpha\in C^\infty(J^k)\otimes\g^*$.
We find those by the method of Sophus Lie, namely via a computation
of the loci where the rank of prolongations $e_j^{(k)}\in\mathfrak{X}(J^k)$
drop, for a basis $e_j\in\g$.
The integral curves are subject to the constraints
\begin{equation}\label{IC1}
y_1=p,\ p_1=q,\ z_1=q^2,
\end{equation}
their prolongation define the equation $\E_\Pi\subset J^\infty(M,1)$
with coordinates $x,y,p,q,z,q_k$, $k\ge1$.
The simplest relative differential invariant is $q_2$.
Next, such invariant arises in order 8, namely
\begin{multline*}
R_8 = 196\,q_2^5q_8-2352\,q_2^4q_3q_7-5040\,q_2^4q_4q_6
-3255\,q_2^4q_5^2+16632\,q_2^3q_3^2q_6+59598\,q_2^3q_3q_4q_5\\
+13772\,q_2^3q_4^3-83160\,q_2^2q_3^3q_5-174735\,q_2^2q_3^2q_4^2
+297000\,q_2q_3^4q_4-118800\,q_3^6.
\end{multline*}
One more relative invariant of order 10 is given by the formula
\[
R_{10} = 21q_2R_8\mathcal{D}_x\bigl(q_2\mathcal{D}_xR_8\bigr) -
\frac{91}{4}\bigl(q_2\mathcal{D}_xR_8\bigr)^2 + 9R_8^2\bigl(13q_3^2-19q_2q_4\bigr).
\]
The two latter relative invariants have proportional weights (that is, 1-forms
$\alpha$), which makes a combination of them an absolute
differential invariant
\[
I_{10} = \frac{R_{10}^3}{R_8^7}.
\]
This is accompanied by an invariant derivation, i.e. a linear map
$\Box:C^\infty(J^k)\to C^\infty(J^{k+1})$ that satisfies the
Leibniz rule and commutes with the action of $G_2$.
We search for it in the form $\Box=h\mathcal{D}_x$,
$h\in C^\infty(J^k)$, where
\[
\D_x=\p_x+p\p_y+q\p_p+q^2\p_z+\sum_{i=0}^\infty q_{i+1}\p_{q_i}
\]
is the operator of total derivative on $\E_\Pi$. Then the invariance condition
\[
[v^{(\infty)},\Box]=0\quad\forall v\in\g
\]
applied to $x$ writes for a basis $e_j\in\g$
\[
L_{e_j^{(k)}}(h)=h\mathcal{D}_x(e_j(x)).
\]
Finding $h$ from this equation, we get the following invariant derivation
($\imath$ for `{\i}ntegral'):
\[
\Box_\imath= \frac{q_2}{R_8^{1/6}}\mathcal{D}_x.
\]
The invariant derivation $\Box_\imath$ produces the next differential invariant
$I_{11}=\Box_\imath(I_{10})$ of order 11, then
$I_{12}=\Box_\imath(I_{11})$ of order 12, and successively generates
all the higher order invariants.
\begin{theorem}\label{thm1}
The algebra $\mathcal{A}_\imath$ of (micro-local) differential invariants
of integral curves is generated in the Lie-Tresse sense by $I_{10}$ and \,$\Box_\imath$.
\end{theorem}
\begin{rk}\rm\label{rk1}
The invariant derivation $\Box_\imath$ has non-rational coefficient. This is
sufficient for micro-local invariants (defined in open non-invariant
sets in jets), however is at odd with the claim
that the global differential invariants are rational in jets \cite{KL}.
To remedy this one passes to rational invariant derivation
(Tresse derivative associated to $I_{10}$)
$$
\bar\Box_\imath=\frac{d}{dI_{10}}:=\frac{I_{10}}{\Box_\imath(I_{10})}\cdot\Box_\imath.
$$
Then the algebra $\bar{\mathcal{A}}_\imath$ of global differential invariants
for integral curves is generated by $I_{10}$, $\bar{I}_{11}=I_{11}^6$
and $\bar\Box_\imath$. Note that $\bar\Box_\imath(I_{10})=1$.
\end{rk}
\begin{proof}
By the count of invariants there is precisely one independent differential invariant
of pure order $k$ for any $k\ge10$. These are $\Box_\imath^{k-10}I_{10}$.
The micro-local claim follows.
To obtain the algebra of rational
differential invariants let us note that the invariants $\bar\Box_\imath^{k-11}\bar{I}_{11}$
are affine in jets of order $k>11$. Invariants of order $\leq11$ are
algebraically generated by $I_{10}$ and $\bar{I}_{11}$ since the ideal
generated by them (in the ring of rational functions that are polynomial
in jets of order $>9$) is radical. This proves the claim.
\end{proof}
\subsection{Invariants of generic curves}\label{Sec_gen1}
Now we consider curves transversal to the distribution and not null
with respect to conformal structure \eqref{conf}. Investigation
of curves of both general type $\texttt{t}$ of 1-jets goes parallel,
so we may assume that the tangent $X=\dot\gamma$ to the curve
satisfies $g(X,X)>0$ (one has to take another normalization below for
$g(X,X)<0$).
When the curve is parametrized coordinately
$\gamma(t)=(x(t),y(t),p(t),q(t),z(t))$,
its tangent vector
\begin{equation}\label{XX}
X = \p_x+y_1\p_y+p_1\p_p+q_1\p_q+z_1\p_z
\end{equation}
is given by the truncated total derivative.
Recall it is defined up to scale. We are going to exploit the change
of scales in order to construct an invariant frame along the curve.
The metric $g$ in \eqref{conf} is defined up to rescaling.
Another representative of $[g]$ is given by $\bar{g}=e^{2f}g$.
Let $\nabla,\bar\nabla$ be the Levi-Civita connections of $g,\bar{g}$.
They are related as follows:
\begin{equation}\label{nabla}
\overline{\nabla}_XU= \nabla_XU+X(f)U+U(f)X-g(X,U)\nabla{f}
\end{equation}
for $X,U\in\mathfrak{X}(M)$.
Therefore $\nabla_XU$ is defined up to $X$, $U$ and $\nabla{f}$. The
latter is difficult to control, so we will apply this formula only for
$g(X,U)=0$. Also, to obtain invariant quantities we can only differentiate
in the direction of the curve, so $X$ will be taken as in \eqref{XX}.
Since $\Pi^2/\Pi$ has rank 1, there is a conformal identification
$\Pi\simeq TM/\Pi^2$ based on $\g_{-1}\simeq[\g_{-1},\g_{-2}]=\g_{-3}$ of
\eqref{g2p1}. Since $\gamma$ is a generic curve, its tangent
$X\notin\Pi^2$ has a conformal dual $Y\in\Pi$.
For instance, choosing the vector
$e_3=[\p_q,\p_x+p\p_y+q\p_p+q^2\p_z]=\p_p+2q\p_z\in\Pi^2$
we find a unique $Y\in\Pi$ from
\[
[Y,e_3] = X\,\op{mod}\Pi^2.
\]
This $Y$ is defined up to scale and satisfies $g(X,Y)=0$.
Therefore the covariant derivative $\nabla_XY$ is defined up to $X,Y$
and determines unambiguously the subspace
\[
\Pi_X= \langle X,Y,\nabla_XY\rangle\subset TM.
\]
Generically $\Pi_X$ has rank 3, $\Pi_X\operatorname{mod}\Pi$ rank 2,
and $\Pi_X\operatorname{mod}\Pi^2$ rank 1.
We change the generator $\nabla_XY$ of $\Pi_X$ to
\[
Z\in \Pi_X\cap\Pi^2\quad\text{ such that }\quad g(X,Z-X)=0.
\]
This $Z$ is defined up to $Y$ and up to scale. However,
due to the above relation, $X$ and $Z$ are subject to rescaling
by the same factor. Therefore we have
\[
\Pi_X=\langle X, Y, Z\rangle
\]
and we use $Z$ to fix the scale of $Y$: the conformal identification
$[Y,Z]=X\,\op{mod}\Pi^2$ determines $Y$ uniquely.
The Gram matrix of $Y,Z,X$ (in this order) is
\[
\left( \begin{array}{ccc}
0 & 0 & 0 \\
0 & \varkappa_2 & \varkappa_1 \\
0 & \varkappa_1 & \varkappa_1
\end{array} \right)
\]
where $\varkappa_1=2R_1$, $\varkappa_2=\frac{R_1^4}{162R_2^2}$ and
\begin{equation}\label{R1}
\begin{array}{l}
R_1 = (q+2p_1)^2 + 6(q_1(p-y_1)-qp_1) - 3z_1\,,\\[2mm]
R_2 =-\frac{(q + 2p_1)^3}{18} +(p-y_1)\left(qp_2-\frac{z_2}{2}\right) + (q+y_2)\left(qp_1-\frac{z_1}{2}\right) + p_1z_1 - q^2 \frac{y_2}{2}
\end{array}
\end{equation}
are relative invariants of orders 1 and 2 respectively.
Their ratio
\begin{equation}\label{I2}
I_2=\frac{\varkappa_1}{324\varkappa_2}=\frac{R_2^2}{R_1^3}.
\end{equation}
is the first absolute differential invariant in $J^2(M,1)$;
note that this invariant, when restricted to $\pi_{2,1}^{-1}(a_1)$,
differs from $I_2\!\!'$ of subsection \ref{S12} only by a power and a factor:
$108I_2=(I_2\!\!')^2$.
As long as $\varkappa_1\neq \varkappa_2$, which is generically true, the conformal metric
has rank 2 on the 3-dimensional $\Pi_X$.
Hence $\Pi_X^\perp$ has rank 2 and $\Pi_X\cap\Pi_X^\perp=\langle Y\rangle$.
Choose
\[
V\in\Pi\quad\text{ such that }\quad g(X,V-X)=0.
\]
This $V$ is defined up to $Y$ and up to scale with the same factor as $X$.
Therefore we have
\[
\Pi_X+\Pi_X^\perp = \langle V,Y,Z,X\rangle\,.
\]
To complete to a (yet non-canonical) frame we add the vector
\[
W= \nabla_X(Z-X).
\]
Since $g(X,Z-X)=0$, this $W$ defined up to scale, and up to $X$ and $Z$, which in turn is defined up to $X$ and $Y$. The vectors $X$ and $W$ are independent mod $\Pi^2$.
The Gram matrix of $Y,V,Z,X,W$ (in this order) is
\[
\left( \begin{array}{ccccc}
0 & 0 & 0 & 0 & \varkappa_3 \\
0 & 0 & 0 & \varkappa_1 & k_4 \\
0 & 0 & \varkappa_2 & \varkappa_1 & k_3 \\
0 & \varkappa_1 & \varkappa_1 & \varkappa_1 & k_2 \\
\varkappa_3 & k_4 & k_3 & k_2 & k_1
\end{array} \right)
\]
where $\varkappa_3=2R_1\Bigl(108I_2-\frac13\Bigr)$ is a relative invariant.
Keeping track of the choices, we change our vectors and the Gram matrix changes accordingly. Precisely, the freedom we have in defining our vectors allows us to make the following transformations:
\[
\begin{array}{lll}
X & \mapsto & c_1X\,,\\[2mm]
Y & \mapsto & \phantom{c_1}Y\,,\\[2mm]
Z & \mapsto & c_1Z + c_2Y\,,\\[2mm]
V & \mapsto & c_1V + c_3Y\,,\\[2mm]
W &\mapsto & c_1^2W + c_4Z -(c_4+c_1c_2k_{5})X + c_5Y\,,
\end{array}
\]
where $k_5 = \frac{p_1-q}{3}+\frac{3R_2}{R_1}$ and we have 5 degrees of freedom given by $c_1,c_2,c_3,c_4,c_5$. We find $c_2,c_3,c_4,c_5$
such that $k_1=k_2=k_3=k_4=0$. Under this transformation of our vectors,
the Gram matrix of $Y,V,Z,X,W$ takes the form
\[
\left( \begin{array}{ccccc}
0 & 0 & 0 & 0 & c_1^2\varkappa_3 \\
0 & 0 & 0 & c_1^2\varkappa_1 & 0\\
0 & 0 & c_1^2\varkappa_2 & c_1^2\varkappa_1 & 0\\
0 & c_1^2\varkappa_1 & c_1^2\varkappa_1 & c_1^2\varkappa_1 & 0\\
c_1^2\varkappa_3 & 0 & 0 & 0 & 0
\end{array} \right) \,.
\]
It only remains to fix the scale of $X$ and the scale of the metric $g$.
We fix $c_1$ by the condition $\mathcal{L}_XI_2=1$, that is, by setting
\[
c_1 = \frac{1}{\mathcal{D}_xI_2},
\]
where $\mathcal{D}_x$ is the operator of total derivative:
\[
\D_x=\p_x+\sum_{i=0}^\infty \Bigl(y_{i+1}\p_{y_i}+p_{i+1}\p_{p_i}+q_{i+1}\p_{q_i}+z_{i+1}\p_{z_i}\Bigr).
\]
Then we fix the scale of the metric $\bar{g}=e^{2f}g$ by
\begin{equation}\label{gg}
\bar{g}(X,X)=1.
\end{equation}
This fixes an invariant frame adapted to the distribution and the
conformal structure. With this the above Gram matrix
becomes
\[
\left( \begin{array}{ccccc}
0 & 0 & 0 & 0 & 108I_2-\tfrac13 \\
0 & 0 & 0 & 1 & 0\\
0 & 0 & \tfrac1{324}I_2^{-1} & 1 & 0\\
0 & 1 & 1 & 1 & 0\\
108I_2-\tfrac13 & 0 & 0 & 0 & 0
\end{array} \right) \,.
\]
The next step is to generate differential invariants of orders 3
and 4 in $J^4(M,1)$.
In order to do so first note that the new metric given by \eqref{gg}
involves rescaling depending on 3-jet, and so its Levi-Civita connection
is uncomputable (we can only differentiate along the curve), yet
formula \eqref{nabla} applied to $U\in\langle X\rangle^\perp$ has a
well-defined output $\bar{\nabla}_XU\,\op{mod}X$.
Let $w_i$ denote the basis $Y,Z-X,V-X,W$ of $\langle X\rangle^\perp$.
Then we decompose
\[
\bar\nabla_Xw_i=\sum_{j=1}^4 a_{ij}w_j\,\op{mod}X,\quad 1\leq i\leq 4.
\]
The coefficients $a_{ij}$ are differential invariants. Some of them
are constants or expressed through $I_2$, some are related due to the
fact that $\bar\nabla_X\bar{g}=0$, but the others will determine
2 differential invariants $I_{3a},I_{3b}$ of order 3
and 4 differential invariants $I_{4a},I_{4b},I_{4c},I_{4d}$
of order 4 (all rational and independent).
The formulae are too large to be given explicitly, but in
$\pi_{4,2}^{-1}(a_2)$ the invariants $I_{3a},I_{3b}$ are equal to
$\frac{4I_2p_3+z_3}{y_3^2}$, $\frac{16p_3^2-24y_3q_3-3z_3^2}{y_3^4}$,
while $I_{4j}$ are affine in $y_4,p_4,q_4,z_4$.
Finally the normalized $X$ yields the invariant derivation
(Tresse derivative associated to $I_2$)
\[
\Box_g=\frac{d}{dI_2}:= \frac{1}{\mathcal{D}_xI_2}\cdot\mathcal{D}_x
\]
which on scalars coincides with $L_X=\bar\nabla_X$.
\begin{theorem}\label{Th2}
The algebra $\mathcal{A}_g$ of differential invariants of generic curves
is generated in the Lie-Tresse sense by seven differential invariants
$I_2,I_{3i},I_{4j}$ and one invariant derivation $\Box_g$.
\end{theorem}
\begin{proof}
By construction the seven invariants generate all differential invariants
of order $\leq4$. Invariant derivation provides independent invariants affine
in jets of order $k>4$ in the totality equal to the number of those jets.
Thus any differential invariant from $\mathcal{A}_g$ can be rationally expressed
through the given generators.
\end{proof}
\section{Invariants of curves in $\M^6=G_2/P_{12}$}\label{S2}
Associated with $P_{12}$ is the gradation of $\g=\op{Lie}(G_2)$ of depth 5
\begin{equation}\label{g2p12}
\g=\g_{-5}\oplus\g_{-4}\oplus\g_{-3}\oplus\g_{-2}\oplus\g_{-1}\oplus\g_0\oplus\g_1\oplus\g_2\oplus\g_3\oplus\g_4\oplus\g_5
\end{equation}
with $\dim\g_{\pm1}=\dim\g_0=2$ and $\dim\g_i=1$ otherwise.
The filtration $\g^i$ is introduced as in Section \ref{S1} and it defines
the distribution $\Delta$ of growth $(2,3,4,5,6)$ invariant with
respect to $G_2$; the stabilizer of $o\in\hat M$ is
$P_{12}= (\R^1_\times\times\R^1_\times)\ltimes\exp(\fp_+)$.
To introduce coordinates on $\hat{M}$ it is convenient to identify it with
the prolongation of $(M,\Pi)$, namely the $\P^1$ bundle $\P\Pi$ over $M$:
its points are $\hat{a}=(a,\ell)$, where $a\in M$ is a point and $\ell\subset\Pi_x$
is a line. Thus we can use the coordinates $(x,y,p,q,z,r)$ for an open chart in $\hat{M}$,
where the first 5-tuple gives a chart in $M$ as in Section \ref{S1} and the line $\ell$
has coordinates $[1:r]$ in the basis \eqref{Pi} of $\Pi$. This gives the representation
\begin{equation}\label{PPi}
\Delta=\hat{\Pi}=\langle\p_x+p\p_y+q\p_p+q^2\p_z+r\p_q,\p_r\rangle
\end{equation}
where both generators are distinguished: the first by the prolongation procedure
described above and the second as the kernel of the differential of
the projection $\pi_l:\M\to M$.
This projection relates the derived distributions as follows:
$\pi_l^{-1}(\Pi)=\Delta^2$ and $\pi_l^{-1}(\Pi^2)=\Delta^3$. In addition,
the pullback of the conformal structure on $M$ gives a degenerate conformal structure on $\M$ with the null cone $\hat{N}=\pi_l^{-1}(N)\simeq N\times\R^1$ in $T\M$.
We parametrize the curves again by $x$, so the jet-coordinates on $J^\infty(\M,1)$
are $(x,y,p,q,z,r)$ and $(y_k,p_k,q_k,z_k,r_k)$. The null cone is given
by the condition $R_1=0$ of the $G_2/P_1$ case \eqref{R1}.
The equation for derived flag is given by the following conditions
\[
\begin{array}{ll}
\E_\Delta \ \,= &\! \left\{ q_1 = r, p_1 = q, y_1=p, z_1 = q^2 \right\} \\[2mm]
\E_{\Delta^2} \,= &\! \left\{p_1 = q, y_1=p, z_1 = q^2 \right\} \\[2mm]
\E_{\Delta^3} \,= &\! \left\{y_1=p, z_1 = 2qp_1 - q^2 \right\} \\[2mm]
\E_{\Delta^4} \,= &\! \left\{z_1 = 2pr -2ry_1 + 2qp_1 -q^2 \right\} \\[2mm]
\end{array}
\]
that determine some types of 1-jets; curves with the given fixed type
are solutions to the corresponding prolonged first order systems
$\E_{\Delta^s}\subset J^\infty(\hat{M},1)$.
There are however more types of 1-jets of curves in $\hat{M}$
as we will describe next.
\subsection{Action and orbits of $P_{12}$ on 1-jets}
The generators of \eqref{PPi} correspond to a basis $e_1,e_2$ of
$\g_{-1}$ in \eqref{g2p12}, which generates a basis $\{e_i\}$ of $\m$ via
commutation:
\begin{gather*}
[e_1,e_2]=e_3,\ [e_1,e_3]=e_4,\ [e_1,e_4]=e_5,\
[e_3,e_4]=e_6,\ [e_2,e_5]=-e_6,\\
[f_1,f_2]=f_3,\ [f_1,f_3]=f_4 ,\ [f_1,f_4]=f_5,\
[f_3,f_4]=f_6,\ [f_2,f_5]=-f_6.
\end{gather*}
This and its dual basis $\{f_i\}$ of $\fp_+$ are indicated on
the root diagram as before.
\begin{center}
\begin{tikzpicture}
\draw[gray, xshift=5mm, yshift=15.5mm] (160.8:2) to (160.8:-2);
\draw[gray, xshift=4mm, yshift=12.4mm] (160.8:2) to (160.8:-2);
\draw[gray, xshift=3mm, yshift=9.3mm] (160.8:2) to (160.8:-2);
\draw[gray, xshift=2mm, yshift=6.2mm] (160.8:2) to (160.8:-2);
\draw[gray, xshift=1mm, yshift=3.1mm] (160.8:2) to (160.8:-2);
\draw[gray] (160.8:2) to (160.8:-2);
\draw[gray, xshift=-1mm, yshift=-3.1mm] (160.8:2) to (160.8:-2);
\draw[gray, xshift=-2mm, yshift=-6.2mm] (160.8:2) to (160.8:-2);
\draw[gray, xshift=-3mm, yshift=-9.3mm] (160.8:2) to (160.8:-2);
\draw[gray, xshift=-4mm, yshift=-12.4mm] (160.8:2) to (160.8:-2);
\draw[gray, xshift=-5mm, yshift=-15.5mm] (160.8:2) to (160.8:-2);
\draw[<->] (0:1)node[right]{$f_1$} to (0:-1) node[left]{$e_1$};
\draw[<->] (120:1)node[above]{$f_3$} to (120:-1)node[below]{$e_3$};
\draw[<->] (60:1)node[above]{$f_4$} to (60:-1)node[below]{$e_4$};
\draw[<->] (30:{sqrt(3)})node[above]{$f_5$} to (30:-{sqrt(3)}) node[below]{$e_5$};
\draw[<->] (90:{sqrt(3)})node[above]{$f_6$} to (90:-{sqrt(3)}) node[below]{$e_6$};
\draw[<->] (150:{sqrt(3)})node[above]{$ f_2 $} to (150:-{sqrt(3)})node[below]{$e_2$};
\end{tikzpicture}
\end{center}
From Serre's relations we find brackets involving $\g_0$:
\[
\begin{array}{lllll}
[h_1,e_1]=2e_1 &
[h_1,e_2]=-3e_2 &
[h_2,e_1]= -e_1 &
[h_2,e_2]=2e_2 & [e_1,f_1]=h_1 \\[2mm]
[h_1,f_1]=-2f_1 &
[h_1,f_2]=3f_2 &
[h_2,f_1]=f_1 &
[h_2,f_2]=-2f_2 & [e_2,f_2]=h_2
\end{array}
\]
The remaining structure relations are written basing on the root
arithmetic with unknown coefficients, which are then uniquely determined
from the Jacobi identity.
With this knowledge we compute the action of $\fp_+$ on $\m$.
This in turn determines the action of
$\rho=\exp\Bigl(\sum_{k=1}^5s_kf_k\Bigr)\in\exp(\fp_+)$ on
$v=\sum_{k=1}^6v_ke_k$ ($f_6$ acts trivially) as follows:
\[
\begin{array}{l}
\hspace{-3pt}
\rho(v_1,v_2,v_3,v_4,v_5,v_6)=\\[2mm]
\Bigl(v_1-s_2v_3+(4s_3-2s_1)v_4+(6s_1s_3-2s_1^2)v_5 +
(\tfrac12s_1^2s_2^2-6s_3^2+12s_2s_4)v_6,\\[2mm]
\phantom{1}
v_2+3s_1v_3+6s_1^2v_4+6s_1^3v_5-(6s_1^2s_3+\tfrac32s_1^3s_2+18s_1s_4)v_6,\\[2mm]
\phantom{1}
v_3+4s_1v_4+6s_1^2v_5-(2s_2+6s_3+\tfrac13s_4)v_6,
v_4+3s_1v_5-(3s_3+\tfrac32s_1s_2)v_6, v_5-s_2v_6, v_6\Bigr).
\end{array}
\]
The group $G_0=\R_\times\times\R_\times$ action on $\g_{-1}$
extends to an automorphism of $\m$.
So we derive the action of $P_{12}=G_0\ltimes\exp(\fp_+)$ on
$\m\setminus\{0\}$ and this yields the decomposition into orbits as follows:
\begin{itemize}
\item 3 orbits in $T\hat{M}\setminus\Delta^4$: one closed in $\hat{N}$ and two open separated by $\hat{N}$,
\item $\infty$ orbits in $\Delta^4\setminus(\Delta^3\cup H_3)$: there is an absolute invariant in $\Delta^4\setminus\hat{N}$,
\item 3 orbits in $H_3\setminus\Delta^3$: one closed in $\hat{N}$ and two open separated by $\hat{N}$,
\item 2 orbits in $\Delta^3\setminus\Delta^2$: one closed in $H_2$ and one open in the complement,
\item 1 orbit in $\Delta^2\setminus\Delta$,
\item 3 orbits in $\Delta\setminus\{0\}$: two lines and the complement.
\end{itemize}
Here $H_2=\{a_1\in\Delta^3:h_2(a_1)=0\}$ and
$H_3=\{a_1\in\Delta^4:h_3(a_1)=0\}$
have the defining equations:
\[
\begin{array}{ll}
\hspace{-3pt}
\,h_2 \,=&\!\! 8p_1r_1-8qr_1-3q_1^2+6rq_1-3r^2,\\[2mm]
h_3 \,=&\!\! 9p^2r_1+9pq_1p_1-9prp_1-9pqq_1+9pqr-18pr_1y_1+4p_1^3-12qp_1^2\\[2mm]
& +12q^2p_1-9p_1q_1y_1+9rp_1y_1-4q^3+9qq_1y_1-9qry_1+9r_1y_1^2.
\end{array}
\]
We note that $h_2$ is a relative invariant in $\Delta^3$ and
$h_3$ is a relative invariant in $\Delta^4$.
Moreover, $h_3=R_2|_{\Delta^4}$, where $R_2$ is the same relative
invariant as in $G_2/P_1$ (note that the order of $R_2$ drops
to 1 when we restrict to the prolongation of the equation for $\Delta^4$).
Actually, the restriction of $I_2$ to ${\Delta^4}\setminus\hat{N}$ is an absolute differential invariant, where $I_2$ is the second order
differential invariant of generic curves in $G_2/P_1$ pulled back to
$G_2/P_{12}$.
The relative invariant $h_2$ comes from a relative invariant for
integral curves in $G_2/P_2$.
\subsection{Number of invariants}
Similar to what is done in Section \ref{S1},
we compute the Hilbert function $h_k$
counting the number of differential invariants of pure order $k$,
depending on the type $\texttt{t}$ of the orbit of 1-jet,
and tabulate it as follows.
\[
\begin{array}{|l|ccccccccccl|}
\hline
\quad\texttt{t} \quad\diagdown\quad k
& 0 & 1 & 2 & 3 & 4 & 5 & 6 & 7 & 8 & 9 & \dots \\\hline
T\M\backslash(\Delta^4\cup\hat{N}) \vphantom{\frac{a}b}
& 0 & 0 & 2 & 5 & 5 & 5 & 5 & 5 & 5 & 5 & 5\\
\hat{N}\backslash\Delta^4 & 0 & 0 & 1 & 3 & 4 & 4 & 4 & 4 & 4 & 4 & 4\\
\Delta^4\backslash(\Delta^3\cup\hat{N}\cup H_3) & 0 & 1 & 0 & 3 & 4 & 4 & 4 & 4 & 4 & 4 & 4 \\
H_3\backslash(\Delta^3\cup\hat{N}) & 0 & 0 & 0 & 1 & 3 & 3 & 3 & 3 & 3 & 3 & 3 \\
(\Delta^4\cap\hat{N})\backslash(\Delta^3\cup H_3) & 0 & 0 & 0 & 1 & 3 & 3 & 3 & 3 & 3 & 3 & 3 \\
(\hat{N}\cap H_3)\backslash\Delta^3 & 0 & 0 & 0 & 0 & 0 & 2 & 2 & 2 & 2 & 2 & 2 \\
\Delta^3 \backslash (\Delta^2 \cup H_2) & 0 & 0 & 0 & 1 & 3 & 3 & 3 & 3 & 3 & 3 & 3 \\
H_2\backslash\Delta^2 & 0 & 0 & 0 & 0 & 0 & 2 & 2 & 2 & 2 & 2 & 2 \\
\Delta^2\backslash\Delta & 0 & 0 & 0 & 0 & 0 & 2 & 2 & 2 & 2 & 2 & 2 \\
\Delta\backslash\{0\} & 0 & 0 & 0 & 0 & 0 &0 & 0 & 0 & 0 & 1 & 1\\ \hline
\end{array}
\]
\medskip
Again we consider in more details only differential invariants
of curves of constant type with either minimal
(actually next to it: integral) or maximal type $\texttt{t}$
of the orbit in 1-jets.
\subsection{Invariants of integral curves}
The first absolute differential invariant $\hat{I}_9$
of curves tangent to $\Delta$ in $\M=G_2/P_{12}$ occurs in order 9.
It coincides with the invariant $I_{10}$
for curves tangent to $\Pi$ in $G_2/P_1$ after the change of coordinates
$r_i=q_{i+1}$ $\forall i$. (Recall that the differential equation for $\Delta$ is obtained from that of $\Pi$ by intersecting with $q_1=r$
and its prolongation.)
An invariant derivation is
\[
\widehat{\Box}_\imath= \frac{r_1}{\hat{R}_7^{1/6}}\widehat{\mathcal{D}}_x\,,
\]
where $\hat{R}_7$ coincides with $R_8$ from Section \ref{section_integral_curves1} after the same change of coordinates, and
\[
\widehat{\D}_x=\p_x+p\p_y+q\p_p+q^2\p_z+r\p_q
+\sum_{i=0}^\infty r_{i+1}\p_{r_i}
\]
is the operator of total derivative on $\E_\Delta$.
Thus the algebra of differential invariants $\widehat{\mathcal{A}}_\imath$
is generated similarly to Section \ref{section_integral_curves1}, and this
is not surprising: there is a bijection between integral
curves of $\Pi$ and those of $\Delta=\hat\Pi$.
Indeed, the prolongation $\gamma(t)\mapsto(\gamma(t),\dot\gamma(t))$
lifts the integral curves of $\Pi$ to the integral curves of $\Delta$,
and the projection gives the inverse map.
\subsection{Invariants of generic curves}
We have the same relative invariants $R_1$ and $R_2$ as in $G_2/P_1$.
In addition, we have the first order relative invariant
\[
R_3 = 2pr + 2qp_1 -2ry_1-q^2 -z_1\,,
\]
that is the pull-back of the contact condition (integral curves) in
$G_2/P_2$.
Some other differential invariants have been computed,
like relative invariant $R_4$ of order 2 (in Maple),
but their formulae are long and we describe the algebra
$\hat{\mathcal{A}}_g$ of invariants differently.
For a generic curve $\hat{\gamma}(t)\subset\M$ its projection
$\gamma(t)=\pi_l\circ\hat{\gamma}(t)\subset M$ is also generic, and hence by
the results of Section \ref{Sec_gen1} possesses a frame
$Y,V,Z,X,W$ along it. A point $\hat\gamma(t)$ over $\gamma(t)$
can be interpreted as a line $\ell_{\gamma(t)}\subset\Pi_{\gamma(t)}$.
There exists a unique $\varrho=\varrho(t)\in\bar\R=\R\cup\infty$
such that $Y+\varrho V\in\ell_{\gamma(t)}$. This $\varrho$ is a function
on the curve, and it defines a rational function on the space of jets
of generic curves in $\M$, denoted by the same symbol.
Let us also note that the differential parameter along the curve
$\hat\gamma$ can be induced from the differential parameter along
its projection $\gamma$. In other words, the invariant derivation
$\Box_g$ from Section \ref{Sec_gen1} induces the following
invariant derivation in $J^\infty(\M,1)$:
$$
\widehat{\Box}_g=\frac1{\D_x I_2}\cdot\hat{\D}_x,
$$
where we use the operator of total derivative
\[
\widehat{\D}_x=\p_x+\sum_{i=0}^\infty \Bigl(y_{i+1}\p_{y_i}+p_{i+1}\p_{p_i}+q_{i+1}\p_{q_i}+z_{i+1}\p_{z_i}
+r_{i+1}\p_{r_i}\Bigr).
\]
\begin{theorem}
The algebra $\hat{\mathcal{A}}_g$ of differential invariants of generic
curves in $\M$ is generated by the differential invariants from
Theorem \ref{Th2}, pulled back from $J^\infty(M,1)$ to $J^\infty(\M,1)$,
the invariant $\varrho$ and the derivation $\widehat{\Box}_g$.
\end{theorem}
\begin{proof}
A curve $\hat\gamma\subset\M$ is uniquely encoded by its projection
$\gamma\subset M$ and its enhancement $\ell_\gamma$, equivalently
represented by the function $\varrho$. Hence it suffices to add
this invariant to the generating set for $\mathcal{A}_g$ to generate
$\hat{\mathcal{A}}_g$.
\end{proof}
\section{Invariants of curves in $K^5=G_2/P_2$}
Associated with $P_2$ is the contact gradation of $\g=\op{Lie}(G_2)$
\begin{equation}\label{g2p2}
\g=\g_{-2}\oplus\g_{-1}\oplus\g_0\oplus\g_1\oplus\g_2
\end{equation}
with $\dim\g_{\pm1}=4$, $\dim\g_{\pm2}=1$ and $\g_0=\mathfrak{gl}_2$.
The manifold $K=G_2/P_2$ possesses $G_2$-invariant contact structure
$D\subset TK$ and a field of rational normal curves (RNC) in $\mathbb{P}D$,
corresponding to the minimal orbit of (the reductive part of)
the structure group $G_0=GL_2$, also identified with its cone
field $\Gamma\subset D$ (in projectivization we will write $[\Gamma]$).
In coordinates $(x,y,p,q,z)$ on $K$ the contact structure is the
annihilator of $\alpha=dz-p\,dx-q\,dy$ and the rational normal cone
(also abbreviated RNC) is given by the following ideal in $S^\bullet D^*$:
\[
\langle 3\,dx\,dp-dy\,dq, \sqrt{3}\,dx\,dy-dq^2,
\sqrt{3}\,dp\,dq-dy^2\rangle.
\]
In other words, RNC is given by the union of 1-parametric family of lines
\begin{equation}\label{xir}
\Gamma=\bigcup_{r\in\bar\R}\xi_r\subset D,\quad\text{ where }\quad
\xi_r=
\langle(\p_x+p\,\p_z)+r\sqrt{3}\,\p_q+r^2\sqrt{3}\,(\p_y+q\,\p_z)+r^3\p_p\rangle.
\end{equation}
The tangent to the RNC is the hypersurface in $D$ of degree 4 given by
\[
T\Gamma=\{a(\p_x+p\,\p_z)+b\,\p_q+c(\p_y+q\,\p_z)+d\p_p\,:\,4\,(ac^3+b^3d)=\sqrt{3}\,(b^2c^2-3a^2d^2+6abcd)\}.
\]
The curves tangent to those varieties are given by the following equations respectively:
\begin{gather}
\E_D=\{z_1=p+q\,y_1\},\notag\\
\E_{T\Gamma}=\bigr\{4\,(y_1^3+p_1q_1^3)=\sqrt{3}\,(y_1^2q_1^2-3p_1^2+6y_1p_1q_1),\ z_1=p+q\,y_1\bigl\},\label{EEE}\\
\E_{\Gamma}=\left\{y_1=\frac{q_1^2}{\sqrt{3}},\ p_1=\frac{q_1^3}{3\sqrt{3}},\ z_1=p+\frac{qq_1^2}{\sqrt{3}}\right\}\notag.
\end{gather}
Note that in our coordinates $(x,y,p,q,z)$ the invariant conformally symplectic structure has the canonical form
$\omega=d\alpha=dx\wedge dp+dy\wedge dq$, while
the RNC has coefficients involving $\sqrt{3}$
(if we normalize RNC standartly,
then the symplectic structure has a coefficient 3).
\subsection{Action and orbits of $P_2$ on 1-jets}
The action of $\fp_+$ on $\m=\g/\fp$ for $\fp=\fp_2$ is nontrivial only on $\g_{-2}$.
Moreover $\g_2$ acts trivially and parametrizing $\g_1$ by the coefficients
$s_1,s_2,s_3,s_4$ in the basis $f_1,f_2,f_3,f_4$ of $\g_1$
dual to the basis $e_1,e_2,e_3,e_4$ of $\g_{-1}$ as described on the picture
\begin{center}
\begin{tikzpicture}
\draw[gray, yshift=17.2mm] (180:2) to (180:-2);
\draw[gray, yshift=8.6mm] (180:2) to (180:-2);
\draw[gray] (180:2) to (180:-2);
\draw[gray, yshift=-8.6mm] (180:2) to (180:-2);
\draw[gray, yshift=-17.2mm] (180:2) to (180:-2);
\draw[<->] (0:1) to (0:-1);
\draw[<->] (120:1)node[above]{$f_3$} to (120:-1)node[below]{$e_3$};
\draw[<->] (60:1)node[above]{$f_2$} to (60:-1)node[below]{$e_2$};
\draw[<->] (30:{sqrt(3)})node[above]{$f_1$} to (30:-{sqrt(3)}) node[below]{$e_1$};
\draw[<->] (90:{sqrt(3)})node[above]{$f_5$} to (90:-{sqrt(3)}) node[below]{$e_5$};
\draw[<->] (150:{sqrt(3)})node[above]{$f_4$} to (150:-{sqrt(3)})node[below]{$e_4$};
\end{tikzpicture}
\end{center}
we encode the action as follows:
\[
(v_1,v_2,v_3,v_4,v_5)\mapsto(v_1+s_1v_5,v_2+s_2v_5,v_3+s_3v_5,v_4+s_4v_5,v_5),
\]
where $v_i$ are coordinates on $\m=\g_{-1}\oplus\g_{-2}$ associated to the basis $e_1,\dots,e_5$.
The action of $G_0=GL_2$ on $\g_{-1}$ is given by the matrix
\[
\left(\begin {array}{cccc}
a^3 & \sqrt{3}\,a^{2}c & \sqrt{3}\,ac^2 & c^3\\ \noalign{\medskip}
\sqrt{3}\,a^2b & a^2d+2\,abc & 2\,acd+bc^2 & \sqrt{3}\,c^2d\\ \noalign{\medskip}
\sqrt{3}\,ab^2 & 2\,abd+b^2c & ad^2+2\,bcd & \sqrt{3}\,cd^2\\ \noalign{\medskip}
b^3 & \sqrt{3}\,b^2d & \sqrt{3}\,bd^2 & d^3\end {array}\right)
\]
in coordinates $(v_1,v_2,v_3,v_4)$ and it extends to $\g_{-2}$ by $v_5\mapsto(ad-bc)^3v_5$.
Hence the action of $P_2$ decomposes $\m$ into the following orbits
\begin{itemize}
\item One orbit in $TM\backslash D$,
\item Two orbits in $D\backslash T\Gamma$,
\item One orbit in $T\Gamma\backslash \Gamma$,
\item One orbit in $\Gamma\backslash\{0\}$.
\end{itemize}
The curves of fixed type $\texttt{t}$ of their 1-jet according to the orbit type
as above, are given by the equations $\E_{\texttt{t}}$ described in \eqref{EEE}.
\subsection{Number of invariants}
Similar to what is done in Section \ref{S1},
we compute the Hilbert function $h_k$
counting the number of differential invariants of pure order $k$,
depending on the type $\texttt{t}$ of the orbit of 1-jet,
and tabulate it as follows.
\[
\begin{array}{|l|cccccccccccl|}
\hline
\ \texttt{t}\ \diagdown\ k
& 0 & 1 & 2 & 3 & 4 & 5 & 6 & 7 & 8 & 9 & 10 & \dots\\\hline
TM\backslash D & 0 & 0 & 0 & 3 & 4 & 4 & 4 & 4 & 4 & 4 & 4 & 4\\
D\backslash T\Gamma & 0 & 0 & 0 & 1 & 2 & 3 & 3 & 3 & 3 & 3 & 3 & 3\\
T\Gamma \backslash \Gamma & 0 & 0 & 0 & 0 & 0 & 1 & 2 & 2 & 2 & 2 & 2 & 2\\
\Gamma \backslash \left\{ 0 \right\} & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 1 & 1 \\\hline
\end{array}
\]
\medskip
Again we consider in more details only differential invariants
of curves of constant type with either minimal or maximal type $\texttt{t}$
of the orbit in 1-jets.
\subsection{Invariants of minimal integral curves}
There are several types $\texttt{t}$ of integral curves for $G_2/P_2$,
we consider those that are tangent to RNC $\Gamma$. The algebra
of differential invariants $\mathcal{I}_\imath$ of these curves is generated by
\[
\widetilde{I}_{10}=\frac{\widetilde{R}_{10}}{\widetilde{R}_8^{7/3}}\quad
\text{ and }\quad
\widetilde\Box=\frac{q_2}{\widetilde R_8^{1/6}}\mathcal{D}_x\,,
\]
where $\D_x$ is the operator of total derivative restricted to $\E_\Gamma$,
\[
\begin{array}{ll}
\widetilde{R}_8 \,\,= \!\! & 196\,q_8q_2^5-3136\,q_2^4q_3q_7-5936\,q_2^4q_4q_6
-3605\,q_2^4q_5^2+26208\,q_2^3q_3^2q_6+83538\,q_2^3q_3q_4q_5\\[2mm]
& +18252\,q_2^3q_4^3-144144\,q_2^2q_3^3q_5-281853\,q_2^2q_3^2q_4^2
+555984\,q_3^4q_4q_2-247104\,q_3^6
\end{array}
\]
corresponds to the invariant $R_8$ from the case $G_2/P_1$, and similar
for $\widetilde{R}_{10}$ (see Theorem \ref{thm1} and Remark \ref{rk1}).
Explicitly this correspondence will be explained in the next section.
\subsection{Invariants of generic curves}\label{gencurveG2P2}
For generic curves $\gamma\subset K$ transversal to the distribution $D$,
the first relative invariant appears in order 1 and it corresponds to
tangency with $D$:
\[
\widetilde{R}_1 = z_1-p-qy_1.
\]
The second order relative invariant $\widetilde{R}_2$ has more complicated
formula, but the most difficult are absolute differential invariants
$\widetilde{I}_{3a}$, $\widetilde{I}_{3b}$, $\widetilde{I}_{3c}$,
$\widetilde{I}_{4d}$ of orders $3\,(\times3)$ and 4, which together with
the invariant derivation $\widetilde{\Box}_g$ generate the algebra
of differential invariants $\mathcal{I}_g$.
Below we explain
how to obtain an invariant frame that, in principle, determines all
basic invariants.
It is known \cite{CS} that for every contact parabolic geometry,
in particular for $K=G_2/P_2$, there is a unique
(up to projective reparametrization) canonical (distinguished) curve
through any point $a\in K$ in any direction $v\in T_aK\setminus D_a$.
For $\gamma(0)=a$ choose $X=\dot\gamma(0)$ and denote this curve
by $\delta_X$. We treat both curves $\gamma$ and $\delta_X$ as
unparametrized. They have the same 1-jet, and therefore
their difference canonically determines 2-jet
$\zeta_X\in S^2T^*_a\gamma\otimes\nu_a$, where $\nu_a=T_aK/\langle X\rangle$
is the normal to $\gamma$ at $a$. The image
$\zeta_X(X,X)\in T_aK\,\op{mod}X$ defines uniquely a 2-plane in $T_aK$,
containing $X$, the intersection of which with $D_a$ is a line
denoted $\Upsilon_X$.
Next we use the projective geometry of $\mathbb{P}D$ equipped with RNC
$[\Gamma]$. The above construction gives a point
$[\Upsilon_X]\in\mathbb{P}D$. We assume the genericity condition
$[\Upsilon_X]\not\in T[\Gamma]$. In this case there exists
a unique bisection $L$ of $[\Gamma]$ containing $[\Upsilon_X]$,
intersecting the RNC in two points $\lambda_X^\pm$
(there is no canonical way to distinguish between $\pm$, so these points
enter non-numerated; in the case $[\Upsilon_X]\in T[\Gamma]\setminus[\Gamma]$ they coincide and in the case $[\Upsilon_X]\in[\Gamma]$ there are
infinitely many lines $L$).
Moreover we can introduce two more points
$\mu_X^\pm=T_{\lambda_X^\pm}[\Gamma]\cap T^2_{\lambda_X^\mp}[\Gamma]$
on the (unique) intersection of the first and second tangents at
the points $\lambda_X^+$ and $\lambda_X^-$ (or interchange).
The corresponding lines in $D$ can be normalized so that to form
a conformally symplectic basis with respect to $\omega$.
Only one overall scale is missing
to obtain the frame from those vectors jointly with $X$
and to fix the contact form. This can be normalized via a
differential invariant.
The formulae are rather complicated,
so instead we show in the next section how to relate
the equivalence problem for generic curves in $K=G_2/P_2$
to those in $M=G_2/P_1$.
\section{Twistor correspondence}
The three realizations of $G_2$, acting on various $G_2/P$ as discussed above,
are conveniently related by the following double fibration
(parabolic subgroups $P$ correspond to crosses on the Dynkin-Satake diagrams).
\begin{figure}[h]
\begin{center}
\begin{tikzpicture}
\draw (0,0) -- (1,0);
\draw (0,0.07) -- (1,0.07);
\draw (0,-0.07) -- (1,-0.07);
\draw (0.6,0.15) -- (0.4,0) -- (0.6,-0.15);
\node[draw,circle,inner sep=2pt,fill=white] at (0,0) {};
\node[draw,circle,inner sep=2pt,fill=white] at (1,0) {};
\node[below] at (0,-0.1) {$\times$};
\draw (3,0) -- (4,0);
\draw (3,0.07) -- (4,0.07);
\draw (3,-0.07) -- (4,-0.07);
\draw (3.6,0.15) -- (3.4,0) -- (3.6,-0.15);
\node[draw,circle,inner sep=2pt,fill=white] at (3,0) {};
\node[draw,circle,inner sep=2pt,fill=white] at (4,0) {};
\node[below] at (4,-0.1) {$\times$};
\draw (1.5,1) -- (2.5,1);
\draw (1.5,1.07) -- (2.5,1.07);
\draw (1.5,0.93) -- (2.5,0.93);
\draw (2.1,1.15) -- (1.9,1) -- (2.1,0.85);
\node[draw,circle,inner sep=2pt,fill=white] at (1.5,1) {};
\node[draw,circle,inner sep=2pt,fill=white] at (2.5,1) {};
\node[below] at (1.5,0.9) {$\times$};
\node[below] at (2.5,0.9) {$\times$};
\path[->,>=angle 90](1.9,0.75) edge (0.65,0.25);
\path[->,>=angle 90](2.1,0.75) edge (3.35,0.25);
\end{tikzpicture}
\end{center}
\end{figure}
The arrows are projections corresponding to the inclusions $P_1\hookleftarrow P_{12}\hookrightarrow P_2$.
Below we explain how this correspondence relates three equivalence problems studied in this paper.
\subsection{Correspondence for points}
For $G_2/P_{12}$ we used the nomenclature $\M$ because it was the geometric
prolongation of $M=G_2/P_1$. In coordinate language
the affine chart $\R^5(x,y,p,q,z)$ of $M$ is covered by the affine chart
$\R^6(x,y,p,q,z,r)$, where $r$ is such that the point of $\M$
is represented by the line
$\ell=\langle\p_x+p\p_y+q\p_p+q^2\p_z+r\p_q\rangle$ in the
distribution \eqref{Pi}.
The rank 2 distribution $\Delta$ of $G_2/P_{12}$ with the canonical split
into $1+1$ line subbundles is given by \eqref{PPi}.
We can also represent $G_2/P_{12}$ as the geometric prolongation of $K=G_2/P_2$, so that its points $\hat{b}=(b,\xi_r)$ are lines in RNC
$\xi_r\subset D_b$, $b\in K$, see \eqref{xir}. In coordinates
this gives $G_2/P_{12}=\hat{K}$ with affine chart $\R^6(x,y,p,q,z,r)$,
and this is naturally equipped with the rank 2 distribution
of growth $(2,3,4,5,6)$ that is canonically split into $1+1$ lines
subbundles as follows:
\begin{equation}\label{PCi}
\tilde\Delta=\langle (\p_x+p\,\p_z)+r\sqrt{3}\,\p_q+r^2\sqrt{3}\,(\p_y+q\,\p_z)+r^3\p_p,\p_r\rangle.
\end{equation}
There is a diffeomorphism $\varphi:(\M,\Delta)\to(\hat{K},\tilde{\Delta})$
that interchanges the first and the second generators of the distributions.
In other words, the vertical line (fiber to $\pi_l$) in $\Delta$
is mapped to the horizontal line in $\tilde\Delta$ and the horizontal line
in $\Delta$ is mapped to the vertical line (fiber to $\pi_r$) in $\tilde\Delta$. This fits the following diagram
\begin{center}
\begin{tikzpicture}
\node () at (3,2.5) {}; \node () at (0,-0.3) {};
\node (A) at (2,2) {$G_2/P_{12}\,:\,(\M,\Delta)$};
\node (B) at (5,2) {$(\hat{K},\tilde\Delta)$};
\node (C) at (0,0) {$G_2/P_1\,:\,(M,\Delta)$};
\node (D) at (6.5,0) {$G_2/P_2\,:\,(K,D,\Gamma)$};
\path[->,font=\scriptsize,>=angle 90]
(2.8,1.7) edge node[above] {$\pi_l$\hphantom{1em}} (0.8,0.3)
(3.6,2) edge node[above]{${}^{\displaystyle\varphi}$} (4.3,2)
(5.1,1.7) edge node[above] {$\hphantom{1em}\pi_r$} (7.1,0.3);
\end{tikzpicture}
\end{center}
where $\pi_l(x,y,p,q,z,r)=(x,y,p,q,z)$ and
$\pi_r(x,y,p,q,z,r)=(x,y,p,q,z)$ in the corresponding coordinates.
The required transformation is given by formula
\begin{multline*}
\varphi(x,y,p,q,z,r)=\\
\left( -\frac{1}{r},\, \sqrt{3}\Bigl(2p-\frac{q^2}{r}\,\Bigr),\,
3z-\frac{q^3}{r},\, \sqrt{3}\Bigl(x-\frac{q}{r}\Bigr),\,
6(xp-y)-\frac{3}{r}\Bigl(z+xq^2\Bigr)+\frac{2q^3}{r^2},\, q \right).
\end{multline*}
\subsection{Correspondence for integral curves}
Integral curves for $(M,\Pi)$ are given by equation \eqref{IC1}
and their prolongations to $(\M,\Delta)$ are determined by the
additional constraint $r=q_1$.
Thus there is a 1:1 correspondence between integral curves of
$(M,\Pi)$ and integral curves of $(\M,\Delta)$. The invariant constraint
$r_1=0$ (or $r=\op{const}$) determines a 1-parametric family of
integral curves through any point called abnormal extremals for $\Pi$.
They are projections of the integral curves for the horizontal
line distribution given by the first generator of \eqref{PPi}.
Minimal integral curves for $(K,D,\Gamma)$ are given by equation
$\E_\Gamma$ of \eqref{EEE} and their prolongation to $(\hat{K},\tilde\Delta)$ are determined by the additional constraint $r=q_1/\sqrt{3}$.
Thus there is a 1:1 correspondence between integral curves of
$(K,D,\Gamma)$ and integral curves of $(\hat{K},\tilde\Delta)$.
The invariant constraint $r_1=0$ (or $r=\op{const}$) determines straight line generators of the RNC through any point of $K$.
They are projections of the integral curves for the horizontal
line distribution given by the first generator of \eqref{PCi}.
This correspondence on the level of jets is summarized in the following
diagram, where we denote by $\jmath_{l,r}$ the lifts defined above, they
are right inverse to the projections $\pi_{l,r}$.
\begin{center}
\begin{tikzpicture}
\node () at (3,2) {}; \node () at (0,-0.1) {};
\node (A) at (2.7,1.5) {$\E_\Delta$};
\node (C) at (0.1,0) {$\E_\Pi$};
\node (D) at (5.2,0) {$\E_\Gamma$};
\path[->,font=\scriptsize,>=angle 90]
(2.2,1.2) edge node[above] {$\pi_l$\hphantom{1em}} (0.2,0.3)
(3.2,1.2) edge node[above] {$\hphantom{1em}\pi_r$} (5.2,0.3)
(0.5,0.3) edge node[below] {\hphantom{1em}$\jmath_l$} (2.5,1.2)
(4.9,0.3) edge node[below] {$\jmath_r\hphantom{1em}$} (2.9,1.2);
\end{tikzpicture}
\end{center}
Note that $\E_\Pi\times\mathbb{P}^1\simeq\E_\Delta\simeq
\E_\Gamma\times\mathbb{P}^1$ (since any integral curve is uniquely
lifted given a point in the fiber) and $\E_\Pi\simeq\E_\Gamma$, which
explains isomorphism of the algebras of differential invariants.
\subsection{Correspondence for generic curves}
The above correspondence cannot be extended to all curves,
however we can produce lifts for generic curves.
On the left side of the double (twistor) fibration the lift
is determined from the observation of Section \ref{Sec_gen1} that
$X$ given by \eqref{XX} determines $Y\in\Pi$ up to scale
by the condition $g(X,Y)=0$. Setting $Y=\p_x+p\p_y+q\p_p+q^2\p_z+r\p_q$
this and \eqref{conf} gives the formula for $r$, from which we conclude
that the lift is given by the following formula (and its prolongations):
\[
\jmath_l(x,y,p,q,z)=\left(x,y,p,q,z,\frac{2qp_1-z_1-q^2}{2(y_1-p)}\right).
\]
On the right side of the double fibration the computation is a bit more
involved. First we derive the formula for distinguished curves in
direction $\g_{-2}$. By the mentioned general result \cite[\S5.3.7]{CS},
there is a unique unparametrized distingushed curve of that type
in any non-contact direction on $TK$. This gives an invariant section
$J^1(K,1)\dashrightarrow J^2(K,1)$ defined on a Zariski open set.
(An alternative way to check it: the stabilizer of a generic
$b_1\in J^1$ is $GL_2\times\R_\times$ that acts on $\pi_{2,1}^{-1}(b_1)\simeq\R^4$
via an irreducible representation of $GL_2$ that has one fixed point.)
The explicit formula involves matrix realization $G_2\subset SO(3,4)$
described in \cite{HS} on the level of Lie algebras;
the reference specifies the $\fp_1$ grading but one can
also identify $\fp_2$. The corresponding parabolic subgroup $P_2$
can be coordinized via $GL_2\ltimes\exp(\fp_+)$ and the action of this
on $\m=\g_-$ is then explicitly derived. The formulae
for the distinguished curves (omitted here, see Maple's supplement)
imply the formula for the above section, or equivalently
for a point $[\Upsilon_X]\in\mathbb{P}D$ as defined in Section
\eqref{gencurveG2P2}:
\begin{multline*}
\Upsilon_X=
\frac{2\sqrt{3}\,q_1^3-9\,qy_2-18\,y_1q_1+9\,z_2}{9(qy_1+p-z_1)}\,
(\partial_x + p\partial_z)+
\left(q_2-\frac{2\,\sqrt{3}\,y_1^2+3\,qq_1y_2+2\,y_1q_1^2-3\,q_1z_2}
{3(qy_1+p-z_1)}\right)\,\partial_q\\
+\left(y_2+\frac{2\,\sqrt{3}\,p_1q_1^2-3\,qy_1y_2-4\,y_1^2q_1-6\,y_1p_1+3\,y_1z_2}
{3(qy_1+p-z_1)}\right)\,(\partial_y+q\partial_z)\\
+\left(p_2-\frac{2\,\sqrt{3}\,y_1^3+9\,qp_1y_2+18\,p_1^2-9\,p_1z_2}
{9(qy_1+p-z_1)}\right)\,\partial_p.
\end{multline*}
Next, given a point $[a:b:c:d]\in\mathbb{P}D$ the RNC secant line
through it intersects $[\Gamma]$ at the points
corresponding to the parameter $r$ from \eqref{xir} so:
\[
\lambda_X^\pm =
\frac{3\,ad-bc \pm \sqrt{(3\,ad-bc)^2-4(\sqrt{3}ac-b^2)(\sqrt{3}bd-c^2)}}
{2(\sqrt{3}ac-b^2)}\,.
\]
Equivalently, the points $r=\lambda_X^\pm$ are the solutions of the
quadratic equation
\[
(\sqrt{3}\,ac -b^2)r^2+(bc-3\,ad)\,r+\sqrt{3}\,bd-c^2=0.
\]
This formula for $r$ composed with the formula for $\Upsilon_X$
(the coefficients $a,b,c,d$ are extracted in the order of appearance)
defines two lifts of generic curves from $K$ to $\hat{K}\simeq\M$:
\[
\jmath^\pm_r(x,y,p,q,z)=(x,y,p,q,z,\lambda_X^\pm\circ[\Upsilon_X]).
\]
This correspondence on the level of jets is summarized in the following
diagram:
\begin{center}
\begin{tikzpicture}
\node () at (3,2) {}; \node () at (0,-0.1) {};
\node (A) at (2.5,1.5) {$J^\infty(\M,1)$};
\node (C) at (0,0) {$J^\infty(M,1)$};
\node (D) at (5,0) {$J^\infty(K,1)$};
\path[->,font=\scriptsize,>=angle 90]
(2.2,1.2) edge node[above] {$\pi_l$\hphantom{1em}} (0.2,0.3)
(3.2,1.2) edge node[above] {$\hphantom{1em}\pi_r$} (5.2,0.3);
\path[dashed,->,font=\scriptsize,>=angle 90]
(0.5,0.3) edge node[below] {\hphantom{1em}$\jmath_l$} (2.5,1.2)
(4.9,0.3) edge node[below] {$\jmath_r\!\!{}^\pm\hphantom{1em}$} (2.9,1.2);
\end{tikzpicture}
\end{center}
The dashed arrows are defined on open dense subsets of their domains,
are right inverse to the corresponding projections, and in addition,
$\jmath_r\!\!{}^\pm$ is 1:2 map. This can be seen as an analog of
the B\"acklund transformation, so that for one (jet of) curve in
$K$ we obtain two such in $M$. This allows to derive the algebra of
differential invariants $\mathcal{I}_g$ of curves in $G_2/P_2$
from the results of Section \ref{S1} by averaging the invariants
thereof on the two branches $\pi_l\circ\jmath_r^\pm$.
\section{Concluding remarks}
The computations in this paper demonstrate the method of
differential invariants for $G_2$ action on curves in generalized
flag varieties.
The group is more complicated than the projective group $PSL_{n+1}$
mentioned in the introduction, and we address the corresponding challenges.
For (minimal) integral curves the approach is very effective and provides
a complete description of the algebra. This has to be compared with
the method of moving frame \cite{C}; a moving frame for this problem
was constructed in \cite{DZ} but the algebra of invariants was not derived.
A modification of this method, the equivariant moving frame \cite{O},
is not applicable as it relies on an explicit Lie group
parametrization, which is non-trivial for $G_2$ (one has to resolve
the quadratic and cubic equations defining the group). We worked mainly
with the Lie algebra. Even in this case for generic curves the direct
computations fail, and we had to evoke geometric arguments to arrive
to the basic invariants, in particular exploiting the ideas of moving frames.
The results of this paper concern only curves in homogeneous flag varieties
$G_2/P$, but they can be extended to more general case of curves
in curved $M^5$ of type $(G_2,P_1)$ etc. Indeed in this more general case
the symmetry algebra of such $M^5$ is smaller than $G_2$ yet the invariants
can be found by the same method. In particular, the stratification
of 1-jets makes a perfect sense in the curved case and one can derive
relative invariants similar to $R_1,R_2$ in Section \ref{S1}
(for $R_1$ this is straightforward) leading to
absolute differential invariants.
The invariance is meant here in the following sense: If $\phi:M_1\to M_2$
is an equivalence between two different spaces with their (2,3,5)
distributions, sending one curve $\gamma_1\subset M_1$ to another
$\gamma_2\subset M_2$ then the invariants are superposed.
Since the structural group $P_1$ for the Cartan bundle associated to
this normal parabolic geometry \cite{CS} was central in our computations,
the basic invariants are expected to generalize.
For the geometry of type $(G_2,P_{12})$ the situation is completely
similar because it is functorially equivalent to the geometry of
type $(G_2,P_1)$. However in the curves case $(G_2,P_2)$ type geometry
fails the twistor correspondence, so this would require a separate
consideration.
|
\section{Introduction}
Sensors are fundamental to all measuring systems in engineering, ranging from small scale experimental setups in research to large scale production surveillance. Depending on the application, difficulties arise if important locations in a system are inaccessible, impractical to instrument or if the costs of the respective sensors are too high. Since modern Internet of Things (IoT) approaches heavily rely on low cost hardware, it is also highly desirable to extract as much information as possible from a given sensor setup.\\
The aim of virtual sensing (VS) is to approximate unmeasured physical quantities in a system using existing sensor information. This can be especially beneficial in applications where sensors are very expensive or their application is difficult. Existing frameworks for VS can mainly be divided into two categories, namely analytical and data-driven approaches. While the former rely on a model of the dynamic system which provides a physically grounded relationship of input and output quantities, the latter generate approximations using available measurement data.\\
A variety of analytical approaches for VS in linear dynamic systems exist in the field of structural monitoring. Here, modal analysis can be used in conjunction with a finite element (FE) model, since the structural response of linear systems can be expressed as a sum of modal contributions. This approach was successfully used to estimate stress histories in fatigue sensitive joints from acceleration measurements in Hjelm et al. \cite{Hjelm2005}, to provide fatigue monitoring at inaccessible locations of offshore wind turbines \cite{Iliopoulos2014} and to predict the full-field response of a system by modeling either the entire structure \cite{Kullaa2019} or only parts of interest \cite{Kullaa2016}. Different VS approaches based on Kalman Filters are demonstrated in \cite{Ching2007} and \cite{Erazo2014} which require complete or partial information about the dynamic system matrices. In many situations, an FE solution might not be available due to insufficient information about the systems geometry and material characteristics. Furthermore, the model of a linear system can be insufficient for a wide range of applications which feature non-linear system characteristics, e.g., non-linear stiffness, kinematics or friction. In these cases, data-driven approaches can be used to implicitly approximate the system using data from sensor measurements.\\
Data-driven VS approaches can be further subdivided into white and black box models, where an interpretation of the model parameters is available in the former and difficult or impossible in the latter case. Frequency response function (FRF) based approaches may provide white box models for discrete systems. While they act as black box models in the continuum case, they perfectly approximate the relationship between measurements in linear systems, see Natke \cite{Natke1988}. Data-driven VS can also provide more accurate estimates of noisy sensor data as demonstrated in Kullaa \cite{Kullaa2019, Kullaa2016}. In recent years, various Machine Learning algorithms have been used to create data-driven black box models for virtual sensing. In chemical process monitoring, Long Short-Term Memory (LSTM) networks were applied in \cite{Ke2017, Yuan2021}, while \cite{Curreri2021} compares recurrent neural networks and LSTM networks and features an approach for transfer learning. Regarding VS in structural mechanics, Rouss et al. \cite{Rouss2009} employs a non-linear autoregressive exogenous model (NARX) for response estimation in a non-linear dynamic system while \cite{Yue2020} applies LSTM networks to model linear time varying systems.\\
The aim of this paper is to provide a black box virtual sensing framework based on LSTM networks which is suitable for multiaxial fatigue applications in non-linear mechanical systems. Special attention must therefore be paid to the error metrics of the VS approximations necessary for fatigue analyses, e.g., multiaxial rainflow counting \cite{Beste1992}. Since LSTM networks rely on a dataset of example inputs and outputs to approximate functions, they can be combined with existing approaches like FRF models, by incorporating their predictions into this training dataset. Similar approaches are already used for lifetime predictions in \cite{Hildebrandt2019}. As a result, this framework is very suited for hybrid modeling. Since both FRF and LSTM models provide estimates of sensor data using measurements, they can also be employed to predict system responses from system actuation data, which is referred to as forward prediction (FP) in fatigue analysis.\\
This paper is structured as follows: In \autoref{sec:model_setup}, important fundamentals regarding frequency response function models and LSTM networks will be reviewed. Signal prediction as a combination of short subsequences is described and different hybrid modeling approaches are proposed. In \autoref{sec:experiments}, a variety of error metrics are introduced and the approach is tested on experimental data originating from a fatigue test bench. The paper concludes with a discussion of the results and an outlook in \autoref{sec:conclusions}.
\section{Model setup} \label{sec:model_setup}
System responses are of interest in many cases where no system descriptions are available. Unknown parameters, complex physical correlations or even time and cost consumption lead to a demand for generally applicable algorithms based on measurement data. Since 1976, FRF-Models are used for test rig descriptions as shown in Cryer et al. \cite{Cryer1976}. Including further developments they are state of the art, up to now \cite{Hay2007}.\\
In this paper, vectors and matrices are indicated using single and double underscores respectively, e.g., $\V v$ and $\M M$. Whenever a scalar operator is applied to a vector, it represents an element-wise application of that operator.
\subsection{Frequency response function model} \label{sec:FRF}
A dynamic system with multiple inputs as well as multiple outputs (MIMO) is characterized by a set of input and output channels. Using $x_k(t)$ to denote a physical quantity measured for the $k$-th input channel at time $t$ and $y_l(t)$ to identify the corresponding measurement for the $l$-th output channel, their relation in the time domain is given by
\begin{align}
\V y(t) = \M g(t) \ast \V x(t)
\end{align}
with $\M g(t)$ being the weight function matrix. Unfortunately, measuring the components of the weight function matrix directly, by applying an impulse excitation with sufficient energy content at the input channels, would severely damage the system in many practical applications. Moreover, the calculation of the convolution operation $(\ast)$ using Duhamel's integral is very time consuming. It is therefore common to compute the frequency response function matrix $\M H(\imag \omega)$ in the frequency domain
\begin{align}
\V Y(\imag \omega) = \M H(\imag \omega) \V X(\imag \omega),
\end{align}
where $\V X \left(\imag \omega \right)=\mathcal{F} \left( \V x \left(t \right) \right)$ and $\V Y \left(\imag \omega \right)=\mathcal{F} \left( \V y \left(t \right) \right)$ are the Fourier transforms of the input and output channel vectors. The elements of $\M H (\imag \omega)$ can be estimated as
\begin{align}
H_{kl} (\imag \omega_n) = \frac{\bar{S}_{kl} (\imag \omega_n)}{\bar{S}_{kk} (\imag \omega_n)}
\end{align}
where the effective power spectral density (PSD) $\bar{S}_{kk}$ and effective cross power spectral density $\bar{S}_{kl}$ can be computed as
\begin{align}
\bar S_{kk} (\imag \omega_n) &= \frac{1}{T \cdot M} \sum_{m=1}^{M} X_{m,k}^\ast (\imag \omega_n) X_{m,k} (\imag \omega_n) \\
\bar S_{kl} (\imag \omega_n) &= \frac{1}{T \cdot M} \sum_{m=1}^{M} X_{m,k}^\ast (\imag \omega_n) Y_{m,l} (\imag \omega_n)
\end{align}
by averaging over the $M$ signal windows of size $T$ for each discrete $\omega_n$ obtained from the Fast Fourier Transform (FFT). This procedure allows for a system characterization using a white-pink-noise excitation. For further details, the reader is referred to \cite{Natke1988}, \cite{Dodds2001} and \cite{Hay2007}.\\
After parameterization, the frequency response function matrix can be used as a predictive model which computes output channel signals perfectly from known input channel information if the dynamic system is linear and time invariant. In the single input, single output (SISO) case, this method can also be extended to non-linear systems by a system linearization, see \cite{Hay2007}, or the usage of multiple models at different support points of a piecewise linearization. In the MIMO case, however, the total number of support points increases exponentially as the non-linear characteristic of each channel combination can be different, making the parameterization and application of this approach very challenging.
\subsection{LSTM prediction and windowing}
The Long Short-Term Memory network, introduced in Hochreiter and Schmidhuber\cite{Hochreiter1997, Gers1999}, is a type of artificial neural network used for sequential data processing. Its gated structure was designed to overcome the vanishing gradient problem of previous recurrent neural networks. As a result, these networks can be trained more efficiently and are generally better at memorizing relationships over long time periods. This section only provides a short overview of the LSTM network algorithm. For more detailed information, the reader is referred to the aforementioned works.\\
An LSTM network is composed of one or multiple memory blocks. Each memory block contains a number of memory cells, where $\V c(t_i)$ denotes the vector of inner cell states at time step $t_i$ with $i=1\dots L$.
\begin{figure}
\begin{centering}
\input{LSTM_tikz}
\caption[LSTM setup]{LSTM networks are composed of memory blocks, which process information using the inner cell state $\V c$. This inner state can be updated, forgotten or used to create the block output $\V h$ depending on the block input at the current time step $\V x (t_i)$ and the previous output $\V h (t_{i-1})$. All operations related to the inner state are carried out by respective gates $G$ and the network $N$, whose parameters are learned from a dataset during training.}
\label{fig:lstm}
\end{centering}
\end{figure}
\autoref{fig:lstm} provides an overview of the data processing steps that occur in a single memory block.\\
At the beginning of each prediction, the cell states are initialized to zero. The LSTM model processes the input channel values $\V x (t_i)$ in sequence at discrete points in time, starting at $\V x(t_1)$ and incrementing $i$ until the terminal input $\V x (t_L)$ of the sequence with length $L$ is reached. The block input $\V x (t_i)$ is concatenated with the output of the previous timestep $\V h(t_{i-1})$ to provide input data for the gate networks $G_\text{store}$, $G_\text{forget}$, $G_\text{out}$ and the input network $N_\text{in}$. Each gate network uses the sigmoid activation function $\sigma(x) = 1/(1+\e^{-x})$ and provides an output
\begin{alignat}{3}
\V g_\text{store} (t_i) &= \sigma \big( \M W_\text{store}^x \V x (t_i) & &+ \M W_\text{store}^h \V h (t_{i-1}) & &+ \V b_\text{store} \big) \\
\V g_\text{out} (t_i) &= \sigma \big( \M W_\text{out}^x \V x (t_i) & &+ \M W_\text{out}^h \V h (t_{i-1}) & &+ \V b_\text{out} \big) \\
\V g_\text{forget} (t_i) &= \sigma \big( \M W_\text{forget}^x \V x (t_i) & &+ \M W_\text{forget}^h \V h (t_{i-1}) & &+ \V b_\text{forget} \big)
\end{alignat}
of the respective gate in the range (0,1), while the input network
\begin{align}
\V a_\text{in} (t_i) = \tanh \left( \M W_\text{in}^x \V x (t_i) + \M W_\text{in}^h \V h (t_{i-1}) + \V b_\text{in} \right)
\end{align}
uses the tanh activation function. The parameters of each network are given by the weight matrices $\M W$ and the bias vector $\V b$, which are initialized randomly. The memory cell state of the current time step
\begin{align}
\V c (t_i) = \V c (t_{i-1}) \odot \V g_\text{forget} (t_i) + \V a_\text{in} (t_i) \odot \V g_\text{store} (t_i)
\end{align}
as well as the block output
\begin{align}
\V h \left(t_i\right) = \tanh \left( \V c \left(t_i\right) \right) \odot \V g_\text{out} \left(t_i\right)
\end{align}
are now computed using the Hadamard product $\odot$ for element-wise multiplication. Afterwards, this process is repeated for the next time step. In architectures with multiple LSTM blocks, the output vector $\V h$ of one block is used as the input $\V x$ of the next block. After the final block, a single fully connected layer
\begin{align}
\V y^\ast (t_i) = \M W_\text{FC} \V h (t_i) + \V b_\text{FC}
\end{align}
with weights $W_\text{FC}$, bias $b_\text{FC}$ and no activation function is used to generate the network prediction $\V y^\ast$.\\
In this work, the LSTM network is implemented using the Python libraries Tensorflow \cite{tensorflow} and Keras \cite{keras}. As a preprocessing step, all training input and output data is collectively standardized to a mean of zero and a standard deviation of one in each channel. During training, the input sequence is used to generate a prediction
\begin{align}
\V y^\ast \left(t_i\right) = \text{LSTM} \left( \V x \left(t_i\right) \right),
\end{align}
which is then compared to the true output channel values using the mean squared error loss function
\begin{align}
E_\text{MSE} = \frac{1}{L} \sum_{i=1}^{L} \left( \V y \left(t_i\right) - \V y^\ast \left(t_i\right) \right)^2.
\end{align}
The optimization algorithm RMSProp \cite{RMSProp} updates the weights and biases after each mini-batch of training data in order to minimize the loss function. The rate of change of these updates is determined by the learning rate hyper-parameter $\lambda$. Training proceeds for a given number of training dataset repetitions called epochs and the assignment of data samples to mini-batches is randomized after each epoch.\\
In order to ensure an efficient training process, all processed sequences are required to have the same length. The application of LSTM networks to measurement data from sensors is therefore carried out on short subsequences with a fixed length $L$. The extraction of subsequences from the dataset is rather straightforward. Starting at the first time sample $t_i = t_1$ of each measurement data file, data in the range $t \in [t_i, t_{i+L-1}]$ is extracted and the starting position of the next subsequence is given by
\begin{align}
t_i \leftarrow t_i + o \cdot L,
\end{align}
where the overlap factor $o$ determines the number of shared time samples between neighboring subsequences.\\
Both training and prediction of the LSTM network are carried out on the subsequence level. In order to achieve a continuous prediction $y^\ast_\text{comb}$ for a complete measurement file, the $n_\text{sub}$ individual subsequence predictions $y^\ast_\text{sub}$ are combined as a weighted sum
\begin{align}
\V y^\ast_\text{comb} = \sum^{n_\text{sub}} \V y^\ast_\text{sub} \odot \V w_\text{sub} \label{eq:weighting}
\end{align}
using window functions $w_\text{sub}$, which are non-zero only in the range of the corresponding subsequence. The window functions are also weighted to ensure the partition of unity property
\begin{align}
\sum^{n_\text{sub}} \V w_\text{sub} = 1
\end{align}
is fulfilled at every time step. \autoref{fig:windowed_prediction} illustrates the subsequence combination process for a single output channel.
\begin{figure}
\begin{center}
\input{subsequence_combination.pdf_tex}
\caption[Windowed prediction]{Individual subsequence predictions (top) are combined as a weighted sum using corresponding window functions (center). As a consequence, predictions for long sequences (bottom) resulting from measurement data can be realized.}
\label{fig:windowed_prediction}
\end{center}
\end{figure}\\
In this paper, the Welch window function
\begin{align}
w_\text{sub} \left( t \right) = 1 - \left( \frac{2t - L}{L} \right)^2
\end{align}
is used to interpolate between individual predictions. It is additionally raised to the power of 10 to provide smooth transitions. As a result of this weighting scheme, the first and last 15\% of the data in each subsequence have a very low impact on the combined prediction. A special treatment is used to extend this approach to the beginning of the measurement process. Here, an additional subsequence is utilized, which spans from $t=-L/2$ to $t=L/2$. For all negative points in time, the unmeasured input channel data is assumed to be equal to the corresponding measurements at the starting time $t_1$. A prediction is generated for this subsequence and included into the weighting process. Finally, all negative points in time are discarded from the resulting combined prediction.
\subsection{Hybrid modeling strategies} \label{sec:hybrid_models}
The FRF model excels at predicting linear system behavior, while the LSTM network can be trained to approximate arbitrary non-linear time-dependent functions. The aim of a hybrid model is to combine both methods in order to exploit their respective strength while minimizing their downsides. In this paper, two different approaches to hybrid modeling are compared.\\
In the first approach, denoted by \textit{hybrid~1}, the FRF model is used to generate a prediction from the input channel values $x$. This prediction is then subtracted from the true output channel values $y$ in the dataset
\begin{align}
\V e \left( t\right) = \V y \left( t \right) - \text{FRF} \left( \V x \left( t \right) \right)
\end{align}
in order to obtain the model error $e$ of the linear FRF prediction. This error data can now be used as output channel values during the training process of an LSTM network. Since the trained network now provides an estimate
\begin{align}
\V e^\ast \left( t\right) = \text{LSTM} \left( \V x \left( t\right) \right)
\end{align}
for the FRF model error, the sum
\begin{align}
\V y^\ast_1 \left( t \right) = \text{FRF} \left( \V x \left( t\right) \right) + \text{LSTM} \left( \V x \left( t \right) \right)
\end{align}
yields the hybrid prediction of the model \textit{hybrid~1}.\\
The second approach, denoted by \textit{hybrid~2}, is designed to provide the LSTM network with more information. Again, the FRF model is used to create a prediction, which is now concatenated to the original input data during LSTM training. This way, the training dataset already contains the FRF prediction as a baseline solution. The hybrid prediction of \textit{hybrid~2}
\begin{align}
\V y^\ast_2 \left( t \right) = \text{LSTM} \left( \V x \left( t \right), \text{FRF} \left( \V x \left( t\right) \right) \right)
\end{align}
can now simply be a copy of the FRF prediction or a modification by the LSTM, depending on the input channel data $x$.
\section{Experiments} \label{sec:experiments}
VS and FP achieve substantial benefits in experimental fatigue tests under multiaxial variable amplitude loading. Predictive maintenance approaches also require an accurate sensor signal prediction from easily accessible measurements, but lead to larger scattering of the resulting data caused by uncertain excitations. Therefore, a real live measurement setup of a fatigue test is chosen in this work to generate a reproducible and large dataset for further research.
\subsection{Experimental setup and data} \label{sec:experimental_setup}
In order to validate the proposed approach, experimental data is collected from the three-component servo-hydraulic fatigue test bench for suspension hydro-mounts, depicted in \autoref{fig:test_setup}.
\begin{figure}
\begin{center}
\subfloat[Fatigue test bench]{
\includegraphics[width=0.65\textwidth]{test_bench.jpg}
}
\subfloat[Hydro-mount]{
\includegraphics[width=0.3\textwidth]{hydro_mount.jpg}
}
\caption[Test setup]{A three-component servo-hydraulic test bench (a) for the fatigue assessment of suspension hydro-mounts (b) is used to generate an experimental dataset. It is equipped with 3 inertia compensated force and 3 displacement sensors.}
\label{fig:test_setup}
\end{center}
\end{figure}
This system features a variety of non-linearities. The hydro-mounts are filled with oil to provide highly non-linear dampening, while the pendulum kinematics of the setup introduce non-linear interactions of the excitations in different spatial directions. The most influential non-linearity originates from the system stiffness. In order to capture the static force-displacement-relationship, each channel is loaded and measured individually, while the two remaining channels are load controlled at a force of zero. The resulting static characteristics, depicted in \autoref{fig:non-linear_characteristics}, show a friction induced hysteresis with significant non-linearities near the upper and lower reversal points.
\begin{figure}
\begin{center}
\subfloat{
\input{x_characteristic.pdf_tex}
}
\subfloat{
\input{y_characteristic.pdf_tex}
}
\subfloat{
\input{z_characteristic.pdf_tex}
}
\caption[Static characteristics]{The static characteristics of each spatial direction form a friction induced hysteresis. While the stiffness is almost constant in large regions of the parameter space, depicted in green color, it changes significantly in the vicinity of the reversal points as indicated by the yellow and orange areas. Only data from regions of constant stiffness is used in the parameterization of the FRF model.}
\label{fig:non-linear_characteristics}
\end{center}
\end{figure}
Apart from the hysteresis, the stiffness is nearly constant in the central regions of parameter space. The FRF model is parameterized using only noise data from this region in order to provide the best linear approximation to the overall system behavior.\\
The measured dataset contains a large collection of system responses that result from different excitations, which are sampled with a frequency of \SI{1}{\kilo\hertz}. It can be subdivided into \SI{1}{\hour} \SI{53}{\minute} of uncorrelated noise signals, \SI{2}{\hour} \SI{37}{\minute} of fatigue service loads whose input signals are rescaled from three independent service load shapes, \SI{20}{\minute} of sinusoidal excitations and \SI{20}{\minute} of sweep. \autoref{fig:example_time_series} shows a time series example for noise and service load data, respectively.
\begin{figure}
\begin{center}
\subfloat[Noise time series]{
\input{Noise_example.pdf_tex}
}\\
\subfloat[Service load time series]{
\input{Serviceload_example.pdf_tex}
}
\caption[Example time series]{The experimental dataset contains a large amount of measured noise time series (a), which are used to train LSTM networks and parameterize FRF models. For validation and testing, mainly service load data files (b) are used to emulate fatigue testing conditions.}
\label{fig:example_time_series}
\end{center}
\end{figure}
In order to ensure that the system characteristics are constant over the duration of all measurements, the entire testing program was repeated once, resulting in identical responses according to the sensor accuracy. A subsequently performed data postprocessing only included a low pass FFT-filtering at \SI{80}{\hertz}. The remaining signal contains the complete controllable frequency range of the used test setup.\\
For the purpose of LSTM network parameterization, the dataset is split into three parts, namely training, validation and test data. Only the training dataset is directly used to update the network weights, while the validation dataset is used to determine the best choice of hyper-parameters of the LSTM architecture and subsequence windowing process. The test dataset is never used during parameterization in order to enable a completely independent evaluation of the predictive performance for each model. From a fatigue analysis point of view, it is very desirable to parameterize predictive models using noise signals exclusively, as they contain a lot of information on the system, while causing significantly less damage to the test specimen if compared to service loads. For this reason, the majority of the noise data is used for training while only a small portion is left to asses the noise prediction quality during validation and testing. The service load data on the other hand is only used during validation and testing. Here, two of the three basic service load signal shapes are assigned for validation and the remaining one is reserved for testing to ensure that both datasets are completely independent. The composition of the dataset is specified in more detail in \autoref{tab:dataset}.
\begin{table}[b]
\centering
\caption[Dataset composition]{Composition of the experimental dataset, sampled at \SI{1}{\kilo \hertz}}
\label{tab:dataset}
\begin{tabular}{ p{2.5cm} R{2.5cm} R{2cm} R{2cm} R{2cm} }
\toprule
Data type & Runtime & \multicolumn{3}{c}{Proportional usage} \\
& (total) & Training & Validation & Test \\
\toprule
Noise & \SI{1}{\hour} \SI{53}{\minute} & 85\% & 6\% & 9\% \\
Service load & \SI{2}{\hour} \SI{37}{\minute} & 0\% & 72\% & 28\% \\
Sinus & \SI{20}{\minute} & 0\% & 80\% & 20\%\\
Sweep & \SI{20}{\minute} & 0\% & 80\% & 20\% \\
\bottomrule
\end{tabular}
\end{table}
\subsection{Error metrics}
In order to evaluate the prediction quality of the models, a variety of error metrics are taken into account. The Root Mean Square (RMS) error
\begin{align}
\text{RMS}\left(y^\ast, y\right) = \sqrt{\frac{\sum_{l=1}^{T} \left(y \left(t_l\right)-y^\ast \left(t_l\right)\right)^2}{\sum_{l=1}^{T} y\left(t_l\right)^2}}
\end{align}
provides a general measure of how well the signal shape of a particular channel prediction $y^\ast$ corresponds to the target $y$, averaged over all $T$ time steps of the series. Similarly, the power spectral density RMS error
\begin{align}
\text{RMS}_\text{PSD} \left( y^\ast, y \right) = \text{RMS} \left( S_{kk}\left( y^\ast \right), S_{kk}\left( y \right) \right)
\end{align}
uses the PSD $S_{kk}$ introduced in \autoref{sec:FRF} to evaluate the prediction quality of a signal channel in the frequency domain, averaged over the corresponding frequencies $\omega_n$.\\
Both of these error metrics do not provide information about the approximation quality of the signals' global extrema, which are of high importance for accurate fatigue damage predictions. For this reason, fictitious fatigue damage calculations according to the nominal stress concept \cite{Haibach2002} are performed for both prediction and target signal. Here, a fictitious Wöhler curve
\begin{align}
N = K \cdot S_\text{a}^{-k}
\end{align}
relates between the load amplitude $S_\text{a}$ and the number of load cycles before component failure denoted by $N$, with $k=5$ and $K=10^7$. In addition, the 4-point Rainflow counting algorithm \cite{McInnes2008} and the elementary Palmgren-Miner rule \cite{Palmgren1924} are used to calculate a fictitious accumulated fatigue damage $d$ for the prediction and target signal, respectively. The metric of the damage ratio
\begin{align}
\text{damage}(y^\ast, y) = \frac{d (y^\ast)}{d (y)}
\end{align}
therefore informs about the relative error between predicted and target fatigue damage, introduced by the virtual sensing model.
The Multi-Rain fatigue damage generalizes the fatigue damage accumulation to multiple spatial directions, see Beste et al. \cite{Beste1992}. This necessity arises as a result of multiaxial stress states following from multiaxial component loading. For a given direction $\psi$, specified by the components $\psi_x$, $\psi_y$ and $\psi_z$ of its unit direction vector satisfying
\begin{align}
\psi_x^2 + \psi_y^2 + \psi_z^2 = 1,
\end{align}
the fictitious damage in this direction can be computed using a weighted sum
\begin{align}
d_\psi (\V s) = d (\psi_x s_x + \psi_y s_y + \psi_z s_z)
\end{align}
of the original signal channels $s_x$, $s_y$ and $s_z$ for arbitrary signals $\V s$. The Multi-Rain damage ratio
\begin{align}
\text{damage}_\text{MR} \left( \V y^\ast, \V y \right) = \frac{\max \left( d_\psi \left( \V y^\ast \right) \right)}{\max \left( d_\psi \left( \V y \right) \right)}
\end{align}
follows by comparing the maximum damages of prediction and target, where 500 uniformly distributed spatial directions $\psi$ are considered in each case.
\subsection{Virtual sensing evaluation} \label{sec:virtual_sensing_evaluation}
In the virtual sensing experiment, the three displacement sensor measurements are used to predict the three channels of force data as shown in \autoref{fig:VSFP}.
\begin{figure}
\begin{centering}
\input{VS_FP_tikz}
\caption[Prediction modes]{The proposed hybrid model can be applied to different signal estimation problems. In a virtual sensing task (blue), one or more output sensors are estimated from the remaining measurements. In forward prediction (orange), the output sensor data is estimated based on the drive signal, which controls the system excitation. The assignment of input and output data during model parameterization changes depending on the use case.}
\label{fig:VSFP}
\end{centering}
\end{figure}
Using this dataset, a comparison is drawn between the FRF model described in \autoref{sec:FRF}, a pure LSTM network and both hybrid models introduced in \autoref{sec:hybrid_models}. As noted in \autoref{sec:experimental_setup}, the FRF model is parameterized using only data from regions where the system stiffness is nearly constant, while the complete training dataset was used for the LSTM and hybrid models. The network hyper-parameters were chosen after conducting multiple large scale automated parameter studies on a high performance computing cluster. Due to the dataset size, a global optimization in this hyper-parameter space is not feasible. To account for the random initialization process of network parameters, each model architecture was trained three times using different starting initializations. This parameter identification process results in varying learning rates and training epoch numbers of the different approaches. It does not limit the comparability of the respective methods, since, in each category, the model with the best prediction quality of the validation dataset was selected.\\
For all model types, good results were achieved by setting the subsequence length $L$ to 256 and the overlap factor $o$ to 0.5. The chosen pure LSTM model features a single memory block with 29 memory cells and was trained for 501 epochs using a learning rate $\lambda$ of 0.0002. Both hybrid models use one memory block with 39 cells, where \textit{hybrid~1} was trained for 402 epochs with $\lambda=0.0001$ and \textit{hybrid~2} was trained for 501 epochs with $\lambda=0.0002$.\\
The models are compared by evaluating a variety of metrics using the test dataset, visualized in \autoref{fig:VS_results}.
\begin{figure}
\begin{center}
\input{VS_results.pdf_tex}
\caption[Evaluation of virtual sensing approach]{In the virtual sensing example, the force sensor data is predicted using the displacement sensors. FRF, LSTM and hybrid models are compared on all service load test data files, whose corresponding test bench drive signals are rescaled versions of the same original signal shape. The results are sorted by the respective scaling factor. A scaling of 0.5$-$ indicates that a negative offset was applied to the data with scaling factor 0.5, while 0.5+ symbolizes a positive offset. The system stiffness changes significantly with an increased scaling factor or when an offset is used, resulting in an increased non-linearity of the system behavior. Both RMS and PSD RMS errors are averaged over the predicted force channels.}
\label{fig:VS_results}
\end{center}
\end{figure}
Regarding the RMS and PSD RMS errors, the hybrid models outperform both the FRF model and the pure LSTM network. Especially in the highly non-linear offset examples, the LSTM and hybrid models approximate the system significantly better than the linear FRF model. The \textit{hybrid~2} model achieves the best prediction of fatigue-related signal properties by scoring a Multi-Rain damage ratio which is closest to one in most service load predictions of the test dataset. Exemplarily, \autoref{fig:VS_time_series} provides a visual time series comparison of the models for a single force channel.
\begin{figure}
\begin{center}
\input{VS_time_series.pdf_tex}
\caption[Virtual sensing time series prediction]{The prediction quality of the presented models is visualized using short time series examples of a service load from the test dataset. Very large amplitudes (top left) benefit the most from LSTM network predictions, since the system stiffness is highly non-linear in regions of high absolute force. Average (top right) amplitudes are generally predicted with a very high accuracy by all models. Small signal offsets in the FRF model are especially noticeable for small oscillations (bottom left).}
\label{fig:VS_time_series}
\end{center}
\end{figure}
\subsection{Forward prediction evaluation} \label{sec:forward_prediction_evaluation}
Apart from its application in virtual sensing, the proposed hybrid methods can also be applied to the task of forward prediction. Here, the aim is to predict the measurements of all displacement and force sensors from the test bench drive signal, which determines the system excitation. From a physical point of view, this task is different from VS, since it relates system input quantities to output quantities as depicted in \autoref{fig:VSFP}. From a data-driven perspective, however, it simply requires a different dataset while the algorithm remains unchanged.\\
The general procedure of hyper-parameter identification is performed as described in \autoref{sec:virtual_sensing_evaluation}. Like during VS, the best overall results were achieved by using a subsequence length $L$ of 256 and an overlap factor $o$ of 0.5. In this application, the best pure LSTM model uses a single LSTM block with 39 memory cells and was trained for 253 epochs with a learning rate $\lambda$ of 0.0002. For the chosen \textit{hybrid~1} model, two memory blocks of 25 memory cells each were trained for 75 epochs using a learning rate $\lambda$ of 0.003. The best \textit{hybrid~2} model again uses one memory block with 39 memory cells and was trained for 800 epochs with $\lambda=0.0001$. The test dataset results are visualized separately for the prediction of displacements and forces in \autoref{fig:FP_results}, although in all cases both quantities were predicted by the same model.
\begin{figure}
\begin{center}
\input{FP_results.pdf_tex}
\caption[Evaluation of forward prediction approach]{In the forward prediction example, both displacement (left) and force (right) sensor data are predicted from the drive signal of the force-controlled servo-hydraulic test bench. FRF, LSTM and hybrid models are compared on all service load test data files, whose corresponding drive signals are rescaled versions of the same original signal shape. The results are sorted by the respective scaling factor. A scaling of 0.5$-$ indicates that a negative offset was applied to the data with scaling factor 0.5, while 0.5+ symbolizes a positive offset. Both RMS and PSD RMS errors are averaged over the predicted channels.}
\label{fig:FP_results}
\end{center}
\end{figure}\\
Regarding only the prediction of the displacement sensors, the hybrid models reliably reproduce the low RMS results of the FRF model while significantly improving the prediction for the offset examples. Here, the hybrid nature of the approach is especially noticeable, since the pure LSTM network performs comparatively poor for most examples in terms of RMS. In contrast, the FRF model yields a higher PSD RMS error than both hybrid and pure LSTM approaches. While the pure FRF and LSTM models tend to under- and overestimate the fatigue damage, respectively, as shown by the Multi-Rain ratio, the prediction of the hybrid models is much closer to the perfect ratio of 1. Especially the \textit{hybrid~2} approach provides comparatively good results in almost all cases and consistently performs best within the offset examples.\\
Unfortunately, the overall trend of the displacement predictions does not translate to the forward prediction of force sensors. When compared to the FRF model predictions, the hybrid models only yield improvements in the offset examples, while the pure LSTM performs worse overall. The Multi-Rain damage results are very similar between all model configurations, where a ratio of 0.1 corresponds to an underestimation of amplitudes by 37\% on average.
\subsection{Dataset size dependency}
The prediction quality of data-driven algorithms strongly depends on the availability of training data. Unfortunately, knowledge about this dependency is rarely available in practical applications, since the collection of large datasets can be very expensive and time consuming. In order to estimate how well LSTM network predictions scale to both larger and smaller datasets, an additional study was conducted using synthetic data.\\
Assuming a linear time invariant dynamic system, the relation between input and output channels is perfectly captured by an FRF model. This model can therefore be used to generate arbitrary amounts of synthetic output data from randomly generated input data in order to train an LSTM network.
In this study, the FRF model of the virtual sensing experiment in \autoref{sec:virtual_sensing_evaluation} is used.
For training and validation purposes, 250 data files of uncorrelated white pink noise data are generated with a length of \SI{180}{\second} each. The white section is limited at \SI{20}{\hertz}, the following pink section is characterized by a power spectral density of the form
\begin{align}
\text{PSD}(\omega) \propto \omega^{-1}
\end{align}
and stops at \SI{50}{\hertz}. The channel mean is randomly sampled in the range [\SI{-4}{\kilo \newton},\SI{4}{\kilo \newton}] and the amplitude range is [\SI{0.5}{\kilo \newton},\SI{2}{\kilo \newton}].\\
Four different LSTM architectures, shown in \autoref{tab:linear_study_models}, are compared in this study.
\begin{table}[b]
\centering
\caption[Linear study networks]{Network architectures in the linear study}
\label{tab:linear_study_models}
\begin{tabular}{ p{3.5cm} P{1.5cm} P{1.5cm} P{1.5cm} P{1.5cm} }
\toprule
Architecture & [10] & [39] & [23,23] & [39,39] \\
\midrule
Number of parameters & 593 & 6,828 & 6,880 & 19,152 \\
\bottomrule
\end{tabular}
\end{table}
The network with one block of only 10 inner states is chosen as an example with an exceptionally low degree of freedom. The architecture of the following networks with one block of 39 cells or two blocks of 23 cells are each very similar to the best performing networks of the virtual sensing and forward prediction tasks, see \autoref{sec:virtual_sensing_evaluation} and \autoref{sec:forward_prediction_evaluation}, respectively. The final network with two blocks of 39 memory cells each is considerably more complex than any previously examined architecture.\\
Since this study is designed to investigate the influence of the dataset size on the LSTM prediction, the model hyper-parameters are fixed to a subsequence length $L$ of 256, an overlap factor $o$ of 0.5, a learning rate $\lambda$ of 0.001 and a fixed training length of 100 epochs. The number of randomly generated noise training files was varied between 5 and 200, where each file has a length of \SI{180}{\second} and was sampled at \SI{1}{\kilo\hertz}. For each model architecture, one random initialization was generated and used as the starting point for all dataset sizes. The trained models are compared on a dataset of 50 random noise signals, which are independent from the training data. \autoref{fig:linear_study_results} shows the RMS and Multi-Rain damage ratio error metrics, averaged over this validation dataset.
\begin{figure}
\begin{center}
\subfloat{
\input{RMS_dataset_size.pdf_tex}
}
\subfloat{
\input{MR_dataset_size.pdf_tex}
}
\caption[Linear study]{The influence of the dataset size on the predictive quality of LSTM networks is studied using a large dataset of random noise excitations and synthetic FRF model responses. The comparison of different model architectures shows that very small models are not able to properly exploit the benefits of a large dataset, while the prediction quality of more complex models scales very well with the dataset size.}
\label{fig:linear_study_results}
\end{center}
\end{figure}\\
The RMS error of each model improves with an increasing number of training data files. Similarly, the Multi-Rain damage ratio converges towards the perfect result of 1. It is also apparent that the small model with only 10 memory cells is not able to capture the system characteristics as good as larger models. Although the model with two blocks of 39 cells performs best, it does not yield significantly better predictions than the models with architectures [39] and [23,23] while requiring substantially more computational effort to parameterize.
\section{Conclusions} \label{sec:conclusions}
A novel hybrid approach for Virtual Sensing in non-linear dynamic systems was introduced based on Long Short-Term Memory networks and frequency response function models. These methods synergize very well, since the FRF model perfectly captures the behavior of linear systems and therefore provides a very good starting point for the non-linear LSTM predictions. Extraction and recombination of short subsequence signals enable the direct application of the LSTM algorithm to measurement data. Two strategies for the hybrid combination of LSTM and FRF models were suggested and compared. The effectiveness of the proposed approaches was demonstrated using a non-linear experimental dataset from a servo-hydraulic fatigue test bench. Different error metrics were employed to determine the predictive quality of the models in time and frequency domains as well as in a fatigue context.\\
Virtual Sensing results indicate that hybrid models significantly outperform both pure FRF and LSTM models in most situations. Extending the LSTM network inputs by the FRF prediction generally yields more accurate results than using the LSTM network to correct the FRF model error, especially regarding fatigue metrics. The approach was also applied to the Forward Prediction of sensor data, where hybrid models provided very good estimates for displacement sensors. Linear studies on a large synthetic dataset suggest that further improvements in prediction quality are likely to be achieved by increasing the dataset size.\\
Since low cost acceleration sensors are readily available and strain measurements are of high interest for fatigue applications, the approach should be extended to these physical quantities in further studies. It should also be tested how well the LSTM training process can be scaled to scenarios with a significantly higher number of sensors. Finally, it would be very beneficial to identify algorithms which find an optimal dataset composition for training and validation. Such algorithms could estimate the exact amount of data required to parameterize models in specific tasks and ensure that the available measurements are used as efficiently as possible.
\section{Declaration of Competing Interrest}
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
\section{Acknowledgments}
\begin{table}[H]
\begin{tabular}{m{8cm} m{1.5cm} m{5cm} }
\includegraphics[height=20mm]{EFRE.png} & \includegraphics[height=20mm]{Saxony.png} &
This measure is co-financed with tax revenues on the basis of the budget adopted by the members of the Saxon State Parliament.
\end{tabular}
\end{table}
The authors gratefully acknowledge the GWK support for funding this project by providing computing time through the Center for Information Services and HPC (ZIH) at TU Dresden.
|
\section{Introduction}
In this paper, we develop likelihood-based methods for estimation, inference, model selection, and forecasting of continuous-time integer-valued trawl (IVT) processes. IVT processes, introduced in \cite{BNLSV2014}, are a flexible class of integer-valued, serially correlated, stationary, and infinitely divisible continuous-time stochastic processes. In general, however, IVT processes are not Markovian, which implies that the structure of the full likelihood of an IVT process is highly intractable \citep[][]{SY2016}. This is the impetus of the present paper, where we propose to use composite likelihood \citep[CL,][]{Lindsay88} methods for estimation and inference. Specifically, we propose to estimate the parameters of an IVT model by maximizing
the pairwise likelihood of the data. CL methods in general, and the pairwise likelihood approach in particular, have been successfully used in many applications, such as statistical genetics \citep[][]{LF2011}, geostatistics \citep[][]{HO1994}, and finance \citep[][]{EPSS2020}. See \cite{VRF2011} for an excellent overview of CL methods. Although the theory behind CL estimation is quite well understood in the case of iid observations \citep[e.g.][]{CN2004,VV2005}, the time series case, which is what we consider here, generally requires separate treatment \citep[][p. 11]{VRF2011}. For instance, \cite{DY2011} develops the theory of CL estimators in the setting of linear Gaussian time series models, while \cite{CHW2016} and \cite{NJKL2011} consider CL methods for a hidden Markov model and a time series model with a latent autoregressive process, respectively. Also, \cite{S2019} develop a two-step CL estimation method for parameter-driven count time series models with covariates. Our paper adds to the literature on CL methods for time series models by deriving the theoretical properties (consistency, asymptotic normality) of a pairwise CL estimator applied to IVT models.
A central feature of IVT processes is that they allow for specifying the correlation structure of the model separately from the marginal distribution of the model, making them flexible and well-suited for modelling count- or integer-valued data. In particular, the marginal distribution of an IVT process can be any integer-valued infinitely divisible distribution, while the correlation structure can be specified independently using a so-called trawl function. This setup allows for both short- and long-memory of the IVT process. So far, IVT processes have been applied to financial data \citep{BNLSV2014,SY2017,VERAART2019} and to the modelling of extreme events in environmental time series \citep{NVG2018}. IVT processes are, under weak conditions, stationary and ergodic, which motivated \cite{BNLSV2014} to suggest a method of moments-based estimator for the parameters of the IVT model. This method of moments estimator has been used in most applied work using IVT processes \cite[e.g.][]{BNLSV2014,SY2017,VERAART2019}. Exceptions are \cite{SY2016} and \cite{NVG2018}. In \cite{NVG2018}, a pairwise likelihood was used for a hierarchical model involving a latent (Gamma-distributed) trawl process and the corresponding asymptotic theory was derived in \cite{CV2020}. However, the asymptotic theory for inference for integer-valued trawl processes which are observed directly is not covered by these earlier papers.
In \cite{SY2016}, the authors derive a prediction decomposition of the likelihood function of a particularly simple IVT process, the so-called Poisson-Exponential IVT process, allowing them to conduct likelihood-based estimation and inference. Although the likelihood estimation method developed in \cite{SY2016} theoretically applies to more general IVT processes, the computational burden quickly becomes overwhelming in these scenarios, making estimation by classical maximum likelihood methods infeasible in practice.
The contributions of this paper can be summarized as follows. First, we derive the theoretical mixing properties of IVT processes. Using these, we prove consistency and, in the short memory case, asymptotic normality of the maximum composite likelihood (MCL) estimator of the parameter vector of an IVT model. We discuss the long memory case and, based on a result about the asymptotic behaviour of partial sums of IVT processes, conjecture that the MCL estimator has an $\alpha$-stable limit with infinite variance in this case. For the purpose of conducting feasible inference and model selection, we propose two alternative estimators of the asymptotic variance of the MCL estimator in the short memory case: a kernel-based estimator, inspired by the heteroskedastic and autocorrelation consistent (HAC) estimator of \cite{NW1987}, and a simulation-based estimator. Second, we use the same principle of considering the pairwise likelihood in lieu of the full likelihood, to derive the predictive distribution of an IVT model, conditional on the current value of the process; this allows us to use the IVT framework for forecasting integer-valued data. In a simulation study, we compare the MCL estimator to the standard method of moments-based estimator suggested in \cite{BNLSV2014} and find that the MCL estimator provides substantial improvements in most cases. Indeed, in a realistic simulation setup, we find that the MCL estimator can improve on the method-of-moments-based estimator by more than $50\%$, in terms of finite sample root median squared error.
We apply the methods developed in the paper to a time series of the bid-ask spread of a financial asset. The time series behaviour of the bid-ask spread has been extensively studied in the literature on the theory of the microstructure of financial markets \citep[e.g.][]{HS1997,BSW2004}. The model selection procedure developed in the paper indicates that a model with Negative Binomial marginal distribution and slowly decaying autocorrelations most adequately describe the data. These findings are in line with those of \cite{GH2013}, who also found strong persistence in bid-ask spread time series. Then, in a pseudo out-of-sample forecast exercise, we find that it is important to carefully model both the marginal distribution and the autocorrelation structure to get accurate forecasts of the future bid-ask spread. These findings highlight the strength of modelling using a framework where the choice of marginal distribution can be made independently of the choice of autocorrelation structure
The rest of the paper is structured as follows. Section \ref{sec.:setup} outlines the mathematical setup of IVT processes, while Section \ref{sec:estimation} contains details on the estimation and model selection procedures. Section \ref{sec:forec} presents the theory behind our proposed forecasting approach. Section \ref{sec:MC} summarises the results from our simulation study, investigating the finite sample properties of the estimation and model selection procedures. Section \ref{sec:emp} illustrates the use of the new methodology
in an empirical application to financial bid-ask spread data. Section \ref{sec.:concl} concludes. The proofs of the main mathematical results are given in an Appendix.
Practical details on the implementation of the asymptotic theory and additional derivations are given
in the Supplementary Material, which
also contains further simulation results and extensive details on various calculations used in the implementation of the methods.
A software package for the implementation of simulation, estimation, inference, model selection, and forecasting of IVT processes is freely available in the MATLAB programming language.\if10{\footnote{The software package can be found on GitHub.}} \fi \if00{\footnote{The software package can be found at \url{https://github.com/mbennedsen/Likelihood-based-IVT}.}} \fi
\section{Integer-valued trawl processes}\label{sec.:setup}
Let $(\Omega, \mathcal{F}, \mathbb{P})$ denote a probability space, satisfying the usual assumptions and supporting a Poisson random measure $N$, defined on $\mathbb{Z} \times [0,1] \times \mathbb{R}$, with mean (intensity) measure $\eta \otimes Leb \otimes Leb$. Throughout $Leb$ denotes the Lebesgue measure and $\eta$ is a L\'evy measure.
A \emph{L\'evy basis} $L$ can be constructed on $[0,1] \times \mathbb{R}$ by defining
\begin{align}\label{eq:LB0}
L(dx,ds) := \int_{-\infty}^{\infty} y N(dy,dx,ds), \quad (x,s) \in [0,1] \times \mathbb{R}.
\end{align}
Since we are only interested in integer-valued L\'evy bases, we will work under the following assumption.
\begin{assumption}\label{ass:LB}
The L\'evy basis $L$ is given by \eqref{eq:LB0} with L\'evy measure $\eta$, concentrated on the integers ($y \in \mathbb{Z}$), such that $\| \eta \| := \sum_{y = -\infty}^{\infty} y^2 \eta(y) < \infty$.
\end{assumption}
The L\'evy basis $L$ is an infinitely divisible random measure with cumulant (log-characteristic) function
\[
C_{L(dx,ds)}(\theta) := \log \mathbb{E}[ \exp (i\theta L(dx,ds)) ] = \int_{-\infty}^{\infty} \left(e^{i\theta y}-1\right) \eta(dy)dx ds, \quad (x,s) \in [0,1] \times \mathbb{R}.
\]
An important random variable associated with the L\'evy basis $L,$ is the so-called \emph{L\'evy seed}, $L'$, which we define as
the random variable $L'$ satisfying $\mathbb{E}[\exp (i \theta L')] = \exp (C_{L'} (\theta)),$ with $C_{L'}(\theta) = \sum_{y=-\infty}^{\infty} \left(e^{i\theta y}-1\right) \eta(y) $.
\begin{remark}\label{rem:Lseed}
Because the distribution of a L\'evy process is entirely determined by its distribution at a particular time point, we can specify a L\'evy process $L_t'$ from a L\'evy seed $L'$, by requiring that $L_1' \sim L'$.
\end{remark}
Using the L\'evy seed, we can rewrite the cumulant function of the L\'evy basis
as $C_{L(dx,ds)}(\theta) = C_{L'}(\theta) dx ds$, or, for a Borel set $B \in \mathcal{B}([0,1]\times \mathbb{R}),$
\begin{align}\label{eq.:cumLB}
C_{L(B)}(\theta) = C_{L'}(\theta) Leb(B).
\end{align}
From \eqref{eq.:cumLB} we have that $\kappa_j(L(B)) = \kappa_j(L') Leb(B)$, $j \geq 0$, where $\kappa_j(Z)$ denotes the $j$'th cumulant of the random variable $Z$, when it exists.\footnote{Recall that the cumulants $\kappa_j(Z)$ of the random variable $Z$ are defined implicitly through the power series expansion of the cumulant function of $Z$, i.e., $C_Z(\theta) = \log \mathbb{E}[ \exp (i\theta Z) ] = \sum_{j=1}^{\infty} \kappa_j(Z) (i \theta)^j/j!$.} In particular
$\mathbb{E}[L(B)] = \mathbb{E}[L'] Leb(B)$, and $Var(L(B)) = Var(L') Leb(B)$.
The relationship \eqref{eq.:cumLB} implies that the distribution of the random variable $L(B)$ is entirely specified by the L\'evy seed $L'$ and the Lebesgue measure of the set $B$. In Section \ref{sec:marginal} below, we illustrate how this can be used to construct trawl processes with a given marginal distribution.
The L\'evy basis $L$ acts on sets in $\mathcal{B}([0,1]\times \mathbb{R})$. We restrict attention to \emph{trawl sets} of the form
\begin{align}\label{eq:At}
A_t = A + (0,t), \quad A = \{(x,s) : s\leq 0, 0\leq x < d(s)\}, \quad t \geq 0,
\end{align}
where $d$
is a \emph{trawl function}, which determines the shape of the trawl set $A_t$. Section \ref{sec:corr} contains several parametric examples for the trawl function $d$.
We will impose the following assumption.
\begin{assumption}\label{ass:trawl}
The trawl set $A_t$ is given by \eqref{eq:At}, where the trawl function $d: \mathbb{R}_- \to [0,1]$ is continuous and monotonically increasing such that $Leb(A) = \int_{-\infty}^0 d(s) < \infty$.
\end{assumption}
Intuitively, $A_t$ is obtained from the set $A$ by ``dragging'' it along in time. Note in particular that $Leb(A_t) = Leb(A)$ for all $t$. Finally, define the IVT process $X = (X_t)_{t \geq 0}$ as the L\'evy basis evaluated over the trawl set:
\begin{align}\label{eq:defIVT}
X_t := L(A_t), \quad t\geq 0.
\end{align}
\subsection{Modelling the marginal distribution}\label{sec:marginal}
For an IVT process $X$ as defined in \eqref{eq:defIVT}, we have $C_{X_t}(\theta) = C_{L(A_t)}(\theta) = Leb(A)C_{L'}(\theta) = C_{ L'_{Leb(A)}}(\theta)$, where $L'_t$ is a L\'evy process with $L'_1 \sim L'$. Hence we observe
that the marginal distribution of the IVT process $X_t$ is entirely decided by the Lebesgue measure of the trawl set $A$ and the L\'evy seed $L'$ of the underlying L\'evy basis $L$. Indeed, by specifying a distribution for $L'$, we can built IVT processes with the corresponding marginal distribution. The following two examples illustrate how to do this; additional details can be found in the Supplementary Material.
\begin{example}[Poissonian L\'evy seed] \label{ex:Poisson}
Let $L' \sim \textnormal{Poisson}(\nu)$, i.e. $L'$ is distributed as a Poisson random variable with intensity $\nu>0$. It follows from standard properties of the Poisson distribution that $X_t \sim \textnormal{Poisson}(\nu Leb(A))$. In other words, for all $t \geq 0$,
$P\left( X_t = x \right) = (\nu Leb(A))^{x} e^{-\nu Leb(A)} / x!$, $x = 0, 1, 2, \ldots$.
\end{example}
\begin{example}[Negative Binomial L\'evy seed]\label{ex:NB}
Let $L' \sim \textnormal{NB}(m,p)$, i.e. $L'$ is distributed as a Negative Binomial random variable with parameters $m>0$ and $p \in [0,1]$. It follows from standard properties of the Negative Binomial distribution that $X_t \sim \textnormal{NB}(m Leb(A),p)$. In other words, for all $t \geq 0$,
$P(X_t = x) = \frac{\Gamma(Leb(A)m+x)}{x!\Gamma(Leb(A)m)} (1-p)^{Leb(A)m} p^x$, $x= 0, 1, 2, \ldots$,
where $\Gamma(z) = \int_0^{\infty} y^{z-1} e^{-y} dy$ for $z>0$ is the $\Gamma$-function.
\end{example}
\subsection{Modelling the correlation structure}\label{sec:corr}
Recall that the shape of the trawl set $A_t$ is determined by the trawl function $d$, see Equation \eqref{eq:A}. A particularly tractable and flexible class of parametrically specified trawl functions are
the so-called \emph{superposition trawls} \citep{BNLSV2014,SY2017}. They are defined as
$d(s) := \int_0^{\infty} e^{\lambda s} \pi (d\lambda)$, for $s \leq 0$,
where $\pi$ is a probability measure on $\mathbb{R}_+.$ This construction essentially randomizes the decay parameter $\lambda$ in an otherwise exponential function.
The IVT process with a superposition trawl function is stationary. Hence, we get the autocorrelation function \citep{BNLSV2014}
\begin{align}\label{eq.:corr}
\rho(h) := Corr( L(A_{t+h}),L(A_t)) = \frac{ Leb( A_{h} \cap A)}{Leb(A)} = \frac{ \int_h^{\infty} d(-s) ds}{\int_0^{\infty} d(-s)ds}, \quad h>0.
\end{align}
\begin{example}[Exponential trawl function] \label{ex:Exp}
For the case where the measure $\pi$ has an atom at $\lambda > 0,$ i.e. $\pi(dx) =\delta_{\lambda}(dx),$ where $\delta_x(\cdot)$ is the Dirac delta function at $x \in \mathbb{R}_+,$ we get $d(s) = e^{\lambda s}$ for $s \leq 0$. Consequently,
$\rho(h) =
\exp(-\lambda h)$, for $h \geq 0$.
\end{example}
\begin{example}[Inverse Gaussian trawl function]\label{ex:IG}
Letting $\pi$ be given by the inverse Gaussian distribution
$\pi(dx) = \frac{(\gamma/\delta)^{1/2}}{2 K_{1/2}(\delta \gamma)} x^{-1/2} \exp \left( -\frac{1}{2} (\delta^2 x^{-1} + \gamma^2 x) \right) dx$,
where $K_{\nu}(\cdot)$ is the modified Bessel function of the third kind and $\gamma, \delta \geq 0$ with both not zero simultaneously. It can be shown that the resulting trawl function is given by
$d(s) = \left( 1- \frac{2s}{\gamma^2}\right)^{-1/2} \exp\left( \delta \gamma \left( 1- \sqrt{ 1 - \frac{2s}{\gamma^2}} \right) \right)$, for $s \leq 0$,
and hence that the correlation function of the IVT process with inverse Gaussian trawl function becomes
$\rho(h) = Corr(X_{t+h},X_t) = \exp\left(-\delta \gamma (\sqrt{1+2h/\gamma^2} - 1)\right)$, for $h \geq 0$.
The details on these calculations can be found in the Supplementary Material.
\end{example}
\begin{example}[Gamma trawl function]\label{ex:GAM}
Let $\pi$ have the $\Gamma(1+H,\alpha)$ density,
$\pi(dx) = \frac{1}{\Gamma(1+H)} \alpha^{1+H} \lambda^{H} e^{-\lambda \alpha} dx$,
where $\alpha > 0 $ and $H > 0.$ We can show that
$d(s) = \left( 1- \frac{s}{\alpha}\right)^{-(H+1)}$, $s \leq 0$,
which implies the correlation function
$\rho(h) = Corr( X_{t+h},X_t) = \frac{ Leb( A_{h} \cap A)}{Leb(A)} = \left(1 + \frac{h}{\alpha}\right)^{-H}$.
Note that in this case $\int_0^{\infty} \rho(h) dh=\infty$ for $H\in (0,1]$ and $\int_0^{\infty} \rho(h) dh=\alpha(H-1)^{-1}$ for $H>1$,
from which we see that an IVT process with a Gamma trawl function enjoys the long memory property, in the sense of a non-integrable autocorrelation function, when $H \in (0,1].$ The details on these calculations can be found in the Supplementary Material.
\end{example}
\subsection{Modelling IVT processes}
Using the above methods, we can build flexible continuous-time integer-valued processes with a marginal distribution determined by the underlying L\'evy basis, and independently specified correlation structure determined by the trawl function. In our main examples given above, we considered a L\'evy basis with Poisson
or Negative Binomial
marginals, and various trawl functions, namely the Exponential trawl function,
the IG trawl function,
and the Gamma trawl function.
Other specifications for the underlying L\'evy basis and trawl function than those given here could of course be considered. In practice, these choices should be guided by the properties of the data being modelled.
The simplest IVT process we can construct in this way is the Poisson-Exponential IVT process, i.e., the the case where $L' \sim \textnormal{Poisson}(\nu)$ and $d(s) = \exp(\lambda s)$, $s \leq 0$, see Examples \ref{ex:Poisson} and \ref{ex:Exp}. This special case results in a Markovian process, which is not in general true of IVT processes \citep[][]{BNLSV2014}. In fact, the model is similar to the popular Poissonian INAR(1) model, introduced in \cite{McKenzie1985} and \cite{AAOA1987}.
An illustration of the exponential trawl set, $A_t,$ dragged through time, together with a simulation of the resulting Poisson-Exponential IVT trawl process $X_t = L(A_t)$, is seen in Figure \ref{fig.:PRMtrawl}. The parameters used are $\lambda = 1$ and $\nu = 5$. At each time point $t$, the value of $X_t$ (bottom plot) is the number of points inside the trawl set $A_t$ (top plot).
\begin{figure}[htb]
\centering
\includegraphics[scale=0.9]{MATLABfigs/IVT_path_v03.eps}
\caption{\it Top: Simulation of a Poisson L\'evy basis on $\mathbb{R} \times [0,1]$ (black dots) with an exponential trawl set $A_t$ (shaded) superimposed at three periods in time, $t \in \{0,7, 8\}$. Bottom: The associated trawl process $X_t = L(A_t)$, given by the number of `points' inside the trawl set $A_t$ at time $t$. The intensity of the Poisson random measure is $\|\eta\| = \eta(1) = \nu = 5$ and the parameter controlling the exponential trawl function, $d(s) = \exp(\lambda s)$, is $\lambda = 1.$}
\label{fig.:PRMtrawl}
\end{figure}
\section{Estimation of integer-valued trawl processes}\label{sec:estimation}
\cite{BNLSV2014} showed that the parameter vector $\theta$ of an IVT process can be consistently estimated using a generalized method of moments (GMM) procedure.
In Section \ref{sec:est_cst}, we propose a likelihood-based approach instead.
Both estimation procedures rely on the fact that the IVT process is stationary and mixing. The mixing property of IVT processes is obtained from results given in \cite{FS2013}, see \citet[][p. 699]{BNLSV2014}. Although mixing, in general, is sufficient for the consistency of the estimators, the central limit theorem for the likelihood-based estimator (Theorem \ref{th:CLT} below) relies on the stronger mixing concept of $\alpha$-mixing, where the size (or rate) of mixing can also be established.
Let us recall the definition of $\alpha$-mixing for a stationary process. Let $\mathcal{F}_{-\infty}^0 = \sigma( X_t; t\leq 0)$ and, for $m>0$, $\mathcal{F}_{m}^{\infty} = \sigma( X_t; t \geq m)$, and define the numbers
$\alpha_m := \sup_{G \in \mathcal{F}_{-\infty}^0, H \in \mathcal{F}_{m}^{\infty}} | \mathbb{P}(H\cap G) - \mathbb{P}(H) \mathbb{P}(G)|$, for $m>0$.
The process $X = (X_t)_{t\in \mathbb{R}}$ is $\alpha$-mixing if $\alpha_m \rightarrow 0$ as $m \rightarrow \infty$. It is $\alpha$-mixing of size $-\phi_0$ if $\alpha_m = O(m^{-\phi})$, as $m \rightarrow \infty$, for some $\phi>\phi_0$.
We obtain the following important property for IVT processes.
\begin{theorem}\label{th:mixing}
Let the IVT process $X$ be given by \eqref{eq:defIVT} and let Assumptions \ref{ass:LB} and \ref{ass:trawl} hold. Now, $X$ has $\alpha_m = O(\rho(m))$ as $m \rightarrow \infty$, where $\rho(m)$ is the autocorrelation function of $X$.
\end{theorem}
\begin{remark}\label{rem:mixing}
The autocorrelation functions of the Exponential (Example \ref{ex:Exp}) and IG (Example \ref{ex:IG}) IVT models imply that these models are in fact $\alpha$-mixing with an exponential decay rate. The autocorrelation function of the Gamma (Example \ref{ex:GAM}) IVT model implies that it is $\alpha$-mixing of size $-(H-\epsilon)$ for all $\epsilon>0$.
\end{remark}
\subsection{Estimation by composite likelihoods}\label{sec:est_cst}
Due to the non-Markovianity of the IVT process, we face computational difficulties when attempting to estimate the model by maximizing the full likelihood,
hence we propose to use the CL method instead, see \cite{Lindsay88}.
The main idea behind the CL approach is to specify a quasi-likelihood function which captures the salient features of the data at hand; here this means capturing the features of the L\'evy basis, controlling the marginal distribution, and those of the trawl function, controlling the dependence structure. We focus on the
pairwise CLs.
\subsubsection{Pairwise composite likelihood}\label{sec:pairwise}
Suppose we have $n \in \mathbb{N}$ observations of the IVT process $X,$ $x_1, \ldots,x_n,$ on an equidistant grid of size $\Delta = T/n$, for some $T>0$. Define the following likelihood function using pairs of observations $k$ periods apart,
\begin{align}\label{eq:CLh}
CL^{(k)}(\theta;x) := \prod_{i=1}^{n-k} f(x_{i+k},x_{i};\theta), \quad k\geq 1,
\end{align}
where $f(x_{i+k},x_{i};\theta)$ is the joint probability mass function (PMF) of the observations $x_i$ and $x_{i+k}$, parametrized by the vector $\theta$. From \eqref{eq:CLh}, we construct the composite likelihood function
\begin{align}\label{eq:CLH}
\mathcal{L}_{CL} (\theta;x) := \mathcal{L}_{CL}^{(K)} (\theta;x) := \prod_{k =1}^{K} CL^{(k)}(\theta;x) = \prod_{k =1}^{K} \prod_{i=1}^{n-k} f(x_{i+k},x_{i};\theta),
\end{align}
where $K \in \mathbb{N}$ denotes the number of pairwise likelihoods to include in the calculation of the composite likelihood function.
%
The maximum composite likelihood (MCL) estimator of $\theta$ is defined as
\begin{align}\label{eq:clmax}
\hat{\theta}^{CL}: = \arg \max_{\theta \in \Theta} l_{CL} (\theta;x),
\end{align}
where $\Theta$ is the parameter space and $l_{CL} (\theta;x) := \log \mathcal{L}_{CL} (\theta;x)$ is the log composite likelihood function. To apply this estimator in practice, we need to be able to calculate the PMFs $f(x_{i+k},x_i)$. Section \ref{app:f_derive} in the Supplementary Material contains a discussion on how to do this in the general integer-valued case. In the count-valued case, $f(x_{i+k},x_i)$ takes a particularly simple form which is convenient in implementations. Indeed, letting $\mathbb{P}_{\theta}(B)$ denote the probability of the event $B$ given parameters $\theta$, we have the following.
\begin{proposition}\label{prop:positiveLB}
Let the IVT process $X$ be given by \eqref{eq:defIVT} and let Assumptions \ref{ass:LB} and \ref{ass:trawl} hold. Suppose further, that the L\'evy basis $L$ is non-negative, i.e. $\eta(y) = 0$ for $y<0$. The joint PMF of two observations $x_{i+k}$ and $x_i$ is
\begin{align}
f(x_{i+k},x_{i};\theta) = \sum_{c=0}^{ \min\{x_{i+k},x_i\}} &\mathbb{P}_{\theta}\left( L(A_{(i+k)\Delta} \setminus A_{i\Delta}) = x_{i+k} - c\right) \mathbb{P}_{\theta}\left( L(A_{i\Delta} \setminus A_{(i+k)\Delta}) = x_{i}-c\right) \nonumber \\
&\cdot \mathbb{P}_{\theta}\left(L(A_{(i+k)\Delta} \cap A_{i\Delta}) = c\right). \label{eq:finsum}
\end{align}
\end{proposition}
The probabilities $\mathbb{P}_{\theta}(\cdot)$ in \eqref{eq:finsum} can be expressed as a function of the parameters of the L\'evy seed and the trawl function. Indeed, for a Borel set $B \in \mathcal{B}([0,1]\times \mathbb{R})$ we have
$\mathbb{P}_{\theta}(L(B) = x) = \mathbb{P}_{\theta}(L'_{Leb(B)} = x)$,
where $L'_t$ is a L\'evy process with $L_1' \sim L'$, and $L'$ being the L\'evy seed associated to $X$, see Remark \ref{rem:Lseed}.
Also, $Leb( A_{(i+k)\Delta} \cap A_{i\Delta}) = \int_{-\infty}^{-k\Delta} d(s) ds$,
and
$Leb( A_{(i+k)\Delta} \setminus A_{i\Delta}) = Leb( A_{i\Delta} \setminus A_{(i+k)\Delta})= Leb(A) - Leb( A_{(i+k)\Delta} \cap A_{i\Delta}) = \int_{-k \Delta}^0 d(s) ds$.
Plugging these into \eqref{eq:finsum} we obtain the pairwise likelihoods, $f(x_{i+k},x_i;\theta)$, and thus the CL function, $\mathcal{L}_{CL}(\theta;x)$, as a function of $\theta$.
\begin{example}[Poisson-Exponential IVT process]
Let $L' \sim \textnormal{Poisson}(\nu)$ and $d(s) = \exp (\lambda s)$, $s \leq 0$, for some $\nu, \lambda > 0$. Since $L' \sim \textnormal{Poisson}(\nu)$ we have $L(B) \sim \textnormal{Poisson}(Leb(B)\nu)$ for Borel sets $B$ and hence
$\mathbb{P}_{\theta}\left( L(B) = x \right) = (\nu Leb(B))^{x} e^{-\nu Leb(B)} / x!$, for $x \geq 0$.
Further, it is not difficult to show that
$Leb( A_{(i+k)\Delta} \cap A_{i\Delta}) = \lambda^{-1} e^{-\lambda k\Delta}$ and $Leb( A_{(i+k)\Delta} \setminus A_{i\Delta}) =\lambda^{-1}(1 - e^{-\lambda k \Delta})$.
Using this, the probabilities in \eqref{eq:finsum} can be expressed as functions of $\nu$ and $\lambda$ and hence the maximization \eqref{eq:clmax} can be carried out using standard numerical methods.
\end{example}
\subsubsection{Asymptotic theory}\label{sec:asym}
Because we are only considering dependencies across pairs of observations and not their dependence with the remaining observations, the pairwise composite likelihood function \eqref{eq:CLH} can be viewed as a misspecified likelihood. Nonetheless, since the individual PMFs $f(x_{i+k},x_i;\theta)$ in \eqref{eq:CLH} are proper bivariate PMFs, the \emph{composite score function} $\partial l_{CL}(\theta;x) / \partial \theta$ provides unbiased estimating equations and, under certain regularity assumptions, the usual asymptotic results will apply \citep{CN2004}. However, as pointed out in \cite{VRF2011}, formally proving the results in the time series case requires more rigorous treatment. The following two theorems provide the details on the asymptotic theory in the setup of this paper.
We will work under the following identification assumption
\begin{assumption}\label{ass:identification}
For all $\theta \in \Theta$, it holds that
\begin{align}\label{eq:identify}
\theta \neq \theta_0 \Rightarrow \sum_{k=1}^K f(x_1,x_2;\theta) \neq \sum_{k=1}^K f(x_1,x_2;\theta_0)
\end{align}
for some $x_1,x_2\in \mathbb{Z}$.
\end{assumption}
First, we have a Law of Large Numbers.
\begin{theorem}\label{th:LLN}
Fix $K \in \mathbb{N}$, let the IVT process $X$ be given by \eqref{eq:defIVT}, and let Assumptions \ref{ass:LB}--\ref{ass:trawl} and \ref{ass:identification} hold. Then
$\hat{\theta}_{CL} \stackrel{\mathbb{P}}{\rightarrow} \theta_0$, as $n\rightarrow \infty$.
\end{theorem}
\begin{remark}\label{rem:identify}
As is often the case, the identification condition in Assumption \ref{ass:identification} can be difficult to check in practice.
For the IVT processes considered in this paper and presented in the examples above, our numerical experiments indicate that requiring $K \geq \textnormal{dim}(\theta_d)$, where $ \textnormal{dim}(\theta_d)$ denotes the dimension of the parameters controlling the trawl function $d$, results in $\theta_0$ being identified. A similar requirement was suggested in \cite{DY2011}.
\end{remark}
We also impose a standard assumption on the parameter space.
\begin{assumption}\label{ass:theta}
The set $\Theta$ is compact such that the true parameter vector, $\theta_0$, lies in the interior of $\Theta$.
\end{assumption}
It turns out that the asymptotic behaviour of the MCL estimator differs in the short- and long-memory cases. The former is captured by the following assumption.
\begin{assumption}[Short memory]\label{ass:SM}
The autocorrelation function of the IVT process satisfies $\lim_{n\rightarrow \infty}\rho(n)n=0$.
\end{assumption}
\begin{remark}
Assumption \ref{ass:SM} is satisfied by IVT processes with the Exponential trawl (Example \ref{ex:Exp}), the Inverse Gaussian trawl (Example \ref{ex:IG}), and the Gamma trawl (Example \ref{ex:GAM}) with $H>1$.
\end{remark}
Under this assumption, the mixing property of IVT processes, presented in Theorem \ref{th:mixing}, implies that the following Central Limit Theorem holds.
\begin{theorem}\label{th:CLT}
Let the conditions from Theorem \ref{th:LLN} hold, together with Assumptions \ref{ass:theta}--\ref{ass:SM}. Then,
\begin{align*
\sqrt{n} (\hat{\theta}^{CL} - \theta_0) \stackrel{d}{\rightarrow} N\left(0,G(\theta_0)^{-1}\right), \quad n\rightarrow \infty,
\end{align*}
where $G(\theta_0)$ is the \emph{Godambe information matrix} \citep{godambe60} matrix with inverse
$G(\theta_0)^{-1} = H(\theta_0)^{-1} V(\theta_0) H(\theta_0)^{-1}$,
where
\begin{align*}
H(\theta_0) =& - \sum_{k =1}^K \mathbb{E}\left[ \frac{\partial^2}{\partial \theta' \partial \theta} \log f(X_{k\Delta},X_{0};\theta)|_{\theta = \theta_0} \right], \quad \mathrm{and}
\\
V(\theta_0) =& \sum_{k=1}^K Var \left( \frac{\partial}{\partial \theta} \log f(X_{k\Delta},X_{0};\theta)|_{\theta = \theta_0} \right) \\
&+ 2 \sum_{k=1}^K \sum_{k'=1}^{K} \sum_{i=1}^{\infty} Cov\left( \frac{\partial}{\partial \theta} \log f(X_{k\Delta},X_{0};\theta)|_{\theta = \theta_0}, \frac{\partial}{\partial \theta'}\log f(X_{(i+k')\Delta},X_{i \Delta};\theta)|_{\theta = \theta_0} \right).
\end{align*}
Further, the infinite sum in the expression for $V(\theta_0)$ converges.
\end{theorem}
Theorem \ref{th:CLT} implies that feasible inference can be conducted using an estimate of the inverse of the Godambe information matrix
$\hat G(\hat \theta^{CL})^{-1} = \hat H(\hat \theta^{CL})^{-1} \hat V(\hat \theta^{CL}) \hat H(\hat \theta^{CL})^{-1}$,
where $\hat \theta^{CL}$ is the MCL estimate from \eqref{eq:clmax}. Note that while the straight-forward estimator $\hat H(\hat \theta^{CL} )= -n^{-1}\frac{\partial}{\partial \theta \partial\theta'}l_{CL}(\hat \theta^{CL};x)$ is consistent for $H(\theta)$ due to the stationarity and ergodicity of the IVT process, $\hat V(\hat \theta^{CL})$ is more difficult to obtain, since the obvious candidate $n^{-1} \frac{\partial}{\partial\theta} l_{CL}(\theta;x) \frac{\partial}{\partial\theta} l_{CL}(\theta;x)'$ vanishes at $\theta = \hat \theta^{CL}$, a fact also remarked in \cite{VV2005}. While it is possible to estimate $V(\theta_0)$ using a Newey-West-type kernel estimator \citep{NW1987}, we obtained more precise results using a simulation-based approach to estimating $V(\theta_0)$. The details of both approaches are provided in the Supplementary Material, see Section \ref{app:stdErr}.\footnote{It is also possible to approximate the standard error of $\hat \theta^{CL}$ using a standard parametric bootstrap approach. However, as we discuss in Section \ref{app:B2} of the Supplementary Material, this solution is more computationally expensive than the two alternative approaches suggested here.}
\subsubsection{Asymptotic theory in the long memory case}
While the consistency result in Theorem \ref{th:LLN} applies for all IVT processes satisfying Assumptions \ref{ass:LB}--\ref{ass:trawl} and \ref{ass:identification}, Assumption \ref{ass:SM}, required in the central limit result in Theorem \ref{th:CLT}, excludes IVT processes with very strong memory, e.g. those with autocorrelation function adhering to $\rho(h) = O(h^{-H})$ for $H \in (0,1]$. As mentioned in Remark \ref{rem:mixing}, this is for instance the case for the Gamma trawl function (Example \ref{ex:GAM}) with $H \in (0,1]$.
Although a long memory CLT as such eludes us, we can say some things about the asymptotic behaviour of the MCL estimator $\hat{\theta}^{CL}$ in the long memory case. For instance, the convergence rate is likely slower than $\sqrt{n}$, as the following result suggests.
\begin{theorem}\label{th:aH}
Let the conditions from Theorem \ref{th:LLN} hold and assume that the autocorrelation function of the IVT process satisfies $\rho(h) = L_{\infty}(h) h^{-H}$ for some $H \in (0,1]$, where $L_{\infty}$ is a function which is slowly varying at infinity, i.e. for all $a>0$ it holds that $\lim_{x \rightarrow \infty} \frac{ L_{\infty}(ax)}{ L_{\infty}(x)} = 1$. Then,
\begin{enumerate}
\item[(i)] For all $\epsilon > 0$,
$n^{H/2-\epsilon} (\hat{\theta}^{CL} - \theta_0) \stackrel{\mathbb{P}}{\rightarrow} 0$, as $n\rightarrow \infty$.
\item[(ii)] Let $J = \textnormal{dim}(\theta_0)$ be the dimension of $\theta_0$ and denote by $\hat{\theta}^{CL}_i$ and $\theta_{0,i}$ the $i$'th component of the vectors $\hat{\theta}^{CL}$ and $\theta_0$, respectively. Then, for $i = 1, 2, \ldots, J$, we have that for all $\epsilon > 0$,
$Var\left( n^{H/2 +\epsilon} (\hat{\theta}^{CL}_i - \theta_{0,i}) \right) \rightarrow \infty$, as
$n\rightarrow \infty$.
\end{enumerate}
\end{theorem}
Theorem \ref{th:aH}(i) implies that the convergence rate of $\hat{\theta}^{CL}$ cannot be slower than $n^{H/2}$ for $H \in (0,1]$. Further, Theorem \ref{th:aH}(ii) implies that if the convergence rate is faster than $n^{H/2}$ it must necessarily be the case that the limiting random variable has infinite variance. We conjecture that $n^{H/(H+1)} (\hat{\theta}^{CL} - \theta_0) \stackrel{(d)}{\rightarrow} M Y_{1+H}$ for a matrix $M$, where $Y_{\alpha}$ is an $\alpha$-stable random vector. Note that, for $H \in (0,1)$ it is the case $H/(1+H) \in (H/2,1/2)$, meaning that the conjectured convergence rate is faster than $n^{H/2}$, but slower that $\sqrt{n}$. Our reason for the conjecture has its roots in Theorem \ref{th:conjecture} below. First, we introduce a technical assumption on the trawl function $d$, ensuring that we are in the long memory case.
\begin{assumption}[Long memory]\label{ass:LM}
Assume that $H \in (0,1)$ and
\begin{enumerate}
\item
$d(-x) = g_1(x) x^{-H-1}$, $x>0$, where $g_1$ is a function that is slowly varying at infinity
\item
$d'(-x) = g_2(x) x^{-H-2}$, $x>0$, where $g_2$ is a function that is slowly varying at infinity
\end{enumerate}
\end{assumption}
\begin{remark}
The key condition in Theorem \ref{th:aH}, namely $\rho(h) = L_{\infty}(h) h^{-H}$ for some $H \in (0,1)$, is implied by Assumption \ref{ass:LM}.
\end{remark}
\begin{remark}
The Gamma trawl function (Example \ref{ex:GAM}) fulfils Assumption \ref{ass:LM} with $g_1(x) = \left( x^{-1} + \alpha^{-1}\right)^{-H-1}$ and $g_2(x) = \frac{H+1}{\alpha} \left( x^{-1} + \alpha^{-1}\right)^{-H-2}$.
\end{remark}
\begin{theorem}\label{th:conjecture}
Suppose $L' \sim Poi(\nu)$ and that the parameters of the trawl function $d$ are known. Let the conditions from Theorem \ref{th:LLN} hold, along with Assumptions \ref{ass:theta} and \ref{ass:LM}.
Then,
\begin{align*}
n^{H/(1+H)} (\hat{\nu}^{CL} - \nu_0 - R_n) \stackrel{d}{\rightarrow} H(\nu_0)^{-1}\nu_0^{-1} Y_{1+H}, \quad n\rightarrow \infty,
\end{align*}
where $H(\nu_0)$ is given as in Theorem \ref{th:CLT}, $Y_\alpha$ is an $\alpha$-stable random variable with characteristic function
\begin{align} \label{eq:chfct}
\phi_{Y_\alpha}(u) := \mathbb{E}[\exp(i u Y_\alpha)] = \exp\left(c |u|^{\alpha} \Gamma(2-\alpha)\ \left( \cos\left(\frac{\pi \alpha}{2}\right) - i \cdot \textnormal{sgn}(u) \sin\left(\frac{\pi \alpha}{2}\right) \right) \right), \quad u \in \mathbb{R},
\end{align}
and where $R_n$ is given by
\begin{align*}
R_n = H(\nu_0)^{-1}\nu_0^{-1} n^{-1} S_n(U),
\end{align*}
with $S_n(U):= \sum_{i=1}^n \left(U_i -\mathbb{E}[U_i] \right)$ denoting the de-meaned partial sum of the sequence $U = \{U_i\}_{i=1}^n$, where $U_i := \sum_{k=1}^K g(X_{(i+k)\Delta},X_{i\Delta})$ and $g(X_{(i+k)\Delta},X_{i\Delta}) := \mathbb{E}[L(A_{(i+k)\Delta}\setminus A_{i\Delta})|X_{(i+k)\Delta},X_{i\Delta}]$.
\end{theorem}
\begin{remark}
The asymptotic behaviour of the remainder term $R_n$ in Theorem \ref{th:conjecture} is decided by a quite general function $g$ of the pairs $(X_i,X_{i+k})$ and one can show that similar issues arise in the more general case where $L'$ is integer-valued and the parameters in the trawl function are estimated. The asymptotic behaviour of such general functions of the data could possibly be studied using mixing conditions for partial sums with $\alpha$-stable limits \citep[e.g.][]{Jakubowski1993} or by deriving Breuer-Major-like theorems \citep[][]{BM1986,NPP2011} valid for IVT processes using Malliavin calculus for Poissonian spaces, see \cite{BPT2020} for a related approach. We believe that especially this latter route could be fruitful, but leave it for future work.
\end{remark}
The proof of Theorem \ref{th:conjecture} relies on a result about the partial sums of the IVT process $X$, which might be of independent interest. We, therefore, state it here.
\begin{theorem}\label{th:partial}
Suppose the L\'evy basis $L$ is non-negative, i.e. $\eta(y) = 0$ for $y<0$, and let the conditions from Theorem \ref{th:LLN} hold, along with Assumptions \ref{ass:theta} and \ref{ass:LM}.
Then,
\begin{align*}
n^{-\frac{1}{1+H}} S_n(X) \stackrel{d}{\rightarrow} Y_{1+H}, \quad n\rightarrow \infty,
\end{align*}
where $Y_\alpha$ is an $\alpha$-stable random variable with characteristic function \eqref{eq:chfct}.
\end{theorem}
\begin{remark}
Closely related results about partial sums of trawl processes have previously been put forth in \cite{DJLS2019} and \cite{PPSV2021}. None of these two approaches can be directly used in our setting, however: The results in \cite{PPSV2021} cannot be used because they are formulated under infill asymptotics; the results in \cite{DJLS2019} cannot be used, since their discrete-time trawl process is not equivalent to a discretized version of the continuous-time trawl process discussed in this paper \citep[][p. 1327]{DJLS2019}.
\end{remark}
%
%
%
%
%
\subsection{Information criteria for model selection}\label{sec:IC}
Takeuchi's Information Criterion \citep{Takeuchi1976} is an information criterion, which can be used for model selection in the case of misspecified likelihoods. \cite{VV2005} adapted the ideas of Takuchi to the composite likelihood framework and provided arguments for using the composite likelihood information criterion (CLAIC)
\[
CLAIC = l_{LC}(\hat \theta^{CL};x) + \textnormal{tr}\left\{ \hat V(\hat \theta^{CL}) \hat H(\hat \theta^{CL})^{-1} \right\}
\]
as a basis for model selection, where $\textnormal{tr}\{M\}$ is the trace of the matrix $M$. Specifically, \cite{VV2005} suggest picking the model that maximizes $CLAIC$.
Analogous to the usual Bayesian/Schwarz Information Criterion \citep[BIC,][]{BIC1978}, we also suggest the alternative composite likelihood information criterion \citep[][]{GS2010}
\[
CLBIC = l_{CL}(\hat \theta^{CL};x) + \frac{\log(n)}{2} \textnormal{tr}\left\{ \hat V(\hat \theta^{CL}) \hat H(\hat \theta^{CL})^{-1} \right\},
\]
where $n$ is the number of observations of the data series $x$. Note that the various models we consider are generally non-nested, whereas most research on model selection using the composite likelihood approach has considered nested model \citep[][]{NJ2014}. An analysis of the properties of $CLAIC$ and $CLBIC$ in the non-nested case in the spirit of, e.g., \cite{Vuong1989} would be very valuable but is beyond the scope of the present article.
\section{Forecasting integer-valued trawl processes}\label{sec:forec}
Let $\mathcal{F}_t = \sigma((X_s)_{s \leq t})$ be the sigma-algebra generated by the history of the IVT process $X$ up until time $t$ and let $h>0$ be a forecast horizon.
We are interested in the predictive distribution of the IVT process, i.e. the distribution of $X_{t+h}|\mathcal{F}_t$.
However, since the IVT process $X$ is in general non-Markovian, the distribution of $X_{t+h}|\mathcal{F}_t$ is highly intractable. This problem is similar to the one encountered when considering the likelihood of observations of $X$, cf. Section \ref{sec:est_cst}. For this reason, we propose to approximate the distribution of $X_{t+h}|\mathcal{F}_t$ by $X_{t+h}|X_t$, i.e. instead of conditioning on the full information set, we only condition on the most recent observation. Thus, our proposed solution to the forecasting problem is akin to the proposed solution to the problem of the intractability of the full likelihood. That is, instead of considering the full distribution of $X_{t+h}|\mathcal{F}_t$, we use the conditional ``pairwise'' distribution implied by $X_{t+h}|X_t$.
To fix ideas, let $t \in \mathbb{R}$ and $h>0$, and consider the random variables $X_t=L(A_t)=L(A_t \cap A_{t+h})+L(A_t\setminus A_{t+h})$ and $X_{t+h}=L(A_{t+h})=L(A_t \cap A_{t+h})+L(A_{t+h}\setminus A_{t})$. The goal is to find the conditional distribution of $X_{t+h}$ given $X_t$.
Note that $L(A_t \cap A_{t+h})$ and $L(A_{t+h}\setminus A_{t})$ are independent random variables. Further, since $L(A_{t+h}\setminus A_t)$ is independent of $X_t$ with known distribution, we only need to determine the distribution of $L(A_t\cap A_{t+h})$ given $X_t$. The following lemma characterises the conditional distribution of $L(A_t\cap A_{t+h})$.
\begin{lemma}\label{lem:fCond}
Let $x \in \mathbb{N}\cup \{0\}$ and $l \in \{0, 1, \ldots, x\}$, then
\begin{align*}
&\mathbb{P}(L(A_t \cap A_{t+h})=l|X_t=x)=\frac{\mathbb{P}(L(A_t\setminus A_{t+h})=x-l)\mathbb{P}(L(A_t \cap A_{t+h})=l)}{\mathbb{P}(X_t=x)}.
\end{align*}
\end{lemma}
\begin{example}\label{ex:f1} In the case when $L'\sim\mathrm{Poi}(\nu)$, we get the Binomial distribution:
\begin{align*}
L(A_t\cap A_{t+h})|X_t \sim \mathrm{Bin}\left(X_t,\frac{Leb(A_0\cap A_h)}{Leb(A_0)}\right),
\end{align*}
which implies that
$
\mathbb{E}(L(A_t\cap A_{t+h})|X_t)=X_t Leb(A_0\cap A_h)(Leb(A_0))^{-1}.
$
\end{example}
\begin{example}\label{ex:f2} In the case when $L'\sim\mathrm{NB}(m,p)$, we get the Dirichlet-multinomial distribution:
\begin{align*}
L(A_t\cap A_{t+h})|X_t~\mathrm{Dirichlet-multinomial}(X_t, \alpha_1, \alpha_2),
\end{align*}
where
$\alpha_1=Leb(A_0\setminus A_h)m, \alpha_2=Leb(A_0\cap A_h)m)$ and $\alpha_1+\alpha_2=Leb(A_0)m$. For $x-l, x\in \{0, \ldots, X_t\}$, the corresponding probability mass function is given by
\begin{align*}
&\mathbb{P}(L(A_t\cap A_{t+h}) = l|X_t=x) \\
&= {x \choose l} \frac{\Gamma(Leb(A_0\setminus A_h)m + x-l)}{\Gamma(Leb(A_0\setminus A_h)m)} \frac{\Gamma(Leb(A_0 \cap A_h)m + l)}{\Gamma(Leb(A_0\cap A_h)m)} \frac{\Gamma(Leb(A_0)m)}{\Gamma(Leb(A_0)m + x)}, \quad x \geq l \geq 0
\end{align*}
where $ {x \choose l} = \frac{x!}{l!(x-l)!}$ is the binomial coefficient. This implies that, as before,
$
\mathbb{E}(L(A_t\cap A_{t+h})|X_t)=X_t Leb(A_0\cap A_h)(Leb(A_0))^{-1}.
$
\end{example}
Using Lemma \ref{lem:fCond}, we can derive the distribution of $X_{t+h}|X_t$, which can be used for probabilistic forecasting. The details for non-negative valued L\'evy bases are given in the following proposition.
\begin{proposition}\label{prop:fCond}
Let the IVT process $X$ be given by \eqref{eq:defIVT} and let Assumptions \ref{ass:LB} and \ref{ass:trawl} hold. Suppose further, that the L\'evy basis $L$ is non-negative, i.e. $\eta(y) = 0$ for $y<0$. Now,
\begin{align*}
\mathbb{P}(X_{t+h}=x_{t+h}|X_t=x_t)
=\sum_{c=0}^{\min(x_t,x_{t+h})}
\mathbb{P}(L(A_{t+h}\setminus A_t)=x_{t+h}-c)
\mathbb{P}(L(A_t\cap A_{t+h})=c|X_t=x_t).
\end{align*}
\end{proposition}
The following corollaries give the specific details for our two main specifications for the marginal distribution of $X_t$, studied in Examples \ref{ex:f1} and \ref{ex:f2} above
\begin{corollary}\label{cor:fpoi}
If $L'\sim\mathrm{Poi}(\nu)$, then
\begin{multline*}
\mathbb{P}(X_{t+h}=x_{t+h}|X_t=x_t)
\\
=\sum_{c=0}^{\min(x_t,x_{t+h})} \frac{(\nu {Leb}(A_h\setminus A_0))^{x_{t+h}-c}}{(x_{t+h}-c)!}e^{-\nu {Leb}(A_h\setminus A_0)}
{x_t \choose c}
\left(\frac{{Leb}(A_h \cap A_0)}{{Leb}(A_0)}\right)^c
\left(1-\frac{{Leb}(A_h \cap A_0)}{{Leb}(A_0)}\right)^{x_t-c}.
\end{multline*}
\end{corollary}
\begin{corollary}\label{cor:fnb}
If $L'\sim\mathrm{NB}(m,p)$, then
\begin{align*}
&\mathbb{P}(X_{t+h}=x_{t+h}|X_t=x_t) \\
&=\sum_{c=0}^{\min(x_t,x_{t+h})} (1-p)^{Leb(A_h\setminus A_0)m} p^{x_{t+h}-c} {x_t \choose c} \frac{1}{(x_{t+h}-c)!} \\
&\cdot \frac{\Gamma(Leb(A_h\setminus A_0)m + x_{t+h}-c)}{ \Gamma(Leb(A_h\setminus A_0)m)}
\frac{\Gamma(Leb(A_h\setminus A_0)m + x_t-c)}{\Gamma(Leb(A_h\setminus A_0)m)} \frac{\Gamma(Leb(A_h \cap A_0)m + c)}{\Gamma(Leb(A_h\cap A_0)m)} \frac{\Gamma(Leb(A_0)m)}{\Gamma(Leb(A_0)m + x_t)}.
\end{align*}
\end{corollary}
If the parameters of an IVT process $X$ with Poisson or Negative Binomial marginal distribution are known, we can use Corollary \ref{cor:fpoi} or \ref{cor:fnb}, and the calculations for the Lebesgue measures of the trawl sets given in Section \ref{sec:corr},
for computing the predictive PMFs and thus for forecasting. When the true parameter values are unknown, they can be estimated using the MCL estimator suggested above, and plugged into the formulas to arrive at estimates of the predictive PMFs.
\section{Monte Carlo simulation experiments}\label{sec:MC}
In a simulation study, we examine the finite sample properties of the composite likelihood-based estimation procedure
and of the model selection procedure. Details are available in the Supplementary Material, see Section \ref{sec:SuppSim}. Here we summarise our main findings.
We consider six data generating processes (DGPs):
the Poisson-Exponential (P-Exp), the Poisson-Inverse Gaussian (P-IG), the Poisson-Gamma (P-Gamma), the Negative Binomial-Exponential (NB-Exp), the Negative Binomial-Inverse Gaussian (NB-IG), and the Negative Binomial-Gamma (NB-Gamma) IVT models.
The parameter choices used in the simulation study, see Table \ref{tab:paramTab} in the Supplementary Material, are motivated from the estimates of our empirical study.
We compare the finite sample properties of the MCL estimator with the GMM estimator, which has been used in the existing literature.
Figure \ref{fig:CLvsMM} plots the root median squared error (RMSE) of the MCL estimator of a given parameter divided by the RMSE of the GMM estimator of the same parameter for the six DGPs.
Thus, numbers smaller than one indicate that the MCL estimator has lower RMSE than the GMM estimator and vice versa for numbers larger than one. We see that for most parameters in most of the DGPs, the MCL estimator outperforms the GMM estimator substantially; indeed, in many cases, the RMSE of the MCL estimator is around $50\%$ that of the GMM estimator. The exception seems to be the trawl parameters, i.e. the parameters controlling the autocorrelation structure, in the case of the Gamma and IG trawls, where the GMM estimator occasionally performs on par with the MCL estimator. However, in most cases, it appears that the MCL estimator is able to provide large improvements over the GMM estimator.
\begin{figure}[!t]
\centering
\includegraphics[scale=0.75]{MATLABfigs/pl_CLvsMM_all_v10.eps}
\caption{\it Root median square error (RMSE) of the MCL estimator \eqref{eq:clmax} divided by the RMSE of the GMM estimator. The underlying IVT process $X_t$ is simulated on the grid $t = \Delta, 2\Delta, \ldots, n\Delta$, with $\Delta = 0.10$, see Table \ref{tab:paramTab} for the values of the parameters used in the simulations. For the Poisson-Exp and NB-Exp models we set $K = 1$ in Equations \eqref{eq:MM} and \eqref{eq:clmax}; for the other models we set $K = 10$.}
\label{fig:CLvsMM}
\end{figure}
%
%
%
%
%
%
%
%
%
%
\section{Application to financial bid-ask spread data}\label{sec:emp}
In this section, we apply the IVT modelling framework to the bid-ask spread of equity prices. The bid-ask spread has been extensively studied in the market microstructure literature, see, e.g., \cite{HS1997} and \cite{BSW2004}. An application similar to the one studied in this section was considered in \cite{BNLSV2014}.
To illustrate the use of the methods proposed in this paper, we study the time series of the bid-ask spread, measured in U.S. dollar cents, of the Agilent Technologies Inc. stock (ticker: A) on a single day, May $4$, $2020$.
We cleaned the data and sampled the data in 5s intervals, leading to $n = 3961$ observations, see Section \ref{sec:SuppEmp} in the Supplementary Material for details.
\begin{figure}[!t]
\centering
\includegraphics[scale=0.75]{MATLABfigs/A_20200504_5s_n720_v01.eps}
\caption{\it Analysis of the A spread level on May 4, 2020. Top: The data (spread level in cents) from $10$:$30$AM to $4$:$00$PM sampled every $5$ seconds. The vertical red line separates the initial in-sample period (left) from the out-of-sample period (right), used in the forecasting exercise in Section \ref{sec:fSpr}. The bottom six rows show the empirical autocorrelation (left; blue bars) and the empirical marginal distribution of the spread level (right; blue bars) together with the fits from the six IVT models (red lines). The parameters of the models have been estimated using the MCL estimator \eqref{eq:clmax} with $K = 10$, see Table \ref{tab:paramEmp}.}
\label{fig:nci1}
\end{figure}
Let $s_t$ be the bid-ask spread level at time $t$, the time series of which is displayed in the top panel of Figure \ref{fig:nci1}. Since the minimum spread level in the data is one tick (one dollar cent), we work on this time series minus one, i.e on $x_t = s_t-1$.
We can now apply our model selection method.
We first inspect the empirical autocorrelation of the data (shown in the right panels of Figure \ref{fig:nci1}) which shows evidence of a very persistent process; we, therefore, set $K$ to a moderately large value to accurately capture the dependence structure of the data. Here, we choose $K=10$ but the results are robust to other choices.
\input{Tables/IC_A_v01.tex}
\input{Tables/tab_A_res_v01.tex}
Using this setting, we calculated the maximized composite likelihood value, CL, and the two information criteria, $CLAIC$ and $CLBIC$, obtained for these data using the six models considered in Section \ref{sec:MC}. The results are shown in Table \ref{tab:nci_ic}. The table shows that the NB-Gamma model is the preferred model on all three criteria, while the second-best model is the NB-IG model.
To further examine the fit of the various models, the bottom six rows of Figure \ref{fig:nci1} plots the empirical autocorrelation (left; blue bars) and the empirical marginal distribution of the spread level (right; blue bars). Each respective row also shows the fit of one of the six models considered in Table \ref{tab:nci_ic}; the parameter estimates corresponding to the models are given in Table \ref{tab:paramEmp}. The fit of the models shown in the bottom six panels of Figure \ref{fig:nci1} and the selection criteria of Table \ref{tab:nci_ic}, indicate that the models based on the Negative Binomial distribution are preferred to the models based on the Poisson distribution. We conclude that, for this data series, the Poisson distribution is unable to accurately describe the marginal distribution of the spread level sampled every $5$ seconds. That the Gamma and IG trawl functions are preferred to the Exponential trawl function indicates that the Exponential autocorrelation function is not flexible enough to capture the correlation structure of the data. By both visual inspection of the autocorrelations in Figure \ref{fig:nci1} and the selection criteria of Table \ref{tab:nci_ic}, we conclude that the NB-Gamma model is the preferred model for these data. As shown in Table \ref{tab:paramEmp}, this model has $\hat H = 1.70$ (s.e. $0.74$), implying that the model possesses a slowly decaying autocorrelation structure, albeit not the long memory property.
\subsection{Forecasting the spread level}\label{sec:fSpr}
This section illustrates the use of IVT models for forecasting, as outlined in Section \ref{sec:forec}. The aim is to forecast the future spread level of the A stock on May $4$, i.e. the data studied above and plotted in the top panel of Figure \ref{fig:nci1}. We set aside the first $n_1 = 3221$ observations as an ``in-sample period'' for initial estimation of the parameters of the models, see the vertical red line in the top panel of Figure \ref{fig:nci1} for the placement of this split. We then forecast the spread level from $5$ seconds until $100$ seconds into the future, using the approach presented in Section \ref{sec:forec}. That is, we forecast $x_{n_1+1}, x_{n_1+2}, \ldots, x_{n_1+20}$ given the current value $x_{n_1}$. After this, we update the in-sample data set with one additional observation so that this sample now contains $n_2 = n_1 +1 = 3222$ observations. Then we again forecast the next $20$ observations, $x_{n_2+1}, x_{n_2+2}, \ldots, x_{n_2+20}$, given $x_{n_2}$. We repeat this procedure until the end of the sample, which yields $n_{oos} = n - n_1 - 20 = 720$ out-of-sample forecasts for each forecast horizon. To ease the computational burden, we only re-estimate the model every $24$ periods (i.e. every $2$ minutes).
To evaluate the forecasts, we consider four different loss metrics. The first two, the mean absolute error (MAE) and the mean squared error (MSE), are often used in econometric forecasting studies of real-valued data \citep[e.g.][]{ET2016}. For a forecast horizon $h = 1, 2, \ldots, 20$, define the mean absolute forecast error,
\[
MAE(h) = \frac{1}{n_{oos}} \sum_{i=n_1+h}^{n-(20-h)} | x_{i} - \hat{x}_{i|i-h}|,
\]
where $\hat{x}_{i|i-h}$ is the $h$-step ahead forecast of $x_i$, constructed using the information available up to observation $i-h$. That is, $\hat{x}_{i|i-h}$ is the point forecast of $x_i$ coming from a particular IVT model, such as the conditional mean, median, or mode. In what follows, we set $\hat x_{i|i-h}$ equal to the estimated conditional mean, i.e. we set $\hat x_{i|i-h} = \sum_{k=0}^{M} \widehat \mathbb{P}(X_{i|i-h} = k) k$, where $M\geq 1$ is a large (cut-off) number and $\widehat \mathbb{P}$ is the estimated predictive density of the IVT model.\footnote{Letting $\hat x_{i|i-h}$ be the conditional mode, instead of the conditional mean, produces results similar to those reported here. These results are reported in Section \ref{sec:add_forec}.} Here, we set $M=60$ but the results are very robust to other choices.
Define also the mean squared forecast error
\[
MSE(h) = \frac{1}{n_{oos}} \sum_{i=n_1+h}^{n-(20-h)} ( x_{i} - \hat{x}_{i|i-h})^2.
\]
We consider two additional loss metrics, designed to directly evaluate the accuracy of the estimated predictive PMF $\widehat \mathbb{P}$, which is arguably more relevant to the problem at hand than MAE and MSE. The first is the logarithmic score \citep[][p. 30]{ET2016},
\[
logS(h) = \frac{1}{n_{oos}} \sum_{i=n_1+h}^{n-(20-h)} -\log \widehat \mathbb{P}(X_{i|i-h} = x_i),
\]
where $x_i$ is the realized outcome. The second is the ranked probability score \citep[RPS;][]{Epstein1969},
\[
RPS(h) = \frac{1}{n_{oos}} \sum_{i=n_1+h}^{n-(20-h)} \sum_{k=0}^M (\widehat F_{i|i-h}(k) - \mathbb{I}_{\{x_i \leq k\}})^2,
\]
where $\widehat F_{i|i-h}(k) = \sum_{j=0}^k \widehat \mathbb{P}(X_{i|i-h} = j)$ is the estimated cumulative distribution function of $X_i|x_{i-h}$ coming from a given model and $\mathbb{I}_{\{x_i \leq k\}}$ is the indicator function of the event $\{x_i \leq k\}$.
Figure \ref{fig:ncif_all} shows the four different forecast loss metrics for the preferred NB-Gamma IVT model as a ratio of the forecasting loss of a given benchmark model in the out-of-sample forecasting exercise described above. The numbers plotted in the figure are $Loss(h)_{NB-Gamma}/Loss(h)_{benchmark}$, where ``$Loss$'' denotes one of the four loss metrics given above and $h = 1, 2, \ldots, 20$ denotes the forecasting horizon. Thus, numbers less than one favour the NB-Gamma model compared to the benchmark model and vice versa for numbers greater than one. Initially, we choose the Poisson-Exponential IVT process as the benchmark model (Figure \ref{fig:ncif_all}, first column); as remarked above, this process is identical to the Poissonian INAR(1) model, which is often used for forecasting count-valued data \citep[e.g.][]{FM2004,MM2005,SPS2009}. It is evident from the figure that losses from the NB-Gamma model are smaller than those from the Poisson-Exponential model for practically all forecast horizons and loss metrics.
In the case of the two most relevant loss functions for evaluating the predictive distribution, the logS and RPS, the reduction in losses are substantial for all forecast horizon, on the order of $20\%$.
\begin{figure}[!t]
\centering
\includegraphics[scale=0.95]{MATLABfigs/A_20200504_5s_ALL2_forecast_v20_mean.eps}
\caption{\it Forecasting the spread level of the A stock on May 4, 2020. Four different loss metrics (row-wise, as indicated above each plot) and twenty forecast horizons, $h = 1, 2, \ldots, 20$. The numbers plotted are relative average losses of the NB-Gamma forecasting model,
compared with the Poisson-Exponential model (first column), the Poisson-Gamma model (second column), and the NB-Exponential model (third column), over $n_{oos} = 720$ out-of-sample forecasts.
A circle above the bars indicates rejection null of equal forecasting performance between the two models, against the alternative that the NB-Gamma model provides superior forecasts, using the Diebold-Mariano \citep{DM1995} test at a $5\%$ level; an asterisk denotes rejection at a $1\%$ level.}
\label{fig:ncif_all}
\end{figure}
To assess whether these loss-differences are also statistically significant, we perform the Diebold-Mariano test of superior predictive ability \citep[][]{DM1995}. The null hypothesis of the statistical test is that the two models have equal predictive power, while the alternative hypothesis is that the NB-Gamma model provides superior forecasts compared to the benchmark model. In Figure \ref{fig:ncif_all}, a circle (asterisk) denotes rejection of the Diebold-Mariano test at a $5\%$ ($1\%$) level. The test rejects the null hypothesis of equal predictive ability for almost all forecast horizons and loss metrics at a $1\%$ level.
To investigate whether the increased forecast performance of the NB-Gamma model comes from having a more flexible marginal distribution than the Poisson-Exponential benchmark model (Negative Binomial vs. Poisson marginals) or from having a more flexible correlation structure (polynomial decay vs. exponential decay) or both, we compare the forecasts from NB-Gamma model to those coming from a Poisson-Gamma model and from a NB-Exp model. These results are given in the second and third columns of Figure \ref{fig:ncif_all}, respectively. From the second column, we see that the NB-Gamma model outperforms the Poisson-Gamma model considerably, especially for the shorter forecast horizons, indicating that it is important to use a model with Negative Binomial marginals when forecasting these data.
From the third column of the figure, we see that for the shorter forecast horizons, the NB-Exp model performs on par with the NB-Gamma model, but for the longer forecast horizons, the NB-Gamma model is superior. Hence, when forecasting, it also appears to be important to specify a model with an accurate autocorrelation structure, especially for longer forecasting horizons.
\section{Conclusion}\label{sec.:concl}
This paper has developed likelihood-based methods for estimation, inference, model selection, and forecasting of IVT processes.
We proved the consistency and asymptotic normality of the MCL estimator and provided the details on how to conduct feasible inference and model selection. We also developed a pairwise approach to approximating the conditional predictive PMF of the IVT process, which can be used for forecasting integer-valued data. All these methods are implemented in a freely available software package written in the MATLAB programming language.
In a simulation exercise, we demonstrated the good properties of the MCL estimator compared to the often-used method of moments-based estimator. Indeed, the reduction in root median squared error of the MCL estimator was in many cases more than $50\%$ compared to the corresponding GMM estimator.
In an empirical application to financial bid-ask spread data, we illustrated the model selection procedure and found that the Negative Binomial-Gamma IVT model provided the best fit for the data. Using the forecast tools developed in the paper, we saw that this model outperformed the simpler Poisson-Exponential IVT model considerably, resulting in a reduction in forecast loss on the order of $20\%$ for most forecast horizons. We demonstrated that most of the superior forecasting performance came from accurate modelling of the marginal distribution of the data; however, we also found that it was beneficial to carefully model the autocorrelation structure, especially for longer forecasting horizons. These findings highlight the strengths of the IVT modelling framework, where the marginal distribution and autocorrelation structure can be modelled independently in a
flexible fashion.
\bibliographystyle{chicago}
|
\section*{Background \& Summary}
The application of Density Functional Theory (DFT) to many-electron systems has witnessed tremendous growth in the past few decades and has now become the {\it de facto} simulation tool for physicists, chemists, and materials scientists.
The central concept of DFT is that the energy, and in turn all of the physical properties of a quantum system, are completely determined by the electronic charge density of the ground state $\rho(\mathbf{r})$ with $\mathbf{r}$ the position vector~\cite{hohenberg_kohn_1964}.
The majority of the computational cost in typical DFT calculations is associated with determining $\rho$ via an iterative algorithm to arrive at a self-consistent charge density~\cite{kohn_sham_1965}.
For the most commonly used exchange-correlation functionals, like the local density approximation (LDA)~\cite{kohn_sham_1965,ceperley_ground_1980} and the semi-local functional by Perdew–Burke-Ernzerhof (PBE)~\cite{pbe}, a converged charge density can be used as the starting point for more expensive calculations such as obtaining a detailed bandstructure~\cite{Martin2004} or calculating the optical response of the material~\cite{gajdos_linear_2006}.
In addition to its central role in standard DFT calculations, the charge density itself is also useful for the analysis of many materials properties.
The critical points of the charge density (i.e. where the gradient is zero) are often used as a boundary between atomic neighborhoods. In turn, this allows for a systematic assignment of charge to specific atoms~\cite{Bader1994Jun,Popelier2001Apr}, as well as the determination of bonding character between neighboring pairs~\cite{Otero-de-la-Roza2014Mar}.
Within the realm of energy materials, the charge density can be used as an effective potential to study the migration properties of Li in solid-state materials, as low charge density provides a metric of ``free'' space in a lattice~\cite{Rong2016Aug,Kahle2018Jun}. Consequently, the local minima of the charge density can act as initial guesses for the positions of inserted cations~\cite{Shen2020Oct}.
A single DFT calculation of the primitive unit cell provides one representation of the charge density within that particular basis set. However, depending on the data application, alternative representations might be desired.
An important example of this is in machine-learning (ML) algorithms where obtaining a consistent data representation is absolutely essential for deep-learning methods.
However, the representation of charge density is heavily influenced by the simulation cell and the Bravais lattice of the periodic structure.
Hence, a necessary step in using electronic charge densities in machine-learning applications is the ability to obtain alternative representations of the same physical density.
While recent work has examined the effectiveness of representations in Fourier space~\cite{Kajita2017Dec}, any ML investigation of local interaction (e.g. adsorption and intercallation of ions) requires flexible representations in real space.
Towards that end, our database will provide code to obtain arbitrary real space representations of charge density for a given material directly from a DFT-computed charge density.
The charge density of any crystalline solid, and indeed any periodic field, is naturally represented in a plane-wave basis set, where the inherent periodicity of the system is embedded in the underlying representation.
For a sufficiently converged finite plane-wave basis, the continuous charge density $\rho({\bf r})$ and its Fourier transform $\phi({\bf k})$ can be accurately sampled by a three-dimensional array indexed by $i$, $j$, and $k$ with $N_1$, $N_2$, and $N_3$ evenly spaced grid-points along each lattice vector, and can be converted from one to the other via a discrete Fourier transform
\begin{align}\label{eq:dft}
\rho(\bm{r})
\equiv
(\bm{a}_1,\bm{a}_2,\bm{a}_3, \rho_{i,j,k})
\xLeftrightarrow[\hspace{1em}\mathcal{F}^{-1}\hspace{1em}]{\mathcal{F}}
(\bm{b}_1,\bm{b}_2,\bm{b}_3, \phi_{i,j,k})
\equiv
\phi(\bm{k})\,.
\end{align}
where the $\bm{a}_\alpha$ and $\bm{b}_\alpha$ represent the real and reciprocal lattice vectors, and $i$, $j$, and $k$ are the indices of regularly-spaced grid points along the lattice vectors.
Due to the discrete nature of numerical Fourier transforms, the number of grid points of a real-space representation is equal to the number of plane waves needed to represent the data in reciprocal space.
A representation of the charge density is uniquely determined by three vectors and a scalar matrix either in real or reciprocal space.
Each representation only provides a ``view'' of the infinite periodic data represented in a specific unit cell and an infinite number of such representations exist for a given charge density.
Regardless of the grid size and the periodic cell representation, the DFT-computed charge density represents the same underlying field, yet they are routinely recomputed when any change is needed in the representation, even when the computational parameters are unchanged, often at considerable expense.
One common example is the use of the electrostatic potential of a super cell to correct for the periodic image effects of a charged defect~\cite{freysoldt2014}.
Due to the significant amount of computational resources devoted to computing the electronic charge densities, as well as the growing domains of their application especially for the training of data-intensive machine learning models, there is a pressing need for a large-scale representation-independent database of charge densities.
The Materials Project (\url{https://materialsproject.org}) - as a rapidly growing (currently more than 170,000 users) materials informatics resource - is a natural platform for the dissemination of such data.
The work presented in this article provides details on how the charge densities in our database are computed and how they can be accessed.
In addition, we provide a high-level API for querying and post-processing of the charge density data.
Among other features, the API will allow users to take an existing atomic structure and query for charge density of the same material, in the representation/view of the user's choosing.
\section*{Methods}
In this section, we provide details on the scope of the charge densities database (CDD) and the precise set of computational parameters used to generate the data.
Additionally, we will demonstrate features of the API that allow users to obtain arbitrary views of the charge density data including up-sampling/compressing the data via Fourier analysis and symmetry operations like translations, rotations, and super-cell transformations.
\subsection*{Calculation parameters}
The charge densities are obtained from DFT calculations run using the static calculation workflow within the atomate software package~\cite{Mathew2017Nov}, and relaxed input structures from the Materials Project (MP) database~\cite{jain2013}.
The projector-augmented wave (PAW) method as implemented in the plane-wave Vienna Ab-initio Simulation Package (VASP) is used in conjunction with the PBE generalized-gradient approximation functional~\cite{pbe}.
The default set of MP calculation input parameters was used, which have been demonstrated to produce well-converged results~\cite{Jain2011Jul}.
Included in these parameters is an energy cutoff of 520~eV, a total energy error threshold of $5~\times~10^{-5}$~eV/atom, and a reciprocal $k$-point density of $100/\mathrm{A}^{-3}$.
The only addition made to the input set is to enable aspherical contributions in the gradient corrections inside the PAW spheres.
Hubbard $U$-corrections are included with materials containing oxygen and fluorine. Elements Co, Cr, Fe, Mn, Mo, Ni, V, and We use values of 3.32, 3.70, 5.30, 3.90, 4.38, 6.20, 3.25, and 6.20~eV, respectively.
\subsection*{Changing the charge density representations}
Given one representation $(\bm{a}_1, \bm{a}_2, \bm{a}_3, \rho_{i,j,k})$ of the charge density $\rho$, we may transform it to any other representation $({\bm a}_1^\prime, {\bm a}_2^\prime, {\bm a}_3^\prime, \rho_{i^\prime,j^\prime,k^\prime})$ by interpolating the data.
Due to computation time and data storage constraints, DFT codes will typically use the fewest grid points possible to represent the charge density which limits the effectiveness of local interpolation schemes.
However, since our charge densities have periodic boundary conditions and are reasonably smooth (owing to the use of pseudo-potentials), the charge density can be represented in Fourier space. we can up-sample our data via Fourier interpolations~\cite{Russell2015Feb} as shown in Figure~\ref{fig:fft_interp}.
The procedure to perform Fourier interpolation of real space data is as follows:
\begin{enumerate}
\item Take the discrete Fourier transform of $\rho_{i,j,k}$.
\item Augment the resulting Fourier data $\phi_{i,j,k}$ with zero-valued higher frequency components.
\item Apply the reverse transformation to obtain the up-sampled data.
\end{enumerate}
The augmented Fourier data is mathematically equivalent to the original Fourier data.
Thus, the inverse transform of the augmented Fourier data must be equivalent to the original real space data sampled at a higher density. Increasing the grid density using Fourier interpolation enables us to up-sample $\rho_{i,j,k}$ in each direction by a factor of $\gamma_{\rm up}$. We may then resample the local grid with a linear interpolation scheme to ensure the fidelity of our data.
Given a primitive-cell representation of the charge density ---
$(\bm{a}_1,\bm{a}_2,\bm{a}_3,\rho_{i,j,k})$,
any periodic representation of a scalar field $f(\bm{r})$ can be understood as applying an arbitrary translation on the unit cell by a vector $\bm{t}$:
\begin{align}
\hat{T}_{\mathbf{t}} f(\bm{r}) \equiv f(\bm{r} - \bm{t}) \, ,
\end{align}
followed by a super-cell transformation $\hat{P}$ defined as an integer matrix with $\det(\hat{P}) \ge 1$ which acts on the lattice vectors from the right
\begin{align}
(\bm{a}^\prime_1 \, \bm{a}^\prime_2 \, \bm{a}^\prime_3)
=
(\bm{a}_1 \, \bm{a}_2 \, \bm{a}_3)\hat{P} \, .
\end{align}
Our software is capable of performing the same operations in arbitrary dimensions. As an example, in Figure~\ref{fig:resampling}, we show the results of re-griding in using a plane of the charge density in a two-atom Si unit cell which only cuts across a single atom at the origin,
Figure~\ref{fig:resampling} (a) shows the result of Fourier interpolating the field from a $12\times12$ grid (large circles) onto a $48\times48$ grid (smaller circles).
In Figure~\ref{fig:resampling} (b), the modified representation is obtained by first shifting the origin to the center of the cell at $\bm{t} = ({\bm a}_1 + {\bm a}_2)/2$ followed by a change of basis to ${\bm a}^\prime_1 = 2{\bm a}_1$ and ${\bm a}^\prime_2 = 2{\bm a}_2 - {\bm a}_1$.
While integer-valued supercell transformations will yield an equivalent periodic charge density, non-integer basis transformations are used to obtain an arbitrary crop of periodic charge density sampled at any density.
As an example, we show how a non-periodic cubic sample of the surface charge density can be obtained from the slab calculation in Figure~\ref{fig:resampling} (c).
The simulation was performed using a $7.73~\mbox{\normalfont\AA{}}\times 3.87~\mbox{\normalfont\AA{}} \times 21.88~\mbox{\normalfont\AA{}}$ orthorhombic Si slab cell and the charge density is stored on a $120 \times 60 \times 336$ grid.
A $5~\mbox{\normalfont\AA{}} \times 5~\mbox{\normalfont\AA{}} \times 5~\mbox{\normalfont\AA{}}$ cropped region of the charge density sampled on a $48\times48\times48$ grid is indicated by the blue iso-surface in Figure~\ref{fig:resampling} (c).
It is important to note that the cropped cell can be greater in any dimension, as compared to the simulation cell. In the example, the smallest dimension of the simulation cell is 3.87~\AA{} while the cropped cube has side lengths of 5~\AA{}. This feature essentially allows us to robustly obtain the charge density in any preferred real-space dimensions, independent of the simulation cell parameters.
essentially allows us to freely choose the simulation cell in situations where periodic-image effects are not present.
\subsection*{Database details}
We use a hybrid data model to serve the data: Queryable data such as chemical formula, total energy, and calculation parameters are served as JSON-like documents using MongoDB, while much larger and not-queryable charge density data is served using AWS S3 object storage~\cite{Leeper2017Jun}.
When a charge density is parsed from the output file to a serialized object, a unique Object ID is assigned and stored alongside the other data in the MongoDB database.
From the user's perspective, two subsequent API requests are needed. One to obtain calculation inputs and outputs from MongoDB, and another for Object ID and charge density data.
A visual representation of the data flow is provided in Figure~\ref{fig:flowchart}.
\subsection*{Code availability}
The software used to access and transform the charge density data is accessible from the Materials Project API (\url{https://github.com/materialsproject/api}) and \texttt{pyRho} (\url{https://github.com/materialsproject/pyRho}) python package repositories on Github. See the \hyperref[sec:usage]{Usage Notes} section for more information.
\section*{Data Records}
Raw charge density data output from DFT calculations can be obtained from the corresponding MP API endpoint:
\url{https://api.materialsproject.org/charge_density}. Each entry can be referenced with a particular DOI through the associated MP material. Additionally, the input parameters for the specific calculation used to generate the entry can be obtained from the tasks endpoint at \url{https://api.materialsproject.org/tasks}. Details for how to interact with the referenced endpoints can be found in the \hyperref[sec:usage]{Usage Notes} section.
\section*{Technical Validation}
We can elucidate the performance of the re-griding algorithm using a larger set of elemental polymorphs from the Materials Project.
For this test set $\mathcal{S}_{\rm el}$, we selected 389 single-element structures from MP for which the energy above the convex hull was less than 100~meV and the number of atoms in the unit-cell was less than 20.
For each structure in $\mathcal{S}_{\rm el}$, we perform VASP static calculations on the primitive unit cell and on a super-cell using
\begin{align}
\hat{P} =
\begin{pmatrix}
1 & 1 & 0 \\
1 & -1 & 0 \\
0 & 0 & 1
\end{pmatrix} \, .
\end{align}
For each charge density obtained using an explicit super-cell calculation, we obtain the average error compared to a super-cell charge density obtained from transforming the charge density.
The results of the comparison are shown in Figure~\ref{fig:avg_err_dist}.
We observe that using an up-sampling factor of 4, results in a periodic grid fine enough such that the pseudo-charge density, which typically ranges from 0 to 100~$e^{-}/\mbox{\normalfont\AA{}}$ near the atomic cores, only exhibits a difference of 0.001~$e^{-}/\mbox{\normalfont\AA{}}$.
\section*{Usage Notes}\label{sec:usage}
To faciliate access to data, convenience functions have been implemented as part of the Materials Project API python client.
These are contained within the \texttt{MPRester} class as part of the \texttt{pymatgen} software package (\url{https://github.com/materialsproject/pymatgen}).
More specifically, two functions are provided to send independent requests to the API endpoints.
These take as input the Materials Project ID associated with a given material in the database.
The calculation input data from the tasks endpoint is then returned as a set of key-value pairs within a python dictionary, and the charge density data is de-serialized and returned as a \texttt{pymatgen} CHGCAR object.
With the \texttt{MPRester} class imported, the following code workflow can be used.
\begin{lstlisting}[language=Python]
# Obtain the CHGCAR object for a given calculation material ID
with MPRester(<API_KEY>) as mpr:
chgcar = mpr.get_chgcar_from_mpid("mp-149")
# To obtain the full list of inputs for the charge density calculation
with MPRester(<API_KEY>) as mpr:
chgcar, calc_inputs = mpr.get_chgcar_from_mpid("mp-149",
inc_inputs = True)
\end{lstlisting}
In order to alter the representation of the charge density obtained from the API endpoint, the \texttt{pyRho} python package (\url{https://github.com/materialsproject/pyRho}) can be used alongside the obtained \texttt{pymatgen} (\url{https://github.com/materialsproject/pymatgen}) \texttt{CHGCAR} object. Examples of how to re-grid, interpolate, and visualize are included in the repository as a set of Jupyter~\cite{Kluyver:2016aa} notebooks.
\section*{Acknowledgements}
This work was supported by the US Department of Energy, Office of Science, Office of Basic Energy Sciences, Materials Sciences and Engineering
Division under contract no. DE-AC02-05-CH11231 (Materials Project program KC23MP).
\section*{Author contributions}
JXS developed the regridding analysis software; JXS and SD developed the back-end API and JMM front-end API; JMM performed the DFT calculations that produced the charge densities; JXS, JMM, MKH, PH, and SD also participated in aggregating, ingesting and maintaining the data at different stages.
KAP was responsible for supervising and advising the project at all stages.
\section*{Competing interests}
The authors declare no competing interests.
\section*{Figures}
\begin{figure}[!htbp]
\centering
\includegraphics[width=0.95\textwidth]{fig_fft_interp.png}
\caption{
Schematic of data transfer for Fourier interpolation and compression.
The more densely sampled (larger) and the coarsely sampled (smaller) 3D blocks of real-space data can each be transformed to Fourier space, resulting in a Fourier representation of the same size.
To up-sample the data, we use the smaller block in Fourier space, augment with zeros while keeping all the data fixed near the origin (at the corners of the cube). To compress, we crop the data in Fourier space and perform an inverse Fourier transform.
}
\label{fig:fft_interp}
\end{figure}
\begin{figure}[!htbp]
\centering
\includegraphics[width=0.90\textwidth]{fig_resampling.png}
\caption{
Periodic re-gridding applied to a plane of the charge density for a two atom Si unit cell where each large circle corresponds to a data point in the original $12\times12$ grid.
The results of Fourier-interpolating the data in the original unit cell onto a $48\times48$ grid is shown in (a). The transformed representation $\hat{\bm a}_1 = {\bm a}_1 + {\bm a}_2$ and $\hat{\bm a}_2 = 2{\bm a}_1 - {\bm a}_2$ with a shift of $0.4 \hat{\bm a}_1 $ and a grid size of $48\times48$ is shown in (b).
}
\label{fig:resampling}
\end{figure}
\begin{figure}[!htbp]
\centering
\includegraphics[width=1.0\textwidth]{fig_flowchart.png}
\caption{
Data pipeline for the charge density database, illustrating how the output files from quantum chemistry calculations are stored and accessed. The data are first converted into a JSON-like format to be stored on a MongoDB server, which allows queries on any of the stored fields.
The charge density data is converted into an array-like object with additional meta-data (e.g. \texttt{ObjectID}) and stored in an AWS S3 bucket.
Since the \texttt{ObjectID} is stored as a field in the MongoDB database, the API is able to combine the MongoDB data with the according S3 object and reconstruct the original data.
}
\label{fig:flowchart}
\end{figure}
\begin{figure}[!htbp]
\centering
\includegraphics[width=0.7\textwidth]{fig_avg_err_dist.pdf}
\caption{
Distributions of the errors between re-sampled charge density and explicitly calculated charge densities.
}
\label{fig:avg_err_dist}
\end{figure}
\newpage
\subsection*{Citing Data}
In line with emerging industry-wide standards for data citation, references to all data sets described or used in this manuscript should be cited in the text with a superscript number and listed in the ‘References’ section in the same manner as a conventional literature reference. See the examples above.
\bibliographystyle{unsrt}
|
\section{Introduction}
Critical string theories compactified to low dimensions provide a useful formal playground for exploring various theoretical phenomena. They enjoy enhanced (nonperturbative) duality groups, uncommon supersymmetry algebras, exhibit relatively explicit but rich mathematical structures in their spacetime physics, and may still possess an interesting family of moduli enabling one to decompactify back to more physically relevant dimensions. Distinguished points in such low dimensional moduli spaces exhibit maximal symmetry groups that can usefully organize or classify (broken) symmetries in higher dimensional models upon decompactification. Alternatively, one can use the enhanced symmetries at special points to construct orbifolds of the original theory; such orbifolds with respect to large symmetry groups can produce exotic models with few moduli. These models may even be completely rigid, sitting at isolated points in moduli space, and are hence distinguished in their own right. It is also interesting and nontrivial to determine the duality webs among these exceptional theories.
It is known that some of the points of maximal symmetry are given by string models whose internal worldsheet theories factorize into holomorphic and anti-holomorphic factors. Such holomorphically factorized theories must be built from consistent (self-dual)\footnote{Throughout this paper we use the same definition of self-dual as the authors of \cite{CDR}: essentially, that an SVOA $V$ is self-dual if $V$ is the only irreducible, admissible $V$-module up to isomorphism.} vertex operator algebras (VOAs) of appropriate central charge. The latter are quite rare for low values of the central charge and have been determined at several key values of interest, including $c=24$ for bosonic VOAs and $c=12$ for super VOAs (SVOAs). In this work, we will focus on compactifications of IIA string theory to two spacetime dimensions built from holomorphically factorized worldsheet theories of the form $V_1 \otimes \bar{V_2}$, where $V_1, V_2$ are self-dual SVOAs with $c=12$. Much of our analysis also carries through for heterotic string theories built from $V_1 \otimes \bar{V_2}$, where $V_1$ is now a self-dual VOA with $c=24$.
One nice feature of these factorized models is that BPS states are closely related to infinite-dimensional Lie (super)algebras called Borcherds-Kac-Moody algebras \cite{BorcherdsMM}. For a variety of instances of BKMs in string theory see, e.g, \cite{HM1, HM2, Neumann, KP, Galakhov, Cheng:2008fc, Cheng:2008kt}. Such algebras can be constructed by applying a certain functor to a self-dual VOA that looks analogous to constructing a ``chiral" string theory: that is, tensor in the vertex algebra corresponding to the even self-dual lattice of signature $(1,1)$ (a chiral analogue of the lightcone directions) to obtain a theory with critical central charge, tensor in the vertex algebra corresponding to ghosts, and compute the BRST cohomology of the resulting complex. The resulting cohomology classes generate a BKM.
BKM algebras were originally defined by Borcherds in the course of his proof of the monstrous moonshine conjectures \cite{borcherds1988generalized,BorcherdsFake,BorcherdsMM}. Harvey and Moore later proposed that BKM algebras should play a role as the underlying organizing structure of BPS states in string compactifications \cite{HM1,HM2}. While a complete understanding of the elusive ``algebra of BPS states'' is still lacking (though see, e.g, \cite{KS} for a mathematical perspective), the fact that BKM algebras are intimately connected with BPS states is indisputable.
Let us explain this connection in some more detail. Consider heterotic string theory compactified to two dimensions with an internal CFT of the form $V^\natural\otimes \bar{V}^{f\natural}$. Here, $V^\natural$ is the monster module, constructed by Frenkel, Lepowsky and Meurman \cite{FLM0,FLM}, and ${V}^{f\natural}$ is Duncan's super-moonshine module for the Conway group \cite{Duncan}. This theory was used in \cite{PPV1,PPV2} to provide a physical interpretation of the genus zero property of monstrous moonshine. A key aspect is that it gives a \emph{spacetime} description of the McKay-Thompson series, which appear in certain BPS indices. In particular, after compactifying the space direction on a circle $S^1$, one can consider the following index
\begin{equation}
\text{Tr}_{\mathcal{H}_{\text{BPS}}}\Big((-1)^F e^{2\pi i TW}e^{2\pi i UM}\Big),
\end{equation}
where $\mathcal{H}_{\text{BPS}}$ is a second-quantized space of BPS string states, $F$ is the fermion number and $(W, M)$ are the winding and momenta along the circle $S^1$. In addition, $(T, U)$ are the associated chemical potentials which involve the spacetime radius $R$ and inverse temperature $\beta$. It was shown in \cite{PPV1} that this index can be written as an infinite product
\begin{equation}
\Big(e^{2\pi i (w_0T+m_0U)}\prod_{m>0\atop w\in \mathbb{Z}}(1-e^{2\pi i mU}e^{2\pi i wT})^{c(mw)}\Big)^{24},
\end{equation}
where $c(n)$ are the Fourier coefficients of the modular invariant $J$-function. This is recognized as the (24th power of) the Borcherds--Weyl--Kac denominator formula of the Monster Lie algebra $\mathfrak{m}$. The roots $\alpha$ of the Monster Lie algebra are labelled by pairs of integers $(m,w)$ and the Fourier coefficients $c(mw)$ encode the root multiplicities $\text{mult}\, \alpha$. This implies that the denominator formula of the Monster Lie algebra can be viewed as a generating function of BPS states in this model. The denominator function turns out to be a special type of automorphic form on $SO(2,2)/(SO(2)\times SO(2))$.
One can further show that the space of BPS states is actually a \emph{module} for the monster Lie algebra $\mathfrak{m}$. This gives $\mathfrak{m}$ a natural interpretation as a BPS algebra \cite{PPV1}. This analysis extends to all CHL orbifolds \cite{CHL} of $V^\natural\otimes \bar{V}^{f\natural}$ in which case the relevant algebras are the $\mathfrak{m}_g$'s constructed by Carnahan in his proof of generalised monstrous moonshine \cite{Carnahan0,Carnahan,Carnahan2}.
The VOA $V^{f\natural}$ was further studied in \cite{Harrison:2018joy}, where a BKM algebra was constructed upon which the Conway group $Co_0$ acts faithfully. This is a candidate for an algebra of BPS states in a certain compactification of type IIA string theory. In a similar spirit, in reference \cite{Harrison:2020wxl}, we constructed a family of BKM algebras associated with $F_{24}$, the holomorphic $c=12$ SCFT based on 24 free fermions. More precisely, we obtained one BKM for every choice of $\mathcal{N}=1$ superconformal structure on $F_{24}$. Additionally, for these BKM algebras one can identify the denominator formulas with certain higher rank automorphic forms. A similar story unfolds if one instead starts with the self-dual SVOA based on the $E_8$ lattice, $V^{fE_8}$\cite{Sch1, Sch2}.
It is the purpose of the present work to provide a spacetime interpretation of the aforementioned BKM (super)algebras, along the lines of \cite{PPV1,PPV2}. The models we consider are now full (non-chiral) string theory, whose spacetime BPS states moreover still enjoy a close relationship with these BKMs, in the sense that 1) they form a module for a BKM (super)algebra and 2) the BKM (super)algebras act as symmetries of amplitudes which contain insertions only of BPS vertex operators. This provides a realization of these BKM algebras as algebras of BPS states in type II string theories, such that their denominator formulas correspond to BPS indices.
\bigskip
\noindent \emph{Summary and outline}
\medskip
Now we come to highlight the key results in the present work. Let us consider 2d type IIA and heterotic string compactifications with holomorphically factorized worldsheet theories of the form $V_1 \otimes \bar V_2$, as introduced above. Let $\mathfrak g$ be the BKM (super)algebra associated to $V_1$ via the standard chiral construction due to Borcherds, briefly reviewed above. In this work, we show the following:
\begin{enumerate}
\item The spacetime BPS states in the 2d compactification associated to $V_1 \otimes \bar V_2$ form a representation of the BKM algebra $\mathfrak g.$ (\S \ref{sec:algebras})
\item $\mathfrak g$ acts as a symmetry on certain genus zero BPS saturated amplitudes in the theory. (\S \ref{sec:algebras})
\item A suitably defined spacetime supersymmetric index in the theory reproduces the (super)denominator formula of $\mathfrak g$. (\S \ref{sec:secondquantized})
\item This index can also be reproduced via a path integral computation on a 2d Euclidean spacetime torus. The path integral precisely reduces to a familiar theta lift in the theory of automorphic forms. (\S \ref{sec:pathintegrals})
\end{enumerate}
The plan of the rest of the paper is as follows. In Section \ref{sec:models}, we describe basic features of the 2d spacetime string theories we are interested in, including worldsheet SCFTs, massless field content, spacetime supersymmetry algebras, and gravitational anomalies. In Section \ref{sec:states}, we explicitly construct the cohomology of physical states in our holomorphically factorized models, leaving some technical details to appendix \ref{app:semirelative}. In Section \ref{sec:algebras}, we focus on the subspace of spacetime BPS states $\mathcal{H}_{BPS}$ and describe the action of the BKM algebra $\mathfrak{g}$ (constructed from the (S)VOAs $V_1$) on $\mathcal{H}_{BPS}$. We further show that $\mathfrak{g}$ is a symmetry of genus zero BPS amplitudes. In Section \ref{sec:secondquantized} we consider a second quantized version of our 2d string theories, where we allow for an arbitrary number of fundamental strings, and study the resulting Hilbert space. We compute a number of natural supersymmetric indices in the second quantized theories from the Hamiltonian point of view, and explain their relation to denominators of the BKM algebras from the previous section. In Section \ref{sec:pathintegrals} we revisit the computation of the indices from the path integral point of view using the formalism of theta lifts from the theory of automorphic forms, and clarify some subtleties that arise in these low dimensional models. Finally, we conclude in section~\ref{sec:discussion} with a discussion of several open questions that emerged during the course of this work.
This paper also contains four appendices. In appendix~\ref{s:Bfield} we give a detailed analysis of gravitational anomalies and the B-field tadpole in our models. In appendix~\ref{app:semirelative} we provide a careful treatment of the semi-relative cohomology of physical states. In appendix \ref{app:0mom} we discuss some details related to the zero momentum R-R spectrum in one of our models, relevant for certain computations carried out in \S \ref{sec:secondquantized}. And finally, in appendix \ref{app:vectorvaluedtheta} we review some standard facts about theta lifts of vector-valued modular forms.
\bigskip
\noindent \emph{Conventions and notation}
\medskip
\noindent We use the two-dimensional metric $\eta^{\mu\nu}={\rm diag}(-,+)$. The gamma matrices $\Gamma^0=\left(\begin{smallmatrix} 0 & 1\\ -1 & 0\end{smallmatrix}\right)$, $\Gamma^1=\left(\begin{smallmatrix} 0 & 1\\ 1 & 0\end{smallmatrix}\right)$ obey the algebra relations $\{\Gamma^\mu,\Gamma^\nu\}=2\eta^{\mu\nu}$ and the chirality matrix is $\Gamma\equiv \Gamma^0\Gamma^1=\left(\begin{smallmatrix} 1 & 0\\ 0 & -1\end{smallmatrix}\right)$. Majorana-Weyl spinors of positive and negative chirality have the form $\left(\begin{smallmatrix} u_+ \\ 0\end{smallmatrix}\right)$ and $\left(\begin{smallmatrix} 0 \\ u_-\end{smallmatrix}\right)$, respectively. The massless Dirac equation is
$$ 0=k_\mu \Gamma^0\Gamma^\mu u=\begin{pmatrix} -k_0+k_1 & 0\\ 0 & k_0+k_1
\end{pmatrix}\begin{pmatrix} u_+\\ u_-\end{pmatrix}=\begin{pmatrix} k^0+k^1 & 0\\ 0 & -k^0+k^1
\end{pmatrix}\begin{pmatrix} u_+\\ u_-\end{pmatrix},
$$ such that a positive chirality fermion exists only with $k^0=-k^1$ and a negative chirality one only for $k^0=k^1$. We say that a theory has $(\mathcal{N}_+,\mathcal{N}_-)$ supersymmetry when there are $\mathcal{N}_+$ supercharges $\mathcal{Q}^i_+$ of positive chirality and $\mathcal{N}_-$ supercharges $\mathcal{Q}^i_-$ of negative chirality. In the absence of central charges, the supersymmetry algebra in two uncompactified dimensions is
\begin{equation}
\{\mathcal{Q}^i_\alpha,\mathcal{Q}^j_\beta\}=2\delta^{ij}(\Gamma^0\Gamma^\mu)_{\alpha\beta}P_\mu=2\delta^{ij}(P^0\delta_{\alpha\beta}+P^1\Gamma_{\alpha\beta});
\end{equation} i.e.
\begin{equation}
\{\mathcal{Q}_+,\mathcal{Q}_+\}=2\delta^{ij}(P^0+P^1)\ ,\qquad \{\mathcal{Q}_-,\mathcal{Q}_-\}=2\delta^{ij}(P^0-P^1)\ ,\qquad \{\mathcal{Q}_+,\mathcal{Q}_-\}=0\ .
\end{equation}
\section{Two--dimensional models}\label{sec:models}
In this section, we discuss the class of models of interest in this paper. These models are string theory compactifications to 1+1 dimensions where the worldsheet CFT takes the holomorphically factorized form $V_1 \otimes \bar V_2.$ We will always take $V_2$ to be one of the three self-dual SVOAs of central charge 12 (see \S \ref{sec:VOAs}). In the case of type IIA compactifications, we will also take $V_1$ to be one of these three theories. For the heterotic models we consider, we will allow $V_1$ to be one of the 71 known self-dual VOAs of central charge 24 \cite{Schellekens:1992db}.
\subsection{The three $c=12$ SVOAs}\label{sec:VOAs}
First we briefly review the three $c=12$ SVOAs we will consider. In \cite{CDR} it was proven that there are exactly three so-called self-dual SVOAs with central charge 12. These theories are:
\begin{enumerate}
\item $V^{fE_8}$: this is the supersymmetric vertex operator algebra based on the $E_8$ lattice. It contains 8 chiral free bosons compactified on the $E_8$ root lattice, and their 8 fermionic superpartners.
\item $V^{f\natural}$: This is the unique self-dual SVOA with $c=12$ and no fields of conformal weight $1/2$ in the NS sector. In \cite{Duncan} it was proved that, up to automorphisms, it admits a unique choice of $\mathcal N=1$ superconformal current which is stabilized by Conway's group $Co_0$. (The $\mathbb{Z}_2$ center of $Co_0$ acts non-trivially only on the Ramond sector).
\item $F_{24}$: This is a theory of 24 free chiral fermions. An $\mathcal N=1$ supercurrent can be defined by taking a linear combination of cubic Fermi terms, and the 8 inequivalent choices are in one-to one correspondence with semisimple Lie algebras of dimension 24. Given a choice of $\mathcal{N}=1$ superconformal structure, the $24$ currents that are supersymmetric descendants of the free fermions generate an affine Kac-Moody algebra, of which there are eight possibilities \cite{Goddard:1984hg}:
\begin{align}(\widehat{su}(2)_2)^{\oplus 8}\ ,\quad (\widehat{su}(3)_3)^{\oplus 3}\ ,\quad \widehat{su}(4)_4\oplus (\widehat{su}(2)_2)^{\oplus 3}\ ,\quad \widehat{su}(5)_5\ ,\quad \widehat{so}(5)_3\oplus \hat g_{2,4}\ ,\notag\\
\widehat{so}(5)_3\oplus \widehat{su}(3)_3\oplus (\widehat{su}(2)_2)^{\oplus 2}\ ,\quad \widehat{so}(7)_5\oplus \widehat{su}(2)_2\ ,\quad \widehat{sp}(6)_4\oplus \widehat{su}(2)_2\ .\notag
\end{align}
We discussed further aspects of this theory in \cite{Harrison:2020wxl}.
\end{enumerate}
Strictly speaking, a self-dual SVOA corresponds to the NS sector of a chiral superconformal field theory, while the Ramond sector is a (canonically) twisted module. We will be slightly imprecise in this respect, and use the word self-dual SVOA as a synonym of chiral superconformal field theory.
In the NS sector of each holomorphic SCFT there is a canonical $\mathbb{Z}_2$ symmetry---the fermion number operator $(-1)^F$---which acts trivially on states of integral $L_0$ eigenvalue and as multiplication by $-1$ on states with half-integral eigenvalue. The Ramond sector can be seen as a twisted module with respect to this symmetry. For all the theories we consider, the definition of the fermion number can be extended to the Ramond sector in such a way that it is a symmetry of the OPE of order $2$. However, there is an ambiguity by an overall sign in this definition. For $F_{24}$ and $V^{fE_8}$, the zero mode of any weight $1/2$ NS field provides an isomorphism between the Ramond eigenspaces of positive and negative fermion number, so the choice of the sign of $(-1)^F$ is immaterial. For $V^{f\natural}$ there is no such weight $1/2$ NS field, and indeed all the $24$ Ramond ground states (i.e. of conformal weight $1/2$) have the same $(-1)^F$ eigenvalue, with can be chosen to be $+1$ or $-1$. This choice will be important when we discuss the GSO projection in superstring compactifications in the next subsections. It is useful to introduce the notation $V^{f\natural}_+$ and $V^{f\natural}_-$ to denote the SVOA $V^{f\natural}$ with the choice of fermion number equal, respectively, to $+1$ and $-1$ on the Ramond ground states. For conformal weight strictly greater than $1/2$, the Ramond subspaces with positive and negative fermion number are again isomorphic, with the isomorphism given by the zero mode of the $\mathcal{N}=1$ supercurrent (see below).
For each of these theories $V \in \{V^{fE_8},V^{f\natural},F_{24}\}$, we can define a set of four torus partition functions, corresponding to the four choices of boundary condition for the fermions,
\begin{eqnarray}\label{eq:partfns}
\phi_{\rm NS}(\tau;V)&:=& \Tr_{\rm NS}(\mathsf{q}^{L_0 - 1/2}) = \frac{\eta^{48}(\tau)}{\eta^{24}(\tau/2)\eta^{24}(2\tau)}-24+\chi^{\rm NS}(V)\\
\phi_{\widetilde{\rm NS}}(\tau;V)&:=& \sTr_{\rm NS}( \mathsf{q}^{L_0 - 1/2}) = {\eta^{24}(\tau/2)\over \eta^{24}(\tau)}+24 -\chi^{\rm NS}(V)\\
\phi_{\rm R}(\tau;V)&:=& \Tr_{\rm R}(\mathsf{q}^{L_0 - 1/2})= 2^{12}{\eta^{24}(2\tau)\over \eta^{24}(\tau)}+ \left (\chi^{\rm R}_+(V)+\chi^{\rm R}_-(V) \right )
\\
\phi_{\tilde{\rm R}}(\tau;V)&:=& \sTr_{\rm R}(\mathsf{q}^{L_0 - 1/2})=\chi^{\rm R}_+(V)-\chi^{\rm R}_-(V)\ ,
\end{eqnarray}
where by $\sTr$ we denote the supertrace; i.e. the trace with the insertion of the fermion number operator $(-1)^F.$
The partition functions $\{\phi_{\rm NS},\phi_{\widetilde{\rm NS}},\phi_{\rm R}\}$ form a 3-component vector-valued representation of $SL(2,\mathbb Z)$, whereas $\phi_{\tilde{\rm R}}$ is a singlet under the action of $SL(2,\mathbb Z)$. We have expressed them explicitly in terms of eta quotients, where we have have used the Dedekind eta function, defined as
\begin{equation}
\eta(\tau):=\mathsf{q}^{1/24}\prod_{n=1}^\infty (1-\mathsf{q}^n),
\end{equation}
and throughout we use the definition $\mathsf{q}:= e^{2\pi i\tau}$.
The first several terms in the $\mathsf{q}$-expansion of each of these functions are
\begin{eqnarray}\label{eq:qexp}
\phi_{\rm NS}(\tau; V)&=& \mathsf{q}^{-1/2} + \chi^{\rm NS}(V) + 276 \mathsf{q}^{1/2} + 2048 \mathsf{q} + 11202 \mathsf{q}^{3/2} + \ldots \\
\phi_{\widetilde{\rm NS}}(\tau; V)&=& \mathsf{q}^{-1/2} -\chi^{\rm NS}(V) + 276 \mathsf{q}^{1/2} - 2048 \mathsf{q} + 11202 \mathsf{q}^{3/2} + \ldots \\
\phi_{\rm R}(\tau; V)&=& \left (\chi^{\rm R}_+(V)+\chi^{\rm R}_-(V) \right )+ 4096 \mathsf{q} + 98304 \mathsf{q}^2 + 1228800 \mathsf{q}^3
+ \ldots\\
\phi_{\tilde{\rm R}}(\tau; V)&=&\left (\chi^{\rm R}_+(V)-\chi^{\rm R}_-(V)\right )\ .
\end{eqnarray}
The constant $\chi^{\rm NS}(V)$ captures the number of spin-$1/2$ fields of $V$ in the NS sector. All of these fields are odd under the fermion number operator. The constants $\chi^{\rm R}_+(V)$ and $\chi^{\rm R}_-(V)$ capture the number of even and odd spin-$1/2$ fields in the Ramond sector, respectively. The values of these constants for each choice of $V \in \{V^{fE_8},V^{f\natural},F_{24}\}$ are listed in the table below.
\begin{center}
\begin{tabular}{c|ccc}
SVOA $V$ & $\chi^{\rm NS}(V)$ & $\chi^{\rm R}_+(V)$ & $\chi^{\rm R}_-(V)$\\ \hline
$V^f_{E_8}$ & 8 & 8 & 8\\
$V^{f\natural}_+$ & 0 & 24 & 0\\
$V^{f\natural}_-$ & 0 & 0 & 24\\
$F_{24}$ & 24 & 0 & 0.
\end{tabular}
\end{center}
Note that each of these theories has a total of 24 spin-$1/2$ fields across both of the NS and R sectors.
In order to construct a physical string model, one also needs a choice of $\mathcal N=1$ supercurrent in these theories. As shown in \cite{Duncan}, $V^{f\natural}$ admits a unique (up to isomorphism) $\mathcal N=1$ supercurrent, which is stabilized by the sporadic group $Co_0$, the group of automorphisms of the Leech lattice. In the theory $V^{fE_8}$, there is a standard choice of supercurrent of the form
$$G(z)\sim \sum_{i=1}^8 :\partial X^i \psi^i:(z),$$
which is left invariant by the group of inner automorphisms $U(1)^8:W(E_8)$, where $W(E_8)$ is the Weyl group of $E_8$. Finally, the theory $F_{24}$ has $8$ inequivalent choices for a supercurrent, all of the form
$$G(z) \sim \sum_{i,j,k}c_{ijk} :\lambda^i\lambda^j\lambda^k:(z),$$
where the coefficients $c_{ijk}$ are the structure constants of a semisimple Lie algebra $g$ of total dimension 24 \cite{Goddard:1984hg}.
As described in \cite{CDR}, the three theories $V^{fE_8},V^{f\natural},F_{24}$ can be related to each other via orbifolding by a cyclic group of symmetries, that preserve the $\mathcal N=1$ superconformal structure. This is described in detail in \S 3 of \cite{Harrison:2020wxl} for orbifolds relating $F_{24}$ and $V^{fE_8}$. When we turn to full string theory models where these SVOAs are components of the worldsheet theory, we expect these relations will be important for understanding string dualities relating these models.
\subsection{Superstring models}
We can build 2-dimensional compactifications of type II string theory by taking worldsheet theories of the form $V_1\otimes \bar V_2$ with $V_1,V_2 \in \{ V^{fE_8},V^{f\natural},F_{24}\}$. For each such model, we list the number of fields of spin $0$ or $1/2$ in the massless spectrum (there are also fields with no propagating local degrees of freedom, namely containing only $G_{\mu\nu}$, $B_{\mu\nu}$, the dilaton $\phi$, and possibly gravitinos and vector fields) and the number of spacetime supersymmetries in table \ref{tbl:IIAtad}.\footnote{Note that $F_{24}\otimes \overline F_{24}$ has massive spacetime fermions, though it has no spacetime supersymmetries.}
\begin{table}
\begin{center}
\begin{tabular}{c|ccccc}
Theory & NS-NS & R-R & NS-R & R-NS & SUSY\\\hline
$V^{fE_8}\otimes \bar V^{fE_8}$ & $8\times 8$ & $8\times 8$ & $8\times 8$ & $8\times 8$ & $(16,16)$ \\
$V^{fE_8}\otimes \bar V^{f\natural}_-$ & $0$ & $8\times 24$ & $8\times 24$ & $0$ & $(8,32)$ \\
$F_{24}\otimes \bar V^{fE_8}$ & $24\times 8$ & $0$ & $24\times 8$ & $0$ & $(8,8)$ \\
$V^{f\natural}_+\otimes \bar V^{f\natural}_-$ & $0$ & $24\times 24$ & $0$ & $0$ & $(0,48)$ \\
$V^{f\natural}_-\otimes \bar V^{f\natural}_-$ & $0$ & $24\times 24$ & $0$ & $0$ & $(24,24)$ \\
$F_{24}\otimes \bar V^{f\natural}_-$ & $0$ & $0$ & $24\times 24$ & $0$ & $(0,24)$ \\
$F_{24}\otimes \bar F_{24}$ & $24\times 24$ & $0$ & $0$ & $0$ & $(0,0)$\\
\end{tabular}\caption{The two-dimensional type IIA models we consider in this paper. We enumerate the number of massless fields from each sector in the first four columns, and identify the spacetime supersymmetry algebra in the fifth column.} \label{tbl:IIAtad}
\end{center}
\end{table}
The theory $V^{fE_8}\otimes \bar V^{fE_8}$ is equivalent to the type IIA string compactified on $T^8=R^8/\Lambda_{E_8}$ at the holomorphically factorized point in moduli space. As both $V^{f\natural}$ and $F_{24}$ can be realized as orbifolds of $V^{fE_8}$, all other theories in the table can be thought of as asymmetric orbifolds of the type IIA string on $T^8$ at the holomorphically factorized point. Some of these models were recently considered in \cite{Florakis:2017zep}.
Similarly, we will also consider 2-dimensional compactifications of heterotic string theory by considering worldsheet theories of the form $V_1\otimes \bar V_2$, with $V_1$ a self-dual bosonic VOA with $c=24$ and $V_2 \in \{ V^{fE_8},V^{f\natural},F_{24}\}$. In table \ref{tbl:hettad}, we list the number of massless fields and spacetime supersymmetries in terms of $ N$, the number of currents in $V_1$.
\begin{table}
\begin{center}
\begin{tabular}{c|ccc}
Theory & NS & R & SUSY\\\hline
$V_1\otimes \bar V^{fE_8}$ & $N\times 8$ & $N\times 8$ & $(8,8)$ \\
$V_1\otimes \bar V^{f\natural}_+$ & $0$ & $N\times 24$ & $(0,24)$\\
$V_1\otimes \bar F_{24}$ & $N\times 24$ & $0$ & $(0,0)$\\
\end{tabular}\caption{The two-dimensional heterotic models we consider in this paper. Here, $N$ is the number of currents in the VOA $V_1$. }\label{tbl:hettad}
\end{center}
\end{table}
When considering type IIA or heterotic string theory compactified to two dimensions, there is the possibility that there is a tadpole for the $B$-field \cite{Lerche:1987sg,Lerche:1987qk,Vafa:1995fj} (see also \cite{Sethi:1996es} and \cite{Sen:1996na}). Such a tadpole can be canceled by adding a certain number of spacetime--filling strings. In appendix \ref{s:Bfield}, we discuss the derivation of the tadpole for the theories we consider.
\section{Physical states in type II on $V_1\otimes \bar V_2$}\label{sec:states}
In this section, we will identify the physical states of type II string theory compactified on $V_1\otimes \bar V_2$, where $V_1$ and $V_2$ are each one of the self-dual $\mathcal{N}=1$ SVOAs with $c=12$, i.e. $V^{f\natural}$, $V_{E_8}$, or $F_{24}$ with a choice of $\mathcal{N}=1$ structure. The final outcome of this section is that, roughly speaking, the space of physical states furnishes a tensor product of the physical states for the `chiral' superstring on $V_1$ times the physical states for the `antichiral' superstring on $V_2$.
A similar factorization holds for the physical states in the heterotic string models on $V_1\otimes \bar V_2$, where $V_1$ is a self-dual bosonic VOA of central charge $c=24$ and $V_2$ a self-dual $\mathcal{N}=1$ SVOA with $c=12$.
\subsection{Chiral compactification}
Let us first recall the main steps in the construction of the physical states for the `chiral' version of superstrings compactified on a self-dual $c=12$ $\mathcal{N}=1$ SVOA $V$. This material is largely standard, and we closely follow the notation and treatment of \cite{Harrison:2020wxl}, to which we refer for further details. One starts from a product vertex algebra $\mathcal{H}^m\otimes \mathcal{H}^{gh}$. The `matter sector' $\mathcal{H}^m$ is itself the product of the internal SVOA $V$ and the super vertex algebra (SVA) of $1+1$-spacetime chiral bosons $X^\mu$ and fermions $\psi^\mu$, $\mu=0,1$. The `ghost' sector $\mathcal{H}^{gh}$ is the product of a $bc$ ghost and a $\beta \gamma$ superghost system \footnote{\label{fn:ghosts}More precisely, we restrict as always to the relevant subalgebra of the $\eta \zeta \phi$-VA, where $\beta = \partial \zeta e^{-\phi}$, $\gamma= \eta e^{\phi}$.}.
The product $\mathcal{H}=\mathcal{H}^m\otimes \mathcal{H}^{gh}$ splits into four sectors $\mathcal{H}_{NS+}$, $\mathcal{H}_{NS-}$, $\mathcal{H}_{R+}$, and $\mathcal{H}_{R-}$, corresponding to the four spin structures on the torus. Here, $$\mathcal{H}_{NS}=\mathcal{H}^m_{NS}\otimes \mathcal{H}_{NS}^{gh}$$ and $$\mathcal{H}_{R}=\mathcal{H}^m_{R}\otimes \mathcal{H}_{R}^{gh}$$ denote the NS and Ramond sector, respectively, and $\mathcal{H}_{NS\pm}$ and $\mathcal{H}_{R\pm}$ are the projections onto states of positive or negative fermion number $(-1)^F$.\footnote{In the Ramond sector of the $\psi^\mu,X^\mu$ theory, the fermion number acts on the ground states $|\pm\rangle$ by $\pm i$ (i.e. $(-1)^F$ coincides with $i\Gamma$, where $\Gamma$ is the chirality matrix in $1+1$ dimensional spacetime), while in the $\beta,\gamma$ theory $(-1)^F$ acts by $e^{\pi i p}$ on the ground state with picture number $p$. Since $p$ is integral in the NS sector and half-integral in the Ramond sector, the fermion number $(-1)^F$ has order $2$ in the full matter+ghost theory.}
Then one defines a GSO projected space of states
\begin{equation} \mathcal{H}_{GSO}:=\mathcal{H}_{NS_+}\oplus \mathcal{H}_{R_+},
\end{equation}
and further restricts to the $\ker b_0\cap \ker L_0$
\begin{equation} C:=\mathcal{H}_{GSO}\cap \ker b_0\cap \ker L_0\ .
\end{equation} The theory contains the conserved currents $j^{gh}=-:\xi\eta:+:bc:$, $j^{p}=\partial\phi+:\xi\eta:$ and $(P^0,P^1)=(i\partial X^0,i\partial X^1)$, whose zero modes eigenvalues correspond, respectively, to the ghost number $n$, the picture number $p$, and the winding-momenta $k:=(k^0,k^1)$. The space $C$ can be decomposed into components $C^{n}_{p}(k)$ with definite $n$, $p$, and $k$, as
\begin{equation} C=\bigoplus_{\{k; n,p\}} C^{n}_{p}(k)\ .
\end{equation} In \cite{Harrison:2018joy, Harrison:2020wxl}, the momenta $k$ were assumed to take values in the even unimodular lattice $\Gamma^{1,1}$; here we leave them unspecified, for the time being.
The nilpotent BRST charge $Q$ commutes with $L_0$, picture number and winding-momenta, and has ghost number $1$, so that for each momentum $k$ and picture number $p$ it defines a complex
\begin{equation} \ldots \rightarrow C^{n-1}_{p}(k)\rightarrow C^{n}_{p}(k)\rightarrow C^{n+1}_{p}(k)\rightarrow \ldots
\end{equation} graded by the ghost number $n$. From this complex, one builds the BRST cohomology $H^{n}_{p}(k)$. Note that the picture number takes integral values in the NS sector and half-integral values in the Ramond sector.
It is also useful to recall the picture-changing homomorphism
\begin{equation} X:H^n_p(k)\to H_{p+1}^{n}(k),
\end{equation} which is an isomorphism for $k\neq 0$. This allows us to focus on the `canonical pictures', which are $p=-1$ for the NS sector and $p=-1/2$ for the R sector. Furthermore, for $k\neq 0$ the chiral cohomology groups $H^{n}_{-1}(k)$ and $H^{n}_{-1/2}(k)$ are trivial unless $n= 1$. Given this, we define the Hilbert space of (chiral) physical states as
\begin{equation} \mathcal H^{phys}:= \bigoplus_k H_{-1}^1(k)\oplus H_{-{1\over 2}}^1(k)=\bigoplus_k H^1(k)\ ,
\end{equation} where
\begin{equation} H^n(k):=H^n_{-1}(k)\oplus H^n_{-1/2}(k)\ .
\end{equation} Note that the same construction could be implemented starting from the GSO projection $\mathcal{H}_{GSO}=\mathcal{H}_{NS_+}\oplus \mathcal{H}_{R_-}$; the corresponding physical states are related by a spacetime parity transformation, which inverts the sign of $X^1, \psi^1$, and $k^1$.
Analogously, starting from anti-holomorphic rather than holomorphic vertex algebras, one can define a space of physical states for an anti-chiral superstring, in terms of the cohomology groups $\bar H^{\bar n}_{\bar p}(k)$ of a complex $\bar C^\bullet_{\bar p}(k)$ with respect to a nilpotent BRST operator $Q_r$.
\subsection{Non-chiral compactification}
We are now ready to construct the non--chiral (left-- and right--moving) compactification of type IIA on $V_1\otimes \bar V_2$, where $V_1$ and $V_2$ are not necessarily the same SVOA. We define the spaces $\mathcal{H}^m, \mathcal{H}^{gh}$ and their right-moving analogues $\bar \mathcal{H}^m, \bar \mathcal{H}^{gh}$ as above. Similarly, we define NS$_\pm$ and R$_\pm$ sectors for both the left-- and the right--moving spaces of states and the corresponding spaces $\mathcal{H}_{NS_\pm}$, $\mathcal{H}_{R_\pm}$, $\bar \mathcal{H}_{NS_\pm}$, $\bar\mathcal{H}_{R_\pm}$. The GSO projected space of states is
\begin{equation} \mathcal{H}_{GSO}:=(\mathcal{H}_{NS_+}\otimes \bar \mathcal{H}_{NS_+})\oplus (\mathcal{H}_{NS_+}\otimes \bar \mathcal{H}_{R_-})\oplus (\mathcal{H}_{R_+}\otimes \bar \mathcal{H}_{NS_+})\oplus (\mathcal{H}_{R_+}\otimes \bar \mathcal{H}_{R_-})\ .
\end{equation}
Note that we are only considering type IIA GSO projection. We could also consider type IIB theories, by projecting the NS-R and R-R sectors on the subspace with positive, rather than negative right-moving fermion number. However, we would not obtain anything new in this way: as stressed in section \ref{sec:models}, there is a choice of sign for the fermion number in the Ramond sector of the internal SVOA $V_2$, and type IIB on $V_1\otimes \bar V_2$ with one choice of sign for $V_2$ is equivalent to type IIA with the opposite choice. In particular, type IIA on $V_1\otimes \bar V^{f\natural}_{\pm}$ is equivalent to type IIB on $V_1\otimes \bar V^{f\natural}_{\mp}$; when $V_2$ is either $V^{fE_8}$ or $F_{24}$, type IIA and type IIB GSO projections give equivalent theories.
We now restrict to the space
\begin{equation} \mathsf{C}:=\mathcal{H}_{GSO}\cap \ker b_0\cap \ker \bar b_0\cap \ker L_0\cap \ker\bar L_0\ ,
\end{equation} which decomposes as
\begin{equation} \mathsf{C}=\bigoplus_{\{k_l,k_r\}} \mathsf{C}(k_l,k_r)=\bigoplus_{\{k_l,k_r; n,\bar n,p,\bar p\}}\mathsf{C}^{n,\bar n}_{p;\bar p}(k_l,k_r)\ ,
\end{equation} where $k_l := (k_l^0,k_l^1)$ and $k_r:= (k_r^0,k_r^1)$ are left-- and right--moving momenta, i.e. the eigenvalues of $(P^0_l,P^1_l)$ and $(P^0_r,P^1_r)$, respectively. Here, $P^\mu_l$ and $P^\mu_r$ are the zero modes of $i\partial X^\mu(z)$ and $i\bar\partial X^\mu(\bar z)$, respectively. We will consider two possibilities for the values of these momenta: in the `uncompactified case', where the target spacetime is $\mathbb{R}^{1,1}$, one has that $k^0_l=k^0_r$ and $k^1_l=k^1_r$ and both take values in $\mathbb{R}$; in the `compactified case', where a spacelike direction of spacetime is compactified on a circle of radius $R$, one has
\begin{equation} k^1_l=\frac{1}{\sqrt{2}}\left (\frac{m}{R}-wR\right)\ ,\qquad k^1_r=\frac{1}{\sqrt{2}}\left(\frac{m}{R}+wR\right)\ ,\qquad m,w\in \mathbb{Z}\ ,
\end{equation} and again $k^0_l=k^0_r\in \mathbb{R}$.
Throughout this section, we will construct physical states in relative cohomology for simplicity, from the space $\mathsf{C}$ above. We will treat the physical states of the complete, non-chiral superstring more properly in semirelative cohomology (i.e. imposing the condition $b_0 - \bar{b}_0=0$ rather than $b_0=\bar{b}_0=0$) in Appendix \ref{app:semirelative}. These two cohomologies are isomorphic at nonzero momentum, and hence in particular are both supported in ghost number $(1, 1)$. The relative and semirelative cohomologies differ, however, at zero momentum. Moreover, zero momentum states in both relative and semirelative cohomologies are supported in various ghost numbers. At ghost number 2, which are the states on which we will construct a BKM algebra action in the next section, the semirelative cohomology only differs from the relative cohomology ($\ker b_0 \cap\ker \bar{b}_0$) by a single state at zero-momentum which is largely unimportant for our subsequent analyses.
Now, if we denote by $C^{n}_{p}(k_l)$ and $\bar{C}^{\bar n}_{ \bar p}(k_r)$ the respective spaces that we would obtain by the chiral and anti-chiral construction described above for $V_1$ and $\bar V_2$ (with the appropriate GSO projections), one has
\begin{equation} \mathsf{C}^{N}_{p,\bar p}(k_l,k_r)=\bigoplus_{n+\bar n=N} C^{n}_{p}(k_l)\otimes \bar{C}^{\bar n}_{ \bar p}(k_r)\ ,
\end{equation} where $N$ is the total (holomorphic plus anti-holomorphic) ghost number. Furthermore, if $Q_l$ and $Q_r$ are the chiral and antichiral BRST charges for the corresponding left-- and right--moving complexes, the operator $Q:=Q_l+Q_r\equiv Q_l\otimes 1+1\otimes Q_r$ is nilpotent (in particular, $\{Q_l,Q_r\}=0$) and has total ghost number $1$, so that it defines a complex
\begin{equation} \ldots \rightarrow \mathsf{C}^{N-1}_{p,\bar p}(k_l,k_r)\rightarrow \mathsf{C}^{N}_{p,\bar p}(k_l,k_r)\rightarrow \mathsf{C}^{N+1}_{p,\bar p}(k_l,k_r)\rightarrow \ldots
\end{equation}
This complex defines a $Q$-cohomology $\mathsf{H}^N_{p,\bar p}(k_l,k_r)$ such that
\begin{equation} \mathsf{H}^N_{p,\bar p}(k_l,k_r)=\bigoplus_{n+\bar n=N} H^n_{p}(k_l)\otimes \bar H^{\bar n}_{\bar p}(k_r)\ ,
\end{equation}
where $H^n_{p}(k_l)$ and $\bar H^{\bar n}_{\bar p}(k_r)$ are the corresponding left-- and right--moving cohomologies of $Q_l$ and $Q_r$, respectively.
Finally, we restrict to the canonical pictures $p,\bar p\in \{-1/2,-1\}$, and total ghost number $N=2$. If $k\neq 0$, then the cohomology group reduces to
\begin{equation} \mathsf{H}^2_{p,\bar p}(k_l,k_r)=H^1_{p}(k_l)\otimes
\bar{H}^1_{\bar p}(k_r)\ ,
\end{equation} because the other components are zero. Again, see Appendix \ref{app:semirelative} for a discussion of (unimportant for our purposes) subtleties at zero-momentum. We define the Hilbert space of physical states as
\begin{align} \mathcal{H}^{phys}&:= \bigoplus_{\{k_l,k_r\}} \mathsf{H}^2(k_l,k_r)\nonumber \\
&=\bigoplus_{\{k_l,k_r\}} (\mathsf{H}^2_{-1,-1}(k_l,k_r)\oplus \mathsf{H}^2_{-1,-{1\over 2}}(k_l,k_r)\oplus \mathsf{H}^2_{-{1\over 2},-1}(k_l,k_r)\oplus \mathsf{H}^2_{-{1\over 2},-{1\over 2}}(k_l,k_r)),\nonumber \\
\end{align} where the four summands correspond, respectively, to the NS-NS, NS-R, R-NS and R-R sectors, and
\begin{equation}
\mathsf{H}^N(k_l,k_r):=\bigoplus_{p,\bar p\in \{-1,-1/2\}}\mathsf{H}^N_{p,\bar p}(k_l,k_r)\ .
\end{equation}
\subsection{Heterotic strings}
Similar results hold for the physical states of heterotic strings compactified on $V_1\otimes \bar V_2$, where $V_1$ is a bosonic self-dual VOA of central charge $24$ and $V_2$ is one of the self-dual SVOA of central charge $12$. The spacetime matter SCFT in $1+1$ dimensions includes only right-moving fermions $\bar\psi^\mu(\bar z)$, in addition to the usual bosonic fields $X^\mu(z,\bar z)$. Similarly, the holomorphic ghost sector includes only the $bc$-system and not the $\beta\gamma$-system; the anti-holomorphic ghost sector is as in type II theories.
The GSO projected space of states is
\begin{equation} \mathcal{H}_{GSO}:=(\mathcal{H}\otimes \bar \mathcal{H}_{NS_+})\oplus (\mathcal{H}\otimes \bar \mathcal{H}_{R_+})\ ,
\end{equation} where $\mathcal{H}$ is the space of states of the holomorphic bosonic matter and ghost CFT. We restrict to the space
\begin{equation} \mathsf{C}:=\mathcal{H}_{GSO}\cap \ker b_0\cap \ker \bar b_0\cap \ker L_0\cap \ker\bar L_0\ ,
\end{equation} which decomposes as
\begin{equation} \mathsf{C}=\bigoplus_{\{k_l,k_r\}} \mathsf{C}(k_l,k_r)=\bigoplus_{\{k_l,k_r; n,\bar n,\bar p\}}\mathsf{C}^{n,\bar n}_{\bar p}(k_l,k_r)\ ,
\end{equation} where now only the anti-holomorphic picture number $\bar p$ is defined. The spaces $\mathsf{C}^{n,\bar n}_{\bar p}(k_l,k_r)$ decompose as
\begin{equation} \mathsf{C}^{N}_{\bar p}(k_l,k_r)=\bigoplus_{n+\bar n=N} C^{n}(k_l)\otimes \bar{C}^{\bar n}_{ \bar p}(k_r)\ ,
\end{equation}
where $\bar{C}^{\bar n}_{ \bar p}(k_r)$ is as in the previous section, and $C^{n}(k_l)$ is the space one would obtain by a chiral bosonic string construction starting from the internal VOA $V_1$, tensoring with the chiral bosonic spacetime matter in $1+1$ dimensions and $bc$-ghost system, and restricting to $\ker b_0\cap\ker L_0$. One can define a nilpotent BRST charge $Q$ of ghost number $1$ that is the sum $Q=Q_l+Q_r$ of BRST charges $Q_l$ and $Q_r$ acting only on the left- and right-moving sectors, respectively. For each $\bar p$ and $(k_l,k_r)$, one has a complex
\begin{equation} \ldots \rightarrow \mathsf{C}^{N-1}_{\bar p}(k_l,k_r)\rightarrow \mathsf{C}^{N}_{\bar p}(k_l,k_r)\rightarrow \mathsf{C}^{N+1}_{\bar p}(k_l,k_r)\rightarrow \ldots
\end{equation} and the corresponding cohomology $\mathsf{H}^N_{\bar p}(k_l,k_r)$ is given by
\begin{equation} \mathsf{H}^N_{\bar p}(k_l,k_r)=\bigoplus_{n+\bar n=N} H^{n}(k_l)\otimes \bar{H}^{\bar n}_{ \bar p}(k_r)\ .
\end{equation} Here, $\bar{H}^{\bar n}_{ \bar p}(k_r)$ is as in the type II case, while $H^{n}(k_l)$ is the cohomology of the complex $C^\bullet(k_l)$ with respect to the nilpotent operator $Q_l$. For $k_l,k_r\neq 0$, the cohomology group $\mathsf{H}^N_{\bar p}(k_l,k_r)$ is non-trivial only at ghost number $N=2$ and factorizes as
\begin{equation} \mathsf{H}^2_{\bar p}(k_l,k_r)= H^{1}(k_l)\otimes \bar{H}^{1}_{ \bar p}(k_r)\ .
\end{equation}
Thanks to the picture changing isomorphism, one can focus on the canonical pictures $\bar p=-1 $ (NS sector) and $\bar p=-1/2$ (Ramond sector). The space of physical states of the heterotic strings is then defined as
\begin{align} \mathcal{H}^{phys}&:= \bigoplus_{\{k_l,k_r\}} \mathsf{H}^2(k_l,k_r)
=\bigoplus_{\{k_l,k_r\}} (\mathsf{H}^2_{-1}(k_l,k_r)\oplus \mathsf{H}^2_{-{1\over 2}}(k_l,k_r)),
\end{align}
where the sum over momenta depends on whether the $1+1$-dimensional spacetime is compactified or not, as in the type II case.
\section{BKM algebras of BRST exact states}\label{sec:algebras}
Now that we have constructed the physical states of our model, we can define the corresponding action of a Borcherds-Kac-Moody (BKM) algebra on a particular subsector of the space of physical states. A BKM algebra is a type of infinite-dimensional Lie algebra introduced by Borcherds \cite{BorcherdsMM} expanding the notion of a Kac-Moody algebra. The construction of a BKM superalgebra on a chiral superstring is well known \cite{Sch1, Sch2}, so at a point in string theory moduli space where the worldsheet theory holomorphically factorizes, one might naively expect two complementary BKMs acting on the left and right. However, a tensor product of two Lie algebras is not a Lie algebra, so a more complicated action of a BKM must arise in the physical superstring if it is to arise at all. Moreover, the chiral superstring construction of a BKM requires all spacetime dimensions to be compactified, and it would be far more interesting if the algebra structure arose in a standard non-chiral string theory where at least the time direction remains uncompactified.
To set the notation we will begin this section with a brief overview of the basic structure theory of BKMs. Then we proceed to discuss BPS states and show that they form a representation of a BKM algebra $\mathfrak{g}$. Finally we demonstrate that $\mathfrak{g}$ is also a symmetry of BPS saturated genus zero amplitudes. We also offer some speculations on the physical interpretation of these results.
\subsection{Basic structure theory of BKM algebras}
Let us review the definition of a Borcherds-Kac-Moody superalgebra. For more details, see \cite{Ray}. Recall that, in general, a \emph{Lie superalgebra} is a $\mathbb{Z}_2$-graded vector space $\mathfrak{g}=\mathfrak{g}_0\oplus \mathfrak{g}_1$ equipped with a Lie bracket satisfying the $\mathbb{Z}_2$-graded version of the usual skew-symmetry properties and Jacobi identity. A BKM Lie superalgebra $\mathfrak{g}$ is characterised
by a Cartan matrix $A$, which is allowed to have infinite rank and
is generically of indefinite signature \cite{borcherds1988generalized, Ray}. Let $I$ be a set (finite or countably infinite) indexing the simple roots of $\mathfrak{g}$ and let $S\subseteq I$ be a subset indexing the odd simple roots. Let $\mathfrak{h}_\mathbb{R}$ be a real vector space with generators $h_i, i\in I$, and equipped with a non-degenerate symmetric real-valued bilinear form $(\cdot |\cdot )$. The bilinear form satisfies the following three properties:
\begin{eqnarray}
& (1)& (h_i|h_j)\leq 0\quad \text{if}\quad i\neq j,\nonumber \\
& (2)& \text{If}\quad (h_i|h_i)> 0\quad \text{then}\quad \frac{2(h_i|h_j)}{(h_i|h_i)}\in \mathbb{Z} \quad \text{for all}\quad j\in I,\nonumber \\
&(3) & \text{If}\quad (h_i|h_i)>0\quad \text{and} \quad i\in S \quad \text{then}\quad \frac{(h_i|h_j)}{h_i|h_i)}\in \mathbb{Z} \quad \text{for all}\quad j\in I.
\end{eqnarray}
Now set $\mathfrak{h}=\mathfrak{h}_{\mathbb{R}}\otimes_{\mathbb{R}} \mathbb{C}$. The Cartan matrix is the symmetric matrix $A$ with entries $A_{ij}=(h_i|h_j)$. The BKM superalgebra associated with the vector space $\mathfrak{h}$ and (generalized) Cartan matrix $A$ is the Lie superalgebra $\mathfrak{g}$ generated by the elements $h_i, e_i, f_i$, $i\in I$, subject to the relations:
\begin{eqnarray}
&& [e_i, f_j]=\delta_{ij}h_i,\quad [h_i,h_j]=0
\nonumber \\
&& [h, e_i]=(h|h_i)e_i, \quad [h, f_i]=-(h|h_i)f_i, \quad \forall h\in \mathfrak{h},
\nonumber \\
&& \text{deg}(e_i)=\text{deg}(f_i)=0 \quad \text{if } i\notin S\qquad \text{and}\qquad \text{deg}(e_i)=\text{deg}(f_i)=1,\quad \text{if } i\in S
\nonumber \\
&& \text{ad}_{e_i}^{1-2A_{ij}/A_{ii}}e_j=0, \quad \text{ad}_{f_i}^{1-2A_{ij}/A_{ii}}f_j=0 \quad \text{if} \quad A_{ii}>0 \quad \text{and} \quad i\neq j,
\nonumber \\
&& \text{ad}_{e_i}^{1-A_{ij}/A_{ii}}e_j=0, \quad \text{ad}_{f_i}^{1-A_{ij}/A_{ii}}f_j=0 \quad \text{if } i\in S, \quad A_{ii}>0 \quad \text{and}\quad i\neq j,
\nonumber \\
&& [e_i, e_j]=[f_i, f_j]=0 \quad \text{if} \quad A_{ij}=0.
\end{eqnarray} Here, $\deg$ denotes the $\mathbb{Z}_2$-grading.
In the special case when $A_{ii}>0$ for all $i\in I$ the resulting algebra $\mathfrak{g}$ is a Kac-Moody Lie superalgebra.
Just like for ordinary Kac-Moody algebras,
the diagonal elements
$h_i$ generate the Cartan subalgebra $\mathfrak{h}$ and the
$e_i$'s and $f_j$'s generate nilpotent subalgebras
$\mathfrak{g}^+$ and $\mathfrak{g}^{-}$, respectively. This implies that $\mathfrak{g}$ has a triangular decomposition
\begin{align}
\mathfrak{g}=\mathfrak{g}^{-}\oplus \mathfrak{h}\oplus \mathfrak{g}^+\, \hspace{1cm} \text{(direct sums of vector spaces)}.
\end{align}
The bilinear form $( \cdot | \cdot )$ on $\mathfrak{h}_{\mathbb{R}}$ induces a bilinear form on the dual space $\mathfrak{h}^*_{\mathbb{R}}$. An important difference compared to standard Kac-Moody
algebras is that the diagonal entries of the Cartan matrix $A$ are not required to
be positive. This implies that the simple roots of $\mathfrak{g}$ come in two classes: \emph{real} simple roots
satisfying
$(\alpha_i|\alpha_i)>0$, and
\emph{imaginary} simple roots satisfying
$(\alpha_i|\alpha_i)\leq 0$.
We denote by $\Delta$ the set of all roots. We say that a root is
positive (resp.\ negative) if it is a non-negative (resp.\ non-positive) integer
linear combination
of the simple roots. We therefore have a natural splitting into positive and negative roots
\begin{equation}
\Delta=\Delta^+\oplus \Delta^-.
\end{equation} Accordingly, the nilpotent subalgebras $\mathfrak{g}^-$ and $\mathfrak{g}^+$ can be written as direct sums
\begin{equation} \mathfrak{g}^\pm=\bigoplus_{\alpha\in\Delta^\pm}\mathfrak{g}_\alpha\ ,
\end{equation} where the root spaces $\mathfrak{g}_\alpha$ are finite dimensional ${\rm mult}(\alpha):=\dim(\mathfrak{g}_\alpha)<\infty$. The bilinear form $(\cdot |\cdot)$ on $\mathfrak{h}$ extends uniquely to a (super-)symmetric, non-degenerate, invariant bilinear form on $\mathfrak{g}$, such that $\mathfrak{g}_\alpha$ and $\mathfrak{g}_\beta$ are orthogonal unless $\beta=-\alpha$.
The integral span of all simple roots is the \emph{root lattice}
\begin{equation}
\Phi=\sum_{i=1}^{\rank\mathfrak{g}}\mathbb{Z}\alpha_i
\subset \mathfrak{h}^{*}.
\end{equation}
The Weyl group $\mathcal{W}(\mathfrak{g})$ is the group of reflections in
$\Phi\otimes \mathbb{C}$ with respect to the even real simple roots $\alpha_i$, $i\in I\setminus S$.
It is generated by the fundamental reflections
\begin{equation}
s_i\ : \alpha\ \longmapsto \ \alpha
-2\frac{(\alpha|\alpha_i)}{(\alpha_i|\alpha_i)} \alpha_i.
\end{equation}
An additional important property of a BKM algebra is the existence of a Weyl
vector $\rho$, satisfying
\begin{align}
(\rho|\alpha)\geq \frac{1}{2}(\alpha|\alpha)\ , \label{DefEquWeyl}
\end{align}
with equality if and only if $\alpha$ is a simple root.
Let us focus on the case where $S=\emptyset$, so that $\mathfrak{g}$ is a (purely even) BKM Lie algebra, rather than a Lie superalgebra. For any (integrable)
lowest weight
representation $R(\lambda)$ of $\mathfrak{g}$ one has the
Weyl-Kac-Borcherds
character formula
\begin{equation}
\text{ch}\, R(\lambda)=\frac{\sum_{w\in\mathcal{W}} \epsilon(w)w(T)e^{\rho}}
{\prod_{\alpha\in \Delta^+} (1-e^{\alpha})^{\text{mult}(\alpha)}}\ ,
\end{equation}
where $\epsilon(w)=(-1)^{\ell(w)}$ with $\ell(w)$ the length of the Weyl
element $w$. This differs from the
standard Weyl-Kac character formula by the factor $w(T)$ which contains a
correction
due to the imaginary simple roots
\begin{equation}
T=e^{\lambda-\rho}\sum_{\mu} \xi(\mu)e^{\mu}
\ .
\end{equation}
The sum is taken over all (unordered) sets of distinct mutually orthogonal imaginary simple roots, whose sum is denoted by $\mu$. Here $\xi(\mu)=(-1)^{m}$ if $\mu$ is a sum of $m$ distinct pairwise
orthogonal
imaginary simple roots which are orthogonal to $\lambda$, and $\xi(\mu)=0$
otherwise.
For our purposes we are mainly interested in the simplest case of the trivial
representation $\lambda=0$,
for which $\text{ch}\, R(\lambda)=1$, and the character formula reduces to the
so called
\emph{denominator formula}
\begin{equation}
\sum_{w\in \mathcal{W}} \epsilon(w)w(T)=
e^{-\rho}\prod_{\alpha\in \Delta^+}\left(1-e^{\alpha}\right)^{\text{mult}(\alpha)}\ .
\label{denominatorformula}
\end{equation}
This formula relates a sum over the Weyl group $\mathcal{W}$ to an
infinite product over all positive roots of $\mathfrak{g}$.
Let us generalize the the (super-)denominator formula to the case where $\mathfrak{g}$ is a BKM superalgebra. To this end we need a little bit of additional structure. Again, we refer to \cite{Ray} for details. Denote the set of roots of $\mathfrak{g}$ by $ \Delta$. This splits into even or odd roots ${\Delta}_{0}, {\Delta}_{1}$, respectively. Define the corresponding even and odd root multiplicities as follows
\begin{equation}
m_0(\alpha)=\dim (\mathfrak{g}_\alpha\cap \mathfrak{g}_0), \qquad m_1(\alpha)=\dim (\mathfrak{g}_\alpha \cap \mathfrak{g}_1)=\text{mult}(\alpha)-m_0(\alpha).
\end{equation}
Any root $\alpha\in \Delta$ can be expanded as $\alpha=\sum_{i\in I} k_i\alpha_i$. Define the \emph{height} $\text{ht}(\alpha)$ and \emph{even height} $\text{ht}_0(\alpha)$ of $\alpha$ as follows
\begin{equation}
\text{ht}(\alpha)=\sum_{i\in I} k_i, \qquad \qquad ht_0(\alpha)=\sum_{i\in I \backslash S} k_i.
\end{equation}
Now introduce the following expressions where the sums are taken over all sums $\mu$ of distinct pairwise orthogonal imaginary simple roots:
\begin{equation}
T=e^{-{\rho}}\sum_{\mu}(-1)^{\text{ht}(\mu)} e^{\mu}, \qquad \qquad T'=e^{-{\rho}}\sum_{\mu}(-1)^{\text{ht}_0(\mu)} e^{\mu},
\end{equation}
where $\rho$ is the Weyl vector.
For any BKM superalgebra $\mathfrak{g}$ we have the {\it denominator formula} and {\it super-denominator formula}:
\begin{eqnarray}
\sum_{w\in W}\epsilon(w)w(T)&=&\frac{e^{-{\rho}}\, \prod_{\alpha\in {\Delta}_0^+}(1-e^{\alpha})^{m_0(\alpha)}}{\prod_{\alpha\in {\Delta}_1^+}(1+e^{\alpha})^{m_1(\alpha)}},
\nonumber \\
\sum_{w\in W}\epsilon(w)w (T')&=&\frac{e^{-{\rho}}\, \prod_{\alpha\in {\Delta}_0^+}(1-e^{\alpha})^{m_0(\alpha)}}{\prod_{\alpha\in {\Delta}_1^+}(1-e^{\alpha})^{m_1(\alpha)}}.
\end{eqnarray}
\subsection{BPS states in superstring models}
\label{sec:BPSstates}
In \cite{PPV1, PPV2}, several of the authors conjectured the appearance of a BKM algebra in a string theory whose worldsheet matter CFT, prior to compactification on a spatial circle, was holomorphically factorized. In this section, we will expand upon and generalize the BKM action studied in \cite{PPV1, PPV2}.
The basic idea of \cite{PPV1, PPV2} was as follows. We began with a heterotic string theory whose internal worldsheet CFT was given by the $c=24$ holomorphic Monster VOA, $V^{\natural}$, tensored with the antiholomorphic $c=12$ SVOA $V^{f\natural}$ (for the NS sector), or its ``canonically twisted module" (for the R sector). Completing the standard string theory voodoo (adding ghost sectors, GSO projecting, etc) resulted in a (1+1)-d theory with $\mathcal{N}=(0, 24)$ supersymmetry. In 2d string theory, the GSO projection relates the internal fermion number of the worldsheet CFT to fermion chirality in spacetime. Compactifying the remaining spatial direction on a circle $S^1$ of radius $R$ enables one to write the supersymmetry algebra as
\begin{equation}
\left\lbrace \mathcal{Q}^i, \mathcal{Q}^j \right\rbrace = 2\delta^{ij}(P^0_r - P^1_r), \ \ i,j=1,\ldots, 24,
\end{equation} expressed in terms of the temporal and spatial components of the \textit{right-moving} momenta around the circle. BPS states in this model are annihilated by all supercharges and hence satisfy $k^0_r = k^1_r$, having equal eigenvalues of the $P^0_r, P^1_r$ operators. BPS states furnish a subspace of physical states in the (0+1)-d string theory, and the latter arise as usual from BRST cohomology classes with respect to a nilpotent operator $Q = Q_l + Q_r$, which can be expressed as a sum of left and right-moving pieces. When the right-moving momentum is nonzero, the space of physical states factorizes into a product of left and right-moving cohomology classes, graded by momenta, picture number, and ghost number. To the left-moving factor we can associate a BKM algebra following precisely the chiral construction; on the subspace of BPS states, the right-moving factor degenerates into 24 copies of the trivial representation of this algebra, contributing only a (24-fold) multiplicity to each BPS state. In other words, although we cannot tensor two algebras to obtain an algebra, a single copy of the BKM structure is preserved upon tensoring with (copies of) the trivial representation. It turns out that in this non-chiral string theory, for each choice of BRST-representative satisfying the BPS condition $k^0_r = k^1_r$, there is a corresponding nonzero BRST-exact state obtained from it by acting with a single supercharge $\mathcal{Q}^i$. The BRST-exact state is the $Q_r$-image of a $Q_l$-closed state. One can then obtain a correspondence between generators of a BKM algebra (in this case, the Monster Lie algebra) and the quotient space coming from the space of $Q_r$-exact $Q_l$-closed BPS states by the space of $Q_l$-exact states.
In the remainder of this section, we will expand and improve upon this algebra construction, generalize to the type II case, and clarify various subtleties and issues along the way.
Let us consider either a heterotic or type II superstring theory model compactified on $(V_1\otimes \bar V_2)\otimes S^1$, where $V_2$ is a self-dual SVOA of central charge $12$ and $V_1$ is either a self-dual VOA of central charge $24$ (in the heterotic case) or a self-dual SVOA of central charge $12$ (in the type II case). Following the analysis of the previous section, the space of physical states has the form
\begin{equation} \mathcal{H}^{phys}:=(\bigoplus_{\substack{k_l,k_r\neq 0\\ k^0_l=k^0_r}} H^1(k_l)\otimes \bar H^1(k_r))\oplus \mathsf{H}^{2}(0,0)\ ,
\end{equation} where $H^1(k)$ and $\bar H^1(k)$ are the cohomology space for the chiral and anti-chiral models with respect to the left-and right-moving BRST charges $Q_l$ and $Q_r$. We have separated the nonzero momentum states from the zero-momentum states, which do not necessarily factorize (see Appendix \ref{app:semirelative}). In the fermionic case, $H^1$ is a direct sum of $-1$ (NS) and $-1/2$ (R) picture components.
We want to focus on the subspace
\begin{equation} \mathcal{H}_{BPS}:=\left(\bigoplus_{\substack{k_l,k_r\neq 0\\ k^0_l=k^0_r=k^1_r}} H^1(k_l)\otimes \bar H^1(k_r)\right )\oplus \mathsf{H}^{2}(0,0)'\ ,
\end{equation}
of physical states satisfying \begin{equation}\label{BPScond} k^0_r=k^1_r\ .\end{equation} The zero momentum sector $\mathsf{H}^{2}(0,0)'$ is obtained from $\mathsf{H}^{2}(0,0)$ by taking a certain quotient of a suitable subspace; we will give the precise definition in subsection \ref{s:zeromom}. If the model has spacetime supersymmetry, corresponding to gravitinos of positive chirality in the NS-R sector of the theory, then $\mathcal{H}_{BPS}$ is the subspace of states annihilated by those supersymmetries, hence BPS states. We use the same notation $\mathcal{H}_{BPS}$ even when there are no spacetime supersymmetries. The possible momenta for states in $\mathcal{H}_{BPS}$ are labeled by two integers $m,w\in \mathbb{Z}$ as follows
\begin{equation} k^0_l=k^0_r=k^1_r=\frac{1}{\sqrt{2}}(\frac{m}{R}+wR)\ ,\qquad k^1_l=\frac{1}{\sqrt{2}}(\frac{m}{R}-wR)\ ,
\end{equation} where $R$ is the radius of the circle.
Recall that with the self-dual VOA or SVOA $V_1$ is canonically associated, via the `chiral (super)string construction', a BKM algebra (if $V_1$ is bosonic) \cite{BorcherdsMM} or superalgebra (if $V_1$ is an SVOA) $\mathfrak{g}$ \cite{Sch1, Sch2}.
In the remainder of this section we will prove the following:
\begin{enumerate}
\item There is a representation $\delta$
\begin{align}\delta: \ &\mathfrak{g}\to \text{End}(\mathcal{H}_{BPS})\\
&x\mapsto \delta_x\end{align}
of the BKM (super)algebra $\mathfrak{g}$ associated with $V_1$ on the space $\mathcal{H}_{BPS}$ of physical BPS states. The elements $x \in \mathfrak{g}$ are identified with certain $Q_l$-closed states $v_x$ of ghost number $(1,0)$ in the superstring theory satisfying the `BPS' condition $k^0_r=k^1_r$, or equivalently with their BRST variation $Qv_x$, which only has components with ghost numbers $(1,1)$. For the heterotic string, the BRST variations $Qv_x$ are exact `BPS' states in the NS sector; in the type II case, the even and odd components $\mathfrak{g}_0$ and $\mathfrak{g}_1$ correspond to exact `BPS' states in the NS-NS and R-NS sector, respectively. Here `BPS' is in quotes because these states satisfy the condition $k^0_r = k^1_r$, but they are not physical states since they are cohomologically trivial. Note that the algebra action does not mix the right-moving NS sector with the right-moving R sector of $\mathcal{H}_{BPS}$, so that the representation $\mathcal{H}_{BPS}$ is, in general, the sum of two representations corresponding to these sectors. This is proven in section~\ref{sec:BPSrep} below. \\
\item The action of $\mathfrak{g}$ on $\mathcal{H}_{BPS}$ is a symmetry of tree-level string theory amplitudes involving only states in $\mathcal{H}_{BPS}$ (\emph{purely BPS amplitudes}). Explicitly, for each $x \in \mathfrak{g}$ and every $\varrho_1,\ldots, \varrho_n \in \mathcal{H}_{BPS}$, we have
\begin{equation}\label{BKMsymm} \delta_x\Bigl(\int_{\mathcal{M}_{0,n}} \langle \prod_{i=1}^n \mathcal{V}_{\varrho_i}\rangle \Bigr)\equiv \sum_{j=1}^n \int_{\mathcal{M}_{0,n}} \langle \mathcal{V}_{\delta_x(\varrho_j)}\prod_{i\neq j} \mathcal{V}_{\varrho_i}\rangle=0\ ,
\end{equation} where $\int_{\mathcal{M}_{0,n}}$ denotes the integration over the appropriate (super)moduli space of genus $0$ with $n$ punctures. Here, $\mathcal{V}_\varrho$ is the vertex operator corresponding to a state $\varrho\in \mathcal{H}_{BPS}$. Roughly speaking, this result will be obtained as follows. One considers an $n+1$-point amplitude where the additional vertex operator corresponds to the insertion of the BRST exact state $Qv_x$ associated to $x\in \mathfrak{g}$. By standard arguments, since this amplitude includes one BRST-exact and $n$ BRST-closed states, it is expected to vanish. One then integrates over the modulus parametrizing the position of the exact state.\footnote{When $x$ is an odd element of a superalgebra, so that $v_x$ is in the R-NS sector, this statement needs to be refined; see section \ref{s:symmBPS}.} The amplitude is a total derivative with respect to this modulus, so it gets contributions only from the boundary of the moduli space, i.e. from the limit where the insertion of the exact vertex operator coincides with one of the other $n$ punctures. One then just needs to prove that the sum over the boundary contributions has the form \eqref{BKMsymm}. \end{enumerate}
Claim 1 above is proven in section~\ref{sec:BPSrep} and claim 2 is proven in section~\ref{s:symmBPS}.
We further conjecture that $\mathfrak{g}$ is a symmetry of BPS amplitudes at all loops, by analogous reasoning to that outlined above. On the other hand, we do not expect the action of $\mathfrak{g}$ to extend to the whole space of physical states $\mathcal{H}^{phys}$.\footnote{Of course, the zero-momentum subalgebra of $\mathfrak{g}$, which corresponds to the standard symmetries related to conservation of spacetime momentum and winding number, will act on all of $\mathcal{H}^{phys}$.}
Similarly, the super-algebra $\bar \mathfrak{g}$ associated with the anti-holomorphic SVOA $\bar V_2$ acts on the space $\bar\mathcal{H}_{BPS}$ of states satisfying $k_l^0=k^1_l$, and is a symmetry of the amplitudes built only from the states in such space. Note that the space $\bar\mathcal{H}_{BPS}$ is different from $\mathcal{H}_{BPS}$, so that there is apparently no space of states where both $\mathfrak{g}$ and $\bar \mathfrak{g}$ act.
\subsection{The BPS subspace as a representation of the BKM algebra}
\label{sec:BPSrep}
In this section we define the action of $\mathfrak{g}$ on $\mathcal{H}_{BPS}$. We begin by focusing on the states of nonzero momentum, which factorize into chiral and anti-chiral components.
The algebra $\mathfrak{g}$ associated with $V_1$ is the direct sum of finite-dimensional components graded by `momentum' $k$ taking values in the even unimodular lattice $\Gamma^{1,1}\cong \mathbb{Z}\oplus \mathbb{Z}$:
\begin{equation} \mathfrak{g}=\bigoplus_{k\in \Gamma^{1,1}} \mathfrak{g}(k)=\bigoplus_{m,w\in \mathbb{Z}}\mathfrak{g}(m,w)\ ,
\end{equation} where the components $\mathfrak{g}(k)$ are isomorphic, as vector spaces, to the BRST cohomology with respect to the left-moving BRST charge $Q_l$ at momentum $k$,
\begin{equation} \mathfrak{g}(k)\cong H^1(k)\ ,\qquad\qquad k\in \Gamma^{1,1}\ .
\end{equation}
There is an analogous BKM superalgebra $\bar\mathfrak{g}$ associated with the SVOA $V_2$, which admits a similar decomposition
\begin{equation} \bar\mathfrak{g}=\bigoplus_{k\in \Gamma^{1,1}} \bar\mathfrak{g}(k)=\bigoplus_{m,w\in \mathbb{Z}}\bar\mathfrak{g}(m,w)\ ,
\end{equation} with
\begin{equation} \bar\mathfrak{g}(k)\cong\bar H^1(k) \ ,\qquad\qquad k\in \Gamma^{1,1}\ .
\end{equation}
We work in the relative, rather than semi-relative, cohomology, so that the BPS states in $\mathcal{H}_{BPS}$ admit representatives that are holomorphically factorized
\begin{equation} \varrho\otimes \bar \varsigma
\end{equation} as tensor products of representatives $\varrho$ and $\bar \varsigma$ for classes in $H^1(k_l)\cong \mathfrak{g}(k_l)$ and $\bar H^1(k_r)$ respectively (here, the isomorphisms are to be understood as isomorphisms of vector spaces; we do not claim that an algebra structure is preserved on the tensor product). The BPS condition $k^0_r=k^1_r$, together with the quantization of momentum $k^1$ along the circle $S^1$ of radius $R$ and the conditions $k^0_l=k^0_r$ (from the uncompactified time direction), imply that
\begin{equation} k^0_l=k^0_r=k^1_r=\frac{1}{\sqrt{2}}(\frac{m}{R}+wR)\ ,\qquad k^1_l=\frac{1}{\sqrt{2}}(\frac{m}{R}-wR)\ ,\qquad m,w\in\mathbb{Z}
\end{equation} where $m$ and $w$ are the quantized momentum and winding number along $S^1$, respectively.
This means that the left-moving momentum takes values in a lattice isomorphic to $\Gamma^{1,1}\cong \mathbb{Z}\oplus \mathbb{Z}$. The right-moving momentum takes values in a null subspace of $\mathbb{R}^{1,1}$, and depends on $m,w\in \mathbb{Z}$ as
\begin{equation} k^0_r=k^1_r=\frac{1}{\sqrt{2}}(\frac{m}{R}+wR)\ .
\end{equation} Let us focus on the space $\bar H^1(k_r)$. Suppose that $\{\bar v^a\}_{a=1\ldots,\chi^{\rm NS}}$ and $\{\bar u^{i+}\}_{i=1,\ldots,\chi^{\rm R}_+}$ are bases for the spaces $\bar V_2^{NS}(1/2)$ and $\bar V_2^{R+}(1/2)$ of states of conformal weight $1/2$ in, respectively, the NS and positive fermion number Ramond sector of the anti-holomorphic SCFT $\bar V_2$. For $k^0_r=k^1_r\neq 0$, the space of $Q_r$-closed states with ghost number $1$, picture number $-1$ and weight $0$ in the anti-holomorphic matter+ghost CFT is spanned by:
\begin{equation}\label{states} \bar v ^a_{-1/2}e^{-\tilde \phi}\bar c_1e^{ik_r X_r}|0\rangle\ ,\qquad (\bar\psi^0_{-1/2}-\bar\psi^1_{-1/2})e^{-\tilde \phi}\bar c_1e^{ik_r X_r}|0\rangle\ ,
\end{equation} and the latter state is the only $Q_r$-exact state. It is proportional to $Q_r \bar\beta_{-1/2}e^{-\bar \phi}\bar c_1e^{ik_r X_r}|0\rangle$. In the $-1/2$ picture, the space of $Q_r$-closed states with $k^0_r=k^1_r\neq 0$ is spanned by
\begin{equation}\label{statesR} \bar u ^{i+}_{-1/2}e^{-\tilde \phi/2}\bar c_1e^{ik_r X_r}|0,-\rangle\ ,& i=1,\ldots,\chi^{{\rm R}}_+(V_2)\ ,
\end{equation} where $|0,-\rangle$ is a Ramond ground state of the $(\bar \psi^\mu,\bar\partial X^\mu)$ SVOA with negative chirality.
This shows that all cohomology spaces $\bar H^1(k_r)$, with $k^0_r=k^1_r \neq 0$, have dimension $\chi^{\rm NS}(V_2)+\chi^{\rm R+}(V_2)$ and are all isomorphic to each other.
In fact, there is a distinguished isomorphism among them. One considers the vertex operator $e^{i(k'_r-k_r)X_r}$, which has conformal weight $0$ and non-singular OPE with all the states \eqref{states} and \eqref{statesR}. It is easy to see that the zero mode $(e^{i(k'_r-k_r)X_r})_0$ induces a well defined map \begin{equation}\label{expmap} (e^{i(k'_r-k_r)X_r})_0:\bar H^1(k_r)\rightarrow \bar H^1(k'_r)\ ,\end{equation} which is an isomorphism for $k_r,k'_r\neq 0$.
With these preparations, one can then define the action of an element $x\in \mathfrak{g}(m,w)$ on a physical state $\varrho\otimes \bar \varsigma\in \mathcal{H}_{BPS}$ by
\begin{equation} \delta_x(\varrho\otimes \bar \varsigma):=[x,\varrho]\otimes (e^{\frac{i}{\sqrt{2}}(\frac{m}{R}+wR)X_r})_0\bar \varsigma\ .
\end{equation} Here, we use the fact that the left-moving factor $\varrho\in H^1(k_l)\cong \mathfrak{g}(k_l)$ can be seen as an element of the algebra $\mathfrak{g}$ itself. The shift in the right-moving momentum is necessary to preserve the condition $k^0_l=k^0_r=k^1_r$.
If we have two elements $x\in \mathfrak{g}(m,w)$, $x'\in \mathfrak{g}(m',w')$, one has
\begin{align}
(\delta_x\delta_{x'}-\delta_{x'}\delta_{x})(\varrho\otimes \bar \varsigma)&=([x,[x',\varrho]]-[x',[x,\varrho]])\otimes (e^{\frac{i}{\sqrt{2}}(\frac{m+m'}{R}+(w+w')R)X_r})_0\bar \varsigma \\&=[[x,x'],\varrho]\otimes (e^{\frac{i}{\sqrt{2}}(\frac{m+m'}{R}+(w+w')R)X_r})_0\bar \varsigma =\delta_{[x,x']}(\varrho\otimes \bar \varsigma)
\end{align} where in the second line we used the Jacobi identity. This shows that $\delta$ is indeed a representation of $\mathfrak{g}$ -- in fact, it is the tensor product of the adjoint representation of $\mathfrak{g}$ times a trivial (in general, not irreducible) representation of dimension $\chi^{NS}(V_2)+\chi^R_+(V_2)$. This proves the first claim in section~\ref{sec:BPSstates}.
\subsection{Subtleties with zero momentum}\label{s:zeromom}
The procedure described in the previous subsection is problematic when either $\varrho\otimes \bar \varsigma\in \mathcal{H}_{BPS}$ or $\delta_x(\varrho\otimes \bar \varsigma)$ has zero right-moving momentum.\footnote{As explained below, we are going to exclude the ghost-dilaton from the space $\mathcal{H}_{BPS}$. This allows us to represent the states in $\mathcal{H}_{BPS}$ as elements in the tensor product $H^1(k_l)\otimes \bar H^1(k_r)$ even at zero momentum $k_l=k_r=0$. See appendix \ref{app:semirelative} for details.} The problem is that the operator $(e^{i(k'_r-k_r)X_r})_0$ from states of momentum $k_r$ to states of momentum $k'_r$ does not map, in general, $Q_r$-closed states to $Q_r$-closed states and $Q_r$-exact states to $Q_r$-exact states.
Indeed, the vertex operator $e^{ip_rX_r}(\bar z)$, with $p^1_r=p^0_r$, does not commute with $Q$
\begin{equation} [Q,e^{ip_r X_r}]=p_{r\mu}(\bar c \bar\partial X^\mu+\bar\gamma \bar\psi^\mu)e^{ip_r X_r}\ .
\end{equation} Given this result, it is quite surprising that, at least for certain momenta, the zero mode $(e^{ip_rX_r})_0$ gives a well-defined map on the cohomology at all. Note however, that the zero mode of $p_{r\mu} \bar\partial X^\mu$, when acting on states with $k_r^0=k^1_r$, gives a term proportional to $k_r\cdot p_r=0$, since $k_r$ and $p_r$ are both null and proportional to each other. As for the second term, the only cases where it is potentially non-vanishing is when the commutator $[Q,e^{ip_r X_r}]$ is applied to the ghost number $0$ state $\bar\beta_{-1/2}e^{-\bar \phi}\bar c_1|k_r\rangle$ or the ghost number $1$ states $\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|k_r\rangle$ and $\bar u ^{i\mp}_{-1/2}e^{-\tilde \phi/2}\bar c_1|k_r,\pm\rangle$. In these cases, we have
\begin{align} (e^{ip_rX_r})_0Q_r\,\bar\beta_{-1/2}e^{-\bar \phi}\bar c_1|k_r\rangle&=k_{r\mu}\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|k_r+p_r\rangle\ ,\\ Q_r(e^{ip_r X_r})_0\,\bar\beta_{-1/2}e^{-\bar \phi}\bar c_1|k_r\rangle&=(k_{r\mu}+p_{r\mu})\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|k_r+p_r\rangle\ ,
\end{align}
as well as
\begin{align} (e^{ip_rX_r})_0Q_r\epsilon_\mu\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|k_r \rangle&=\epsilon_\mu k^\mu_r \gamma_{-1/2}e^{-\tilde \phi}\bar c_1|k_r+p_r\rangle\ ,\\ Q_r(e^{ip_rX_r})_0\epsilon_\mu\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|k_r\rangle&=\epsilon_\mu (k^\mu_r+p^\mu_r) \gamma_{-1/2}e^{-\tilde \phi}\bar c_1|k_r+p_r\rangle\ ,
\end{align}
and
\begin{align} (e^{ip_rX_r})_0Q_r\bar u ^{i\mp}_{-1/2}e^{-\tilde \phi/2}\bar c_1|k_r,\pm\rangle&=k_{r\mu}\bar\gamma_0\bar\psi_0^\mu\bar u ^{i\mp}_{-1/2}e^{-\tilde \phi/2}\bar c_1|k_r+p_r,\pm\rangle\ ,\\ Q_r(e^{ip_rX_r})_0\bar u ^{i\mp}_{-1/2}e^{-\tilde \phi/2}\bar c_1|k_r,\pm\rangle&=(k_{r\mu}+p_{r\mu})\bar\gamma_0\bar\psi_0^\mu\bar u ^{i\mp}_{-1/2}e^{-\tilde \phi/2}\bar c_1|k_r+p_r,\pm\rangle\ .
\end{align}
Since $k_r$ and $k_r+p_r$ are proportional to each other, then so long as both $k_r\neq 0$ and $k_r+p_r\neq 0$, exchanging $(e^{ip_rX_r})_0$ and $Q_r$ gives just a rescaling of the resulting state. This explains why $(e^{ip_rX_r})_0$ provides an isomorphism of cohomology in these cases. Of course, these arguments only work for states in $\mathcal{H}_{BPS}$, so there seems to be no natural way to extend the action of $\mathfrak{g}$ to the whole space of physical states $\mathcal{H}^{phys}$.
The problems arise when either $k_r$ or $k_r+p_r$ is zero. Recall that for $k^0_r=k^1_r=0$ and ghost number $1$ the $Q_r$-closed states are
\begin{align}\label{stateszero} &\nu^a:=\bar v ^a_{-1/2}e^{-\tilde \phi}\bar c_1|0\rangle\ ,& a=1,\ldots,\chi^{\rm NS}(V_2)\\
&\nu_-:=(\bar\psi^0_{-1/2}- \bar\psi^1_{-1/2})e^{-\tilde \phi}\bar c_1|0\rangle\ ,\\
&\nu_+:=(\bar\psi^0_{-1/2}+ \bar\psi^1_{-1/2})e^{-\tilde \phi}\bar c_1|0\rangle\ ,
\end{align} in the $-1$-picture (NS sector), and \begin{align}\label{stateszeroR} &\upsilon^{i}_+:=\bar u ^{i-}_{-1/2}e^{-\tilde \phi/2}\bar c_1|0,+\rangle\ ,& i=1,\ldots,\chi^{{\rm R}}_-(V_2)\\&\upsilon^{i}_-:=\bar u ^{i+}_{-1/2}e^{-\tilde \phi/2}\bar c_1|0,-\rangle\ ,& i=1,\ldots,\chi^{{\rm R}}_+(V_2)
\end{align} in the $-1/2$-picture (Ramond sector). None of these states is $Q_r$-exact.
Therefore we have two kind of problems:
\begin{enumerate}
\item The state $\epsilon_\mu\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|0\rangle$ at zero momentum, which is closed for every choice of polarization $\epsilon_\mu$, is mapped by $(e^{ip_rX_r})_0$ to $\epsilon_\mu\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|p_r\rangle$, which is closed only when $\epsilon_\mu$ is proportional to $p_{r\mu}$. Similarly, the $Q_r$-closed states $\upsilon^{i+}$ in the Ramond sector are mapped to the states $\bar u ^{i-}_{-1/2}e^{-\tilde \phi/2}\bar c_1|p_r,+\rangle $ that are not closed for $p^0_r=p^1_r$. Therefore, $(e^{ip_rX_r})_0$ maps physical states with zero momentum to non-physical states with momentum $p_r$.
\item The state $k_{r\mu}\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|k_r\rangle$ at momentum $k_r\neq 0$, which is exact, is mapped by $(e^{-ik_r X_r})_0$ to the state $k_{r\mu}\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|0\rangle$, which is closed but not exact. Therefore, $(e^{-ik_rX_r})_0$ maps exact states with momentum $k_r$ to non-exact states with momentum $0$.
\end{enumerate}
As a consequence, $(e^{ip_r X_r})_0$ does not induce a well-defined map on cohomology in these cases.
\paragraph{Possible resolutions.} For problem 1 above, there is actually a simple (though perhaps slightly unnatural) solution. In the NS sector, we can just exclude the states $\epsilon_\mu\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|0\rangle$ from $\mathcal{H}_{BPS}$, with the exception of the combination \begin{equation}\label{weird} \nu_-=(\bar\psi^0_{-1/2}-\bar\psi^1_{-1/2})e^{-\tilde \phi}\bar c_1|0\rangle\ .\end{equation} Similarly, in the Ramond sector, we only include the states $\upsilon^{i}_{-}$ and exclude the states $\upsilon^{i}_{+}$. Since we are already considering a particular subspace of $\mathcal{H}^{phys}$, there seems to be nothing wrong with making one further restriction. Note that by acting with the algebra $\mathfrak{g}$ on $\mathcal{H}_{BPS}$ there is no way to obtain a linear combination $\epsilon_\mu\bar\psi^\mu_{-1/2}e^{-\tilde \phi}\bar c_1|0\rangle$ different from \eqref{weird}, nor a state of the form $\upsilon^{i}_{+}$, so the restricted space is still a representation of $\mathfrak{g}$. In the same fashion, we also exclude the ghost dilaton (see Appendix \ref{app:semirelative}).
Problem $2$, related to the fact that the state \eqref{weird} is not exact at zero momentum, is more subtle. This state, when tensored with an appropriate left-moving counterpart, corresponds to a soft particle. Soft particles in amplitudes couple to other particles through conserved charges. In this case, the conserved charge is $k^0-k^1$ (the $0$ picture version of the corresponding vertex operator is proportional to the current $\bar\partial X^0-\bar\partial X^1$). Therefore, $\nu_-$ should decouple from any amplitude with states in $\mathcal{H}_{BPS}$, i.e. amplitudes with one state \eqref{weird} and all the other states in $\mathcal{H}_{BPS}$ are always zero. In §\ref{s:symmBPS}, we check this expectation by a direct calculation. This implies that, so long as we consider symmetries of purely BPS amplitudes, the state $\nu_-$ is equivalent to $0$ (or to a BRST exact state). For these reasons, it seems reasonable that the action of $\mathfrak{g}$, which is a symmetry of these purely BPS amplitudes, is only defined modulo $\nu_-$.
The conclusion is that, at zero momentum, one should really consider a quotient of $\bar H^1(0)$ by the state \eqref{weird}. Altogether, the zero momentum space $\mathsf{H}^2(0,0)' $ that should be included in $\mathcal{H}_{BPS}$ is
\begin{equation}
\mathsf{H}^2(0,0)'=H^1(0)\otimes \bar H^1(0)'\ ,
\end{equation} where
\begin{equation} \bar H^1(0)'=\Bigl(\bigoplus_{a=1}^{\chi^{\rm NS}} \mathbb{C}\nu^a\oplus \mathbb{C}\nu_-\oplus \bigoplus_{i=1}^{\chi^{\rm R}_+} \mathbb{C}\upsilon^{i}_-\Bigr) /\mathbb{C}\nu_-\cong \bigoplus_{a=1}^{\chi^{\rm NS}} \mathbb{C}\nu^a\oplus \bigoplus_{i=1}^{\chi^{\rm R}_+} \mathbb{C}\upsilon^{i}_{-}\ .
\end{equation}
The restricted quotient space $\bar H^1(0)'$ has dimension $\chi^{\rm NS}+\chi^{\rm R}_+$, and it is isomorphic to the cohomology at non-zero momentum, with the isomorphism given by operators $(e^{ip_r X_r})_0$.
With this definition, the action of $\mathfrak{g}$ on $\mathcal{H}_{BPS}$ is well-defined, but it remains to show that it acts in the appropriate way on BPS amplitudes.
\subsection{Symmetry of BPS amplitudes}\label{s:symmBPS}
In this subsection, we will prove \eqref{BKMsymm}.
Let us consider a purely BPS genus zero string amplitude
\begin{equation} A_n=\int_{\mathcal{M}_{0,n}} \langle \prod_{i=1}^n \mathcal{V}_{\varrho_i\otimes \bar \varsigma_i}(z_i,\bar z_i)\rangle
\end{equation} with $n\ge 3$ insertions of vertex operators $\mathcal{V}_{\varrho_i\otimes \bar \varsigma_i}$ corresponding to BRST-closed states $\varrho_i\otimes \bar \varsigma_i$ representing classes in the BPS subspace $\mathcal{H}_{BPS}$, i.e. such that $k^0_r=k^1_r$ for all $i$. The picture numbers are chosen so as to give a non-zero answer, and $n-3$ vertex operators are integrated.
For states in $\mathcal{H}_{BPS}$, the integrand factorizes into a holomorphic times an antiholomorphic factor
\begin{equation} \langle \prod_{i=1}^n \mathcal{V}_{\varrho_i\otimes \bar \varsigma_i}(z_i,\bar z_i)\rangle =\langle \prod_{i=1}^n \mathcal{V}_{\varrho}(z_i)\rangle \langle \prod_{i=1}^n \mathcal{V}_{\bar \varsigma_i}(\bar z_i)\rangle \ .
\end{equation}
Let us focus on the right-moving factor, which must be anti-holomorphic in the variables $z_i$, with possible singularities when two insertion points coincide. The BPS and physical state conditions imply that the $\mathcal{V}_{\bar \varsigma_i}$ are built using only the following combinations of right-moving `spacetime' operators
\begin{equation}\label{stoper} \bar\psi^0-\bar\psi^1\ ,\qquad \bar\partial X^0-\bar \partial X^1\ ,\qquad e^{ik_r X_r}\ \text{(with } k_r^0=k_r^1)\ ,
\end{equation} multiplied by (super-)ghost and internal matter operators. Using the OPE
\begin{equation} \bar\partial X^\mu(\bar z)\bar\partial X^\nu(0)=-\frac{\eta^{\mu\nu}}{{\bar z}^2}+O(1)\ ,\qquad \bar\psi^\mu(\bar z)\bar\psi^\nu(0)=\frac{\eta^{\mu\nu}}{\bar z}+O(1)
\end{equation}
\begin{equation} \bar\partial X^\mu(z)e^{ik_rX_r}(0)=\frac{ik_r^\mu}{\bar z}e^{ik_rX_r}(0)+O(1)\ ,\end{equation}
\begin{equation} e^{ik_r X_r}(\bar z)e^{ik'_r X_r}(0)=\bar z^{k_r\cdot k'_r}(\pm e^{i(k_r+k_r')X_r}(0)+O(\bar z))\ ,
\end{equation} it is easy to see that the spacetime operators \eqref{stoper} have non-singular OPE with each other.
Now, suppose that one of the vertex operators $\mathcal{V}_{\bar \varsigma}(\bar z)$ (taken in the $0$-picture, integrated form) is just a product of spacetime operators \eqref{stoper}, with no further `internal' matter or ghost factor. An example is
\begin{equation} \mathcal{V}_{\bar \varsigma}(\bar z)= :(\bar\partial X^0-\bar\partial X^1) e^{ik_r X_r}: (\bar z)d\bar z\ ,
\end{equation} which is the $0$-picture vertex operator of the closed state $\bar \varsigma=(\bar\psi^0_{-1/2}-\bar\psi^1_{-1/2})e^{-\tilde \phi}\bar c_1e^{ik_r X_r}|0\rangle$.
In this case, the antiholomorphic factor $\langle \mathcal{V}_{\bar \varsigma}(\bar z) \prod_{i=1}^n \mathcal{V}_{\bar \varsigma_i}(\bar z_i)\rangle$ has no singularities in $\bar z$, so it must be a constant in this variable. It follows that, for these closed states, the CFT correlator $\langle \mathcal{V}_{\varrho\otimes \bar \varsigma}(z,\bar z) \prod_{i=1}^n \mathcal{V}_{\varrho_i\otimes \bar \varsigma_i}(z_i,\bar z_i)\rangle$ is meromorphic in the insertion position $z$.
Note that the state $\bar \varsigma=(\bar\psi^0_{-1/2}-\bar\psi^1_{-1/2})e^{-\tilde \phi}\bar c_1e^{ik_rX_r}|0\rangle$ is BRST-exact if and only if $k_r\neq 0$, and in this case the full vertex operator $\mathcal{V}_{\varrho\otimes \bar \varsigma}(z,\bar z)$ is a total derivative
\begin{equation}\label{vertex} \mathcal{V}_{\varrho\otimes \bar \varsigma}(z,\bar z)\propto\partial_{\bar z}(\mathcal{V}_{\varrho}(z)e^{ik_r X_r} (\bar z)) \ .
\end{equation}
Let us consider an $(n+1)$-point amplitude where the final vertex operator is of the form \eqref{vertex} for $k_r\neq 0$.
\begin{equation} A_{n+1}= \int_{\mathcal{M}_{0,n}} \int_{\mathbb{P}^1} dzd\bar z\, \frac{\partial}{\partial{\bar z}}\langle \prod_{i=1}^{n} \mathcal{V}_{\varrho_i\otimes \bar \varsigma_i}(z_i,\bar z_i) \mathcal{V}_{\varrho}(z)e^{ik_r X_r} (\bar z)\rangle\ .\end{equation}
Since the vertex operator \eqref{vertex} corresponds to an exact state, we expect the amplitude to vanish. We will now prove that this is the case.
The integral in $z$ needs to be regularized by cutting a small disc around each of the other insertion points $z_1,\ldots, z_{n}$ and then taking the limit where the radius of each disc goes to zero. Since the integrand is a total derivative of a meromorphic function in $z$, by Stokes theorem we obtain
\begin{equation}\label{variation1} A_{n+1}=\int_{\mathcal{M}_{0,n}} \sum_{j=1}^{n}\oint_{\gamma_{z_j}} dz\langle \prod_{i=1}^{n} \mathcal{V}_{\varrho_i\otimes \bar \varsigma_i}(z_i,\bar z_i) \mathcal{V}_{\varrho}(z)e^{ik_r X_r} (\bar z)\rangle \ .
\end{equation} where $\gamma_{z_j}$ is a small circle centered in $z_j$. Each contour integral picks up the residue of the correlator at the corresponding singularity. For a (single-valued) meromorphic function, the sum over all residues vanishes, so that
\begin{equation} A_{n+1}=0\ ,
\end{equation} as expected.
An analogous result holds even when the state $\bar \varsigma$ has zero momentum $k_r=0$. In this case, $\bar \varsigma$ coincides with the state $\upsilon^-$ of equation \eqref{weird}. The vertex operator can still be written as a total derivative, if one allows for the fields $X_r^\mu(\bar z)$ to appear without derivatives or exponentials
\begin{equation}\label{totalder} \mathcal{V}_{\varrho\otimes \bar \varsigma}(z,\bar z)\propto\partial_{\bar z}(\mathcal{V}_{\varrho}(z)(X_r^0-X_r^1) (\bar z)) \ .
\end{equation} In general, there are some subtleties in trying to apply the previous argument in presence of the fields $X_r^\mu(\bar z)$. Indeed, these fields might in principle lead to logarithmic singularities that spoil the single-valuedness of the correlator. However, this never happens in the case of the pure BPS amplitudes we are interested in, because the combination $X_r^0-X_r^1$ has non-singular OPE with itself and with all the operators in \eqref{stoper}. We conclude that, while $\upsilon^-$ is \emph{not} an exact state at zero momentum $k_r=0$, a pure BPS amplitude with an insertion of the corresponding vertex operator always vanishes, as anticipated in the previous subsection.
Coming back to \eqref{variation1}, the singularity at the point $z=z_i$ arises from the OPE of $\mathcal{V}_{\varrho}(z)e^{ik_rX_r} (\bar z)$ with $\mathcal{V}_{\varrho_i\otimes \bar \varsigma_i}(z_i,\bar z_i)$. In order to prove \eqref{BKMsymm}, we just need to show that the residue of this OPE is the action of the algebra element corresponding to $\varrho$ acting on the state $\varrho_i\otimes \bar \varsigma_i$, i.e.
\begin{equation} \oint_{\gamma_{z_i}} dz\, \mathcal{V}_{u}(z)e^{ik_rX_r} (\bar z) \mathcal{V}_{\varrho_i\otimes \bar \varsigma_i}(z_i,\bar z_i) =\mathcal{V}_{\delta_\varrho(\varrho_i\otimes \bar \varsigma_i)}(z_i,\bar z_i)\ .
\end{equation}
The OPE of the antiholomorphic operators $e^{ik_rX_r} (\bar z)$ and $\mathcal{V}_{\bar \varsigma_i}(\bar z_i)$ is non-singular and gives just a shift in the momentum of $\bar \varsigma_i$
\begin{equation} e^{ik_r X_r} (\bar z)\mathcal{V}_{\bar \varsigma_i}(\bar z_i)=\mathcal{V}_{(e^{ik_r X_r} )_0\bar \varsigma_i}(\bar z_i)+O(\bar z-\bar z_i)\ .
\end{equation} Note that the terms of order $O(\bar z-\bar z_i)$ in this OPE will not contribute to the full anti-holomorphic correlator, since, as we argued above, the correlator is constant in $\bar z$. Let us focus on the case where $\varrho$ is in the NS sector, so that it is a representative of a left-moving BRST cohomology class with ghost number $1$ and canonical $(-1)$-picture. The vertex operator $\mathcal{V}_\varrho$ is in the integrated form and in the $0$-picture, so it corresponds to the state $b_{-1}X\varrho$ with picture and ghost numbers $0$. The latter state has conformal weight $1$ and the residue picks up the zero mode acting on the state $\varrho_i$:
\begin{equation} \oint_{\gamma_{z_i}} dz\, \mathcal{V}_{\varrho}(z) \mathcal{V}_{\varrho_i}(z_i)=\mathcal{V}_{(b_{-1}X\varrho)_0u_i}(z_i)\ .
\end{equation} Now, we recall that the Lie bracket of the (even part of the) BKM algebra $\mathfrak{g}$ is precisely defined to be
\begin{equation} [\varrho,\varrho_i]=(b_{-1}X\varrho)_0\varrho_i\ .
\end{equation} We conclude that
\begin{equation} \oint_{\gamma_{z_i}} dz\, \mathcal{V}_{\varrho}(z)e^{ik_r X_r} (\bar z) \mathcal{V}_{\varrho_i\otimes \bar \varsigma_i}(z_i,\bar z_i)=\mathcal{V}_{[\varrho,\varrho_i]}(z_i)\mathcal{V}_{(e^{ik_r X_r} )_0\bar \varsigma_i}(\bar z_i)=\mathcal{V}_{\delta_\varrho(\varrho_i\otimes \bar \varsigma_i)}(z_i,\bar z_i)\ .
\end{equation}
A similar result holds when $\varrho$ is in the Ramond sector, and represents a left-moving BRST cohomology classes with ghost number $1$ and canonical $(-1/2)$-picture. The vertex operator $\mathcal{V}_\varrho$ is in the integrated form and corresponds to the state $b_{-1}\varrho$ of conformal weight $1$ and picture number $-1/2$, and the residue picks out the zero mode of this current acting on $\varrho_i$,
\begin{equation} (b_{-1}\varrho)_0\varrho_i\ .
\end{equation} When $\varrho_i$ is in the Ramond sector with canonical $(-1/2)$-picture, the state $(b_{-1}\varrho)_0\varrho_i$ is in the NS sector with canonical picture number $-1$, and is simply the commutator $[\varrho,\varrho_i]$. When $\varrho_i$ is in the NS sector with canonical picture number $-1$, one should move the picture changing operators so that the resulting Ramond state is $X(b_{-1}\varrho)_0\varrho_i\equiv [\varrho,\varrho_i]$ with picture number $-1/2$. This seemingly \emph{ad hoc} prescription for the placement of picture changing operators in fact arises naturally when one describes the superstring amplitude in terms of an integration over supermoduli.\footnote{In particular, the limit where $z$ coincides with another insertion point $z_i$ corresponds to a degeneration of the $(n+1)$-punctured sphere into two spheres joined through a nodal point, with the first sphere containing the two insertion points $z$ and $z_i$ and the second containing all the other punctures. The nodal point is an additional puncture in each of the two spheres, and the puncture is of Ramond type if $\varrho$ and $\varrho_i$ are one NS and one R, and of NS type otherwise. While an NS degeneration is parametrized only by one even supermodulus, a Ramond degeneration corresponds to one even and one odd supermodulus, and the integration over the odd one corresponds to the insertion of a picture changing operator.} This concludes the proof of the second claim in section~\ref{sec:BPSstates}.
\subsection{Physical interpretation}
Let us pause for a moment and discuss the physical interpretation of the results of this section.
We have shown that the subspace $\mathcal{H}_{BPS}$ of physical states is a representation of a BKM (super-)algebra $\mathfrak{g}$. Furthermore, $\mathfrak{g}$ arises as an algebra of symmetries of the string tree level amplitudes where all insertion points correspond to states in $\mathcal{H}_{BPS}$.
If the uncompactified spacetime were higher dimensional, the physical interpretation would be straightforward: $\mathfrak{g}$ is an algebra of symmetries of the S-matrix for the scattering of these BPS states, at least at tree level. In the present case, the spacetime we are considering is $0+1$-dimensional (or $1+1$ dimensional on a cylinder). Naively, it seems natural to interpret the amplitudes as transition amplitudes between an initial asymptotic state at time $t=-\infty $ and a final state at time $t=+\infty$.
However, this interpretation is problematic. Let us regard our models as theories in a $1+1$-dimensional cylindrical spacetime. The states in $\mathcal{H}_{BPS}$, in general, represent spacetime-filling strings. The initial and final states in our transition amplitudes, therefore, represent arbitrary numbers of spacetime-filling strings. However, these states are coupled to the metric and B-field, so they cannot make sense in general: the field equations for these massless degrees of freedom require a precise number of spacetime filling strings to cancel the B-field tadpole and cosmological constant (see appendix \ref{s:Bfield} for a calculation of such a tadpole). In section \ref{sec:secondquantized} we will consider a second quantized version of this theory in a zero coupling limit. In this limit, one can neglect any backreaction and regard the massless fields as a non-dynamical fixed background; these kind of inconsistencies can be safely ignored in this case. However, when considering amplitudes, as in this section, we are implicitly assuming that the string coupling is non-zero, so that this solution is not available here.
One possible attitude is to view the amplitudes as a purely formal construction. We can build a collection of functions that are symmetric under the BKM algebra. This statement is certainly true, even if the quantities do not have a sensible spacetime interpretation.
On the other hand, the existence of this rich collection of functions is suggestive, and hints that there should be a reasonable way to interpret our results. One possibility could be that the vertex operators are accompanied by a background charge that offsets their coupling to the massless fields. This would be analogous to matter coupled to Liouville gravity in two dimensions, where the Liouville and the matter part are coupled in such a way that the combined stress energy tensor is always traceless. A more suggestive possibility is that there exists a topological version of these string models, where only the states in $\mathcal{H}_{BPS}$ survive, and the dangerous massless fields are either not present or decouple.
While we are not going to further investigate these proposals in the present article, let us conclude by mentioning evidence that the BKM symmetry persists in BPS amplitudes at all loops. We believe this provides an additional hint that a sensible physical interpretation of these amplitudes exists.
To start, we consider the possibility that, at least, the even subalgebra $\mathfrak{g}_0$ is $\mathfrak{g}$ is a symmetry of pure BPS amplitudes at all orders in perturbation theory. The argument of the previous subsection generalizes in a straightforward way. One considers an $(n+1)$-point amplitude on a genus $g$ Riemann surface $\Sigma$, where one of the vertex operators corresponds to a BRST exact NS-NS state, and has the form \eqref{totalder}, i.e. a total derivative in the insertion position. One then integrates the position of this BRST-exact state over $\Sigma$. Technically, this is an integration over the even supermodulus parametrizing this position, i.e. an integration along the fibers of the forgetful map $\mathcal{M}_{g,n+1}\to \mathcal{M}_{g,n}$. Being a total derivative, this integral would vanish trivially if the integrand was non-singular. However, there are singularities when $z$ collides with one of the other insertion points, so one needs to cut out from $\Sigma$ small disks around each of these insertion points. For pure BPS amplitudes, the integrand still factorizes into left- and right-moving factors, and the right-moving factor is non-singular in $\bar z$. Therefore, the integrand is a total derivative of a meromorphic form. The integration reduces to a sum over all the residues of this meromorphic form, and this sum vanishes. The sum over residues can again be interpreted as a variation of an $n$-point amplitude with respect to the action of some element of the algebra $\mathfrak{g}_0$, so its vanishing implies that the $n$-point amplitude is invariant.
This is a highly non-trivial result, that points toward the existence of a meaningful physical interpretation of these amplitudes.
The odd component of the algebra requires a more sophisticated formalism. In this case, the BRST-exact vertex operator is in the R-NS sector, and there is no even supermodulus that simply parametrizes the position of this operator. Equivalently, there is no map $\mathcal{M}_{g,n+1}\to \mathcal{M}_{g,n}$ where one `forgets' about one Ramond puncture.\footnote{To show that such a forgetful map does not exist, it is sufficient to note that the number of Ramond punctures must always be even.} In this case, one needs to integrate over all supermoduli at once. The integrand is still a total derivative, so one gets only contributions from the boundary components of the Deligne-Mumford compactification of the supermoduli space. To prove that our result at tree level generalizes to higher genus, one needs to show that the only non-vanishing boundary contributions are the ones coming from degenerations of the Riemann surface $\Sigma$, of genus $g$ and $n+1$ punctures, into a surface $\Sigma'$ of the same genus $g$ and $n-1$ punctures and a sphere with two punctures (one of them being the exact state), joined through a double point. Furthermore, the sum over all such degenerations should vanish. In the previous case of NS-NS punctures, these kind of boundary components in the Deligne-Mumford compactification correspond exactly to the limits where the exact vertex operator collides with one of the other punctures.
These conditions are similar (though not exactly the same) as the conditions for spacetime supersymmetry in general string perturbation theory. In that case, one can show (see for example \cite{Witten2012}) that there are only a few, particular degeneration limits that can potentially spoil spacetime supersymmetry at higher loop, and that these cases are related to either tadpoles, spontaneous supersymmetry breaking, or to higher loop modifications of supersymmetry transformations. Checking that the full algebra $\mathfrak{g}$ (including the odd component) is a symmetry of purely BPS amplitudes at all orders in string perturbation theory would provide strong evidence that a consistent physical interpretation of this theory does exist.
\section{Second quantization and BPS indices}\label{sec:secondquantized}
Starting from the space of physical states in our type IIA or heterotic theory on $V_1\otimes \bar V_2$, let us now define a `second quantized' Hilbert space describing an arbitrary number of strings. We will consider only the limit where the string coupling constant is zero, so that we have a theory of free strings.
We begin by constructing our second quantized Hilbert space and we define an associated supersymmetric index which only receives contributions from BPS states. We show that the second quantized space of BPS state forms a representation for the BKM algebra $\mathfrak{g}$ associated with the (super)VOA $V_1$, so that the index is a character for that representation. We then proceed to consider two examples in detail: a family of heterotic string compactifications on $V\otimes \bar V^{f\natural}$ (\S \ref{sec:hetex1}) and type IIA compactifications on $V\otimes \bar V^{f\natural}$ (\S \ref{sec:IIAex2}). In these cases we calculate the BPS indices and show that they correspond to known (super)denominator formulas of BKM algebras.
\subsection{A second quantized Hilbert space}\label{sec:secondHilb}
Let us consider type IIA or heterotic string theory on $V_1\otimes \bar V_2$, where $V_2\in \{V^{fE_8},V^{f\natural},F_{24}\}$. Occasionaly, we will compactify one further space-like direction on a circle $S^1$. In order to construct this second quantized space, we first introduce one operator $\eta_a$ for each physical state $a\in \mathsf{H}^2(k)$ with $k\neq 0$. The operators obey a free oscillator algebra, with (anti-)commutation relations determined by the string two point functions. The $k\neq 0$ operators can be separated into creation ($k^0>0$) or annihilation ($k^0<0$) operators. The idea is that each creation/annihilation operator $\eta_a$ creates or destroys a string in the state $a$ in the $(1+1)$- dimensional spacetime.
For the physical states with $k=0$ (i.e. $k_l=k_r=0$), the construction is slightly more complicated. First note that the $k=0$ physical states are the same in the uncompactified and in the compactified theory; for these definitions, it is convenient to work in the uncompactified theories. We separate the space of zero-momentum physical states into two orthogonal subspaces, the `propagating' and `non-propagating' states. The `propagating' states are the ones that can be obtained starting from massless $(k_l)^2=(k_r)^2=0$ states with $k\neq 0$ and then taking the $k\to 0$ limit (this limit is well defined only in the uncompactified case, which is why we prefer to give the definition in this set up). The `non-propagating' states are the states that are orthogonal to the propagating ones. The physical interpretation is clear: the propagating states are the zero modes of some local propagating degrees of freedom in the $1+1$-dimensional spacetime, corresponding for example to some massless scalars (excluding the dilaton) or spin $1/2$ fermions in spacetime. The non-propagating degrees of freedom correspond, for example, to the metric, B-field, dilaton, gravitinos and gauge vectors, that have no local propagating degrees of freedom in $1+1$-dimensions. The presence of the latter states in the physical spectrum of the superstring correspond to the possibility to deform the background, such as the geometry of the spacetime and the string coupling constant. In the construction of the second quantized space of states, we will introduce one operator $\eta_a$ for each `propagating' state $a\in \mathcal{H}^2(0)$, and no operator for the `non-propagating' ones. For each of the latter, we can instead introduce a fixed non-dynamical background field: for example, in the compactified case, one can set the radius of the circle, a background B-field, or Wilson lines of gauge fields along the circle (besides the string coupling, which we always fix to zero).
We define a ground state of the Hilbert space to be a state in the kernel of all annihilation ($k^0<0$) operators; physically, these states should correspond to the vacuum, i.e. no strings are present. The ground states might be degenerate if there are $k=0$ `propagating' operators. The second quantized Hilbert space is then defined as the Fock space constructed by acting in all possible ways on the ground states with the creation operators.
Let us consider the theory compactified on a circle $S^1$ of radius $R$. We define a supersymmetric index
\begin{equation} \mathcal{Z}^{V_1 \otimes \bar{V_2}}(\beta, b,v,R, A_k):=\Tr(e^{-\beta H} e^{2\pi i bW}e^{2\pi i vM} e^{2\pi i\sum_k A_kq_k} (-1)^\mathbf{F})\ ,
\end{equation} where the $H$, $M$, $W$ are the total Hamiltonian, momentum and winding, the $q_k$ are charges with respect to some abelian background gauge fields (corresponding to a maximal abelian subgroup of the possibly non-abelian gauge group), and $(-1)^{\mathbf{F}}$ is the spacetime fermion number. The superscript denotes the factorized worldsheet theory in which we are computing the index. The real chemical potentials $\beta$, $b$, $v$, $A_k$ admit natural physical interpretations: $\beta$ is the usual inverse temperature; $b$ is a constant background B-field; $v$ is a constant off-diagonal term in the $1+1$ dimensional metric; $A_k$ are constant background for the gauge fields in a maximal abelian torus of the gauge group, giving non-trivial Wilson lines along the circle $S^1$.
If $\eta$ is an oscillator corresponding to momentum $k^0_l=k^0_r=E$ and $k^1_{l,r}=\frac{1}{\sqrt{2}}(\frac{m}{R}\mp wR)$, one has
\begin{equation} [H,\eta]=E\eta\qquad [M,\eta]=m\eta\qquad [W,\eta]=w\eta\ .
\end{equation} The ground states are (possibly degenerate) eigenstates for $H, M,W$
\begin{equation} H|0\rangle=E_0|0\rangle\ ,\qquad M|0\rangle =m_0|0\rangle\ ,\qquad W|0\rangle =w_0|0\rangle
\ .\end{equation} Here, $w_0$ and $m_0$ have a straightforward physical interpretation as a B-field tadpole and a `vacuum momentum', respectively, since they couple to the background B-field $b$ and to the off-diagonal metric component $v$. They arise as a 1-loop effect in superstring theory, and can be easily computed for all the theories we are considering, see appendix \ref{s:Bfield}. The `cosmological constant' $E_0$ is usually fixed in terms of $w_0,m_0$ by spacetime supersymmetry.
\begin{table}[h]\begin{center}
\begin{minipage}{.4\textwidth}
\begin{tabular}{c|cc}
Type IIA & $w_0$ & $m_0$\\\hline
$V^{fE_8}\otimes \bar V^{fE_8}$ & 0 &0\\
$F_{24}\otimes \bar V^{fE_8}$ & 0 & 0\\
$V^{fE_8}\otimes \bar V^{f\natural}_-$ & 0& 0\\
$V^{f\natural}_{+}\otimes \bar V^{f\natural}_-$ &0&$-24$ \\
$V^{f\natural}_{-}\otimes \bar V^{f\natural}_-$ &$ -24$ & 0\\
$F_{24}\otimes \bar V^{f\natural}_-$ & $ 24$ & $24$\\
$F_{24}\otimes \bar F_{24}$ &0 &0\\
\end{tabular}
\end{minipage}
\begin{minipage}{.4\textwidth}
\begin{tabular}{c|cc}
Het & $w_0$ & $m_0$\\\hline
$V\otimes \bar V^{fE_8}$ & 0 & 0\\
$V\otimes \bar V^{f\natural}_\pm$ & $\pm (N-24)$ & $\pm N$\\
$V\otimes \bar F_{24}$ & 0 & 0
\end{tabular}\end{minipage}
\end{center}\caption{The vacuum winding $w_0$ (i.e. the B-field tadpole) and momentum $m_0$ for the type IIA and heterotic compactifications we are interested in. The details of the calculations are in appendix \ref{s:Bfield}.}\label{tbl:tadpole}\end{table}
The theories we are considering often contain some spacetime supersymmetries $\mathcal{Q}^i_\alpha$ (see Tables \ref{tbl:IIAtad} and \ref{tbl:hettad}), where $i=1,2,3,\ldots$ and $\alpha\in\{\pm\}$ denote the chirality. In this case, the index gets non-vanishing contributions only from a BPS subspace of the second quantized Hilbert space, which can be constructed as a Fock space by acting on the vacuum only with the creation operators that (anti-)commute with the supercharges. In turn, these operators correspond to single string states that are annihilated by the supercharges (BPS states). Thus we can restrict our analysis to these BPS single string states. In heterotic models, the two-dimensional supersymmetry algebra is
\begin{equation} \{\mathcal{Q}^i_\pm,\mathcal{Q}^j_\pm\}=2\delta^{ij}(P^0_r\pm P^1_r)\ ,\qquad \{\mathcal{Q}^i_+,\mathcal{Q}^j_-\}=0\ ,
\end{equation} and involves only the right-moving momentum. The same relations hold in type II theories when the supercharges arise from the NS-R sector, while for the R-NS sector we have the analogous relations with the left-moving momenta,
\begin{equation} \{\mathcal{Q}^i_\pm,\mathcal{Q}^j_\pm\}=2\delta^{ij}(P^0_l\pm P^1_l)\ ,\qquad \{\mathcal{Q}^i_+,\mathcal{Q}^j_-\}=0\ .
\end{equation} Type II supercharges coming from different sectors anticommute with each other.
When any of these supersymmetries is present, the BPS condition is equivalent to a linear relation between the energy $E=k^0_l=k^0_r$ and the winding and momentum $m,w$ of a single string state. By linearity, the same relation must hold between the Hamiltonian $H$ and the momentum and winding operators $M$ and $W$ in the BPS subsector of the second quantized Hilbert space. For example, when negative chirality supersymmetries $\mathcal{Q}^i_-$ from the right-moving Ramond sector are present, the BPS condition implies
\begin{equation} H=\frac{1}{\sqrt{2}} \left(\frac{M}{R}+WR\right)\ .
\end{equation} Note that if we require the ground states of the second quantized Hilbert space to be supersymmetric, we have the corresponding relation $E_0=\frac{1}{\sqrt{2}} \left(\frac{m_0}{R}+w_0R\right)$ of vacuum eigenvalues. By restricting the trace to the BPS subsector of the second quantized Hilbert space, we can reexpress the above index as,
\begin{equation} \mathcal{Z}^{V_1 \otimes \bar{V_2}}(\beta, b,v,R, A_k)=\Tr_{\rm BPS}\Big(e^{-\frac{\beta}{\sqrt{2}} \bigl(\frac{M}{R}+WR\bigr)} e^{2\pi i bW}e^{2\pi i vM} \prod_i e^{2\pi i\sum_k A_kq_k} (-1)^\mathbf{F}\Big).
\end{equation}
It is convenient to reorganize the real parameters $\beta$, $R$, $b$ and $v$ into two complex variables,
\begin{equation} T=b+i\frac{\beta R}{2\sqrt{2}\pi}\ ,\qquad U=v+i\frac{\beta }{2\sqrt{2}\pi R}\ .
\end{equation} Both $T$ and $U$ take values in the upper half-plane and parametrize, respectively, the K\"ahler and complex structure of the Euclidean spacetime torus obtained upon Wick rotation of the time direction. In terms of these variables, the index becomes
\begin{eqnarray}\label{eq:index0} \mathcal{Z}^{V_1 \otimes \bar{V_2}}(T,U, A_k)&=&\Tr_{\rm BPS}\Big(e^{2\pi i TW}e^{2\pi i UM} \prod_i e^{2\pi i\sum_k A_kq_k} (-1)^\mathbf{F}\Big)
\nonumber \\
&=&\Tr_{\rm BPS}\Big(p^{W}q^{M} \prod_k y_k^{q_k} (-1)^\mathbf{F}\Big),
\end{eqnarray}
where we introduced the variables
\begin{equation} p:=e^{2\pi iT}\ ,\qquad q:=e^{2\pi i U}\ ,\qquad y_k:=e^{2\pi iA_k}\ .
\end{equation}
If there are bosonic or fermionic zero modes, this definition may need to be modified. Bosonic zero modes might lead to a divergence that needs to be regularized. In the examples we consider below, massless scalars always come from the R-R sector. Since there is no physical string states representing the zero momentum of R-R fields, their contribution is automatically factored out. Fermionic zero modes $\lambda^1,
\lambda^2\ldots$ make the index vanish (unless they carry non-trivial charges $q_k$). In all the examples we will consider, the fermionic zero modes will arise as gauginos, i.e. superpartners of the gauge fields, and thus transforming in the adjoint representation of the spacetime gauge group. The number of neutral fermionic zero modes in this case is equal to the rank of the gauge group. In order to get a non-vanishing quantity, one can absorb these zero modes by inserting them in the trace
\begin{equation} \label{eq:index1} \mathcal{Z}^{V_1 \otimes \bar{V_2}}(\beta, b,v,R, A_k):=\Tr\Big(e^{-\beta H} e^{2\pi i bW}e^{2\pi i vM} e^{2\pi i\sum_k A_kq_k} (-1)^\mathbf{F}\prod_{i}\lambda^i\Big)\ .\end{equation}
We will use the notation $\mathcal{Z}(T, U, A_k)$ throughout this section to refer to the minimal nonvanishing index for each of the theories we study: if the theory has no fermionic zero modes, then $\mathcal{Z}$ indicates \eqref{eq:index0}, while if the theory does have fermionic zero modes, we absorb them as in \eqref{eq:index1}.
There are further modifications to the index which one may want to consider. First, in type II theories, the spacetime fermions may come either from the NS-R or from the R-NS sector. If there are supercharges coming from both of these sectors, then only the ground states will contribute to the index, thus giving a constant. To get a more interesting quantity, one can consider a modified index
\begin{equation} \label{eq:index2} \tilde{\mathcal{Z}}^{V_1 \otimes \bar{V_2}}(\beta, b,v,R, A_k):=\Tr\Big(e^{-\beta H} e^{2\pi i bW}e^{2\pi i vM} e^{2\pi i\sum_k A_kq_k} (-1)^{\mathbf{F}_r}\prod_{i}\lambda^i\Big)\ ,\end{equation}
where the fermion number $(-1)^\mathbf{F}$ is replaced by an operator $(-1)^{\mathbf{F}_r}$ anti-commuting only with, say, states in the right-moving R sector (NS-R and R-R) and commuting with states in the right-moving NS sector (NS-NS and R-NS). Under this definition, the states contributing to the index obey $k^0_r=k^1_r$, but not necessarily $k^0_l=k^1_l$. As above, we use $\tilde{\mathcal{Z}}$ to refer to the minimal nonvanishing (with any fermionic zero modes inserted) modified index for a given theory.
When the string theory has $V_2=V^{f\natural}_-$ as its right-moving SVOA, $\mathcal{Z}, \tilde{\mathcal{Z}}$ evaluate to the 24th powers of the superdenominator and denominator (respectively) of the BKM algebra constructed from the left-moving (S)VOA. We will derive this in detail in \S \ref{sec:hetex1} and \S \ref{sec:IIAex2}, but the basic idea is that $V^{f\natural}$ has 24 states of conformal weight 1/2 in the Ramond sector and none in the NS sector. The contribution from these 24 fermionic ground states is to produce a 24-fold multiplicity of single-string BPS states, resulting in a second-quantized Fock space that has the form of a 24th tensor power. Any of the 24 factors effectively counts contributions from the left-movers, and produces the BKM (super)denominator.
There are other options to modify the index. We could impose anti-periodic boundary conditions on the fermions around the spacelike $S^1$ circle. This corresponds to taking a different quantization for the spacelike momenta $k^1_l$ and $k^1_r$ in the NS-R and R-NS sectors, where $n$ takes values in $\frac{1}{2}+\mathbb{Z}$ instead of $\mathbb{Z}$. We could also impose anti-periodic boundary conditions only on (say) the NS-R fermions and periodic ones on the R-NS fermions. We will not consider these modifications in the rest of the text, and focus on computing the indices in equations \eqref{eq:index1} and \eqref{eq:index2}.
\subsection{The BPS Fock space as an algebra module}
As mentioned in the previous subsection, when the string theory has the right-movers fixed to be $V_2= V^{f\natural}$, the supersymmetric indices \eqref{eq:index1}, \eqref{eq:index2} reproduce the 24th power of the denominator and superdenominator of the BKM associated to the left-movers. The factor of 24 simply comes from the right-moving ground state degeneracy. In fact, the supersymmetric index can be viewed as the graded supercharacter of a certain algebra module for the left-moving BKM superalgebra $\mathfrak{g}$. Let us restrict for simplicity to the case where $\mathfrak{g}$ is bosonic, i.e. with no odd components; the generalization to the case where $\mathfrak{g}$ is a superalgebra is straightforward. Let us consider the usual triangular decomposition as $\mathfrak{g} = \mathfrak{g}^+ \oplus \mathfrak{h} \oplus \mathfrak{g}^-$ in terms of positive and negative roots and the Cartan subalgebra. As discussed below, the module describing the second quantized states is $(\bigwedge \mathfrak{g}^{-})^{\otimes 24}$, 24 copies of the graded sum of all exterior powers of the subalgebra associated to the negative roots. It is well known that for ordinary Lie algebras or Kac-Moody algebras, this is an irreducible $\mathbb{Z}_2$-graded module with highest weight the Weyl vector. It also inherits the weight space grading from $\mathfrak{g}$. In the case of the heterotic string with $V_1 = V^{\natural}$, the BKM algebra $\mathfrak{g}$ is the Monster Lie algebra, and the module was constructed in \cite{PPV1}. We will briefly review its construction and the relation with the second quantized Hilbert space described in section \ref{sec:secondHilb}, and then comment on subtleties in the generalization to our other examples. We will focus on the construction of a single copy of $\bigwedge \mathfrak{g}^-$, since the 24 copies do not interact with one another.
The $\mathfrak{g}$-representation $\bigwedge \mathfrak{g}^-$ can be formally constructed as follows. Recall that $\mathfrak{g}$ is graded by its root lattice $\Phi \subset \mathfrak{h}^*$, $\mathfrak{g} = \bigoplus_{\alpha \in \Phi} \mathfrak{g}_{\alpha}$, and has an invariant bilinear form $(\cdot|\cdot)$ that respects the grading. The basic idea is to built a module $A_\mathfrak{g}$ over the Clifford algebra whose underlying vector space is $\mathfrak{g}$ endowed with $(\cdot|\cdot)$. More precisely, let us consider an algebra
of fermionic operators $\xi_a, \forall a \in \mathfrak{g}$, transforming in the adjoint representation of $\mathfrak{g}$. The fermionic modes satisfy the Clifford algebra
\begin{equation}
\left\lbrace \xi_a, \xi_b \right\rbrace = (a|b)
\end{equation} where the right-hand side vanishes unless, for any $a \in \mathfrak{g}_{\alpha}$, $b \in \mathfrak{g}_{-\alpha}$. Let us define a module $A_\mathfrak{g}$ for this Clifford algebra by considering a space of ground states annihilated by all $\xi_a$ with $a\in \mathfrak{g}^+$, and by acting in all possible ways on such ground states by $\xi_a$, $a\in \mathfrak{h}\oplus \mathfrak{g}^-$. We can view $\mathfrak{g}$ as a subalgebra of the orthogonal algebra $so(\mathfrak{g})$ that preserves the bilinear form $\kappa$, since $\kappa$ is preserved by the adjoint action of the BKM on itself. This Clifford module can be understood as a spinorial representation of the orthogonal algebra $so(\mathfrak{g})$ and hence of its subalgebra $\mathfrak{g}$.
The space of ground states of $A_\mathfrak{g}$ forms a module for the Clifford subalgebra associated with $\mathfrak{h}\subset\mathfrak{g}$. Each of these ground states is a highest weight vector for a representation of $\mathfrak{g}\subset so(\mathfrak{g})$. This immediately shows that, in general, the Clifford module $A_\mathfrak{g}$ is not irreducible as a $\mathfrak{g}$-representation.
In the case of the rank-2 Monster Lie algebra, one has a twofold ground state degeneracy of opposite chirality. Indeed, for general $\mathfrak{g}$ of even rank, the module always splits, as a representation over $so(\mathfrak{g})$, into two spinors of definite chirality. Focusing on the rank-2 case for the moment, it is natural to consider the $\mathfrak{g}$-representation obtained by restricting to a subspace $A_\mathfrak{g}^+$ of definite chirality, which effectively allows us to skirt vacuum degeneracy issues relating to the Cartan operators, as follows. If we take a lightcone decomposition of the Cartan as $\mathfrak{h} = \mathfrak{h}^+ \oplus \mathfrak{h}^-$ such that $\left\lbrace \xi_+, \xi_- \right\rbrace$ = 1 (and all other anticommutators zero), we may define a vacuum
\begin{equation}
\xi_a |0 \rangle = 0, \ \ \ a \in \mathfrak{g}^+ \oplus \mathfrak{h}^+.
\end{equation}
The Clifford module $A_\mathfrak{g}$ is recovered by acting on the vacuum in all possible ways with the $\xi_a, a \in \mathfrak{g}^- \oplus \mathfrak{h}^-$. Next, we consider a chirality operator $(-1)^J$, distinct from the fermion parity operator used in the index definition, which leaves the vacuum invariant but acts on all $\xi_a$ with a minus sign. We project to the positive chirality subspace of our module $A_\mathfrak{g}$, to obtain a graded vector space $A^+_\mathfrak{g}$ isomorphic to $\bigwedge \mathfrak{g}^-$. Namely, to obtain the even powers of $\mathfrak{g}^-$, simply act on the vacuum with an even number of $\xi_{a}, a \in \mathfrak{g}^-$, and to obtain the odd powers, act first with $\xi_-$ on the vacuum, and then with an odd number of $\xi_a$, $a \in \mathfrak{g}^-$.
We stress that the set of modes $\{\xi_a\}$ are different from the set $\{\eta_a\}$ considered in section \ref{sec:secondHilb}: in that case, we exclude the modes corresponding to gravitinos, while here we include all modes. Excluding the gravitinos leads, in the rank-2 case, to a non-degenerate vacuum for the second quantized Fock space. This suggests that the second quantized space is isomorphic to the positive chirality subspace $A^+_\mathfrak{g}$ of the $\xi_a$ Clifford module; as such, it is naturally a representation for the BKM algebra $\mathfrak{g}$. Indeed, the operators $\eta_a$ considered in section \ref{sec:secondHilb} can be identified with the operators $\xi_-\xi_a$, that are even with respect to $(-1)^J$ and carry the same grading with respect to $\Phi\subset \mathfrak{h}^*$.
Implicitly, then, we may imagine that our index can be defined as a trace over the full Clifford module $A_\mathfrak{g}$, with an additional insertion of $(1 + (-1)^J)/2$ in the trace that has so far been suppressed.
With this identification, the space-time fermion number $(-1)^{\mathbf{F}}$ can be defined as an operator acting trivially on the vacuum, commuting with $\xi_-,\xi_+$ and anti-commuting with the other $\xi_a$.
The fact that we have two $\mathbb{Z}_2$ operators to employ in defining our index, $(-1)^J$ and $(-1)^\mathbf{F}$, is special to supersymmetric indices in $0+1$ dimensions. We prove in \cite{PPV1} that the resulting module is indeed a suitable highest weight representation of $\mathfrak{g}$.
A similar construction holds for the more general, higher-rank BKMs we discuss in this paper. In the construction of the second quantized Fock space in section \ref{sec:secondHilb}, we consider oscillators $\eta_a$ at zero momentum only when they correspond to the zero momentum limit of `propagating' massless degrees of freedom, while we exclude the modes that exist only at zero momentum, i.e. the two gravitinos. The space spanned by the gravitino zero modes correspond to a subspace of signature $(1,1)$ in the Cartan subalgebra of $\mathfrak{g}$. In particular, gravitinos can be associated to a pair of fermionic modes $\xi_+,\xi_-$ obeying $\{\xi_\pm,\xi_{\pm}\}=0$, $\{\xi_+,\xi_-\}=1$. The other elements of the Cartan subalgebra now correspond to gaugino zero modes, which we absorb in the definition of the index. Once again, the second quantized Fock space can be identified with the positive chirality subspace $A^+_\mathfrak{g}$ of the $\xi_a$-Clifford module $A_\mathfrak{g}$, where the $\eta_a$ operators correspond to the generators $\xi_-\xi_a$ of the even Clifford algebra. For a BKM of even rank $r$, the Clifford module $A_\mathfrak{g}$ has ground state degeneracy $2^{r/2}$, where each chirality $A^\pm_\mathfrak{g}$ of the orthogonal algebra splits as $A^\pm_\mathfrak{g}\cong (\bigwedge \mathfrak{g}^-)^{\oplus 2^{r/2-1}} $ into $2^{r/2 - 1}$ representations of $\mathfrak{g}$, each isomorphic (as a graded vector space) to $\bigwedge \mathfrak{g}^-$.
The separation between the gauginos and gravitinos zero modes looks unnatural from the algebra point of view, since the adjoint action of $\mathfrak{g}$ can rotate the $\xi_+,\xi_-$ operators into any other $\xi_a$, $a\in \mathfrak{h}$. In fact, the distinction between propagating and non-propagating zero modes makes sense only in the decompactification limit, where the radius $R$ of the circle $S^1$ goes to infinity. When the rank of the algebra is greater than $2$, there are different decompactification limits, which correspond to different choices of a null direction of the Cartan subalgebra.
We therefore have the option of defining the full BPS Fock space using the full module $A_\mathfrak{g}$ of the Clifford algebra, including both chiralities of the spinorial rep of $so(\mathfrak{g})$. This necessitates absorbing the gravitino modes to get a nonzero index. Alternatively, we may project onto a single chirality $A^+_\mathfrak{g}$ of the spinorial rep, as we did with the Monster. As a graded vector space, the resulting chiral representation is isomorphic to the second quantized Fock space obtained from ignoring the gravitino zero modes. This is simpler and seems natural from the physical viewpoint, in particular if one sees the superstring model as a $(1+1)$-dimensional theory on the cylinder. The downside of privileging the gravitinos relative to the gauginos in this way is that it requires choosing a null direction in the Cartan subalgebra, viewed as a space of rank $(1, r-1)$. The resulting BKM algebra action on the Fock space module is rather unnatural.
\subsection{Heterotic strings on $V\otimes \bar V^{f\natural}$}\label{sec:hetex1}
Let us now apply the general formalism described in \S\ref{sec:secondHilb} to some specific superstring models.
As a first example, let us consider the heterotic string on $V_L\otimes \bar V^{f\natural}_+$, where $V_L$ is a lattice VOA for one of the $24$ Niemeier lattices $L$ and contains $N$ currents. The massless content of the theory is: \footnote{Notation: each massless string state is the tensor product of a chiral and an anti-chiral physical state, which in turn are in one-to-one correspondence with, respectively, a left-moving weight $1$ state and a right-moving weight $1/2$ state is the internal CFT: $\nu^a$, $a=1,\ldots,N$ corresponds to a current in $V$; $\bar \upsilon_+^i$, $i=1,\ldots, 24$ correspond to the $24$ Ramond ground states in $\bar V^{f\natural}$; $\alpha_{++}, \alpha_{--}, \bar \psi_{++},\bar\psi_{--}$ correspond to the light-cone components of $\partial X^\mu$ and $\bar\psi^\mu$ from the sigma model with target $\mathbb{R}^{1,1}$. The $+$ and $-$ subscripts keep track of the action of the $SO(1,1)$ spacetime Lorentz group: each $+$ or $-$ is $\pm 1/2$ in the spin; spacetime parity exchanges $+$ and $-$.}
\begin{itemize}
\item Graviton $\alpha_{++}\bar \psi_{++}$ and $\alpha_{--}\bar\psi_{--}$; B-field $\alpha_{++}\bar \psi_{--}-\alpha_{--}\bar \psi_{++}$; dilaton $\alpha_{++}\bar \psi_{--}+\alpha_{--}\bar \psi_{++}$. These states are non-physical, except for $k=0$.
\item $24$ chiral gravitinos $\alpha_{++}\bar \upsilon^i_+$ (spin $+3/2$); $24$ anti-chiral dilatinos $\alpha_{--}\bar \upsilon^i_+$ (spin $-1/2$). These states are also only physical for $k=0$.
\item $N$ gauge vectors $A^a=\nu^a\bar \psi_{++}$, $\nu^a\bar \psi_{--}$. These states are only physical for $k=0$.
\item $24N$ chiral gauginos $\lambda^{ai}=\nu^a \bar \upsilon^i_+$ (spin $1/2$); these states are physical for all $k$ with $k^2=0$ (they are the only massless propagating degrees of freedom).
\end{itemize} The $N$ gauge vectors $A^a$ correspond to a semi-simple Lie algebra $g$ of dimension $N$; the propagating gauginos $\lambda^{ai}$ form $24$ copies of the adjoint representation for $g$.
The zero momentum modes of the gauginos form a Clifford algebra, and the ground states of our second quantized Hilbert space must form a module over this Clifford algebra. The full Clifford algebra is a direct sum of $24$ copies of the Clifford algebra generated by a single set (i.e. a fixed $i$, say $i=1$) of $N$ gauginos $\lambda^{ai}$, $a=1,\ldots,N$. The Clifford module of ground states, therefore, is the tensor product of $24$ copies of the Clifford module for a single set of gauginos. Thus, we can focus on one of these sets and simply take the tensor product at the end.
We choose a Cartan subalgebra $h\subset g$ and take a triangular decomposition $g=g^-\oplus h\oplus g^+$. We have an associated decomposition of the gauginos zero modes into a Cartan subspace plus the positive and negative roots subspaces. We turn on non-trivial Wilson lines $y_1,\ldots,y_r$, where $r=\rank g$ (for the theories we are considering we always have $r=24$) for the gauge vectors $A_a$ in the Cartan subalgebra, under which the gauginos in $g^-\oplus g^+$ are charged.
To get a non-vanishing supersymmetric index, one needs to absorb the zero modes of the neutral $\lambda^{ai}$, i.e. the ones in the Cartan subalgebra. The ground states of the Hilbert space live in a tensor product of a Clifford module for the `Cartan' gauginos times a Clifford module for the $g^+\oplus g^-$ gauginos. After absorbing the zero modes, the trace over the `Cartan' Clifford module just gives a non-zero constant, which, with the appropriate normalization, can be taken to be $1$. Thus, we can just focus on the factor corresponding to the Clifford module for $g^+\oplus g^-$. The latter module can be constructed by starting from a state (a highest weight vector) annihilated by all gauginos in $g^-$ and then acting in all possible ways with the gauginos in $g^+$. The ground state contribution to the supersymmetric index is a trace $\Tr((-1)^\mathbf{F} \prod y_i^{q_i})$ over this module, where $q_i$ are the charges with respect to the background gauge fields in the Cartan torus. The final result is the Weyl denominator of the algebra $g$
\begin{equation}\label{Weylden} y^{-\rho_g}\prod_{\alpha\in \Delta_g^+}(1-y^\alpha)\ ,
\end{equation} where $\Delta^+_g$ are the positive roots of the Lie algebra $g$ and $\rho_g$ is the charge of the lowest weight vector, which equals the Weyl vector of the Lie algebra $g$. (We implicitly use the notation that $y^\alpha$ for any vector $\alpha$ is shorthand for $\prod_k y_k^{\alpha_k}$).
Note that there are $24$ copies of this set of gauginos, and hence one needs to take the $24$th power of this Weyl denominator in computing the index.\footnote{The ground states of the second quantized Hilbert space must form a representation of the gauge algebra $g$. It is clear what kind of representation this is: one considers the group $G$, the adjoint group of $g$, as a subgroup of the orthogonal group $SO(g)$ acting on the vector space of the algebra $g$, and preserving the Cartan Killing form. The gauginos form a vector representation for $SO(g)$. The ground states form a module for the Clifford algebra associated with the vector space underlying $g$, so they form a spinorial representation of $Spin(g)$, the universal cover of $SO(g)$. The group $G$ being a subgroup of $SO(g)$ lifts to a subgroup of $Spin(g)$, and this determines the representation of $G$ on the ground states.}
The full supersymmetric index is given by multiplying this trace over the ground states by the contributions of the positive energy oscillators. For $k\neq 0$, the BRST quantization of the string is equivalent to the light-cone quantization, so that the classes in $\mathsf{H}^2(k_l,k_r)$ are in one-to-one correspondence with states in the internal CFT $V_L\otimes \bar V^{f\natural}_+$ satisfying the physical state conditions \begin{equation} L_0-1=-(k_l)^2/2\ ,\qquad \qquad \bar L_0-\frac{1}{2}=-(k_r)^2/2\ .\end{equation} The BPS condition forces $(k_r)^2=0$, and since $V^{f\natural}_+$ contains no NS states with weight $1/2$, all BPS states come from the Ramond sector and are therefore spacetime fermions. This means that the corresponding operators $\eta_a$ obey a free fermion oscillator algebra.
In order to count the number of such oscillators, let us consider the `flavoured' partition function for the lattice VOA $V_L$
$$ Z_{V_L}(\tau,\xi):=\Tr_{V_L}(\mathsf{q}^{L_0-\frac{c}{24}} e^{2\pi i \sum_k \xi_kq_k})\ .
$$ Here, $\xi\equiv(\xi_1,\xi_2,\ldots)$ are chemical potentials, and $q_k$ are the weights with respect to the Lie algebra generated by the zero modes of the $N$ currents in $V_L$; as the notation suggests, these are also the charges of the corresponding physical string states with respect to the background gauge fields $A=(A_1,A_2,\ldots)$. For a lattice VOA $V_L$ based on the Niemeier lattice $L$, this is given by
\begin{equation} Z_{V_L}(\tau,\xi)=\frac{\Theta_L(\tau,\xi)}{\eta(\tau)^{24}}=\sum_{n\in \mathbb{Z},\ell\in \mathbb{Z}^{24}} c(n,\ell)\mathsf{q}^ne^{2\pi i\sum_k \xi_k\ell_k}\ ,
\end{equation} where $\Theta_L$ is the `flavoured' lattice theta series
\begin{equation} \Theta_L(\tau,\xi)=\sum_{\ell\in \mathbb{Z}^{24}} \mathsf{q}^{\frac{1}{2}\sum_{j,k}\ell_j\ell_k\mu_j\cdot \mu_k} e^{2\pi i\sum_k \xi_k\ell_k}\ ,
\end{equation} where $\mu_1,\ldots,\mu_{24}$ is a basis of $L$.
Let us first express the ground state factor \eqref{Weylden} in terms of the Fourier coefficients $c(n,\ell)$ of the partition function $Z_{V_L}(\tau,\xi)$. The number of currents in $V$ is
$$ N=\sum_{\ell\in \mathbb{Z}^{24}} c(0,\ell)\ ,
$$ and the rank of the algebra is $c(0,0)$, which is always equal to $24$ for $L$ a Niemeier lattice. The set of roots $\{\lambda\in L,\ \lambda^2=2\}$ correspond to the roots of the algebra $g$, and can accordingly be written as the disjoint union of the sets of positive or negative roots. For $\ell\in \mathbb{Z}^{24}$ such that $\lambda=\sum_i\ell_i\mu_i$ is a root, we write $\ell>0$ or $\ell<0$ depending on whether $\lambda$ is positive or negative. The ground state contribution to the index \eqref{Weylden} can thus be written as,
\begin{equation} y^{-24\rho}\prod_{\ell>0}(1-\prod_{i=1}^{24} y_i^{\ell_i})^{24c(0,\ell)},
\end{equation} where for each $\ell\neq 0$, $c(0,\ell)$ is either $1$ (if the vector $\sum_i\ell_i\mu_i$ has length $2$) or $0$ (otherwise).
For the contribution of positive energy string oscillators to the second-quantized index, we note that, for BPS states of winding and momentum $(w,m)$, one has $-(k_l)^2/2=mw$. Therefore, the number of BPS single string states of winding-momentum $(w,m)$ and charge vector $\ell\equiv (\ell_1,\ldots,\ell_{24})$ is $24c(mw,\ell)$ (the factor $24$ comes from the fact that there are $24$ Ramond ground states in $V^{f\natural}$). The positive energy condition $E=\frac{1}{\sqrt{2}}(\frac{m}{R}+wR)>0$ in the large radius regime $R>1$ is satisfied for $w> 0, m\in \mathbb{Z}$ (the only possible state with $m<0$ is $m=-1,w=1$) or for $w=0, m>0$. Therefore, the contribution from positive energy oscillators is
\begin{equation} \prod_{m>0}\prod_{\ell\in\mathbb{Z}^{24}}(1-q^m\prod_{i=1}^{24} y_i^{\ell_i})^{24c(0,\ell)}\prod_{w>0,m\in \mathbb{Z}}\prod_{\ell\in\mathbb{Z}^{24}}(1-p^wq^m\prod_{i=1}^{24} y_i^{\ell_i})^{24c(mw,\ell)}\ .
\end{equation} Altogether, we find the index can be written as,
\begin{equation}\label{hetVLind} \mathcal{Z}^{V_L \otimes \bar{V}^{f\natural}_+}(T, U, A_k)= p^{N-24}q^{N}y^{-24\rho}\prod_{\substack{m,w\in\mathbb{Z},\ell\in \mathbb{Z}^{24}\\(m,w,\ell)>0}}(1-p^wq^m\prod_{i=1}^{24} y_i^{\ell_i})^{24c(mw,\ell)},
\end{equation} where $(m,w,\ell)>0$ means $w\ge 0$, with $m\ge 0$ if $w=0$, and with $\ell>0$ if $m=w=0$. The winding-momentum $(w_0, m_0)$ of the ground states is computed in appendix \ref{s:Bfield} and is given by $w_0=N-24$ and $m_0=N$. This index is equal to the $24$th power of the denominator for the BKM algebra constructed from any Niemeier lattice VOA, which is known as the fake Monster Lie algebra \cite{BorcherdsFake,BorcherdsMM}.
This algebra denominator turns out to be equal to the automorphic form $\Phi_{12}$ \cite{Gritsenko:2012qn}, whose appearance in string theory has been explored earlier \cite{phi12}. $\Phi_{12}$ enjoys 24 expansions associated to 24 ``Niemeier cusps" in moduli space corresponding to the 24 complementary constructions of the BKM.
The fact that there is a unique BKM algebra associated with all the $24$ VOAs $V_L$ associated with a Niemeier lattice $L$ is not a coincidence. Indeed, the (non-chiral) CFTs obtained as the product of any of the $V_L$ with the CFT of a single free boson on a circle $S^1$ are all equivalent to each other. These CFTs admit a uniform description as theories of $25$ chiral and $1$ anti-chiral free boson compactified on the unique even unimodular lattice $\Gamma^{25,1}$ of signature $(25,1)$. The Narain moduli space of this CFT is $O(25)\times O(1)\backslash O(25,1)/O(25,1,\mathbb{Z})$, and is spanned by the radius $R$ and the Wilson lines $(A_1,\ldots, A_{24})$. The different descriptions of this theory as a product $S^1\times V_L$ correspond to the $24$ inequivalent ways of writing the lattice $\Gamma^{25,1}$ as an orthogonal sum of a Niemeier lattice and a unimodular lattice of signature $(1,1)$. These descriptions are related to one each other by the action of the T-duality group $O(25,1,\mathbb{Z})$, which mixes the radius and the Wilson line moduli, as well as the winding-momentum $(w,m)$ with the gauge charges $q_k$.
In general, if we turn off some of the Wilson lines (i.e. set $y_i=1$ for some $i$), the index vanishes because of the zero modes of some combination of gauginos in $g^+\oplus g^-$. The only exception is when $V_L$ is the VOA associated with the Leech lattice $L=\Lambda$, where $g$ is the abelian algebra $u(1)^{\oplus 24}$ and $c(0,\ell)=0$ for all $\ell\neq 0$. In this case, we can turn off all Wilson lines, and by setting
\begin{equation} c(n)=\sum_\ell c(n,\ell),
\end{equation} such that $c(n)$ are the Fourier coefficients of
\begin{equation} Z_{V_\Lambda}(\tau,0)=\frac{\Theta_\Lambda(\tau,0)}{\eta(\tau)^{24}}=J(\tau)+24=\sum_{n\in \mathbb{Z}} c(n)q^n=q^{-1}+24+196884q+\ldots\ ,
\end{equation}
the index reduces to
\begin{equation} \mathcal{Z}^{V_{\Lambda} \otimes \bar{V}^{f\natural}_+}(T, U, A_k=0)= \left (q\prod_{m>0}(1-q^m)^{c(0)}\prod_{w>0,m\in \mathbb{Z}}(1-p^wq^m)^{c(mw)}\right )^{24}.
\end{equation} Recall the Koike-Norton-Zagier identity
\begin{equation} p^{-1} \prod_{w>0,m\in \mathbb{Z}\setminus\{0\}}(1-p^wq^m)^{c(mw)}=J(\sigma)-J(\tau)
\end{equation} which can be interpreted as the denominator identity for the Monster BKM algebra \cite{BorcherdsMM}. Multiplying this factor by the $w=0$ and the $m=0$ parts yields
\begin{eqnarray} \nn \mathcal{Z}^{V_{\Lambda} \otimes \bar{V}^{f\natural}_+}(T, U, 0)&=&\left (q\prod_{m>0}(1-q^m)^{c(0)}\right ) \left (p\prod_{w>0}(1-p^w)^{c(0)}\right )\\ \nonumber
& & \times \, p^{-1} \prod_{w>0,m\in \mathbb{Z}\setminus\{0\}}(1-p^wq^m)^{c(mw)}\\ \nonumber
&=&\eta(\tau)^{24}\eta(\sigma)^{24}(J(\sigma)-J(\tau))\\
&=&\eta(\tau)^{24}\Theta_\Lambda(\sigma)-\eta(\sigma)^{24}\Theta_\Lambda(\tau)\ ,
\end{eqnarray} which is the denominator of the fake Monster Lie algebra \cite{BorcherdsFake}.
This construction should generalize straightforwardly to all $71$ self-dual VOAs $V$ with $c=24$. When we compactify one further direction on a circle $S^1$, we expect many non-trivial equivalences between these different models, as is the case for the $24$ Niemeier lattice VOAs $V_L$. It is known \cite{Hohn2017,Chigira2021} that there are only $11$ isomorphism classes of holomorphic vertex algebras of central charge $26$ of the form $V_{\Gamma^{1,1}}\otimes V$, where $V_{\Gamma^{1,1}}$ is the lattice vertex algebra based on the even unimodular lattice of signature $(1,1)$ and $V$ is a self-dual VOA of central charge $24$ with currents. In particular, the $24$ VOAs $V_{\Gamma^{1,1}}\otimes V_L$ are all isomorphic to each other; the proof is similar to the one showing that the (non-chiral) CFTs on $S^1\otimes V_L$ are all isomorphic. Conjecturally, there is only one additional isomorphism class $V_{\Gamma^{1,1}}\otimes V$ where $V$ is a self-dual VOA of $c=24$ \emph{without} currents -- it is the case where $V=V^\natural$ is the Monster VOA \cite{FLM}. From each of these isomorphism classes of vertex algebras, one can define a BKM algebra using Borcherds' construction based on chiral bosonic string theory compactified on $V_{\Gamma^{1,1}}\otimes V$; see \cite{BorcherdsFake,BorcherdsMM, HS1,HS2,Creutzig2007,Moller2021} for explicit descriptions and denominator identities.\footnote{These references describe $10$ out of $12$ distinct BKM algebras; N. Scheithauer informed us that he calculated the denominator identities for the two remaining cases (unpublished).} It is natural to conjecture that by tensoring any self-dual VOA of $c=24$ with the bosonic (non-chiral) CFT on a circle $S^1$, one gets one of precisely $12$ distinct CFTs of left and right central charges $(25,1)$. If this is correct, then there are only $12$ inequivalent compactifications of the heterotic string of the form $(V\otimes \bar V^{f\natural})\otimes S^1$. Our construction shows that the corresponding second quantized indices $\mathcal{Z}$ are just the (24th powers of the) denominators of the $12$ associated BKM algebras.
\subsection{Type IIA strings on $V\otimes \bar V^{f\natural}$}\label{sec:IIAex2}
\label{IIAVfnatural}
Now we consider the type IIA string compactified on $V\otimes \bar V^{f\natural}_-$, where $V$ is one of the self-dual $\mathcal{N}=1$ SVOAs with $c=12$.\footnote{Note that in these type IIA examples we take $V^{f\natural}_-$ as the right-moving internal SVOA, while for the heterotic examples we took $V^{f\natural}_+$. The reason is that in heterotic string theory the GSO projection restricts to the right-moving R$_+$ sector, while in the type IIA string the projection is onto the right-moving R$_-$ sector. Our choice then corresponds to having $24$ gravitinos with positive chirality in all examples.} We assume that $V$ contains $\chi^{\rm NS}$ states of weight $1/2$ in the NS sector, $\chi^{\rm R}_+$ states of weight $1/2$ in the R$_+$ sector and $\chi^{\rm R}_-$ states in the R$_-$ sector. These VOA states correspond to massless physical states in the chiral cohomology, denoted, respectively, by $\nu^a$, $a=0,\ldots,\chi^{\rm NS}$, $\upsilon^i_+$, $i=1,\ldots,\chi^{\rm R}_+$, $\upsilon^i_-$, $i=1,\ldots,\chi^{\rm R}_-$. As discussed in \S \ref{sec:models}, we distinguish between the two cases $V=V^{f\natural}_\pm$ which have $24$ Ramond ground states in the R$_\pm$ sector. The anti-holomorphic $\bar V^{f\natural}_-$ contains $24$ Ramond ground states in the R$_-$ sector corresponding to anti-chiral physical states $\bar \upsilon^i_+$, $i=1,\ldots,24$. The subscripts $+$ or $-$ on the Ramond states $\upsilon^i_\pm$ and $\bar \upsilon^i_+$ refer to the spin with respect to the $SO(1,1)$ spacetime Lorentz group; note that the type IIA GSO projection identifies the sign of the spacetime spin with the internal fermion number in the holomorphic Ramond sector, and with the opposite of the fermion number in the anti-holomorphic Ramond sector. Additionally, there are the left and right-moving states arising from the $\mathcal{N}=(1,1)$ supersymmetric non-linear sigma model with target $\mathbb{R}^{1,1}$. The massless single string states are:
\begin{itemize}
\item Gravitons $\psi_{++}\bar \psi_{++}$ and $\psi_{--}\bar\psi_{--}$; B-field $\psi_{++}\bar \psi_{--}-\psi_{--}\bar \psi_{++}$; dilaton $\psi_{++}\bar \psi_{--}+\psi_{--}\bar \psi_{++}$. These states are non-physical, except for $k=0$.
\item $(24+\chi^{\rm R}_+)$ chiral gravitinos $\psi_{++}\bar \upsilon^i_+$, $i=1,\ldots,24$, and $\upsilon^i_+\bar\psi_{++}$ $i=1,\ldots \chi^{\rm R}_+$ (spin $+3/2$); $\chi^{\rm R}_-$ antichiral gravitinos $\upsilon^i_-\bar\psi_{--}$ $i=1,\ldots \chi^{\rm R}_-$ (spin $-3/2$); $(24+\chi^{\rm R}_+)$ anti-chiral dilatinos $\psi_{--}\bar \upsilon^i_+$, $i=1,\ldots,24$ and $\upsilon^i_+\bar\psi_{--}$ $i=1,\ldots \chi^{\rm R}_+$ (spin $-1/2$); $\chi^{\rm R}_-$ chiral dilatinos $\upsilon^i_-\bar\psi_{++}$ $i=1,\ldots \chi^{\rm R}_-$ (spin $+1/2$). These states are only physical for $k=0$.
\item $\chi^{\rm NS}$ gauge vectors $A^a=\nu^a\bar \psi_{++}$, $\nu^a\bar \psi_{--}$ from the NS-NS sector. These states are only physical for $k=0$.
\item From the R-R sector, $24\chi^{\rm R}_+$ states $\upsilon^i_+\bar \upsilon^j_+$, $i=1,\ldots, \chi^{\rm R}_+$, $j=1,\ldots, 24$ corresponding to derivatives $\partial_+ \phi^{ij}$ of scalar chiral fields $\phi^{ij}$ with $\partial_-\phi^{ij}=0$, and $24\chi^{\rm R}_-$ states $\upsilon^i_-\bar \upsilon^j_+$, $i=1,\ldots, \chi^{\rm R}_-$, $j=1,\ldots, 24$, corresponding to field strengths of $U(1)$ vectors. When the theory is uncompactified, only the scalar fields have propagating degrees of freedom. When we compactify the space direction on a circle $S^1$, the equations of motion force the scalars to carry no winding along $S^1$, while the vectors can carry winding but not momentum. There are no physical string states representing the zero modes of the scalars or of the vectors -- this is standard for R-R bosons. See appendix \ref{app:0mom} for more detail.
\item $24\chi^{\rm NS}$ chiral gauginos $\lambda^{ai}=\nu^a \bar \upsilon^i_+$ (spin $1/2$) from the NS-R sector; these states are physical for all $k$ with $k^2=0$ (massless propagating degrees of freedom).
\end{itemize}
In total the spacetime theory has $(\chi^R_-,24+\chi^{\rm R}_+)$ SUSY. When we compactify the space direction on a circle $S^1$, the corresponding supercharges obey slightly different algebras then presented previously:
\begin{itemize}
\item The `standard' $(0,24)$ supercharges $\mathcal{Q}^i_{r-}$ from the NS-R gravitinos $\psi_{++}\bar \upsilon^i_+$ obey the algebra
\begin{equation} \{\mathcal{Q}^i_{r-},\mathcal{Q}^j_{r-}\}=\delta^{ij}(P^0_r-P^1_r)\ .
\end{equation}
\item The $(0,\chi^{\rm R}_+)$ supercharges $\mathcal{Q}^i_{l-}$ from the R-NS gravitinos $\upsilon^i_+\bar\psi_{++}$ obey the algebra
\begin{equation} \{\mathcal{Q}^i_{l-},\mathcal{Q}^j_{l-}\}=\delta^{ij}(P^0_l-P^1_l)\ .
\end{equation} Note that here only left-moving momenta appear, while in the previous equation we had only right-moving momenta. In the uncompactified theory, one has $P^0_l=P^0_r$ and $P^1_l=P^1_r$ and the algebra is the same; in the compactified theory $P^1_l$ and $P^1_r$ are independent operators.
\item The $(\chi^{\rm R}_-,0)$ supercharges $\mathcal{Q}^i_{l+}$ from the R-NS gravitinos $\upsilon^i_-\bar\psi_{--}$ obey the algebra
\begin{equation} \{\mathcal{Q}^i_{l+},\mathcal{Q}^j_{l+}\}=\delta^{ij}(P^0_l+P^1_l)\ .
\end{equation}
\end{itemize}
Now we are going to discuss the computation of the supersymmetric indices defined in equations \eqref{eq:index1}, \eqref{eq:index2} for these theories.
Since the time direction is always uncompactified, we have $P^0_l=P^0_r$. The spacetime index $\mathcal{Z}$ gets contributions only from states that are annihilated by all the supercharges. Since the $24$ supercharges $\mathcal{Q}^i_{r-}$ are always present, this implies that $k^1_r=k^0_r=k^0_l$. If $\chi^{\rm R}_+\neq 0$, then the states contributing to $\mathcal{Z}$ have momenta satisfying
\begin{equation}\label{kayplus} k^1_r=k^0_r=k^0_l=k^1_l\ ,
\end{equation} which means that they cannot have any winding around the circle $S^1$, so that the index is independent of $T$. If $\chi^{\rm R}_-\neq 0$, we get the condition
\begin{equation}\label{kayminus} k^1_r=k^0_r=k^0_l=-k^1_l
\end{equation} which implies that states contributing to the index cannot carry any units of momentum along $S^1$, and $\mathcal{Z}$ is independent of $U$.
If both $\chi^{\rm R}_+$ and $\chi^{\rm R}_-$ are not zero (this happens if $V=V^{fE_8}$) then the only states contributing are the ones with zero momentum
\begin{equation}\label{kayboth} k^0_l=k^0_r=k^1_l=k^1_r=0\ ,
\end{equation} so the index is just a number.
As we will show below, the supersymmetric index $\mathcal{Z}^{V\otimes \bar V^{f\natural}_-}$ (\ref{eq:index1}) and the modified index $\tilde{\mathcal{Z}}^{V\otimes \bar V^{f\natural}_-}$ (\ref{eq:index2}) reproduce, respectively, the superdenominator and the denominator of the BKM superalgebra corresponding to $V$. Passing from $\mathcal{Z}$ to $\tilde{\mathcal{Z}}$ amounts to inserting a `left-moving' spacetime fermion number $(-1)^{\mathbf{F}_l}$ in the trace, which acts by $-1$ on the left-moving Ramond and by $+1$ on the left-moving NS sector. With this insertion, the states contributing to $\tilde{\mathcal{Z}}$ are the ones that are annihilated by the $24$ supercharges $\mathcal{Q}^i_{r-}$ from the NS-R gravitinos $\psi_{++}\bar \upsilon^i_+$. Thus, the only condition is
\begin{equation} k^0_l=k^0_r=k^1_r\ ,
\end{equation} with no constraints on $k^1_l$. Indeed, all the other supercharges do not commute with the operator $(-1)^{\mathbf{F}_l}$, so there are no cancellations between states that are related by these supersymmetries. Then $\tilde{\mathcal{Z}}$ will in general be a function of both $T$ and $U$ for all algebras. This is indeed what happens for the algebra denominators.
The only propagating massless fermions are the $24\chi^{\rm NS}$ chiral gauginos $\lambda^{ai}$, that are the superpartners of the gauge vectors $A^a$. The gauge algebra $g^{\oplus 24}$ consists of $24$ copies of a $\chi^{\rm NS}$-dimensional Lie algebra $g$. Therefore, when $\chi^{\rm NS}\neq 0$, we can consider Wilson lines corresponding to the Cartan generators of $g$. Furthermore, in order to get a non-vanishing result for the index, one needs to absorb the zero modes of the gauginos corresponding to Cartan generators, which are neutral under the Wilson lines. This situation occurs when $V=V^{fE_8}$ ($\chi^{\rm NS}=8$) and for $V=F_{24}$ ($\chi^{\rm NS}=24$).
Let us now consider a case by case analysis of the three possibilities for $V$.
\begin{enumerate}
\item For $V=V^{f\natural}_+$ (or $V=V^{f\natural}_-$) one has $\chi^{\rm R}_+\neq 0$ and $\chi^{\rm NS}=\chi^{\rm R}_-=0$ (resp., $\chi^{\rm R}_-\neq 0$ and $\chi^{\rm NS}=\chi^{\rm R}_+=0$), so the index $\mathcal{Z}$ receives contributions only from states with $w=0$ (resp., $m=0$) and therefore is a function of $U$ only (resp., of $T$ only). This fits with the fact that the superdenominator of the Conway superalgebra associated with $V^{f\natural}$ depends on one variable only (see equation 4.30 and the surrounding discussion in \cite{Harrison:2018joy}). The two cases $V=V^{f\natural}_+$ and $V=V^{f\natural}_-$ are related by exchanging winding and momentum along $S^1$, i.e. by T-duality along this circle; this fits with the idea that T-duality is a `left-moving parity' exchanging the left-moving R$_+$ and R$_-$ sectors while keeping the right-moving sectors fixed. The conditions \eqref{kayplus} (or \eqref{kayminus}) on momenta imply that only propagating massless states contribute to the index. The only such states are the $24^2$ massless bosons in the R-R sector; they are either scalars carrying only momentum for $V=V^{f\natural}_+$, or vectors carrying only winding number for $V=V^{f\natural}_-$. The index is therefore
\begin{equation} \mathcal{Z}^{V^{f\natural}_+ \otimes \bar{V}^{f\natural}_-}(U)=\Bigl(q^{-1}\prod_{m=1}^\infty\frac{1}{(1-q^m)^{24}}\Bigr)^{24}=\left(\frac{1}{\eta^{24}(U)}\right)^{24},
\label{ConwaydenomVplus}
\end{equation}
\begin{equation} \mathcal{Z}^{V^{f\natural}_- \otimes \bar{V}^{f\natural}_-}(T)=\Bigl(p^{-1}\prod_{w=1}^\infty\frac{1}{(1-p^w)^{24}}\Bigr)^{24}=\left(\frac{1}{\eta^{24}(T)}\right)^{24},
\label{ConwaydenomVminus}
\end{equation}
that are indeed the $24$-th power of the superdenominator of Conway BKM superalgebra \cite{Harrison:2018joy}.
The modified index $\tilde{\mathcal{Z}}$ receives contributions from both massive and massless states with $k^0_r=k^1_r$. Let $c_{NS}(n)$ and $c_R(n)$ be the multiplicities of the GSO projected NS and R states in the internal SVOA $V$ at level $L_0-\frac{1}{2}=n$ -- these multiplicities are the same for both $V^{f\natural}_{-}$ and $V^{f\natural}_{+}$. For winding and momenta $m$, $w$, we have $24c_{NS}(mw)$ fermions from the NS-R sector and $24c_{R}(mw)$ bosons from the R-R sector. The multiplicities are non-zero only for $mw\ge 0$, and the positive energy condition $E=\frac{1}{\sqrt{2}}(\frac{m}{R}+wR)>0$ implies that $m,w\ge 0$. As discussed above, the $24c_R(0)=24^2$ massless bosons must have $w=0$ for $V=V^{f\natural}_+$ or $m=0$ for $V=V^{f\natural}_-$. The product $(-1)^\mathbf{F}(-1)^{\mathbf{F}_l}=(-1)^{\mathbf{F}_r}$ of spacetime fermion number $(-1)^\mathbf{F}$ and the `left-moving' fermion number $(-1)^{\mathbf{F}_l}$ acts by a minus sign on all of these states. The final result for the modified index is therefore
\begin{equation} \tilde{\mathcal{Z}}^{V^{f\natural}_+ \otimes \bar{V}^{f\natural}_-}(T, U)=\Bigl(q^{-1}\prod_{m=1}^\infty\frac{1}{(1+q^m)^{24}}\prod_{w=1}^\infty \frac{(1-p^wq^m)^{c_{NS}(mw)}}{(1+p^wq^m)^{c_{R}(mw)}}\Bigr)^{24},
\end{equation}
\begin{equation}\label{modindVmVm} \tilde{\mathcal{Z}}^{V^{f\natural}_- \otimes \bar{V}^{f\natural}_-}(T, U)=\Bigl(p^{-1}\prod_{w=1}^\infty\frac{1}{(1+p^w)^{24}}\prod_{m=1}^\infty \frac{(1-p^wq^m)^{c_{NS}(mw)}}{(1+p^wq^m)^{c_{R}(mw)}}\Bigr)^{24}.
\end{equation}
These are indeed the $24$-th power of the superalgebra denominator (as computed in \cite{Harrison:2018joy}).
\item When $V=F_{24}$, we have $\chi^{\rm NS}=24$ and $\chi^{\rm R}_+=\chi^{\rm R}_-=0$. Thus, for both the index and the modified index, the states giving non-zero contribution to the trace may carry any value of winding and momentum. To be precise, there are $8$ different string models, depending on the choice of a $\mathcal{N}=1$ supercurrent for $F_{24}$ (as described in \S \ref{sec:models}.) Each choice is associated with a semi-simple Lie algebra $g$ of dimension $24$; $g$ is also the algebra of gauge symmetries in spacetime for the corresponding model. One can turn on $r$ Wilson lines for these gauge fields where $r$ is the rank of the algebra. We are left with $r$ neutral massless gauginos that need to be absorbed in order to get a non-zero result. The treatment of the massless modes is completely analogous to the case of heterotic strings with $N$ currents that we saw in the previous section. The only difference is that in this case we have massive BPS bosons, while in the heterotic case all BPS states were fermions. Let us denote by $c_{NS}(n,\lambda)$ and $c_R(n,\lambda)$ the GSO projected NS and Ramond multiplicities of states in the internal CFT $F_{24}$ with level $L_0-\frac{1}{2}=n$ and charge $\lambda$ with respect to the algebra $g$. The result for the index is then
\begin{eqnarray}\label{F24ind1} \mathcal{Z}^{F_{24} \otimes \bar{V}^{f\natural}_-}&=&\Bigl( pqy^{-\rho} \prod_{\lambda \in \Delta^+_g} (1-y^{\lambda})^{c_{NS}(0,\lambda)} \prod_{\substack{m,w=0\\(m,w)\neq (0,0)}}^{\infty}\prod_{\lambda\in \Delta^g} \frac{(1-p^wq^my^{\lambda})^{c_{NS}(mw,\lambda)}}{(1-p^wq^my^{\lambda})^{c_{R}(mw,\lambda)}} \Bigr)^{24},
\nonumber \\
\end{eqnarray} and for the modified index
\begin{eqnarray}\label{F24ind2} \tilde{\mathcal{Z}}^{F_{24} \otimes \bar{V}^{f\natural}_-}&=&\Bigl( pqy^{-\rho} \prod_{\lambda \in \Delta^+_g} (1-y^{\lambda})^{c_{NS}(0,\lambda)} \prod_{\substack{m,w=0\\(m,w)\neq (0,0)}}^{\infty}\prod_{\lambda\in \Delta^g} \frac{(1-p^wq^my^{\lambda})^{c_{NS}(mw,\lambda)}}{(1+p^wq^my^{\lambda})^{c_{R}(mw,\lambda)}} \Bigr)^{24}\ .
\nonumber \\
\end{eqnarray} where, for any vector $\alpha$, $y^\alpha$ is shorthand for $\prod_k y_k^{\alpha_k}=e^{2\pi i \sum_kA_k\alpha_k}$. Again, up to the power $24$, these are, respectively, the superdenominator and denominator of the associated BKM superalgebra (see \cite{Harrison:2020wxl}).
\item Finally, for $V=V^{fE_8}$, we have $\chi^{\rm NS}=\chi^{\rm R}_+=\chi^{\rm R}_-=8$. The $8\cdot 24$ vectors from the NS-NS sectors are the gauge bosons of an abelian $U(1)^{8\cdot 24}$ algebra. The $8\cdot 24$ massless gauginos from the NS-R sector are all neutral, so their zero modes force the indices to vanish independently of the Wilson lines, unless they are absorbed. For simplicity, we consider the case where the Wilson lines are set to zero. The theory contains supersymmetries of the form $\mathcal{Q}^i_{l+}$ and $\mathcal{Q}^i_{l-}$ from the R-NS sector and $\mathcal{Q}^i_{r-}$ from the NS-R sector; as discussed above, this implies that the contributions to the index $\mathcal{Z}$ from states of non-zero momentum always cancel. So, the index $\mathcal{Z}^{V^{f E_8} \otimes \bar{V}^{f\natural}}$ is simply a non-zero constant that can be normalized to $1$. The modified index is more interesting, and gives
\begin{equation}\label{VE8ind} \tilde{\mathcal{Z}}^{V^{f E_8} \otimes \bar{V}^{f\natural}}(T, U)=\Bigl(\prod_{\substack{m,w=0\\(m,w)\neq (0,0)}}^\infty \frac{(1-p^wq^m)^{c_{NS}(mw)}}{(1+p^wq^m)^{c_{R}(mw)}}\Bigr)^{24}\ ,\end{equation} where $c_{NS}(n)=c_R(n)$ are the Fourier coefficients of the GSO projected NS and Ramond characters of $V^{fE_8}$ (that are actually equal to each other).
This is the denominator of the fake Monster superalgebra (to the power $24$) \cite{BorcherdsMM, Sch2, Sch1}.
\end{enumerate}
\section{Path integrals and theta lifts}\label{sec:pathintegrals}
The index described in the previous section, and its variations, can be calculated using a path integral. In this section we discuss this point of view, first reviewing the structure and modular properties of second quantized partition functions (\S \ref{sec:pfn}), and then discussing the relationship between the path integral and operatorial formalism in more detail (\S \ref{sec:pathvsop}). In \S \ref{sec:paththeta} we show that the path integral reduces to a so called theta lift in the theory of automorphic forms. We then demonstrate how to recover the (super)denominator identities using this approach (\S \ref{sec:pintsuper} and \S \ref{sec:pintdenom}).
\subsection{First and second quantized partition functions}\label{sec:pfn}
Let us first consider the relation between first and second quantized partition functions in particle physics/ quantum field theory. For a single point particle of mass $m$ in a $d$-dimensional spacetime, one defines a (first quantized) partition function by summing over worldlines all possible ways to embed a single (Euclidean) loop in spacetime
\begin{equation} Z_{particle}(m^2)=V_d \int \frac{d^dk}{(2\pi)^d}\int_0^{+\infty}\frac{dl}{2l}e^{-\frac{1}{2}(k^2+m^2)l}\ .
\end{equation}
Here, $l$ is the length of the loop, $\frac{1}{2}(k^2+m^2)$ is the worldline Hamiltonian, and the factor $2l$ takes into account the translation and reflection invariance of the wordline parametrization. To obtain the (second quantized) partition function in a quantum field theory, one needs to sum over an arbitrary number $n$ of disconnected worldlines describing $n$ particles going around a closed loop in spacetime, where on each wordline one sums over all possible particles in the theory. One should also divide by a factor $n!$ to take into account the permutations of the $n$ worldlines. The final result is
\begin{equation} Z_{QFT}=\exp\left(\sum_i Z_{particle}(m_i^2)(-1)^{\mathbf{F}_i}\right)\ ,
\end{equation}
where the factor $(-1)^{\mathbf{F}_i}$ takes into account that fermions running in the loop contribute with negative sign with respect to the bosons (see \cite{PolchinskiVol1}, \S7.3.).
Now let us turn to the analogue of this in string theory. In order to obtain the second quantized partition function in string theory one needs to exponentiate the (first quantized) torus partition function for a single string, with opposite signs for spacetime fermions and bosons, namely
\begin{equation} \mathscr{Z}=\exp\left(\frac{1}{2}\int_{SL(2,\mathbb{Z})\backslash \mathbb{H}} \frac{d^2\tau}{\tau_2} \Tr\Big(\mathsf{q}^{L_0}\bar \mathsf{q}^{\bar L_0}e^{2\pi i \sum_kA_kq_k}(-1)^{\mathbf{F}}\Big)\right)\ ,
\end{equation} where $\tau=\tau_1+i\tau_2$ and $\mathsf{q}=e^{2\pi i\tau}$. The trace is over the GSO projected single string states and $(-1)^{\mathbf{F}}$ is a space-time fermion number. The factors of $1/2$ and $1/\tau_2$ in the exponential are needed in the torus amplitude to take into account, respectively, of the reflection and translation automorphisms of the worldsheet torus \cite{PolchinskiVol1}. The $A_k$ are background gauge fields (if present), and $q_k$ are the corresponding charges. The Virasoro operators $L_0$ and $\bar L_0$ depend implicitly on the geometry of the spacetime and on the background B-field. The target space should be a Euclidean 2-dimensional spacetime on a torus $S^1\times S^1$, where the first $S^1$ corresponds, in Lorentzian signature, to the spacelike circle of radius $R$, while the second $S^1$ is a thermal circle, i.e. a Euclidean time circle with radius the inverse temperature $\beta$. This means that both $k^0$ and $k^1$ are quantized in the path integral. The standard quantization of momenta in the path integral will lead, on the operatorial side, to the index with fermions that are periodic along the spacelike circle $S^1$ and with $(-1)^\mathbf{F}$ inserted. Non-standard quantizations of momenta in the path integral (i.e. with half-integral rather than integral momentum, either in the space or in the Euclidean time directions) for \emph{some} of the sectors will lead, in the operatorial side, to either anti-periodic fermions around the space circle, or to modifications of the $(-1)^\mathbf{F}$ factor in the trace.
The path integral representation of the index should make invariance under a suitable subgroup of $O(2,2,\mathbb{Z})\sim SL(2,\mathbb{Z})\times SL(2,\mathbb{Z})$ manifest. The precise invariance subgroup depends on the periodicity conditions imposed on the fields around the spatial and Euclidean time circles. The two $SL(2,\mathbb{Z})$ factors in $O(2,2,\mathbb{Z})$ act by fractional linear transformations on the complex variables $T,U$ parametrizing, respectively, the complexified K\"ahler and the complex structure moduli of the spacetime torus. Thus, duality invariance implies that the index is a modular function in both variables $T$ and $U$. This invariance may be modified in the presence of non-trivial Wilson lines, which give rise to (possibly multivariate) Jacobi forms rather than modular functions.
The path integral might have infrared divergences in the presence of massless or tachyonic modes. These can be regularized in a way that preserves space-time diffeomorphism invariance and T-duality invariance, by cutting a suitable region in the integration over the fundamental domain $SL(2,\mathbb{Z})\backslash \mathbb{H} $. Therefore, one expects the path integral to be $O(2,2,\mathbb{Z})$-invariant even in this case.
This is in contrast with the expected modular properties of the index $\mathcal{Z}$, as obtained from the operatorial formalism of section \ref{sec:secondquantized}. For example, suppose that our theory contains some fermionic zero modes that need to be absorbed as in eqs.\eqref{eq:index1} and \eqref{eq:index2}. In this case, one expects a non-zero modular weight depending on the number of fermions one needs to absorb. For example, consider a modular transformation $U\to \frac{aU+b}{cU+d}$ of the complex structure of the Euclidean torus. Spacetime fermions are sections of a spinorial bundle on the torus; in particular, a left-moving fermion is a section of $K^{1/2}$, a square root of the canonical bundle on the torus, and thus transforms as $dz^{1/2}$, where $z$ is a complex coordinate on the torus. Similarly, right moving fermions transform as $d\bar z^{1/2}$. This means that if one needs to absorb $n_l$ left-moving and $n_r$ right moving fermions, the corresponding index is a modular form of weights $(n_l,n_r)$, rather than a modular invariant function.
In order to explain this mismatch, we will now discuss in more detail the relationship between the path integral $\mathscr{Z}$ and the corresponding index $\mathcal{Z}$.
\subsection{Path integral vs operatorial formalism}
\label{sec:pathvsop}
Some of the theories we are considering contain chiral massless fermions or bosons, whose path integral description is notoriously problematic. For a single chiral free boson or fermion, a standard method to overcome this issue consists in introducing additional massless degrees of freedom with the opposite chirality, so as to make the whole theory non-chiral. One can then easily compute the path integral $\mathscr{Z}$ for this non-chiral theory. Finally, the chiral partition function $\mathcal{Z}$ is obtained by extracting a suitable `holomorphic square root' of the non-chiral one $\mathscr{Z}$ -- this last step might be quite non-trivial, as discussed below.
\subsubsection*{Including spurious degrees of freedom}
Since we are interested in computing indices in free theories, a similar method can be generalized to our case. Actually, it is simpler to modify the indices computed in section \ref{sec:secondquantized} directly in the operatorial formalism, by introducing suitable spurious degrees of freedom that make the theory non-chiral. The `non-chiral' indices we obtain this way can be compared with the path integral results we discuss in the following subsections.
Let us take a closer look at the chiral content of the superstring compactifications. Chiral massless fields can appear when the SVOA $V^{f\natural}$ is the holomorphic or anti-holomorphic factor in the internal CFT. All $24$ Ramond ground states of this SVOA have the same worldsheet fermion number, which can be taken to have either positive (for $V^{f\natural}_+$) or negative ($V^{f\natural}_-$). The GSO projection relates the fermion number of these ground states to the spacetime spin of the corresponding massless fields. Finally, the mass-shell condition, arising from the requirement that the state is BRST closed, relates the spin to the spacetime momentum. For example, for chiral fermions of spin $+1/2$ or $-1/2$, the massless Dirac equation admits a non-zero solution only for $k^0=-k^1$ or $k^0=k^1$, respectively. As a result, we obtain massless fields that are either purely left-moving or purely right-moving in spacetime. This phenomenon does not occur for $V^{fE_8}$ or $F_{24}$, for which the Ramond sector contains the same number of states with positive or negative worldsheet fermion number.
In a path integral formulation, the mass-shell condition is not imposed on fields, so that the relationship between spacetime momentum and spin (and, in turn, with the internal fermion number) is lost. One simply sums over all possible spacetime momenta and, independently, over all possible internal states. Nevertheless, this procedure gives the correct result if the number of internal states with positive and negative worldsheet fermion numbers is the same. Therefore it is clear how to modify the operatorial description so as to obtain a `non-chiral' index that can be compared with the path integral: for each (holomorphic or antiholomorphic) internal SVOA $V^{f\natural}$, containing $24$ Ramond ground states having fermion number $+ 1$ or $-1$, one needs to add $24$ `spurious' ground states with the opposite fermion number.
\subsubsection*{Het/Type IIA on $V\otimes \bar V^{f\natural}_-$}
Let us analyze how the index is modified by these spurious degrees of freedom. Let us first suppose that the theory is heterotic string theory on $V\otimes \bar V^{f\natural}_+$ or type IIA on $V\otimes \bar V^{f\natural}_-$, where $V$ is a VOA or SVOA different from $V^{f\natural}$. As described in section \ref{sec:secondquantized}, in this case, the only single string physical states relevant for the supersymmetric index are the ones with $k^0_r=k^1_r$, and correspond to products $v\otimes \bar \upsilon^i_+$, where $v$ is a state in $V$ and $\bar \upsilon^1_+,\ldots,\bar \upsilon^{24}_+$ are the antiholomorphic Ramond ground states in $\bar V^{f\natural}_+$ (heterotic) or $\bar V^{f\natural}_-$ (type IIA) (the subscript $+$ in $\bar \upsilon^i_+$ denotes positive spacetime chirality, and not the worldsheet fermion number; notice that, according to our conventions, the GSO projection on the antiholomorphic internal factor for type IIA is the opposite than for heterotic). For each of these states, there is a creation or annihilation (depending on the sign of the energy) operator acting on the second quantized Hilbert space. Adding $24$ further antiholomorphic Ramond ground states $\bar \upsilon^1_-,\ldots,\bar \upsilon^{24}_-$ with opposite worldsheet fermion number to $\bar V^{f\natural}$ corresponds to introducing a second copy of each creation/annihilation operator, but now with right-moving momenta satisfying $k^0_r=-k^1_r$ rather than $k^0_r=k^1_r$. This means that, for these new operators, the relation between energy and winding-momentum changes sign and becomes $E=-\frac{1}{\sqrt{2}}(\frac{m}{R}+wR)$, so that the second copy of a creation (i.e. positive energy) operator has the same energy and the opposite winding and momentum with respect to the first copy. Changing the sign of $m$ and $w$ while keeping the energy fixed is equivalent to the transformation $(T,U)\mapsto (-\bar T,-\bar U)$. In turn, this is equivalent to applying complex conjugation $\overline{\mathcal{Z}(T,U)}$ to the index, because the latter is a power series in $p=e^{2\pi iT}$ and $q=e^{2\pi iU}$ with integral coefficients.
This construction generalizes to the case where Wilson lines are present. In this case, one has \begin{equation} \overline{\mathcal{Z}(T,U,A_k)}=\mathcal{Z}(-\bar T,-\bar U,-A_k)=\mathcal{Z}(-\bar T,-\bar U,A_k)\ .\end{equation} The last equality follows because the spectrum of a self-dual VOA $V$ is invariant under charge conjugation -- in general, applying charge conjugation to a VOA $V$ leads to a different $V$-module, but since $V$ is self-dual the charge conjugate $V$-module must be isomorphic to $V$ itself.
Finally, the `non-chiral' index obtained by including both the original and the spurious degrees of freedom, therefore, is just the modulus square, \begin{equation}|\mathcal{Z}(T,U,A_k)|^2=\mathcal{Z}(T,U,A_k)\overline{\mathcal{Z}(T,U,A_k)},
\end{equation}
of the original index. A similar result was already discussed in \cite{PPV1} in the case of a heterotic string theory on $V^\natural\otimes V^{f\natural}$.
\subsubsection*{Type IIA on $V^{f\natural}_\pm \otimes \bar V^{f\natural}_-$}
The treatment is slightly more complicated for type IIA compactified on $V^{f\natural}_+\otimes \bar V^{f\natural}_-$ or $V^{f\natural}_-\otimes \bar V^{f\natural}_-$, because one needs to add spurious degrees of freedom to both the holomorphic and the antiholomorphic factor. Let us start with $V^{f\natural}_+\otimes \bar V^{f\natural}_-$. For the index $\mathcal{Z}$ (corresponding to the superdenominator of the associated BKM superalgebra), the only relevant single string physical states are the ones satisfying $k^1_l=k^0_l=k^0_r=k^1_r$, i.e. with zero winding $w=0$ along the circle, so that the index equals $\mathcal{Z}(T,U)=(1/\eta(U)^{24})^{24}$. Let us first add $24$ spurious ground states with fermion number $-1$ to the holomorphic factor $V^{f\natural}_+$. This amounts to introducing creation/annihilation operators with momentum $-k^1_l=k^0_l=k^0_r=k^1_r$, i.e. with $m=0$, which multiply the index by a factor $(1/\eta(T)^{24})^{24}$. Similarly, the modified index $\tilde{\mathcal{Z}}$, corresponding to the denominator of the associated BKM superalgebra, gets multiplied by $\bigl(p^{-1}\prod_{w=1}^{\infty}\frac{1}{(1+p^w)^{24}}\bigr)^{24}$. Therefore, once these holomorphic spurious states are introduced, the index $\mathcal{Z}$ becomes
\begin{equation}\label{spurious1} \mathcal{Z}_{sp}^{V^{f\natural}_+\otimes \bar V^{f\natural}_-}(T,U)=\Bigl(\frac{1}{\eta(T)^{24}\eta(U)^{24}}\Bigl)^{24}\ ,
\end{equation} and the modified index $\tilde{\mathcal{Z}}$ becomes
\begin{eqnarray}\label{spurious2}
& & \tilde{\mathcal{Z}}_{sp}^{V^{f\natural}_+\otimes \bar V^{f\natural}_-}(T,U)=
\\
& & \Bigl(q^{-1}\prod_{m=1}^\infty\frac{1}{(1+q^m)^{24}}\Bigr)^{24}\Bigl(p^{-1}\prod_{w=1}^\infty\frac{1}{(1+p^w)^{24}}\Bigr)^{24}\Bigl(\prod_{m,w=1}^\infty \frac{(1-p^wq^m)^{c_{NS}(mw)}}{(1+p^wq^m)^{c_{R}(mw)}}\Bigr)^{24}\ . \nonumber
\end{eqnarray} Exactly the same result can be obtained by adding spurious states to the holomorphic factor of $V^{f\natural}_-\otimes \bar V^{f\natural}_-$. This is obvious, since the only difference between these two theories is the fermion number of the Ramond ground states.
But we are not done yet: one needs to add also the spurious states for the antiholomorphic factor $\bar V^{f\natural}$. The treatment is similar to the other $V\otimes \bar V^{f\natural}$ compactifications: the new spurious degrees of freedom just introduce a second copy of each creation and annihilation operator with the same energy but with opposite winding and momentum. Therefore, the complete non-chiral index (respectively, non-chiral modified index) is just the modulus square of $\mathcal{Z}_{sp}$ in \eqref{spurious1} (respectively, of $\tilde{\mathcal{Z}}_{sp}$ in \eqref{spurious2}).
\subsubsection*{Scalar and fermionic zero modes}
One final subtlety occurs when there are scalar or fermionic zero modes. It is well known that the path integral representation for the partition function of a free massless scalar field on a two dimensional torus is not holomorphically factorized, i.e. it is not simply the modulus square of a function depending holomorphically on the complex structure modulus $U$. Something similar can happen for a free fermion on the torus with doubly periodic boundary conditions, due to the zero modes. In Euclidean signature, the fermion is necessarily complex, and its partition function is a regularized determinant $\det' \Delta_{1/2}$, where $\Delta_{1/2}$ is the two-dimensional (spacetime) Laplace operator acting on $1/2$-differentials, and the symbol $\det'$ means that the zero eigenvalues are excluded, i.e. the zero modes have been absorbed. At first sight, there seems to be no problem with the holomorphic factorization of $\det' \Delta_{1/2}$. Indeed, if one chooses a conformal gauge $ds^2=\rho(z,\bar z)dz\,d\bar z$ for the metric of the spacetime torus, the functional determinant can be regularized in such a way that it is the modulus square of a chiral determinant $\det' \bar \partial_{1/2}$ depending homolorphically on $U$ (in fact, it is the modulus square of an eta function). This is the standard result one obtains in two dimensional conformal field theory for the torus $1$-point function of the free fermion with periodic boundary conditions. This factorized expression for $\det' \Delta_{1/2}$, however, is not invariant under diffeomorphisms of the spacetime torus: indeed, being a $1$-point function on a torus, it transforms as a section of $K^{1/2}$, a square root of the cotangent bundle. On the other hand, the path integral we are considering in this section is manifestly diff-invariant -- it depends on the spacetime metric only through diff-invariant quantities, such as the volume, the lengths of geodesics or the angle between them. Therefore it must correspond to a different, diff-invariant regularization of the functional determinant $\det' \Delta_{1/2}$.
A classical result by Belavin and Knizhnik \cite{Belavin:1986cy} shows that, in general, a diff-invariant regularized determinant $\det'\Delta_n$ of the Laplacian acting on $n$-differentials on a Riemann surface $\Sigma$ fails to be holomorphically factorized. More precisely, $\det'\Delta_n$ is related to a chiral determinant $\det'\bar \partial_n$ by
\begin{equation} \frac{\det'\Delta_n}{\det\langle \phi^n_a|\phi^n_b\rangle \det\langle \phi^{1-n}_a|\phi^{1-n}_b\rangle}=e^{-c_nS_L(\rho)}|\det{}' \bar \partial_n|^2\ .
\end{equation} Here, $\{\phi^n_1,\phi^n_2,\ldots\}$ and $\{\phi^{1-n}_1,\phi^{1-n}_2,\ldots\}$ are bases of, respectively, the kernel and cokernel of $\bar \partial_n$, i.e. holomorphic $n$- and $1-n$-differentials, $S_L(\rho)$ is the Liouville action, depending on the metric $\rho(z,\bar z)$ used to define the Laplacian, $c_n$ is the conformal anomaly, and $(\det' \bar \partial_n)\,\phi^n_1\wedge\phi^n_2\wedge\ldots\wedge \phi^{1-n}_1\wedge\phi^{1-n}_2\wedge\ldots$ is a section of a holomorphic line bundle on the moduli space of Riemann surfaces. Furthermore, the scalar product $\langle \phi^n_a|\phi^n_b\rangle$ is defined by \begin{equation} \langle \phi^n_a|\phi^n_b\rangle=\int_\Sigma (\rho(z,\bar z)dz\,d\bar z)^{1-n}\phi^n_a(z)\overline{\phi^n_b(z)}\ ,\end{equation} and an analogous definition holds for the scalar product between $1-n$ differentials.
In our case, $\Sigma$ is the Euclidean spacetime torus $T^2$, which can be parametrized by the complex coordinate $z$ taking values in $\mathbb{C}/(\mathbb{Z}+U\mathbb{Z})$, with respect to which the metric is of the form $ds^2=\rho(z,\bar z)dz\,d\bar z$. The holomorphic $1$-differential $dz$ is canonically normalized $\oint_A dz=1$, $\oint_Bdz=U$, where the $A$- and $B$-cycles are identified with the spatial and the Euclidean time circle, respectively. The metric is constant $\rho(z,\bar z)\equiv \rho$ and normalized so that the torus volume is $\Im T$. These conditions imply that
\begin{equation} \int_{T^2} dz\,d\bar z=\Im U\ ,\qquad \int_{T^2} \rho\, dz\,d\bar z=\Im T\ .
\end{equation} There is a $1$-dimensional space of holomorphic $1/2$-differentials with doubly periodic boundary conditions, and we can take a generator to be $\phi^{1/2}(z)=(dz)^{1/2}$. Note that free chiral fermions with standard normalization of the OPE, such as the ones used to absorb the zero modes in the indices $\mathcal{Z}$ and $\tilde{\mathcal{Z}}$ in eqs. \eqref{eq:index1} and \eqref{eq:index2}, correspond, up to a numerical ($T,U$-independent) factor, to the half-differential $(dz)^{1/2}$. The square norm of $\phi^{1/2}$ is
\begin{equation}
\langle \phi^{1/2}|\phi^{1/2}\rangle=\int_{T^2} (\rho\, dz\,d\bar z)^{1/2} (dz)^{1/2}\,(d\bar z)^{1/2}=(\Im U)^{1/2}(\Im T)^{1/2}\ .
\end{equation}
For a flat torus, the Liouville factor $e^{-S_L}$ admits holomorphic factorization
so that it can be reabsorbed into the definition of the chiral determinants
\begin{equation} \det{}'\Delta_{1/2}=(\Im U)(\Im T)e^{c_{1/2}S_L}|\det{}' \bar \partial_{1/2}|^2=(\Im U)(\Im T)|\widetilde{\det}{}' \bar \partial_{1/2}|^2\ .
\end{equation} An analogous result holds for scalar fields. The partition function of a free \emph{complex} scalar field is the inverse $(\det'\Delta_0)^{-1}$ of the regularized functional determinant for the scalar Laplacian. We can choose $\phi^1(z)=dz$ and $\phi^0(z)=1$ as generators of the spaces of holomorphic $1$- and $0$-differentials on the torus, respectively, so that
\begin{equation} \langle \phi^{1}|\phi^{1}\rangle=\int_{T^2} dz\, d\bar z=\Im U\ ,\qquad \langle \phi^{0}|\phi^{0}\rangle=\int_{T^2} \rho dz\, d\bar z=\Im T\ .
\end{equation} We conclude that
\begin{equation} \det{}'\Delta_{0}=(\Im U)(\Im T)|\widetilde{\det}{}' \bar \partial_{0}|^2\ ,
\end{equation} where, once again, the Liouville factor is absorbed in a redefinition of the chiral determinant.
This discussion finally suggests the correct relation between the indices $\mathcal{Z}$ and $\tilde{\mathcal{Z}}$ of section \ref{sec:secondquantized} and their path integral representation $\mathscr{Z}$ considered in this section. In particular, if the string theory we are considering contains $n_b$ massless scalars and $n_f$ massless fermions, then the path integral equals
\begin{equation}\label{finalpath}\mathscr{Z}= [(\Im U)(\Im T)]^{n_f-n_b}|\mathcal{Z}_{sp}|^2\ ,
\end{equation} where $\mathcal{Z}_{sp}$ possibly contains additional `spurious' degrees of freedom, as in equation \eqref{spurious1}.
Note that if the massless degrees of freedom are charged with respect to some non-trivial background gauge fields, then the corresponding Laplacian is modified in such a way that the zero modes are lifted. This means that one can take the full regularized determinant $\det \Delta$, without projecting onto non-zero modes, and such a determinant automatically factorizes. As a consequence, in the presence of non-trivial Wilson lines for the gauge fields, the correct power $[(\Im U)(\Im T)]^{n_f-n_b}$ in eq.\eqref{finalpath} is given by the number $n_f$ of \emph{neutral} massless fermions minus the number $n_b$ of \emph{neutral} massless scalars.
An analogous formula to \eqref{finalpath} holds for the path integral $\tilde{\mathscr{Z}}$ corresponding to $\tilde{\mathcal{Z}}$. The insertion of the factor $(-1)^{\mathbf{F}_l}$ in the trace corresponds, in the path integral formulation, to requiring the fermions and bosons to obey periodic or antiperiodic boundary conditions along the Euclidean time circle, depending on their $(-1)^{\mathbf{F}_l}$ eigenvalue. Fermions and bosons with antiperiodic boundary conditions on the torus have no zero modes, therefore the analog \eqref{finalpath} holds if $n_f$ and $n_b$ are the number of zero modes of \emph{periodic} fermions and bosons.
\subsubsection*{Examples}
Let us consider some examples:
\begin{itemize}
\item For heterotic strings on $V_L\otimes V^{f\natural}_+$, where $V_L$ is the lattice VOA of the Niemeier lattice $L$, the number of massless fermions is $24N$, where $N$ is the number of currents in the VOA $V_L$. Only $24^2$ of them are neutral with respect to the background gauge fields in a maximal abelian torus of the gauge group. Therefore, $n_f=24^2$. There are no massless propagating scalars, so $n_b=0$. Thus, we expect the path integral to reproduce
\begin{equation} \mathscr{Z}^{V_L\otimes V^{f\natural}_+}(T,U,A_k)=[(\Im U)(\Im T)]^{24^2}|\mathcal{Z}^{V_L\otimes V^{f\natural}_+}(T,U,A_k)|^2\ ,
\end{equation} where $\mathcal{Z}^{V_L\otimes V^{f\natural}_+}(T,U,A_k)$ is given in \eqref{hetVLind}.
\item Consider type IIA on $V^{f\natural}_{\pm}\otimes V^{f\natural}_-$. Once the spurious states are included, the theory contains $24^2$ massless scalars from the R-R sector, and no propagating massless fermions. When we consider the index $\mathcal{Z}$, therefore, we have $n_b=24^2$ and $n_f=0$, so that the path integral will reproduce
\begin{equation}\label{piVfVf1} \mathscr{Z}(T,U)=[(\Im U)(\Im T)]^{-24^2}|\mathcal{Z}_{sp}(T,U)|^2=\frac{1}{[(\Im U)(\Im T)]^{24^2}}\left|\frac{1}{\eta(T)^{24^2}\eta(U)^{24^2}}\right|^2\ ,
\end{equation} where $\mathcal{Z}_{sp}$ was calculated in \eqref{spurious1}. As for the modified index $\tilde{\mathcal{Z}}$, recall that $(-1)^{\mathbf{F}_l}$ acts by $-1$ on the R-NS and R-R sector and trivially on the NS-R and NS-NS sector. Therefore, all $24^2$ massless R-R scalars obey anti-periodic boundary conditions along the Euclidean time circle, and there are no zero modes. It follows that $n_b=n_f=0$ and the path integral $\tilde{\mathscr{Z}}$ factorizes as the modulus square
\begin{equation} \tilde{\mathscr{Z}}^{V^{f\natural}_\pm \otimes V^{f\natural}_-}=|\tilde{\mathcal{Z}}^{V^{f\natural}_\pm \otimes V^{f\natural}_-}_{sp}|^2
\end{equation}
of the index in eq.\eqref{spurious2}.
\item In type IIA on $F_{24}\otimes V^{f\natural}_-$ there are $24^2$ massless fermions from the NS-R sector and no massless bosons. Only $24r$ of these fermions are neutral, where $r$ is the rank of the gauge group, which depends on the choice of the $\mathcal{N}=1$ supercurrent in $F_{24}$. Thus, both for the index $\mathcal{Z}$ and the modified index $\tilde{\mathcal{Z}}$, one has $n_f=24r$ and $n_b=0$, so that the path integral is expected to give
\begin{equation} \mathscr{Z}^{F_{24} \otimes V^{f\natural}_-}(T,U,A_k)=[(\Im U)(\Im T)]^{24r}|\mathcal{Z}^{F_{24} \otimes V^{f\natural}_-}(T,U,A_k)|^2
\end{equation} and
\begin{equation} \tilde{\mathscr{Z}}^{F_{24} \otimes V^{f\natural}_-}(T,U,A_k)=[(\Im U)(\Im T)]^{24r}|\tilde{\mathcal{Z}}^{F_{24} \otimes V^{f\natural}_-}(T,U,A_k)|^2
\end{equation} where $\mathcal{Z}^{F_{24} \otimes V^{f\natural}_-}$ and $\tilde{\mathcal{Z}}^{F_{24} \otimes V^{f\natural}_-}$ are given in \eqref{F24ind1} and \eqref{F24ind2}, respectively.
\item Finally, in type IIA on $V^{fE_8}\otimes V^{f\natural}_-$, there are $8\cdot 24$ bosons from the R-R sector and $8\cdot 24$ fermions from the NS-R sector. The gauge group is abelian and all of these states are neutral. For the index $\mathcal{Z}$, one has $n_b=n_f=8\cdot 24$, so that the path integral $\mathscr{Z}$ is holomorphically factorized (in fact, it is just a constant). For the modified index, the scalars obey anti-periodic boundary conditions, so that $n_f=8\cdot 24$ and $n_b=0$. Thus, we expect the path integral to reproduce
\begin{equation} \tilde{\mathscr{Z}}^{V^{fE_8} \otimes V^{f\natural}_-}=[(\Im U)(\Im T)]^{8\cdot 24}|\tilde{\mathcal{Z}}^{V^{fE_8} \otimes V^{f\natural}_-}|^2\ ,
\end{equation} where $\tilde{\mathcal{Z}}^{V^{fE_8} \otimes V^{f\natural}_-}$ is given in eq.\eqref{VE8ind}.
\end{itemize}
In \S \ref{sec:pintsuper} and \S \ref{sec:pintdenom}, we will verify some of these expectations by explicit path integral calculations.
\subsection{Path integrals and theta lifts}\label{sec:paththeta}
Let us consider heterotic or type II superstring theory on a generic internal CFT $V_1\otimes \bar V_2$. Let us first consider the case where there are no Wilson lines. As mentioned above, the path integral representation of the second quantized index is given by
\begin{equation}\label{pathint} \mathscr{Z}=\exp\left(\frac{1}{2}\int_{SL(2,\mathbb{Z})\backslash \mathbb{H}} \frac{d^2\tau}{\tau_2} \Tr\Big(\mathsf{q}^{L_0}\bar \mathsf{q}^{\bar L_0}(-1)^{\mathbf{F}}\Big)\right).
\end{equation}
The trace in the integrand is taken over the full GSO projected ghost and matter CFT, restricted to $\ker b_0\cap \ker \bar b_0$. The latter condition corresponds to the insertion of suitable ghost vertex operators in the path integral. The operator $(-1)^{\mathbf{F}}$ is a spacetime fermion number; for example, in type II theories it acts trivially on the NS-NS and R-R sectors and by a minus sign on the NS-R and R-NS sectors. As usual, the contributions from non-zero modes of the ghosts and superghosts exactly cancel the bosonic and fermionic matter oscillators in the $1+1$ spacetime directions. Thus, the trace is the product of a term coming from a sum over winding-momenta along the two dimensional Euclidean spacetime torus, times the partition function of the internal CFT $V_1\otimes \bar V_2$.
The winding-momenta take values in an even unimodular lattice $\Gamma^{2,2}$ of signature $(2,2)$, so that their contribution gives a Narain-Siegel theta function
\begin{equation} \Theta_{\Gamma^{2,2}}(\tau;T,U)=\tau_2\sum_{m_1,w_1,m_0,w_0\in \mathbb{Z}} \mathsf{q}^{\frac{k_l^2}{2}}\bar \mathsf{q}^{\frac{k_r^2}{2}}\ ,
\end{equation} (we included a factor $\tau_2$ to make it modular invariant and match with the mathematical literature) where
\begin{align}\label{momenta1}
k_l^2&=\frac{\left|\begin{pmatrix}
T & 1
\end{pmatrix}\begin{pmatrix}
w_0 & w_1\\ -m_1 & m_0
\end{pmatrix}\begin{pmatrix}
-U \\ 1
\end{pmatrix}
\right|^2}{2T_2U_2}\\
k_r^2&=k_l^2-2m_1 w_1-2 m_0 w_0\ .\label{momenta2}
\end{align}
The partition function of the CFT $V_1\otimes \bar V_2$ factorizes as a product $f(\tau,V_1)\overline{f(\tau,V_2)}$ of a holomorphic and an anti-holomorphic factor.
Let us focus on type II models; in this case, the spacetime fermion number factorizes as $(-1)^{\mathbf{F}}=(-1)^{\mathbf{F}_l}(-1)^{\mathbf{F}_r}$, where $(-1)^{\mathbf{F}_{l,r}}$ acts by a minus sign on the (left- or right-moving) Ramond sector. In terms of the traces of eq. \eqref{eq:partfns}, for each given SVOA $V$, one has
\begin{equation}\label{strace} f(\tau,V)=\frac{\phi_{NS}(\tau,V)-\phi_{\tilde{NS}}(\tau,V)}{2}-\frac{\phi_{R}(\tau,V)\pm \phi_{\tilde R}(\tau,V)}{2}=\begin{cases}
0 & \text{for } V=V^{fE_8}\ ,\\
- 24 & \text{for } V=V^{f\natural}_\pm\ , \\
24 & \text{for } V=F_{24}\ .
\end{cases}
\end{equation} In this formula, the first two terms yield the GSO-projected NS sector. The relative sign between the NS and the Ramond sector is due to the spacetime fermion number. The last two terms can be explained as follows. In the Ramond sector, the GSO projection should be implemented by taking just one of the two spacetime chiralities for each Ramond state of the internal SVOA $V$, depending on the eigenvalue of the internal worldsheet fermion number $(-1)^F$. However, in our Euclidean path integral, the description of chiral fermions is problematic. A way out is as follows. For $V=F_{24}$ or $V=V^{fE_8}$, one observes that $\phi_{\tilde R}(\tau,V)=0$, i.e. the number of states with positive and negative fermion number is the same for each $L_0$ eigenvalue. This means that the states in the Ramond sector come in pairs with opposite fermion number, and we can count one complex (non-chiral) spacetime fermion for each such pair, thus giving $\frac{\phi_R(\tau,V)}{2}$ as a counting function. The same reasoning applies to $V^{f\natural}_\pm$ with $L_0>1/2$: the number of states with positive and negative fermion number is the same for $L_0>1/2$, so we can count one complex fermion for each pair of states.
On the other hand, the $24$ Ramond ground states ($L_0=1/2$) in $V^{f\natural}_\pm$, only appear for either positive (for $V^{f\natural}_+$) or negative (for $V^{f\natural}_-$) fermion number, i.e. they would correspond to a chiral spacetime fermion. Since we are not able to describe these chiral fermions in our Euclidean path integral formulation, we simply count one complex non-chiral fermion for each of these $24$ states, irrespective of their fermion number; this gives $\frac{\phi_{R}(\tau,V^{f\natural}_\pm)\pm \phi_{\tilde R}(\tau,V^{f\natural}_\pm)}{2}$. In this way we have a slight overcounting of Ramond ground states: this is the origin of the `spurious states' discussed in section \ref{sec:pathvsop}.
By \eqref{strace}, in type IIA theories, the partition function $f(\tau,V_1)\overline{f(\tau,V_2)}$ is just a constant. Note that when either $V_1$ or $ V_2$ is $V^{fE_8}$, the partition function vanishes.
For heterotic models on $V_1\otimes \bar V_2$, we have a similar result for $f(\tau,V_1)\overline{f(\tau,V_2)}$, where the anti-holomorphic factor $\overline{f(\tau,V_2)}$ is a constant given in in \eqref{strace}, while the holomorphic factor
\begin{equation} f(\tau,V_1)=J(\tau)+N=\mathsf{q}^{-1}+N+196884\mathsf{q}+\ldots
\end{equation} is the partition function of the bosonic VOA $V_1$, which equals the $J$-function up to the constant term.
Thus, in all cases we are interested in, the integrand $\tau_2\Tr(\mathsf{q}^{L_0}\bar \mathsf{q}^{\bar L_0}(-1)^{\mathbf{F}})$ is just the product $F(\tau)\Theta_{\Gamma^{2,2}}(\tau;T,U)$ of a theta series and a holomorphic function $F(\tau)=f(\tau,V_1)\overline{f(\tau,V_2)}$.
We conclude that the path integral will amount to performing an integral of the form
\begin{equation}
\int_{SL(2,\mathbb{Z})\backslash \mathbb{H}}F(\tau)\Theta_{\Gamma^{2,2}}(\tau;T,U) \frac{d^2\tau}{\tau_2^2}.
\end{equation}
This is recognized as a \emph{theta lift} in the mathematics literature. More generally one can lift a modular form $F$ on $\mathbb{H}$ to an automorphic form on $SO(m,n)$ via
\begin{equation}
F\quad \longmapsto\quad \Theta_F(g)=\int_{SL(2,\mathbb{Z})\backslash \mathbb{H}}F(\tau)\Theta_{\Gamma^{m,n}}(\tau;g) \frac{d^2\tau}{\tau_2^2}.
\end{equation}
Here, $\Theta_{\Gamma^{m,n}}$ is a Siegel-Narain theta series for the lattice $\Gamma^{m,n}$, depending on $\tau\in \mathbb{H}$ and $g\in SO(m,n;\mathbb{R})$. The image $\Theta_F(g)$ of the theta lift is then an automorphic form on
\begin{equation}
\Gamma \backslash SO(m,n;\mathbb{R})/ (SO(m)\times SO(n)),
\end{equation}
where $\Gamma\subset SO(m,n;\mathbb{R})$ is an arithmetic subgroup (T-duality group).
Consider the case of the lattice $\Gamma^{2,d}$, which is the level of generality that we are interested in. The case when $d>2$ corresponds to including Wilson lines. Then $\Theta_{\Gamma^{2,d}}$ transforms like a modular form of weight $d/2-1$ with respect to $SL(2,\mathbb{Z})$. Assume further that $F(\tau)$ is a weakly holomorphic modular form of weight $1-d/2$ with Fourier coefficients $c(m,n)$. Since $F$ may have singularities at the cusps the integral diverges. However, it can be regularized by introducing a cutoff $\Im(\tau)\le t$ and computing the integral in the limit $t\to \infty$ \cite{Dixon:1990pc,HM1}. Physically, the divergence is an IR effect, due to the presence of massless or tachyonic modes (the latter only arises in off-shell heterotic strings). The result is of the form
\begin{equation}
\Theta_F(g)=\log ||\Phi_F(g)||^2_{\text{Pet}}+\text{const},
\end{equation}
where $|| \cdot ||_{\text{Pet}}$ denotes the Petersson metric on the line bundle $\mathcal{L}$ of modular forms of weight $c(0,0)/2$ over $SO(2,d;\mathbb{R})/(SO(2)\times SO(d))$. Moreover, in the neighbourhood of a cusp, $\Phi_F(g)$ has an infinite product expansion. The theta lift generalizes to the case where $\Theta_\Lambda$ is the theta series of a lattice $\Lambda$ that is not unimodular, and $F(\tau)$ is a vector valued modular form for a suitable $SL(2,\mathbb{Z})$-representation, see appendix \ref{app:vectorvaluedtheta} for details and references.
To illustrate this let us restrict again to the case of having no Wilson lines, i.e. $d=2$, as in the beginning of this section.
In this case, $F(\tau)$ is a weight 0 modular form. The simplest possibility is to let $F$ be a constant, say $c$. Then we obtain
\begin{equation}
\Theta_c(T,U)=\int_{SL(2,\mathbb{Z})\backslash \mathbb{H}} c\, \cdot \, \Theta_{\Gamma^{d,d}}(\tau;T,U) \frac{d^2\tau}{\tau_2^2}=-c\log ||\eta(T)^{2} \eta(U)^{2}||^2_{\text{Pet}} +\text{const},
\label{thetaliftofidentity}
\end{equation}
where the Petersson metric is given explicitly by
\begin{equation}
||\eta(T)^{2} \eta(U)^{2}||^2_{\text{Pet}}=\Im(T)\Im(U)\big|\eta^{2}(T)\eta^{2}(U)\big|^2.
\end{equation}
The constant in (\ref{thetaliftofidentity}) is explicit and involves the Euler-Mascheroni constant (see, e.g, \cite{HM1}). We recognize the general structure of the path integral~(\ref{finalpath}), where we recall that the prefactors $\Im(T)\Im(U)$ arise from the bosonic and fermionic zero modes.
As mentioned in section \ref{sec:pathvsop}, the path integral we started from is manifestly invariant under spacetime diffeomorphisms. The dependence on the metric is only through the complex moduli $T$ and $U$, which in turn are defined in terms of diff-invariant quantities, such as the volume of the spacetime torus, the length of geodesics or the angle between them. The infrared regularization is also manifestly diff-invariant -- we just cut a region of integration over the moduli of the \emph{worldsheet} torus. Thus, the final result is expected to be free of gravitational anomalies. In particular, the arithmetic T-duality group $\Gamma\subset SO(2,d;\mathbb{R})$ contains a group of large spacetime diffeomorphisms, so that the absence of gravitational anomalies can be seen as the physical counterpart of the automorphy properties of the theta lift.
\subsection{The path integral for the superdenominator}\label{sec:pintsuper}
Let us consider a type IIA model on $V\otimes \bar V^{f\natural}_-$, where $V$ is a self-dual $\mathcal{N}=1$ SVOA with $c=12$. The second quantized supersymmetric index $\mathcal{Z}$ corresponding to this model is (the $24$-th power of) the superdenominator of the BKM superalgebra associated with $V$.
In the following subsections, we will describe how the superdenominator arises explicitly from the path integral for the type II string on $V\otimes V^{f\natural}$, with $V=F_{24}$, $V^{f\natural}$, and $V^{fE_8}$.
\subsubsection*{The case $F_{24}\otimes \bar{V}^{f\natural}_-$}
For $V=F_{24}$ we have $\chi^{\rm R}_+=\chi^{\rm R}_-=0$. Let us consider the case when we turn off all Wilson lines, i.e. $y_i=1$ for all $i$, so that the lattice is $\Gamma^{2,2}$. We expect the index to depend on both $T$ and $U$, the K\"ahler and complex structure moduli of the torus.
By \eqref{strace}, we have $f(\tau,F_{24})=24$ and $f(\tau,{V}^{f\natural}_-)=-24$. The result of the theta lift is thus
\begin{equation}
\Theta_{F_{24}\otimes \bar{V}^{f\natural}}(T,U)=\int_{SL(2,\mathbb{Z})\backslash \mathbb{H}} 24\cdot (-24)\, \cdot \, \Theta_{\Gamma^{2,2}}(\tau;T,U) d\mu=24\cdot 24\log ||\eta^{2}(T)\eta^{2}(U)||^2_{\text{Pet}}.
\label{thetaliftfullGamma22}
\end{equation}
The full non-holomorphic partition function in this case is given by
\begin{equation}
\mathscr{Z}^{F_{24}\otimes \bar{V}^{f\natural}}\big|_{y=1}=e^{\frac{1}{2}\Theta_{_{F_{24}\otimes \bar{V}^{f\natural}}}(T,U)}=\text{const}\cdot ||(\eta^{24}(T))^{24} (\eta^{24}(U))^{24}||_{\text{Pet}}^{2}.
\end{equation}
Now let us give a rough idea of the generalization to the case where the Wilson lines are turned on. Recall that $y_i=e^{2\pi i A_i}$, $i=1, \dots, r$, where $A_i$ are Wilson line moduli and $r$ is the rank of the gauge group $G$. The integral now involves the Siegel-Narain theta function $\Theta_{\Lambda}(\tau; T, U, A)$ for a lattice $\Lambda=\Gamma^{2,2}\oplus L$ of signature $(2,2+r)$, where $L$ is the $r$-dimensional lattice of charges with respect to gauge group $G$. The partition function $F$ becomes a Jacobi form, with theta decomposition of the form $F=\sum F_\gamma \theta_\gamma$, where $\gamma$ label the cosets in $L^\vee/L$. Using the vector valued theta lift of $F$ discussed in appendix~\ref{app:vectorvaluedtheta} we arrive at
\begin{equation}
{\mathscr Z}^{F_{24}\otimes \bar{V}^{f\natural}_-}=e^{\frac{1}{2}\Theta_{_{F_{24}\otimes \bar{V}^{f\natural}}}(T,U,A)}=\text{const}\cdot ||\Phi(T, U, A)^{24}||_{\text{Pet}}^{2},
\end{equation}
where $\Phi(T, U, A)$ has the following infinite product representation
\begin{equation}
\Phi=e^{-2\pi i (T+U+(\rho, A))} \prod_{\lambda\in \Delta^+_g} (1-e^{2\pi i (\lambda, A)})^{c(0,\lambda)} \prod_{m,w=0\atop (m,w)\neq (0,0)}^\infty\prod_{\lambda\in \Delta^g} (1-e^{2\pi i( mT+ wU+ (\lambda, A))})^{c(mw, \lambda)}
\end{equation}
This matches perfectly with the index $\mathcal{Z}^{F_{24}\otimes \bar{V}^{f\natural}_-}$ obtained in section~\ref{IIAVfnatural}.
\subsubsection*{The case $V^{fE_8} \otimes \bar{V}^{f\natural}$}
In this case we have both $\chi^{\rm R}_+\neq 0$ and $\chi^{\rm R}_-\neq 0$, and only states with all momenta vanishing will contribute. Thus, we expect the theta lift to be independent of $T$ and $U$. Indeed, the contribution to $F(\tau)$ from the $f(\tau,V^{fE_8})$ vanishes (see eq.\eqref{strace}). Hence the partition function is just
\begin{equation}
\mathscr{Z}^{V^{fE_8}\otimes \bar{V}^{f\natural}}=e^{\frac{1}{2}\Theta_0}=1,
\end{equation}
which agrees with the result in section~\ref{IIAVfnatural}.
\subsubsection*{The cases $V_{\pm}^{f\natural} \otimes \bar{V}^{f\natural}_-$}
For $V_{\pm}^{f\natural}$ we have $\chi^R_\pm \neq 0$ (but $\chi^R_\mp=0$). Recall from section \ref{IIAVfnatural} the case $\chi^{\rm R}_+\neq0$ implies that, on-shell, there is a constraint on the winding and momenta such that there is no winding around the spacelike $S^1$. Similarly, the case $\chi^{\rm R}_-\neq 0$ implies that there is no momenta around the $S^1$. Therefore, in the operatorial formalism, one has that $\mathcal{Z}^{V_{+}^{f\natural} \otimes \bar{V}^{f\natural}_-}$ depends only on $U$, while $\mathcal{Z}^{V_{+}^{f\natural} \otimes \bar{V}^{f\natural}_-}$ depends only on $T$.
In the path integral \eqref{pathint}, these conditions are not imposed, so one expects $\mathscr{Z}$ to depend on both $T$ and $U$ and be the same function for both $V_{+}^{f\natural} \otimes \bar{V}^{f\natural}_-$ and $V_{-}^{f\natural} \otimes \bar{V}^{f\natural}_-$.
The calculation is very similar to the case $F_{24} \otimes \bar{V}^{f\natural}_-$, but now \begin{equation} c=f(\tau,{V}^{f\natural}_\pm)\overline{f(\tau,{V}^{f\natural}_-)}=(-24)^2\ .\end{equation}
The result is
\begin{eqnarray}
\mathscr{Z}^{V_{\pm}^{f\natural} \otimes \bar{V}^{f\natural}_-}(T, U)&=&\text{const}\cdot ||\eta^{-24}(T)\eta^{-24}(U)||_{\text{Pet}}^{2\cdot 24}.
\end{eqnarray}
The superdenominator formula should correspond to the 24th power of the holomorphic piece of this partition function, namely $\eta^{-24}(T)$ (or $\eta^{-24}(U)$). This indeed agrees with eq.~\eqref{piVfVf1}.
\subsection{Path integral for the denominator of Type II on $V^{f\natural}_{\pm}\otimes \bar V^{f\natural}_-$}\label{sec:pintdenom}
We shall now move on to compute the path integral for the modified index $\tilde{\mathcal{Z}}^{V_1\otimes \bar V^{f\natural}_-}$ for type IIA on $V_1\otimes \bar V^{f\natural}_-$, corresponding to the denominator function of the BKM superalgebra associated with $V_1$. The modified index $\tilde{\mathcal{Z}}$ is obtained by inserting an operator $(-1)^{\mathbf{F}_l}$ in the trace over the second quantized Hilbert space. The left-moving fermion number $(-1)^{\mathbf{F}_l}$ acts by $+1$ on the physical states in the left-moving NS sector (which give the even elements of the BKM superalgebra) and by $-1$ on physical string states in the left-moving R sector (corresponding to odd elements in the BKM superalgebra). In the path integral formulation of the index, this insertion corresponds to taking either integral or half integral quantization for the momenta in the time direction, depending on the $(-1)^{\mathbf{F}_l}$ eigenvalue of the string running in the loop. Formally, this is equivalent to taking the standard path integral for an orbifold theory, analogous to the CHL string models. One starts from a theory whose Euclidean time circle has twice the radius, and then takes an orbifold by a symmetry $\mathfrak{z} $ acting as a half-period shift along the Euclidean time circle, together with the action of $(-1)^{\mathbf{F}_l}$. As a result, we get a theory whose fields obey $(-1)^{\mathbf{F}_l}$-twisted boundary conditions along the Euclidean time circle.
From a mathematical viewpoint, this procedure amounts to taking the theta lift of vector-valued (rather than scalar) modular forms in the integrand. The general structure of such integrals is recalled in appendix~\ref{app:vectorvaluedtheta}.
Now let us apply this machinery to our setting. Let us consider the example of type IIA string theory on $V^{f\natural}_-\otimes \bar V^{f\natural}_-$. Recall that the path integral for the superdenominator, in this example, is given by \eqref{pathint}, where the integrand is $\Theta_{\Gamma^{2,2}}(T,U,\tau)f(\tau,V^{f\natural}_-)\overline{f(\tau,V^{f\natural}_-)}$. In particular, in the CFT trace inside the integral, the spacetime oscillators cancel against the ghost and superghost contributions, and we are left with the theta series for the winding-momentum lattice on the Euclidean torus times the trace over the internal CFT.
Now, in order to compute the path integral for the denominator, we have to take an orbifold by an order $2$ symmetry $\mathfrak{z}$ acting by a half-period shift along the Euclidean time circle and simultaneously by $(-1)^{\mathbf{F}_l}$. This symmetry acts trivially on the spacetime oscillators and (super)ghosts, so that the same cancellations as for the superdenominator case occur. Therefore, the CFT trace in the integral of \eqref{pathint} is still $\overline{f(\tau,V^{f\natural}_-)}=-24$ times the contributions from the holomorphic internal SVOA and from the winding-momentum. We claim that the integrand has the form
\begin{equation} \sum_{r\in \mathbb{Z}/2\mathbb{Z}}\Tr_{\mathfrak{z}^r}\Bigl(\mathsf{q}^{L_0}\bar\mathsf{q}^{\bar L_0}(-1)^{\mathbf{F}} \frac{1}{2}\sum_{s\in \mathbb{Z}/2\mathbb{Z}}\mathfrak{z}^s\Bigr)=\frac{1}{2}\sum_{r,s\in \mathbb{Z}/2\mathbb{Z}} f(r,s;\tau)\Theta^{r,s}(T,U;\tau)\overline{f(\tau,V^{f\natural}_-)}\ .
\end{equation}
Here, $ \Tr_{\mathfrak{z}^r}$ denotes the trace over the $\mathfrak{z}^r$-twisted sector, and $\frac{1}{2}\sum_{s} \mathfrak{z}^s$ is the projection onto the $\mathfrak{z}$-invariant states. The antiholomorphic SVOA $\bar V^{f\natural}_-$ contributes with the usual factor $\overline{f(\tau,V^{f\natural}_-)}=-24$, since $\mathfrak{z}$ acts trivially on this theory. For each $r,s\in \mathbb{Z}/2\mathbb{Z}$, $f(r,s;\tau)$ is the contribution from the holomorphic internal SVOA $V^{f\natural}_-$, while $\Theta^{r,s}(T,U;\tau)$ comes from the sum over winding and momentum along the space-time torus. Explicitly,
\begin{eqnarray}
f(0,0;\tau)&=&\frac{\phi_{\text{NS}}(\tau)-\phi_{\tilde{\text{NS}}}(\tau)}{2}-\frac{\phi_{\text{R}}(\tau)-\phi_{\tilde{\text{R}}}(\tau)}{2} =-24\nonumber \\
f(0,1;\tau)&=&\frac{\phi_{\text{NS}}(\tau)-\phi_{\tilde{\text{NS}}}(\tau)}{2}+\frac{\phi_{\text{R}}(\tau)-\phi_{\tilde{\text{R}}}(\tau)}{2} =24+4096\mathsf{q}+98304\mathsf{q}^2+1228800\mathsf{q}^3+\cdots \nonumber \\
f(1,0;\tau)&=& \frac{\phi_{\text{NS}}(\tau)+\phi_{\tilde{\text{NS}}}(\tau)}{2}-\frac{\phi_{\text{R}}(\tau)+\phi_{\tilde{\text{R}}}(\tau)}{2} =\mathsf{q}^{1/2}+276 \mathsf{q}^{1/2}-2048\mathsf{q}+11202\mathsf{q}^{3/2}+\cdots
\nonumber \\
f(1,1;\tau)&=&-\frac{\phi_{\text{NS}}(\tau)+\phi_{\tilde{\text{NS}}}(\tau)}{2}-\frac{\phi_{\text{R}}(\tau)+\phi_{\tilde{\text{R}}}(\tau)}{2} =-\mathsf{q}^{-1/2}-276 \mathsf{q}^{1/2}-2048\mathsf{q}-11202\mathsf{q}^{3/2}+\cdots
\nonumber \\
\nonumber
\end{eqnarray}
where in the second line we use the fact that $\mathfrak{z}=(-1)^{\mathbf{F}_l}$ on $V^{f\natural}_-$, and the third and fourth line follow from modular transformations of the second (recall that $f_{\text{NS}}$, $f_{\tilde{\text{NS}}}$, and $f_{\text{R}}$ span a $3$-dimensional representation of $SL(2,\mathbb{Z})$, while $f_{\tilde{\text{R}}}$ is $SL(2,\mathbb{Z})$-invariant).
As for the theta series, we have
\begin{equation} \Theta^{r,s}(T,U;\tau)=\tau_2\sum_{m_1,w_1,m_0\in \mathbb{Z}}\sum_{w_0\in \mathbb{Z}+\frac{r}{2}} \mathsf{q}^{\frac{k_l^2}{2}}\bar \mathsf{q}^{\frac{k_r^2}{2}}(-1)^{sm_0}\ ,
\end{equation} where $k_l,k_r$ are given in \eqref{momenta1},\eqref{momenta2}. This follows from the fact that the winding number $w_0$ is half-integral in the $\mathfrak{z}$-twisted sector, and that a shift by half a period corresponds to multiplication by $(-1)^{m_0}$.
\bigskip
The connection with vector-valued theta lifts can be easily made manifest (see appendix~\ref{app:vectorvaluedtheta} for notation).
Let us consider the lattice $\Lambda=\Gamma^{1,1}\oplus \Gamma^{1,1}(2)$, where $\Gamma^{1,1}$ is the unique even unimodular lattice of signature $(1,1)$, and $\Gamma^{1,1}(2)$ is the same lattice with the quadratic form rescaled by $2$. This implies
\begin{equation}
\Lambda^{\vee}=\Gamma^{1,1}\oplus \tfrac{1}{2}\Gamma^{1,1}(2), \qquad \Lambda^{\vee} /\Lambda\cong \tfrac{1}{2}\Gamma^{1,1}(2)/\Gamma^{1,1}(2)\cong \mathbb{Z}_2\times \mathbb{Z}_2.
\end{equation}
The elements $\lambda \in \tfrac{1}{2}\Gamma^{1,1}(2)$ can be parametrized by
\begin{equation}
\lambda=(m/2, n/2), \qquad \lambda^2=mn.
\end{equation}
The cosets $\gamma\in \Lambda^{\vee}/\Lambda$ are represented by pairs $(r/2,s/2)$ with $r,s\in \mathbb{Z}/2\mathbb{Z}$. With the lattice $\Lambda$ is associated a vector--valued representation $\rho_\Lambda$ of $SL(2,\mathbb{Z})$, as in \eqref{rhoLambda}. We define a vector--valued modular form $F$ for $\rho_\Lambda$ via the discrete Fourier transform as follows
\begin{equation} F_{r,s}(\tau):=\frac{1}{2}\sum_{t\in \mathbb{Z}/2\mathbb{Z}}e^{-\pi i ts}f(r,t;\tau)\overline{f(\tau,V^{f\natural}_-)}.
\end{equation}
This yields
\begin{eqnarray}
F_{00}(\tau)&=&-24(2048\mathsf{q}+\cdots)
\nonumber \\
F_{01}(\tau)&=&-24(-24-2048\mathsf{q}-\cdots)
\nonumber \\
F_{10}(\tau)&=&-24(-2048\mathsf{q}-\cdots)
\nonumber \\
F_{11}(\tau)&=&-24(\mathsf{q}^{-1/2}+276\mathsf{q}^{1/2}+\cdots).
\end{eqnarray}
For later reference let us denote the Fourier expansions of these functions by
\begin{equation}
F_{r,s}(\tau)=-24\sum_{n\in \frac{1}{2}\mathbb{Z}} C_{r,s}(n)\mathsf{q}^n.
\label{FourierCoeff}
\end{equation}
These functions represent the components $F_\gamma(\tau)$ of the vector-valued modular form $F(\tau)$.
Now let us turn to the theta function. The shifted theta series $\theta_{\Lambda+\gamma}$ can be written as follows in terms of the shifted Narain theta series $\Theta^{r,s}$:
\begin{equation}
\theta_{\Lambda+\gamma}=\frac{1}{2}\sum_{t\in \mathbb{Z}/2\mathbb{Z}}e^{\pi i st}\Theta^{r,t}(T, U; \tau),
\end{equation} where $\gamma\equiv(r/2,s/2)\in \Lambda^\vee/\Lambda$.
The inner product in the integrand of the theta lift can now be written out explicitly as follows
\begin{equation}
\left(\overline{\Theta}_\Lambda, F\right)=\sum_{\gamma, \gamma'\in \Lambda^{\vee}/\Lambda}\theta_{\Lambda+\gamma}F_{\gamma'}\delta_{\gamma'-\gamma, 0}=\frac{1}{2}\sum_{r,s\in \mathbb{Z}/2\mathbb{Z}} f(r,s;\tau)\Theta^{r,s}(T,U;\tau)\overline{f(\tau,V^{f\natural}_-)}.
\end{equation}
Thus, the theta integral that we wish to perform is explicitly given by
\begin{equation}
\frac{1}{2}\int_{SL(2,\mathbb{Z})\backslash \mathbb{H}} \left(\overline{\Theta}_\Lambda, F\right)d\mu.
\end{equation}
We can now invoke the general theorems of Borcherds \cite{Borcherds:1996uda} and Carnahan \cite{Carnahan} to deduce that the result of this integral is\footnote{The function $\Phi_F$ considered here is the inverse of the automorphic function $\Phi_M$ defined in theorem 13.3 of \cite{Borcherds:1996uda}. With our conventions, $\Phi_F$ can be directly identified with the path integral $\tilde{\mathscr{Z}}_{sp}$.}
\begin{equation}
\log ||\Phi_F(T, U)||_{\text{Pet}} +\text{const},
\end{equation}
where $\Phi_F(T, U)$ is an automorphic form on $O(2,2;\mathbb{R})/(O(2)\times O(2))$, with the following product representation:
\begin{equation}
\Phi_F(T,U)=
p^{-24}q^{-24}\prod_{m,w\in \mathbb{Z}\atop (\lambda, W)> 0}\prod_{t\in \mathbb{Z}/2\mathbb{Z}} (1-(-1)^tp^w q^{m})^{24C_{0,t}\left(mw\right)}.
\end{equation}
The condition $(\lambda, W)>0$ includes all states $\lambda = (m, w)$ such that $m,w \geq 0$, and $(m,w) \neq (0,0)$.\footnote{We thank Scott Carnahan for clarifications about this point.} We may separate this into states with $w=0, m>0$ and states with $w\geq 1, m\ge 0$. Since $C_{0,0}(0)=0$ and $C_{0,1}(0)=-24$ the first set of states (with the $q^{-24}$ factor) give
\begin{equation}
\left(q^{-1}\prod_{m=1}^{\infty}(1+q^m)^{-24}\right)^{24}
\end{equation}
which we can rewrite in terms of $\eta$-functions according to
\begin{equation}
\left(\frac{\eta(U)^{24}}{\eta(2U)^{24}}\right)^{24}.
\end{equation}
The complete function $\Phi_F$ may now be written as
\begin{equation}
\Phi_F(T, U)=\left(q^{-1}\prod_{m=1}^{\infty}\frac{1}{(1+q^m)^{24}}\right)^{24}\Psi(T,U)^{24},
\end{equation}
where we defined
\begin{equation}
\Psi(T, U)=p^{-1}\prod_{w=1}^{\infty} \prod_{m\ge 0} \left(1-p^wq^m\right)^{C_{0,0}(mw)}\left(1+p^wq^m\right)^{C_{0,1}(mw)}.
\end{equation}
Here $C_{0,0}$ and $C_{0,1}$ are the Fourier coefficients defined in (\ref{FourierCoeff}). The function $\Psi(T,U)^{24}$ matches exactly with the modified index $\tilde{\mathcal{Z}}^{V^{f\natural}_- \otimes \bar{V}^{f\natural}_-}$ in eq.\eqref{modindVmVm}, and its $24$-th root $\Psi(T, U)$ is the denominator formula in eq.(4.18) of \cite{Harrison:2018joy}. The factor $\left(q^{-1}\prod_{m=1}^{\infty}\frac{1}{(1+q^m)^{24}}\right)^{24}$ is the contribution of the spurious states, so that $\Phi_F$ matches with $\tilde{\mathcal{Z}}_{sp}^{V^{f\natural}_-\otimes \bar V^{f\natural}_-}(T,U)$ in equation~(\ref{spurious2}).
Using similar techniques one may compute the path integrals for the other cases and reproduce the corresponding denominator functions obtained in section~\ref{sec:IIAex2}.
\section{Discussion}
\label{sec:discussion}
In this paper we construct a family of distinguished type IIA and heterotic string compactifications to two spacetime dimensions. These compactifications are distinguished by the fact that there exists an action of a BKM algebra on the BPS subspsace of the Hilbert space of physical states in the models, which we illustrate in \S \ref{sec:algebras}, following the original construction for the monster BKM algebra in \cite{PPV1, PPV2}. Furthermore, we demonstrate how a spacetime supersymmetric index in our theories---computed from both a trace in the Hilbert space (\S \ref{sec:secondquantized}) and via a path integral (\S \ref{sec:pathintegrals})---furnishes an automorphic form which is (closely related to) a denominator function for the corresponding BKM algebra. In this family we find a spacetime string--theoretic setting for the BKM algebras constructed in \cite{Sch1,Harrison:2018joy,Harrison:2020wxl}, among many others.
The compactifications we consider in this paper are also distinguished because they are highly symmetric, and the corresponding BKM algebras which arise have large finite symmetry groups, in some cases sporadic groups. For example, $V^{f\natural}$ has an action of the Conway group \cite{Duncan}, which carries over to an action on the corresponding BKM arising from the chiral string compactification \cite{Harrison:2018joy}. The lattice VOAs $V_L$ based on the Niemeier lattices $L$ have symmetry group corresponding to (extensions of) the automorphism group of the lattice.\footnote{These are the groups appearing in the umbral moonshine phenomenon \cite{CDH2}. It would be very interesting if there was a connection between these physical models and umbral moonshine.} (For $L$ the Leech lattice, this is the group $Co_0$, while other cases have symmetry groups $M_{24}$ and $2.M_{12}$ arising from the Mathieu groups.) In light of this fact, a natural question is to explore so--called CHL models \cite{CHL} based on these compactifications, which arise from orbifolds of string theory on $\mathcal{C} \times T^d$. These orbifolds arise by quotienting by a symmetry of the internal CFT $\mathcal C$ combined with a translation along the torus $T^d$. For a general discussion, see \cite{Persson:2017lkn}. In the monster case of \cite{PPV1, PPV2}, where $\mathcal{C}= V^\natural \otimes \bar V^{f\natural}$, considering these CHL models leads to a family of ``twisted" denominator formulas for the spacetime BKM algebra. It would be interesting to generalize this to the case of models considered in this paper.
Furthermore, these CHL models also inspired a proposed physical explanation for the genus zero property of monstrous moonshine \cite{CN}. As the Conway moonshine arising from the SVOA $V^{f\natural}$ also satisfies a genus zero property \cite{Duncan:2014eha},\footnote{To be precise, Conway moonshine is usually expressed in terms of $V^{s\natural}$, which is an SVOA isomorphic to $V^{f\natural}$, but with a different action of the Conway group. In our setup, it would be more natural to re-formulate this moonshine phenomenon in terms of $V^{f\natural}$.} it would be very interesting to offer a physical explanation along the lines of that in \cite{PPV1,PPV2} based on the constructions in this paper and their corresponding CHL models.
Besides finding explicit physical models where one can explore the physics of BPS algebras, another one of our original motivations for this work was to uncover new 2d spacetime string theoretic dualities, where one can explore connections to BKM algebras and automorphic forms. It is the case that a single automorphic form on the moduli space $\mathcal M$ of some family of string compactifications can have multiple distinct Fourier expansions at different ``cusps" of $\mathcal M$, and that the expansion at each cusp corresponds to the (super)denominator formula a unique BKM (super)algebra, as in \cite{Gritsenko:2012qn}. In a string theory context, these BKMs arise as symmetries of different perturbative duality frames of a given compactification, which can be related by discrete duality transformations. We imagine that this furnishes a physical explanation for the following observations:
\begin{enumerate}
\item The denominator of the Conway BKM superalgebra constructed in \cite{Harrison:2018joy} arises as the Fourier expansion of automorphic form on $(\mathbb H\times \mathbb H)/O(2,2,\mathbb Z)$ at a given cusp. The authors of this paper gave evidence for the existence of a distinct BKM superalgebra, which also has an action of the Conway group, and whose denominator and superdenominator should correspond to the expansion of the same automorphic form at a different cusp of $(\mathbb H\times \mathbb H)/O(2,2,\mathbb Z)$. The construction in the present article provides a natural description of this new mysterious superalgebra. In section \ref{sec:pathintegrals}, we described the denominator of the Conway superalgebra as a path integral with `twisted' boundary conditions along the Euclidean time circle, i.e. with the fields being periodic or antiperiodic depending on their eigenvalue with respect to the left-moving spacetime fermion number $(-1)^{\mathbf{F}_l}$. The expansions of this automorphic function at different cusps are related to one another by $O(2,2,\mathbb{Z})$ T-duality transformation. A general T-duality does not necessarily preserve these boundary conditions, but can map them to $(-1)^{\mathbf{F}_l}$-twisted boundary conditions along the spacelike circle or around both circles. In particular, the path integrals obtained from these two boundary conditions are related, respectively, to the denominator and superdenominator of a different BKM superalgebra, the one obtained by taking the CHL model by $(-1)^{\mathbf{F}_l}$ along the spacelike circle.
\item Along similar lines, one of the BKM superalgebras discussed in \cite{Harrison:2020wxl} (and originally constructed by Borcherds in \cite{BorcherdsFake,Borcherds96,BorcherdsMM}) arises from the expansion of an automorphic form for a group of the form $\Gamma \backslash SO(2,10)/SO(2) \times SO(10)$ (where $\Gamma$ is a discrete group of automorphisms of a particular lattice.) Expanding this automorphic form at a different cusp gives rise to another BKM superalgebra, based of the SVOA $V^{fE_8}$ and originally constructed by Scheithauer in \cite{Sch1}. See example 13.7 in \cite{Borcherds:1996uda} for a description of this relation, and sections 6 and 7 of \cite{Harrison:2020wxl} for further elaboration of this point. We expect this connection arises physically from dualities of certain models we consider in this paper.
\end{enumerate}
These are just two examples where we believe string dualities acting on models of the type we study in this paper lead to nontrivial relations among different BKM algebras, though we expect there are many more.
Finally, we close with a number of additional natural questions which are raised by our analysis:
\begin{itemize}
\item While our analysis in this paper has been limited to 2-dimensional string compactifications, we hope that BKM algebras act as symmetries of special string solutions in higher dimensions in a similar way. For example, it would be interesting to study decompactification limits of our models to higher dimensions (perhaps along similar lines as \cite{KPV}), and understand what, if any, symmetries of the BKM algebras are preserved in these limits. One could also try to construct such algebras directly from worldsheet theories of certain higher dimensional string compactifications.
\item It would be very interesting to understand the D-brane states in the family of type II string compactifications considered here, which we imagine may furnish representations of the BKM algebras we have constructed.
\item The denominator of the fake monster superalgebra, arising as the modified index for type IIA strings on $V^{fE_8}\otimes \bar V^{f\natural}_-$, also appears as the genus one topological amplitude $F_1$ in in type II string theory on the Enriques Calabi-Yau threefold $X$ (the ``FHSV-model'') \cite{Klemm:2005pd}. From this point of view the modified index can be interpreted as a generating function for Gromov-Witten invariants on $X$. It would be interesting to understand more generally whether such geometric interpretations exist for other denominator formulas obtained in this paper. In view of heterotic-type II duality the perturbative BPS-states contributing to our indices should correspond to non-perturbative states in another duality frame. Mathematically, this would correspond to counting Donaldson-Thomas invariants on $K3, T^4$, or the Enriques Calabi-Yau threefold $X$.
\item Many of the (S)VOAs which appear as part of the worldsheet theory in our models have connections to large sporadic symmetry groups, arising as automorphisms that preserve some suitable subVOA (see, e.g., \cite{DuncanMC, M5, Bae:2020pvv}.) It would be interesting to understand if these structures are present in the BKM algebras which appear in the spacetime of our models.
\item In \cite{Kawaguchi2021jinvariantAB} it was observed that the denominator formula for one of the BKM superalgebras in \cite{Harrison:2020wxl} can be obtained starting from the $SL(2,\mathbb{Z})$-invariant $J$-function. Can this connection be explained in terms of heterotic-type II string duality?
\item It would be interesting to determine if any of our models arise as special points in the moduli space of any of the 2d string models considered in \cite{Sen:1996na}, where certain dual pairs of 2d superstring compactifications were identified.
\item As discussed in more detail in section \ref{sec:algebras}, it would be satisfying to study a twisted version of our models, so that our space of BPS states becomes a space of physical states in a topological string theory, perhaps with a natural action of the BKM algebras.
\end{itemize}
\section*{Acknowledgements} It is a pleasure to thank Scott Carnahan and Nils Scheithauer for very helpful email correspondences.
The work of S.M.H. is supported by the National Science and Engineering Council of Canada, an FRQNT new university researchers start-up grant, and the Canada Research Chairs program.
NMP is supported by the grant NSF PHY-1911298, and the Sivian Fund. D.P. was supported by the Swedish Research Council (Vetenskapsr\aa det), grant nr. 2018-04760.
|
\section{Introduction} \label{sec:intro}
Data analysis techniques in modern science are becoming increasingly important in achieving significant discoveries and breakthroughs in the data of scientific observations and experiments. As these observations and experiments gradually became larger, the amount of accumulated data became vast; accordingly the data processing and analysis involved in extracting meaningful information have become significant in various fields of science. Hence, this has created a novel area of data science, and its foundation includes advanced data analysis algorithms and mathematical principles, as well as the progressive development of computational resources.
Modern experimental equipment and observation facilities are becoming more complex and precise, in which there are considerable noises to be identified and mitigated to mitigate harm to the physical interpretation from data analysis. \ac{Gw} detectors, such as the \ac{aligo} \cite{TheLIGOScientific:2014jea}, Virgo \cite{TheVirgo:2014hva}, and KAGRA \cite{Akutsu:2018axf} are complex facilities with high-precision measurements. These facilities comprises highly complicated and interconnected systems affected by various electronics and devices surrounding instruments and environments. Hence, to improve the quality of data for scientific purposes, it is crucial to elucidate subsystems of the detector and its overall status, as well as categorize and mitigate the noises from the systems and the environments. In particular, owing to the interference and mutual impacts between multi-channels in the complex devices, a few non-linear couplings also limit the detector of \ac{Gw}s. To date, several efforts in identifying the correlations of transient noises have been made to characterize aLIGO \ac{Gw} detectors. In particular, a long-duration coincidence between detector's range fluctuations and disturbances from auxiliary channels has been investigated via the \ac{lasso} regression \cite{Walker:2018ylg}. From this perspective, measuring the correlation between two random variable helps to identify the noise source elements associated with a particular device, and analyze significant relevance.
Several measures have been introduced and utilized in identifying linear relevance, such as Pearson's correlation coefficient \cite{Pearson}, Spearman rank correlation coefficient \cite{Spearman}, and Kendall's $\tau$ coefficient \cite{Kendall}, as well as non-linear relationships such as mutual information (MI) \cite{LINFOOT195785, MI1,MI2}, distance correlation (dCorr) \cite{dCorr}, correlation distributed along curve \cite{Delicado2008}, and Heller-Heller-Gorfine (HHG) distance test \cite{HHG2012} between two variables. Another method for measuring non-linear correlation, {\it maximal information coefficient (MIC)}, has been proposed in Ref. \cite{reshef_detecting_2011} with (non-)functional relationships \cite{Zhang2014, Speed1502}. MIC designs an approach to detect non-linear association, considering the maximal MI values defined on the $a \times b$ grid in a two-variable data plane. Hence, MIC explores every possible $a\times b$ grid up to maximal bin resolutions, and selects the maximal value among the computed MIC values on grids. The association between two datasets can be visualized when the scattered plot is depicted on the $X-Y$ plane. Reshef {\it et al.} \cite{JMLR:v17:15-308} also proposed an empirical estimator of MIC (MICe) that avoids any heuristic approach to maximize the value for all possible resolutions. Let $D$ be a set of ${\mathfrak N}$ ordered pairs, and the total grid size is restricted by $B({\mathfrak N})={\mathfrak N}^{\alpha}$ and $c$. Note that $\alpha$ is a dimensionless parameter that controls the size of grids with $0 < \alpha <1$, and $c$ is a controlling parameter for the coarseness of the discrete grid-maximization search. Then, MICe is defined as:
\begin{equation} \label{eq:mice}
MIC^{e}(X, Y, \alpha, c) = \max_{ab<B({\mathfrak N})} \Big\{\frac{\max I^{[*]}(D, a, b)}{\log_{2} \min\{a,b\}} \Big\},
\end{equation}
where $I^{[*]}(D, a, b)$ indicates that MI is maximized in the set of $a \times b$ grids whose y-axis partition is the equipartition of size $b$, if $a \le b$. (Please refer to \ref{sec:appendixA} for more details on MI and MIC.)
\begin{figure}[t!]
\begin{center}
\includegraphics[width=\textwidth]{alphaVSc.png}
\caption{Plot of MICe values in Eq. (\ref{eq:mice}) for varying $\alpha$ and $c$ between two random variables.} \label{Fig.alphavsc}
\end{center}
\end{figure}
Computing MI using the grid method is simple and straightforward; however several issues need to be addressed to apply this method directly to the correlation analysis. First, there is a problem with the reliability of the estimator in choosing parameters. The value of grid-based estimators relies on choosing their parameters to establish the appropriate resolution of bins. For instance, a parameter choice can result in a non-zero value of the estimator when two variables $X$ and $Y$ are Gaussian noise sets that do not have any associations. Figure \ref{Fig.alphavsc} presents an illustrative example of how the association strength of estimators varies by selecting a set of parameters, $(\alpha, c)$. Second, we have to decide the lower bound of the data size for securing the residence of background noises, which is related to the challenge posed by the absolute value of MIC and its interpretation. For example, no significant correlation for any two random samples is expected such that its correlation coefficient should vanish. However, the estimator (MIC) is not the case for the arbitrary sample size data. This issue has been addressed, and a novel method for computing MIC combined with $\chi^2$-statistics, called ChiMIC, has been proposed \cite{chimic2016}. However, it remains insufficient to interpret the MIC results for some reliable data size and parameter sets.
Furthermore, these two issues are directly related to the problem of computational costs. With a steady increase in data size or the value of parameters, the computing costs required increase. In addition, to estimate the non-linear associations between time-series datasets, additional factors, such as data sampling rates and the type of background noises, also exert significant effects on the results.
As pointed out in Ref. \cite{Speed1502}, MI is limited in interpreting the results; however MIC has been introduced to address its limitation by suggesting the criterion of equitability. Nevertheless, optimizing parameters to produce reliable results and interpretation remains crucial in extracting convincing information from the given data.
We summarize the aforementioned practical issues in computing and interpreting MIC values, as expressed in the following questions:
\begin{itemize}
\item How is the MIC value differently varied under the different types of background noises in data?
\item What is the reliable sampling rate and data size? In addition, how do they influence the computational cost?
\item When we handle the data from multi-channel devices with different sampling rates, does the resampling process affect MIC results? If so, what is the best way of resampling to obtain a reliable MIC score?
\end{itemize}
To answer these questions, we conduct MIC (MICe) tests with a wide range of MIC parameters and obtain a few guidelines for setting parameters when using and interpreting MIC results.
This study investigates various cases of optimizing parameters in computing MIC, and presents a methodology for parameter optimization. This research is motivated by contributions from previous studies on the formulation of MIC \cite{chimic2016, Simon2014, Justin2014}.
In Section~\ref{sec:dataNmethods}, we discuss the process of setting up datasets for alternative/null hypotheses and the statistical power, thereby providing optimized parameters based on analytical results from the relationship between the strength and parameters presented in Section~\ref{sec:results}. Finally, we discuss our results in Section~\ref{sec:discussions}.
\section{Data and Methods} \label{sec:dataNmethods}
We prepare datasets with some particular associations between two random variables. If noiseless random time-series $X(t)$ and $Y(t)$ can be described by $Y(X)=X$, two variables exhibit a perfect linear correlation. Similarly, we can construct a paired dataset with linear, quadratic, cubic, sinusoidal, fourth-root, circular, and stepwise associations defined by various functional relationships as presented in Table \ref{Table.FunctionTypes}.
To generate a simulated dataset, we mix Gaussian, gamma, and Brownian noises with given datasets $X(t)$ and $Y(t)$, as well as a real instrumental noise from the \ac{Gw} detector (GWD).
The GWD noise is taken from the \ac{Gw} public open data center for aLIGO. aLIGO is a 4-km long gravitational-wave detector using laser interferometry at Hanford (Washington) and Livingston (Louisiana), USA \cite{RICHABBOTT2021100658}.
It is known that the typical behavior of GWD noise is non-stationary and non-Gaussian owing to complex interconnected couplings between hundreds of thousands of instrumental and environmental noise sources.
\renewcommand\arraystretch{1.2}
\renewcommand{\tabcolsep}{5pt}
\begin{table}[htp]
\begin{tabularx}{\columnwidth}{l|l}
\hline
Functional Association Type & Function Form between $X$ and $Y$ \\ \hline
Linear & $Y(X)=X$ \\
Quadratic & $Y(X)=4(X-\frac{1}{4})^2$ \\
Cubic & $Y(X)=128(X-\frac{1}{3})^3 -48(X-\frac{1}{3})^2-12(X-\frac{1}{3})$ \\
Sinusoidal: a half period & $Y(X)=\sin{(4\pi X)}$ \\
Sinusoidal: a quarter period & $Y(X)=\sin{(16\pi X)}$ \\
Fourth-root & $ Y(X)=X^{1/4} $ \\
Circular & $Y(X) = \pm \sqrt{1-(2X-1)^2}$ \\
Stepwise & $ Y(X)= 0 \quad \mbox{if } X \le 1/2 \quad {\rm or}~ 1 \quad \mbox{if } X > 1/2$ \\ \hline
\end{tabularx}
\caption{Datasets and functional types of random variables $X$ and $Y$ with special associations.} \label{Table.FunctionTypes}
\end{table}
First, we investigate the diversity of MIC values under the different types of background noises. Owing to the level of noises in various noise types (for example, Gaussian versus gamma noises), we need to define a consistent approach to interpreting compared to MIC values under the different noise backgrounds. To achieve this let us consider two time-series datasets, \textcolor{black}{$X(t)$ and $Y(t)$ which have the relation as follows,
\begin{equation}
\label{eq:Y(t)}
Y = F(X) + (\textrm{RND}(n,1)-0.5)\times {\mathcal N} \times {\mathcal R},
\end{equation}
where $F$ is a functional relation shown in Table \ref{Table.FunctionTypes}, and $\mathcal R$ represents the range of $F$. And $\mathcal N$ is a relative weight of the noise amplitude and $\textrm{[RND]}$ is randomly generated $n$ numbers in $[0,1]$ following the Ref. \cite{chimic2016}. For the time-series data, we take a time interval called stride. Since the sampling rate of the two datasets is in general not the same, we take samples with a sampling rate in a given stride, then we obtain the number of samples as $N=f_{samp}\times \textrm{stride}$. For the test of the MICe correlation, we prepare the time-series dataset for one second ($\textrm{stride}=1s $) with a different sampling rate: $f_{samp} [Hz] = \{512, 1024, 2048, 4096, 8196\}$. Therefore, the data we used has the number of data points: $N=\{512, 1024, 2048, 4096, 8196\}$. A schematic cartoon view of generating data samples from the time-series data is shown in Fig. \ref{Fig.time-series}.}
\begin{figure}[htp]
\begin{center}
\includegraphics[width=\columnwidth]{time-series_data.png}
\caption{A cartoon view of data samples from the time-series data. For a given stride, we obtain the discrete time-series data with the same sample size $N=f_{samp}\times \textrm{stride}$.} \label{Fig.time-series}
\end{center}
\end{figure}
To assess an association effect of MICe for varying parameters in the different noise backgrounds, we introduce a statistical power rejecting the probability of the null hypothesis $H_0$ when the alternative hypothesis $H_1$ is true. We consider the datasets for the alternative hypothesis $H_1$, while datasets for the null hypothesis $H_0$ are randomly permuted $x$ to create the lower association data. \textcolor{black}{The set for describing $H_0$ is defined as:
\begin{eqnarray} \label{eq: null}
S_{0}(\epsilon) \equiv \big\{ {\mathcal M} = MIC^{e}\left( X_{0}(t), Y_{0}(t), \epsilon \right) | {\mathcal M} \leq D_{0}^{95{\%}} \big\}.
\end{eqnarray}
where $D_{0}^{95\%}$ is an element of the ninety-fifth percentile in a set of $MIC^{e}$ with two random variables, $X_0$ and $Y_0$.}
Given the parameters of $\epsilon=(\alpha, c)$ in $MIC^{e}(X, Y, \epsilon)$, when we measured 500 independent observations for both hypotheses, the MICe established, satisfying the alternative hypothesis is defined as: \textcolor{black}{
\begin{equation}
S_{1}(\epsilon) \equiv \big\{ {\mathcal M} = MIC^{e}\left(X(t), Y(t), \epsilon \right) | {\mathcal M} > D_{0}^{95\%}(\epsilon) \big\}
\end{equation}
where $D_{0}^{95\%}(\epsilon) \in S_{0}(\epsilon)$.}
The set $S_{1}(\epsilon)$ containing MICe value, which are greater than an element of the set for the null hypothesis, exhibits true positive (TP). Hence, we can define a statistical power of MICe, ${\mathcal P}^{\mathrm{MICe}}$, by the ratio between the number of TP samples and the number of alternative samples $N_{1}$ for a given parameter set of $\epsilon$ as:
\begin{equation} \label{eq: power}
{\mathcal P}^{\mathrm{MICe}}(\epsilon) \equiv N[D_{1}^{5\%}(\epsilon)]/N_{1},
\end{equation}
where \textcolor{black}{$N[D_{1}^{5\%}]$ represents the number of samples that has greater MICe value than the fifth percentile of $H_1$, $D_{1}^{5\%}(\epsilon) \in S_{1}$.}
The statistical power in Eq. (\ref{eq: power}) indicates the possible separability between two hypotheses. An example of the statistical power is presented in Fig. \ref{Fig.PowerExample}, in which the statistical power of MICe for both hypotheses is plotted for diverse values of the noise amplitude levels. For low noise amplitude levels, it can be inferred that the statistical power of MICe seems efficient owing to the significant separation of both hypotheses. In contrast, the statistical power decreases when the noise amplitude level increases. We deduce that the statistical power is sufficiently efficient above $0.95$ at ${\mathcal N}$$\sim 2$ in this example.
\begin{figure}[t!]
\includegraphics[width=\columnwidth]{PowerNDensityExample-new.png}
\caption{Plot depicting the statistical power of MICe in the noise amplitude in Eq. (\ref{eq:Y(t)}) and the distribution densities of each hypothesis. \textcolor{black}{For example, we draw the power of MICe for the case of the sinusoidal association with a quarter period in Table \ref{Table.FunctionTypes}.}} \label{Fig.PowerExample}
\end{figure}
\section{Experimental Tests} \label{sec:results}
Based on aforementioned criterion, we estimate the statistical power of MICe for every functionally associated dataset under different background noises. To determine the effect of parameters on the power of MICe, we investigate two factors for optimizing the parameters of MICe - an {\it area under the power curve} (AUPC) and computational cost. The AUPC is defined as an area under the statistical power curve for a given parameter value presented in Fig. \ref{Fig.PowerExample}. However, we estimate by computing a sample of MICe to vary the data sample size $N$\footnote{We conducted tests in a single node of clusters with {\tt Intel(R) Xeon(R) CPU [email protected]} and {\tt the minepy package} \cite{minepy}.} because the computing cost increases in proportion to ${\mathcal O}(c^2B(N)^{5/2}) = {\mathcal O}(c^2N^{5\alpha/2})$ as $N$ increases \cite{JMLR:v17:15-308}. As discussed in Section \ref{sec:dataNmethods}, the number of data samples improves the statistical power against the higher noise amplitude. However, the computational cost increases owing to the size of the data sample growth, as illustrated in Fig. \ref{Fig.ComputingCost}. Therefore, determining an optimal parameter set between the statistical power and the computational cost is crucial.
\begin{figure}[t!]
\includegraphics[width=\columnwidth]{computingcost_2d.png}
\caption{Plot of computing runtimes \textcolor{black}{(in log-scale)} for varying $\alpha$ with a fixed $c=3$: as expected, the plot relies on the data sample size as $\alpha$ increases. \textcolor{black}{The computing runtime is the averaged value of ten computations.} } \label{Fig.ComputingCost}
\end{figure}
\subsection{Data samples and Parameter Selection}
Here, we first investigate the statistical power in Eq. (\ref{eq: power}) versus the noise amplitude for different numbers of data samples and different background noises. As presented in Fig. \ref{Fig.Powers}, each plot for $N=512,2048$, and $8192$ describes the statistical power as the noise amplitude increases for different background noises of the given parameters $\epsilon=(\alpha,~c)=(0.5,~1)$. In addition, the averaged curve of the statistical power for MICe is plotted with a bold marker in each figure.\footnote{Please refer to Ref. \cite{zenodo} for the whole results for $N=512,1024,2048,4096,8192$.}
For low noise amplitude levels, the power seems sufficiently effective regardless of background noises; however, the power decreases with the different levels of the efficiency as the noise amplitude level increases. When the sample size becomes large, the statistical power also remains efficient as the noise amplitude level increases, as illustrated in the plots for $N=8192$ in each plot. Except for the cases of the fourth-root and circular relationships, every association has a constantly efficient power for larger $N$ cases. In particular, it is observed that the circular association between two variables seems to be significantly sensitive to noises. Consequently sufficient data samples are required to maintain a reliable statistical power of MICe. If we consider the averaged curve of the statistical power for MICe, we may select ${\mathcal N}$$\sim 2$ for the most efficient power of MICe. However, we cannot apply this in a real case because we would be unable to elucidate the accurate association and functional relationships with the noisy datasets.
\begin{figure*}[htp]
\includegraphics[width=\textwidth]{powers_a05_c1-new.png}
\caption{Plots of the statistical power of MICe for eight functional associations and the averaged curve under each noise background and given parameters $(\alpha, c)=(0.5,1)$. The results are comprehensively presented in \cite{zenodo}.} \label{Fig.Powers}
\end{figure*}
\begin{figure*}[htp]
\includegraphics[width=\textwidth]{avgAUPCs.png}
\caption{Heat maps of the averaged AUPC under each noise background for varying $\alpha$ and $c$ when $N=512$, $2048$, and $8192$. The results are comprehensively presented in \cite{zenodo}.} \label{Fig.AUCpowers}
\end{figure*}
\begin{figure*}[htp]
\includegraphics[width=\textwidth]{powerNcost_all_1.png}
\caption{Plots of the averaged AUPC of MICe versus the relative computational cost for varying parameters of $\epsilon=(\alpha, c)$. \textcolor{black}{Each point represents the AUPC with the corresponding computational cost for a given parameter $(\alpha, c)$.} The red asterisk mark points represent the \textcolor{black}{proposed values of parameters with the maximal averaged AUPC for relatively low computational cost of a given sample size $N$.} \textcolor{black}{Hence we conclude that the parameter value $(\alpha, c)$ of the red asterisk marks can be regarded as the maximal AUPC of MICe, \textcolor{black}{considering the relatively low} computational cost.} The analysis results are comprehensively presented in \cite{zenodo}.} \label{Fig.AUCpowersNcost}
\end{figure*}
Now, we can estimate the most optimal set of $\epsilon$ producing the highest power of MICe for different background noises. In Fig. \ref{Fig.AUCpowers}, the heatmaps of the average AUPC are illustrated relative to $N=512, 4096$, and $8192$ in the parameter space of varying $\alpha$ and $c$. Each block in this heatmap indicates the strength of the averaged AUPC with the efficient values of parameters $\alpha$ and $c$ for a given data sample and background noise. Note that each block in the heat map depicts the lower left-hand side value of $(\alpha, c)$. Therefore, by computing the averaged AUPC for varying parameters, we can select more efficient parameter sets to produce the highest statistical power of MICe. We select the parameter set of $(\alpha, c)$ and its relative computing cost for each data sample size that provides the highest averaged AUPC presented in Table \ref{tab:optparameters}. The relative computing cost is computed as a relative value based on the computational time of the Gaussian noise case for $N=512$.
We can plot the average AUPC versus the computation cost for each noise type, and the data sample size in Fig.~\ref{Fig.AUCpowersNcost}, \textcolor{black}{which exhibits a consistent pattern of computational cost versus average AUPC that can be calculated for each number of data samples. Each point represents the average AUPC with the computational cost for a given $(\alpha, c)$. For each tail of a fixed $\alpha$ and varying $c$, we want to choose a \textcolor{black}{proposed} set of $(\alpha, c)$ with maximal AUPC, which is marked with the red asterisk.
The \textcolor{black}{proposed parameter set of $(\alpha, c)$ with the maximal AUPC} of MICe is presented in Table \ref{tab:optparameters}. }
\subsection{Resampling for Multi-channel Datasets}
If a dataset comprises data obtained from multi-channel devices with various sampling frequencies, it is necessary to equally match the different sampling frequencies of the two channels. Here, there are three ways to do this: 1) match both equally by down-sampling the channel of the high sampling frequency (HD) 2) match both equally by up-sampling the channel of the low sampling frequency (LU) 3) match both equally by up-sampling (down-sampling) the channel of the low (high) sampling frequency into the intermediate sampling frequency (BR). Therefore, we need to investigate the effect of the resampling process on the statistical power of MICe.
To achieve this, we first prepare two datasets with different sampling frequencies, $f=8192Hz$ and $f=1024Hz$. We investigate the above three scenarios for all functional associations under different noise background levels of ${\mathcal N}=2$. The first option is to equally down-sample the data with $f=8192Hz$ to that with $f=1024Hz$ (HD) while we up-sample the data with $f=1024Hz$ to that with $f=8192Hz$ equally in the second option (LU). Finally, we resample both datasets to an intermediate sampling frequency of $f=2048Hz$ or $4096Hz$ (BR). Some analysis results for only linear and circular correlations are presented in Fig. \ref{Fig.ResamplePowers}. The plots illustrate the statistical power aspect for distinguishing null and alternative distributions when we resample datasets. Except for a specific case of circular association for Gaussian and gamma noises, the resampling effect does not affect the statistical power of MICe. This phenomenon emerges because the down-sampled data size of the circular association in the Gaussian noise case is insufficient to possess the statistical power required to distinguish null/alternative distributions. This criterion is validated for comparisons by performing another experiment with the datasets of $f=8192Hz$ and $f=1024Hz,~2048Hz$, and $4096Hz$ in Gaussian/gamma noise backgrounds in Fig. \ref{Fig.ResampleGaussianNGamma}, in which it is inferred that the statistical power increases as down-sampled datasets size increases, thus implying that it is important to obtain the data sample size after down-sampling, regardless of the resampling procedure. Therefore, we infer that if the sufficient size of data samples is guaranteed, the data resampling does not affect the statistical power of computing MICe.
\renewcommand\arraystretch{1.4}
\renewcommand{\tabcolsep}{2pt}
\begin{table*}[!htbp]
\begin{small}
\centering
\begin{tabular}{ccccccc}
\hline
\hline
Noise Type & $N$ & $\alpha$ & $c$ & Averaged AUPC & Relative Computing Cost & Runtime (sec) \\ \hline\hline
\multirow{5}{*}{Gaussian Noise} & 512 & 0.35 & 7.0 & 5.434 & 1.000 & 7.2779$\times 10^{-4}$ $\pm$ 5.1360$\times 10^{-6}$ \\
& 1024 & 0.35 & 2.0 & 6.899 & 1.286 & 9.4907$\times 10^{-4}$ $\pm$5.3110$\times 10^{-5}$\\
& 2048 & 0.30 & 5.0 & 9.166 & 1.625 & 1.1988$\times 10^{-3}$ $\pm$ 3.5905$\times 10^{-5}$ \\
& 4096 & 0.25 & 7.0 & 11.465 & 3.069 & 2.2643$\times 10^{-3}$ $\pm$ 5.1274$\times 10^{-5}$ \\
& 8192 & 0.25 & 7.0 & 13.742 & 5.694 & 4.2009$\times 10^{-3}$ $\pm$ 1.5290$\times 10^{-5}$ \\\cline{1-7}
\multirow{5}{*}{GW Detector Noise} & 512 & 0.55 & 7.0 & 8.535 & 1.000 & 1.4158$\times 10^{-2}$ $\pm$ 5.4217$\times 10^{-5}$ \\
& 1024 & 0.50 & 7.0 & 11.092 & 1.040 & 1.4721$\times 10^{-2}$ $\pm$ 6.6200$\times 10^{-5}$ \\
& 2048 & 0.55 & 6.0 & 14.164 & 4.561 & 6.4571$\times 10^{-2}$ $\pm$ 5.8023$\times 10^{-4}$ \\
& 4096 & 0.55 & 6.0 & 16.566 & 10.781 & 1.5264$\times 10^{-1}$ $\pm$ 4.1442$\times 10^{-3}$ \\
& 8192 & 0.50 & 7.0 & 18.199 & 13.330 & 1.8872$\times 10^{-1}$ $\pm$ 3.7194$\times 10^{-4}$ \\\cline{1-7}
\multirow{5}{*}{Gamma Noise} & 512 & 0.6 & 7.0 & 16.752 & 1.000 & 2.9842$\times 10^{-2}$ $\pm$ 8.6986$\times 10^{-5}$ \\
& 1024 & 0.50 & 7.0 & 18.234 & 0.493 & 1.4721$\times 10^{-2}$ $\pm$ 6.6200$\times 10^{-5}$ \\
& 2048 & 0.45 & 7.0 & 18.955 & 0.531 & 1.5858$\times 10^{-2}$ $\pm$ 9.5062$\times 10^{-5}$ \\
& 4096 & 0.40 & 7.0 & 19.346 & 0.466 & 1.3906$\times 10^{-2}$ $\pm$ 4.6712$\times 10^{-5}$ \\
& 8192 & 0.40 & 7.0 & 19.614 & 1.069 & 3.1898$\times 10^{-2}$ $\pm$ 4.4971$\times 10^{-5}$ \\\cline{1-7}
\multirow{5}{*}{Brownian Noise} & 512 & 0.60 & 6.0 & 13.320 & 1.000 & 2.2202$\times 10^{-2}$ $\pm$ 5.4714$\times 10^{-5}$ \\
& 1024 & 0.55 & 7.0 & 15.736 & 1.613 & 3.5811$\times 10^{-2}$ $\pm$ 2.3834$\times 10^{-3}$ \\
& 2048 & 0.50 & 6.0 & 17.495 & 1.252 & 2.7804$\times 10^{-2}$ $\pm$ 1.0220$\times 10^{-4}$ \\
& 4096 & 0.50 & 5.0 & 18.652 & 2.014 & 4.4709$\times 10^{-2}$ $\pm$ 8.6971$\times 10^{-5}$ \\
& 8192 & 0.50 & 5.0 & 19.367 & 4.886 & 1.0848$\times 10^{-1}$ $\pm$ 2.1029$\times 10^{-3}$ \\ \cline{1-7}
\end{tabular}
\caption{Table of proposed parameters \textcolor{black}{(in red asterisk marks in Fig. \ref{Fig.AUCpowersNcost})} of $\epsilon = (\alpha, c)$ for data samples ($N$) under various background noises. The selected parameters provide the maximal averaged AUPC. The relative computational cost is the relative value calculated based on the computational time of each noise with $N=512$. The runtime solely depends on the selected $\alpha, ~N$, and $c$, regardless of the choice of the noise type.}
\label{tab:optparameters}
\end{small}
\end{table*}
\begin{figure*}[htp]
\includegraphics[width=\textwidth]{resampling_reduced_powertests-new.png}
\caption{Comparison of the statistical powers and the distribution of MICe values for resampling datasets with different scenarios under each nose background. Please refer to \cite{zenodo} for the entire analysis results.} \label{Fig.ResamplePowers}
\end{figure*}
\begin{figure}[htp]
\includegraphics[width=\columnwidth]{resampling_powertest_gaussianNgamma-new.png}
\caption{Comparison between the statistical powers of three cases for down-samplings. The $HD 1024$, $HD 2048$, and $HD 4096$ cases represent the down-sampling to $f=1024Hz$, $2048Hz$, and $4096Hz$ from $f=8192Hz$, respectively.} \label{Fig.ResampleGaussianNGamma}
\end{figure}
\section{Discussions} \label{sec:discussions}
This study investigated various aspects of computing MICe to address the questions posed in the introduction section. These questions are frequently asked while using MICe in the \ac{Gw} data analysis with multi-channel datasets. Moreover, similar questions could emerge in other fields of science and engineering. According to the analysis results provided in this study, we can establish a strategy for setting the parameters required to compute MICe between datasets from multi-channel devices. First, we can check the noise level between two datasets by computing ${\mathcal N}$ expected to be ${\mathcal O}(1)$. If the discord of the noise level is severe, we can perform a relatively denoising procedure to obtain a comparable noise level. Subsequently, we perform the resampling process to maintain a sufficient data sample size. Finally, we compute the averaged AUPC and select a set of MICe parameters, $(\alpha, c)$, with a reasonable computational cost.
As summarized, it is observed that the statistical power of MICe depends on the choice of parameter sets, noise level of data, and data sample size. Furthermore, the values of the parameters rely on the type of background noise and data sample size adopted. To compute some gauges of ${\mathcal N}$ and ${\mathcal P}^{\mathrm{MICe}}$, we can select the set of parameters $(\alpha, c)$, yielding the maximal result of the statistical power. To handle the data of different sampling frequencies, it is crucial to have a sufficient data sample size, regardless of the resampling scenarios selected. Even if we can improve the MICe algorithm by suggesting other methods, it is appropriate to identify the non-linear couplings between two variables from different channels. To make a more reliable decision, it is important to have a consistent standard for interpretations.
\section*{Acknowledgments}
The authors would like to thank Kyujin Kwak, Kyungmin Kim, and Whansun Kim for their helpful discussions and comments.
This work was supported by the Basic Science Research Program through a National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2020R1I1A2054376). Furthermore, this work is partially supported by the NRF grant funded by the Korean government's Ministry of Science and ICT (No.\ 2019R1A2C2006787, No.\ 2016R1A5A1013277, No.\ 2021R1A2C1093059, and No.\ 2022R1C1C2012226).
|
\section{Introduction}
When a heavy fluid is supported or accelerated by a light fluid, the physical phenomenon of small perturbations at the interface growing with time is called Rayleigh-Taylor (RT) instability. Because of the gravitational field, the light fluid rises as a bubble structure and the heavy fluid sinks as a spike structure. When the amplitude is equal to the wavelength, the disturbance begins to become asymmetric, and then grows nonlinearly, and finally enters the turbulent mixing stage\cite{Dimonte2004}. The RT instability is a typical and fundamental interfacial instability that plays an important role in many fields, such as inertial confinement fusion \cite{Ping2019, Lindl2004, Jacquemot2017}, supernova explosions \cite{Ribeyre2004, Fraschetti2010, Hillebrandt2013}, meteorology \cite{Agee1974, Jiang2013}, and geophysics \cite{Houseman1997, Kaus2007, Ghosh2020}. Therefore, the study of RT instability has important theoretical significance and application value, and has aroused considerable interest and been developed rapidly.
The study of RT instability began with the classical linear stability theory proposed by Rayleigh and Taylor, and they discovery that the amplitude of the disturbance in the early stage has exponential growth law\cite{Rayleigh1882, Taylor1950}. In the past few decades, scholars have proposed many numerical methods to study RT instability, including the monte carlo method \cite{Barber2006}, the direct numerical simulation method \cite{Cook2001,Liang2019}, the monotone integrated large eddy simulation \cite{Youngs2009}, the smooth particle hydrodynamics method \cite{Shadloo2013}, the parallel adaptive wavelet collocation method \cite{Reckinger2015}, the phase-field method \cite{Yang2021}, etc. The above methods provide an effective tool for the study of RT instability. By using these methods, authors studied the effects of different physical quantities on RT instability. Wang et al. studied the influence of interface width on the RT instability under weakly nonlinear conditions \cite{Wang2010}. Wei et al. studied the single-mode RT instability problem at low Atwood (At) numbers \cite{Wei2012}. Yang et al. studied the effect of side-wall boundary on RT instability \cite{Yang2021}. Bian et al. systematically analyzed the influence of the disturbed Reynolds number and At number on the late growth of RT instability \cite{Bian2020}.
The above research enriches our in-depth understanding of the RT instability, but at the same time, these conclusions are mainly focus on the macro level, and do not involve concrete thermodynamic non-equilibrium (TNE) information. In order to have a deeper understanding of the TNE evolution law of RT instability systems, we turn to the Boltzmann equation based on non-equilibrium statistical physics, which can not only provide macroscopic fluid dynamics information, but also mesoscopic non-equilibrium information. In the last three decades, the lattice Boltzmann method (LBM) develops rapidly and becomes an effective tool for researching complex dynamics and kinetic behavior, which is self-adaptive in physical description. The discrete Boltzmann method (DBM) is a variant of the standard LBM. Formally, both DBM and LBM use the discrete Boltzmann equation. But in most literature LBM is regarded as a new scheme to solve partial differential equations, while DBM is a coarse-grained physical model based on non-equilibrium statistical physics. It chooses a research perspective and selects a set of kinetic properties to study the system. Thus, it requires that the corresponding kinetic moments describing those properties to keep values in the model simplification \cite{Xu2012,XuAG2018,Xu2021,XuAG2021}. From the perspective of physical modeling, DBM which describes the TNE effect is approximately equivalent to a continuous fluid model and a coarse-grained model. In the region where the Navier-Stokes (NS) model is valid, it is equivalent to the NS equations plus a coarse-grained model of TNE. And in the case of the NS failure, it is equivalent to a modified NS equations plus a coarse-grained model of TNE \cite{Xu2012,Gan2015}. In recent ten years, DBM has been widely used in a variety of complex flow systems \cite{Xu2015,Lai2016,Lin2016,Chen2016,Lin2017,Xu2018,Chen2018,Zhangm2018,GAN2018,LiDM2018,Gan2019,Zhang2019,Ye2020,Chen2020,Lin2020}, and it provides an effective tool to study the non-equilibrium effects in RT instability. Lai et al. studied the influence of compressibility on RT instability, and found that compressibility inhibits the evolution of RT instability in the early stage, but promoted the development in the later stage. At the same time, the TNE also increases with the enhancement of compressibility \cite{Lai2016}. Chen et al. studied the effects of viscosity, heat conduction and Prandtl number on RT instability by using a multiple-relaxation-time DBM \cite{Chen2016}. Lin et al. studied the effect of Reynolds numbers on both global non-equilibrium manifestations and the growth rate of the entropy of mixing though the two-component DBM \cite{Lin2017}. Li et al. used the DBM
to simulate the multi-mode RT instability in a compressible fluid system and explore the evolutionary mechanism \cite{LiDM2018}. Ye et al. used the DBM to explore the influence of Knudsen number on the compressible RT instability, and found that the Knudsen number suppresses the development of RT instability, and also enhances both hydrodynamic non-equilibrium (HNE) and TNE strength \cite{Ye2020}. Chen et al. studied the coupled Rayleigh-Taylor-Kelvin-Helmholtz instability system with the multi-relaxation-time DBM, and studied the complex fluid structure and dynamics process by introducing the morphological boundary length and TNE strength \cite{Chen2020}.
Furthermore, the specific heat ratio is one of the most important parameters to describe the thermodynamic properties of fluids, which is closely related to the compressibility of fluids. It is of great theoretical and application value to study the influence of the specific heat ratio on the evolution of complex fluid system. Bernstein et al. found that the evolution rate of RT instability decreases with the specific heat ratio increasing\cite{Bernstein1982}. Fraley et al. presented a solution for the perturbation growth of density discontinuity caused by shock waves at the material interface, and analyzed the interface asymptotic velocities at different specific heat ratios \cite{Fraley1986}. Livescu et al. found that when the specific heat ratios of the upper and lower fluids are different, the growth rate of RT instability is more sensitive to the change of the specific heat ratio of the lower fluid. However, when the At number is large, the growth rate is less affected by the specific heat ratio of the fluid, and then the equilibrium pressure at the interface becomes the main parameter that affects the compressibility of the system \cite{Livescu2004}. Lafay et al. proved that as the compressibility of the two fluids decreases, the linear growth rate increases, and when the compressibility of two fluids is equal, the linear and nonlinear behaviors are opposite \cite{Lafay2007}. He et al. studied the effect of the interface specific heat ratio on the growth rate of RT instability, and found that when the specific heat ratio of the upper heavy fluid is small, it would hinder the growth of RT instability. And the opposite effect will be achieved when the specific heat ratio of the lower fluid is relatively small \cite{He2008}. Xue et al. found that when the specific heat ratio decreases, the compressibility has a destabilizing effect \cite{Xue2010}. Wang et al. studied the evolution of RT instability related to the low specific heat ratio $(\gamma <5/3)$ in the remnants of the Type Ia supernovae \cite{Wang2011}. Hu et al. studied the impact of the specific heat ratio on the piston effect by simulating eight near-critical fluids \cite{Hu2016}. Zhao et al. studied the bubble growth in compressible RT and RM instabilities, and found that in the RT instability, the adiabatic index and density of the upper fluid increase the amplitude and velocity of the bubble, but reduce the radius of curvature in the early stage, while the influence of the adiabatic index and density of the lower fluid is exactly the opposite\cite{Zhao2020}. These studies have achieved fruitful results and improved our understanding of the physical laws of compressible RT instability.
However, the above research results mainly focus on the description of macroscopic HNE behaviors, and do not contain TNE effect at the intermediate scale. In this paper, the DBM is used to study the effects of the specific heat ratio on RT instability, and both TNE and HNE effects are discussed and analyzed. Furthermore, the non-equilibrium laws of mesoscopic dynamics are presented, which are helpful for us to understand the evolutionary process of multi-scale interface instability. The remaining structure of this paper is as follow: Section \ref{Methodology} introduces the DBM and the details of non-equilibrium quantity extraction. Section \ref{Numerical Simulations} displays the numerical simulation. The effects of the specific heat ratio on RT instability and its physical mechanism are analyzed in detail. Finally, a brief conclusion is given in Section \ref{Conclusions}.
\section{Discrete Boltzmann model}\label{Methodology}
In this work, the discrete Boltzmann equation with the Bhatnagar-Gross-Krook collision term \cite{Zhang2018, Tamura2011, Gan2013} can be described by:
\begin{equation}\label{e5}
\frac{{\partial {f_i}}}{{\partial t}} + {\textbf{v}_i}\cdot\frac{{\partial {f_i}}}{{\partial {\textbf{r}}}} - \frac{{{\textbf{a}}\cdot({\textbf{v}_i} - \textbf{u})}}{{T}}f_i^{eq} = - \frac{1}{\tau }({f_i} - f_i^{eq}),
\end{equation}
where $f_i$ and $f_i^{eq}$ are the discrete forms of the velocity distribution function and the Maxwellian distribution function, respectively, $t$ is the time, $\textbf{v}_i$ the discrete velocity, $i (=1, 2, \cdots ,N)$ the discrete velocity direction, $\textbf{r}$ the space coordinates, $\textbf{a}$ the external force, $\textbf{u}$ the macroscopic velocity, $T$ the fluid temperature, and $\tau$ the relaxation time.
It can be easily proved that, by means of the Chapman-Enskog multi-scale expansion, the compressible NS equations can be recovered by this model in the hydrodynamic limit:
\begin{eqnarray}\label{e6}
\left\{
\begin{array}{ll}
\frac{\partial \rho}{\partial t} + \nabla \cdot (\rho \textbf{u}) = 0, & \\[10pt]
\frac{\partial}{\partial t}(\rho \textbf{u}) + \nabla \cdot (\rho \textbf{u}\textbf{u} + p\textbf{I} + \textit{\textbf{P}}) = \rho \textbf{a}, & \\[10pt]
\frac{\partial}{\partial t} \Big[\rho \Big(e + \frac{|\textbf{u}|^2}{2}\Big)\Big]+ \nabla \cdot \Big[\rho\textbf{u}\Big(e + T + \frac{|\textbf{u}|^2}{2} \Big) + \textit{\textbf{J}} + \textit{\textbf{P}} \cdot \textbf{u} \Big] \\[10pt]
= \rho \textbf{a} \cdot \textbf{u}, &
\end{array}
\right.
\end{eqnarray}
here, $\rho$ denotes the fluid density, $\textit{\textbf{P}}$ and $\textit{\textbf{J}}$ are quantities related to viscous stress and heat flux respectively, and the specific forms are:
\begin{equation}\label{e7}
\textit{\textbf{P}} = -\mu\Big[\nabla \textbf{u} + (\nabla \textbf{u})^T - \frac{2}{D+n}(\nabla \cdot \textbf{u})\textbf{I}\Big],
\end{equation}
\begin{equation}\label{e8}
\textit{\textbf{J}} = -\kappa \nabla T,
\end{equation}
and $e = [(D+n)/2]T$ is the internal energy per unit mass of the system, $\kappa = (D+n+2)\mu/2$ the thermal conductivity coefficient, $\mu = \tau\rho T = \tau p$ the dynamic viscosity coefficient, and $D$ the space dimension, $n$ the number of additional degrees of freedom introduced except translational freedom. In order to obtain a macroscopic result consistent with the compressible NS equations in the continuous limit condition, the local equilibrium distribution function in the discrete Boltzmann equation needs to satisfy the following seven kinetic moment relations:
\begin{eqnarray}\label{e9}
\sum\limits_{i}f_{i}=\sum\limits_{i}f_{i}^{eq}=\rho,
\end{eqnarray}%
\begin{eqnarray}\label{e10}
\sum\limits_{i}f_{i}\textbf{v}_i
=\sum\limits_{i}f_{i}^{eq}\textbf{v}_i=\rho \textbf{u},
\end{eqnarray}%
\begin{eqnarray}\label{e11}
\sum\limits_{i}f_{i}(\textbf{v}_{i} \cdot \textbf{v}_{i} + \eta_{i}^2)
=\sum\limits_{i}f_{i}^{eq}(\textbf{v}_{i} \cdot \textbf{v}_{i} + \eta_{i}^2)
=\rho \big[(D+n)T+\textbf{u} \cdot \textbf{u}\big],\nonumber\\
\end{eqnarray}%
\begin{eqnarray}\label{e12}
\sum\limits_{i}f_{i}^{eq}\textbf{v}_{i} \textbf{v}_{i}
=\rho (T\mathbf{I} +\textbf{u}\textbf{u}),
\end{eqnarray}%
\begin{eqnarray}\label{e13}
\sum\limits_{i}f_{i}^{eq}(\textbf{v}_{i} \cdot \textbf{v}_{i}+\eta_{i}^2)\textbf{v}_{i}
=\rho \textbf{u}\big[(D+n+2)T+\textbf{u} \cdot \textbf{u}\big],
\end{eqnarray}%
\begin{eqnarray} \label{e14}
\sum\limits_{i}f_{i}^{eq}\textbf{v}_{i}\textbf{v}_{i}\textbf{v}_{i}
=\rho\big[T(\textbf{u}_\alpha \textit{\textbf{e}}_\beta \textit{\textbf{e}}_\chi \delta_{\beta\chi}
+\textit{\textbf{e}}_\alpha\textbf{u}_\beta\textit{\textbf{e}}_\chi \delta_{\alpha\chi}
+\textit{\textbf{e}}_\alpha\textit{\textbf{e}}_\beta \delta_{\alpha\beta} \textbf{u}_\chi)\nonumber\\
+\textbf{u}\textbf{u}\textbf{u}\big],\qquad
\end{eqnarray}%
\begin{eqnarray}\label{e15}
\sum\limits_{i}f_{i}^{eq}(\textbf{v}_{i} \cdot \textbf{v}_{i}+\eta_{i}^2)\textbf{v}_{i}\textbf{v}_{i}
=\rho T \big[(D+n+2)T +\textbf{u} \cdot \textbf{u}\big]\textit{\textbf{e}}_\alpha\textit{\textbf{e}}_\beta \delta_{\alpha\beta} \nonumber\\
+\rho \textbf{u}\textbf{u}\big[(D+n+4)T+\textbf{u}\cdot\textbf{u}\big].\qquad
\end{eqnarray}%
In fact, the above seven kinetic moment relations can be expressed in a matrix form as below:
\begin{equation}\label{e16}
\textbf{C} \cdot \textbf{f}^{eq} = \hat{\textbf{f}}^{eq},
\end{equation}
where
\begin{equation}\label{e17}
\textbf{f}^{eq} = [f_1^{eq}, f_2^{eq}, \cdots , f_N^{eq}]^{\rm{T}},
\end{equation}
\begin{equation}\label{e18}
\hat{\textbf{f}}^{eq} = [\hat{f}_1^{eq}, \hat{f}_2^{eq}, \cdots , \hat{f}_N^{eq}]^{\rm{T}},
\end{equation}
and $\textbf{C}$ is the coefficient matrix concerning the discrete velocity $\textbf{v}_i$ and the free parameter $\eta_i$. To solve $\textbf{f}^{eq}$ requires that the coefficient matrix should have at least $16\times16$ elements, namely, the velocity model should contain at least 16 discrete velocities. At this point, if $\textbf{C}$ is an invertible matrix, Eq. \ref{e16} leads to:
\begin{equation}\label{e19}
\textbf{f}^{eq} = \textbf{C}^{-1} \cdot \hat{\textbf{f}}^{eq}.
\end{equation}
In this work, 2-dimensional 16-velocity (D2V16) discrete velocity model is adopted\cite{Lin2016}, as shown in Fig. \ref{FIG01}. In the previous work \cite{Lai2016}, there is only one tunable parameter that controls all values of discrete velocities. In the current work, there are four tunable parameters which indicate magnitudes of four groups of discrete velocities. Compared with the former one, the latter discrete velocity model is more flexible in the selection of discrete velocities, and is beneficial to the robustness and accuracy of the DBM. And the discrete velocity value is obtained by these equations:
\begin{equation}\label{e20}
\textit{\textbf{v}}_i= \left\{
\begin{array}{ll}
v_a\Big[\cos\frac{(i-1)\pi}{2},\sin\frac{(i-1)\pi}{2}\Big], & i=1,\cdots,4, \\[10pt]
v_b\Big[\cos\frac{(2i-1)\pi}{4},\sin\frac{(2i-1)\pi}{4}\Big], & i=5,\cdots,8, \\[10pt]
v_c\Big[\cos\frac{(i-9)\pi}{2},\sin\frac{(i-9)\pi}{2}\Big], & i=9,\cdots,12,\\[10pt]
v_d\Big[\cos\frac{(2i-9)\pi}{4},\sin\frac{(2i-9)\pi}{4}\Big], & i=13,\cdots,16,
\end{array}
\right.
\end{equation}
meanwhile, $\eta_i=\eta_0$ when $i=1,\cdots,4$, and $\eta_i=0$ when $i=5,\cdots,16$.
\begin{figure}[tbp]
\center\includegraphics*%
[scale=0.4]{FiG01.eps}
\caption{Sketch of discrete velocity model.}\label{FIG01}
\end{figure}
Both HNE and TNE effects play important roles in non-equilibrium fluid systems. In general, the non-equilibrium information is too complex to be described in detail. Fortunately, the DBM provides an effective tool for studying the non-equilibrium phenomena. Among the seven kinetic moment relations, Eqs. \ref{e9}-\ref{e11} represent the conservation of mass, momentum and energy, respectively, and remain unchanged when the system is moving toward or away from thermodynamic equilibrium. And the TNE information can be extracted from the deviation caused by the $f_{i}$ replacing $f_{i}^{eq}$ in the nonconserved kinetic moments Eqs. \ref{e12}-\ref{e15}.
According to the above ideas, we introduce the kinetic central moments $\textbf{M}_{m,n}^*$ of the velocity distribution function and the equilibrium distribution function \cite{Yan2013},
\begin{eqnarray}\label{e21}
\left\{
\begin{array}{ll}
\textbf{M}_{2}^*(f_i)=\sum\limits_i f_i \textbf{v}_{i}^*\textbf{v}_{i}^*, \\[10pt]
\textbf{M}_{3}^*(f_i)=\sum\limits_i f_i \textbf{v}_{i}^* \textbf{v}_{i}^*\textbf{v}_{i}^*,\\[10pt]
\textbf{M}_{3,1}^*(f_i)=\sum\limits_i f_i[\textbf{v}_{i}^* \cdot \textbf{v}_{i}^*+\eta_{i}^2]\textbf{v}_{i}^*,\\[10pt]
\textbf{M}_{4,2}^*(f_i)=\sum\limits_i f_i[\textbf{v}_{i}^*\cdot \textbf{v}_{i}^*+\eta_{i}^2]\textbf{v}_{i}^*\textbf{v}_{i}^*,
\end{array}
\right.
\end{eqnarray}
and
\begin{eqnarray}\label{e22}
\left\{
\begin{array}{ll}
\textbf{M}_{2}^*(f_i^{eq})=\sum\limits_i f_i^{eq} \textbf{v}_{i}^*\textbf{v}_{i}^*, \\[10pt]
\textbf{M}_{3}^*(f_i^{eq})=\sum\limits_i f_i^{eq} \textbf{v}_{i}^* \textbf{v}_{i}^*\textbf{v}_{i}^*,\\[10pt]
\textbf{M}_{3,1}^*(f_i^{eq})=\sum\limits_i f_i^{eq}[\textbf{v}_{i}^* \cdot \textbf{v}_{i}^*+\eta_{i}^2]\textbf{v}_{i}^*,\\[10pt]
\textbf{M}_{4,2}^*(f_i^{eq})=\sum\limits_i f_i^{eq}[\textbf{v}_{i}^*\cdot \textbf{v}_{i}^*+\eta_{i}^2]\textbf{v}_{i}^*\textbf{v}_{i}^*,
\end{array}
\right.
\end{eqnarray}
where $\textbf{v}_{i}^* = \textbf{v}_i - \textbf{u}$, the subscript ``$m, n$'' denotes the reduction of $m$-order tensor to $n$-order tensor. Then, the non-equilibrium quantity can be defined as follows:
\begin{eqnarray}\label{e23}
\boldsymbol{\Delta}_{m,n}^* &=&\textbf{M}_{m,n}^*(f_i)-\textbf{M}_{m,n}^*(f_i^{eq}),
\end{eqnarray}
which $\boldsymbol{\Delta}_{m,n}^*$ describes the information of the thermal fluctuations, including 12 components $\Delta_{2\alpha \beta}^*$, $\Delta_{3\alpha \beta \chi}^*$, $\Delta_{(3,1)\alpha}^*$, $\Delta_{(4,2)\alpha \beta}^*$, $\alpha, \beta, \chi = x$ or $y$. In order to qualitatively analyze the global TNE effect of the system, we define several specific TNE quantities:
\begin{eqnarray}\label{e24}
|\boldsymbol{\Delta}_{2}^*| = |\Delta_{2xx}^*| + |\Delta_{2xy}^*| + |\Delta_{2yy}^*|,
\end{eqnarray}
\begin{eqnarray}\label{e25}
|\boldsymbol{\Delta}_{3,1}^*| = |\Delta_{3,1x}^*| + |\Delta_{3,1y}^*|,
\end{eqnarray}
\begin{eqnarray}\label{e26}
|\boldsymbol{\Delta}_{4,2}^*| = |\Delta_{4,2xx}^*| + |\Delta_{4,2xy}^*| + |\Delta_{4,2yy}^*|,
\end{eqnarray}
\begin{eqnarray}\label{e27}
|\boldsymbol{\Delta}_{3}^*| = |\Delta_{3xxx}^*| + |\Delta_{3xxy}^*| + |\Delta_{3xyy}^*| + |\Delta_{3yyy}^*|.
\end{eqnarray}
And the total TNE quantity can describe the degree of deviation from the equilibrium of the fluid system:
\begin{eqnarray}\label{e28}
|\boldsymbol{\Delta}^*| = |\boldsymbol{\Delta}_{2}^*| + |\boldsymbol{\Delta}_{3,1}^*| + |\boldsymbol{\Delta}_{4,2}^*| + |\boldsymbol{\Delta}_{3}^*|.
\end{eqnarray}
Moreover, the global average TNE strength in the system is defined as:
\begin{eqnarray}\label{e29}
\overline{D} = \frac{1}{L_xL_y}\int_0^{L_x}\int_0^{L_y} |\boldsymbol{\Delta}^*| dxdy,
\end{eqnarray}
the global average viscous stress tensor strength in the system is defined as:
\begin{eqnarray}\label{e30}
\overline{D}_{2} = \frac{1}{L_xL_y}\int_0^{L_x}\int_0^{L_y} |\boldsymbol\Delta_{2}^*| dxdy,
\end{eqnarray}
and the global average heat flux strength in the system is defined as:
\begin{eqnarray}\label{e31}
\overline{D}_{3,1} = \frac{1}{L_xL_y}\int_0^{L_x}\int_0^{L_y} |\boldsymbol\Delta_{3,1}^*| dxdy,
\end{eqnarray}
where $L$ represents the boundary length of the simulation region.
\section{Numerical Simulations}\label{Numerical Simulations}
In this section, numerical simulations are carried out in a two-dimensional rectangular region $\Omega = [-d/2, d/2] \times [-2d, 2d]$. The system with upper and lower layers of fluid is placed in a gravitational field with constant gravitational acceleration, and a cosine disturbance $y_c(x) = y_0\cos(kx)$ is applied at the interface between the two fluids, where $y_0 = 0.05d$, $k = 2\pi/\lambda$ denotes wave number, and $\lambda = d$ the perturbance wavelength. At the initial moment, the system satisfies the static equilibrium condition:
\begin{eqnarray}\label{e32}
\partial_y p_0(y) = -g\rho_0(y),
\end{eqnarray}
where $g$ indicates the magnitude of gravitational acceleration. And the initial conditions of the unstable system are:
\begin{equation}\label{e33}
\left\{
\begin{array}{l}
T_0(y)=T_u,~\rho_0(y)=\frac{p_0}{T_u}\exp{\big[\frac{g}{T_u}\big(2d-y\big)\big]},~y>y_c(x), \\[8pt]
T_0(y)=T_b,~\rho_0(y)=\frac{p_0}{T_b}\exp\big[\frac{g}{T_u}\big(2d-y_c(x)\big)
\\[8pt]
-\frac{g}{T_b}\big(y-y_c(x)\big)\big],~y<y_c(x),
\end{array}
\right.
\end{equation}
where $p_0$ represents the pressure at the top of the system, $T_u$ and $T_p$ express the initial temperatures of the upper and lower fluid, respectively. At the same time, the pressure beside the interface of the two fluids should be consistent, which can be known from the equation of state of ideal gas:
\begin{equation}\label{e34}
\rho_u T_u=\rho_b T_b,
\end{equation}
where $\rho_u$ and $\rho_b$ are the densities of the upper and lower fluids near the interface, respectively.
In the simulation process, a computing grid $N_x \times N_y = 256 \times 1024$ is used. The top and bottom boundaries are dealt with solid wall boundary conditions, and the left and right boundaries are dealt with periodic boundary conditions, the time and space steps are $\Delta t = 2 \times 10^{-5}$, and $\Delta x = \Delta y = 5\times10^{-4}$, respectively. The initial pressure at the top of the system is $p_0 = 1.0$, and the relaxation time $\tau = 4 \times 10^{-5}$. The temperatures at the upper and lower parts are $T_u = 1.0$ and $T_p = 4.0$, respectively. And the other parameters are $(v_a, v_b, v_c, v_d) = (0.9, 0.9, 4.2, 4.2)$, $\eta_0 = 15$, $a_x = 0.0$, $a_y = -g = -1.0$.
Next, we will focus on the influence of the specific heat ratio $\gamma$ on the RT instability. The specific heat ratio is one of the most important parameters to describe the thermodynamic properties of gases. And the expression of $\gamma$ is as follows:
\begin{eqnarray}\label{e35}
\gamma = \frac{n+4}{n+2}.
\end{eqnarray}
\begin{figure}[tbp]
\center\includegraphics*%
[scale=0.17]{FIG02.eps}
\caption{Temperature contours at different time instants (from left to right) $t$ = 0.8, 1.6, 2, 2.14, 2.68, and 3, respectively.}\label{FIG02}
\end{figure}
\begin{figure*}
\begin{center}
\includegraphics[bbllx=200pt,bblly=0pt,bburx=592pt,bbury=477pt,width=0.4\textwidth]{FIG03.eps}
\end{center}
\caption{Evolution of global average temperature gradients with various specific heat ratios: (a) the global average temperature gradient in the $x$ direction, (b) the global average temperature gradient in the $y$ direction, (c) the global average temperature gradient, (d) the relationship between the gradient value at $t=1.6$ and the specific heat ratio.}\label{FIG03}
\end{figure*}
In order to study the effect of $\gamma$, we adjust the number of extra degrees of freedom $n$ to change $\gamma$. Here, we choose $n=0,1,2,\cdots,8$, correspondingly $\gamma =2$, 5/3, 3/2, 7/5, 4/3, 9/7, 5/4, 11/9, 6/5. In order to observe the changes of interface length and width more clearly, the spatial distribution diagram of temperature is presented with $\gamma =7/5$, as shown in Fig. \ref{FIG02}. Firstly, the global average temperature gradients in fluid system are discussed. The formula for calculating the global average temperature gradients are shown below:
\begin{equation}\label{e33}
\overline{T_x}=\frac{1}{L_x L_y} \int_0^{L_x}\int_0^{L_y}|\nabla_x T|dxdy,
\end{equation}
\begin{equation}\label{e33}
\overline{T_y}=\frac{1}{L_x L_y}\int_0^{L_x}\int_0^{L_y} |\nabla_y T|dxdy,
\end{equation}
\begin{equation}\label{e33}
\overline{T}=\frac{1}{L_x L_y}\int_0^{L_x}\int_0^{L_y} |\nabla T|dxdy.
\end{equation}
Figures \ref{FIG03} (a)-(b) delineate the evolution of the global average temperature gradients in $x$ and $y$ directions, respectively, and Fig. \ref{FIG03} (c) illustrates the global average temperature gradient of the fluid system over time. It can be seen from Fig. \ref{FIG03} (a) that the global average temperature gradients in $x$ direction corresponding to different $\gamma$ values have roughly the same changing trend. Take the case with $\gamma = 7/5$, $\overline{T_x}$ gradually rises and presents an exponential growth state, and at $t = 2.06$, the $\overline{T_x}$ no longer increases and then shows a downward trend. At $t = 2.68$, $\overline{T_x}$ shows a short-term upward trend, and this state continues until $t = 3$, after that $\overline{T_x}$ starts decreasing all the way down.
The physical reason for this phenomenon is that, at the initial stage, the distance between the bubble and the spike increases exponentially, and the change of the temperature in the $x$ direction is concentrated in the middle range between the spike and the bubble, so the temperature gradient shows an exponential growth trend in the early stage, at this time, a large number of high-temperature and low-density fluids at the bottom have risen to low-temperature and high-density flow fields, which reduces the temperature at the bottom and increases the temperature at the top. In the $x$ direction, the temperature at the bottom generally presents a state of high temperature fluid on both sides and low temperature fluid in the middle. When the spike is about to touch the bottom, the mixing of two fluids further increases and even tends to be saturated, this makes the temperature in the system tend to be consistent, leading to the decrease in the global average temperature gradient. At the same time, with the increase of $\gamma$, the values of $\overline{T_x}$ are roughly the same, but there is a big difference near the peak value. Due to the disordered development of the system, the physical mechanism becomes more complex in the latter stage.
However, the change of the global average temperature gradient in the $y$ direction is completely different from the one in the $x$ direction. As can be seen from Fig. \ref{FIG03} (b), $\overline{T_y}$ keeps constant from $t = 0$ to $t = 0.85$, and increases from $t = 0.85$ to $t = 1.6$. After $t = 1.6$, $\overline{T_y}$ begins to show a downward trend until the spike arrive at the bottom. Then, the RT system enters into the chaotic stage, and the evolution of $\overline{T_y}$ becomes more complex. Throughout the evolution, an interesting phenomenon can be observed: $\overline{T_y}$ always keeps constant during the initial period. This is because, in the early stage, the change of the temperature is concentrated in the front of the spike and bubble, and the change is uniform, while in other regions, the change of the temperature are negligible, which makes $\overline{T_y}$ maintain constant in the early stage. As the system evolves, some small vortex structures appear due to the shear stress in the fluid system, and the temperature no longer varies monotonously in the vertical direction, which leads to the gradual increase of $\overline{T_y}$. Therefore, the moment when $\overline{T_y}$ is out of the fixed value can be taken as the criterion to judge the formation of the vortex structure. Fig. \ref{FIG03} (c) illustrates the change curve of the temperature gradient of the fluid system. It can be observed that the maximum of $\overline{T_x}$ is twice that of $\overline{T_y}$. The integral absolute value of temperature gradient in the $x$ direction ($y$ direction) is associated with the changing trend of temperature gradient along the $x$ direction ($y$ direction) and the vertical (horizontal) length of the computational region. On the one hand, within the mixing area between the hot and cold media, the value of temperature gradient first decreases then increase in the $x$ direction, and the value of temperature gradient reduces monotonously in the $y$ direction. On the other hand, the vertical length $L_y$ is greater than the horizontal length $L_x$. In other words, the area where the temperature gradient in the $x$ direction ($y$ direction) deviates from zero is larger (smaller). Consequently, the maximum of temperature gradient in the $x$ direction is larger than that in the $y$ direction. Moreover, with the increase of $\gamma$, the global average temperature gradient shows an decreasing trend. This is because for a larger specific ratio, the morphological structure of the fluid becomes more complex, and the temperature field has larger spatial changes. Furthermore, it can be found that the value of $\overline{T}$ at $t = 1.6$ and $\gamma$ have the following functional relationship: $\overline{T}_{t=1.6} = 39.94-1.07\gamma$.
\begin{figure}[tbp]
\center\includegraphics*%
[scale=0.18]{FIG04.eps}
\caption{Schematic diagram of the ways that the specific heat ratio effects affect the global TNE intensity.}\label{FIG04}
\end{figure}
Next the TNE behaviors of the RT instability are investigated, and then the change of different TNE quantities are analyzed. The ways the specific heat ratio effects affect the global TNE intensity are shown in Fig. \ref{FIG04}. Figure \ref{FIG05} shows the evolution of the global average intensity $\overline{D}_2$ of the non-equilibrium quantity $\Delta_{2\alpha \beta}^*$ over time. It can be found that, $\overline{D}_2$ increases first and then decreases. Furthermore, $\overline{D}_2$ increases with the decrease of $\gamma$. To explain the trend of $\overline{D}_2$ in detail, we take $\gamma =7/5$ as an example, it can be found that $\overline{D}_2$ increases rapidly at the early period, and with the spike reaches bottom at $t = 2.14$, $\overline{D}_2$ first shows a down trend and then gradually increases, and at $t = 5.8$, it reaches the peak, after that $\overline{D}_2$ starts to oscillate less. Next, the effect of $\gamma$ on $\overline{D}_2$ is analyzed. When $t < 2.14$, there is no significant difference in fluid structure between different examples. At this point, with the increase of $\gamma$, the compressibility decreases and the TNE strength decreases, which is consistent with our previous work. At $t > 2.14$, the morphological structure of the system generates great difference, and the complexity of the morphological structure makes the evolution of $\overline{D}_2$ have no obvious rule.
\begin{figure}[tbp]
\center\includegraphics*%
[scale=0.28]{FIG05.eps}
\caption{Evolution of the global average strength $\overline{D}_2$.}\label{FIG05}
\end{figure}
\begin{figure*}[tbp]
\begin{center}
\includegraphics[bbllx=200pt,bblly=0pt,bburx=592pt,bbury=477pt,width=0.4\textwidth]{FIG06.eps}
\end{center}
\caption{TNE quantities $\overline{D}_{3,1x}$, $\overline{D}_{3,1y}$ and $\overline{D}_{3,1}(=|\overline{D}_{3,1x}|+|\overline{D}_{3,1y}|)$ versus time under different specific heat ratios. (d) the fitting curve of the value of $\overline{D}_{3,1}$ at $t=1.6$ and $\gamma$ as: $\overline{D}_{3,1,t=1.6} = 0.01+14.21
\times\exp(-5.67\gamma)$.}\label{FIG06}
\end{figure*}
Figure \ref{FIG06} shows the evolution of the average intensity and global average intensity of each component of $\Delta_{3,1\alpha}^*$ with time. It can be found from the three subgraphs that $\overline{D}_{3,1x}$, $\overline{D}_{3,1y}$ and $\overline{D}_{3,1}$ all decrease with the increase of $\gamma$. To explain this physical phenomena, we resort to Eq. \ref{e8}. It can be seen that both $\kappa$ and $\nabla T$ vary with $\gamma$ in Eq. \ref{e8}, however, as shown in Fig. \ref{FIG03}, the temperature gradients in different cases are similar, so the change of $\textit{\textbf{J}}$ is mainly controlled by $\kappa$. Therefore, the absolute value of $\textit{\textbf{J}}$ decrease with the increase of $\gamma$, which explains the relationship between each non-equilibrium quantity and $\gamma$. In addition, Fig. \ref{FIG06} (a) shows that when $\gamma =7/5$, $\overline{D}_{3,1x}$ rapidly increases to the maximum at the beginning, and then declines. There are two main physical mechanisms in the whole evolution process: one is the growth rate of the mixing area between hot and cold fluids, and the other is the heat conduction caused by the change of temperature gradients. The increase of the area of contact between two fluids causes the increase of the area of heat exchange. And the increase of the temperature gradients also lead to the increase of the heat exchange. In the early stage, the area of contact between two fluids is increasing and the total temperature gradient is also increasing, so the heat exchange is also increasing. After the spike touches the bottom, $\overline{T_x}$ decreases rapidly. Although the contact area is still increasing, the growth rate becomes slower. At this moment, the change of temperature gradient is dominant. For $t = 2.68-3$, the temperature gradient rises again, so $\overline{D}_{3,1x}$ increases. Later, the contact area between the two fluids does not increase with the development of evolution, and the temperature gradient always plays a decisive role, so $\overline{D}_{3,1x}$ will gradually decrease and remain near a fixed value.
From Fig. \ref{FIG06} (b), it can be observed that $\overline{D}_{3,1y}$ maintains constant from $t =0$ to $t =0.85$. This is because the total temperature gradient in $y$ direction keeps constant, while the contact area grows slowly. Therefore, the temperature gradient plays a greater role at this period. When $t = 0.85-1.6$, the contact area of the two fluids increase due to the appearance of the vortex structure, and the total temperature gradient is also rising. As a result, the combined action of the temperature gradient and the increase of the area of contact leads to the increase of $\overline{D}_{3,1y}$. And when $t > 1.6$, $\overline{D}_{3,1y}$ shows a downward trend. With the spike arrives at the bottom, the RT system enters into the chaotic stage, and the evolution of $\overline{D}_{3,1y}$ becomes more complex. Interestingly, as $\gamma$ decreases, $\overline{T_y}$ does not change much, just only a slight difference, but the interaction between the contact area and the temperature gradient has a great influence on the numerical change of $\overline{D}_{3,1y}$. Furthermore, in the later stage, the evolution of $\overline{T_y}$ and $\overline{D}_{3,1y}$ under different $\gamma$ has no obvious rule. In order to explain the inherent physical mechanism, the temperature contour map at $t = 4$ is given by Fig. \ref{FIG07}. It can be observed that there is a great difference in the temperature contour under different $\gamma$ conditions. Therefore, it can be known that the difference in the morphology and structure of the flow field is the main reason for the occurrence of this phenomenon.
\begin{figure}[tbp]
\center\includegraphics*%
[scale=0.2]{FIG07.eps}
\caption{Temperature contours corresponding to $\gamma$= 2, 3/2, 4/3, 5/4, 6/5 from left to right with the same time $t = 4$. The color from blue to red indicates the increase of values.}\label{FIG07}
\end{figure}
The global average TNE intensity is closely related to the macroscopic physical gradients (including temperature, density and velocity gradient) and the area of the non-equilibrium region. The numerical study shows that in the early stage of RT instability, the local physical gradients decrease, such as the local temperature gradient, so the local TNE intensity decreases. However, with the development of RT instability, the increasing area of non-equilibrium region makes the global TNE strength increasingly stronger. That is, the effect of the macroscopic physical gradient and the effect of the non-equilibrium area are competing with each other. In order to facilitate the analysis of the evolution law of global non-equilibrium, the proportion of the non-equilibrium region $S_r$ (i.e., the ratio of non-equilibrium area to total area) is defined. Here, we use the following method to calculate it. Namely, to count the number of points which non-equilibrium intensity is greater than the given threshold and then to compare them with the total number of points to get $S_r$.
Figure \ref{FIG08} shows the evolution of $S_r$, from which it can be seen that the proportion of the non-equilibrium region increases at first and then decreases. At the beginning, both the non-equilibrium intensity at each point and the non-equilibrium area increase, so that the $S_r$ has an exponential growth trend in the previous period. As time evolves, the fluid system tends to be more balanced, the non-equilibrium strength decreases, and the area of the non-equilibrium region tends to be saturated, which makes $S_r$ gradually decrease. It is further found that there is a relationship between the non-equilibrium area and the specific heat ratio as follows: $S_{r,t=1.6}=0.29+1.59\times\exp(-2.37\gamma)$.
\begin{figure*}[tbp]
\begin{center}
\includegraphics[bbllx=200pt,bblly=0pt,bburx=592pt,bbury=477pt,width=0.5\textwidth]{FIG08.eps}
\end{center}
\caption{(a) evolution of the proportion of the non-equilibrium region $S_r$, (b) relationship between the value of the proportion of the non-equilibrium region $S_r$ at $t=1.6$ and the specific heat ratio $\gamma$.}\label{FIG08}
\end{figure*}
\begin{figure}[tbp]
\center\includegraphics*%
[scale=0.17]{FIG09.eps}
\caption{Spatial profiles of the global TNE quantity with $\gamma=7/5$ at different time instants (from left to right) $t$ = 0.8, 1.6, 2, 2.14, 2.68, and 3, respectively. The color from blue to red indicates the increase of values. The values of the global TNE quantity is high at the interface, while it is almost zero away from the interface.}\label{FIG09}
\end{figure}
Furthermore, the global TNE quantity are shown in Fig. \ref{FIG09}, which can help us to get the spatial distributions of the non-equilibrium region. It can be seen that the TNE intensity which near the front end of the bubble and spike is the highest, this is because the physical gradients near the interface is sharpest. With the evolution of RT instability, the mixing layer gradually elongates, and many small structures appear in the system, leading to the increasing area of the non-equilibrium region. Finally, we discuss the evolution law of the global average TNE intensity $\overline{D}$. Figure \ref{FIG10} shows the evolution of $\overline{D}$ over time. The global average TNE intensity is numerically determined by $\overline{D}_2$, $\overline{D}_{3,1}$, $\overline{D}_3$ and $\overline{D}_{4,2}$, and its intrinsic evolution rules are determined by the physical gradients and the non-equilibrium area of the system. The numerical results show that $\overline{D}$ increases rapidly in the beginning. During this process, the proportion of the non-equilibrium region plays a leading role. In addition, the non-equilibrium area increases with the disturbance amplitude increasing, which leads to the global TNE intensity shows an exponential growth trend. At the time $t = 2.14$, $\overline{D}$ stops growing and starts to decline slowly. This is because the non-equilibrium area shows a downward trend at this time, thus the global non-equilibrium intensity decreases. Meanwhile, it can be seen from Fig. \ref{FIG10} (b) that there is an exponential relationship between the global average non-equilibrium intensity $\overline{D}$ at $t = 1.6$ and the specific heat ratio $\gamma$ as follows: $\overline{D}_{t=1.6} = 0.04+128.40\times\exp(-6.76\gamma)$. Although this work focus on two-dimensional case, the model with flexible specific heat ratio can be applied to pick up information from three-dimensional physical fields. And the non-equilibrium information of three-dimensional RT instability in compressible flows deviating far away from thermodynamic equilibrium deserve further study. But on the other hand, the two-dimensional model does not take into account the geometric effects of the three-dimensional system.
\begin{figure*}[tbp]
\begin{center}
\includegraphics[bbllx=200pt,bblly=0pt,bburx=592pt,bbury=477pt,width=0.5\textwidth]{FIG10.eps}
\end{center}
\caption{(a) the global average TNE intensity $\overline{D}$ evolves with time under different specific heat ratios, (b) the fitting curve of the global average TNE intensity $\overline{D}$ at $t=1.6$ and $\gamma$ as: $\overline{D} = 0.04+128.40
\times\exp(-6.76\gamma)$.}\label{FIG10}
\end{figure*}
\section{Conclusions}\label{Conclusions}
The DBM has been applied to study the effects of the specific heat ratio on the compressible RT instability. Firstly, two kinds of non-equilibrium quantities related to the viscous stress and heat flux are investigated. It is found that with the increase of the specific heat ratio, the global average strength of the non-equilibrium quantity $\Delta_{2\alpha \beta}^*$ related to the viscous stress decreases, and the overall trend is first increasing and then decreasing. Secondly, with the increase of the specific heat ratio, the total average intensity of the non-equilibrium quantity $\Delta_{3,1\alpha}^*$ related to the heat flux will decrease, and the overall performance is first increases and then decreases. There are two main factors contributing to this phenomenon, i.e., (i) the increasing temperature gradient increases the non-equilibrium strength, (ii) the increase of the area of contact between the two fluids promotes the heat exchange, thus enhancing the non-equilibrium strength. These two factors compete with each other and jointly determine the overall average intensity. Furthermore, the global average thermodynamic non-equilibrium strength $\overline{D}$ is discussed. The numerical simulation results reveal that $\overline{D}$ also increases first and then decreases, and $\overline{D}$ also increases with the decrease of the specific heat ratio. This is because the increasing non-equilibrium area enhances the global non-equilibrium effects, and the decreasing physical gradients weakens the local TNEs. The combined action of the two factors determine the global non-equilibrium strength of the system. These results of the macro and mesoscopic non-equilibrium information contribute to a deeper understanding of the physical mechanisms of the compressible RT instability.
\section*{Acknowledgments}
This work was supported by National Natural Science Foundation of China (under Grant Nos. 51806116, 11875001), Natural Science Foundation of Fujian Provinces (under Grant Nos. 2018J01654).
|
\section{Introduction}
\IEEEPARstart{P}{edestrian} attribute recognition (PAR) is to predict multiple attributes of
pedestrian images as semantic descriptions in video surveillance, such as age, gender, and clothing. Recently, pedestrian attribute recognition has drawn increasing attention due to its great potential in real-world applications in video surveillance \cite{li2016richly, zhu2013pedestrian} and scene understanding \cite{li2019recurrent}, such as attribute classification, attribute retrieval \cite{li2018richly}, and person re-identification \cite{huang2020improve, yang2019towards}. Like many vision tasks, progress on pedestrian attribute recognition is significantly advanced by deep learning \cite{lecun2015deep}, and various methods \cite{li2015deepmar, yu2016weakly, liu2017hydraplus, wang2017attribute, li2018pose,li2018pedestrian, sarafianos2018deep, li2019visual, guo2019visual, lin2019improving} are proposed to improve the attribute recognition performance. All these methods focus on technical contributions to extract powerful attribute features. Nevertheless, two critical issues are still overlooked: What is the task of pedestrian attribute recognition? How to fairly evaluate the recognition performance of various methods in a realistic environment?
\begin{figure}[t]
\begin{center}
\includegraphics[width=1\linewidth]{figures/illus_zs.pdf}
\end{center}
\caption{Comparison between existing dataset RAP and our proposed datasets RAP\textsubscript{ZS} of zero-shot pedestrian identity. In existing datasets RAP, plenty of pedestrian identities exists both in training time and test time, which contradicts with realistic application and academic criterion. In our proposed RAP\textsubscript{ZS}, we take the zero-shot setting of pedestrian identity between training time and test time, which can real evaluate the model performance and generalization.}
\label{fig:zeroshot_overview}
\vspace{-1em}
\end{figure}
Unlike the vision tasks such as detection \cite{li2018mixed}, segmentation\cite{gao2019ssap}, and tracking\cite{huang2019got}, although some previous works \cite{deng2014pedestrian, zhu2013pedestrian, li2018richly, liu2017hydraplus} focus on pedestrian attribute datasets, a clear and specific definition of pedestrian attribute recognition has yet been proposed. The ambiguous definition further makes datasets flawed and makes evaluation protocol unrealistic. Due to the ambiguous definition and questionable datasets, the performance of existing methods is overestimated, and it is difficult to quantify the actual progress in the pedestrian attribute recognition area. Therefore, we first introduce an explicit and specific definition of pedestrian attribute recognition to guide the dataset construction and performance evaluation. Second, to solve the limitations on existing datasets, several actionable criteria are proposed to construct realistic pedestrian attribute datasets PETA\textsubscript{ZS}, RAP\textsubscript{ZS} from the perspective of zero-shot pedestrian identity. We illustrate the comparison between existing pedestrian attribute datasets and zero-shot pedestrian attribute datasets in Figure \ref{fig:zeroshot_overview}. RAP and RAP\textsubscript{ZS} are taken as examples. Finally, we extensively evaluate recent state-of-the-art methods in depth on existing four popular datasets PETA \cite{deng2014pedestrian}, RAP1\cite{li2016richly}, RAP2\cite{li2018richly}, PA100K \cite{liu2017hydraplus} and proposed datasets PETA\textsubscript{ZS}, RAP\textsubscript{ZS}.
Great oaks from little acorns grow. As the ``acorn'' of pedestrian attribute recognition, an explicit and specific task definition is necessary for academic research and industry application. However, as far as we are concerned, there is no clear definition for pedestrian attribute recognition task since it is first proposed by Zhu \emph{et al}\onedot~ on APiS \cite{zhu2013pedestrian}, followed by PETA \cite{deng2014pedestrian}, RAP1 \cite{li2016richly}, PA100K \cite{liu2017hydraplus}, RAP2 \cite{li2018richly}, Market1501 \cite{lin2019improving}, and DukeMTMC \cite{lin2019improving}. Thus, we first introduce an explicit, specific, and complete definition to solid the base of pedestrian attribute recognition and distinguish it from other similar tasks like human attribute recognition. The core characteristic distinguishing pedestrian attribute recognition from other tasks lies in cropped pedestrian images, which are the bounding box results from the pedestrian detector or human annotator. Unlike images of the human attribute task, pedestrian images captured by surveillance cameras are low-resolution, and the entire pedestrian body is located in the center of the images. We illustrate the comparison between images of the human attribute recognition task and images of the pedestrian attribute recognition task in Fig. \ref{fig:task_comprison}.
\begin{figure}[t]
\begin{center}
\includegraphics[width=1\linewidth]{figures/human_pedes.pdf}
\end{center}
\caption{Comparison between human attribute recognition task and pedestrian attribute recognition task. For the human attribute recognition task, we take WIDER \cite{li2016human} and HAT \cite{sharma2011learning} datasets as examples. For the task of pedestrian attribute recognition, we take PETA \cite{deng2014pedestrian} and RAP \cite{li2018richly} datasets as examples. The ratio of images keeps 1:1 and 1:2 for two tasks, respectively.}
\label{fig:task_comprison}
\vspace{-1em}
\end{figure}
Given a clear definition of pedestrian attribute recognition, we systematically evaluate existing datasets PETA \cite{deng2014pedestrian}, RAP1 \cite{li2016richly}, RAP2 \cite{li2018richly}, and PA100K \cite{liu2017hydraplus} in terms of academic norms and practical application. From the perspective of academic norms, due to the ambiguous task definition, previous works \cite{zhu2013pedestrian, li2016richly, li2018richly} randomly split the samples into the training set and test set without the validation set. All previous methods directly finetune hyperparameters in the test set, which violates the academic norms and makes method generalization ability improperly measured. Besides, as demonstrated in Fig. \ref{fig:zeroshot_overview}, the overlap of pedestrian identities between the training set and the test set makes some images of the test set almost identical to the images of the training set, except for little background and pose variation. This phenomenon is also called ``data leakage", which violates the academic norms. From the perspective of practical application, pedestrian attribute recognition is first proposed to provide auxiliary knowledge for applications, such as pedestrian tracking, person re-identification, and person retrieval \cite{zhu2013pedestrian}. In these applications, pedestrian (person) identities of the test set never appear in the training set, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, zero-shot settings of pedestrian identities. However, plenty of pedestrian identities of the test set on PETA \cite{deng2014pedestrian} and RAP \cite{li2016richly} exist in the training set. Therefore, the standard of dividing the training set and the test set is inconsistent with the practical application. To solve the mentioned problem, we introduce a series of dataset splitting criteria and propose two new datasets PEAT\textsubscript{ZS} and RAP\textsubscript{ZS} based on original PEAT \cite{zhu2013pedestrian} and RAP \cite{li2018richly} following zero-shot settings of pedestrian identities.
After introducing the definition and proposed datasets, we reimplement and thoroughly evaluate current state-of-the-art methods, including MsVAA \cite{sarafianos2018deep}, VAC \cite{guo2019visual}, ALM \cite{tang2019Improving}, and JLAC \cite{tan2020relation}. The crux of the matter for methods of pedestrian attribute recognition is the unfair comparison and overestimated performance since experiments of these methods are conducted based on different experimental settings and tested on defective datasets. First, as listed in Table \ref{tab:baseline}, the baseline performance gap between the existing methods is significant, originating from various backbone networks and different experimental settings. Some methods are evaluated only on the part of three popular datasets. Second, performance of methods is overestimated because pedestrian identities of the test set appear in the training set. As demonstrated in Fig.\ref{fig:overlapped_perf_gap}, pedestrian identity overlap causes remarkably similar images in the training set and test set on PETA \cite{deng2014pedestrian}. The same phenomenon can also be noticed on RAP1 \cite{li2016richly} and RAP2 \cite{li2018richly}. Thus, to make a fair comparison between various methods and provide a reliable baseline performance, we reimplement several state-of-the-art methods and conduct exhaustive experiments on different settings.
The contributions of this paper are as follows:
\begin{itemize}
\item For the definition, we answer two questions: What is pedestrian attribute recognition? What is the essential characteristic of pedestrian attribute recognition different from other similar tasks?
\item For the datasets and evaluation protocol, we answer two questions: Can the existing datasets truly measure the performance of pedestrian attribute recognition methods? If not, on what kind of datasets can performance be measured appropriately?
\item For the existing methods, we answer two questions: How does the existing method perform on existing datasets and proposed datasets in the same experimental settings? How much influence do different experimental factors have on performance?
\end{itemize}
\section{Related Work}
In this section, we give a comprehensive introduction to the progress of pedestrian attribute recognition from the perspective of datasets and methods.
\subsection{Pedestrian Attribute Datasets}
The first pedestrian attribute dataset APiS (Attributed Pedestrians in Surveillance) was proposed by Zhu \emph{et al}\onedot~\cite{zhu2013pedestrian}, where 3,661 images with 11 binary and two multi-class attribute annotations are collected from three outdoor scenes and one indoor scene. To provide a well-aligned yet diverse dataset of pedestrians in realistic scenarios, Sudowe \emph{et al}\onedot~\cite{sudowe2015person} proposed PARSE-27k (Pedestrian Attribute Recognition on Sequences) dataset, where samples are captured by a moving camera in a city environment and annotated by ten attributes. Deng \emph{et al}\onedot~\cite{deng2014pedestrian} released a new large-scale dataset PETA (PEdesTrian Attribute), composed of 19,000 images with 61 binary and four multi-class attributes. These images are chosen and organized from ten publicly available small-scale datasets. To take viewpoints, occlusions, and body parts into consideration, Li \emph{et al}\onedot~\cite{li2016richly} built RAP (Richly Annotated Pedestrian) \footnote{We use RAP1 to indicate this version and use RAP2 to indicate the version published in \cite{li2018richly}} dataset with 41,585 pedestrian samples, captured from a real surveillance network with 26 video cameras at a shopping mall. Sixty-nine fine-grained attributes and three environmental factors (viewpoints, occlusion styles, and body parts) are annotated. PA-100K (Pedestrian Attribute) is the largest pedestrian attribute dataset introduced by Liu \emph{et al}\onedot~\cite{liu2017hydraplus} and composed of 100,000 images with 26 attributes. Based on RAP1 \cite{li2016richly}, Li \emph{et al}\onedot further enlarge the dataset size and propose RAP2 \cite{li2018richly} with 84,928 pedestrian samples and 72 attributes. In order to improve global feature representation of person re-identification, Lin \emph{et al}\onedot \cite{lin2019improving} added attribute information as complementary local cues on Market1501 \cite{zheng2015scalable} and DukeMTMC \cite{ristani2016performance} datasets and constructed two new attribute datasets Market1501-Attribute and DukeMTMC-Attribute \cite{lin2019improving}.
PETA \cite{deng2014pedestrian}, RAP1 \cite{li2016richly}, PA100K \cite{liu2017hydraplus} are three popular pedestrian attribute recognition datasets used by mostly mainstream methods \cite{liu2017hydraplus, wang2017attribute, li2018richly, li2018pedestrian, li2018pose, li2019visual, li2019pedestrian, tang2019Improving, tan2020relation}.
\subsection{Pedestrian Attribute Methods}
We review the existing methods from two aspects. One type of methods adopts auxiliary information like human parsing or human key points as prior or training supervision. The other type of methods only uses attribute labels as supervision.
For the methods utilizing human parsing and human key points as extra prior, the critical challenge is using the human knowledge to locate related attribute regions and improve attribute feature discrimination. Li \emph{et al}\onedot~\cite{li2018pose} utilized the CPM \cite{wei2016convolutional} model to generate human key points as coarse supervision to train the STN \cite{jaderberg2015spatial} models for regressing pedestrian pose. Inspired by human body structure information considered in SpindleNet \cite{zhao2017spindle}, Zhao \emph{et al}\onedot~\cite{zhao2018grouping} utilized human key points and adopted a body region proposal network to generate the head, upper body, and lower body regions. These body region proposals were pooled and input into the LSTM \cite{hochreiter1997long} as local features of the attribute groups. Li \emph{et al}\onedot~\cite{li2019pedestrian} combined the graph convolution network (GCN) with knowledge distillation from a pre-trained human parsing model to guide the attribute semantic relational learning. Tan \emph{et al}\onedot~\cite{tan2019attention} proposed the JLPLS-PAA framework composed of parsing attention, label attention, and spatial attention mechanism, where parsing attention mechanism utilizes pedestrian parsing network PSPNet to provide parsing results and aggregates features from different semantic human regions.
For the methods without using extra human knowledge, mainstream methods focus on locating attribute-related regions in a weakly supervised manner, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, only attribute label are given. Yu \emph{et al}\onedot~\cite{yu2016weakly} introduced the WPAL network by concatenating multi-level features of flexible spatial pyramid pooling layers to utilize the information at different scales. Liu \emph{et al}\onedot~\cite{liu2017hydraplus} proposed HydraPlus-Net with multi-directional attention modules to exploit the multi-scale feature maps and enrich the final feature representations. Wang \emph{et al}\onedot~\cite{wang2017attribute} proposed the JRL network, which took attribute recognition task as a sequence prediction problem and adopted LSTM \cite{hochreiter1997long} to formulate the correlations between pedestrian attributes. Li \emph{et al}\onedot~\cite{li2019visual} proposed a graph-based reasoning framework including visual-to-semantic sub-network and semantic-to-visual sub-network. The two sub-networks are jointly optimized to capture spatial and semantic attribute relations. Tang \emph{et al}\onedot~\cite{tang2019Improving} proposed a new framework that combined FPN \cite{lin2017feature}, STN \cite{jaderberg2015spatial}, and SE \cite{hu2018squeeze} modules to enhance the attribute localization and make full use of pyramid feature maps. Tan \emph{et al}\onedot~\cite{tan2020relation} proposed the JLAC model, which includes attribute relation module and contextual relation module, to formulate attribute relation as a graph structure.
\section{Problem Definition}
In this section, we first introduce the complete definition of pedestrian attribute recognition in realistic settings. Then, a comparison between pedestrian attribute recognition and other task is introduced. Finally, we demonstrate the characteristics of pedestrian attribute recognition, which is the base of the dataset construction.
\subsection{Definition} \label{definition}
As the stone of the development of an area, an explicit and specific definition is indispensable. However, APiS \cite{zhu2013pedestrian}, PETA \cite{deng2014pedestrian}, RAP1 \cite{li2016richly}, RAP2 \cite{li2018richly}, and PA100k \cite{liu2017hydraplus} do not give a concrete definition of pedestrian attribute recognition yet. Some papers \cite{sarafianos2018deep, wu2020distraction} even confuse pedestrian attribute recognition with other tasks, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, human attribute recognition \cite{li2016human} and re-identification-related attribute recognition \cite{lin2019improving}. Thus, we first give a specific and complete definition for pedestrian attribute recognition as follows.
\noindent \textbf{Definition} Given a training set of input-target pairs $\mathcal{D} = \{ (x_{i}, y_{i}), i=1,2,\dots,N \}$, pedestrian attribute recognition is a task assigning multiple attribute labels $y_{i} \in \{0, 1\}^{M}$ to one pedestrian image $x_{i}$ of the test set, where pedestrian identities $\mathbb{I}_{test}$ have never been seen in the training set, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, the zero-shot settings between identities of the training set and identities of the test set, $ \mathbb{I}_{train} \cap \mathbb{I}_{test} = \varnothing $.
According to the definition, the essence of pedestrian attribute recognition is to train a model on images of one part of pedestrians to generalize well on images of the other part of pedestrians. Specifically, the pedestrian identities $\mathbb{I}_{test}$ of the test set cannot appear in the pedestrian identities $\mathbb{I}_{train}$ of the training set. This principle is the foundation for the pedestrian attribute datasets to measure the generalization ability of the model correctly.
\subsection{Task Comparison}
There are two similar tasks compared to pedestrian attribute recognition: human attribute recognition and person re-identification-related ((ReID-related)) attribute recognition.
Human attribute recognition is first proposed by Bourdev \emph{et al}\onedot~\cite{bourdev2011describing} on BAP (Berkeley Attributes of People) dataset and by Sharma\emph{et al}\onedot~\cite{sharma2011learning} on HAT (Human ATtributes) dataset. Followed by HAT, Li \emph{et al}\onedot~\cite{li2016human} proposes a large-scale human attribute recognition dataset WIDER, where images are collected from 30 events. Unlike pedestrian attribute recognition, where almost all images contain only one pedestrian and the pedestrian is located in the center of the image, images of human attribute recognition contain multiple people (Fig. \ref{fig:task_comprison}) with huge pose variations. From the image quality perspective, pedestrian attribute images collected from surveillance cameras are low-resolution, while images on human attribute datasets are high-resolution and selected from search engines. In addition, pedestrian attribute recognition can provide auxiliary information to help pedestrian tracking and re-identification, while human attribute recognition cannot.
\begin{figure}[t]
\begin{center}
\includegraphics[width=1\linewidth]{figures/reid_pedes.pdf}
\end{center}
\caption{Comparison between ReID-related attribute recognition vs pedestrian attribute recognition. For the task of ReID-related attribute recognition and pedestrian attribute recognition, we take Market1501 \cite{lin2019improving} and RAP \cite{li2018richly} as examples, respectively. On Market1501 \cite{lin2019improving}, even if the attribute status changes, the same pedestrian identity is annotated with the same attribute labels, which is described as an identity-level annotation. On RAP \cite{li2018richly}, the same pedestrian identity may also have different attribute labels, depending on whether the attribute exists, which is described as an instance-level annotation. Images with \textbf{green} (\textbf{red}) boundaries are \textbf{positive} (\textbf{negative}) samples of the corresponding attribute. Same phenomenon can be also noticed on DukeMTMC \cite{lin2019improving}.}
\label{fig:reid_pedes}
\vspace{-1em}
\end{figure}
ReID-related attribute recognition refers to the attribute recognition task proposed by Lin \emph{et al}\onedot \cite{lin2019improving}, which is based on the ReID datasets and is specifically used to assist the ReID task. However, the existing ReID-related attribute datasets Market-1501 and DukeMTMC have two fatal flaws that make them unusable for pedestrian attribute recognition. First, annotations of pedestrian attribute datasets are at the instance level, while annotations of ReID-related attribute datasets are at the identity level. Datasets based on identity-level attribute annotation are unable to measure the model performance correctly. As shown in Fig. \ref{fig:reid_pedes}, we take three people on Market1501 as examples. For person ID0002, five images are labeled the ``without backpack'' attribute, regardless of the ``backpack" attribute in the second, third, and fifth images. This annotation standard is described as the identity-level annotation so that the attribute labels between all images of the same person are consistent. Nevertheless, this annotation leads to plenty of wrong labels, making the model unable to learn representative attribute features. As a result, model performance tested on these annotations is unreliable. On the contrary, for pedestrian attribute datasets, different images of the same pedestrian are annotated with different labels based on whether the attribute appears, which is described as the instance-level attribute annotation. For example, for pedestrian ID0068, the first, third, and fifth images are labeled as negative samples of the ``hs-Glasses'' attribute, while the second and fourth images are labeled as positive samples. Second, 17 of the 27 attributes in Market1501 and 17 of the 23 attributes in DukeMTMC belong to color attributes, which is not adopted for model evaluation \cite{li2016richly, li2018richly, li2019recurrent, li2019recurrent, tang2019Improving, liu2017hydraplus, sarafianos2018deep}. Besides, color attributes can be directly inferred by pixel values of RGB channels without model learning.
In a word, because of the different image collection scenes and the different annotation standards, pedestrian attribute recognition is quite distinct from human attribute recognition and ReID-related attribute recognition. Therefore, the following sections mainly focus on pedestrian attribute recognition and three widely used datasets PETA, RAP, and PA100K.
\section{Datasets}
In this section, we aim at answering two questions: Can the existing datasets truly measure the performance of pedestrian attribute recognition methods? If not, on what kind of datasets can performance be measured appropriately? Therefore, we first analyze the existing datasets and uncover the limitations. Then, we give a series of criteria to guide the pedestrian attribute dataset construction according to the task definition. Finally, according to the criteria, we propose two new pedestrian attribute datasets PEAT\textsubscript{ZS} and RAP\textsubscript{ZS}, following zero-shot settings on pedestrian identity.
\subsection{Flaws in existing datasets}
As defined in Section \ref{definition}, the critical requirement for pedestrian attribute datasets is to evaluate the model generalization ability correctly. However, due to the two limitations, this requirement is ignored by many previous dataset works. One limitation is the manner of collecting pedestrian images.
Pedestrian images of existing large-scale pedestrian attribute datasets are captured by surveillance video cameras in a dense sampling manner, such as 15 frames per second in RAP1 \cite{li2016richly} and RAP2 \cite{li2018richly}, which results little variation between adjacent frames of the same pedestrian. The other limitation is the manner of splitting the training set and test set. Most existing datasets PETA \cite{deng2014pedestrian}, RAP1 \cite{li2016richly}, and RAP2 \cite{li2018richly} assign pedestrian images randomly into the training set and the test set without considering the pedestrian identities. As a result, the limitations in image collection manner and dataset splitting manner lead to the highly similar images between the training set and the test set, except for negligible background and pose variation as illustrated in Fig. \ref{fig:zeroshot_overview}. This problem is often referred to as ``data leakage " and makes it impossible to measure model generalization ability on most existing datasets, which contradicts academic norms and practical application objectives. Although PA-100K assigns all samples of one pedestrian to one of the training set and test set to avoid this problem, detailed explanations and underlying reasons are not given.
To further confirm the severity of the problem, we statistic the proportion of common-identity images in the test set on PETA and RAP2. We use ``common-identity images" to represent the images of pedestrian identities that appear in both the training set and test set. In contrast, ``unique-identity images" are denoted as the images of pedestrian identities that appear only in the test set. As shown in Fig. \ref{fig:common_image}, 57.7\% and 31.5\% of test images have highly similar counterparts of the same identity in the training set of PETA and RAP2, respectively. Although there are also plenty of similar images between the training set and test set in RAP1, we can not get the accurate proportion of common-identity images in the test set, due to the lack of pedestrian identity labels.
Since plenty of test images have been seen in the training stage, recognition performance in the test set cannot reflect the method generalization ability. To give an intuitive demonstration, we reimplement four state-of-the-art methods MsVAA \cite{sarafianos2018deep}, VAC \cite{guo2019visual}, ALM \cite{tang2019Improving}, and JLAC \cite{tan2020relation}, and report their performance of common-identity images, unique-identity images, and all images on the test set. A significant performance gap between performance in common-identity images and performance in unique-identity images for four methods is shown in Fig.~\ref{fig:overlapped_perf_gap}. The phenomenon validates the argument that performance in the test set of existing datasets cannot reflect the generalization ability of methods. More importantly, the test set of the existing datasets, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, PETA, RAP1, and RAP2, overestimate the model performance and mislead the model evaluation.
\begin{figure}[t]
\centering
\includegraphics[width=0.8\linewidth ]{figures/pie.pdf}
\caption{The proportions of common-identities images in the test sets of PETA and RAP2. The proportion of common-identity images on RAP2 test set is at least 31.5\%, due to some test images are not labeled with pedestrian identity.}
\label{fig:common_image}
\vspace{-1em}
\end{figure}
\begin{figure*}[ht]
\centering
\subfloat[MsVAA]{
\includegraphics[width=0.5\linewidth]{figures/common_perf_msvaa.pdf}}
\subfloat[VAC]{
\includegraphics[width=0.5\linewidth]{figures/common_perf_vac.pdf}} \\
\subfloat[ALM]{
\includegraphics[width=0.5\linewidth]{figures/common_perf_alm.pdf}}
\subfloat[JLAC]{
\includegraphics[width=0.5\linewidth]{figures/common_perf_jlac.pdf}}
\caption{Performance of MsVAA \cite{sarafianos2018deep} and VAC \cite{guo2019visual} methods on common-identity images, unique-identity images and all images of PETA test set. We observe there is a big gap between common-identity images and unique-identity images as well as between unique-identity images and all images of test set. The remarkable performance difference shows the irrationality of existing datasets. Similar phenomenon can be observed on RAPv2 as well.}
\label{fig:overlapped_perf_gap}
\vspace{-1em}
\end{figure*}
\subsection{Splitting Criterion} \label{criterion}
To solve the mentioned flaws in existing datasets, we propose a series of criteria to guide the pedestrian attribute dataset construction as follows.
\noindent \textbf{Criteria on Pedestrian Attribute Dataset Construction:}
\begin{enumerate}
\item $\mathcal{I}_{all} =\mathcal{I}_{train} \cup \mathcal{I}_{valid} \cup \mathcal{I}_{test}$, \\ $ |\mathcal{I}_{train}| : | \mathcal{I}_{valid}| : | \mathcal{I}_{test}|$ $\approx$ $ 3 : 1 : 1 $ . \label{crit1}
\item $\mathcal{I}_{train} \cap \mathcal{I}_{valid} = \varnothing$, $ \mathcal{I}_{train} \cap \mathcal{I}_{test} = \varnothing $, $\mathcal{I}_{valid} \cap \mathcal{I}_{test} = \varnothing$. \label{crit2}
\item $||\mathcal{I}_{valid}| - |\mathcal{I}_{test}|| < |\mathcal{I}_{all}| \times T_{id}$ . \label{crit3}
\item $|N_{valid} - N_{test}| < T_{img}$ . \label{crit4}
\item $|R_{valid}^{i} - R_{test}^{i}| < T_{attr}, i = 1, 2, \dots, M$ . \label{crit5}
\end{enumerate}
where $\mathcal{I}_{train}$, $\mathcal{I}_{valid}$, $\mathcal{I}_{test}$ denotes the pedestrian identity set of the training set, validation set, and test set respectively. $|\cdot|$ denotes the set cardinality. $N_{valid}$, $N_{test}$ indicates the number of samples of validation set and test set. $R_{valid}^{i}$, $R_{test}^{i}$ is the positive ratio of $i$-th attribute in the validation set and test set. $T_{id}$, $T_{img}$, $T_{attr}$ is the threshold to control the difference of identity number, image number, and positive number between the validation set and test set. \textbf{Criteria~\ref{crit1}}, \textbf{Criteria~\ref{crit3}}, and \textbf{Criteria~\ref{crit4}} are used to provide an effective and reliable validation set, which is necessary for tuning method hyper-parameters. We argue that tuning hyper-parameters on test classes to improve the pedestrian attribute recognition performance violates the zero-shot assumption \cite{xian2018zero}. \textbf{Criteria~\ref{crit2}} is proposed to follow the zero-shot settings on pedestrian identity. In addition, \textbf{Criteria~\ref{crit5}} is proposed to control the attribute distribution gap between the validation set and the test set.
\subsection{Existing Datasets and Proposed Datasets}
\begin{algorithm}[t]
\caption{Pseudocode of Splitting Search Algorithm in a Numpy-like style. }
\label{alg:splitting_search}
\begin{algorithmic}[1]
\footnotesize
\Require Pedestrian dataset $\mathcal{D} = \{x_{i}, y_{i}, Id_{j} | i=1, \dots, N, j=1, \dots, K\}$, where $\mathcal{I} = \{Id_{j}|j=1, \dots, K\}$ denotes the pedestrian identity set, $\mathcal{X} = \{x_{i}|i=1, \dots, N \}$, $\mathcal{Y} = \{y_{i} | i=1, 2, \dots, N \}$, and $y_{i} \in \{0, 1\}^{M}$. Id2Idx = Dict(). The threshold of pedestrian identity number difference, attribute positive radio difference, and images number difference is set $T_{id} = 50$, $T_{attr} = 0.03$, $T_{img} = 300$ as default respectively.
\For{$k = 1$ to $K$}
\State $\text{Id2Idx}[k] = \{x_{i}, y_{i}, Id_{j} | Id_{j} = k\}$
\EndFor
\While{True}
\State $K_{train} = \text{Random.Randint}([ \frac{3}{5}\cdot K - T_{id}, \frac{3}{5} \cdot K + T_{id}]) \label{get_train_id_start}$
\State $\mathcal{I}_{train} = \text{Random.Choice}(\mathcal{I}, K_{train}, \text{replace=False}) $
\State $K_{mid} = (K - K_{train}) / 2$
\State $K_{valid} = \text{Random.Randint}([K_{mid} - T_{id}, K_{mid} + T_{id}]) \label{id_cons}$
\State $\mathcal{I}_{valid} = \text{Ramdom.Choice}(\mathcal{I} - \mathcal{I}_{train}, K_{valid}, \text{replace=False})$
\State $K_{test} = K - K_{train} - K{valid}$
\State $\mathcal{I}_{test} = \mathcal{I} - \mathcal{I}_{train} - \mathcal{I}_{valid}$
\State $\mathcal{D}_{train}=\mathcal{D}_{valid}=\mathcal{D}_{test}= \varnothing$
\For{$k = 1$ to $K$}
\If{$k \in \mathcal{I}_{train}$}
\State $\mathcal{D}_{train} \leftarrow \mathcal{D}_{train} \cup \text{Id2Idx}[k]$
\ElsIf{$k \in \mathcal{I}_{valid}$}
\State $\mathcal{D}_{valid} \leftarrow \mathcal{D}_{valid} \cup \text{Id2Idx}[k]$
\Else
\State $\mathcal{D}_{test} \leftarrow \mathcal{D}_{test} \cup \text{Id2Idx}[k]$ \label{get_train_id_end}
\EndIf
\EndFor
\If{$ ||\mathcal{D}_{test}| - |\mathcal{D}_{val}|| > T_{img} $} \label{img_cons}
\State continue
\EndIf
\State Collect label set $\mathcal{Y}_{train}$, $\mathcal{Y}_{valid}$, $\mathcal{Y}_{test}$ from dataset $\mathcal{D}_{train}$, $\mathcal{D}_{valid}$, $\mathcal{D}_{test}$ respectively.
\State Compute positive ratio $R_{train}$, $R_{valid}$, $R_{test} \in (0, 1)^{M}$ of each attribute in training set, validation set and test set.
\If{($R_{train} - R_{valid} < T_{attr}$).all() and ($R_{train} - R_{test} < T_{attr}$).all()} \label{contr_same}
\State \Return{$\mathcal{D}_{train}$, $\mathcal{D}_{test}$, $\mathcal{D}_{val}$}
\EndIf
\EndWhile
\end{algorithmic}
\end{algorithm}
PETA \cite{deng2014pedestrian}, RAP1 \cite{li2016richly}, PA100K \cite{liu2017hydraplus} are three widely adopted pedestrian attribute datasets in recent state-of-the-arts methods. Although RAP2 \cite{li2018richly} is expanded on RAP1 and has more samples, all methods conduct experiments on RAP1 to make a fair comparison with previous methods. Except for PA100K, PETA, RAP1, and RAP2 adopt random splitting criterion to construct the training data and test set, which violates the zero-shot settings on pedestrian identity so that performance cannot be correctly evaluated in the test set. Considering that no pedestrian identity label is available in RAP1, we propose PETA \textsubscript{ZS} and RAP \textsubscript{ZS} datasets based on existing PETA and RAP2 datasets.
\begin{figure}[t]
\centering
\includegraphics[width=1\linewidth]{figures/overlap_dataset.pdf}
\caption{Pedestrian identity distribution on PETA and PETA\textsubscript{$zs$}. X-axis indicates the pedestrian identity number and Y-axis is the proportion of corresponding images of the pedestrian identity. There are 1106 common-identities between the training set and the test set, accounting for 19.42 percent of the pedestrian identities in the training set (55.27 percent of the image) and 26.91 percent of the pedestrian identities in the test set (57.70 percent of the image). Our proposed dataset PETA\textsubscript{$ZS$} solves the problem by completely separating the pedestrian identities of the test set from the identities of the training set.}
\label{fig:overlap_dataset}
\vspace{-1em}
\end{figure}
In order to avoid the influence of artificially splitting the dataset, we propose the splitting search algorithm to find suitable dataset partitions under the guidance of the criteria on pedestrian attribute dataset construction. The full algorithm is provided in Algorithm \ref{alg:splitting_search}. Besides following the zero-shot settings of pedestrian identity (Algorithm \ref{alg:splitting_search}, line \ref{get_train_id_start}-\ref{get_train_id_end}), the attribute distribution of training set, validation set, and test set is approximately consistent and constrained by threshold $T_{attr}$ (Algorithm \ref{alg:splitting_search}, line \ref{contr_same}). To construct an effective validation set for performance measurement and hyper-parameters fine-tuning, we use the threshold $T_{img}$ and $T_{id}$ to separately limit the difference in the number of images and the number of identities between the validation set and the test set. (Algorithm \ref{alg:splitting_search}, line \ref{id_cons} and line \ref{img_cons}).
Targeting at providing a reliable dataset partition and avoid the influence from random noise, we conduct the search algorithm five times on each dataset PETA, RAP2 and get five versions of PETA\textsubscript{ZS}, RAP\textsubscript{ZS}. The dataset information and performance of the baseline method (described in Section \ref{method}) on these datasets are reported in Table \ref{tab:five_version}. For PETA\textsubscript{ZS}, we keep all images and annotated attributes unchanged. For RAP\textsubscript{ZS}, we only keep images with pedestrian identity labels and remove the ``Age46-60" attribute because there is no positive sample of the ``Age46-60" attribute. From the detailed dataset information and experiment performance of five versions, we can conclude that there is no apparent difference between the various dataset versions obtained by the splitting search algorithm. Thus, we choose the first version of PETA\textsubscript{ZS} and RAP\textsubscript{ZS} as the final version for the following experiments. We illustrate the comparison between PETA and PETA\textsubscript{ZS} as an example in Fig. \ref{fig:overlap_dataset}. For the existing dataset PETA, 26.91 percent of pedestrian identities of the test set appear in the training set and occupy 55.27 percent of images in the training set. In contrast, for the proposed PETA\textsubscript{ZS}, no pedestrian identity of the test set appears in the training set.
\begin{table*}[t]
\renewcommand{\arraystretch}{1.3}
\caption{Details of existing datasets and proposed datasets. Zero-shot setting of pedestrian identities is considered in the proposed PETA\textsubscript{$zs$} and RAP2\textsubscript{$zs$} datasets. $I_{train}$, $I_{valid}$, $I_{test}$ indicates the number of identities in the training set, validation set, and test set respectively. Pedestrian identities are not provided in RAPv1, PA100k and are partly provided in RAPv2, so the exact quantity cannot be counted, which is denoted by -- . Due to the overlapped identities between $I_{train}$, $I_{valid}$, and $I_{test}$ of PETA, the sum of $I_{train}$, $I_{valid}$, and $I_{test}$ is not equal to that in PETA\textsubscript{$zs$}. \textit{Attribute} here denotes the number of attributes used for evaluation. Due to no apparent difference between the various versions, the first version of PETA\textsubscript{ZS} and RAP\textsubscript{ZS} is selected as \textbf{the final version}, which is represented by red font.}
\label{tab:five_version}
\centering
\begin{tabular}{cc|c|c|c|c|c|c|c|c|c|c|c|c|c|c}
\toprule
\multicolumn{2}{c|}{Dataset} & Attr & $I_{all}$ & $I_{train}$ & $I_{valid}$ & $I_{test}$ & $N_{all}$ & $N_{train}$ & $N_{val}$ & $N_{test}$ & mA & Accu & Prec & Recall & F1\\ \hline \hline
\multirow{5}{*}{PETA\textsubscript{ZS}} & \bf{v1} & \multirow{5}{*}{35} & \multirow{5}{*}{8,699} & \bf{5,233} & \bf{1,760} & \bf{1,706} &\multirow{5}{*}{19,000} & \bf{11,241} & \bf{3,826} & \bf{3,933} & \bf{69.14} & \bf{58.43} & \bf{76.65} & \bf{67.90} & \bf{71.45} \\
& v2 & & & 5,212 & 1,698 & 1,789 & & 11,545 & 3,589 & 3,866 & 68.41 & 57.01 & 75.00 & 67.72 & 70.64 \\
& v3 & & & 5,189 & 1,734 & 1,776 & & 11,589 & 3,584 & 3,827 & 68.25 & 58.49 & 75.74 & 68.90 & 71.62 \\
& v4 & & & 5,184 & 1,713 & 1,802 & & 11,117 & 3,890 & 3,993 & 69.17 & 58.23 & 76.52 & 68.08 & 71.45 \\
& v5 & & & 5,248 & 1,676 & 1,775 & & 11,720 & 3,509 & 3,771 & 68.08 & 59.33 & 77.14 & 69.20 & 72.42 \\ \cline{1-16}
\multirow{5}{*}{RAP\textsubscript{ZS}} & \bf{v1} & \multirow{5}{*}{53} & \multirow{5}{*}{2,590} & \bf{1,566} & \bf{505} & \bf{518} & \multirow{5}{*}{26,638} & \bf{17,062} & \bf{4,648} & \bf{4,928} & \bf{68.73} & \bf{64.84} & \bf{81.35} & \bf{74.24} & \bf{77.19}\\
& v2 & & & 1,517 & 551 & 521 & & 15,175 & 5,832 & 5,631 & 67.81 & 63.79 & 80.87 & 73.35 & 76.45 \\
& v3 & & & 1,601 & 514 & 474 & & 16,455 & 5,214 & 4,969 & 69.49 & 64.47 & 80.74 & 74.21 & 76.89 \\
& v4 & & & 1,556 & 531 & 502 & & 15,879 & 5,447 & 5,312 & 69.99 & 64.50 & 81.28 & 73.91 & 76.96 \\
& v5 & & & 1,593 & 503 & 493 & & 16,515 & 5,084 & 5,039 & 69.71 & 64.83 & 81.18 & 74.35 & 77.17 \\
\bottomrule
\end{tabular}
\vspace{-1em}
\end{table*}
\section{Methods} \label{method}
In this section, we start by formalizing the pedestrian attribute recognition task. Then we review and reimplement four existing state-of-the-art methods MsVAA \cite{sarafianos2018deep}, VAC \cite{guo2019visual}, ALM \cite{tang2019Improving}, and JLAC \cite{tan2020relation} on the same experimental settings to make a fair comparison. Finally, considering the enormous gap between baseline performance of various methods, we propose a solid and reliable baseline method.
\subsection{Task Formulation and Baseline Method}
Given a training set of $\mathcal{D} = \{ (x_{i}, y_{i}), i=1,2,\dots,N \}$, where $y_{i} \in \{ 0, 1 \}^{M}$ is a binary vector with $M$ number of attributes and $y_{ij} = 1$ indicates the presence of the $j$-th attribute in $i$-th image, the task is to learn $f:X \rightarrow Y$ by minimizing the empirical risk loss:
\begin{equation}
Loss = \frac{1}{N} \sum_{i=1}^N \mathcal{L} (y_{i}, \mathcal{C}(\mathcal{F}(x_{i};W_{f}); W_{c})),
\end{equation}
where $\mathcal{L}(\cdot)$, $\mathcal{F}(\cdot;W_{f})$, and $\mathcal{C}(\cdot;W_{c})$ denotes the loss function, feature extractor, and classifier respectively. $W_{f}$ and $W_{c}$ are the parameters in feature extractor and classifier. At the test time, the output logits is followed by a sigmoid function to get the final prediction:
\begin{align}
\hat{y}_{ij} &=
\begin{cases}
1, & p_{ij} >= t_{cls} \\
0, & p_{ij} < t_{cls}
\end{cases} \\
p_{i} &= \sigma (\mathcal{C}(\mathcal{F}(x_{i};W_{f}); W_{c})),
\end{align}
where $\sigma(z) = 1/(1+ e^{-z})$ is the sigmoid function and classification threshold is set to $t_{cls} = 0.5$ by default. The output probability vector is denoted as $p_{i} = \{ p_{ij}|j=1, \dots, M \} \in R^{M}$, where $p_{ij} \in [0, 1]$ indicates the probability that $j$-th attribute appears in $i$-th image.
For the baseline method, we use binary cross-entropy loss as our loss function, which can be formulated as:
\begin{align}
\mathcal{L} & = - \sum_{j=1}^{M} \omega_{j}(y_{ij} \log(p_{ij} + (1 - y_{ij})\log(1 - p_{ij}))
\label{eq:celoss}
\end{align}
where $\omega_{j}$ is the attribute weight of $j$-th attribute to alleviate the distribution imbalance between attributes. We find experimentally that weight functions play an important role in model optimization. Thus, we introduce three widely used weight functions for pedestrian attribute recognition. The most popular weight function proposed by Li \emph{et al}\onedot \cite{li2015deepmar} is computed as:
\begin{align}
\omega_{j} =
\begin{cases}
e^{1 - r_{j}}, & y_{ij}=1 \\
e^{r_{j}}, & y_{ij}=0
\end{cases}
\label{eq:weight1}
\end{align}
where $r_{j} $ is the positive sample ratio of $j$-$th$ attribute in the training set. Recently, Tan \emph{et al}\onedot \cite{tan2020relation} introduces a weight function, which is formulated as:
\begin{align}
\omega_{j} =
\begin{cases}
\sqrt{\frac{1}{2r_{j}}}, & y_{ij}=1 \\
\sqrt{\frac{1}{2(1-r_{j})}}, & y_{ij}=0
\end{cases}
\label{eq:weight2}
\end{align}
Besides, to solve the general long-tailed distribution problem, Zhang \emph{et al}\onedot \cite{zhang2021disalign} proposes a weight function, which can be computed as:
\begin{align}
\omega_{j} =
\begin{cases}
\frac{(\frac{1}{r})^{\alpha}}{(\frac{1}{r})^{\alpha} + (\frac{1}{1 - r})^{\alpha}}, & y_{ij}=1 \\
\frac{(\frac{1}{1 - r})^{\alpha}}{(\frac{1}{r})^{\alpha} + (\frac{1}{1 - r})^{\alpha}}, & y_{ij}=0
\end{cases}
\label{eq:weight3}
\end{align}
where $\alpha$ is a hyper-parameter to adjust the weight between positive ratio and negative ratio. We name the weight function in Equation.~\ref{eq:weight1}, Equation.~\ref{eq:weight2}, and Equation.~\ref{eq:weight3} as WF1, WF2, and WF3 respectively. Ablation experiments of weight functions can be found in Table \ref{tab:ablation_weight}.
\subsection{Evaluated Methods} \label{eva_methods}
For making a fair comparison among state-of-the-art methods and our baseline method, we reimplement MsVAA \cite{sarafianos2018deep}, VAC \cite{guo2019visual}, ALM \cite{tang2019Improving}, and JLAC \cite{tan2020relation} methods. There are two reasons why we choose these methods to reimplement. First, all four methods do not adopt human key points \cite{li2018pose, zhao2018grouping}, human parsing \cite{li2019pedestrian, tan2019attention}, or extra labeled data \cite{tan2019attention} as auxiliary knowledge. The primary purpose of this work is to provide a reliable and solid evaluation from the perspective of existing datasets and state-of-the-art methods. Therefore, whether to use auxiliary knowledge and how to choose a pre-trained model \cite{kalayeh2018human, zhao2017spindle, zhao2017pyramid, zhang2020correlating} for auxiliary knowledge is beyond the scope of this work. Second, the authors of these methods provide detailed implementation information to achieve comparable performance compared with performance reported in the paper.
\noindent \textbf{MsVAA} \cite{sarafianos2018deep} combines attention mechanism with conv4 and conv5 stage of ResNet101 \cite{he2016deep} as the feature extractor to extract attribute-wise spatial attention map and average pooled image feature. After one image feature and two attribute features are sent as input to the linear classifier, three logits are aggregated in prediction level to get the final results. A weighted focal loss \cite{lin2017focal} is used as the loss function.
\noindent \textbf{VAC} \cite{guo2019visual} considers the human prior that the attention area of augmented samples should be consistent. For example, compared with the attention area of the original image, the attention area of horizontally flipped image should also be flipped horizontally. Thus, the feature extractor (ResNet50 \cite{he2016deep}) takes a pair of original pictures and augmented pictures as input and aligns the attention region of corresponding feature maps. The classifier takes the feature vector of the original image as input and outputs the logits as the final prediction. The weighted sigmoid cross-entropy loss in Equation \ref{eq:celoss} and Equation \ref{eq:weight1} is used as the loss function.
\noindent \textbf{ALM} \cite{tang2019Improving} draws on the idea of feature pyramid networks (FPN) \cite{lin2017feature} on object detection and integrated spatial transformation network (STN) \cite{jaderberg2015spatial} and squeeze-and-excitation \cite{hu2018squeeze} with each layer of FPN as the feature extractor. Followed by spatial transformation, each layer in FPN outputs the feature vector for each attribute. In the training stage, deep supervision is adopted in each layer of FPN. In the test stage, predictions from each layer are aggregated by element-wise maximum. The weighted sigmoid cross-entropy loss is used as in Equation \ref{eq:celoss} and Equation \ref{eq:weight1}.
\noindent \textbf{JLAC} \cite{tan2020relation} proposes a two-branch network consisted of an attribute relation graph and a contextual relation graph as the feature extractor to represent the attribute feature and image feature. Attribute relation branch learns each attribute feature and conducts feature propagation by graph convolution network \cite{kipf2017semi} to refine attribute features. The refined features are sent to one classifier. Contextual relation branch projects feature map into node vectors through NetVLAD \cite{arandjelovic2016netvlad} and concatenates the node vectors as the inputs to another classifier. The weighted sigmoid cross-entropy loss is used as in Equation \ref{eq:celoss} and Equation \ref{eq:weight2}.
\section{Experiments}
In this section, we first give an exhaustive introduction to datasets, evaluation metrics, and implementation details adopted by our experiments. Then, experimental performance on existing datasets and proposed datasets are present to make a fair comparison between our baseline method and state-of-the-art methods. Experiments comprise following three parts. First, we compare the performance of the baseline model of state-of-the-art methods to uncover the inconsistent baseline problem. Second, we sequentially conduct experiments in existing datasets and proposed datasets to compare our baseline method with state-of-the-art methods. Finally, we conduct several ablation studies on our baseline method to demonstrate the effect of various factors.
\begin{table*}[ht]
\renewcommand{\arraystretch}{1.3}
\caption{Details of existing datasets and proposed datasets. $I_{all}$, $I_{train}$, $I_{valid}$, $I_{test}$ indicates the number of identities in the whole set, train set, validation set and test set respectively. $N_{all}$, $N_{train}$, $N_{valid}$, $N_{test}$ indicates the number of images in the whole set, train set, validation set and test set respectively. Pedestrian identities are not provided in RAP1, PA100k and are partly provided in RAP2, so the exact quantity cannot be counted, which is denoted by -- . Due to the overlapped identities between $I_{train}$, $I_{valid}$ and $I_{test}$ in PETA, $I_{all} \neq I_{train} + I_{valid} + I_{test}$. \textit{Attr} here denotes the number of attributes used for evaluation.}
\label{tab:dataset_info}
\centering
\begin{tabular} {c|c|c|c|c|c|c|c|c|c|c}
\toprule
Setting & Dataset & Attr & $I_{all}$ & $I_{train}$ & $I_{valid}$ & $I_{test}$ & $N_{all}$ & $N_{train}$ & $N_{val}$ & $N_{test}$ \\ \hline \hline
\multirow{3}{*}{random splitting} & PETA & 35 & 8,699 & 4,886 & 1,264 & 4,110 & 19,000 & 9,500 & 1,900 & 7,600 \\
& RAP1 & 51 & -- & -- & -- & -- & 41,585 & 33,268 & -- & 8,317 \\
& RAP2 & 54 & -- & -- & -- & -- & 84,928 & 50,957 & 16,986 & 16,985 \\ \cline{1-1}
\multirow{3}{*}{zero-shot splitting}& PETA\textsubscript{ZS} & 35 & 8,699 & 5,233 & 1,760 & 1,706 & 19,000 & 11,241 & 3,826 & 3,933 \\
& RAP\textsubscript{ZS} & 53 & 2,590 & 1,566 & 505 & 518 & 26,632 & 17,062 & 4,648 & 4,928 \\
& PA100k & 26 & -- & -- & -- & -- & 100,000 & 80,000 & 10,000 & 10,000 \\
\bottomrule
\end{tabular}
\vspace{-1em}
\end{table*}
\subsection{Datasets and Evaluation Metrics}
We conduct experiments in six datasets, including four existing datasets PETA \cite{deng2014pedestrian}, RAP1 \cite{li2016richly}, RAP2 \cite{li2018richly}, PA100K \cite{liu2017hydraplus}, and two proposed datasets PETA\textsubscript{ZS}, RAP\textsubscript{ZS}. We divide datasets into two categories according to the splitting criteria. Some are random-splitting datasets, where samples are random assigned to the training set and test set, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, PETA, RAP1, RAP2. Others are zero-shot splitting datasets, where samples are assigned according to the zero-shot pedestrian identities of the training set and test set, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, PETA\textsubscript{ZS}, RAP\textsubscript{ZS}, and PA100K. The details are given in Table \ref{tab:dataset_info}. For PETA, Deng \emph{et al}\onedot annotates each image with more than 60 attributes, but only 35 attributes are used for evaluation due to the imbalance distribution of some attributes. For RAP and RAP2, Li \emph{et al}\onedot annotates each image with 72 attributes, but only 51 and 54 attributes are respectively selected for evaluation considering the proportion of positive samples. For PA100K, Liu \emph{et al}\onedot annotates each image with 26 attributes and adopts all attributes for training and testing. We find experimental that training with all annotated attributes cannot consistently improve the performance. Thus, we only choose 35, 51, 54 attributes for training on PETA, RAP1, RAP2 respectively.
According to the previous works \cite{liu2017hydraplus, sarafianos2018deep, tang2019Improving, guo2019visual, li2018richly, tan2019attention}, we adopt five metrics to evaluate the model performance, including four instance-level metrics and one attribute-level (label-level) metric. For instance-level metrics, accuracy (Acc), precision (Prec), recall (Recall), F1 are adopted and calculated as follows:
\begin{align}
Acc &= \frac{1}{N} \sum_{i=1}^N \frac{TP_{i}}{TP_{i} + FP_{i} + FN_{i}} \\
Prec &= \frac{1}{N} \sum_{i=1}^N \frac{TP_{i}}{TP_{i} + FP_{i}} \\
Recall &= \frac{1}{N} \sum_{i=1}^N \frac{TP_{i}}{TP_{i} + FN_{i}} \\
F1 &= \frac{1}{N} \sum_{i=1}^N \frac{2 \cdot Prec \cdot Recall}{Prec + Recall} \label{eq:f1}
\end{align}
where $TP_{i}$, $FP_{i}$, $FN_{i}$ is the number of true positive, false positive, false negative attributes of $i$-th sample and $N$ denotes the number of samples. For attribute-level metrics, mean accuracy (mA) is adopted and calculated as follows:
\begin{align}
mA &= \frac{1}{M} \sum_{j=1}^M \frac{1}{2} (\frac{TP^{j}}{TP^{j} + FN^{j}} + \frac{TN^{j}}{TN^{j} + FP^{j}}) \label{eq:ma_1}
\end{align}
where $TP^{j}$, $TN^{j}$, $FP^{j}$, $FN^{j}$ is the number of true positive, true negative, false positive, false negative samples of $j$-th attribute and $M$ denotes the number of attributes.
\subsection{Implementation Details} \label{implement}
To make a fair comparison, all experiments of reimplemented methods and the proposed baseline method are conducted on the same experimental settings. For previous state-of-the-art methods, we strictly follow their papers and public codes to reimplement corresponding models. All models are implemented with PyTorch and trained end-to-end. ResNet50 is adopted as the backbone network. Pedestrian images are resized to 256 × 128 (height × width) as inputs. We use Adam optimizer to train the whole network with initial learning rate 1e-3 and weight decay 5e-4. The ReduceLROnPlateau learning rate scheduler is adopted to reduce the learning rate with 0.1 factor once the performance has no improvement in four epochs. For the JLAC method, since the Batch Normalization \cite{ioffe2015batch} is used after the classification layer, we use the MultiStepLR scheduler with milestones [10, 20] to adjust the learning rate. The batch size is set to 64, and the total epoch number of training stage is set to 30. Only image resizing, random horizontal flipping, and normalization are used as augmentation at the training time. Only image resizing is adopted during test. The weighting function \ref{eq:weight2} is used by default.
We emphasize that our experiments do not focus on achieving higher performance on the metrics but show how good a simple baseline model can achieve and how big the gap between the state-of-the-art method and the baseline model is.
\subsection{Comparison of our baseline method with those in state-of-the-art methods}
\begin{table*}[ht]
\renewcommand{\arraystretch}{1.3}
\caption{Performance comparison of \textbf{baseline models} of state-of-the-art methods on the PETA, RAP1, PA100k datasets. Performance on five metrics, mA, Accuracy, Precision, Recall, and F1 are evaluated. Although some baseline models use the same backbone network, their performance varies greatly.}
\label{tab:baseline}
\centering
\resizebox{\linewidth}{!}{
\begin{tabular}{c|c|ccccc|ccccc|ccccc}
\toprule
\multirow{2}{*}{Method} & \multirow{2}{*}{Backbone} & \multicolumn{5}{c|}{PETA} & \multicolumn{5}{c|}{RAP} &\multicolumn{5}{c}{PA100K} \\ \cline{3-17}
& & mA & Accu & Prec & Recall & F1 & mA & Accu & Prec & Recall & F1 & mA & Accu & Prec & Recall & F1 \\ \hline \hline
GRL\cite{zhao2018grouping} (IJCAI18) & Inception-V3 & 81.50 & -- & 89.70 & 81.90 & 85.68 & 76.10 & -- & 82.20 & 74.80 & 78.30 & -- & -- & -- & -- & -- \\
VRKD\cite{li2019pedestrian} (IJCAI19) & ResNet50 & 81.27 & 76.69 & 87.33 & 82.76 & 84.99 & 75.12 & 66.67 & 81.16 & 76.52 & 79.00 & 76.31 & 76.76 & 88.62 & 83.22 & 85.84 \\
AAP\cite{han2019attribute} (IJCAI19) & ResNet50 & 84.68 & 78.89 & 85.38 & 86.41 & 85.83 & 79.67 & 66.01 & 77.93 & 79.25 & 78.58 & 78.12 & 74.11 & 84.42 & 84.09 & 84.25 \\
MsVAA\cite{sarafianos2018deep} (ECCV18) & ResNet101 & 82.67 & 76.63 & 85.13 & 84.46 & 84.79 & -- & -- & -- & -- & -- & -- & -- & -- & -- & -- \\
VAC \cite{guo2019visual} (CVPR19) & ResNet50 & -- & -- & -- & -- & -- & -- & -- & -- & -- & -- & 78.12 & 75.23 & 88.47 & 83.41 & 85.86\\
ALM\cite{tang2019Improving} (ICCV19) & BN-Inception & 82.66 & 77.73 & 86.68 & 84.20 & 85.57 & 75.76 & 65.57 & 78.92 & 77.49 & 78.20 & 77.47 & 75.05 & 86.61 & 85.34 & 85.97 \\
JLAC\cite{tan2020relation} (AAAI20) & BN-Inception & 84.81 & 77.66 & 85.43 & 85.85 & 85.64 & 80.49 & 66.00 & 76.35 & 81.32 & 78.76 & 81.17 & 77.84 & 85.95 & 87.19 & 86.56 \\ \hline
Baseline & BN-Inception & 83.34 & 76.11 & 85.21 & 83.89 & 84.55 & 78.66 & 65.55 & 77.87 & 78.71 & 78.28 & 79.73 & 77.68 & 86.61 & 86.29 & 86.45 \\
Baseline & ResNet50 & 84.42 & 78.13 & 86.88 & 85.08 & 85.97 & 80.32 & 67.28 & 79.04 & 79.89 & 79.46 & 80.38 & 78.58 & 87.09 & 87.01 & 87.05 \\
Baseline & ResNet101 & 85.17 & 78.82 & 86.77 & 86.11 & 86.44 & 80.82 & 67.56 & 79.01 & 80.37 & 79.68 & 81.61 & 79.45 & 87.66 & 87.59 & 87.62 \\\bottomrule
\end{tabular}}
\vspace{-1em}
\end{table*}
A solid baseline method is essential for developing specific area, such as image classification \cite{he2019bag}, person re-identification \cite{luo2019strong}, and zero-shot learning \cite{xian2018zero}. However, baseline model performance of state-of-the-art methods in pedestrian attribute recognition varies greatly, which hinders fair comparison between methods and cannot fully validate the method contribution. As listed in Table \ref{tab:baseline}, there is a significant performance gap between existing methods in each metric, especially in mA. For PETA, RAP, PA100K, performance in mA fluctuates by as much as 3.41, 4.55, 1.81 points, which is a considerable performance variance compared with the performance improvement from the technical contribution. Except for JLAC \cite{tan2020relation}, which adopts horizontal flipping, random scaling, rotation, translation, cropping, erasing, and adding random gaussian blurs as data augmentations, our baseline method achieves performance superior to other baseline models, with only horizontal flipping augmentation. For example, compared with ALM \cite{tang2019Improving}, our baseline model with BN-Inception achieve 0.68, 2.90, 2.26 performance improvement in mA and 0.40, 1.26, 1.08 performance improvement in F1. We argue that the proposed solid baseline without bells and whistles plays an important role in advancing the pedestrian attribute recognition field by providing a performance reference to evaluate the model technical contribution.
\begin{table*}[ht]
\renewcommand{\arraystretch}{1.3}
\caption{Performance comparison of state-of-the-art methods on the PETA, RAPv1, PA100k datasets. Performance on five metrics, mA, Accuracy, Precision, Recall, and F1 are evaluated. Parameters (Params) and floating point operations per second operations (FLOPS) of various methods are also reported.}
\label{tab:sota_perf}
\centering
\resizebox{\linewidth}{!}{
\begin{tabular}{c|c|ccccc|ccccc|ccccc|cc}
\toprule
\multirow{2}{*}{Method} & \multirow{2}{*}{Backbone} & \multicolumn{5}{c|}{PETA} & \multicolumn{5}{c|}{RAP1} &\multicolumn{7}{c}{PA100k} \\ \cline{3-19}
& & mA & Accu & Prec & Recall & F1 & mA & Accu & Prec & Recall & F1 & mA & Accu & Prec & Recall & F1 & Params(M) & FLOPS(G) \\ \hline \hline
DeepMAR \cite{li2015deepmar} (ACPR15) & CaffeNet & 82.89 & 75.07 & 83.68 & 83.14 & 83.41 & 73.79 & 62.02 & 74.92 & 76.21 & 75.56 & 72.70 & 70.39 & 82.24 & 80.42 & 81.32 & -- & --\\
HPNet\cite{liu2017hydraplus} (ICCV17) & InceptionNet & 81.77 & 76.13 & 84.92 & 83.24 & 84.07 & 76.12 & 65.39 & 77.33 & 78.79 & 78.05 & 74.21 & 72.19 & 82.97 & 82.09 & 82.53 &--&--\\
JRL \cite{wang2017attribute} (ICCV17) \footnotemark[1] & AlexNet & 85.67 & -- & 86.03 & 85.34 & 85.42 & 77.81 & -- & 78.11 & 78.98 & 78.58 &--&--&--&--&--& -- & -- \\
JRL \cite{wang2017attribute} (ICCV17) & AlexNet & 82.13 & -- & 82.55 & 82.12 & 82.02 & 74.74 & -- & 75.08 & 74.96 & 74.62 &--&--&--&--&-- & -- & -- \\
LGNet \cite{liu2018localization} (BMVC18) & Inception-V2 &--&--&--&--&--& 78.68 & 68.00 & 80.36 & 79.82 & 80.09 & 76.96 & 75.55 & 86.99 & 83.17 & 85.04 &--&--\\
PGDM \cite{li2018pose} (ICME18) & CaffeNet & 82.97 & 78.08 & 86.86 & 84.68 & 85.76 & 74.31 & 64.57 & 78.86 & 75.90 & 77.35 & 74.95 & 73.08 & 84.36 & 82.24 & 83.29 &--&--\\ \hline
GRL\cite{zhao2018grouping} (IJCAI18) & Inception-V3 & 86.70 & -- & 84.34 & \bf{88.82} & 86.51 & 81.20 & -- & 77.70 & 80.90 & 79.29 &--&--&--&--&-- & -- &--\\
RA\cite{zhao2019recurrent} (AAAI19)& Inception-V3 & 86.11 & -- & 84.69 & 88.51 & 86.56 & 81.16 & -- & 79.45 & 79.23 & 79.34 &--&--&--&--&--& -- & -- \\
VSGR\cite{li2019visual} (AAAI19)\footnotemark[1] & ResNet50 & 85.21 & \bf{81.82} & \bf{88.43} & 88.42 & \bf{88.42} & 77.91 & \bf{70.04} & 82.05 & 80.64 & \bf{81.34} & 79.52 & \bf{80.58} & 89.40 & 87.15 & \bf{88.26} & -- & --\\
VRKD\cite{li2019pedestrian} (IJCAI19)& ResNet50 & 84.90 & 80.95 & 88.37 & 87.47 & 87.91 & 78.30 & 69.79 & 82.13 & 80.35 & 81.23 & 77.87 & 78.49 & 88.42 & 86.08 & 87.24 & -- & -- \\
AAP\cite{han2019attribute} (IJCAI19) & ResNet50 & \bf{86.97} & 79.95 & 87.58 & 87.73 & 87.65 & 81.42 & 68.37 & 81.04 & 80.27 & 80.65 & 80.56 & 78.30 & \bf{89.49} & 84.36 & 86.85 & -- & -- \\ \hline
MsVAA\cite{sarafianos2018deep} (ECCV18) & ResNet101 & 84.59 & 78.56 & 86.79 & 86.12 & 86.46 & -- & -- & -- & -- & -- & -- & -- & -- & -- & -- & -- & --\\
VAC \cite{guo2019visual} (CVPR19) & ResNet50 & -- & -- & -- & -- & -- & -- & -- & -- & -- & -- & 79.16 & 79.44 & 88.97 & 86.26 & 87.59 & -- & -- \\
ALM\cite{tang2019Improving} (ICCV19) & BN-Inception & 86.30 & 79.52 & 85.65 & 88.09 & 86.85 & \bf{81.87} & 68.17 & 74.71 & \bf{86.48} & 80.16 & 80.68 & 77.08 & 84.21 & 88.84 & 86.46 & -- & -- \\
JLAC\cite{tan2020relation} (AAAI20) & BN-Inception & 86.96 & 80.38 & 87.81 & 87.09 & 87.45 & 83.69 & 69.15 & 79.31 & 82.40 & 80.82 & \bf{82.31} & 79.47 & 87.45 & \bf{87.77} & 87.61 & -- & -- \\ \hline
MsVAA\cite{sarafianos2018deep} (ECCV18) \footnotemark[2] & ResNet50 & 83.57 & 77.62 & 86.74 & 84.57 & 85.64 & 78.86 & 66.99 & 79.39 & 79.15 & 79.27 & 80.41 & 78.37 & 87.08 & 86.52 & 86.80 & 114.19 & 3.28\\
VAC \cite{guo2019visual} (CVPR19) \footnotemark[2] & ResNet50 & 84.58 & 78.37 & 87.40 & 84.93 & 85.83 & 80.27 & 66.26 & 77.87 & 79.77 & 78.36 & 80.11 & 78.43 & 87.24 & 86.44 & 86.45 & 23.56 & 2.69 \\
ALM\cite{tang2019Improving} (ICCV19) \footnotemark[2] & ResNet50 & 85.57 & 76.91 & 83.48 & 87.08 & 85.24 & 80.96 & 66.04 & 75.13 & 82.69 & 78.73 & 81.29 & 77.61 & 85.42 & 87.40 & 86.40 & 27.70 & 2.82 \\
JLAC\cite{tan2020relation} (AAAI20) \footnotemark[2] & ResNet50 & 86.88 & 78.03 & 85.61 & 86.21 & 85.91 & 81.51 & 66.29 & 77.17 & 80.42 & 78.76 & 82.10 & 77.49 & 85.74 & 86.88 & 86.31 & 40.87 & 6.00 \\
\hline
Baseline & BN-Inception & 83.34 & 76.11 & 85.21 & 83.89 & 84.55 & 78.66 & 65.55 & 77.87 & 78.71 & 78.28 & 79.73 & 77.68 & 86.61 & 86.29 & 86.45 & \bf{11.32} & \bf{1.34}\\
Baseline & ResNet50 & 84.42 & 78.13 & 86.88 & 85.08 & 85.97 & 80.32 & 67.28 & 79.04 & 79.89 & 79.46 & 80.38 & 78.58 & 87.09 & 87.01 & 87.05 & 23.56 & 2.69\\
Baseline & ResNet101 & 85.17 & 78.82 & 86.77 & 86.11 & 86.44 & 80.82 & 67.56 & 79.01 & 80.37 & 79.68 & 81.61 & 79.45 & 87.66 & 87.59 & 87.62 & 42.55 & 5.12\\\bottomrule
\end{tabular}}
\vspace{-1em}
\end{table*}
\subsection{Comparison of our baseline method with state-of-the-art methods on existing datasets}
We make a systematic performance comparison between our baseline methods with state-of-the-art algorithms on the PETA, RAP1, and PA100K in Table \ref{tab:sota_perf}. For a fair comparison, besides the performance reported by the papers \cite{sarafianos2018deep, guo2019visual, tang2019Improving, tan2020relation}, we also report the performance of our reimplementations based on the same experimental settings described in Implementation Details. Model complexity is also reported in parameters (Params) and floating point operations per second operations (FLOPS). In order to give a clear comparison and avoid the effect of overfitting, all experiments are conducted only with resizing, random horizontal flipping, and normalization. Considering that the F1 is a trade-off between Prec and Recall, we argue that F1 and mA are the two most important metrics for method evaluation.
Our reimplemented methods achieve comparable performance compared with the performance reported by the paper. For MsVAA \cite{sarafianos2018deep} , our reimplemented method achieves slightly worse performance because we adopt ResNet50 as the backbone network instead of ResNet101 \footnote{\url{https://github.com/cvcode18/imbalanced_learning}} in the original paper. For VAC \cite{guo2019visual} \footnote{\url{https://github.com/hguosc/visual_attention_consistency}}, our reimplemented method achieves comparable performance on PA100K, namely 0.95 performance improvement in mA and 1.14 performance decrease in F1. For ALM \cite{tang2019Improving} \footnote{\url{https://github.com/chufengt/iccv19_attribute}}, our reimplemented method achieves slightly lower performance than paper-reported performance on PETA and RAP1 and achieves comparable even higher performance on PA100K. There are two reasons. First, the authors of ALM adopt a two-stage training manner and use a warm-up learning rate scheduler, but we train the model once end-to-end to align with other methods. Second, due to the extremely similar images between the training set and test set on PETA and RAP, caused by random splitting and shown in Figure \ref{fig:zeroshot_overview}, models of PETA and RAP incline to overfitting. This phenomenon can also be found in JLAC experiments. For JLAC, since authors adopt a series of data augmentations described in implementation details, our reimplemented method can achieve comparable performance on PA100K and slightly worse performance on PETA and RAP1. Thus, we conclude that, due to the small size and highly similar images between the training set and test set, which make models easy to overfit, performance on PETA and RAP1 is more sensitive to data augmentations than performance on PA100K. We verify this conclusion in Table \ref{tab:ablation_aug}.
After achieving the comparable performance of reimplemented methods, we can directly compare our baseline methods with state-of-the-art methods in the same experimental settings. We use the baseline method with ResNet50 by default. As listed in Table \ref{tab:sota_perf}, compared with reimplementations of MsVAA and VAC, our baseline method achieve comparable even higher performance on three datasets. Compared with ALM, on three datasets, our baseline method with only 85\% parameters achieves performance improvement in F1 by 0.65 to 0.73, while mA performance reduces by 0.64 to 1.15. Compared with JLAC, the baseline performance is reduced by 1.56, 1.19, 1.72 in mA on PETA, RAP1, and PA100K separately and improved by 0.80, 0.70, 0.74 in F1. Although performance decrease on mA is higher than the performance increase on F1, our baseline only uses 57.65\% parameters and 44.83\% flops compared with JLAC, which uses the two-branch network and each branch adopts conv5 stage of ResNet50 as unshared parameters.
\footnotetext[1]{Results are achieved by the ensemble model.}
\footnotetext[2]{Results are reimplemented with the same experimental setting of our baseline.}
\begin{table*}[ht]
\renewcommand{\arraystretch}{1.3}
\caption{Performance comparison of four methods on the PETA, RAP2 datasets. We use \textit{``zero-shot"} to denote our proposed PETA\textsubscript{$zs$} or RAP\textsubscript{$zs$} dataset, while \textit{``random"} indicates the existing datasets PETA or RAP. Performance on five metrics, mA, Accuracy, Precision, Recall, and F1 are evaluated. Our baseline method adopt ResNet50 as the backbone network.}
\label{tab:proposed_dataset_perf}
\centering
\begin{tabular}{c|c|ccccc|ccccc}
\toprule
\multirow{2}{*}{Method} & \multirow{2}{*}{Dataset Splitting} & \multicolumn{5}{c|}{PETA} & \multicolumn{5}{c}{RAP2} \\ \cline{3-12}
& & mA & Accu & Prec & Recall & F1 & mA & Accu & Prec & Recall & F1 \\ \hline \hline
\multirow{2}{*}{MsVAA} & random & 84.35 & 78.69 & 87.27 & 85.51 & 86.09 & 78.34 & 65.57 & 77.37 & 79.17 & 78.26 \\ \cline{2-2}
& zero-shot & 71.53 & 58.67 & 74.65 & 69.42 & 71.94 & 72.04 & 62.13 & 75.67 & 75.81 & 75.74\\\cline{1-12}
\multirow{2}{*}{VAC} & random & 83.63 & 78.94 & 87.63 & 85.45 & 86.23 & 79.23 & 64.51 & 75.77 & 79.43 & 77.10 \\\cline{2-2}
& zero-shot & 71.91 & 57.72 & 72.05 & 70.64 & 70.90 & 73.70 & 63.25 & 76.23 & 76.97 & 76.12\\\cline{1-12}
\multirow{2}{*}{ALM} & random & 85.11 & 79.14 & 86.99 & 86.33 & 86.39 & 79.79 & 64.79 & 73.93 & 82.03 & 77.77 \\\cline{2-2}
& zero-shot & 73.01 & 57.78 & 69.50 & 73.69 & 71.53 & 74.28 & 63.22 & 72.96 & 80.73 & 76.65\\\cline{1-12}
\multirow{2}{*}{JLAC} & random & 86.02 & 79.51 & 86.62 & 87.19 & 86.66 & 79.23 & 64.42 & 75.69 & 79.18 & 77.40 \\\cline{2-2}
& zero-shot & 73.60 & 58.66 & 71.70 & 72.41 & 72.05 & 76.38 & 62.58 & 73.14 & 79.20 & 76.05\\ \cline{1-12}
\multirow{2}{*}{Baseline} & random & 84.42 & 78.13 & 86.88 & 85.08 & 85.97 & 79.19 & 65.27 & 76.26 & 79.89 & 78.03 \\\cline{2-2}
& zero-shot & 71.62 & 58.19 & 73.09 & 70.33 & 71.68 & 72.32 & 63.61 & 76.88 & 76.62 & 76.75\\\bottomrule
\end{tabular}
\vspace{-1em}
\end{table*}
\subsection{Performance comparison between existing datasets and proposed datasets}
To give a direct comparison between existing datasets (PETA, RAP2) and proposed datasets (PETA\textsubscript{ZS}, RAP\textsubscript{ZS}), we evaluate the state-of-the-art methods and our proposed baseline method on four datasets, as shown in Table \ref{tab:proposed_dataset_perf}. We emphasize that the ``random" splitting manner and ``zero-shot" splitting manner in Table \ref{tab:proposed_dataset_perf} is adopted by existing datasets (PETA, RAP2) and proposed datasets (PETA\textsubscript{ZS}, RAP\textsubscript{ZS}), separately. All experiments are performed following implementation details. We have the following observations.
First, for the same method, the performance on PETA\textsubscript{ZS} and RAP\textsubscript{ZS} decreases significantly compared with the corresponding performance on PETA and RAP2. The main reason is the pedestrian identity overlap between the training set and test set on PETA and RAP (shown in Fig. \ref{fig:common_image} and Fig. \ref{fig:overlap_dataset}), which results in high performance on common-identity images in the test set (shown in Fig. \ref{fig:overlapped_perf_gap}). However, the high performance on common-identity images does not reflect the method generalization ability. In contrast, no pedestrian identity of the test set appears in the training set on our proposed datasets, PETA\textsubscript{ZS} and RAP\textsubscript{ZS}, where the generalization ability of methods can be truly measured. We can notice that, although PETA\textsubscript{ZS} has more training samples and fewer test samples than PETA, the performance of all metrics is at least ten points lower on PETA\textsubscript{ZS} than on PETA, which demonstrates that our proposed datasets can evaluate the model generalization more rigorously and accurately. In addition, the performance on PETA\textsubscript{ZS} is close to the performance on unique-identity images of PETA test set (shown in Fig. \ref{fig:overlapped_perf_gap}), which also verifies that our proposed datsets can reflect the generalization ability of the model on unseen pedestrian images.
Second, for the same method, compared with the performance gap between PETA and PETA\textsubscript{ZS}, the performance gap between RAP2 and RAP\textsubscript{ZS} is much smaller. We consider that is related to the composition of datasets, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, PETA is composed of 10 publicly small-scale datasets, while RAP2 is collected in one scene. When there is no pedestrian identity overlap between the training set and test set, the cross-domain problem is inevitable. Thus, the domain difference between the training set and the test set of PETA\textsubscript{ZS} is more significant than that of RAP\textsubscript{ZS}, which results in the notable performance degradation from PETA to PETA\textsubscript{ZS}.
Third, whether on PETA or RAP2, the performance difference between methods on the proposed dataset is more significant than the performance difference between the methods on the existing dataset. For example, five methods performance on RAP2 is from 78.34 to 79.79 in mA, while performance on RAP\textsubscript{ZS} is from 72.04 to 76.38 in mA. Because the existing datasets are prone to the overfitting problem, there is little difference in the performance of various methods, which cannot adequately represent the generalization ability of the model and hinders the direct comparison between models.
Therefore, we conclude that our proposed datasets PETA\textsubscript{ZS} and RAP\textsubscript{ZS} are superior to existing datasets PETA, RAP1, and RAP2, in terms of evaluation of the model generalization and practical application.
\subsection{Ablation Study}
In this section, we conduct experiments on several factors that affect baseline performance. Considering that PA100K is currently the largest dataset and conforms to the zero-shot setting, all experiments are conducted on PA100K and adopt ResNet50 as the backbone network. No weighting function is used. Other details are following implementation details.
First, we make a performance comparison on the input image size. We list several common input image sizes in Table \ref{tab:input_size}. Unlike general multi-label classification on COCO \cite{lin2014microsoft} and PASCAL-VOC \cite{everingham2010pascal}, where increasing the input image size can significantly improve performance, input image size has little effect on performance. The reason is that the high-resolution ($640 \times 480$) images of COCO and PASCAL are usually resized to a small size ($224 \times 224$) as inputs. Thus, increasing input size (from 224x224 to 448x448) can bring more information and improve performance. However, almost all pedestrian images captured by surveillance cameras at far distance are low-resolution. Therefore, increasing the input image size to exceed the original image size has little effect.
\begin{table}[t]
\caption{Performance comparison on the input image size (height x width) of baseline method on PA100K.}
\label{tab:input_size}
\centering
\begin{tabular}{c|c|c|c|c|c}
\toprule
Input Size & mA & Accu & Prec & Recall & F1 \\\hline \hline
224 x 224 & 78.12 & 78.60 & 89.01 & 85.13 & 86.60 \\
256 x 128 & \bf{78.62} & \bf{79.15} & \bf{89.46} & \bf{85.49} & \bf{87.01} \\
256 x 192 & 78.57 & 78.98 & 89.38 & 85.33 & 86.87 \\
384 x 192 & 78.35 & 78.94 & 89.59 & 85.12 & 86.86 \\
\bottomrule
\end{tabular}
\vspace{-1em}
\end{table}
Second, we make a performance comparison on the weighting function \ref{eq:weight1}, \ref{eq:weight2}, and \ref{eq:weight3} in Table \ref{tab:ablation_weight}. Interestingly, there is almost no difference between the various weighting functions. These functions are effective in the mA metric but have little effect in the F1 metric. To explain the reason of this phenomenon, we first introduce the formulation of mA in Eq. \ref{eq:ma_1} from another perspective as follows:
\begin{align}
mA &= (mPR + mNR) / 2. \label{eq:ma} \\
mPR &= \frac{1}{M} \sum_{1}^{M} \frac{TP^{j}}{TP^{j} + FN^{j}} = \frac{1}{M} \sum_{1}^{M} \frac{TP^{j}}{N_{j}^{p}} \label{eq:mpr}\\
mNR &= \frac{1}{M} \sum_{1}^{M} \frac{TN^{j}}{TN^{j} + FP^{j}} = \frac{1}{M} \sum_{1}^{M} \frac{TN^{j}}{N_{j}^{n}} \label{eq:mnr}
\end{align}
where $N_{j}^{p}$, $N_{j}^{n}$ is the number of positive samples and negative samples of the $j$-th attribute. $mPR$ and $mNR$ indicates the mean positive recall and mean negative recall respectively.
We emphasize that all weighting functions are proposed to solve the imbalanced distribution of attributes. For most attributes, the number of negative samples is much larger than the number of positive samples $N_{j}^{n} \gg N_{j}^{p}$, which results in $TN^{j} \gg TP^{j}$. Thus, to improve the performance of positive samples of attributes, all weighting functions pay more attention to the loss of positive samples and reduce the proportion of negative samples, which can be concluded from Eq. \ref{eq:weight1}, Eq. \ref{eq:weight2}, and Eq. \ref{eq:weight3} with $r_{j} < 0.5$. As a result, methods that adopted weighting functions can significantly increase TP at the price of decreasing TN.
For the F1 metric in Eq.~\ref{eq:f1}, which is an instance-level metric and averaged on the number of all samples, compared with the baseline performance without weighting function, methods with weighting function improve the performance Recall but achieve lower performance in Prec. Thus, considering that F1 performance is a trade-off between Prec and Recall, there is limited performance improvement in F1. On the other hand, for the mA metric, which is an attribute-level metric and averaged on the number of attributes, due to the huge difference in the denominator between Eq. \ref{eq:mpr} and Eq. \ref{eq:mnr}, the increased number of TP samples significantly improve the performance in mPR, while the decreased TN only slightly affect the performance in mNR. For example, compared with the baseline method, WF2 improves 4.18 performance at the cost of only 0.27 performance reduction, which results in 1.76 performance improvements in mA. Thus, we conclude that the model with slightly low performance in mNR can achieve much high performance in mPR, which results in performance improvement in mA.
\begin{table}[t]
\caption{Performance comparison on the weight function of baseline method on PA100K. $R_{pos}$ and $R_{neg}$ denotes the mean positive recall and mean negative recall of attribute, where mA = (mPR + mNR) / 2. We use ``--" to denote the method without weighting function. }
\label{tab:ablation_weight}
\centering
\resizebox{\linewidth}{!}{
\begin{tabular}{c|c|c|c|c|c|c|c}
\toprule
Weight Function & mA & mPR & mNR & Accu & Prec & Recall & F1 \\\hline \hline
-- & 78.62 & 62.98 & 94.26 & 79.15 & 89.46 & 85.49 & 87.01 \\
WF1 & 80.19 & 66.37 & 94.01 & 78.78 & 87.86 & 86.47 & 87.16 \\
WF2 & 80.38 & 67.16 & 93.59 & 78.58 & 87.09 & 87.01 & 87.05 \\
WF3 $\alpha = 0.1$ & 78.93 & 63.69 & 94.17 & 79.03 & 89.04 & 85.67 & 87.32 \\
WF3 $\alpha = 0.4$ & 80.77 & 67.75 & 93.79 & 78.82 & 87.52 & 86.83 & 87.17 \\
WF3 $\alpha = 0.7$ & 82.44 & 72.18 & 92.70 & 75.30 & 82.70 & 87.31 & 84.94 \\
WF3 $\alpha = 1$ & 85.05 & 78.07 & 92.02 & 75.07 & 81.40 & 88.54 & 84.82 \\
\bottomrule
\end{tabular}}
\vspace{-1em}
\end{table}
Third, we make a performance comparison on the data augmentations in Table \ref{tab:ablation_aug}, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, padding and random cropping, color jitter and random rotation, random erasing. Three data augmentations are sequentially added to the baseline method with ResNet50 as the backbone network. We only reported the two most important metrics mA and F1 for convenience. Compared with performance variance on PA100K, performance on PETA and RAP is more sensitive to data augmentations.
\begin{table}[ht]
\renewcommand{\arraystretch}{1.3}
\caption{Performance comparison on data augmentations. ``RC", ``CJ", ``RR" and ``RE" denotes RandomCrop, ColorJitter, RandomRotation and RandomErasing respectively.}
\label{tab:ablation_aug}
\centering
\resizebox{0.9\linewidth}{!}{
\begin{tabular}{c|cc|cc|cc|cc|cc}
\toprule
\multirow{2}{*}{Method} & \multicolumn{2}{c|}{PETA\textsubscript{ZS}} & \multicolumn{2}{c|}{PETA} & \multicolumn{2}{c|}{RAP} & \multicolumn{2}{c|}{RAP\textsubscript{ZS}} & \multicolumn{2}{c}{PA100K}\\ \cline{2-11}
& mA & F1 & mA & F1 & mA & F1 & mA & F1 & mA & F1 \\ \hline \hline
basline & 71.62 & 71.68 & 84.42 & 85.97 & 80.32 & 79.46 & 72.32 & 76.75 & 80.38 & 87.05\\\cline{1-1}
+ Pad \& RC & 72.21 & 71.33 & 85.12 & 86.03 & 81.34 & 79.63 & 73.36 & 76.68 & 80.99 & 86.77 \\\cline{1-1}
+ CJ \& RR & 72.55 & 70.96 & 85.00 & 85.95 & 81.33 & 79.80 & 74.14 & 77.07 & 81.38 & 87.19\\\cline{1-1}
+ RE & 73.30 & 71.19 & 85.61 & 86.23 & 82.14 & 80.13 & 75.08 & 77.23 & 80.94 & 87.18\\ \bottomrule
\end{tabular}}
\vspace{-1em}
\end{table}
\section{Conclusion}
In this paper, we review and rethink the development of pedestrian attribute recognition from the definition, datasets, and state-of-the-art methods. For the definition of pedestrian attribute recognition, our work proposes an explicit, complete, and specific definition for the first time, which points out the essential requirement of pedestrian attribute recognition, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, the model can correctly predict attributes on unseen pedestrians. Guided by definition, we expose the flaws and limitations in existing datasets PETA, RAP1, and RAP2, which mislead the algorithm evaluation. The algorithm performance is overestimated and can not truly reflect the generalization ability. Thus, to solve the mentioned problems, we propose two datasets PETA\textsubscript{ZS} and RAP\textsubscript{ZS} following the zero-shot settings on pedestrian identity. Finally, we propose a solid baseline method and reimplement state-of-the-art methods to provide a reliable and realistic evaluation on four existing datasets and two proposed datasets. On the one hand, we found that our proposed baseline method, which is superior to several methods, can be taken as a reference for future work. On the other hand, due to reducing the overfitting influence, it is easier to compare methods on our proposed datasets, which directly reflect the pros and cons of various methods.
\bibliographystyle{IEEEtran}
|
\section{Introduction.}\label{sec:Introduction}
In recent years there has been an increase in interest in pronilfactors both for measure-preserving systems (m.p.s.) and topological dynamical systems (t.d.s.). Pronilfactors of a given system are either measurable or topological (depending on the category) factors given by an inverse limit of nilsystems. A t.d.s. (m.p.s.) is called a topological (measurable) \textit{$d$-step pronilsystem}
if it is a topological (measurable) inverse limit of nilsystems of degree at most $d$.\footnote{
It is a classical fact that every (measurable) ergodic $d$-step pronilsystem is isomorphic as m.p.s. to a (topological) minimal $d$-step pronilsystem.} In the theory of measure preserving systems $(X,\mathcal{X},\mu,T)$ maximal measurable pronilfactors appear in connection with the $L^2$-convergence of the nonconventional ergodic averages
\begin{equation}\label{eq: convergence of multiple ergodic averages}
\frac{1}{N}\sum f_{1}(T^{n}x)\ldots f_{k}(T^{kn}x)
\end{equation}
for $f_1,\ldots,f_k\in L^\infty(X,\mu)$ (\cite{HK05,Z07}).
In the theory of topological dynamical systems maximal topological pronilfactors appear in connection with the higher order regionally proximal relations (\cite{HKM10,SY12,GGY2018}).
When a system possesses both measurable and topological structure, it seems worthwhile to investigate pronilfactors both from a measurable and topological point of view. A natural meeting ground are strictly ergodic systems - minimal topological dynamical systems $(X,T)$ possessing a unique invariant measure $\mu$. For $k\in \mathbb{Z}$ let us denote by $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ respectively $(W_k(X),T)$ the maximal $k$-step measurable respectively topological pronilfactor\footnote{Both these objects exist and are unique in a precise sense. See Subsection \ref{subsec:Universality}.} of $(X,T)$. Clearly $(W_k(X),T)$ has a unique invariant measure $\omega_k$. We thus pose the question when is $(W_k(X), \mathcal{W}_k(X), \omega_k,T)$ isomorphic to $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ as m.p.s.? We call a t.d.s. which is strictly ergodic and for which $(W_k(X), \mathcal{W}_k(X), \omega_k,T)$ is isomorphic to $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ as m.p.s., a \textit{\text{CF-Nil}$(k)$ } system\footnote{This terminology is explained in Subsection \ref{subsec: def:continuously to k-nil}.}.
Note that $(W_k(X), \mathcal{W}_k(X), \omega_k,T)$ is always a measurable factor of $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$. At first glance it may seem that \text{CF-Nil}$(k)$ systems are rare however a theorem by Benjamin Weiss regarding topological models for measurable extensions implies that every ergodic m.p.s. is measurably isomorphic to a \text{CF-Nil}$(k)$ system\footnote{See Subsection \ref{subsec:Weiss thm}.}.
We give two characterizations of \text{CF-Nil}$(k)$ systems. The first characterization is related to the Wiener-Wintner theorem while the second characterization is related to \textit{$k$-cube uniquely ergodic} systems - a class of topological dynamical systems introduced in \cite{GL2019}.
The Wiener-Wintner theorem (\cite{WW1941}) states that for an ergodic system $(X,\mathcal{X},\mu,T)$, for $\mu$-a.e. $x\in X$, \textit{any} $\lambda\in \mathbb{S}^1$ and any $f\in L^\infty(\mu)$, the following limit exists:
\begin{equation}\label{WW theorem converge}\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=1}^N \lambda^nf(T^nx)
\end{equation}
Denote by $M_T\subset \mathbb{S}^1$ the set of measurable eigenvalues\footnote{Measurable and topological eigenvalues are defined in Subsection \ref{subsec:Dynamical-background.}.} of $(X,\mathcal{X},\mu,T)$. Let $P_{\lambda}f$ be the projection of $f$ to the eigenspace corresponding to $\lambda$ (in particular for $\lambda\notin M_T$, $P_{\lambda}f\equiv 0$). For fixed $\lambda\in \mathbb{S}^1$, one can show \eqref{WW theorem converge} converges a.s. to $P_{\lambda}f$.
In \cite{Lesigne1990} Lesigne proved that a.s. convergence in \eqref{WW theorem converge} still holds when the term $\lambda^n$ is replaced by a (continuous function) of a real-valued polynomial $P(n)$, $P\in \mathbb{R}[t]$. In \cite{frantzikinakis2006uniformity} Frantzikinakis established a \textit{uniform version}\footnote{In the context of the Wiener-Wintner theorem, \textit{uniform versions} are a.s. convergence results involving a supremum over weights belonging to a given class. The first result of this type was obtained by Bourgain in \cite{B90}.} of this theorem. In \cite{HK09}, Host and Kra showed that a.s. convergence in \eqref{WW theorem converge} still holds when the term $\lambda^n$ is replaced by a \textit{nilsequence}. In \cite{EZK13} Eisner and Zorin-Kranich established a uniform version of this theorem.
For topological dynamical systems one may investigate the question of \textit{everywhere} convergence in the Wiener-Wintner theorem.
In \cite{Robinson1994}, Robinson proved that
for an uniquely ergodic system $(X,\mu,T)$, for any $f\in C(X)$, if every measurable eigenfunction of $(X,\mathcal{X},\mu,T)$ has a continuous version then the limit \eqref{WW theorem converge} converges everywhere. He noted however that if $P_\lambda f\neq 0$ for some $\lambda \in M_T$, then the convergence of \eqref{WW theorem converge} is not uniform in $(x,\lambda)$, since the limit function $P_\lambda f(x)$ is not continuous on $X\times \mathbb{S}^1$.\footnote{Note $M_T$ is countable.} Moreover Robinson constructed a strictly ergodic system $(X,T)$ such that \eqref{WW theorem converge} does not converge for some continuous function $f\in C(X)$, some $\lambda\in \mathbb{C}$ and some $x\in X$. Other topological versions of the Wiener-Wintner theorem may be found in \cite{Assani1992,Fan2018}\footnote{One should also note that topological Wiener-Winter theorems have been investigated in the generality of operator semigroups by Schreiber and Bartoszek and Śpiewak (\cite{schreiber2014topological,bartoszek2017note}).}.
The first main result of this article is the following theorem:
\begin{them}\label{TWWT main}
Let $(X,T)$ be a minimal system. Then for $k\geq 0$ the following are equivalent:
\begin{lyxlist}{0.0000}
\item [(I).] $(X,T)$ is a \text{CF-Nil}$(k)$ system.
\item [(II).] For any $k$-step nilsequence $\{a(n)\}_{n\in \mathbb{Z}}$, any continuous function $f\in C(X)$ and any $x\in X$,
\begin{equation}\label{TWWT limit}\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=1}^Na(n)f(T^nx)
\end{equation}
exists.
\end{lyxlist}
\end{them}
We remark that the direction (I)$\Rightarrow $(II) of Theorem \ref{TWWT main} follows from \cite{HK09} whereas the case $k=1$ of Theorem \ref{TWWT main} follows from \cite[Theorem 1.1]{Robinson1994}.
As part of the proof of Theorem \ref{TWWT main} we established a fundamental property for pronilsystems:
\begin{them}\label{thm:coalescense}
Let $(Y,\nu,T)$ be a minimal (uniquely ergodic) $k$-step pronilsystem. Then
\begin{lyxlist}{0.0000}
\item [(I).]
$(Y,\nu,T)$ is measurably coalescent, i.e. if $\pi:(Y,\nu,T)\rightarrow (Y,\nu,T)$ is a measurable factor map, then $\pi$ is a measurable isomorphism.
\end{lyxlist}
and
\begin{lyxlist}{0.0000}
\item [(II).]
$(Y,T)$ is topologically coalescent, i.e. if $\Phi:(Y,T)\rightarrow (Y,T)$ is a topological factor map, then $\Phi$ is a topological isomorphism.
\end{lyxlist}
\end{them}
As part of the the theory of higher order regionally proximal relations, Host, Kra and Maass introduced in \cite{HKM10} the \textit{dynamical cubespaces}
$\C_{\T}^{n}(X)\subset X^{2^n}$, $n\in \mathbb{N}:=\{1,2,\ldots\}$. These compact sets enjoy a natural action by the \textit{Host-Kra cube groups} $\mathcal{HK}^{n}(T)$. According to the terminology introduced in \cite{GL2019}, a t.d.s. $(X,T)$ is called \textit{$k$-cube uniquely ergodic} if
$(\C_{\T}^{k}(X),\mathcal{HK}^{k}(T))$
is uniquely ergodic. The third main result of this article is the following theorem:
\begin{them}
\label{thm:equiv cube u.e}
Let $(X,T)$ be a minimal t.d.s. Then the following are equivalent for any $k\geq 0$:
\begin{lyxlist}{0.0000}
\item [(I).] $(X,T)$ is a \text{CF-Nil}$(k)$ system.
\item [(II).] $(X,T)$ is
$(k+1)$-cube uniquely ergodic.
\end{lyxlist}
\end{them}
We remark that the direction (I) $\Rightarrow $ (II) follows from \cite{HSY2017}. \\
In the context of various classes of strictly ergodic systems, several authors have investigated the question of whether every measurable eigenfunction has a continuous version. Famously in \cite{Host1986} (see also \cite[Page 170]{M2010}), Host established this is the case for
\textit{admissible substitution dynamical systems}. In \cite[Theorem 27]{BDM10} an affirmative answer was given for strictly ergodic \textit{Toeplitz type systems of finite rank}. In \cite{DFM2019}, the continuous and measurable eigenvalues of minimal Cantor systems were studied.
It is easy to see that for strictly ergodic systems $(X,T)$ the condition that every measurable eigenfunction has a continuous version is equivalent to the fact that $(X,T)$ is \text{CF-Nil}($1$).
Thus Theorem \ref{thm:equiv cube u.e} provides for strictly ergodic systems a new condition equivalent to the property that every measurable eigenfunction has a continuous version. Namely this holds iff $(\C_{\T}^{2}(X),\mathcal{HK}^{2}(T))$ is uniquely ergodic. As the last condition seems quite manageable one wonders if this new equivalence may turn out to be useful in future applications.\\
\noindent
\textbf{Structure of the paper.} In Subsections \ref{subsec:Dynamical-background.}--\ref{Subsec: Con exp} we review some definitions and classical facts; In Subsections \ref{subsec:Nilsystem-and-a system at most d}--\ref{subsec: def:continuously to k-nil}, we introduce the topological and measurable maximal pronilfactors and define the \text{CF-Nil}$(k)$ systems; In Subsection \ref{subsec:Weiss thm}, we use Weiss's Theorem to show that the \text{CF-Nil}$(k)$ systems are abundant; In Section \ref{uniqueness for Z and W}, we prove Theorem \ref{thm:coalescense} and then establish \textit{universality} for maximal pronilfactors; In Section \ref{sec:cubespace}, we prove Theorem \ref{thm:equiv cube u.e}; In Section \ref{sec TWWT}, we prove Theorem \ref{TWWT main}.\\
\noindent
\textbf{Acknowledgements.} We are grateful to Bernard Host, Mariusz Lemańczyk and and anonymous referee for helpful comments.
\section{Preliminaries.}\label{sec:Preliminaries}
\subsection{\label{subsec:Dynamical-background.}Dynamical systems.}
Throughout this article we assume every topological space to be metrizable. A $\mathbb{Z}$-\strong{topological dynamical system (t.d.s.)} is a pair $(X,T)$,
where $X$ is a compact space and $T$ is a homeomorphism on $X$. Denote by $C(X)$ the set of real-valued continuous functions on $X$. The \strong{orbit} $\mathcal{O}(x)$ of $x\in X$ is the set $\mathcal{O}(x)=\{T^n x:n\in \mathbb{Z}\}$. Its closure is denoted by $\OC(x)$ A t.d.s. is \strong{minimal} if $\OC(x)=X$ for all $x\in X$. A t.d.s. $(X,T)$ is \strong{distal} if for a compatible metric $d_{X}$
of $X$, for any $x\neq y\in X$, $\inf_{n\in \mathbb{Z}}d_{X}(T^n x,T^n y)>0$. We say $\pi:(Y,S)\rightarrow(X,T)$ is a \strong{topological factor map} if $\pi$ is a continuous and
surjective map such that for any $x\in X$, $\pi(S x)=T\pi(x)$. Given such a map, $(X,T)$ is called a \strong{topological factor} of $(Y,S)$ and $(X,T)$ is said to \strong{factor continuously} on $(Y,S)$. If in addition $\pi$ is injective then it is called a \strong{topological isomorphism} and $(Y,S)$ and $(X,T)$ are said to be \textbf{isomorphic as t.d.s.}
A factor map $\pi:(Y,S)\rightarrow(X,T)$ is called a \strong{topological group extension} by a compact group $K$ if there exists a continuous action $\alpha:K\times Y\rightarrow Y$ such that the actions $S$ and $K$ commute and for all $x,y\in Y$, $\pi(x)=\pi(y)$ iff there
exists a unique $k\in K$ such that $kx = y$.
A \textbf{(topological) eigenvalue} of a t.d.s. $(X,T)$ is a complex number $\lambda \in \mathbb{S}^1$ such that an equation of the form $f(Tx)=\lambda f(x)$ holds for some $f\in C(X,\mathbb{C})$ and all $x\in X$. The function $f$ is referred to as a \textbf{continuous} or \textbf{topological eigenfunction}.
Let $\{(X_{m},T_m)\}_{m\in\mathbb{N}}$ be a sequence of t.d.s. and for any $m\geq n$, $\pi_{m,n}:(X_{n},T_n)\rightarrow(X_{m},T_m)$ factor maps such
that $\pi_{i,l}=\pi_{i,j}\circ\pi_{j,l}\text{ for all }1\leq i\leq j\leq l.$ The \strong{inverse limit} of $\{(X_{m},T_m)\}_{m\in\mathbb{N}}$ is defined to be the system $(X,T)$, where
\[
X=\{(x_{m})_{m\in \mathbb{N}}\in\prod_{m\in\mathbb{N}}X_{m}:\ \pi_{m+1}(x_{m+1})=x_{m}\text{ for }m\geq1\}
\]
equipped with the product topology and $T(x_{m})_{m\in\mathbb{N}}\triangleq(T_mx_{m})_{m\in\mathbb{N}}$. We write
$(X,T)=\underleftarrow{\lim}(X_{m},T_m)$.
A \strong{measure preserving probability system (m.p.s.)} is a quadruple $(X,\mathcal{X},\mu,T)$, where $(X,\mathcal{X},\mu)$
is a standard Borel probability space (in particular $X$ is a Polish space and $\mathcal{X}$ is its Borel $\sigma$-algebra) and $T$ is an invertible Borel measure-preserving map ($\mu(TA)=\mu(A)$ for all $A\in \mathcal{X}$). An m.p.s. $(X,\mathcal{X},\mu,T)$ is \strong{ergodic}
if for every set $A\in\mathcal{X}$ such that $T(A)=A$,
one has $\mu(A)=0$ or $1$. A \strong{measurable factor map} is a Borel map $\pi:(X,\mathcal{X},\mu,T)\rightarrow (Y,\mathcal{Y},\nu,S)$ which is induced by a $G$-invariant sub-$\sigma$-algebra of $\mathcal{X}$ (\cite[Chapter 2.2]{G03}). Given such a map, $(Y,\mathcal{Y},\nu,S)$ is called a \strong{measurable factor} of $(X,\mathcal{X},\mu,T)$. If $\pi$ is in addition invertible on a set of full measure then $\pi$ is called a \strong{measurable isomorphism} and $(X,\mathcal{X},\mu,T)$ and $(Y,\mathcal{Y},\nu,S)$ are said to be \textbf{isomorphic as m.p.s.}
Let $(Y,\mathcal{Y},\nu,S)$ be an m.p.s. and $A$ a compact group with Borel $\sigma$-algebra $\mathcal{A}$ and Haar measure $m$. A \textbf{skew-product} $(Y\times A,\mathcal{Y}\otimes \mathcal{A}, \nu\times m,T)$ is given by the action $T(y,u)=(Sy,\beta(y)u)$, where $\beta:Y\rightarrow A$ is a Borel map, the so-called \textit{cocycle} of the skew-product. The projection $(Y\times A,\mathcal{Y}\otimes \mathcal{A}, \nu\times m,T)\rightarrow (Y,\mathcal{Y},\nu,S)$ given by $(y,a)\mapsto y$ is called a \textbf{measurable group extension} (cf. \cite[Theorem 3.29]{G03}).
A \textbf{(measurable) eigenvalue} of a m.p.s. $(X,\mathcal{X},\mu,T)$ is a complex number $\lambda\in\mathbb{S}^1$ such that an equation of the form $f(Tx)=\lambda f(x)$ holds for $\mu$-a.e. $x\in X$ for some Borel function $f:X\rightarrow \mathbb{C}$. The function $f$ is referred to as a \textbf{measurable eigenfunction}.
Denote by $\PM(X)$ the set of $T$-invariant Borel probability measures of $X$. A t.d.s. $(X,T)$ is called \textbf{uniquely ergodic} if $|\PM(X)|=1$. If in addition it is minimal then it is called \textbf{strictly ergodic}. For a strictly ergodic system $(X,T)$ with a (unique) invariant measure $\mu$, we will use the notation $(X,\mu,T)$. When considered as a m.p.s. it is with respect to its Borel $\sigma$-algebra.
Occasionally in this article we will consider more general group actions than $\mathbb{Z}$-actions. Thus a $G$-\strong{topological dynamical system (t.d.s.)} is a pair $(G,X)$ consisting of a (metrizable) topological group $G$ acting on a (metrizable) compact space
$X$. For $g\in G$ and $x\in X$ we denote the action both by $gx$ and $g.x$. We will need the following proposition:
\begin{prop}\label{prop:factor of ue}
Let $G$ be an amenable group. Let $(G,X)$ be uniquely ergodic and let $(G,X)\rightarrow (G,Y)$ be a topological factor map. Then $(G,Y)$ is uniquely ergodic.
\end{prop}
\begin{proof}
See proof of Proposition 8.1 of \cite{angel2014random}.
\end{proof}
\subsection{Topological models.}
\begin{defn}\label{subsec:topological model}
Let $(X,\mathcal{X},\mu,T)$ be a m.p.s. We say that a t.d.s. $(\hat{X},\hat{T})$
is a \textbf{topological model} for $(X,\mathcal{X},\mu,T)$ w.r.t. to a $\hat{T}-$invariant probability
measure $\hat{\mu}$ on $\hat{\mathcal{X}}$, the Borel $\sigma$-algebra of $X$,
if the system
$(X,\mathcal{X},\mu,T)$ is isomorphic to $(\hat{X},\hat{\mathcal{X}},\hat{\mu},\hat{T})$ as m.p.s., that is, there exist a $T$-invariant Borel subset $C\subset X$ and a $\hat{T}$-invariant Borel subset $\hat{C}\subset \hat{X}$ of full measure and a (bi)measurable and equivariant measure preserving bijective Borel map $p:C\rightarrow \hat{C}$. Notice that oftentimes in this article $(\hat{X},\hat{T})$ will be uniquely ergodic so that $\hat{\mu}$ will be the unique $\hat{T}-$invariant probability
measure of $X$.
\end{defn}
\begin{defn}\label{def:top model for map} \sloppy
Let $(X,\mathcal{X},\mu,T)$, $(Y,\mathcal{Y}, \nu, S)$ be m.p.s. Let $(\hat{X},\hat{T})$, $(\hat{Y},\hat{S})$ be t.d.s. which are topological models of $(X,\mathcal{X},\mu,T)$ and $(Y,\mathcal{Y}, \nu, S)$ w.r.t. measures $\hat{\mu}$ and $\hat{\nu}$ as witnessed by maps $\phi$ and $\psi$ respectively. We say that $\hat{\pi}: (\hat{X},\hat{T})\rightarrow (\hat{Y},\hat{S})$ is a \textbf{topological
model} for a factor map $\pi: (X,\mathcal{X}, \mu, T)\rightarrow (Y,\mathcal{Y}, \nu, S)$ if
$\hat{\pi}$ is a topological factor and the following diagram
\[
\begin{CD}
X @>{\phi}>> \hat{X}\\
@V{\pi}VV @VV{\hat{\pi}}V\\
Y @>{\psi }>> \hat{Y}
\end{CD}
\]
is commutative, i.e. $\hat{\pi}\phi=\psi\pi$
\end{defn}
\subsection{Conditional expectation.}\label{Subsec: Con exp}
Let $(X,\mathcal{X},\mu)$ be a probability space and let $\mathcal{B}$ be a sub-$\sigma$-algebra of $\mathcal{X}$. For $f\in L^1(\mu)$, the \strong{conditional expectation} of $f$ w.r.t. $\mathcal{B}$ is the unique function $\mathbb{E}(f|\mathcal{B})\in L^1(X,\mathcal{B},\mu)$ satisfying
\begin{equation}\label{eq:cond exp}
\int_Bfd\mu=\int_B\mathbb{E}(f|\mathcal{B})d\mu
\end{equation}
for every $B\in \mathcal{B} $. For $f\in L^1(\mu)$ and $g\in L^{\infty}(X,\mathcal{B},\mu)$, it holds (see \cite[Chapter 2, Section 2.4]{HK2018}):
\begin{equation}\label{conditional expection}
\int_Xfgd\mu=\int_X\mathbb{E}(f|\mathcal{B})gd\mu.
\end{equation}
Let $(X,\mathcal{X},\mu)$ and $(Y,\mathcal{Y},\nu)$ be probability spaces and let $\pi:X\rightarrow Y$ be a measurable map such that $\pi_{*}\mu=\nu$. Denote by $\mathbb{E}(f|Y)\in L^1(Y,\nu)$ the function such that $\mathbb{E}(f|Y)=\mathbb{E}(f|\pi^{-1}(\mathcal{Y}))\circ\pi^{-1}$. Note this is well-defined. Thus the difference between $\mathbb{E}(f|Y)$ and $\mathbb{E}(f|\pi^{-1}(\mathcal{Y}))$ is that the first function is considered as a function on $Y$ and the second as a function on $X$.
\subsection{Pronilsystems and nilsequences.}\label{subsec:Nilsystem-and-a system at most d}
\begin{defn}
A (real) \strong{Lie group} is a group that is also a finite dimensional
real smooth manifold such that the group operations of multiplication
and inversion are smooth. Let $G$ be a Lie group. Let $G_1=G$ and $G_{k}=[G_{k-1},G]$
for $k\geq 2$, where $[G,H]=\{[g,h]:g\in G,h\in H\}$ and $[g,h]=g^{-1}h^{-1}gh$.
If there exists some $d\geq1$ such that $G_{d+1}=\{e\}$,
$G$ is called a \strong{$d$-step nilpotent} Lie group. We say that a discrete subgroup $\Gamma$ of a Lie group $G$ is
\strong{cocompact} if $G/\Gamma$, endowed with the quotient topology,
is compact. We say that quotient $X=G/\Gamma$ is a \strong{$d$-step nilmanifold}
if $G$ is a $d$-step nilpotent Lie group and
$\Gamma$ is a discrete, cocompact subgroup. The nilmanifold $X$ admits a natural action by $G$ through \textbf{translations} $g.a\Gamma=ga\Gamma$, $g,a \in G$. The \textbf{Haar measure} of $X$ is the unique Borel probability measure on $X$ which is invariant under this action. A \strong{nilsystem of degree at most $d$}, $(X,T)$, is given by an $d$-step nilmanifold
$X=G/\Gamma$ and $T\in G$ with action $T.a\Gamma=Ta\Gamma$. When a nilsystem is considered as a m.p.s. it is always w.r.t. its Haar measure.
\end{defn}
\begin{defn}\label{def:pronilsystem}
A t.d.s. (m.p.s) is called a topological (measurable) \strong{$d$-step pronilsystem}
if it is a topological (measurable) inverse limit of nilsystems of degree at most $d$. By convention a $0$-step pronilsystem is the one-point trivial system.
\end{defn}
\begin{rem}\label{rem:meas and top pronil}
\sloppy By \cite[p. 233]{HK2018} if an ergodic measurable $d$-step pronilsystem is presented as the inverse limit $(X,\mathcal{X},\nu,T)=\underleftarrow{\lim}(X_{m},\mathcal{X}_m,\nu_m,T_m)$ given by the measurable factor maps $\pi_m:(X_{m},\mathcal{X}_m,\nu_m,T_m)\rightarrow (X_{m-1},\mathcal{X}_{m-1},\nu_{m-1},T_{m-1})$ between nilsystems of degree at most $d$ then there exist topological factor maps $\tilde{\pi}_m:(X_{m},T_m)\rightarrow (X_{m-1},T_{m-1})$ such that $\tilde{\pi}=\pi$ $\nu_m$-a.e. and so effectively one can consider $(X,\mathcal{X},\nu,T)$ as a (minimal) topological pronilsystem. Moreover any two $d$-step pronilsystem topological models of $(X,\mathcal{X},\nu,T)$ are isomorphic as t.d.s. (Theorem \ref{thm: meas coalescence}).
\end{rem}
\begin{defn}(\cite[Definition 2.2]{HKM10})\label{def:nilsequence}
A bounded sequence $\{a(n)\}_{n\in \mathbb{Z}}$ is called a \strong{$d$-step nilsequence} if there exists a $d$-step pronilsystem $(X,T)$, $x_0\in X$ and a continuous function $f\in C(X)$ such that $a(n)=f(T^nx_0)$ for $n\in \mathbb{Z}$.
\end{defn}
\begin{thm}(\cite[Theorem 3.1]{HK09})\label{thm:basic properties for nilsystems}
Let $(X,T)$ be a nilsystem. Then
$(X,T)$ is uniquely ergodic if and only if $(X,T)$ is ergodic w.r.t. the Haar measure if and only if $(X,T)$ is minimal.
\end{thm}
The following proposition is an immediate corollary of the previous theorem.
\begin{prop}\label{prop:basic properties for pronilsystems}
Let $(X,T)$ be a pronilsystem. Then
$(X,T)$ is uniquely ergodic if and only if $(X,T)$ is minimal.
\end{prop}
\begin{defn}
Let $(X,\mu,T)$ be a strictly ergodic t.d.s. We say that a t.d.s. $(Y,T)$ is a \textbf{topological $k$-step pronilfactor} of $(X,T)$ if it is a topological factor of $(X,T)$ and if it is isomorphic to a $k$-step pronilsystem as a t.d.s. We say that a m.p.s. $(Y,\mathcal{Y},\nu,T)$ is a \textbf{measurable $k$-step pronilfactor} of $(X,T)$ if it is a measurable factor of $(X,\mathcal{X},\mu,T)$ and if it is isomorphic to a $k$-step pronilsystem as a m.p.s.
\end{defn}
\subsection{Host-Kra structure theory machinery.}\label{subsec:Definition-of-the mu k}
By a \strong{face} of the discrete cube $\{0,1\}^{k}$ we mean a
subcube obtained by fixing some subset of the coordinates. For $k\in \mathbb{N}$,
let $[k]=\{0,1\}^k$. Thus $X^{[k]}=X\times\cdots\times X$, $2^k$ times and similarly $T^{[k]}=T\times\cdots\times T$, $2^k$ times. For $x\in X$, $x^{[k]}=(x,\ldots, x)\in X^{[k]}$.
Let $[k]_*=\{0,1\}^k\setminus \{\vec{0}\}$ and define $X_{*}^{[k]}=X^{[k]_*}$.
\begin{defn} (\cite{HK05}) \label{def:HK cube group and face group}
Let $(X, \mathcal{X},\mu,T)$ be an ergodic m.p.s. For $1\leq j\leq k$, let $\overline{\alpha}_{j}=\{v\in\{0,1\}^{k}:v_j=1\}$ be
the \textbf{$j$-th upper face} of $\{0,1\}^{k}$. For any face $F\subset \{0,1\}^k$, define $$(T^{F})_v=\begin{cases} T & v\in F\\
\id & v\notin F.
\end{cases}$$
Define the \strong{face group} $\mathcal{F}^k(T)\subset \Homeo(X^{[k]})$ to be the group generated by the elements $\{T^{\overline{\alpha}_{j}}:1\leq j\leq k\}$. Define the the $k$-th \strong{Host-Kra cube group} $\mathcal{HK}^k(T)$ to be the subgroup of $\Homeo(X^{[k]})$ generated by $\mathcal{F}^k(T)$ and $T^{[k]}$.
\end{defn}
\begin{defn} (\cite{HK05}) \label{def: muk definition} Let $(X,\mathcal{B},\mu,T)$ be an ergodic m.p.s. Let $\mu^{[1]}=\mu\times \mu$. For $k\in \mathbb{N}$, let $\mathcal{I}_{T^{[k]}}$ be the $T^{[k]}$-invariant
$\sigma$-algebra of $(X^{[k]},\mathcal{X}^{[k]},\mu^{[k]})$.
Define $\mu^{[k+1]}$ to be the relative independent
joining of two copies of $\mu^{[k]}$ over $\mathcal{I}_{T^{[k]}}$.
That is, for $f_{v}\in L^{\infty}(\mu)$, $v\in\{0,1\}^{k+1}$:
\begin{multline*}
\int_{X^{[k+1]}}\prod_{v\in\{0,1\}^{k+1}}f_{v}(x_v)d\mu^{[k+1]}(x)=\\\int_{X^{[k]}}\mathbb{{E}}(\prod_{v\in\{0,1\}^{k}}f_{v0}|\mathcal{I}_{T^{[k]}})(x)\mathbb{{E}}(\prod_{v\in\{0,1\}^{k}}f_{v1}|\mathcal{I}_{T^{[k]}})(x)d\mu^{[k]}(x)
.
\end{multline*}
In particular, from Equation \eqref{conditional expection}, it follows that for all measurable functions $H_1,H_2\in L^\infty(X^{[k]},\mu^{[k]})$,
\begin{multline}\label{def muk 2}\int_{X^{[k]}}\mathbb{{E}}(H_1|\mathcal{I}_{T^{[k]}})(c)\mathbb{{E}}(H_2|\mathcal{I}_{T^{[k]}})(c)d\mu^{[k]}(c)=\\ \int_{X^{[k]}}\mathbb{{E}}(H_1|\mathcal{I}_{T^{[k]}})(c)H_2(c)d\mu^{[k]}(c).\end{multline}
Note $\mu^{[k]}$ is $\mathcal{HK}^{k}(T)$-invariant (\cite[Chapter 9, Proposition 2]{HK2018}).
\end{defn}
\begin{defn}
\cite[Chapter 9, Section 1]{HK2018}\label{def:J} For $k\in \mathbb{N}$, let $\mathcal{J}_{*}^{k}$ be the $\sigma$-algebras of sets invariant
under $\mathcal{F}^{k}(T)$ on $X_{*}^{[k]}$.
\end{defn}
\begin{defn}
\label{def:Z_k}
\cite[Subsection 9.1]{HK2018} Let $(X,\mathcal{X},\mu,T)$ be an ergodic m.p.s. For $k\in \mathbb{N}$, define $\mathcal{Z}_{k}(X)$ to be the $\sigma$-algebra consisting of measurable sets $B$ such that there exists a $\mathcal{J}_{*}^{k+1}$-measurable
set $A\subset X_*^{[k+1]}$ so that
up to $\mu^{[k+1]}$- measure zero it holds:
\begin{equation*}
X\times A=B\times X_{*}^{[k+1]}\label{eq:measurable unique completeness}
\end{equation*}
Define the \textbf{$k$-th Host-Kra factor} $Z_k(X)$ as the measurable factor of $X$ induced by $\mathcal{Z}_{k}(X)$ and denote by $\pi_k:X\rightarrow Z_{k}(X)$ the \textbf{(measurable) canonical $k$-th projection}. Let $\mu_k$ be the projection of $\mu$ w.r.t. $\pi_k$.
\end{defn}
\begin{defn}
\label{def:The-seminorms} Let $(X,\mathcal{X},\mu,T)$ be an m.p.s. and $k\in \mathbb{N}$. The \textbf{Host-Kra-Gowers seminorms} on $L^{\infty}(\mu)$ are defined as follows:
\[
|||f|||_{k}=(\int\prod_{v\in\{0,1\}^{k}}\mathcal{C}^{|v|}fd\mu^{[k]})^{1/2^{k}},
\]
where $|(v_1,\ldots,v_{k+1})|=\Sigma_{i=1}^{k+1} v_i$ and $\mathcal{C}^{n}z=z$ if
$n$ is even and $\mathcal{C}^{n}z=\overline{z}$ if
$n$ is odd. By \cite[Subsection 8.3]{HK2018},
$|||\cdot|||_{k}$ is a seminorm.
\end{defn}
\begin{lem}\cite[Chapter 9, Theorem 7]{HK2018}\label{lem: seminorm and k factor} Let $(X,\mathcal{X},\mu,T)$
be an ergodic m.p.s. and $k\in\mathbb{N}$. Then for $f\in L^{\infty}(\mu)$,
$|||f|||_{k+1}=0$ if and only if $\mathbb{E}(f|\mathcal{Z}_{k}(X))=0$.
\end{lem}
\subsection{Maximal measurable pronilfactors.}\label{subsec:classical meas max}
\begin{defn}
Let $k\in \mathbb{N}$. A m.p.s.
$(X,\mathcal{X},\mu,T)$ is called a \strong{(measurable) system of order $k$} if it is isomorphic to $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$.
\end{defn}
\begin{thm}\label{thm:meas order k}(\cite[Theorem 10.1]{HK05}, \cite[Chapter 16, Theorem 1]{HK2018}, for an alternative proof see \cite[Theorem 5.3]{GL2019})
An ergodic m.p.s. is a system of order $k$ iff it is isomorphic to a minimal $k$-step pronilsystem as m.p.s.
\end{thm}
\begin{rem}\label{rem:classical Z}
Let $(X,\mathcal{X},\mu,T)$ be an ergodic m.p.s.
In the literature $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ is referred to as the \textbf{maximal measurable $k$-step pronilfactor} or as the \textit{maximal factor which is a system of order $k$} (see \cite[Chapter 9, Theorem 18]{HK2018}). By this it is meant that any measurable factor map $\phi:(X,\mathcal{X},\mu,T)\rightarrow (Y,\mathcal{Y},\nu,S)$ where $(Y,\mathcal{Y},\nu,S)$ is a minimal $k$-step pronilsystem, factors through the canonical $k$-th projection $\pi_k:(X,\mathcal{X},\mu,T)\rightarrow (Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$, i.e., there exists a unique (up to measure zero) $\psi:(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)\rightarrow (Y,\mathcal{Y},\nu,S)$ such that $\phi=\psi\circ \pi_k$ a.s. In section \ref{uniqueness for Z and W} we establish the complementary property of \textit{universality} for $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$.
\end{rem}
\begin{rem}
In \cite[Corollary 2.2]{HKM2014} a criterion for an ergodic m.p.s. $(X,\mathcal{X},\mu,T)$ to have $Z_k(X)=Z_1(X)$ for all $k\geq 1$ is given. Indeed this is the case for ergodic systems whose spectrum does not admit a
Lebesgue component with infinite multiplicity. In particular this holds true for weakly mixing systems, systems with singular maximal spectral type and systems with finite spectral multiplicity.
\end{rem}
\subsection{Maximal topological pronilfactors.}\label{subsec:classical top max}
Recall the Definition of $\mathcal{HK}^{k}(T)$ and $\mathcal{F}^k(T)$ (Definition \ref{def:HK cube group and face group}).
\begin{defn}
\label{defn of cubesystem} Let $(X,T)$ be a minimal t.d.s. Define the \textbf{induced $(k+1)$-th dynamical cubespace} by: $$\C_{\T}^{k+1}(X)=\overline{\{gx^{[k+1]}|\,g\in\mathcal{HK}^{k+1}(T)\}}.$$
\end{defn}
\begin{defn}(\cite[Definition 3.2]{HKM10})\label{defn for RP}
Let $(X,T)$ be a topological dynamical system and $k\geq 1$. The points $x,y\in X$ are said to be \strong{regionally proximal of order $k$}, denoted $(x,y)\in \RP^{[k]}(X)$, if there are sequences of elements $f_i\in \mathcal{F}^k(T)$, $x_i,y_i\in X$, $a_*\in X_{*}^{[k]}$ such that
$$\lim_{i\rightarrow \infty}(f_i x_i^{[k]},f_i y_i^{[k]})=(x,a_*,y,a_*).$$
\end{defn}
\begin{thm}\label{thm:rpk is eq rel}(\cite[Theorem 3.5]{SY12}\footnote{This theorem was generalized to arbitrary minimal group actions in \cite[Theorem 3.8]{GGY2018}.})
Let $(X,T)$ be a minimal t.d.s. and $k\geq 1$. Then $\RP^{[k]}(X)$ is a closed $T$-invariant equivalence relation.
\end{thm}
\begin{defn}
A t.d.s.
$(X,T)$ is called \strong{a (topological) system of order $k$} if $\RP^{[k]}(X)=\{(x,x)\,|\, x\in X\}$.
\end{defn}
\begin{thm}(\cite[Theorem 1.2]{HKM10}, for an alternative proof see \cite[Theorem 1.30]{GMVIII})
A minimal t.d.s. is a topological system of order $k$ iff it is isomorphic to a minimal $k$-step pronilsystem as t.d.s.
\end{thm}
Theorem \ref{thm:rpk is eq rel} allows us to give the following definition.
\begin{defn}\label{def:max nilfactor}
Let $(X,T)$ be a minimal t.d.s. Define the \textbf{maximal $k$-step nilfactor} by $W_k(X)=X/\RP^{[k]}(X)$. Denote the associated map $\pitk:X\rightarrow W_{k}(X)$ as the \textbf{(topological) canonical $k$-th projection}.
\end{defn}
\begin{rem}\label{rem:classical top max}
The terminology of Definition \ref{def:max nilfactor} is justified by the following property: Any topological factor map $\phi:(X,T)\rightarrow (Y,T)$ where $(Y,T)$ is a system of order $k$, factors through the canonical $k$-th projection $\pitk:(X,T)\rightarrow (W_k(X),T)$, i.e., there exists a unique $\psi:(W_k(X),T)\rightarrow (Y,T)$ such that $\phi=\psi\circ \pitk$ (\cite[Proposition 4.5]{HKM10}). In section \ref{uniqueness for Z and W} we establish the complementary property of \textit{universality} for $(W_k(X),T)$.
\end{rem}
\begin{defn}(\cite[Definition 3.1]{GL2019})
A t.d.s. $(X,T)$ is called \textbf{$k$-cube uniquely ergodic} if
$(\C_{\T}^{k}(X),\mathcal{HK}^{k}(T))$
is uniquely ergodic.
\end{defn}
\subsection{\text{CF-Nil}$(k)$ systems.}\label{subsec: def:continuously to k-nil}
\begin{defn}\label{def:continuously to k-nil}
For $k\geq 0$, we say $(X,T)$ is a \strong{CF-Nil($k$)} system if $(X,T)$ is strictly ergodic and $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ is isomorphic to $(W_k(X),\omega_k,T)$ as m.p.s.where $\mu_k$ and $\omega_k$ are the images of the unique invariant measure of $(X,T)$ under the measurable, respectably topological canonical $k$-th projections.
\end{defn}
\begin{rem}\label{rem:0-nil}
By convention $Z_0(X)=W_0(X)=\{\bullet\}$. Thus every strictly ergodic $(X,T)$ is CF-Nil($0$).
\end{rem}
\noindent
The term "$(X,\mu, T)$ is CF-Nil($k$)" is an abbreviation of
\vspace{0.25 cm}
\begin{center}
"$(X,\mu, T)$ \textbf{C}ontinuously \textbf{F}actors on a $\mathbf{k}$-step pro\textbf{Nil}system which is isomorphic to $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ as m.p.s."
\end{center}
\vspace{0.25 cm}
Indeed if $(W_k(X),\omega_k,T)$ is isomorphic to $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ as m.p.s. then obviously this condition holds. The reverse implication is given by the following proposition which has been (implicitly) used several times in the literature (\cite{HK09,HKM2014,HSY2019pointwise}). Its proof is given at the end of Subsection \ref{subsec:Universality}.
\begin{prop}\label{pronilfactor maximal}
Let $(X,T)$ be a strictly ergodic t.d.s. which topologically factors on a (minimal) $k$-step pronilsystem $(\hat{Z}_k,T)$ with the unique ergodic measure $\gamma_k$. If $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ is isomorphic to $(\hat{Z}_k,\gamma_k,T)$ as m.p.s., then $(\hat{Z}_k,T)$ and $(W_k(X),T)$ are isomorphic as t.d.s. In particular $(X,\mu, T)$ is \text{CF-Nil}($k$).
\end{prop}
Theorem \ref{thm:equiv cube u.e} allows us to give a remarkable simple proof of the following Theorem.
\begin{thm}\label{factor and k kronecker}
Let $(X,T)$ be a \text{CF-Nil}$(k)$ system. The following holds:
\begin{enumerate}
\item If $\pi:(X,T)\rightarrow (Y,T)$ is a topological factor map, then $(Y,T)$ is a \text{CF-Nil}$(k)$ system.
\item
$(X,T)$ is a \text{CF-Nil}($i$) system for $0\leq i\leq k$.
\end{enumerate}
\end{thm}
\begin{proof}
To prove (1) we note $(Y,T)$ is minimal being a factor of a minimal system and $(\C_{\T}^{k+1}(Y),\mathcal{HK}^{k+1}(T))$ is uniquely ergodic being a factor of $(\C_{\T}^{k+1}(X),\mathcal{HK}^{k+1}(T))$ under the natural topological factor map induced from $\pi:(X,T)\rightarrow (Y,T)$ (see Proposition \ref{prop:factor of ue}). By Theorem \ref{thm:equiv cube u.e} this implies $(Y,T)$ is a \text{CF-Nil}$(k)$ system.
\sloppy
Similarly, to prove (2), we consider
$(\C_{\T}^{k+1}(X),\mathcal{HK}^{k+1}(T))\rightarrow (\C_{\T}^{i+1}(X),\mathcal{HK}^{i+1}(T))$ given by $$(c_{v_1,\ldots,v_{k+1}})_{(v_1,\ldots,v_{k+1})\in \{0,1\}^{k+1}}\mapsto (c_{v_1,\ldots,v_{i+1},0,\ldots, 0})_{(v_1,\ldots,v_{i+1})\in \{0,1\}^{i+1}}$$
\end{proof}
\subsection{A \text{CF-Nil}$(k)$ topological model.} \label{subsec:Weiss thm}
Recall the definitions of Subsection \ref{subsec:topological model}. In \cite[Theorem 2]{W85} Benjamin Weiss proved the following theorem:
\begin{thm}(Weiss)\label{thm: Weiss thm}
Let $(Z,\nu,S)$ be a strictly ergodic t.d.s. and $(X,\mathcal{X},\mu,S)$ an ergodic m.p.s. such that there exists a measurable factor $\pi:(X,\mathcal{X},\mu,T)\rightarrow (Z,\mathcal{Z},\nu,S)$. Then $\pi$ has a topological model $\hat{\pi}:(\hat{X},\hat{T})\rightarrow (Z,S)$ where $(\hat{X},\hat{T})$ is strictly ergodic.
\end{thm}
The following theorem is already implicit in \cite{HSY2019pointwise}.
\begin{thm}\label{thm:continuously to k-nil realization}
Let $k\in \mathbb{Z}$. Every ergodic system $(X,\mathcal{X},\mu,T)$ has a topological model $(\hat{X},\hat{T})$ such that $(\hat{X},\hat{T})$ is \text{CF-Nil}($k$).
\end{thm}
\begin{proof}
By Theorem \ref{thm:meas order k}, $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ is measurably isomorphic to a strictly ergodic inverse limit of $k$-step nilsystems $(\hat{Z}_k,\hat{T})$. By Theorem \ref{thm: Weiss thm}, $(X,\mathcal{X},\mu,T)$ admits a strictly ergodic topological model $(\hat{X},\hat{T})$ such that there exists a topological factor map $(\hat{X},\hat{T})\rightarrow (\hat{Z}_k,\hat{T})$ which is a topological model of $(X,\mathcal{X},\mu,T)\rightarrow(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$.
By Proposition \ref{pronilfactor maximal}, $(\hat{X},\hat{T})$ is \text{CF-Nil}($k$).
\end{proof}
\begin{rem}
One can easily construct a strictly ergodic system which is not \text{CF-Nil}($k$).\, Let $(X,\mathcal{X},\mu,T)$ be an irrational rotation on the circle. By \cite{Lehrer87}, there exists a topologically mixing and strictly ergodic model $(\hat{X},\hat{\mu},T)$ of $(X,\mu,T)$. As $X$ is an irrational rotation, $Z_1(\hat{X})=\hat{X}$ and therefore for all $k\geq 1$, $Z_k(\hat{X})=\hat{X}$. As $\hat{X}$ is topologically mixing, it is topologically weakly mixing and therefore for all $k\geq 1$, $W_k(\hat{X})=\{\bullet\}$ (\cite[Theorem 3.13(1)]{SY12}). It follows for all $k\geq 1$ one has that $(W_k(\hat{X}),T)$ is not isomorphic to $(Z_k(\hat{X}),\hat{\mu}_1,T)$ as m.p.s.
\end{rem}
\section{Coalescence and universality for maximal pronilfactors.}\label{uniqueness for Z and W}
\subsection{Coalescence}
In this section we establish Theorem \ref {thm:coalescense}, i.e., both \textit{topological coalescence} (introduced in \cite{auslander1963endomorphisms}) and \textit{measurable coalescence} (introduced in \cite{hahn1968some}) for minimal pronilsystems\footnote{The definitions of these concepts appear as part of the statements of Theorems \ref{thm: top coalescence} and \ref{thm: meas coalescence} respectively.}. There is a vast literature dedicated to coalescence (see \cite{lemanczyk1992coalescence} and references within). Coalescence plays an important role in the next subsection.
\begin{thm} (Topological coalescence for minimal pronilsystems)\label{thm: top coalescence} Let $(Y,T)$ be a minimal $k$-step pronilsystem. Then $(Y,T)$ is topologically coalescent, i.e. if $\Phi:(Y,T)\rightarrow (Y,T)$ is a topological factor map, then $\Phi$ is a topological isomorphism.
\end{thm}
\begin{proof}
Recall that the Ellis semigroup is defined as $E=E(Y,T)=\overline{\{T^n:n\in \mathbb{Z}\}}$, where the closure is w.r.t. the product topology on $Y^Y$ (see \cite{E58} for more details). By a theorem of Donoso \cite[Theorem 1.1]{DonosoEnveloping}, $E(Y,T)$ is a $k$-step nilpotent group, i.e. for $E_1=E$, $E_{i+1}=[E_{i},E], i\geq 1$, one has that $E_{k+1}=\{\id\}$. As $\Phi$ is continuous, one has that $E$ and $\Phi$ commute, i.e. for any $g\in E$, $\Phi\circ g=g\circ \Phi$. For any $z\in Y$, we define the group $\mathcal{G}(Y,z)=\{\alpha \in E(Y,T), \alpha z=z\}$. Let $x,y\in Y$ such that $\Phi(x)=y$. If $u\in \mathcal{G}(Y,x)$, one always has that $uy=u(\Phi(x))=\Phi(ux)=\Phi(x)=y$, i.e. $u\in \mathcal{G}(Y,y)$. Thus $\mathcal{G}(Y,x)\subset \mathcal{G}(Y,y)$.
Assume that $\Phi$ is not one-to-one, then there exists $x_1\neq x_2 \in Y$ such that $\Phi(x_1)=\Phi(x_2)$. As $(Y,T)$ is minimal, there exists $p_1,p_2\in E(Y,T)$ such that $x_1=p_1x$, $x_2=p_2x$. Then $p_1y=\Phi(p_1x)=\Phi(x_1)=\Phi(x_2)=\Phi(p_2x)=p_2y$. Thus $p_1^{-1}p_2\in \mathcal{G}(Y,y)$. As $p_2x=x_2\neq x_1=p_1 x$, we have $$p_1^{-1}p_2x\neq x,$$ which implies that $p_1^{-1}p_2\in \mathcal{G}(Y,y)\setminus \mathcal{G}(Y,x)$.
Let $\beta_0=p_1^{-1}p_2$. As $(Y,T)$ is minimal, there exists $u\in E(Y,T)$ such that $ux=y$. Then $\mathcal{G}(Y,x)=u^{-1}\mathcal{G}(Y,y)u$. Let $\beta_1=(u^{-1}\beta_0^{-1} u)\beta_0$. As $\beta_0\in \mathcal{G}(Y,y)\setminus \mathcal{G}(Y,x)$, one has that
\begin{equation}\label{beta0 property}\beta_0\notin \mathcal{G}(Y,x),\beta_0\in \mathcal{G}(Y,y)\text{ and }(u^{-1}\beta_0^{-1} u)\in u^{-1}\mathcal{G}(Y,y)u=\mathcal{G}(Y,x)\subset \mathcal{G}(Y,y).
\end{equation}
Thus we can show that $\beta_1\in \mathcal{G}(Y,y)\setminus \mathcal{G}(Y,x)$. Indeed, by \eqref{beta0 property} we know that $\beta_1=(u^{-1}\beta_0^{-1}u)\beta_0\in \mathcal{G}(Y,y)$ as $ \mathcal{G}(Y,y)$ is a group. If $\beta_1\in \mathcal{G}(Y,x)$, then $\beta_0=(u^{-1}\beta_0^{-1}u)^{-1}\beta_1\in \mathcal{G}(Y,x)$, which constitutes a contradiction. Therefore $\beta_1\in \mathcal{G}(Y,y)\setminus \mathcal{G}(Y,x)$ and $(u^{-1}\beta_1^{-1}u)\in u^{-1}\mathcal{G}(Y,y)u=\mathcal{G}(Y,x)$.
Similarly, we define $\beta_{i+1}=(u^{-1}\beta_{i}^{-1}u)\beta_i$ for $i\geq 1$. By the same argument, one has that $\beta_{i+1}\in \mathcal{G}(Y,y)\setminus \mathcal{G}(Y,x)$. But notice that $ \beta_{i}\in E_{i+1}$ and $E_{k+1}=\{\id\}$, therefore $\id=\beta_k\in \mathcal{G}(Y,y)\setminus \mathcal{G}(Y,x)$. Contradiction.
Thus $\Phi$ is a one-to-one topological factor map, which implies it is a topological isomorphism.
\end{proof}
\begin{prop}\cite[Chapter 13, Proposition 15]{HK2018}\label{continuty for pronilsystem factor map}
Let $(Y,\nu,T)$, $(Y',\nu',T)$ be minimal (uniquely ergodic) $k$-step pronilsystems. Let $\pi:(Y,\nu,T)\rightarrow (Y',\nu',T)$ be a measurable factor map. Then there exists a topological factor map $\hat{\pi}:(Y,T)\rightarrow (Y',T)$ such that $\pi(y)=\hat{\pi}(y)$ for $\nu$-a.e. $y$.
\end{prop}
Combining Theorem \ref{thm: top coalescence} and Proposition \ref{continuty for pronilsystem factor map} we immediately have the following theorem.
\begin{thm} (Measurable coalescence for minimal pronilsystems)\label{thm: meas coalescence} Let $(Y,\nu,T)$ be a minimal (uniquely ergodic) $k$-step pronilsystem. Then $(Y,\nu,T)$ is measurably coalescent, i.e. if $\pi:(Y,\nu,T)\rightarrow (Y,\nu,T)$ is a measurable factor map, then $\pi$ is a measurable isomorphism (which equals a.s. a topological isomorphism).
\end{thm}
\begin{proof}
By Proposition \ref{continuty for pronilsystem factor map}, there exists a topological factor map $\hat{\pi}:(Y,\nu,T)\rightarrow (Y,\nu,T)$ such that $\pi(y)=\hat{\pi}(y)$ for $\nu$-a.e. $y\in Y$. By Theorem \ref{thm: top coalescence}, $\hat{\pi}$ is a topological isomorphism. As $\pi$ equals a.s. $\hat{\pi}$, one may find a $T$-invariant Borel set $Y_0\subset Y$ with $\nu(Y_0)=1$, $\pi_{|Y_0}=\hat{\pi}_{|Y_0} $. As $\hat{\pi}$ is one-to-one, $\pi_{|Y_0}^{-1}(\pi_{|Y_0}(Y_0))=Y_0$ and therefore $\nu(\pi_{|Y_0}(Y_0))=1 $. Thus
$\pi_{|Y_0}:Y_0\rightarrow \hat{\pi}(Y_0)$ is a Borel measurable one-to-one map between two $T$-invariant sets of full measure, which implies that $\pi$ is a measurable isomorphism.
\end{proof}
\begin{cor}\label{cor:strong max}
\sloppy Let $(X,\mathcal{X},\mu,T)$ be an ergodic m.p.s. and $k\in \mathbb{N}$. Let $(Y,\mathcal{Y},\nu,S)$ be a minimal $k$-step pronilsystem isomorphic to $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$. Let $\pi:(X,\mathcal{X},\mu,T)\rightarrow (Y,\mathcal{Y},\nu,S)$ be a factor map.
The following holds:
\begin{enumerate}
\item
There is a (topological) isomorphism $p~:~(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)\rightarrow (Y,\mathcal{Y},\nu,S)$ such that $\pi=p\circ \pi_k$ a.s.
\item
For every measurable factor map $\phi:(X,\mathcal{X},\mu,T)\rightarrow (Y',\mathcal{Y}',\nu',S')$ where $(Y',\mathcal{Y}',\nu',S')$ is a minimal $k$-step pronilfactor, factors through $\pi$, i.e., there exists a unique (up to measure zero) $\psi:(Y,\mathcal{Y},\nu,S)\rightarrow (Y',\mathcal{Y}',\nu',S')$ such that $\phi=\psi\circ \pi$ a.s.
\end{enumerate}
$$
\xymatrix@R=0.7cm{
& X\ar[dl]_{\pi_{k}}\ar[d]^{\pi}\ar[dr]^{\phi} &\\
Z_k\ar[r]^{p}& \ar[l]Y\ar[r]^{\psi} &Y'
}
$$
\end{cor}
\begin{proof}
By the maximality of $\pi_k$ (see Subsection \ref{subsec:classical meas max}) there is a measurable factor map $p:(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)\rightarrow (Y,\mathcal{Y},\nu,S)$ such that $\pi=p\circ \pi_k$ a.s.
By assumption there is a measurable isomorphism $i:(Y,\mathcal{Y},\nu,S)\rightarrow(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ (which equals a.s. a topological isomorphism). By Theorem \ref{thm: meas coalescence}, $i \circ p$ is a measurable isomorphism and therefore $p$ is a measurable isomorphism. This establishes (1). Thus $\pi$ inherits the maximality property of $\pi_k$. This establishes (2).
\end{proof}
\begin{rem}
Bernard Host has pointed out to us that it is possible to prove Theorem \ref{thm:coalescense} using results from \cite[Chapter 13]{HK2018}.
\end{rem}
\subsection{Universality}\label{subsec:Universality}
\begin{defn}
Let $(X,\mu,T)$ be a strictly ergodic t.d.s. Denote by $\cktop$ the collection of (topological) isomorphism equivalence classes of topological $k$-step pronilfactors of $(X,T)$. Denote by $\ckme$ the collection of (measurable) isomorphism equivalence classes of measurable $k$-step pronilfactors of $(X,T)$. An (equivalence class of) t.d.s. $(M,T)\in \cktop$ is called $\cktop$-\textbf{universal}\footnote{This terminology is frequently used in the literature, see \cite{dV93,GutLi2013}.} if every $(N,S)\in\cktop$ is a topological factor of $(M,T)$. An (equivalence class of) m.p.s. $(M,\mathcal{M},\mu,T)\in \ckme$ is called $\ckme$-\textbf{universal} if every $(N,\mathcal{N},v,S)\in\ckme$ is a measurable factor of $(M,\mathcal{M},\mu,T)$.
\end{defn}
The following theorem establishes a complementary property to maximality as described in Remark \ref{rem:classical Z} and Remark \ref{rem:classical top max}.
\begin{thm}
Let $(X,\mu,T)$ be a strictly ergodic t.d.s., then $(W_k(X),T)$ is the unique $\cktop$-universal topological $k$-step pronilfactor of $(X,T)$ and $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ is the unique $\ckme$-universal measurable $k$-step pronilfactor of $(X,T)$.
\end{thm}
\begin{proof}
By Remark \ref{rem:classical Z} $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ is a $\ckme$-universal measurable $k$-step pronilfactor of $(X,T)$. Assume $(Z'_k(X),\mathcal{Z}'_k(X),\mu'_k,T)$ is another $\ckme$-universal measurable $k$-step pronilfactor of $(X,T)$. By universality one has measurable factor maps $Z'_k(X)\rightarrow \mathcal{Z}'_k(X)$ and $Z_k(X)\rightarrow \mathcal{Z}'_k(X)$.
By Theorem \ref{thm: meas coalescence}, $Z_k(X)$ and $\mathcal{Z}'_k(X)$ are isomorphic.
By Remark \ref{rem:classical top max} $(W_k(X),T)$ is a $\cktop$-universal topological $k$-step pronilfactor of $(X,T)$. By Theorem \ref{thm: top coalescence} it is unique.
\end{proof}
\begin{proof}[Proof of Proposition \ref{pronilfactor maximal}]
By Remark \ref{rem:classical top max}, one can find a topological factor map $q:(W_k(X),T)\rightarrow (\hat{Z}_k,T)$. Let $\omega_k$ be the unique ergodic measure of $(W_k(X),T)$. By Remark \ref{rem:classical Z}, one can find a measurable factor map $\psi:(\hat{Z}_k,\gamma_k, T)\rightarrow (W_k(X),\omega_k,T)$. $$
\xymatrix@R=0.7cm{
\hat{Z}_k\ar@{.>}[r]^{\psi} & W_k \ar@/^/[l]^{q} }
$$
By Proposition \ref{continuty for pronilsystem factor map}, there exists a topological factor map $\hat{\psi}:(\hat{Z}_k,\gamma_k, T)\rightarrow (W_k(X),\omega_k,T)$ such that $\hat{\psi}=\psi$ a.s. In particular, $\hat{\psi}\circ q:(W_k(X),\omega_k,T)\rightarrow (W_k(X),\omega_k,T)$ is a topological factor map. By Theorem \ref{thm: top coalescence}, $\hat{\psi}\circ q$ is a topological isomorphism. Thus $q$ is a topological isomorphism. As $(\hat{Z}_k,T)$ and $(W_k,T)$ are uniquely ergodic, $q$ is also a measurable isomorphism. In particular $(W_k(X),\mathcal{W}_k(X),\omega_k,T)$ and $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ are isomorphic as m.p.s. and $(X,\mu,T)$ is \text{CF-Nil}($k$).
\end{proof}
\section{Cubespace characterization of \text{CF-Nil}($k$).}\label{sec:cubespace}
In this section, we prove Theorem \ref{thm:equiv cube u.e}. We need some lemmas.
\begin{lem}\cite[Lemma 5.6]{HKM10}\label{prop:full support on Ck1}
Let $(X,T)$ be a minimal topological dynamical system and $\mu$ be an invariant ergodic measure on $X$. Then the measure $\mu^{[k]}$ is supported on $\C_{\T}^k(X)$ for any $k\geq 1$.
\end{lem}
\begin{proof}
The Lemma is proven in \cite[Lemma 5.6]{HKM10} with the help of the so called $L^2$-convergence of cubical averages theorem \cite[Theorem 1.2]{HK05}. This is a deep theorem with a highly non-trivial proof. We note that we are able to give a direct proof of this Lemma which we hope to publish elsewhere.
\end{proof}
\begin{defn}\label{Folner sequence}
Let $G$ be a countable amenable group. A \textbf{Følner sequence} $\{F_{N}\}_{N\in \mathbb{N}}$ is a sequence of finite subsets of $G$ such that for any $g\in G$, $\lim_{n\rightarrow \infty}|gF_{N}\cap F_{N}|/|F_{N}|=1$.
\end{defn}
\begin{thm}\label{pointwise ergodic theorem for amenable}(Lindenstrauss)
Let $G$ be an amenable group acting on a measure space $(X,\mathcal{X},\mu)$ by measure preserving transformations.
Let $\mathcal{I}_G$ be the $G$-invariant
$\sigma$-algebra of $(X,\mathcal{X},\mu)$.
There is a Følner sequence $\{F_{N}\}_{N\in \mathbb{N}}$ such that for any $f\in L^\infty(\mu)$, for $\mu$-a.e. $x\in X$,
$${\displaystyle \lim_{N\rightarrow\infty}\frac{1}{|F_{N}|}\sum_{g\in F_{N}}}f(gx)=\mathbb{E}(f|\mathcal{I}_G)(x),
$$
In particular, if the $G$ action is ergodic, for $\mu$-a.e. $x\in X$,
$${\displaystyle \lim_{N\rightarrow\infty}\frac{1}{|F_{N}|}\sum_{g\in F_{N}}}f(gx)=\int f(x)d\mu\text{ a.e.}$$
\end{thm}
\begin{proof}
The theorem follows from \cite[Theorem 1.2]{L01} and \cite[Proposition 1.4]{L01}. In \cite[Theorem 1.2]{L01} the statement reads
\begin{equation}\label{eq:Lin}
\lim_{N\rightarrow\infty}\frac{1}{|F_{N}|}\sum_{g\in F_{N}}f(gx)=\overline{f}(x)\text{ a.e.}
\end{equation}
for some $G$-invariant $\overline{f}\in L^\infty(\mu)$.
Note that if we replace $f$ by $\mathbb{E}(f|\mathcal{I}_G)$ in \eqref{eq:Lin}, we have trivially as $\mathbb{E}(f|\mathcal{I}_G)$ is $G$-invariant:
$$
\mathbb{E}(f|\mathcal{I}_G)(x)=\lim_{N\rightarrow\infty}\frac{1}{|F_{N}|}\sum_{g\in F_{N}}\mathbb{E}(f|\mathcal{I}_G)(gx)
$$
Using the Lebesgue dominated convergence theorem for conditional expectation\footnote{It follows easily from applying the Lebesgue dominated convergence theorem in Equation \eqref{eq:cond exp}.} one has:
$$
\mathbb{E}(f|\mathcal{I}_G)(x)=\lim_{N\rightarrow\infty}\mathbb{E}(\frac{1}{|F_{N}|}\sum_{g\in F_{N}}f(g\cdot)|\mathcal{I}_G)(x)=\mathbb{E}(\overline{f}|\mathcal{I}_G)(x)=\overline{f}(x)\text{ a.e.}
$$
Thus $\overline{f}(x)=\mathbb{E}(f|\mathcal{I}_G)(x)$, which gives the statement above.
\end{proof}
\begin{proof}[Proof of Theorem \ref{thm:equiv cube u.e}]
(I) $\Rightarrow$ (II): This follows from the proof in \cite[Section 4.4.3]{HSY2017}, where it is shown that if one has a commutative diagram of the following form:
\[
\begin{CD}
(X,\mathcal{X},\mu,T) @>{\phi}>> (\hat{X},T)\\
@V{\pi_k}VV @VV{\hat{\pi}_k}V\\
(Z_k(X),\mathcal{Z}_k(X),\mu_k,T) @>{\id }>> (Z_k(X),T),
\end{CD}
\]
then $(C^{k+1}_T(\hat{X}),\mathcal{HK}^{k+1}(T)) $ is uniquely ergodic. Here $(X,\mathcal{X},\mu,T)$ is an ergodic system, $(\hat{X},T)$ is strictly ergodic, $\phi$ is a measurable isomorphism w.r.t. the uniquely ergodic measure of $(\hat{X},T)$ and $\hat{\pi}_k$ is a topological factor map. Indeed, it is easy to obtain such a diagram for a \text{CF-Nil}$(k)$ system using Proposition \ref{pronilfactor maximal}.
(II) $\Rightarrow$ (I): We assume that $(\C_{\T}^{k+1}(X),\mathcal{HK}^{k+1}(T))$ is uniquely ergodic. By Lemma \ref{prop:full support on Ck1}, the unique invariant measure is $\mu^{[k+1]}$. As $(X,T)$ is a topological factor of $(\C_{\T}^{k+1}(X),\mathcal{HK}^{k+1}(T))$ w.r.t. the projection to the first coordinate, $(X,T)$ is uniquely ergodic.
Let $p_k:(X,T)\rightarrow (W_k(X),T)$ be the topological canonical $k$-th projection. By Proposition \ref{prop:factor of ue}, as $(X,T)$ is uniquely ergodic so is $(W_k(X),T)$. Let us denote by $\omega_k$ the unique invariant measure of $(W_k(X),T)$. Obviously $(p_k)_*\mu=\omega_k$. Thus $p_k:(X,\mu,T)\rightarrow (W_k(X),\omega_k,T)$ is a measurable factor map.
Let $\mathcal{W}_k$ be the $\sigma$-algebra corresponding to the map $p_k$. Let $\mathcal{Z}_k$ be the $\sigma$-algebra corresponding to the measurable canonical $k$-th projection $\pi_k:(X,\mu,T)\rightarrow (Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$. We will show that $\mathcal{W}_k=\mathcal{Z}_k$, which implies that $(W_k(X),\omega_k,T)$ is isomorphic to $(Z_k(X),\mathcal{Z}_k(X),\mu_k,T)$ as m.p.s.
The map $p_k:(X,T)\rightarrow (W_k(X),T)$ induces a factor map $$(\C_{\T}^{k+1}(X),\mathcal{HK}^{k+1}(T))\rightarrow(\C_{\T}^{k+1}(W_k(X)),\mathcal{HK}^{k+1}(T)).$$ By Proposition \ref{prop:factor of ue}, as $(\C_{\T}^{k+1}(X),\mathcal{HK}^{k+1}(T))$ is uniquely ergodic so is
$(\C_{\T}^{k+1}(W_k(X)),\mathcal{HK}^{k+1}(T))$.
By Lemma \ref{prop:full support on Ck1} the unique invariant measure on $(\C_{\T}^{k+1}(W_k(X)),\mathcal{HK}^{k+1}(T))$ is $\omega_k^{[k+1]}$.
Let $\gamma_{k+1}$ be the \textit{conditional product measure relative to $(W_k(X)^{[k+1]},\omega_k^{[k+1]})$} on $X^{[k+1]}$ (\cite[Definition 9.1]{F77}). This is the unique measure on $X^{[k+1]}$ such that for all $f_v\in L^\infty(X,\mu)$, $v\in\{0,1\}^{k+1}$ (\cite[Lemma 9.1]{F77}):
\begin{multline}\label{definition of gamma}\int_{X^{[k+1]}} \prod_{v\in \{0,1\}^{k+1}}f_v(c_v)d\gamma_{k+1} (c)=\\\int_{W_k(X)^{[k+1]}} \prod_{v\in \{0,1\}^{k+1}}
\mathbb{E}(f_v|W_k(X))(c_v)d\omega_k^{[k+1]}(c).
\end{multline}
As $\mathbb{E}(\cdot|W_k(X))$ commutes with $T$ and $\omega_k^{[k+1]}$ is $\mathcal{HK}^{k+1}(T)$-invariant, one has that $\gamma_{k+1}$ is $\mathcal{HK}^{k+1}(T)$-invariant.
It is natural to introduce the measure $\gamma_{k+1}$ as by \cite[Chapter 9, Theorem 14]{HK2018}, $\mu^{[k+1]}$ is the conditional product measure relative to $\mu_{k}^{[k+1]}$. Thus if $\mu_{k}=\omega_k$ then $\gamma_{k+1}=\mu^{[k+1]}$. It turns out one can reverse the direction of implications.
Indeed we claim that $\gamma_{k+1}(\C_{\T}^{k+1}(X))=1$.
Assuming this claim and recalling the assumption that $(\C_{\T}^{k+1}(X),\mathcal{HK}^{k+1}(T))$ is uniquely ergodic, one has by Lemma \ref{prop:full support on Ck1} that $\gamma_{k+1}=\mu^{[k+1]}$.
With the end goal of showing $\mathcal{Z}_{k}= \mathcal{W}_k$ we start by showing $\mathcal{Z}_{k}\subset \mathcal{W}_k$. It is enough to show $L^\infty(\mu)\cap L^2(\mathcal{W}_k)^\perp\subset L^\infty(\mu)\cap L^2(\mathcal{Z}_{k})^\perp$.
To this end we will show that for any function $f\in L^\infty(\mu)$ such that $\mathbb{E}(f|\mathcal{W}_k)=0$, it holds that $\mathbb{E}(f|\mathcal{Z}_{k})=0$. By Definition \ref{def:The-seminorms}, as $\gamma_{k+1}=\mu^{[k+1]}$,
\begin{multline*}
|||f|||_{k+1}^{2^{k+1}}=\int\prod_{v\in\{0,1\}^{k+1}}\mathcal{C}^{|v|}f(c_v)d\gamma_{k+1}(c)=\\
\int \prod_{v\in \{0,1\}^{k+1}}\mathbb{E}(\mathcal{C}^{|v|}f|W_k(X))(c_v)d\omega_k^{[k+1]}(c).
\end{multline*}
As $\mathbb{E}(f|\mathcal{W}_k)\equiv0$, it holds that $\mathbb{E}(\mathcal{C}^{|v|}f|W_k(X))\equiv0$ for any $v\in \{0,1\}^{k+1}$. Therefore $|||f|||_{k+1}=0$. This implies by Lemma \ref{lem: seminorm and k factor} that
$\mathbb{E}(f|\mathcal{Z}_{k})=0$ as desired.
By Remark \ref{rem:classical Z}, $Z_k(X)$ is the maximal measurable $k$-step pronilfactor of $(X,\mu,T)$. As $(W_k(X),\omega_k,T)$ is a $k$-step pronilfactor of $(X,T)$, one has that $\mathcal{W}_k\subset \mathcal{Z}_{k}$. Thus $\mathcal{W}_k=\mathcal{Z}_k$, which implies that $(W_k(X),\omega_k,T)$ is isomorphic to $(Z_{k}(X),\mathcal{Z}_k(X),\mu_{k},T)$ as m.p.s.
As a final step, we will now show that $\gamma_{k+1} (\C_{\T}^{k+1}(X))=1$. Let $f_v\in L^\infty(X,\mu)$, $v\in \{0,1\}^{k+1}$ and set $H_0=\prod_{v\in \{0\}\times \{0,1\}^k}f_v$ and $H_1=\prod_{v\in \{1\}\times \{0,1\}^k}f_v$ as well as $\hat{H}_0=\prod_{v\in \{0\}\times \{0,1\}^k}\mathbb{E}(f_v|W_k(X))$, $ \hat{H}_1=\prod_{v\in \{1\}\times \{0,1\}^k}\mathbb{E}(f_v|W_k(X))$.
By Equation \eqref{definition of gamma}, we have
\begin{equation}\label{eq:first}
\int_{X^{[k+1]}} H_0(c)H_1(c')d\gamma_{k+1}(c,c') =\int_{W_k(X)^{[k+1]}} \hat{H}_0(c)\hat{H}_1(c')d\omega_k^{[k+1]}(c,c').
\end{equation}
By Equation \eqref{def muk 2} in Definition \ref{def: muk definition},
\begin{equation}\label{eq:second}
\int_{W_k(X)^{[k+1]}} \hat{H}_0(c)\hat{H}_1(c')d\omega_k^{[k+1]}(c,c')=\int_{W_k(X)^{[k]}} \mathbb{E}(\hat{H}_0|\mathcal{I}_{T^{[k]}})(c)\hat{H}_1(c)d\omega_k^{[k]}(c).
\end{equation}
By Birkhoff's ergodic theorem (see also Theorem \ref{pointwise ergodic theorem for amenable}), one has that
\begin{equation}\label{eq:3 lines}\begin{array}{ll}\int_{W_k(X)^{[k]}} \mathbb{E}(\hat{H}_0|\mathcal{I}_{T^{[k]}})(c)\hat{H}_1(c)d\omega_k^{[k]}(c)\\
{\displaystyle =\int\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=0}^{N-1}\hat{H}_0((T^{[k]})^nc)\hat{H}_1(c)d\omega_k^{[k]}(c)}\\
={\displaystyle \lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=0}^{N-1}\int\hat{H}_0((T^{[k]})^nc)\hat{H}_1(c)d\omega_k^{[k]}(c)},
\end{array}
\end{equation}
here we used the Lebesgue dominated convergence theorem.
Abusing notation one may consider $\hat{H}_0$ and $\hat{H}_1$ as defined on $X^{[k]}$ (see Subsection \ref{Subsec: Con exp}). As $p_k:(X,\mu,T)\rightarrow (W_k(X),\omega_k,T)$ is a measurable factor map, one has
$$\int\hat{H}_0((T^{[k]})^nc)\hat{H}_1(c)d\omega_k^{[k]}(c)=\int\hat{H}_0((T^{[k]})^nc)\hat{H}_1(c)d\mu^{[k]}(c). $$
As $(C_T^k(X),\mathcal{HK}^{k}(T))$ is a topological factor of $(\C_{\T}^{k+1}(X),\mathcal{HK}^{k+1}(T))$ w.r.t. the ``lower'' $2^k$ coordinates, $(C_T^k(X),\mathcal{HK}^{k}(T))$ is uniquely ergodic. By Lemma \ref{prop:full support on Ck1}, the unique ergodic measure is $\mu^{[k]}$.
By Theorem \ref{pointwise ergodic theorem for amenable} applied to $(C_T^k(X),\mu^{[k]},\mathcal{HK}^{k}(T))$, there is a Følner sequence $\{F_M\subset \mathcal{HK}^k(T)\}_{M\in \mathbb{N}}$ such that
\begin{equation}\label{eq:first sum}
\int\hat{H}_0\big((T^{[k]})^nc\big)\hat{H}_1(c)d\mu^{[k]}(c)=\lim_{M\rightarrow \infty}\frac{1}{|F_M|}\sum_{h\in F_M}\hat{H}_0\big((T^{[k]})^nhs\big)\hat{H}_1(hs)
\end{equation}
for $\mu^{[k]}$-a.e. $s\in C_T^k(X)$.
Thus from Equations \eqref{eq:first}, \eqref{eq:second}, \eqref{eq:3 lines} and \eqref{eq:first sum}, it holds for arbitrary $f_v\in L^\infty(X,\mu)$, $v\in \{0,1\}^{k+1}$, $H_0=\prod_{v\in \{0\}\times \{0,1\}^k}f_v$ and $H_1=\prod_{v\in \{1\}\times \{0,1\}^k}f_v$, for $\mu^{[k]}$-a.e. $s\in C_T^k(X)$,
\begin{multline}
\label{ergodic convergence for Ck}
\int_{X^{[k+1]}} H_0(c)H_1(c')d\gamma_{k+1}(c,c')=\\
\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=0}^{N-1}\lim_{M\rightarrow \infty}\frac{1}{|F_M|}\sum_{h\in F_M}\hat{H}_0\big((T^{[k]})^nhs\big)\hat{H}_1(hs)
\end{multline}
Let $R\in C(X^{[k+1]},\mathbb{R})$ be a continuous function. We claim
for $\mu^{[k]}$-a.e. $s\in \C_{\T}^k(X)$,
\begin{equation}\label{uniformly converges-1}\int R(c)d\gamma_{k+1}(c)=\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=0}^{N-1}\lim_{M\rightarrow \infty}\frac{1}{|F_M|}\sum_{h\in F_M} R\big((T^{[k]})^nhs,hs\big)
\end{equation}
Notice that it follows from Definitions \ref{def:HK cube group and face group} and
\ref{defn of cubesystem} that if $s\in C_T^k(X)$, then $((T^{[k]})^nhs,hs)\in C_T^{k+1}(X)$ for arbitrary $h\in \mathcal{HK}^k(T)$ and $n\in \mathbb{Z}^{+}$ (see also \cite[Subsection A.2]{GGY2018}). Thus using Equation \eqref{uniformly converges-1} with functions $R_\delta\in C(X^{[k+1]},[0,1])$ such that $R_\delta|_{\C_{\T}^{k+1}(X)}\equiv 1$ and $R|_{X^{[k+1]}\setminus B_{\delta}(\C_{\T}^{k+1}(X))}\equiv 0$, (taking $\delta$ to zero) one obtains:
$$\gamma_{k+1}(C_T^{k+1}(X))=1.$$
We now prove \eqref{uniformly converges-1}. For $d\in \mathbb{N}$, let $H_d^{(i)}$ be functions of the form $\prod_{v\in \{0,1\}^{k+1}} h^{(i)}_v$, $i\in I_d$ for some finite set $I_d$, such that $|R(z)-\sum_{i\in I_d}H_d^{(i)}(z)|<\frac{1}{2d}$ for all $z\in \C_{\T}^{k+1}(X)$.
Denote by $C(R)=\int R(c)d\gamma_{k+1}(c)$ the (LHS) of \eqref{uniformly converges-1}. Denote by
$D(R)(z)$ be the (RHS) of Equation \eqref{uniformly converges-1}. By Equation \eqref{ergodic convergence for Ck},
$C(H_d^{(i)})=D(H_d^{(i)})(z)$ for $\mu^{[k]}$-a.e. $z\in \C_{\T}^k(X)$. Note that $|C(R)-\sum_{i\in I_d}C(H_d^{(i)})|<\frac{1}{2d}$ and $|D(R)(y)-\sum_{i\in I_d}D(H_d^{(i)})(y)|<\frac{1}{2d}$ for all $y\in \C_{\T}^k(X)$. Thus for any $d$, $E_d:=\{y\in \C_{\T}^{k}(X):|C(R)(y)-D(R)(y)|<\frac{1}{d}\}$ has full $\mu^{[k]}$ measure. Let $E=\bigcap_{d\in \mathbb{N}}E_d$, then $\mu^{[k]}(E)=1$ and for any $y\in E$, Equation \eqref{uniformly converges-1} holds.
\end{proof}
The following remark may be of interest:
\begin{rem}
In \cite[Section 6]{GHSY2019} an example is given showing there exists a strictly ergodic \textit{distal} system which is \textit{not} \text{CF-Nil}($1$).
\end{rem}
\section{A topological Wiener-Wintner theorem.}\label{sec TWWT}
In this section, we prove Theorem \ref{TWWT main}.
\begin{defn}\label{def:generic}
Let $(X,T)$ be a t.d.s. and $\mu\in \PM(X)$. A point $x\in X$ is \textbf{generic} (for $\mu$) if for all $f\in C(X)$
$$\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=0}^Nf(T^nx)=\int f d\mu$$
\end{defn}
\begin{lem} \label{lem:genericity}
Let $(X,T)$ be a t.d.s. and $x_0\in X$. Assume that for all $f\in C(X)$, there exists $c_f\in \mathbb{R}$, a constant depending on $f$, so that :
$$\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=0}^N f(T^nx_0)=c_f$$
Then $x_0$ is generic for some $\mu\in \PM(X)$.
\end{lem}
\begin{proof}
Define the functional $\phi:C(X)\rightarrow \mathbb{R}$ by $\phi(f)=c_f$. It is easy
to see that $\phi$ is a bounded linear positive functional of supremum norm $1$. By the Riesz representation theorem $c_f=\int f d\mu$ for some Borel probability measure $\mu$ on
$X$ (\cite[Theorem 2.14]{rudin2006real}). As $c_f=c_{Tf}$ for all $f\in C(X)$, it follows that $\mu\in \PM(X)$. Thus $x_0$ is generic by Definition \ref{def:generic}.
\end{proof}
\begin{thm}(\cite[Theorem 4.10]{G03})\label{thm:genericity}
Let $(X,T)$ be a minimal t.d.s., then $(X,T)$ is uniquely ergodic iff every $x\in X$ is generic for some $\mu\in \PM(X)$ (depending on $x$).
\end{thm}
\begin{lem}\label{lem:supp gen}
Let $(X,T)$ be a t.d.s. and $\mu\in \PM(X)$. If a point $x\in X$ is generic for $\mu$, then $\mu$ is supported on $\OC(x)$.
\end{lem}
\begin{proof}
Let $f$ be a non-negative function supported outside $\OC(x)$. Then $\int f d\mu=\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=1}^Nf(T^nx)=0$. Q.E.D.
\end{proof}
\begin{proof}[Proof of Theorem \ref{TWWT main}]
$(I)\Rightarrow (II)$. It follows from
\cite[Theorem 2.19 and Proposition 7.1]{HK09}.
We will show $(II)\Rightarrow (I)$ inductively. For $k=0$ note that Condition $(II)$ with the constant nilsequence $a(n)\equiv 1$ implies that for a fixed arbitrary $x\in X$ and every $f\in C(X)$, $\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=1}^Na(n)f(T^n x)=\lim_{N\rightarrow \infty}\frac{1}{N}\sum_{n=1}^N f(T^n x)$ exists. From Lemma \ref{lem:genericity}, $x\in X$ is generic for some $\mu_x\in P_T(X)$. By Theorem \ref{thm:genericity}, $(X,T)$ is uniquely ergodic. By assumption $(X,T)$ is minimal and thus $(X,T)$ is a \text{CF-Nil}$(k)$ system.
Assume the $(II)\Rightarrow (I)$ holds for $k-1$. We will now show $\sim (I)\Rightarrow \,\,\, \sim (II)$ for $k$. Thus we assume that $(X,T)$ is not \text{CF-Nil}($k$).
\,\,If $(X,T)$ is not \text{CF-Nil}($k-1$) then the result follows from the inductive assumption. Thus we may assume $(X,T)$ is \text{CF-Nil}($k-1$) and in particular uniquely ergodic. Denote the unique probability measure of $(X,T)$ by $\mu$. By definition one has that $(Z_{k-1}(X),\mathcal{Z}_{k-1}(X),\mu_{k-1},T)$ is isomorphic as an m.p.s. to $(W_{k-1}(X),\omega_{k-1}, T)$, where $\omega_{k-1}$ is the unique ergodic measure of $(W_{k-1}(X),T)$.
An important result of the \textit{Host-Kra structure theory} is that $\pi:Z_{k}(X) \rightarrow
Z_{k-1}(X)$, determined by $\pi_{k-1}=\pi\circ\pi_k$ (as defined in Definition \ref{def:Z_k}), is a measurable group extension w.r.t. some abelian group $A$ (See \cite[ Section 6.2]{HK05}, \cite[Chapter 9, Section 2.3]{HK2018}). By \cite[Theorem 1.1, proof of Theorem 5.3]{GL2019}, we can find a topological model $\hat{\pi}:(\hat{Z}_k,T)\rightarrow (\hat{Z}_{k-1},T)$ of $\pi$ which is an abelian topological group extension w.r.t. the abelian group $A$ such that $(\hat{Z}_k,T)$ is a minimal $k$-step pronilsystem and $(\hat{Z}_{k-1},T)$ is a minimal $(k-1)$-step pronilsystem.
Denote by $\phi$ and $\psi$ the measurable isomorphisms between $Z_k(X)$ and $\hat{Z}_k(X)$ and $Z_{k-1}(X)$ and $\hat{Z}_{k-1}(X)$ respectively.
\[
\begin{CD}
Z_k(X) @>{\phi}>> \hat{Z}_k(X) \\
@V{\pi}VV @VV{\hat{\pi}}V\\
Z_{k-1}(X) @>{\psi }>> \hat{Z}_{k-1}(X)
\end{CD}
\]
\noindent
For clarity denote $\pi_{Z_k}:=\pi_k$ from the previous paragraph.
Define $\pi_{\hat{Z}_k}=\phi\circ\pi_{Z_k}$. Let $p_{k-1}:X\rightarrow W_{k-1}(X)$ be the topological canonical $(k-1)$-th projection.
Let $\pi_{\hat{Z}_{k-1}}=\hat{\pi}\circ\pi_{\hat{Z}_{k}}$.
By Corollary \ref{cor:strong max}(2), $\hat{\pi}\circ \pi_{\hat{Z}_k}$ inherits the maximality property of $\pi_{k-1}=\pi\circ \pi_{Z_k}$. By Corollary \ref{cor:strong max}(1), there exists a measurable factor map $p:\hat{Z}_{k-1}(X)\rightarrow W_{k-1}(X)$ such that $p_{k-1}=p\circ \hat{\pi}\circ \pi_{\hat{Z}_k(X)}$ a.s. As $\hat{Z}_{k-1}(X)$ is isomorphic to both $Z_{k-1}(X)$ and $W_{k-1}(X)$ as m.p.s.\footnote{Here we use that $(X,T)$ is \text{CF-Nil}($k-1$).}, by Theorem \ref{thm: meas coalescence}, $p$ may be chosen to be a topological isomorphism. W.l.o.g. we will assume $p=\id$. Thus we have:
\begin{equation}\label{circ a.e.}
\text{$p_{k-1}(x)=\hat{\pi}\circ \pi_{\hat{Z}_k(X)}(x)$ for $\mu$-a.e. $x\in X$.}
\end{equation}
$$
\xymatrix@R=1.5cm{
X\ar[d]_{\pi_{Z_k}}\ar[r]^{\id} &\ar[l]X\ar[r]^{\id}\ar[d]_{\pi_{\hat{Z}_k}}& \ar[l] X\ar[dd]^{p_{k-1}} \\
Z_k(X)\ar@{>}[r]^{\phi}\ar[d]_{\pi}& \ar[l]\hat{Z}_k(X)\ar[d]_{\hat{\pi}} \\
Z_{k-1}(X)\ar@{>}[r]^{\psi} &\ar[l]\hat{Z}_{k-1}(X)\ar[r]^{\id}&\ar[l]W_{k-1}(X)}
$$
\noindent
We claim that there exists a minimal subsystem $(Y,T\times T)\subset (X\times \hat{Z}_k,T\times T)$ such that $(Y,T\times T)$ is not uniquely ergodic. Assuming this, as by Theorem \ref{thm:genericity} a minimal system is uniquely ergodic if and only if every point is generic, there exists $(x_3,u_3)\in Y$ such that $(x_3,u_3)$ is not a generic point for any measure. By Lemma \ref{lem:genericity}, there exist continuous functions $h\in C(\hat{Z}_k)$, $f\in C(X)$ such that
\begin{equation}\label{limit no exist}\lim_{N\rightarrow \infty }\frac{1}{N}\sum_{n=1}^N h(T^nu_3)f(T^nx_3)
\end{equation}does not exist. As $(\hat{Z}_k,T)$ is a $k$-step pronilsystem, $h(T^nu_3)$ is a $k$-step nilsequence (Definition \ref{def:nilsequence}). Thus $(II)$ does not hold as required.
Our strategy in proving the claim is finding a minimal subsystem $(Y,T\times T)$ of $(X\times \hat{Z}_k,T\times T)$ which supports an invariant measure $\nu$, w.r.t which $(Y,T\times T)$ is isomorphic to $(X,\mu, T)$ as an m.p.s. We then assume for a contradiction that $(Y,T\times T)$ is uniquely ergodic.
Next we notice that the strictly ergodic system $(Y,T\times T)$, being measurably isomorphic to $(X,\mu,T)$, has $Z_k(Y)\simeq Z_k(X)$. Moreover as $(Y,T\times T)$ is a minimal subsystem of a product of the two minimal systems, $(X,T)$ and $(\hat{Z}_k,T)$, it maps onto each of them through the first, respectively second coordinate projections. From the projection on $(\hat{Z}_k,T)$, we conclude that $(Y,T)$ has a topological $k$-step pronilfactor $\hat{Z}_k$ which is measurably isomorphic to $Z_k(Y)$. By Proposition \ref{pronilfactor maximal}, one has that $(Y,T)$ is \text{CF-Nil}($k$). From the projection on $(X,T)$, we conclude by Proposition \ref{factor and k kronecker}, that $(X,T)$ is \text{CF-Nil}($k$). This constitutes a contradiction implying that $(Y,T)$ is not uniquely ergodic as desired.
A natural copy of $(X,\mu, T)$ inside $(X\times \hat{Z}_k,T\times T)$ is given by the \textit{graph joining} of $\pi_{\hat{Z}_k(X)}$, defined by the measure $\mu^{(k)}=(\id\times\pi_{\hat{Z}_k(X)})_*\mu :=\int \delta_x\times \delta_{\pi_{\hat{Z}_k(X)}(x)}d\mu(x)$ on $(X\times \hat{Z}_k,T)$ (see \cite[Chapter 6, Example 6.3]{G03}). Clearly
\begin{equation}\label{eq for k}\id\times\pi_{\hat{Z}_k(X)}:(X,\mathcal{X},\mu,T)\rightarrow (X\times \hat{Z}_k,\mathcal{X}\times \hat{\mathcal{Z}}_k, \mu^{(k)},T\times T),\, x\mapsto (x,\pi_{\hat{Z}_k(X)}(x)).
\end{equation}
is a measurable isomorphism and in particular $\mu^{(k)}$ is an ergodic measure of $(X\times \hat{Z}_k,T\times T)$.
However $(X\times \hat{Z}_k,\mathcal{X}\times \hat{\mathcal{Z}}_k, \mu^{(k)},T\times T)$ is a m.p.s. and not a (minimal) t.d.s. We consider an orbit closure of a $\mu^{(k)}$-generic point $(x_1,\pi_{\hat{Z}_k(X)}(x_1))$ to be determined later. By Lemma \ref{lem:supp gen}, $\mu^{(k)}$ is supported on $\OC(x_1,\pi_{\hat{Z}_k(X)}(x_1))$. However $(\OC(x_1,\pi_{\hat{Z}_k(X)}(x_1)), T\times T)$ is not necessarily minimal. We thus pass to an (arbitrary) minimal subsystem $(Y,T\times T))\subset (\OC(x_1,\pi_{\hat{Z}_k(X)}(x_1)),T\times T))$. However $\mu^{(k)}$ is not necessarily supported on $Y$.
As explained in the previous paragraph, our final aim will be to find (a possibly different) invariant measure $\nu\in \PMM(Y)$ which is isomorphic to $\mu$.
As $\hat{\pi}$ is a topological group extension w.r.t. the abelian group $A$,
\begin{equation}\label{group extension}\id\times \hat{\pi}:(X\times \hat{Z}_k,T\times T)\rightarrow (X\times W_{k-1}(X),T\times T): (x,z)\mapsto (x,\hat{\pi}(z))
\end{equation}
is also a topological group extension w.r.t. the abelian group $A$. Thus $A$ acts on the fibers of $\id\times \hat{\pi}$ transitively and continuously by homeomorphisms. Moreover for all $a\in A$, $(\id\times a)_*\mu^{(k)}$ is an invariant measure on $(X\times \hat{Z}_k,T\times T)$ isomorphic to $\mu^{(k)}$ and thus isomorphic to $\mu$. We will find $\nu\in \PMM(Y)$ of the form $\nu=(\id\times a)_*\mu^{(k)}$. Indeed for $\mu$-a.e. $x\in X$, $(x,\pi_{\hat{Z}_k(X)}(x))$ is a generic point of $\mu^{(k)}$. Using \eqref{circ a.e.}, one may choose $x_1\in X$ such that
\begin{itemize}
\item $(x_1,\pi_{\hat{Z}_k(X)}(x_1))$ is a generic point of $\mu^{(k)}$;
\item $\hat{\pi}(\pi_{\hat{Z}_k(X)}(x_1))=p_{k-1}(x_1)$.
\end{itemize}
From the second point it follows that:
$$\id\times \hat{\pi}:(\OC(x_1,\pi_{\hat{Z}_k(X)}(x_1)),T\times T)\rightarrow (\OC(x_1,p_{k-1}(x_1)),T\times T)$$is a topological factor map. As $p_{k-1}$ is a topological factor map,
\begin{equation}\label{eq for k-1}
\id\times p_{k-1}:(X,T)\rightarrow (\OC(x_1,p_{k-1}(x_1)),T\times T), \,x\rightarrow (x,p_{k-1}(x))
\end{equation}
is a topological isomorphism. Therefore $(\OC(x_1,p_{k-1}(x_1)),T\times T)$ is minimal. Thus $(\id\times \hat{\pi})_{|Y}:(Y,T)\rightarrow (\OC(x_1,p_{k-1}(x_1)),T)$ factors onto.
In particular there exists $z_1\in \hat{Z}_k(X)$, such that $(x_1,z_1)\in Y$ and $\hat{\pi}(z_1)=p_{k-1}(x_1)$.
As by assumption $\hat{\pi}(\pi_{\hat{Z}_k(X)}(x_1))=p_{k-1}(x_1)$, we can find $a\in A$ such that $a.\pi_{\hat{Z}_k(X)}(x_1)=z_1$.
As $(x_1,\pi_{\hat{Z}_k(X)}(x_1))$ is a generic point of $\mu^{(k)}$, it follows that $(x_1,a.\hat{\pi}_k(x_1))=(x_1,z_1)$ is a generic point of $\nu:=(\id\times a)_*\mu^{(k)}$. Therefore by Lemma \ref{lem:supp gen}, the invariant measure $\nu\simeq \mu$ is supported on the minimal subsystem $\OC{(x_1,z_1)}=Y$. This ends the proof.
\end{proof}
\specialsectioning
\bibliographystyle{alpha}
|
\section{Introduction}\label{sec:Introduction}
In this paper, we focus on a scenario in Industrial Internet of Things (IIoT) where a controller and a robot are out of each other's transmission range, and they exchange messages with the assistance of a relay\cite{varga20205g,sisinni2018industrial,yamamoto2018multi,kagawa2017study}. To achieve the stringent requirement on the communication latency between the robot and controller in IIoT, we apply physical layer network coding (PNC)\cite{zhang2006hot,popovski2007physical}, as shown in Fig. \ref{Fig1_1}. Specifically, at time slot 1, the controller and robot transmit their messages simultaneously to the relay. From the overlapped signals, the relay deduces a network-coded message. At time slot 2, the relay broadcasts the network-coded message to the controller and robot. The robot then uses the network-coded message and its own message to deduce the message from the controller. Likewise for the controller. Compared with the traditional scheme which requires four times slots for the communications between the robot and controller, PNC can reduce the communication latency from four time slots to two time slots\cite{zhang2006hot,popovski2007physical}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.58]{Figures/Fig1_1.pdf}\\
\caption{A controller and a robot are out of each other's transmission range, and they exchange messages with the assistance of a relay. The PNC technique is applied to reduce the communication latency.}\label{Fig1_1}
\end{figure}
Within the robot and controller communication scenario, we are particularly interested in the case where 1) the message length from the controller is longer than that from the robot. For example, the controller controls motion of the robot through a series of instructions, while the robot only needs to feed back a one-bit acknowledgment to indicate if the robot executes the instructions correctly; 2) the controller and robot have nearly the same transmit power, while the channel power between the controller and relay, is larger than that between the robot and relay. For example, the channel between the controller and relay is a line-of-sight channel, while the channel between the robot and relay is a non-line-of-sight channel due to the equipment around the robot which creates multipaths and in turn causes channel fading. Another example is, due to the mobility of the robot, the distance between relay and robot could be larger than the distance between relay and controller. In this case, the path loss of the relay-robot channel is larger than that of the relay-controller channel.
Most of the current channel-coded PNC studies are based on a pioneering work \cite{popovski2007physical}, which showed that as long as the amounts of the information from the two users are the same, the XOR of the two linear codewords from the two users is still a valid codeword at the relay. Currently, nearly all the PNC channel encoding and decoding techniques were developed over this requirement\cite{zhang2009channel,huang2013design,yang2015achieving,wang2019signal,shi2016subtleties,shi2017complex,wangnoncoherent}, although sometimes the channel power between the controller and relay is larger than that between the robot and relay. In this case, within our considered scenario, if we apply the current PNC techniques, the controller should use another time slot to transmit the additional information to the robot separately.
In this paper, to further reduce the communication latency, we put forth an ``asymmetric transmission scheme'' where the controller can transmit more information than the robot by exploiting its stronger channel gain in the uplink of PNC. In this case, we cannot apply the current PNC channel decoding techniques which require the both users transmit the same amount of information. For example, the robot transmits a QPSK modulated packet. Since the channel between the controller and relay is stronger, we assume that the controller transmits a 8-QAM modulated packet. In addition, the robot and controller apply a same type of channel code to guarantee the transmission reliability. Since each QPSK symbol contains two encoded bits of the codeword, while each 8-QAM symbol contains three encoded bits, it is hard for the relay to find a channel decoder to deduce meaningful network-coded messages from the superimposed packet. Thus, a key challenge is how to construct a channel decoder at the relay to deduce the network-coded messages in the asymmetric transmission.
\subsection{Related Work}
\underline{\emph{Symmetric transmission with channel codes}}: Currently, most of the channel-coded PNC studies lie in the symmetric transmission, where two end users transmit the same amount of information, even in the case where the channel gain of the relay-controller channel is larger than that of the relay-robot channel\cite{popovski2007physical,zhang2009channel,huang2013design,yang2015achieving,wang2019signal,shi2016subtleties,shi2017complex,wangnoncoherent}. As long as the amount of the information from the two users is the same, \cite{popovski2007physical} showed that the XOR of the two linear codewords is still a valid codeword at the relay. Thus, the channel decoder can be constructed to deduce the network-coded messages at the relay. However, the problem is that the symmetric transmission does not exploit the larger channel gain from the relay-controller channel such that the controller can transmit more information than the robot. In this case, if the controller has more information to transmit, the controller should use another time slot to transmit the rest of the information. In this paper, we consider the channel-coded asymmetric PNC transmission scheme to reduce the transmission time.
\underline{\emph{Asymmetric transmission without channel codes}}: To further exploit the channel gain in the relay-controller channel, \cite{koike2009adaptive,koike2009optimized,chen2010novel,chen2011optimization,muralidharan2013wireless,chen2013spectrum,zhang2015design} studied the case where the controller transmits more information than the robot, but without applying channel codes protection. The asymmetric transmission is achieved through a way where the controller chooses a higher signal modulation order than that of the robot\footnote{Since the channel gain of the relay-controller channel is larger than that of the relay-robot channel, the received SNR from the controller is larger than that from the robot. For a same target frame error rate (FER), the controller can thus potentially choose a higher order modulation than that of the robot\cite{goldsmith2005wireless}. In this case, the controller can transmit more information with a larger channel gain.}. Refs. \cite{koike2009adaptive,koike2009optimized,chen2010novel,chen2011optimization,muralidharan2013wireless,chen2013spectrum,zhang2015design} did not apply the channel codes because in the case that the amounts of information from the two users are different, the current PNC coding schemes cannot guarantee the linearity of the underlying channel codes at the relay for successful decoding. In this case, it is not clear how to construct channel decoder at the relay to deduce the network-coded messages. In this paper, we solve this problem by proposing a lattice-based channel encoder and decoder in the asymmetric PNC transmission.
\underline{\emph{Asymmetric transmission with channel codes}}: Prior to this work, \cite{zhang2017design,pan2017practical} put forth novel channel coding and modulation schemes to solve the problem partially in asymmetric PNC transmission. First, the channel coding and modulation scheme in \cite{zhang2017design} is applicable to the case where the robot applies BPSK modulation, and the controller applies QPSK modulation. The channel coding and modulation scheme in \cite{pan2017practical} can be applied to the case where the robot applies $2^m$-QAM modulation, and the controller applies $2^{2m}$-QAM modulation, $m\ge 1$. Second, the channel coding and modulation scheme in \cite{zhang2017design} is particularly designed for repeat-accumulate (RA) codes, and channel coding as well as the modulation scheme in \cite{pan2017practical} is particularly designed for convolutional codes. The detailed description of the encoding and modulation schemes in \cite{zhang2017design,pan2017practical} is shown in Section \ref{sec:related}. In this paper, we put forth a general framework to solve the above problem comprehensively. Our design is versatile in the following two aspects: 1) in our framework, the controller and robot can freely choose their modulation orders based on their corresponding channel gains; 2) our design is generally applicable for arbitrary channel codes, not particularly applicable for one type of channel code.
\subsection{Contributions}
First, we put forth a lattice-based channel encoding and modulation framework to solve the channel coding problem in asymmetric PNC. Specifically, a lattice is a discrete set of points in a complex Euclidean space that forms a group under ordinary vector addition\cite{coset1988}. The lattice can be constructed through a set of nested linear binary channel codes $\mathcal{C}_1\subseteq\mathcal{C}_2\subseteq\dots\subseteq\mathcal{C}_{L-1}$, where $\mathcal{C}_l$ lies in the $l$-th level of the lattice, $l=1,\dots,L-1$, and $L$ is the number of lattice construction level. That is, the source information is stored in the first $L-1$ lattice levels. A power shaping in the $L$-th lattice level is applied to constrain the power of the lattice. The lattice with larger construction levels $L$ has larger power. Denote the number of lattice level at the robot and controller by $L_R$ and $L_C$, respectively. Since the channel at the controller is stronger that that of the robot, we have $L_C>L_R$. The relay estimates the network-coded messages from the received lattice level $l=1$ to lattice level $l=L_C-1$ in a level-by-level manner.
Second, when the lattice levels from the two users are not the same, the conventional power shaping design (i.e., the power shaping design applicable for point-to-point systems) makes the lattices from the two users not nested with each other, since the power shaping at the robot is not a legal codeword to the channel codes $\mathcal{C}_{L_R}$ in general. Thus, the channel decoder at the lattice level $L_R$ can not decode network-coded information successfully, which then causes decoding error propagation at the lattice levels $l>L_R$. To solve this problem, we ask the robot to transmit a correction signal beforehand, such that the difference between the power shaping and the correction signal is a legal codeword to the codes $\mathcal{C}_{L_R}$. Upon receiving the superimposed signal, the correction signal is subtracted from the received signal. In this case, the decoder at the relay can estimate the network-coded messages successfully.
Third, to reduce the correction signal transmission time, we apply the polar source coding \cite{arikan2010source,cronie2010lossless} technique to compress the correction signal, and transmit the compressed correction signal instead. We find that the polar source coding technique can efficiently reduce the correction signal transmission time when the channel coding rate at lattice level $L_R$ is close to 1. We emphasize that this can be achieved when the lattice construction level is large. In the numerical section, we show this though an example when $L_C=5$. To make the study of the asymmetric transmission comprehensive, we also consider the case where channel coding rate at lattice level $L_R$ is not close to 1. In this case, the length of the compressed correction signal may be large, and the asymmetric transmission scheme may spend much time on the correction signal transmission in addition to the PNC transmission. Thus, the overall asymmetric transmission time may be larger than the symmetric transmission time. To solve this problem, we put forth a dynamic transmission scheme in which the relay dynamically selects one of the transmission schemes which has smaller transmission time.
\subsection{Organization}
The rest of this paper is organized as follows. Section \ref{sec:SYS} describes the system model for the symmetric transmission scheme and asymmetric transmission scheme. In addition, we detail the related work on the channel encoder and modulator in asymmetric transmission scheme in Section \ref{sec:related}. Section \ref{sec:en-de} introduces the
proposed lattice-based channel encoder and modulator in asymmetric transmission, and the power shaping design. Section \ref{sec:nu} presents the numerical results to validate the effectiveness of the proposed asymmetric transmission scheme. Section \ref{sec:dy} proposes a dynamic transmission scheme to solve the problem on which the symmetric transmission time may be smaller than that of the asymmetric transmission. Finally, Section \ref{sec:con} concludes this paper.
\section{System Model}\label{sec:SYS}
In this paper, we study the communications between a controller and a robot in a two way relay channel (TWRC), as shown in Fig. \ref{Fig1_1}. The controller and robot are out of each other's transmission range, and they exchange messages with the assistance of a relay. In particular, we focus on a scenario in which 1) the message length from the controller is longer than that from the robot; 2) the controller and robot have nearly the same transmit power, while the channel power between the controller and relay, is larger than that between the robot and relay. To simplify the exposition, we denote the robot by $A$, the controller by $B$, and the relay by $R$. In addition, let $h_u$ be the channel between user $u$ and relay $R$, $u\in\{A,B\}$. From the assumption above, we have $|h_B|>|h_A|$. We assume that the coherence time is larger than a packet duration, and thus $h_u$ keeps constant within a packet duration, $u\in\{A,B\}$. Moreover, given the same transmit power, for a same target frame error rate (FER), a channel with stronger power can potentially support a higher modulation order\cite{goldsmith2005wireless}. Suppose the signal modulation order that can be supported by the channel $h_u$ is $M_u$, $u\in\{A,B\}$. In this case, we have $M_B>M_A$. Let $\mv{s}_u\in\{0,1\}^{K_u}$ denote the source information of user $u$, where $K_u$ is the length of the source information, $u\in\{A,B\}$. Under the considered setup, we have $K_B>K_A$. Note that, most of the current PNC studies require that the source information length at both users should be equal to each other, i.e., $K_A=K_B$. To achieve this, users $A$ and $B$ apply the same coding rate and modulation order\cite{wangnoncoherent,wangcoherent,wangnoncoherent_cof,xie2019polar,yang2014asynchronous,liew2015primer}. To reduce the transmission duration, in this paper, we put forth an asymmetric transmission scheme in which user $B$ can transmit more information than the user $A$, i.e., $K_B>K_A$.
\subsection{Symmetric Transmission Scheme}\label{sec:sy}
We first introduce the conventional symmetric transmission scheme, in which both users $A$ and $B$ transmit source information with the same length during the PNC phase, and user $B$ transmits the rest of information separately in a point-to-point (P2P) phase. The signal transmission process is detailed as follows.
\begin{figure}[t]
\centering
\includegraphics[scale=0.58]{Figures/Fig1_2.pdf}\\
\caption{Symmetric transmission scheme where the whole transmission takes four time slots.}\label{Fig1_2}
\end{figure}
\underline{\emph{Time slot 1: Uplink PNC transmission.}} The source information $\mv{s}_B$ from user $B$ is divided into the two parts: $\mv{s}_{B,PNC}$ and $\mv{s}_{B,P2P}$, where $\mv{s}_{B,PNC}\in\{0,1\}^{K_A}$, and $\mv{s}_{B,P2P}\in\{0,1\}^{(K_B-K_A)}$. The information $\mv{s}_{B,PNC}$ is transmitted during the PNC phase, and the information $\mv{s}_{B,P2P}$ is transmitted by user $B$ separately during the P2P phase. In the PNC phase, the source information $\mv{s}_A$ and $\mv{s}_{B,PNC}$ with the same length go through a same channel-encoder-and-modulator (EM), with coding rate $R_{A,PNC}=R_{B,PNC}$, and modulation order $M_A$. Note that the modulation order now is restricted by the weaker channel $h_A$. Otherwise, FER of the uplink transmission will be higher than the target FER. The transmitted packets are $\mv{x}_{A,PNC}$ and $\mv{x}_{B,PNC}$, respectively. We assume that the bandwidth in the uplink and downlink channel is $W$ symbols per second, i.e., the transmitter transmits $W$ modulated symbols to the receiver per second. The time slot 1 duration is
\begin{align}
T_1^{(Sym)}=\frac{K_A}{R_{A,PNC}M_AW}.
\end{align}
We assume that the signals from users \emph{A} and \emph{B} arrive at relay \emph{R} simultaneously, the received signal is expressed as:
\begin{align}
&\mv{y}_{R,PNC}\nonumber\\
&=h_A\beta_A\frac{1}{\sqrt{p_A}}\mv{x}_{A,PNC}+h_B\beta_B\frac{1}{\sqrt{p_B}}\mv{x}_{B, PNC}+\mv{n}_{R,PNC},\label{eq:rec}
\end{align}
where $p_u$ is the power of the symbol $x_{u,PNC}^{(n)}$, where $x_{u,PNC}^{(n)}$ is the $n$-th symbol in the packet $\mv{x}_{u,PNC}$, $u\in\{A,B\}$, and $n=1,\dots,N$. In this case, $\frac{1}{\sqrt{p_u}}\mv{x}_{u,PNC}$ denotes a power-normalized packet; $\beta_u$ is the channel precoder to compensate the channel at user $u$, $u\in\{A,B\}$, and $\mv{n}_{R,PNC}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{R,PNC}\mv{I}\right)$ denotes the additive white Gaussian noise (AWGN) at the relay. In addition, we assume perfect channel precoding at the users, i.e.,
\begin{align}
h_u\beta_u\frac{1}{\sqrt{p_u}}=1, ~~~u\in\{A,B\}.\label{eq:c}
\end{align}
We will show in Section \ref{sec:en-de} that the precoding in \eqref{eq:c} makes a lot of sense in our asymmetric PNC design. Let us first elaborate more details on \eqref{eq:c}. Specifically, we assume that the channels $h_u$'s are perfectly known at the users $A$ and $B$. Given the channel gain $|h_u|$ and the transmit power (i.e., the precoder power $|\beta_u|^2$), the user $u$ chooses the signal modulation with order $M_u$ with symbol power $p_u$, such that
\begin{align}
\sqrt{p_u}=|h_u||\beta_u|, ~~~u\in\{A,B\}.\label{eq:c1}
\end{align}
Thus, for a same $|\beta_u|$, from \eqref{eq:c1} we know that larger channel gain $|h_u|$ can help us to support higher order modulation. Next, the precoder adjusts its phase such that
\begin{align}
\theta_{h_u}+\theta_{\beta_u}=0, ~~~u\in\{A,B\},\label{eq:c2}
\end{align}
where $\theta_{h_u}$ is the phase of the channel $h_u$, and $\theta_{\beta_u}$ is the phase of the precoder $\beta_u$. The channel precoding technique to achieve \eqref{eq:c} has been studied and implemented in \cite{tan2018mobile}. Specifically, \cite{tan2018mobile} mainly solves the three problems: 1) time synchronization between users $A$ and $B$; 2) channel amplitude precoding to achieve \eqref{eq:c1}; 3) channel phase precoding to achieve \eqref{eq:c2}. We refer interested readers to \cite{tan2018mobile} for more details.
Substituting \eqref{eq:c} into \eqref{eq:rec}, we have
\begin{align}
\mv{y}_{R,PNC}=\mv{x}_{A,PNC}+\mv{x}_{B, PNC}+\mv{n}_{R,PNC}.\label{eq:rec_compen}
\end{align}
Based on the received signals $\mv{y}_R$, the relay $R$ deduces network-coded messages from users $A$ and $B$. Note that, since users $A$ and $B$ applies a same EM, the current PNC decoder-and-demodulator\cite{xie2019polar,yang2014asynchronous,liew2015primer} can be applied directly. The estimated network-coded information is denoted by $\mv{s}_{R,PNC}\in\{0,1\}^{K_A}$.
\underline{\emph{Time slot 2: Downlink PNC transmission.}} The relay then broadcasts the estimated network-coded information to both end users. The relay applies an EM, with coding rate $R_{R,PNC}$ and modulation order $M_A$. The modulation order is restricted by the weaker channel $h_A$ to achieve a target FER for the two users\footnote{In the downlink PNC, the received SNR at the controller is larger than that at the robot since the relay-controller channel is stronger than of the relay-robot channel. To make the FER at the robot and controller both smaller than the target FER, the relay chooses the low order modulation; otherwise, the FER of the robot would be larger than the target FER.}. In addition, for exposition simplicity, we assume that the modulation order in time slot 2 is the same as that in time slot 1, and the downlink PNC can achieve different FERs by adjusting the coding rate $R_{R,PNC}$. The broadcast packet is $\mv{x}_{R,PNC}$, and the duration of the time slot 2 is
\begin{align}
T_2^{(Sym)}=\frac{K_A}{R_{R,PNC}M_AW}.
\end{align}
At the user $u$, the received signal from the relay is
\begin{align}
\mv{y}_{u,PNC}=\mv{x}_{R,PNC}+\mv{n}_{u,PNC}, u\in\{A,B\}.\label{eq:us}
\end{align}
Note that, the channel $h_u$ has been compensated at user $u$. In this case, $\mv{n}_{u,PNC}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{u,PNC}\mv{I}\right)$ denotes the AWGN at the user $u$ after the channel compensation. The decoder at user $u$ decodes the messages from the other user based on the received signal $\mv{y}_{u,PNC}$ and its own message $\mv{x}_u$.
\underline{\emph{Time slot 3: User $B$ uplink P2P transmission.}} User $B$ transmits its remaining information $\mv{s}_{B,P2P}$ with length ($K_B-K_A$). The user $B$ applies an EM with coding rate $R_{B,P2P}$. In addition, since the channel between user $B$ and the relay is stronger than that between user $A$ and the relay, the modulation order now is assumed to be $M_B$. The transmitted packet is $\mv{x}_{B,P2P}$, and the duration of the time slot 3 is
\begin{align}
T_3^{(Sym)}=\frac{K_B-K_A}{R_{B,P2P}M_BW}.
\end{align}
At the relay $R$, the received signal is
\begin{align}
\mv{y}_{R,P2P}=\mv{x}_{B,P2P}+\mv{n}_{R,P2P}.
\end{align}
Note that, the channel $h_B$ has been compensated at the relay. In this case, $\mv{n}_{R,P2P}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{R,P2P}\mv{I}\right)$ denotes the AWGN after the channel compensation at the relay. The decoder at the relay $R$ decodes the messages from user $B$ based on the received signal $\mv{y}_{R,P2P}$. The estimated information is denoted by $\mv{s}_{R,P2P}\in\{0,1\}^{(K_B-K_A)}$.
\underline{\emph{Time slot 4: Relay $R$ downlink P2P transmission.}} The relay then transmits the information $\mv{s}_{R,P2P}$ to user $A$. The relay $R$ applies an EM with coding rate $R_{R,P2P}$, and the modulation order $M_A$. The modulation order is restricted by the channel $h_A$. In addition, for exposition simplicity, we assume that the modulation order in time slot 4 is the same as that in time slots 1 and 2, and the downlink P2P can achieve different FERs by adjusting the coding rate $R_{R,P2P}$. The duration of time slot 4 is
\begin{align}
T_4^{(Sym)}=\frac{K_B-K_A}{R_{R,P2P}M_AW}.
\end{align}
At the user $A$, the received signal is
\begin{align}
\mv{y}_{A,P2P}=\mv{x}_{R,P2P}+\mv{n}_{A,P2P}.
\end{align}
Note that, the channel $h_A$ has been compensated at user $A$. In this case, $\mv{n}_{A,P2P}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{A,P2P}\mv{I}\right)$ denotes the AWGN after the channel compensation. The decoder at the user $A$ decodes the messages from user $B$ based on the received signal $\mv{y}_{A,P2P}$.
Overall, the transmission time in the symmetric transmission scheme is
\begin{align}
T^{(Sym)}&=T_1^{(Sym)}+T_2^{(Sym)}+T_3^{(Sym)}+T_4^{(Sym)}\nonumber\\
&=\frac{K_A}{R_{A,PNC}M_AW}+\frac{K_A}{R_{R,PNC}M_AW}\nonumber\\
&~~~+\frac{K_B-K_A}{R_{B,P2P}M_BW}+\frac{K_B-K_A}{R_{R,P2P}M_AW}.\label{eq:time-sy}
\end{align}
\subsection{Asymmetric Transmission Scheme}\label{sec:asy}
A problem in the symmetric transmission scheme is that, in the uplink PNC phase (i.e., time slot 1 in the symmetric transmission), user $B$ transmits signals with a lower modulation order $M_A$, although the channel power between user $B$ and the relay can support user $B$ to transmits signals with a higher modulation order $M_B>M_A$. This takes user $B$ additional time for signal transmission. In this paper, by exploiting the stronger channel at user $B$, we put forth an asymmetric transmission scheme, in which user $A$ transmits its $K_A$-length source information, and user $B$ transmits its $K_B$-length source information simultaneously during the uplink of PNC phase. The signal transmission processes are detailed as follows.
\underline{\emph{Time slot 1: Uplink PNC transmission.}} User $A$ transmits it source information $\mv{s}_A$, and user $B$ transmits its source information $\mv{s}_B$ to the relay at the same time. The source information $\mv{s}_u$ goes through an EM with coding rate $R_{u,PNC}$ and modulation order $M_u$, and the transmitted packet is $\mv{x}_{u,PNC}$, $u\in\{A, B\}$. In this case, since the channel from user $B$ is stronger than that of user $A$, we have $M_B>M_A$. We assume that the lengths of source information from the two users are chosen such that the lengths of the transmitted packets from the two users are the same. The time slot 1 duration is
\begin{align}
T_1^{(Asy)}=\frac{K_A}{R_{A,PNC}M_AW}=\frac{K_B}{R_{B,PNC}M_BW}.
\end{align}
The received signal at the relay is the same as that shown in \eqref{eq:rec_compen}. A key challenge is how to design an EM at the two users such that the relay can decode the network-coded messages from the two end users. We will show our design on the encoder and decoder in Section \ref{sec:en-de}. The estimated network-coded information is denoted by $\mv{s}_{R,PNC}\in\{0,1\}^{K_B}$.
\underline{\emph{Time slot 2: Downlink PNC transmission.}} The relay then broadcasts the estimated network-coded information to the two end users. The relay applies an EM, with coding rate $R_{R,PNC}$ and modulator order $M_A$. The modulator order is restricted by the weaker channel $h_A$ to achieve a targeted FER. In addition, the modulation order is the same as that in time slots 2 and 4 in the symmetric transmission scheme in order to have a fair transmission time comparison later. The broadcast packet is $\mv{x}_{R,PNC}$, and the duration of the time slot 2 is
\begin{align}
T_2^{(Asy)}=\frac{K_B}{R_{R,PNC}M_AW}.
\end{align}
The received signal at the relay is the same as that shown in \eqref{eq:us}. The decoder at user $u$ decodes the messages from the other user based on the received signal $\mv{y}_{u,PNC}$ and its own message $\mv{x}_u$, $u\in\{A,B\}$.
Overall, the transmission time in the asymmetric transmission scheme is
\begin{align}
T^{(Asy)}&=T_1^{(Asy)}+T_2^{(Asy)}\nonumber\\
&=\frac{K_A}{R_{A,PNC}M_AW}+\frac{K_B}{R_{R,PNC}M_AW}.\label{eq:time-asy}
\end{align}
If we set $R_{R,PNC}=R_{R,P2P}$, from \eqref{eq:time-sy} and \eqref{eq:time-asy}, we have
\begin{align}
T^{(Sym)}-T^{(Asy)}=T^{(Sym)}_3=\frac{K_B-K_A}{R_{B,P2P}M_BW}. \label{eq:com0}
\end{align}
Eqn. \eqref{eq:com0} shows that the time slot 3 in symmetric transmission scheme is saved by the asymmetric transmission scheme.
\subsection{Challenge in Traditional EM in Asymmetric Transmission} \label{sec:tr_scheme}
We first show the traditional EM, i.e., the EM applied in the current PNC systems, and its problems when applied to asymmetric transmission scheme through a concrete example. In time slot 1 of the asymmetric transmission scheme shown in Section \ref{sec:asy}, the source information $\mv{s}_u$ first goes through a channel encoder, the output codeword is $\mv{c}_u$ with codeword length $D_u$, $u\in\{A,B\}$. Suppose that the codeword length $D_B=2D_A$. Then, the codeword $\mv{c}_A$ goes through a BPSK modulator, and $\mv{c}_B$ goes through a QPSK modulator. As a result, the modulated packets $\mv{x}_{A,PNC}$ and $\mv{x}_{B,PNC}$ have the same length. The problem is, since each BPSK symbol within $\mv{x}_{A,PNC}$ contains 1 encoded bit of the codeword $\mv{c}_A$, while each QPSK symbol within $\mv{x}_{B,PNC}$ contains 2 encoded bits of the codeword $\mv{c}_B$, it is hard for the relay $R$ to find a channel decoder to deduce meaningful network-coded messages from the superimposed packet between $\mv{x}_{A,PNC}$ and $\mv{x}_{B,PNC}$. In this case, the above traditional EM is not applicable to the asymmetric transmission in PNC.
\subsection{Related Work on EM in Asymmetric Transmission} \label{sec:related}
Prior to this work, \cite{zhang2017design,pan2017practical} put forth novel schemes to solve the above problem. Specifically, in \cite{zhang2017design}, user $A$ follows the traditional EM shown in Section \ref{sec:tr_scheme}, and the modulated packet is $\mv{x}_{A,PNC}\in\{-1,1\}^N$, where $N$ is the packet length. To solve the problem detailed in Section \ref{sec:tr_scheme}, user $B$ divides the source information $\mv{s}_B$ into the following two parts: $\mv{s}_{B,1}$ and $\mv{s}_{B,2}$, where $\mv{s}_{B,i}\in\{0,1\}^{K_{B,i}}$, $i=1, 2$. In \cite{zhang2017design}, $K_{B,1}=K_{B,2}=K_A$. The source information $\mv{s}_{B,1}$ and $\mv{s}_{B,2}$ first go through a same RA channel encoder, and the output codewords are $\mv{c}_{B,1}$ and $\mv{c}_{B,2}$, respectively. Then, the codewords $\mv{c}_{B,1}$ and $\mv{c}_{B,2}$ go through a BPSK modulator separately, and the output BPSK packets are $\mv{x}_{B,PNC}^I\in\{-1,1\}^N$ and $\mv{x}_{B,PNC}^Q\in\{-1,1\}^N$, respectively. Finally, the QPSK modulated packet of user $B$ is:
\begin{align}
\mv{x}_{B,PNC}=\mv{x}_{B,PNC}^I+j\mv{x}_{B,PNC}^Q,
\end{align}
where $j^2=-1$. In this case, the scheme makes two BPSK modulated packets $\mv{x}_{B,PNC}^I$ and $\mv{x}_{B,PNC}^Q$ embedded in the in-phase and quadrature parts of one QPSK modulated packet $\mv{x}_{B,PNC}$, respectively. Since each BPSK symbol within $\mv{x}_{A,PNC}$, $\mv{x}_{B,PNC}^I$, and $\mv{x}_{B,PNC}^Q$ all contains 1 encoded bit information of their corresponding codewords, the traditional channel decoder can be applied to deduce the network-coded messages at the relay. The relay in \cite{zhang2017design} applies a PNC joint channel decoder. Specifically, \cite{zhang2017design} first jointly decodes $\mv{s}_{A}$, $\mv{s}_{B,1}$, and $\mv{s}_{B,2}$ based on the received signal $\mv{y}_{R,PNC}$ in \eqref{eq:rec_compen}. Then, the network-coded message $\mv{s}_{R,PNC}$ is as follows:
\begin{align}
\mv{s}_{R,PNC}=\left[\mv{s}_A\oplus\mv{s}_{B,1}, \mv{s}_A\oplus\mv{s}_{B,2}\right],\label{eq:net_info}
\end{align}
where $\oplus$ denotes the XOR operation. Ref. \cite{zhang2017design} shows the scheme where user $A$ applies BPSK modulation, and user $B$ applies QPSK modulation. It is not clear whether the channel encoding and modulation scheme in \cite{zhang2017design} can be extended to the cases beyond BPSK-QPSK combination. The following three factors make the extension difficult:
\begin{itemize}
\item \emph{Channel decoder design issue}: The channel decoder at the relay is particularly designed for RA codes. We need to re-design the channel decoder if anther channel code is applied. In addition, the PNC joint channel decoder applied in \cite{zhang2017design} is not widely used due to the decoding complexity issue. Specifically, the decoding complexity increases as the number of input states to the channel decoder. In the above example, there are $2^{(1+2)}=8$ input states. The number of input states of the scheme exponentially increase with the sum of the modulation orders from the two users, making the joint channel decoder infeasible to high order modulations.
\item \emph{PNC XOR mapping issue}: It is not clear how to do PNC XOR mapping beyond the BPSK-QPSK combination.
\end{itemize}
We next introduce the EM in \cite{pan2017practical}. Specifically, the EM in \cite{pan2017practical} is the same as that in \cite{zhang2017design} introduced above except that the convolutional code is applied in \cite{pan2017practical}. In addition, \cite{pan2017practical} applies a PNC XOR channel decoder. Specifically, \cite{pan2017practical} first applies the PNC XOR mapping between codewords as follows:
\begin{align}
\mv{c}_{R,PNC}=\left[\mv{c}_A\oplus\mv{c}_{B,1}, \mv{c}_A\oplus\mv{c}_{B,2}\right].\label{eq:xor}
\end{align}
Then, the soft information of $\mv{c}_{R,PNC}$ in \eqref{eq:xor} is fed to the channel decoder to get the network-coded message in \eqref{eq:net_info}. Ref. \cite{pan2017practical} use the same way to deal with the other cases beyond BPSK-QPSK combination. The problems are 1) according to the PNC mapping in \eqref{eq:xor}, the codeword length of user $B$ should always be two times as much as that of user $A$. Thus, the scheme from \cite{pan2017practical} can only be applied to the case where user $A$ applies $2^m$-QAM modulation, and user $B$ applies $2^{2m}$-QAM modulation, $m\ge 1$; 2) The channel decoder at the relay is particularly designed for convolutional codes. We should re-design the channel decoder if anther channel code is applied.
In general, the EM in \cite{zhang2017design,pan2017practical} cannot be generally applied to the cases in which users $A$ and $B$ can freely choose their channel codes, and modulation schemes according to their channel power, e.g., user $A$ applies QPSK modulation, and user $B$ applies 8-QAM modulation with low decoding complexity. In the following, we put forth a lattice-based EM to solve the above problem comprehensively.
\section{Lattice-based EM in Uplink of Asymmetric PNC}\label{sec:en-de}
In Section \ref{sec:asy}, we propose an asymmetric transmission scheme to improve the throughput of the PNC systems. To achieve this, users $A$ and $B$ should apply different coding and modulation strategies such that they can transmit different amount of information in the uplink of PNC. A key challenge is how to design the EM at the two users such that the relay can decode the network-coded messages from the two users. In this section, we propose a lattice-based EM to solve the above problem.
\subsection{Preliminaries for Lattice}\label{sec:pre}
A complex lattice $\Lambda_1$ is a discrete set of points in a complex Euclidean $n$-dimensional space $\mathbb{C}^n$ that forms a group under ordinary complex vector addition, $n\ge 1$\cite{coset1988}. A sublattice $\Lambda_2$ ($\Lambda_2\subseteq\Lambda_1$) induces a partition of $\Lambda_1$ into equivalence groups modulo $\Lambda_2$. We denote this partition by $\Lambda_1/\Lambda_{2}$. When the number of cosets of $\Lambda_2$ in $\Lambda_1$ is two, the lattice partition is the binary lattice partition. Let $\Lambda_1/\Lambda_2/\dots/\Lambda_{L-1}/\Lambda_L$ denote an $n$-dimensional lattice partition chain for $L\ge 2$. For each partition $\Lambda_l/\Lambda_{l+1}$, a code $\mathcal{C}_l$ over $\Lambda_l/\Lambda_{l+1}$ selects a sequence of coset representatives $a_l\in A_l$, where $A_l$ is a set that contains all the coset representatives of $\Lambda_{l+1}$ in the partition $\Lambda_l/\Lambda_{l+1}$, $1\le l\le L-1$. The construction of the binary lattice requires a set of nested linear binary codes $\mathcal{C}_l$ with codeword length $D$ and source information length $k_l$, $l=1,\dots, L-1$, and $\mathcal{C}_1\subseteq\mathcal{C}_2\subseteq\dots\subseteq\mathcal{C}_{L-1}$. Let $\pi$ be the natural embedding of $\mathbb{F}^D_2$
into $\mathbb{Z}^D$, where $\mathbb{F}^D_2$ is the binary field. In addition, let $\mv{e}_1$, $\mv{e}_2$,\dots, $\mv{e}_{k_l}$ be a basis of $\mathbb{F}^D_2$ that spans the code $\mathcal{C}_l$. When $n=2$, a vector $\mv{x}$ in the binary lattice is expressed as
\begin{align}
\mv{x}=\sum_{l=1}^{L-1}\phi^{l-1}\sum_{j=1}^{k_l}\alpha_j^{(l)}\pi(\mv{e}_j)+\phi^{L-1}\mv{b},
\end{align}
where $\phi=1+j$, $\alpha_j^{(l)}\in\{0, 1\}$, and $\mv{b}\in\mv{G}^D$ with $\mv{G}$ being a set of Gaussian integers. Moreover, the length of $\mv{x}$ now is $N=D$. Furthermore, if $\mv{x}$ is a baseband transmitted signal, the above lattice construction system combines the channel coding and modulation as a joint process, which is quite different from the traditional EM with separated channel coding and modulation processes. In addition, the power shaping $\mv{b}$ should be carefully chosen such that the transmitted baseband signal $\mv{x}$ is power constrained. We will detail this in Section \ref{sec:pw_sp}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.62]{Figures/Fig2.pdf}\\
\caption{A lattice-based EM at user $A$ when $L_A=3$.}\label{Fig2}
\end{figure}
\subsection{Lattice-based Encoder and Decoder}\label{sec:lattice}
Now, we show the lattice constructions at users $A$ and $B$ in the uplink of PNC. The lattice construction at both users strictly follows the description in Section \ref{sec:pre}. Specifically, according to the channel power, user $u$ applies $L_u$ levels lattice construction, $u\in\{A,B\}$. Then, user $u$ first divides the source information $\mv{s}_u$ as $\mv{s}_u=\left[\mv{s}_{u,1},\dots,\mv{s}_{u,L_u-1}\right]$, where $\mv{s}_{u,l}$ with length $K_{u,l}$ is the source information at level $l$ in the lattice, $l=1,\dots, L_u-1$, and $u\in\{A,B\}$. Next, at level $l$, we apply a channel encoder with coding rate $R_{u,l}$ to encode the source information $\mv{s}_{u,l}$, and the output codeword is $\mv{c}_{u,l}\in\mathbb{Z}^{D_u}$,\footnote{Note that, the codewords $\mv{c}_{u,l}$'s should lie in the whole integer field $\mathbb{Z}^{D_u}$, not in the binary finite field $\mathbb{F}_2^{D_u}$, $u\in\{A,B\}$. The reasons are as follows. In PNC, users $A$ and $B$ transmit signals to the relay simultaneously. Note that, the lattice signals superimposition over the air is actually an addition over the whole integer field. In this case, if we apply binary codewords at the two users, the summation of the two binary codewords from the two users over the air does not lie in the binary finite field anymore, causing the codewords at different lattice levels not nested at the relay. As a result, the decoding failures happen even in the absence of noise at the relay. On the other hand, if we apply codewords that lie in $\mathbb{Z}^{D_u}$, the summation of the two codewords still lie in the whole integer field at the relay. In this case, we can do decoding successfully at the relay.} where $D_u$ is the codeword length, $R_{u,1}\le R_{u,2}\le\dots\le R_{u,L_u-1}$, $u\in\{A,B\}$, and $l=1,\dots, L_u-1$. Note that, both users should apply a same type of channel code, e.g., polar codes, LDPC codes, or convolutional codes, during the lattice construction. In addition, the source information length and coding rate at each level of lattice should be the same for the two users, i.e., $K_{A,l}=K_{B,l}$, and $R_{A,l}=R_{B,l}=R_l$, $\forall l$. As a result, we have $D_A=D_B$. Finally, the transmitted packet $\mv{x}_{u,PNC}$, $u\in\{A,B\}$, is expressed as:
\begin{align}
\mv{x}_{u,PNC}=\mv{c}_{u,1}+\phi\mv{c}_{u,2}+\dots+\phi^{L_u-2}\mv{c}_{u,L_u-1}+\phi^{L_u-1}\mv{b}_{u}. \label{eq:trans}
\end{align}
The length of the transmitted packet $\mv{x}_{u,PNC}$ is $N=D_A=D_B$. We will show how to design the power shaping $\mv{b}_{u}$ later in Section \ref{sec:pw_sp}. In addition, in Fig. \ref{Fig2}, we show an illustrative example of the lattice-based EM at user $A$ when $L_A=3$.
Next, we introduce the decoder at relay $R$. According to \eqref{eq:rec_compen}, the received signal at the relay is
\begin{align}
&\mv{y}_{R,PNC}\nonumber\\
&=\mv{x}_{A,PNC}+\mv{x}_{B,PNC}+\mv{n}_{R,PNC}\nonumber\\
&=(\mv{c}_{A,1}+\mv{c}_{B,1})+\dots+\phi^{L_A-2}(\mv{c}_{A,L_A-1}+\mv{c}_{B,L_B-1})\nonumber\\
&~~+\phi^{L_A-1}(\mv{b}_A+\mv{c}_{B,L_A})+\dots+\phi^{L_B-1}\mv{b}_{B}+\mv{n}_{R,PNC}.\label{eq:rec_compen2}
\end{align}
From \eqref{eq:rec_compen2}, the effective signals $\mv{x}_{A,PNC}+\mv{x}_{B,PNC}$ forms a $L_B$ levels signal at the relay. The relay decodes the superimposed signals between users $A$ and $B$ level-by-level in the lattice, aiming to deduce the network-coded messages from the two end users. The procedures are summarized as follows:
\begin{itemize}
\item \textbf{Decode the network-coded message at level 1}.\\
The decoder at relay $R$ decodes the signal at the first level of the lattice as follows:
\begin{align}
\mv{y}_{R,PNC}^{(1)}={\rm mod}_{\phi}(\mv{y}_{R,PNC}),\label{eq:modu}
\end{align}
where ${\rm mod}_{\phi}(\mv{y}_{R,PNC})$ denotes $\mv{y}_{R,PNC}$ modulo $\phi$. Through the modulo operation in \eqref{eq:modu}, the resulting signal $\mv{y}_{R,PNC}^{(1)}$ only contains information from the first level of lattice, i.e., ${\rm mod}_{\phi}\left(\mv{c}_{A,1}+\mv{c}_{B,1}\right)$, in which the effective information ${\rm mod}_{\phi}\left(\mv{c}_{A,1}+\mv{c}_{B,1}\right)$ is a BPSK modulated signal. Then, $\mv{y}_{R,PNC}^{(1)}$ is sent to the channel decoder at the first level of the lattice to estimate the network-coded source information $\mv{s}_{R,PNC}^{(1)}$. Note that the channel decoder should be well-matched to the channel encoder at the each level of the lattice so that the decoding process can be successful. In addition, at each level of lattice, we directly apply the current PNC channel decoders where BPSK modulation is assumed, e.g., the LDPC channel decoder, convolutional codes channel decoder, and polar codes channel decoder\cite{xie2019polar,yang2014asynchronous,liew2015primer}. To facilitate the decoding process in the rest levels, $\mv{s}_{R,PNC}^{(1)}$ is re-encoded, and the output codeword is $\mv{c}_{R,PNC}^{(1)}$.
\item \textbf{Decode the network-coded message from level 2 to level $L_B-1$ sequentially}.\\
Denote the estimated network-coded source information at level $l$ in the lattice by $\mv{s}_{R,PNC}^{(l)}$, and the corresponding codeword by $\mv{c}_{R,PNC}^{(l)}$, $l=2, \dots, L_B-1$. Then, $\mv{s}_{R,PNC}^{(l)}$ at the level $l$ is computed as follows:
\begin{align}
\mv{y}_{R,PNC}^{(l)}={\rm mod}_{\phi}\left(\hat{\mv{y}}_{R,PNC}^{(l)}\right), l=2, \dots, L_B-1, \label{eq:BAWGN}
\end{align}
where
\begin{align}
&\hat{\mv{y}}_{R,PNC}^{(l)}\nonumber\\
&=\frac{1}{\phi^{l-1}}\left(\mv{y}_{R,PNC}-\mv{c}_{R,PNC}^{(1)}-\dots-\phi^{l-2}\mv{c}_{R,PNC}^{(l-1)}\right)\nonumber\\
&=\frac{1}{\phi^{l-1}}\left(\!\mv{x}_{A,PNC}\!\!+\!\mv{x}_{B,PNC}\!-\!\mv{c}_{R,PNC}^{(1)}\!\!-\!\dots\!\!-\!\phi^{l-2}\mv{c}_{R,PNC}^{(l-1)}\!\right)\nonumber\\
&~~~+\frac{1}{\phi^{l-1}}\mv{n}_{R,PNC}\label{eq:noi}.
\end{align}
The $\mv{y}_{R,PNC}^{(l)}$ contains information of ${\rm mod}_{\phi}\left(\mv{c}_{A,l}+\mv{c}_{B,l}\right)$, and is then sent to the channel decoder at the level $l$ of the lattice to estimate the network-coded source information $\mv{s}_{R,PNC}^{(l)}$. Next, $\mv{s}_{R,PNC}^{(l)}$ is re-encoded through the channel encoder at the level $l$ of the lattice, and the output codeword is $\mv{c}_{R,PNC}^{(l)}$. We compute $\mv{c}_{R,PNC}^{(l)}$ from $l=2$ to $l=L_B-1$ sequentially. In addition, in \eqref{eq:noi}, since $\frac{1}{\phi^{l-1}}\mv{n}_{R,PNC}\sim\mathcal{CN}\left(\mv{0},\frac{1}{2^{l-1}}\sigma^2_{R,PNC}\mv{I}\right)$, the noise power decreases exponentially as $l$. In this case, through the operation in \eqref{eq:BAWGN}, the channel becomes a binary-input AWGN (BAWGN) channel at level $l$, and the capacity of the BAWGN increases as $l$. Thus, we can transmit much more information at higher levels of the lattice. In particular, when the lattice level $l$ is large, the capacity of the BAWGN at the lattice level $l$ can approach to 1.
\end{itemize}
In Fig. \ref{Fig3}, we show the decoding process at relay $R$ when $L_A=3$ and $L_B=4$ as an illustrative example. Last, the relay encodes the estimated network-coded messages, and broadcasts them to the end users.
\begin{figure}[t]
\centering
\includegraphics[scale=0.58]{Figures/Fig3.pdf}\\
\caption{A decoder at relay $R$ when $L_A=3$ and $L_B=4$.}\label{Fig3}
\end{figure}
\subsection{Power Shaping Design}\label{sec:pw_sp}
In this subsection, we show the power shaping design. To make the every dimension of the transmitted signal $\mv{x}_u$ power constrained, $u\in\{A,B\}$, we apply the hypercube power shaping\cite{tan2018mobile} in our PNC lattice construction in \eqref{eq:trans}. Specifically, in \eqref{eq:trans}, denote
\begin{align}
\mv{c}_u=\mv{c}_{u,1}+\phi\mv{c}_{u,2}+\dots+\phi^{L_u-2}\mv{c}_{u,L_u-1}, u\in\{A,B\}.
\end{align}
Then, the hypercube power shaping is expressed as follows:
\begin{align}
\mv{b}_u=\frac{1}{\phi^{L_u-1}}\left({\rm mod}_{\phi^{L_u-1}}\left(\mv{c}_{u}\right)-\mv{c}_{u}\right), u\in\{A,B\}. \label{eq:pw}
\end{align}
In this case, the transmitted packet at user $u$ is
\begin{align}
\mv{x}_{u,PNC}&=\mv{c}_{u,1}+\phi\mv{c}_{u,2}+\dots+\phi^{L_u-2}\mv{c}_{u,L_u-1}+\phi^{L_u-1}\mv{b}_{u}\nonumber\\
&={\rm mod}_{\phi^{L_u-1}}\left(\mv{c}_{u}\right), u\in\{A,B\}.
\end{align}
Thus, the power shaping makes the every dimension of the transmitted signal $\mv{x}_{u,PNC}$ power constrained, $u\in\{A,B\}$. For example, when $L_A=3$, $x_{A,PNC}^{(n)}\in\{0, j, -1, -1-j\}$; when $L_A=4$, $x_{A,PNC}^{(n)}\in\{0, j, -1, -1-j, -j, 1, 1-j, -2j\}$, where $x_{A,PNC}^{(n)}$ is the $n$-th element of $\mv{x}_{A,PNC}$, $n=1,\dots, N$.
In lattice construction, only hypercube power shaping design shown above can make the transmitted signals power constrained for each dimension. The lattice applying hypercube power shaping works well in point to point communications, and in PNC when $L_A=L_B$. However, in PNC when $L_B>L_A$ is studied in this paper, the hypercube power shaping causes decoding failure at the relay for lattice levels $l\ge L_A$ when ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is not a codeword to the codebook at the lattice level $L_A$. Specifically, in \eqref{eq:rec_compen2}, at level $L_A$ in the lattice, the signal $\mv{y}_{R,PNC}^{(L_A)}$ contains information of
\begin{align}
{\rm mod}_{\phi}\left(\mv{b}_A+\mv{c}_{B,L_A}\right)={\rm mod}_{\phi}\left({\rm mod}_{\phi}\left(\mv{b}_A\right)+\mv{c}_{B,L_A}\right).
\end{align}
Based on $\mv{y}_{R,PNC}^{(L_A)}$, the decoder applies channel decoder to recover the signal ${\rm mod}_{\phi}\left(\mv{b}_A+\mv{c}_{B,L_A}\right)$. The problem is, ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ may not be a codeword to the codebook at the lattice level $L_A$, i.e., the channel decoder cannot decode ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ successfully even in the absence of noise. When ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is not a codeword, the superimposed signal ${\rm mod}_{\phi}\left(\mv{b}_A+\mv{c}_{B,L_A}\right)$ may also not a codeword of the codebook at the lattice level $L_A$. Thus, the decoder at the level $L_A$ can not recover ${\rm mod}_{\phi}\left(\mv{b}_A+\mv{c}_{B,L_A}\right)$, even in the absence of noise. Moreover, the decoding errors are propagated to the decoders at the lattice levels $l>L_A$.
To solve the problem, we need to find a way that can not only make the transmitted signal power constrained by applying the power shaping in \eqref{eq:pw}, but also make the decoding in the level $L_A$ successfully. To this end, denote $\mv{c}_{A,L_A}$ a codeword of the codebook at the lattice level $L_A$. In this case, we propose to ask user $A$ to transmit a correction signal $\mv{e}\in\{0,1\}^N$ to the relay beforehand such that
\begin{align}
{\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)={\rm mod}_{\phi}\left(\mv{b}_A-\mv{e}\right).\label{eq:bsc}
\end{align}
Then, users $A$ and $B$ transmit their signals to the relay simultaneously. Upon receiving the superimposed signals $\mv{y}_{R,PNC}$ as shown in \eqref{eq:rec_compen2}, the correction signal $\mv{e}\in\{0,1\}^N$ is subtracted from $\mv{y}_{R,PNC}$, and the resulting signal is
\begin{align}
&\hat{\mv{y}}_{R,PNC}\nonumber\\
&=\mv{y}_{R,PNC}-\phi^{L_A-1}\mv{e}\nonumber\\
&=\mv{x}_{A,PNC}+\mv{x}_{B,PNC}-\phi^{L_A-1}\mv{e}+\mv{n}_{R,PNC}\nonumber\\
&=(\mv{c}_{A,1}+\mv{c}_{B,1})+\dots+\phi^{L_A-2}(\mv{c}_{A,L_A-1}+\mv{c}_{B,L_A-1})\nonumber\\
&~~~~+\phi^{L_A-1}(\mv{b}_{A}-\mv{e}+\mv{c}_{B,L_A})+\dots+\phi^{L_B-1}\mv{b}_{B}+\mv{n}_{R,PNC}.\label{eq:rec_compen3}
\end{align}
In this case, at the level $L_A$, according to \eqref{eq:bsc}, since
\begin{align}
{\rm mod}_{\phi}\left(\mv{b}_{A}-\mv{e}+\mv{c}_{B,L_A}\right)={\rm mod}_{\phi}\left(\mv{c}_{A,L_A}+\mv{c}_{B,L_A}\right)
\end{align}
is a codeword to the codebook at the lattice level $L_A$, the decoder can recover ${\rm mod}_{\phi}\left(\mv{c}_{A,L_A}+\mv{c}_{B,L_A}\right)$ successfully through the decoding and encoding process. In this case, the transmitted signals at the two users are power constrained, and the relay can decode the superimposed signals successfully. There are two problems to be solved:
\underline{\emph{A: Find a codeword around the hypercube power shaping.}} From \eqref{eq:bsc}, we have
\begin{align}
{\rm mod}_{\phi}\left(\mv{b}_A\right)={\rm mod}_{\phi}\left({\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)+\mv{e}\right).\label{eq:bsc1.1}
\end{align}
We can imagine that the codeword ${\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)$ goes through a binary symmetric channel (BSC) with bit flipping probability $p$, the correction signal $\mv{e}$ is the corresponding BSC noise, and ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is the output of the BSC channel. The capacity $C_{BSC}$ of the BSC is\cite{cover1999elements}
\begin{align}
C_{BSC}=1-H(p), \label{eq:bscc}
\end{align}
where
\begin{align}
H(p)=-p\log_2(p)-(1-p)\log_2(1-p),\label{eq:entro}
\end{align}
is binary entropy function. To find the codeword $\mv{c}_{A,L_A}$, we send ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ to the BSC channel decoder with the output source information $\mv{s}_{A,L_A}$. The BSC channel decoder is similar to the channel decoder at the lattice level $L_A$, and the only difference is that the channel decoder is constructed under binary AWGN channel, while the BSC channel decoder is constructed under BSC channel. The source information $\mv{s}_{A,L_A}$ is then re-encoded, with output codeword $\mv{c}_{A,L_A}$. The correction signal (i.e., the BSC noise) $\mv{e}$ is
\begin{align}
\mv{e}={\rm mod}_{\phi}\left(\mv{b}_A-\mv{c}_{A,L_A}\right). \label{eq:bsc2}
\end{align}
The above decoding process, i.e., finding ${\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)$ from ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ with $\mv{e}$ being the noise vector, can be interpreted as a lossy compression process. We denote the space ${\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)$ lies in by $\{0,1\}^{K_{L_A}}$, i.e., the dimension of the space is $K_{L_A}$ although the length of the codeword $\mv{c}_{A,L_A}$ is $N$, and the space ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ lies in by $\{0,1\}^{N}$. In this case, the BSC decoding process actually compresses the space $\{0,1\}^{N}$ to the space $\{0,1\}^{K_{L_A}}$. Ref. \cite{korada2010polar} proves that, as $N$ goes to infinity, for the lossy compression under the measure of Hamming distortion, the optimal compression rate can be expressed as
\begin{align}
\frac{K_{L_A}}{N}=R_{L_A}=1-H(p), \label{eq:Compre_rate}
\end{align}
where $H(p)$ is the entropy of $\mv{e}$. In this case, we can determine the flipping probability according to
\eqref{eq:Compre_rate}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.62]{Figures/Source-coding-rate.pdf}\\
\caption{Compression rate $R_c$ over flipping probability $p$ for different $N$. }\label{Fig4}
\end{figure}
\underline{\emph{B: Compress signal in \eqref{eq:bsc2} by polar source coding.}} To facilitate the decoding process in the relay as shown in \eqref{eq:rec_compen3}, we need to transmit the correction signal $\mv{e}$ in \eqref{eq:bsc2} to the relay. However, if we ask the user $A$ to transmit the correction signal $\mv{e}$ with length $K_{e}=N$ directly, the time saved through the asymmetric PNC transmission will be canceled out by the correction signal transmission. Fortunately, according to \eqref{eq:Compre_rate}, if the rate $R_{L_A}$ is large, then the entropy of $\mv{e}$ would be small. In this case, we can apply the lossless polar source coding\cite{arikan2010source} to compress the correction signal $\mv{e}$. Specifically, according to \cite{arikan2010source}, as $N$ goes to infinity, the compression rate is $H(p)$ shown in \eqref{eq:entro}. In this case, we can transmit the compressed correction signal $\hat{\mv{e}}$ with the length $K_{\hat{\mv{e}}}=NH(p)$ instead of the original correction signal $\mv{e}$ with length $K_{\mv{e}}=N$, greatly saving the correction signal transmission time. In practice, for $N$ is finite, we apply the lossless polar source coding algorithm proposed in \cite{cronie2010lossless}. According to the algorithm, we can perfectly recover $\mv{e}$ from $\hat{\mv{e}}$, and $\mv{e}$ is plugged into \eqref{eq:rec_compen3} for PNC decoding. The algorithm details are omitted.
In Fig. \ref{Fig4}, we show the compression rate
\begin{align}
R_c=\frac{K_{\hat{\mv{e}}}}{N}
\end{align}
The theoretical limit is $R_c=H(p)$ shown in\cite{arikan2010source}, and the other two lines show the results in \cite{cronie2010lossless} for packet length $N=256$ and $N=1024$. Fig. \ref{Fig4} shows that, when the flipping probability is small, we can reduce the length of the correction signal $\mv{e}$ significantly by applying the lossless polar source coding. In addition, as the packet length $N$ becomes large, the compression rate in \cite{cronie2010lossless} approaches to the theoretical limit.
\begin{figure}[t]
\centering
\includegraphics[scale=0.6]{Figures/Fig1_3.pdf}\\
\caption{Overall asymmetric transmission scheme with correction signal transmission taken into account.}\label{Fig1_3}
\end{figure}
\subsection{Overall Asymmetric Transmission Scheme}\label{sec:overall}
The overall asymmetric transmission scheme is shown in Fig. \ref{Fig1_3}. The signal transmission processes are detailed as follows.
\underline{\emph{Time slot 0: Compressed correction signal $\hat{\mv{e}}$ transmission.}} The user $A$ first computes the correction signal $\mv{e}$ according to the method introduced in Section \ref{sec:pw_sp}, then compresses the correction signal by applying lossless polar source coding according to the algorithm in \cite{cronie2010lossless}. Next, user $A$ transmits the compressed correction signal to the relay. We assume that the user $A$ applies an EM with coding rate $R_{A,P2P}$ and modulator order $M_A$ to transmit the source information $\hat{\mv{e}}$. The modulator order is restricted by the weaker channel $h_A$ to achieve a targeted FER. The transmit packet is $\mv{x}_{A,P2P}$, and duration of the correction signal transmission is
\begin{align}
T_{\hat{\mv{e}}}=\frac{K_{\hat{\mv{e}}}}{R_{A,P2P}M_AW}.
\end{align}
At the relay $R$, the received signal is
\begin{align}
\mv{y}_{R,P2P}=\mv{x}_{A,P2P}+\mv{n}_{R,P2P},
\end{align}
where $\mv{n}_{R,P2P}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{R,P2P}\mv{I}\right)$ denotes the additive white Gaussian noise (AWGN) at the relay in the P2P phase. Note that, the channel $h_A$ has been compensated at the relay. The decoder at the relay $R$ first decodes the compressed correction signal $\hat{\mv{e}}$, and then decompressed it to recover the original correction signal $\mv{e}$ by applying the algorithm in \cite{cronie2010lossless}.
\underline{\emph{Time slot 1: Uplink PNC transmission.}}
The encoding and modulation processes are the same as that introduced in Section \ref{sec:asy}. To solve the problem that the users $A$ and $B$ can transmit different amount of information, we apply the lattice-based EM shown in Section \ref{sec:lattice}. In addition, to make the decoding at the relay successfully, the estimated correction signal is subtracted from the received signal, and the resulting received signal is shown in \eqref{eq:rec_compen3}. Moreover, we apply the lattice-based channel-decoder-and-demodulator to estimate the network-coded messages shown in \ref{sec:lattice}.
\underline{\emph{Time slot 2: Downlink PNC transmission.}} The encoding and decoding processes are the same as that introduced in Section \ref{sec:asy}.
In this case, the total transmission time of the asymmetric transmission scheme in \eqref{eq:time-asy} is rewritten as
\begin{align}
&\hat{T}^{(Asy)}\nonumber\\
&=T_1^{(Asy)}+T_2^{(Asy)}+T_{\hat{\mv{e}}}\nonumber\\
&=\frac{K_A}{R_{A,PNC}M_AW}+\frac{K_B}{R_{R,PNC}M_AW}+\frac{K_{\hat{\mv{e}}}}{R_{A,P2P}M_AW}.\label{eq:time-asy2}
\end{align}
If we set $R_{R,PNC}=R_{R,P2P}$, from \eqref{eq:time-sy} and \eqref{eq:time-asy2}, we have
\begin{align}
T^{(Sym)}-\hat{T}^{(Asy)}&=T^{(Sym)}_3-T_{\hat{\mv{e}}}\nonumber\\
&=\frac{K_B-K_A}{R_{B,P2P}M_BW}-\frac{K_{\hat{\mv{e}}}}{R_{A,P2P}M_AW}. \label{eq:com}
\end{align}
\begin{remark}\label{R1}
As we discussed in Section \ref{sec:lattice}, as the increase of the lattice level $l$, the capacity of the BAWGN increases even approaching to 1. In this case, the coding rate $R_{L_A}$ can approach to 1 potentially. Then, according to \eqref{eq:Compre_rate}, we know that $H(p)$ approaches to zero as the increase of the lattice level. In this case, we can compress the signal $\mv{e}$ to $\hat{\mv{e}}$ with length $K_{\hat{\mv{e}}}=NH(p)$ approaching to zero when $L_A$ is large enough, and the correction signal transmission time $T_{\hat{\mv{e}}}$ can be far smaller than $T^{(Sym)}_3$. In particular, if the coding rate $R_{L_A}=1$, we have $T_{\hat{\mv{e}}}=0$. We show this case though the example when user $A$ applies 3-order modulation, and user $B$ applies 4-order modulation in Section \ref{sec:nu}. Moreover, to make the study of the asymmetric comprehensive, we also consider the case when the coding rate $R_{L_A}$ is not close to 1. In this case, the length of the compressed correction signal $\hat{\mv{e}}$ would be large, and may leading to the transmission time $T_{\hat{\mv{e}}}$ larger than $T^{(Sym)}_3$. In this case, the throughput of the proposed asymmetric transmission scheme may be smaller than that of the symmetric transmission. We solve this problem in Section \ref{sec:dy}.
\end{remark}
\subsection{ Discussions on the Lattice Decoder in Section \ref{sec:lattice}}
In the following, we briefly discuss some theoretical analysis on the lattice decoder shown in Section \ref{sec:lattice}. First, we discuss the decoding complexity. Let $D$ denote the overall decoding complexity of the lattice decoder shown in Section \ref{sec:lattice}, and $D_l$ denote the decoding complexity at the $l$-th lattice level, $l=1,\dots, L_{B}-1$. Since the decoding is implemented layer-by-layer, the overall decoding complexity is
\begin{align}
D=D_1+\dots+D_{L_B-1}.
\end{align}
When we apply polar codes to the lattice-based encoder, since the decoding complexity of the polar codes at the $l$-th level of the lattice is $D_l=\mathcal{O}\left(N\log_2N\right)$, $l=1,\dots, L_B-1$\cite{arikan2009channel}, the overall decoding complexity is $D=\mathcal{O}\left((L_B-1)N\log_2N\right)$. Similarly, we can also compute the decoding complexity when we apply other channel codes to the lattice-based encoder and decoder. We omit the details here.
Second, we discuss the decoding properties of the lattice decoder at the relay. As we show in Section \ref{sec:overall}, the relay begins to decode the PNC signals after the decoding of the correction signals $\mv{e}$. In the case the correction signal $\mv{e}$ is correctly decoded at the relay, the effective received signal $\mv{x}_{A,PNC}+\mv{x}_{B,PNC}-\phi^{L_A-1}\mv{e}$ forms a lattice, whose decoding process is similar to that in the point-to-point system, except that the decoder output in PNC is the network-coded messages. In this case, we can study the properties of the decoder by applying the tools in lattice. Currently, there are lots of studies on the decoding properties of the lattice in a point-to-point system. For example, the upper bound of decoding FER of the lattice was shown in \cite{liu2018construction} when applying polar codes; the coding gain of the lattice, and the trade-off between the coding and FER was shown in \cite{forney2000sphere}. These properties can be applied to the PNC systems. However, in general, the correction signal $\mv{e}$ may not be correctly decoded at the relay. In the case the correction signal is not correctly decoded, the signal $(\mv{b_A}-\mv{e})$ is not a codeword of the codebook at the lattice level $L_A$, and thus the effective received signal $\mv{x}_{A,PNC}+\mv{x}_{B,PNC}-\phi^{L_A-1}\mv{e}$ is not a lattice\footnote{In this case, we still name the decoder as the ``lattice decoder''.}. In particular, the first $L_A-1$ levels of the effective received signals are nested with each other, but they are not nested with the rest of levels of the effective received signals. In this case, the analysis of the decoding FER and coding gain is difficult since the structure of the received signals is quite complicated. We leave this as a future work to further explore.
\begin{table*}[t]\centering
\caption{ Rate Setup When $K_B$=537 bits}\label{T_A1}
\begin{tabular}{|c|c|c|c|c|c|c|c|c|c|}
\hline
Scheme & \begin{tabular}[c]{@{}c@{}}Time \\ Slot\end{tabular} & User & \begin{tabular}[c]{@{}c@{}}Modulation \\ Order\end{tabular} & EM Scheme & $R_1$ & $R_2$ & $R_3$ & $R_4$ & \begin{tabular}[c]{@{}c@{}}Overall Rate in \\ This Time Slot\end{tabular} \\ \hline\hline
\multirow{3}{*}{\begin{tabular}[c]{@{}c@{}}ALEM with \\ $K_B$=537 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \cline{3-10}
& & $B$ & 4 & Lattice & 0.003 & 0.45 & 0.65 & 1 & 0.53 \\ \cline{2-10}
& 2 & $Relay$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \hline\hline
\multirow{5}{*}{\begin{tabular}[c]{@{}c@{}}SLEM with \\ $K_B$=537 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \cline{3-10}
& & $B$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \cline{2-10}
& 2 & $Relay$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \cline{2-10}
& 3 & $B$ & 4 & Lattice & 0.003 & 0.45 & 0.65 & 1 & 0.53 \\ \cline{2-10}
& 4 & $Relay$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \hline\hline
\multirow{5}{*}{\begin{tabular}[c]{@{}c@{}}STEM with \\ $K_B$=537 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & Polar codes and 8QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.37 \\ \cline{3-10}
& & $B$ & 3 & Polar codes and 8QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.37 \\ \cline{2-10}
& 2 & $Relay$ & 3 & Polar codes and 8QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.37 \\ \cline{2-10}
& 3 & $B$ & 4 & Polar codes and 16QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.53 \\ \cline{2-10}
& 4 & $Relay$ & 3 & Polar codes and 8QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.37 \\ \hline
\end{tabular}
\end{table*}
\section{Numerical Results}\label{sec:nu}
In this section, we evaluate performance of the transmission schemes introduced in Section \ref{sec:asy}. In the simulations, we assume that the modulation orders $M_A=3$, and $M_B=4$, i.e., the channel $h_A$ can support user $A$ to transmit signals with modulation order of 3, and the channel $h_B$ can support user $B$ to transmit signals with modulation order of 4. In addition, as an example, we apply the polar codes in the asymmetric and symmetric schemes for data protection. The results of this section can be extended to the case where other channel codes are applied. We omit the details here.
For the proposed asymmetric transmission scheme, we apply the lattice-based EM shown in Section \ref{sec:en-de}, for uplink and downlink PNC transmissions, and for the correction signal $\hat{\mv{e}}$ transmission. Note that the downlink PNC transmission and the correction signal transmission are simple P2P transmissions, and the lattice-based encoding and decoding algorithms shown in Section \ref{sec:en-de} can be similarly applied. We denote this scheme by ``\textbf{Asymmetric transmission applying Lattice-based EM (ALEM)}''. We have the following two benchmarks:
\begin{itemize}
\item \textbf{Symmetric transmission applying Lattice-based EM (SLEM):}
We apply the lattice-based EM both for uplink and downlink transmissions in time slots 1 to 4. Specifically, in time slot 1, i.e., the uplink of PNC transmission, the lattice encoding and decoding processes can apply the algorithm shown in Section \ref{sec:lattice} by setting $L_A=L_B$ additionally. In addition, the transmissions in time slots 2-4 are simple P2P transmissions, and the lattice-based encoding and decoding algorithms shown in Section \ref{sec:en-de} can be applied similarly.
\item \textbf{Symmetric transmission applying Traditional EM (STEM):} Unlike SLEM above, in this symmetric transmission scheme here, we apply a traditional EM in which the channel encoding and modulation are two separate processes, instead of the joint encoding and modulation as in the lattice-based EM. In addition, in the uplink of PNC, the relay applies a XOR channel decoder\cite{liew2015primer} to decode the network-coded messages from the two users.
\end{itemize}
We evaluate the performance in terms of throughput and FER of user $B$. The throughput is defined as follows:
\begin{align}
{\rm Throughput}=\frac{P_BK_B}{T} ~~ bps,
\end{align}
where $P_B$ is the number of times that the whole $K_B$ source bits are successfully decoded at user $A$ within $T$ duration. Note that, for the symmetric transmission scheme shown in Section \ref{sec:sy}, the $K_B$ information bits are transmitted partially in PNC phase (time slots 1 and 2), and partially in P2P phase (time slots 3 and 4). So the successful decoding of the $K_B$ source bits requires the successful decoding both at time slot 2 and time slot 4 at user $A$. The unit of the throughput is bits per second (bps). In addition, the bandwidth is 1 $M$ symbols/second. The FER is defined as follows:
\begin{align}
{\rm FER}=1-\frac{P_B}{\bar{P}_B},
\end{align}
where $\bar{P}_B$ is the number of times that $K_B$ source bits are decoded at user $A$ within $T$ duration. Moreover, the SNR is defined as
\begin{align}
SNR=\frac{p_AN}{K_AN_0}~~dB\label{eq:SNR},
\end{align}
where $N_0=2\sigma^2_{R,PNC}$ is the noise power, and $N$ is the packet length in time slot 1 for both schemes. In the simulations, we set $N=256$.
\subsection{Performance When ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a Codeword}\label{sec:hy}
In the asymmetric transmissions in which $L_A<L_B$, Section \ref{sec:pw_sp} shows that the hypercube power shaping $\mv{b}_A$ may cause decoding failures at the relay when ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is not a codeword to the codebook at the lattice level $L_A$. In this subsection, we first evaluate the performance of the asymmetric transmission in which ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a codeword to the codebook at the lattice level $L_A$ by simply setting the rate in lattice level-$L_A$ as 1, i.e., $R_{L_A}=1$. In this case, since the codebook in lattice level-$L_A$ is exactly the space $\{0,1\}^N$, ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a legal codeword to the codebook. As a result, we do not need to transmit the correction signal $\mv{e}$ in the asymmetric transmissions. The results are shown in Figs. \ref{Fig6} and \ref{Fig6_1}. Let us first introduce the legends in the figures as follows:
\begin{itemize}
\item \textbf{ALEM with $K_B=537$ bits:} The uplink and downlink rate setups are shown in TABLE \ref{T_A1}. Since $N=256$, user $B$ transmits $K_B=537$ bits in total.
\item \textbf{SLEM/STEM with $K_B=537$ bits:} The rate setups of the four time slots are shown in TABLE \ref{T_A1}. Since $N=256$, user $B$ transmits 281 bits in time slot 1. In time slot 3, the user $B$ transmits 256 bits to the relay separately. Thus, user $B$ transmits $K_B=537$ bits in total.
\item \textbf{ALEM/SLEM with $K_B=588$ bits:} The setup is the same as ``ALEM/SLEM with $K_B=537$ bits'' except that the coding rate $R_3=0.85$.
\item \textbf{STEM with $K_B=588$ bits:} The setup is the same as ``STEM with $K_B=537$ bits'' except that the coding rates in time slots 1, 2, 4, are all $0.43$, and the coding rate in time slot 3 is 0.58.
\item \textbf{ALEM/SLEM with $K_B=639$ bits:} The setup is the same as ``ALEM/SLEM with $K_B=537$ bits'' except that the coding rates $R_2=0.55$ and $R_3=0.95$.
\item \textbf{STEM with $K_B=639$ bits:} The setup is the same as ``STEM with $K_B=537$ bits'' except that the coding rates in time slots 1, 2, 4, are all $0.50$, and the coding rate in time slot 3 is 0.63.
\end{itemize}
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_1FER.pdf}\\
\caption{FER comparison when ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a legal codeword.}\label{Fig6}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_1Thpt.pdf}\\
\caption{Throughput comparison when ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a legal codeword.}\label{Fig6_1}
\end{figure}
We first compare the performance of ALEM and SLEM. First, Fig. \ref{Fig6} shows that for the same amount of the transmitted bits $K_B$, the FERs of ALEM and SLEM are roughly the same. Second, Fig. \ref{Fig6_1} shows that, in terms of throughput, ALEM performs much better than SLEM. For example, when $SNR=8$ dB and $K_B=639$ bits, ALEM has 15\% throughput improvement compared with that of SLEM. It suggests that, our proposed asymmetric transmission scheme has significant throughput improvement compared with that of the symmetric transmission, since the asymmetric transmission scheme saves the transmission time greatly. We emphasize that the ALEM achieves the above throughput improvement by simply setting the coding rate $R_{L_A}=1$.
Next, we compare the performance of SLEM and STEM. First, from Fig. \ref{Fig6}, for a given FER, SLEM performs 6 dB better than that of STEM. The reasons mainly come from the different PNC decoders at the relay between SLEM and STEM. Specifically, from the decoding process detailed in Section \ref{sec:lattice}, for SLEM the signals fed to the PNC decoder at each level of the lattice are BPSK-modulated signals through the modulo $\phi$ operation, while for STEM the signals fed to the PNC detector are 8QAM modulated signals. For a given SNR, the PNC detector for low-order modulated signals has better FER performance than that for high-order modulated signals\cite{liew2015primer}. For example, the detector for BPSK-modulated signals performs much better than the detector for 8QAM-modulated signals in terms of FER. As a result, SLEM performs better than STEM. Second, from Fig. \ref{Fig6_1}, the throughput of SLEM is much higher than that of STEM, since the FER of SLEM is much lower than that of STEM.
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_2FER.pdf}\\
\caption{FER comparison for general hypercube power shaping.}\label{Fig7}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_2Thpt.pdf}\\
\caption{Throughput comparison for general hypercube power shaping.}\label{Fig8}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[scale=0.41]{Figures/Time_2.pdf}\\
\caption{$T^{(Sym)}_3$ and $T_{\hat{\mv{e}}}$ comparison over different $K_B$. In ALEM, we plot the time $T_{\hat{\mv{e}}}$ for $K_B=385$ bits and $K_B=472$ bits; in SLEM, we plot the time $T_3^{(sym)}$ for $K_B=385$ bits and $K_B=472$ bits.}\label{Fig9}
\end{figure}
\begin{table*}[]\centering
\caption{Rate Setup When $K_B$=385 bits}\label{T_B1}
\vspace{-1em}
\begin{tabular}{|c|c|c|c|c|c|c|c|}
\hline
Scheme & \begin{tabular}[c]{@{}c@{}}Time \\ Slot\end{tabular} & User & \begin{tabular}[c]{@{}c@{}}Modulation \\ Order\end{tabular} & $R_1$ & $R_2$ & $R_3$ & $R_4$ \\ \hline\hline
\multicolumn{1}{|l|}{\multirow{4}{*}{\begin{tabular}[c]{@{}l@{}}ALEM with \\ $K_B$=385 bits\end{tabular}}} & 0 & $A$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{2-8}
\multicolumn{1}{|l|}{} & \multirow{2}{*}{1} & $A$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{3-8}
\multicolumn{1}{|l|}{} & & $B$ & 4 & 0.003 & 0.40 & 0.55 & 0.56 \\ \cline{2-8}
\multicolumn{1}{|l|}{} & 2 & $Relay$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \hline\hline
\multirow{5}{*}{\begin{tabular}[c]{@{}c@{}}SLEM with \\ $K_B$=385 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{3-8}
& & $B$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{2-8}
& 2 & $Relay$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{2-8}
& 3 & $B$ & 4 & 0.003 & 0.40 & 0.55 & 0.56 \\ \cline{2-8}
& 4 & $Relay$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \hline
\end{tabular}
\end{table*}
\subsection{Performance for General Hypercube Power Shaping}\label{sec:gen}
We next show the simulation results for general hypercube power shaping in Figs.\ref{Fig7}-\ref{Fig9}. Note that, for general hypercube power shaping, ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ may not be a codeword to the codebook at the lattice level $L_A$. In this case, user $A$ may need to send a correction signal to the relay beforehand. Let us first introduce the legends in the figure, as follows:
\begin{itemize}
\item \textbf{ALEM with $K_B=385$ bits:} User $A$ first transmits the compressed correction signal $\hat{\mv{e}}$ to the relay in time slot 0. The rate setup is shown in TABLE \ref{T_B1}. Since $N=256$, user $B$ transmits $K_B=385$ bits in total.
\item \textbf{SLEM with $K_B=385$ bits:} The rates setup is shown in TABLE \ref{T_B1}. Since $N=256$, user $B$ transmits 68 bits in time slot 1. In time slot 3, the user $B$ transmits 317 bits to the relay separately. Thus, user $B$ transmits $K_B=385$ bits in total.
\item \textbf{ALEM/SLEM with $K_B=472$ bits:} The setup is the same as ``ALEM/SLEM with $K_B=385$ bits'' except that the coding rate $R_4=0.90$.
\end{itemize}
\begin{figure}[ht]
\centering
\includegraphics[scale=0.61]{Figures/offset_Thpt.pdf}\\
\caption{ Throughput penalty when the channel precoding is not perfect.}\label{Fig11}
\end{figure}
First, from Fig. \ref{Fig7} we obverse that ALEM and SLEM perform relative the same in terms of FER. Second, Fig. \ref{Fig8} shows that in terms of throughput, when $K_B=472$ bits ALEM outperforms SLEM, while when $K_B=385$ bits SLEM outperforms ALEM. Since the FERs of the two schemes are roughly the same, this phenomenon is due to the transmission time $T^{(Sym)}$ of SLEM, and the transmission time $\hat{T}^{(Asy)}$ of ALEM. Specifically, according to \eqref{eq:com}, we have $T^{(Sym)}-\hat{T}^{(Asy)}=T^{(Sym)}_3-T_{\hat{\mv{e}}}$. In this case, in Fig. \ref{Fig9} we compare the correction signal transmission time $T_{\hat{\mv{e}}}$ and the duration of the third time slot $T^{(Sym)}_3$ over different $K_B$ for 50 Monte Carlo simulations. When $K_B=472$ bits, we observe from Fig. \ref{Fig9} that $T_{\hat{\mv{e}}}<T^{(Sym)}_3$. As a result, from \eqref{eq:com} we have $\hat{T}^{(Asy)}<T^{(Sym)}$. In this case, for a relatively same FER, the throughput of ALEM is higher than that of SLEM; on the other hand, when $K_B=385$ bits, we observe from Fig. \ref{Fig9} that $T_{\hat{\mv{e}}}>T^{(Sym)}_3$. As a result, from \eqref{eq:com} we have $\hat{T}^{(Asy)}>T^{(Sym)}$. In this case, for a relatively same FER, the throughput of SLEM is higher than that of ALEM. In Section \ref{sec:dy}, we will solve this problem by proposing a dynamic transmission scheme. In addition, from Fig. \ref{Fig7}, benchmarked against the uncoded lattice, we can see that the ALEM has 3dB coding gain at $10^{-3}$ when the correction signal error is taken into account.
\subsection{Performance Penalty for Imperfect Channel Precoding}
\begin{table*}[h]\centering
\caption{Rate Setup When $K_B$=614 bits}\label{T_B3}
\vspace{-1em}
\begin{tabular}{|c|c|c|c|c|c|c|c|}
\hline
Scheme & \begin{tabular}[c]{@{}c@{}}Time \\ Slot\end{tabular} & User & \begin{tabular}[c]{@{}c@{}}Modulation \\ Order\end{tabular} & $R_1$ & $R_2$ & $R_3$ & $R_4$ \\ \hline\hline
\multirow{3}{*}{\begin{tabular}[c]{@{}c@{}}ALEM with \\ $K_B$=614 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & 0.003 & 0.45 & 0.95 & \textbackslash{} \\ \cline{3-8}
& & $B$ & 4 & 0.003 & 0.45 & 0.95 & 1 \\ \cline{2-8}
& 2 & $Relay$ & 3 & 0.003 & 0.45 & 0.95 & \textbackslash{} \\ \hline
\end{tabular}
\end{table*}
In this subsection, we evaluate the performance when the channel precoding conditions in \eqref{eq:c1} and \eqref{eq:c2} are not strictly satisfied. We define the channel gain compensation offset as:
\begin{align}
O_{pw}=\frac{|h_B||\beta_B|\sqrt{p_A}}{|h_A||\beta_A|\sqrt{p_B}},
\end{align}
and the channel phase compensation offset as:
\begin{align}
O_{ph}=\theta_{\beta_B}+\theta_{h_B}-\theta_{\beta_A}-\theta_{h_A}.
\end{align}
Note that, in PNC, only $O_{pw}$ and $O_{ph}$ affect the performance, not the individual $\frac{|h_u||\beta_u|}{\sqrt{p_u}}$ and $\theta_{\beta_u}+\theta_{h_u}$, $u\in\{A,B\}$. In Fig. \ref{Fig11}, we show the throughput performance of ALEM under different $O_{pw}$ and $O_{ph}$. The parameters of ALEM is shown in TABLE \ref{T_B3}. First, when $O_{pw}\le1.1$ or $O_{ph}\le0.025\pi$, we observe from Fig. \ref{Fig11} that the performance penalty is quite small. Second, when $O_{pw}=1.15$ or $O_{ph}=0.05\pi$, Fig. \ref{Fig11} shows that the throughput penalty is 1dB when SNR is low, and the penalty can be ignored when $SNR=8$ dB. We emphasize that, the tested power offsets and phase offsets are based on the channel precoding precision in a lattice-based PNC implementation paper\cite{tan2018mobile}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_3Thpt.pdf}\\
\caption{Throughput comparison between DLEM, ALEM, and SLEM for general hypercube power shaping.}\label{Fig10}
\end{figure}
\section{Dynamic Transmission Scheme}\label{sec:dy}
As we shown in Section \ref{sec:gen}, when the coding rate $R_{L_A}$ is far smaller than 1, the symmetric transmission may perform better than that of the asymmetric transmission since $T_{\hat{\mv{e}}}$ may be larger than $T^{(Sym)}_3$. In this case, if we insist on the asymmetric PNC transmission at all, we will not achieve the optimal throughput in the end since sometimes the symmetric transmission scheme performs better. To solve the above problem, we propose to ask the relay $R$ to choose the two schemes dynamically based on the values of $T_{\hat{\mv{e}}}$ and $T^{(Sym)}_3$ so that the dynamic transmission scheme can always achieve the better performance between ALEM and SLEM. Specifically, if $T^{(Sym)}_3\le T_{\hat{\mv{e}}}$, then the symmetric transmission scheme is selected; otherwise, the asymmetric transmission scheme is selected. We denote this scheme by ``\textbf{Dynamic transmission scheme applying Lattice-based EM (DLEM)}''. The simulation results are shown in Fig. \ref{Fig10}. Let us first introduce the legends as follows.
\begin{itemize}
\item \textbf{DLEM with $K_B=385/472$ bits:} The relay dynamic selects the scheme between ALEM and SLEM according to the values $T_{\hat{\mv{e}}}$ and $T_3^{(Sym)}$. The parameters of ALEM/SLEM with $K_B=385/472$ bits are introduced in Section \ref{sec:gen}.
\end{itemize}
Fig. \ref{Fig10} shows the throughput comparison between DLEM and ALEM/SLEM. From Fig. \ref{Fig10}, DLEM can always achieve the better performance between SLEM and ALEM over different rate setups, since DLEM always chooses the scheme with smaller transmission time.
\section{Conclusion}\label{sec:con}
This paper studied an asymmetric transmission scheme in PNC in which users $A$ and $B$ transmit different amount of information in the uplink of PNC simultaneously. A key challenge is how to implement channel coding and modulation in asymmetric PNC transmission such that the relay can deduce network-coded messages correctly from the two users. To solve this problem, we first proposed a lattice-based EM in which the two users encode and modulate their information in lattices with different lattice levels. In addition, we find that the applied hypercube power shaping causes decoding failures at the relay. We solved this problem by asking user $A$ to transmit a correction signal beforehand such that the difference between the power shaping and the correction signal is a legal codeword. Last, to reduce the correction signal transmission time, we applied the polar source coding technique to compress the correction signal, and user $A$ can transmit the compressed correction signal instead. We find that the polar source coding technique can efficiently reduce the correction signal transmission time when the channel coding rate at lattice level $L_A$ is close to 1. However, when channel coding rate at lattice level $L_A$ is not close to 1, the overall asymmetric transmission time may be larger than the symmetric time. To solve this problem, we put forth a dynamic transmission scheme in which the relay dynamically selects one of the transmission schemes which has smaller transmission time. Numerical results demonstrate the effectiveness of the proposed schemes.
\bibliographystyle{IEEEtran}
\section{Introduction}\label{sec:Introduction}
In this paper, we focus on a scenario in Industrial Internet of Things (IIoT) where a controller and a robot are out of each other's transmission range, and they exchange messages with the assistance of a relay\cite{varga20205g,sisinni2018industrial,yamamoto2018multi,kagawa2017study}. To achieve the stringent requirement on the communication latency between the robot and controller in IIoT, we apply physical layer network coding (PNC)\cite{zhang2006hot,popovski2007physical}, as shown in Fig. \ref{Fig1_1}. Specifically, at time slot 1, the controller and robot transmit their messages simultaneously to the relay. From the overlapped signals, the relay deduces a network-coded message. At time slot 2, the relay broadcasts the network-coded message to the controller and robot. The robot then uses the network-coded message and its own message to deduce the message from the controller. Likewise for the controller. Compared with the traditional scheme which requires four times slots for the communications between the robot and controller, PNC can reduce the communication latency from four time slots to two time slots\cite{zhang2006hot,popovski2007physical}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.58]{Figures/Fig1_1.pdf}\\
\caption{A controller and a robot are out of each other's transmission range, and they exchange messages with the assistance of a relay. The PNC technique is applied to reduce the communication latency.}\label{Fig1_1}
\end{figure}
Within the robot and controller communication scenario, we are particularly interested in the case where 1) the message length from the controller is longer than that from the robot. For example, the controller controls motion of the robot through a series of instructions, while the robot only needs to feed back a one-bit acknowledgment to indicate if the robot executes the instructions correctly; 2) the controller and robot have nearly the same transmit power, while the channel power between the controller and relay, is larger than that between the robot and relay. For example, the channel between the controller and relay is a line-of-sight channel, while the channel between the robot and relay is a non-line-of-sight channel due to the equipment around the robot which creates multipaths and in turn causes channel fading. Another example is, due to the mobility of the robot, the distance between relay and robot could be larger than the distance between relay and controller. In this case, the path loss of the relay-robot channel is larger than that of the relay-controller channel.
Most of the current channel-coded PNC studies are based on a pioneering work \cite{popovski2007physical}, which showed that as long as the amounts of the information from the two users are the same, the XOR of the two linear codewords from the two users is still a valid codeword at the relay. Currently, nearly all the PNC channel encoding and decoding techniques were developed over this requirement\cite{zhang2009channel,huang2013design,yang2015achieving,wang2019signal,shi2016subtleties,shi2017complex,wangnoncoherent}, although sometimes the channel power between the controller and relay is larger than that between the robot and relay. In this case, within our considered scenario, if we apply the current PNC techniques, the controller should use another time slot to transmit the additional information to the robot separately.
In this paper, to further reduce the communication latency, we put forth an ``asymmetric transmission scheme'' where the controller can transmit more information than the robot by exploiting its stronger channel gain in the uplink of PNC. In this case, we cannot apply the current PNC channel decoding techniques which require the both users transmit the same amount of information. For example, the robot transmits a QPSK modulated packet. Since the channel between the controller and relay is stronger, we assume that the controller transmits a 8-QAM modulated packet. In addition, the robot and controller apply a same type of channel code to guarantee the transmission reliability. Since each QPSK symbol contains two encoded bits of the codeword, while each 8-QAM symbol contains three encoded bits, it is hard for the relay to find a channel decoder to deduce meaningful network-coded messages from the superimposed packet. Thus, a key challenge is how to construct a channel decoder at the relay to deduce the network-coded messages in the asymmetric transmission.
\subsection{Related Work}
\underline{\emph{Symmetric transmission with channel codes}}: Currently, most of the channel-coded PNC studies lie in the symmetric transmission, where two end users transmit the same amount of information, even in the case where the channel gain of the relay-controller channel is larger than that of the relay-robot channel\cite{popovski2007physical,zhang2009channel,huang2013design,yang2015achieving,wang2019signal,shi2016subtleties,shi2017complex,wangnoncoherent}. As long as the amount of the information from the two users is the same, \cite{popovski2007physical} showed that the XOR of the two linear codewords is still a valid codeword at the relay. Thus, the channel decoder can be constructed to deduce the network-coded messages at the relay. However, the problem is that the symmetric transmission does not exploit the larger channel gain from the relay-controller channel such that the controller can transmit more information than the robot. In this case, if the controller has more information to transmit, the controller should use another time slot to transmit the rest of the information. In this paper, we consider the channel-coded asymmetric PNC transmission scheme to reduce the transmission time.
\underline{\emph{Asymmetric transmission without channel codes}}: To further exploit the channel gain in the relay-controller channel, \cite{koike2009adaptive,koike2009optimized,chen2010novel,chen2011optimization,muralidharan2013wireless,chen2013spectrum,zhang2015design} studied the case where the controller transmits more information than the robot, but without applying channel codes protection. The asymmetric transmission is achieved through a way where the controller chooses a higher signal modulation order than that of the robot\footnote{Since the channel gain of the relay-controller channel is larger than that of the relay-robot channel, the received SNR from the controller is larger than that from the robot. For a same target frame error rate (FER), the controller can thus potentially choose a higher order modulation than that of the robot\cite{goldsmith2005wireless}. In this case, the controller can transmit more information with a larger channel gain.}. Refs. \cite{koike2009adaptive,koike2009optimized,chen2010novel,chen2011optimization,muralidharan2013wireless,chen2013spectrum,zhang2015design} did not apply the channel codes because in the case that the amounts of information from the two users are different, the current PNC coding schemes cannot guarantee the linearity of the underlying channel codes at the relay for successful decoding. In this case, it is not clear how to construct channel decoder at the relay to deduce the network-coded messages. In this paper, we solve this problem by proposing a lattice-based channel encoder and decoder in the asymmetric PNC transmission.
\underline{\emph{Asymmetric transmission with channel codes}}: Prior to this work, \cite{zhang2017design,pan2017practical} put forth novel channel coding and modulation schemes to solve the problem partially in asymmetric PNC transmission. First, the channel coding and modulation scheme in \cite{zhang2017design} is applicable to the case where the robot applies BPSK modulation, and the controller applies QPSK modulation. The channel coding and modulation scheme in \cite{pan2017practical} can be applied to the case where the robot applies $2^m$-QAM modulation, and the controller applies $2^{2m}$-QAM modulation, $m\ge 1$. Second, the channel coding and modulation scheme in \cite{zhang2017design} is particularly designed for repeat-accumulate (RA) codes, and channel coding as well as the modulation scheme in \cite{pan2017practical} is particularly designed for convolutional codes. The detailed description of the encoding and modulation schemes in \cite{zhang2017design,pan2017practical} is shown in Section \ref{sec:related}. In this paper, we put forth a general framework to solve the above problem comprehensively. Our design is versatile in the following two aspects: 1) in our framework, the controller and robot can freely choose their modulation orders based on their corresponding channel gains; 2) our design is generally applicable for arbitrary channel codes, not particularly applicable for one type of channel code.
\subsection{Contributions}
First, we put forth a lattice-based channel encoding and modulation framework to solve the channel coding problem in asymmetric PNC. Specifically, a lattice is a discrete set of points in a complex Euclidean space that forms a group under ordinary vector addition\cite{coset1988}. The lattice can be constructed through a set of nested linear binary channel codes $\mathcal{C}_1\subseteq\mathcal{C}_2\subseteq\dots\subseteq\mathcal{C}_{L-1}$, where $\mathcal{C}_l$ lies in the $l$-th level of the lattice, $l=1,\dots,L-1$, and $L$ is the number of lattice construction level. That is, the source information is stored in the first $L-1$ lattice levels. A power shaping in the $L$-th lattice level is applied to constrain the power of the lattice. The lattice with larger construction levels $L$ has larger power. Denote the number of lattice level at the robot and controller by $L_R$ and $L_C$, respectively. Since the channel at the controller is stronger that that of the robot, we have $L_C>L_R$. The relay estimates the network-coded messages from the received lattice level $l=1$ to lattice level $l=L_C-1$ in a level-by-level manner.
Second, when the lattice levels from the two users are not the same, the conventional power shaping design (i.e., the power shaping design applicable for point-to-point systems) makes the lattices from the two users not nested with each other, since the power shaping at the robot is not a legal codeword to the channel codes $\mathcal{C}_{L_R}$ in general. Thus, the channel decoder at the lattice level $L_R$ can not decode network-coded information successfully, which then causes decoding error propagation at the lattice levels $l>L_R$. To solve this problem, we ask the robot to transmit a correction signal beforehand, such that the difference between the power shaping and the correction signal is a legal codeword to the codes $\mathcal{C}_{L_R}$. Upon receiving the superimposed signal, the correction signal is subtracted from the received signal. In this case, the decoder at the relay can estimate the network-coded messages successfully.
Third, to reduce the correction signal transmission time, we apply the polar source coding \cite{arikan2010source,cronie2010lossless} technique to compress the correction signal, and transmit the compressed correction signal instead. We find that the polar source coding technique can efficiently reduce the correction signal transmission time when the channel coding rate at lattice level $L_R$ is close to 1. We emphasize that this can be achieved when the lattice construction level is large. In the numerical section, we show this though an example when $L_C=5$. To make the study of the asymmetric transmission comprehensive, we also consider the case where channel coding rate at lattice level $L_R$ is not close to 1. In this case, the length of the compressed correction signal may be large, and the asymmetric transmission scheme may spend much time on the correction signal transmission in addition to the PNC transmission. Thus, the overall asymmetric transmission time may be larger than the symmetric transmission time. To solve this problem, we put forth a dynamic transmission scheme in which the relay dynamically selects one of the transmission schemes which has smaller transmission time.
\subsection{Organization}
The rest of this paper is organized as follows. Section \ref{sec:SYS} describes the system model for the symmetric transmission scheme and asymmetric transmission scheme. In addition, we detail the related work on the channel encoder and modulator in asymmetric transmission scheme in Section \ref{sec:related}. Section \ref{sec:en-de} introduces the
proposed lattice-based channel encoder and modulator in asymmetric transmission, and the power shaping design. Section \ref{sec:nu} presents the numerical results to validate the effectiveness of the proposed asymmetric transmission scheme. Section \ref{sec:dy} proposes a dynamic transmission scheme to solve the problem on which the symmetric transmission time may be smaller than that of the asymmetric transmission. Finally, Section \ref{sec:con} concludes this paper.
\section{System Model}\label{sec:SYS}
In this paper, we study the communications between a controller and a robot in a two way relay channel (TWRC), as shown in Fig. \ref{Fig1_1}. The controller and robot are out of each other's transmission range, and they exchange messages with the assistance of a relay. In particular, we focus on a scenario in which 1) the message length from the controller is longer than that from the robot; 2) the controller and robot have nearly the same transmit power, while the channel power between the controller and relay, is larger than that between the robot and relay. To simplify the exposition, we denote the robot by $A$, the controller by $B$, and the relay by $R$. In addition, let $h_u$ be the channel between user $u$ and relay $R$, $u\in\{A,B\}$. From the assumption above, we have $|h_B|>|h_A|$. We assume that the coherence time is larger than a packet duration, and thus $h_u$ keeps constant within a packet duration, $u\in\{A,B\}$. Moreover, given the same transmit power, for a same target frame error rate (FER), a channel with stronger power can potentially support a higher modulation order\cite{goldsmith2005wireless}. Suppose the signal modulation order that can be supported by the channel $h_u$ is $M_u$, $u\in\{A,B\}$. In this case, we have $M_B>M_A$. Let $\mv{s}_u\in\{0,1\}^{K_u}$ denote the source information of user $u$, where $K_u$ is the length of the source information, $u\in\{A,B\}$. Under the considered setup, we have $K_B>K_A$. Note that, most of the current PNC studies require that the source information length at both users should be equal to each other, i.e., $K_A=K_B$. To achieve this, users $A$ and $B$ apply the same coding rate and modulation order\cite{wangnoncoherent,wangcoherent,wangnoncoherent_cof,xie2019polar,yang2014asynchronous,liew2015primer}. To reduce the transmission duration, in this paper, we put forth an asymmetric transmission scheme in which user $B$ can transmit more information than the user $A$, i.e., $K_B>K_A$.
\subsection{Symmetric Transmission Scheme}\label{sec:sy}
We first introduce the conventional symmetric transmission scheme, in which both users $A$ and $B$ transmit source information with the same length during the PNC phase, and user $B$ transmits the rest of information separately in a point-to-point (P2P) phase. The signal transmission process is detailed as follows.
\begin{figure}[t]
\centering
\includegraphics[scale=0.58]{Figures/Fig1_2.pdf}\\
\caption{Symmetric transmission scheme where the whole transmission takes four time slots.}\label{Fig1_2}
\end{figure}
\underline{\emph{Time slot 1: Uplink PNC transmission.}} The source information $\mv{s}_B$ from user $B$ is divided into the two parts: $\mv{s}_{B,PNC}$ and $\mv{s}_{B,P2P}$, where $\mv{s}_{B,PNC}\in\{0,1\}^{K_A}$, and $\mv{s}_{B,P2P}\in\{0,1\}^{(K_B-K_A)}$. The information $\mv{s}_{B,PNC}$ is transmitted during the PNC phase, and the information $\mv{s}_{B,P2P}$ is transmitted by user $B$ separately during the P2P phase. In the PNC phase, the source information $\mv{s}_A$ and $\mv{s}_{B,PNC}$ with the same length go through a same channel-encoder-and-modulator (EM), with coding rate $R_{A,PNC}=R_{B,PNC}$, and modulation order $M_A$. Note that the modulation order now is restricted by the weaker channel $h_A$. Otherwise, FER of the uplink transmission will be higher than the target FER. The transmitted packets are $\mv{x}_{A,PNC}$ and $\mv{x}_{B,PNC}$, respectively. We assume that the bandwidth in the uplink and downlink channel is $W$ symbols per second, i.e., the transmitter transmits $W$ modulated symbols to the receiver per second. The time slot 1 duration is
\begin{align}
T_1^{(Sym)}=\frac{K_A}{R_{A,PNC}M_AW}.
\end{align}
We assume that the signals from users \emph{A} and \emph{B} arrive at relay \emph{R} simultaneously, the received signal is expressed as:
\begin{align}
&\mv{y}_{R,PNC}\nonumber\\
&=h_A\beta_A\frac{1}{\sqrt{p_A}}\mv{x}_{A,PNC}+h_B\beta_B\frac{1}{\sqrt{p_B}}\mv{x}_{B, PNC}+\mv{n}_{R,PNC},\label{eq:rec}
\end{align}
where $p_u$ is the power of the symbol $x_{u,PNC}^{(n)}$, where $x_{u,PNC}^{(n)}$ is the $n$-th symbol in the packet $\mv{x}_{u,PNC}$, $u\in\{A,B\}$, and $n=1,\dots,N$. In this case, $\frac{1}{\sqrt{p_u}}\mv{x}_{u,PNC}$ denotes a power-normalized packet; $\beta_u$ is the channel precoder to compensate the channel at user $u$, $u\in\{A,B\}$, and $\mv{n}_{R,PNC}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{R,PNC}\mv{I}\right)$ denotes the additive white Gaussian noise (AWGN) at the relay. In addition, we assume perfect channel precoding at the users, i.e.,
\begin{align}
h_u\beta_u\frac{1}{\sqrt{p_u}}=1, ~~~u\in\{A,B\}.\label{eq:c}
\end{align}
We will show in Section \ref{sec:en-de} that the precoding in \eqref{eq:c} makes a lot of sense in our asymmetric PNC design. Let us first elaborate more details on \eqref{eq:c}. Specifically, we assume that the channels $h_u$'s are perfectly known at the users $A$ and $B$. Given the channel gain $|h_u|$ and the transmit power (i.e., the precoder power $|\beta_u|^2$), the user $u$ chooses the signal modulation with order $M_u$ with symbol power $p_u$, such that
\begin{align}
\sqrt{p_u}=|h_u||\beta_u|, ~~~u\in\{A,B\}.\label{eq:c1}
\end{align}
Thus, for a same $|\beta_u|$, from \eqref{eq:c1} we know that larger channel gain $|h_u|$ can help us to support higher order modulation. Next, the precoder adjusts its phase such that
\begin{align}
\theta_{h_u}+\theta_{\beta_u}=0, ~~~u\in\{A,B\},\label{eq:c2}
\end{align}
where $\theta_{h_u}$ is the phase of the channel $h_u$, and $\theta_{\beta_u}$ is the phase of the precoder $\beta_u$. The channel precoding technique to achieve \eqref{eq:c} has been studied and implemented in \cite{tan2018mobile}. Specifically, \cite{tan2018mobile} mainly solves the three problems: 1) time synchronization between users $A$ and $B$; 2) channel amplitude precoding to achieve \eqref{eq:c1}; 3) channel phase precoding to achieve \eqref{eq:c2}. We refer interested readers to \cite{tan2018mobile} for more details.
Substituting \eqref{eq:c} into \eqref{eq:rec}, we have
\begin{align}
\mv{y}_{R,PNC}=\mv{x}_{A,PNC}+\mv{x}_{B, PNC}+\mv{n}_{R,PNC}.\label{eq:rec_compen}
\end{align}
Based on the received signals $\mv{y}_R$, the relay $R$ deduces network-coded messages from users $A$ and $B$. Note that, since users $A$ and $B$ applies a same EM, the current PNC decoder-and-demodulator\cite{xie2019polar,yang2014asynchronous,liew2015primer} can be applied directly. The estimated network-coded information is denoted by $\mv{s}_{R,PNC}\in\{0,1\}^{K_A}$.
\underline{\emph{Time slot 2: Downlink PNC transmission.}} The relay then broadcasts the estimated network-coded information to both end users. The relay applies an EM, with coding rate $R_{R,PNC}$ and modulation order $M_A$. The modulation order is restricted by the weaker channel $h_A$ to achieve a target FER for the two users\footnote{In the downlink PNC, the received SNR at the controller is larger than that at the robot since the relay-controller channel is stronger than of the relay-robot channel. To make the FER at the robot and controller both smaller than the target FER, the relay chooses the low order modulation; otherwise, the FER of the robot would be larger than the target FER.}. In addition, for exposition simplicity, we assume that the modulation order in time slot 2 is the same as that in time slot 1, and the downlink PNC can achieve different FERs by adjusting the coding rate $R_{R,PNC}$. The broadcast packet is $\mv{x}_{R,PNC}$, and the duration of the time slot 2 is
\begin{align}
T_2^{(Sym)}=\frac{K_A}{R_{R,PNC}M_AW}.
\end{align}
At the user $u$, the received signal from the relay is
\begin{align}
\mv{y}_{u,PNC}=\mv{x}_{R,PNC}+\mv{n}_{u,PNC}, u\in\{A,B\}.\label{eq:us}
\end{align}
Note that, the channel $h_u$ has been compensated at user $u$. In this case, $\mv{n}_{u,PNC}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{u,PNC}\mv{I}\right)$ denotes the AWGN at the user $u$ after the channel compensation. The decoder at user $u$ decodes the messages from the other user based on the received signal $\mv{y}_{u,PNC}$ and its own message $\mv{x}_u$.
\underline{\emph{Time slot 3: User $B$ uplink P2P transmission.}} User $B$ transmits its remaining information $\mv{s}_{B,P2P}$ with length ($K_B-K_A$). The user $B$ applies an EM with coding rate $R_{B,P2P}$. In addition, since the channel between user $B$ and the relay is stronger than that between user $A$ and the relay, the modulation order now is assumed to be $M_B$. The transmitted packet is $\mv{x}_{B,P2P}$, and the duration of the time slot 3 is
\begin{align}
T_3^{(Sym)}=\frac{K_B-K_A}{R_{B,P2P}M_BW}.
\end{align}
At the relay $R$, the received signal is
\begin{align}
\mv{y}_{R,P2P}=\mv{x}_{B,P2P}+\mv{n}_{R,P2P}.
\end{align}
Note that, the channel $h_B$ has been compensated at the relay. In this case, $\mv{n}_{R,P2P}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{R,P2P}\mv{I}\right)$ denotes the AWGN after the channel compensation at the relay. The decoder at the relay $R$ decodes the messages from user $B$ based on the received signal $\mv{y}_{R,P2P}$. The estimated information is denoted by $\mv{s}_{R,P2P}\in\{0,1\}^{(K_B-K_A)}$.
\underline{\emph{Time slot 4: Relay $R$ downlink P2P transmission.}} The relay then transmits the information $\mv{s}_{R,P2P}$ to user $A$. The relay $R$ applies an EM with coding rate $R_{R,P2P}$, and the modulation order $M_A$. The modulation order is restricted by the channel $h_A$. In addition, for exposition simplicity, we assume that the modulation order in time slot 4 is the same as that in time slots 1 and 2, and the downlink P2P can achieve different FERs by adjusting the coding rate $R_{R,P2P}$. The duration of time slot 4 is
\begin{align}
T_4^{(Sym)}=\frac{K_B-K_A}{R_{R,P2P}M_AW}.
\end{align}
At the user $A$, the received signal is
\begin{align}
\mv{y}_{A,P2P}=\mv{x}_{R,P2P}+\mv{n}_{A,P2P}.
\end{align}
Note that, the channel $h_A$ has been compensated at user $A$. In this case, $\mv{n}_{A,P2P}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{A,P2P}\mv{I}\right)$ denotes the AWGN after the channel compensation. The decoder at the user $A$ decodes the messages from user $B$ based on the received signal $\mv{y}_{A,P2P}$.
Overall, the transmission time in the symmetric transmission scheme is
\begin{align}
T^{(Sym)}&=T_1^{(Sym)}+T_2^{(Sym)}+T_3^{(Sym)}+T_4^{(Sym)}\nonumber\\
&=\frac{K_A}{R_{A,PNC}M_AW}+\frac{K_A}{R_{R,PNC}M_AW}\nonumber\\
&~~~+\frac{K_B-K_A}{R_{B,P2P}M_BW}+\frac{K_B-K_A}{R_{R,P2P}M_AW}.\label{eq:time-sy}
\end{align}
\subsection{Asymmetric Transmission Scheme}\label{sec:asy}
A problem in the symmetric transmission scheme is that, in the uplink PNC phase (i.e., time slot 1 in the symmetric transmission), user $B$ transmits signals with a lower modulation order $M_A$, although the channel power between user $B$ and the relay can support user $B$ to transmits signals with a higher modulation order $M_B>M_A$. This takes user $B$ additional time for signal transmission. In this paper, by exploiting the stronger channel at user $B$, we put forth an asymmetric transmission scheme, in which user $A$ transmits its $K_A$-length source information, and user $B$ transmits its $K_B$-length source information simultaneously during the uplink of PNC phase. The signal transmission processes are detailed as follows.
\underline{\emph{Time slot 1: Uplink PNC transmission.}} User $A$ transmits it source information $\mv{s}_A$, and user $B$ transmits its source information $\mv{s}_B$ to the relay at the same time. The source information $\mv{s}_u$ goes through an EM with coding rate $R_{u,PNC}$ and modulation order $M_u$, and the transmitted packet is $\mv{x}_{u,PNC}$, $u\in\{A, B\}$. In this case, since the channel from user $B$ is stronger than that of user $A$, we have $M_B>M_A$. We assume that the lengths of source information from the two users are chosen such that the lengths of the transmitted packets from the two users are the same. The time slot 1 duration is
\begin{align}
T_1^{(Asy)}=\frac{K_A}{R_{A,PNC}M_AW}=\frac{K_B}{R_{B,PNC}M_BW}.
\end{align}
The received signal at the relay is the same as that shown in \eqref{eq:rec_compen}. A key challenge is how to design an EM at the two users such that the relay can decode the network-coded messages from the two end users. We will show our design on the encoder and decoder in Section \ref{sec:en-de}. The estimated network-coded information is denoted by $\mv{s}_{R,PNC}\in\{0,1\}^{K_B}$.
\underline{\emph{Time slot 2: Downlink PNC transmission.}} The relay then broadcasts the estimated network-coded information to the two end users. The relay applies an EM, with coding rate $R_{R,PNC}$ and modulator order $M_A$. The modulator order is restricted by the weaker channel $h_A$ to achieve a targeted FER. In addition, the modulation order is the same as that in time slots 2 and 4 in the symmetric transmission scheme in order to have a fair transmission time comparison later. The broadcast packet is $\mv{x}_{R,PNC}$, and the duration of the time slot 2 is
\begin{align}
T_2^{(Asy)}=\frac{K_B}{R_{R,PNC}M_AW}.
\end{align}
The received signal at the relay is the same as that shown in \eqref{eq:us}. The decoder at user $u$ decodes the messages from the other user based on the received signal $\mv{y}_{u,PNC}$ and its own message $\mv{x}_u$, $u\in\{A,B\}$.
Overall, the transmission time in the asymmetric transmission scheme is
\begin{align}
T^{(Asy)}&=T_1^{(Asy)}+T_2^{(Asy)}\nonumber\\
&=\frac{K_A}{R_{A,PNC}M_AW}+\frac{K_B}{R_{R,PNC}M_AW}.\label{eq:time-asy}
\end{align}
If we set $R_{R,PNC}=R_{R,P2P}$, from \eqref{eq:time-sy} and \eqref{eq:time-asy}, we have
\begin{align}
T^{(Sym)}-T^{(Asy)}=T^{(Sym)}_3=\frac{K_B-K_A}{R_{B,P2P}M_BW}. \label{eq:com0}
\end{align}
Eqn. \eqref{eq:com0} shows that the time slot 3 in symmetric transmission scheme is saved by the asymmetric transmission scheme.
\subsection{Challenge in Traditional EM in Asymmetric Transmission} \label{sec:tr_scheme}
We first show the traditional EM, i.e., the EM applied in the current PNC systems, and its problems when applied to asymmetric transmission scheme through a concrete example. In time slot 1 of the asymmetric transmission scheme shown in Section \ref{sec:asy}, the source information $\mv{s}_u$ first goes through a channel encoder, the output codeword is $\mv{c}_u$ with codeword length $D_u$, $u\in\{A,B\}$. Suppose that the codeword length $D_B=2D_A$. Then, the codeword $\mv{c}_A$ goes through a BPSK modulator, and $\mv{c}_B$ goes through a QPSK modulator. As a result, the modulated packets $\mv{x}_{A,PNC}$ and $\mv{x}_{B,PNC}$ have the same length. The problem is, since each BPSK symbol within $\mv{x}_{A,PNC}$ contains 1 encoded bit of the codeword $\mv{c}_A$, while each QPSK symbol within $\mv{x}_{B,PNC}$ contains 2 encoded bits of the codeword $\mv{c}_B$, it is hard for the relay $R$ to find a channel decoder to deduce meaningful network-coded messages from the superimposed packet between $\mv{x}_{A,PNC}$ and $\mv{x}_{B,PNC}$. In this case, the above traditional EM is not applicable to the asymmetric transmission in PNC.
\subsection{Related Work on EM in Asymmetric Transmission} \label{sec:related}
Prior to this work, \cite{zhang2017design,pan2017practical} put forth novel schemes to solve the above problem. Specifically, in \cite{zhang2017design}, user $A$ follows the traditional EM shown in Section \ref{sec:tr_scheme}, and the modulated packet is $\mv{x}_{A,PNC}\in\{-1,1\}^N$, where $N$ is the packet length. To solve the problem detailed in Section \ref{sec:tr_scheme}, user $B$ divides the source information $\mv{s}_B$ into the following two parts: $\mv{s}_{B,1}$ and $\mv{s}_{B,2}$, where $\mv{s}_{B,i}\in\{0,1\}^{K_{B,i}}$, $i=1, 2$. In \cite{zhang2017design}, $K_{B,1}=K_{B,2}=K_A$. The source information $\mv{s}_{B,1}$ and $\mv{s}_{B,2}$ first go through a same RA channel encoder, and the output codewords are $\mv{c}_{B,1}$ and $\mv{c}_{B,2}$, respectively. Then, the codewords $\mv{c}_{B,1}$ and $\mv{c}_{B,2}$ go through a BPSK modulator separately, and the output BPSK packets are $\mv{x}_{B,PNC}^I\in\{-1,1\}^N$ and $\mv{x}_{B,PNC}^Q\in\{-1,1\}^N$, respectively. Finally, the QPSK modulated packet of user $B$ is:
\begin{align}
\mv{x}_{B,PNC}=\mv{x}_{B,PNC}^I+j\mv{x}_{B,PNC}^Q,
\end{align}
where $j^2=-1$. In this case, the scheme makes two BPSK modulated packets $\mv{x}_{B,PNC}^I$ and $\mv{x}_{B,PNC}^Q$ embedded in the in-phase and quadrature parts of one QPSK modulated packet $\mv{x}_{B,PNC}$, respectively. Since each BPSK symbol within $\mv{x}_{A,PNC}$, $\mv{x}_{B,PNC}^I$, and $\mv{x}_{B,PNC}^Q$ all contains 1 encoded bit information of their corresponding codewords, the traditional channel decoder can be applied to deduce the network-coded messages at the relay. The relay in \cite{zhang2017design} applies a PNC joint channel decoder. Specifically, \cite{zhang2017design} first jointly decodes $\mv{s}_{A}$, $\mv{s}_{B,1}$, and $\mv{s}_{B,2}$ based on the received signal $\mv{y}_{R,PNC}$ in \eqref{eq:rec_compen}. Then, the network-coded message $\mv{s}_{R,PNC}$ is as follows:
\begin{align}
\mv{s}_{R,PNC}=\left[\mv{s}_A\oplus\mv{s}_{B,1}, \mv{s}_A\oplus\mv{s}_{B,2}\right],\label{eq:net_info}
\end{align}
where $\oplus$ denotes the XOR operation. Ref. \cite{zhang2017design} shows the scheme where user $A$ applies BPSK modulation, and user $B$ applies QPSK modulation. It is not clear whether the channel encoding and modulation scheme in \cite{zhang2017design} can be extended to the cases beyond BPSK-QPSK combination. The following three factors make the extension difficult:
\begin{itemize}
\item \emph{Channel decoder design issue}: The channel decoder at the relay is particularly designed for RA codes. We need to re-design the channel decoder if anther channel code is applied. In addition, the PNC joint channel decoder applied in \cite{zhang2017design} is not widely used due to the decoding complexity issue. Specifically, the decoding complexity increases as the number of input states to the channel decoder. In the above example, there are $2^{(1+2)}=8$ input states. The number of input states of the scheme exponentially increase with the sum of the modulation orders from the two users, making the joint channel decoder infeasible to high order modulations.
\item \emph{PNC XOR mapping issue}: It is not clear how to do PNC XOR mapping beyond the BPSK-QPSK combination.
\end{itemize}
We next introduce the EM in \cite{pan2017practical}. Specifically, the EM in \cite{pan2017practical} is the same as that in \cite{zhang2017design} introduced above except that the convolutional code is applied in \cite{pan2017practical}. In addition, \cite{pan2017practical} applies a PNC XOR channel decoder. Specifically, \cite{pan2017practical} first applies the PNC XOR mapping between codewords as follows:
\begin{align}
\mv{c}_{R,PNC}=\left[\mv{c}_A\oplus\mv{c}_{B,1}, \mv{c}_A\oplus\mv{c}_{B,2}\right].\label{eq:xor}
\end{align}
Then, the soft information of $\mv{c}_{R,PNC}$ in \eqref{eq:xor} is fed to the channel decoder to get the network-coded message in \eqref{eq:net_info}. Ref. \cite{pan2017practical} use the same way to deal with the other cases beyond BPSK-QPSK combination. The problems are 1) according to the PNC mapping in \eqref{eq:xor}, the codeword length of user $B$ should always be two times as much as that of user $A$. Thus, the scheme from \cite{pan2017practical} can only be applied to the case where user $A$ applies $2^m$-QAM modulation, and user $B$ applies $2^{2m}$-QAM modulation, $m\ge 1$; 2) The channel decoder at the relay is particularly designed for convolutional codes. We should re-design the channel decoder if anther channel code is applied.
In general, the EM in \cite{zhang2017design,pan2017practical} cannot be generally applied to the cases in which users $A$ and $B$ can freely choose their channel codes, and modulation schemes according to their channel power, e.g., user $A$ applies QPSK modulation, and user $B$ applies 8-QAM modulation with low decoding complexity. In the following, we put forth a lattice-based EM to solve the above problem comprehensively.
\section{Lattice-based EM in Uplink of Asymmetric PNC}\label{sec:en-de}
In Section \ref{sec:asy}, we propose an asymmetric transmission scheme to improve the throughput of the PNC systems. To achieve this, users $A$ and $B$ should apply different coding and modulation strategies such that they can transmit different amount of information in the uplink of PNC. A key challenge is how to design the EM at the two users such that the relay can decode the network-coded messages from the two users. In this section, we propose a lattice-based EM to solve the above problem.
\subsection{Preliminaries for Lattice}\label{sec:pre}
A complex lattice $\Lambda_1$ is a discrete set of points in a complex Euclidean $n$-dimensional space $\mathbb{C}^n$ that forms a group under ordinary complex vector addition, $n\ge 1$\cite{coset1988}. A sublattice $\Lambda_2$ ($\Lambda_2\subseteq\Lambda_1$) induces a partition of $\Lambda_1$ into equivalence groups modulo $\Lambda_2$. We denote this partition by $\Lambda_1/\Lambda_{2}$. When the number of cosets of $\Lambda_2$ in $\Lambda_1$ is two, the lattice partition is the binary lattice partition. Let $\Lambda_1/\Lambda_2/\dots/\Lambda_{L-1}/\Lambda_L$ denote an $n$-dimensional lattice partition chain for $L\ge 2$. For each partition $\Lambda_l/\Lambda_{l+1}$, a code $\mathcal{C}_l$ over $\Lambda_l/\Lambda_{l+1}$ selects a sequence of coset representatives $a_l\in A_l$, where $A_l$ is a set that contains all the coset representatives of $\Lambda_{l+1}$ in the partition $\Lambda_l/\Lambda_{l+1}$, $1\le l\le L-1$. The construction of the binary lattice requires a set of nested linear binary codes $\mathcal{C}_l$ with codeword length $D$ and source information length $k_l$, $l=1,\dots, L-1$, and $\mathcal{C}_1\subseteq\mathcal{C}_2\subseteq\dots\subseteq\mathcal{C}_{L-1}$. Let $\pi$ be the natural embedding of $\mathbb{F}^D_2$
into $\mathbb{Z}^D$, where $\mathbb{F}^D_2$ is the binary field. In addition, let $\mv{e}_1$, $\mv{e}_2$,\dots, $\mv{e}_{k_l}$ be a basis of $\mathbb{F}^D_2$ that spans the code $\mathcal{C}_l$. When $n=2$, a vector $\mv{x}$ in the binary lattice is expressed as
\begin{align}
\mv{x}=\sum_{l=1}^{L-1}\phi^{l-1}\sum_{j=1}^{k_l}\alpha_j^{(l)}\pi(\mv{e}_j)+\phi^{L-1}\mv{b},
\end{align}
where $\phi=1+j$, $\alpha_j^{(l)}\in\{0, 1\}$, and $\mv{b}\in\mv{G}^D$ with $\mv{G}$ being a set of Gaussian integers. Moreover, the length of $\mv{x}$ now is $N=D$. Furthermore, if $\mv{x}$ is a baseband transmitted signal, the above lattice construction system combines the channel coding and modulation as a joint process, which is quite different from the traditional EM with separated channel coding and modulation processes. In addition, the power shaping $\mv{b}$ should be carefully chosen such that the transmitted baseband signal $\mv{x}$ is power constrained. We will detail this in Section \ref{sec:pw_sp}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.62]{Figures/Fig2.pdf}\\
\caption{A lattice-based EM at user $A$ when $L_A=3$.}\label{Fig2}
\end{figure}
\subsection{Lattice-based Encoder and Decoder}\label{sec:lattice}
Now, we show the lattice constructions at users $A$ and $B$ in the uplink of PNC. The lattice construction at both users strictly follows the description in Section \ref{sec:pre}. Specifically, according to the channel power, user $u$ applies $L_u$ levels lattice construction, $u\in\{A,B\}$. Then, user $u$ first divides the source information $\mv{s}_u$ as $\mv{s}_u=\left[\mv{s}_{u,1},\dots,\mv{s}_{u,L_u-1}\right]$, where $\mv{s}_{u,l}$ with length $K_{u,l}$ is the source information at level $l$ in the lattice, $l=1,\dots, L_u-1$, and $u\in\{A,B\}$. Next, at level $l$, we apply a channel encoder with coding rate $R_{u,l}$ to encode the source information $\mv{s}_{u,l}$, and the output codeword is $\mv{c}_{u,l}\in\mathbb{Z}^{D_u}$,\footnote{Note that, the codewords $\mv{c}_{u,l}$'s should lie in the whole integer field $\mathbb{Z}^{D_u}$, not in the binary finite field $\mathbb{F}_2^{D_u}$, $u\in\{A,B\}$. The reasons are as follows. In PNC, users $A$ and $B$ transmit signals to the relay simultaneously. Note that, the lattice signals superimposition over the air is actually an addition over the whole integer field. In this case, if we apply binary codewords at the two users, the summation of the two binary codewords from the two users over the air does not lie in the binary finite field anymore, causing the codewords at different lattice levels not nested at the relay. As a result, the decoding failures happen even in the absence of noise at the relay. On the other hand, if we apply codewords that lie in $\mathbb{Z}^{D_u}$, the summation of the two codewords still lie in the whole integer field at the relay. In this case, we can do decoding successfully at the relay.} where $D_u$ is the codeword length, $R_{u,1}\le R_{u,2}\le\dots\le R_{u,L_u-1}$, $u\in\{A,B\}$, and $l=1,\dots, L_u-1$. Note that, both users should apply a same type of channel code, e.g., polar codes, LDPC codes, or convolutional codes, during the lattice construction. In addition, the source information length and coding rate at each level of lattice should be the same for the two users, i.e., $K_{A,l}=K_{B,l}$, and $R_{A,l}=R_{B,l}=R_l$, $\forall l$. As a result, we have $D_A=D_B$. Finally, the transmitted packet $\mv{x}_{u,PNC}$, $u\in\{A,B\}$, is expressed as:
\begin{align}
\mv{x}_{u,PNC}=\mv{c}_{u,1}+\phi\mv{c}_{u,2}+\dots+\phi^{L_u-2}\mv{c}_{u,L_u-1}+\phi^{L_u-1}\mv{b}_{u}. \label{eq:trans}
\end{align}
The length of the transmitted packet $\mv{x}_{u,PNC}$ is $N=D_A=D_B$. We will show how to design the power shaping $\mv{b}_{u}$ later in Section \ref{sec:pw_sp}. In addition, in Fig. \ref{Fig2}, we show an illustrative example of the lattice-based EM at user $A$ when $L_A=3$.
Next, we introduce the decoder at relay $R$. According to \eqref{eq:rec_compen}, the received signal at the relay is
\begin{align}
&\mv{y}_{R,PNC}\nonumber\\
&=\mv{x}_{A,PNC}+\mv{x}_{B,PNC}+\mv{n}_{R,PNC}\nonumber\\
&=(\mv{c}_{A,1}+\mv{c}_{B,1})+\dots+\phi^{L_A-2}(\mv{c}_{A,L_A-1}+\mv{c}_{B,L_B-1})\nonumber\\
&~~+\phi^{L_A-1}(\mv{b}_A+\mv{c}_{B,L_A})+\dots+\phi^{L_B-1}\mv{b}_{B}+\mv{n}_{R,PNC}.\label{eq:rec_compen2}
\end{align}
From \eqref{eq:rec_compen2}, the effective signals $\mv{x}_{A,PNC}+\mv{x}_{B,PNC}$ forms a $L_B$ levels signal at the relay. The relay decodes the superimposed signals between users $A$ and $B$ level-by-level in the lattice, aiming to deduce the network-coded messages from the two end users. The procedures are summarized as follows:
\begin{itemize}
\item \textbf{Decode the network-coded message at level 1}.\\
The decoder at relay $R$ decodes the signal at the first level of the lattice as follows:
\begin{align}
\mv{y}_{R,PNC}^{(1)}={\rm mod}_{\phi}(\mv{y}_{R,PNC}),\label{eq:modu}
\end{align}
where ${\rm mod}_{\phi}(\mv{y}_{R,PNC})$ denotes $\mv{y}_{R,PNC}$ modulo $\phi$. Through the modulo operation in \eqref{eq:modu}, the resulting signal $\mv{y}_{R,PNC}^{(1)}$ only contains information from the first level of lattice, i.e., ${\rm mod}_{\phi}\left(\mv{c}_{A,1}+\mv{c}_{B,1}\right)$, in which the effective information ${\rm mod}_{\phi}\left(\mv{c}_{A,1}+\mv{c}_{B,1}\right)$ is a BPSK modulated signal. Then, $\mv{y}_{R,PNC}^{(1)}$ is sent to the channel decoder at the first level of the lattice to estimate the network-coded source information $\mv{s}_{R,PNC}^{(1)}$. Note that the channel decoder should be well-matched to the channel encoder at the each level of the lattice so that the decoding process can be successful. In addition, at each level of lattice, we directly apply the current PNC channel decoders where BPSK modulation is assumed, e.g., the LDPC channel decoder, convolutional codes channel decoder, and polar codes channel decoder\cite{xie2019polar,yang2014asynchronous,liew2015primer}. To facilitate the decoding process in the rest levels, $\mv{s}_{R,PNC}^{(1)}$ is re-encoded, and the output codeword is $\mv{c}_{R,PNC}^{(1)}$.
\item \textbf{Decode the network-coded message from level 2 to level $L_B-1$ sequentially}.\\
Denote the estimated network-coded source information at level $l$ in the lattice by $\mv{s}_{R,PNC}^{(l)}$, and the corresponding codeword by $\mv{c}_{R,PNC}^{(l)}$, $l=2, \dots, L_B-1$. Then, $\mv{s}_{R,PNC}^{(l)}$ at the level $l$ is computed as follows:
\begin{align}
\mv{y}_{R,PNC}^{(l)}={\rm mod}_{\phi}\left(\hat{\mv{y}}_{R,PNC}^{(l)}\right), l=2, \dots, L_B-1, \label{eq:BAWGN}
\end{align}
where
\begin{align}
&\hat{\mv{y}}_{R,PNC}^{(l)}\nonumber\\
&=\frac{1}{\phi^{l-1}}\left(\mv{y}_{R,PNC}-\mv{c}_{R,PNC}^{(1)}-\dots-\phi^{l-2}\mv{c}_{R,PNC}^{(l-1)}\right)\nonumber\\
&=\frac{1}{\phi^{l-1}}\left(\!\mv{x}_{A,PNC}\!\!+\!\mv{x}_{B,PNC}\!-\!\mv{c}_{R,PNC}^{(1)}\!\!-\!\dots\!\!-\!\phi^{l-2}\mv{c}_{R,PNC}^{(l-1)}\!\right)\nonumber\\
&~~~+\frac{1}{\phi^{l-1}}\mv{n}_{R,PNC}\label{eq:noi}.
\end{align}
The $\mv{y}_{R,PNC}^{(l)}$ contains information of ${\rm mod}_{\phi}\left(\mv{c}_{A,l}+\mv{c}_{B,l}\right)$, and is then sent to the channel decoder at the level $l$ of the lattice to estimate the network-coded source information $\mv{s}_{R,PNC}^{(l)}$. Next, $\mv{s}_{R,PNC}^{(l)}$ is re-encoded through the channel encoder at the level $l$ of the lattice, and the output codeword is $\mv{c}_{R,PNC}^{(l)}$. We compute $\mv{c}_{R,PNC}^{(l)}$ from $l=2$ to $l=L_B-1$ sequentially. In addition, in \eqref{eq:noi}, since $\frac{1}{\phi^{l-1}}\mv{n}_{R,PNC}\sim\mathcal{CN}\left(\mv{0},\frac{1}{2^{l-1}}\sigma^2_{R,PNC}\mv{I}\right)$, the noise power decreases exponentially as $l$. In this case, through the operation in \eqref{eq:BAWGN}, the channel becomes a binary-input AWGN (BAWGN) channel at level $l$, and the capacity of the BAWGN increases as $l$. Thus, we can transmit much more information at higher levels of the lattice. In particular, when the lattice level $l$ is large, the capacity of the BAWGN at the lattice level $l$ can approach to 1.
\end{itemize}
In Fig. \ref{Fig3}, we show the decoding process at relay $R$ when $L_A=3$ and $L_B=4$ as an illustrative example. Last, the relay encodes the estimated network-coded messages, and broadcasts them to the end users.
\begin{figure}[t]
\centering
\includegraphics[scale=0.58]{Figures/Fig3.pdf}\\
\caption{A decoder at relay $R$ when $L_A=3$ and $L_B=4$.}\label{Fig3}
\end{figure}
\subsection{Power Shaping Design}\label{sec:pw_sp}
In this subsection, we show the power shaping design. To make the every dimension of the transmitted signal $\mv{x}_u$ power constrained, $u\in\{A,B\}$, we apply the hypercube power shaping\cite{tan2018mobile} in our PNC lattice construction in \eqref{eq:trans}. Specifically, in \eqref{eq:trans}, denote
\begin{align}
\mv{c}_u=\mv{c}_{u,1}+\phi\mv{c}_{u,2}+\dots+\phi^{L_u-2}\mv{c}_{u,L_u-1}, u\in\{A,B\}.
\end{align}
Then, the hypercube power shaping is expressed as follows:
\begin{align}
\mv{b}_u=\frac{1}{\phi^{L_u-1}}\left({\rm mod}_{\phi^{L_u-1}}\left(\mv{c}_{u}\right)-\mv{c}_{u}\right), u\in\{A,B\}. \label{eq:pw}
\end{align}
In this case, the transmitted packet at user $u$ is
\begin{align}
\mv{x}_{u,PNC}&=\mv{c}_{u,1}+\phi\mv{c}_{u,2}+\dots+\phi^{L_u-2}\mv{c}_{u,L_u-1}+\phi^{L_u-1}\mv{b}_{u}\nonumber\\
&={\rm mod}_{\phi^{L_u-1}}\left(\mv{c}_{u}\right), u\in\{A,B\}.
\end{align}
Thus, the power shaping makes the every dimension of the transmitted signal $\mv{x}_{u,PNC}$ power constrained, $u\in\{A,B\}$. For example, when $L_A=3$, $x_{A,PNC}^{(n)}\in\{0, j, -1, -1-j\}$; when $L_A=4$, $x_{A,PNC}^{(n)}\in\{0, j, -1, -1-j, -j, 1, 1-j, -2j\}$, where $x_{A,PNC}^{(n)}$ is the $n$-th element of $\mv{x}_{A,PNC}$, $n=1,\dots, N$.
In lattice construction, only hypercube power shaping design shown above can make the transmitted signals power constrained for each dimension. The lattice applying hypercube power shaping works well in point to point communications, and in PNC when $L_A=L_B$. However, in PNC when $L_B>L_A$ is studied in this paper, the hypercube power shaping causes decoding failure at the relay for lattice levels $l\ge L_A$ when ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is not a codeword to the codebook at the lattice level $L_A$. Specifically, in \eqref{eq:rec_compen2}, at level $L_A$ in the lattice, the signal $\mv{y}_{R,PNC}^{(L_A)}$ contains information of
\begin{align}
{\rm mod}_{\phi}\left(\mv{b}_A+\mv{c}_{B,L_A}\right)={\rm mod}_{\phi}\left({\rm mod}_{\phi}\left(\mv{b}_A\right)+\mv{c}_{B,L_A}\right).
\end{align}
Based on $\mv{y}_{R,PNC}^{(L_A)}$, the decoder applies channel decoder to recover the signal ${\rm mod}_{\phi}\left(\mv{b}_A+\mv{c}_{B,L_A}\right)$. The problem is, ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ may not be a codeword to the codebook at the lattice level $L_A$, i.e., the channel decoder cannot decode ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ successfully even in the absence of noise. When ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is not a codeword, the superimposed signal ${\rm mod}_{\phi}\left(\mv{b}_A+\mv{c}_{B,L_A}\right)$ may also not a codeword of the codebook at the lattice level $L_A$. Thus, the decoder at the level $L_A$ can not recover ${\rm mod}_{\phi}\left(\mv{b}_A+\mv{c}_{B,L_A}\right)$, even in the absence of noise. Moreover, the decoding errors are propagated to the decoders at the lattice levels $l>L_A$.
To solve the problem, we need to find a way that can not only make the transmitted signal power constrained by applying the power shaping in \eqref{eq:pw}, but also make the decoding in the level $L_A$ successfully. To this end, denote $\mv{c}_{A,L_A}$ a codeword of the codebook at the lattice level $L_A$. In this case, we propose to ask user $A$ to transmit a correction signal $\mv{e}\in\{0,1\}^N$ to the relay beforehand such that
\begin{align}
{\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)={\rm mod}_{\phi}\left(\mv{b}_A-\mv{e}\right).\label{eq:bsc}
\end{align}
Then, users $A$ and $B$ transmit their signals to the relay simultaneously. Upon receiving the superimposed signals $\mv{y}_{R,PNC}$ as shown in \eqref{eq:rec_compen2}, the correction signal $\mv{e}\in\{0,1\}^N$ is subtracted from $\mv{y}_{R,PNC}$, and the resulting signal is
\begin{align}
&\hat{\mv{y}}_{R,PNC}\nonumber\\
&=\mv{y}_{R,PNC}-\phi^{L_A-1}\mv{e}\nonumber\\
&=\mv{x}_{A,PNC}+\mv{x}_{B,PNC}-\phi^{L_A-1}\mv{e}+\mv{n}_{R,PNC}\nonumber\\
&=(\mv{c}_{A,1}+\mv{c}_{B,1})+\dots+\phi^{L_A-2}(\mv{c}_{A,L_A-1}+\mv{c}_{B,L_A-1})\nonumber\\
&~~~~+\phi^{L_A-1}(\mv{b}_{A}-\mv{e}+\mv{c}_{B,L_A})+\dots+\phi^{L_B-1}\mv{b}_{B}+\mv{n}_{R,PNC}.\label{eq:rec_compen3}
\end{align}
In this case, at the level $L_A$, according to \eqref{eq:bsc}, since
\begin{align}
{\rm mod}_{\phi}\left(\mv{b}_{A}-\mv{e}+\mv{c}_{B,L_A}\right)={\rm mod}_{\phi}\left(\mv{c}_{A,L_A}+\mv{c}_{B,L_A}\right)
\end{align}
is a codeword to the codebook at the lattice level $L_A$, the decoder can recover ${\rm mod}_{\phi}\left(\mv{c}_{A,L_A}+\mv{c}_{B,L_A}\right)$ successfully through the decoding and encoding process. In this case, the transmitted signals at the two users are power constrained, and the relay can decode the superimposed signals successfully. There are two problems to be solved:
\underline{\emph{A: Find a codeword around the hypercube power shaping.}} From \eqref{eq:bsc}, we have
\begin{align}
{\rm mod}_{\phi}\left(\mv{b}_A\right)={\rm mod}_{\phi}\left({\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)+\mv{e}\right).\label{eq:bsc1.1}
\end{align}
We can imagine that the codeword ${\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)$ goes through a binary symmetric channel (BSC) with bit flipping probability $p$, the correction signal $\mv{e}$ is the corresponding BSC noise, and ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is the output of the BSC channel. The capacity $C_{BSC}$ of the BSC is\cite{cover1999elements}
\begin{align}
C_{BSC}=1-H(p), \label{eq:bscc}
\end{align}
where
\begin{align}
H(p)=-p\log_2(p)-(1-p)\log_2(1-p),\label{eq:entro}
\end{align}
is binary entropy function. To find the codeword $\mv{c}_{A,L_A}$, we send ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ to the BSC channel decoder with the output source information $\mv{s}_{A,L_A}$. The BSC channel decoder is similar to the channel decoder at the lattice level $L_A$, and the only difference is that the channel decoder is constructed under binary AWGN channel, while the BSC channel decoder is constructed under BSC channel. The source information $\mv{s}_{A,L_A}$ is then re-encoded, with output codeword $\mv{c}_{A,L_A}$. The correction signal (i.e., the BSC noise) $\mv{e}$ is
\begin{align}
\mv{e}={\rm mod}_{\phi}\left(\mv{b}_A-\mv{c}_{A,L_A}\right). \label{eq:bsc2}
\end{align}
The above decoding process, i.e., finding ${\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)$ from ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ with $\mv{e}$ being the noise vector, can be interpreted as a lossy compression process. We denote the space ${\rm mod}_{\phi}\left(\mv{c}_{A,L_A}\right)$ lies in by $\{0,1\}^{K_{L_A}}$, i.e., the dimension of the space is $K_{L_A}$ although the length of the codeword $\mv{c}_{A,L_A}$ is $N$, and the space ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ lies in by $\{0,1\}^{N}$. In this case, the BSC decoding process actually compresses the space $\{0,1\}^{N}$ to the space $\{0,1\}^{K_{L_A}}$. Ref. \cite{korada2010polar} proves that, as $N$ goes to infinity, for the lossy compression under the measure of Hamming distortion, the optimal compression rate can be expressed as
\begin{align}
\frac{K_{L_A}}{N}=R_{L_A}=1-H(p), \label{eq:Compre_rate}
\end{align}
where $H(p)$ is the entropy of $\mv{e}$. In this case, we can determine the flipping probability according to
\eqref{eq:Compre_rate}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.62]{Figures/Source-coding-rate.pdf}\\
\caption{Compression rate $R_c$ over flipping probability $p$ for different $N$. }\label{Fig4}
\end{figure}
\underline{\emph{B: Compress signal in \eqref{eq:bsc2} by polar source coding.}} To facilitate the decoding process in the relay as shown in \eqref{eq:rec_compen3}, we need to transmit the correction signal $\mv{e}$ in \eqref{eq:bsc2} to the relay. However, if we ask the user $A$ to transmit the correction signal $\mv{e}$ with length $K_{e}=N$ directly, the time saved through the asymmetric PNC transmission will be canceled out by the correction signal transmission. Fortunately, according to \eqref{eq:Compre_rate}, if the rate $R_{L_A}$ is large, then the entropy of $\mv{e}$ would be small. In this case, we can apply the lossless polar source coding\cite{arikan2010source} to compress the correction signal $\mv{e}$. Specifically, according to \cite{arikan2010source}, as $N$ goes to infinity, the compression rate is $H(p)$ shown in \eqref{eq:entro}. In this case, we can transmit the compressed correction signal $\hat{\mv{e}}$ with the length $K_{\hat{\mv{e}}}=NH(p)$ instead of the original correction signal $\mv{e}$ with length $K_{\mv{e}}=N$, greatly saving the correction signal transmission time. In practice, for $N$ is finite, we apply the lossless polar source coding algorithm proposed in \cite{cronie2010lossless}. According to the algorithm, we can perfectly recover $\mv{e}$ from $\hat{\mv{e}}$, and $\mv{e}$ is plugged into \eqref{eq:rec_compen3} for PNC decoding. The algorithm details are omitted.
In Fig. \ref{Fig4}, we show the compression rate
\begin{align}
R_c=\frac{K_{\hat{\mv{e}}}}{N}
\end{align}
The theoretical limit is $R_c=H(p)$ shown in\cite{arikan2010source}, and the other two lines show the results in \cite{cronie2010lossless} for packet length $N=256$ and $N=1024$. Fig. \ref{Fig4} shows that, when the flipping probability is small, we can reduce the length of the correction signal $\mv{e}$ significantly by applying the lossless polar source coding. In addition, as the packet length $N$ becomes large, the compression rate in \cite{cronie2010lossless} approaches to the theoretical limit.
\begin{figure}[t]
\centering
\includegraphics[scale=0.6]{Figures/Fig1_3.pdf}\\
\caption{Overall asymmetric transmission scheme with correction signal transmission taken into account.}\label{Fig1_3}
\end{figure}
\subsection{Overall Asymmetric Transmission Scheme}\label{sec:overall}
The overall asymmetric transmission scheme is shown in Fig. \ref{Fig1_3}. The signal transmission processes are detailed as follows.
\underline{\emph{Time slot 0: Compressed correction signal $\hat{\mv{e}}$ transmission.}} The user $A$ first computes the correction signal $\mv{e}$ according to the method introduced in Section \ref{sec:pw_sp}, then compresses the correction signal by applying lossless polar source coding according to the algorithm in \cite{cronie2010lossless}. Next, user $A$ transmits the compressed correction signal to the relay. We assume that the user $A$ applies an EM with coding rate $R_{A,P2P}$ and modulator order $M_A$ to transmit the source information $\hat{\mv{e}}$. The modulator order is restricted by the weaker channel $h_A$ to achieve a targeted FER. The transmit packet is $\mv{x}_{A,P2P}$, and duration of the correction signal transmission is
\begin{align}
T_{\hat{\mv{e}}}=\frac{K_{\hat{\mv{e}}}}{R_{A,P2P}M_AW}.
\end{align}
At the relay $R$, the received signal is
\begin{align}
\mv{y}_{R,P2P}=\mv{x}_{A,P2P}+\mv{n}_{R,P2P},
\end{align}
where $\mv{n}_{R,P2P}\sim\mathcal{CN}\left(\mv{0},\sigma^2_{R,P2P}\mv{I}\right)$ denotes the additive white Gaussian noise (AWGN) at the relay in the P2P phase. Note that, the channel $h_A$ has been compensated at the relay. The decoder at the relay $R$ first decodes the compressed correction signal $\hat{\mv{e}}$, and then decompressed it to recover the original correction signal $\mv{e}$ by applying the algorithm in \cite{cronie2010lossless}.
\underline{\emph{Time slot 1: Uplink PNC transmission.}}
The encoding and modulation processes are the same as that introduced in Section \ref{sec:asy}. To solve the problem that the users $A$ and $B$ can transmit different amount of information, we apply the lattice-based EM shown in Section \ref{sec:lattice}. In addition, to make the decoding at the relay successfully, the estimated correction signal is subtracted from the received signal, and the resulting received signal is shown in \eqref{eq:rec_compen3}. Moreover, we apply the lattice-based channel-decoder-and-demodulator to estimate the network-coded messages shown in \ref{sec:lattice}.
\underline{\emph{Time slot 2: Downlink PNC transmission.}} The encoding and decoding processes are the same as that introduced in Section \ref{sec:asy}.
In this case, the total transmission time of the asymmetric transmission scheme in \eqref{eq:time-asy} is rewritten as
\begin{align}
&\hat{T}^{(Asy)}\nonumber\\
&=T_1^{(Asy)}+T_2^{(Asy)}+T_{\hat{\mv{e}}}\nonumber\\
&=\frac{K_A}{R_{A,PNC}M_AW}+\frac{K_B}{R_{R,PNC}M_AW}+\frac{K_{\hat{\mv{e}}}}{R_{A,P2P}M_AW}.\label{eq:time-asy2}
\end{align}
If we set $R_{R,PNC}=R_{R,P2P}$, from \eqref{eq:time-sy} and \eqref{eq:time-asy2}, we have
\begin{align}
T^{(Sym)}-\hat{T}^{(Asy)}&=T^{(Sym)}_3-T_{\hat{\mv{e}}}\nonumber\\
&=\frac{K_B-K_A}{R_{B,P2P}M_BW}-\frac{K_{\hat{\mv{e}}}}{R_{A,P2P}M_AW}. \label{eq:com}
\end{align}
\begin{remark}\label{R1}
As we discussed in Section \ref{sec:lattice}, as the increase of the lattice level $l$, the capacity of the BAWGN increases even approaching to 1. In this case, the coding rate $R_{L_A}$ can approach to 1 potentially. Then, according to \eqref{eq:Compre_rate}, we know that $H(p)$ approaches to zero as the increase of the lattice level. In this case, we can compress the signal $\mv{e}$ to $\hat{\mv{e}}$ with length $K_{\hat{\mv{e}}}=NH(p)$ approaching to zero when $L_A$ is large enough, and the correction signal transmission time $T_{\hat{\mv{e}}}$ can be far smaller than $T^{(Sym)}_3$. In particular, if the coding rate $R_{L_A}=1$, we have $T_{\hat{\mv{e}}}=0$. We show this case though the example when user $A$ applies 3-order modulation, and user $B$ applies 4-order modulation in Section \ref{sec:nu}. Moreover, to make the study of the asymmetric comprehensive, we also consider the case when the coding rate $R_{L_A}$ is not close to 1. In this case, the length of the compressed correction signal $\hat{\mv{e}}$ would be large, and may leading to the transmission time $T_{\hat{\mv{e}}}$ larger than $T^{(Sym)}_3$. In this case, the throughput of the proposed asymmetric transmission scheme may be smaller than that of the symmetric transmission. We solve this problem in Section \ref{sec:dy}.
\end{remark}
\subsection{ Discussions on the Lattice Decoder in Section \ref{sec:lattice}}
In the following, we briefly discuss some theoretical analysis on the lattice decoder shown in Section \ref{sec:lattice}. First, we discuss the decoding complexity. Let $D$ denote the overall decoding complexity of the lattice decoder shown in Section \ref{sec:lattice}, and $D_l$ denote the decoding complexity at the $l$-th lattice level, $l=1,\dots, L_{B}-1$. Since the decoding is implemented layer-by-layer, the overall decoding complexity is
\begin{align}
D=D_1+\dots+D_{L_B-1}.
\end{align}
When we apply polar codes to the lattice-based encoder, since the decoding complexity of the polar codes at the $l$-th level of the lattice is $D_l=\mathcal{O}\left(N\log_2N\right)$, $l=1,\dots, L_B-1$\cite{arikan2009channel}, the overall decoding complexity is $D=\mathcal{O}\left((L_B-1)N\log_2N\right)$. Similarly, we can also compute the decoding complexity when we apply other channel codes to the lattice-based encoder and decoder. We omit the details here.
Second, we discuss the decoding properties of the lattice decoder at the relay. As we show in Section \ref{sec:overall}, the relay begins to decode the PNC signals after the decoding of the correction signals $\mv{e}$. In the case the correction signal $\mv{e}$ is correctly decoded at the relay, the effective received signal $\mv{x}_{A,PNC}+\mv{x}_{B,PNC}-\phi^{L_A-1}\mv{e}$ forms a lattice, whose decoding process is similar to that in the point-to-point system, except that the decoder output in PNC is the network-coded messages. In this case, we can study the properties of the decoder by applying the tools in lattice. Currently, there are lots of studies on the decoding properties of the lattice in a point-to-point system. For example, the upper bound of decoding FER of the lattice was shown in \cite{liu2018construction} when applying polar codes; the coding gain of the lattice, and the trade-off between the coding and FER was shown in \cite{forney2000sphere}. These properties can be applied to the PNC systems. However, in general, the correction signal $\mv{e}$ may not be correctly decoded at the relay. In the case the correction signal is not correctly decoded, the signal $(\mv{b_A}-\mv{e})$ is not a codeword of the codebook at the lattice level $L_A$, and thus the effective received signal $\mv{x}_{A,PNC}+\mv{x}_{B,PNC}-\phi^{L_A-1}\mv{e}$ is not a lattice\footnote{In this case, we still name the decoder as the ``lattice decoder''.}. In particular, the first $L_A-1$ levels of the effective received signals are nested with each other, but they are not nested with the rest of levels of the effective received signals. In this case, the analysis of the decoding FER and coding gain is difficult since the structure of the received signals is quite complicated. We leave this as a future work to further explore.
\begin{table*}[t]\centering
\caption{ Rate Setup When $K_B$=537 bits}\label{T_A1}
\begin{tabular}{|c|c|c|c|c|c|c|c|c|c|}
\hline
Scheme & \begin{tabular}[c]{@{}c@{}}Time \\ Slot\end{tabular} & User & \begin{tabular}[c]{@{}c@{}}Modulation \\ Order\end{tabular} & EM Scheme & $R_1$ & $R_2$ & $R_3$ & $R_4$ & \begin{tabular}[c]{@{}c@{}}Overall Rate in \\ This Time Slot\end{tabular} \\ \hline\hline
\multirow{3}{*}{\begin{tabular}[c]{@{}c@{}}ALEM with \\ $K_B$=537 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \cline{3-10}
& & $B$ & 4 & Lattice & 0.003 & 0.45 & 0.65 & 1 & 0.53 \\ \cline{2-10}
& 2 & $Relay$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \hline\hline
\multirow{5}{*}{\begin{tabular}[c]{@{}c@{}}SLEM with \\ $K_B$=537 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \cline{3-10}
& & $B$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \cline{2-10}
& 2 & $Relay$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \cline{2-10}
& 3 & $B$ & 4 & Lattice & 0.003 & 0.45 & 0.65 & 1 & 0.53 \\ \cline{2-10}
& 4 & $Relay$ & 3 & Lattice & 0.003 & 0.45 & 0.65 & \textbackslash{} & 0.37 \\ \hline\hline
\multirow{5}{*}{\begin{tabular}[c]{@{}c@{}}STEM with \\ $K_B$=537 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & Polar codes and 8QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.37 \\ \cline{3-10}
& & $B$ & 3 & Polar codes and 8QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.37 \\ \cline{2-10}
& 2 & $Relay$ & 3 & Polar codes and 8QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.37 \\ \cline{2-10}
& 3 & $B$ & 4 & Polar codes and 16QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.53 \\ \cline{2-10}
& 4 & $Relay$ & 3 & Polar codes and 8QAM & \textbackslash{} & \textbackslash{} & \textbackslash{} & \textbackslash{} & 0.37 \\ \hline
\end{tabular}
\end{table*}
\section{Numerical Results}\label{sec:nu}
In this section, we evaluate performance of the transmission schemes introduced in Section \ref{sec:asy}. In the simulations, we assume that the modulation orders $M_A=3$, and $M_B=4$, i.e., the channel $h_A$ can support user $A$ to transmit signals with modulation order of 3, and the channel $h_B$ can support user $B$ to transmit signals with modulation order of 4. In addition, as an example, we apply the polar codes in the asymmetric and symmetric schemes for data protection. The results of this section can be extended to the case where other channel codes are applied. We omit the details here.
For the proposed asymmetric transmission scheme, we apply the lattice-based EM shown in Section \ref{sec:en-de}, for uplink and downlink PNC transmissions, and for the correction signal $\hat{\mv{e}}$ transmission. Note that the downlink PNC transmission and the correction signal transmission are simple P2P transmissions, and the lattice-based encoding and decoding algorithms shown in Section \ref{sec:en-de} can be similarly applied. We denote this scheme by ``\textbf{Asymmetric transmission applying Lattice-based EM (ALEM)}''. We have the following two benchmarks:
\begin{itemize}
\item \textbf{Symmetric transmission applying Lattice-based EM (SLEM):}
We apply the lattice-based EM both for uplink and downlink transmissions in time slots 1 to 4. Specifically, in time slot 1, i.e., the uplink of PNC transmission, the lattice encoding and decoding processes can apply the algorithm shown in Section \ref{sec:lattice} by setting $L_A=L_B$ additionally. In addition, the transmissions in time slots 2-4 are simple P2P transmissions, and the lattice-based encoding and decoding algorithms shown in Section \ref{sec:en-de} can be applied similarly.
\item \textbf{Symmetric transmission applying Traditional EM (STEM):} Unlike SLEM above, in this symmetric transmission scheme here, we apply a traditional EM in which the channel encoding and modulation are two separate processes, instead of the joint encoding and modulation as in the lattice-based EM. In addition, in the uplink of PNC, the relay applies a XOR channel decoder\cite{liew2015primer} to decode the network-coded messages from the two users.
\end{itemize}
We evaluate the performance in terms of throughput and FER of user $B$. The throughput is defined as follows:
\begin{align}
{\rm Throughput}=\frac{P_BK_B}{T} ~~ bps,
\end{align}
where $P_B$ is the number of times that the whole $K_B$ source bits are successfully decoded at user $A$ within $T$ duration. Note that, for the symmetric transmission scheme shown in Section \ref{sec:sy}, the $K_B$ information bits are transmitted partially in PNC phase (time slots 1 and 2), and partially in P2P phase (time slots 3 and 4). So the successful decoding of the $K_B$ source bits requires the successful decoding both at time slot 2 and time slot 4 at user $A$. The unit of the throughput is bits per second (bps). In addition, the bandwidth is 1 $M$ symbols/second. The FER is defined as follows:
\begin{align}
{\rm FER}=1-\frac{P_B}{\bar{P}_B},
\end{align}
where $\bar{P}_B$ is the number of times that $K_B$ source bits are decoded at user $A$ within $T$ duration. Moreover, the SNR is defined as
\begin{align}
SNR=\frac{p_AN}{K_AN_0}~~dB\label{eq:SNR},
\end{align}
where $N_0=2\sigma^2_{R,PNC}$ is the noise power, and $N$ is the packet length in time slot 1 for both schemes. In the simulations, we set $N=256$.
\subsection{Performance When ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a Codeword}\label{sec:hy}
In the asymmetric transmissions in which $L_A<L_B$, Section \ref{sec:pw_sp} shows that the hypercube power shaping $\mv{b}_A$ may cause decoding failures at the relay when ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is not a codeword to the codebook at the lattice level $L_A$. In this subsection, we first evaluate the performance of the asymmetric transmission in which ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a codeword to the codebook at the lattice level $L_A$ by simply setting the rate in lattice level-$L_A$ as 1, i.e., $R_{L_A}=1$. In this case, since the codebook in lattice level-$L_A$ is exactly the space $\{0,1\}^N$, ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a legal codeword to the codebook. As a result, we do not need to transmit the correction signal $\mv{e}$ in the asymmetric transmissions. The results are shown in Figs. \ref{Fig6} and \ref{Fig6_1}. Let us first introduce the legends in the figures as follows:
\begin{itemize}
\item \textbf{ALEM with $K_B=537$ bits:} The uplink and downlink rate setups are shown in TABLE \ref{T_A1}. Since $N=256$, user $B$ transmits $K_B=537$ bits in total.
\item \textbf{SLEM/STEM with $K_B=537$ bits:} The rate setups of the four time slots are shown in TABLE \ref{T_A1}. Since $N=256$, user $B$ transmits 281 bits in time slot 1. In time slot 3, the user $B$ transmits 256 bits to the relay separately. Thus, user $B$ transmits $K_B=537$ bits in total.
\item \textbf{ALEM/SLEM with $K_B=588$ bits:} The setup is the same as ``ALEM/SLEM with $K_B=537$ bits'' except that the coding rate $R_3=0.85$.
\item \textbf{STEM with $K_B=588$ bits:} The setup is the same as ``STEM with $K_B=537$ bits'' except that the coding rates in time slots 1, 2, 4, are all $0.43$, and the coding rate in time slot 3 is 0.58.
\item \textbf{ALEM/SLEM with $K_B=639$ bits:} The setup is the same as ``ALEM/SLEM with $K_B=537$ bits'' except that the coding rates $R_2=0.55$ and $R_3=0.95$.
\item \textbf{STEM with $K_B=639$ bits:} The setup is the same as ``STEM with $K_B=537$ bits'' except that the coding rates in time slots 1, 2, 4, are all $0.50$, and the coding rate in time slot 3 is 0.63.
\end{itemize}
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_1FER.pdf}\\
\caption{FER comparison when ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a legal codeword.}\label{Fig6}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_1Thpt.pdf}\\
\caption{Throughput comparison when ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ is a legal codeword.}\label{Fig6_1}
\end{figure}
We first compare the performance of ALEM and SLEM. First, Fig. \ref{Fig6} shows that for the same amount of the transmitted bits $K_B$, the FERs of ALEM and SLEM are roughly the same. Second, Fig. \ref{Fig6_1} shows that, in terms of throughput, ALEM performs much better than SLEM. For example, when $SNR=8$ dB and $K_B=639$ bits, ALEM has 15\% throughput improvement compared with that of SLEM. It suggests that, our proposed asymmetric transmission scheme has significant throughput improvement compared with that of the symmetric transmission, since the asymmetric transmission scheme saves the transmission time greatly. We emphasize that the ALEM achieves the above throughput improvement by simply setting the coding rate $R_{L_A}=1$.
Next, we compare the performance of SLEM and STEM. First, from Fig. \ref{Fig6}, for a given FER, SLEM performs 6 dB better than that of STEM. The reasons mainly come from the different PNC decoders at the relay between SLEM and STEM. Specifically, from the decoding process detailed in Section \ref{sec:lattice}, for SLEM the signals fed to the PNC decoder at each level of the lattice are BPSK-modulated signals through the modulo $\phi$ operation, while for STEM the signals fed to the PNC detector are 8QAM modulated signals. For a given SNR, the PNC detector for low-order modulated signals has better FER performance than that for high-order modulated signals\cite{liew2015primer}. For example, the detector for BPSK-modulated signals performs much better than the detector for 8QAM-modulated signals in terms of FER. As a result, SLEM performs better than STEM. Second, from Fig. \ref{Fig6_1}, the throughput of SLEM is much higher than that of STEM, since the FER of SLEM is much lower than that of STEM.
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_2FER.pdf}\\
\caption{FER comparison for general hypercube power shaping.}\label{Fig7}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_2Thpt.pdf}\\
\caption{Throughput comparison for general hypercube power shaping.}\label{Fig8}
\end{figure}
\begin{figure}[t]
\centering
\includegraphics[scale=0.41]{Figures/Time_2.pdf}\\
\caption{$T^{(Sym)}_3$ and $T_{\hat{\mv{e}}}$ comparison over different $K_B$. In ALEM, we plot the time $T_{\hat{\mv{e}}}$ for $K_B=385$ bits and $K_B=472$ bits; in SLEM, we plot the time $T_3^{(sym)}$ for $K_B=385$ bits and $K_B=472$ bits.}\label{Fig9}
\end{figure}
\begin{table*}[]\centering
\caption{Rate Setup When $K_B$=385 bits}\label{T_B1}
\vspace{-1em}
\begin{tabular}{|c|c|c|c|c|c|c|c|}
\hline
Scheme & \begin{tabular}[c]{@{}c@{}}Time \\ Slot\end{tabular} & User & \begin{tabular}[c]{@{}c@{}}Modulation \\ Order\end{tabular} & $R_1$ & $R_2$ & $R_3$ & $R_4$ \\ \hline\hline
\multicolumn{1}{|l|}{\multirow{4}{*}{\begin{tabular}[c]{@{}l@{}}ALEM with \\ $K_B$=385 bits\end{tabular}}} & 0 & $A$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{2-8}
\multicolumn{1}{|l|}{} & \multirow{2}{*}{1} & $A$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{3-8}
\multicolumn{1}{|l|}{} & & $B$ & 4 & 0.003 & 0.40 & 0.55 & 0.56 \\ \cline{2-8}
\multicolumn{1}{|l|}{} & 2 & $Relay$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \hline\hline
\multirow{5}{*}{\begin{tabular}[c]{@{}c@{}}SLEM with \\ $K_B$=385 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{3-8}
& & $B$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{2-8}
& 2 & $Relay$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \cline{2-8}
& 3 & $B$ & 4 & 0.003 & 0.40 & 0.55 & 0.56 \\ \cline{2-8}
& 4 & $Relay$ & 3 & 0.003 & 0.40 & 0.55 & \textbackslash{} \\ \hline
\end{tabular}
\end{table*}
\subsection{Performance for General Hypercube Power Shaping}\label{sec:gen}
We next show the simulation results for general hypercube power shaping in Figs.\ref{Fig7}-\ref{Fig9}. Note that, for general hypercube power shaping, ${\rm mod}_{\phi}\left(\mv{b}_A\right)$ may not be a codeword to the codebook at the lattice level $L_A$. In this case, user $A$ may need to send a correction signal to the relay beforehand. Let us first introduce the legends in the figure, as follows:
\begin{itemize}
\item \textbf{ALEM with $K_B=385$ bits:} User $A$ first transmits the compressed correction signal $\hat{\mv{e}}$ to the relay in time slot 0. The rate setup is shown in TABLE \ref{T_B1}. Since $N=256$, user $B$ transmits $K_B=385$ bits in total.
\item \textbf{SLEM with $K_B=385$ bits:} The rates setup is shown in TABLE \ref{T_B1}. Since $N=256$, user $B$ transmits 68 bits in time slot 1. In time slot 3, the user $B$ transmits 317 bits to the relay separately. Thus, user $B$ transmits $K_B=385$ bits in total.
\item \textbf{ALEM/SLEM with $K_B=472$ bits:} The setup is the same as ``ALEM/SLEM with $K_B=385$ bits'' except that the coding rate $R_4=0.90$.
\end{itemize}
\begin{figure}[ht]
\centering
\includegraphics[scale=0.61]{Figures/offset_Thpt.pdf}\\
\caption{ Throughput penalty when the channel precoding is not perfect.}\label{Fig11}
\end{figure}
First, from Fig. \ref{Fig7} we obverse that ALEM and SLEM perform relative the same in terms of FER. Second, Fig. \ref{Fig8} shows that in terms of throughput, when $K_B=472$ bits ALEM outperforms SLEM, while when $K_B=385$ bits SLEM outperforms ALEM. Since the FERs of the two schemes are roughly the same, this phenomenon is due to the transmission time $T^{(Sym)}$ of SLEM, and the transmission time $\hat{T}^{(Asy)}$ of ALEM. Specifically, according to \eqref{eq:com}, we have $T^{(Sym)}-\hat{T}^{(Asy)}=T^{(Sym)}_3-T_{\hat{\mv{e}}}$. In this case, in Fig. \ref{Fig9} we compare the correction signal transmission time $T_{\hat{\mv{e}}}$ and the duration of the third time slot $T^{(Sym)}_3$ over different $K_B$ for 50 Monte Carlo simulations. When $K_B=472$ bits, we observe from Fig. \ref{Fig9} that $T_{\hat{\mv{e}}}<T^{(Sym)}_3$. As a result, from \eqref{eq:com} we have $\hat{T}^{(Asy)}<T^{(Sym)}$. In this case, for a relatively same FER, the throughput of ALEM is higher than that of SLEM; on the other hand, when $K_B=385$ bits, we observe from Fig. \ref{Fig9} that $T_{\hat{\mv{e}}}>T^{(Sym)}_3$. As a result, from \eqref{eq:com} we have $\hat{T}^{(Asy)}>T^{(Sym)}$. In this case, for a relatively same FER, the throughput of SLEM is higher than that of ALEM. In Section \ref{sec:dy}, we will solve this problem by proposing a dynamic transmission scheme. In addition, from Fig. \ref{Fig7}, benchmarked against the uncoded lattice, we can see that the ALEM has 3dB coding gain at $10^{-3}$ when the correction signal error is taken into account.
\subsection{Performance Penalty for Imperfect Channel Precoding}
\begin{table*}[h]\centering
\caption{Rate Setup When $K_B$=614 bits}\label{T_B3}
\vspace{-1em}
\begin{tabular}{|c|c|c|c|c|c|c|c|}
\hline
Scheme & \begin{tabular}[c]{@{}c@{}}Time \\ Slot\end{tabular} & User & \begin{tabular}[c]{@{}c@{}}Modulation \\ Order\end{tabular} & $R_1$ & $R_2$ & $R_3$ & $R_4$ \\ \hline\hline
\multirow{3}{*}{\begin{tabular}[c]{@{}c@{}}ALEM with \\ $K_B$=614 bits\end{tabular}} & \multirow{2}{*}{1} & $A$ & 3 & 0.003 & 0.45 & 0.95 & \textbackslash{} \\ \cline{3-8}
& & $B$ & 4 & 0.003 & 0.45 & 0.95 & 1 \\ \cline{2-8}
& 2 & $Relay$ & 3 & 0.003 & 0.45 & 0.95 & \textbackslash{} \\ \hline
\end{tabular}
\end{table*}
In this subsection, we evaluate the performance when the channel precoding conditions in \eqref{eq:c1} and \eqref{eq:c2} are not strictly satisfied. We define the channel gain compensation offset as:
\begin{align}
O_{pw}=\frac{|h_B||\beta_B|\sqrt{p_A}}{|h_A||\beta_A|\sqrt{p_B}},
\end{align}
and the channel phase compensation offset as:
\begin{align}
O_{ph}=\theta_{\beta_B}+\theta_{h_B}-\theta_{\beta_A}-\theta_{h_A}.
\end{align}
Note that, in PNC, only $O_{pw}$ and $O_{ph}$ affect the performance, not the individual $\frac{|h_u||\beta_u|}{\sqrt{p_u}}$ and $\theta_{\beta_u}+\theta_{h_u}$, $u\in\{A,B\}$. In Fig. \ref{Fig11}, we show the throughput performance of ALEM under different $O_{pw}$ and $O_{ph}$. The parameters of ALEM is shown in TABLE \ref{T_B3}. First, when $O_{pw}\le1.1$ or $O_{ph}\le0.025\pi$, we observe from Fig. \ref{Fig11} that the performance penalty is quite small. Second, when $O_{pw}=1.15$ or $O_{ph}=0.05\pi$, Fig. \ref{Fig11} shows that the throughput penalty is 1dB when SNR is low, and the penalty can be ignored when $SNR=8$ dB. We emphasize that, the tested power offsets and phase offsets are based on the channel precoding precision in a lattice-based PNC implementation paper\cite{tan2018mobile}.
\begin{figure}[t]
\centering
\includegraphics[scale=0.61]{Figures/R4_3Thpt.pdf}\\
\caption{Throughput comparison between DLEM, ALEM, and SLEM for general hypercube power shaping.}\label{Fig10}
\end{figure}
\section{Dynamic Transmission Scheme}\label{sec:dy}
As we shown in Section \ref{sec:gen}, when the coding rate $R_{L_A}$ is far smaller than 1, the symmetric transmission may perform better than that of the asymmetric transmission since $T_{\hat{\mv{e}}}$ may be larger than $T^{(Sym)}_3$. In this case, if we insist on the asymmetric PNC transmission at all, we will not achieve the optimal throughput in the end since sometimes the symmetric transmission scheme performs better. To solve the above problem, we propose to ask the relay $R$ to choose the two schemes dynamically based on the values of $T_{\hat{\mv{e}}}$ and $T^{(Sym)}_3$ so that the dynamic transmission scheme can always achieve the better performance between ALEM and SLEM. Specifically, if $T^{(Sym)}_3\le T_{\hat{\mv{e}}}$, then the symmetric transmission scheme is selected; otherwise, the asymmetric transmission scheme is selected. We denote this scheme by ``\textbf{Dynamic transmission scheme applying Lattice-based EM (DLEM)}''. The simulation results are shown in Fig. \ref{Fig10}. Let us first introduce the legends as follows.
\begin{itemize}
\item \textbf{DLEM with $K_B=385/472$ bits:} The relay dynamic selects the scheme between ALEM and SLEM according to the values $T_{\hat{\mv{e}}}$ and $T_3^{(Sym)}$. The parameters of ALEM/SLEM with $K_B=385/472$ bits are introduced in Section \ref{sec:gen}.
\end{itemize}
Fig. \ref{Fig10} shows the throughput comparison between DLEM and ALEM/SLEM. From Fig. \ref{Fig10}, DLEM can always achieve the better performance between SLEM and ALEM over different rate setups, since DLEM always chooses the scheme with smaller transmission time.
\section{Conclusion}\label{sec:con}
This paper studied an asymmetric transmission scheme in PNC in which users $A$ and $B$ transmit different amount of information in the uplink of PNC simultaneously. A key challenge is how to implement channel coding and modulation in asymmetric PNC transmission such that the relay can deduce network-coded messages correctly from the two users. To solve this problem, we first proposed a lattice-based EM in which the two users encode and modulate their information in lattices with different lattice levels. In addition, we find that the applied hypercube power shaping causes decoding failures at the relay. We solved this problem by asking user $A$ to transmit a correction signal beforehand such that the difference between the power shaping and the correction signal is a legal codeword. Last, to reduce the correction signal transmission time, we applied the polar source coding technique to compress the correction signal, and user $A$ can transmit the compressed correction signal instead. We find that the polar source coding technique can efficiently reduce the correction signal transmission time when the channel coding rate at lattice level $L_A$ is close to 1. However, when channel coding rate at lattice level $L_A$ is not close to 1, the overall asymmetric transmission time may be larger than the symmetric time. To solve this problem, we put forth a dynamic transmission scheme in which the relay dynamically selects one of the transmission schemes which has smaller transmission time. Numerical results demonstrate the effectiveness of the proposed schemes.
\bibliographystyle{IEEEtran}
|
\section{Introduction}
Dimensionful constants appearing in a theory enable one to define dimensionful attributes of a system that are of special significance in the dynamics of that system. In quantum mechanics, Planck's $\hbar$ defines the de Broglie wavelength of a particle, given its momentum, and in relativistic quantum mechanics, $\hbar$ (with $c$) defines the Compton wavelength of a particle given its mass. In relativistic gravity, $G$ and $c$ define the Schwarzschild radius of a body, given its mass. All these quantities are of obvious and proven usefulness.
\par
MOND \cite{milgrom83} -- which strives to account for the mass discrepancies in The Universe without dark matter -- introduces a new constant, $a_{0}$, with the dimensions of acceleration (for reviews of MOND see Refs. \cite{fm12,milgrom14,milgrom20}). Two system-specific attributes of proven usefulness that MOND defines with the use of $a_{0}$ (and $G$) are the ``MOND radius'' and the ``MOND speed'' of a given mass.
\par
$a_{0}$, together with $c$ and $G$, also define universal, not-system-specific, quantities, the MOND length, $\ell\_M\equiv c^2/a_{0}$, the MOND time $t\_M\equiv c/a_{0}$, and the MOND mass, $M\_M\equiv c^4/Ga_{0}$. Their values are of cosmological magnitudes, which perhaps points to the fundamental basis of MOND (e.g., Ref, \cite{milgrom20a}).
They are analogous to the universal Planck length, time, and mass, which $\hbar$ defines, together with $c$ and $G$.
\par
Here, I point out that MOND also defines an important fiducial value of the specific angular momentum (hereafter, SAM), and I elaborate on the ways in which it enters the dynamics of galaxies and their evolution.
\par
Correlations are observed between global properties of the baryonic body of disc galaxies -- such as their total mass, disc mass, rotational speed, etc. -- and their angular momentum (hereafter, AM) (see, e.g., the recent Refs. \cite{og14,jb19,posti18,fr18,pina21a} for but a few examples). These have given rise to much discussion as to their significance and possible reasons for their emergence in the dark-matter paradigm (e.g., Ref. \cite{dalcanton97} and Refs. \cite{og14,posti18,fr18,jb19,pina21a}). Reference \cite{lelli19} discusses
AM-mass relations vis a vis the baryonic Tully-Fisher relation.
\par
Correlations involving the AM require, in the dark-matter paradigm, separate explanations, because they hinge on mutual effects of the baryonic and the putative dark-matter halo; e.g., the exchange of AM between the components.
The correlations I specifically discuss here can perhaps be worked by hand into the results of dark-matter simulations, as is usually done in the context of this paradigm. In MOND, however, such correlations follow naturally and without recourse to complicated galaxy formation and evolution scenarios, as MOND is much more constrained than the dark-matter paradigm.
\par
Inasmuch as MOND predicts correctly, as it does, the rotation curves of individual disc galaxies from their baryonic mass distribution, it, perforce, also predicts correctly their AM from the mass distribution. However, this does not directly imply correlations between global properties and the AM. It is thus interesting to inquire how such correlations arise in MOND.
\par
In Sec. \ref{SAM}, I define the MOND fiducial SAM. In Sec. \ref{scaling}, I show how it underlies galaxy correlations involving their AM, and, in Sec. \ref{evolution}, how it is an important predictor of the type of galaxy a protogalaxy will settle to, explaining why some galaxies end up as low-surface-density, pure discs, and some as high-surface-density, disc-plus-bulge ones. In Sec. \ref{observation}, I compare with some relevant observations. Section \ref{discussion} is a discussion of further points.
\section{The MOND specific angular momentum of a galaxy \label{SAM}}
For a body of (``baryonic'') mass $\M$ (a ``galaxy'' hereafter), the MOND constant, $a_{0}$, with $G$, defines
the ``MOND radius''
\begin{equation} r\_M\equiv \left(\frac{\M G}{a_{0}}\right)^{1/2}=\left(\frac{r\_s\ell\_M}{2}\right)^{1/2}, \eeqno{mondradius}
where $r\_s$ is the Schwarzschild radius of $\M$, and $\ell\_M$ the MOND length, which is comparable with the Hubble distance.
It also defines the ``MOND velocity''
\begin{equation} V\_{\infty}\equiv (\M Ga_{0})^{1/4}. \eeqno{vinf}
MOND also defines a universal (i.e., mass independent) fiducial surface density
\begin{equation} \S\_M\equiv\frac{a_{0}}{2\pi G}. \eeqno{sigmam}
Their special roles in galaxy dynamics have been widely discussed (see below, and the MOND reviews \cite{fm12,milgrom14,milgrom20}).
\par
I note here that $a_{0}$ (with $G$) also defines an important fiducial value of the SAM for a body of mass $\M$:
\begin{equation} j\_M(\M)\equiv\rMV\_{\infty}=\M^{3/4}(G^3/a_{0})^{1/4}, \eeqno{fidu}
and in terms of $V\_{\infty}$
\begin{equation} j\_M(\M)=V\_{\infty}^3/a_{0}. \eeqno{fiduvv}
For the canonical value, $a_{0}=1.2~10^{-8}{\rm cm~s^{-2}}$ \cite{fm12,milgrom14,milgrom20}, we have
$$j\_M(\M)=383(\M/10^{10}M_{\odot})^{3/4}~{\rm kpc}~{\rm km~s^{-1}}$$
\begin{equation} =269(V\_{\infty}/100{\rm km~s^{-1}})^3~{\rm kpc}~{\rm km~s^{-1}}. \eeqno{numar}
\subsection{Role of $j\_M$ in scaling relations \label{scaling}}
To better understand the role of $j\_M$ we need to recapitulate the special roles of $r\_M$ and $V\_{\infty}$.
The MOND radius, $r\_M$, plays an important role in defining the transition radius from the Newtonian to the deep-MOND regime. Bodies whose effective size is much larger than their $r\_M$ are governed by deep-MOND, scale-invariant dynamics, while bodies contained well within their $r\_M$ are, by and large, governed by standard dynamics (Newtonian or general relativistic).
\par
While there are objects (such as stars) that are much smaller than their MOND radius,
galaxies of all types are not found to be appreciably smaller than their MOND radius. This is the expression in MOND of early observations dubbed the ``Freeman law'' (for disc galaxies) and ``Fish law'' (for elliptical galaxies), which state that the distribution of mean surface densities, $\av{\S}$, of galaxies is cut off above a certain value, $\av{\S}_0$ (see, e.g. Ref. \cite{mbs95}, in particular, their Fig. 3).\footnote{The original statements where that $\av{\S}$ was narrowly distributed around some $\av{\S}_0$. We now understand that this was due to selection against galaxies with $\av{\S}<\av{\S}_0$, of which there are, indeed, many.} With the advent of MOND it was pointed out that this value $\av{\S}_0$ corresponds to a mean acceleration ($G\av{\S}_0$) of $\approxa_{0}$. Moreover, there are explanations for the existence of such a cutoff in the framework of MOND (e.g., Refs. \cite{milgrom83b,milgrom84,milgrom89,brada99a}).
\par
$V\_{\infty}$ is of special significance in that MOND predicts that the rotational speed on circular orbits around a mass $\M$ should become independent of orbital radius at asymptotically large radii, leveling at the value $V\_{\infty}(\M)$.
But, $V\_{\infty}$ features not only on the asymptote, it also sets the velocity scale for the whole galaxy. For example, for self-gravitating bodies that are deep in the MOND regime (i.e., of mean accelerations $\lla_{0}$) MOND predicts that the mass-weighted root-mean-square velocity is $\av{V^2}^{1/2}\approx 0.8V\_{\infty}$ (see, e.g., Refs. \cite{milgrom12,milgrom14a} for the predictions, and Refs. \cite{mm13a,pl20} for observational verification).
\par
At the other end, for high-surface-density galaxies, barring some extreme examples, the rotational speed remains roughly constant at $V\_{\infty}$ down to small radii. This is understood in MOND as tantamount to the existence of the Freeman cutoff:
Without further knowledge, and based only on AM argumentation, a galaxy can, in principle, be envisaged that has $\av{V}_j\ggV\_{\infty}(\M)$. But this would mean that the bulk of the galaxy is very deep in the Newtonian regime. This however, is largely excluded in MOND by the arguments leading to the Freeman and Fish limits, as indeed is observed in real galaxies. Galaxies with even the maximum rotation speed exceeding $1.5V\_{\infty}$ are very rare.
\par
More quantitatively,
the relevant mean of the rotational speeds in the disc of surface density $\Sigma(r)$ is
\begin{equation} \av{V}_j\equiv\frac{\int\Sigma(r)r^2V(r)dr}{\int\Sigma(r)r^2dr}, \eeqno{viva}
where $V(r)$ is weighted in the way it enters the SAM of the disc:
\begin{equation} j\_D=\frac{\int\Sigma(r)r^2V(r)dr}{\int\Sigma(r)r~dr}=\av{r}\av{V}_j, \eeqno{kasal}
where the mean disc radius is
\begin{equation} \av{r}\equiv\frac{\int\Sigma(r)r^2dr}{\int\Sigma(r)r~dr}. \eeqno{factor}
The arguments above state that for discs of all types we have in MOND $\av{V}_j\approxV\_{\infty}$.
Even more specifically, I calculated $\av{V}_j/V\_{\infty}$ for MOND rotation curves of exponential disc of scale length $h$ (for which $\av{r}=2h$), for different values of $\xi=r\_M/h$. I find for all deep-MOND discs (low-surface density), which have $\xi\ll 1$, $\av{V}_j/V\_{\infty}=0.95$. For $\xi=1,~2,~4$, I find, respectively, $\av{V}_j/V\_{\infty}=1.03,~1.12,~1.29$ [with the MOND interpolating function $\nu(y)=(1-e\^{-y^{1/2}})^{-1}$, see the MOND reviews \cite{fm12,milgrom14,milgrom20} for its meaning; the exact choice of $\nu$ is quite immaterial in the present context].
\par
To recapitulate, to within a factor of order unity, $V\_{\infty}$ is the effective rotational speed that enters the SAM {\it of the disc component} in disc galaxies.
This means that the SAM of these discs is
\begin{equation} j\_D\approx \frac{\av{r}}{r\_M}j\_M(\M)=\left(\frac{\S\_M}{\av{\S}}\right)^{1/2}j\_M(\M), \eeqno{ipota}
where $\M$ is the total baryonic mass of the galaxy (including all components, such as a bulge), $\av{\S}=\M/2\pi\av{r}^2$ is some mean surface density of the galaxy, and $\S\_M$ is the MOND surface density defined in Eq. (\ref{sigmam}).\footnote{I adopt for concreteness sake a simplified picture of a disc galaxy of total mass $\M$, with one rotationally supported disc component of mass $\M\_D$, and a nonrotating bulge of mass $\M\_B=\M-\M\_D$, with $J$ -- the total AM of baryons, wholly in the disc. Thus, $j\equiv J/\M$, and $j\_D\equiv J/\M\_D$.}
\par
Relation (\ref{ipota}) establishes $j\_M$ as an underlying cornerstone defining correlations between the AM or SAM of galaxies and other global properties. It does so in ways that depend only little on details of the formation and evolution of these galaxies -- in contradistinction with what happens in the dark-matter paradigm as follows:
\par
High-surface-density galaxies, with few exceptions, have (as per the ``Freeman law'') $\av{r}\approxr\_M(\M)$. Relation (\ref{ipota}) then tells us that their discs should lie on the fiducial relation $j\_D\approxj\_M(\M)$. Thus, their global SAM should satisfy
$j\approxj\_M(\M)(\M\_D/\M)$. In other words, to the extent that high-surface galaxy does not have a dominant, nonrotating bulge it should lie on the $j\_M(\M)$ relation in the $j-\M$ plane. If it has a substantial bulge it should lie below the relation.
\par
As to low-surface-density galaxies, which are deep in the MOND regime; they are generically of subdominant bulge, and relation (\ref{ipota}) tells us that they should lie above the $j\_M(\M)$ relation; the more so the deeper they are in the MOND regime (i.e. the larger their $\av{r}/r\_M$ is).
\subsection{Role of $j\_M$ in galaxy evolution \label{evolution}}
Based on the arguments in the previous sections, MOND can explain why some galaxies become low-surface-density virialized disc galaxy, mostly of negligible bulge, while others virialize into disc galaxies with mean surface densities near the Freeman limit, mostly possessing bulges.\footnote{By ``bulge'' here and in what follows I mean any component
of the galaxy -- possibly also a halo -- that takes up mass but little angular momentum, and
is used solely as a component to be reckoned with in the mass and AM balance. I am not referring to any specific type of bulge or to the possibly complicated way in which it forms, as long as it is a result of a secular evolution, not e.g. of mergers.}
\par
Envisage a protogalactic body\footnote{A ``protogalaxy'' here means the state of the would-be-disc-galaxy when it starts to evolve in isolation. It can be a primordial mass that will develop in isolation, or a pair or a group of galaxies that will eventually merge and evolve into one galaxy whose virialized state we want to determine.} of total mass $\M$ and total AM $J$ (with SAM $j=J/M$). Suppose that it decouples from its surrounding, and evolves into a virialized state in isolation, and without disintegrating, exchanging mass or AM with neither external entities, nor -- as MOND posits -- with a dark-matter halo.
\par
We saw in Sec. \ref{scaling} that MOND dictates that in the virialized state, the disc has $\av{V}_j\approxV\_{\infty}(\M)$, where $\M$ is the total mass of the galaxy.
Consider first the case with
\begin{equation} \zeta\equiv j/j\_M(\M)\gg1. \eeqno{liut}
If the virialized galaxy possesses a (nonrotating) bulge of mass $\M\_B$, the disc, of mass $\M\_D=\M-\M\_B$ is left with SAM
$j\_D=j\M/\M\_D$, which has to equal $\av{r}\av{V}_j\approx\avrV\_{\infty}(\M)$. To accommodate this the disc must adjust its mean radius to be
\begin{equation} \frac{\av{r}}{r\_M(\M)}\approx \zeta\frac{\M}{\M\_D}\gg 1. \eeqno{buteq}
The minimal value of $\av{r}$ is $\zetar\_M(\M)$, when no bulge is formed. This state of things describes a low-surface-density disc, as concretely defined in the context of MOND: a disc whose mean radius is much larger than the MOND radius of the galaxy, or equivalently, the mean acceleration in which, $\av{a}=\M G/\av{r}^2\lla_{0}$.
\par
Reference \cite{wkf20} shows results of MOND simulations of collapsing gas clouds (finding that they form virialized disc galaxies with exponential discs). Based on only a handful of simulations they observed that: ``...This suggests that low surface brightness galaxies result from collapsing gas clouds with high specific angular momentum.'' This is in line with the above general result. It would be interesting to see if this result and the ones below are supported by more quantitative and systematic MOND simulations.
\par
If, on the other hand, the protogalaxy starts with $\zeta\ll 1$, how can this be accommodated by the disc of the virialized galaxy, given that it has to have $\av{V}_j\approxV\_{\infty}(\M)$?
In principle, considering only conservation of mass and AM, the galaxy can end up as a pure disc. But it then has to attain a small enough $\av{r}$ to make $j\_D=\av{r}\av{V}_j\approx \avrV\_{\infty}(\M)$. This would imply $\av{r}/r\_M\approx\zeta\ll 1$. So the disc would be deep in the Newtonian regime, and would greatly exceed the Freeman limit. MOND does not robustly predict that the Freeman limit must be obeyed, but it points to it as the more probable outcome.
\par
If there are processes that limit $\av{\S}$ roughly to the Freeman value, the only route the galaxy can take is to put enough of its mass into a nonrotating bulge and attain the minimal $\av{r}$ compatible with the Freeman limit $\av{r}\approxr\_M(\M)$. The disc then sits on the fiducial MOND SAM
$j\_D\approxj\_M(\M)$, which, in turn, dictates that its mass is $\M\_D\approx \zeta\M$, with the bulge mass $\M\_B\approx (1-\zeta)\M$.
Such an enforced formation of a bulge is also in line with the arguments, and compatible with the expected dynamics, leading to a Freeman limit in MOND: When the inner surface density of the disc exceeds the Freeman limit dynamics become Newtonian, hence the inner disc becomes unstable, not being protected by the stabilizing MOND effects \cite{milgrom83b,milgrom89,brada99a}, hence is amenable to churning up a bulge, leaving the galaxy at the Freeman limit.
\section{Comparison with observations \label{observation}}
The expectations argued for in Sec. \ref{scaling} call for plotting the disc SAM, $j\_D/j\_M(\M)$, against the mean surface density, $\av{\S}$. MOND leads us to expect that for $\av{\S}$ at the high end -- i.e., near the Freeman limit -- $j\_D$ should be given by the MOND fiducial, $j\_M$, calculated for the total mass of the galaxy. But, as we go to progressively lower $\av{\S}$ values, below the MOND value, $j\_D$ should be above the $j\_M(\M)$ line and progressively depart from it.
\par
I could not find in the literature plots of exactly this desired description, but there are to be found analyses plotting $j$ against other global properties of the galaxies, which can be used as reasonable proxies.
\par
I chose for comparison the recent analysis of Ref. \cite{pina21a} who plotted, for a sample of disc galaxies the global baryonic SAM ($j=J/\M$ in our notation) against $\M$. Their points are reproduced here in Fig. \ref{asa}, together with the MOND $j\_M(\M)$.
\begin{figure}[ht]
\centering
\includegraphics[width = 8cm] {Pavels_plot}
\caption{The baryonic SAM against the total baryonic mass. Data for a sample of disc galaxies from Ref. \cite{pina21a} are shown, with their best fit power law (dashed line). The thick (red) line shows the fiducial MOND relation $j\_M(\M)$ from Eq. (\ref{numar}). Figure, courtesy of Pavel Mancera Pi\~{n}a.} \label{asa}
\end{figure}
\par
The mean surface densities of discs are correlated with their masses (hence with $V\_{\infty}\propto \M^{1/4}$), in that, by and large, low-surface-density galaxies are of lower mass (see, e.g., Fig. 2 of Ref. \cite{lms16}, for the stellar quantities, ignoring the gas) \footnote{There are relatively rare examples of high-mass, low-surface-density galaxies.}. In plots of $j$ vs. $\M$ we thus expect high mass galaxies to lie around the $j\_M(\M)$ line, rising above it for smaller and smaller $\M$ values.
\par
Progressively less massive disc galaxies are also becoming progressively low in surface density. With this in mind we see from Eq. (\ref{ipota}) that the galaxies in the sample at the higher-mass end, which have $\av{\S}\approx\S\_M$, do indeed fall around the $j\_M$ line, while at lower and lower masses, with progressively smaller $\av{\S}$, they do, as expected, fall above the $j\_M$ line, and depart progressively from it.
\par
The MOND fiducial $j\_M(\M)$ thus predicts correctly the amplitude of the observed relation as defined by the high-mass end, and the qualitative behavior with galaxy mass.
\section{Discussion \label{discussion}}
I have explained how the fiducial MOND SAM, $j\_M$ plays a central role in defining the properties of virialized disc galaxies, and how
it defines the borderline in the mass-AM plane of protogalaxies between those that will become bulgeless low-surface-density discs, and those that will possess a bulge and have mean surface densities near the Freeman limit.
\par
The former of the two roles does not depend much on formation scenarios, as it concerns, and is based on, MOND dynamics of settled galaxies that follow from only the basic tenets of MOND. Its application requires, though, considerations of several caveats. For example, we used simplistic picture of a disc galaxy as made of a single component disc, and a nonrotating bulge. Galactic discs generally have a stellar and a gas component with different masses, and different surface densities, hence different SAM. (They both have, however, roughly the same $\av{V}_j\approxV\_{\infty}(\M)$.)
This is not a concern at the high-mass end, where the gas disc is by far subdominant generically. Generically the gas fraction increases with decreasing surface density (and mass) (see, e.g., Fig. 4 of Ref. \cite{lms16}, which, however use the surface brightness, not the total surface densities -- including gas -- which are relevant here) and at the low end we may thus be dealing again with a single dominant gas component, which generically has a different $\Sigma(r)$ than the stars (as in the galaxies studied in Ref. \cite{sanders21}). One should then be careful not to use $\av{r}$ and $\av{\S}$ values based on the stellar distribution alone.
\par
References \cite{jb19,pina21a}, among others, also plot separately the SAM of gas and stars as functions of their respective masses. But the interpretation of these based on $j\_M(\M)$ would be rather roundabout, for example because it would have to involve the correlation of the gas fraction with total mass, which is much a matter of evolution, and not cleanly an aspect of the dynamics.
\par
I thank Pavel Mancera Pi\~{n}a for preparing the figures, and an anonymous referee for useful comments.
{\it Note added.--} After completion of this paper there appeared an analysis of disc-galaxy $j-\M$ relations, with results that lend themselves much better to direct comparison with the MOND predictions. Reference \cite{pina21b}, using an even larger sample of disc galaxies than in Ref. \cite{pina21a}, plot the $j-\M$ relations separately for galaxy subsamples characterized by different values of the gas fraction. These plots are reproduced in Fig. \ref{baasa}, together with the fiducial, MOND $j\_M(\M)$ relation. The main points to note are
\begin{enumerate}[(i)]
\item
For each gas-fraction bin, the observed $j-\M$ relation is parallel to the MOND fiducial relation (with a slope of $\approx 3/4$). Inasmuch as the gas fraction is a proxy of the mean surface density, this agrees with the MOND prediction for a constant surface density [Eq. (\ref{ipota})].
\item
The higher the gas fraction -- corresponding to progressively lower mean surface density -- the higher is the observed plot above the fiducial relation -- also as predicted in Eq. (\ref{ipota}). A quantitative measure of the actual mean surface densities for each bin would be desirable for quantitative comparison with the MOND prediction, but the trend is as predicted by Eq. (\ref{ipota}).
\item
In the highest-gas-fraction bin (lower-right panel) the data points lie above the fiducial relation by about half an order of magnitude. According to Eq. (\ref{ipota}), this would correspond to a surface density $\sim 10$ times lower than the Freeman limit.\footnote{Note that what is relevant here are mass surface densities. So, for the high-gas-fraction galaxies it is by and large the gas surface density that is relevant, while for the low-gas-fraction galaxies it is by and large the stellar surface density.}
\item
The galaxies in the lowest gas fraction bin (upper-middle panel), which are at the high-surface-density end, fall on the fiducial MOND relation, showing that their mean surface densities are at the Freeman value, which corresponds to the MOND $\S\_M$, defined in Eq. (\ref{sigmam}).
\item
The upper-left panel shows all galaxies on the same plot. This is in the same vein as Fig. \ref{asa}. It shows clearly why the slope of the full-sample correlation is shallower than that of the fiducial MOND relation: As explained above, in Sec. \ref{observation}, this results from galaxies with lower masses having typically higher gas fractions (lower surface density) hence a higher normalization of the $j-\M$ relation relative to the fiducial.
\end{enumerate}
It emerges then that MOND all but removes the mystery from the $j-\M$ relation, whose origin no longer has to be looked for in complicated formation scenarios, as in the dark-matter paradigm.
\begin{figure}[ht]
\centering
\includegraphics[width = 9cm] {6panels_MOND}
\caption{The $j-\M$ relations for a sample of disc galaxies plotted separately for different bins of the gas-mass fraction, shown each with the best-fit power law in solid (colored) lines, taken from Ref. \cite{pina21b}. Also shown in each panel is the fiducial MOND relation $j\_M(\M)$ from Eq. (\ref{numar}) (dashed line). The upper-left panel shows all galaxies on the same $j-\M$ plot, with all the best-fit lines also shown (and color coded). Color coding for the gas fraction is given on the right. Figure, courtesy of Pavel Mancera Pi\~{n}a.} \label{baasa}
\end{figure}
|
\section{Introduction}
Online discussion boards provide a versatile platform which allows users to have fluid and multithreaded discussions about any topic. Examples of discussion boards include Twitter, What's app, and Telegram. Telegram, in particular, is widely used by members of criminal and quasi-criminal Dark Net groups to exchange information and negotiate exchange of goods and funds. Thus, automated scanning, processing, and comprehension of Telegram conversations is a significant problem in understanding and preventing cybercrime.
When a new user joins the conversation, there may be thousands of existing messages and different topics already in the discussion. While human users can readily assimilate the chat history and integrate into the discussion, this is a difficult problem in natural language processing and AI. The conversations are asynchronous and at least somewhat overlapping. Therefore understanding the conversation requires disentangling the different threads so that individual conversations can be analysed. ``Reply-to'' and similar metainformation is useful, but not sufficient, for automatic disentanglement.
\begin{comment}
There are many reasons to engage in a discussion, novelty, previous replies and their number, engagement also depends on the time of the posting \cite{aragon2017generative}. It is not rare that due to reduced engagement a discussion can die down and a new message posted into this thread which is from a different theme or topic can start a whole new conversation. In a similar situation at a discussion board, some messages are replies for previous messages while some others are entirely new. While some discussion boards allow their framework to handle this by providing a reply-to function but it doesn't follow that all its users will use the said functionality.
\end{comment}
Reply to feature can come in different forms; one where the user can select the post to which they are replying to, this will show the whole or a part of the original message in the replying users message. Some discussion boards maintain the reply to feature as a tree like hierarchy where one could look into the thread in a much more informed manner. In any of these discussion boards, it is to be understood that users may or may not use the said functionality or if one chooses to use the features could use it in an incorrect manner which makes the reply structure also wrong. Not only that there maybe situations where a user wants to reply to many messages in the thread at once, most online platforms does not provide such a feature. Considering these reconstructing the reply structure is an interesting and relevant problem that needs to be explored. This problem was phrased as a structural learning \cite{wang2011learning} problem in natural language processing domain.
\begin{figure}
\centering
\includegraphics[height=6cm]{model.png}
\caption{Processing of posts with the context window paradigm 1 and generating the similarity matrix}
\label{fig:model}
\end{figure}
\section{Problem Statement}
\label{problem_statement}
In this article a `thread' is a linear, chronologically ordered conversation where two or more users take part in a discussion. Problem in simpler terms can be phrased like this; Given a thread $P_i$ compute the reply relations $R$. ($P_i = \{p_{i,1}, p_{i,2}, ..., p_{i,k}\}$), We need to extract post and replies relation ($p_{i_j} \rightarrow p_{i,k}$) for all the posts in the thread. A post ($p_{i,l}$) could have multiple replies, $(p_{i,l} \rightarrow \{p_{i,m}, p_{i,n} ...\}$)
Inspired by the Skipgram model in \cite{mikolov2013distributed} we model our inputs and labels as a singular post ($p_i$) in a thread and the context window of $k$ posts $p_{i-k}, p_{i-k-1}, ..., p_i$ respectively. The context will allow the network to encode positional information with respect to its linguistic features into the embeddings so that not only linguistic features are captured. In a typical conversation context is usually previous questions, answers and comments on a similar theme. If the reply relation is not extracted during the time the conversation is happening (not online) it is also possible to include posts which come after $p_i$ into the context such as, ($p_{i-k}, p_{i-k-1}, ..., p_i, p_{i+1}, p_{i+2}, ..., p_{i+k}$). This gives the network a unique perspective of the conversation which in an online setting would be difficult to incorporate.
Schisms in a conversation can happen due to various reasons \cite{elsner2008you}, while we do not observe all reasons we base that a schism can happen either due to a conversation dying out because users didn't engage in it, or there was a more interesting point or a question raised by a participant. We believe if we can detect schisms, we can efficiently model the post to parent relationship by correctly clustering messages.
To handle first type of schisms we can use the language similarity measure, since the vector embeddings itself incorporates the language with the positional information we can use the same here. The other can be modeled as a Hawkes process. A Hawkes process is a set of activation or excitation events, where each excitation has an exponential probability of exciting other events. Because of the exponential distribution it is useful to use a Laplace transformation to analyze the self exciting Hawkes processes.
\section{Data}
\label{data}
Telegram has been very successful in recent years \cite{dargahi2017analysis} as an instant messaging service (IM). While users can send text messages, photos, videos etc. to other users, the features that stand out in Telegram are its Channels, Groups, and the anonymity given to the users. We crawled specific channels in Telegram and logged conversational data using the publicly available API. Due to the nature of the conversations happening in these channels some users have been banned or deleted meaning that in some cases the crawler does not have access to the author of the message even though the message content exists in the thread. Moreover, when predicting the reply relations of a threaded structure the author of a message is quite important. We have taken the challenge of not using any meta data except for the time the post was created at.
\begin{figure}
\centering
\includegraphics[height=5cm]{boxplots.png}
\caption{Distribution of length of the messages in each chat}
\label{fig:boxplot}
\end{figure}
There is in interesting distribution of the message length in words. While most of the messages in each thread are short occasionally there are messages which has hundreds of words as well. These occasional messages are most of the time advertisements which seems to be selling or willing to buy things from users in the thread. Interestingly our encoded post embeddings are sensitive to the length of the message therefore it is easy to see these long messages as they seem to be outliers. For further reading we direct the readers to Section \ref{embeddings}.
We obtained three discussion threads and from here onward we shall call them `Chat 1', `Chat 2' and `Chat 3'. Each chat has messages, a unique identifier for any given message and a timestamp associated with it. Table \ref{datatable} is a descriptive table of how many messages and how long the discussion spans in each of these discussion threads. We have observed that there are short and long conversations present in the message threads, but conversations are not labeled.
\begin{table}[b]
\centering
\begin{tabular}{l r r}
\hline
\textbf{Thread} & \textbf{Number of messages} & \textbf{Time span (m)}\\
\hline
Chat 1 & 4832 & 1650.797\\
Chat 2 & 3685 & 2415.881\\
Chat 3 & 5597 & 2160.231\\
\hline
\end{tabular}
\caption{Dataset description}
\label{datatable}
\end{table}
\section{Model}
\label{model}
We create an LSTM based \cite{hochreiter1997lstm} model with a goal to learn vector representations to the posts in regards of their position of the thread and the language in the post itself. As discussed in the previous section to encode positional information we use the context window of surrounding posts. We created two paradigms for the context window, first has access to both messages which came before and after of the considering message. This allows the network to grasp positional information of the message from both sides, but this may not be the ideal in a real world setting. Claiming that a reply to a message will depend on the messages came before it, not the ones after. The second is when you take messages which came before a particular post and only them. We test both paradigms and evaluate results in the Section \ref{experiments}.
Following is a simple representation of the model and its objective function.
\[
l_i, W_i = \phi (p_i, C_i)
\] \[
loss\_value = similarity(l_i, W_i)
\]
Here ($p_i, C_i$) are post content and its context respectively. The model will process both these values and return a vector for the post and a vector for its context called ($l_i, W_i$) respectively. To learn the efficacy of ($l_i$) we employ a similarity function, since both $l_i$ \& $W_i$ are vectors in the same dimension it is a matter of distance between the two vectors.
We learn time based info from the Hawkes/Laplace process based models from these vectors. This is required because a vanilla LSTM based models will not consider the time difference between two posts while it takes each post occurrence as events which happened in constant time. This is where the Hawkes process is important, it factors in where time difference is needed.
\begin{figure}[t!]
\centering
\begin{subfigure}[b]{0.3\linewidth}
\includegraphics[width=\textwidth]{tsne3d_twoside5.png}
\caption{5$p_i$5} \label{atsne}
\end{subfigure}
\begin{subfigure}[b]{0.3\linewidth}
\includegraphics[width=\textwidth]{tsne_3d_oneside4.png}
\caption{$4p_i$}\label{btsne}
\end{subfigure}
\begin{subfigure}[b]{0.3\linewidth}
\includegraphics[width=\textwidth]{tsne3d_oneside10.png}
\caption{$10p_i$}\label{ctsne}
\end{subfigure}
\caption{Figure \ref{atsne} shows a first paradigm context window while Figures \ref{btsne} and \ref{ctsne} shows the second type, note that the original figure was rotated so that the clusters are evident in the illustration. In each illustration you can see dimensions $x, y$ \& $z$ which are calculated with the t-Stochastic Neighbor Embeddings \cite{van2008visualizing}}
\end{figure}
\section{Experiments}
\label{experiments}
Complete process of training the post embeddings to recreating the reply relations will be discussed here onward.
\subsection{Computing Post embeddings}
\label{embeddings}
First we shall discuss about the quality of the vector embeddings of the posts learned by our model. Linguistic and positional features were expected to learn as we trained these embeddings. To get a better understanding about our embeddings we compute t-Stochastic Neighbor Estimation and get 3-dimensional vectors for each of the embedding. We can use these vectors to visualize our embeddings and their quality. Using this it is trivial to examine the quality of the embeddings.
It is apparent in the figure \ref{ctsne} that obvious clusters exists in which when we explore more into them they are quite similar in language and the length of the post content. We used Agglomerative clustering and clustered into different number of clusters, and came into the above conclusion. It was also needed to change the size of the context window to see how that parameter will affect in the quality of the computed embeddings.
We transform naive Hawkes process with smoothed Laplace transformation.
\begin{figure}[t]
\centering
\begin{subfigure}[b]{0.49\linewidth}
\includegraphics[width=\textwidth]{chat2lap.png}
\caption{$Chat2$}\label{blap}
\end{subfigure}
\begin{subfigure}[b]{0.49\linewidth}
\includegraphics[width=\textwidth]{chat3lap.png}
\caption{$Chat3$}\label{clap}
\end{subfigure}
\caption{This illustration shows the naive Hawkes process of Chats 2 and 3}
\end{figure}
\subsection{Algorithms}
\label{algorithm}
First drawing inspiration from \cite{wang2008recovering} we create a similarity matrix for the post embeddings in order to create a graph with edges as the similarity. This will create a dense graph which is pruned using the Hawkes intensities. We calculate the average similarity score and then prune any edge with less than average score. This increases the number of conversations in the thread and allows the algorithm to find small conversations which happen inside bigger conversations.
\IncMargin{1em}
\begin{algorithm}[b]
\SetKwData{Ranges}{ranges}
\SetKwData{Embeddings}{embeddings}
\SetKwData{Pruned}{pruned}
\SetKwData{Sim}{similarityMatrix}
\SetKwData{Avg}{avg}
\SetKwFunction{Average}{averageScore}
\SetKwFunction{Zeros}{zeros}
\SetKwFunction{ }{ Similarity}
\SetKwFunction{In}{in}
\SetKwFunction{Add}{add}
\SetKwInOut{Input}{input}
\SetKwInOut{Output}{output}
\Input{\Ranges and \Embeddings}
\Output{Pruned Graph}
\Sim = \Sim(\Embeddings) \\
\Avg = \Average(\Sim) \\
\Sim[\Sim $<$ \Avg] = 0 \\
\Pruned = \Zeros(\Sim.shape) \\
\BlankLine
\For{(min, max) \In \Ranges}{
\Pruned[min:max, min:max] = \Sim[min:max, min:max]
}
\caption{Pruning Algorithm}
\label{algo_1pruning}
\end{algorithm}
\DecMargin{1em}
This algorithm will yield the pruned graph structure. It is satisfactory to assume that a post with an earlier time stamp will never be a child to a post which came after that. The resulting graph is a directed and sparse structure which represents the thread. Post processing of the graph will give us multiple discussion threads with one root message for each thread. This first run of the pruning algorithm will help to determine the root messages of the threads, however this tree like graph is has isolated sub graphs and each of these are shallow having maximum depth one, we can use another algorithm to compute the path of the message structure to reconstruct the threads parent post structure essentially creating a sparse pruned representation of the same graph.
\begin{figure}
\centering
\includegraphics[height=5cm]{graph_reconstruction.png}
\caption{Algorithm 2 input and output}
\end{figure}
Before the second stage of the pruning algorithm, the graph indicates edges from all the children from a parent. This means that a parent can have edges to its grand children. Goal of Algorithm 2 is to increase the depth of the isolated sub graphs, essentially this will prune the repetitive nodes making it a sensible discussion structure.
\IncMargin{1em}
\begin{algorithm}[t]
\SetKwData{Graph}{graph}
\SetKwData{Child}{child}
\SetKwData{Children}{children_}
\SetKwData{Pruned}{pruned}
\SetKwData{Visited}{visited}
\SetKwFunction{Remove}{remove}
\SetKwFunction{Addchildren}{setchildren}
\SetKwFunction{Children}{children}
\SetKwFunction{In}{in}
\SetKwFunction{Add}{add}
\SetKwInOut{Input}{input}
\SetKwInOut{Output}{output}
\Input{Graph pruned (\Pruned) with Algorithm 1}
\Output{Graph after removing extra linkages}
\For{$node$ \In \Graph}{
\Visited.\Add($node$)\\
\Children = \Graph.\Children(node)\\
\Pruned.\Addchildren(\Children) \\
\For{$itm$ \In \Visited}{
\If{$node$ == $itm$}{
continue\\
}
\For{\Child \In \Pruned.\Children(node)}{
\If{\Child \In \Pruned.\Children(itm)}{
\Pruned.\Children(itm).\Remove(\Child)
}
}
}
}
\caption{Further prunning - thinning the graph}
\label{algo_2pruning}
\end{algorithm}
\DecMargin{1em}
\section{Conclusions}
\label{conclusions}
This article presents a disentanglement method for threaded discussions where the reply relation will be discovered using a position encoded and linguistic embedding with the help of a graph pruning algorithm. We have shown that our method built on top of most of the literature shared herewith have been able to increment the performance of them.
While our method removes two phases of training similar to \cite{wang2008recovering} it is also not a complete end to end process. There is a separate entity (neural network) to create the embeddings, the graph structure is another entity with its own properties and parameters which needs adjusting. It is true that we have fine tuned our parameters for the data but for further scaling and managing it would be much easier to have one system which needs to be trained or parameter tuned once. We are using a top down construction of a graph and when one node is visited, the algorithm does not evaluate to the nodes above it to see whether it is attached to others, meaning that if a message is replying to multiple parent messages, we do not have the means to discover it yet.
|
\section{Introduction}
\label{sec:sec1}
Collective azimuthal correlations, commonly parameterized in terms of harmonic flow coefficients $v_{n}$, were crucial experimental
signals in the discovery of the strongly interacting fluid-like quark-gluon plasma (QGP) in ultra-relativistic heavy-ion collisions.
Those collectives have been found in ultra-relativistic heavy-ion collisions
at the Relativisitic Heavy Ion Collider (RHIC) of the Brookhaven National Laboratory~\cite{Abelev:2009lrr},
and at the Large Hadron Collider (LHC) of the European Organization for Nuclear Research~\cite{ATLAS:2012mot}.
Recently, in the high multiplicity events of the small collision systems at LHC~\cite{Khachatryan:2015ltc} and RHIC~\cite{Aidala:2019coq},
long-range correlated collective signal similarly to the large collision systems have been found.
The long-range correlation experimental data of these small collision systems can be reproduced by the hydrodynamics~\cite{Mantysaari:2017iof}.
However, hydrodynamics is not the only explanation for these long-range collective correlations~\cite{Schenke:2016moo}.
The Color Glass Condensate (CGC) model can be reproduce the experimental results of these collective through gluon field correlation~\cite{Mace:2018hoa}.
Therefore, the collectives caused by small collision systems have aroused heated discussion.
These collectives observed in the small collision systems:
(1) Is it an initial state effect that one has contributed from the correlation of initial momentum in the collisions (i.e., CGC~\cite{Mace:2018hoa})?
(2) Or a final state response, that the contribution from hydrodynamic evolution~\cite{Mantysaari:2017iof}
or the contribution of other simple scattering mechanisms~\cite{Koop:2015aar,Kurkela:2019fia}?
(3) Or both of them? In experiments, people have also carried out numerous measurements,
i.e., the PHENIX of RHIC scanned energy dependent on $^{3}$He-Au and d-Au collisions,
which clearly shows that the collective behavior is a result of the final state effect~\cite{Aidala:2019coq}.
However, so far, there is still a lack of abundant and significant experimental signals to prove the complete applicability of these prediction models on small collision systems.
Although various signals tend to the final state effect, the current experiments based on small collision systems
have not yet detected other significant signals that characterize the generation of QGP droplets, i.e., jet quenching.
A suggested solution to the above-mentioned problems of QGP minimum droplets is to operate a polarized ion beam~\cite{Bozek:2018efi},
which is certainly an attractive suggestion, but it may take several years to create a suitable infrastructure.
The inherent problems of the origin of these possible QGP droplets are fascinating, and other physical properties can still be learned by studying small systems.
It is assumed that the physical mechanism behind the significance collective in Pb-Pb and p-Pb collision is the same:
they are strongly-coupled QGP substances, and satisfy the framework of thermodynamics and hydrodynamic mechanics;
the fluctuating initial geometric can successfully predict the fluctuating final collective;
there are nonequilibrium partial sub-dynamics (it may cause the system to evolve from a weak-coupled collective to a strong-coupled collective).
The hydrodynamics points out that~\cite{Noronha-Hostler:2016sof} the influence of subnucleon color fluctuations in Pb-Pb and p-Pb collisions is different,
indeed, eccentricity in p-Pb collision is sensitive to subnucleon scale fluctuations,
and the collective in Pb-Pb collision with the same multiplicity is not particularly sensitive to microscopic subnucleon physics.
Therefore, subnucleon fluctuations are critical to understanding the collective correlations in small collision systems.
Recently, it has been recognized that hot spot fluctuations in subnucleons are crucial to understanding the geometry of the initial stage of high energy collisions~\cite{Mantysaari:2020rop}.
It leads to a series of new studies on the transverse spatial distribution of freedom degrees of subnucleon in protons and nuclei~\cite{Schlichting:2014tso,Mantysaari:2016eos}.
Ref.~\cite{Demirci:2021hsa} reveals the main source of fluctuation on the subnucleon scale:
the geometric fluctuation of a hot spot in proton (projectile side) is the main source of eccentricity,
while the fluctuation of color (target side) can only give a negligible correction.
Follow this subject, we study the asymmetry degrees in symmetrical small collisions and asymmetrical small collisions in this paper.
While, there are still not clear enough about geometric fluctuations of time-dependent evolution, especially in the process of nonequilibrium dynamics.
If we assume that a collective exists in small collision systems, the fluctuating behavior of these collective represent
critical tool for studying the properties of the QGP medium.
To explore these fluctuations, in this paper,
we mainly start from the time-dependent transverse asymmetry to study the general geometric fluctuation properties of the peripheral Pb-Pb and p-Pb collision systems.
To this purpose, we focus on time-dependent transverse shape asymmetry in peripheral Pb-Pb and p-Pb collisions using an
event averaged analysis.
This paper does not intend to talk about collective flow and non-collective behavior in small collision systems.
Notice that in this paper, we do not attempt to compare simulations with experimental data,
but rather to explore how the transverse asymmetry is influenced by the dynamic and/or dynamic fluctuations.
The paper is organized as follows: In \sect{sec:sec2} we briefly describe
the events averaged x-y and transverse components of asymmetry in a multi-phase transport (AMPT)
model~\cite{Lin:2004amt}, which is then used in the simulations.
Numerical results about the events averaged x-y and transverse components of asymmetry are presented in \sect{sec:sec3}.
Finally, we summarize the main results in \sect{sec:sum}.
\section{Materials and Methods}
\label{sec:sec2}
One observation to probe the transverse subnucleon fluctuations is the transverse shape asymmetry, $A(x)$.
In a single event, the transverse shape asymmetry is defined as
\begin{eqnarray}\label{asym:def1}
A(x) &=& \frac{\sqrt{\sum_{i=1}^{N}(x_{i}-\langle x\rangle)^{2}}}{\sqrt{N}\langle x\rangle}.
\end{eqnarray}
where brackets $\langle \cdots \rangle$ indicate the present particles are averaged over the entire event and $N$ is the multiplicity in a single event.
The variables $x$ can be considered samples from the spatial or the momentum in evolutionary stage.
In this case, $A(x)=0$ means that
the samples are completely symmetrical, whereas and $A(x)\neq 0$ corresponds to asymmetrical quantities.
For the event-by-event simulations, the events averaged transverse asymmetry is expressed as
\begin{eqnarray}\label{asym:def2}
\langle A(x)\rangle &=& \langle \frac{\sqrt{\sum_{i=1}^{N}(x_{i}-\langle x\rangle)^{2}}}{\sqrt{N}\langle x\rangle}\rangle.
\end{eqnarray}
To estimate the whole particle of an averaged method, one must be careful about noncollective physics in the strong color-coupled system,
i.e., non-hydrodynamic-like/particle-like, which contributed from the jet fragment and hadron resonance.
While, in this paper, we focus only on the fluctuation evolved with time in the strong couple system, not about the collective of the system.
Through this paper, we consider all charged particles in the present range (with 0.3 $< p_{T} <$ 3.0 GeV and $|\eta|<$2.40).
In this work, the transverse shape asymmetry is investigated in peripheral Pb-Pb (b=14-15 fm) and p-Pb (b=0-1 fm) collisions
at $\sqrt{s_{NN}}$ = 5.02 TeV by the AMPT model~\cite{Lin:2004amt}, respectively.
Note that the impact parameters are controlled by the transverse distances of the overlap in initial collision space,
not the final charged participant multiplicity, $M$. As a consequence, it includes a wide multiplicity range, from low $M$ to large ones.
This paper takes the specific shear viscosity $\eta/s=0.273$,
one is calculated by the Lund string fragmentation parameters in AMPT~\cite{De:2020rli}, i.e., $a=0.5$, $b=0.9$ GeV$^{-2}$,
$\alpha_{s}$ =0.33 and $\mu$ = 3.2 fm$^{-1}$. More thorough details of the AMPT model can be found in Ref.~\cite{Lin:2004amt}.
The results for Pb-Pb and p-Pb collisions are obtained by simulating 5$\times 10^{5}$ events for each given impact parameter.
\section{Results}
\label{sec:sec3}
\begin{figure*}[tp]
\begin{center}
\includegraphics[width=0.320\textwidth]{./fig101a}
\hspace{0.80cm}
\includegraphics[width=0.330\textwidth]{./fig101b}\\
\includegraphics[width=0.320\textwidth]{./fig101c}
\hspace{0.80cm}
\includegraphics[width=0.330\textwidth]{./fig101d}
\caption{(Color online)
Up panels: (a) the probability of initial parton multiplicity and (b) the probability of final charged hadron multiplicity
in Pb-Pb (b=14-15 fm) and p-Pb (b=0-1 fm) collisions at $\sqrt{s_{NN}}$= 5.02 TeV, respectively.
Down panels: (c) the initial averaged transverse spatial asymmetry as a function of the initial parton multiplicity and
(d) the final averaged transverse momentum asymmetry as a function of the final charged hadron multiplicity,
in Pb-Pb (b=14-15 fm) and p-Pb (b=0-1 fm) collisions at $\sqrt{s_{NN}}$= 5.02 TeV, respectively.
}
\label{fig1}
\end{center}
\end{figure*}
\begin{figure*}[h]
\begin{center}
\includegraphics[width=0.30\textwidth]{./fig102a}
\hspace{0.25cm}
\includegraphics[width=0.30\textwidth]{./fig102b}
\hspace{0.25cm}
\includegraphics[width=0.30\textwidth]{./fig102c}\\
\includegraphics[width=0.30\textwidth]{./fig102d}
\hspace{0.25cm}
\includegraphics[width=0.30\textwidth]{./fig102e}
\hspace{0.25cm}
\includegraphics[width=0.30\textwidth]{./fig102f}
\caption{(Color online)
The x-y components of the asymmetry distributions of initial spatial, initial momentum, and final momentum are shown in Pb-Pb (b=14-15 fm) and p-Pb (b=0-1 fm) collisions, respectively.
Up panels: for Pb-Pb collisions. Down panels: for p-Pb collisions.
}
\label{fig2}
\end{center}
\end{figure*}
\begin{figure*}[h]
\begin{center}
\includegraphics[width=0.36\textwidth]{./fig103a}
\hspace{1.00cm}
\includegraphics[width=0.36\textwidth]{./fig103b}
\caption{(Color online)
The transverse asymmetry distributions between final momentum and initial momentum are shown in Pb-Pb (b=14-15 fm) and p-Pb (b=0-1 fm) collisions, respectively.
Left panel: for Pb-Pb collisions. Right panel: for p-Pb collisions.
}
\label{fig3}
\end{center}
\end{figure*}
\begin{figure*}[h]
\begin{center}
\includegraphics[width=0.30\textwidth]{./fig104a}
\hspace{0.25cm}
\includegraphics[width=0.30\textwidth]{./fig104b}
\hspace{0.25cm}
\includegraphics[width=0.30\textwidth]{./fig104c}\\
\includegraphics[width=0.30\textwidth]{./fig104d}
\hspace{0.25cm}
\includegraphics[width=0.30\textwidth]{./fig104e}
\hspace{0.25cm}
\includegraphics[width=0.30\textwidth]{./fig104f}
\caption{(Color online)
The x-y and transverse components of averaged asymmetry of spatial and momentum as functions of the parton evolution time.
Up panels: for Pb-Pb (b=14-15 fm) collisions. Down panels: for p-Pb (b=0-1 fm) collisions.
}
\label{fig4}
\end{center}
\end{figure*}
\begin{figure*}[h]
\begin{center}
\includegraphics[width=0.360\textwidth]{./fig105a}
\hspace{0.80cm}
\includegraphics[width=0.354\textwidth]{./fig105b}\\
\includegraphics[width=0.360\textwidth]{./fig105c}
\hspace{0.80cm}
\includegraphics[width=0.354\textwidth]{./fig105d}
\caption{(Color online)
Linear fitting of the averaged transverse shape asymmetry (up-left panel and down-left panel) as functions of the parton evolution time.
Linear response coefficients extract from \eq{resp:def1} and \eq{resp:def2} are shown in up-right panel and down-right panel, respectively.
Up panels: correlation between the final averaged transverse momentum asymmetry, $\langle A(p_{T}^{final})\rangle$, and time-dependent averaged transverse spatial asymmetry, $\langle A(R_{T}^{time})\rangle$.
Down panels: correlation between the final averaged transverse momentum asymmetry, $\langle A(p_{T}^{final})\rangle$, and time-dependent averaged transverse momentum asymmetry, $\langle A(p_{T}^{time})\rangle$.
}
\label{fig5}
\end{center}
\end{figure*}
\begin{figure*}[h]
\begin{center}
\includegraphics[width=0.480\textwidth]{./fig106a}
\hspace{0.30cm}
\includegraphics[width=0.480\textwidth]{./fig106b}
\caption{(Color online)
Left panel: the averaged transverse asymmetry of initial spatial, initial momentum and final momentum, as functions of the transverse momentum $p_{T}$, where
(a) for Pb-Pb (b=14-15 fm) collisions and (b) for p-Pb (b=0-1 fm) collisions.
Right panel: the final averaged transverse momentum asymmetry are dependent on the PID in the present transverse momentum $p_{T}$ range, where
(c) for Pb-Pb (b=14-15 fm) collisions and (d) for p-Pb (b=0-1 fm) collisions.
}
\label{fig6}
\end{center}
\end{figure*}
The probability of parton multiplicity in small collisions probes the fluctuations of the initial state because they are to
a good approximation equal to the fluctuations of the initial total energy density of the system.
The results of probability and transverse asymmetry for Pb-Pb (b=14-15 fm) and p-Pb (b=0-1 fm) collisions at $\sqrt{s_{NN}}$= 5.02 TeV,
are shown in \Fig{fig1}.
The up-left panel of \Fig{fig1} shows the distribution of probability of initial parton multiplicity in Pb-Pb and p-Pb collisions,
and the up-right panel of \Fig{fig1} shows the distribution of probability of final charged hadron multiplicity in Pb-Pb and p-Pb collisions.
These initial parton multiplicity-dependent probability distributions are different in Pb-Pb and p-Pb collisions.
The peak of the distribution in Pb-Pb collisions is close to the zero parton multiplicity (similar to Ref.~\cite{Giacalone:2020eof}), while it is close to 200 in p-Pb collisions.
Such differences are similar to the final charged hadron multiplicity-dependent probability distributions,
i.e., the peak of the distribution in Pb-Pb collisions is close to multiplicity $=$ 10,
while it is close to 80 in p-Pb collisions, as shown in \Fig{fig1} (b).
We can conclude that the multiplicity distributions are different in those two systems.
Moving on to the spatial asymmetry, it also serves as a probe of the initial shape of the system,
a quantity that originates from the fluctuating geometry of the initial energy density fields.
In \Fig{fig1} (c) (down-left panel of \Fig{fig1}), the initial averaged transverse spatial asymmetry, $\langle A(R_{T}^{initial})\rangle$, as a function of the initial parton multiplicity, is shown.
The initial averaged transverse spatial asymmetry increases with the initial parton multiplicity increasing in p-Pb collisions,
while it is almost independent on the initial parton multiplicity in Pb-Pb collisions.
The value of $\langle A(R_{T}^{initial})\rangle$ is deviates significantly from zero in p-Pb collisions, and close to zero in Pb-Pb collisions.
These phenomena as a result of the degree of fluctuations of initial transverse, overlap in collisions.
Furthermore, the final averaged transverse momentum asymmetry, $\langle A(p_{T}^{final})\rangle$, as a function of the final charged hadron multiplicity,
is shown in \Fig{fig1} (d) (down-right panel of \Fig{fig1}).
Surprisingly, the value of $\langle A(p_{T}^{final})\rangle$ is almost consistent in Pb-Pb and p-Pb collisions.
These $\langle A(p_{T}^{final})\rangle$ depend weakly on the final charged hadron multiplicity.
This reason can be explained by the hydrodynamics~\cite{Gardim:2021eoi}: even though the small initial fireball size is different,
but in the case of large initial entropy and energy,
it generates similarly large system in the final state.
To study this phenomenon, we will show the comparison of the initial,
time-dependent, and final shape asymmetry between Pb-Pb and p-Pb collisions.
We have chosen the same final charged hadron multiplicity in Pb-Pb and p-Pb collisions.
In this paper, for each chosen event, its final charged hadron multiplicity is ranged in $M_{ch}\in [60, 100]$.
Such settings are used in \cref{fig2,fig3,fig4,fig5,fig6}.
To estimate the asymmetry quantitatively, we show the initial and final shape asymmetry distributions for Pb-Pb and p-Pb systems in \Fig{fig2}.
In \Fig{fig2}, the up panels are the results of Pb-Pb (b=14-15 fm) collisions, and the down panels are the results of p-Pb (b=0-1 fm) collisions.
The x-y components of the initial spatial asymmetry are close to zero in Pb-Pb collisions [as in \Fig{fig2} (a1)],
while they deviates significantly from zero in p-Pb collisions [as in \Fig{fig2} (b1)].
It means that the initial spatial asymmetry distributions are dependent on the collision system.
However, the distributions of initial momentum asymmetry and final momentum asymmetry are similar both in Pb-Pb and p-Pb collisions,
as shown in \Fig{fig2} (a2), 2(b2), 2(a3) and 2(b3).
These effects can be understood as, in AMPT event-by-event simulations, the initial spatial asymmetry mainly comes from the initial geometric fluctuations of collisions,
and the initial momentum asymmetry mainly comes from the energy-momentum density fluctuations of collisions.
Hydrodynamics~\cite{Noronha-Hostler:2015dbi} showed that the final collective responds to the initial eccentricity.
And we can also see that both the initial transverse momentum asymmetry and final transverse momentum asymmetry are similar in Pb-Pb and p-Pb collisions.
In \Fig{fig3}, we show the correlation between the final transverse momentum asymmetry and initial transverse momentum asymmetry,
for Pb-Pb (b=14-15 fm) and p-Pb (b=0-1 fm) collisions at $\sqrt{s_{NN}}$= 5.02 TeV, respectively.
From \Fig{fig3}, there are weak correlations between the final transverse momentum asymmetry and initial transverse momentum asymmetry.
Such weak correlations are shown similarly in the two systems.
The linear correlation coefficients (noted Pearson coefficients) between the final transverse momentum asymmetry and initial transverse momentum asymmetry are $C[A(p_{T}^{initial}),~ A(p_{T}^{final})]$ (Pb-Pb) $\approx$0.21 and $C[A(p_{T}^{initial}),~A(p_{T}^{final})]$ (p-Pb) $\approx$0.18.
The magnitude of the Pearson coefficients is obtained by Ref.\cite{Wei:2020esd}.
These nonunity linear correlation coefficients also imply that the dynamic and/or dynamic fluctuations play an important role in the system evolution stage~\cite{Sakai:2021rdc}, i.e.,
the final transverse momentum asymmetry gets a large contribution from the initial fluctuations (noted by initial transverse momentum asymmetry)
and non-negligible contribution from the evolution of dynamics.
To study the contribution of dynamic and/or dynamic fluctuations,
the parton evolution time-dependent averaged transverse asymmetry are simulated. These results are shown in \Fig{fig4}.
The up panels of \Fig{fig4} are the results for Pb-Pb (b=14-15 fm) collisions at $\sqrt{s_{NN}}$= 5.02 TeV,
and the down panels of \Fig{fig4} are the results for p-Pb (b=0-1 fm) collisions at $\sqrt{s_{NN}}$= 5.02 TeV.
The x-y and transverse components of averaged spatial asymmetry and averaged momentum asymmetry are decrease with increasing evolution time.
In \Fig{fig4}, the x-y components of averaged asymmetry of spatial and momentum are similar in Pb-Pb and p-Pb collisions.
However, the ratios of the averaged transverse spatial asymmetry and averaged transverse momentum asymmetry are identifiable in the two systems.
Not only there is a weakly splitting of $\langle A(R_{T}^{time})\rangle$ and $\langle A(p_{T}^{time})\rangle$ in Pb-Pb collisions, but also there is a remarkable splitting in the p-Pb collisions.
The reason for the splitting phenomenon is that orderly heating of a nonequilibrium system is required during the initial short time to boost-invariant gluon fields expansion.
While the time is approximately equal to 1.0 fm/c, the system reaches the state of local thermal equilibrium and
enters the hydrodynamic stage with macroscopic properties of temperature~\cite{Heinz:2002eta,Schlichting:2018etd,Gale:2020Ped,Bhalerao:2015cfi}.
The system in the thermal equilibrium state has a symmetrical transverse expansion rate, as a result, it has a similarly transverse asymmetry rate,
i.e., $\langle A(p_{T}^{time})\rangle$ (Pb-Pb) $\approx \langle A(p_{T}^{time})\rangle$ (p-Pb) with $\langle A(R_{y})\rangle/\langle A(R_{x})\rangle \approx 1$.
These results are shown in \Fig{fig4} (a3) and (b3).
From \Fig{fig3}, the final transverse momentum asymmetry is independent of the initial transverse momentum asymmetry, both in the Pb-Pb and p-Pb systems.
The time-dependent transverse shape asymmetry are shown smoothly in \Fig{fig4}.
A natural idea is that the final transverse momentum asymmetry depend on the gradient of time.
If $\langle A(R_{T}^{time})\rangle$ begins in \Fig{fig4} and $\langle A(p_{T}^{final})\rangle$, we can get a linear response from these two quantities, as
\begin{eqnarray}\label{resp:def1}
\langle A(p_{T}^{final})\rangle &\approx& -\kappa_{1}\frac{\partial \langle A(R_{T}^{time})\rangle}{\partial t}.
\end{eqnarray}
Similarly, if $\langle A(p_{T}^{time})\rangle$ begin in \Fig{fig4} and $\langle A(p_{T}^{final})\rangle$, we can also get a linear response from these two quantities, as
\begin{eqnarray}\label{resp:def2}
\langle A(p_{T}^{final})\rangle &\approx& -\kappa_{2}\frac{\partial \langle A(p_{T}^{time})\rangle}{\partial t}.
\end{eqnarray}
In this work, we only study the degree of linear correlation of the samples, without entering the discussion about the possible nonlinear correlations.
Given $\langle A(p_{T}^{final})\rangle$~(Pb-Pb)$\approx$0.67 and $\langle A(p_{T}^{final})\rangle$~(p-Pb)$\approx$0.69 from the final charged hadrons,
we can extract the response coefficient $\kappa_{1}$ and $\kappa_{2}$ from \eq{resp:def1} and \eq{resp:def2}, respectively.
The linear fitting of the averaged transverse asymmetry, both of the spatial and momentum as functions of the parton evolution time,
is shown in \Fig{fig5} (a1) and (b1). The linear response coefficients extracted from \Fig{fig5} (a1) and (b1)
are significantly dependent on the collision system, as shown in \Fig{fig5} (a2) and (b2), respectively.
From \Fig{fig5} (a2) and (b2), one can see that the response coefficients are significantly deviate from zero both in Pb-Pb and p-Pb collisions.
These nonzero linear response coefficients imply that the final momentum asymmetry is significantly dependent on the evolution of parton dynamics.
The linear response coefficient $\kappa_{1}$ is identifiable in Pb-Pb and p-Pb collisions, while $\kappa_{2}$ is almost identical in those two systems.
To provide effective observability to the experiment, we show the transverse momentum and the particle species identity (PID)-dependent averaged transverse shape asymmetry in this work.
In \Fig{fig6}, the averaged transverse shape asymmetry is significantly dependent on the transverse momentum (a) and PID (b) in Pb-Pb and p-Pb collisions.
For each $p_{T}$ bin, there is ranged in the same final charged hadron multiplicity $M_{ch}\in [60, 100]$.
From \Fig{fig6} (a) and (b) (left panel), both the initial and final averaged transverse shape asymmetry decrease with increasing transverse momentum ($p_{T}$).
Such phenomena are similar in Pb-Pb and p-Pb collisions, while the peak of the initial averaged transverse spatial asymmetry is different.
Again, the initial spatial asymmetry mainly comes from the initial geometric fluctuations of the event-by-event collisions,
and the initial momentum asymmetry mainly comes from the energy-momentum density fluctuations of collision.
From \Fig{fig6} (c) and (d) (right panel), the final averaged transverse momentum asymmetry is significantly dependent on the PID,
i.e., the scales ordering of final averaged transverse momentum asymmetry is $\langle A(p_{T}^{final})\rangle$(charged pions)$\geq \langle A(p_{T}^{final})\rangle$(charged kaos)$\geq \langle A(p_{T}^{final})\rangle$(protons). These final averaged transverse momentum asymmetry of all PID are also decrease with increasing the transverse momentum ($p_{T}$).
For lower $p_{T}$ with larger $\langle A(p_{T}^{final})\rangle$, the reason is that the lower $p_{T}$ shape undergoes, the more about the soft scattering process in the evolution,
as a result, it generates more dynamic fluctuations. Such $p_{T}$ dependent and PID scales ordering phenomena is similarly in Pb-Pb and p-Pb collisions.
For the same multiplicity, the final averaged transverse momentum asymmetry are PID scales ordering means that the protons are influenced by the density/volume fluctuations in collisions.
It can be similarly understood that the final collective coefficient $v_{2}$ are scales ordering on PID~\cite{Abelev:2013lac} due to the initial density/volume fluctuations.
\section{Summary}
\label{sec:sum}
In summary, based on AMPT event-by-event calculations, this paper carried out the parton evolution time-dependent transverse asymmetry
in Pb-Pb (b=14-15 fm) and p-Pb (b=0-1 fm) collisions at $\sqrt{s_{NN}}$= 5.02 TeV, respectively.
The results showed that the initial spatial asymmetry is dependent on the collision system,
while both the initial and final momentum asymmetry are independent on the collision system.
By the evolution time step, we extracted the linear response coefficients from quantities between the final momentum asymmetry and time-dependent momentum asymmetry.
The nonzero extraction response coefficients imply that the final momentum asymmetry significantly depends on the evolution of parton dynamics.
That is the reason the final momentum asymmetry is weakly correlated with initial momentum asymmetry.
Furthermore, the averaged transverse shape asymmetry, which includes the initial spatial asymmetry,
the initial and final momentum asymmetry, is significantly dependent on the transverse momentum and PID.
The PID scales ordering transverse asymmetry indicated that it provides a possible observation
for studying the fluctuating properties of QGP droplets, which may produce in heavy-ion collisions.
Such possible QGP droplets are fascinating, but they still are open questions and opportunities for future improvements.
\section*{Acknowledgements}
This work are supported by the Youth Program of Natural Science Foundation of Guangxi (China), with Grant No.~2019GXNSFBA245080, the Special fund for talentes of Guangxi (China), with Grant No.~AD19245157, and also by the Doctor Startup Foundation of Guangxi University of Science and Technology, with Grant No.~19Z19.
|
\subsubsection*{References}}
\usepackage{mathtools}
\usepackage{booktabs}
\usepackage{tikz}
\newcommand{\swap}[3][-]{#3#1#2}
\usepackage{times}
\usepackage{epsfig}
\usepackage{graphicx}
\usepackage{amsmath}
\usepackage{amssymb}
\usepackage{amsthm}
\usepackage{physics}
\usepackage{xr}
\makeatletter
\newcommand*{\addFileDependency}[1]
\typeout{(#1)}
\@addtofilelist{#1}
\IfFileExists{#1}{}{\typeout{No file #1.}}
}
\makeatother
\newcommand*{\myexternaldocument}[1]{%
\externaldocument{#1}%
\addFileDependency{#1.tex}%
\addFileDependency{#1.aux}%
}
\newtheorem{theorem}{Theorem}[section]
\newtheorem{corollary}{Corollary}[theorem]
\newtheorem{lemma}[theorem]{Lemma}
\theoremstyle{remark}
\newtheorem*{remark}{Remark}
\theoremstyle{definition}
\newtheorem{definition}{Definition}[section]
\usepackage{algorithm}
\usepackage{algorithmic}
\usepackage[caption=false]{subfig}
\newcommand{\SY}[1]{\textcolor{red}{\textit{(SY - #1)}}}
\newcommand{\JG}[1]{\textcolor{blue}{\textit{(JG - #1)}}}
\title{Staying in Shape: Learning Invariant Shape Representations using Contrastive Learning}
\author[1]{\href{mailto:Jeffrey Gu <<EMAIL>>?Subject=Your UAI 2021 paper}{Jeffrey~Gu}{}}
\author[2]{Serena Yeung}
\affil[1]{%
Institute for Computational \& Mathematical Eng.\\
Stanford University\\
Stanford, California, USA
}
\affil[2]{%
Depts. of Biomedical Data Science and Computer Science\\
Stanford University\\
Stanford, California, USA
}
\begin{document}
\maketitle
\begin{abstract}
Creating representations of shapes that are invariant to isometric or almost-isometric transformations has long been an area of interest in shape analysis, since enforcing invariance allows the learning of more effective and robust shape representations. Most existing invariant shape representations are handcrafted, and previous work on learning shape representations do not focus on producing invariant representations.
To solve the problem of learning unsupervised invariant shape representations, we use contrastive learning, which produces discriminative representations through learning invariance to user-specified data augmentations. To produce representations that are specifically isometry and almost-isometry invariant, we propose new data augmentations that randomly sample these transformations. We show experimentally that our method outperforms previous unsupervised learning approaches in both effectiveness and robustness.
\end{abstract}
\section{Introduction}
3D shape analysis is important for many applications, such as processing street-view data for autonomous driving \citep{pylvanainen2010automatic}, studying morphological differences arising from disease \citep{niethammer2007global}, archaeology \citep{richards2012kinect}, and virtual reality \citep{hagbi2010shape}. Deep learning methods for shape analysis have generally focused on the supervised setting. However, manual annotations are expensive and time-consuming to produce in 3D. In some cases, annotations may even be impossible to produce, for example in biomedical imaging, where annotating pathological specimens may be hindered by a limited understanding of the disease. Unsupervised learning allows us to avoid the need to produce manual annotations.
3D data comes in many formats, each of which has advantages and disadvantages, and their own methods for shape analysis. Voxel data consists of a 3D grid of voxels, but tends to suffer from data sparsity, low voxel resolution, and shape learning methods tend to be computationally expensive \citep{wei2020view}. Point cloud data consists of a list of coordinates representing points on the shape, and is generally more dense than voxel data and also more easily permits direct transformations on the shape represented by the data. Because of these reasons, we will focus on point cloud data in our paper.
Previous unsupervised methods for learning shape descriptors have generally used either probabilistic models \citep{xie2018learning, shi2020unsupervised}, generative adversarial networks (GANs) \citep{wu20153d, achlioptas2018learning, han2019view}, or autoencoders \citep{girdhar2016learning, sharma2016vconv, wu20153d, yang2018foldingnet}. One approach that has been relatively unexplored for deep learning methods but common in hand-crafted methods is to design shape descriptors that are invariant to transforms that preserve distances, either the extrinsic (Euclidean) distance \citep{belongie2001shape, johnson1999using, manay2004integral, gelfand2005robust, pauly2003multi} or intrinsic (geodesic) distance \citep{elad2003bending, rustamov2007laplace, sun2009concise, aubry2011wave}. Distance-preserving transformations are called isometries, and such transformations preserve only the underlying shape properties. In this paper, we will focus on extrinsic isometries, which include many common transformations such as rotations, reflections, and translations. Enforcing isometry-invariance leads to more effective representations by simplifying the learning problem for downstream tasks, since we will only need to learn the task for each possible shape and not each possible example. Furthermore, invariance also makes our learned representations robust to the variation in shapes. However, isometry-invariance is unable to distinguish between different poses of a shape, such as a when an object bends. These poses are instead almost-isometric, and we argue that almost-isometry invariance can capture these cases while retaining the benefits of isometry-invariance.
To learn isometry and almost-isometry invariant representations, we use contrastive learning in combination with methods that sample isometric and almost-isometric transformations to learn invariant representations in an unsupervised fashion. Contrastive learning allows the learning of representations that are both invariant and discriminative \citep{xiao2020should} through the use of instance discrimination as a pretext task, where the model is trained to match an input to its transformed or augmented version. However, existing isometric data augmentation methods such as random rotation around the gravity axis, which were originally proposed for supervised point cloud learning, are not general enough to achieve our goal of learning invariance to general extrinsic isometries or almost-isometries. To do this, we introduce novel data augmentations that are capable of sampling general isometries and almost-isometries using mathematical results on sampling from groups, for isometries, and concentration of measure, for linear almost-isometries. We also propose a new smooth perturbation augmentation to capture additional non-linear isometries.
Our focus on learning transformation-invariant representations also leads to more robust representations. Robustness is useful for real-world applications where the data may be noisy or have arbitrary orientation or pose, and may also offer greater protection against adversarial attacks \citep{zhao2020isometry}. However, few previous unsupervised shape representation learning methods have investigated the robustness of their methods, and those that do observe drop-offs in performance on downstream tasks as the noise level increases. Our invariance-based method is able to overcome these limitations.
We show empirically that previous point cloud data augmentations are insufficient for learning good representations with contrastive learning, whereas our proposed data augmentations result in much more effective representations. We also show the quality of representations learned with contrastive learning and our new data augmentations for downstream shape classification. Finally, we demonstrate that our representations are also more robust to variations such as rotations and perturbations than previous unsupervised work.
\section{Related Works}
\paragraph{Shape Descriptors}
Shape descriptors represent 3D shapes as a compact $d$-dimensional vector with the goal of capturing the underlying geometric information of the shape. Many hand-crafted shape descriptors have focused on enforcing invariance to various types of isometries, such as extrinsic isometries (i.e. isometries in Euclidean space) \citep{belongie2001shape, johnson1999using, manay2004integral, gelfand2005robust, pauly2003multi} or isometries intrinsic to the shape itself \citep{rustamov2007laplace, sun2009concise, aubry2011wave}.
Unsupervised methods for learning shape descriptors follow two major lines of research, with the first line leveraging generative models such as autoencoders \citep{girdhar2016learning, sharma2016vconv, yang2018foldingnet} or generative adversarial networks (GANs) \cite{wu2016learning, achlioptas2018learning, han2019view} and the second line focusing on probabilistic models \citep{xie2018learning, shi2020unsupervised}. Autoencoder-based approaches focus either on adding additional supervision to the latent space via 2D predictability \citep{girdhar2016learning}, adding de-noising \citep{sharma2016vconv}, or improving the decoder using a folding-inspired architecture \citep{yang2018foldingnet}. GAN-based approaches leverage either an additional VAE structure \citep{wu2016learning}, pre-training via earthmover or Chamfer distance \citep{achlioptas2018learning}, or using inter-view prediction as a pretext task \citep{han2019view}. For probabilistic methods, \citet{xie2018learning} proposes an energy-based convolutional network which is trained with Markov Chain Monte Carlo such as Langevin dynamics, and \citet{shi2020unsupervised} proposes to model point clouds using a Gaussian distribution for each point. Of these approaches, only \citet{shi2020unsupervised} focuses on producing robust representations.
Finally, some methods do not fall under any of these three approaches. \citet{sauder2019self} uses reconstruction as a pretext task to self-supervise representation learning.
PointContrast \citep{xie2020pointcontrast} aims to learn per-point representations using a novel residual U-Net point cloud encoder and a per-point version of InfoNCE \citep{oord2018representation}. They use contrastive learning to pre-train on views generated from ScanNet \citep{dai2017scannet}, a dataset of 3D indoor scenes. In contrast, our work focuses specifically on learning isometry and almost-isometry invariant representations of shapes and developing algorithms to sample such transformations.
\paragraph{Contrastive Learning}
Contrastive learning has its roots in the idea of a pretext task, a popular approach in unsupervised or self-supervised learning. A pretext task is any task that is learned for the purpose of producing a good representation \citep{he2020momentum}. Examples of pretext tasks for 2D image and video data include finding the relative position of two patches sampled from an image \citep{doersch2015unsupervised}, colorizing grayscale images \citep{zhang2016colorful}, solving jigsaw puzzles \citep{noroozi2016unsupervised}, filling in missing patches of an image \citep{pathak2016context}, and predicting which pixels in a frame of a video will move in subsequent frames \citep{pathak2017learning}. Contrastive learning can be thought of as a pretext task where the goal is to maximize representation similarity of an input query between positive keys and dissimilarity between negative keys. Positive keys are generated with a stochastic data augmentation module which, given an input, produces a pair of random views of the input \citep{xiao2020should}. The other inputs in the batch usually serve as the negative keys. The main application of contrastive learning has been to learn unsupervised representations of 2D natural images \citep{chen2020simple, he2020momentum, chen2020improved, xiao2020should}. We focus on using contrastive learning as an means of producing shape-specific invariant representations for 3D point clouds.
\paragraph{Data Augmentation}
Although data augmentation has been well-studied for 2D image data, there has been little work studying data augmentations for point clouds. Previously examined point cloud augmentations include rotations around the the gravity axis, random jittering, random scaling, and translation \citep{qi2017pointnet, qi2017pointnet++, li2020pointaugment} in the supervised learning setting, and applying a random rotation from 0 to 360$^\circ$ on a randomly chosen axis for unsupervised pre-training \citep{xie2020pointcontrast}. \citet{chen2020pointmixup} proposes to generalize image interpolation data augmentation to point clouds using shortest-path interpolation. To improve upon these hand-crafted data augmentations, \citet{li2020pointaugment} proposes an auto-augmentation framework that jointly optimizes the data augmentations and a classification neural network, but is not applicable in unsupervised settings. In contrast, our work focuses on generalizing previous data augmentations such as random rotation and jittering to much more general classes of invariant transformations, including Euclidean isometries and almost-isometries, for the purpose of invariant representation learning with contrastive learning.
\section{Methods}
In this section, we introduce our novel transformation sampling schemes and the contrastive learning framework we use to learn invariant representations. In Section \ref{augmentations}, we introduce sampling procedures for isometry and almost-isometry invariant transformations, and in Section \ref{contrastivelearning} we show how contrastive learning can be used to learn representations that are invariant to the transformations introduced in Section \ref{augmentations}.
\subsection{Sampling isometric and almost-isometric transformations}\label{augmentations}
\begin{figure*}[ht]
\vskip 0.2in
\begin{center}
\begin{minipage}{\linewidth}
\subfloat[]{\includegraphics[width=0.25\linewidth] {airplane.png}}
\subfloat[]{\includegraphics[width=0.25\linewidth] {airplane_orth.png}}
\subfloat[]{\includegraphics[width=0.25 \linewidth] {airplane_rip.png}}
\subfloat[]{\includegraphics[width=0.25\linewidth] {airplane_interp.png}}
\end{minipage}
\caption{Examples of our isometric and almost-isometric transformations. Each image has been normalized to be centered at the origin and scaled so the maximum distance of any point to the origin is 1. (a): The original point cloud. (b): The point cloud after a uniformly sampled orthogonal transform has been applied. We see that the point cloud has been rotated. (c): The point cloud after a random RIP transformation has been applied. The point cloud has undergone both rotation and a small amount of stretching (d): The point cloud after a smooth perturbation has been applied. We see that the point cloud has been perturbed, particularly near the nose of the aircraft.}
\label{fig:examples}
\end{center}
\vskip -0.2in
\end{figure*}
To achieve our goal of learning isometry-invariant and almost-isometry-invariant representations, we develop algorithms that allow us to sample randomly instances of these transformations from the set of all such transformations.
\paragraph{Preliminaries}
An isometry is a distance-distance preserving transformation:
\begin{definition}
Let $X$ and $Y$ be metric spaces with metrics $d_X, d_Y$. A map $f: X \to Y$ is called an isometry if for any $a, b \in X$ we have $d_X(a, b) = d_Y(f(a), f(b))$.
\end{definition}
In this paper, we will only be concerned about isometries of Euclidean space ($X = Y = \mathbb{R}^n$). Examples of Euclidean isometries include translations, rotations, and reflections. Mathematically, if two objects are isometric, then the two objects are the same shape.
From a shape learning perspective, isometry-invariance creates better representations by allowing downstream tasks such as classification to learn only one label per shape, rather than having to learn the label of every training example.
\subsubsection{Uniform orthogonal transformation}
\label{orth}
The isometries of $n$-dimensional Euclidean space are described by the Euclidean group $E(n)$, the elements of which are arbitrary combinations of rotations, reflections, and translations. If we normalize each point cloud by centering it at the origin, then we only need to consider linear isometries, which are precisely the orthogonal matrices $O(n)$ (for more details, see Appendix~\ref{orth-info}). In the rest of the paper, we will use orthogonal transformation and isometry interchangeably.
To ensure robustness to all orthogonal transformations $Q \in O(n)$, we would like to sample uniformly $Q$ from $O(n)$. A biased sampling method may leave our algorithm with ``blind spots'', as it may only learn to be invariant to the more commonly sampled orthogonal transformations.
A theorem of Eaton \citep{eaton1983} shows that if a random matrix $A$ whose entries are distributed according to the standard normal distribution is QR-factorized, then $Q$ distributed uniformly on $O(n)$. This provides a simple algorithm for sampling uniform orthogonal transformations, given in Algorithm \ref{alg:uniform-orth}. An example transformation is shown in Figure \ref{fig:examples}.
\begin{algorithm}
\caption{Uniform Orthogonal sampling}\label{alg:uniform-orth}
\begin{algorithmic}[1]
\REQUIRE dimension $n$
\ENSURE uniform orthogonal matrix $Q \in O(n)$
\STATE Sample $A \sim N(0, 1)^{n \times k}$
\STATE Perform QR decomposition on $A$ to get $Q, R$
\STATE \textbf{return} $Q$
\end{algorithmic}
\end{algorithm}
\subsubsection{Random almost-orthogonal transformation}
\label{rip}
Many transformations preserve almost all shape information but may not be isometries. For example, the bending of a shape or rotation of part of a shape around a joint generally change geodesic distances on the shape very little and are thus almost-isometric transformations. Using almost-isometries instead of exact isometries may also allow our shape representations to account for natural variation or small amounts of noise between two shapes that otherwise belong to the same class of shape.
In the case of Euclidean isometries, an almost-isometric transformation is an almost-orthogonal transformation. To formally define almost-orthgonal matrices, we use the Restricted Isometry Property (RIP) first introduced by \citet{candes2005decoding}:
\begin{definition}[Restricted Isometry Property of \citet{baraniuk2008simple}]
A $n \times N$ matrix $A$ satisfies the \textit{Restricted Isometry Property} of order $k$ if there exists a $\delta_k \in (0, 1)$ such that for all sets of column indices $T$ satisfying that $|T| \le k$ we have
\begin{align}
(1 - \delta_k) \norm{x_T}^2 \le \norm{A_T x_T}^2 \le (1 + \delta_k)\norm{x_T}^2
\end{align}
where $A_T$ is the $n \times |T|$ matrix generated by taking columns of $A$ indexed by $T$, and $x_T$ is the vector obtained by retaining only the entries corresponding to the column indices $T$, and $N$ is an arbitrary parameter satisfying $N \gg n$.
\end{definition}
For more details on RIP matrices, see Appendix \ref{rip-info}. To sample from the set of RIP matrices, we leverage the concentration of measure result of \citet{baraniuk2008simple} to create rejection sampling algorithm:
\begin{theorem}[Theorem 5.2 of \citet{baraniuk2008simple}]
Suppose that $n, N$ and $0 < \delta < 1$ are given. If the probability distribution generating the $n \times N$ matrices $A$ satisfies the concentration inequality
\begin{align}
\Pr(\left| \norm{Ax}^2 - \norm{x}^2 \right| \ge \epsilon \norm{x}^2) \le 2\epsilon^{-n c_0(\epsilon)}
\end{align}
where $0 < \epsilon < 1$ and $c_0$ is a constant depending only on $\epsilon$, then there exist constants $c_1, c_2 > 0$ depending only on $\delta$ such that RIP holds for $A$ with the prescribed $\delta$ and any $k \le c_1 n / \log(N/k)$ with probability $\ge 1 - e^{-c_2 n}$.
\end{theorem}
We note that many common distributions satisfy the concentration inequality, for example $A_{ij} \sim \mathcal{N} \left(0, \frac{1}{n} \right)$ \cite{baraniuk2008simple}, where the concentration inequality holds with $c_0(\epsilon) = \epsilon^2/4 - \epsilon^3/6$.
This theorem says that with the right setting of parameters, if we generate a random $n \times N$ matrix $A$ where the entries are chosen from a distribution satisfying the concentration inequality and form a new matrix $Q$ by taking $T$ random columns of $A$, the result is an $n \times T$ RIP matrix with high probability. This gives us a simple algorithm for sampling RIP matrices: first we generate a random matrix $A$ by sampling entries from $\mathcal{N} \left(0, \frac{1}{n} \right)$, choosing $T$ columns of $A$ without replacement and forming a new matrix $Q$ consisting of just these columns, and testing if the matrix is RIP (that is, it satisfies Equation \ref{eqn:rip-spectral-cond}, see Appendix \ref{rip-info}), repeating the procedure if $Q$ is not RIP. The full algorithm is given in Algorithm \ref{alg:rand-rip}, and an example RIP transformation is shown in Figure \ref{fig:examples}.
\begin{algorithm}
\caption{Sample $Q$ such that $\sigma(Q^TQ - I) < \delta$} \label{alg:rand-rip}
\begin{algorithmic}[1]
\REQUIRE dimensions $n, N, T$, tolerance $\delta$
\ENSURE $n \times T$ matrix $Q$ satisfying RIP
\WHILE{$\norm{Q^TQ - I_n}_2 > \delta$}
\STATE Sample $A \sim \mathcal{N}\left(0, \frac{1}{n}\right)^{n \times N}$
\STATE Randomly choose $T$ columns of $A$ without replacement to get $n \times T$ matrix $Q$
\ENDWHILE
\STATE return $Q$
\end{algorithmic}
\end{algorithm}
\begin{figure*}[htb!]
\vskip 0.2in
\begin{center}
\includegraphics[width=0.8\linewidth]{Contrastive_Learning_Figure.pdf}
\caption{Schematic of the contrastive learning framework as described in Section~\ref{contrastivelearning}. Random data augmentations $t_q, t_k$ are sampled from the stochastic data augmentation and applied to input $x$ to produce views $v_q, v_k$. The views are then fed through the corresponding encoder $f$ and then a projection head $g$ to produce representations $q, k$ which are then used to calculate the contrastive loss. The module block describes how the algorithm uses the key representations as negative examples. For example, in SimCLR \citep{chen2020simple}, the module is just the identity and the keys of all other views are used as negative examples, whereas MoCo \citep{he2020momentum, chen2020improved} uses a memory bank composed of key representations. Together, $,g(f(\cdot))$ comprise $E(\cdot)$. For methods employing a projection head $g$, for downstream tasks $g$ is thrown away and typically the representation $r_q$ is used.}
\label{fig:contrastive-learning-diagram}
\end{center}
\vskip -0.2in
\end{figure*}
\subsubsection{Smooth perturbation}
\label{interp}
RIP transformations are examples of \textit{linear} almost-isometries, since they are represented by matrices. To capture some non-linear almost-isometries, we generalize the commonly used point cloud augmentation of Gaussian perturbation \citep{qi2017pointnet, qi2017pointnet++}, which applies Gaussian noise with zero mean to each point of the point cloud. To generalize this augmentation to capture the variation in real-world shapes, we propose a data augmentation that generates a smooth perturbation, inspired by \citep{ronneberger2015u, cciccek20163d}. We generate a smooth perturbation by sampling $P$ points uniformly in $\mathbb{R}^3$ and $3P$ values from a Gaussian with zero mean and standard deviation $\sigma$. We then use smooth interpolation to generate a perturbation $(n_x^i, n_y^i, n_z^i)$ for each point $p_i = (x_i, y_i, z_i)$ in the point cloud, and apply the perturbation as a translation of $p_i$ to get new points $p_i = (x_i + n_x^i, y_i + n_y^i, z_i + n_z^i)$. An example is shown in Figure \ref{fig:examples}.
\subsection{Contrastive Learning}\label{contrastivelearning}
The contrastive learning framework (see Figure~\ref{fig:contrastive-learning-diagram}) can be summarized as follows \citep{xiao2020should}: we first define a stochastic data augmentation module $\mathcal{T}$ from which we can sample transformations $t \sim \mathcal{T}$. Given a training example $x$, two random views $v_q = t_q(x), v_k = t_k(x)$ are generated, where $t_q, t_k \sim \mathcal{T}$. We then produce representations $q, k$ by applying a base encoder $E(\cdot)$ to $v_q$ and $v_k$. The pair $q, k_+ = k_1$ is called a positive pair, and our goal is to distinguish this pair from some set of negative examples $k_2, \ldots, k_K$. The model is then trained with a contrastive loss, which allows the model to learn representations that are invariant to the transformations in $\mathcal{T}$.
We use InfoNCE \citep{oord2018representation} as our contrastive loss:
\begin{align}\label{infonce}
\mathcal{L}_q = -\log \frac{\exp(q \cdot k_+/\tau)}{\sum_{i = 1}^K \exp(q \cdot k_i/\tau)}
\end{align}
where the temperature $\tau$ is a tunable hyperparameter. Since the contrastive loss forces $q, k_+$ to be similar and $q, k_i \neq k_+$ to be dissimilar, our model learns invariance to the transformations used to generate $q, k_+$. Many different strategies have been used to choose the negative keys $k_i \neq k_+$, such as using the keys of the other training examples in the mini batch \cite{chen2020simple} or drawing them from a queue of previously seen keys \cite{he2020momentum, chen2020simple}.
We choose momentum contrastive learning (MoCo) \citep{he2020momentum, chen2020improved} as our contrastive learning framework due to its state-of-the-art performance for 2D image data and its relatively lightweight computational requirements, but our method is framework-agnostic and could be used with any contrastive learning framework. To adapt this framework for learning shape representations for point clouds, we need a base encoder capable of producing representations from point cloud input and shape-specific data transformations $T_i$. In our method, the stochastic data augmentation module $\mathcal{T}$ comprises the transformation-sampling modules introduced in Section \ref{augmentations}. Unlike the case of 2D image representations, where there are canonical choices of base encoder, there are not similar choices for point cloud data, due to the infancy of point cloud architectures \citep{xie2020pointcontrast}. PointNet \citep{qi2017pointnet}, DGCNN \citep{wang2019dynamic}, and a residual U-Net architecture \citep{xie2020pointcontrast} and others have all been used in prior work. Our framework is model-agnostic and works with any point cloud encoder. We will discuss the choice of base encoder more in Section \ref{experiments}.
\section{Experiments} \label{experiments}
\subsection{Unsupervised Shape Classification Protocol}\label{shapeclassificationprotocol}
To show the quality of our learned shape representations, we compare our method to previous work on unsupervised shape classification. The procedure for our shape classification experiment follows the established protocol for unsupervised shape classification evaluation: first, the network is pre-trained in an unsupervised manner using the ShapeNet dataset \citep{chang2015shapenet}. Using the embeddings from pre-training, either a 2-layer MLP \citep{shi2020unsupervised} or linear SVM \citep{wu20153d} is trained and evaluated on the ModelNet40 dataset.
Following previous work \citep{wu20153d, shi2020unsupervised}, we only pre-train on the 7 major categories of ShapeNet (chairs, sofas, tables, boats, airplanes, rifles, and cars). Other work pre-train on all 55 categories of ShapeNet \citep{achlioptas2018learning, yang2018foldingnet, han2019view, sauder2019self}, but due to the differences in the amount of data used we are unable to make a fair comparison to these methods.
\paragraph{ShapeNet}
ShapeNet \citep{chang2015shapenet} dataset consists of 57448 synthetic 3D CAD models organized into 55 categories with a further 203 subcategories, organized according to WordNet synsets. However, we only have access to the public version of ShapeNet, which contains the same categories but only 52472 models. For contrastive learning pre-training we use the normalized version of ShapeNet, where all shapes are consistently aligned and normalized to fit inside a unit cube.
\paragraph{ModelNet40}
ModelNet40 \citep{wu20153d} is a shape classification dataset consisting of 12311 3D CAD models organized into 40 classes. We use the official ModelNet40 train and test splits of 9843 training examples of 2468 test examples. For downstream shape classification training and evaluation, we use the normalized and resampled version of ModelNet40, where models are normalized to be centered at the origin and and lie within the unit sphere and the points resampled as in \citet{qi2017pointnet}. ModelNet10 is a 10-class subset of ModelNet40.
\paragraph{Training} We use PointNet \cite{qi2017pointnet} as our base encoder. For ShapeNet pre-training using MoCo, we follow \citet{he2020momentum, chen2020improved} and use SGD as our optimizer with weight decay 0.0001, momentum 0.9, temperature $\tau = 0.02$, and latent dimension 128. Unlike \citet{he2020momentum}, we train with only a single GPU with batch size 64 and a learning rate chosen from $\{0.075, 0.0075, 0.00075\}$, which is tuned using the final MoCo accuracy. Models are trained until the MoCo accuracy converges, up to a limit of 800 epochs. Convergence typically takes 200 epochs for single transformation models but up to or even exceeding 800 epochs for multiple transformation models. We use a cosine learning rate schedule \citep{chen2020simple, chen2020improved}. For both pre-training and supervised classification training, we sample 2048 points from each point cloud.
For ModelNet40 shape classification we choose to use a two layer MLP, which is known to be equivalent to a linear SVM, and train with a batch size of 128, and a learning rate chosen from \{0.01, 0.001\}. The learning rate was selected using a validation set sampled from the official training set of ModelNet40. Following \citet{shi2020unsupervised}, our hidden layer has 1000 neurons.
\paragraph{Experimental setup} Unless otherwise stated, the setting of our data augmentation modules are as follows: for uniform orthogonal matrices, we set $n, k = 3$ to generate $3 \times 3$ orthogonal matrices. For random RIP matrices, we set $n = 3, N = 1000, T = 3$ and $\delta = 0.9$ (see Section \ref{rip}, Algorithm \ref{alg:rand-rip}). For the smooth perturbation data augmentation, we generate $100$ points according to an isotropic Gaussian with mean $0$ and standard deviation $0.02$, and perform radial basis interpolation to get smooth noise at every point in the point cloud, which we add to each point of the point cloud. For Gaussian noise, we perturb each point in the point cloud by a random perturbation sampled according to a Gaussian with mean $0$ and standard deviation $0.02$.
\paragraph{Training with individual data augmentations}
Table \ref{table:single-aug} shows different versions of our method when trained with each individual transformation. We compare our proposed data augmentations against three existing data augmentations: random $y$-rotation \citep{qi2017pointnet}, random rotation \citep{zhao2020isometry}, and point cloud jitter/Gaussian perturbation \citep{qi2017pointnet}. We do not investigate random scaling or translations since their effect can always be negated by normalization.
We first consider the linear transformations, which are the random $y$-rotation, random rotation from previous works and the uniform orthogonal transformation and random RIP transformations we propose. Each of the earlier classes of transformation is a subset of the later classes of transformations. We find that as the class of transformations get more general, the performance improves. This is similar to earlier contrastive learning work \citep{chen2020simple}, which finds that increasing the strength of a data augmentation improves the performance of contrastive learning. In particular, we find that the RIP transformation performs the best, followed by the uniform orthogonal transformation, showing that almost-isometry invariance provides further improvement over the more-strict isometry invariance. We also find that our proposed transformations (uniform orthogonal, random RIP) greatly outperform previously used transformations for contrastive learning, and that these previous transformations are insufficient for learning good representations with contrastive learning (c.f. Table \ref{table:prior-work}).
We find that the non-linear transformations (Gaussian perturbation and smooth perturbation) perform noticeably worse than the best linear transformations. We believe that this is because the best linear transformations captures more diversity in object variation. Both of the transformations in this category perform similarly, which is likely is due to the two transformations being similar in strength, since they are both based on noise sampled from a Gaussian distribution with the same standard deviation.
\begin{table}[t]
\caption{Ablation study of our model pre-trained with only one transformation and on the 7 major ShapeNet categories listed in Section \ref{shapeclassificationprotocol} and evaluated using the protocol of Section \ref{shapeclassificationprotocol} on ModelNet40. Bolded names correspond to our proposed data augmentations.}
\vskip 0.15in
\begin{center}
\begin{small}
\begin{sc}
\begin{tabular}{c c c}
\hline
Type & Data augmentation & Accuracy \\
\hline
Linear & Random $y$-rotation & 71.8\% \\
& Random rotation & 72.9\%\\
& \textbf{Uniform Orthogonal} & 83.0\% \\
& \textbf{Random RIP} & 86.3\% \\
\hline
Non-linear & \textbf{Smooth perturbation} & 78.6\% \\
& Gaussian perturbation & 78.7\% \\
\hline
\end{tabular}
\end{sc}
\end{small}
\end{center}
\vskip -0.1in
\label{table:single-aug}
\end{table}
\paragraph{Training with multiple data augmentations}
\label{multiple-aug}
Previous contrastive learning literature finds that training with multiple transformations is generally more effective than training only a single transformation \citep{chen2020simple}, leading us to examine combinations of data augmentations. When training with multiple transformations, we uniformly randomly apply one of the transformations to each mini-batch. Due to the large number of combinations and the fact that many transformations are generalizations of other transformations, we only investigate the top two linear and non-linear transformations from Table \ref{table:single-aug}. Additionally, we only investigate all pairs of transformations.
Table \ref{table:multiple-aug} shows the results of our method trained with pairs of data augmentation. Training was stopped for all models at 800 epochs regardless of whether the model was converged or not, due to the computational expense of training with single GPUs. Under these conditions, we find that the combination of the uniform orthogonal and random RIP transformations produces the best classification accuracy. We find that the random RIP and Gaussian perturbation and random RIP and smooth perturbation models do not fully converge after 800 epochs, in the sense that their instance discrimination accuracy after MoCo pre-training is still improving but not close to the accuracy achieved by the other models (above 90\%).
In line with previous work, models trained with combinations of transformations improve over models trained with just the individual transformations in every case where the models converge. We conjecture that if computational resources were significantly increased, this would also hold for the models that have not converged, and for even greater combinations of data augmentations.
\begin{table}[t]
\caption{Comparison of our model trained with combinations of augmentations mentioned in Section \ref{multiple-aug} and on the 7 major ShapeNet categories listed in Section \ref{shapeclassificationprotocol} and evaluated using the protocol of Section \ref{shapeclassificationprotocol} on ModelNet40. Here, orthogonal refers to our uniform orthogonal transformation, RIP refers to our random RIP transformation, perturbation refers to Gaussian perturbation, interpolation refers to our smooth perturbation generated using interpolation.
Bolded names correspond to our proposed data augmentations. Models that did not converge after training with terminated at the maximum number of epochs (800) are marked with a $*$.}
\vskip 0.15in
\begin{center}
\begin{small}
\begin{sc}
\begin{tabular}{c c}
\hline
Data augmentations & Accuracy \\
\hline
\textbf{RIP} + \textbf{Interpolation}$^*$ & 73.0\% \\
\textbf{RIP} + Perturbation$^*$ & 75.9\% \\
\textbf{Orthogonal} + \textbf{Interpolation} & 83.6\% \\
\textbf{Orthogonal} + Perturbation & 83.9\% \\
Perturbation + \textbf{Interpolation} & 84.4\%\\
\textbf{Orthogonal} + \textbf{RIP} & 86.4\%\\
\hline
\end{tabular}
\end{sc}
\end{small}
\end{center}
\vskip -0.1in
\label{table:multiple-aug}
\end{table}
\paragraph{Comparison to previous results} Table \ref{table:prior-work} shows the performance of our method compared to previous unsupervised shape classification methods using the shape classification protocol. In the table, ``Ours'' refers to our model trained with the uniform orthogonal and random RIP transformations.
Our model outperforms all comparable prior unsupervised work.
This shows the importance of learning invariance to shape-preserving transformations in shape representation learning, as no previous unsupervised methods explicitly consider learning invariant representations, as well as the importance of considering broadly invariant transformations in contrastive learning. Since most of the classes are unseen by the model during ShapeNet pre-training, our model also shows good ability to generalize to novel classes.
\begin{table*}[ht]
\caption{Comparison of our method against previous unsupervised work on the shape classification protocol of Section \ref{shapeclassificationprotocol}. The evaluation metric is classification accuracy, and MN40 and MN10 refer to the ModelNet40 and ModelNet10 datasets, respectively. A $-$ indicates that there is no published result for that dataset.}
\vskip 0.15in
\begin{center}
\begin{small}
\begin{sc}
\begin{tabular}{c c c c}
\hline
Supervision & Method & MN40 & MN10\\
\hline
Supervised & PointNet \citep{qi2017pointnet} & 89.2\% &-- \\
& PointNet++ \citep{qi2017pointnet++} & 91.9\% &--\\
& PointCNN \citep{li2018pointcnn} & 92.2\% &--\\
& DGCNN \citep{wang2019dynamic} & 92.2\% &--\\
& RS-CNN \citep{liu2019relation} & 93.6\% &--\\
\hline
Unsupervised & T-L Network \citep{girdhar2016learning} & 74.4\% &-- \\
& VConv-DAE \citet{sharma2016vconv} & 75.5\% & 81.5\%\\
& 3D-GAN \citep{wu2016learning} & 83.3\% & 91.0\%\\
& Point Distribution Learning \citep{shi2020unsupervised} & 84.7\% & -- \\
& \textbf{Ours} & \textbf{86.4}\% & \textbf{92.8}\%\\
\hline
\end{tabular}
\end{sc}
\end{small}
\end{center}
\vskip -0.1in
\label{table:prior-work}
\end{table*}
\subsection{Robustness}
\label{robustness}
Our focus on learning transformation-invariant representations also leads to better representation robustness. Robust representations allow our method to better handle the natural variation in shapes and is useful in real-world settings where the input shapes may not always be consistently aligned. Additionally, robustness may also make our method more resistant to adversarial attacks. In this section, we assess robustness to common changes such as rotation and noise as well as more complex transformations based on our proposed data augmentations.
\begin{figure*}[htb!]
\vskip 0.2in
\begin{center}
\begin{minipage}{\linewidth}
\subfloat[]{\includegraphics[width=0.25 \linewidth]{seaborn_rotation_robust.png}}
\subfloat[]{\includegraphics[width=0.25 \linewidth]{seaborn_perturb_robust.png}}
\subfloat[]{\includegraphics[width=0.25 \linewidth]{seaborn_interp_robust.png}}
\subfloat[]{\includegraphics[width=0.25 \linewidth]{seaborn_rip_robust.png}}
\end{minipage}
\caption{Plots of accuracy vs variation strength for (a) rotations by a fixed angle, (b) Gaussian noise of varying standard deviations, (c) smooth noise generated using Gaussian noise of varying standard deviations, and (d) RIP transformations with increasing deviation $\delta$ from isometry. Each variation was applied at both train and test time for ModelNet40 shape classification (see Section \ref{shapeclassificationprotocol}). We find that our method is fairly consistent with regards to different types of variation, with performance only decreasing slightly as the variation or noise becomes stronger.}
\label{fig:robustness}
\end{center}
\vskip -0.2in
\end{figure*}
\paragraph{Experimental Setup}
In our first experiment, we examine robustness to rotation. Robustness to rotation can alleviate the need to align shapes before performing downstream tasks as well as provide greater defense against adversarial attacks \citep{zhao2020isometry}. We apply a rotation along each axis from 0 to 45 degrees in increments of 9 degrees to each shape during both supervised classification training and testing, following \citet{shi2020unsupervised}. All other experiment details are the same as Section \ref{shapeclassificationprotocol}. For this experiment, our model is trained with the uniform orthogonal and random RIP transformations.
As a second experiment, we evaluate the resistance of our method to noise, which is useful in real-world settings due to the imprecision of sensors. For this experiment, we apply a Gaussian perturbation with standard deviation 0 to 0.08 in increments of 0.02, and train our model with only the Gaussian perturbation with standard deviation 0.08.
Finally, we evaluate robustness with respect to more complex variations such as the data augmentations proposed in this work. We show that our model is also robust to our proposed transformations, which are much more difficult than fixed-degree rotations around each axis and Gaussian noise. For this experiment, we apply our random RIP transformation with noise parameters $\delta$ (see Section \ref{rip}) from 0.75 to 0.9 in increments of 0.05, and our smooth perturbation with standard deviation 0.05 to 0.02 in increments of 0.05 (see Section \ref{interp}). We pre-train our models with the RIP transformation and perturbation and interpolation transformations, respectively.
\paragraph{Results} Results for all experiments can be found in Figure \ref{fig:robustness}. For the first experiment, we find that our method's accuracy actually increases slightly with the rotation angle, unlike Figure 7 of \citet{shi2020unsupervised}, where the accuracy degrades as the rotation angle increases. We also find that our method achieves higher accuracy on the robustness experiment than the best unsupervised baseline \citet{shi2020unsupervised} at all rotation angles. In the Gaussian noise experiment we find that our method experiences only a slight decrease of around 2\% from the setting without noise to the highest level of noise, unlike Figure 8 of \citet{shi2020unsupervised}, where the accuracy decreases significantly as the noise level increases. \citet{shi2020unsupervised} achieves robustness by learning their representations by mapping the distribution of points to the corresponding point origin, but our method achieves much better robustness through a much stronger constraint of isometry-invariance on the representations. For our proposed transformations, we find similar results as the noise experiment, with only slight decreases in performance as the noise increases, showing that our method is even robust to much more complex variations. The lower accuracy of the robust RIP transformation compared to the non-robust accuracy (see Table \ref{table:single-aug}) is to be expected because \citet{zhao2020isometry} observes that robustness to random rotations causes a significant decrease in classification accuracy for supervised training, and the RIP transformation is a generalization of random rotations.
\section{Conclusion}
In this paper we introduce a contrastive learning framework to learn isometry and almost-isometry invariant shape representations, together with novel isometric and almost-isometric data augmentations. We show empirically that our contrastive learning and isometry approach improves over previous methods in both representation effectiveness and robustness, as well as that our novel data augmentations produce much better representations using contrastive learning than existing point cloud data augmentations.
\begin{acknowledgements}
The authors would like to acknowledge Joy Hsu, Jen Weng, Julia Gong for helpful discussions, Joy Hsu for suggesting the title of the paper, and Yi Shi for help with his code for baseline experiments.
\end{acknowledgements}
|
\section{Introduction} \label{sec:intro}
Magnetic field couples the solar interior, the solar atmosphere, throughout the heliosphere; it is responsible for the many solar activities, heating of the chromosphere and corona, and acceleration of the solar wind~\citep[e.g.,][]{Wiegelmann2014, Komm2015, Cheung2017}; besides, its characteristics are essential for interpreting the solar dynamo and solar cycle~\citep{Brun2017, Charbonneau2020}. Therefore, understanding the spatial and temporal evolution of the solar magnetic field is of vital importance.
Hitherto, only the photospheric magnetic field can be measured in detail routinely with high-resolution space-borne instruments~\citep{Lagg2017}, e.g., the Michelson Doppler Imager onboard the Solar and Heliospheric Observatory (MDI/SOHO; \citealt{Scherrer1995}) and the Helioseismic and Magnetic Imager onboard the Solar Dynamics Observatory (HMI/SDO; \citealt{Schou2011, Scherrer2011, Hoeksema2014}). The interpretation and modeling of magnetic field on other parts of the solar atmosphere are mainly dependent on the photospheric measurements~\citep{Lagg2017}. In this study, we will investigate the asymmetric distribution of the solar photospheric magnetic field values.
The solar surface is overspread with ubiquitous magnetic fields coming from the quiet Sun and active regions~\citep{Sheeley1966, Harvey1971, Jin2011}. The quiet Sun photospheric magnetic field is usually divided into kilogauss magnetic network and internetwork magnetic field with weaker strength; the former is situated in the profiles of supergranular cells where the horizontal flows become downdrafts, and the latter is small-scale flux concentrations scattered on the solar surface \citep{BellotRubio2019}.
The distribution of the magnetic field values is a fundamental property of the Sun.
\citet{Getachew2019a, Getachew2019} studied the asymmetry of solar weak photospheric magnetic field values, using synoptic chart data from several sources, including the Wilcox Solar Observatory, Mount Wilson Observatory, Kitt Peak Vacuum Telescope, SOHO/MDI, SOLIS/VSM, and SDO/HMI. In their study, `asymmetry' is defined as the nonzero field value of the fitted Gaussian distribution maximum. They fitted the distribution with a parameterized Gaussian function, and then the asymmetry is revealed, mainly when the spatial resolution of the synoptic chart is considerably reduced, such as $360\times180$ pixels or even $120\times48$ pixels which are much lower than the original resolution (e.g., $3600\times1440$ pixels for HMI). They showed that the lower the resolution, the more prominent the calculated asymmetry; according to which, they inferred that it is the supergranulation that brings about the asymmetry.
There are several shortcomings in estimating the asymmetry with highly resolution-reduced synoptic charts.
First, high-spatial-resolution magnetograms and synoptic charts resolve quiet Sun small-scale magnetic fields much better, such as internetwork, network, etc. There is no reason to give up the most essential advantage of observation, i.e., high-resolution. For a chart of 3600$\times$1440\ (1080) pixels, the spatial resolution is about $1.68''\times1.33''\ (1.78'')$ (the physical spatial resolution on the solar surface is in the magnitude of ${\sim}10^3$ km). When the spatial resolution decreases to around ${\sim}3''$, most of the magnetic features are canceled and the magnetograms look very vague \citep{BellotRubio2019}. It will be unable to resolve many of the adjacent magnetic elements with opposite polarities.
For charts of $120\times48$ pixels, the spatial resolution is about $50.3''\times40.0''$, which is much larger than ${\sim}3''\times3''$.
Second, the number of pixels in the distribution decreases substantially when a chart is downsized, which affects the fitting result. From $3600\times1440$ to $120\times48$ pixels, the number of pixels decreases by nearly 3 orders of magnitude.
In the distribution of a downsized chart, the probability of adjacent bins vary drastically (e.g., Fig. 2 in \citealt{Getachew2019a}). The parameters of the fitted Gaussian model are unlikely reliable in judging the asymmetry.
Last, the noise of measurements (a few Gauss) should be taken into consideration, because they dominate the location parameter of a Gaussian function during the fitting of magnetic field values, especially when the distribution is narrow.
In this study, we show that the distribution of solar photospheric magnetic field values is much better fitted with the Lorentzian function, rather than the Gaussian function. The asymmetry is clearly revealed after merely excluding the noise. We also uncovered the temporal characteristic of the asymmetry variation. This paper is organized as follows.
In Section 2, we introduce the synoptic chart data. Section 3 introduces the method and Section 4 the analyses and results. In the final Section 5, we conclude the paper and discuss the results.
\section{Data: Synoptic Charts}\label{sec:data}
Due to the substantial instrumental differences between various ground and space-based measurements, we only make use of MDI/SOHO and HMI/SDO high-resolution synoptic charts that are coming from space-borne observations. The HMI started observation with similar yet upgraded instruments when the MDI was reaching its end of life, i.e., the HMI is a successor to the MDI~\citep{Scherrer2011}. Synoptic charts from both of them are constructed from zero-level offset corrected magnetograms~\citep{Liu2004}. The HMI (MDI) charts are 3600 points in Carrington longitude by 1440 (1080) points equally spaced in sine latitude. The inferred radial synoptic charts provide the imputed radial component of the magnetic field over the entire solar disk. Each pixel on a synoptic chart is generated using near-central-meridian data from 20 magnetograms.
A detailed description and comparison of the charts from the two instruments can be found in \citet{Liu2012}. In this study, we used synoptic charts of MDI span from Carrington Rotation (CR) 1909 to CR-2096 (from May 6, 1996 to Dec 10, 2010; 188 charts in total), and that of HMI from CR-2097 to CR-2232 (from May 6, 2010 to Jun 18, 2020; 136 charts in total). In all, there are 324 synoptic charts, spanning 24 years which covers more than two solar cycles.
\begin{figure*}
\centering
\includegraphics[width=\textwidth]{syn_map.eps}
\caption{Example of synoptic charts from HMI and MDI: (a) HMI CR-2172 (2015/12/25--2016/01/21), and (b) MDI CR-1950 (1999/05/28--1999/06/24). The two subfigures share the same colorbar. The magnetic field saturates at $\pm$800 $\mathrm{Mx\ cm^{-2}}$. The resolution of HMI (MDI) is 3600$\times$1440 (1080) pixels. The field values measured by MDI is greater than that of HMI by a factor of 1.40, and that is why the magnetic fields in the lower panel seems stronger.}
\label{fig:syn_chart}
\end{figure*}
Examples of HMI and MDI synoptic charts are depicted in Figure~\ref{fig:syn_chart}. In the Figure, the CR number of the HMI chart shown here (CR-2172) is the same as in \citet{Getachew2019a}, and the CR number (CR-1950) of MDI is chosen so that it is roughly amid solar maximum and minimum (similar to the case of CR-2172). The two subfigures share the same colorbar, and the colormap is \texttt{hmimag} from the \texttt{SunPy}~\citep{Community2020} open-source software.
The magnetic field values measured by MDI is greater than that of HMI by a factor of 1.40~\citep{Liu2012}, and that is why the magnetic fields in the lower panel of Figure~\ref{fig:syn_chart} seems stronger.
\section{Method}\label{sec:metho}
To estimate the asymmetry of solar photospheric magnetic fields (denoted as `$\mathbb{A}$' afterward), we model the magnetic field value distribution of each synoptic chart with a three-parameter Lorentzian function (or Cauchy-Lorentz distribution). The Lorentzian function is written as \[f(x; x_0,\gamma,I) = \dfrac{I \gamma^{2}}{\gamma^{2} + \left(x - x_{0}\right)^{2}}\] where $x_0$ is the location parameter, specifying the location where the distribution reaches the peak. It is interpreted as the solar photospheric magnetic asymmetry $\mathbb{A}$\ in this study. Besides, $I$ is the height of the peak, and $\gamma$ is half of the full width at half maximum (FWHM). Since only in the special case when $I=1/(\pi \gamma)$, the integration of this function equals to 1, the Lorentzian function is normally not a probability density function.
We use the \texttt{astropy.modeling} package to do the fitting. The model parameters and their uncertainties are estimated with the Levenberg-Marquardt algorithm and the least-squares statistic. The significance of an obtained asymmetric value $\mathbb{A}$\ is quantified with the same method as in \citet{Getachew2019a} (with different degrees of freedom).
\begin{figure}
\centering
\includegraphics[width=0.4\textwidth]{distri.eps}
\caption{Typical examples of the distribution and modeling of magnetic field values in synoptic charts: (a) HMI CR-2172 and (b) MDI CR-1950. The original distribution is plotted with black `+' signs. The distributions are fitted with the Lorentzian model (red line) and the Gaussian model (blue line), respectively.}
\label{fig:model}
\end{figure}
Figure~\ref{fig:model} shows the distributions and model fittings for the two exemplary synoptic charts in Figure~\ref{fig:syn_chart}. Specifically, the magnetic field values in the synoptic charts of HMI CR-2172 and MDI CR-1950 are fitted with both the Lorentzian model and Gaussian model, respectively. The Lorentzian function is an example of a fat-tailed distribution that exhibits a large kurtosis relative to that of a Gaussian function. The result indicates that the Lorentzian model is much more suitable than the Gaussian model in describing the distribution of magnetic field values, both at the center and the tails. It should reflect the property of the evolution of magnetic fields from strong magnetic fields in active regions decaying into weaker fields.
As exhibited in the modeled Gaussian distribution in Figure~\ref{fig:model}, the major part of the distribution is concentrated within about $\pm5$ $\mathrm{Mx\ cm^{-2}}$\ (for HMI) or $\pm10$ $\mathrm{Mx\ cm^{-2}}$\ (for MDI), and it plunges to zero in the tails very quickly. It is obvious that the Gaussian model describes the distributions poorly; especially, it seriously understates the tails of the distribution of magnetic field values.
For the HMI and MDI line-of-sight magnetic field synoptic charts, the noise levels are 2.3 and 5.0 $\mathrm{Mx\ cm^{-2}}$, respectively, and they are quite uniform over the entire chart \citep{Liu2012}.
The magnetic field values larger than tens of Gauss are totally ignored. Thus the asymmetry is almost completely dominated by the very weak magnetic fields mixed with indistinguishable noise.
Therefore, not surprisingly, the calculated asymmetry with the Gaussian model is not dependent on the upper range of magnetic field values from 10 to hundreds Gauss~\citep{Liu2004, Getachew2019a}. In this study, in the process of estimating the $\mathbb{A}$, we will exclude the very weak field values which are unresolvable from noise.
\section{Result}
In this section, first, we calculate the asymmetry values $\mathbb{A}$\ of each synoptic chart in three different cases. Then, we calculate $\mathbb{A}$\ after excluding polar regions and high-latitude areas; the temporal characteristics of the obtained $\mathbb{A}$\ are explored. In addition, we attempt to determine the reversal times of polar field polarities of solar cycles 23 and 24 from the reversal of $\mathbb{A}$.
\subsection{Asymmetry values: three cases} \label{subsec:3cases}
We model the distribution of magnetic field values of each synoptic chart with a Lorentzian function to calculate the asymmetry $\mathbb{A}$\, and estimate the significance in the meanwhile. Here, only the original high-resolution charts of HMI (3600$\times$1440 pixels) and MDI (3600$\times$1080 pixels) are used. For each chart, the $\mathbb{A}$\ is calculated in three cases:
\begin{enumerate}
\item model the original distribution (case-1: orig);
\item model the distribution after excluding magnetic field values within range $-5.4$ to 5.4 G (case-2: $|\mathrm{B}|\geqslant 5.4$ G);
\item model the distribution after excluding magnetic field values within range $-10.4$ to 10.4 G (case-3: $|\mathrm{B}|\geqslant 10.4$ G).
\end{enumerate}
In the latter two cases, the noise and very weak fields are excluded. Here, the threshold values 5.4 G and 10.4 G are chosen because they are the average FWHM of HMI and MDI, respectively. In performing the fitting, we limit the range of magnetic field values within $-$600 to 600 G.
The significance of the obtained $\mathbb{A}$\ values is estimated via the same method as in \cite{Getachew2019a}, i.e., the Student's $t$-tests. To be more specific, we compare the calculated $\hat{t}={Z}/{s}$ value with the pre-calculated statistic $t_{0.01,n-3}$; here, $Z$ is the mean value of the fitted location parameter $x_0$ (i.e., the asymmetry value $\mathbb{A}$), $s$ is the standard error of $Z$, and $n$ is the degree of freedom.
If $\hat{t}>t_{0.01,n-3}$, the corresponding $\mathbb{A}$\ is considered to be statistically significant at the 99\% confidence level. The calculation is done with the \texttt{stats.t} module in the open-source \texttt{SciPy} package.
\begin{figure} %
\centering
\includegraphics[width=0.48\textwidth]{asym_HMI.eps}
\includegraphics[width=0.48\textwidth]{asym_MDI.eps}
\caption{Asymmetry values $\mathbb{A}$\ obtained from (a) HMI and (b) MDI synoptic charts in three cases (see text), as well as a comparison with the sunspot numbers. Only values that are statistically significant at the 95\% confidence level are plotted. The dots are not connected when there are insignificant values. Note that the time spans of the two subfigures are different. The range of the y-axis in the upper panels of the two subfigures are the same.}
\label{fig:asymTwo}
\end{figure}
The resulted $\mathbb{A}$\ values from the HMI charts are shown in Figure~\ref{fig:asymTwo} (a).
For the three cases for HMI, the counts of significant $\mathbb{A}$\ values are 124, 133, and 136 (136 in total), respectively, which means that 91.2\%, 97.8\%, and 100\% of the asymmetry values are statistically significant. Compared with \citet{Getachew2019a}, the obtained $\mathbb{A}$\ values are more noteworthy, and the high percentages of significant values here is the result of a better fitting with the Lorentzian function. When the fitting is performed on a resolution-reduced map, the frequency (or probability) vary drastically between adjacent bins in the distribution (besides the shortcoming of underestimating the fat-tail), and thus the uncertainty is large, which probably leads to a much larger portion of insignificant $\mathbb{A}$\ (see the right two columns of figure 2 in \citealt{Getachew2019a}).
In performing the modeling for each chart, in the latter two cases (case-2 and case-3) , the amplitudes of the resulted model (i.e., the `$I$' in the Lorentzian function) are usually different from that in case-1. Thus, we also perform the modeling in case-2 and case-3 with the amplitude being equal to the respective amplitude in case-1.
It turns out that fixing the amplitude or not only affect the results marginally.
In addition, changing the bin size from 0.1 to 0.5 $\mathrm{Mx\ cm^{-2}}$\ or changing the magnetic field values ranges from $\pm$100 to $\pm$1500 $\mathrm{Mx\ cm^{-2}}$\ affect the asymmetry marginally (the maximum difference of $\mathbb{A}$\ is less than $4\times10^{-3}$). In case-2 and case-3, $\mathbb{A}$\ is affected by the threshold values; specifically, it gradually becomes larger with the increase of threshold value from 0 to 10.4 $\mathrm{Mx\ cm^{-2}}$.
With the same procedure, the $\mathbb{A}$\ values calculated from the MDI charts are plotted in Figure~\ref{fig:asymTwo} (b). For the three cases, the counts of significant values of $\mathbb{A}$\ are 139, 143, and 166 (188 in total), respectively, which means that 73.9\%, 76.1\%, and 88.3\% of the asymmetry values are statistically significant.
The obtained $\mathbb{A}$\ values in case-3 are in the same order of magnitude as that obtained with a resolution as low as 72$\times$30 pixels in \citet{Getachew2019a}.
Figure~\ref{fig:asymTwo} manifests that $\mathbb{A}$\ values increase systematically from case-1 to case-3, which is more obviously shown in the results of HMI (panel a). Both of the panels indicate that the $\mathbb{A}$\ is modulated by the solar cycle. In case-2 and case-3 in panel (a), the $\mathbb{A}$\ values present opposite relations with the two peaks of the double-peaked maxima of the solar cycle. Specifically, it is clearly seen from $\mathbb{A}$\ of HMI (red or blue dots connected by dashed lines) that at the former peak during the ascending phase of solar cycle 24, the $\mathbb{A}$\ surges and stays positive, while at the latter peak, the $\mathbb{A}$\ plunges and remains negative.
This regularity seems not true for $\mathbb{A}$\ of MDI at the former peak of solar cycle 23 though, which is possibly due to the data quality of the early observations.
Besides, the $\mathbb{A}$\ values seem to oscillate ups and downs periodically.
\subsection{Periodicity of the asymmetry values} \label{subsec:wavelet}
\begin{figure}
\centering
\includegraphics[width=0.48\textwidth]{wave.eps}
\caption{Wavelet power spectra of the asymmetry values. (a) The asymmetry values; HMI results are used during the overlapped time. (b) The wavelet power spectrum. The black solid contours indicate the 95\% confidence level, and the hatched area indicates the cone of influence where edge effects become important. (c) The global wavelet power spectrum (solid line) and the 95\% confidence level (dashed line). In (b) and (c) the y axis is logarithmic.}\label{fig:wave}
\end{figure}
The variation of the asymmetry values from both HMI and MDI suggests that there are periodicities in them, especially in $\mathbb{A}$\ of case-2 and case-3. Therefore, we join the $\mathbb{A}$\ values from the two instruments of case-3 to form a continuous time series and perform the wavelet analysis; the power spectra are displayed in Figure~\ref{fig:wave}. The wavelet power spectrum in Figure~\ref{fig:wave} (b) reveals that areas above the 95\% confidence level are distributed in three period bands. The global wavelet power spectrum in Figure~\ref{fig:wave} (c) indicates that the three periods are: 178.1 days ($\sim$0.5 year), 361.1 days ($\sim$1.0 year), and 2441.2 days ($\sim$6.7 years), respectively. All of them are statistically significant at the 95\% confidence level. The $\sim$6.7-year period is affected by the cone of influence, which is due to the limited length of $\mathbb{A}$\ time series.
These obvious characteristics are not revealed in previous studies.
We speculate that the $\sim$0.5 and $\sim$1 year periods are caused by the annual variation of the B$_0$ angle, i.e., the inclination of the solar rotational axis with respect to the ecliptic plane, or the heliographic latitude of the central point of the solar disk.
The $\sim$6.7-year period indicates that the asymmetry is probably related to the solar activity cycle.
\subsection{Asymmetry values: hemispheres and low latitudes}
\label{subsec:FNS}
\begin{figure*}
\centering
\includegraphics[width=0.8\textwidth]{AsymDegHemi_10.eps}
\caption{Asymmetry values in various cases. (a) 90F (black), 90N (red), 90S (blue). (b) and (c) are similar to (a), only that the latitudes are restricted to $\pm60$\textdegree\ and $\pm40$\textdegree, respectively (see text for details). Only values above the 95\% confidence level are shown. (d) The SIDC monthly sunspot numbers (solid line) and 13-month smoothed sunspot numbers (dashed line). (e) The inclination of the solar rotational axis (B$_0$ angle) with respect to a normal to the ecliptic plane.}
\label{fig:AsymHemi}
\end{figure*}
It is of interest to exclude the high latitudes and polar regions and study the asymmetry; there are two reasons. First, the Sun's rotation axis is tilted by about 7.25 degrees with respect to the ecliptic plane, and the region near each one of the solar poles is unable to be observed during half of the year. So either in the north or the south, some pixels in the polar regions in synoptic charts are absent of values.
Second, in synoptic charts the high latitude regions are substantially exaggerated in the toroidal direction, which is due to the method of construction of synoptic charts, i.e., the process of remapping and interpolating onto a Carrington coordinate grid~\citep{Ulrich2006}. This problem is not taken into consideration in previous studies.
Thus, we studied the $\mathbb{A}$\ in latitudes within $\pm60$\textdegree\ and within $\pm40$\textdegree\ as well, that is, excluding the magnetic field values of high latitudes in synoptic maps.
Furthermore, to investigate the difference of distribution of magnetic field values between the two hemispheres, we also studied the asymmetry of the northern hemisphere (N-hemisphere) and southern hemisphere (S-hemisphere) individually.
The results of $\mathbb{A}$\ values are displayed in Figure~\ref{fig:AsymHemi} (a), (b), and (c). Note that the asymmetry values are calculated only in case-3. In the figure, the legend of the line indicates the range of latitude that is used to calculate the asymmetry values. For example, in panel (b), `\A60F' means result of latitude from $-60$\textdegree\ to 60\textdegree (see Figure~\ref{fig:syn_chart}), `\A60N' means 0\textdegree\ to 60\textdegree\ (in the N-hemisphere), and `\A60S' means $-60$\textdegree\ to 0\textdegree\ (in the S-hemisphere).
Only $\mathbb{A}$\ values that are above the 95\% confidence level are shown with dots connected by dashed lines (some of them are not connected because there are insignificant or missing values between them).
The daily sunspot numbers and the 13-month filtered sunspot numbers are displayed in panel (d) to show the solar cycle. The variation of the B$_0$ angle in the range $\pm$7.25\textdegree\ during the contemporary time is shown in panel (e).
The main findings from the results in Figure~\ref{fig:AsymHemi} can be summed up as follows:
\begin{itemize}
\item from panel (a) to (c), the magnitude of hemispheric $\mathbb{A}$\ decreases overall after high-latitude regions are excluded;
\item in panel (a), the variations of hemispheric $\mathbb{A}$\ values (\A90N and \A90S) reflect the solar cycle, and show obvious flips at solar maxima;
\item during solar minima, \A90N and \A90S differ the most and show opposite signs; on the contrary, \A40N and \A40S agrees better during solar minima;
\item the hemispheric or full-disk $\mathbb{A}$\ in panel (a) show an obvious annual variation, while such a periodicity is not that apparent in panels (b) and (c);
\item the magnitude of the asymmetry values calculated when both of the two hemisphere are considered (i.e., \A90F, \A60F, and \A40F) are close.
\end{itemize}
The different results of $\mathbb{A}$\ are inferred to be caused by the emergence and evolution of magnetic flux over the entire solar disk from the equator to the poles.
To better understand the variations of the asymmetry values, we construct a magnetic butterfly diagram during the years between 1996 and 2020 from the synoptic charts of MDI and HMI. For each chart, the magnetic field values are averaged over longitude. The diagram is shown in Figure \ref{fig:bfly}. In the figure, the values of MDI are scaled down by a factor of 1.4 to make the two parts more consistent. Values exceeding $\pm$10 Mx cm$^{-2}$ are represented by red or blue, respectively. In the left half, there are some blank vertical areas which indicate that there are missing values. At the top and bottom wave-shaped edges, the effect of B$_0$ angle can be clearly seen. The Spörer's law, Hale’s polarity law, and Joy’s law are well manifested (more discussions in the final section).
It is clearly presented in Figure \ref{fig:bfly} that the active belt is dominated by emergent bipolar flux, while the high-latitude regions are dominated by unipolar flux surges.
When both high- and low-latitudes are considered in the calculation, the asymmetries are greatly modulated by the flux in high-latitude, as well as polar fields; with high-latitude areas excluded, the amplitude of asymmetries decreases.
The reversal of polar fields as shown in Figure \ref{fig:bfly} is well reflected in the reversal of \A90N and \A90S during the two solar maxima.
During solar minima, the flux emergence are sparse, and \A90N and \A90S are dominated by polar region flux surges.
The relatively small and similar amplitudes of the asymmetries \A90F, \A60F, and \A40F indicate the approximately balanced flux on the solar surface. However, even within $\pm$40\textdegree (\A40F/N/S), the positive and negative flux seems not totally balanced at all, but rather exhibits systematic deviations.
\begin{figure*}
\centering
\includegraphics[width=1.0\textwidth]{magButterfly.eps}
\caption{A magnetic butterfly diagram constructed from synoptic charts of MDI and HMI (divided by the vertical dashed line). The values of MDI are scaled down by a factor of 1.4 to make the two parts more consistent. Values exceed $\pm$10 Mx cm$^{-2}$ are represented by red or blue. Blank vertical areas indicate that there are missing vales. The effect of B0 angle is clearly seen from the top and bottom wave edge.}
\label{fig:bfly}
\end{figure*}
\subsection{Periodicity of the hemispheric asymmetry values} \label{subsec:hemi_wavelet}
\begin{figure}
\centering
\includegraphics[width=0.5\textwidth]{gwps.eps}
\caption{Global wavelet power spectra of the $\mathbb{A}$\ values obtained in nine different cases as shown in Figure~\ref{fig:AsymHemi}. In each panel, the solid curve is the power spectrum and the dashed line indicates the 95\% confidence level.}
\label{fig:gwps}
\end{figure}
To study the periodicity in hemispheric asymmetry values and the $\mathbb{A}$\ that calculated after excluding high-latitude areas, we perform wavelet analyses on all of the obtained $\mathbb{A}$\ values in Figure~\ref{fig:AsymHemi} (a), (b), and (c), respectively. Their global wavelet power spectra are displayed in Figure~\ref{fig:gwps}.
Surprisingly, almost all of them show the $\sim$0.5 year and the $\sim$1 year period (above the 95\% confidence level), even when the calculation is restricted to low latitudes (i.e., \A40F, \A40N, and \A40S).
Longer periods are also shown in some of the $\mathbb{A}$\ values. Similar features are shown in each column in Figure~\ref{fig:gwps}. For instance, both \A90F and \A60F show a significant $\sim$6.7-year period (it is also shown in \A40F but below the 95\% confidence level).
Asymmetry values of the S-hemisphere, i.e., \A90S, \A60S, and \A40S show a period of $\sim$2.5-year; however, it is above the 95\% confidence level only in \A60S.
\A90N and \A60N show a period of $\sim$3.5 year, but all of them are not significant.
Besides, \A40N show a significant period of $\sim$7.5 years.
The variation of this approximate solar-cycle-length period (compared to the $\sim$6.7-year period in \A90F and \A60F) is probably due to the limited length of the $\mathbb{A}$\ values.
\subsection{Polar field reversal time}
\begin{figure}[htbp]
\begin{center}
\includegraphics[width=0.48\textwidth]{reves_time.eps}
\includegraphics[width=0.48\textwidth]{reves_time_SC23.eps}
\caption{The reversal of asymmetry values during the maximum of solar cycle 24. The upper and lower panels show the reversal of the N- and S-hemispheres, respectively. In the upper panel, the dark-red dots display the results of case-2, and the red dots connected by dashed line display the results of case-3 (see text). The lower panel is similar to the upper panel, only that it displays the results of the S-hemisphere. The blue arrow indicates the reversal time of the southern hemispheric $\mathbb{A}$, and the right red arrow indicates that of the N-hemisphere; the left red arrow indicates a possible time that may be falsely considered a reversal.}
\label{fig:rev_time}
\end{center}
\end{figure}
In Figure~\ref{fig:AsymHemi} (a), the hemispheric asymmetry values (\A90N and \A90S) show an obvious flip at solar maxima of cycles 23 and 24, which is inferred to be caused by the reversal of the polarities of polar magnetic fields.
In order to show the reversal time more clearly, Figure~\ref{fig:rev_time} (a)--(d) display \A90N and \A90S during the maxima of these two cycles, calculated in both case-2 and case-3 (see Section~\ref{subsec:3cases} for details of the two cases).
Since the data quality from the HMI is better (almost no insignificant or missing values), we discuss the polar reversal of cycle 24 first.
Figure~\ref{fig:rev_time} (a) and (b) show that the reversal of hemispheric $\mathbb{A}$\ of both the N- and S-hemispheres are not a simple and obvious process.
For the S-hemisphere, according to Figure~\ref{fig:rev_time} (b), during CR-2138 (Jun 2013) and CR-2139 (July 2013) which are indicated with a blue arrow, \A90S turn from positive to mainly negative; however, taking both $\mathbb{A}$\ of case-2 and case-3 into consideration, it episodically turns back to positive in two of the Carrington rotations. Notably, the \A90S stays negative from CR-2148 (March 2014) onward. Therefore, we argue that the polar magnetic polarity reversal of the S-hemisphere happened in March 2014. It agrees well with that of \citet{Sun2015}, and it is merely 1--3 months earlier than the results of \citet{PastorYabar2015} and \citet{Gopalswamy2016}, and 4 months later than that of \citet{Janardhan2018}.
Previous results reveal that the reversal time of the N-hemisphere polar field is more diversified~\citep[e.g.,][]{Janardhan2018}, which is also reflected in the \A90N values in Figure~\ref{fig:rev_time} (a). The \A90N turns from negative to positive in as early as Jan 2012 (indicated with the left red arrow). However, from 2012 on, \A90N oscillates around 0 until March 2014 (from CR-2147 to CR-2148, indicated with the right red arrow in the figure) when \A90N turns positive and stays positive afterward.
\citet{Karna2014}, \citet{Sun2015}, and \citet{PastorYabar2015} resulted in 2012 or early 2013 for the reversal of the N-hemisphere. \citet{Gopalswamy2016} and \citet{Janardhan2018} gave intervals of Oct 2012--Sep 2015 and Jun 2012--Nov 2014, respectively. The intervals given by the latter two authors generally agree with the interval of complicated reversal process of \A90N shown in Figure~\ref{fig:rev_time}.
We claim that the polar magnetic polarity of the N-hemisphere reversed during the same time as that of the S-hemisphere --- in March 2014.
This result agrees well with the polar polarity changes shown in the magnetic butterfly diagram in Figure~\ref{fig:bfly}.
Specifically, the reversal time of the S-hemisphere is clearly in between 2014 and 2015, during when the polar polarity changes sign.
In the N-hemisphere, the reversal time is not that obvious, and the complication of $\mathbb{A}$\ values is explained by the magnetic field. Although it seems like the reversal (from negative to positive) is in 2012-2013, it is affected by the obvious negative trailing polarity during 2010 and 2014. The ultimate reversal most likely happened during 2014-2015. The reversal of $\mathbb{A}$\ values confirms that it is not reversed until March 2014.
As for solar cycle 23 shown in Figure~\ref{fig:rev_time} (d), taken both two cases of \A90S values into consideration, the polar field polarity of the S-hemisphere ultimately reversed in March 2001 (indicated with the right blue arrow), though the first reversal happened in May 2000 as indicated with the left blue arrow. This result generally agrees with \citet{Wang2002} who stated that the S-hemisphere polarity reversal is completed in 2001.
Determining the reversal time of the N-hemisphere is impeded by a lack of data (missing or insignificant values). However, it does seems that it happened earlier than the S-hemisphere -- it might happen in Jan 2000 (or earlier) as indicated with the red arrow.
\section{Conclusion and Discussion}
In this research, we investigated the asymmetry of solar photospheric magnetic field values and its temporal variations with data of synoptic charts spanning the recent 24 years (covering solar cycles 23 and 24). Note that the synoptic charts are constructed with magnetograms that are all zero-level offset corrected \citep{Liu2004, Liu2012}.
The distributions of magnetic field values in the synoptic charts are found to be Lorentzian rather than Gaussian. Besides an obvious better fitting at the central part of the distribution, especially, the Lorentzian function better represents the stronger magnetic fields at the tails of the distribution, which probably reflects the gradual evolution process of magnetic fields from strong fields to quiet Sun magnetic fields.
The asymmetry of distribution is uncovered by the Lorentzian function fitting, despite that it is somewhat concealed by the symmetrically distributed noise and very weak fields. Further, after excluding the noise, as well as weak fields that are indistinguishable from the noise, the asymmetry is clearly revealed. We argue that it is the stronger small-scale magnetic fields rather than supergranulations that bring about the asymmetry.
In a resolution-reduced synoptic chart, the magnetic field value of each pixel is coming from the average of values of dozens or even thousands (depending on the resolution of the resulted chart) of pixels from the original chart; consequently, the strong magnetic fields are likely averaged out to the range within $\pm$10 G, which leads to the calculated asymmetry in previous studies \citep{Getachew2019a, Getachew2019}.
The magnetic fields of supergranulation mainly reside on the cell boundaries and thus can be resolved only with high-resolution observations \citep{Rincon2018}. Even if the asymmetry is caused by the supergranulation, it can only be detected with high-resolution observations.
We obtained asymmetry values in several circumstances (see sections \ref{subsec:3cases} and \ref{subsec:FNS}), and also studied their periodicity. Taken all of the $\mathbb{A}$\ values into consideration, almost all of them show the half-year and/or annual periods; additionally, some of them show a period approximately half of the solar cycle.
We infer that the annual (and half-year) period is caused by the variation of the B$_0$ angle, and the asymmetry is modulated by the solar cycle, i.e., the evolution of the global magnetic field. More details are discussed in the following paragraph.
These characteristics are not revealed at all in previous studies.
The various features of the asymmetry values are a result of the emergence and transportation of surface magnetic flux.
The typical butterfly diagram (sunspot areas as a function of latitude and time, i.e., Spörer's law) manifests that active regions emerge at higher latitudes at the beginning of each cycle (within $\pm40$ degree); as the cycle progresses, the central emergent latitudes drift towards the equator.
The emerged flux at active latitudes usually consists of bipolar active regions with a leading and a following part; the flux of these two opposite polarity parts are approximately equal.
Between the two hemispheres, the polarities of the leading (or following) parts are opposite; and also, from one solar cycle to another, of the same hemisphere, the polarities of the leading and following parts change alternatively~\citep[Hale's polarity law,][]{Hale1925}.
The leading polarity is usually more compact in morphology and intense in magnetism.
Statistically, the leading polarity spots of the emerged bipolar active regions are at a lower latitude than the following polarity; the latitudinally averaged tilt angles increase with latitude, (and the overall averaged title angle is about 5--6 degrees)~\citep[Joy's law,][]{Hale1919}.
The emerged flux is dispersed by the differential rotation, the turbulent diffusion, and the meridional flow. Both polarities of the bipolar regions are being carried poleward.
The dispersed flux from the leading polarities in one hemisphere, since it is closer to the equator, is more likely drifting toward the equator to meet and cancel with the opposite-polarity dispersed flux of the leading polarity of the other hemisphere.
On the contrary, the following polarities at higher latitudes have a higher probability of reaching the pole instead of being canceled.
Also, The leading polarity, while being carried poleward, is more likely to meet and cancel with the following polarity from the same bipole.
Some of these characteristics are well displayed in the magnetic butterfly diagram in Figure~\ref{fig:bfly} and the asymmetry values.
The calculation of the three \A40 is restricted to the activity belt ($\pm$40 degree).
Though there are lots of flux emergence during solar maxima, the emerged bipolar regions are approximately flux-balanced, and the amplitudes of \A40 are small (compared with \A90N/S).
Surprisingly, during solar minimum, even when there are very few or no sunspots and the flux emergence is sparse, \A40N and \A40S still systematically deviate from zero, and the three generally agree well with each other.
During times other than the solar minimum, \A40N and \A40S are anti-correlated sometimes, which could be caused by cross-equator flux cancellation events; during such processes, the total flux of leading polarities on both hemispheres decreases, and thus the asymmetries \A40 will be dominated by the following polarities \citep{Cameron2013}.
The magnitude of the \A40 variation seems independent of the solar cycle. It is not clear where does this asymmetry comes from. The magnetic elements that cause the asymmetry in \A40 seems to come from a source independent of the global solar dynamo. We speculate that it is probably related with magnetic flux coming from a local turbulent dynamo \citep[e.g.,][]{Jin2011}.
Another probability is that the \A40 variation is caused by the cross-equatorial flux plumes \citep{Cameron2013}, as well as the variation of the B$_0$ angle. That is to say, the asymmetries brought about by cross-equatorial flux plumes are further modulated by the annual variation of the solar axis inclination, which is noteworthy even in the \A40F.
When high-latitudes and polar regions are taken into consideration, the asymmetries \A90N/S are dominated by the poleward polarity surges and polar fields.
The polar fields are often located at $\pm$60 degrees poleward, and they are almost unipolar and relatively weak and have large spatial scales~\citep{Petrie2017}. Thus the amplitudes of \A90N/S are substantially larger.
The variation of the polar field strength lags the $\sim$22-year magnetic activity cycle by $\sim$11-year in time phase. During solar minima, the magnetic activity in the solar surface is at a low level, while the strength of polar fields reaches the peak, so the amplitudes of A90N/S also reach the peak.
Each of the poles is unable to be observed during half a year periodically, and this effect is shown in the annual variation of \A90 and in Figure~\ref{fig:bfly}.
As shown in Figure \ref{fig:AsymHemi} (a) and Figure \ref{fig:bfly}, during the late declining phase of the cycle approaching solar minima, the 0.5/1-year periodicity is most noticeable in \A90. This is because, during this time, the poleward polarity surges become less frequent and finally cease, and then the asymmetries \A90 will be dominated by high-latitude regions and polar fields.
On the contrary, during the time when the polarity surges are strong and frequent, the 0.5/1-year modulation is partially masked by the lower-latitude streams, and thus it is not that discernible. %
We assert that the reversal of the hemispheric $\mathbb{A}$\ can be another indicator of the polar field reversal. Especially, we show that the polar reversal of the N- and S-hemisphere of solar cycle 24 may have happened contemporarily, both in March 2014.
It is well known that the Sun's global dipole magnetic field reverses polarity at each solar maximum during the 11-year solar cycle. Polarity reversal is essential for the Babcock-Leighton model of the solar cycle~\citep{Babcock1961, Leighton1969}.
Since emergent active regions located in low latitudes are typically bipolar and flux-balanced while large spatial-scale high-latitude fields and polar fields are usually unipolar \citep{Petrie2017},
the hemispheric asymmetry \A90N/S mainly reflect the asymmetry of magnetic fields at high latitudes and polar regions which reverse their signs during solar maxima.
At the beginning of each cycle, the sign of the following-polarity of emergent flux is opposite to the polar fields. As the cycle progresses and reaches the maximum, the poleward surges of this flux reverse the sign of the magnetic field at high-latitude and polar regions. These surges then continue to build up new polar fields during the declining phase of the cycle\citep{Hathaway2015}.
It is a controversial issue when did the polar field of the two hemispheres reversed in solar cycles 23 and 24; different groups of researchers reported different results \citep[for a list of reversal times from previous research, see, e.g.,][]{Pishkalo2019}.
For solar cycle 24, in previous studies, the reversal time of the N-hemisphere varies from Jun 2012 to Sep 2015, and that of the S-hemisphere varies from Nov 2013 to Jun 2014~\citep[e.g.,][]{Sun2015, Petrie2017, Janardhan2018}.
The reversal time of the S-hemisphere determined here agrees well with that of \citet{Sun2015}.
The so-called triple or multiple reversals in the N-hemisphere in cycle 24 as indicated in, e.g., \citet{Pishkalo2019} and \citet{Janardhan2018}, is well shown in the variation of asymmetry values.
For cycle 23, the polar reversal time of the S-hemisphere determined with asymmetry values agrees with \citet{Wang2002}; furthermore, it can be assured that the reversal of the N-hemisphere was completed prior to the S-hemisphere despite that the determination of the exact date is impeded by missing values.
More research can be done to investigate the polar field reversal with the asymmetry of magnetic field values. For instance, calculating the asymmetry of distribution with daily magnetograms, restricting the calculations within high latitudes and polar regions, or calculating the asymmetry in various latitudes ranges, etc.
\acknowledgments
Source of sunspot numbers: WDC-SILSO, Royal Observatory of Belgium, Brussels.
\href{http://soi.stanford.edu/magnetic/synoptic/carrot/M\_Corr}{SOHO/MDI} is a project of international cooperation between ESA and NASA.
\href{http://jsoc.stanford.edu/data/hmi/synoptic}{HMI} data are courtesy of the Joint Science Operations Center (JSOC) Science Data Processing team at Stanford University.
This work is supported by the National Natural Science Foundation of China (No. 11903077, 11973085, 11633008, 40636031, 11673061, 11703085), the Specialized Research Fund for State Key Laboratories, the Basic Research Priorities Program of Yunnan (202001AU070078), and the Chinese Academy of Sciences.
\software{Astropy (The Astropy Collaboration \citeyear{Robitaille2013, Price-Whelan2018}), Matplotlib \citep{Hunter2007}, NumPy \citep{Walt2011, Harris2020}, SciPy \citep{Virtanen2020}, IPython \citep{Perez2007}, SunPy (The SunPy Community \citeyear{Community2020}, \citealt{Mumford2020})}
\bibliographystyle{aasjournal}
|
\section{Introduction and Main Result}
This paper presents both a proof method and result. The proof
method presented, in contrast to other familiar proof methods
for identities, including the Binet form, generating functions,
and matrix methods, is particularly suitable for proving a family
of identities satisfied by a family of recursive sequences.
To motivate the method we first state the result proven in
this paper which presents a
family of identities satisfied by the following family of recursive sequences indexed
by a parameter $k \ge 2.$
\begin{equation}\label{kacci}
F^{(k)}_n = \sum_{i=1}^k F^{(k)}_{n-i}.
\end{equation}
with $n$ a parameter varying over all integers.
\begin{comment} Four comments are now presented
discussing i) initial values, ii) doubly infinite sequences,
iii) minimal polynomials, and
iv) the names associated with this family as well as with individual
members.
In the sequel, we will use the abbreviation
$F^{(k)}$ to refer to the sequence
$\{F^{(k)}_n\}_{\{\text{all $n$}\}}.$
\textbf{Initial values.} The Online Encyclopedia of Integer Sequences, OEIS,
in presenting the Tribonacci and Tetranacci sequences,
\cite[A000073]{OEIS},\cite[A000078]{OEIS} , indicates the following
initial values.,
\begin{equation}\label{initialvalues}
F^{(k)}_i=0, \qquad 0 \le i \le k-2, \qquad F^{(k)}_{k-1}=1,
\end{equation}
However, the literature notes two alternatives to \eqref{initialvalues}:
1) \cite{Noe} presents initial conditions with $k-2$ zeroes followed by 2 ones,
and
2)\cite{Bravo}, while adhering to initial values of $k-1$ zeroes followed by a 1,
starts the sequence
at $F^{(k)}_{k-2}$ so that $F^{(k)}_1=1.$ In this paper we follow \eqref{initialvalues}
which is the OEIS approach. However, the results of this paper are true for any sequence
satisfying \eqref{kacci} independent of initial conditions.
\textbf{Doubly infinite sequence.}
As with any recursive sequence initially defined for non-negative $n$,
\eqref{kacci} allows extending the sequence to negative indices.
\textbf{Minimal polynomials.}
For reference and later use, for $k \ge 2,$ we let $r_k(X)$
indicate the minimal polynomial of $F^{(k)}.$
\begin{equation}\label{rk}
r_k(X) = X^k - \sum_{i=1}^{k} X^{k-i}.
\end{equation}
The theory associated with
$r_k(x)$ is well-known: i) $r_k(X)$ is irreducible over $\Z[x],$ and hence
ii) it is the
\emph{minimal polynomial} for $F^{(k)}.$
iii) Furthermore, the $\Z[x]$-ideal generated by the minimal polynomial contains
the characteristic equation associated with any identity satisfied by
the sequences which the minimal recursion generates. Additionally,
iv) $r_k(X)$ has simple roots; one root is very close to two while the other
roots lie in the unit circle \emph{\cite{Miles, Miller, Wolfram2}}.
However, in the sequel we will not need the entire theory.
\textbf{Names.} For $k=2,3,4$ and for traditional initial values,
\eqref{initialvalues},
\eqref{kacci} corresponds to the
Fibonacci,
Tribonacci \emph{\cite[A000073]{OEIS}}, and Tetranacci \emph{\cite[A000078]{OEIS}} sequences respectively.
However, there is no accepted standardized name for the family of sequences
described by \eqref{kacci}. Furthermore, when names do exist,
they are also used to refer to other types of families of identities.
Consequently, in this paper we will suffice with using the algebraic notation,
$F^{(k)}.$ Here are some details supporting this assertion.
An initial place to look for names for the family
described by \eqref{kacci} would be the Fibonacci Quarterly.
But we find multiple terms such as
\emph{generalized Fibonacci numbers} \cite{Ferguson, Kalman},
\emph{$k$-generalized Fibonacci numbers} \cite{Flores}, and
\emph{generalized Fibonacci $k$-sequences} \cite{Gabai}.
Dresden \cite{Dresden} lists five accepted names for the family
described by \eqref{kacci}:
\emph{i) generalized Fibonacci numbers of order $k,$
ii) Fibonacci numbers of order $k$,
iii) Fibonacci $k$-step numbers,
iv) Fibonacci $k$-sequences, and
v) $k$-bonacci numbers.} If one looks for rarer names
occurring in only one or two articles other names pop up
such as \emph{the $k$-nacci numbers} \cite{Bacani}. But even here,
a routine google search over the internet using the search
term ``$k$-nacci" shows multiple papers.
It might appear from the preceding discussion that the
description
\emph{generalized Fibonacci numbers} is a safe consensus for a name.
But \cite{Edson, Yayenie},
citing multiple references, point out that in
generalizing the Fibonacci recursion, $F_n=a F_{n-1} + bF_{n-2}, a=b=1,$
some authors have altered the starting values,
while others have preserved the first two terms of the sequence
but changed the recurrence relation.
In other words, the phrase \emph{generalized Fibonacci numbers}
can refer to different things in different articles.
As indicated at the introduction of this comment,
we find the best course to simply modestly state that we are
proving a family of identities satisfied by a family of recursive sequences
$F^{(k)},$ which for $k=2,3,4$ are the familiar Fibonacci, Tribonacci, and
Tetranacci sequences (with appropriate initial values).
\end{comment}
We motivate the main result by considering three examples.
\begin{itemize}
\item
The subsequence of Fibonacci numbers restricted to even indices,
$\{G_n\}_{n \ge 0}=$ \\
$\{0,1,3,8,21,55,\dotsc\},$ satisfies the recursion
$G_n=3G_{n-1}-G_{n-2}.$ Equivalently, $\{F_n\}_{n \ge 0}$ satisfies
$F_n = 3F_{n-2} - F_{n-4}.$ Note that this last identity is satisfied by the
Fibonacci numbers restricted to either even or odd indices.
\item Similarly, the subsequence of Tribonacci
numbers, as defined by the OEIS,
\cite[A000073]{OEIS}, restricted to indices divisible by 3,
$\{G_n\}_{n \ge 0}=\{0, 1, 7, 44, 274, 1705, 10609, \dotsc \},$
satisfies the recursion $G_n = 7 G_{n-1} -5 G_{n-2} + G_{n-3}.$
For purposes of this paper, we will deal with the corresponding identity
on the Tribonacci numbers, $F_n^{(3)} = 7 F_{n-3}^{(3)} - 5 F_{n-6}^{(3)}
+ F_{n-9}^{(3)}.$ As in the
case of the Fibonacci numbers, it is simply a convenience to say that the identity
holds for the subsequence of indices divisible by three; it actually also holds for
any subsequence of indices at a fixed congruence modulo 3.
\item The subsequence of the Tetranacci numbers,
as defined by the OEIS, \cite[A000078]{OEIS},
restricted to indices divisible by 4,
$\{G_n\}_{n \ge 0} =$
$ \{0, 1, 15, 208, 2872, 39648, 547337, \dotsc \},$ satisfies the recursion,
$G_n = 15G_{n-1} - 17 G_{n-2} + 7 G_{n-3} -G_{n-4},$ or equivalently, the
Tetranacci numbers satisfy the recursion
$F_n^{(4)} = 15F_{n-4}^{(4)} - 17 F_{n-8}^{(4)} + 7 F_{n-12}^{(4)} -F_{n-16}^{(4)}.$
\end{itemize}
These examples motivate defining a triangle $P,$ presented in Table \ref{TP},
whose second, third, and fourth
rows (starting the count of rows from the zero-th row)
correspond to the coefficients in the recursions just listed.
\begin{center}
\begin{table}[H]
\begin{tabular}{||c|c c c c c c c||}
\hline \hline \text{Row number-Column Number} &0 & 1 & 2 & 3 & 4 & 5 & 6 \\
\hline
0 & -1 & 0 & 0 & 0 & 0 & 0 & 0 \\
1 & -1 & 1 & 0 & 0 & 0 & 0 & 0 \\
2 & -1 & 3 & -1& 0 & 0 & 0 & 0 \\
3 & -1 & 7 & -5& 1 & 0 & 0 & 0 \\
4 & -1 &15 & -17&7 &-1 & 0 & 0 \\
5 & -1 & 31 & -49 &31&-9 & 1& 0 \\
6 & -1 & 63 &-129&111&-49&11& -1 \\
\hline \hline
\end{tabular}
\caption{The recursive triangle $P.$}
\label{TP}
\end{table}
\end{center}
To formulate our main result we instead define $P$ recursively as follows.
\begin{definition} \; \\
\begin{equation}\label{2minus1}
P_{i,j} = 2P_{i-1,j} - P_{i-1,j-1}.
\end{equation}
\end{definition}
The initial values for $P$ are as given in Table \ref{TP} in row 0 and column 0.
As with any triangle recursion, once initial values are given, the associated
sequence can be extended to a doubly infinite array. This fact will be
useful in the proof.
Having defined $P,$ we can then formulate a main theorem
which states that the rows of $P$ give the coefficients
of the recursion satisfied by the subsequence of
$\{F^{(k)}_n\}_{\{\text{all n}\}}$ restricted
to indices divisible by $k.$
\begin{theorem} For $k\ge 2,$ (and all $n$)
\begin{equation}\label{t1}
F^{(k)}_{n} = \sum_{i=1}^k P_{k,i} F^{(k)}_{n-ki}.
\end{equation}
\end{theorem}
\section{Proof Method}
This section motivates the need for a separate proof method.
Traditional proof methods include the Binet form, generating
functions, and matrix methods \cite{Koshy}. If we are proving
an identity satisfied by a single recursive sequence, these methods suffice.
However, we are proving that for each $k,$ \eqref{t1} is
satisfied by $F^{(k)}.$ We therefore need a \emph{uniform} method to
prove the family of identities. The Binet form for each $F^{(k)}$
is different with different roots. Similar comments apply to generating functions and matrices.
The method by which we prove \eqref{t1} exploits the fact
that the minimal polynomial of
a recursive sequence generates an ideal containing
the characteristic polynomials corresponding to
all identities satisfied by the recursive sequence.
This method will allow uniform proofs.
To make this precise, we first illustrate the flow of logic
in the proof, by discussing the proof for $k=2,$
that the
subsequence of Fibonacci numbers restricted to even indices,
$\{G_n\}_{n \ge 0}=$
$\{0,1,3,8,21,55,\dotsc\},$ satisfies the recursion
\begin{equation}\label{tt1}
G_n=3G_{n-1}-G_{n-2}.
\end{equation}.
As just formulated this appears to be statement about a sequence
$\{G_n\}_{n \ge 0}.$ We can equivalently prove,
\begin{equation}\label{tt2}
F_n = 3 F_{n-2} - F_{n-4},
\end{equation} which is a statement about the Fibonacci numbers.
We simply observe that \eqref{tt2} implies \eqref{tt1}.
\begin{definition} If $H_m = \sum_{i=1}^n c_i H_{m-i}$ is an identity
satisfied by a recursive sequence $\{H_m\}_{m \ge 0},$ then the
characteristic polynomial of the identity is
\begin{equation}\label{cp}
p(X) = X^n - \sum_{i=1}^n c_i X^{n-i}.
\end{equation}
\end{definition}
Equation \eqref{cp}
establishes a correspondence between recursive sequences and polynomials.
This definition of characteristic polynomial follows
\cite[Section 6.2]{Rosen}. As noted in \cite{Hendel} other definitions
do exist. Definition 2.1 regards the characteristic polynomial
as an attribute of the identity. Contrastively, the minimal
polynomial is an attribute of the recursive sequence; roughly, it is
the characteristic polynomial with leading coefficient 1
of smallest degree whose associated recursion is satisfied by the sequence.
The following result is well-known, but is not frequently used in traditional sources
\cite{Koshy} to prove identities. Webb \cite{Webb1,Webb2} has written
some papers showing the usefulness of such methods. The proof is
short and also given below.
\begin{proposition} A recursive identity is satisfied by a recursive sequence iff the characteristic polynomial of that
identity is divisible by the minimal polynomial of the underlying
recursion. \end{proposition}
\begin{proof} Interpret the variable $X$ as the difference operator
\cite{Boole}. Then the minimal polynomial considered as an operator when applied to the
sequence to which it is a minimal polynomial annihilates that sequence, that is,
the resulting sequence is identically 0.
It immediately follows by the associativity of polynomials
that any polynomial multiple of this minimal polynomial
also annihilates the underlying recursive sequence showing
that the identity corresponding to this multiple of the minimal polynomial
is satisfied by the recursive sequence.
Since in $\Z[x]$ all ideals are generated by a single element,
it follows that the characteristic polynomial associated with any
identity must lie in the ideal generated by the minimal polynomial
\end{proof}
It follows that to prove \eqref{tt2} it suffices to show that
the characteristic polynomial of this identity
is divisible by the minimal polynomial for the Fibonacci numbers,
$r(X)= X^2-X-1.$
The flow of logic is concisely presented in Table \ref{Tpolynomial}.
\begin{center}
\begin{table}[H]
\begin{tiny}
\begin{tabular}{||p{.15\linewidth} | p{.35\linewidth} || p{.30\linewidth} | p{.20\linewidth}||}
\hline \hline Row number & Item & Recursive-Identity Formulation & Characteristic-Polynomial Formulation \\
\hline
1 & Fibonacci Numbers, & $F_n=F_{n-1}+F_{n-2}$ & $r(X)=X^2 - X - 1$ \\
2 & Even-indexed Fibonacci numbers & $F_n = 3F_{n-2} -F_{n-4}$ & $p(X)=X^4 -3X^2 +1$ \\
\hline
3 & The Row-2 recursion is satisfied by the Fibonacci numbers & &
$p(X)$ is divisible by $r(X)$ \; \\
\hline \hline
\end{tabular}
\caption{ Polynomial formulation of Theorem. }
\label{Tpolynomial}
\end{tiny}
\end{table}
\end{center}
To prove that $p(X)$ is divisible by $r(X)$
it suffices to show that the quotient $p(X)/r(X)=q(X)$
lies in $\Z[x]$ that is, has integer coefficients.
For the case of general $k,$
first, we define $p_k(X), k \ge 2,$ as follows.
\begin{equation}\label{pk}
p_k(X) = X^k - \sum_{i=1}^k P_{k,i} X^{k-i}.
\end{equation}
Then the characteristic polynomial of \eqref{t1} is $p_k(X^k).$
$p_k(X)$ has descending powers of $X$ while $p_k(X^k)$
has powers which descend by multiples of $k$ as required.
By the discussion above,
to prove \eqref{t1} it suffices to prove that
the \emph{corresponding} characteristic polynomial
$p_k(X^k)$ is divisible by the minimal polynomial of $F^{(k)},
$ $r_k(X).$ Alternatively, we must show
that $\frac{p_k(X^k)}{r_k(X)}$ lies in $\Z[x].$
We therefore proceed as follows.
\begin{proposition} Define rational functions, $q_k(x), k \ge 2$ by
\begin{equation}\label{qk}
p_k(X^k) = r_k(X) q_k(X).
\end{equation}
Then to prove \eqref{t1}, it suffices to prove that $q_k(X) \in \Z[X].$
\end{proposition}
Actually, in this paper, we prove the equivalent equation,
\begin{equation}\label{qkn}
-p_k(X^k) = (-r_k(X)) q_k(X).
\end{equation}
This is purely a convenience to avoid excessive minus signs in tables and equations.
To summarize, we will prove \eqref{qkn} which in turn implies
\eqref{qk} which in turn shows $\frac{p_k(X^k)}{r_k(X)}$ lies in $\Z[x],$
or equivalently that $p_k(X^k)$ is divisible by
$r_k(X).$ By Proposition 2.2 this implies that
\eqref{t1}, the identity corresponding to the characteristic polynomial $p_k(X^k),$
is satisfied by $F^{(k)}$ the recursive sequence corresponding
to the minimal polynomial $r_k(X).$ In other words, proving
\eqref{qkn} suffices to prove Theorem 1.3.
We close this section explaining where the \emph{work} for the proof lies.
We must show \emph{for each $k$} that $q_k(X)$ has integral coefficients.
What we actually do, is inductively describe the coefficients of $q_k(X)$
and then show that
$q_k(X)(-r_k(X))=-p_k(X^k).$
\section{The Coefficients of $q_k(X).$}
To describe the coefficients
of $q_k(x)$ we first define a matrix $Q,$ presented in Table \ref{TQ}, which
is obtained by applying the backward difference operator to $P.$
\begin{definition} The triangle $Q$ is defined by
\begin{equation}\label{Q}
Q_{i,j} = P_{i,j}-P_{i-1,j}.
\end{equation}
\end{definition}
\begin{center}
\begin{table}[H]
\begin{tabular}{||c|c c c c c c c||}
\hline \hline
$\text{Row number-Column Number}$ & 0 & 1 & 2 & 3 & 4 & 5 & 6 \\
\hline
0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\
1 & 0 & 1 & 0 & 0 & 0 & 0 & 0 \\
2 & 0 & 2 & -1& 0 & 0 & 0 & 0 \\
3 & 0 & 4 & -4& 1 & 0 & 0 & 0 \\
4 & 0 & 8 & -12&6 &-1 & 0 & 0 \\
5 & 0 & 16& -32 &24&-8 & 1& 0 \\
6 & 0 & 32&-80&80&-40&10& -1 \\
\hline \hline
\end{tabular}
\caption{ The recursive triangle $Q$ defined by Definition \eqref{Q}. }
\label{TQ}
\end{table}
\end{center}
In the proof of Theorem 1.3, besides using \eqref{Q}, we will need
the following two easily proven identities. These three identities allow
us to convert sums in $Q$-elements into $P$-elements.
\begin{subequations}\label{Q2P}
\begin{align}
\; & \sum_{r=c}^t Q_{r,c} = P_{t,c}, &\text{by telescoping and \eqref{Q}},\\
\; & \sum_{r=s}^t Q_{r,c}= P_{t,c} - P_{s-1,c}.
&\text{ by the equation just stated.}
\end{align}
\end{subequations}
Using \eqref{Q} we can now completely describe
the polynomial $q_k(x),$ $k \ge 2.$
\begin{equation}\label{qq}
q_k(x) = x^{k(k-1)} +
\displaystyle \sum_{j=0}^{k-2} x^{kj}
\Biggl(-P_{k-1,k-1-j} +
\displaystyle \sum_{i=k-1-j}^{k-1} Q_{i,k-1-j} x^{k-i} \Biggr).
\end{equation}
As explained in the last section, to prove \eqref{t1} it suffices to show
\eqref{qkn} is true which is what we will spend the rest of the paper doing.
\section{Some Literature}
Before continuing the proof, we take note of certain related items
appearing in the literature.
\cite[A193845]{OEIS} presents a triangle similar to $P$
with only positive entries. This triangle can be generated by power series,
polynomials, or
using fission and fusion \cite{Kimberling}.
It is easy to "fix" this OEIS triangle
so that it agrees with $P$ in sign.
For example, M. F. Hasler in the last comment of the \emph{comment} section
of sequence \cite[A193845]{OEIS},
dated Oct. 15, 2014,
notes that the $k$-th row of A193845 lists the coefficients of the polynomial
$\sum_{i=0}^k (X+2)^i,$ in order of increasing powers.
To modify this for the $P$ triangle in Table \ref{TP},
which has negative entries, we first replace $X+2$ with $2-X.$
An example, for $k=3,$ will illustrate the further
required polynomial manipulations.
We can verify that
$(2-X)^3 - (2-X)^2-(2-X)-(2-X)^0 = -X^3+5X^2-7X+1$ which is almost what we want except
that the signs and exponents have to be adjusted.
First, by \eqref{rk} we can re-write this as
$r_3(2-X) = (2-X)^3 - (2-X)^2-(2-X)-(2-X)^0 =-X^3+5X^2-7X+1.$
To fix up the sign, we
can, by \eqref{pk}, write $X^3 r_3(2-\frac{1}{X}) =
-1+ 5X-7X^2+X^3 = p_3(X).$
We can similarly write for arbitrary $k,$
$X^{k^2} r_k(2-\frac{1}{X^k}) = p_k(X^k).$
This gives an alternate definition of triangle $P$ from which the recursion
\eqref{2minus1} can
be derived. Expositionally, since all we need is the underlying recursion,
it is simpler to
directly define triangle $P$ by \eqref{2minus1}.
Similar observations can be made about triangle $Q$ in Table \ref{TQ}.
A triangle similar to $Q$ with only positive entries
is found in \cite[A038207]{OEIS}. N-E. Fahssi, in the \emph{comment} section
of this sequence (with comment date, Apr 13 2008),
points out that the $k$-th row of A038207
are the coefficients $(2+X)^k$.
We can adjust this idea to triangle $Q$
which has negative entries. The coefficients of $X(2-X)^k$ give
the coefficients in the $k$-th row of triangle $Q.$
For example, when $k=2,$ $X(2-X)^2 =4X-4X^2+X^3$
corresponding to row 3 in
Table \ref{TQ}.
These alternate definitions might provide an
alternate proof of \eqref{t1} using polylnomials.
A challenge in proving \eqref{qkn} by polynomials or some similar
method such as fusion and fission is that, as seen in \eqref{qq}, the
coefficients of $q_k(X)$ are mixtures of $Q$ and $P$ triangle entries.
The proof presented in this paper is both straightforward and computational, and should
have independent interest.
We therefore
leave the search for a purely polynomial proof of \eqref{qkn} as an open problem.
\section{ The matrix $M$}
We prove \eqref{qkn} computationally by performing the product long hand. To keep tabs on
calculations we store the information in a matrix $M=M_k.$ Throughout the proof,
Tables \ref{TrqQP14}-\ref{Trqnumber25} presenting $M_5$ facilitate following arguments.
The matrix $M,$ as illustrated in Tables \ref{TrqQP14} and \ref{TrqQP25} for the
case $k=5,$
labels columns with $X$ raised to a power. In the sequel we
will interchangeably refer to the \emph{column with header $X^k$}
as column $X^k$ or column $k.$
The rows of $M$ are labeled with the summands in $-r_k(X),$ \eqref{rk}. Similar,
to the way we refer to columns, in the sequel we will refer, for example, to the
row with header $-X^k$ as either row $k$ or row $X^k$ (leaving out the sign).
This should cause no confusion.
Using this terminology, we define $M$ as follows:
\begin{small}
\begin{subequations}\label{M}
\begin{align}
\; & M_{r,c}&= \text{coefficient of $X^c$ in $X^r q_k(X)$}, & 0 \le r \le k-1\\
\; & \; &= \text{coefficient of $X^{c-r}$ in $q_k(X)$}, & c \ge r, r \neq k\\
\; & M_{k,c}&= \text{coefficient of $X^c$ in $-X^k q_k(X)$}, &\; \\
\; & \; &= \text{coefficient of $X^{c-k}$ in $-q_k(X)$}, & c \ge k
\end{align}
\end{subequations}
\end{small}
For $k=5,$
Tables \ref{TrqQP14} and \ref{TrqQP25} present all non-leading
coefficients of $q_k(X)$
using $Q$ and $P$ with subscripts, while Tables \ref{Trqnumber14} and \ref{Trqnumber25}
present the
associated numerical values. The leading coefficient for the $X^{20}$ column
is simply 1 in both Tables \ref{TrqQP25} and \ref{Trqnumber25}. Tables \ref{TrqQP14}-\ref{Trqnumber25} have a terminal
\emph{sum} row indicating in each column the sum of the entries
above it in that column. The top \emph{case}
row is explained in the next section.
\begin{center}
\begin{table}[H]
\begin{tiny}
{\renewcommand{\arraystretch}{1.3}
\begin{tabular}{|||c||c|c|c|c|c||c|c|c|c|c||c|c|c|c|c||}
\hline Case& A&B&B&B&B&C&E&B&B&B&C&E&E&B&B \\
\hline$r-c$&$X^{0}$&$X^{1}$&$X^{2}$&$X^{3}$&$X^{4}$&$X^{5}$&$X^{6}$&$X^{7}$&$X^{8}$&$X^{9}$&$X^{10}$&$X^{11}$&$X^{12}$&$X^{13}$&$X^{14}$\\
\hline$X^0$&$-P_{4,4} $&$Q_{4,4}$&\;&\;&\;&$-P_{4,3} $&$Q_{4,3}$&$Q_{3,3}$&\;&\;&$-P_{4,2} $&$Q_{4,2}$&$Q_{3,2}$&$Q_{2,2}$&$$\\
\hline$X^1$&$ $&$-P_{4,4} $&$Q_{4,4}$&$ $&$ $&$ $&$-P_{4,3} $&$Q_{4,3}$&$Q_{3,3}$&$ $&$ $&$-P_{4,2} $&$Q_{4,2}$&$Q_{3,2}$&$Q_{2,2}$\\
\hline$X^2$&$ $&\;&$-P_{4,4} $&$Q_{4,4}$&$ $&$ $&$ $&$-P_{4,3} $&$Q_{4,3}$&$Q_{3,3}$&$ $&$ $&$-P_{4,2} $&$Q_{4,2}$&$Q_{3,2}$\\
\hline$X^3$&\;&\;&\;&$-P_{4,4} $&$Q_{4,4}$&$ $&$ $&$ $&$-P_{4,3} $&$Q_{4,3}$&$Q_{3,3}$&$ $&$ $&$-P_{4,2} $&$Q_{4,2}$\\
\hline$X^4$&\;&\;&\;&\;&$-P_{4,4} $&$Q_{4,4}$&$ $&$ $&$ $&$-P_{4,3} $&$Q_{4,3}$&$Q_{3,3}$&$ $&$ $&$-P_{4,2} $\\
\hline$-X^5$&\;&\;&\;&\;&$ $&$P_{4,4}$&$-Q_{4,4}$&\;&\;&\;&$P_{4,3}$&$-Q_{4,3}$&$-Q_{3,3}$&\;&$$\\
\hline$SUM$&$P_{5,5}$&\;&\;&\;&\;&$P_{5,4}$&\;&\;&\;&\;&$P_{5,3}$&\;&\;&\;&$$\\
\hline \hline \hline
\end{tabular}}
\end{tiny}
\caption{Coefficients of of $-r_5(X) \times q_5(X)$ using $Q,P,$ columns 0-14. }
\label{TrqQP14}
\end{table}
\end{center}
\begin{center}
\begin{table}[H]
\begin{tiny}
{\renewcommand{\arraystretch}{1.4}
\begin{tabular}{|||c||c|c|c|c|c||c|c|c|c|c||c|c|c|c|c||}
\hline \hline \hline
\hline Case&C&E&E&E&B&D&D&D&D&D&A\\
\hline$row - col$&$X^{15}$&$X^{16}$&$X^{17}$&$X^{18}$&$X^{19}$&$X^{20}$&$X^{21}$&$X^{22}$&$X^{23}$&$X^{24}$&$X^{25}$\\
\hline$X^0$&$-P_{4,1} $&$Q_{4,1}$&$Q_{3,1}$&$Q_{2,1}$&$Q_{1,1}$&$1$&\;&\;&\;&\;&$$\\
\hline$X^1$&$ $&$-P_{4,1} $&$Q_{4,1}$&$Q_{3,1}$&$Q_{2,1}$&$Q_{1,1}$&$1$&$ $&$ $&$ $&$ $\\
\hline$X^2$&$Q_{2,2}$&$ $&$-P_{4,1} $&$Q_{4,1}$&$Q_{3,1}$&$Q_{2,1}$&$Q_{1,1}$&$1$&$ $&$ $&$ $\\
\hline$X^3$&$Q_{3,2}$&$Q_{2,2}$&$ $&$-P_{4,1} $&$Q_{4,1}$&$Q_{3,1}$&$Q_{2,1}$&$Q_{1,1}$&$1$&$ $&$ $\\
\hline$X^4$&$Q_{4,2}$&$Q_{3,2}$&$Q_{2,2}$&$ $&$-P_{4,1} $&$Q_{4,1}$&$Q_{3,1}$&$Q_{2,1}$&$Q_{1,1}$&$1$&$ $\\
\hline$-X^5$&$P_{4,2}$&$-Q_{4,2}$&$-Q_{3,2}$&$-Q_{2,2}$&\;&$P_{4,1}$&$-Q_{4,1}$&$-Q_{3,1}$&$-Q_{2,1}$&$-Q_{1,1}$&$-1$\\
\hline$SUM$&$P_{5,2}$&\;&\;&\;&\;&$P_{5,1}$&\;&\;&\;&\;&$-1$\\
\hline \hline \hline
\end{tabular}}
\end{tiny}
\caption{ Coefficients of $-r_5(X) \times q_5(X)$ using $Q,P,$ columns 15-25. }
\label{TrqQP25}
\end{table}
\end{center}
\begin{center}
\begin{table}[H]
\begin{tiny}
{\renewcommand{\arraystretch}{1.4}
\begin{tabular}{|||c||c|c|c|c|c||c|c|c|c|c||c|c|c|c|c||}
\hline \hline
\hline$row - col$&$X^{0}$&$X^{1}$&$X^{2}$&$X^{3}$&$X^{4}$&$X^{5}$&$X^{6}$&$X^{7}$&$X^{8}$&$X^{9}$&$X^{10}$&$X^{11}$&$X^{12}$&$X^{13}$&$X^{14}$\\
\hline$X^0$&$1$&$-1$&\;&\;&\;&$-7$&$6$&$1$&\;&\;&$17$&$-12$&$-4$&$-1$&$$\\
\hline$X^1$&$ $&$1$&$-1$&\;&\;&\;&$-7$&$6$&$1$&$\;$&$\;$&$17$&$-12$&$-4$&$-1$\\
\hline$X^2$&\;&\;&$1$&$-1$&\;&\;&\;&$-7$&$6$&$1$&\;&\;&$17$&$-12$&$-4$\\
\hline$X^3$&\;&\;&\;&$1$&$-1$&\;&\;&\;&$-7$&$6$&$1$&\;&\;&$17$&$-12$\\
\hline$X^4$&\;&\;&\;&\;&$1$&$-1$&\;&\;&\;&$-7$&$6$&$1$&\;&\;&$17$\\
\hline$-X^5$&\;&\;&\;&\;&\;&$-1$&$1$&\;&\;&\;&$7$&$-6$&$-1$&\;&$$\\
\hline$SUM$&$1$&\;&\;&\;&\;&$-9$&\;&\;&\;&\;&$31$&\;&\;&\;&$$\\
\hline \hline \hline
\end{tabular}}
\end{tiny}
\caption{Numerical coefficients of $-r_5(X) \times q_5(X),$ columns 0-14. }
\label{Trqnumber14}
\end{table}
\end{center}
\begin{center}
\begin{table}[H]
\begin{tiny}
{\renewcommand{\arraystretch}{1.4}
\begin{tabular}{|||c||c|c|c|c|c||c|c|c|c|c||c|c|c|c|c||}
\hline \hline \hline
\hline$row - col$&$X^{15}$&$X^{16}$&$X^{17}$&$X^{18}$&$X^{19}$&$X^{20}$&$X^{21}$&$X^{22}$&$X^{23}$&$X^{24}$&$X^{25}$\\
\hline$X^0$&$-15$&$8$&$4$&$2$&$1$&$1$&\;&\;&\;&\;&$$\\
\hline$X^1$&$ $&$-15$&$8$&$4$&$2$&$1$&$1$&\;&\;&\;&$$\\
\hline$X^2$&$-1$&$ $&$-15$&$8$&$4$&$2$&$1$&$1$&\;&\;&$$\\
\hline$X^3$&$-4$&$-1$&$ $&$-15$&$8$&$4$&$2$&$1$&$1$&\;&$$\\
\hline$X^4$&$-12$&$-4$&$-1$&$ $&$-15$&$8$&$4$&$2$&$1$&$1$&$$\\
\hline$-X^5$&$-17$&$12$&$4$&$1$&$ $&$15$&$-8$&$-4$&$-2$&$-1$&$-1$\\
\hline$SUM$&$-49$&\;&\;&\;&\;&$31$&\;&\;&\;&\;&$-1$\\
\hline \hline \hline
\end{tabular}}
\end{tiny}
\caption{ Numerical coefficients of $-r_5(X) \times q_5(X),$ columns 15-25. }
\label{Trqnumber25}
\end{table}
\end{center}
As can be seen from the $X^0$ row of Tables \ref{Trqnumber14}-\ref{Trqnumber25},
\begin{multline}\label{qk5}
q_5(X) = X^{20} + \biggl( X^{19}
+2X^{18}+4X^{17}
+8X^{16} -15 X^{15} \biggr) \\
+ \biggl( -X^{13} -4 X^{12} -12 X^{11} + 17 X^{10}\biggr)
+ \biggl( X^7 + 6X^6- 7X^5 \biggr) + \biggl(-X+1\biggr).
\end{multline}
Inspecting the expression
inside the summation sign of \eqref{qq}, for any $j, 0 \le j \le k-2,$
\begin{equation}\label{expression}
X^{kj}
\Biggl(-P_{k-1,k-1-j} +
\displaystyle \sum_{i=k-1-j}^{k-1} Q_{i,k-1-j} X^{k-i} \Biggr),
\end{equation}
we note certain patterns in each such block.
More specifically, the $j$-th block (from left to right) starts with a
$P$ term, followed by $Q$ terms, followed by 0 terms.
In \eqref{qk5}, the $j$-th block, $0 \le k \le 3,$
is indicated by the use of bigger parentheses.
Formally, for each $j, 0 \le j \le k-2,$
\begin{itemize}
\item $M_{0,jk}=-P_{k-1,k-1-j},$
\item $M_{0,jk+m}=Q_{k-m,k-1-j},$ for $1 \le m \le j+1,$
\item $M_{0,jk+m}=0,$ for $j+2 \le m \le k-1.$
\end{itemize}
Additionally, geometrically, each successive row after the first row shifts the row above
it by one column to the right as seen in Tables \ref{TrqQP14} and \ref{TrqQP25}
(with the last row having negative signs).
This shifting is formally
justified by \eqref{M}. In the sequel we will simply refer
to \eqref{M} for justifications, it being understood that \eqref{M} is geometrically
clarified by these bullets.
\section{Overview of Proof}
To prove \eqref{qkn} using the matrix $M,$ we must show
that for each column of $M,$ the sum of coefficients in rows 0 through k
equals the corresponding coefficient in $-p_k(X^k),$ found in the bottom \emph{sum} row.
That is, we must show
\begin{subequations}\label{SumMrc}
\begin{align}
\; & \sum_r M_{r,jk} &= P_{k,j}, &\qquad & 0 \le j \le k, \\
\; & \sum_r M_{r,jk+m} &= 0, & \qquad & 0 \le j \le k-1, 1 \le m \le k-1.
\end{align}
\end{subequations}
Thus to prove \eqref{qkn} we must prove \eqref{SumMrc}. We prove \eqref{SumMrc}
separately on the following five groups of columns. The proof of \eqref{SumMrc}
for each group of columns will occupy one of the next five sections.
\begin{enumerate}[label=\Alph*.]
\item Columns $k^2$ and 0.
\item Columns $jk+m, 0 \le j \le k-2, j+1 \le m \le k-1 $
\item Columns $jk, 1 \le j \le k-2 $
\item Columns $jk+m, j=k-1, 0 \le m \le k-1$
\item Columns $jk+m,$ for
\begin{equation}\label{jkm}
0 \le j \le k-2, 1 \le m \le j
\end{equation}
\end{enumerate}
For the reader's convenience, the letters denoting cases are
included in Tables \ref{TrqQP14}-\ref{TrqQP25}.
As shown, these five cases are mutually exclusive and
exhaust all columns.
Throughout the proof of these five cases,
presented in the next five sections,
we i) review
Tables \ref{TrqQP14} and \ref{TrqQP25} in order
to discover patterns, and, using \eqref{M}, ii) state the
pattern discovered for $k=5,$ for general $k.$
\section{Proof of \eqref{SumMrc} for Case A, Columns 0 and $k^2$}
By \eqref{2minus1} and the initial conditions for triangle $P$
presented in Table \ref{TP}, we have for $k \ge 1,$
\begin{equation*}
-P_{k-1,k-1} = P_{k,k}.
\end{equation*}
It follows that for column $0$ the \emph{sum} row
equals the sum of entries above it, verifying \eqref{SumMrc}
for column $X^{0}.$ For the column $X^{k^2},$ \eqref{SumMrc} reduces
to verification that $-X^k \times X^{k(k-1)} = -X^{k^2}.$
\section{Proof of \eqref{SumMrc} for Case B, columns $jk+m,
0 \le j \le k-2, j+1 \le m \le k-1 $}
For the case $k=5,$
Table \ref{TrqQP14} shows that
the three elements of block 1 at columns 5,6, and 7 of row $X^0,$
diagonally descend so that these three elements comprise the entries in columns 7,8 and 9.
Similarly, the four elements in block 2 at columns 10,11,12,and 13 in row $X^0$
diagonally descend so that these four elements comprise the entries in columns 13 and 14.
This pattern is true for general $k.$ By \eqref{M},
for the $j$-th block, $1 \le j \le k-2,$
the set of column elements for columns
$jk+m, 0 \le j \le k-2, j+1 \le m \le k-1 $ is equal to the
set of entries in the 0-th row of that block.
Hence, for $0 \le j \le k-2, j+1 \le m \le k-1,$
\begin{equation*}
\left.
\begin{aligned}
\;& \text{\; the sum of entries in the $jk+m$-th column,} & \; \\
&=\sum_{r=0}^{k} M_{r,jk+m} & \; \\
&=-P_{k-1,k-1-j} + \sum_{r=k-1-j}^{k-1} Q_{r,k-1-j} =0, & \text{by \eqref{Q2P}(a)}.
\end{aligned}
\right\}
\end{equation*}
Notice that by \eqref{2minus1}, \eqref{Q}, and the initial conditions, row 0 and column 0
of Table \ref{TP}, $Q_{r,c} = 0$ if $r<c.$ These 0 entries correspond to blank cells
in Tables \ref{TrqQP14}-\ref{Trqnumber25}.
\section{Proof of \eqref{SumMrc} for Case C, columns $jk, 1 \le j \le k-2 $ }
Table \ref{TrqQP14} shows that the three elements in the
0-th row of block 1 at columns 5,6, and 7
diagonally descend to column 10, the beginning column of the 2nd block, except that
i) the $-P$ term from
column 5, now has a positive sign and ii) column 10
has an additional $-P$ term in row $X^0.$
By \eqref{M}, for general $k,$ column $jk, 1 \le j \le k-2,$
has i) all $Q$ terms
from the 0-th row of the $(j-1)$-st block, ii) a $P$
term from column $(j-1)k$ with a positive sign, and
iii) the $P$ term in row 0, column $jk.$
Hence,
\begin{equation*}
\left.
\begin{aligned}
\; &\text{The sum of elements in column $kj, \text{ for } 1 \le j \le k-2,$} & \; & \; \\
\;&=P_{k-1,k-j}+ \sum_{r=k-j}^{k-1} Q_{r,k-j} - P_{k-1,k-j-1} \\
\;&=2 P_{k-1,k-j} - P_{k-1,k-j-1}, & \qquad \text{by \eqref{Q2P}(a)}, \\
\;& = P_{k,k-j}. &\; \text{by \eqref{2minus1}.}
\end{aligned}
\right\}
\end{equation*}
\section{Proof of \eqref{SumMrc} for Case D, columns $jk+m, j=k-1, 0 \le m \le k-1$}
For the case $k=5$, Table \ref{Trqnumber25} motivates proving
\eqref{SumMrc} using well-known identities about powers of 2.
For general $k,$ by \eqref{2minus1}, \eqref{Q}, and by the initial conditions
presented in Tables \ref{TP} and \ref{TQ}, a straightforward inductive argument shows that
\begin{equation*}
P_{n,1} = 2^n-1, \qquad Q_{n,1} = 2^{n-1}, \qquad n \ge 1.
\end{equation*}
By inspection of Table \ref{TrqQP25} for the case $k=5,$ and by \eqref{M},
for general $k,$ we see that column $jk+m, 0 \le m \le k-1$
has a 1 entry and elements $Q_{1,1},\dotsc, Q_{k-1-m,1}.$
There are now two cases to consider according to the value of $m.$
\textbf{Case $m=0.$} If $m=0$ column $jk+m$ also has entry
$P_{k-1,1}.$ Hence, the following proves
\eqref{SumMrc} for column $jk+m, m = 0$ in the $(k-1)$-st block.
\begin{equation*}
\sum_{r=0}^k M_{r,k(k-1)} =
1 + \sum_{r=1}^{k-1} Q_{r,1} + P_{k-1,1} =
1 + \sum_{r=1}^{k-1} 2^{r-1} + (2^{k-1}-1) =
P_{k,1}.
\end{equation*}
\textbf{Case $m=1.$} If $m \neq 0,$ column $jk+m$ also has entry $-Q_{k-m,1}.$
Hence, the following proves
\eqref{SumMrc} for column $jk+m, m \neq 0$ in the $(k-1)$-st block.
\begin{equation*}
\sum_{\substack{r=0\\m \neq 0}}^k M_{r,k(k-1)+m} =
1 + \sum_{r=1}^{k-1-m} Q_{r,1} - Q_{k-m,1} =
1 + \sum_{r=1}^{k-1-m} 2^{r-1} - 2^{k-m-1} =
0.
\end{equation*}
\section{Proof of \eqref{SumMrc} for Case E, \eqref{jkm}, \
columns $jk+m,$ for $0 \le j \le k-2, 1 \le m \le j$ }
For each column in Case E whose sum we are trying to show equal to 0,
we will first show that the column entries naturally divide into 4 groups
(with some groups empty). The proof is then completed by
showing that the sum of the four group-sums equals 0.
\textbf{1st group:}
As can be motivated by Tables \ref{TrqQP14} and \ref{TrqQP25},
and as justified for general $k$
by \eqref{M},
all columns satisfying \eqref{jkm} have a $-P$ term
which descends
diagonally from the column in that block divisible by $k.$
For example, column 6 has a $-P_{4,3}$ term which diagonally descends from column 5;
columns 11 and 12 have a $-P_{4,2}$ term which diagonally descends from column 10; and columns
16,17,18 each have a $-P_{4,1}$ term which diagonally descends from column 15.
Thus, for general $k,$
this first group of the elements in a column satisfying \eqref{jkm}, is
defined as the singleton $P$ term that diagonally descends from
the column of that block divisible by $k.$
\begin{equation}\label{case1}
\text{ Sum of the singleton element in 1st Group} = -P_{k-1,k-1-j}.
\end{equation}
\textbf{2nd group:}
In the $X^5$ row of Tables \ref{TrqQP14} and \ref{TrqQP25},
any column satisfying \eqref{jkm} has
a negative $Q$ terms that descends from
column $(j-1)k$ in the $(j-1)$-st block. When $j=0,$ this group is vacuously
empty; for $j=1,$ column 6 has an entry $-Q_{4,4},$
which diagonally descends from column 5;
for $j=2,$ columns 11 and 12 have entries of $-Q_{4,3}, -Q_{3,3}$ respectively,
which diagonally descend from column 10;
and for $j=3,$ columns 16, 17, 18 have entries $-Q_{4,2}, -Q_{3,2}, -Q_{2,2}$ respectively,
which diagonally descend from column 15.
By \eqref{M}, for general $k,$ this second group of elements in a column
satisfying \eqref{jkm}, is defined as the negative $Q$ term that diagonally
descends from column $(j-1)k$ in the $(j-1)$-st block. By \eqref{Q},
for each $m$ and $j$ satisfying \eqref{jkm},
the sum of the singleton element in this group is the following.
\begin{equation}\label{case2}
- Q_{k-m,k-j} = - \biggl(P_{k-m,k-j} - P_{k-m-1,k-j} \biggr).
\end{equation}
\textbf{3rd group:} For each $m$ satisfying \eqref{jkm},
we define this third group, as
the $Q$ entries in row 0 of the $j$-th block
diagonally descending to column $jk+m$ (this includes the $j$-th block entry
already in that column in row 0).
For example, Tables \ref{TrqQP14} and \ref{TrqQP25} show
that column 6 has a singleton $Q_{4,3};$ column
11 has a singleton $Q_{4,2},$ and column 12 has $Q_{3,2}, Q_{4,2};$
column 16 has a singleton $Q_{4,1},$ column 17 has $Q_{3,1}, Q_{4,1}$
and column 18 has $Q_{2,1}, Q_{3,1}, Q_{4,1}.$
Using \eqref{M}, for general $k,$
the set of $Q$ entries in row 0 of the $j$-th block
diagonally descending to column $jk+m, 0 \le m \le j$
equals $\{Q_{k-m,k-j-1},\dotsc, Q_{k-1,k-j-1}\}.$
By \eqref{Q2P}(b), the sum of elements in this group is as follows:
\begin{equation}\label{case3}
\displaystyle \sum_{r=k-m}^{k-1} Q_{r,k-j-1} = P_{k-1,k-j-1} -P_{k-m-1,k-j-1}.
\end{equation}
\textbf{4th group:} For each fixed $j,k,m$ satisfying \eqref{jkm}, we define
this fourth group to consist of the $Q$ entries diagonally descending
from row 0 in the $j-1$-st block.
This last group requires more care to address
since for some columns the group is empty.
For example, Column 16 in Table \ref{TrqQP25} has $Q_{2,2}$ and $Q_{3,2}$ while
column 17 has singleton $Q_{2,2}.$ Column 18 has no
entries for this group; but we can alternatively describe this empty group
as all $Q$s between $Q_{2,2}$ and $Q_{1,2}$
which would result in no $Q$s since there are no integers between 2 and 1.
For general $k,$ by\eqref{M}, this group consists of the
following (possibly) empty set of elements: $\{Q_{k-j,k-j}, \dotsc, Q_{k-1-m,k-j}\}$
where we follow the usual convention that the set is empty if
$k-1-m < k-j.$
Hence, by \eqref{Q2P}(a),
the sum of the entries in this fourth group is the following.
\begin{equation}\label{case4}
\displaystyle \sum_{r=k-j}^{k-1-m} Q_{r,k-j} = P_{k-m-1,k-j}.
\end{equation}
It is straightforward to check for Tables \ref{TrqQP14} and
\ref{TrqQP25} that the sum is vacuous for
$k=5$ at columns 6 and 18 and that the $P$ value on the right hand side of
\eqref{case4} is also 0 as required.
To complete the proof for this case (E),
we note that for any column $jk+m,$ satisfying \eqref{jkm},
i) the four groups enumerated above are mutually exclusive,
ii) each entry in column $jk+m$ is in some group, and
iii) by \eqref{2minus1} the sum of
the right-hand sides of \eqref{case1}-\eqref{case4} is 0.
This completes the proof for case E.
\section{Completion of Proof of Theorem 1.3}
To see that the proof of Theorem 1.3 is complete we again review the flow of logic.
\begin{itemize}
\item The last five sections have proven \eqref{SumMrc}, which for Tables
\ref{TrqQP14} and \ref{TrqQP25} state that the \emph{sum} row of $M$ contains
the sum of all column entries above it, with the column entries being obtained by
the multiplication of $q_5(X),$ the top row, by $-r_5(X)$ the left-most column.
\item Equation \eqref{SumMrc} in turn proves \eqref{qkn},
$-p_k(X^k) = -r_k(X) \times q_k(X).$ The long-hand multiplication
is illustrated for the case $k=5$ in Tables \ref{TrqQP14}-\ref{TrqQP25}.
\item Equation \eqref{qkn} is equivalent to \eqref{qk}, $p_k(X^k) = r_k(X)q_k(X)$
\item Equation \eqref{qk} directly implies that $r_k(X),$ the characteristic polynomial
for $\{F^{(k)}_{n}\}_{\text{all $n$}},$
divides $p_k(X^k),$ the characteristic polynomial for
$\{F^{(k)}_{kn}\}_{\text{all $n$}}.$
\item Hence by either Table \ref{Tpolynomial} or Proposition 1.4,
which creates a \emph{dictionary} between polynomial identities and recursions,
$F_n = \sum_{i=1}^k P_{k,i} F_{n-ki},$ the identity associated with the polynomial
$p_k(X^k),$ is satisfied by the sequence $\{F^{(k)}_{n}\}_{\text{all $n$}}.$
\item This last bullet is the statement of Theorem 1.3, which is therefore proven.
\end{itemize}
\section{Conclusion}
In this paper, we have proven a family of identities for the family of
recursive sequences $F^{(k)}, k=2,3,\dotsc$
restricted to a fix modulus modulo $k.$ This paper has provided a
proof-method tool which exploits the divisibility
properties of characteristic polynomials and was facilitated by a matrix $M$
showing the long-hand multiplication. We believe this tool may prove
useful for proving families of identities in other infinite families of recursions.
A typical application of the methods of this paper could involve starting with
some second order recursion such as the Pell, Pell-Lucas, or Jacobstahl sequence,
generalizing this sequence to a family of recursive sequences similar to the
$F^{(k)},k=2,3,\dotsc,$ and uniformly proving identities satisfied by the subsequences
whose indices are divisible by $k.$
|
\section{Introduction}
\IEEEPARstart{W}{ith} the growth of global population and urbanization, the frequency of crowd gathering consistently rises in recent years. In some scenarios, stampedes and crushes can be life threatening and should always be prevented.
In recent years, with the widespread use of intelligent monitoring~\cite{liu2017provid, wang2017joint, wang2018background} in public areas such as congested squares, stations and markets, it becomes possible to adopt these techniques to manage, control and prevent crowd gathering in cities.
Among various congested scene content analysis techniques, crowd counting~\cite{zhang2016single, sam2017switching, sindagi2017generating, zhang2018sacnn, shen2018crowd}, which aims to estimate the count of the pedestrians in a scene, is one of the fundamental tasks and has drawn considerable research attention.
Accurate counting in a single image remains a challenging topic due to the complex distribution of people, non-uniform illumination, inter- and intra-scene scale variations, cluttering and occlusions, \textit{etc}.
In the past decades, many methods have been proposed, which can be roughly categorised into detection-based~\cite{viola2004robust, dalal2005histograms, wu2005detection, wang2011automatic}, regression-based~\cite{davies1995crowd, he1990texture, lowe1999object, wang2015deep, idrees2013multi,ryan2009crowd, chan2008privacy, chan2009bayesian, chen2012feature, marana1998efficacy, idrees2013multi}, and deep learning-based approaches~\cite{zhang2016single, sam2017switching, sindagi2017generating, zhang2018sacnn, shen2018crowd, sindagi2017generating, zhang2015cross, huang2018body, liu2018leveraging, liu2018decidenet, liu2018crowd, ranjan2018iterative, shi2019revisiting}.
With powerful representation ability of modern convolutional neural networks (CNNs), deep learning-based methods become dominant and have achieved superior performances in terms of accuracy and robustness.
Although significant progress has been achieved in the past decade by using deep models, the dramatic intra-scene scale variations of people due to the perspective effect is still a big problem, limiting the improvement of counting accuracy.
To address this issue, existing methods~\cite{zhang2016single, sam2017switching,sindagi2017generating, zhang2018sacnn,shen2018crowd} usually adopt multi-scale or multi-column architectures to aggregate the features from different scales.
However, such schemes usually suffer from several limitations.
Firstly, the multi-column architecture~\cite{zhang2016single} inevitably introduces redundant parameters, huge computation burden and difficulty in optimization.
For example, as shown in~\cite{li2018csrnet}, such methods cannot even compete with a deeper CNN due to the high correlation of the features learned by different
columns.
Secondly, they only consider discrete scales,
which is limited when addressing continuous scale variations in practical scenarios.
Recently, a single-column network architecture termed CSRNet~\cite{li2018csrnet} has been proposed to deal with crowd counting problem.
By applying dilated convolutions, this method achieves state-of-the-art performance.
However, it still delivers fixed receptive field for different scales
of people, thereby remaining vulnerable to the highly variant intra-scene scales.
As illustrates in Fig.~\ref{fig:show_shb}~(b), this method performs well at intermediate scales, but reveals its incapability for small or large scales of pedestrian heads, indicating its limitation in dealing with scale variations.
Based on the above observation, we argue it is difficult to implicitly model large scale continuous variations by only using normal components in a multi- or single-column architectures.
Thus we take a step forward to explicitly tackle the scale variations.
\begin{figure}[!t]
\centering
\includegraphics[width=0.48\textwidth]{./fig/fig1/shb1.pdf}
\scriptsize
\caption{Density maps predicted by CSRNet~\cite{li2018csrnet} and our PFDNet. For this image, the MAE of PFDNet is 3.9, much lower than that of CSRNet (10.1). It is observed that PFDNet delivers consistent superior performances at either smaller or larger scales among the marked regions.}
\label{fig:show_shb}
\end{figure}
Since the perspective information encodes the localized resolution of a scene in the image, it is natural to exploit such annotation as an indication to estimate the scale of pedestrians in a scene.
Thus, this work proposes a novel Perspective-guided Fractional-Dilation Network (\textit{i}.\textit{e}., PFDNet), which aims to allocate spatially variant receptive fields under the guidance of perspective information.
In our implementation, the proposed PFDNet is constructed by stacking multiple Perspective-guided Fractional-Dilation Convolutions (PFC) on a VGG16-BN backbone network.
In each PFC, the perspective information is firstly normalized by a customized normalization function and then transformed into a dilation rate map via the linear mapping.
Then we introduce a novel generalized dilation convolution operation, which performs feature aggregation of each position over the sliding window with spatially variant dilation rate, achieving fractional dilation ratios in the spatial domain.
Without bells and whistles, our proposed PFDNet achieves significant performance gain (\textit{e}.\textit{g}.~$17.4\%$ and ~$33.7\%$ improvement on ShanghaiTech A / B dataset) by replacing normal (dilated) convolutions in CSRNet~\cite{li2018csrnet} with PFC when using ground-truth perspective maps.
In practice, to deal with the problem of unavailable perspective information,
we further introduce an effective perspective estimation branch to the proposed PFDNet, which can be trained in either supervised or weakly-supervised setting once the branch has been pre-trained.
And a three-step estimation strategy is proposed to make the perspective estimation more stable.
In summary, the main contributions of this paper are three folds.
(1) We propose a Perspective-guided Fractional-Dilation Convolution (PFC) to mitigate the scale variation in crowd counting.
It is a plug and play module, which is able to work as a spatial allocator of varying receptive field.
(2) Based on PFC, we build up PFDNet for crowd counting, with which a perspective information estimation branch is introduced, making the whole net can be trained with or without perspective annotations.
(3) With the proposed PFDNet, we achieve dramatic performance gain over the state-of-the-arts on several crowd counting benchmarks.
This work is an extension of our previous conference paper~\cite{yan2019persp}. Compared with~\cite{yan2019persp}, this paper extends previous method in the following aspects:
\begin{itemize}
\item We propose perspective-guided fractional-dilation convolution, generalizing perspective-guided convolution in~\cite{yan2019persp} .
PFC is a generalized dilation convolution that even works when the dilation rate is a fractional number.
\item PFDNet uses a lightweight single-column architecture compared with PGCNet~\cite{yan2019persp}. While PGC~\cite{yan2019persp} concatenates the smoothed feature maps together with the original feature maps, making the parameters increase dramatically.
\item We also conduct other counting experiments (\textit{i}.\textit{e}.~vehicle counting) in this version by using our proposed PFDNet, further validating its broad applications.
\end{itemize}
\section{Related Work}
\label{sec:related_work}
We provide a brief review on the three categories of crowd counting methods, i.e., detection-based, regression-based and CNN-based methods.
Besides, the use of perspective normalization in crowd counting, including PGCNet~\cite{yan2019persp}, is also reviewed.
\subsection{Detection-based Methods}
\label{sec:counting_by_detection}
One straightforward way for single image crowd counting is to conduct human detection and count the number of bounding boxes.
Early researches usually exploit hand-crafted low-level features (\textit{e}.\textit{g}., Haar wavelets~\cite{viola2004robust} and histogram of oriented gradient (HOG)~\cite{dalal2005histograms}) which are then fed to the subsequent classifiers.
However, they tend to deliver poor performances when the scene is highly-congested.
To alleviate such issue, part-based detection is proposed for pedestrian counting by detecting particular body parts~\cite{wu2005detection, wang2011automatic}.
\subsection{Regression-based Methods}
\label{sec:counting_by_regression}
Regression-based methods directly learn a mapping from an input image to a numeric crowd count, which gives rise to two other issues, \textit{i}.\textit{e}., how to achieve effective feature extraction and how to perform reliable regression.
An early work~\cite{davies1995crowd} adopts holistic features to characterize the global property of a scene, local feature descriptors, \textit{e}.\textit{g}., LBP~\cite{he1990texture}, SIFT~\cite{lowe1999object} and even CNN features~\cite{wang2015deep}, have also been introduced to boost the effectiveness of feature extraction~\cite{idrees2013multi,ryan2009crowd}.
In terms of regression models, linear regression and its improvements~\cite{chan2008privacy, chan2009bayesian, chen2012feature, marana1998efficacy} have been widely employed to learn the regression mapping, and in~\cite{idrees2013multi} the multi-scale Markov random field is introduced to aggregate the local counts.
\subsection{CNN-based Methods}
\label{sec:counting_by_cnn}
Many CNN-based crowd counting methods have been proposed in recent years. These methods usually focus on typical techniques, including multi-scale~\cite{zhang2016single, sam2017switching, sindagi2017generating, zhang2018sacnn, shen2018crowd}, context~\cite{sindagi2017generating}, multi-task~\cite{zhang2015cross, huang2018body, liu2018leveraging}, attention~\cite{liu2019adcrowdnet, sindagi2019ha, zhang2019relational, zhang2019attentional, jiang2020attention}, GNN~\cite{luo2020hybrid}, loss functions~\cite{ma2019bayesian, wang2020DMCount}, classification~\cite{xhp2019SDCNet}, detection~\cite{liu2018decidenet, sam2020locate}, NAS~\cite{hu2020count}, reinforcement learning~\cite{liu2020weighing} and others~\cite{shi2018crowd, liu2018crowd, ranjan2018iterative, wan2019adaptive, sindagi2019multi, shi2019counting, liu2019point, wan2020modeling}.
Recently, some other methods have been proposed in handling the scale variation issue.
For instance, Zhang~\textit{et al}.~\cite{zhang2016single} suggested a multi-column architecture (MCNN) that combines features with different sizes of receptive fields.
In Switching-CNN~\cite{sam2017switching}, one of the three regressors is assigned for an input image by referring to its specific crowd density.
CP-CNN~\cite{sindagi2017generating} incorporates MCNN with local and global contexts.
SANet~\cite{cao2018scale} employs scale aggregation modules for multi-scale representation.
Instead of multi-column architecture, CSRNet~\cite{li2018csrnet} enlarges receptive fields by stacking dilated convolutions.
Cheng~\textit{et al}.~\cite{cheng2019learning} aimed to replace Euclidean distance with Maximum Excess over Pixels (MEP) loss and
achieved the promising performance.
Ma~\textit{et al}.~\cite{ma2019bayesian} proposed Bayesian loss which constructs a density contribution probability model from point annotations.
Liu~\textit{et al}.~\cite{liu2020adaptive} proposed local counting map and
Wang~\textit{et al}.~\cite{wang2020DMCount} reformulated crowd counting as a distribution matching problem and propose DM-Count based on optimal transport.
\subsection{Perspective Normalization}
Chan~\textit{et al}.~\cite{chan2008privacy} first proposed feature normalization for foreground objects under the guidance of perspective information.
Later, Lempitsky~\textit{et al}.~\cite{lempitsky2010learning} proposed a novel MESA-distance to deal with perspective distortion.
Among the CNN-based methods, a lot of works~\cite{zhang2015cross, zhang2016single, sam2017switching, huang2018body} prefer the perspective information as a prior in generating better density maps, but few of them attempt to encode such information directly into the network architecture.
To our best knowledge, PACNN~\cite{shi2019revisiting} is the most relevant to our method.
However, PACNN is still based on the multi-column architecture, so is limited in only discrete scale representations.
It aims to combine two density maps (predicted by two columns pool4\_2 and pool4\_1 on VGG-16~\cite{simonyan2014very}, respectively) via corresponding weights generated by the perspective map.
In comparison, we argue that a better choice would be to allocate spatially variant receptive fields under the explicit guidance of perspective information during the training process.
\subsection{Perspective-guided convolution}
\label{sec:pgc}
In PGCNet~\cite{yan2019persp}, Yan~\textit{et al}.~proposed perspective-guided convolution which employs spatially variant Gaussian kernels to smooth the feature maps.
A normal convolution is followed afterwards to aggregate information on the smoothed feature maps.
Generally speaking, we point out that there are three notable differences between PGC~\cite{yan2019persp} and our proposed PFC.
1) The implementation is different. PGC~\cite{yan2019persp} utilizes adaptive Gaussian kernels to perform spatially variant smoothing and obtain the smoothed features, and then aggregate the features via a conventional convolution, while PFC directly samples features by bilinear interpolation on the spatially variant windows.
2) Our PFC is much faster than PGC~\cite{yan2019persp}. Taken feature map with size $256\times 96 \times 128$ as an example, PGC~\cite{yan2019persp} has to generate Gaussian kernel $G_{{\sigma}_{i,j}}$ for each position $(i, j)$ and then performs extra matrix multiplications, resulting in the forward runtime $\sim 10ms$.
In contrast, PFC generalizes the dilated convolution, thus shares similar runtime with conventional dilated convolution (\textit{i}.\textit{e}., it takes $\sim 3.3ms$), which only takes $\sim 3.7ms$.
Besides, when the receptive field of allocation rises, due to the intrinsic characteristic of Gaussian smoothing in PGC~\cite{yan2019persp}, the time complexity increases in a quadratic manner attributed to the computation of Gaussian blurring. While, for our proposed PFC, it shares similar runtime with conventional dilated convolution whose runtime nearly keeps static regardless of the changes of dilation rate.
3) PGC~\cite{yan2019persp} suffers from severe feature confusion where our PFC does not suffer.
Due to the spatially variant Gaussian smoothing, the sampling region of Gaussian kernel largely overlaps with each other, which becomes more severe when the size of Gaussian kernel is large.
Such large overlaps inevitably introduce severe mixed information for the smoothed features, which limits the further performance improvement.
While, PFC generalizes dilated convolution where each sampling point in computed via bilinear interpolation of the nearest four grid points, which obviously does not suffer from feature confusion.
\section{Method}
\label{sec:method}
In this section, we first give the definition and implementation details of perspective-guided fractional-dilation convolution (PFC) in Sec~\ref{sec:PGFD}, and then introduce a perspective information estimation branch to the proposed PFDNet in Sec~\ref{sec:persp_estim}.
At last, the learning objectives and the architecture of PFDNet are presented in Sec~\ref{sec:architecture}.
\subsection{Perspective-guided Fractional-dilation Convolution}\label{sec:PGFD}
Firstly, we give a brief introduction of perspective map.
Perspective maps encode the localized resolution of the scene in an image,
and the perspective value $\mathbf{s}^{gt}_j$ at each location $j$ represents the number of imaging pixels for a one-meter object at the location in the real scene~\cite{zhang2015cross}.
From~\cite{zhang2015cross, shi2019revisiting}, we have
\begin{equation}\label{eqn:s_gt}
\mathbf{s}^{gt} = \frac{h}{H}=\frac{1}{C-H}y_h,
\end{equation}
where $C$ is the camera height from the ground, $H$ is the height of a person on the ground, and the person's head top are mapped on the image plane at $y_h$.
$h$ is the observed person height and $H$ is set to the mean height of adults ($1.75m$).
Due to $C$ is fixed for each image, $\mathbf{s}^{gt}$ is a linear mapping of $y_h$ and remains the same in each row of $y_h$.
In~\cite{zhang2015cross}, the heights $h_i$ of several pedestrians at different positions has been manually labeled in each image, perspective value $p^{g}_j$ can be obtained by $p^{g}_j = \frac{h_j}{1.75}$ and $C$ can be estimated.
Finally, the entire ground-truth perspective map can be generated by employing a linear regression method to fit Eqn.~\eqref{eqn:s_gt}.
A straightforward way to deal with intra-scene variations is to adopt the larger receptive field for the people at larger scales, while to use the smaller one for that at smaller scales.
To this end, we propose a novel perspective-guided fractional-dilation convolution to adaptively adjust the receptive field of each convolution operation.
Perspective-guided fractional-dilation convolution has two appealing properties.
(1) By removing the limitation of discrete dilation rates, it extends regular dilation convolution to a more flexible form.
(2) It allocates spatially-variant receptive fields for different regions under the guidance of the dilation rate map generated from perspective maps.
In the following, we firstly introduce how to generate the dilation rate map from the perspective map, and then describe the definition and implementation of fractional-dilation convolution.
\begin{figure}[!t]
\centering
\begin{overpic}[scale=0.15]{./fig/fdc3.pdf}
\put(17, 21){\scalebox{.60}{\textcolor{black}{$\mathbf{p}$}}}
\put(51, 21){\scalebox{.60}{\textcolor{black}{$\mathbf{p}$}}}
\put(85, 21){\scalebox{.60}{\textcolor{black}{$\mathbf{p}$}}}
\put(3, 27){\scalebox{.60}{\textcolor{black}{$\mathbf{p} + \mathbf{p}_k\cdot r_1$}}}
\put(35, 32){\scalebox{.60}{\textcolor{black}{$\mathbf{p} + \mathbf{p}_k\cdot r_2$}}}
\put(70, 30.5){\scalebox{.60}{\textcolor{black}{$\mathbf{p} + \mathbf{p}_k\cdot r_3$}}}
\end{overpic}
\scriptsize
\caption{Illustration of normal convolution, dilated convolution and factional-dilation convolution, as demonstrated in (a), (b) and (c). The red points indicates the sampling positions, the dashed lines show the grids and the intersections are grid points. Pixel/Feature values only exist on the grid points. When dilation rate $r$ is an integer (\textit{e}.\textit{g}., $r_1=1$ in (a) and $r_2=2$ in (b)), the sampling positions are on the grid points, thus feature aggregation can be directly performed. However, when $r$ is a fractional (\textit{e}.\textit{g}., $r_3$), we need to compute the values of sampling positions via bilinear interpolation.}
\label{fig:FDC}
\end{figure}
\subsubsection{Perspective-guided dilation rate map}\label{pg_dmap}
Let $\mathbf{x}$ and $\mathbf{s}$ be the feature maps and perspective map of an image, respectively.
Without loss of generality, $\mathbf{s}$ is downsampled to the same size $ H\times W$ with $\mathbf{x}$.
Following~\cite{shi2019revisiting}, $\mathbf{s}$ is firstly normalized to $[0,1]$ via a custom sigmoid-like function $\zeta(\cdot)$
\begin{equation}\label{eqn:ada_sig}
\widetilde{\mathbf{s}} = \zeta\left(\mathbf{s}\right)=\frac{1}{1+e^{-\alpha\left(\mathbf{s}-\beta\right)}}
\end{equation}
where $\alpha$ and $\beta$ are two trainable parameters.
Then the dilation rate map is defined as
\begin{equation}\label{eqn:dilation_rate_map}
\mathbf{r}=\max(~\gamma * \widetilde{\mathbf{s}} + \theta, ~0~)
\end{equation}
where $\gamma$ and $\theta$ are another two parameters that should be learned in the training phase.
Here, we adopt $\mathbf{r}$ as the dilation rate map for fractional-dilation convolution.
\subsubsection{Fractional-dilation Convolution}
\label{sec:FDC}
A convolution filter with the kernel size $K \times K$ mainly accumulates the sampled values weighted by the filter parameters $\mathbf{w}$, where the sampled values are usually taken from a regular grid $\mathcal{R}$ on the input feature maps $\mathbf{x}$.
$\mathcal{R}$ enumerates all the integer points within the range $[- \lfloor K/2 \rfloor, \lfloor K/2 \rfloor]$.
In this way, for any position $\mathbf{p}$ in the output feature map $\mathbf{y}$, its feature representation can be defined as
\begin{equation}
\mathbf{y}(\mathbf{p}) = \sum_{\mathbf{p}_k \in \mathcal{R}}\mathbf{w}(\mathbf{p}_k)\cdot \mathbf{x}(\mathbf{p} + \mathbf{p}_k),
\end{equation}
where $\mathbf{p}$ and $\mathbf{p}_k$ indicate the original coordinate and offset coordinate, respectively.
Similarly, in a dilated convolution with dilation rate $r$, we have the following definition,
\begin{equation}
\label{eqn:navie_dilated_conv}
\mathbf{y}(\mathbf{p}) = \sum_{\mathbf{p}_k \in \mathcal{R}}\mathbf{w}(\mathbf{p}_k)\cdot \mathbf{x}(\mathbf{p} + \mathbf{p}_k \cdot r)
\end{equation}
where $r$ is a positive integer to make sure that the sampling positions are on the grid points.
Different from this normal definition, we propose fractional-dilation convolution of which the dilation rate can be a fractional number.
Fig.~\ref{fig:FDC} shows the differences between original convolution, dilated convolution and fractional-dilation convolution.
To realize Eqn.~\eqref{eqn:navie_dilated_conv} by using a fractional rate, we adopt bilinear interpolation to calculate the feature representation of the point with the fraction coordinate.
As illustrated in Fig.~\ref{fig:bilinear}, suppose the fraction coordinate of $\mathbf{\hat p}$ is $(\hat i ,\hat j)$, we firstly
search the nearest four grid points $(i,j)$, $(i,j\!+\!1)$, $(i\!+\!1,j)$ and $(i\!+\!1,j\!+\!1)$ respectively.
Then the bilinear interpolation is performed along the horizontal direction to calculate,
\begin{equation}
\begin{split}
\mathbf{x}(i, \hat j) &= \mu \cdot \mathbf{x}(i, j\!+\!1) + (1-\mu) \cdot \mathbf{x}(i, j) \\
\mathbf{x}(i\!+\!1, \hat j) &= \mu \cdot \mathbf{x}(i\!+\!1, j\!+\!1) + (1-\mu) \cdot \mathbf{x}(i\!+\!1, j) \\
\end{split}
\end{equation}
where $\mu$ is determined by the location of $(i,j)$ and $(i,j\!+\!1)$.
Then, we compute $\mathbf{x}(\hat i, \hat j)$ along vertical direction.
\begin{equation}
\label{eqn:detailed_bilinear}
\begin{split}
\mathbf{x}(\hat i, \hat j) &= \lambda \cdot \mathbf{x}(i\!+\!1, \hat j) + (1-\lambda) \cdot \mathbf{x}(i, \hat j) \\
&= \lambda \cdot \left[~ \mu \cdot \mathbf{x}(i\!+\!1, j\!+\!1) + (1-\mu) \cdot \mathbf{x}(i\!+\!1, j) ~\right] \\
&+ (1-\lambda) \cdot \left[~ \mu \cdot \mathbf{x}(i, j\!+\!1) + (1-\mu) \cdot \mathbf{x}(i, j)~ \right]
\end{split}
\end{equation}
From Fig.~\ref{fig:bilinear}(a), we have:
\begin{equation}
\lambda = 1-|(i+1)-\hat i|
\vspace{-0.6em}
\end{equation}
\begin{equation}
\mu = 1-|(j+1)-\hat j|
\end{equation}
And the coefficients of grid points in Eqn.~\eqref{eqn:detailed_bilinear} can be represented by:
\begin{equation}
\label{eqn:coeffi_1}
\lambda\mu = (1-|(i+1)-\hat i|)\cdot (1-|(j+1)- \hat j|)
\end{equation}
\begin{equation}
\label{eqn:coeffi_2}
\lambda(1-\mu) = (1-|(i+1)- \hat i|)\cdot (1-|j- \hat j|)
\end{equation}
\begin{equation}
\label{eqn:coeffi_3}
(1-\lambda)\mu = (1-|i- \hat i|)\cdot (1-|(j+1)-\hat j|)
\end{equation}
\begin{equation}
\label{eqn:coeffi_4}
(1-\lambda)(1-\mu) = (1-|i- \hat i|)\cdot (1-|j-\hat j|)
\end{equation}
Let $\Omega(\mathbf{\hat p})$ be the set of the nearest four grid points of $\mathbf{\hat p}$. $\mathbf{q}= (q_i,q_j)$ belongs to $\Omega(\mathbf{\hat p})$.
According to Eqn.~(\ref{eqn:detailed_bilinear}) and Eqn.~(\ref{eqn:coeffi_1}),~(\ref{eqn:coeffi_2}),~(\ref{eqn:coeffi_3}),~(\ref{eqn:coeffi_4}), we have the following simplified form,
\begin{equation}
\label{eqn:complex_bilinear}
\begin{split}
\mathbf{x}(\mathbf{\hat p}) = \sum_{\mathbf{q}\in \Omega(\mathbf{\hat p})} (1-|q_i-p_i|)\cdot ( 1-|q_j-p_j|)\cdot \mathbf{x}(\mathbf{q}).
\end{split}
\end{equation}
Then, we can further rewrite Eqn.~\eqref{eqn:complex_bilinear} as follows,
\begin{equation}\label{eqn:G}
\mathbf{x}(\mathbf{\hat p}) = \sum_{\mathbf{q}\in \Omega(\mathbf{\hat p})}G(\mathbf{q}, \mathbf{\hat p}) \cdot \mathbf{x}(\mathbf{q}),
\end{equation}
where $\mathbf{\hat p}$ denotes an arbitrary location. According to Eqn.~(\ref{eqn:navie_dilated_conv}), we have $\mathbf{\hat p} = \mathbf{p} + \mathbf{p}_k \cdot r$.
And $\mathbf{q}$ enumerates integral spatial locations in the feature map $\mathbf{x}$, $G(\cdot, \cdot)$ denotes the bilinear interpolation kernel, which can be written as,
\begin{equation}
G(\mathbf{q}, \mathbf{\hat p}) = g(q_i, p_i) \cdot g(q_j, p_j),
\label{eqn:G}
\end{equation}
where $g(m, n) = \max (0, 1\!-\!|m \!-\! n|)$.
According to Eqn.~(\ref{eqn:G}), the output of such bilinear interpolation kernel is non-zero for only a few neighbor points of $\mathbf{\hat p}$.
So we can obtain the meaningful feature representation of any fraction point.
\begin{figure}[!htbp]
\centering
\begin{overpic}[scale=0.118]{./fig/bilinear_v2.pdf}
\put(10, 34.5){\scalebox{0.5}{$\mu$}}
\put(4, 32){\scalebox{0.5}{$\lambda$}}
\put(24, 34.5){\scalebox{0.5}{$1 - \mu$}}
\put(4, 20){\scalebox{0.5}{$1 - \lambda$}}
\put(0.5, 38){\scalebox{0.5}{$(i, j)$}}
\put(26, 38){\scalebox{0.5}{$(i, j+1)$}}
\put(0.5, 5){\scalebox{0.5}{$(i+1, j)$}}
\put(23.5, 5){\scalebox{0.5}{$(i+1, j+1)$}}
\put(16, 38){\scalebox{0.5}{$(i, \hat{j})$}}
\put(14, 5){\scalebox{0.5}{$(i+1, \hat{j})$}}
\put(17, 26){\scalebox{0.5}{$(\hat{i}, \hat{j})$}}
\put(49.5, 28){\scalebox{0.7}{\textcolor{mygreen}{$\mathbf{p}_{k}$}}}
\put(81, 28){\scalebox{0.7}{\textcolor{mygreen}{$\mathbf{p}_{k}$}}}
\end{overpic}
\scriptsize
\caption{Illustration of bilinear interpolation and gradient w.r.t. $r$ in fractional-dilation convolution, where (a) shows the procedure of bilinear interpolation and subfigure (b) demonstrates the gradient with respect to $r$. In \textbf{subfigure (a)}, when $r$ is a fractional number, the sampling location $(\hat i, \hat j)$ is not on the grid point. We need to search the nearest four grid points and then perform linear interpolation in the horizontal direction to obtain $\mathbf{x}(i, \hat j)$ and $\mathbf{x}(i+1, \hat j)$. After that, we compute $\mathbf{x}(\hat i, \hat j)$ via linear interpolation in the vertical direction. In \textbf{subfigure (b)}, the blue dashed arrows indicate the derivatives with respect to sampling locations. The green arrows show the direction vectors, and the red arrows represent the projected vectors of blue vectors onto the corresponding green vectors.}
\label{fig:bilinear}
\end{figure}
\subsubsection{Back-propagation of Fractional-dilation Convolution}
In our fractional-dilation convolution, we optimize the filter weights and the dilation rate together.
The gradient with respect to the dilation rate $r$ is calculated by,
\begin{equation}
\begin{split}
& \frac{\partial{\mathbf{y}}(\mathbf{p})}{\partial{r}} = \sum_{\mathbf{p}_k \in \mathcal{R}} \mathbf{w}(\mathbf{p}_k)\cdot \frac{\partial{\mathbf{x}(\mathbf{p} + \mathbf{p}_k \cdot r)}}{\partial{r}} \\
&= \sum_{\mathbf{p}_k \in \mathcal{R}}\left[
\mathbf{w}(\mathbf{p}_k) \cdot \sum_{\mathbf{q}\in \Omega(\mathbf{\hat p})} \frac{\partial{G}(\mathbf{q}, \mathbf{p} + \mathbf{p}_k \cdot r)}{\partial{r}} \cdot \mathbf{x}(\mathbf{q}) \right] \\
&= \sum_{\mathbf{p}_k \in \mathcal{R}}\left[
\mathbf{w}(\mathbf{p}_k) \cdot \mathbf{p}_k \cdot \sum_{\mathbf{q}\in \Omega(\mathbf{\hat p})} \frac{\partial{G}(\mathbf{q}, \mathbf{p} + \mathbf{p}_k \cdot r)}{\partial{(\mathbf{p} + \mathbf{p}_k \cdot r) }} \cdot \mathbf{x}(\mathbf{q})
\right]
\end{split}
\end{equation}
In fact, $\sum_{\mathbf{q}\in \Omega(\hat{\mathbf{p}})}
\frac{\partial{G}(\mathbf{q}, \mathbf{p} + \mathbf{p}_k \cdot r)}{\partial{(\mathbf{p} + \mathbf{p}_k \cdot r) }} \cdot \mathbf{x}(\mathbf{q})$ is 2D and denotes the derivative of bilinear interpolation with respect to the sampling location $\mathbf{p} + \mathbf{p}_k \cdot r$ (\textit{i}.\textit{e}., $\hat{\mathbf{p}}$).
We use the brief expression of \textit{the gradient with respect to sampling location} $\mathbf{p} + \mathbf{p}_k \cdot r$ to represent $\sum_{\mathbf{q}\in \Omega(\hat{\mathbf{p}})}\frac{\partial{G}(\mathbf{q}, \mathbf{p} + \mathbf{p}_k \cdot r)}{\partial{(\mathbf{p} + \mathbf{p}_k \cdot r) }} \cdot \mathbf{x}(\mathbf{q})$.
And $\mathbf{p}_k$ can represent a direction vector that starts from point $\mathbf{p}$ and ends at point $\mathbf{p} + \mathbf{p}_k$.
Intuitively, the formulation can be figuratively explained as Fig.~\ref{fig:bilinear}(b).
Here, $\mathbf{p}_k \cdot \sum_{\mathbf{q}\in \Omega(\hat{\mathbf{p}})} \frac{\partial{G}(\mathbf{q}, \mathbf{p} + \mathbf{p}_k \cdot r)}{\partial{(\mathbf{p} + \mathbf{p}_k \cdot r) }} \cdot \mathbf{x}(\mathbf{q})$
can be regarded as the result when the derivatives with respect to sampling locations are projected onto the corresponding direction vectors, shown as the red arrows in Fig.~\ref{fig:bilinear}.
If the result is positive/negative, the red arrow is in the same/opposite direction of the corresponding direction vector $\mathbf{p}_k$ and it encourages an expanding/shrinking of the dilation rate $r$.
Afterwards, the projected results are then weighted by the corresponding grid weight $\mathbf{w}(\mathbf{p}_k)$ and finally summed up as the final decision on scaling dilation rate $r$.
After obtaining the gradient of the dilation rate $r$ for each position, we could further calculate the parameters in Eqn.~(\ref{eqn:ada_sig}) and Eqn.~(\ref{eqn:dilation_rate_map}) according to gradient chain rule.
\begin{figure}[t]
\centering
\begin{overpic}[scale=0.235]{./fig/pfc_vs_pgc/pfc_vs_pgc.pdf}
\end{overpic}
\scriptsize
\caption{Comparison on sampling positions of our proposed PFC and PGC~\cite{yan2019persp}. The dashed black lines show the grids and the intersections are grid points. Suppose we want to perform feature aggregation on a square region marked in purple. The region can be exactly covered by a fractional dilation convolution with dilation rate $r=1.5$.
The input feature map is termed as $\mathbf{x}$. (a) and (b) respectively show the procedure of PFC and PGC.
In (a), the sampling positions are marked with small balls and most of them are not on the grid points. Taken the upper-left red sampling position and the upper-right green sampling position for example, their values are estimated by the bilinear interpolation with the values (from $\mathbf{x}$) of two groups, four grid points per group. \emph{Obviously the two groups of points do not overlap with each other.} Finally, the feature aggregation is performed on the values of the small balls.
In (b), when conducting PGC on the region, we need to perform feature aggregation with the values (from the blurred feature $\mathbf{\widetilde{x}}$, instead of directly from input feature $\mathbf{x}$) of the grid points (\textit{i}.\textit{e}., here is $9$ big balls in the purple square). The value of red ball is obtained by performing Gaussian smoothing (with kernel size $3\times 3$ and $\sigma=\frac{3}{4}$) on the values (from $\mathbf{x}$) in the region of red square. Similarly, the value of green ball can be computed. The procedure is named as spatially variant Gaussian smoothing, and the blurred feature is represented as $\mathbf{\widetilde{x}}$. One can see that \emph{large overlap (colored in yellow) exists between the sampling points when performing Gaussian smoothing.} Furthermore, larger overlaps exist when the Gaussian kernel size goes bigger(\textit{e}.\textit{g}., it reaches $7\times 7$ in ~\cite{yan2019persp}), resulting in severe feature confusion.
}
\label{fig:pfc_vs_pgc}
\end{figure}
\begin{figure*}[!htbp]
\centering
\begin{overpic}[scale=0.11]{./fig/net_arch/PFC_v7.pdf}
\put(48.5, 0.55){\scalebox{.80}{\textcolor{black}{$\mathbf{r}$}}}
\put(47.0, 12.1){\scalebox{.80}{\textcolor{black}{$\mathbf{x}$}}}
\end{overpic}
\scriptsize
\caption{The architecture of the proposed PFDNet. PFNet aims to predict reasonable dilation rate map for each input image and then PFC takes the backbone features and estimated dilation rate map to perform spatially variant receptive field allocation. Six PFCs are embedded in our PFDNet.
The perspective map estimated by PENet is normalized via a custom sigmoid function to generate the dilation rate map. Afterwards, the sampled locations $\mathbf{p}+\mathbf{p}_k\cdot r$ for each point $\mathbf{p}$ on the feature map is obtained.}
\label{fig:PFDNet}
\end{figure*}
\subsubsection{Differences to PGC~\cite{yan2019persp}}
\label{sec:diff2pgc}
We firstly give a brief introduction to PGC.
PGC~\cite{yan2019persp} generates $\widetilde{s}$ via Eqn.~(\ref{eqn:ada_sig}), and then the blur map $\boldsymbol{\sigma}$ is obtained via linear mapping of $\widetilde{s}$, defined as
\begin{equation}\label{eqn:blur_map}
\boldsymbol{\sigma} = \max (a(\widetilde{s} - s_0), 0 ),
\end{equation}
where $a$ and $s_0$ are trainable parameters.
With spatially variant Gaussian smoothing, the smoothing result $\widetilde{x}_{i,j}$ is computed by
\begin{equation}\label{eqn:smoothing}
\widetilde{x}_{i,j} = \sum_k \sum_l x_{k,l} G_{\sigma_{i,j}} (i,j,k,l),
\end{equation}
where $G_{\sigma_{i,j}} (i,j,k,l)$ is defined as below:
\begin{equation}\label{eqn:gaussian}
\small
G_{\sigma_{i,j}} (i,j,k,l) \!=\! \frac{1}{\sqrt{2 \pi }\sigma_{i,j} } \exp \left( - \frac{\left( (k \!-\! i)^2 \!+\! (l \!-\! j)^2 \right)}{2\sigma_{i,j}^2} \right).
\end{equation}
And the perspective-guided convolution is formulated as,
\begin{equation}\label{eqn:persp_conv}
\mathbf{y} = \mathbf{W}^{T} \widetilde{\mathbf{x}},
\end{equation}
where $\mathbf{W}$ denotes the conventional convolution kernel.
From Fig.~\ref{fig:pfc_vs_pgc}, it can be seen that PGC suffers from severe feature confusion due to large overlaps of sampling positions.
Intuitively, when the size of Gaussian kernel goes larger (\textit{e}.\textit{g}., in PGC~\cite{yan2019persp}, the maximum Gaussian kernel size is $7 \times 7$), larger overlap exists between the regions of Gaussian smoothing, which inevitably limits the performance of PGC.
By contrast, each sampling position of PFC is computed via bilinear interpolation of the nearest four grid points, and the groups of grid points hardly overlap with each other.
Therefore, PFC is effective in avoiding feature confusion.
Generally speaking, from the discussion in Sec.~\ref{sec:pgc}, our proposed PFC runs much faster, more flexible on allocating larger receptive field, can avoid feature confusion, and thus achieves better performance.
\subsection{Perspective Estimation}
\label{sec:persp_estim}
Although perspective maps are critical for calculating the dilation rate of fractional-dilation convolution, they are not always available in real applications.
To address such an issue, we introduce a perspective estimation branch to predict corresponding perspective information under the above situation.
Intuitively, one can pre-train a perspective estimation network on available pairs of image and perspective map, and then adopt it as the perspective estimation branch of the whole network.
However, we find a plain network optimized with the end-to-end manner usually achieves an unacceptable prediction accuracy.
Inspired by \cite{Mostajabi_2018_CVPR}, we propose a three-phase training strategy to train a robust auto-encoder for perspective estimation.
In the first phase, we use perspective maps from ShanghaiTech A~\cite{zhang2016single} to train an auto-encoder $D_{s}(E_{s}(\mathbf{s}; \Theta^E_s); \Theta^D_s)$ as a perspective re-constructor for each input $\mathbf{s}$.
Here, $\Theta^E_s$ and $\Theta^D_s$ denotes the parameters of the encoder $E_{s}$ and decoder $D_{s}$, respectively.
We adopt the $\ell_2$ reconstruction loss as the objective function,
\begin{equation}\label{eqn:persp_estimating_loss}
{\cal L}_{s2s} = \frac{1}{2N}\sum_{i=1}^{N}\| D_{s}(E_{s}(\mathbf{s}_i; \Theta^E_s);\Theta^D_s) - \mathbf{s}_i \|_{2}^{2} ,
\end{equation}
where $N$ is the total number of perspective maps.
Once the model is trained, the latent code $E_{s}(\mathbf{s}; \Theta^E_s)$ could encode the internal structure and contextual relationships in $\mathbf{s}$,
while the decoder $D_{s}$ could accurately recover a high quality perspective map from this latent code.
In the second phase, we train another auto-encoder which takes an image $\mathbf{I}$ as the input and predicts the corresponding perspective map $D_{s}(E_{I}(\mathbf{I}; \Theta^E_I); \Theta^D_s)$.
Specially, we reuse the decoder parameters $\Theta^D_s$ learned in the first phase, and only optimize the encoder parameters $\Theta^E_I$ by minimizing the following loss function,
\begin{equation}\label{eqn:persp_perceptual_loss}
{\cal L}_{I2s} = \frac{1}{2N}\sum_{i=1}^{N}\| D_{s}(E_{I}({I}_i; \Theta^E_I);\Theta^D_s) - \mathbf{s}_i \|_{2}^{2} .
\end{equation}
In the third phase, we transfer the optimized auto-encoder in the second phase onto the target training set.
The decoder is fixed during the training phase.
If the perspective maps are available on the target training set, we could optimize both ${\cal L}_{I2s}$ and density estimation loss (\textit{i}.\textit{e}., the main loss of the crowd counting task) together.
If the perspective maps are unavailable, we could train the perspective estimation branch together with the main backbone network with an end-to-end manner.
In practice, benefited from the robustness of the decoder, even if the encoder is not well optimized, the decoder can still recover a roughly reasonable perspective map.
According to the above three training phases, our perspective estimation branch can be optimized in a weakly-supervised way even without using the corresponding perspective annotations.
\subsection{Network Architecture}
\label{sec:architecture}
Fig.~\ref{fig:PFDNet} illustrates the architecture of our PFDNet, which is comprised of the main backbone network together with the perspective estimation network (PENet).
We adopt CSRNet~\cite{li2018csrnet} as our main backbone network, and replace all of the regular dilated convolutions with our proposed PFCs.
The dilation rate map for the PFC are calculated based on the output of PENet according to the Eqn.~(\ref{eqn:ada_sig}) and Eqn.~(\ref{eqn:dilation_rate_map}).
The detailed PENet architecture is illustrated in Table~\ref{table:PENet}.
\begin{table}[!ht]
\begin{center}
\scriptsize
\caption{The architecture of PENet. ``LReLU'' denotes leaky ReLU with the slope of 0.2. ``UpConv'' represents transposed convolution. $H$ and $W$ are the height and width of input respectively.}
\label{table:PENet}
\resizebox{0.95\hsize}{!}{
\begin{tabular}{ c| c |c }
\hline
Part & Layer & Output Size \\
\midrule
\multirow{6}*{Encoder}
& Conv. (3, 3, 32), stride=2; LReLU & $32\times H/2\times W/2$ \\
& Conv. (3, 32, 64), stride=2; LReLU & $64\times H/4\times W/4$ \\
& Conv. (3, 64, 128), stride=2; LReLU & $128\times H/8\times W/8$ \\
& Conv. (3, 128, 256), stride=2; LReLU & $256\times H/16\times W/16$ \\
& Conv. (3, 256, 512), stride=2; LReLU & $512\times H/32\times W/32$ \\
& Conv. (3, 512, 1024), stride=2; LReLU & $1024\times H/64\times W/64$ \\
\hline\hline
& UpConv. (3, 1024, 512), stride=2; ReLU & $512\times H/32\times W/32$ \\
\multirow{6}*{Decoder}
& UpConv. (3, 512, 256), stride=2; ReLU & $256\times H/16\times W/16$ \\
& UpConv. (3, 256, 128), stride=2; ReLU & $128\times H/8\times W/8$ \\
& UpConv. (3, 128, 64), stride=2; ReLU & $64\times H/4\times W/4$ \\
& UpConv. (3, 64, 32), stride=2; ReLU & $32\times H/2\times W/2$ \\
& UpConv. (3, 3, 1), stride=2; ReLU & $1\times H\times W $ \\
\bottomrule
\end{tabular}
}
\end{center}
\end{table}
\section{Experimental Results and Dataset}
\label{sec:experiments_results}
In this section, we will first give the description of the implementation details, and then present the comparison between state-of-the-arts and our PFDNet on five datasets, namely ShanghaiTech~\cite{zhang2016single}, WorldExpo'10~\cite{zhang2015cross}, UCF-QNRF~\cite{idrees2018composition}, UCF\_CC\_50~\cite{idrees2013multi} and TRANCOS~\cite{guerrero2015extremely}. Extensive ablation study is then conducted to clarify the contribution of each component in PFDNet.
The pre-trained models and source code are online available at~\url{https://github.com/Zhaoyi-Yan/PFDNet}.
\subsection{Evaluation Metric and Dataset}
We adopt Mean Absolute Error (MAE) and Root Mean Square Error (RMSE) as the evaluation metrics, the same as previous works~\cite{zhang2016single, sam2017switching, li2018csrnet}.
Let $N$ be the number of test samples, $C_i$ and $\hat{C}_i$ are respectively the ground-truth count and prediction one.
Then MAE and RMSE can be defined as follows:
\begin{equation}\label{eqn:mae}
MAE = \frac{1}{N}\sum_{i=1}^{N}|C_i - \hat{C}_{i}|,
\end{equation}
\begin{equation}\label{eqn:mse}
RMSE = \sqrt{\frac{1}{N}\sum_{i=1}^{N}\|C_i - \hat{C}_{i}\|^2}.
\end{equation}
We evaluate the performance of the proposed PFDNet and other state-of-the-art methods on five popular benchmarks. The detailed descriptions are as follows.
\textbf{ShanghaiTech} contains $1,198$ images with a total of $330,165$ annotated people.
ShanghaiTech A contains $482$ crowd images with crowd numbers varying from $33$
to $3139$, and ShanghaiTech B contains $716$ high-resolution
images with crowd numbers from $9$ to $578$.
For Part A, the images are collected from the web, while the images in Part B are Shanghai street views.
\textbf{WorldExpo'10} contains $3,980$ images from the $2010$ Shanghai WorldExpo.
The training set contains $3,380$ images, while the test set is divided into five different scenes with $120$ images each.
ROIs are provided to indicate the target regions for training / testing.
Following~\cite{li2018csrnet}, each image and its ground-truth density map are masked with the ROI in preprocessing.
\textbf{UCF-QNRF} is a large crowd counting dataset with $1,535$ high-resolution images and $1.25$ million head annotations.
There are $1,201$ training images and the rest are used as test images.
It contains extremely congested scenes where the maximum count of an image $12,865$.
\textbf{UCF\_CC\_50} contains $50$ images of diverse scenes, which is a challenging dataset.
The head count per image varies drastically (from $94$ to $4,543$).
Following~\cite{idrees2013multi}, we split the dataset into five subsets and perform a $5$-fold cross-validation.
\textbf{TRANCOS} is a public traffic dataset containing $1,244$ images of different congested traffic scenes captured
by surveillance cameras with $46,796$ annotated vehicles.
The regions of interest (ROI) are provided for evaluation.
We evaluate PFDNet on TRANCOS dataset to validate the generalization of our method and the robustness of
PENet.
The Grid Average Absolute Error (GAME) is adopted as the evaluation metric, which can be referred in~\cite{guerrero2015extremely, li2018csrnet}.
GAME(L) subdivides the image using a grid of $4^L$ non-overlapping regions, and the error is computed as the sum of the mean absolute errors in each of these regions.
Obviously, GAME(0) is equivalent to the MAE metric.
\subsection{Implementation Details}
\label{sec:training_details}
Let $\Theta$ denote the model parameters of PFDNet $\Phi(I; \Theta)$. Then the main loss function of the crowd counting estimation task is as follows,
\begin{equation}\label{eqn:pmae_pmse}
{\cal L}\left(\Theta\right) = \frac{1}{2N}\sum_{i=1}^{N}\|\Phi(I; \Theta) - Y_{i}\|_{2}^{2},
\end{equation}
where $Y_i$ is the ground-truth density map of $I_i$.
We generate ground-truth density maps by adopting a normalized Gaussian kernel to blur each head annotation, and make sure the summations equals to the crowd counts.
In our experiments, we use a fixed $15\!\times\!15$ Gaussian kernel with standard deviation of $4$ to generate density maps.
We adopt Adam~\cite{kingma2014adam} as the optimizer.
The learning rate is set as $1e^{-4}$ for the parameters of backbone network.
Original CSRNet perfers one whole image in an iteration when training, consuming a lot of time for some datasets (\textit{e}.\textit{g}., ShanghaiTech A which contains images of various sizes).
To make the training procedure more efficient, we adopt VGG16-BN~\cite{simonyan2014very} model instead of VGG-16 as the backbone, and add extra BatchNorm~\cite{ioffe2015batch} layers after each dilated convolution in CSRNet.
BatchNorm layer stabilizes the model when training with random cropping images and gets rid of performance degradation when evaluating.
Besides, we upsample the predicted density map by the factor 4, making the final predicted density map $\frac{1}{2}$ of the original input size.
\textbf{After all the changes, we call it CSRNet* and take it as the baseline of our method}.
It should be noted that CSRNet* shows its superiority in faster training (\textit{i}.\textit{e}., batch size can be larger than 1, and is 16 in our experiments.) and higher performances than original CSRNet on the validation datasets.
The weights of PFDNet are initialized with Gaussian distribution of zero mean and 0.01 standard deviation, except the weights of backbone are initialized with the VGG16-BN pretrained on ImageNet.
We implement our PFDNet on Pytorch~\cite{paszke2017automatic}.
Random flipping and color jittering are adopted for data augmentation.
For the initialization of $\alpha$, $\beta$, $\gamma$ and $\theta$, according to CSRNet~\cite{li2018csrnet}, the average dilated rate over the whole map is expected to be around $2$.
Empirically, we set $\alpha$, $\beta$, $\gamma$ and $\theta$ respectively with value $1$, $1$, $1.5$, $1$ for all the PFC layers.
For simplicity, we adopt the same initialization values for these four super-parameters on all the datasets.
For ShanghaiTech and WorldExpo'10, since the corresponding ground-truth perspective maps are available, they are used as the guidance of PFC directly, and our model is trained for $300$ epochs without PENet.
For the datasets without perspective annotations, the PENet is pre-trained for the first two phases of Sec.~\ref{sec:persp_estim}, both using $500$ epochs. After that the main network and PENet are jointly trained for another $300$ epochs, following the description of the third phase of Sec.~\ref{sec:persp_estim}.
In practice, we build PFDNet by stacking six PFC layers after a truncated VGG16-BN for all datasets.
It takes about $2$ days to train the network on UCF-QNRF with an NVIDIA Tesla P100 GPU.
\subsection{Evaluations and Results}
\label{sec:eval_and_comparison}
Five datasets are adopted in our experiments, including ShanghaiTech~\cite{zhang2016single}, WorldExpo'10~\cite{zhang2015cross}, UCF-QNRF~\cite{idrees2018composition}, UCF\_CC\_50~\cite{idrees2013multi} and TRANCOS~\cite{guerrero2015extremely}.
It is noted that the first two contain available perspective maps\footnote{Annotations of ShanghaiTech are from ~\cite{shi2019revisiting} and WorldExpo'10 provides official annotations.}, thus we can directly use these annotations to train our PFDNet.
For the later three datasets that perspective map annotations are unavailable, we denote \textbf{\emph{Ours A}} as directly adopting the estimated perspective maps (based on the PENet trained on perspective annotations from ShanghaiTech A in the first two phases) as \emph{ground-truth} and feed them to the training of PFC layers;
while \textbf{\emph{Ours B}} as the end-to-end training without perspective map annotations in the third training phase described in Sec.~\ref{sec:persp_estim}, where the main network and PENet are jointly trained without any perspective map annotations.
As the resolution of perspective map required by PFCs is only $1/8$ size of the original image,
thus all input images are firstly downsampled to $1/8$ resolution of the original size in the two training phases of PENet.
For \emph{Ours A} / \emph{Ours B}, by following Sec.~\ref{sec:persp_estim} with ShanghaiTech A, we get $30.6$ dB PSNR in the first phase and $25.1$ dB PSNR in the second phase.
Besides, Fig.~\ref{fig:PENet_out} shows a test sample for visualization of the perspective estimation.
Fig.~\ref{fig:PENet_out}(b)(d) shows the quite similar estimation results, which indicates the auto-encoder is well trained in the first phase.
In the second phase, the auto-encoder aims at predicting perspective estimations (\textit{e}.\textit{g}., Fig.~\ref{fig:PENet_out}(c)) from RGB images.
It is observed that Fig.~\ref{fig:PENet_out}(c) is still visually-satisfying, indicating that the PENet could actually recover good perspective annotations from a RGB image.
\begin{figure}[!t]
\centering
\includegraphics[width=0.5\textwidth]{./fig/persp_est/PENet_output.pdf}
\scriptsize
\caption{Perspective estimations of PENet in the first two phases. (a) is the input; (b)(c) are respectively the predictions in the first and second phase; (d) is the ground-truth perspective annotations.}
\label{fig:PENet_out}
\end{figure}
\begin{table*}[!t]
\footnotesize
\centering
\small
\caption{Comparisons on ShanghaiTech A, ShanghaiTech B and WorldExpo'10. It is noted that we adopt \textbf{ground-truth} perspective annotations to feed PFCs. The results of top two performance are highlighted in red and blue respectively.}
\resizebox{0.95\hsize}{!}{
\begin{tabular}{
l|*1{p{0.8cm}<{\centering}}|*1{p{1cm}<{\centering}}|*2{p{0.8cm}<{\centering}}|*2{p{0.8cm}<{\centering}}|*6{p{0.8cm}<{\centering}}
}
\toprule
{\multirow{2}{*}{\textbf{Method}}} & {\multirow{2}{*}{\textbf{Year}}} & {\multirow{2}{*}{\textbf{Venue}}} &
\multicolumn{2}{c|}{\textbf{ShanghaiTech A}} & \multicolumn{2}{c|}{\textbf{ShanghaiTech B}} & \multicolumn{6}{c}{\textbf{WorldExpo'10}} \\
\cline{4-13}
{} & {} & {} & MAE & RMSE & MAE & RMSE & Sce.1 & Sce.2 & Sce.3 & Sce.4 & Sce.5 & Avg \\
\hline
\hline
CSRNet~\cite{li2018csrnet} & 2018 & CVPR & 68.2 & 115.0 & 10.6 & 16.0 & 2.9 & 11.5 & 8.6 & 16.6 & 3.4 & 8.6 \\
SANet~\cite{cao2018scale} & 2018 & CVPR & 67.0 & 104.5 & 8.4 & 13.6 & 2.6 & 13.2 & 9.0 & 13.3 & 3.0 & 8.2 \\
HA-CCN~\cite{sindagi2019ha} & 2019 & TIP & 62.9 & 94.9 & 8.1 & 13.4 & - & - & - & - & - & - \\
TEDnet~\cite{jiang2019crowd} & 2019 & CVPR & 64.2 & 109.1 & 8.2 & 12.8 & 2.3 & 10.1 & 11.3 & 13.8 & 2.6 & 8.0 \\
ADCrowdNet~\cite{liu2019adcrowdnet} & 2019 & CVPR & 63.2 & 98.9 & 8.2 & 15.7 & 1.6 & 13.2 & 8.7 & 10.6 & 2.6 & 7.3 \\
SFCN~\cite{wang2019learning} & 2019 & CVPR & 65.2 & 109.4 & 7.2 & 12.2 & - & - & - & - & - & - \\
PACNN~\cite{shi2019revisiting} & 2019 & CVPR & 62.4 & 102.0 & 7.6 & 11.8 & 2.3 & 12.5 & 9.1 & 11.2 & 3.8 & 7.8 \\
CAN~\cite{liu2019context} & 2019 & CVPR & 62.3 & 100.0 & 7.2 & 11.1 & 2.9 & 12.0 & 10.0 & 7.9 & 4.3 & 7.4 \\
PSDDN~\cite{liu2019point} & 2019 & CVPR & 65.9 & 112.3 & 9.1 & 14.2 & - & - & - & - & - & - \\
SPN~\cite{Xu2019learn} & 2019 & ICCV & 64.2 & 98.4 & 7.2 & 11.1 & - & - & - & - & - & - \\
BL~\cite{liu2019context} & 2019 & ICCV & 62.3 & 100.0 & 7.2 & 11.1 & - & - & - & - & - & - \\
S-DCNet~\cite{xhp2019SDCNet} & 2019 & ICCV & 58.3 & 95.0 & \textcolor{blue}{6.7} & \textcolor{blue}{10.7} & - & - & - & - & - & - \\
PGCNet~\cite{yan2019persp} & 2019 & ICCV & 57.0 & 86.0 & 8.8 & 13.7 & 2.5 & 12.7 & 8.4 & 13.7 & 3.2 & 8.1 \\
DensityCNN~\cite{jiang2020density} & 2020 & TMM & 63.1 & 106.3 & 9.1 & 16.3 & 1.8 & 11.2 & 10.1 & 7.9 & 3.4 & \textcolor{blue}{6.9} \\
DENet~\cite{liu2020denet} & 2020 & TMM & 65.5 & 101.2 & 9.6 & 15.4 & 2.8 & 10.7 & 8.6 & 15.2 & 3.5 & 8.2 \\
EPA~\cite{yang2020embedding} & 2020 & TIP & 60.9 & 91.6 & 7.9 & 11.6 & 2.1 & 9.3 & 9.4 & 11.0 & 3.7 & 7.4 \\
KDMG~\cite{wan2020kernel} & 2020 & TPAMI & 63.8 & 99.2 & 7.8 & 12.7 & - & - & - & - & - & - \\
LSC-CNN~\cite{sam2020locate} & 2020 & TPAMI & 66.4 & 117.0 & 8.1 & 12.7 & 2.9 & 11.3 & 9.4 & 12.3 & 4.3 & 8.0 \\
LCM~\cite{hu2020count} & 2020 & ECCV & 61.6 & 98.4 & 7.0 & 11.0 & - & - & - & - & - & - \\
AMSNet~\cite{liu2020adaptive} & 2020 & ECCV & \textcolor{blue}{56.7} & \textcolor{blue}{93.4} & \textcolor{blue}{6.7} & \textcolor{red}{10.2} & 1.6 & 8.8 & 10.8 & 10.4 & 2.5 & \textcolor{red}{6.8} \\
DM-Count~\cite{wang2020DMCount} & 2020 & NeurIPS & 61.9 & 99.6 & 7.4 & 11.8 & - & - & - & - & - & - \\
\hline
\hline
Baseline & - & - & 65.1 & 112.4 & 9.8 & 15.2 & 2.7 & 11.1 & 8.5 & 16.7 & 3.6 & 8.5 \\
Ours & - & - & \textcolor{red}{\textbf{53.8}} & \textcolor{red}{\textbf{89.2}} & \textcolor{red}{\textbf{6.5}} & \textcolor{blue}{\textbf{10.7}} & \textbf{2.5} & \textbf{9.7} & \textbf{8.1} & \textbf{10.1} & \textbf{3.5} & \textcolor{red}{\textbf{6.8}} \\
\bottomrule
\end{tabular}
}
\vspace{1em}
\label{table:sha_shb_we}
\end{table*}
\begin{table*}[!t]
\footnotesize
\centering
\small
\caption{Comparisons on UCF-QNRF, UCF\_CC\_50 and TRANCOS. Baseline is the model CSRNet*, and \textit{Ours A} means we directly use the estimated perspective maps predicted by PENet. While \textit{Ours B} indicates that PENet embeded as a branch and the whole training is end-to-end. The results of top two performance are highlighted in red and blue respectively.}
\resizebox{0.95\hsize}{!}{
\begin{tabular}{
l|*1{p{0.8cm}<{\centering}}|*1{p{1cm}<{\centering}}|*2{p{0.8cm}<{\centering}}|*2{p{0.8cm}<{\centering}}|*4{p{0.8cm}<{\centering}}
}
\toprule
{\multirow{2}{*}{\textbf{Method}}} & {\multirow{2}{*}{\textbf{Year}}} & {\multirow{2}{*}{\textbf{Venue}}} &
\multicolumn{2}{c|}{\textbf{UCF-QNRF}} & \multicolumn{2}{c|}{\textbf{UCF\_CC\_50}} & \multicolumn{4}{c}{\textbf{TRANCOS}} \\
\cline{4-11}
{} & {} & {} & MAE & RMSE & MAE & RMSE & GE(0) & GE(1) & GE(2) & GE(3) \\
\hline
\hline
CSRNet~\cite{li2018csrnet} & 2018 & CVPR & - & - & 266.1 & 397.5 & 3.56 & 5.49 & 8.57 & 15.04 \\
SANet~\cite{cao2018scale} & 2018 & CVPR & - & - & 258.4 & 334.9 & - & - & - & - \\
HA-CCN~\cite{sindagi2019ha} & 2019 & TIP & 118.1 & 180.4 & 256.2 & 348.4 & - & - & - & - \\
TEDnet~\cite{jiang2019crowd} & 2019 & CVPR & 113 & 188 & 294.4 & 354.5 & - & - & - & - \\
ADCrowdNet~\cite{liu2019adcrowdnet} & 2019 & CVPR & - & - & 257.1 & 363.5 & - & - & - & - \\
SFCN~\cite{wang2019learning} & 2019 & CVPR & 102.0 & 171.4 & 214.2 & 318.2 & - & - & - & - \\
PACNN~\cite{shi2019revisiting} & 2019 & CVPR & - & - & 241.7 & 320.7 & - & - & - & - \\
CAN~\cite{liu2019context} & 2019 & CVPR & 107 & 183 & 212.2 & \textcolor{red}{243.7} & - & - & - & - \\
PSDDN~\cite{liu2019point} & 2019 & CVPR & - & - & 359.4 & 514.8 & 4.79 & 5.43 & 6.68 & 8.40 \\
SPN~\cite{Xu2019learn} & 2019 & ICCV & 104.7 & 173.6 & 259.2 & 335.9 & - & - & - & - \\
BL~\cite{liu2019context} & 2019 & ICCV & 88.7 & 154.8 & 229.3 & 308.2 & - & - & - & - \\
S-DCNet~\cite{xhp2019SDCNet} & 2019 & ICCV & 104.4 & 176.1 & 204.2 & 301.3 & - & - & - & - \\
PGCNet~\cite{yan2019persp} & 2019 & ICCV & - & - & 244.6 & 361.2 & - & - & - & - \\
DensityCNN~\cite{jiang2020density} & 2020 & TMM & 101.5 & 186.9 & 244.6 & 341.8 & \textcolor{blue}{3.17} & 4.78 & \textcolor{blue}{6.30} & \textcolor{red}{8.26} \\
DENet~\cite{liu2020denet} & 2020 & TMM & - & - & 241.9 & 345.4 & - & - & - & - \\
LSC-CNN~\cite{sam2020locate} & 2020 & TPAMI & 120.5 & 218.2 & 225.6 & 302.7 & 4.6 & 5.4 & 6.9 & \textcolor{blue}{8.3} \\
EPA~\cite{yang2020embedding} & 2020 & TIP & - & - & 250.1 & 342.1 & 3.21 & - & - & - \\
KDMG~\cite{wan2020kernel} & 2020 & TPAMI & 99.5 & 173.0 & - & - & 3.13 & 4.79 & 6.20 & 8.68 \\
LCM~\cite{hu2020count} & 2020 & ECCV & 86.6 & 152.2 & \textcolor{red}{184.0} & \textcolor{blue}{265.8} & - & - & - & - \\
AMSNet~\cite{liu2020adaptive} & 2020 & ECCV & 101.8 & 163.2 & 208.4 & 297.3 & - & - & - & - \\
DM-Count~\cite{wang2020DMCount} & 2020 & NeurIPS & \textcolor{blue}{85.6} & 148.3 & 211.0 & 291.5 & - & - & - & - \\
\hline
\hline
Baseline & - & - & 103.1 & 188.6 & 257.1 & 363.8 & 3.49 & 5.30 & 8.16 & 14.45 \\
Ours A & - & - & 87.5 & 152.4 & 224.6 & 304.4 & 3.22 & \textcolor{blue}{4.58} & 6.74 & 10.69 \\
Ours B & - & - & \textcolor{red}{\textbf{84.3}} & \textcolor{red}{\textbf{141.2}} & \textcolor{blue}{\textbf{205.8}} & \textbf{289.3} & \textcolor{red}{\textbf{3.06}} & \textcolor{red}{\textbf{4.15}} & \textcolor{red}{\textbf{6.22}} & \textbf{9.86} \\
\bottomrule
\end{tabular}
}
\vspace{1em}
\label{table:qnrf_ucf_trans}
\end{table*}
Table~\ref{table:sha_shb_we}
shows the results on ShanghaiTech and WorldExpo'10, in which we feed ground-truth perspective annotations to the PFCs.
It is seen that our method shows significant performance gain against the baseline CSRNet* with $17.4\%$ relative MAE decrease on ShanghaiTech A and $33.7\%$ relative MAE decrease on ShanghaiTech B.
For WorldExpo'10 dataset, our method achieves the best $6.8$ average MAE with $20.0\%$ performance improvement.
For all these three datasets, our method performs the best, indicating the superiority of spatially variant receptive field allocation.
Besides, some test cases can be found in Fig.~\ref{fig:sample}, clearly indicating that the superiority of PFDNet to CSRNet* in estimating a better density map.
For the datasets UCF-QNRF, UCF\_CC\_50 and TRANCOS, they do not provide official perspective annotations.
Thus, we conduct the two comparison experiments \emph{Ours A} and \emph{Ours B} described at the beginning of this section.
Table~\ref{table:qnrf_ucf_trans} shows the results of these three datasets.
Compared with the baseline CSRNet*, \emph{Ours A} achieves significant gain on both MAE and RMSE.
Specifically, $15.7\%$, $18.1\%$ performance gains on MAEs for datasets UCF-QNRF and UCF\_CC\_50, achieving $87.5$ and $224.5$ MAE.
Notably, \emph{Ours B} further reduces the MAEs, ranks first on UCF-QNRF and achieves the second best performance on UCF\_CC\_50, which shows the feasibility of our end-to-end training strategy described in Sec.~\ref{sec:persp_estim}.
Furthermore, we emphasize that PFDNet still delivers obvious performance gain even in object counting over baseline CSRNet* and achieves $3.06$ MAE.
It is noted that perspective estimation aims to predict the depth information of a scene, which is object-unrelated.
We show a test sample in Fig.~\ref{fig:mul_stage}.
For both phases \textit{Ours A} and \textit{Ours B}, PENet generally creates fine perspective estimations, which is the guarantee of fine performance.
It is generally known that the perspective map is roughly of horizontal-linear-growth and vertical-value-consistent for a plain scene~\cite{shi2019revisiting}.
Fig.~\ref{fig:mul_stage}(c) outperforms Fig.~\ref{fig:mul_stage}(b) in its higher accordance with the prior, and Fig.~\ref{fig:mul_stage}(f) outperforms Fig.~\ref{fig:mul_stage}(e) in predicting more accurate density maps.
These observations validate the robustness and feasibility of our method.
\\
\subsection{Comparisons with state-of-the-arts}
Among the existing deep crowd counting approaches, we select three state-of-the-art methods (\textit{i}.\textit{e}., LCM~\cite{hu2020count}, AMSNet~\cite{liu2020adaptive}, DM-Count~\cite{wang2020DMCount}) which show the best completing performance against our PFDNet.
(1) LCM~\cite{hu2020count} adopts NAS (Neural Architecture Search) to automatically develop a multi-scale architecture to address the scale variation in crowd counting.
However, the operations in the searching space are conventional network components, thus all these operations suffer from the intrinsic limitation in modeling continuous scale variation.
(2) AMSNet~\cite{liu2020adaptive} attempts to model continuous scales by stacking multiple manually-designed complicated and computational-heavy modules (\textit{i}.\textit{e}., Scale-aware Module, Mixture Regression Module and Adaptive Soft Interval Module), largely increasing the inference time (\textit{i}.\textit{e}.~$\sim$$1.72s$ for a 1024$\times$768 image).
In contrast, our PFDNet only takes $\sim70ms$.
(3) DM-Count~\cite{wang2020DMCount} proposes optimal transport loss to replace MSE-based loss as the density map prediction constraint, so as to tackle the scale variation to a certain extent.
Nonetheless, the network (\textit{i}.\textit{e}., VGG-19~\cite{simonyan2014very}) adopted in DM-Count is built with conventional operators.
Therefore, continuous scales of features are compressed into discrete scales of feature representations, resulting in irreparable loss of information.
Actually, a better approach would be explicitly modeling the scale variation via our proposed PFD layer, which can be validated from the performance comparisons.
\begin{figure*}[!t]
\centering
\includegraphics[width=1.0\textwidth]{./fig/fig_sample/samples_v2.pdf}
\scriptsize
\caption{Density maps estimated by CSRNet* and Ours. It is seen that our PFDNet delivers superior performance over CSRNet* in both estimating better density maps and more accurate counts.}
\label{fig:sample}
\end{figure*}
\begin{figure}[!t]
\centering
\includegraphics[width=0.5\textwidth]{./fig/trancos/trancos.pdf}
\scriptsize
\caption{Visualization of a test example from TRANCOS dataset. (a) is the input; (b)(c) / (e)(f) are estimated perspective / density maps of Ours A and Ours B; and (d) is the ground truth.}
\label{fig:mul_stage}
\end{figure}
\subsection{Ablation Study}
\label{sec:ablation}
In this section, we will first demonstrate the influence of the number of PFCs stacked in our network.
Besides, we validate the feasibility of PFC as an insertable component for existing network to improve performance.
Moreover, we exploit the necessity of spatially variant receptive fields.
Furthermore, we visualize the dilation rate maps of different PFC layers.
In addition, we compare our PFC with deformable convolution to have a deeper understanding of continuous scale modeling.
Apart from these, we also verify the importance of the pre-training of PENet in our method.
Finally, we confirm the reliability of the prediction of PENet.
\subsubsection{Influence of the Number of PFCs}
\label{sec:number_of_persp_convs}
Table~\ref{table:differnet_modules}
shows the performance of our network when replacing dilated convolutions in CSRNet* with our proposed PFCs, as Fig.~\ref{fig:PFDNet} shows.
We know that CSRNet* is built upon VGG16-BN backbone with six dilated convolutions stacked afterward, and finally ends with a normal convolution to output density map prediction.
We validate the effectiveness of our method by replacing dilated convolution in CSRNet* with PFC layer by layer, in the order from top to bottom.
The performance increases with the number of applied PFCs, from 65.1 and 9.8 MAE as the baseline to peak values 53.8 and 6.5 MAE with six PFCs on Part A and Part B, respectively.
Fig.~\ref{fig:mul_pfc} demonstrates the predicted density maps when applied several PFCs.
It is seen that density maps are gradually turning to be more accurate on either small scales or large ones.
Here, we need to make two clarifications.
i) Better performance may be achieved when extra PFCs are applied and fine parameter-tuning is adopted, however, exploring additional PFCs is unfair in comparison with the original CSRNet*.
Therefore, we do not exploit more PFCs.
ii) Intuitively, our PFC is also able to substitute normal convolution layer which can be regarded as a special type of dilated convolution with dilation rate $1$.
Whereas, when we replace all convolutions in CSRNet* with our PFCs, we do not obtain continuous performance improvements over different datasets.
To be precise, performances of ShanghaiTech A / B turn out to be $55.4$ / $7.1$ MAE.
There exist two main reasons for the degradation.
Firstly, we do not conduct experiments on substituting normal convolutions layer by layer, which requires massive computation.
Thus, the optimal number of normal convolutions to be replaced with PFCs are not fully searched.
Secondly, we do not train our PFDNet in an incremental scheme, as it is quite complicated, though such training strategy usually leads to better performance.
Instead, the parameters in PFCs are initialized with the same setting and backbone is initialized with VGG16-BN as described in Sec.~\ref{sec:training_details}.
Based on these observations, we construct our final network as the architecture that all six dilated convolutions in CSRNet* are replaced with our proposed PFCs, resulting in $70$ ms total time cost for a $1024 \times 768$ image in testing.
\begin{table}[!ht]
\begin{center}
\scriptsize
\caption{Influence of the number of stacked PFCs in our method on ShanghaiTech dataset.}
\label{table:differnet_modules}
\resizebox{0.8\hsize}{!}{
\begin{tabular}{ c | c c |c c}
\toprule
\multirow{2}{*}{\# of PFCs} & \multicolumn{2}{c|}{Part A} & \multicolumn{2}{c}{Part B} \\
\cline{2-5}
& MAE & RMSE & MAE & RMSE \\
\hline
0 & 65.1 & 112.4 & 9.8 & 15.2 \\
1 & 63.3 & 106.6 & 8.6 & 13.9 \\
2 & 60.4 & 100.3 & 7.9 & 13.3 \\
3 & 57.8 & 96.8 & 7.5 & 12.4 \\
4 & 56.2 & 92.1 & 7.1 & 11.5 \\
5 & 54.4 & 90.5 & 6.7 & 11.1 \\
6 & \textbf{53.8} & \textbf{89.2} & \textbf{6.5} & \textbf{10.7} \\
\bottomrule
\end{tabular}
}
\end{center}
\end{table}
\begin{figure}[!t]
\centering
\includegraphics[width=0.47\textwidth]{./fig/fig_mul_pfc/multi_PFNet.pdf}
\scriptsize
\caption{Density maps predicted by replacing different numbers of dilated convolutions with our PFCs. CSRNet* is the baseline and is equivalent to the situation of `\#PFC = 0'.}
\label{fig:mul_pfc}
\end{figure}
\subsubsection{Extensibility to Another Backbone}
\label{ResNet_with_PFC_blocks}
In order to verify the extensibility of our PFC, we build a new baseline that consists of a truncated ResNet-50~\cite{he2016deep} with the first $22$ convolutional layers, four dilated convolutions (with dilation rate $2$ and $512$, $256$, $128$, $64$ channels respectively) and a normal convolution that aims to reduce the channel dimension to $1$.
Table~\ref{table:res_pfc}
shows the comparison results on ShanghaiTech Part A / B, where \emph{ResNet-50 (backbone)} is the backbone itself, and \emph{ResNet-50 (partly PFC)} only replaces the four dilated convolutions with our PFCs and \emph{ResNet-50 (fully PFC)} replaces all convolutions with PFCs.
All models are trained for $300$ epochs with the first $22$ convolutional layers initialized by pre-trained weights on ImageNet~\cite{deng2009imagenet}.
For \emph{ResNet-50 (backbone)}, we get $89.5 / 18.6$ MAE on ShanghaiTech Part A / B.
When we replace all dilated convolutions with PFCs, a significant performance gain of $13.1 / 5.9$ MAE on ShanghaiTech Part A / B.
Besides, if all normal convolutions are also be replaced by PFCs, we observe further gain of $2.3 / 1.5$ MAE.
This indicates that PFC is not only a superior alternative to dilation convolution and even has the potential to substitute normal convolution.
Such observations validate the effectiveness and extensibility of the PFC on another backbone.
\begin{table}[!ht]
\begin{center}
\scriptsize
\caption{Comparisons on the ResNet-50 backbone.}
\label{table:res_pfc}
\resizebox{0.95\hsize}{!}{
\begin{tabular}{ c | c c | c c}
\toprule
\multirow{2}{*}{Method} & \multicolumn{2}{c|}{Part A} & \multicolumn{2}{c}{Part B} \\
& MAE & RMSE & MAE & RMSE \\
\hline
ResNet-50 (backbone) & 89.5 & 163.2 & 18.6 & 26.6 \\
ResNet-50 (partly PFC) & 76.4 & 145.3 & 12.7 & 19.2 \\
ResNet-50 (fully PFC) & \textbf{74.1} & \textbf{140.5} & \textbf{11.2} & \textbf{16.8} \\
\bottomrule
\end{tabular}
}
\end{center}
\end{table}
\subsubsection{Necessity of Spatially Variant Receptive Fields}
\label{sec:ness_receptive_fields}
In this section, we conduct an experiment to validate the vital importance of spatially variant dilation rate guided by perspective maps.
Specifically, we average the perspective map of each image, and use the mean perspective maps to replace the original ones.
Then, we train our PFDNet with the mean perspective maps and name the trained model as \textit{Ours (mean perspective map)}.
In Table~\ref{table:different_rate_maps},
\textit{Ours (mean perspective map)} performs much worse than \textit{Ours (original perspective map)} does.
It verifies that adaptive receptive allocation is essential for estimating accurate pedestrian counts.
Although the severe performance degradation it suffers when we adopt mean perspective map for each image, it still slightly outperforms CSRNet*.
In fact, \textit{Ours (mean perspective map)} can be taken as a weaken version of PFDNet, in which dynamic receptive fields allocation is only performed among images instead of among pixels.
\begin{table}[!ht]
\begin{center}
\scriptsize
\caption{Comparisons on different dilation rate maps.}
\label{table:different_rate_maps}
\resizebox{0.95\hsize}{!}{
\begin{tabular}{ c | c c | c c}
\toprule
\multirow{2}{*}{Method} & \multicolumn{2}{c|}{Part A} & \multicolumn{2}{c}{Part B} \\
\cline{2-5}
& MAE & RMSE & MAE & RMSE \\
\hline
Ours (original perspective map) & \textbf{53.8} & \textbf{89.2} & \textbf{6.5} & \textbf{10.7} \\
%
Ours (mean perspective map) & 63.7 & 104.8 & 9.0 & 14.3 \\
CSRNet* & 65.1 & 112.4 & 9.8 & 15.2 \\
\bottomrule
\end{tabular}
}
\end{center}
\end{table}
\subsubsection{Visualization of Dilation Rate Maps}
\label{sec:visual_rate_map}
In order to have a deeper understanding of PFC layer, we further visualize the dilation maps of different PFC layers in our PFDNet.
Fig.~\ref{fig:dilation_rate}(c) shows the dilation rate maps of the first PFC (the $1$-st PFC layer, in a top to bottom order) and Fig.~\ref{fig:dilation_rate}(d) demonstrates the last (the $6$-th PFC layer, in the same order) PFC layer in our PFDNet.
Obviously, in different PFC layers, the dilation maps are different due to the learnable parameters of $\alpha$, $\beta$, $\gamma$ and $\theta$.
Besides, for the same position, the value in Fig.~\ref{fig:dilation_rate}(c) tends to be smaller than that in Fig.~\ref{fig:dilation_rate}(d).
This accords with the fact: For the same scale of a head, when the region can be covered by a fractional dilation convolution with small dilation rate in the top layer (\textit{i}.\textit{e}., here is the $1$-st PFC layer in a top to bottom order), then for the lower layer (\textit{i}.\textit{e}., here is the $6$-th PFC layer in a top to bottom order), we need a fractional dilation convolution with larger dilation rate to cover the region.
Finally, we show the receptive fields of two heads with small red balls in (a), it can be seen that the receptive fields basically fit the scales of heads, which indicates the rationale of PFC layer.
\begin{figure}[!h]
\centering
\includegraphics[width=0.5\textwidth]{./fig/dilation_rate.pdf}
\scriptsize
\caption{Visualization of dilation rate maps of different PFC layers in our PFDNet. (a) is the input image, (b) is the perspective map. (c) and (d) are dilation rate maps of the first PFC (the $1$-st PFC layer, in a top to bottom order) and the last (the $6$-th PFC layer, in the same order) PFC, respectively.}
\label{fig:dilation_rate}
\end{figure}
\subsubsection{Comparison with Deformable Convolution}
\label{sec:compare_with_deform}
Intuitively, deformable convolution~\cite{dai2017deformable} learns to allocate adaptive receptive field via enabling the offsets on the sampling positions.
Thus, we conduct an experiment by replacing normal dilated convolution in CSRNet* with deformable convolution~\cite{dai2017deformable} layer by layer, in the order from top to bottom, All the settings are kept the the same as those described in Sec.~\ref{sec:number_of_persp_convs}.
We term this network CSRNet*(DeConv).
Table~\ref{table:pfc_vs_deform} shows the performance comparison on ShanghaiTech dataset.
It is seen that when all the six dilated convolutions are replaced by deformable convolutions, CSRNet*(DeConv) delivers the best performance with MAE $56.7 / 7.6$ on ShanghaiTech A / B, respectively, however, still inferior to our PFDNet with the margin of $2.9 / 1.1$ MAE.
This indicates the superiority of our PFC against deformable convolution.
Furthermore, in Fig.~\ref{fig:deformable}, we visualize the sampling positions of PFC and deformable convolution.
Concretely, we show two typical cases.
In the region surrounded by white dashed lines, it is observed that the layout of sampling positions is approximately in the shape of a square, resulting in a roughly Gaussian-like blob in Fig.~\ref{fig:deformable}(e).
In the area marked with orange dashed lines, two heads are too close and the corresponding two groups of offsets mix with each other, leading to inadequate feature aggregation and unsatisfying prediction in Fig.~\ref{fig:deformable}(e).
While, for our PFC shown in Fig.~\ref{fig:deformable}(f), as guided by the prior of the perspective map, it can be seen that the sampling positions fall uniformly in an appropriate square in the head, leading to much more accurate and clear estimation in both cases.
\begin{table}[!ht]
\begin{center}
\caption{Comparison of PFC with deformable convolution on ShanghaiTech dataset.}
\resizebox{0.95\hsize}{!}{
\label{table:pfc_vs_deform}
\begin{tabular}{ c | c c |c c}
\toprule
\multirow{2}{*}{\# of PFCs / DeConvs} & \multicolumn{2}{c|}{Part A} & \multicolumn{2}{c}{Part B} \\
\cline{2-5}
& PFC & DeConv~\cite{dai2017deformable} & PFC & DeConv~\cite{dai2017deformable} \\
\hline
0 & 65.1 & 65.1 & 9.8 & 9.8 \\
1 & 63.3 & 62.6 & 8.6 & 9.2 \\
2 & 60.4 & 60.3 & 7.9 & 8.7 \\
3 & 57.8 & 58.4 & 7.5 & 8.3 \\
4 & 56.2 & 57.8 & 7.1 & 8.0 \\
5 & 54.4 & 57.1 & 6.7 & 7.7 \\
6 & \textbf{53.8} & 56.7 & \textbf{6.5} & 7.6 \\
\bottomrule
\end{tabular}
}
\end{center}
\end{table}
\begin{figure}[!h]
\centering
\includegraphics[width=0.5\textwidth]{./fig/deform_cropped.pdf}
\scriptsize
\caption{Visualization of sampling locations of deformable convolution and PFDNet. (a) is the input image, (b) and (c) are input image with some sampling positions. (d),(e),(f) are the density maps of ground-truth, CSRNet*(DeConv) and PFDNet. It is seen that PFDNet surpasses CSRNet*(DeConv) in estimating more accurate counts and more reasonable sampling postions.}
\label{fig:deformable}
\end{figure}
\subsubsection{Importance of PENet Pre-training}
\label{sec:Importance_of_pre-training}
The pre-training of PENet makes the decoder part a robust perspective map constructor.
By doing so, \textit{Ours B} can recover a roughly satisfying perspective estimation as shown in Fig.~\ref{fig:mul_stage}.
In this section, we validate the necessity the pre-training of PENet.
To this end, we conduct two experiments without pre-training of PENet on UCF\_CC\_50~\cite{idrees2013multi} and TRANCOS~\cite{guerrero2015extremely}.
As shown in Table~\ref{table:PENet_pretraining},
the results with PENet pre-training significantly outperform those without pre-training.
Such performance margin is attributed to the confusing guidance of PENet, since without pre-training, we observe that the output of PENet is still messy even after considerable epochs of training.
\begin{table}[!ht]
\begin{center}
\scriptsize
\caption{The performances with / without pre-training of PENet on UCF\_CC\_50~\cite{idrees2013multi} and TRANCOS~\cite{guerrero2015extremely}.}
\label{table:PENet_pretraining}
\resizebox{0.95\hsize}{!}{
\begin{tabular}{ c| c c| c}
\toprule
\multirow{2}{*}{Method} & \multicolumn{2}{c|}{UCF\_CC\_50} &
TRANCOS \\
\cline{2-4}
& MAE & RMSE & GAME 0 \\
\hline
PENet(w/ pre-training) & \textbf{205.8} & \textbf{289.3} & \textbf{3.06} \\
PENet(w/o pre-training) & 264.8 & 383.5 & 5.28 \\
\bottomrule
\end{tabular}
}
\end{center}
\end{table}
\subsubsection{Reliability of PENet Prediction}
\label{sec:Reliability_of_PENet}
PENet is designed as a compromise of the situation that perspective annotations are unavailable, in which the reliability of PENet is crucial.
Therefore, we conduct an experiment to confirm the feasibility of PENet.
Table~\ref{table:reliablity_of_PENet}
demonstrates the comparisons of adopting the ground-truth or the estimated perspective map
as the guidance of PFC on ShanghaiTech Part A/B and WorldExpo'10.
MAEs are respectively $55.0$, $7.5$ and $7.3$, with a small decrease of $1.2$, $1.0$ and $0.5$, respectively.
This indicates that PENet is competent to a reasonable perspective map estimator.
\begin{table}[!ht]
\begin{center}
\caption{Different guidances of PFC on ShanghaiTech Part A/B and WorldExpo'10.}
\label{table:reliablity_of_PENet}
\resizebox{1\hsize}{!}{
\begin{tabular}{c | c | c }
\toprule
Perspective Map & ShanghaiTech Part A/B & WorldExpo'10 \\
\hline
Estimated & 55.0/7.5 & 7.3 \\
\hline
Ground-truth & \textbf{53.8}/\textbf{6.5} & \textbf{6.8} \\
\bottomrule
\end{tabular}
}
\end{center}
\end{table}
\section{Conclusion}
\label{sec:conclusion}
In this paper, we have presented a perspective-guided fractional-dilation convolutional network (PFDNet) for crowd counting.
The key idea of PFDNet is the perspective-guided fractional-dilation convolution, which plays a role as an insertable module that successfully handles the continuous intra-scene scale variation issue under the guidance of perspective map annotations.
We have also proposed a perspective estimation branch as well as its learning strategy, which is incorporated into our method to form an end-to-end trainable network, even without perspective map annotations.
Experiments on five benchmark datasets have shown the superiority of our PFDNet against the state-of-the-arts.
\section*{Acknowledgment}
This project is partially supported by the National Natural Scientific Foundation of China (NSFC) under Grant No.s U19A2073 and 61872118.
\ifCLASSOPTIONcaptionsoff
\newpage
\fi
\bibliographystyle{IEEEtran}
|
\section{Introduction}\label{sec:intro}
Potential theory on curves over a field $K$
complete
with respect to a non-archimedean absolute value $|\cdot|$ has made substantial progress in recent years. Fundamental developments can be found in \cite{Rumely89}, \cite{FJbook}, \cite{BR10} and \cite{ThuillierThesis}. Nevertheless, some topics have been left unexplored, for instance extremal subharmonic functions associated with compact subsets. Such functions are well known in classical potential and pluripotential theory in $\mathbb{C}^N, \ N \geq 1$. Recall that in $\mathbb{C}$ (with the standard, archimedean absolute value) the Green function with pole at infinity of a compact subset $E$ can be proved to be equal to the so-called Leja extremal function (see \cite{Leja34}, \cite{Leja45}, \cite{Gorski48}). In $\mathbb{C}^N, \ N>1$, an analogous extremal function (Siciak-Zaharjuta extremal function, \cite{Siciak62}, \cite{Za77}, \cite{Siciak81}), with plurisubharmonic functions replacing subharmonic ones, serves a multivariate counterpart to the Green function. In this article we will work on the Berkovich projective line $\mathsf{P}^1$ over an algebraically closed complete $K$. We will fix a point $\zeta \in \mathsf{P}^1$ (not necessarily equal to $\infty$) and define a class of subharmonic functions on $\mathsf{P}^1 \setminus \{\zeta\}$ with suitable behavior near $\zeta$. The supremum $Q_E$ of this class can be treated as a non-archimedean analogue of the Leja-Siciak-Zaharjuta extremal function. We will further show that the Green function relative to a point $\zeta$ of a compact subset of $\mathsf{P}^1 \setminus \{\zeta\}$ of positive capacity (see subsection \ref{sec: Green} for definitions) equals the upper semicontinuous regularization $Q_E^*$ of $Q_E$. Our approach is analytic and topological rather than geometric. In particular, we do not appeal to available results in the (already rich) non-archimedean pluripotential theory. \\
The paper is organized as follows: Throughout, we provide proofs only for statements that are new in the non-archimedean setting. When we explicilty state known results (without proofs), we do so for convenient reference. In Section \ref{sec: foundations} we gather the necessary background in potential theory on the Berkovich projective line, although we do not always present all details. So this section is mainly a survey, but a few results therein are new in the non-archimedean setting (or at least not explicitly stated in the existing literature). Our first major result is the Brelot-Cartan principle (Theorem \ref{prop: Cartanprinciple}), proved in Section \ref{sec: Cartan}. In the proof of this principle we use the Choquet topological lemma, which requires the underlying topological space to be Hausdorff and second countable. So we assume the existence of a countable base of open sets for the Berkovich topology on $\mathsf{P}^1$, which is anyway compact, and hence Hausdorff. The second countability assumption is only made in this section and is not necessary for other results in our paper (which do not rely on the non-archimedean Brelot-Cartan principle, either). In Section \ref{sec: extremal} we fix a point $\zeta \in \mathsf{P}^1$ (not necessarily equal to $\infty$) and, for a set $E$ such that $\overline{E} \subset \mathsf{P}^1 \setminus \{\zeta\}$, we define a suitable class of subharmonic functions on $\mathsf{P}^1 \setminus \{\zeta\}$ (an analog of the Lelong class) and then study properties of its supremum $Q_E$. This function is a non-archimedean analogue of the Leja-Siciak-Zaharjuta extremal function; we prove several results that justify this analogy. \\
Our main result is the equality between the upper semicontinuous regularization $Q_E^*$ of $Q_E$ and the Green function for $E$ relative to $\zeta$ when $E$ has positive capacity. In Subsection \ref{sec: classical}, we compare the non-archimedean case with the (one-dimensional, complex) classical case. This comparison also has a survey character, with some historical notes. As a new insight, we point out that a proof of the equality between the upper semicontinuous regularization of the Siciak-Zaharjuta function and the Green function can be obtained in the same way as in our non-archimedean proof, instead of relying on separate identities of these two functions with the Leja extremal function.
\section{Foundations of potential theory on the Berkovich projective line} \label{sec: foundations}
This section recalls background notions and results developed by other researchers in potential theory on the Berkovich projective line (following mostly \cite{BR10}), and so it can be skipped by readers familiar with the material. However, Proposition \ref{prop: harmlocunifbound} is a new result in the Berkovich setting.
\subsection{Berkovich projective line as a topological space}
Let $K$ be an algebraically closed field
(possibly of characteristic $>0$) that is complete
with respect to a non-trivial and non-archimedean absolute value $|\cdot|$.
The Berkovich projective line $\mathsf{P}^1=\mathsf{P}^1(K)$ is
the Berkovich analytification of the (classical) projective line
$\mathbb{P}^1=\mathbb{P}^1(K)=K\cup\{\infty\}$. Each point in $\mathsf{P}^1$ corresponds to an equivalence class of multiplicative seminorms on the polynomial ring $K[X,Y]$ extending the absolute value $|\cdot|$.
The Berkovich upper half space
is $\mathsf{H}^1=\mathsf{H}^1(K):=\mathsf{P}^1\setminus\mathbb{P}^1$. Taking into account the correspondences between points, seminorms and sequences of disks, the points in $\mathsf{P}^1$ can be further classified into four types, with $\mathbb{P}^1$ being the set of all points of type I. For some fields $K$ the set of points of type IV in $\mathsf{P}^1(K)$ may be empty. For further details see Chapter 2 of \cite{BR10}, or \cite{Jonsson15}. \\
We will work only with the Berkovich topology on the Berkovich projective line (also called the weak topology). A basis for this topology is given in Proposition 2.7 in \cite{BR10}, while neighborhood bases for the four types of points are described in the discussion after Lemma 2.28 in that book. It follows that $\mathsf{P}^1$ with the Berkovich topology is locally connected. In particular, the connected components of open sets are open. We will use this property several times in this paper. Also, $\mathsf{P}^1$ with the Berkovich topology is uniquely arcwise connected (\cite{BR10}, Lemma 2.10).\\
Potential theory on the Berkovich projective line makes extensive use of the tree structure on $\mathsf{P}^1$. We will not present here the definition or general properties of this tree structure, even though it enters the formulation of some definitions and results we need. For details, we refer the reader to \cite{BR10} or \cite{Jonsson15}.
\begin{definition}
(i) (cf. p. 39, \cite{BR10}) Let $\{\zeta_1,...,\zeta_n\} \subset \mathsf{H}^1$ be a finite set of points. The finite subgraph with endpoints $\{\zeta_1,...,\zeta_n\}$ is the intersection of all subtrees of $\mathsf{P}^1$ containing the set $\{\zeta_1,...,\zeta_n\}$.\\
(ii) (cf. Definition 2.27, \cite{BR10}) A simple domain is a domain $U \subset \mathsf{P}^1$ such that $\partial U$ is a nonempty finite set $\{\zeta_1,...,\zeta_n\} \subset \mathsf{H}^1$, where each $\zeta_i$ is of type II or III.
\end{definition}
\begin{proposition} (Corollary 7.11, \cite{BR10}): \label{prop: exhaustion} If $U \subsetneq \mathsf{P}^1$ is a domain, then $U$ can be exhausted by a sequence $V_1 \subset V_2\subset ...$ of strict simple domains (i.e., simple domains with boundary points all of type II) such that $\overline{V_n} \subset V_{n+1}$ for all $n$.
\end{proposition}
Although the Berkovich topology on $\mathsf{P}^1$ is not metrizable in general, an analog of the chordal metric plays an important role in the potential theory. Namely,
the spherical kernel, or the Hsia kernel $[x,y]_g$ on $\mathsf{P}^1$ with respect to the Gauss point $g$ (a distinguished point in the Berkovich unit disk)
is the unique upper semicontinuous and separately continuous extension to $\mathsf{P}^1\times\mathsf{P}^1$
of the chordal metric
\[
[z,w] = \frac{|x_1y_2-x_2y_1|}{\max\{|x_1|,|y_1|\} \max\{|x_2|,|y_2|\}}
\]
defined for $z=(x_1 :y_1), w=(x_2:y_2)$ in $\mathbb{P}^1\times\mathbb{P}^1$. More generally, for each $\zeta\in\mathsf{P}^1$,
the generalized Hsia kernel on $\mathsf{P}^1$ with respect to $\zeta$ is defined as
\begin{gather*}
[x,y]_{\zeta}:=[x,y]_g/([x,\zeta]_g[y,\zeta]_g)\quad\text{on }\mathsf{P}^1\times\mathsf{P}^1.
\end{gather*}
Note that the kernel function
$[x,y]_{\zeta}$ satisfies the strong triangle inequality
\begin{gather*}
[x,y]_{\zeta}\le\max\bigl\{[x,z]_{\zeta},[z,y]_{\zeta}\bigr\}
\quad\text{for any }x,y,z\in \mathsf{P}^1.
\end{gather*}
Let us fix a $\zeta\in\mathsf{P}^1$. The generalized spherical kernel $[\cdot,\cdot]= [\cdot,\cdot]_{\zeta}$ has the following properties: (cf. \S 4.3 in \cite{BR10}): (i) $0 \leq [x,y] \leq 1$ (Formula 4.19)\\
(ii) (Proposition 4.7 (A), \cite{BR10}) $[\cdot,\cdot]$ is continuous on the complement of the diagonal and at every $(x,x) \in \mathbb{P}^1\times \mathbb{P}^1$;\\
(iii) (Proposition 4.7 (D), \cite{BR10}) For each $a \in \mathsf{P}^1$ and $r \in \mathbb{R}$, the closed ball $\mathcal{B}(a,r):=\{x \in \mathsf{P}^1: [x,a]\leq r\}$ is connected and closed in the Berkovich topology. It is empty if $r < [a,a]$ and coincides with $\mathcal{B}(b,r)$ for some $b \in \mathbb{P}^1$ if $r >[a,a] =: {\rm diam }(a)$ or if $r= {\rm diam }(a)$ and $a$ is of type II or III. If $r= {\rm diam }(a)$ and $a$ is of type I or IV, then $\mathcal{B}(a,r)=\{a\}$.\\
Finally, for an arbitrary function $f: \mathsf{P}^1 \to \mathbb{R}$ we define its upper semicontinuous regularization as $f^*(z):= \limsup_{y \to z} f(y)$.
\subsection{Subharmonic functions}\label{sec: sh} In this subsection we recall the basics on harmonic and subharmonic functions on the Berkovich projective line. We need to introduce the Laplacian on $\mathsf{P}^1$, but the available definitions are all quite involved, so we will only outline the theory, mostly following \cite{BR10}. \\
Let $\Gamma$ be a finite subgraph in $\mathsf{P}^1$ (viewed as a metric graph with the path distance $\rho$ on $\mathsf{P}^1$; see Section 2.7 in \cite{BR10} for the definition of $\rho$).
\begin{definition} (see Section 3.2 in \cite{BR10})
A function $f: \Gamma \to \mathbb{R}$ is piecewise affine on $\Gamma$ if there is a set $S_f \subset \Gamma$ such that (i) $\Gamma \setminus S_f$ is a union of intervals, each of which has two distinct endpoints in $\Gamma$ and (ii) $f$ is affine on each interval in $\Gamma \setminus S_f$ with respect to its arclength parametrization. By $CPA(\Gamma)$ we denote the class of continuous, piecewise affine real-valued functions on $\Gamma$.
\end{definition}
For a point $x \in \mathsf{P}^1$ the set $\mathsf{P}^1 \setminus \{x\}$ does not have to be connected. The connected components of $\mathsf{P}^1 \setminus \{x\}$ can be identified with the tangent directions $\vec{v} \in T_x$ at $x$, defined as certain equivalence classes of paths emanating from $x$ (see Appendix B of \cite{BR10} and the end of Section 3.1 in \cite{BR10}). For any function $f \in CPA(\Gamma)$, any $p \in \Gamma$ and any tangent direction $\vec{v}$ to $\Gamma$ at $p$, the directional derivative $d_{\vec{v}}f(p):=\lim_{t \to 0^+}\frac{f(\gamma(t))-f(p))}{t}$, where $\gamma$ is a representative path emanating from $p$, exists and is finite. \\
The Laplacian $\Delta$ is first defined for $f \in CPA(\Gamma)$, as
\[
\Delta(f):=-\sum_{p \in \Gamma}\biggl (\sum_{\vec{v}\in T_p(\Gamma)} d_{\vec{v}}f(p) \biggr )\delta_p,
\]
where $\delta_p$ denotes the Dirac measure at $p$. Then the class of functions $BDV (\Gamma)$ is defined (see Section 3.5 in \cite{BR10}) and the Laplacian $\Delta_\Gamma(f)$ is defined for $f \in BDV (\Gamma)$ (Theorem 3.6 in \cite{BR10}) extending the operator $\Delta$. That is, $\Delta_\Gamma(f) =\Delta(f)$ when $f \in CPA(\Gamma) (\subset BDV (\Gamma)).$\\
Let $U \subset \mathsf{P}^1$ be a domain. Using the natural retraction maps $r_{\overline{U},\Gamma}$ for each finite subgraph $\Gamma \subset U$ (see Section 2.5 in \cite{BR10}), the Laplacian is extended to $\Delta_{\overline{U}}(f)$ for functions $f$ in the class $BDV(U)$ (for the precise definitions, see Definitions 5.11 and 5.15 in \cite{BR10}). Each such $\Delta_{\overline{U}}(f)$ is a finite signed Borel measure on $\overline{U}$. One further defines $\Delta_U(f):=\Delta_{\overline{U}}(f)|_U$ and $\Delta_{\partial U}(f):=\Delta_{\overline{U}}(f)|_{\partial U}$ for $f \in BDV(U)$. \\
Example (Example 5.19, \cite{BR10}): Fix $\zeta \in \mathsf{P}^1$ and $y \neq \zeta$. Let $f(x):=-\log [x,y]_\zeta$. Then $f \in BDV(\mathsf{P}^1)$ and $\Delta_{\mathsf{P}^1}(f)=\delta_y(x)-\delta_\zeta(x)$.\\
Let $U$ be an open set in $\mathsf{P}^1$.
\begin{definition} (Definition 8.1, \cite{BR10}) (i) A function $f: U \to [-\infty,\infty)$ is subharmonic in $U$ if for each $x \in U$ there is a domain $V_x \subset U$ with $x \in V_x$ such that $f \in BDV(V_x)$, $\Delta_{V_x}(f) \leq 0$, $f$ is upper semicontinuous in $V_x$, and for each $z \in V_x \cap \mathbb{P}^1$, $f(z)=\limsup_{V_x \cap \mathsf{H}^1 \ni y \to z}f(y)$.\\
(ii) A function $f: U \to \mathbb{R}$ is harmonic in $U$ if and only if $f$ and $-f$ are subharmonic in $U$.
\end{definition}
Many properties of harmonic and subharmonic functions known from the classical potential theory hold also in the Berkovich setting. We now list those which will be used later in the paper.\\
\begin{proposition} (Maximum principle; Proposition 8.14 (B) in \cite{BR10}) \label{prop: maxprinciple} Let $U \subsetneq \mathsf{P}^1$ be a domain and let $f$ be a subharmonic function in $U$. Then, if $M \in \mathbb{R}$ is such that, for each $y \in \partial U$, $\limsup_{U \ni z \to y} f(z) \leq M$, then $f(z) \leq M$ for all $z \in U$.
\end{proposition}
\begin{proposition} (Proposition 8.26 (E) in \cite{BR10}) \label{prop: netsbounded} Let $U \subset \mathsf{P}^1$ be an open set and let $\langle f_\alpha\rangle_{\alpha \in A}$ be a net of subharmonic functions in $U$ which is locally uniformly bounded from above. Put $f(x)=\sup_{\alpha \in A} f_\alpha(x)$. Then $f^*$ is subharmonic in $U$ and $f^*(x)=f(x)$ for all $x \in U \cap \mathsf{H}^1$.
\end{proposition}
\begin{proposition} (Harnack's inequality; Lemma 8.33, \cite{BR10}) \label{prop: Harnackineq} Let $U \subset \mathsf{P}^1$ be a domain. then for each $x_0 \in U$ and each compact set $X \subset U$ there is a constant $C=C(x_0,X)$ such that for each function which is harmonic and nonnegative in $U$, each $x \in X$ satisfies
\[
(1/C)\cdot h(x_0) \leq h(x) \leq C \cdot h(x_0).
\]
\end{proposition}
The default topology on the set $SH(U)$ of subharmonic functions in a domain $U \subset \mathsf{P}^1$ is that of pointwise convergence on $U \cap \mathsf{H}^1$. The space $\mathcal{M}^+(U)$ of positive locally finite Borel measures on $U$ can be given the following topology: a net of measures $\langle \mu_\alpha\rangle_{\alpha \in A}$ in $\mathcal{M}^+(U)$ converges (weakly) to a measure $\mu \in \mathcal{M}^+(U)$ if and only if $\int f d\mu_\alpha \to \int f d\mu$ for all $f \in \mathcal{C}_c(U)$. Here $\mathcal{C}_c(U)$ is the space of all continuous functions $f: U \to \mathbb{R}$ for which there exists a compact subset $X_f \subset U$ such that $f|_{U\setminus X_f}\equiv 0$. The following continuity result will be used.
\begin{proposition} (Theorem 8.44, \cite{BR10}) \label{prop: contLaplacian} Let $SH(U)$ and $\mathcal{M}^+(U)$ be the topological spaces as described above. Then the operator $-\Delta_U: SH(U)\to \mathcal{M}^+(U)$ is continuous.
\end{proposition}
Here we also recall, in a general framework, a useful consequence of weak convergence.
\begin{proposition} \label{prop: weakconv} (cf. Formula (5.1.15) in \cite{AGS} for sequences of positive Radon measures in metric spaces) Let $X$ be a locally compact Hausdorff space, $f$ be a nonnegative lower semicontinuous function on $X$, and $\langle \mu_\alpha\rangle_{\alpha \in A}$ be a net of positive Radon measures on $X$ converging weakly to a positive Radon measure $\mu$ on $X$. Then
\[
\liminf_\alpha \int f d\mu_\alpha \geq \int fd\mu.
\]
\end{proposition}
\begin{proof} By Proposition A.3 in \cite{BR10},
\[
\int f d\mu =\sup \bigl \{\int g d\mu: \ g \in \mathcal{C}_c(X), \ 0 \leq g \leq f \bigr \},
\]
where the class $\mathcal{C}_c$ is defined as above. Then
\begin{multline*}
\liminf_\alpha \int f d\mu_\alpha \geq \sup_{g \in \mathcal{C}_c(X), 0 \leq g \leq f} \liminf_\alpha \int g d\mu_\alpha = \\ \sup_{g \in \mathcal{C}_c(X), 0 \leq g \leq f} \int g d\mu = \int f d\mu .
\end{multline*}
\end{proof}
In the literature on subharmonic functions in the Euclidean space various (related) results are referred to as a ``Hartogs lemma''. Some of them have their non-archimedean counterparts.
\begin{proposition} (Proposition 8.54 in \cite{BR10}) \label{prop: Hartogs} Let $U \subset \mathsf{P}^1$ be a domain and let $\{g_n\}$ be a sequence of functions subharmonic in $U$. Suppose that the functions $g_n$ are uniformly bounded from above in $U$. Then one of the following holds: \\
(i) there is a subsequence $\{g_{n_k}\}$ which converges uniformly to $-\infty$ on each compact subset of $U$, or
(ii) there is a subsequence $\{g_{n_k}\}$ and a function $G$ subharmonic in $U$ such that $g_{n_k}$ converge pointwise to $G$ in $U \cap \mathsf{H}^1$ and such that for each continuous function $f:U \to \mathbb{R}$ and each compact subset $X \subset U$,
\[
\limsup_{k \to \infty} \bigl( \sup_{z \in X} (g_{n_k}(z)-f(z))\bigr) \leq \sup_{z\in X}(G(z)-f(z)).
\]
\end{proposition}
\begin{coro} (cf. Theorem 1.31 and Corollary 1.32 in \cite{LG86} in the Euclidean case; see also \cite{Klimek91}, Theorem 2.6.4)) \label{coro: littleHartogs} Let $U \subset \mathsf{P}^1$ be a domain and let $\{g_n\}$ be a sequence of functions subharmonic in $U$ uniformly bounded from above in $U$. Suppose (possibly after passing to a subsequence) that $g_n$ converge pointwise on $U \cap \mathsf{H}^1$ to a function $G$ subharmonic in $U$. \\
(i) Suppose further that for some compact set $X \subset U$ there is a constant $C=C(X)$ such that $(\limsup_{n \to \infty}g_n(x))^* \leq C$ on $X$. Then for every $\varepsilon >0$ there is an $n_0=n_0(\varepsilon,X)$ such that for every $n \geq n_0$ and every $x \in X$ we have $g_n(x) \leq C+\varepsilon$.
(ii) More generally, under the above asumptions, let $F$ be a function continuous on $X$ such that $(\limsup_{n \to \infty}g_n(x))^* \leq F(x)$ on $X$. Then for every $\varepsilon >0$ there is an $n_0=n_0(\varepsilon,X)$ such that for every $n \geq n_0$ and every $x \in X$ we have $g_n(x) \leq F(x) +\varepsilon$.
\end{coro}
\begin{proof} For (i), let $c_n:=\sup_{z \in X}g_n(z)$ and let $\varepsilon >0$. By the inequality from part (ii) of Proposition \ref{prop: Hartogs}, $(\limsup_{n \to \infty}g_n(x))^* \leq C$ on $X$ with $C:=sup_{z \in X}G(z)$. Take an $n_0$ such that for every $n \geq n_0$, $c_n \leq \limsup_{n \to \infty}c_n +\varepsilon$. Then $c_n \leq C+\varepsilon$. Part (ii) follows from (i) by observing that $F$ is uniformly continuous on $X$ (taking into account the unique uniform structure on $\mathsf{P}^1$ compatible with the Berkovich topology; see Appendix A.9, \cite{BR10}).
\end{proof}
Here are some results on convergence of harmonic functions in open subsets of $\mathsf{P}^1$.
\begin{proposition} (Proposition 7.31, \cite{BR10}) \label{prop: harmconv} Let $U$ be an open subset of $\mathsf{P}^1$. Suppose $f_1,f_2,...$ are harmonic on $U$ and converge pointwise to a function $f: U \to \mathbb{R}$. Then $f$ is harmonic in $U$ and the $f_i$ converge uniformly to $f$ on compact subsets of $U$.
\end{proposition}
Proposition 7.34 in \cite{BR10} gives a non-archimedean Harnack principle for a sequence $0 \leq h_1 \leq h_2 \leq ...$ of harmonic functions on a domain $\Omega \subset \mathsf{P}^1$. Theorem 4.7.2 in \cite{Wanner2016} is slightly more general, since it does not require the sequence to be non-negative. A similar result is Proposition 3.1.2 in \cite{ThuillierThesis}, while Proposition 3.1.3 and Corollary 3.3.10 in \cite{ThuillierThesis} are equicontinuity results for locally uniformly bounded families of harmonic functions. Here we offer an even more general variant of the Harnack principle, for a family $\mathcal{F}$ of harmonic functions on a domain $\Omega \subset \mathsf{P}^1$ that is locally uniformly bounded from below in $\Omega$ but not necessarily uniformly bounded from below in $\Omega$, countable or increasing. This is a new result in the non-archimedean setting.
\begin{proposition} (cf. \cite{AG}, Theorem 1.5.11 in the classical case) \label{prop: harmlocunifbound} Let $\Omega \subset \mathsf{P}^1$ be a domain and let $\mathcal{F}$ be a family of harmonic functions on $\Omega$ which is locally uniformly bounded from below. Then either $\sup \mathcal{F} \equiv +\infty$ in $\Omega$ or $\mathcal{F}$ is uniformly bounded and uniformly equicontinuous on every compact subset $E \subset \Omega$.
\end{proposition}
\begin{proof} If $\sup \mathcal{F} \not \equiv +\infty$, then we can fix an $x_0 \in \Omega$ such that $\sup \mathcal{F}(x_0)< +\infty$. Let $E \subset \Omega$ be a compact set and let $V \subset \mathsf{P}^1$ be a domain such that $E \cup \{x_0\} \subset V \subset \overline{V} \subset \Omega$. The family $\mathcal{F}$ is uniformly bounded from below on $\overline{V}$, so without loss of generality we can assume that all functions in $\mathcal{F}$ are positive on $V$. By Proposition \ref{prop: Harnackineq}, there is a constant $C=C(E,x_0)$ such that, for every $f \in \mathcal{F}$ and every $x \in E$, $0 < f(x) < C < +\infty$. Hence $\mathcal{F}$ is uniformly bounded on $E$. Further, the right side of the inequality in Proposition \ref{prop: Harnackineq} is the same as Axiom $\mathrm{III}_2$ of \cite{LW65}. By the Theorem of \cite{LW65}, the family $\mathcal{F}$ of positive functions is equicontinuous in a compact neighborhood of $x_0$.
\end{proof}
\subsection{The Green function}\label{sec: Green}
In this section, we fix the base $q >1$ of logarithms which occur in the definition of potentials. Typically this is done so that the absolute value $|\cdot|$ coincides with the modulus of the Haar measure on the additive group of $K$. When $K=\mathbb{C}_p$, $p$ prime, one takes $q=p$ (see Example 6.4 in \cite{BR10}).\\
\begin{definition} (\cite{BR10}, Section 6.3) Fix $\zeta \in \mathsf{P}^1$ and let $\nu$ be a positive measure on $\mathsf{P}^1$. The potential of $\nu$ with respect to $\zeta$ is the function
\[
u_\nu(x,\zeta)=\int -\log [x,y]_\zeta d\nu(y).
\]
\end{definition}
Remark (Example 8.8, \cite{BR10}): If $\nu$ is a probability measure on $\mathsf{P}^1$ and $\zeta \not \in {\rm supp }\ \nu$, then the potential $u_\nu(\cdot,\zeta)$ is strongly subharmonic in $\mathsf{P}^1 \setminus {\rm supp }\ \nu$, while $-u_\nu(\cdot,\zeta)$ is strongly subharmonic in $\mathsf{P}^1 \setminus \{\zeta\}$.
\begin{proposition}
(Theorem 8.38, \cite{BR10}: Riesz decomposition theorem) \label{prop: Riesz} Let $V$ be a simple subdomain of an open set $U \subset \mathsf{P}^1$. Fix $\zeta \in \mathsf{P}^1 \setminus \overline{V}$. Suppose $f$ is subharmonic in $U$
and let $\nu$ be the positive measure $\nu=-\Delta_V(f)$. Then there is a function $h_V$ which is continuous in $\overline{V}$, harmonic in $V$ and such that $f(z)=h_V(z)-u_\nu(z,\zeta)$ for all $z \in \overline{V}$.
\end{proposition}
Let now $E \subset \mathsf{P}^1$ be a compact subset such that $\zeta \not \in E$ and let $\nu$ is a probability measure with support contained in $E$. Following Section 6.1, \cite{BR10}, we define a few basic notions.
\begin{definition} The energy of $\nu$ with respect to $\zeta$ is
\[
I_\zeta(\nu)=\int_E u_\nu(x,\zeta) d\nu(x).
\]
\end{definition}
Varying $\nu$ over all probability measure with support in $E$ we further define
\begin{definition} The Robin constant of $E$ with respect to $\zeta$ is
\[
V_\zeta(E)=\inf_\nu I_\zeta(\nu)
\]
and the (logarithmic) capacity of $E$ is
\[
{\rm cap }_\zeta(E)=q^{-V_\zeta(E)}.
\]
\end{definition}
Remark: Unlike in the classical setting, there are finite subsets of Berkovich line with positive capacity: in fact, for every $a \in \mathsf{H}^1$ and $\zeta \neq a$, ${\rm cap }_\zeta(\{a\})={\rm diam}_\zeta(a) >0$.\\
Remark: Other capacitary notions can be defined for subsets of $\mathsf{P}^1$ (see Section 6.4 of \cite{BR10}). While they coincide for compact subsets (Theorem 6.24 in \cite{BR10}), they may differ for non-compact subsets (Remark 6.25 in \cite{BR10}).\\
\begin{proposition}\label{prop: countsum}
(Corollary 6.17, \cite{BR10}): Let $\{e_n\}_{n \in \mathbb{N}}$ be a countable collection of Borel subsets of $\mathsf{P}^1\setminus\{\zeta\}$ such that each $e_n$ has capacity $0$. Let $e=\bigcup_{n\in \mathbb{N}}e_n$. Then $e$ has capacity $0$.
\end{proposition}
If $E$ is compact and ${\rm cap }_\zeta(E)>0$, there is a (unique) probability measure $\mu_\zeta$ supported on $E$ for which $V_\zeta(E)=I_{\zeta}(\mu_\zeta)$ (Propositions 6.6 and 7.21 in \cite{BR10}).
\begin{definition}
The measure $\mu_\zeta$ is called the equilibrium measure of $E$ with respect to $\zeta$. If $\zeta \not \in E$, the Green function of $E$ with respect to $\zeta$ is
\[
G(z,\zeta,E):=V_\zeta(E)-u_{\mu_\zeta}(z,\zeta).
\]
\end{definition}
We recall here several known properties of the Green function of a compact set $E \subset \mathsf{P}^1\setminus\{\zeta\}$ with positive capacity. Let $D_\zeta$ denote the connected component of $\mathsf{P}^1\setminus E$ containing $\zeta$.
\begin{proposition} (Proposition 7.37, \cite{BR10}) \label{prop: Green} (i) $G(z,\zeta,E)$ is finite for every $z \in \mathsf{P}^1 \setminus\{\zeta\}$.\\
(ii) $G(z,\zeta,E) \geq 0$ for every $z \in \mathsf{P}^1$ and $G(z,\zeta,E) > 0$
for every $z \in D_\zeta$.\\
(iii) $G(z,\zeta,E) = 0$ on $\mathsf{P}^1 \setminus D_\zeta$ except on a (possibly empty) set $e \subset \partial D_\zeta$ of capacity zero.\\
(iv) $G(z,\zeta,E)$ is continuous on $\mathsf{P}^1 \setminus e$.\\
(v) $G(z,\zeta,E)$ is subharmonic on $\mathsf{P}^1\setminus\{\zeta\}$ and (strongly) harmonic on $D_\zeta \setminus\{\zeta\}$. For every $a \neq \zeta$, $G(z,\zeta,E)-\log [z,a]_\zeta$ extends to a function harmonic in a neighborhood of $\zeta$.\\
(vi) $G(z,\zeta,E)=G(z,\zeta, \mathsf{P}^1\setminus D_\zeta)= G(z,\zeta, \partial D_\zeta)$.\\
(vii) If $E_1 \subset E_2$ are two sets of positive capacity, then $G(z,\zeta,E_1) \geq G(z,\zeta,E_2)$.
\end{proposition}
\section{Brelot-Cartan principle}\label{sec: Cartan}
In this section we will work under an additional topological assumption, namely that of the second countability of the Berkovich topology. This is restrictive but still reasonable. On one hand, when there exists a countable base of open sets for the Berkovich topology on $\mathsf{P}^1$, the underlying valued field is necessarily separable as a topological space. The precise conditions characterizing such fields are not known but, as observed in \cite{MO12}, separability may fail even if the residue field and the value group are both countable. On the other hand, for the fields $\mathbb{C}_p$, $p$ prime (which are separable; see discussion before Corollary 1.20 in \cite{BR10}), such a countable base exist. For some results related to countability of the topologies on $\mathsf{P}^1$ see \cite{Favre11} and \cite{HLP14}.
The second countability of the Berkovich topology allows us to apply the following lemma:
\\
\begin{lemma} (Choquet topological lemma; for this formulation and its proof see \cite{Doob01}, A.VIII.3) \label{lemma: Choquet} Let $\{u_\iota\}_{\iota \in I}$ be a family of functions from a second countable Hausdorff space to $[-\infty,+\infty]$. For a $J \subset I$, define $u^J=\sup_{\iota \in J}u$. Then there is a countable subset $J \subset I$ such that $(u^J)^*=(u^I)^*$, where $v^*(x)=\limsup_{y \to x}v(y)$.
\end{lemma}
Using the Choquet topological lemma we can prove the Brelot-Cartan principle. It was first proved in \cite{Brelot38} (in connection with Dirichlet regularity) and \cite{Cartan45} (in a more general context). Our formulation and the general strategy of proof follows the classical version as presented in \cite{AG}, Theorem 5.7.1 (ii) and (iii).
\begin{theorem} \label{prop: Cartanprinciple} Let $\Omega \subsetneq \mathsf{P}^1$ be a domain and $\{u_\iota\}_{\iota \in I}$ be a family of functions subharmonic on $\Omega$ which is locally uniformly bounded from above. Let $u=\sup_{\iota \in I}u_\iota$. Then the set $\{x \in \Omega: u(x) < u^*(x)\}$ has capacity zero.
\end{theorem}
\begin{proof} By Proposition \ref{prop: exhaustion}, every domain different from $\mathsf{P}^1$ can be exhausted by a sequence $V_1 \subset V_2 \subset...$ of (strict) simple domains such that $\overline{V_n} \subset V_{n+1} \subset \Omega$ for each $n$. Since $u(x) = u^*(x)$ in $\Omega \cap \mathsf{H}^1$, it is enough to prove that for any simple domain $V \subset \Omega$ any compact subset of $\{x \in V: u(x) < u^*(x)\}$ has capacity zero. So let us fix a point $\zeta \not \in \Omega$ and take a simple domain $V$ such than $\overline{V} \subset \Omega$. By Lemma \ref{lemma: Choquet} there is a sequence $(u_n) \subset \{u_\iota\}_{\iota \in I}$ such that $u^*=v^*$, where $v=\sup_{n \in \mathbb{N}}u_n$. By Proposition \ref{prop: netsbounded}, $v^*$ is subharmonic. Defining $v_n=\max\{u_1,...,u_n\}$ we get an increasing sequence $(v_n)$ of subharmonic functions with limit $v$ in $\Omega$. By Proposition \ref{prop: contLaplacian}, the positive measures $\mu_n:=-\Delta_V(v_n)$ converge weakly to the positive bounded measure $\mu:=-\Delta_V(v^*)$. \\
Consider the potentials $p_{\mu_n}(z,\zeta)=\int \! -\log \delta(z,w)_\zeta d\mu_n(w)$. Since the function $ -\log \delta(z,w)_\zeta$ is lower semicontinuous and bounded below on $\overline{V}$, we have by Proposition \ref{prop: weakconv} that $\liminf_{n \to \infty}p_{\mu_n} \geq p_\mu$ on $V$. \\
ByProposition \ref{prop: Riesz}, for every $n$ there exists a function $h_n$ continuous on $\overline{V}$ and harmonic on $V$ such that $v_n=h_n - p_{\mu_n}$. The functions $h_n, n=1,2,...$ are locally uniformly bounded below on $V$. Indeed, $h_n \geq v_1+ p_{\mu_n}$ for every $n$. If $C$ is a compact subset of $V$ and $x \in C$, then there is an $N >0$ such that for every $n \geq N$, $h_n(x) \geq v_1(x) + \liminf_{n \to \infty} p_{\mu_n} -\frac{1}{2} \geq (v_1)_*(x) + p_\mu(x)-\frac{1}{2}$. Taking infimum over $x \in C$ on both sides of the inequality, we get $h_n \geq \inf_C (v_1)_*+ \inf_C p_\mu \cdot \mu(C) -\frac{1}{2}$ on $C$ for every $n \geq N$, and hence a common lower bound on $C$ for all $h_n$. By Proposition \ref{prop: harmlocunifbound}, there exists a subsequence $(h_{n_k})$ that converges locally uniformly to a (continuous) harmonic function $h$ on $V$. Since $v_{n_k} \to v$ and $h_{n_k} \to h$, then also $p_{\mu_{n_k}}$ converge as $k \to \infty$ and $\lim_{k \to \infty} p_{\mu_{n_k}} \geq p_\mu$ on $V$. \\
We have $v(x) = h(x) - \lim_{k \to \infty} p_{\mu_{n_k}}(x) \leq h(x) - p_\mu(x) = v^*(x)$ in $V$, so it is enough to prove that the set $E=\{x \in V: \lim_{k \to \infty} p_{\mu_{n_k}}(x) > p_\mu(x) \}$ has capacity zero. Suppose there is a compact subset $F \subset E$ such that ${\rm cap}_\zeta F >0$. Let $\nu$ be the equilibrium measure on $F$ with respect to $\zeta$. Then, by continuity of $p_\nu$ on $F' \subset F$ with ${\rm cap}_\zeta F >0$, portmanteau theorem and Fatou's lemma,
\begin{multline*}
\int_{F'} p_\mu d \nu \!=\! \int_{F'} p_\nu d \mu \!=\! \lim_{k \to \infty} \int_{F'} p_\nu d \mu_{n_k} \!=\! \lim_{k \to \infty} \int_{F'} p_{\mu_{n_k}} d\nu \! \\
\geq \! \int_{F'} \lim_{k \to \infty} p_{\mu_{n_k}} d\nu\!>\! \int_{F'} p_\mu d\nu,
\end{multline*}
which is a contradiction. Hence $E$ has capacity zero. Since $v \leq u$ and $u^*=v^*$, the set $\{x: u(x) < u^*(x)\}$ is a subset of $\{x: v(x) < v^*(x)\}$ and also has capacity zero.
\end{proof}
\begin{remark}
In Proposition 8.26 (E) of \cite{BR10} it was shown that $u(x)=u^*(x)$ for every $x \in \mathsf{H}^1$. The Brelot-Cartan principle in the Berkovich setting refines this relation, since nonempty subsets of $\mathsf{H}^1$ have positive capacity. \\
\end{remark}
\section{The extremal function}\label{sec: extremal}
\subsection{An upper envelope}\label{sec: envelope}
Fix a point $\zeta \in \mathsf{P}^1$. Define the following:
\begin{definition} \label{defin: classL}
\begin{multline*} \mathcal{L}= \mathcal{L}(\zeta):=\bigl\{u: u\text{ is subharmonic in }\mathsf{P}^1\setminus\{\zeta\}, \\ \forall a \ne \zeta \ u -\log [z,a]_\zeta \text{ extends to a function subharmonic in } \mathsf{P}^1\setminus\{a\} \bigr\}.
\end{multline*}
\end{definition}
\begin{definition} \label{defin: Qfcn} Let $\zeta$ and $\mathcal{L}(\zeta)$ be as in Definition \ref{defin: classL} and let $E \subsetneq \mathsf{P}^1 \setminus \{\zeta\}$ be nonempty. Define
\[
\mathcal{S}\mapsto Q_E(\mathcal{S})
:=\sup \{u(\mathcal{S}):u \in \mathcal{L}, u|E\leq 0\}.
\]
We call $Q_E$ the $\mathcal{L}$-extremal function (relative to $\zeta$) associated to $E$.
\end{definition}
\begin{proposition} \label{prop: nonempty} If $E$ has positive capacity, then the class of functions defining $Q_E$ is not empty.
\end{proposition}
\begin{proof} If $E \subset \mathsf{H}^1$, then the Green function $G(\cdot,\zeta,E)$ of $E$ relative to $\zeta$ is in $\mathcal{L}$ and $G(\cdot,\zeta,E)=0$ on $E$. If $E \cap \mathbb{P}^1 \neq \emptyset$, take a point $a \in E \cap \mathbb{P}^1$ and $r \geq \sup_{z\in E}[z,a]$. The function $(\log[z,a]_{\zeta}-\log r)^+:=\max \{\log[z,a]_{\zeta}-\log r,0\}$ is then in $\mathcal{L}$, and it is non-positive on $E$.
\end{proof}
\noindent The following property holds (for the classical analog, see \cite{Klimek91}, Corollary 5.1.2).\\
\begin{proposition} \label{prop: nested} If $E_1 \supset E_2 \supset ...$ is a sequence of nonempty sets in $\mathsf{P}^1 \setminus \{\zeta\}$ and $E=\bigcap_{n \to \infty}E_n$, then $Q_E =\lim_{n \to \infty}Q_{E_n}$.
\end{proposition}
\begin{proof} Since $Q_{E_1} \leq ... \leq Q_{E_n} \leq ...\leq Q_E$, the limit $\lim_{n \to \infty}Q_{E_n}$ exists and does not exceed $Q_E$. Conversely, for an $u \in \mathcal{L}$ and an $\varepsilon > 0$ the open set $\{ u < \varepsilon\}$ is a neighborhood of $E$ containing $E_n$ for all sufficiently large $n$. Hence for those $n$, $u-\varepsilon \leq Q_{E_n} \leq \lim_{n \to \infty}Q_{E_n}$. Since $\varepsilon$ was arbitrary, $Q_E \leq \lim_{n \to \infty}Q_{E_n}$.
\end{proof}
Having fixed a point $\zeta \in \mathsf{P}^1$, we can compute an example of the function $Q$. Let $a \in \mathsf{P}^1\setminus\{\zeta\}$, $r \in ({\rm diam}_\zeta(a), {\rm diam}_\zeta(\zeta))$ and let $B_r=B(a,r)_\zeta:=\{z: [z,a]_\zeta\leq r\}$. When $a \in \mathsf{H}^1$, the bounds on $r$ guarantee that $B_r \ne \emptyset$ and $B_r \ne \mathsf{P}^1$.\\
\begin{proposition} \label{prop: pseudoball} (cf. Property 2.6 in \cite{Siciak81}, Example 5.1.1 in \cite{Klimek91}, Th\'eor\`eme 3.6 in \cite{Ze91})
\[
Q_{B_r}(z)=\max \{\log[z,a]_{\zeta}-\log r,0\}=(\log[z,a]_{\zeta}-\log r)^+.\]
\end{proposition}
\begin{proof} Recall that, by Formula 5 in Section 5.2 of \cite{Rumely89}, the function on the right-hand side is the Green function of $B_r$. Arguing like in Proposition \ref{prop: nonempty}, we get that $(\log[z,a]-\log r)^+ \leq Q_{B_r}(z)$. In the reverse direction, let $v \in \mathcal{L}=\mathcal{L}(B_r,\zeta)$. The function $v(z) - \log [z,a]_\zeta + \log r$ extends to a subharmonic function in $A_r=\mathsf{P}^1 \setminus B_r$. By Remark 4.13 in \cite{BR10}), the set $A_r$ is the connected component of $\mathsf{P}^1 \setminus \{x_r\}$ containing $\zeta$, where $x_r$ is the unique point on the path from $a$ to $\zeta$ with ${\rm diam}_\zeta(x_r)=r$. Moreover, $v(z) - \log [z,a]_\zeta + \log r \leq 0$ on $\partial B_r=\partial A_r$, and so by the maximum principle $v(z) - \log [z,a]_\zeta + \log r \leq 0$ in $A_r$. Hence on $\mathsf{P}^1 \setminus \{\zeta\}$ we have $v(z) \leq \log [z,a]_\zeta - \log r$ and finally
$Q_{B_r} \leq (\log[z,a]-\log r)^+$.
\end{proof}
The behavior of locally uniformly bounded families in $\mathcal{L}$ is analogous to what happens in $\mathbb{C}^N$. Namely, the following holds:
\begin{proposition} (cf. \cite{Klimek91}, Proposition 5.2.1; \cite{Siciak81}, Theorem 3.5; \cite{Ze91}, Lemme 3.10) \label{prop: uniffamilies} Let $\mathcal{U} \subset \mathcal{L}=\mathcal{L}(\zeta)$ be a non-empty family, let $u=\sup\{v: v \in \mathcal{U}\}$ and let $\Omega$ be a connected component of $\mathsf{P}^1\setminus\{\zeta\}$. If the set $A=\{z \in \Omega: u(z)<+\infty\}$ has nonzero capacity, then the family $\mathcal{U}$ is locally uniformly bounded from above in $\Omega$. If moreover $\mathcal{U}$ is locally uniformly bounded from above in $\mathsf{P}^1\setminus\{\zeta\}$, then $u^*\in \mathcal{L}$.
\end{proposition}
\begin{proof} Suppose $\mathcal{U}$ is not locally uniformly bounded in $\Omega$. Then there exists a simple domain $V \subset \overline{V} \subset \Omega$ and a sequence $(u_j)$ in $\mathcal{U}$ such that $m_j:=\sup_{\overline{V}}u_j \geq 2^j$ for every $j \in \mathbb{N}$. We have $u_j \leq m_j + Q_{\overline{V}}$ on $\mathsf{P}^1\setminus \{\zeta\}$ for every $j \geq 1$. Fix a simple domain $V'$ such that $\overline{V} \subset V' \subset \Omega$. The family $(u_j -m_j)_{j \in \mathbb{N}}$ is uniformly bounded in $V'$. We claim that there exists an $x_0 \in V'$ such that $\limsup_{j \to \infty} u_j(x_0) >-\infty$. Suppose to the contrary that $\limsup_{j \to \infty} u_j \equiv -\infty$ in $V'$. Then $\limsup_{j \to \infty} \exp [u_j(x_0)-m_j] \equiv 0$ in $V'$, so $\lim_{j \to \infty} \exp [u_j(x_0)-m_j] \equiv 0$ in $V'$. Note that all functions $\exp [u_j(x_0)-m_j]$ are subharmonic (by Corollary 8.29 in \cite{BR10}) and have an uniform upper bound in $V'$. Hence, by Proposition \ref{prop: Hartogs} and Corollary \ref{coro: littleHartogs}, there exists a subsequence $(u_{j_n})$ and an $n_0 \geq 1$ such that $\sup_{V'} \exp [u_{j_n}(x_0)-m_{j_n}] \leq 1/2$ for every $n \geq n_0$. Taking natural logarithm of both sides of this inequality we get a contradiction with the definition of $m_j$. The claim allows us (passing to a subsequence of $u_j$ if necessary) to fix an $x_0 \in \Omega$ and an $\varepsilon >0$ such that $u_j(x_0)-m_j > \log \varepsilon$ for every $j \geq 1$. Define next
\[
v(x)=\sum_{j=1}^{\infty}\frac{1}{2^j}(u_j(x)-m_j)
\]
for every $x \in \mathsf{P}^1\setminus \{\zeta\}$.
Note that on every simple subdomain of $\Omega$ the function $v$ is the limit of a uniformly convergent sequence of subharmonic functions. Therefore (by Proposition 8.26 (C) in \cite{BR10}) $v$ is subharmonic in $\Omega$.
If $x \in A \cap \Omega$, then $\sup_j u_j(x) <+\infty$, and so $v(x)=-\infty$, while $v(x_0) \geq \log \varepsilon >-\infty$. Hence, by Corollary 8.40 in \cite{BR10}, $A \cap \Omega$ has capacity zero.\\
Now, if the family $\mathcal{U}$ is locally uniformly bounded in $\mathsf{P}^1 \setminus \{\zeta\}$, then by Proposition \ref{prop: netsbounded}, $u^*$ is subharmonic on $\mathsf{P}^1 \setminus \{\zeta\}$. Let us fix arbitrarily an $a \in \mathsf{P}^1 \setminus \{\zeta\}$ and a simple subdomain $W$ of $\mathsf{P}^1 \setminus \{a\}$. Let $h$ be a harmonic function in $W$ such that $u^* -\log[\cdot,a]_\zeta \leq h$ on $\partial W$. Then for every $v \in \mathcal{U}$, $v -\log[\cdot,a]_\zeta \leq h$ on $\partial W$. By Theorem 8.19 in \cite{BR10} or Corollary 3.1.12 in \cite{ThuillierThesis} , $v -\log [\cdot,a]_\zeta \leq h$ in $W$ (when $\zeta \in W$, we consider the subharmonic extension of $v -\log[\cdot,a]_\zeta$ to $W$), so $u \leq \log [\cdot,a]_\zeta + h$ in $W$. Since $\log[\cdot,a]_\zeta + h$ is continuous as a function of $z \in W$, we also have $u^* \leq \log[\cdot,a]_\zeta + h$ in $W$ and so (again by Theorem 8.19 in \cite{BR10}), $u^*-\log[\cdot,a]_\zeta$ extends as a subharmonic function in $W$. Hence $u^* \in \mathcal{L}$.
\end{proof}
\begin{coro}\label{coro: polarsets} (cf. Corollary 3.9 in \cite{Siciak81}, Theorem 5.2.4 in \cite{Klimek91})
For a nonempty $E \subset \mathsf{P}^1 \setminus \{\zeta\}$ the following are equivalent:\\
(i) There exists a function $v$ subharmonic in $\mathsf{P}^1 \setminus \{\zeta\}$ such that $E \subset \{x: v(x)=-\infty\}$.\\
(ii) The capacity of $E$ equals zero.\\
(iii) There exists a function $w \in \mathcal{L}(\zeta)$ such that $E \subset \{x: w(x)=-\infty\}$.
\end{coro}
\begin{proof} The implication $(iii) \Rightarrow (i)$ is obvious and $(i) \Rightarrow (ii)$ is Corollary 8.40 in \cite{BR10}. Applying Proposition \ref{prop: uniffamilies} to the family $\mathcal{U}=\{w \in \mathcal{L}: w|_E \leq 0\}$ yields $(ii) \Rightarrow (iii)$.
\end{proof}
Remark: For a compact set $F \subset \mathsf{P}^1\setminus\{\zeta\}$ one can also directly construct a function $w$ of class $\mathcal{L}(\zeta)$ such that $F \subset \{w=-\infty\}$. For $N \in \mathbb{N}$ let $P_N$ be a pseudopolynomial $P_N(z)=\prod_{i=1}^N [z,a_i]_\zeta$ with $a_1, ..., a_N \in F$. For every $k \in \mathbb{N}$, let us pick $a_1,...,a_{N_k} \in F$ and a real number $p_k \geq 0$ such that $\sum_{k=1}^\infty p_k=1$. Let further
\[
w(z):=\sum_{k=1}^\infty p_k\bigl (\frac{1}{N_k}\log P_{N_k}(z)\bigr ).
\]
The function $w$ is the negative of an Evans potential for $F$ (see Lemma 7.18 in \cite{BR10}). It is easy to see that $w \in \mathcal{L}(\zeta)$.\\
Let $E \subset \mathsf{P}^1 \setminus \{\zeta\}$ be an arbitrary compact with positive capacity and let $G(\cdot,\zeta,E):= V_E-p_{\nu_\zeta}(\cdot)$ be the Green function with pole at $\zeta$ (see subsection \ref{sec: Green}). Our goal is to show that the equality $Q_E^*=G(\cdot,E,\zeta)$ holds. From Proposition \ref{prop: pseudoball} we already know it for a class of sets $B_r$. Now we will establish it in another important special case, that of the complement of a simple domain. Note that in these special cases $Q_E$ is continuous, so $Q_E=Q_E^*$.
\begin{proposition} \label{prop: simpledom} Let $V \subset \mathsf{P}^1$ be a simple domain such that $\zeta \in V$. Then $Q_{\mathsf{P}^1 \setminus V}(\cdot) = G(\cdot, \mathsf{P}^1 \setminus V, \zeta)$. In particular, the function $Q_{\mathsf{P}^1 \setminus V}$ is continuous in $\mathsf{P}^1\setminus\{\zeta\}$ and strongly harmonic in $V\setminus \{\zeta\}$.
\end{proposition}
\begin{proof}
For $z \in \mathsf{P}^1 \setminus V$, $Q_{\mathsf{P}^1 \setminus V}(z) \leq 0 = G(z,\mathsf{P}^1 \setminus V, \zeta)$. Fix an $a \not \in \overline{V}$. By Proposition \ref{prop: uniffamilies}, the function $Q_{\mathsf{P}^1 \setminus V}^* - \log [\cdot,a]_\zeta$ has subharmonic extension to $V$. Note that $Q_{\mathsf{P}^1 \setminus V}=Q_{\mathsf{P}^1 \setminus V}^*$ on $\partial V$, since $\partial V \subset \mathsf{H}^1$. Then $Q_{\mathsf{P}^1 \setminus V}^*(z) - \log [z,a]_\zeta - (G(z, \mathsf{P}^1 \setminus V, \zeta)- \log [z,a]_\zeta) \leq 0$ on $\partial V$. Using the maximum principle we get that $Q_{\mathsf{P}^1 \setminus V}(\cdot) \leq G(\cdot, \mathsf{P}^1 \setminus V, \zeta)$ in $V \setminus \{\zeta\}$. In the other direction, $G(\cdot, \mathsf{P}^1 \setminus V, \zeta) \in \mathcal{L}(\mathsf{P}^1 \setminus V, \zeta)$ and $G(\cdot, \mathsf{P}^1 \setminus V, \zeta)|_{\mathsf{P}^1 \setminus V}=0$. Hence in $\mathsf{P}^1\setminus\{\zeta\}$ we have $Q_{\mathsf{P}^1 \setminus V}(\cdot) = G(\cdot, \mathsf{P}^1 \setminus V, \zeta)$.
\end{proof}
Now we are ready to prove the general case.
\begin{theorem} \label{theorem: equality} For an arbitrary compact set $E \subset \mathsf{P}^1\setminus \{\zeta\}$ of positive capacity, $G(\cdot,\zeta,E)= Q_E^*(\cdot)$ in $\mathsf{P}^1\setminus \{\zeta\}$.
\end{theorem}
\begin{proof} Note first that $Q_{\mathsf{P}^1\setminus D_\zeta} = Q_E$, where $D_\zeta$ is the connected component of $\mathsf{P}^1\setminus E$ containing $\zeta$. Indeed, let $U$ be a connected component of $\mathsf{P}^1\setminus E$ not containing $\zeta$ and let $u \in \mathcal{L}(E,\zeta)$. By the maximum principle, $u \leq 0$ on $U$. Hence $u \leq 0$ on $\mathsf{P}^1\setminus D_\zeta$, which shows that $Q_{\mathsf{P}^1\setminus D_\zeta} \geq Q_E$ (the other inequality is obvious). Since $G(\cdot,\zeta,E)=G(\cdot,\zeta,\mathsf{P}^1\setminus D_\zeta)$, it is thus enough to establish the equality in the theorem for sets $E=\mathsf{P}^1\setminus D$ of positive capacity, where $D \subsetneq \mathsf{P}^1$ is a domain containing $\zeta$.\\
For such a domain $D$ consider an exhaustion by simple domains $V_1 \subset V_2 \subset ...$ such that $\overline{V_n} \subset V_{n+1}$ and let $F_n := \mathsf{P}^1\setminus V_n$. Then, by Proposition \ref{prop: simpledom}, $G_n:= G(\cdot,\zeta,F_n)= Q_{F_n}$. By Proposition \ref{prop: nested}, $Q_E= \lim_{n \to \infty}G_n \leq G(\cdot,\zeta, E)$. \\
It remains to prove that $G(\cdot,\zeta,E) \leq Q_E^*$ in $\mathsf{P}^1\setminus \{\zeta\}$. Let $e \subset \partial D$ be the (possibly empty) set of capacity zero such that $G(z,\zeta,E) >0$ for all $z \in e$. Then $G(\cdot,\zeta,E) \leq Q_{E\setminus e}$. By Corollary \ref{coro: polarsets}, there exists a function $v \in \mathcal{L}$ such that $e \subset K:= \{z \in \mathsf{P}^1\setminus \{\zeta\}: v(z)=-\infty\}$. Without loss of generality we can assume that $v \leq 0$ on $E$. Let $u \in \mathcal{L}$ be such that $u \leq 0$ on $E$ and let $\varepsilon >0$ be arbitrary. Then $u+\varepsilon v \leq Q_{E\setminus e}$. Letting $\varepsilon \to 0$ we get that $Q_E \leq Q_{E\setminus e}$ (and hence $Q_E = Q_{E\setminus e}$) outside the set $K$, which has zero capacity. Hence also $G(\cdot,\zeta,E) \leq Q_E \leq Q_E ^*$ outside $K$. Let now $z \in K$. By Remark 7.38 in \cite{BR10}, we have
\begin{multline*}
G(z,\zeta,E)=\limsup_{\mathsf{H}^1 \ni y \to z}G(y,\zeta,E) \\
=\limsup_{\mathsf{H}^1 \ni y \to z}Q_E(y) \leq \limsup_{x \to z} Q_E(x)=Q_E^*(z),
\end{multline*}
which completes the proof.
\end{proof}
\begin{coro} $Q_E=R_E :=\sup\{u \in \mathcal{L}', \ u|_E \leq 0\})$, where
\begin{multline*} \mathcal{L}' :=\bigl\{u: u\text{ is subharmonic in }\mathsf{P}^1\setminus\{\zeta\}, \\ \forall a \ne \zeta \ u -\log [z,a]_\zeta \text{ extends to a function harmonic in } \mathsf{P}^1\setminus\{a\} \bigr\}.
\end{multline*}
\end{coro}
\begin{proof} With the notation as in the proof of Theorem \ref{theorem: equality}, \[
Q_E =\sup_n G_n \leq R_E.\] The other inequality is obvious.
\end{proof}
\subsection{Comparison with the classical case} \label{sec: classical}
Fix a $\zeta \in \mathsf{P}^1$ and let $u \in \mathcal{L}=\mathcal{L}(\zeta)$. For an arbitrary $a \ne \zeta$, rewrite
\[
u(z) -\log [z,a]_\zeta =u(z)-\log\biggl ( \frac{[z,a]_g}{[z,\zeta]_g [a,\zeta]_g}\biggr )
\]
As $z \to \zeta$, we see (by continuity of the Hsia kernel $[\cdot,a]_g$ near $\zeta \neq a$) that $\limsup_{z \to \zeta} u(z) -\log [z,a]_\zeta= \limsup_{z \to \zeta} u(z) + \log[z,\zeta]_g$. The limit superior exists, since $u(z) -\log [z,a]_\zeta$ extends to a function which is subharmonic, in particular upper semicontinuous, in a neighborhood of $\zeta$. \\
Recall that the spherical kernel $[x,y]_g$ is an extension of the chordal metric from $\mathbb{P}^1(K) \times \mathbb{P}^1(K)$ to $\mathsf{P}^1 \times \mathsf{P}^1$. Consider now the field $\mathbb{C}$ of complex numbers with the standard (archimedean) absolute value and the point $\zeta =\infty \in \mathbb{P}^1(\mathbb{C})$. The chordal distance $[z,\infty]$ equals $\frac{1}{\sqrt{1+|z|^2}}$ for $z \in \mathbb{C}$. The class of all functions $u$ subharmonic in $\mathbb{C}$ and such that $u(z) \leq \frac{1}{2}\log (1+|z|^2) + C_u$ with a constant $C_u$ dependent only on $u$ is the Lelong class $\mathcal{L}_\mathbb{C}$ on $\mathbb{C}$ (an analogous class of plurisubharmonic functions can be defined on $\mathbb{C}^n$ for $n >1$). Here we use the natural logarithm. Each difference $u(z)- \frac{1}{2}\log (1+|z|^2)$ extends to an $\omega$-subharmonic function $v$ on $\mathbb{P}^1(\mathbb{C})$ (where $\omega$ is the Fubini-Study form) by taking $v(\infty)=\limsup_{z \to \infty} u(z)- \frac{1}{2}\log (1+|z|^2)$, and the extensions yield a natural 1-to-1 correspondence between the Lelong class and the class of $\omega$-subharmonic functions. This viewpoint on Lelong classes was introduced in \cite{GZ05} and it helped launch systematic (and successful) study of pluripotential theory on compact (complex) K\"ahler manifolds. Our class $\mathcal{L}$ is a non-archimedean analog of the Lelong class, and similarly the class $\mathcal{L}'$ is an analog of the class $\mathcal{L}_\mathbb{C}^+=\{u \in \mathcal{L}_\mathbb{C}: u(z)- \frac{1}{2}\log (1+|z|^2)= \mathcal{O}(1) \mbox{ as } z \to \infty\}$. \\
Some extremal functions associated with compact subsets of $\mathbb{C}$ are well known because of their usefulness in approximation theory. In \cite{Leja34}, F. Leja introduced the following extremal function:\\
Let $E \subset \mathbb{C}$ be a compact set. For an array $a^{(n)}=(a_0^{(n)},...,a_n^{(n)}), \ n=2,3,...$ of points in $\partial E$ (with all $a_i^{(n)}, i=0,...,n$ pairwise distinct) define the quantities
\[ M(a^{(n)}):=\prod_{0\leq j <k \leq n} \left|a_j^{(n)} -a_k^{(n)}\right|.
\]
Consider an array of Fekete extremal points in $\partial E$, that is, an array $b^{(n)}=(b_0^{(n)},...,b_n^{(n)}), \ n=1,2,...$ such that
$M(b^{(n)})=\max_{a^{(n)}}M(a^{(n)})$ for every $n \geq 2$. In each row $b^{(n)}$ order the points so that $|\Delta_0(b_0,...,b_n)| \leq |\Delta_j(b_0,...,b_n)|, \ j =1,2,...n$, where \[
\Delta_j(b_0,...,b_n)=(b_j-b_0)...(b_j-b_{j-1})(b_j-b_{j+1})...(b_j-b_n), \ j=0,1,...n.\]
Let $L_n$ be the Lagrange interpolating polynomial $L_n(z)=\frac{(z-b_1)...(z-b_n)}{(b_0-b_1)...(b_0-b_n)}$. The function
\[
L(z):=\lim_{n \to \infty} \frac{1}{n}\log |L_n(z)|
\]
is well defined for all $z \in \mathbb{C}$.
Under the assumption that $E$ is a union of (non-degenerate) continua, Leja also proved that $L$ equals the Green function $G(\cdot,\infty,E)$ for $E$ with pole at infinity. In \cite{Gorski48}, J. G\'orski (a student of Leja) proved the equality $L(\cdot)=G(\cdot,\infty,E)$ for an arbitrary compact $E$ with positive capacity. In \cite{Siciak62}, J. Siciak (another student of Leja) defined an analog of the Leja extremal function for compact subsets of $\mathbb{C}^N$. Another extremal function for a compact subset of $\mathbb{C}^N$, $N \geq 1$, was defined in \cite{Za77} as
\[
V_E(z):=\sup\{ u \in \mathcal{L}, u|_E \leq 0 \},
\]
where (for $N >2$) $\mathcal{L}$ is the class of all plurisubharmonic functions $u$ with logarithmic growth, $u(z) \leq \frac{1}{2}\log (1+\|z\|^2) + C_u$ (the Lelong class). Proofs that $V_E=\log L(\cdot,E)$ (different ones) were given in \cite{Za77} for $E$ with $V_E$ continuous, and in \cite{Siciak81} (Theorem 4.12) for an arbitrary non-polar compact $E$ (see also \cite{Klimek91}, Theorem 5.1.7 and, in an even more general setting of algebraic varieties embedded in $\mathbb{C}^N$, \cite{Ze91}, Th\'eor\`eme 5.1). It was observed without proof in both \cite{Za77} (beginning of Section 4) and \cite{Siciak81} that $V_E(\cdot)=G(\cdot,\infty,E)$
when $n=1$. \\
Note that using our method of proof of Theorem \ref{theorem: equality}
one can prove directly that $V_E^*(\cdot)=G(\cdot,\infty,E)$ in $\mathbb{C}$, without relying on the separate equalities of each of these functions with the function $\log L(\cdot,E)$. As before, we consider $G(\cdot,\infty,E)$ as the Robin constant of the set $E$ minus the equlibrium potential. We can also assume without loss of generality that $\mathbb{C} \setminus E$ is connected. Recall that in proving the equality $G_E=Q_E^*$ in the non-archimedean case we took advantage of the possibility of exhausting a domain with a sequence of subdomains whose boundaries do not contain sets of zero capacity (simple domains). There are no such subdomains in $\mathbb{C}$ with the standard absolute value, where each point has zero logarithmic capacity. Hence different auxiliary results must be used. First, for a general unbounded domain $D \subset \mathbb{C}$ we can take (as in \cite{Gorski48}) an exhaustion of $D$ by domains $D_n, \ n \geq 1$, such that, for every $n$, $\overline{D_n} \subset D_{n+1}$, $G(\cdot,\infty,\mathbb{C}\setminus D_n)|_{\mathbb{C}\setminus D_n}=0$ and $D_n \to D$ in the sense of Carath\'eodory convergence of domains. Then $G(\cdot,\infty,\mathbb{C}\setminus D)=\lim_{n\to \infty}G(\cdot,\infty,\mathbb{C}\setminus D_n)=\lim_{n \to \infty} V_{\mathbb{C}\setminus D_n}$. Second, we need a way to compare $V_{E\cup F}^*$ with $V_E^*$ for every $E$ bounded and $F$ of zero capacity. In fact, the equality $V_{E\cup F}^*=V_E^*$ holds in $\mathbb{C}^N, \ N \geq 1$: see Proposition 3.11 in \cite{Siciak81} or Corollary 5.2.5 in \cite{Klimek91}. With these tools in place, the arguments of Theorem \ref{theorem: equality} go through in the archimedean case.\\
Finally, let us note that other characterizations of the Green function as the extremal function relative to a class of functions with certain growth are also available in the classical theory. For example, see \cite{Doob01}, formula 1.XIII (18.1) in the logarithmic potential case; see further \cite{Doob01}, Theorem 1.VII.2 in the Newtonian potential case in $\mathbb{R}^n$, $n >2$.
\def$'${$'$}
|
\section{Introduction}
\subsection{Background}
The purpose of this paper is to study parameter estimation and adaptation for stochastic systems, in which the system output cannot be measured accurately, and the only available information is whether or not the output belongs to some set (\cite{zhang:2003}). Specifically, consider the following standard stochastic regression model:
\begin{equation}\label{1}
y_{k+1}=\phi_{k}^{T} \theta+v_{k+1}, \quad k=0, 1,2, \ldots
\end{equation}
where $y_{k+1}\in R^{1}, v_{k+1}\in R^{1}, \phi_{k}\in R^{p}(p\geq1)$ represent the system output, random noise and regression vector, respectively, and $\theta \in R^{p}$ is an unknown parameter vector to be estimated. The system output $y_{k+1}$ can only be observed with binary-valued measurements:
\begin{equation}\label{2}
s_{k+1}=I\left(y_{k+1} \geq c_{k}\right)=\left\{\begin{array}{ll}
1, & y_{k+1} \geq c_{k};\\
0, & otherwise,
\end{array}\right.
\end{equation}
where $\{c_{k}\}$ denotes a given threshold sequence, and $I(\cdot)$ is the indicator function.
This type of observations emerges widely in practical systems with the development of science and technology. One example comes from neuron systems(\cite{ghysen:2003}) where, instead of measuring exact internal potential, the systems only provide information of states (excitation or inhibition). When the potential is smaller than the potential threshold, the neuron shows the inhibition state, otherwise shows the excitation state. The objective of classification via neural network is to learn the system parameters based on states of neurons only. Another example comes from sensor networks(\cite{zhang:2019}) where, for set-valued sensor networks, the information from each sensor turns out to be quantized observations with finite number of bits or even 1 bit. Specifically, each sensor only provide information whether the measured value is larger than a designed threshold or not. Usually, such sensors are more cost effective than regular sensors. Besides, there are also numerous other examples such as ATM ABR traffic control; gas content sensors ($CO_{2}$, $H_{2}$, etc.) in gas and oil industry and switching sensors for shift-by-wire in automotive applications(\cite{zhang:2003}).
\subsection{Related works}
Due to the widely use of systems with quantized observations, a number of basic problems concerning identification and control emerge, which need theoretical investigations. In fact, the estimation of quantized output systems has constituted a vast literature recently. \cite{zhang:2003}; \cite{yin:2007}; \cite{yin:2008}; \cite{yin:2010} gave a strongly consistent identification algorithm under periodic signals. \cite{jafari:2012} proposed a recursive identification algorithm for FIR systems with binary-valued observations, and proved its convergence under $\alpha$-mixing property of the signals. Later, \cite{guo:2013} proposed a recursive projection algorithm for FIR systems with binary-valued observations and fixed thresholds. The paper established the convergence rate $O\left(\frac{\log k}{k}\right)$ under the following strongly persistent excitation condition $\sum_{l=k}^{k+N-1} \phi_{l} \phi_{l}^{T} \geq \varepsilon I, \quad k=1,2, \ldots$, for some fixed $N$ and constant $\epsilon >0$. Besides, \cite{you:2013} considered ARMA system with time-varying K -
level scalar quantizer also random packet dropouts, and gave the consistence result under independent and identically distributed(i.i.d.) conditions. The adaptive quantizer is considered in \cite{you:2015} for FIR systems, provided that the signals satisfy i.i.d conditions with $E[\phi_{i}\phi_{i}^{\tau}]=H >0$. Moreover, under some persistent excitation conditions, \cite{zhao:2016} introduced a EM-typed algorithm, which is robust and easy to programme, and proved that the maximum likelihood criterion can be achieved as the number of iterations goes to infinity. \cite{song:2018} presented a strongly consistent estimate and obtained the convergence rate for ARMA systems with binary sensors and unknown threshold under i.i.d Gaussian inputs. \cite{zhang:2019} considered a Quasi-Newton type algorithm under the following persistent excitation (PE) condition: $\liminf _{k \rightarrow \infty} \lambda_{min}\left\{\frac{1}{k} \sum_{i=1}^{k} \phi_{i} \phi_{i}^{T}\right\}>0,$ where $\lambda_{min}\left\{\cdot \right\}$ represents the minimal eigenvalue of the matrix in question. Numerical simulations in \cite{zhang:2019} demonstrated that their Quasi-Newton type algorithm has equivalent convergence properties for first-order FIR systems and high-order systems, where strong consistency and asymptotic efficiency for first-order FIR systems are also established. For other methods, We refer the readers to \cite{bottegal:2017}, \cite{wang:2014} about kernel-based method and quadratic programming-based method, among others.
However, almost all of the existing investigations on identification suffer from some fundamental limitations.
Firstly, for the system with regular output sensors, i.e., $s_{k+1}=y_{k+1}$ in $(\ref{2})$, substantial progresses had been made in the area of adaptive estimation and control (e.g.,\cite{chen:1991}), and the excitation condition for consistency of parameter estimates need not to be persistent. For example, it is widely known that the weakest possible excitation condition for strong consistency of the least-squares estimate for stochastic regression models is the following (\cite{lai:1982}):
\begin{equation}\label{3}
\left\{\log \lambda_{\max }\left(\sum_{i=1}^{n} \phi_{i} \phi_{i}^{T}\right)\right\} / \lambda_{\min }\left(\sum_{1}^{n} \phi_{i} \phi_{i}^{T}\right) \rightarrow 0. \quad a.s.,
\end{equation}
which is actually a decaying excitation condition, is much weaker than the classical PE condition, and can be applied in adaptive feedback control(see e.g., \cite{chen:1991}). However, as mentioned above, for identification of systems with binary-valued sensors, almost all of the existing literatures need the PE conditions on signals for strong consistency, and actually, most need i.i.d or periodic signal assumptions. Though these conditions may be satisfied for some open-loop or off-line identification, they are much more difficult to be satisfied or verified for closed-loop system identification, since the input and output data of such systems are generally determined by nonlinear stochastic dynamic equations(\cite{chen:1991}). Consequently, the problem whether or not the PE condition can be essentially weakened to e.g. (\ref{3}) for identification of stochastic systems with binary-valued sensors still remains open.
Secondly, to the best of the authors' knowledge, almost all of the existing estimation algorithms for stochastic systems with binary-valued observations and given thresholds, are designed with first-order gradient. This kind of algorithms is designed by taking the same step-size for each coordinates, which may alleviate the complexity in the convergence analysis, but will sacrifice the convergence rate of the algorithms (\cite{ljung:1983}). To improve the convergence properties, it is necessary to consider estimation algorithms with adaptation gain being a matrix (e.g., Hessian matrix or its modifications), rather than a scalar.
Thirdly, there are only a few results on adaptive control with binary-valued observations in the existing literature (c.f.,e.g., \cite{guo:2011}, \cite{zhao:2013}), where some kinds of FIR control systems are considered and consistency of parameter estimates is needed for the optimality of adaptive control systems.
The goal of this paper is to show that the above mentioned limitations can be considerably relaxed or removed.
\subsection{Contributions}
Inspired by the method in \cite{guo:1995}, this paper proposes a new recursive projected Quasi-Newton type algorithm which can be viewed as a naturally extension of classical linear least-square algorithm with a projection operator. The main contributions of this paper can be summarized as follows:
\begin{itemize}
\item We propose a projected recursive Quasi-Newton type algorithm for stochastic regression systems with binary-valued observations. In the area of identification with binary-valued observations and given fixed thresholds, this paper appears to be the first to establish almost sure convergence for Quasi-Newton type estimation algorithms where the adaptation gains are matrices. \\
\item The weakest possible excitation condition $(\ref{3})$ known for strong consistency of the classical least-squares algorithm, is proven to be sufficient for strong consistency of the proposed new estimation algorithm in the current binary-valued observation case. This appears to be the first time to achieve such a strong result in the literature of system identification with binary-valued observations. \\
\item We also obtain a celebrated result on the asymptotic order of the accumulated regret of adaptive prediction, that is $\sum_{k=0}^{n}\left[E\left(y_{k+1} \mid \mathcal{F}_{k}\right)-\hat{y}_{k+1}\right]^{2}=O(\log n)$, $a.s$, which does not need any excitation condition and can be conveniently used in adaptive control to give better results than the existing ones in the literature.
\end{itemize}
The remainder of this paper is organized as follows. In Section 2, we give the main results of this paper, including the assumptions, proposed algorithms and main theorems; Section 3 presents the proofs of the main results together with some key lemmas. Some numerical examples are provided in Section 4. Finally, we conclude the paper with some remarks.
\section{The main results}
Consider the stochastic regression model (\ref{1})-(\ref{2}) with binary-valued observations. The objectives of this paper are, to propose a strongly consistent estimator $\{\hat{\theta}_{n}\}$ for the unknown parameter vector $\theta$ under a non-PE condition, and to give an asymptotically optimal adaptive predictor $\{\hat{y}_{n+1}\}$ for the regular output $\{y_{n+1}\}$ together with its applications in adaptive tracking.
\subsection{Notations and assumptions}
For our purpose, we introduce some notations and assumptions first.
{\bf Notations.} By $\|\cdot\|$, we denote the Euclidean-norm of vectors or matrices. The spectrum of a symmetric matrix $M$ is denoted by $\left\{\lambda_{i}\left\{M\right\}\right\}$, where the maximum and minimum eigenvalues are denoted by $\lambda_{max}\left\{M\right\}$ and $\lambda_{min}\left\{M\right\}$ respectively. Moreover, by $det M$ or $|M|$ we mean the determinant of the matrix $M$.
\begin{assumption}\label{assum1}
Let $\left\{\mathcal{F}_{k},k\geq 0\right\}$ be a non-decreasing sequence of $\sigma -$algebras such that $\phi_{k}$ is $\mathcal{F}_{k}-$measurable with a known upper bound:
\begin{equation}\label{4}
\sup _{k \geq 1}\left\|\phi_{k}\right\| = M<\infty, \qquad a.s.
\end{equation}
where $M$ may be a random variable.
\end{assumption}
\begin{assumption}\label{assum2}
The true parameter $\theta$ belongs to a bounded convex set $D \subseteq \mathcal{R}^{n}$, and we denote
\begin{equation}\label{5}
\sup _{x \in D}\|x\| = L<\infty, \qquad a.s.
\end{equation}
\end{assumption}
\begin{assumption}\label{assum3}
The given threshold $\left\{c_{k},\mathcal{F}_{k}\right\}$ is an adapted sequence, with a known upper bound:
\begin{equation}\label{a17}
\sup_{k\geq 0}|c_{k}|=C <\infty,\qquad a.s.
\end{equation}
where $C$ may be a random variable.
\end{assumption}
\begin{assumption}\label{assum4}
The noise $v_{k}$ is integrable and $\mathcal{F}_{k}-$measurale. For any $k\geq 1$, the conditional probability density function of $v_{k}$ given $\mathcal{F}_{k-1}$, denoted by $f_{k}(\cdot)$, is known and satisfies
\begin{equation}\label{6}
\begin{aligned}
\inf_{|x| \leq LM+C} \left\{f_{k}(x)\right\} > 0,\; \;\;\; k=0,1,\cdots, \qquad a.s.
\end{aligned}
\end{equation}
where $L$, $M$ and $C$ are defined by $(\ref{4})$, $(\ref{5})$ and $(\ref{a17})$.
\end{assumption}
\begin{remark}
It can be easily seen that if the threshold $c_{k}$ is fixed, then Assumption $\ref{assum3}$ will be satisfied automatically. Moreover, if the noise $v_{k}$ is independent with the $\sigma-$algebra $\mathcal{F}_{k-1}$, and with identically normal distribution as assumed previously (see,e.g., \cite{guo:2013}, \cite{zhang:2019}), then the condition $(\ref{6})$ in Assumption $\ref{assum4}$ will be satisfied.
\end{remark}
\subsection{Recursive algorithm and adaptive predictor}
To construct a Quasi-Newton type identification algorithm, we need to introduce a projection operator on $R^{p}$ as follows.
\begin{definition}
For the linear space $R^{p}~ (p\geq1)$, the weighted norm $\|\cdot \|_{Q}$ associated with a positive definite matrix $Q$ is defined as
\begin{equation}\label{7}
\| x\|_{Q}=x^{\tau}Qx, \quad \forall x \in \mathcal{R}^{p}.
\end{equation}
\end{definition}
\begin{definition}\label{def2}
For a given convex compact set $\Omega \in R^{p}$, and a positive definite matrix Q, the projection operator $\Pi_{Q}(\cdot)$ is defined as
\begin{equation}\label{8}
\Pi_{Q}(x)=\mathop{\arg\min}_{\omega \in \Omega}\|x-\omega\|_{Q}, \quad \forall x \in \mathcal{R}^{p}
\end{equation}
\end{definition}
\begin{remark}
The well-posedness of $ \Pi_{Q}(x)$ is ensured by the positive definite property of the matrix $Q$ and the convexity of $\Omega$ \citep{cheney:2001}.
\end{remark}
Our recursive identification algorithm is a kind of Quasi-Newton algorithm, defined as follows:
\begin{alg}\label{alg1}
\begin{equation}\label{9}
\hat{\theta}_{k+1}=\Pi_{P_{k+1}^{-1}}\left\{\hat{\theta}_{k}+a_{k}\beta_{k}P_{k}\phi_{k}e_{k+1}\right\},
\end{equation}
\begin{equation}\label{a1}
P_{k+1}=P_{k}-\beta_{k}^{2}a_{k}P_{k}\phi_{k}\phi_{k}^{\tau}P_{k},
\end{equation}
\begin{equation}\label{a2}
e_{k+1}=s_{k+1}-1+F_{k+1}(c_{k}-\phi_{k}^{\mathrm{\tau}} \hat{\theta}_{k}),
\end{equation}
\begin{equation}\label{a3}
a_{k}=\frac{1}{1+\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k}},
\end{equation}
\begin{equation}\label{a4}
0<\beta_{k+1}\leq \min{\left\{\beta_{k}, \inf _{|x| \leq LM+C}f_{k+2}(x)\right\}},
\end{equation}
\end{alg}
where $\hat{\theta}_{k}$ is the estimate of $\theta$ at
time $k$; $\Pi_{P_{k}^{-1}}$ is a projection operator defined as in Definition $\ref{def2}$; $F_{k}$ is the conditional probability distribution function of $v_{k}$ given the $\sigma-$algbra $\mathcal{F}_{k-1}$; the initial value $\hat{\theta}_{0}$ can be chosen arbitrarily in $D$, where $D$ is given in Assumption $\ref{assum2}$; $\beta_{0} $ can be arbitrarily chosen from the interval $\left(0, \min{\left\{1, \inf _{|x| \leq LM+C}f_{1}(x)\right\}}\right)$ ; $P_{0}>0$ can also be chosen arbitrarily.
Note that by $(\ref{a1})$ and the well-known matrix inversion formula (see, e.g., \cite{guo:2020}, Theorem 1.1.17), the inverse of $P_{k}$ can be recursively rewritten as
\begin{equation}\label{10}
P_{k+1}^{-1}=P_{k}^{-1}+\beta_{k}^{2}\phi_{k}\phi_{k}^{\tau},\;\;\;\; k=0,1,\cdots.
\end{equation}
Thus, $P_{k}^{-1}$ is positive-definite since the initial condition $P_{0}>0$, which ensures the well-posedness of the projection operator $\Pi_{P_{k}^{-1}}$ in Algorithm $\ref{alg1}$.
Moreover, since both $c_{k}$ and $\phi_{k}$ are $\mathcal{F}_{k}-$measurable, we have
\begin{equation}\label{a15}
E(y_{k+1}\mid \mathcal{F}_{k})=\theta^{\tau}\phi_{k} +E\left(v_{k+1}\mid \mathcal{F}_{k}\right)
\end{equation}
which is the best prediction for $y_{k+1}$ given $\mathcal{F}_{k}$ in the mean square sense. Note that $E\left(v_{k+1}\mid \mathcal{F}_{k}\right)$ can be obtained by the known conditional probability density function $f_{k+1}\left(\cdot\right)$ in Assumption $\ref{assum4}$. Replacing the unknown parameter $\theta$ in $(\ref{a15})$ by its estimate $\hat{\theta}_{k}$, we can obtain a natural adaptive predictor of $y_{k+1}$ as follows:
\begin{equation}\label{11}
\hat{y}_{k+1}=\hat{\theta}_{k}^{\tau}\phi_{k} +E\left(v_{k+1}\mid \mathcal{F}_{k}\right).
\end{equation}
The difference between the best prediction and adaptive prediction can be regarded as regret, denoted as $R_{k}$, i.e.,
\begin{equation}\label{12}
\begin{aligned}
R_{k}=&\left[E(y_{k+1}\mid \mathcal{F}_{k})-\hat{y}_{k+1} \right]^{2}=\left(\tilde{\theta}_{k}^{\tau}\phi_{k}\right)^{2},
\end{aligned}
\end{equation}
where $\tilde{\theta}_{k}=\theta-\hat{\theta}_{k}$. One may naturally expect that the regret $R_{k}$ be small in some sense, which will be useful in adaptive control. Details will be discussed in the subsequent section.
Throughout the sequel, for convenience , let us introduce the following notations:
\begin{equation}\label{cc}
\gamma_{k}=1/\beta_{k},
\end{equation}
\begin{equation}\label{23}
\omega_{k+1}=s_{k+1}-1+F_{k+1}(c_{k}-\theta^{\tau}\phi_{k}),
\end{equation}
\begin{equation}\label{24}
\psi_{k}=F_{k+1}(c_{k}-\hat{\theta}_{k}^{\tau}\phi_{k})-F_{k+1}(c_{k}-\theta^{\tau}\phi_{k})).
\end{equation}
\subsection{Global convergence results}
The following three theorems are the main results of this paper. Under no excitation conditions, we will establish some nice asymptotic upper bounds for the parameter estimation error, the accumulated regrets of adaptive prediction, and the tracking error of adaptive control.
\begin{theorem}\label{thm2}
Under Assumptions $\ref{assum1}$-$\ref{assum4}$, the estimation error produced by the estimation Algorithm $\ref{alg1}$ has the following upper bound:
\begin{equation}\label{15}
\begin{aligned}
\left\|\tilde{\theta}_{n+1}\right\|^{2}=&O\left(\frac{ \log \left(\lambda_{\max}\left\{P_{n+1}^{-1}\right\} \right)}{\lambda_{\min }\left\{P_{n+1}^{-1}\right\}}\right), \;\;\mathrm{a.s}.
\end{aligned}
\end{equation}
where $\tilde{\theta}_{k}=\theta-\hat{\theta}_{k}$.
\end{theorem}
The detailed proof of Theorem $\ref{thm2}$ is supplied in the next section.
\begin{corollaryx}\label{cor3}
Let the conditions of Theorem $\ref{thm2}$ hold, and let the conditional probability density function $\left\{f_{k}(x)\right\}$ of the noise sequence have a uniformly positive lower bound:
\begin{equation}\label{dd9}
\inf_{|x|\leq LM+C, k\geq 0}\left\{ f_{k}(x)\right\} > 0,\;\;\mathrm{a.s}.
\end{equation}
Then
\begin{equation}\label{dd8}
\left\|\tilde{\theta}_{n+1}\right\|^{2}=O\left(\frac{\log n }{\lambda_{\min }\left\{P_{0}^{-1}+\sum_{i=1}^{n} \phi_{i} \phi_{i}^{\tau}\right\}}\right),\;\;\mathrm{a.s}.
\end{equation}
\end{corollaryx}
\begin{remark}\label{re555}
Let the noise $v_{k}$ be independent with $\sigma-$algebra $\mathcal{F}_{k-1}$, and normally distributed with zero mean and variance $\sigma_{k}^{2}$, $k\geq 1$. Then the condition $(\ref{dd9})$ will be satisfied if $\left\{\sigma_{k}^{2}\right\}$ has an upper and positive lower bound.
\end{remark}
\begin{remark}\label{re55}
From $(\ref{dd8})$ we know that if we have
\begin{equation}\label{ccc}
\log n=o\left(\lambda_{\min }\left\{\sum_{i=1}^{n} \phi_{i} \phi_{i}^{\tau}\right\}\right),\;\; \mathrm{a.s}.
\end{equation}
as $n\rightarrow \infty$, then the estimates given by Algorithm $\ref{alg1}$ will be strongly consistent, i.e., $\lim_{n\rightarrow \infty}\|\tilde{\theta}_{n}\|=0,\;a.s.$
The condition $(\ref{ccc})$ is much weaker than the traditional persistent excitation condition, which requires that\, $n=O\left(\lambda_{min}\left\{\sum \limits_{i=1}^{n}\phi_{i}\phi_{i}^{\tau} \right\}\right)$. Also, the condition $(\ref{ccc})$ is equal to the Lai-Wei excitation condition $(\ref{3})$ for classical least-squares algorithm with regular output sensors.
\end{remark}
\begin{theorem}\label{thm1}
Consider the estimation Algorithm $\ref{alg1}$ under Assumptions $\ref{assum1}$-$\ref{assum4}$. The sample paths of the accumulated regrets will have the following upper bound:
\begin{equation}\label{14}
\sum_{k=0}^{n} R_{k}=O\left(\gamma_{n}^{2}\log |P_{n+1}^{-1}|\; \right),\;\;a.s.
\end{equation}
where $R_{k}$, $\gamma_{k}$ are defined by $(\ref{12})$ and $(\ref{cc})$, respectively.
\end{theorem}
The proof of Theorem $\ref{thm1}$ is given in Section $\ref{sec3}$.
According to Theorem $\ref{thm1}$, one can directly deduce the following corollary.
\begin{corollaryx}\label{cor2}
Let the conditions of Theorem $\ref{thm1}$ hold, and let $\left\{f_{k}(x)\right\}$ be the conditional probability density function of the noise sequence as defined in Assumption $\ref{assum4}$. Then we have the following two basic results for the accumulated regret of adaptive prediction:
\begin{itemize}
\item If $\left\{f_{k}(x)\right\}$ has a uniformly positive lower bound, i.e.
\begin{equation}\label{dd1}
\inf_{|x|\leq LM+C, k\geq 0}\left\{ f_{k}(x)\right\} > 0,\;\; \mathrm{a.s}.
\end{equation}
then
\begin{equation}\label{ddd}
\sum_{k=0}^{n} R_{k}= O(\log n),\;\; \mathrm{a.s}.
\end{equation}
\item If $\left\{f_{k}(x)\right\}$ does not have a uniformly positive lower bound but satisfies
\begin{equation}\label{dd2}
\sqrt{\frac{\log k}{k}} = o\;\left(\inf_{|x| \leq LM+C} \left\{ f_{k}(x)\right\}\right),\;\; \mathrm{a.s}.
\end{equation}
then
\begin{equation}\label{bb}
\sum_{k=0}^{n} R_{k} = o(n),\;\; \mathrm{a.s}.
\end{equation}
\end{itemize}
\end{corollaryx}
\begin{remark}\label{rem5}
Let the noise sequence $\left\{v_{k}\right\}$ be independent and normally distributed with zero mean and variance $\left\{\sigma_{k}^{2}\right\}$. Then the condition $(\ref{dd1})$ will be satisfied if $\left\{\sigma_{k}^{2}\right\}$ has both upper and lower positive bounds; the conditions $(\ref{dd2})$ will be satisfied if $\sigma_{k}^{2}\rightarrow 0$ and $\sigma_{k}^{2}\log k \rightarrow \infty$.
\end{remark}
\begin{remark}
The result $(\ref{ddd})$ in Corollary $\ref{cor2}$ is similar to the result for the classical LS algorithm for linear stochastic regression models with regular sensors, where the order $O(\log n)$ for the accumulated regrets is the best possible among all adaptive predictors(see \cite{lai:1986})
\end{remark}
As in the regular observation case (see \cite{guo:1995}), an important application of Theorem $\ref{thm1}$ is in adaptive control of stochastic systems with binary-valued observations, as stated in the following theorem:
\begin{theorem}\label{thm3}
Let the conditions of Theorem $\ref{thm1}$ hold. And let the conditional probability density function $\left\{f_{k}(x)\right\}$ satisfy $(\ref{dd1})$ and
\begin{equation}\label{uuu}
\sup_{k}E\left[|v_{k}|^{\alpha}\mid \mathcal{F}_{k-1}\right]<\infty, \quad a.s.,
\end{equation}
for some $\alpha > 4$. If the regression vectors $\phi_{k}$ can be influenced by an input signal $u_{k}$, such that for a given bounded sequence of reference signals $\{y_{k+1}^{*}\}$, the following equation can be satisfied by choosing $u_{k}$:
\begin{equation}\label{ggg}
\hat{\theta}_{k}^{\tau}\phi_{k}+E(v_{k+1}\mid\mathcal{F}_{k})=y_{k+1}^{*}.
\end{equation}
Then the averaged tracking error $J_{n}$, defined by
\begin{equation}
J_{n}=\frac{1}{n}\sum_{k=0}^{n-1}\left(y_{k+1}-y_{k+1}^{*}\right)^{2},
\end{equation}
will approach to its minimum value ${\frac{1}{n}}{\sum \limits_{k=1}^{n}\sigma_{k}^{2}}$ with the following best possible almost sure convergence rate:
\begin{equation}\label{ffff}
\begin{aligned}
\left|J_{n}-\frac{1}{n}\sum_{k=1}^{n}\sigma_{k}^{2}\right|=O\left(\sqrt{\frac{\log \log n}{n}}\right),\quad a.s.
\end{aligned}
\end{equation}
where $\sigma_{k}^{2}=E\left\{[v_{k}-E(v_{k} \mid \mathcal{F}_{k-1})]^{2}\mid \mathcal{F}_{k-1}\right\}$.
\end{theorem}
The detailed proof of Theorem $\ref{thm3}$ is given in the next section.
\section{Proofs of the main results}\label{sec3}
To prove the main results, we first introduce several lemmas.
\begin{lemma}\label{lem1} \citep{cheney:2001}.The projection operator given by Definition $\ref{def2}$ satisfies
\begin{equation}\label{17}
\|\Pi_{Q}(x)-\Pi_{Q}(y)\|_{Q} \leq \|x-y\|_{Q}\quad \forall x, y\in R^{p}
\end{equation}
\end{lemma}
\begin{lemma}\label{lem2} \citep{chen:1991}.Let $\left\{\omega_{n}, \mathcal{F}_{n}\right\}$ be a martingale difference sequence and $\left\{f_{n}, \mathcal{F}_{n}\right\}$ an adapted sequence.
If
\begin{equation}\label{18}
\sup_{n} E[|\omega_{n+1}|^{\alpha}\mid \mathcal{F}_{n}] < \infty \;\;a.s.
\end{equation}
for some $\alpha \in (0, 2]$, then as $n\rightarrow \infty$:
\begin{equation}\label{19}
\sum_{i=0}^{n}f_{i}\omega_{i+1} = O(s_{n}(\alpha)\log^{\frac{1}{\alpha}+\eta}(s_{n}^{\alpha}(\alpha)+e))\;a.s., \forall \eta >0,
\end{equation}
where
\begin{equation}
s_{n}(\alpha)=\left(\sum_{i=0}^{n}|f_{i}|^{\alpha}\right)^{\frac{1}{\alpha}}
\end{equation}
\end{lemma}
\begin{lemma}\label{lem3} \citep{lai:1982}.
Let \;$X_{1}, X_{2},\cdots$ be a sequence of vectors in $R^{p} (p\geq 1)$ and let $A_{n} = A_{0}+\sum_{i=1}^{n}X_{i}X_{i}^{\tau}$. Let $|A_{n}|$ denote the determinant of $A_{n}$. Assume that $A_{0}$ is nonsingular, then as $n\rightarrow \infty$
\begin{equation}\label{20}
\sum_{k=0}^{n}\frac{X_{k}^{\tau}A_{k}^{-1}X_{k}}{1+X_{k}^{\tau}A_{k}^{-1}X_{k}} = O(\log(|A_{n}|)).
\end{equation}
\end{lemma}
\begin{lemma}\label{lem4} \citep{guo:1995}.
Let \;$X_{1}, X_{2},\cdots$ be any bounded sequence of vectors in $R^{p}~(p\geq 1)$. Denote $A_{n} = A_{0}+\sum_{i=1}^{n}X_{i}X_{i}^{\tau}$ with $A_{0} > 0 $, then we have
\begin{equation}\label{b1}
\sum_{k=0}^{\infty}\left(X_{k}^{\tau}A_{k}^{-1}X_{k}\right)^{2} < \infty.
\end{equation}
\end{lemma}
Finally, the proofs of Theorems $\ref{thm2}$-$\ref{thm3}$ will immediately follow from the following Lemma $\ref{lem6}$, which can be proven by using Lemmas \ref{lem1}-\ref{lem4}.
\begin{lemma}\label{lem6}
Let Assumptions $\ref{assum1}$-$\ref{assum4}$ be satisfied. Then the parameter estimate given by Algorithm $\ref{alg1}$ has the following property as n $\rightarrow \infty$:
\begin{equation}\label{22}
\begin{aligned}
\tilde{\theta}_{n+1}^{\tau}P_{n+1}^{-1}\tilde{\theta}_{n+1}+\beta_{n}^{2}\sum_{k=0}^{n}\left(\tilde{\theta}_{k}^{\tau}\phi_{k} \right)^{2} = O\left(\log |P_{n+1}^{-1}|\right).
\end{aligned}
\end{equation}
\end{lemma}
{\bf Proof.}
By Assumptions $\ref{assum1}$-$\ref{assum4}$ and (\ref{9})-(\ref{a4}), $\psi_{k}$ is $\mathcal{F}_{k}-$measurable, and satisfies
\begin{equation}\label{25}
|\psi_{k}|\leq 1, k=0,1,\cdots
\end{equation}
Moreover, by $(\ref{a15})$ and $(\ref{23})$
\begin{equation}\label{26}
E(\omega_{k+1}\mid \mathcal{F}_{k})=0,
\end{equation}
which means $\left\{{\omega_{k}}, \mathcal{F}_{k} \right\}$ is a martingale difference sequence.
Following the analysis ideas of the classical least-squares for linear stochastic regression models(see e.g., \cite{moore:1978}, \cite{lai:1982}, \cite{guo:1995}), we consider the following stochastic Lyapunov function: $$ V_{k}=\tilde{\theta}_{k}^{\tau}P_{k}^{-1}\tilde{\theta}_{k}. $$By Lemma $\ref{lem1}$ and Algorithm $\ref{alg1}$ ,
we know that
\begin{equation}\label{27}
\begin{aligned}
&V_{k+1}=\tilde{\theta}_{k+1}^{\tau}P_{k+1}^{-1}\tilde{\theta}_{k+1} \\
\leq& \left\{\tilde{\theta}_{k}-a_{k}P_{k}\beta_{k}\phi_{k}\left[s_{k+1}-1+F_{k+1}\left(c_{k}-\phi_{k}^{\mathrm{\tau}} \hat{\theta}_{k}\right)\right] \right\}^{\tau}P_{k+1}^{-1}\cdot \\
&\left\{\tilde{\theta}_{k}-a_{k}P_{k}\beta_{k}\phi_{k}\left[s_{k+1}-1+F_{k+1}\left(c_{k}-\phi_{k}^{\mathrm{\tau}} \hat{\theta}_{k}\right)\right] \right\}\\
=&\left\{\tilde{\theta}_{k}-a_{k}P_{k}\beta_{k}\phi_{k}\left[\psi_{k}+\omega_{k+1}\right]\right\}^{\tau}P_{k+1}^{-1}\cdot \\
&\left\{\tilde{\theta}_{k}-a_{k}P_{k}\beta_{k}\phi_{k}\left[\psi_{k}+\omega_{k+1}\right]\right\}\\
=&\tilde{\theta}_{k}^{\tau}P_{k+1}^{-1}\tilde{\theta}_{k}-2a_{k}\beta_{k}\tilde{\theta}_{k}^{\tau}P_{k+1}^{-1}P_{k}\phi_{k}\psi_{k}\\
&+a_{k}^{2}\beta_{k}^{2}\psi_{k}^{2}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\\
&+2a_{k}^{2}\beta_{k}^{2}\psi_{k}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\omega_{k+1}\\
&-2a_{k}\beta_{k}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}\tilde{\theta}_{k}\omega_{k+1}\\
&+a_{k}^{2}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\omega_{k+1}^{2}.
\end{aligned}
\end{equation}
Let us now analyze the right-hand-side (RHS) of $\left(\ref{27} \right)$ term by term. From (\ref{10}), we know that
\begin{equation}\label{xx}
\tilde{\theta}_{k}^{\tau}P_{k+1}^{-1}\tilde{\theta}_{k} = \tilde{\theta}_{k}^{\tau}P_{k}^{-1}\tilde{\theta}_{k}+\beta_{k}^{2}(\tilde{\theta}_{k}^{\tau}\phi_{k})^{2}.
\end{equation}
Moreover, by (\ref{10}) again, we know that
\begin{equation}\label{28}
\begin{aligned}
&a_{k}P_{k+1}^{-1}P_{k}\phi_{k}\\
=&a_{k}\left(I+\beta_{k}^{2}\phi_{k}\phi_{k}^{\tau}P_{k}\right)\phi_{k}\\
=&a_{k}\phi_{k}\left(1+\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k}\right)\\
=&\phi_{k}.
\end{aligned}
\end{equation}
Hence, we have
\begin{equation}\label{29}
\begin{aligned}
&2a_{k}\beta_{k}\tilde{\theta}_{k}^{\tau}P_{k+1}^{-1}P_{k}\phi_{k}\psi_{k}\\
=&2\beta_{k}\tilde{\theta}_{k}^{\tau}\phi_{k}\psi_{k} = 2\beta_{k}|\tilde{\theta}_{k}^{\tau}\phi_{k}|\cdot|\psi_{k}|\\
\geq &2\beta_{k}^{2}(\tilde{\theta}_{k}^{\tau}\phi_{k})^{2},
\end{aligned}
\end{equation}
where the second equality is since $F_{k+1}(\cdot)$ is an increasing function, and the last inequality holds by ($\ref{a4}$) and
\begin{equation}\label{30}
|\psi_{k}|=\left|\int_{c_{k}-\theta^{\tau}\phi_{k}}^{c_{k}-\hat{\theta}_{k}^{\tau}\phi_{k}}f_{k+1}(x)dx\right| \geq \beta_{k}|\tilde{\theta}_{k}^{\tau}\phi_{k}|.
\end{equation}
Similarly, by $(\ref{28})$,
\begin{equation}\label{31}
\begin{aligned}
& a_{k}^{2}\beta_{k}^{2}\psi_{k}^{2}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\\
=&a_{k}\beta_{k}^{2}\psi_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k} \leq a_{k}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k}
\end{aligned}
\end{equation}
where we have used the fact that $|\psi_{k}| \leq 1$.
Now, substituting $(\ref{xx})$, $(\ref{29})$ and $(\ref{31})$ into $(\ref{27})$ we get
\begin{equation}\label{ee1}
\begin{aligned}
V_{k+1}\leq&\tilde{\theta}_{k}^{\tau}P_{k}^{-1}\tilde{\theta}_{k}-\beta_{k}^{2}(\tilde{\theta}_{k}^{\tau}\phi_{k})^{2}
+a_{k}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k}\\
&+2a_{k}^{2}\beta_{k}^{2}\psi_{k}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\omega_{k+1}\\
&-2a_{k}\beta_{k}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}\tilde{\theta}_{k}\omega_{k+1}\\
&+a_{k}^{2}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\omega_{k+1}^{2},
\end{aligned}
\end{equation}
Summing up both sides of $\left(\ref{ee1} \right)$ from 0 to $n$, we have
\begin{equation}\label{32}
\begin{aligned}
V_{n+1}\leq &\tilde{\theta}_{0}^{\tau}P_{0}^{-1}\tilde{\theta}_{0}+\sum_{k=0}^{n}a_{k}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k}\\
&-\beta_{k}^{2}\sum_{k=0}^{n}(\tilde{\theta}_{k}^{\tau}\phi_{k})^{2}\\
&+2\sum_{k=0}^{n}a_{k}^{2}\beta_{k}^{2}\psi_{k}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\omega_{k+1}\\
&-2\sum_{k=0}^{n}a_{k}\beta_{k}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}\tilde{\theta}_{k}\omega_{k+1}\\
&+\sum_{k=0}^{n}a_{k}^{2}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\omega_{k+1}^{2}
\end{aligned}
\end{equation}
We now analyze the last three terms in $(\ref{32})$ which are related to the martingale difference sequence $\left\{\omega_{k}, \mathcal{F}_{k} \right\}$.
Let $X_{k}=\beta_{k}\phi_{k}$ in Lemma $\ref{lem3}$ and Lemma $\ref{lem4}$, we get
\begin{equation}\label{35}
\sum_{k=0}^{n}a_{k}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k}=O(\log \left|P_{n+1}^{-1}\right|),
\end{equation}
\begin{equation}\label{fff}
\sum_{k=0}^{n}(\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k})^{2} = O(1),
\end{equation}
respectively. Moreover, since $|\omega_{k}|\leq 1$, we have
\begin{equation}\label{final}
\sup_{k} E[|\omega_{k+1}|^{2}\mid \mathcal{F}_{k}] < \infty, \;a.s.
\end{equation}
Denote
\begin{equation}
\tilde{S}_{n}=\sqrt{\sum_{k=0}^{n}\left(a_{k}\beta_{k}^{2}\psi_{k}\phi_{k}^{\tau}P_{k}\phi_{k}\right)^{2}}.
\end{equation}
By $(\ref{fff})$ and the boundedness of $a_{k}$ and $\psi_{k}$, we know that $\tilde{S}_{n} = O(1)$. Consequently, by $(\ref{28})$ and Lemma $\ref{lem2}$, we have
\begin{equation}\label{33}
\begin{aligned}
&\sum_{k=0}^{n}a_{k}^{2}\beta_{k}^{2}\psi_{k}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\omega_{k+1}\\
=&\sum_{k=0}^{n}a_{k}\beta_{k}^{2}\psi_{k}\phi_{k}^{\tau}P_{k}\phi_{k}\omega_{k+1}\\
=&O\left(\tilde{S_{n}} \log^{\frac{1}{2}+\eta} \left(\tilde{S}_{n}^{2}+e\right)\right) = O(1), \; \text { a.s. } \;\;\forall \eta>0.
\end{aligned}
\end{equation}
Also, by Lemma $\ref{lem2}$ and $(\ref{28})$ again, we know that
\begin{equation}\label{34}
\begin{aligned}
&\sum_{k=0}^{n}a_{k}\beta_{k}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}\tilde{\theta}_{k}\omega_{k+1}\\
=&\sum_{k=0}^{n}\beta_{k}\phi_{k}^{\tau}\tilde{\theta}_{k}\omega_{k+1}\\
=&O\left(\sum_{k=0}^{n}(\beta_{k}\tilde{\theta}_{k}^{\tau}\phi_{k})^{2} \right)^{\frac{1}{2}+\eta}\\
=&o\left(\sum_{k=0}^{n}(\beta_{k}\tilde{\theta}_{k}^{\tau}\phi_{k})^{2} \right) + O(1) \; \text { a.s. } \;\; \forall \eta>0
\end{aligned}
\end{equation}
As for the last term of right side of $(\ref{32})$, since $\left|\omega_{k}\right|\leq 1$, we have
\begin{equation}\label{kkk}
\sup _{k} E\left[\left|\omega_{k+1}^{2}-E[\omega_{k+1}^{2}\mid\mathcal{F}_{k}]\right|^{2}\mid \mathcal{F}_{k}\right] \leq 1, \;\text { a.s. },
\end{equation}
Denote $\Lambda_{n} =\sqrt{\sum_{k=0}^{n}\left(a_{k}\beta_{k}^{2} \phi_{k}^{\mathrm{\tau}} P_{k} \phi_{k}\right)^{2}}$, by Lemma $\ref{lem2}$ and letting $\alpha = 2$, we get
\begin{equation}\label{36}
\begin{aligned}
&\sum_{k=0}^{n}a_{k}^{2}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}P_{k+1}^{-1}P_{k}\phi_{k}\left\{\omega_{k+1}^{2}-E[\omega_{k+1}^{2}\mid\mathcal{F}_{k}]\right\}\\
=&\sum_{k=0}^{n}a_{k}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k}\left\{\omega_{k+1}^{2}-E[\omega_{k+1}^{2}\mid\mathcal{F}_{k}]\right\}\\
=&O\left(\Lambda_{n} \log^{\frac{1}{2}+\eta} (\Lambda_{n}^{2}+e)\right)
=O(1), \quad \text { a.s. } \forall \eta>0
\end{aligned}
\end{equation}
where the last equality is from $(\ref{fff})$ and $|a_{k}|\leq 1$.
Hence, from $(\ref{35})$ and $(\ref{final})$
\begin{equation}\label{39}
\begin{aligned}
& \sum_{k=0}^{n} a_{k}\beta_{k}^{2} \phi_{k}^{\mathrm{\tau}} P_{k} \phi_{k} \omega_{k+1}^{2} \\
\leq& \sum_{k=0}^{n}a_{k}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k}\left(\omega_{k+1}^{2}-E[\omega_{k+1}^{2}\mid\mathcal{F}_{k}]\right)\\
&+ \sup_{k}E[\omega_{k+1}^{2}\mid\mathcal{F}_{k}]\left( \sum_{k=0}^{n}a_{k}\beta_{k}^{2}\phi_{k}^{\tau}P_{k}\phi_{k}\right) \\
=& O\left(\log |P_{n+1}^{-1}|) \right)\quad \text { a.s. }
\end{aligned}
\end{equation}
Combine $(\ref{32})$, $(\ref{33})$, $(\ref{34})$, $(\ref{39})$, we thus have
\begin{equation}
\tilde{\theta}_{n+1}^{\tau}P_{n+1}^{-1}\tilde{\theta}_{n+1}+\sum_{k=0}^{n}\left(\beta_{k}\tilde{\theta}_{k}^{\tau}\phi_{k} \right)^{2}= O(\log |P_{n+1}^{-1}|),\quad \text { a.s. }.
\end{equation}
Note that $\left\{\beta_{k}\right\}$ is a non-increasing sequence, we finally obtain $(\ref{22})$.
\qed
{\bf Proofs of Theorems $\ref{thm2}$ and $\ref{thm1}$.} We note that
\begin{equation}
\lambda_{min}\left\{P_{n+1}^{-1} \right\} \|\tilde{\theta}_{n+1}\|^{2} \leq \tilde{\theta}_{n+1}^{\tau}P_{n+1}^{-1}\tilde{\theta}_{n+1}.
\end{equation}
Then Theorem $\ref{thm2}$ follows from Lemma $\ref{lem6}$ immediately. Moreover, note that $\gamma_{n}=1/ \beta_{n}$, Theorem $\ref{thm1}$ also follows from Lemma $\ref{lem6}$.\qed
{\bf Proof of Theorem $\ref{thm3}$.} By the definitions of $J_{n}$, $R_{n}$ and the equation $(\ref{ggg})$, we know that
\begin{equation}\label{jjj}
\begin{aligned}
J_{n}=&\frac{1}{n}\sum_{k=0}^{n-1}\left[y_{k+1}-y_{k+1}^{*} \right]^{2}\\
=&\frac{1}{n}\sum_{k=0}^{n-1}\left[y_{k+1}-\phi_{k}^{\tau}\hat{\theta}_{k}-E\left(v_{k+1}\mid \mathcal{F}_{k}\right)\right]^{2}\\
=&\frac{1}{n}\sum_{k=0}^{n-1}R_{k}+\frac{1}{n}\sum_{k=0}^{n-1}\left[v_{k+1}-E\left(v_{k+1}\mid \mathcal{F}_{k}\right)\right]^{2}\\
&+\frac{1}{n}\sum_{k=0}^{n-1}2\left(\phi_{k}^{\tau}\tilde{\theta}_{k}\right)\left[v_{k+1}-E\left(v_{k+1}\mid \mathcal{F}_{k}\right)\right],
\end{aligned}
\end{equation}
We now estimate the RHS of the above equation term by term. First, by Corollary $\ref{cor2}$ we know that the first term is bounded by $O\left({\log n \over n}\right)$. For the last two terms of $(\ref{jjj})$, by Lemma $\ref{lem2}$, we have
\begin{equation}\label{hh}
\begin{aligned}
&\sum_{k=0}^{n-1}\left(\phi_{k}^{\tau}\tilde{\theta}_{k}\right)\left[v_{k+1}-E\left(v_{k+1}\mid \mathcal{F}_{k}\right)\right]\\
=&O\left(\left\{\sum_{k=0}^{n-1}R_{k}\right\}^{\frac{1}{2}+\eta}\right) \\
=&o\left(\sum_{k=0}^{n-1}R_{k}\right) + O(1)\quad a.s.,\quad \forall \eta >0
\end{aligned}
\end{equation}
Moreover, let $\xi_{k+1}=v_{k+1}-E\left(v_{k+1}\mid \mathcal{F}_{k}\right)$. From $C_{r}-$inequality and Lyapunov equality, we can get
\begin{equation}
\begin{aligned}
&\sup_{k}E\left[|\xi_{k+1}^{2}-E(\xi_{k+1}^{2}\mid \mathcal{F}_{k})|^{\frac{\alpha}{2}}\mid \mathcal{F}_{k} \right]\\
\leq&2^{\frac{\alpha}{2}}\sup_{k}E\left[|\xi_{k+1}|^{\alpha}\mid \mathcal{F}_{k} \right] \\
\leq&2^{\frac{3\alpha}{2}}\sup_{k}E\left[|v_{k+1}|^{\alpha}\mid \mathcal{F}_{k} \right] < \infty \quad a.s.
\end{aligned}
\end{equation}
Thus by a refined martingale estimation theorem (see \cite{wei:1985}, \cite{guo:2020}), we have
\begin{equation}
\frac{1}{n}\sum_{k=0}^{n-1}\left[\xi_{k+1}^{2}-E\left(\xi_{k+1}^{2}\mid\mathcal{F}_{k}\right) \right]=O\left(\sqrt{\frac{\log \log n}{n}}\right), \quad a.s.
\end{equation}
Note that $\sigma_{k+1}^{2} = E\left(\xi_{k+1}^{2}\mid\mathcal{F}_{k}\right)$, hence
\begin{equation}\label{tian}
\begin{aligned}
&\frac{1}{n}\sum_{k=0}^{n-1}\left[v_{k+1}-E\left(v_{k+1}\mid \mathcal{F}_{k}\right)\right]^{2}\\
=&\frac{1}{n}\sum_{k=0}^{n-1}\sigma_{k+1}^{2}+ \frac{1}{n}\sum_{k=0}^{n-1}\left[\xi_{k+1}^{2}-E\left(\xi_{k+1}^{2}\mid\mathcal{F}_{k}\right) \right]\\
=&\frac{1}{n}\sum_{k=0}^{n-1}\sigma_{k+1}^{2}+ O\left(\sqrt{\frac{\log \log n}{n}}\right), \quad a.s.
\end{aligned}
\end{equation}
Combining all the results above, we can obtain $(\ref{ffff})$. The convergence rate is claimed to be the best possible because it is the same as that given by the well known iterated logarithm laws in probability theory.
\qed
\section{Numerical simulation}
{\bf Example 1.}
Consider the stochastic regression system
\begin{equation}\label{a}
y_{k+1}=a+bu_{k}+v_{k+1},\;k=0,1,2,\cdots
\end{equation}
with binary-valued observations
\begin{equation}\label{b}
s_{k+1}=I_{\left[y_{k+1} \geq 0\right]}=\left\{\begin{array}{ll}1, & y_{k+1} \geq 0; \\0,& \text { otherwise, }\end{array}\right.
\end{equation}
where $\left\{u_{k}\right\}$ and $\left\{v_{k}\right\}$ are the input and the noise, respectively. $\theta=[a , b]^\tau=[0.5, -0.5]^\tau \in R^{2}$ is the true parameter, $\phi_{k}=[1,u_{k}]^{\tau}\in R^{2}$ is the corresponding regressor. The noise sequence $\left\{ v_{k}, k\geq 1\right\}$ is i.i.d. with standard normal distribution $\mathcal{N}(0,1)$. To estimate $\theta$ by Algorithm $\ref{alg1}$, take a convex bounded set $$D =\left\{[x , y]^\tau : |x| \leq 2, |y| \leq 2 \right\},$$ and the initial value $\hat{\theta}_{0}=[1,-1]^\tau$, $P_{0}=I$. Moreover, the input $\left\{u_{k}, k\geq 1\right\}$ is an independent sequence with Gaussian distribution $u_{k}\sim\sqrt[4]{\frac{1}{k}}\cdot\mathcal{N}(0,1)$, and independent of $\left\{v_{k}\right\}$.
In this case, we can easily verify that
\begin{equation}\label{kkkk}
\begin{aligned}
&\lambda_{min}\left\{\sum_{k=1}^{n}\phi_{k}\phi_{k}^{\tau}\right\}\sim \sqrt{n},\\
&\lambda_{max}\left\{\sum_{k=1}^{n}\phi_{k}\phi_{k}^{\tau}\right\}\sim n,
\end{aligned}
\end{equation}
as $n\rightarrow \infty$, which indicates that $\left\{\phi_{k}\right\}$ does not satisfy the PE condition. By $(\ref{kkkk})$ and $(\ref{dd8})$ in Corollary $\ref{cor3}$, the estimate error $\|\tilde{\theta}_{n}\|^{2}$ will convergent to 0 with the convergence rate $O\left(\frac{\log n}{\sqrt{n}}\right)$, which is verified by a trajectory of $G_{n}=\frac{\|\tilde{\theta}_{n}\|^{2}\sqrt{n}}{\log n}$ in Fig. \ref{fig1}. For the accumulated regrets, Fig. \ref{fig2} shows the trajectory of $\frac{1}{\log n}\cdot\sum \limits_{k=0}^{n}R_{k}$, which is bounded by $(\ref{ddd})$ in Corollary $\ref{cor2}$.
\begin{figure}
\begin{center}
\includegraphics[width=0.52\textwidth,height=0.34\textwidth]{1.eps}
\caption{A trajectory of $G_{n}$}
\label{fig1}
\end{center}
\end{figure}
\begin{figure}
\begin{center}
\includegraphics[width=0.52\textwidth,height=0.34\textwidth]{2.eps}
\caption{A trajectory of $\frac{1}{\log n} \sum \limits_{k=0}^{n}R_{k}$}
\label{fig2}
\end{center}
\end{figure}
{\bf Example 2.} Let the conditional probability density function $\left\{f_{k}(x),k\geq 1\right\}$ be defined as in Assumption $\ref{assum4}$. Then Corollary $\ref{cor2}$ indicates that if $\inf_{|x|\leq LM+C}\left\{f_{k}(x)\right\}$ converges to 0 with proper rate, the averaged regrets of adaptive prediction will converges to 0. Let us verify this result by the model (\ref{a})-(\ref{b}) again.
Suppose $\theta=[a,b]^\tau=[1, 1]^\tau \in R^{2}$, $\phi_{k}=[1,u_{k}]^{\tau}\in R^{2}$. The input sequence $\left\{u_{k}, k\geq 1\right\}$ is an independent sequence with Gaussian distribution $u_{k}\sim\sqrt[4]{\frac{1}{k}}\cdot\mathcal{N}(0,1)$. The noise sequence $\left\{ v_{k}, k\geq 1\right\}$ is independent with Gaussian distribution $v_{k}\sim \sqrt[4]{\frac{1}{\log k}} \cdot\mathcal{N}(0, 1)$ and independent of $\left\{u_{k}\right\}$.
In this case, the variance $\sigma_{k}^{2}$ of $v_{k}$ is $\sqrt{\frac{1}{\log k}}$, thus $(\ref{dd2})$ is satisfied according to Remark $\ref{rem5}$. To construct the estimation algorithm, let the bounded parameter set $D$ be $\left\{[x , y]^\tau : |x| \leq 3, |y| \leq 3 \right\}$, the initial value $\hat{\theta}_{0}=[-2,2]^\tau$, $P_{0}=I$. Fig. \ref{fig3} shows the convergence result $(\ref{bb})$ in Corollary $\ref{cor2}$ for the averaged regrets of adaptive prediction under Algorithm $\ref{alg1}$.
\begin{figure}
\begin{center}
\includegraphics[width=0.52\textwidth,height=0.34\textwidth]{3.eps}
\caption{A trajectory of $\frac{1}{n} \sum \limits_{k=0}^{n}R_{k}$}
\label{fig3}
\end{center}
\end{figure}
{\bf Example 3.} In this example, we will give a concrete example with adaptive control to verify Theorem $\ref{thm3}$. Consider the model (\ref{a})-(\ref{b}). Let $\theta=[a,b]^\tau=[0.5,0.8]^\tau \in R^{2}$ be the true parameter, $\phi_{k}=[1,u_{k}]^{\tau}\in R^{2}$ be the corresponding regressor. The noise sequence $\left\{ v_{k}, k\geq 1\right\}$ is independent and standard normally distributed with $\sigma=1$. To give the estimate $\hat{\theta}_{k}=\left(a_{k}, b_{k}\right)^{\tau}$ under Algorithm $\ref{alg1}$, let the bounded parameter set $D$ be $\left\{[x , y]^\tau : |x| \leq 2, \;0.3\leq y \leq 2 \right\}$, the initial value $\hat{\theta}_{0}=[1,1]^\tau$, $P_{0}=I$.
Let the reference signals $\left\{y_{k}^{*}\right\}$ be given by $y_{k}^{*}\equiv 1$. The input $u_{k}$ is designed to ensure the output $y_{k+1}$ to track the given bounded reference signal $y_{k+1}^{*}$. By $(\ref{ggg})$ in Theorem $\ref{thm3}$, we can design the input by solving the following equation:
\begin{equation}
E(y_{k+1}\mid \mathcal{F}_{k})=y_{k+1}^{*},
\end{equation}
which implies $u_{k}=(1-\hat{a}_{k})/\;\hat{b}_{k}$. From the result of the Theorem $\ref{thm3}$, the averaged tracking error $J_{n}$ will approach to $\sigma^{2}$ with the convergence rate $O\left(\sqrt{\frac{\log \log n}{n}} \right)$. Let $L_{n}=|J_{n}-\sigma^{2}|\sqrt{\frac{n}{\log \log n}}$.\; Fig.~\ref{fig4} shows the trajectory of $L_{n}$.
\begin{figure}
\begin{center}
\includegraphics[width=0.52\textwidth,height=0.34\textwidth]{4.eps}
\caption{A trajectory of $L_{n}$}
\label{fig4}
\end{center}
\end{figure}
\section{Concluding remarks}
This paper investigated the identification and adaptation problems of stochastic regression models with binary-valued observations, and proposed a recursive Quasi-Newton type algorithm to estimate the unknown parameters. It is shown that the estimation algorithm will converge to the true parameter almost surely under a non-persistent excitation condition. It is also shown that the averaged regrets of adaptive prediction converges to 0 under no excitation condition, which can be conveniently used in adaptive control to achieve asymptotic optimality of adaptive tracking without resorting to any excitation conditions. We remark that the results of this paper can be extended to various situations including any finite-valued observations with generally defined indicator functions, and that this paper may offer a necessary step for future investigations on more general adaptive control and estimation problems of stochastic systems with binary-valued observations.
|
\section{INTRODUCTION}
Autonomous driving is expected to improve the safety and efficiency of our daily transportation thanks to the technological advancements in both algorithms and hardwares. While a typical autonomous driving system consists of four modules: perception, decision-making, planning, and control, researchers recently argue that autonomous vehicles will be safer if they can precisely predict future locations of its surrounding vehicles~\cite{li2019grip}. To this purpose, many trajectory prediction methods have been proposed, which fall in three categories, physics-based~\cite{ammoun2009real}, maneuver-based~\cite{hermes2009long, laugier2011probabilistic}, and interaction-aware methods~\cite{deo2018convolutional, li2019grip, mo2020recog, zhao2020tnt, mo2021heterogeneous}. More about this taxonomy can be found in~\cite{lefevre2014survey}. However, trajectory prediction is challenging in that driving is a complex interactive behavior~\cite{xing2021toward}, where the motion of a vehicle is affected by not only its driving style but also its surrounding vehicles, and the number of surrounding vehicles can be variant in different traffic situations.
Thanks to the availability of many real-world collected driving datasets~\cite{ushighway101, interactiondataset} and the success of neural networks, data-driven interaction-aware methods dominate the field of trajectory prediction in the last years. Most of these methods jointly consider temporal and spatial features~\cite{deo2018convolutional, zhao2019multi, mo2020recog}. Convolutional social pooling (CS-LSTM)~\cite{deo2018convolutional} applies long short-term memory network (LSTM)~\cite{hochreiter1997long} to individual vehicles' past tracks to extract their dynamics then aligns these dynamics into a target-centered occupancy grid to represent the spacial interaction. A CNN is then used to extract interaction feature from the grid. The performance of CS-LSTM can be affected by the size of the occupancy grid. It ignores the vehicle which is aggressively approaching the target vehicle but still outside the grid. Authors of~\cite{mo2020interaction} proposed to consider eight closet surrounding vehicles that have the most impact on the target vehicle's behavior rather than many vehicles in an occupancy grid. However, requiring the exact eight neighboring vehicles limited their model to be applied to situations where the number of surrounding vehicles varies.
Representing inter-vehicular interaction as a graph and applying graph neural network algorithms to model the interaction attracted great interest in the past two years~\cite{diehl2019graph, li2019grip, zhao2020tnt, mo2020recog}.
Authors of~\cite{diehl2019graph} conceptually proved that modeling a traffic scene as a graph to utilize the power of GNN increases prediction quality on a more-interactive highway dataset. They used only current information in their model and suggested integrating recurrent neural networks with GNNs in future works. GRIP~\cite{li2019grip} designed several graph convolutional blocks to extract interaction feature, which is then fed to an LSTM-based Encoder-Decoder to predict future trajectories. GRIP treats all the nodes equally when predicting a target vehicle's trajectory, which fails to emphasize the effects of the target vehicle's own dynamics. GRIP cannot accommodate state-of-the-art GNNs for interaction modeling to take advantage the advances in GNNs, like attention mechanisms. ReCoG~\cite{mo2020recog} modeled the relationships among vehicles and infrastructure as a heterogeneous graph and adopted state-of-the-art GNNs for the interaction feature. ReCoG focused on single vehicular trajectory prediction for urban driving, where the road structure affects vehicles' trajectories significantly.
Inspired by~\cite{diehl2019graph}, this work improves the CNN-LSTM-based trajectory prediction method proposed in~\cite{mo2020interaction} by integrating RNNs and GNNs to handle the situation with varying number of surrounding vehicles and investigates the graph modeling's potential on the multi-vehicular trajectory prediction. The proposed model uses RNNs to extract dynamics features of all vehicles, then applies a GNN on a star-like directed graph, where a node corresponding to a vehicle contains its sequential feature and an edge from one node to another node implies that the latter's behavior is affected by the former, to summarize the inter-vehicular interaction. Finally, an RNN decoder is applied to the combination of the target vehicle's dynamics feature and its interaction feature for single vehicular trajectory prediction.
\begin{figure*}
\centering
\includegraphics[trim={0cm 0cm 0cm 0cm}, clip, width=1.0\textwidth]{figs/grmodelitsc2021.pdf}
\vspace{-0.7cm}
\caption{\textbf{Illustration of the proposed model in this study.} RNNs with shared weights are used to encode the dynamics features of vehicles individually. A GNN-based interaction encoder is applied to these dynamics features, which are contained in corresponding nodes in a directed interaction graph, to summarize the inter-vehicular interaction feature. Finally an LSTM decoder predicts the trajectory by jointly consider the target vehicle's dynamics and interaction features.}
\label{fig: model}
\vspace{-5mm}
\end{figure*}
The main contributions of this work can be summarized as follows:
\begin{itemize}
\item A Graph-based interaction-aware trajectory prediction method is proposed.
\item Ablative studies are conducted to show the necessity to jointly consider individual dynamics and interaction features.
\item The potential of the proposed method to be applied to multi-vehicular trajectory prediction is investigated.
\end{itemize}
The rest of this paper is organized as below. Sec.~\ref{sec: method} expatiates the proposed method. Sec.~\ref{sec: experiment} describes experimental settings. Sec.~\ref{sec: results} evaluates the proposed model on the single trajectory prediction task and investigates its potential for multi-vehicular trajectory prediction. Finally, Sec.~\ref{sec: conclusion} concludes this paper and points out future directions.
\section{METHOD}
This section formulates the trajectory prediction problem and proposes a two-channel Encoder-Decoder structure, which consists of history encoder, interaction encoder, and future decoder, for this problem.
\label{sec: method}
\subsection{Problem Formulation}
\label{subsec: stpproblem}
This work aims to predict the future trajectory of a target vehicle driving on a highway given historical trajectories of its up-to-eight surrounding vehicles. As shown in Fig.~\ref{fig: model}, this task considers two kinds of vehicles: the target vehicle and its neighboring vehicles.
Neighboring vehicles considered are the target vehicle's preceding (\#1) and following (\#2) vehicles, its nearest neighbors in adjacent lanes (\#3 and \#4), in terms of longitudinal distance, and their preceding (\#5 and \#7) and following (\#6 and \#8) vehicles.
The input to the model ($\mathcal{H}_t$) is a set of historical trajectories of all considered vehicles, including the target vehicle.
\begin{equation}
\mathcal{H}_t = \lbrace h^0_t, h^1_t, \cdots, h^{m}_t \rbrace
\label{eq: Histstp}
\end{equation}
where $ h^i_t = [p^i_{t-T_h+1}, p^i_{t-T_h+2}, \cdots, p^i_t]$ represents the sequence of historical trajectory of vehicle $i$ at time $t$. $T_h$ is the traceback horizon. Without loss of generality, this work numbers the target vehicle as $0$ and the neighboring vehicles from $1$ to $m \in [1, 8]$.
The output is the predicted future trajectory of the target vehicle at time $t$:
\begin{equation}
f^0_t = [p^i_{t+1}, p^i_{t+2}, \cdots, p^i_{t+T_f}]
\label{eq: Futstp}
\end{equation}
where $T_f$ is the prediction horizon.
\subsection{Model Structure}
To solve the single trajectory prediction problem, this work proposes a GNN-RNN based model, which is designed under the Encoder-Decoder structure and consists of two encoders (history encoder, interaction encoder) and one decoder (future decoder). The history encoder, implemented with an RNN, extracts an individual vehicle's dynamics from its historical trajectory. The interaction encoder uses a GNN to summarize interaction features among a variable number of vehicles. Then the future decoder uses another RNN to roll out the future trajectory of the target vehicle. Details of these main parts of the proposed model are described below.
\subsubsection{History Encoder}
The history encoder is shared across all vehicles to encode individual dynamics from their own historical trajectories. Eq.~\ref{eq: histenc} shows that the encoder is applied to historical tracks of all vehicles in parallel.
\begin{equation}
R_t = \{r^0_t, r^1_t, \cdots, r^m_t \} = \mathrm{RNN_{hist}}(\mathrm{Emb}(\mathcal{H}_t)),
\label{eq: histenc}
\end{equation}
where $\mathrm{Emb}()$ is a linear transformation embedding the low-dimensional xy-coordinates into a high-dimensional vector space, $\mathrm{RNN_{hist}}$ is a shared RNN applied to the embedded historical tracks of all vehicles, $r^i_t$ is the dynamics feature of vehicle $i$ at time $t$.
\subsubsection{Interaction Encoder}
\label{subsec: intenc}
Considering the fact that driving is an interactive activity and the mutual influence between two cars on each other is different, this method models the inter-vehicular interaction as a directed graph, where each node represents a vehicle and contains the vehicle's sequential feature.
\begin{MyDef}[Directed Graph]
A graph can be represented by $\mathbb{G} = (V, E)$, where $V=\{v_0, \cdots, v_m\}$ is the set of $m+1$ nodes, and $E \subset V \times V$ is the set of edges.
If the edge from node $i$ to node $j$ is different from the edge from node $j$ to node $i$, the graph is a directed graph.
\end{MyDef}
Since this work models the interaction among vehicles as a graph, the structure of the graph will significantly affect the performance and efficiency of method~\cite{diehl2019graph}. If the graph contains only self connections, its performance should be similar to a simple model working on the target vehicle's historical track only. While if the graph contains all connections (every node is connected to the rest of the nodes), it considers redundant connections, which increases quadratically with the number of nodes. This work considers up-to-eight neighboring vehicles and constructs the interactive graph as a star-like graph.
\textbf{Graph Construction.} Without loss of generality, this work sets the target vehicle as $v_0$, and all the neighboring vehicles as $\{ v_1, \dots, v_m \}$. Then the edge set of the star-like graph with self-loop is constructed.
\begin{equation}
E = \{ e^{0, j} \}_{(j=0, \cdots, m)} \cup \{ e^{j, 0} \}_{(j=1, \cdots, m)},
\end{equation}
where $e^{i,j}$ means that there is a directed edge from node $j$ to node $i$, that is, node $j$ is the neighbor of node $i$ and node $j$'s behavior will affect node $i$'s behavior. An example of the star-like directed graph with self-loop can be found in Fig.~\ref{fig: model}
Nodes in the constructed graph contain corresponding vehicles' sequential features $r^i_t$ and directed edges represent their directed effects to others. Then the graph is processed by a graph neural network to model the the interaction feature $g^0_t \in G_t$ as shown in Eq.~\ref{eq: interenc}:
\begin{equation}
G_t = \mathrm{GNN_{inter}}(R_t, E_t),
\label{eq: interenc}
\end{equation}
where $E_t$ represents the graph structure at time $t$, $\mathrm{GNN_{inter}}$ is the interaction encoder implemented with a 2-layer GNN, and $G_t=\{ g^0_t, \cdots, g^m_t \}$ contains the interaction features of all vehicles at time $t$.
\subsubsection{Future Decoder}
The future trajectory $f^0_t$ is predicted upon the target vehicle's dynamics feature $r^0_t$ and interaction feature $g^0_t$ using another RNN.
\begin{equation}
f^0_t = \mathrm{RNN_{fut}} ([g^0_t, r^0_t]),
\end{equation}
where $\mathrm{RNN_{fut}}$ is the future decoder implemented with RNN and $[g^0_t, r^0_t]$ is the concatenation of $g^0_t$ and $r^0_t$.
The model also uses proper fully-connected layers, which are not shown in the equations. Further details can be found in Sub.Sec.~\ref{subsec: implement} and the released code.
\section{EXPERIMENTAL SETUP}
\label{sec: experiment}
The experiments are set up with data pre-processing, model implementing, and metric setting.
\subsection{Dataset}
This work uses vehicle trajectories extracted from the publicly available NGSIM US-101~\cite{ushighway101} dataset, collected from 7:50 a.m. to 8:35 a.m. on June 15, 2005, for training and validation. The study area is a 640 meters segment of U.S. Highway 101, consisting of five main lanes, one auxiliary lane, and on-ramp and off-ramp lanes. The vehicle trajectory data are recorded at 10 Hz using eight synchronized digital video cameras mounted from the top of a 36-story building. This work selects roughly balanced data so that the lane-keeping trajectories do not dominate the dataset.
\subsection{Data Pre-processing}
This work first selects target vehicles then selects data pieces from their trajectory.
\subsubsection{Target Vehicles Selection} A vehicle is selected as a target vehicle upon following conditions:
\begin{itemize}
\item It has not been driven in lanes 7 (On-ramp) and 8 (off-ramp).
\item It only changed its lane once during the recording time.
\item Its recorded track is at least 1,000 feet in length.
\item Its lane-change maneuver happened within the range from 300 to 1,900 feet in the study area.
\item Its lane-change maneuver was obvious that the maximum lateral displacement before and after lane-change is greater than 10 feet.
\end{itemize}
This step finally selects 124 ( out of 1,993) vehicles from the \textit{07:50am-08:05am} segment, 106 (out of 1,533) vehicles from the \textit{08:05am-08:20am} segment, and 68 (out of 1,298) vehicles from the \textit{08:20am-08:35am} segment.
\subsubsection{Data Selection}
For a target vehicle, 260 frames from 13 seconds (130 frames) before lane-change to 13 seconds (130 frames) after lane-change are considered as candidates of the current frame (time $t$ in Eq.~\ref{eq: Histstp}). Then a data is stored in the dataset if the following conditions are all satisfied:
\begin{itemize}
\item The target vehicle has a 3-second historical trajectory and a 5-second future trajectory.
\item All neighboring vehicles have a 3-second historical trajectory.
\end{itemize}
This step selects totally 63,176 pieces of data with 23,803 from the \textit{07:50am-08:05am} segment, 24,559 from the \textit{08:05am-08:20am} segment, and 14,814 from the \textit{08:20am-08:35am} segment.
\textbf{Translation.}
A stationary frame of reference with its origin fixed at the target vehicle's current position is used for each data piece.
\textbf{Down-sampling.}
The raw data in NGSIM US-101 is recorded with a sampling rate of 10 Hz. This work down-sample the historical tracks by a factor of 2 and the future trajectories by 5.
\textbf{Edge indexes.}
The edge set representing the graph structure is constructed as described in SubSec.~\ref{subsec: intenc}.
\textbf{Data format.}
A data with 3 parts is stored to the dataset.
\begin{equation}
data = \{ \mathcal{H}_t, E_t, y_t \},
\end{equation}
where $\mathcal{H}_t$ is the historical tracks of all vehicles, $E_t$ is the edge set containing the structure of the interactive graph, and $y_t$ is the target vehicle's ground truth future trajectory.
After the above processing, this work randomly selects 10,000 data pieces from the whole dataset as the validation set and uses the rest of the dataset for training.
\subsection{Implementation Details}
\label{subsec: implement}
All the models in this work are implemented with PyTorch~\cite{NEURIPS2019_9015} except the GNN layers, which are implemented with PyTorch Geometric~\cite{Fey/Lenssen/2019}. The history encoder is implemented using a one-layer Gated Recurrent Unit (GRU)~\cite{chung2014empirical} with a 32-dimensional hidden state, and the future decoder is implemented using a two-layer LSTM with a 64-dimensional hidden state. The interaction encoder is implemented with two Graph Attention Network (GAT)~\cite{velivckovic2017graph} layers, which adopt concatenated three-head attention mechanism to stabilize the training process. This work uses LeakyReLU with a 0.1 negative slope as the only activation function.
The proposed model is trained for 50 epochs to minimize the same loss function as described in~\cite{mo2020interaction} using Adam~\cite{kingma2014adam} with a learning rate of 0.001. Full implementation of the proposed model can be found in the released code.
\subsection{Metrics}
This work uses root-mean-square error (RMSE) in meters of the predicted trajectories against the ground truth future trajectories to evaluate different models. RMSE is calculated for each predictive time step $t_p$ within 5 seconds in the future. Previous works~\cite{mo2020interaction, deo2018convolutional, jeon2020scale} also adopt this metric.
\begin{equation}
RMSE(t_p) = \sqrt{\frac{1}{n}\sum^{n}_{i=1}( (\hat{x}^i_{t_p} - x^i_{t_p} )^2 + (\hat{y}^i_{t_p} - y^i_{t_p} )^2 )},
\label{eq: metric}
\end{equation}
where $n=10000$ is the size of test set, $(\hat{x}^i_{t_p}, \hat{y}^i_{t_p})$ and $(x^i_{t_p}, y^i_{t_p})$ are the predicted position of the target vehicle in data $i$ at time ${t_p}$ and the corresponding ground truth, respectively.
\section{RESULTS AND DISCUSSION}
\label{sec: results}
This section compares the proposed two-channel model with its ablations and previous works on the single trajectory prediction task, followed by an investigation of its potential for multiple trajectory prediction.
\subsection{Single Trajectory Prediction (STP)}
Following methods are implemented for comparison:
\begin{itemize}
\item \textbf{Dynamics-only}: this is the one-channel ablation of the proposed model considering the target vehicle's dynamics feature only for prediction.
\item \textbf{Interaction-only}: this is the other one-channel ablation using the interaction feature extracted by the GNN only.
\item \textbf{Two-channel}: this is the proposed two-channel model.
\end{itemize}
The above implementations are trained and validated using the same dataset.
Results reported in some related works are also listed in Tab.~\ref{tab: othersresults}. However, this work focuses on comparing results between the proposed method and its ablations, considering that different works are using different training and validation datasets.
\begin{figure}
\centering
\includegraphics[trim={0cm 0cm 0cm 0cm}, clip, width=1.0\columnwidth]{figs/stpbox.png}
\vspace{-7mm}
\caption{\textbf{Box plots of the RMSE of implemented models.} R is the dynamics-only model, G the interaction-only model, and GR the proposed two-channel model.}
\label{fig: stpbox}
\vspace{-5mm}
\end{figure}
\begin{table}[!ht]
\caption{\textbf{Prediction performance comparison (RMSE in meters)}}
\centering
\begin{tabular}{|c|c|c c c c c|}
\hline
&\multirow{2}{6em}{ \textbf{Methods }} &\multicolumn{5}{c|}{\textbf{Prediction horizon}}\\
\cline{3-7}
& & \textbf{\textit{1 sec}}& \textbf{\textit{2 sec}}& \textbf{\textit{3 sec}} & \textbf{\textit{4 sec}} & \textbf{\textit{5 sec}} \\
\hline
1 & Dynamics-only (Ours) & 0.74 & 1.86 & 3.30 & 5.07 & 7.11 \\
\hline
2 & Interaction-only (Ours) & 0.67 & 1.03 & 1.34 & 1.74 & 2.46 \\
\hline
3 & Two-channel (Ours) & 0.68 & 0.99 & 1.21 & 1.53 & 2.14 \\
\hline
\hline
4 & CS-LSTM~\cite{deo2018convolutional} & 0.61 & 1.27 & 2.09 & 3.10 & 4.37 \\
\hline
5 & GRIP~\cite{li2019grip} & 0.37 & 0.86 & 1.45 & 2.21 & 3.16 \\
\hline
6 & CNN-LSTM~\cite{mo2020interaction} & 0.64 & 0.96 & 1.22 & 1.53 & 2.09 \\
\hline
\end{tabular}
\vspace{0.2cm}
\label{tab: othersresults}
\end{table}
Tab.~\ref{tab: othersresults} compares different models. It shows that:
\begin{itemize}
\item Interaction-aware methods (2,3,4,5,6) outperform the dynamics-only method (1). This demonstrates the necessity of modeling interactions for trajectory prediction as stated in previous works~\cite{deo2018convolutional, mo2020interaction}.
\item The proposed two-channel model outperforms its interaction-only ablation. This shows that the target vehicle's dynamics feature should be emphasized in some way for trajectory prediction. This work sets an additional channel for it.
\item The proposed method matches the CNN-LSTM method with advances in considering variable number of surrounding agents and the potential for multi-trajectory prediction.
\item The proposed method outperforms GRIP and CS-LSTM in longer-term prediction (3-5sec). However, for the short-term prediction, GRIP shows better performance possibly in that GRIP uses the whole dataset from NGSIM, where the lane-keeping trajectories are dominant and less challenging for trajectory prediction.
\end{itemize}
Fig.~\ref{fig: stpbox} shows box plots of the RMSE errors of models implemented in this study over a 5-second time in the future, where the red boxes are the results of the dynamics-only model (R), the green boxes the results of the interaction-model (G), and blue boxes the proposed two-channel model (GR). Triangles in a box represents its mean value. Outliers are ignored for clarity. In addition to Tab.~\ref{tab: othersresults}, Fig.~\ref{fig: stpbox} shows that the prediction of interaction-aware methods (G \& GR) is more stable (shorter interquartile range (IQR)) than dynamics-only model (R) and the proposed two-channel model produces the shortest IQR. Please note that the mean value shown in Fig.~\ref{fig: stpbox} is calculated using Eq.~\ref{eq: boxmean}:
\begin{equation}
RMSE(t_p) = \frac{1}{n}\sum^{n}_{i=1} \sqrt{(\hat{x}^i_{t_p} - x^i_{t_p} )^2 + (\hat{y}^i_{t_p} - y^i_{t_p} )^2 },
\label{eq: boxmean}
\end{equation}
which is slightly different to the results in Tab.~\ref{tab: othersresults}.
Fig.~\ref{fig: stpvis} visualizes prediction results in situations with different numbers of surrounding vehicles from the validation set. It shows that the proposed model can predict the target vehicle is going to keep or change lane in the next 5 seconds regardless of how many surrounding vehicles are in sight.
\begin{figure}
\centering
\includegraphics[trim={0cm 0cm 0cm 0cm}, clip, width=1.0\columnwidth]{figs/stpvis.png}
\vspace{-7mm}
\caption{\textbf{Visualized STP predictions.} Squares are the considered vehicles (target vehicle in blue and neighboring vehicles in gray). Gray lines are the vehicles' historical tracks over the last 3 seconds. The green line is the ground truth (GT) future trajectory of the target vehicle. The blue line is the prediction of the proposed two-channel model (GR). All the vehicles move from left to right.}
\label{fig: stpvis}
\vspace{-5mm}
\end{figure}
Even though this work focuses on single trajectory prediction, the proposed model has the potential to be applied to multi-vehicular trajectory prediction since the interaction encoder implemented with GNN processes all nodes simultaneously, see Eq.~\ref{eq: interenc}. The following section briefly formulates the problem of multi-vehicular trajectory prediction (MTP) and shows the proposed method's performance on MTP.
\subsection{Multiple Trajectory Prediction (MTP)}
From the ego vehicle's point of view, MTP wants to predict future trajectories of up-to-eight target vehicles based on historical tracks of more vehicles. In this formulation, considered vehicles are separated into three categories: one ego vehicle, up-to-eight target vehicles, and some other surrounding vehicles. The MTP problem here is formulated similar to Sub.Sec.~\ref{subsec: stpproblem} and the target vehicles are selected as the selection of neighboring vehicle in Sub.Sec.~\ref{subsec: stpproblem}. Please note that this part is only to investigate the proposed method's potential for multi-agent setting, and the only difference to STP is the input and output data.
The input to the model is historical trajectories of all considered vehicles,
\begin{equation}
\mathcal{H}_t = \lbrace h^0_t, h^1_t, \cdots, h^{m}_t, h^{m+1}_t, \cdots, h^n_t \rbrace,
\label{eq: Hist}
\end{equation}
where the $h^0_t$ is the ego vehicle's historical track and $1\leq m \leq 8$ is the number of target vehicles. MTP simultaneously predicts $m$ target vehicles' future trajectories, numbered from $1$ to $m$, based on historical trajectories of $n+1$ vehicles.
The output is then the predicted future trajectories of the target vehicles:
\begin{equation}
\mathcal{F}_t = \lbrace f^1_t, f^2_t,\cdots, f^{m}_t \rbrace,
\label{eq: Fut}
\end{equation}
where $ f^i_t = [p^i_{t+1}, p^i_{t+2}, \cdots, p^i_{t+T_f}]$ represents the sequence of future trajectory of vehicle $i$ at time $t$.
The dataset used here is pre-processed from the \textit{08:05am-08:20am} segment of NGSIM US-101. The size of training and validation datasets are 533,564 and 13,3392, respectively.
\begin{table}[!ht]
\caption{\textbf{MTP performance comparison (RMSE in meters)}}
\centering
\begin{tabular}{|c|c|c c c c c|}
\hline
&\multirow{2}{6em}{ \textbf{Methods }} &\multicolumn{5}{c|}{\textbf{Prediction horizon}}\\
\cline{3-7}
& & \textbf{\textit{1 sec}}& \textbf{\textit{2 sec}}& \textbf{\textit{3 sec}} & \textbf{\textit{4 sec}} & \textbf{\textit{5 sec}} \\
\hline
1 & Two-channel (Ours) & 0.54 & 1.12 & 1.80 & 2.63 & 3.67 \\
\hline
\hline
2 & GRIP(ALL)~\cite{li2019grip} & 0.64 & 1.13 & 1.80 & 2.62 & 3.60 \\
\hline
\end{tabular}
\label{tab: mtptab}
\end{table}
Tab.~\ref{tab: mtptab} compares the proposed method with a previous work GRIP~\cite{li2019grip} on the MTP task. It shows that the proposed model, when applied to multi-vehicular trajectory prediction, matches the previous work in terms of RMSE.
\begin{figure}
\centering
\includegraphics[trim={0cm 0cm 0cm 0cm}, clip, width=1.0\columnwidth]{figs/mtpvis.png}
\vspace{-7mm}
\caption{\textbf{Visualized MTP predictions.} Blue square is the ego vehicle and gray squares represent the rest of considered vehicles. Only future trajectories of target vehicles are plotted. Green lines are the ground truth and dashed blue lines are the prediction future trajectory. All the vehicles move from left to right.}
\label{fig: mtpvis}
\vspace{-5mm}
\end{figure}
Fig.~\ref{fig: mtpvis} visualizes the prediction results of the proposed model on the MTP task. It can be seen that the proposed method can predict the multiple trajectories longitudinally while it fails to predict the lane-change maneuver in the next 5 seconds. This can be explained by the imbalance of the MTP dataset since the majority of the future trajectories in the dataset are keeping lane, and it is hard to get a roughly balanced dataset for MTP.
\section{CONCLUSIONS}
\label{sec: conclusion}
This work proposes a GNN-RNN-based method for trajectory prediction to model the inter-vehicular interaction among various vehicles. RNN is used to capture the dynamics feature of vehicles, and GNN is adopted to summarize the interaction feature. Another RNN serves as the decoder jointly considers the dynamics and interaction feature for prediction. This work finds that both the target vehicle's individual dynamics feature and its interaction with other vehicles affect the prediction accuracy. The proposed method matches state-of-the-art methods on the NGSIM dataset in terms of RMSE.
This work can be improved to handle multi-vehicular trajectory prediction properly, which is necessary for the downstream decision-making module of autonomous driving. It can also be extended to consider the multi-modality of driving behaviors.
\addtolength{\textheight}{-2.5cm}
\section*{ACKNOWLEDGMENT}
This work was supported in part by A*STAR Grant (No. 1922500046), Singapore, the Alibaba Group through Alibaba Innovative Research (AIR) Program and Alibaba-NTU Singapore Joint Research Institute (JRI) (No. AN-GC-2020-012), A*STAR AME Young Individual Research Grant (No. A2084c0156), and the SUG-NAP Grant, Nanyang Technological University, Singapore.
\bibliographystyle{unsrt}
|
\section{Introduction}
Symplectic manifolds $(M,\omega)$ have been of much interest in the \emph{global} study of
Hamiltonian dynamics, and symplectic topology via analysis of pseudoholomorphic
curves. In this regard, closedness of the two-form $\omega$ plays an important
role in relation to the dynamics of Hamiltonian diffeomorphisms and the global
analysis of pseudoholomorphic curves, especially the study of compactification of
the relevant moduli spaces.
On the other hand when one takes the
coordinate chart definition of symplectic manifolds and implements the
covariance property of Hamilton's equation, there is no compulsory reason why one should require the
two-form to be closed. Indeed from the point of view of canonical formalism in
Hamiltonian mechanics and construction of the corresponding \emph{bulk physical space}, it is
more natural to require the locally defined canonical symplectic forms
$$
\omega_\alpha = \sum_{i=1}^n dq_i^{\alpha} \wedge dp_i^{\alpha}
$$
to satisfy the cocycle condition
\begin{equation}\label{eq:cocylce}
\omega_\alpha = \lambda_{\beta\alpha} \omega_\beta, \quad \lambda_{\beta\alpha}\equiv \text{const.}
\end{equation}
with $\lambda_{\gamma\beta}\lambda_{\beta\alpha} = \lambda_{\gamma\alpha}$
as the gluing condition. (See introduction \cite{vaisman:lcs} for a nice
explanation on this point of view) The corresponding bulk constructed in this way
naturally becomes a \emph{locally conformal symplectic manifold}
(abbreviated as l.c.s manifold) whose definition we first recall.
\begin{defn} An $\lcs$ manifold is a triple $(M, \omega, \frak b)$ where $\frak b$ is
a closed one-form, called the Lee form, and $\omega$ is a nondegenerate 2-form satisfying the relation
\begin{equation}\label{eq:relation}
d ^{\frak b} \omega:=d\omega + \frak b \wedge \omega = 0.
\end{equation}
\end{defn}
(We refer to \eqref{eq:db} for our convention for the definition of the operation $d^{\mathfrak b}$.)
The following definition of morphisms between lcs manifolds
is given in \cite{haller-ryb} with slight variation of phrasing.
\begin{defn}\label{defn:morphism} Let $(M,\omega,\frak b)$ and
$(M^\prime, \omega^\prime, \frak b^\prime)$ be two lcs manifolds.
\begin{enumerate}
\item A diffeomorphism $\phi: M\to M'$ is called {\it lcs} if there exists
$a \in C^\infty(M,{\mathbb R}\setminus\{0\})$ such that
$$
\phi^*\omega^\prime = (1/a) \omega, \quad \phi^*\frak b' = \frak b + d(\ln|a|).
$$
\item An lcs diffeomorphism is \emph{positive} (resp. \emph{negative}) if the function $a$
is positive (resp. negative).
\end{enumerate}
\end{defn}
We refer to \cite{vaisman:lcs}, \cite{haller-ryb}, \cite{banyaga:lcs}, \cite{Banyaga2007}
for a more detailed discussion of general properties of $\lcs$ manifolds and non-trivial examples.
(See also \cite{apost-dlous}, \cite{eliash-murphy} for more recent development concerning
the existence question on the conformal symplectic structure.)
Note that for a positive lcs diffeomorphism, the defining condition can be rewritten as
\begin{equation}\label{eq:+lcs-definition}
\phi^*\omega^\prime = e^f \omega, \quad \phi^*\frak b' = \frak b - df
\end{equation}
which manifests its similarity to the defining condition $\psi^*\lambda' = e^g \lambda$ of a (nonstrict)
(orientation preserving) contactomorphism $\psi$ with \emph{conformal exponent} $g \in C^\infty(M)$.
(See \cite{oh:contacton-Legendrian-bdy} for the usage of the same terminology used here.)
Locally by choosing $\frak b = d\ell$ for a local function $\ell: U \to {\mathbb R}$
on an open neighborhood $U$, \eqref{eq:relation} is equivalent to
\begin{equation}\label{eq:local}
d(e^{\ell}\omega) = 0
\end{equation}
and so the local geometry of l.c.s manifold is exactly the same as that of
symplectic manifolds. In particular one can define the notion of Lagrangian
submanifolds, isotropic submanifolds, and coisotropic submanifolds in the same
way as in the symplectic case since the definitions require only nondegeneracy of the two-form $\omega$.
The main purpose of the present paper is to explore the study of $J$-holomorphic curves in an
enlarged bulk of \emph{locally conformal symplectic} manifolds. We will abbreviate
the term locally conformal symplectic as $\lcs$ from now on.
All the local theory of $J$-holomorphic
curves go through without change as in the symplectic case. The main difficulty lies in the global
geometry of $J$-holomorphic curves and it has not been clear
whether Novikov-closedness of $\lcs$ structure $(M,\omega,\frak b)$ would give
meaningful implication to the Fredholm theory of moduli problem
and the study of compactification of $J$-holomorphic
curves with \emph{punctured} Riemann surfaces as their domains.
(See \cite[Introduction]{le-oh:lcs} for such a discussion.)
\subsection{$\lcs$ instantons}
The starting point of the present paper is the second named author's question on whether
or not contact non-squeezing of Eliashberg-Kim-Polterovich \cite{EKP}
can be generalized to that of $\lcs$ context.
The Eliashberg-Kim-Polterovich contact
non-squeezing theorem as stated
by Fraser ~\cite{fraser} has the following form.
Let $C = {\mathbb R} ^{2(n-1)} \times S ^{1} $, $S ^{1} =
\mathbb{R} ^{}/\mathbb{Z} $, be the
prequantization space of ${\mathbb R} ^{2n-2} $, or in other
words the contact manifold with the contact form
$d\theta - \lambda$, for $\lambda =
\frac{1}{2}(ydx - xdy)$, (or $\lambda = p\ dq$).
Let $B _{R} $ denote the open radius $R$ ball in
$\mathbb{R} ^{2n-2} $, and $\overline{B} _{R}$ its
topological closure.
To put the current research in some perspective, we recall the following
\emph{contact nonsqueezing theorem} which is the result arising from
a combination of \cite{EKP} and \cite{chiu} (or \cite{fraser}).
\begin{thm}
[Eliashberg-Kim-Polterovich~\cite{EKP}, Chiu~\cite{chiu},
Fraser~\cite{fraser}]
\label{thm:}
For $R \geq 1$ there is no
contactomorphism, isotopic to the identity, $\phi: C \to C$ so that $\phi
(\overline{B} _{R} \times S ^{1}) \subset B _{R}
\times S ^{1} $.
\end{thm}
A Hamiltonian conformal symplectomorphism of an
$\lcs$ manifold $(M,\omega)$, which we just
abbreviate by the short name:
\emph{Hamiltonian lcs map}, is a
$\lcs$ diffeomorphism $\phi _{H} $ generated
analogously to the symplectic case by a smooth
function $H: M \times [0,1] \to \mathbb{R} $.
Specifically, we define the time dependent vector
field $X _{t} $ by:
\begin{equation*}
\omega (X _{t}, \cdot) = d ^{\frak b} H _{t},
\end{equation*}
for $\frak b$ the Lee form, and then taking $\phi
_{H} $ to be the time 1 flow map of $\{X _{t} \}$.
For example, let $C$ be a manifold with a
contact form $\lambda$, then $\omega = d^{\frak b}
\lambda $ on $C \times S ^{1} $ an $\lcs$
structure called the
$\mathfrak{lcs}$-fication of $(C, \lambda)$, see also the
Definition \ref{def:lcsfication} further ahead.
Then if $\forall t: H _{t} =-1$, then $d ^{\frak b} (H
_{t}) = - \frak b$ and clearly
$$
X _{t} = R_\lambda \oplus 0,
$$ as a section of $TC
\oplus TS ^{1}$ with $R_\lambda $ the
$\lambda$-Reeb vector field. (See the list of our sign conventions given in
Convention at the end of this introduction.) Thus in this case the
associated flow is naturally induced by the Reeb
flow. More generally, given a contact flow on a closed contact
manifold $C$, there is an induced Hamiltonian flow
on the $\mathfrak{lcs}$-fication $C \times S ^{1}$. So that the
following conjecture is a direct generalization of the
contact non-squeezing theorem above.
\begin{conj} \label{conj:lcsnonsqueezing} If $R
\geq 1$ there is no compactly supported,
Hamiltonian lcs map $$\phi: \mathbb{R} ^{2n} \times S ^{1} \times S ^{1} \to \mathbb{R} ^{2n} \times S ^{1} \times S ^{1}, $$ so that $\phi (\overline{U} ) \subset U$, for $U := B _{R} \times S ^{1} \times S ^{1} $ and $\overline{U} $ the topological closure.
\end{conj}
The way how \cite{EKP} approaches
the contact non-squeezing problem is to consider open domains of the form $U \times S^1$ and compare their
contact homology which is constructed by considering the \emph{symplectization} $Q \times {\mathbb R}$, where
$Q ={\mathbb R}^{2(n-1)} \times S^1$ is the prequantization space of ${\mathbb R} ^{2(n-1)} $ equipped
with the contact form $d\theta - \lambda$ for $\lambda = \frac{1}{2}(ydx - xdy)$ (or $\lambda = p\ dq$)
and consider the case $U = B_{R}$ where $B_R$ denotes the open radius $R$ ball in $\mathbb{R}^{2(n-1)} $.
In this regard, an interesting general class of $\text{\rm lcs}$ manifolds arises from the mapping torus construction of
contactomorphisms of a contact manifold $(Q,\xi)$ (See Subsection \ref{subsec:mapping-tori} for
a detailed explanation.)
Motivated by this we will more generally associate to each contact manifold $(Q,\xi)$ with $Q = Q^{2n-1}$
an $\lcs$ manifold $Q \times S^1$ equipped with a \emph{${\frak b}$-exact} $\lcs$ form
\begin{equation}\label{eq:banyaga-lcs-form}
d^{\frak b}\lambda: = \omega_\lambda = d\lambda + {\frak b} \wedge \lambda,
\end{equation}
where $\frak b = \pi^*d \theta$ for the canonical angular coordinate $\theta$ on $S^1$ with its
period given by $1$. One can check $d\omega_\lambda + \pi^*d\theta \wedge \omega_\lambda =0$, i.e.,
the relation \eqref{eq:relation} holds for $\omega_\lambda$ with the choice of $\frak b = \pi^*d\theta$.
Since this particular $\lcs$ structure is naturally constructed from the contact manifold $(Q,\lambda)$
it seems reasonable to name it
\begin{defn}[$\mathfrak{lcs}$-fication]
\label{def:lcsfication} We call the pair $(Q \times S^1, \omega_\lambda)$ an \emph{$\mathfrak{lcs}$-fication}
of the contact manifold $(Q,\lambda)$ where $S^1 = {\mathbb R}/{\mathbb Z}$.
\end{defn}
\begin{rem}
By varying the size of the circle $(S^1,d\theta): = ({\mathbb R}/{\mathbb Z},[dt])$ to $(S^1_R,d\theta): = ({\mathbb R}/R {\mathbb Z}, [dt])$,
or by taking the one-form $\frak b_R: = \frac{1}{R} \pi^*\theta$ on $S^1 = R/{\mathbb Z}$,
we may regard the $\lcs$-manifold
$$
(Q \times {\mathbb R}, d\lambda + ds \wedge \lambda)
$$
as the limiting case of
$$
(Q \times S^1, d\lambda + \frak b_R \wedge \lambda), \quad \frak b_R = \frac{1}{R} d\theta
$$
as $R \to \infty$. See Subsection \ref{subsec:canonical} for more discussion on
this relationship.
\end{rem}
We observe that
$$
\ker d\lambda = \xi \oplus 0 R_\lambda \oplus 0 \frac{\partial}{\partial \theta} \cong \xi
$$
for the contact distribution $\xi$ of $Q$. We again denote by $\xi$ for $\ker d\lambda \subset T(Q \times S^1)$
by abuse of notation. Then the tangent bundle of $Q \times S^1$ has the following canonical splitting:
$$
T(Q \times S^1) = \xi \oplus {\mathcal V}
$$
with
$$
{\mathcal V} = \operatorname{span}_{\mathbb R}\left\{\frac{\partial}{\partial \theta}, R_\lambda \right\} = (\xi)^{\omega_\lambda}
$$
where $(\xi)^{\omega_\lambda}$ denotes the $\omega_\lambda$-orthogonal complement of $\xi$.
As the first step in attacking Conjecture \ref{conj:lcsnonsqueezing} and also as
a first step towards to the study of general pseudoholomorphic curves on general $\lcs$ manifolds,
we study pseudoholomorphic curves on the $\mathfrak{lcs}$-fication $(Q \times S^1, \omega_\lambda)$.
It turns out that the $J$-holomorphic curve on this $\mathfrak{lcs}$-fication is closely related to
that of \emph{contact instanton} studied in \cite{oh-wang:CR-map1,oh-wang:CR-map2,oh:contacton}
for a suitable class of almost complex structures on $Q\times S^1$, which
we call \emph{$\lambda$-admissible}.
\begin{defn}[$\lambda$-admissible almost complex structure]\label{defn:lambda-admissible-J}
We say an almost complex structure $J$ on $M = Q \times S^1$ is \emph{$\lambda$-admissible} if
$J$ satisfies the following:
\begin{enumerate}
\item $J$ is tame with respect to $\omega_\lambda$ in the standard sense,
\item $J$ preserves the splitting \eqref{eq:splitting}, i.e., $J(\xi) = \xi, \,
J({\mathcal V}) = {\mathcal V}$.
\item $J$ satisfies $J \frac{\partial}{\partial \theta} = R_\lambda$.
\end{enumerate}
We denote by ${\mathcal J}(Q \times S^1, \lambda)$ the set of $\lambda$-admissible almost
complex structures.
\end{defn}
\begin{rem} \begin{enumerate}
\item One can weaken the above requirements by dropping the condition (3) which will
provide greater flexibility of the choice of $J$'s. We think such a generalization will be needed for the study of
our starting question on the above mentioned $\lcs$-type nonsqueezing theorem.
We call such $J$ a \emph{$\omega_\lambda$-admissible}
almost complex structure the set of which we denote by ${\mathcal J}(Q \times S^1,\omega_\lambda)$.
See Subsection \ref{subsec:mapping-tori} for the case of mapping tori of contact diffeomorphisms.
\item However we leave the study of this general case elsewhere and focus on the
study of pseudoholomorphic curves on the $\mathfrak{lcs}$-fication of contact manifolds in the
present paper.
The study of this special case would be also needed for the computation of
the expected $\lcs$-type invariants which are invariant under the $\omega_\lambda$-compatible
almost complex structures.
\end{enumerate}
\end{rem}
The associated $J$-holomorphic curve equation for the map $u = (w,f): \dot \Sigma \to Q \times S^1$
is reduced to
\begin{equation}\label{eq:lcs-instanton-intro}
{\overline \partial}^\pi w = 0, \quad w^*\lambda \circ j = f^*d\theta.
\end{equation}
(See Proposition \ref{prop:lcs-instanton} for its proof.)
The equation resembles the $J$-holomorphic curve equation in the symplectization ${\mathbb R} \times Q$
except that the \emph{exact} one-form $f^*dr$ in the symplectization case is replaced by
the \emph{closed} one-form $f^*d\theta$. Indeed if we replace $S^1$ by ${\mathbb R}$, our study of
pseudoholomorphic curves on the $\lcs$ manifold equipped with the form
$d\lambda + \frak b \wedge \lambda$ with $\frak b = dr$ reduced to that of the
symplectization of $(Q,\lambda)$.
Furthermore $w$ in $u= (w,f)$ is a \emph{contact instanton}
in the sense of \cite{oh-wang:CR-map1,oh-wang:CR-map2,oh:contacton}, i.e.,
satisfies
\begin{equation}\label{eq:contacton-intro}
{\overline \partial}^\pi w = 0, \quad d(w^*\lambda \circ j) = 0.
\end{equation}
The equation \eqref{eq:lcs-instanton-intro} is augmented by
the datum of its charge given by integrating the specific closed one-form $f^*d\theta$.
To highlight relevance of the similarity of the two equations \eqref{eq:lcs-instanton-intro}, \eqref{eq:contacton-intro},
we give the following definition.
\begin{defn}\label{defn:lcs-instanton-intro}
We call a solution $u=(w,f)$ of \eqref{eq:lcs-instanton-intro} an \emph{$\lcs$ instanton} and
the equation the \emph{$\lcs$ instanton equation}.
\end{defn}
In fact, when by decomposing the closed one-form $f^*d\theta$ into
$$
f^*d\theta = \beta + d\widetilde f
$$
for a harmonic one-form $\beta$ on $\Sigma$
the above equation \eqref{eq:lcs-instanton-intro}
is equivalent to the following
\begin{equation}\label{eq:abbas-intro}
\begin{cases} {\overline \partial}^\pi w = 0,\\
w^*\lambda\circ j - d \widetilde f = \beta\\
\Delta \beta = 0
\end{cases}
\end{equation}
for the triple $(w,\widetilde f, \beta)$ which determines (modulo addition by $\theta_0$) the component
$f: \dot \Sigma \to S^1$ by the equation
$$
\beta + d \widetilde f= f^*d\theta, \quad [\beta] = \eta \text{ in }\, H^1(\dot \Sigma).
$$
(We refer readers to Subsection 4.2 for the detailed discussion on this transformation.)
\begin{rem}
This equation \eqref{eq:abbas-intro} resembles the equation
considered by \cite{ACH} Abbas-Cieliebak-Hofer and by Abbas in \cite{abbas}.
One big difference of our treatment from thereof lies in the case where the domain of the map
$w$ carries punctures: while \emph{we allow the harmonic one-form $\beta$
not to be smoothly extended across the punctures} (i.e., $Q(r) \neq 0$ in the language of \cite{oh-wang:CR-map1}) at
some puncture $r$), only the case the harmonic one-form extends smoothly
across the puncture (i.e., $Q(r) = 0$ for all punctures $r$) is considered in
both \cite{ACH, abbas}. See below for further discussion on this.
\end{rem}
\subsection{Charge class and asymptotic behavior of $\lcs$ instantons}
The main purpose of the present article is to establish
the two crucial analytical components in the construction of compactification of
the moduli space of solutions of the contact instantons, one the definition of
correct energy and the other the definition of correct (smooth) moduli spaces.
Here what we mean by `correct' choices is that they enable us to define
a compactification that carries all the properties that
are needed in the global study of moduli spaces on the $\lcs$ manifolds $S^1 \times $Q.
One may tempt to use the standard $\omega_\lambda$-energy for $J$-holomorphic curves
(equivalently $\lcs$ instantons),
especially when $Q$ is closed and so $Q \times S^1$ is
a closed $\lcs$ manifold. However in this case the requirement of finite $\omega_\lambda$-energy is
too strong, irrespective whether it is closed or punctured. This is because all
$\lcs$ instantons are completely classified as
stated in Proposition \ref{prop:classify}, when combined with the removal
singularity theorem for the $J$-holomorphic curves with finite harmonic
energy which is the same as $\omega_\lambda$-area.
Therefore to make the story interesting, one should use different energy for the global study of
moduli space of $\lcs$ instantons. Here we utilize some similarity of
the $\lcs$ instanton equation with the pseudoholomorphic curves in the
symplectization. We will use a variation of Hofer's energy used in the
symplectization in the $\mathfrak{lcs}$-fication of $(Q,\lambda)$. One difficulty
to adapt Hofer-type energy in the $\lcs$ context is that Hofer's energy
used the ${\mathbb R}$-factor of the symplectization ${\mathbb R} \times Q$ or more specifically
the global $r$-coordinate of ${\mathbb R}$ in its definition. It was already pointed out
in \cite{oh-wang:CR-map1} that the case of non-zero charge
$$
Q: = \int_{\{\tau\} \times S^1} w^*\lambda \circ j
$$
seriously obstructs both the Fredholm theory and the attempt to
construct a compactification of the moduli space of \emph{contact instantons}
(See \cite{oh:contacton} for some effort to overcome these obstructions
in the context of contact instantons.)
In this paper, we are able to overcome both obstructions if the contact instanton $w$ is arising from an
$\lcs$ instanton $u = (w,f)$, i.e., if the charge form $w^\lambda \circ j$
is specified by the differential of the $S^1$-component $f: \dot \Sigma \to S^1$ of
an $\lcs$ instanton $u = (w,f)$ as in \eqref{eq:lcs-instanton-intro}.
We will first carry out the asymptotic study of $\lcs$ instantons near the punctures.
For this study of asymptotic convergence result at the punctures and the relevant index
theory, it turns out to be useful to regard \eqref{eq:lcs-instanton-intro} as a version of
gauged sigma model with abelian Hick's field. It is also important to employ the notion of
asymptotic contact instanton at each puncture,
which is a massless instanton on ${\mathbb R}\times S^1$
canonically associated to any finite energy contact instantons.
It also gives rise to an asymptotic Hick's field, which is a holomorphic one-form
that appears as the asymptotic limit of the complex-valued $(1,0)$-form
$$
\chi= f^*d\theta + \sqrt{-1} w^*\lambda.
$$
The following asymptotic invariant is useful to introduce in relation to the
precise study of asymptotic behavior of contact instantons near punctures.
\begin{defn}[Asymptotic Hick's charge] Let $(\Sigma, j)$ be a closed Riemann surface
and $\dot \Sigma$ its associated punctured Riemann surface. Let $p$ be a given puncture of $\dot \Sigma$.
We define the \emph{asymptotic Hick's charge} of the instanton
$w: \dot \Sigma \to Q$ with finite energy with bounded gradient to be the complex number
$$
Q(p) + \sqrt{-1} T(p)
$$
defined by
\begin{eqnarray}\label{eq:asymp-charge-intro}
Q(p) & = & \int_{\partial_{\infty;p}\overline \Sigma}w^*\lambda\circ j = -\int_{S^1} \opname{Re} \chi(0,t)\, dt \\
T(p) & = & \int_{\partial_{\infty;p}\overline \Sigma}w^*\lambda = \int_{S^1} \opname{Im} \chi(0,t)\, dt
\end{eqnarray}
where $z = e^{-2\pi(\tau + it)}$ are the analytic coordinates of $D_r(p)$ centered at $p$, and
$\overline \Sigma$ is the real blow-up of $\dot \Sigma$ performed at all the given puncture.
We call $Q(p)$ the \emph{contact instanton charge} of $w$ at $p$
and $T(p)$ the \emph{contact instanton action} of $w$ at $p$.
\end{defn}
We define the asymptotic Hick's field (or charge) of a map $w: {\mathbb C} \to Q$ at infinity
by regarding $\infty$ as a puncture associated to ${\mathbb C} \cong {\mathbb C} P^1 \setminus \{\infty\}$.
We will prove a removable singularity result (see Theorem \ref{thm:c=0}) that
if $Q(p) = 0 = T(p)$ $w$ is smooth across $p$ and so the
puncture $p$ is removable \emph{under a suitable finite energy condition} whose description is
one of the important themes of the present paper.
\begin{thm}[Compare with Proposition 8.3 \cite{oh:contacton}]\label{thm:pole-structure-intro}
Let $\eta \in H^1(\dot \Sigma,{\mathbb Z})$ be a given charge class on a punctured Riemann surface
$\dot \Sigma = \Sigma = \{p_1, \cdots, p_k\}$.
Let $u = (w,f)$ be an $\lcs$ instanton on $\dot \Sigma$ in class $\eta$.
Consider the complex-valued one-form on $\dot \Sigma$ defined by
\begin{equation}\label{eq:chi-intro}
\chi: = f^*d\theta + \sqrt{-1} w^*\lambda.
\end{equation}
Let $p \in \{p_1, \cdots, p_k\}$ and let $z$ be an analytic coordinate at $p$. Suppose
$$
E(u) < \infty.
$$
Then for any given sequence $\delta_j \to 0$ there exists a subsequence, still denoted by $\delta_j$, and a conformal diffeomorphism
$\varphi_j: [-\frac{1}{\delta_j}, \infty) \times S^1 \to D_{\delta_j}(p)\setminus \{p\}$ such that
the one form $\varphi_j^*\chi$ converges to a bounded holomorphic one-form
$\chi_\infty$ on $(-\infty, \infty) \times S^1$.
\end{thm}
We would like to emphasize that at the moment, the limiting holomorphic one-form $\chi_\infty$
may depend on the choice of subsequence.
\subsection{Charge class, $\lcs$ instanton energy and $\epsilon$-regularity}
Now we consider the general case where $Q(p) \neq 0$ for some $p$ in general.
As mentioned above, this is the most troublesome case for the study of contact
instantons in \cite{oh-wang:CR-map1, oh-wang:CR-map2,oh:contacton}.
It turns out that in the current $\lcs$ context, there is a nice way of treating
this non-zero charge case by further decomposing the moduli space
into the union of suitable sub-moduli spaces classified by some homotopy class
of maps for the domain curves whose description is now in order.
We denote by $\dot \Sigma$ the punctured Riemann surfaces of a closed Riemann
surface $\Sigma$. We can write
$$
f^*d\theta = \beta_\eta + d\widetilde f
$$
for some \emph{harmonic one-form} and a \emph{real-valued} function
$\widetilde f: \dot \Sigma \to {\mathbb R}$ under a suitable asymptotic property on $f^*d\theta$.
(We refer to Subsection \ref{subsec:energy} for the description of the relevant
asymptotic condition.)
With respect to the K\"ahler metric which is strip-like near each puncture, the map
$$
(w,\widetilde f): [0, \infty) \times S^1 \to Q \times {\mathbb R}
$$
satisfies the following \emph{perturbed} pseudoholomorphic curve equation
$$
{\overline \partial}^\pi w = 0 , \, w^*\lambda \circ j - d\widetilde f = \beta_\eta
$$
on $\dot \Sigma$. Then one can employ Hofer-type $\lambda$-energy using the pair $(w,\widetilde f)$.
(We refer readers to Section \ref{sec:lcs-instanton} for the details on how its
definition goes.) With this energy, we prove the following $\epsilon$-regularity result.
(Compare this with a similar result for the contact instantons in \cite[Theorem 7.4]{oh:contacton}.)
In the current setting of $\lcs$ instanton map, it is not obvious what would be
the precise form of relevant $\epsilon$-regularity statement. We formulate this $\epsilon$-regularity
theorem in terms of the associated contact instantons.
The following is by now a standard definition in contact topology.
\begin{defn} Let $\lambda$ be a contact form of contact manifold $(Q,\xi)$.
Denote by $\frak R eeb(Q,\lambda)$ the set of closed Reeb orbits.
We define $\operatorname{Spec}(Q,\lambda)$ to be the set
$$
\operatorname{Spec}(Q,\lambda) = \left\{\int_\gamma \lambda \mid \lambda \in \frak Reeb(Q,\lambda)\right\}
$$
and call the \emph{action spectrum} of $(Q,\lambda)$. We denote
$$
T_\lambda: = \inf\left\{\int_\gamma \lambda \mid \lambda \in \frak Reeb(Q,\lambda)\right\}.
$$
\end{defn}
We set $T_\lambda = \infty$ if there is no closed Reeb orbit.
This constant $T_\lambda$ will enter in a crucial way in the following
period gap theorem of $\lcs$ instantons. (See \cite{hofer} for
the first such appearance in the study of pseudoholomorphic curves in the symplectization
$Q \times {\mathbb R}$.)
\begin{thm}\label{thm:e-regularity-intro}
Denote by $D^2(1)$ the closed unit disc and let $u = (w,f)$ be an $\text{\rm lcs}$ instanton
defined on $D^2(1)$ so that $w:D^2(1)\to Q$ satisfies
$$
{\overline \partial}^\pi w = 0, \, w^*\lambda\circ j = f^*d\theta.
$$
Assume the vertical energy bound $E^\perp (w) < K_0$ defined in Definition \ref{defn:vertical-energy}.
Then for any given $0 <\epsilon < T_\lambda$ and $w$ satisfying
$E^\pi(w) < T_\lambda - \epsilon$, and for a smaller disc $D' \subset \overline D' \subset D$,
there exists some $K_1 = K_1(D', \epsilon,K_0) > 0$
\begin{equation}\label{eq:dwC0-intro}
\|dw\|_{C^0;D'} \leq K_1
\end{equation}
where $K_1$ depends only on $(Q,\lambda,J)$, $\epsilon$, $D' \subset D$.
\end{thm}
\subsection{Linearization and the Fredholm theory}
The fixation of a charge class for the $\lcs$ instanton also enables us to develop
the Fredholm theory and to construct a compactification, because it rules out the
phenomenon of \emph{appearance of spiraling instantons along the Reeb core} in the
asymptotic subsequence limit at the puncture. (See \cite[Section 6]{oh-wang:CR-map1} for
the detailed explanation on the appearance of this phenomenon for the case of
contact instantons.)
We consider the map
$$
\Upsilon(w,f) = \left({\overline \partial}^\pi w, w^*\lambda \circ j - f^*d\theta \right)
$$
whose zero set is the set of $\lcs$ instantons by definition.
For the optimal expression of the linearization map and its relevant
calculations, we use the $\mathfrak{lcs}$-fication connection $\nabla$ of $(Q \times S^1,\lambda,J)$
which is the lcs-lifting of the contact triad connection introduced in \cite{oh-wang:CR-map1}.
(See Section \ref{sec:connection} for the details.)
We refer readers to \cite{oh-wang:CR-map1}, \cite{oh:contacton} for the unexplained notations.
\begin{thm}\label{thm:linearization-intro} Let $u = (w,f): \dot \Sigma Q \times S^1$
be an $\lcs$ instanton of a given charge class $[u] =\eta$.
We decompose $d\pi = d^\pi w + w^*\lambda\otimes R_\lambda$
and $Y = Y^\pi + \lambda(Y) R_\lambda$, and $X = (Y, v) \in \Omega^0(u^*T(Q \times S^1))$.
Denote $\kappa = \lambda(Y)$ and $\upsilon = d\theta(v)$. Then we have $D\Upsilon(u) = D\Upsilon_1(u) + D\Upsilon_2(u)$
with
\begin{eqnarray}
D\Upsilon_1(u)(Y,v) & = & {\overline \partial}^{\nabla^\pi}Y^\pi + B^{(0,1)}(Y^\pi) + T^{\pi,(0,1)}_{dw}(Y^\pi) \nonumber\\
&{}& \quad + \frac{1}{2}\kappa \cdot \left(({\mathcal L}_{R_\lambda}J)J(\partial^\pi w)\right)
\label{eq:Dwdelbarpi-intro}\\
D\Upsilon_2(u)(Y,v) & = & ({\mathcal L}_Y \lambda) \circ j- {\mathcal L}_v d\theta = d\kappa \circ j - d\upsilon
+ Y \rfloor d\lambda \circ j
\nonumber\\
\label{eq:Dwddot-intro}
\end{eqnarray}
where $B^{(0,1)}$ and $T_{dw}^{\pi,(0,1)}$ are the $(0,1)$-components of $B$ and
$T_{dw}^{\pi,(0,1)}$ respectively, where $B, \, T_{dw}^\pi: \Omega^0(w^*TQ) \to \Omega^1(w^*\xi)$ are
the zero-order differential operators given by
$$
B(Y) =
- \frac{1}{2} w^*\lambda \left(({\mathcal L}_{R_\lambda}J)J Y\right)
$$
and
$$
T_{dw}^\pi(Y) = \pi T(Y,dw).
$$
\end{thm}
More succinctly, we can express the operator $D\Upsilon(u)$ in a matrix form
\begin{equation}\label{eq:matrix-form-intro}
\left(
\begin{matrix}
{\overline \partial}^{\nabla^\pi} + B^{(0,1)} + T^{\pi,(0,1)}_{dw} &, & \frac{1}{2}(\cdot) \cdot
\left(({\mathcal L}_{R_\lambda}J)J(\partial^\pi w)\right)\\
\left((\cdot)^\pi \rfloor d\lambda\right)\circ j &, & {\overline \partial}
\end{matrix}
\right).
\end{equation}
\begin{rem}
We would like to highlight that our linearization formula is coordinate-free and
is written in terms of the \emph{$\mathfrak{lcs}$-fication of contact triad connection from \cite{oh-wang:connection}}.
(See Section \ref{sec:connection}, especially Remark \ref{rem:connection}
for some more details on this connection.) The same formula
equally applies to the pseudoholomorphic curves in the symplectization as a special case.
A novelty of our coordinate-free formula is that it equips each individual term in the formula
of the linearization operator with natural tensorial geometric meaning in terms of the
contact triad $(Q,\lambda, J)$ and its triad connection. Compare this with the coordinate-dependent formula
for the linearization operator appearing in the literature such as \cite{bourgeois}, \cite{behwz}
on the Fredholm analysis of the moduli space of pseudoholomorphic curves in the symplectization.
\end{rem}
Then noting that the off-diagonal terms of \eqref{eq:matrix-form-intro} are zero-order operators,
by the continuous invariance of the Fredholm index, we obtain
\begin{equation}\label{eq:indexDXiw}
\operatorname{Index} D\Upsilon_{(\lambda,T)}(w) =
\operatorname{Index} \left({\overline \partial}^{\nabla^\pi} + T^{\pi,(0,1)}_{dw} + B^{(0,1)}\right)
+ \operatorname{Index}({\overline \partial}).
\end{equation}
Therefore it remains to compute the latter two indices which follows from by now
standard Riemann-Roch type index formulae
(See and compare with \cite[p.52]{bourgeois} for a relevant formula.)
\begin{thm}\label{thm:indexforDUpsilon-intro} We fix a trivialization
$\Phi: E \to \overline \Sigma$ and denote
by $\Psi_i^+$ (resp. $\Psi_j^-$) the induced symplectic paths associated to the trivializations
$\Phi_i^+$ (resp. $\Phi_j^-$) along the Reeb orbits $\gamma^+_i$ (resp. $\gamma^-_j$) at the punctures
$p_i$ (resp. $q_j$) respectively. Then we have
\begin{eqnarray}
&{}&
\operatorname{Index} D\Upsilon_{(\lambda,T)}(u) \\
& = & n(2-2g-s^+ - s^-) + 2c_1(w^*\xi)\nonumber\\
&{}& + \sum_{i=1}^{s^+} \mu_{CZ}(\Psi^+_i)
- \sum_{j=1}^{s^-} \mu_{CZ}(\Psi^-_j)\nonumber \\
&{}& +
\sum_{i=1}^{s^+} (2m(\gamma^+_i)+1) + \sum_{j=1}^{s^-}( 2m(\gamma^-_j)+1) - 2g.
\end{eqnarray}
\end{thm}
We refer to Section \ref{sec:Fredholm} for the details of the Fredholm theory,
and postpone elsewhere for the construction of compactified moduli space and its applications.
\medskip
{\bf Acknowledgement:} We would like to thank the unknown referee for her/his careful reading of
the paper and pointing out many careless typos and incorrect English expressions which we appreciate
very much.
\bigskip
\noindent{\bf Convention:}
\medskip
\begin{itemize}
\item The Hamiltonian vector field on symplectic manifold $(P, \omega)$ is defined by $X_H \rfloor \omega = dH$.
\item {(Contact Hamiltonian)} The contact Hamiltonian of a time-dependent contact vector field $X_t$ is
given by
$$
H: = - \lambda(X_t).
$$
We denote by $X_H$ the contact vector field whose associated contact Hamiltonian is given by $H = H(t,x)$.\item For given Lee form $\mathfrak b$, we define the operator $d^{\mathfrak b}$ action on $\Omega^*(M)$ by
\begin{equation}\label{eq:db}
d^{\mathfrak b} \alpha = d\alpha + {\mathfrak b} \wedge \alpha.
\end{equation}
\end{itemize}
These convention are consistent with that of \cite{oh:book}, \cite{oh:contacton-Legendrian-bdy} and \cite{le-oh:lcs}
respectively.
\section{Banyaga $\lcs$ manifolds and contact mapping tori}
In this section, we briefly summarize basic geometric properties of
the $\mathfrak{lcs}$-fication of a contact manifold $(Q,\lambda)$ and
of the pseudoholomorphic curves thereon that we are going to study.
\subsection{$\mathfrak{lcs}$-fication of contact manifolds}
As the starting point towards the Floer theory on general $\lcs$ manifolds, we
consider a special class of $\lcs$ manifolds, which we call \emph{Banyaga $\lcs$ manifolds}.
\begin{defn}[Banyana $\lcs$ structure \cite{banyaga:lcs}]\label{defn:banyaga-lcs}
Let $(Q,\lambda)$ be any contact manifold. A Banyaga $\lcs$ form on $Q \times S^1$ is defined to
be
$$
d^{\frak b}\lambda = d \lambda + {\frak b} \wedge \lambda =: \omega _{\lambda}, \quad \frak b = \pi^*d\theta.
$$
\end{defn}
From now on we will just denote by $d\theta$ $\pi^*d\theta$ slightly abusing notation as long as
there is no danger of confusion.
The main purpose of the present paper is to develop a Floer theory on this class of $\lcs$
manifolds.
Let ${\mathcal V}: = \ker d\lambda$ i.e.,
$$
\mathcal{V}_p = \{ v \in T _{p} M \mid d\lambda(v, \cdot)=0 \}
$$
at each $p \in M$. Then it follows that
$\mathcal{V}$ is a 2-dimensional distribution: ${\mathcal V}_p $
has dimension at least 2 since $d \lambda$ cannot be symplectic since $M $ is closed,
and has dimension at most 2 since
$\omega_\lambda = d \lambda + d\theta \wedge \lambda$ is non-degenerate.
Next we let $\widetilde \xi$ denote the co-vanishing distribution that is $\widetilde \xi _{p} $
is the $\omega_\lambda$-orthogonal complement to ${\mathcal V}_p $. With these definitions, we
have a canonical splitting
\begin{equation}\label{eq:splitting}
TM = \widetilde \xi \oplus {\mathcal V}.
\end{equation}
It follows that
$$
d\pi_Q(\widetilde \xi) = \xi, \, d\pi_{S^1}(\widetilde \xi) = 0
$$
i.e., $\widetilde \xi = \xi \oplus 0$ in terms of the splitting
$TM = (\xi \oplus \operatorname{span}_{\mathbb R}\{R_\lambda\}) \oplus TS^1 $.
Here $\pi_Q: M \to Q$ is the natural projection and
$\xi = \xi_\lambda \subset TQ$ is the contact distribution of $(Q,\lambda)$.
\begin{rem} One may try to
generalize the above discussion to a
more general Lichnerowitz exact $\lcs$ structure $\omega$ on $M =Q^{2n-1} \times S^1$,
with $Q$ a general manifold equipped with a general 1-form $\lambda$ on $M$ such that the 2-form
$\omega = d \lambda + d\theta \wedge \lambda$ is non-degenerate.
See Subsection \ref{subsec:mapping-tori} below.
We will however focus on the above Banyaga $\lcs$ manifolds leaving the general
mapping tori case (or even the general case of lcs manifolds) for a future work so that
we can directly utilize the analysis for
the \emph{contact instantons} developed in \cite{oh-wang:CR-map1} by Wang and
the first named author.
\end{rem}
Now denote a map $u: \dot \Sigma \to M$ as $u = (w,f)$ where $w: \dot \Sigma \to Q$ and
$f: \dot \Sigma \to S^1$ are the components of $u$ for $Q$ and $S^1$ respectively.
We have the natural decomposition of $du$ into
$$
du = dw \oplus df
$$
induced by the product structure $M = Q \times S^1$. Under the presence of the contact form $\lambda$,
$TQ = \xi \oplus \operatorname{span}_{\mathbb R}\{R_\lambda\}$ which in turn induces the splitting
$$
du = \pi_\lambda \circ dw \oplus w^*\lambda \otimes R_\lambda \oplus df.
$$
We denote $d^\pi w = \pi_\lambda \circ dw$ following \cite{oh-wang:CR-map1}.
On the other hand, the splitting \eqref{eq:splitting} induces another splitting
$$
du = \pi_{\widetilde \xi}\circ du \oplus \pi_{\mathcal V}\circ du.
$$
By definition, we have
$$
\pi_\xi(\pi_{\widetilde \xi} \circ du) = d^\pi w
$$
and
$$
\pi_{\widetilde \xi}^\perp(\pi_{\mathcal V}\circ du) = w^*\lambda \otimes R_\lambda \oplus df
$$
where $\pi_{\widetilde \xi}^\perp$ is the projection to
$(\operatorname{span}_{\mathbb R}\{R_\lambda\} \oplus TS^1)$ with respect to the splitting
$$
TM =\xi \oplus \operatorname{span}_{\mathbb R}\{R_\lambda\} \oplus TS^1.
$$
We will denote by
$\Pi_\xi, \, \Pi_\xi^\perp: TM \to TM$ the associated idempotents.
\subsection{Mapping tori of contactomorphisms}
\label{subsec:mapping-tori}
Another class of natural lcs manifolds arises as the mapping cylinder of contactomorphisms
whose description is now on order. This is a generalization of
Banyaga's lcs manifold on $Q \times S^1$ to the general mapping tori associated
to any contact diffeomorphism $\phi$. Banyaga's lcs manifold corresponds to
the mapping torus of the identity map.
Let $(Q,\xi)$ be a contact manifold and $\phi \in \Cont(Q,\xi)$ ba a
contactomorphism. By definition, we have
$$
d\phi(\xi) \subset \xi.
$$
We consider the product $Q \times {\mathbb R}$ and the distribution given by
$$
\xi \oplus {\mathbb R} \langle \frac{\partial}{\partial s} \rangle \subset T(Q \times {\mathbb R}).
$$
Since $d\phi(\xi) \subset \xi$, the distribution descends to
the mapping torus
$$
M_\phi: = \frac{Q \times {\mathbb R}}{(t,\phi(x)) \sim (t+1,x)}.
$$
We denote by $\widetilde \xi$ the resulting distribution
$$
\widetilde \xi = \left[\xi \oplus {\mathbb R} \langle \frac{\partial}{\partial s} \rangle\right]
\subset TM_\phi
$$
on $M_\phi$.
\begin{rem} We would like to emphasize that the above mapping torus is
well-defined for the contact manifold $(M,\xi)$ not for the one $(M,\lambda)$
with a given contact form: Unless $\phi$ is strict, i.e., $\phi^*\lambda = \lambda$,
the obvious pull-back form $\pi^*\lambda$ on $Q \times {\mathbb R}$ does not descend but
the contact distribution does.
\end{rem}
Since $\widetilde \xi$ is cooriented if $\xi$ is, we can take a one-form $\kappa$
on $M_\phi$ such that
\begin{equation}\label{eq:kappa}
\ker \kappa = \widetilde \xi.
\end{equation}
\begin{prop} For each contactomorphism $\phi \in \Cont(Q,\xi)$, the
two form $d \kappa + d\theta \wedge \kappa =: \omega_\kappa$ is an lcs form.
Furthermore if $\kappa'$ is another such form satisfying \eqref{eq:kappa},
the two lcs forms $\omega_\kappa$ and $\omega_{\kappa'}$ are (positively) conformally
diffeomorphic.
\end{prop}
\begin{proof} We take the differential
$$
d\omega_\kappa = d(d \kappa + d\theta \wedge \kappa) = - d\theta \wedge d \kappa
$$
which is equivalent to
$$
0 = d\omega_\kappa + d\theta \wedge d \kappa = d\omega_\kappa + d\theta \wedge \omega_\kappa = d^{\frak b}\omega_\kappa
$$
with $\frak b = d\theta$.
Now we prove non-degeneracy. Consider the exact sequence
$$
0 \to \ker \kappa \to TM_\phi \to TM_\phi/\ker \kappa \to 0
$$
and take the splitting of the sequence
$$
TM_\phi = \ker \kappa \oplus {\mathbb R}\langle R \rangle.
$$
We take the $(n+1)$-th power
$$
(\omega_\kappa)^{n+1} = (d\kappa)^{n+1} + (d\kappa)^n \wedge d\theta \wedge \kappa.
$$
Since $\opname{dim} \ker \kappa = 2n$, $(d\kappa)^{n+1} = 0$.
On the other hand, the second term is nowhere vanishing because we have
$$
(d\kappa)^n \wedge d\theta \wedge \kappa\left(e_1,f_1,e_2,f_2,\ldots, \partial_\theta, R\right) = 1
$$
for any Darboux basis $\{e_1,f_1,e_2,f_2,\ldots,e_n,f_n\}$ and a choice of $R \in TQ$ such that
$$
\lambda(R) = 1
$$
for $R \in T_yQ$. Therefore $(\omega_\kappa)^{n+1}$ is nowhere vanishing and hence $\omega_\kappa$ is
non-degenerate.
Now for the last part of the proposition, suppose that $\kappa _{0}, \kappa _{1} $ are a pair of $1$-forms as above.
We will find a pair $(\phi,f)$ of a diffeomorphism $\phi: M \to M$ and a function $f: M \to {\mathbb R}$
satisfying \eqref{eq:+lcs-definition} with $\frak b = \frak b'$ with $\frak b = d\theta$.
Let $\{\kappa _{t} = t\kappa_1 +(1-t) \kappa_0 \}$, $t \in [0,1]$, be the convex linear combination of $\kappa _{i} $, so in particular $\ker \kappa _{t} = \widetilde{\xi} $. This gives a homotopy
$$
\{\omega _{t} := \omega _{\kappa _{t} } = d ^{\frak b} \kappa _t \}
$$
of $\lcs$ forms, with the property that
$$
\frac{d}{d\tau}\Big| _{\tau=t} \omega _{\tau} = d ^{\frak b} \rho _{t}
$$
for a family of smooth 1-forms $\{\rho _{t} \} $,
$
\rho_t = \frac{d}{d\tau}| _{\tau=t} \kappa_t (= \kappa_1 - \kappa_0).
$
At this point we may apply the version of lcs Moser's argument as it appears in \cite[Theorem 4]{banyaga:lcs}.
(Alternatively, we may also refer readers to the proof of \cite[Theorem 4.2]{le-oh:lcs} for more concrete details
in a similar context.)
More specifically, Banyaga proves that under the current circumstance there exists a family of the pairs $(\phi_t,f_t)$
that satisfy
\begin{equation}\label{eq:+lcs-morphism}
\phi_t^*\omega_t= e^{f_t} \omega_{\kappa_0}, \, \phi_t^* d\theta = d\theta - df_t
\end{equation}
with $\phi_0 = id, \, f_0 = 0$.
\end{proof}
\begin{defn}[$\text{\rm lcs}$ mapping torus]\label{defn:lcs-mapping-torus} Let $\phi \in \Cont(Q,\xi)$. We call the pair $(M_\phi,\omega_\kappa)$
the $\text{\rm lcs}$ mapping torus of the contactomorphism $\phi$.
\end{defn}
\begin{rem}
Analysis of lcs instantons developed in the present paper on the $\mathfrak{lcs}$-fication $Q \times S^1$ of
contact manifold $Q$, which corresponds to the mapping torus $\phi = id$, can be promoted to
one on the contact mapping tori. From the point of view of study of contact dynamics
via perturbed contact instantons in \cite{oh:contacton-Legendrian-bdy},
considering the mapping tori corresponds to
discretizing the contact Hamiltonian dynamics. In this way, we can rule out
the troublesome phenomenon of the appearance of `spiraling instantons along the Reeb core' by fixing the
charge class. We hope to investigate the study of lcs-instantons on
the contact mapping tori and its application to the study of
contactomorphisms and their loops elsewhere.
\end{rem}
\section{Contact triad connection and its $\lcs$-lifting}
\label{sec:connection}
Let$(Q, \lambda, J)$ be a contact triad of dimension $2n+1$ for the contact manifold $(M, \xi)$,
and equip with it the contact triad metric $g=g_\xi+\lambda\otimes\lambda$.
In \cite{oh-wang:connection}, the authors introduced the \emph{contact triad connection} associated to every contact triad $(Q, \lambda, J)$ with the contact triad metric and proved its existence and uniqueness.
\begin{thm}[Contact Triad Connection \cite{oh-wang:connection}]\label{thm:connection}
For every contact triad $(Q,\lambda,J)$, there exists a unique affine connection $\nabla$, called the contact triad connection,
satisfying the following properties:
\begin{enumerate}
\item The connection $\nabla$ is metric with respect to the contact triad metric, i.e., $\nabla g=0$;
\item The torsion tensor $T$ of $\nabla$ satisfies $T(R_\lambda, \cdot)=0$;
\item The covariant derivatives satisfy $\nabla_{R_\lambda} R_\lambda = 0$, and $\nabla_Y R_\lambda\in \xi$ for any $Y\in \xi$;
\item The projection $\nabla^\pi := \pi \nabla|_\xi$ defines a Hermitian connection of the vector bundle
$\xi \to Q$ with Hermitian structure $(d\lambda|_\xi, J)$;
\item The $\xi$-projection of the torsion $T$, denoted by $T^\pi: = \pi T$ satisfies the following property:
\begin{equation}\label{eq:TJYYxi}
T^\pi(JY,Y) = 0
\end{equation}
for all $Y$ tangent to $\xi$;
\item For $Y\in \xi$, we have the following
$$
\partial^\nabla_Y R_\lambda:= \frac12(\nabla_Y R_\lambda- J\nabla_{JY} R_\lambda)=0.
$$
\end{enumerate}
We call $\nabla$ the contact triad connection.
\end{thm}
From this theorem, we see that the contact triad connection $\nabla$ canonically induces
a Hermitian connection $\nabla^\pi$ for the Hermitian vector bundle $(\xi, J, g_\xi)$, and we call it the \emph{contact Hermitian connection}.
Moreover, the following fundamental properties of the contact triad connection was
proved in \cite{oh-wang:connection}, which will be used to perform tensorial calculations later.
\begin{cor}\label{cor:connection}
Let $\nabla$ be the contact triad connection. Then
\begin{enumerate}
\item For any vector field $Y$ on $Q$,
\begin{equation}\label{eq:nablaYX}
\nabla_Y R_\lambda = \frac{1}{2}({\mathcal L}_{R_\lambda}J)JY;
\end{equation}
\item $\lambda(T|_\xi)=d\lambda$.
\end{enumerate}
\end{cor}
We refer readers to \cite{oh-wang:connection} for more discussion on the contact triad connection
and its relation with other related canonical type connections.
Now we define the liftings of contact triad and of $(Q,\lambda)$ to
its $\mathfrak{lcs}$-fication $(Q \times S^1,\omega_\lambda)$. Recalling
$T(Q \times S^1) = TQ \oplus TS^1$, we define a connection on $T(Q \times S^1)$ as follows.
\begin{defn}[$\mathfrak{lcs}$-fication of contact triad connection] Let $(Q,\lambda,J)$ be a contact
triad and $\nabla$ the associated contact triad connection given in Theorem \ref{thm:connection}.
Denote by $\overline J$ the unique $\lambda$-admissible almost complex structure
whose restriction to $TQ$ is $J$.
We call the connection $\overline \nabla$ on $T(Q \times S^1)$ be the \emph{$\mathfrak{lcs}$-fication connection}
for $(Q,\lambda, J)$ if it satisfies the following:
\begin{enumerate}
\item[(7)] it satisfies all the properties of (1) - (6) above,
\item[(8)] $\overline \nabla_{\frac{\partial}{\partial \theta}}\frac{\partial}{\partial \theta}= 0$ and
$\overline \nabla_Y \frac{\partial}{\partial \theta} \in \xi$ for all $Y \in \xi$,
\item[(9)] $\partial_Y^{\overline \nabla}\frac{\partial}{\partial \theta} = 0$ for all $Y \in \xi$,
\item[(10)] $\overline \nabla_{R_\lambda} \frac{\partial}{\partial \theta} = \overline \nabla_{\frac{\partial}{\partial \theta}} R_\lambda = 0$,
\item[(11)] $\overline \nabla$ is $\overline J$-linear.
\end{enumerate}
\end{defn}
It is immediate to check that the above requirement indeed defines a connection on $T(Q \times S^1)$.
Obviously $(10)$ implies the torsion $\overline T$ of $\overline \nabla$ satisfies
$\overline T\left(R_\lambda, \frac{\partial}{\partial \theta}\right) = 0$.
Furthermore we also have
\begin{prop} The $\mathfrak{lcs}$-fication connection $\overline \nabla$ on $T(Q \times S^1)$ satisfies
$$
\overline \nabla_Y \frac{\partial}{\partial \theta} = - \frac12 ({\mathcal L}_{R_\lambda} J) Y \in \xi
$$
for all $Y \in \xi$.
\end{prop}
\begin{proof} By the definition of $\lambda$-admissible almost complex structure in
Definition \ref{defn:lambda-admissible-J}, we have
$\overline J\frac{\partial}{\partial \theta} = R_\lambda$. Therefore using the $\overline J$-linearity of the connection
and compatibility with the contact triad connection $\nabla$ in addition,
and applying the relation $J {\mathcal L}_YJ = - ({\mathcal L}_YJ) J$ a couple of times, we derive
\begin{eqnarray*}
\overline \nabla_Y \frac{\partial}{\partial \theta} & = & - \overline \nabla_Y \overline J R_\lambda
= -\overline J \overline \nabla_Y R_\lambda \\
& = & - \overline J \frac12 \left({\mathcal L}_{R_\lambda} J\right) J R_\lambda =
- \frac12 {\mathcal L}_{R_\lambda}J R_\lambda
\end{eqnarray*}
which finishes the proof.
\end{proof}
Usage of this connection is not essential for the main study of pseudoholomorphic
curves but will simplify geometric calculations and many formulae that appear in our elliptic estimates
\cite{oh-wang:CR-map1}
and in our expression of the linearization operator (see Section \ref{subsec:linearization}). This enables us to provide transparent geometric
interpretation of the various terms appearing in the linearization operator
as in \cite{oh-wang:CR-map1,oh-wang:CR-map2}.
\begin{rem}\label{rem:connection}
\begin{enumerate}
\item One can promote the above definition of $\mathfrak{lcs}$-fication of contact triad connection to
the $\mathfrak{lcs}$-fication of the fiberwise contact triad connection to the contact mapping tori whose
detailed study is postponed to elsewhere.
\item
The $\mathfrak{lcs}$-fication connection $\overline \nabla$ even for the symplectization
is not the canonical connection of the \emph{symplectization} as an almost K\"ahler manifold
\cite{gauduchon}, \cite{kobayashi}:
this is manifested by the nonvanishing $\overline \nabla R_\lambda \neq 0$ while
all other metric connections
on contact manifolds in the literature require $R_\lambda$ to be a Killing vector field and
so also $\overline \nabla R_\lambda = 0$ in their symplectizations.
(See \cite[Introduction]{oh-wang:connection} for the relevant discussion on the relationship between
the contact triad connection and other connections used in the literature on the natural
connections on contact manifolds.)
\end{enumerate}
\end{rem}
\emph{From now on, by an abuse of notation, we will omit the overline from the notation and just denote by $\nabla$ this
$\mathfrak{lcs}$-fication connection on $Q \times S^1$ of the contact triad connection $\nabla$ associated to $(Q,J,\lambda)$.}
\section{Review of contact Cauchy-Riemann maps and Hofer's energy}
\label{sec:CRmap}
\subsection{Contact Cauchy-Riemann maps}
In this section, we recall the basic definition and properties of the so called \emph{contact Cauchy
Riemann map} and \emph{contact instanton} introduced in \cite{oh-wang:CR-map1}.
We denote by $(\dot\Sigma, j)$ a punctured Riemann surface (including the case of closed Riemann surfaces without punctures).
\begin{defn}A smooth map $w:\dot\Sigma\to Q$ is called a \emph{contact Cauchy--Riemann map}
(with respect to the contact triad $(Q, \lambda, J)$), if $w$ satisfies the following Cauchy--Riemann equation
$$
{\overline \partial}_J^\pi w:={\overline \partial}^{\pi}_{j,J}w:=\frac{1}{2}(\pi dw+J\pi dw\circ j)=0.
$$
\end{defn}
Recall that for a fixed smooth map $w:\dot\Sigma\to Q$,
the triple $(w^*\xi, w^*J, w^*g_\xi)$ becomes a Hermitian vector bundle
over the punctured Riemann surface $\dot\Sigma$. This introduces a Hermitian bundle structure on
$Hom(T\dot\Sigma, w^*\xi)\cong T^*\dot\Sigma\otimes w^*\xi$ over $\dot\Sigma$,
with inner product given by
$$
\langle \alpha\otimes \zeta, \beta\otimes\eta \rangle =h(\alpha,\beta)g_\xi(\zeta, \eta),
$$
where $\alpha, \beta\in\Omega^1(\dot\Sigma)$, $\zeta, \eta\in \Gamma(w^*\xi)$,
and $h$ is the K\"ahler metric on the punctured Riemann surface $(\dot\Sigma, j)$.
Let $\nabla^\pi$ be the contact Hermitian connection.
Combining the pull-back of this connection and the Levi-Civita connection of the Riemann surface,
we get a Hermitian connection for the bundle $T^*\dot\Sigma\otimes w^*\xi \to \dot\Sigma$.
By a slight abuse of notation, we will still denote by $\nabla^\pi$ this combined connection.
The smooth map $w$ has an associated $\pi$-harmonic energy density
defined as the norm of the section $d^\pi w:=\pi dw$ of $T^*\dot\Sigma\otimes w^*\xi\to \dot\Sigma$.
In other words, it is the function $e^\pi(w):\dot\Sigma\to {\mathbb R}$ defined by
$
e^\pi(w)(z):=|d^\pi w|^2(z).
$
(Here we use $|\cdot|$ to denote the norm from $\langle\cdot, \cdot \rangle$ which should be clear from the context.)
Similarly to the case of pseudoholomorphic curves on almost K\"ahler manifolds,
we obtain the following basic identities, for whose proofs we refer readers to \cite{oh-wang:CR-map1}.
\begin{lem}[Lemma 3.2 \cite{oh-wang:CR-map1}]\label{lem:omega-area}
Fix a K\"ahler metric $h$ on $(\dot\Sigma,j)$,
and consider a smooth map $w:\dot\Sigma \to Q$. Then we have the following equations
\begin{enumerate}
\item $e^\pi(w):=|d^\pi w|^2 = |\partial^\pi w| ^2 + |{\overline \partial}^\pi w|^2$;
\item $2\, w^*d\lambda = (-|{\overline \partial}^\pi w|^2 + |\partial^\pi w|^2) \,dA $
where $dA$ is the area form of the metric $h$ on $\dot\Sigma$;
\item $w^*\lambda \wedge w^*\lambda \circ j = - |w^*\lambda|^2\, dA$.
\end{enumerate}
As a consequence, if $w$ satisfies ${\overline \partial}^\pi w=0$, then
\begin{equation}\label{eq:onshell}
|d^\pi w|^2 = |\partial^\pi w| ^2 \quad \text{and}\quad w^*d\lambda = \frac{1}2|d^\pi w|^2 \,dA.
\end{equation}
\end{lem}
We call a map $w:\dot \Sigma \to Q$ a \emph{contact Cauchy-Riemann map} if $w$ satisfies
${\overline \partial}^\pi w=0$. The contact Cauchy--Riemann equation itself is \emph{not} an elliptic system
since the symbol is of rank $2n$ which is $1$ dimension lower than $TM$.
Here the closedness condition $d(w^*\lambda\circ j)=0$
leads to an elliptic system (see \cite{oh:contacton} for an explanation)
\subsection{Contact instantons}
The following definition is introduced in \cite{oh-wang:CR-map1,oh-wang:CR-map2} and
its analysis of the moduli space relevant to the equation has been developed
therein and in \cite{oh:contacton}.
\begin{defn}[Contact instantons \cite{oh-wang:CR-map1}] A contact Cauchy-Riemann map $w:(\dot \Sigma, j) \to (Q,J)$ is called
a \emph{contact instanton} if it satisfies $d(w^*\lambda \circ j) = 0$ in addition.
\end{defn}
We call the defining equation of a contact instanton
\begin{equation}\label{eq:contacton}
{\overline \partial}^\pi w = 0, \quad d(w^*\lambda \circ j) = 0
\end{equation}
a \emph{contact instanton equation}.
We recall the following local elliptic estimates for any contact instantons $w$
proved in \cite{oh-wang:CR-map1}.
\begin{thm}[Theorem 1.6 \cite{oh-wang:CR-map1}]\label{thm:local-W12}
Let $(\dot \Sigma, j)$ be a punctured Riemann surface with a possibly
empty set of punctures. Equip $\dot \Sigma$ with a metric which is cylindrical
near each puncture. Let $w: \dot\Sigma \to M$ be a contact instanton.
For any relatively compact domains $D_1$ and $D_2$ in
$\dot\Sigma$ such that $\overline{D_1}\subset D_2$, we have
$$
\|dw\|^2_{W^{1,2}(D_1)}\leq C_1 \|dw\|^2_{L^2(D_2)} + C_2 \|dw\|^4_{L^4(D_2)},
$$
where $C_1, \ C_2$ are some constants which
depend only on $D_1$, $D_2$ and $(M,\lambda, J)$.
\end{thm}
We also establish the following iterative local $W^{2+k,2}$-estimates on punctured surfaces $\dot \Sigma$
in terms of the $W^{\ell,p}$-norms with $\ell \leq k+1$. Combined with
Theorem \ref{thm:local-W12}, this theorem in turn provides
a priori local $W^{2+k,2}$-estimates in terms of (local) $L^2$, $L^4$ norms of $|d^\pi w|$,
and $|w^*\lambda|$.
\begin{thm}[Theorem 1.7 \cite{oh-wang:CR-map1}] \label{thm:Wk2}
Let $w$ be a contact instanton.
Then for any pair of domains $D_1 \subset D_2 \subset \dot \Sigma$ such that $\overline{D_1}\subset D_2$,
$$
\int_{D_1} |(\nabla)^{k+1}(dw)|^2 \leq \int_{D_2} {\mathcal J}_{k}(d^\pi w, w^*\lambda).
$$
Here ${\mathcal J}_k$ is a polynomial function of degree up to $2k+4$ with nonnegative coefficients of the norms of the covariant derivatives
of $d^\pi w, \, w^*\lambda$ up to $0, \, \ldots, k$ with degree at most $2k + 4$
whose coefficients depending on $J$, $\lambda$ and $D_1, \, D_2$ but independent of $w$.
\end{thm}
One can also directly derive $C^{k,\alpha}$ estimates instead as in \cite{oh:contacton-Legendrian-bdy}.
The following classification result of closed contact instantons was proved
in \cite{oh-wang:CR-map1}. (See also \cite[Proposition 1.4]{abbas} where Abbas
made a similar statement as a part of \cite[Proposition 1.4]{abbas}.)
\begin{prop}[Proposition 3.4, \cite{oh-wang:CR-map1}]\label{prop:abbas} Assume $w:\Sigma\to M$ is a smooth contact instanton from a closed Riemann surface.
Then
\begin{enumerate}
\item If $g(\Sigma)=0$, $w$ is a constant map;
\item If $g(\Sigma)\geq 1$, $w$ is either a constant or the locus of its image
is a \emph{closed} Reeb orbit.
\end{enumerate}
In particular, any such instanton satisfies $[w] = 0$ in $H_2(Q;{\mathbb Z})$ and so
is massless (i.e., $E^\pi(w) = 0$).
\end{prop}
Next we recall the asymptotic behavior of contact instantons in general
from \cite{oh-wang:CR-map1}.
\begin{hypo}\label{hypo:basic}
Let $h$ be the metric on $\dot \Sigma$ given above.
Assume $w:\dot\Sigma\to Q$ satisfies the contact instanton equations \eqref{eq:contacton},
and
\begin{enumerate}
\item $E^\pi(w) <\infty$ (finite $\pi$-energy);
\item $\|d w\|_{C^0(\dot\Sigma)} <\infty$.
\end{enumerate}
\end{hypo}
Let $w$ satisfy Hypothesis \ref{hypo:basic}. We can associate two
natural asymptotic invariants at each puncture defined as
\begin{eqnarray}
T & := & \frac{1}{2}\int_{[0,\infty) \times S^1} |d^\pi w|^2 \, dA + \int_{\{0\}\times S^1}(w|_{\{0\}\times S^1})^*\lambda\label{eq:TQ-T}\\
Q & : = & \int_{\{0\}\times S^1}((w|_{\{0\}\times S^1})^*\lambda\circ j).\label{eq:TQ-Q}
\end{eqnarray}
(Here we only look at positive punctures. The case of negative punctures is similar.)
\begin{rem}\label{rem:TQ}
For any contact instanton $w$, since $\frac{1}{2}|d^\pi w|^2\, dA=d(w^*\lambda)$, by Stokes' formula,
$$
T = \frac{1}{2}\int_{[s,\infty) \times S^1} |d^\pi w|^2\, dA + \int_{\{s\}\times S^1}(w|_{\{s\}\times S^1})^*\lambda, \quad
\text{for any } s\geq 0.
$$
Moreover, since $d(w^*\lambda\circ j)=0$, the integral
$$
\int_{\{s \}\times S^1}(w|_{\{s \}\times S^1})^*\lambda\circ j, \quad
\text{for any } s \geq 0
$$
does not depend on $s$ whose common value is nothing but $Q$.
\end{rem}
We call $T$ the \emph{asymptotic contact action}
and $Q$ the \emph{asymptotic contact charge} of the contact instanton $w$ at the given puncture.
The following theorem slightly strengthens the convergence results from
\cite{oh-wang:CR-map1}.
\begin{thm}[Theorem 6.4 \cite{oh-wang:CR-map1}]\label{thm:subsequence}
Let $\Sigma$ be a closed Riemann surface of genus 0 with
a finite number of marked points $\{p_1, \cdots, p_k\}$ for $k \geq 3$, and let $\dot \Sigma = \Sigma \setminus
\{p_1,\cdots, p_k\}$ be the associated punctured Riemann surface equipped with a metric as before.
Suppose that $w$ is a contact instanton map $w:\dot \Sigma
\to Q \times S^1 $ with finite total energy $E^\pi(w)$
and fix a puncture $p \in \{p_1, \cdots, p_k\}$.
Then for any given sequence $I=\{\tau_k\}$ with $\tau_k \to \infty$,
there exists a subsequence $I' \subset I$ and a closed parameterized Reeb orbit $\gamma = \gamma_{I'}$ of period $T$ and some $(\tau_0,t_0) \in {\mathbb R} \times S^1$ and a massless instanton $w_\infty(\tau,t)$
(i.e., $E^\pi(w_\infty) = 0$) on the cylinder ${\mathbb R} \times S^1$ such that
$$
\lim_{i \to \infty} w(\tau + \tau_{k_i},t) = w_\infty
$$
on $K \times S^1$ in the $C^\infty$-sense for every compact subset $K \subset {\mathbb R}$.
Furthermore $w_\infty$ has the formula
$w_\infty(\tau,t) = \gamma(-Q(p) \tau + T(p)\, t)$ where $\gamma$ is a Reeb trajectory, and for the case
of $Q = 0$ and $T\neq 0$, the trajectory is a closed Reeb orbit of $R_\lambda$ with period $T$.
\end{thm}
\begin{prop}[Corollary 6.5 \cite{oh-wang:CR-map1}] \label{cor:tangent-convergence}
Let $(w,f):[0, \infty)\times S^1\to Q$ satisfy the $\lcs$
instanton equations \eqref{eq:lcs-instanton} and Hypothesis \ref{hypo:basic}.
Then
\begin{eqnarray*}
&&\lim_{s\to \infty}\left|\pi \frac{\partial w}{\partial\tau}(s+\tau, t)\right|=0, \quad
\lim_{s\to \infty}\left|\pi \frac{\partial w}{\partial t}(s+\tau, t)\right|=0\\
&&\lim_{s\to \infty}\lambda(\frac{\partial w}{\partial\tau})(s+\tau, t)= - Q, \quad
\lim_{s\to \infty}\lambda(\frac{\partial w}{\partial t})(s+\tau, t)=T
\end{eqnarray*}
and
$$
\lim_{s\to \infty}|\nabla^l dw(s+\tau, t)|=0 \quad \text{for any}\quad l\geq 1.
$$
All the limits are uniform for $(\tau, t)$ in $K\times S^1$ with compact $K\subset {\mathbb R}$.
\end{prop}
If $\lambda$ is nondegenerate and $Q = 0, \, T \neq 0$, then the convergence $w(\tau,\cdot) \to \gamma(T\cdot)$
in Theorem \ref{thm:subsequence} is uniform.
\begin{rem} In a recent work \cite{oh:contacton-Legendrian-bdy}, the first named author
proved that the charge $Q$ always vanishes for the contact instantons with
Legendrian boundary conditions, i.e., for the maps satisfying
\begin{equation}\label{eq:contacton-Legendrian-bdy}
\begin{cases}
{\overline \partial}^\pi w = 0, \, d(w^*\lambda \circ j) = 0 \\
w(\overline{z_iz_{i+1}}) \subset R_i, \quad i = 0, \ldots, k
\end{cases}
\end{equation}
for a tuple of Legendrian submanifolds $(R_1,\cdots, R_k)$. It will be interesting
to develop the $\mathfrak{lcs}$-fication of this boundary value problem.
\end{rem}
\subsection{Canonical symplectization and Hofer's $\lambda$-energy; revisit}
\label{subsec:canonical}
In this subsection, we first recall the canonical symplectization of a contact manifold $(Q,\xi)$,
which does not involve the choice of contact form.
We consider the subset
\begin{equation}\label{eq:setalpha}
\{\alpha \in T^*Q \mid \alpha \neq 0, \, \ker \alpha = \xi \} \subset T^*Q \setminus \{0\}.
\end{equation}
When $Q$ is oriented and a positive contact form $\lambda$ is given, we consider
the $(2n+2)$-dimensional submanifold $W$ of $T^*Q$
\begin{equation}\label{eq:W}
W = \{\alpha \in T^*Q \setminus \{0\} \mid \ker \alpha = \xi, \, \alpha(\vec n) > 0\}
\end{equation}
where $\vec n$ is a vector such that ${\mathbb R} \{\vec n\} \oplus \xi$ becomes a positively
oriented basis. Note that $W$ is a principal ${\mathbb R}_+$-bundle over $Q$ that is trivial.
We can lift a map $w: \dot \Sigma \to Q$ to a map $\widehat w:\dot \Sigma \to W$
if the contact manifold $(Q,\xi)$ is cooriented. In particular when the contact manifold
$(Q,\xi)$ is equipped with the contact form $\lambda$, $w$ has a canonical lift given by
\begin{equation}\label{eq:canonical-lift}
\widehat w(z) : = \lambda(w(z)) \in T^*Q_{w(z)}.
\end{equation}
We then examine the relationship between $w$ being a contact instanton and $\widehat w$
being a pseudoholomorphic curve on $W$ with respect to a scale-invariant almost complex
structure on $W$. We give a geometric description of Hofer's remarkable energy
introduced in \cite{hofer} in terms of this canonical symplectization. This energy
is the key ingredient needed in the bubbling-off analysis and so in the construction of the
compactification of the moduli spaces of pseudoholomorphic curves needed to develop the
symplectic field theory \cite{EGH}, \cite{behwz}. In this section,
we will then introduce its variant for the study of contact instanton maps whose
charge is not necessarily vanishing, i.e. $w^*\lambda \circ j$ does not have to be exact.
We now denote by
$$
i_W: W \hookrightarrow T^*Q
$$
the canonical embedding and by
$$
\pi_W: W \to Q
$$
the canonical projection which defines a principle ${\mathbb R}_+$-bundle. A generator of this ${\mathbb R}_+$ action is given by
the Euler vector field
$$
E(q,p): = \sum_{i=1}^{2n+1} p_i\frac{\partial}{\partial p_i}.
$$
We also denote
by $\Theta$ the Liouville
one-form on $T^*Q$. The basic proposition is that $W$ carries the canonical symplectic form
\begin{equation}\label{eq:omegaW}
\omega_W = i_W^*d\Theta.
\end{equation}
\begin{defn}[Canonical Symplectization]\label{defn:canonical-symplectization}
Let $(Q,\xi)$ be a co-oriented contact manifold. We call $(W,\omega_W)$ the
\emph{canonical symplectization} of the contact manifold $(Q,\xi)$.
\end{defn}
One important point of this canonical symplectization is the fact that it depends only on the
contact structure $\xi$ and the orientation of $Q$,
but does not depend on the choice of contact form $\lambda$. The symplectic form $\omega_W$
provides a natural subspace
$$
\widetilde \xi: = \left\{\eta \in T_\alpha W \, \Big\vert\, \omega_W\left(\eta, \frac{\partial}{\partial r}\right) = 0 \right\}.
$$
Note that the projection $d_\alpha\pi_w$ restricts to an isomorphism $\widetilde \xi \to \xi$.
As explained in \cite{oh:contacton}, a choice of contact form $\lambda$ defines the map
$$
\widehat \psi: Q \times {\mathbb R} \to W; \quad \widehat \psi(x,s) = \psi(s) \, \lambda(x) \in T^*_xQ
$$
associated to each monotonically increasing function $\psi$ such that
\begin{equation}\label{eq:varphi}
\psi(s) =
\begin{cases} 1 \quad & \mbox{for $s \geq R_1$} \\
\frac{1}{2} \quad & \mbox{for $s \leq R_0$}
\end{cases}
\end{equation}
for any pair $R_0 < R_1$ of real numbers. We measure the symplectic area
of the composition $\widehat\psi \circ w: \dot \Sigma \to W$
for all possible variations of such $\psi$. Hofer's original definition of
this type of energy then can be expressed as the integral
\begin{eqnarray}
E_{\mathcal C}(u)& : = & \sup_{\psi} \int_{\dot \Sigma} (\widehat\psi \circ u)^*\omega_W \nonumber\\
& = & \sup_{\psi} \int_{\dot \Sigma} d (\psi(s)\, \pi^*\lambda) \label{eq:hofer's-energy}\\
& = & \sup_{\psi}\left(\int_{\dot \Sigma} \psi(a) dw^*\lambda + \psi'(a)\, da \wedge w^*\lambda\right).
\end{eqnarray}
Following \cite{behwz}, we split this energy into two parts,
one purely depending on $w$
$$
E^\pi(w)= \int_{\dot \Sigma} dw^*\lambda
$$
and the other
$$
E^\lambda(u) = \sup_{\psi} \int_{\dot \Sigma} \psi'(a)\, da \wedge w^*\lambda
= \sup_{\psi} \int_{\dot \Sigma} d(u^*\psi) \wedge u^*(\pi_Q^*\lambda).
$$
\begin{rem} The upshot of the above discussion is that Hofer's energy is
closely tied to the symplectic area of the composition $\widetilde \psi \circ u$
measured with respect to the canonical symplectic form on $W \subset T^*Q$.
Since the choice of the positive function satisfying \eqref{eq:varphi} is not
unique, we take the supremum over all such function $\psi$ to extract $\psi$-independent
quantity, which is precisely the way how Hofer's energy is defined.
\end{rem}
\section{$\lcs$ instantons and their energy}
\label{sec:lcs-instanton}
\subsection{$\lcs$ instanton equation}
In this section, we give a useful representation of the equation ${\overline \partial}_J u = 0$
for any $\lambda$-admissible almost complex structure $J$ in terms of the
contact instanton studied in \cite{oh-wang:CR-map1, oh-wang:CR-map2}.
We denote by
$$
{\overline \partial}^\pi w: = \frac{d^\pi w + J d^\pi w \circ j}{2}
$$
(similarly for $\partial^\pi w$).
\begin{prop}\label{prop:lcs-instanton} Let $J$ be $\lambda$-admissible almost complex structure. Then
a map $u$ is $J$-holomorphic if and only if $(w,f)$ satisfies
\begin{equation}\label{eq:lcs-instanton}
{\overline \partial}^\pi w = 0, \quad w^*\lambda \circ j = f^*d\theta.
\end{equation}
\end{prop}
\begin{proof} By definition, we have
${\overline \partial}_J u= \frac{du + J du j}{2}$. Writing
\begin{equation}\label{eq:du}
du = \pi_{\widetilde \xi}\circ du \oplus \pi_{\mathcal V}\circ du
\end{equation}
and using the $J$ invariance of $\widetilde \xi$ and ${\mathcal V}$, we compute
\begin{eqnarray*}
J du & = & J (\Pi_{\widetilde \xi}\circ du + \Pi_{\mathcal V}\circ du) \\
& = & J (\Pi_{\widetilde \xi}\circ du) + J(\Pi_{\mathcal V}\circ du).
\end{eqnarray*}
For the first summand, we can rewrite it as
\begin{eqnarray*}
J (\Pi_{\widetilde \xi}\circ du) = J \left( (\pi_\xi \circ dw) \oplus 0 R_\lambda)\oplus 0 \frac{\partial}{\partial \theta}\right)
= (J d^\pi w) \oplus 0_{\mathcal V}.
\end{eqnarray*}
For the second summand, we have
$$
J(\pi_{\mathcal V} \circ du) = J (w^*\lambda R_\lambda\oplus df).
$$
Therefore we have
\begin{equation}\label{eq:Jdu}
J du = J d^\pi w \oplus J (w^*\lambda R_\lambda\oplus df).
\end{equation}
By adding up \eqref{eq:du}, \eqref{eq:Jdu}, we obtain
$$
{\overline \partial}_J u = {\overline \partial}^\pi w \oplus
\left(\frac{(w^*\lambda R_\lambda\oplus df) + J (w^*\lambda R_\lambda\oplus df) \circ j}{2} \right).
$$
For the second summand, we derive that
$$
\frac{(w^*\lambda R_\lambda \oplus df) + J (w^*\lambda R_\lambda\oplus df) \circ j}{2} = 0
$$
is equivalent to $w^*\lambda \circ j = f^*d\theta$ by noting $J\frac{\partial}{\partial \theta} = R_\lambda$
and evaluating the equation
against the coordinate basis $\{\frac{\partial}{\partial s},\frac{\partial}{\partial t} \}$ of
any complex coordinate $z = s + i t$ on $\dot \Sigma$.
\end{proof}
\begin{rem}\label{rem:comparison}
Here we would like to compare the system \eqref{eq:lcs-instanton} with the contact instanton equation
\eqref{eq:contacton}
studied in \cite{oh-wang:CR-map1,oh-wang:CR-map2}. First of all in both systems, the first
equation depends only on the contact component $w: \dot \Sigma \to Q$ which satisfies
the contact Cauchy-Riemann map equation ${\overline \partial}^\pi w = 0$. In \cite{oh-wang:CR-map1,oh-wang:CR-map2},
all the local a priori elliptic estimates have been established. Furthermore asymptotic convergence is
also established for such map $w$
under the derivative bound $\|dw\|_{C^0} < C$ except the case where the asymptotic charge
$$
Q = \int w^*\lambda\circ j|_{t = t_0}
$$
does not vanish but its asymptotic period
$$
T = \lim_{t_0 \to \infty} \int w^*\lambda|_{t = t_0}
$$
vanishes. Unlike that case where $w^*\lambda\circ j$ is exact as in the symplectization of $(Q,\lambda)$,
the second equation $d(w^*\lambda\circ j)=0$ does not enable us to establish the asymptotic convergence to
a closed Reeb orbit for such a case under the derivative bound $\|dw\|_{C^0} < C$.
In the current situation, $w$ is a contact instanton such that the one-form $w^*\lambda\circ j$
is not only closed but it is determined by the $f$-component. In particular it always has
\emph{integral} asymptotic charge which is nothing but the degree of the map
$$
t \mapsto f(t, \cdot); S^1 \to S^1
$$
in the coordinate $(\tau,t)$ in the strip-like region near the given puncture of $\dot \Sigma$.
\end{rem}
\subsection{Hofer-type energy for $\lcs$ instantons}
\label{subsec:energy}
In the present section, we will derive some basic properties of \eqref{eq:lcs-instanton}.
A crucial point for the analysis of $\lcs$ instanton equation is to identify the
relevant geometric energy that enables us to establish the results of suitable
compactness and asymptotic convergence for a finite energy $\lcs$ instantons.
(See \cite[Section 6]{oh-wang:CR-map1} for delicacy of the issue
arising in the study of asymptotic convergence for the contact instanton equation.)
Fix a K\"ahler metric $h$ on $(\dot \Sigma, j)$. The norm $|dw|$ of the map
$$
dw:(T \dot \Sigma,h) \to (TQ, g)
$$
with respect to the metric $g$ is defined by
$$
|dw|_g^2 := \sum_{i=1}^{2} {|dw(e_i)|_g}^2,
$$
where $\{ e_1, e_2 \}$ is an orthonormal frame of $T \Sigma$
with respect to $h$.
We first introduce the $\xi$-component of the harmonic energy, which we call
the $\pi$-harmonic energy. This energy equals the contact area $\int w^*d\lambda$
`on shell' i.e., for any contact Cauchy-Riemann map, which satisfies ${\overline \partial}^\pi w = 0$
\begin{defn}\label{defn:pi-energy}
For a smooth map $\dot \Sigma \to Q$, we define the $\pi$-energy of $w$ by
\begin{equation}\label{eq:Epi}
E^\pi(j,w) = \frac{1}{2} \int_{\dot \Sigma} |d^\pi w|^2.
\end{equation}
\end{defn}
As mentioned in subsection \ref{subsec:canonical} in the context of symplectization, the $\pi$-harmonic energy
itself is not enough for the crucial bubbling-off analysis needed for the equation
\eqref{eq:lcs-instanton}. This is only because the bubbling-off analysis
requires the study of asymptotic behavior of contact instantons on the complex place ${\mathbb C}$.
A crucial difference between the case of contact instantons from Gromov's theory of
pseudoholomorphic curves on symplectic manifolds is that there is no removal singularity
result of the type of harmonic maps (or pseudoholomorphic maps) \emph{under the finite
$\pi$-energy condition}. Because of this, one
needs to examine the vertical part (i.e., the $R_\lambda$-component) of energy to control the asymptotic behavior of
contact instantons near the puncture. For this purpose, the Hofer-type energy
will be again crucial. In this section, we introduce this energy
in the general context of $\mathfrak{lcs}$-fication of $(Q,\lambda)$.
Now the definition of the vertical part of energy, which we call the $\lambda$-energy,
is in order. We need some preparation before giving the definition.
Let $u = (w,f):\dot \Sigma \to Q \times S^1$ be an $\lcs$ instanton.
Denote by $\overline \Sigma$ the real blow-up of the punctured Riemann
surface $\dot \Sigma$.
\begin{prop}\label{prop:S1class} Let $u: \dot \Sigma \to Q \times S^1$ be an $\lcs$ instanton
satisfying
\begin{equation}\label{eq:pienergy-C1bound}
E^\pi(u) < \infty, \quad \|du\|_{C^0} < \infty.
\end{equation}
Then the differential from $f^*d\theta$ extends smoothly to $\partial \overline \Sigma$.
\end{prop}
\begin{proof} We note that the given hypothesis for $u = (w,f)$ makes
$w$ a contact instanton satisfying Hypothesis \ref{hypo:basic} and so we apply
Theorem \ref{thm:subsequence} and Proposition \ref{cor:tangent-convergence} to $w$.
\end{proof}
Recalling the isomorphism
$$
[\dot \Sigma,S^1] \cong H^1(\dot \Sigma,{\mathbb Z})
$$
we may also regard the cohomology class $[u]_{S^1}$ as an element in $[\dot \Sigma,S^1]$.
This enables us to define an element in the set of homotopy classes $[\dot \Sigma,S^1]$, which
we also denote by $\eta = \eta_u$. In fact, the isomorphism
$[\dot \Sigma, S^1] \cong H^1(\dot \Sigma;{\mathbb Z})$
is directly induced by the period map
$$
[f] \mapsto [f^*d\theta].
$$
Motivated by this theorem, we define the set of \emph{period classes} $\eta \in H^1(\dot \Sigma,{\mathbb Z})$.
\begin{defn}[Period map and the charge class] Let $f: \dot \Sigma \to Q \times S^1$ be a smooth map.
\begin{enumerate}
\item We call the map
$$
C^\infty(\dot \Sigma,Q) \to H^1(\dot \Sigma,{\mathbb Z}); \quad f \mapsto [f^*d\theta]
$$
the \emph{period map} and call the cohomology class $[f^*d\theta]$
the \emph{charge class} of the map $f$.
\item For an $\text{\rm lcs}$ instanton $u = (w,f): \dot \Sigma \to Q \times S^1$, we call the cohomology class
$$
\left[f^*d\theta\right] \in H^1(\dot \Sigma,{\mathbb Z})
$$
the \emph{charge class} of $u$ and write
$$
[u]_{S^1}: = [f^*d\theta].
$$
\end{enumerate}
\end{defn}
Now we consider the maps $u = (w,f)$ with a fixed charge class $\eta = \eta_u$.
\begin{prop}\label{prop:harmonic-form}
Let $h$ be any K\"ahler metric on $(\dot \Sigma,j)$ such that $h = d\tau^2 + dt^2$
with respect to the strip-like coordinates $(\tau,t)$ near each puncture of $\dot \Sigma$.
Suppose that $u = (w,f)$ satisfies \eqref{eq:pienergy-C1bound}.
Then there exists a harmonic one form $\beta_\eta$ such that
\begin{equation}\label{eq:dtildef}
f^*d\theta = \beta_\eta + d \widetilde f
\end{equation}
on $\dot \Sigma$ for a function $\widetilde f: \dot \Sigma \to {\mathbb R}$ that continuously extends to a function
on the real-blow up $\overline{\Sigma}$.
\end{prop}
\begin{proof}
Let $\eta \in H^1(\dot \Sigma, {\mathbb Z})$ be the class represented by $f^*d\theta$. We first recall
that the one-form $f^*d\theta = w^*\lambda \circ j$ converges to $- Q\, dt + T\, d\tau$ exponentially fast
as $\tau \to \infty$ in the given strip-like coordinate $(\tau,t)$. Therefore we can write
$$
f^*d\theta = \beta_0 + dg
$$
for some function $g$ and a closed one-form $\beta_0$ in class $\eta \in H^1(\dot \Sigma,{\mathbb Z})$ which satisfy
the following:
\begin{itemize}
\item $dg \to 0$ exponentially fast as $\tau \to \infty$,
\item $\beta_0 \equiv - Q\, dt + T\, d\tau$ for $\tau \geq R_0$ for sufficiently large $R_0> 0$.
\end{itemize}
We note that $\beta_0$ is a harmonic form on $[R_0, \infty) \times [0,1]$.
We apply the above discussion to each puncture of $\dot \Sigma$ and consider the compact domain
$$
\Sigma_{\vec R_0}: = \dot \Sigma \setminus \left( \sqcup_{i=1}^k [R_{0,i}+ \delta, \infty) \times [0,1]\right)
$$
for some small $\delta > 0$.
We write $(\beta_{0,i}, g_i)$ for the above pair $(\beta_0,g)$ associated to the strip
$$
Z_i = [R_{0,i}, \infty)\times [0,1].
$$
We have $h = d\tau^2 + dt^2$ on each $[R_{0,i}, R_{0,i} + \delta] \times [0,1]$
for sufficiently large $R_{0,i}$'s.
Then we take the double of $(\Sigma_{\vec R_0},h)$ given by
$$
(\Sigma_{\vec R_0}^{db},h^{db}) = (\Sigma_{\vec R_0},h) \# (\Sigma_{\vec R_0},h)^{op}
$$
where $\Sigma_{\vec R_0}^{op}$ is $\Sigma_{\vec R_0}$ with opposite orientation.
We also have the canonical double of the form $\beta_0$ on $\Sigma_{\vec R_0}^{db}$ which we denote by
$\beta_0^{db}$.
This one-form $\beta_0^{db}$ is closed on $\Sigma^{db}$ and so naturally defines a (de Rham) cohomology class
in $H^1(\Sigma_{\vec R_0}^{db};{\mathbb Z})$.
Let $\beta$ be the unique harmonic one-form representing the class $\eta^{db}$ on the double $\Sigma_{\vec R_0}^{db}$.
Then $\beta$ is invariant
under the natural involution
$\iota: \Sigma_{\vec R_0}^{db} \to \Sigma_{\vec R_0}^{db}$, i.e., $\iota^*\beta = \beta$
since $\iota$ is an isometry.
On the annulus $[-\delta, \delta]_i \times S^1 \subset [-\delta, \delta] \times \partial \Sigma_{\vec R_0}$, we write
$$
\beta = c(\tau,t)\, d\tau + d(\tau,t)\, dt
$$
and consider the complex-valued function
$$
\kappa(\tau + it) = (c(\tau + i t) + T) + \sqrt{-1} (d(\tau + it) - Q)
$$
as a $t$-periodic complex-valued function on ${\mathbb C}$.
Then since $\beta$ is a harmonic one-form, the function $\kappa$ is a holomorphic function which also satisfies
\begin{equation}\label{eq:Im}
\int_{\{\tau\} \times S^1} \opname{Im} \kappa (\tau,t)\, dt = \int_{\{\tau\} \times S^1} \beta - Q \equiv 0
\end{equation}
for all $\tau$. Furthermore, the identity $\iota^*\beta = \beta$ implies
\begin{equation}\label{eq:Re}
\kappa(-\tau + it) = - (c(\tau + i t) + T) + \sqrt{-1} (d(\tau + it)- Q).
\end{equation}
In particular, substituting $\tau = 0$, we get $c(i t) +T = - (c(i t) + T)$ which implies
both sides vanish for all $t \in S^1$.
Combining \eqref{eq:Im} and \eqref{eq:Re}, we have proved $\kappa(\tau + it) \equiv 0$ on each $[-\delta, \delta]_i \times S^1$
for $i = 1, \cdots, k$. But this is equivalent to the equality
$$
\beta(\tau,t) = T\, d\tau - Q\, dt
$$
on the strips $[-\delta, \delta]_i \times S^1$.
Now the restriction of $\beta$ to $\Sigma_{\vec R_0}$ automatically extends to
$\dot \Sigma$ by setting it to be $\beta = T d\tau - Q\, dt$ on $[R_{0,i} + \delta, \infty) \times [0,1]$.
We denote the resulting harmonic form still by $\beta$ on $\dot \Sigma$. Then
it satisfies $[\beta] = [f^*d\theta]$ and
$$
\beta - \beta_0 = 0
$$
on $[R_{0,i} + \delta, \infty) \times [0,1]$ and hence
$$
\beta = f^*d\theta + d\widetilde f
$$
such that $d(\widetilde f - g) \to 0$ exponentially fast. This finishes the proof.
\end{proof}
In particular on the given cylindrical neighborhood $D_\delta(p) \setminus \{p\}$,
$d \widetilde f \to 0$ as $\tau \to \infty$ by the asymptotic convergence theorem
Theorem \ref{thm:subsequence}.
We remark that when $w$ is given, the function $\widetilde f$ on $\dot \Sigma$ is uniquely determined
by the equation \eqref{eq:dtildef} modulo
the shift by a constant.
By construction, \eqref{eq:lcs-instanton} for $u = (w,f)$ in class
$
[u]_{S^1}= \eta \text{ in }\, H^1(\dot \Sigma)
$
is equivalent to the following
\begin{equation}\label{eq:abbas}
\begin{cases} {\overline \partial}^\pi w = 0,\\
w^*\lambda\circ j - d \widetilde f = \beta\\
\Delta \beta = 0
\end{cases}
\end{equation}
for the triple $(w,\widetilde f, \beta)$ which determines (modulo addition by $\theta_0$) the component
$f: \dot \Sigma \to S^1$ by the equation
$$
\beta + d \widetilde f= f^*d\theta, \quad [\beta] = \eta \text{ in }\, H^1(\dot \Sigma).
$$
\begin{rem}
When $g(\dot \Sigma) = 0$, the harmonic one-form $\beta$ is uniquely determined by
its asymptotic charges at the punctures. In other words, the following asymptotic boundary
value problem has the unique solution
$$
\begin{cases} \Delta \beta = 0, \\
\lim_{\tau \to \pm \infty} \epsilon_j^*\beta = \pm(-Q_j)\,dt
\end{cases}
$$
on $\dot \Sigma$ where $\epsilon_j: [0,\infty) \times S^1 \to \dot \Sigma$
(or $\epsilon_j: (-\infty,0] \times S^1 \to \dot \Sigma$ is the
strip-like coordinates at the puncture $r_j$. When $g(\dot \Sigma) > 0$, then the solution space
for this asymptotic boundary value problem has dimension $g(\dot \Sigma)$.
\end{rem}
We are now ready to give the definition of $\lambda$-energy. Denoting
$\varphi = \psi'$ for the function $\psi$ given in section \ref{subsec:canonical}, we introduce the following class of
test functions
\begin{defn}\label{defn:CC} We define
\begin{equation}
{\mathcal C} =\{\varphi: {\mathbb R} \to {\mathbb R}_{\geq 0} \mid \opname{supp} \varphi \, \text{is compact}, \, \int_{\mathbb R} \varphi = 1\}.
\end{equation}
\end{defn}
Later for the purpose of compactification of relevant moduli spaces
${\mathcal M}_{k,\ell}(\dot \Sigma, Q \times S^1;J;(\vec \gamma^+,\vec \gamma^-))$,
we need to establish a uniform upper bound for the energy of
$$
u \in {\mathcal M}_{k,\ell}(\dot \Sigma, Q \times S^1;J;(\vec \gamma^+,\vec \gamma^-)),
$$
which is an
important first step towards compactification of
${\mathcal M}_{k,\ell}(\dot \Sigma, Q \times S^1;J;(\vec \gamma^+,\vec \gamma^-))$.
\begin{defn}[$E_{{\mathcal C},\eta}$-energy] Let $\eta \in H^1(\dot \Sigma, {\mathbb Z})$ be given.
Let $w$ satisfy $w^*\lambda \circ j = f^*d\theta$ with $[u]_{S^1} = \eta$. Then we define
$$
E_{{\mathcal C},\widetilde f}(j,u) = \sup_{\varphi \in {\mathcal C}} \int_{\dot \Sigma} df \circ j \wedge d(\psi(\widetilde f))
= \sup_{\varphi \in {\mathcal C}} \int_{\dot \Sigma} d(\psi(\widetilde f)) \wedge w^*\lambda.
$$
\end{defn}
We note that
$$
d(\psi(\widetilde f)) \wedge w^*\lambda = \psi'(\widetilde f) d\widetilde f \wedge w^*\lambda
= \varphi(\widetilde f) w^*\lambda \circ j \wedge w^*\lambda \geq 0
$$
and hence we can rewrite $E_{{\mathcal C},\eta}(j,w)$ into
$$
E_{{\mathcal C},\widetilde f}(j,u) = \sup_{\varphi \in {\mathcal C}} \int_{\dot \Sigma} \varphi(\widetilde f) d\widetilde f \wedge w^*\lambda.
$$
\begin{prop}\label{prop:a-independent} Let $u = (w,f)$ satisfy
$w^*\lambda \circ j = f^*d\theta$. If $g$ is another function satisfying $f^*d\theta = g^*d\theta$,
then we have $E_{{\mathcal C},\widetilde f}(w) = E_{{\mathcal C},\widetilde g}(w)$ for any lifting $(\widetilde f,\widetilde g)$ whenever
$d\widetilde f = w^*\lambda\circ j = d\widetilde g$
on $\dot \Sigma$.
\end{prop}
\begin{proof} We first note that $g(z) = f(z) + c$ for some constant $c$ on each connected component of
$\dot \Sigma$.
Certainly $d\widetilde f$ or $w^*\lambda$ are independent of the addition of the constant $c$.
On the other hand, we have
$$
\varphi(\widetilde g) = \varphi(\widetilde f + c)
$$
and the function $a \mapsto \varphi(a + c)$ still lie in ${\mathcal C}$. Therefore after taking
the supremum over ${\mathcal C}$, we have derived
$$
E_{{\mathcal C},\widetilde f}(j,u) = E_{{\mathcal C},\widetilde g}(j,u).
$$
This finishes the proof.
\end{proof}
This proposition enables us to introduce the following
\begin{defn}[Vertical energy]\label{defn:vertical-energy} Let $\eta \in H^1(\dot \Sigma,{\mathbb Z})$ be given.
We denote the common value of $E_{{\mathcal C},\eta}(j,u)$ by $E^\perp_\eta(j,u)$,
and call it the \emph{vertical energy in charge class $\eta$}.
\end{defn}
The following then would be the definition of the total energy.
\begin{defn}[Total energy] Let $w:\dot \Sigma \to Q \times S^1$ be any smooth map
in class $[u]_{S^1} = \eta$.
We define the total energy of $u$ by
\begin{equation}\label{eq:total-energy}
E(j,u) = E^\pi(j,u) + E^\perp_\eta(j,u)
\end{equation}
\end{defn}
We now provide examples of finite energy $\lcs$ instanton \emph{with nonzero charge}.
\begin{exm} Consider the contact manifold $Q = S^3$ with the standard
contact structure (i.e. the $CR$-structure of $S^3 \subset {\mathbb C}^2$)
and take the standard contact form $\lambda$ on $S^3$
$$
\lambda = \frac12 \sum_{i=1}^2 (x_i dy_i - y_i dx_i).
$$
Then the Reeb foliation is the one given by Hopf circles. Let $C$ be any
one of them. Now consider the $\mathfrak{lcs}$-fication $M=S^1 \times S^3$ and the
Reeb torus $T: = S^1 \times C \subset M$. We fix a parameterization of $C$ by
$\gamma: [0,1]/\sim \to C$ and that of $T$ by
$$
[0,1]^2 \to T; \quad (s,t) \mapsto (s, \gamma(t)).
$$
Let $0 \neq Q \in {\mathbb Z}$ be any given integer and consider
the map
$
u: {\mathbb R} \times S^1 \to M
$
defined by
$$
u(\tau,t) = (t, \gamma(Q\tau + t)).
$$
It is easy to check that $u$
is an $\lcs$ instanton with its charge
$$
Q \in H^1({\mathbb R} \times S^1) \cong H^1(S^1) \cong {\mathbb Z}.
$$
The total energy of this $\lcs$ instanton is zero.
\end{exm}
\section{$\lcs$ instantons on the plane}
\label{sec:onC}
As in Hofer's bubbling-off analysis in pseudo-holomorphic curves on symplectization \cite{hofer}, it
turns out that study of contact instantons on the plane plays a crucial role in the bubbling-off
analysis of contact instantons too.
For this purpose, we start with a proposition which is an analog to
Theorem 31 \cite{hofer}. Our proof is a slight modification and some simplification
of Hofer's proof
of Theorem 31 \cite{hofer} in our generalized context.
\begin{prop}\label{prop:C^1}
Let $u: {\mathbb C} \to Q \times S^1$ be an $\lcs$ instanton. Regard $\infty$ as
a puncture of ${\mathbb C} = {\mathbb C} P^1\setminus \{\infty\}$. Suppose $|dw|_{C^0} < \infty$ and
\begin{equation}\label{eq:asymp-densitybound}
E^\pi(u)=0, \quad E^\perp(u) < \infty.
\end{equation}
Then $u$ is a constant map.
\end{prop}
\begin{proof} Let $\dot \Sigma \cong {\mathbb C} P^1 \setminus \{\infty\} \cong {\mathbb C}$. Then
$H^1(\dot \Sigma,{\mathbb Z}) = 0$ and hence the asymptotic charge $Q = 0$ in the cylindrical
coordinate $(\tau,t)$ near $\infty$.
Therefore the one-form $f^*d\theta$ on ${\mathbb C}$ is exact so that
$$
w^*\lambda \circ j = f^*d\theta = d\widetilde f.
$$
We have only to look at the $w$ component since constancy of $f$ is determined by the equation
$w^*\lambda \circ j= f^*d\theta$.
From the equality $\frac12 |d^\pi w|^2\, dA = d(w^*\lambda)$ and the hypothesis $E^\pi(w) = 0$,
we infer $|d^\pi w|^2 = 0 = d(w^*\lambda)$ in addition to $d(w^*\lambda \circ j) = 0$.
Therefore we derive that $d^\pi w = 0$. This implies
$$
dw = w^*\lambda\otimes R_\lambda(w)
$$
with $w^*\lambda$ a bounded harmonic one-form. The boundedness of $w^*\lambda$ follows from the hypothesis
$|dw|_{C^0} < \infty$. Since ${\mathbb C}$ is connected, the image of $w$ must be contained
in a single leaf of the Reeb foliation. We parameterize the leaf by $\gamma: {\mathbb R} \to Q$,
$\gamma = \gamma(t)$.
Then there is a smooth function $b = b(z)$ such that
$$
w(z) = \gamma(b(z)).
$$
Since $w^*\lambda$ is exact on ${\mathbb C}$, $w^*\lambda = db$ for some function $b$. Since we also have $d(w^*\lambda\circ j) = 0$,
$$
d(db \circ j) = 0
$$
i.e., $b: {\mathbb C} \to {\mathbb R}$ is a harmonic function and hence $b$ is the imaginary part of a holomorphic
function $f$, i.e., $f(z) = a(z) + ib(z)$. Since $b$ has bounded derivative, the gradient of $f$
is also bounded on ${\mathbb C}$. Therefore $f(z) = \alpha z + \beta$ for some constants $\alpha, \, \beta \in {\mathbb C}$.
Once this is achieved, the rest of the argument is exactly the same as Hofer's proof of Lemma 28 \cite{hofer}
via the usage of the $\lambda$-energy bound $E^\perp(w) < \infty$ and so omitted.
\end{proof}
We recall the following useful lemma from \cite{hofer-viterbo} whose proof we refer thereto.
\begin{lem}\label{lem:Hofer-lemma} Let $(X,d)$ be a complete metric space, $f: X \to {\mathbb R}$ be a
nonnegative continuous function, $x \in X$ and $\delta > 0$. Then there exists $y \in X$ and
a positive number $\epsilon \leq \delta $ such that
$$
d(x,y) < 2 \delta, \, \max_{B_y(\epsilon)} f \leq 2 f(y), \, \epsilon\, f(y) \geq \delta f(x).
$$
\end{lem}
Using the above proposition, we prove the following fundamental result.
\begin{thm}\label{thm:C1bound} Let $u: {\mathbb C} \to Q \times S^1$ be an $\lcs$ instanton.
Suppose
\begin{equation}\label{eq:Epi-bound}
E(u) = E^\pi(u) + E^\perp(u) < \infty.
\end{equation}
Then $|du|_{C^0} < \infty$.
\end{thm}
\begin{proof} Again it is enough to establish $|dw|_{C^0} < \infty$.
Suppose to the contrary that $|dw|_{C^0} = \infty$ and let $z_\alpha$ be a blowing-up
sequence. We denote $R_\alpha = |dw(z_\alpha)| \to \infty$. Then by applying Lemma \ref{lem:Hofer-lemma},
we can choose another such sequence $z_\alpha'$ and $\epsilon_\alpha \to 0$ such that
\begin{equation}\label{eq:blowingup-sequence}
|dw(z_\alpha')| \to \infty, \quad \max_{z \in D_{\epsilon_\alpha}(z_\alpha')}|dw(z)| \leq 2 R_\alpha,
\quad \epsilon_\alpha R_\alpha \to 0.
\end{equation}
We consider the re-scaling maps $\widetilde w_\alpha: D^2_{\epsilon_\alpha R_\alpha}(0) \to Q$
defined by
$$
w_\alpha(z) = w \left(z_\alpha' + \frac{z}{R_\alpha}\right).
$$
Then we have
$$
|d w_\alpha|_{C^0; \epsilon_\alpha R_\alpha} \leq 2, \quad |d w_\alpha(0)|=1.
$$
Applying Ascoli-Arzela theorem, there exists a continuous map $w_\infty: {\mathbb C} \to Q$ such that
$ w_\alpha \to w_\infty$ uniformly on compact subsets. Then by the a priori $W^{k,2}$-estimates,
Theorem \ref{thm:Wk2}, it follows that the convergence is in the $C^\infty$-sense on every compact subset,
and $w_\infty$ is smooth. Furthermore
$w_\infty$ satisfies ${\overline \partial}^\pi w_\infty = 0 = d(w_\infty^*\lambda \circ j) = 0$,
$$
E^\pi(w_\infty), \, E^\lambda(w_\infty) \leq E(w) < \infty
$$
and
$$
|d w_\infty|_{C^0; {\mathbb C}} \leq 2, \quad |dw_\infty(0)|=1.
$$
On the other hand, by the finite $\pi$-energy hypothesis and density identity $\frac12 |d^\pi w|^2 \, dA = d(w^*\lambda)$,
we derive
\begin{eqnarray*}
0 & = & \lim_{\alpha \to \infty} \int_{D_{\epsilon_\alpha}(z_\alpha')} d(w^*\lambda) =
\lim_{\alpha \to \infty} \int_{D_{\epsilon_\alpha R_\alpha}(z_\alpha')} d( w_\alpha^*\lambda)\\
&= & \lim_{\alpha \to \infty} \int_{D_{\epsilon_\alpha R_\alpha}(z_\alpha')}\frac12 |d^\pi \widetilde w_\alpha|^2
= \int_{\mathbb C} \frac12 |d^\pi w_\infty|^2.
\end{eqnarray*}
Therefore we derive
$$
E^\pi(w_\infty) = 0.
$$
Then Proposition \ref{prop:C^1} implies $w_\infty$ is a constant map which contradicts
$|dw_\infty(0)| = 1$. This finishes the proof.
\end{proof}
An immediate corollary of this theorem and Proposition \ref{prop:C^1} is the following
\begin{cor}\label{cor:pi-positive} For any non-constant $\lcs$ instanton $u: {\mathbb C} \to Q \times S^1$
with energy bound $E(u) < \infty$, we obtain
$$
E^\pi(w) = \int z^*\lambda > 0
$$
for $z = \lim_{R \to \infty} w(R e^{2\pi it})$. In particular $E^\pi(w) \geq T_\lambda > 0$.
\end{cor}
Combining Theorem \ref{thm:subsequence}, Theorem \ref{thm:C1bound} and Proposition \ref{prop:S1class},
we immediately derive
\begin{cor} Let $u = (w,f)$ be a non-constant $\lcs$ instanton on ${\mathbb C}$ with
\begin{equation}\label{eq:C1-densitybound}
E(u) < \infty.
\end{equation}
Then there exists a sequence $R_j \to \infty$ and a Reeb orbit $\gamma$ such that
$z_{R_j} \to \gamma(T(\cdot))$ with $T \neq 0$ and
$$
T = E^\pi(w), \quad Q = \int_z w^*\lambda \circ j = 0.
$$
\end{cor}
\begin{proof} Since $[\overline{{\mathbb C}},S^1] = 0$, it follows $Q = 0$.
If $T = 0$, the above theorem shows that there exists a sequence
$\tau_i \to \infty$ such that $w(\tau_i,\cdot)$ converges to a constant in the $C^\infty$
topology and so
$$
\int_{\{\tau = \tau_i\}} w^*\lambda \to 0
$$
as $i \to \infty$. By Stokes' formula, we derive
$$
\int_{D_{e^{\tau_i}}(0)} w^*d\lambda = \int_{\tau = \tau_i} w^*\lambda \to 0.
$$
On the other hand, we have
$$
E^\pi(w) = \lim_{i \to \infty} \int_{D_{e^{\tau_i}}(0)} \frac12 |d^\pi w|^2
= \lim_{i \to \infty} \int_{D_{e^{\tau_i}}} w^*d\lambda = 0.
$$
This contradicts Corollary \ref{cor:pi-positive}, which finishes the proof.
\end{proof}
The following is the analog to Proposition 30 \cite{hofer}.
\begin{cor}\label{cor:C^1oncylinder} Let $u$ be an $\lcs$ instanton on
${\mathbb R} \times S^1$ in class $\eta = [u]_{S^1}$ with $E(u) < \infty$.
Then $\|du\|_{C^0} < \infty$.
\end{cor}
\begin{proof} By definition, we have a harmonic one-form $\beta_\eta$ and
a function $\widetilde f: {\mathbb R} \times S^1 \to {\mathbb R}$ satisfying
$$
f^*d\theta = \beta_\eta + d\widetilde f.
$$
We note that $H^1(\dot \Sigma,{\mathbb Z}) \cong {\mathbb Z}$ and
$\beta_\eta(\tau,t) = a\, d\tau + b\, dt$ for constants $a, \, b$ and
$d\widetilde f \to 0$ as $\tau \to \pm \infty$. In particular $|\beta_\eta(\tau,t)|_{C^0} = \sqrt{a^2 + b^2}$.
In particular, the pair $\widetilde u= (\widetilde f, w): \dot \Sigma \to Q \times {\mathbb R}$ satisfies
$$
{\overline \partial}^\pi w = 0, \quad f^*d\theta - d\widetilde f = \beta_\eta.
$$
In other words, the pair $(\widetilde f, w)$ satisfies the following perturbed
Cauchy-Riemann equation ${\overline \partial}_J \widetilde u = \beta_\eta$ for a given harmonic one-form
on ${\mathbb R} \times S^1$ which is independent of $\widetilde u$, an inhomogeneous
${\overline \partial}_J$-equation (with constant one-form).
As in Hofer's proof of Proposition 30 \cite{hofer}, using the Hofer's energy for $\widetilde u$,
we can apply the same kind of bubbling-off argument as that of Theorem \ref{thm:C1bound}
and derive the same conclusion.
\end{proof}
We now derive the following from Proposition \ref{prop:S1class}
\begin{cor}\label{cor:periodoncylinder} For any $\lcs$ instanton on
${\mathbb R} \times S^1$ with $E(u) < \infty$, the charge class
$[u]_{S^1}$ is well-defined.
\end{cor}
\section{Bubbling-off analysis and the period-gap theorem }
\label{sec:e-regularity}
We recall some basic definitions and results from
from \cite{oh-wang:CR-map1}, \cite{oh:contacton} on contact instantons
which are also relevant to the current study of lcs-instantons.
In \cite{oh-wang:CR-map1}, the local a priori $W^{k,2}$-regularity estimates are established with respect to
the bounds of $\|dw\|_{L^4}$ and $\|dw\|_{L^2}$. Therefore in addition to the local a priori $W^{k,2}$-regularity estimates,
one should establish another crucial ingredient, the $\epsilon$-regularity result, for the
study of moduli problem as usual in any of conformally invariant geometric non-linear PDE's.
This will in turn establish the $W^{1,p}$-bound
with $p > 2$ (say $p = 4$). (See \cite{sacks-uhlen}.)
In the current setting of $\lcs$ instanton map, it is not obvious what would be
the precise form of relevant $\epsilon$-regularity statement is.
We formulate this $\epsilon$-regularity theorem in the setting of contact instantons.
\begin{defn} Let $\lambda$ be a contact form of contact manifold $(Q,\xi)$.
Denote by $\frak R eeb(Q,\lambda)$ the set of closed Reeb orbits.
We define $\operatorname{Spec}(Q,\lambda)$ to be the set
$$
\operatorname{Spec}(Q,\lambda) = \left\{\int_\gamma \lambda \mid \lambda \in \frak Reeb(Q,\lambda)\right\}
$$
and call it the \emph{action spectrum} of $(Q,\lambda)$. We denote
$$
T_\lambda: = \inf\left\{\int_\gamma \lambda \mid \lambda \in \frak Reeb(Q,\lambda)\right\}.
$$
\end{defn}
We set $T_\lambda = \infty$ if there is no closed Reeb orbit.
The following is a standard lemma in contact geometry
\begin{lem} Let $(Q,\xi)$ be a closed contact manifold. Then
$\operatorname{Spec}(Q,\lambda)$ is either empty or a countable nowhere dense subset of ${\mathbb R}_+$
and $T_\lambda > 0$. Moreover the subset
$$
\operatorname{Spec}^{K}(Q,\lambda) = \operatorname{Spec}(Q,\lambda) \cap (0,K]
$$
is finite for each $K> 0$.
\end{lem}
The constant $T_\lambda$ will enter in a crucial way in the following
period gap theorem. The proof of this theorem will closely follow the argument used in
\cite[Section 8.4]{oh:book} and \cite{oh:imrn} by adapting it to
the proof of the current gap theorem with the replacement of
the standard harmonic energy by the $\pi$-harmonic energy.
\begin{thm}[Theorem 7.4 \cite{oh:contacton}]\label{thm:e-regularity}
Denote by $D^2(1)$ the closed unit disc and let $u = (w,f)$ be an $\text{\rm lcs}$ instanton
defined on $D^2(1)$ so that $w:D^2(1)\to Q$ satisfies
$$
{\overline \partial}^\pi w = 0, \, w^*\lambda\circ j = f^*d\theta.
$$
Assume the vertical energy bound $E^\perp (w) < K_0$ defined in Definition \ref{defn:vertical-energy}.
Then for any given $0 <\epsilon < T_\lambda$ and $w$ satisfying
$E^\pi(w) < T_\lambda - \epsilon$, and for a smaller disc $D' \subset \overline D' \subset D$,
there exists some $K_1 = K_1(D', \epsilon,K_0) > 0$
\begin{equation}\label{eq:dwC0}
\|dw\|_{C^0;D'} \leq K_1
\end{equation}
where $K_1$ depends only on $(Q,\lambda,J)$, $\epsilon$, $D' \subset D$.
\end{thm}
\begin{proof}
Suppose to the contrary that
there exists a disc $D' \subset D$ with $\overline{D'} \subset \overset{\circ}D$ and a sequence $\{ w_\alpha \}$
such that
$$
{\overline \partial}^\pi w_\alpha = 0, \quad w_\alpha \circ j = f_\alpha^*d\theta
$$
and
\begin{equation}\label{eq:2to0ptoinfty}
E^\pi_{\lambda,J;D}(w_\alpha) < T_\lambda - \epsilon,, E^\perp(w_\alpha) < K_0,
\quad \norm{dw_\alpha}{C^0,D'} \to \infty
\end{equation}
as $\alpha \to \infty$. Let $x_\alpha \in D'$ be such that $|dw_\alpha(x_\alpha)| \to \infty$.
By choosing a subsequence, we may assume that $x_\alpha \to x_\infty\in \overline D' \subset \overset{\circ} D$.
We take a coordinate chart centered at $x_\infty$ on $D_{x_\infty}(\delta) \subset \overset{\circ} D$
and identify $D_{x_\infty}(\delta)$ with the disc $D^2(\delta) \subset {\mathbb C}$ and $x_\infty$ with $0 \in {\mathbb C}$.
This can be done by choosing $\delta > 0$ sufficiently small since we assume $\overline D' \subset \overset{\circ} D$.
Then $x_\alpha \to 0$. We choose $\delta_\alpha \to 0$ so that $\delta_\alpha |dw_\alpha(x_\alpha)| \to \infty$.
Using Lemma \ref{lem:Hofer-lemma} as before, we adjust the sequence $x_\alpha$ to $y_\alpha$ so that
$y_\alpha \to 0$ and
\begin{equation}\label{eq:adjustedy}
\max_{x \in B_{y_\alpha}(\epsilon_\alpha)}|dw_\alpha| \leq 2|dw_\alpha(y_\alpha)|, \quad
\delta_\alpha |dw_\alpha(y_\alpha)| \to \infty.
\end{equation}
We denote $R_\alpha = |dw_\alpha(y_\alpha)|$ and consider the re-scaled map
$$
v_\alpha(z) = w_\alpha\left(y_\alpha + \frac{z}{R_\alpha}\right).
$$
Then the domain of $w_\alpha$ at least includes $z \in {\mathbb C}$ such that
$$
y_\alpha + \frac{z}{R_\alpha} \in D^2(\delta),
$$
i.e., those $z$'s satisfying
$$
\left|y_\alpha + \frac{z}{R_\alpha} \right| \leq \delta.
$$
In particular, if $|z| \leq R_\alpha (\delta - |y_\alpha|)$, $v_\alpha(z)$ is
defined. Since $y_\alpha \to 0$ and $\delta_\alpha \to 0$ as $\alpha \to \infty$,
$R_\alpha (\delta - |y_\alpha|)> R_\alpha \epsilon_\alpha$
eventually, $v_\alpha$ is defined on $D^2(\epsilon_\alpha R_\alpha)$ for all sufficiently
large $\alpha$'s.
Since $\delta_\alpha R_\alpha \to \infty$ by \eqref{eq:adjustedy}, for any given $R>0$,
$D^2(\delta_\alpha R_\alpha)$ of $v_\alpha (z)$ eventually contains $B_{R+1}(0)$.
Furthermore, we may assume,
$$
B_{R+1}(0) \subset \left\{ z \in \mathbb{C} \mid \eta_\alpha z + y_\alpha \in \overline{D}'\right\}
$$
Therefore, the maps
$$
v_\alpha : B_{R+1} (0) \subset \mathbb{C} \to M
$$
satisfy the following properties:
\begin{enumerate}
\item[(i)] $E^\pi(v_\alpha) < T_\lambda -\epsilon$, \, ${\overline \partial}^\pi v_\alpha = 0$, \,
$E^\perp(v_\alpha) \leq K_0$,
(from the scale invariance)
\item[(ii)] $|dv_\alpha(0)|=1 $ by definition of $v_\alpha$ and $R_\alpha$,
\item[(iii)]$\norm{dv_\alpha}{C^0,B_1(x)} \leq 2$ for all $x \in B_R(0) \subset D^2(\epsilon_\alpha R_\alpha)$,
\item[(iv)] ${\overline \partial}^\pi v_\alpha =0$ and $d(v_\alpha^*\lambda \circ j) = 0$.
\end{enumerate}
For each fixed $R$, we take the limit of $v_\alpha|_{B_R}$, which we denote by $w_R$.
Applying (iii) and then the local $W^{k,2}$ estimates, Theorem \ref{thm:Wk2}, we obtain
$$
\norm{dv_\alpha}{k,2;B_{\frac9{10}}(x)} \leq C
$$
for some $C=C(R)$. By the Sobolev embedding theorem, we have a
subsequence that converges in $C^2$ in each $B_{\frac{8}{10}}(x), x \in \overline D'$. Then
we derive that the convergence is in $C^2$-topology on $B_{\frac{8}{10}}(x)$ for all $x \in \overline D'$ and
in turn on $B_R(0)$.
Therefore the limit $w_R: B_R(0) \to M$ of $v_\alpha|_{B_R(0)}$ satisfies
\begin{itemize}
\item[(1)] $E^\pi(w_R) \leq T_\lambda -\epsilon$, ${\overline \partial}^\pi w_R = 0$,
$d(w_R^*\lambda \circ j) = 0$ and $E^\perp(v_\alpha) \leq K_0$,
\item[(2)] $E^\pi(w_R) \leq \limsup_\alpha E^\pi_{(\lambda,J;B_R(0))}(v_\alpha) \leq T_\lambda -\epsilon$,
\item[(3)] Since $v_\alpha \to w_R$ converges in $C^2$, we have
$$
\norm{dw_R}{p,B_1(0)}^2 = \lim_{\alpha \to \infty} \norm{dv_\alpha}{p,B_1(0)}^2 \geq \frac{1}{2}.
$$
\end{itemize}
By letting $R \to \infty$ and taking a diagonal subsequence argument, we have
derived a nonconstant contact instanton map $w_\infty: {\mathbb C} \to Q$. Therefore by definition of $T_\lambda$,
we must have $E^\pi(w_\infty) \geq T_\lambda$.
On the other hand, the bound
$E^\pi(w_R) \leq T_\lambda -\epsilon$ for all $R$ and again by Fatou's lemma implies
$$
E^\pi(w_\infty) \leq T_\lambda -\epsilon
$$
which gives rise to a contradiction.
This finishes the proof of \eqref{eq:dwC0}.
\end{proof}
\section{Asymptotic behaviors of finite energy $\lcs$ instantons}
\label{sec:asymptotic}
In this section, we study the asymptotic behavior of $\lcs$ instantons $u=(w,f)$
on the Riemann surface $(\dot\Sigma, j)$ associated with a metric $h$ with \emph{cylindrical ends}.
To be precise, we assume there exists a compact set $K_\Sigma\subset \dot\Sigma$,
such that $\dot\Sigma-\Int(K_\Sigma)$ is a disjoint union of punctured disks
each of which is isometric to the half cylinder $[0, \infty)\times S^1$ or $(-\infty, 0]\times S^1$, where
the choice of positive or negative cylinders depends on the choice of analytic coordinates
at the punctures.
We denote by $\{p^+_i\}_{i=1, \cdots, l^+}$ the positive punctures, and by $\{p^-_j\}_{j=1, \cdots, l^-}$ the negative punctures.
Here $l=l^++l^-$. Denote by $\phi^{\pm}_i$ such isometries from cylinders to disks.
We start with the following lemma
\begin{lem}\label{lem:|dw|<infty} Let $\eta \in H^1(\dot \Sigma, {\mathbb Z})$ be given.
Suppose $[u]_{S^1} = \eta$ and $E^\pi(w) \leq E(u) = E_\eta (u) < \infty$. Then
$$
\|du\|_{C^0;\dot \Sigma} < \infty.
$$
\end{lem}
\begin{proof}
By the finiteness $E^\pi(w)\leq E(u) < \infty$, we can choose sufficiently small $\delta > 0$ such that
$$
E^\pi(w|_{\Sigma\setminus \Sigma(\delta)})< \frac{1}{2}T_\lambda, \, E^\perp(u) < \epsilon(\delta)
$$
Denote
$$
\Sigma(\delta) = \dot \Sigma \setminus \cup_{\ell =1}^k D_{r_\ell}(\delta).
$$
Then we apply the $\epsilon$-regularity theorem
Theorem \ref{thm:e-regularity}, to $w$ on $\cup_{\ell =1}^k D_{r_\ell}(\delta) = \dot \Sigma \setminus \Sigma(\delta)$
to derive
$$
\|du\|_{C^0;\cup_{\ell =1}^k D_{r_\ell}} < \infty.
$$
Obviously $\|du\|_{C^0;\Sigma(\delta)} < \infty$ and hence the proof.
\end{proof}
Because the behavior of the component $f$ largely determined by the component $w$,
we will focus on the study of the latter's asymptotic behavior.
We now state our assumptions for the study of the behavior of punctures.
\begin{defn}Let $\dot\Sigma$ be a punctured Riemann surface with punctures
$\{p^+_i\}_{i=1, \cdots, l^+}\cup \{p^-_j\}_{j=1, \cdots, l^-}$ equipped
with a metric $h$ with \emph{cylindrical ends} outside a compact subset $K_\Sigma$.
Let
$w: \dot \Sigma \to M$ be any smooth map.
\end{defn}
Throughout this section, we work locally near one puncture, i.e., on
$D^\delta(p) \setminus \{p\}$. By taking the associated conformal coordinates $\phi^+ = (\tau,t)
:D^\delta(p) \setminus \{p\} \to [0, \infty)\times S^1 \to $ such that $h = d\tau^2 + dt^2$,
we need only look at a map $w$ defined on the half cylinder $[0, \infty)\times S^1\to M$
without loss of generality.
The following is proved in \cite{oh:contacton}.
\begin{lem}[Lemma 8.2 \cite{oh:contacton}]\label{lem:massless}
Let $\dot \Sigma$ be any punctured Riemann surface.
Suppose $w: \dot \Sigma \to Q$ is a massless contact instanton
on $\dot \Sigma$. Then $w^*\lambda $ is a harmonic 1-form and
the image of $w$ lies in a single leaf of the Reeb foliation.
\end{lem}
The following result is the lcs-counterpart of \cite[Proposition 8.3]{oh:contacton}
whose proof can be repeated verbatim and so is omitted.
\begin{prop}[Compare with Proposition 8.3 \cite{oh:contacton}]\label{prop:pole-structure}
Let $u = (w,f)$ be an $\lcs$ instanton on $\dot \Sigma$ with punctures $p \in \{p_1, \cdots, p_k\}$.
Consider the complex-valued one-form on $\dot \Sigma$ defined by
\begin{equation}\label{eq:chi}
\chi: = f^*d\theta + \sqrt{-1} w^*\lambda.
\end{equation}
Let $p \in \{p_1, \cdots, p_k\}$ and let $z$ be an analytic coordinate at $p$. Suppose
$$
E(u) < \infty.
$$
Then for any given sequence $\delta_j \to 0$ there exists a subsequence, still denoted by $\delta_j$, and a conformal diffeomorphism
$\varphi_j: [-\frac{1}{\delta_j}, \infty) \times S^1 \to D_{\delta_j}(p)\setminus \{p\}$ such that
the one form $\varphi_j^*\chi$ converges to a bounded holomorphic one-form
$\chi_\infty$ on $(-\infty, \infty) \times S^1$.
\end{prop}
We would like to emphasize that at the moment, the limiting holomorphic one-form $\chi_\infty$
may depend on the choice of subsequence.
Finally we would like to further analyze the asymptotic behavior of the instanton $u = (w,f)$.
We will show that if both $T$ and $Q$ vanish,
$w_\infty$ is a constant map and so the puncture is removable.
For this purpose, we consider the complex valued one-form
\begin{equation}\label{eq:specialchi}
\chi = f^*d\theta + \sqrt{-1} w^*\lambda = w^*\lambda \circ j + \sqrt{-1} w^*\lambda
\end{equation}
where the latter equality follows from $w^*\lambda \circ j = f^*d\theta$ as a
part of $\lcs$ instanton equation. We note that for $\lcs$ instanton $u = (w,f)$ $\chi$
is expressed purely in terms of $w$.
\begin{defn}\label{defn:charge} Let $(\Sigma,j)$ be a closed
Riemann surface with a finite number of marked points $\{p_1, \cdots, p_k\}$. Denote by $\dot \Sigma$ the
associated punctured Riemann surface with cylindrical metric near the punctures, and let $\overline \Sigma$
be the real blow-up of $\Sigma$ along the punctures.
Let $w$ be a contact instanton map. Let $p \in \{p_1, \cdots, p_k\}$. We call the integrals
\begin{eqnarray}
Q(p) &: =& \int_{\partial_{\infty;p}\Sigma} w^*\lambda \circ j\\
T(p) &: =& \int_{\partial_{\infty;p}\Sigma} w^*\lambda
\end{eqnarray}
the \emph{contact instanton charge} and \emph{contact instanton action} at $p$ respectively.
Here $\partial_{\infty;p}\Sigma$ is the
boundary component corresponding to $p$ of the real blow-up $\overline \Sigma$ of $\dot \Sigma$.
Then we call the form $\chi = w^*\lambda \circ j + \sqrt{-1} w^*\lambda$ the \emph{
contact Hick's field} of $w$ and
$$
Q(p) + \sqrt{-1} T(p)
$$
the \emph{asymptotic charge} of the instanton $w$ at the puncture $p$.
\end{defn}
Note that by the closedness $d(w^*\lambda \circ j) = 0$, the charge $Q(p)$ is the same as
the initial integral
$$
\int_{\{\tau = 0\}} w^*\lambda \circ j
$$
which does not depend on the choice of subsequence but is determined by
the initial condition at $\tau = 0$ and homology class of the loop
$w|_{\tau = 0} \in H_1(\dot \Sigma) = H_1(\Sigma \setminus \{p_1, \cdots, p_k\}$.
Furthermore if $u= (w,f)$ is an $\lcs$-instanton, then $Q(p) = 0$.
Now we consider the asymptotic Hick's field $\chi_\infty$ associated to the asymptotic
$\lcs$ instanton $(w_\infty,\chi_\infty)$ obtained in the proof of Proposition \ref{prop:pole-structure}.
Because $w_\infty$ is massless and has bounded derivatives on ${\mathbb R} \times S^1$,
$\chi_\infty$ becomes a bounded holomorphic one-form. Therefore we derive
\begin{equation}\label{eq:chiinfty}
\chi_\infty = c\, (d\tau + i \, dt)
\end{equation}
for some complex number $c \in {\mathbb C}$. We denote $c = b + i a$ for $a, \, b \in {\mathbb R}$.
Equivalently, we obtain
$$
w_\infty^*\lambda = a\, d\tau + b\, dt
$$
where $a = - Q(p), \, b = T(p)$ .
\begin{thm} \label{thm:c=0}
Suppose $Q(p) = 0 =T(p)$. Then $u$ is smooth across $p$ and so the
puncture $p$ is removable.
\end{thm}
\begin{proof} When $c = 0$, we obtain $dw_\infty = d^\pi w_\infty
+ \lambda^*w_\infty\, R_\lambda = 0$ and so
$w_\infty$ must be a constant map $q \in Q$. By the convergence $w_j \to w_\infty$ in the $C^\infty$ topology
on every compact subset, it follows that $w_j(0,\cdot) \to q$ or equivalently
$$
d(w|_{r = \delta_j}, q) \to 0
$$
and $w_j^*\lambda \to 0$ converges uniformly. Using the compactness of $Q$ and applying Ascoli-Arzela theorem,
we can choose a sequence $z_i \to p$ in $D_\delta(p) \setminus \{p\}$ such that
$w(z_i) \to p$ and $w^*\lambda|_{r = \delta_j} \to 0$ uniformly. Then this
continuity of $w^*\lambda$ at $p$ in turn implies $dw$ is continuous at $p$
by the expression
$$
dw = d^\pi w + w^*\lambda\otimes R_\lambda(w)
$$
In particular $|dw|_{D_\delta(r)}$ is bounded and so lies in
$L^2 \cap L^4$ on $D_\delta(r)$. Then the local $W^{k,2}$ a priori estimate implies
that $w$ is indeed smooth across $p$.
Recalling $f^*d\theta = w^*\lambda \circ j$, smoothness of $f$ across $p$ immediately follows.
This finishes the proof.
\end{proof}
\medskip
If $T \neq 0$, we obtain
$$
\lim_{k \to \infty}\int_{S^1} (w|_{r = \delta_k})^*\lambda = T \neq 0.
$$
\begin{prop}\label{prop:bnot0} Suppose $T \neq 0$. Then there exists a closed Reeb orbit $\gamma$ of
period $T = b$ such that there exists a sequence $\tau_k \to \infty$
for which $w(\tau_k, \cdot) \to \gamma(T(\cdot))$ in the $C^\infty$ topology.
\end{prop}
\begin{proof}
When $T \neq 0$, we obtain
$$
dw_\infty = (T \, dt)\otimes R_\lambda.
$$
Again by the connectedness of $[0,\infty) \times S^1$, it follows that
the image of $w_\infty$ must be contained in a single leaf of the Reeb foliation
and so
$$
w_\infty(\tau,t) = \gamma(T\, t)
$$
for a parameterized Reeb orbit $\gamma$ such that $\dot \gamma = R_\lambda(\gamma)$.
Such a parameterization is unique modulo a time-shift.
Since the map $w$ is one-periodic for any $\tau$, we derive
$$
\gamma(T) = \gamma(0).
$$
This implies first that $\gamma$ is a periodic Reeb orbit of period $T$.
\end{proof}
Now we are ready to define the notion of positive and negative
punctures of contact instanton map $w$. Assume $\lambda$ is nondegenerate.
Let $p$ be one of the punctures of $\dot \Sigma$.
In the disc $D_\delta(p) \subset {\mathbb C}$ with the standard orientation, we consider the function
$$
\int_{\partial D_\delta(p)} w^*\lambda
$$
as a function of $\delta > 0$. This function is either decreasing or increasing
by the Stokes' formula, the positivity $w^*d\lambda \geq 0$ and the finiteness of
$\pi$-energy
$$
\frac{1}{2} \int_{\dot \Sigma} |d^\pi w|^2 \, dA = \int_{\dot \Sigma} w^*d\lambda < \infty.
$$
\begin{defn}[Classification of punctures]\label{defn:plus-minus-punctures}
Let $\dot \Sigma$ be a puncture Riemann
surface with punctures $\{p_1, \cdots, p_k\}$ and let
$w: \dot \Sigma \to Q$ be a contact instanton map.
\begin{enumerate}
\item We call a puncture $p$ \emph{removable} if $T(p) = Q(p) = 0$, and \emph{non-removable} otherwise.
\item
We say a non-removable puncture \emph{positive} (resp. \emph{negative}) puncture if the function
$$
\int_{\partial D_\delta(p)} w^*\lambda
$$
is increasing (resp. decreasing) as $\delta \to 0$.
\end{enumerate}
\end{defn}
\begin{rem}
The appearance of `adiabatic puncture' (i.e. a puncture with $T=0$ and $Q \neq 0$
is an obstacle towards the compactification of contact instantons in \cite{oh-wang:CR-map1,oh-wang:CR-map2}
\emph{ when the form $w^*\lambda \circ j$ is not exact}. It is quite remarkable
that this obstacle is removed when the contact instanton $w$ is coupled with
a map $f: Q \to S^1$ to form an $\lcs$ instanton $u=(w,f)$.
\end{rem}
\section{Definition of the moduli space of $\lcs$-instantons}
In this section, we define the moduli space of $\lcs$-instantons and
construct its compactification. It turns out that compactification of
$\lcs$-instantons is much simpler since we will not need the well-known SFT-type
compactification that appears in the study of moduli space of pseudoholomorphic
curves in the case of symplectization.
Let $(\dot \Sigma, j)$ be a punctured Riemann surface and let
$$
p_1, \cdots, p_{s^+}, q_1, \cdots, q_{s^-}
$$
be the positive and negative punctures. For each $p_i$ (resp. $q_j$), we associate the isothermal
coordinates $(\tau,t) \in [0,\infty) \times S^1$ (resp. $(\tau,t) \in (-\infty,0] \times S^1$)
on the punctured disc $D_{e^{-2\pi R_0}}(p_i) \setminus \{p_i\}$
(resp. on $D_{e^{-2\pi R_0}}(q_i) \setminus \{q_i\}$) for some sufficiently large $R_0 > 0$.
For each $\eta \in [\dot \Sigma, S^1]$, we define the associated energy
$$
E_\eta(u) = E^\pi(u) + E^\perp_\eta(u)
$$
for each smooth map $u = (w,f)$ in class $\eta$, i.e., $[u]_{S^1} = \eta$.
\begin{defn} For each fixed $\eta$, we define
$$
\widetilde{{\mathcal M}}_{k,\ell}^\eta(\dot \Sigma, M;J), \quad k, \, \ell \geq 0, \, k+\ell \geq 1
$$
to be the moduli space of $\lcs$-instantons $u = (w,f)$ with $E_\eta(u) < \infty$.
\end{defn}
Then we have a decomposition
$$
\widetilde{{\mathcal M}}_{k,\ell}^\eta(\dot \Sigma, M;J)
= \bigcup_{\vec \gamma^+,\vec \gamma^-} \widetilde{{\mathcal M}}_{k,\ell}^\eta
\left(\dot \Sigma, Q;J;(\vec \gamma^+,\vec \gamma^-)\right)
$$
by Theorem \ref{thm:subsequence} where
\begin{eqnarray*}
\widetilde{{\mathcal M}}_{k,\ell}^\eta(\dot \Sigma, Q;J;(\vec \gamma^+,\vec \gamma^-))
& = &\{u = (w,f) \mid u \, \text{is an $\lcs$ instanton with } \\
&{}& \quad E_\eta(u) < \infty, \, w(-\infty_j) = \gamma^-_j, \, w(\infty_i) = \gamma_i \}.
\end{eqnarray*}
Here we have
the collections of Reeb orbits $\gamma^+_i$ and $\gamma^-_j$
and of points $\theta^+_i$, $\theta^-_j$ for $i =1, \cdots, s^+$
and for $j = 1, \cdots, s^-$ respectively such that
\begin{equation}\label{eq:limatinfty}
\lim_{\tau \to \infty}w((\tau,t)_i) = \gamma^+_i(T_i(t+t_i)), \quad
\lim_{\tau \to - \infty}w((\tau,t)_j) = \gamma^-_j(T_j(t-t_j))
\end{equation}
for some $t_i, \, t_j \in S^1$, where
$$
T_i = \int_{S^1} (\gamma^+_i)^*\lambda, \, T_j = \int_{S^1} (\gamma^-_j)^*\lambda.
$$
Here $t_i,\, t_j$ depends on the given analytic coordinate and the parameterization of
the Reeb orbits.
Due to the $S^1$-equivariance of the equation \eqref{eq:lcs-instanton}
under the $S^1$ action of rotations on $S^1$, this action induces a free action on
$\widetilde{{\mathcal M}}_{k,\ell}^\eta(\dot \Sigma, M;J)$. Then we denote
\begin{equation}\label{eq:CMkell}
{\mathcal M}_{k,\ell}^\eta(\dot \Sigma, M;J) = \widetilde{{\mathcal M}}_{k,\ell}(\dot \Sigma, M;J)/S^1.
\end{equation}
We also have the decomposition
$$
\widetilde{{\mathcal M}}_{k,\ell}^\eta(\dot \Sigma, M;J) = \bigcup_{\vec \gamma^\pm}
\widetilde{{\mathcal M}}_{k,\ell}^\eta(\dot \Sigma, Q;J;(\vec \gamma^+,\vec \gamma^-)).
$$
Here we denote
$$
\vec \gamma^+ = (\gamma^+_i), \quad \vec \gamma^- = (\gamma^-_j).
$$
The above mentioned $S^1$-action acts on each
$\widetilde{{\mathcal M}}_{k,\ell}(\dot \Sigma, Q;J;(\vec \gamma^+,\vec \gamma^-))$
by image rotation of the component $f$, and hence
$$
{\mathcal M}_{k,\ell}^\eta(\dot \Sigma, M;J) = \bigcup_{\vec \gamma^\pm}
{\mathcal M}_{k,\ell}^\eta(\dot \Sigma, Q;J;(\vec \gamma^+,\vec \gamma^-)).
$$
For each element $(w,f)$ of $\widetilde{{\mathcal M}}_{k,\ell}^\eta(\dot \Sigma, Q;J;(\vec \gamma^+,\vec \gamma^-))$,
we have
points $(\vec \theta^+, \vec \theta^-) \in (S^1)^k \times (S^1)^\ell$ such that
$$
\lim_{\tau \to \infty}f((\tau,\cdot)_i )= \theta^+_i, \quad \lim_{\tau \to \infty}f((\tau,\cdot)_j )= \theta^-_j.
$$
We now introduce a uniform energy bound for $u$ with given asymptotic condition at
its punctures. To describe this energy estimate, we
consider the associated function $\widetilde f: \dot \Sigma \to {\mathbb R}$
determined by
\begin{equation}\label{eq:tildef}
f^*d\theta - \beta_\eta = d\widetilde f
\end{equation}
for given $u = (w,f) \in {\mathcal M}_{k,\ell}^\eta(\dot \Sigma, Q;J;(\vec \gamma^+,\vec \gamma^-))$.
The following proposition is the analog to \cite[Lemma 5.15]{behwz} and
\cite[Proposition 9.2]{oh:contacton} whose proof is also similar.
\begin{prop}\label{prop:proper-energy} Let $\eta \in [\dot \Sigma,S^1]$ and
$u = (w,f) \in {\mathcal M}_{k,\ell}^\eta(\dot \Sigma, Q;J;(\vec \gamma^+,\vec \gamma^-))$.
Suppose that $E^\pi(w) < \infty$ and the function $f:\dot \Sigma \to {\mathbb R}$ is proper.
Then $E(w) < \infty$.
\end{prop}
\begin{proof} We postpone the details of the proof till Appendix \ref{sec:energy-bound}.
\end{proof}
By the same argument as the derivation of \cite[Lemma 5.16]{behwz}, we obtain
the following a priori energy bounds for the $\text{\rm lcs}$ instantons $u = (w,f)$ in a \emph{fixed}
charge class $[u] \in H^1(\dot \Sigma)$.
\begin{prop}\label{prop:uniform-energy-bound} Let $\eta \in [\dot \Sigma,S^1]$ and
$u = (w,f) \in {\mathcal M}_{k,\ell}^\eta(\dot \Sigma, Q;J;(\vec \gamma^+,\vec \gamma^-))$.
Let $\widetilde f: \dot \Sigma \to {\mathbb R}$ be the function given as \eqref{eq:tildef}.
Suppose the function $\widetilde f$ is proper. Then we have
\begin{eqnarray*}
E^\pi(u) & = & E^\pi(w) = \sum_{i=1}^k {\mathcal A}_\lambda(\gamma^+_i) - \sum_{j=1}^\ell {\mathcal A}_\lambda(\gamma^-_j)\\
E^\perp_\eta (u)& = & \sum_{j=1}^k {\mathcal A}_\lambda(\gamma^+_i) \\
E(u) & = & 2 \sum_{i=1}^k {\mathcal A}_\lambda(\gamma^+_i) - \sum_{j=1}^\ell {\mathcal A}_\lambda(\gamma^-_j).
\end{eqnarray*}
\end{prop}
\section{Fredholm theory and index calculations}
\label{sec:Fredholm}
In this section, we work out the Fredholm theories of $\lcs$-instantons. We will adapt the
exposition given in \cite{oh:contacton} for the case of contact instantons to that of $\lcs$-instantons
by incorporating the presence of the $S^1$-factor in the product $M = Q^{2n-1} \times S^1$.
We divide our discussion into the closed case and the punctured case.
\subsection{Calculation of the linearization map}
\label{subsec:linearization}
Let $\Sigma$ be a closed Riemann surface and $\dot \Sigma$ be its
associated punctured Riemann surface. We allow the set of whose punctures
to be empty, i.e., $\dot \Sigma = \Sigma$.
We would like to regard the assignment $u \mapsto {\overline \partial}_J u$ which can be
decomposed into
$$
u= (w,f) \mapsto \left({\overline \partial}^\pi w, w^*\lambda \circ j - f^*d\theta\right)
$$
for a map $w: \dot \Sigma \to Q$ as a section of the (infinite dimensional) vector bundle
over the space of maps of $w$. In this section, we lay out the precise relevant off-shell framework
of functional analysis.
Let $(\dot \Sigma, j)$ be a punctured Riemann surface, the set of whose punctures
may be empty, i.e., $\dot \Sigma = \Sigma$ is either a closed or a punctured
Riemann surface. We will fix $j$ and its associated K\"ahler metric $h$.
We consider the map
$$
\Upsilon(w,f) = \left({\overline \partial}^\pi w, w^*\lambda \circ j - f^*d\theta \right)
$$
which defines a section of the vector bundle
$$
{\mathcal H} \to {\mathcal F} = C^\infty(\Sigma,Q)
$$
whose fiber at $u \in C^\infty(\Sigma,Q \times S^1)$ is given by
$$
{\mathcal H}_u: = \Omega^{(0,1)}(u^*\xi) \oplus \Omega^{(0,1)}(u^*{\mathcal V}).
$$
Recalling ${\mathcal V}_{(q,\theta)} = \operatorname{span}_{\mathbb R}\{R_\lambda, \frac{\partial}{\partial \theta}\}$,
we have a natural isomorphism
$$
\Omega^{(0,1)}(u^*{\mathcal V}) \cong \Omega^1(\Sigma) = \Omega^0(T^*S^1)
$$
via the map
$$
\alpha \in \Omega^0(T^*S^1) \mapsto \frac12\left(\alpha \frac{\partial}{\partial \theta} + \alpha \circ j R_\lambda\right).
$$
Utilizing this isomorphism,
we decompose $\Upsilon = (\Upsilon_1,\Upsilon_2)$ where
\begin{equation}\label{eq:upsilon1}
\Upsilon_1: \Omega^0(w^*TQ) \to \Omega^{(0,1)}(w^*\xi); \quad \Upsilon_1(w) = {\overline \partial}^\pi(w)
\end{equation}
and
\begin{equation}\label{eq:upsilon2}
\Upsilon_2: \Omega^0(w^*TQ) \to \Omega^1(\Sigma); \quad \Upsilon_2(w) = w^*\lambda \circ j - f^*d\theta.
\end{equation}
We first compute the linearization map which defines a linear map
$$
D\Upsilon(u) : \Omega^0(w^*TQ) \oplus \Omega^0(f^*TS^1) \to \Omega^{(0,1)}(w^*\xi) \oplus \Omega^1(\dot \Sigma)
$$
where we have
$$
T_u {\mathcal F} = \Omega^0(w^*TQ) \oplus \Omega^0(f^*TS^1).
$$
For the optimal expression of the linearization map and its relevant
calculations, we use the $\mathfrak{lcs}$-fication connection $\nabla$ of $(Q \times S^1,\lambda,J)$
which is the lcs-lifting of contact triad connection introduced in \cite{oh-wang:CR-map1}.
We refer readers to \cite{oh-wang:CR-map1}, \cite{oh:contacton} for the unexplained notations
appearing in our tensor calculations during the proof.
\begin{thm}\label{thm:linearization} We decompose $d\pi = d^\pi w + w^*\lambda\otimes R_\lambda$
and $Y = Y^\pi + \lambda(Y) R_\lambda$, and $X = (Y, v) \in \Omega^0(u^*T(Q \times S^1))$.
Denote $\kappa = \lambda(Y)$ and $\upsilon = d\theta(v)$. Then we have
\begin{eqnarray}
D\Upsilon_1(u)(Y,v) & = & {\overline \partial}^{\nabla^\pi}Y^\pi + B^{(0,1)}(Y^\pi) + T^{\pi,(0,1)}_{dw}(Y^\pi) \nonumber\\
&{}& \quad + \frac{1}{2}\kappa \cdot \left(({\mathcal L}_{R_\lambda}J)J(\partial^\pi w)\right)
\label{eq:Dwdelbarpi}\\
D\Upsilon_2(u)(Y,v) & = & ({\mathcal L}_Y \lambda) \circ j- {\mathcal L}_v d\theta = d\kappa \circ j - d\upsilon
+ Y \rfloor d\lambda \circ j
\nonumber\\
\label{eq:Dwddot}
\end{eqnarray}
where $B^{(0,1)}$ and $T_{dw}^{\pi,(0,1)}$ are the $(0,1)$-components of $B$ and
$T_{dw}^{\pi,(0,1)}$, where $B, \, T_{dw}^\pi: \Omega^0(w^*TQ) \to \Omega^1(w^*\xi)$ are
zero-order differential operators given by
$$
B(Y) =
- \frac{1}{2} w^*\lambda \left(({\mathcal L}_{R_\lambda}J)J Y\right)
$$
and
$$
T_{dw}^\pi(Y) = \pi T(Y,dw)
$$
respectively.
\end{thm}
\begin{proof}
Let $Y$ be a vector field over $w$ and $w_s$ be a family of maps $w_s: \Sigma \to Q$ with
$w_0 = w$ and $Y = \frac{d}{ds}\Big|_{s = 0} w^s$, and $a = \frac{d\gamma}{dt}\Big|_{t = 0}$
for a curve $\gamma$ with $\gamma(0) = z$. We decompose
$$
Y = Y^\pi + \kappa \, R_\lambda, \quad \kappa = \lambda(Y)
$$
into the sum of $\xi$-component and $R_\lambda$-component.
Calculation of \eqref{eq:Dwdelbarpi} is the same as that of \cite[Theorem 10.1]{oh:contacton} which
we refer readers to for the details.
Next we compute $D\Upsilon_2(u)$ and prove \eqref{eq:Dwddot}.
We compute $\frac{d}{ds}|_{s= 0} w_s^*\lambda \circ j$
\begin{equation}\label{eq:nablas}
\frac{d}{ds}\Big|_{s = 0} w_s^*\lambda\circ j
= \frac{d}{ds}\Big|_{s = 0}w_s^*\lambda \circ j.
\end{equation}
By Cartan's formula applied to the \emph{vector field $Y$ over the map $w$},
we obtain
$$
\frac{d}{ds}\Big|_{s = 0} w_s^*\lambda = Y \rfloor d\lambda + d(Y \rfloor \lambda)
$$
where $\rfloor$ is the interior product over the map $w$.
Substituting this into \eqref{eq:nablas}, we derive
$$
\frac{d}{ds}\Big|_{s = 0} w_s^*\lambda\circ j =
d(\lambda(Y))\circ j + (Y \rfloor d\lambda) \circ j = d\kappa \circ j + (Y \rfloor d\lambda) \circ j.
$$
Similarly we compute
$$
\frac{d}{ds}\Big|_{s = 0} f_s^*d\theta = d(v \rfloor d\theta).
$$
This proves
\begin{equation}\label{eq:linearizedUpsilon2}
D\Upsilon_2(w)(Y) = d\kappa \circ j + (Y \rfloor d\lambda) \circ j - d\upsilon, \, \upsilon = d\theta(v)
\end{equation}
which finishes the proof of Theorem \ref{thm:linearization}.
\end{proof}
Now we evaluate $D\Upsilon_1(w)$
more explicitly. We have
$$
{\overline \partial}^{\nabla^\pi}Y = \frac{1}{2} \left(\nabla^\pi Y + J \nabla^\pi_{j(\cdot)} Y \right)
$$
and $B^{(0,1)}(Y)$ becomes
$$
-\frac{1}{4}\left(w^*\lambda\, \pi (({\mathcal L}_{R_\lambda}J)J Y) + w^*\lambda \circ j\, \pi ({\mathcal L}_{R_\lambda}J)Y \right).
$$
\subsection{The closed case}
We recall the classification result of contact instantons, Proposition \ref{prop:abbas}.
This (or rather its proof given in \cite[Proposition 3.4]{oh-wang:CR-map1}) gives rise to the following
immediate classification result
for smooth $\lcs$ instantons too.
\begin{prop}\label{prop:classify} Let $u=(w,f) : \Sigma \to Q \times S^1$ be a smooth $\lcs$ instanton from
a closed Riemann surface $(\Sigma,j)$. Then
\begin{enumerate}
\item If $g(\Sigma) = 0$, then $u$ is a constant map.
\item If $g(\Sigma) \geq 1$, there exists a closed Reeb orbit $C$ such that
$u$ can be factored into
$u = \iota_u \circ \varphi_u$ where $\varphi_u: \Sigma \to S^1 \times C$
is a surjective map and $\iota_u: C \times S^1 \to Q \times S^1$ is the inclusion map.
\end{enumerate}
Furthermore if we equip $C \times S^1$ with the complex structure induced from $J$ and denote
by $E_{C,J}$ the resulting elliptic curve, then the map $\varphi_u: \Sigma \to E_{C,J}$
is a holomorphic branched covering. When $g(\Sigma) =1 $, $\varphi_u$ is an \'etale covering.
\end{prop}
\begin{proof} We recall that $w$ is a contact instanton.
The beginning of our proof closely follows that of \cite[Proposition 3.4]{oh-wang:CR-map1}
but for readers' convenience, we duplicate it here.
Since $\Sigma$ is closed, the identity $|d^\pi w|^2 dA = d(2w^*\lambda)$ implies
$d^\pi w = 0$ by Stokes' formula. Therefore we have
$$
dw = w^*\lambda \otimes R_\lambda.
$$
In particular the image of $w$ is contained in a single leaf, say $C$, of the Reeb foliation of $(Q,\lambda)$.
It was proven in the proof of \cite[Proposition 3.4]{oh-wang:CR-map1} that if $C$ is not a closed leaf,
$w$ must be a constant map and so is $u$. Therefore we have only to consider the case where $C$ is a
closed leaf.
The vanishing $d^\pi w= 0$ also implies $dw^*\lambda = 0$. Combined with $d(w^*\lambda \circ j) = 0$,
we conclude that $w^*\lambda$ is a harmonic one-form on $\Sigma$. Then we derive that
the one-form
$$
\alpha = f^*d\theta + \sqrt{-1} w^*\lambda = w^*\lambda \circ j + \sqrt{-1} w^*\lambda
$$
is a smooth holomorphic one-form on $\Sigma$. Recall
$$
\opname{dim}_{\mathbb C} H^{(1,0)}(\Sigma) = g.
$$
Therefore if $g(\Sigma) = 0$, it must be zero and so $u$ is a constant map.
When $g(\Sigma) \geq 1$, we note that
the map $u$ is factored through $\Sigma \to C \times S^1 \hookrightarrow Q \times S^1$.
We note that $C \times S^1$ is diffeomorphic to a two-torus. Furthermore it is equipped with
the induced complex structure satisfying
$$
J\frac{\partial}{\partial \theta} = R_\lambda = \dot \gamma, \quad J \dot \gamma = - \frac{\partial}{\partial \theta}.
$$
We denote the resulting elliptic curve by $(E_{C,J},J)$ by some abuse of notation.
Obviously the map $u$ induces a (non-constant)
holomorphic map $\varphi_u: (\Sigma,j) \to (E_{C,J},J)$ since the map $u$ is $(j,J)$-holomorphic.
By the general property of holomorphic maps between two
closed Riemann surfaces, it follows that $\varphi_u$ is a branched covering map
onto $E_{C,J}$, provided it is not constant. Furthermore if $g(\Sigma) = 1$, it is an \'etale covering, i.e.,
a covering map without branching. In particular if the degree is 1, the map is an
isomorphism of an elliptic curve. This finishes the proof.
\end{proof}
\begin{rem}
This proposition has two implications. On the one hand, there are `many' closed $\lcs$ instantons
for the genus zero case which are all constants, and existence of nonconstant closed $\lcs$ instanton for
the higher genus case implies existence of a closed Reeb orbit of $(Q,\lambda)$.
Therefore if one wants to develop a more interesting story of contact instantons, one
should consider those defined on open Riemann surfaces, either with boundary or with punctures.
\end{rem}
Next we would like to compute the Fredholm index of such an $\lcs$ instanton
$u = (f, w)$. We start with considering the $w$ component.
From the expression of the map $\Upsilon = (\Upsilon_1,\Upsilon_2)$, the map defines a bounded linear map
\begin{equation}\label{eq:dUpsilon}
D\Upsilon(w): \Omega^0_{k,p}(w^*TQ) \to \Omega^{(0,1)}_{k-1,p}(w^*\xi) \oplus \Omega^2_{k-2,p}(\Sigma).
\end{equation}
We choose $k \geq 2, \, p > 2$. Recalling the decomposition
$$
Y = Y^\pi + \lambda(Y)\, R_\lambda,
$$
we have the decomposition
$$
\Omega^0_{k,p}(w^*TQ) \cong \Omega^0_{k,p}(w^*\xi) \oplus \Omega^0_{k,p}(\dot \Sigma,{\mathbb R})\cdot R_\lambda.
$$
Here we use the splitting
$$
TQ = \operatorname{span}_{\mathbb R}\{R_\lambda\} \oplus \xi
$$
where $\operatorname{span}_{\mathbb R}\{R_\lambda\}: = {\mathcal L}$ is a trivial line bundle and so
$$
\Gamma(w^*{\mathcal L}) \cong C^\infty(\Sigma).
$$
By definition the linearization operator $D\Upsilon_2(w)$ acts trivially on the section
$Y$ tangent to the Reeb direction.
We derive the following index formula for $D\Upsilon(w)$ from the homotopy
invariance of the index
\begin{thm}\label{thm:index} Let $\Sigma$ be any closed Riemann surface
of genus $g$, and let $w: \Sigma \to Q$ be a contact instanton
with finite $\pi$-energy. Then the operator \eqref{eq:dUpsilon} is a Fredholm operator
whose index is given by
\begin{equation}\label{eq:indexwhen0}
\operatorname{Index} D\Upsilon(w) = 2n(1-g).
\end{equation}
\end{thm}
\begin{proof}
We already know that the operators ${\overline \partial}^{\nabla^\pi} + T_{dw}^{\pi,(0,1)} + B^{(0,1)}$ and
${\overline \partial}$ are Fredholm. Furthermore we can homotope the operator
\eqref{eq:dUpsilon} to the direct sum operator
$$
\left({\overline \partial}^{\nabla^\pi} + T_{dw}^{\pi,(0,1)} + B^{(0,1)} + \frac{1}{2}
\lambda(\cdot) ({\mathcal L}_{R_\lambda}J)J \partial^\pi w \right)
\oplus {\overline \partial}
$$
Then the index is given by
\begin{eqnarray*}
\operatorname{Index}{\overline \partial}^{\nabla^\pi} + \operatorname{Index} ({\overline \partial})
& = & 2c_1(w^*\xi) + 2(n-1)(1-g) + 2(1-g)\\
& = & 2c_1(w^*\xi) + 2n(1-g).
\end{eqnarray*}
in general. But since $[w] = 0$ in $H_2(Q;{\mathbb Z})$ for any contact instanton
by Proposition \ref{prop:abbas}, this is reduced to
\eqref{eq:indexwhen0}. This finishes the proof.
\end{proof}
\subsection{The punctured case}
\label{subsec:punctured}
We start with the general remark on the Fredholm theory of
nonlinear elliptic equation defined on the non-compact domain. The
Fredholm theory usually requires both the domain and the linearized
operator to be \emph{cylindrical} in that the operator is translationally
invariant under the radial coordinates. For the current $\lcs$ instanton
equation, the linearized operator is not cylindrical when the
asymptotic charge $Q(p)$ is nonzero and so the linearization operator
derived in Section \ref{subsec:linearization} is not suitable for the
Fredholm theory. Here enters the charge class $[u]_{S^1}$ again!
By restricting the charge class $[u]_{S^1}$, we restrict to the
smaller off-shell function space
$$
{\mathcal W}^{k,p}_{\delta;\eta}\left(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-\right)
$$
and linearize the map
$$
(\widetilde f, w) \mapsto \left({\overline \partial}^\pi w, \beta_\eta + d\widetilde f\right)
$$
with the harmonic part $\beta_\eta$ \emph{fixed} instead. This restricted linearization
operator then becomes cylindrical. With this preparation, the rest of the discussion
will be restricted to this smaller function space and so the linearized
operator becomes cylindrical. Then the Fredholm theory details
are entirely similar to the case of a symplectization. For readers' convenience, we
provide full details of the Fredholm theory and the index calculation.
Fix an elongation function $\rho: {\mathbb R} \to [0,1]$
so that
\begin{eqnarray*}
\rho(\tau) & = & \begin{cases} 1 \quad & \tau \geq 1 \\
0 \quad & \tau \leq 0
\end{cases} \\
0 & \leq & \rho'(\tau) \leq 2.
\end{eqnarray*}
Then we consider sections of $w^*TQ$ by
\begin{equation}\label{eq:barY}
\overline Y_i = \rho(\tau - R_0) R_\lambda(\gamma^+_k(t)),\quad
\underline Y_j = \rho(\tau + R_0) R_\lambda(\gamma^+_k(t))
\end{equation}
and denote by $\Gamma_{s^+,s^-} \subset \Gamma(w^*TQ)$ the subspace defined by
$$
\Gamma_{s^+,s^-} = \bigoplus_{i=1}^{s^+} {\mathbb R}\{\overline Y_i\} \oplus \bigoplus_{j=1}^{s^-} {\mathbb R}\{\underline Y_j\}.
$$
Let $k \geq 2$ and $p > 2$. We denote by
$$
{\mathcal W}^{k,p}_\delta(\dot \Sigma, Q;J;\gamma^+,\gamma^-), \quad k \geq 2
$$
the Banach manifold such that
\begin{equation}\label{eq:limatinfty}
\lim_{\tau \to \infty}w((\tau,t)_i) = \gamma^+_i(T_i(t+t_i)), \quad
\lim_{\tau \to - \infty}w((\tau,t)_j) = \gamma^-_j(T_j(t-t_j))
\end{equation}
for some $t_i, \, t_j \in S^1$, where
$$
T_i = \int_{S^1} (\gamma^+_i)^*\lambda, \, T_j = \int_{S^1} (\gamma^-_j)^*\lambda.
$$
Here $t_i,\, t_j$ depends on the given analytic coordinate and the parameterization of
the Reeb orbits.
The local model of the tangent space of ${\mathcal W}^{k,p}_\delta(\dot \Sigma, Q;J;\gamma^+,\gamma^-)$ at
$w \in C^\infty_\delta(\dot \Sigma,Q) \subset W^{k,p}_\delta(\dot \Sigma, Q)$ is given by
\begin{equation}\label{eq:tangentspace}
\Gamma_{s^+,s^-} \oplus W^{k,p}_\delta(w^*TQ)
\end{equation}
where $W^{k,p}_\delta(w^*TQ)$ is the Banach space
\begin{eqnarray*}
&{} & \{Y = (Y^\pi, \lambda(Y)\, R_\lambda)
\mid e^{\frac{\delta}{p}|\tau|}Y^\pi \in W^{k,p}(\dot\Sigma, w^*\xi), \,
\lambda(Y) \in W^{k,p}(\dot \Sigma, {\mathbb R})\}\\
& \cong & W^{k,p}(\dot \Sigma, {\mathbb R}) \cdot R_\lambda(w) \oplus W^{k,p}(\dot\Sigma, w^*\xi).
\end{eqnarray*}
Here we measure the various norms in terms of the triad metric of the triad $(Q,\lambda,J)$.
To describe the choice of $\delta > 0$, we need to recall the covariant linearization of the map $
D\Upsilon_{\lambda, T}: W^{1,2}(z^*\xi) \to L^2(z^*\xi)
$
of the map
$$
\Upsilon_{\lambda,T}: z \mapsto \dot z - T\, R_\lambda(z)
$$
for a given $T$-periodic Reeb orbit $(T,z)$. The operator has the expression
\begin{equation}\label{eq:DUpsilon}
D\Upsilon_{\lambda, T} = \frac{D^\pi}{dt} - \frac{T}{2}({\mathcal L}_{R_\lambda}J) J=: A_{(T,z)}
\end{equation}
where $\frac{D^\pi}{dt}$ is the covariant derivative
with respect to the pull-back connection $z^*\nabla^\pi$ along the Reeb orbit
$z$ and $({\mathcal L}_{R_\lambda}J) J$ is a (pointwise) symmetric operator with respect to
the triad metric. (See Lemma 3.4 \cite{oh-wang:connection}.)
We choose $\delta> 0$ so that $0 < \delta/p < 1$ is smaller than the
spectral gap
\begin{equation}\label{eq:gap}
\text{gap}(\gamma^+,\gamma^-): = \min_{i,j}
\{d_{\text H}(\text{spec}A_{(T_i,z_i)},0),\, d_{\text H}(\text{spec}A_{(T_j,z_j)},0)\}.
\end{equation}
Now for each given $w \in {\mathcal W}^{k,p}_\delta:= {\mathcal W}^{k,p}_\delta(\dot \Sigma, Q;J;\gamma^+,\gamma^-)$,
we consider the Banach space
$$
\Omega^{(0,1)}_{k-1,p;\delta}(w^*\xi)
$$
the $W^{k-1,p}_\delta$-completion of $\Omega^{(0,1)}(w^*\xi)$ and form the bundle
$$
{\mathcal H}^{(0,1)}_{k-1,p;\delta}(\xi) = \bigcup_{w \in {\mathcal W}^{k,p}_\delta} \Omega^{(0,1)}_{k-1,p;\delta}(w^*\xi)
$$
over ${\mathcal W}^{k,p}_\delta$. Then we can regard the assignment
$$
\Upsilon_1: (w,f) \mapsto {\overline \partial}^\pi w
$$
as a smooth section of the bundle ${\mathcal H}^{(0,1)}_{k-1,p;\delta}(\xi) \to {\mathcal W}^{k,p}_\delta$.
Furthermore the assignment
$$
\Upsilon_2: (w,f) \mapsto w^*\lambda \circ j - f^*d\theta
$$
defines a smooth section of the bundle
$$
\Omega^1_{k-1,p}(u^*{\mathcal V}) \to {\mathcal W}^{k,p}_\delta.
$$
We have already computed the linearization of each of these maps in the previous section.
With these preparations, the following is a corollary of exponential estimates established
in \cite{oh-wang:CR-map1}.
\begin{prop}[Corollary 6.5 \cite{oh-wang:CR-map1}]\label{prop:on-containedin-off}
Assume $\lambda$ is nondegenerate.
Let $w:\dot \Sigma \to Q$ be a contact instanton and let $w^*\lambda = a_1\, d\tau + a_2\, dt$.
Suppose
\begin{eqnarray}
\lim_{\tau \to \infty} a_{1,i} = -Q(p_i), &{}& \, \lim_{\tau \to \infty} a_{2,i} = T(p_i)\nonumber\\
\lim_{\tau \to -\infty} a_{1,j} = -Q(p_j) , &{}& \, \lim_{\tau \to -\infty} a_{2,j} = T(p_j)
\end{eqnarray}
at each puncture $p_i$ and $q_j$.
Then $w \in {\mathcal W}^{k,p}_\delta(\dot \Sigma, Q;J;\gamma^+,\gamma^-)$.
\end{prop}
Now we are ready to describe the moduli space of $\lcs$ instantons with prescribed
asymptotic condition as the zero set
\begin{equation}\label{eq:defn-MM}
{\mathcal M}(\dot \Sigma, Q;J;\gamma^+,\gamma^-) = \left({\mathcal W}^{k,p}_\delta(\dot \Sigma, Q;J;\gamma^+,\gamma^-)
\oplus {\mathcal W}^{k,p}_\delta(\dot \Sigma, S^1)\right) \cap \Upsilon^{-1}(0)
\end{equation}
whose definition does not depend on the choice of $k, \, p$ or $\delta$ as long as $k\geq 2, \, p>2$ and
$\delta > 0$ is sufficiently small. One can also vary $\lambda$ and $J$ and define the universal
moduli space whose detailed discussion is postponed.
In the rest of this section, we establish the Fredholm property of
the linearization map
$$
D\Upsilon_{(\lambda,T)}(u): \Omega^0_{k,p;\delta}(u^*T(Q \times S^1);J;\gamma^+,\gamma^-) \to
\Omega^{(0,1)}_{k-1,p;\delta}(w^*\xi) \oplus \Omega^{(0,1)}_{k-1,p}(u^*TS^1)
$$
and compute its index. Here we also denote
$$
\Omega^0_{k-1,p;\delta}(u^*T(Q \times S^1);J;\gamma^+,\gamma^-) =
W^{k-1,p}_\delta(u^*T(Q \times S^1);J;\gamma^+,\gamma^-)
$$
for the semantic reason.
For this purpose, we remark that
as long as the set of punctures is non-empty, the symplectic vector bundle
$w^*\xi \to \dot \Sigma$ is trivial. We denote by
$
\Phi: E \to \overline \Sigma \times {\mathbb R}^{2n}
$
and by
$$
\Phi_i^+: = \Phi|_{\partial_i^+ \overline \Sigma}, \quad \Phi_j^- = \Phi|_{\partial_j^- \overline \Sigma}
$$
its restrictions on the corresponding boundary components of $\partial \overline \Sigma$.
Using the cylindrical structure near the punctures,
we can extend the bundle to the bundle $E \to \overline \Sigma$ where $\overline \Sigma$
is the real blow-up of the punctured Riemann surface $\dot \Sigma$.
We then consider the following set
\begin{eqnarray*}
{\mathcal S} &: = & \{A: [0,1] \to Sp(2n,{\mathbb R}) \mid 1 \not \in \text{spec}(A(1)), \\
&{}& \hskip0.5in A(0) = id, \, \dot A(0) A(0)^{-1} = \dot A(1) A(1)^{-1} \}
\end{eqnarray*}
of regular paths in $Sp(2n,{\mathbb R})$ and denote by $\mu_{CZ}(A)$ the Conley-Zehnder index of
the paths following \cite{robbin-salamon}. Recall that for each closed Reeb orbit $\gamma$ with a fixed
trivialization of $\xi$, the covariant linearization $A_{(T,z)}$ of the Reeb flow along $\gamma$
determines an element $A_\gamma \in {\mathcal S}$. We denote by $\Psi_i^+$ and $\Psi_j^-$
the corresponding paths induced from the trivializations $\Phi_i^+$ and $\Phi_j^-$ respectively.
We have the decomposition
$$
\Omega^0_{k,p;\delta}(w^*T(Q \times S^1);J;\gamma^+,\gamma^-) =
\Omega^0_{k,p;\delta}(w^*\xi) \oplus \Omega^0_{k,p;\delta}(u^*{\mathcal V})
$$
and again the operator
\begin{equation}\label{eq:DUpsilonu}
D\Upsilon_{(\lambda,T)}(u): \Omega^0_{k,p;\delta}(w^*T(Q \times S^1);J;\gamma^+,\gamma^-) \to
\Omega^{(0,1)}_{k-1,p;\delta}(w^*\xi) \oplus \Omega^{(0,1)}_{k-1,p;\delta}(u^*{\mathcal V})
\end{equation}
which is decomposed into
$$
D\Upsilon_1(u)(Y,v)\oplus D\Upsilon_2(u)
$$
where the summands are given as in
\eqref{eq:Dwdelbarpi} and \eqref{eq:Dwddot} respectively. We see therefrom that
$D\Upsilon_{(\lambda,T)}$ is the first-order differential operator whose first-order part
is given by the direct sum operator
$$
(Y^\pi,(\kappa, \upsilon)) \mapsto {\overline \partial}^{\nabla^\pi} Y^\pi \oplus (d\kappa \circ j - d\upsilon)
$$
where we write $(Y,v) = \left(Y^\pi + \kappa R_\lambda, \upsilon \frac{\partial}{\partial \theta}\right)$
for $\kappa = \lambda(Y), \, \upsilon = d\theta(v)$.
Here we have
$$
{\overline \partial}^{\nabla^\pi} : \Omega^0_{k,p;\delta}(w^*\xi;J;\gamma^+,\gamma^-) \to
\Omega^{(0,1)}_{k-1,p;\delta}(w^*\xi)
$$
and the second summand can be written as the standard Cauchy-Riemann operator
$$
{\overline \partial}: W^{k,p}(\dot \Sigma;{\mathbb C}) \to \Omega^{(0,1)}_{k-1,p}(\dot \Sigma,{\mathbb C}); \quad
\upsilon + i \kappa =: \varphi \mapsto
{\overline \partial} \varphi.
$$
The following proposition can be derived from the arguments used by
Lockhart and McOwen \cite{lockhart-mcowen}. However before applying their
general theory, one needs to pay some preliminary
measure to handle the fact that the order of the operators $D\Upsilon(w)$ are
different depending on the direction of $\xi$ or on that of $R_\lambda$.
\begin{prop}\label{prop:fredholm} Suppose $\delta > 0$ satisfies the inequality
$$
0< \delta < \min\left\{\frac{\text{\rm gap}(\gamma^+,\gamma^-)}{p}, \frac{2}{p}\right\}
$$
where $\text{\rm gap}(\gamma^+,\gamma^-)$ is the spectral gap, given in \eqref{eq:gap},
of the asymptotic operators $A_{(T_j,z_j)}$ or $A_{(T_i,z_i)}$
associated to the corresponding punctures. Then the operator
\eqref{eq:DUpsilonu} is Fredholm.
\end{prop}
\begin{proof} We first note that the operators ${\overline \partial}^{\nabla^\pi} + T^{\pi,(0,1)}_{dw} + B^{(0,1)}$ and
${\overline \partial}$ are Fredholm: The relevant a priori coercive $W^{k,2}$-estimates for any integer $k \geq 1$
for the derivative $dw$ on the punctured Riemann surface $\dot \Sigma$ with cylindrical metric
near the punctures are established in \cite{oh-wang:CR-map1} for the operator
${\overline \partial}^{\nabla^\pi} + T^{\pi,(0,1)}_{dw} + B^{(0,1)}$ and the one for ${\overline \partial}$ is standard.
From this, the standard interpolation inequality establishes the $W^{k,p}$-estimates
for $D\Upsilon(w)$ for all $k \geq 2$ and $p \geq 2$.
Secondly, we can express the operator $D\Upsilon(u)$ in a matrix form
\begin{equation}\label{eq:matrix-form}
\left(
\begin{matrix}
{\overline \partial}^{\nabla^\pi} + B^{(0,1)} + T^{\pi,(0,1)}_{dw} &, & \frac{1}{2}(\cdot) \cdot
\left(({\mathcal L}_{R_\lambda}J)J(\partial^\pi w)\right)\\
\left((\cdot)^\pi \rfloor d\lambda\right)\circ j &, & {\overline \partial}
\end{matrix}
\right)
\end{equation}
with respect to the decomposition
$$
\left(Y, \upsilon \frac{\partial}{\partial \theta}\right) = \left(Y^\pi+\kappa R_\lambda, \upsilon\frac{\partial}{\partial \theta}\right)
\cong (Y^\pi, \upsilon + i\kappa)
$$
in terms of the splitting
$$
T(Q\times S^1) = \xi \oplus (\operatorname{span}\{R_\lambda\} \oplus TS^1) \cong \xi \oplus {\mathbb C}.
$$
Therefore it can be homotoped to the block-diagonal form, i.e., into the direct sum operator
$$
\left({\overline \partial}^{\nabla^\pi} + T^{\pi,(0,1)}_{dw} + B^{(0,1)}\right)\oplus {\overline \partial}
$$
via a continuous path of Fredholm operators given by
$$
s \in [0,1] \mapsto \left(
\begin{matrix}
{\overline \partial}^{\nabla^\pi} + B^{(0,1)} + T^{\pi,(0,1)}_{dw} &, &\frac{s}{2}(\cdot) \cdot
\left(({\mathcal L}_{R_\lambda}J)J(\partial^\pi w)\right)\\
s \left((\cdot)^\pi \rfloor d\lambda\right)\circ j &, &{\overline \partial}
\end{matrix}
\right)
$$
from $s =1$ to $s = 0$. The Fredholm property of this path follows from the fact that
the off-diagonal terms are $0$-th order linear operators.
\end{proof}
Then by the continuous invariance of the Fredholm index, we obtain
\begin{equation}\label{eq:indexDXiw}
\operatorname{Index} D\Upsilon_{(\lambda,T)}(w) =
\operatorname{Index} \left({\overline \partial}^{\nabla^\pi} + T^{\pi,(0,1)}_{dw} + B^{(0,1)}\right)
+ \operatorname{Index}({\overline \partial}).
\end{equation}
Therefore it remains to compute the latter two indices.
We denote by $m(\gamma)$ the multiplicity of the Reeb orbit in general.
Then we have the following index formula.
\begin{thm}\label{thm:indexforDUpsilon} We fix a trivialization
$\Phi: E \to \overline \Sigma$ and denote
by $\Psi_i^+$ (resp. $\Psi_j^-$) the induced symplectic paths associated to the trivializations
$\Phi_i^+$ (resp. $\Phi_j^-$) along the Reeb orbits $\gamma^+_i$ (resp. $\gamma^-_j$) at the punctures
$p_i$ (resp. $q_j$) respectively. Then we have
\begin{eqnarray}
&{}& \operatorname{Index} ({\overline \partial}^{\nabla^\pi} + T^{\pi,(0,1)}_{dw} + B^{(0,1)}) \nonumber\\
& = &
n(2-2g-s^+ - s^-) + 2c_1(w^*\xi) + (s^+ + s^-) \nonumber \\
&{}& \quad + \sum_{i=1}^{s^+} \mu_{CZ}(\Psi^+_i)- \sum_{j=1}^{s^-} \mu_{CZ} (\Psi^-_j)
\label{eq:Indexdelbarpi}
\end{eqnarray}
\begin{equation}
\operatorname{Index} ({\overline \partial}) = 2\sum_{i=1}^{s^+} m(\gamma^+_i)+ 2\sum_{j=1}^{s^-} m(\gamma^-_j) -2 g.
\label{eq:indexdelbar}
\end{equation}
In particular,
\begin{eqnarray}\label{eq:indexforDUpsilon}
&{}& \operatorname{Index} D\Upsilon_{(\lambda,T)}(u) \nonumber\\
& = & n(2-2g-s^+ - s^-) + 2c_1(w^*\xi)\nonumber\\
&{}& + \sum_{i=1}^{s^+} \mu_{CZ}(\Psi^+_i)
- \sum_{j=1}^{s^-} \mu_{CZ}(\Psi^-_j)\nonumber \\
&{}& +
\sum_{i=1}^{s^+} (2m(\gamma^+_i)+1) + \sum_{j=1}^{s^-}( 2m(\gamma^-_j)+1) - 2g.
\end{eqnarray}
\end{thm}
\begin{proof} The formula \eqref{eq:Indexdelbarpi} can be immediately derived from
the general formula given in the top of p. 52 of Bourgeois's thesis \cite{bourgeois}:
The summand $(s^+ + s^-)$ comes from the factor $\Gamma_{s^+,s^-}$ in the decomposition
\eqref{eq:tangentspace} which has dimension $s^+ + s^-$.
So it remains to compute the index \eqref{eq:indexdelbar}.
To compute the (real) index of ${\overline \partial}$, we consider the Dolbeault complex
$$
0 \to \Omega^0(\Sigma; D) \to \Omega^1(\Sigma;D) \to 0
$$
where $D = D^+ + D^-$ is the divisor associated to the set of punctures
$$
D^+ = \sum_{i=1}^{s^+}m(\gamma^+_i) p_i, \quad
D^- = \sum_{j=1}^{s^-} m(\gamma^-_j) q_j
$$
where $m(\gamma^+_i)$ (resp. $m(\gamma^-_j)$) is the multiplicity of the Reeb orbit
$\gamma^+_i$ (resp. $\gamma^-_j$). The standard Riemann-Roch formula then gives rise to
the formula for the Euler characteristic
\begin{eqnarray*}
\chi(D) & = & 2\opname{dim}_{\mathbb C} H^0(D) - 2\opname{dim}_{\mathbb C} H^1(D) = 2\operatorname{deg} (D) - 2g\\
& = &\sum_{i=1}^{s^+} 2m(\gamma^+_i)+ \sum_{j=1}^{s^-} 2m(\gamma^-_j) - 2g.
\end{eqnarray*}
This finishes the proof.
\end{proof}
\section{Generic transversality under the perturbation of $J$}
\label{sec:generic}
We start with recalling the linearization of the equation $\dot x = R_\lambda(x)$
along a closed Reeb orbit. Let $z$ be a closed Reeb orbit of period $T > 0$. In other words,
$z: {\mathbb R} \to Q$ is a periodic solution of $\dot z = R_\lambda(z)$ with period $T$, thus satisfying $z(T) = z(0)$.
Denote by $\phi^t= \phi^t_{R_\lambda}$ the flow of the Reeb vector field $R_\lambda$,
so that we can write $z(t) = \phi^t(z(0))$.
In particular $p:= z(0)$ is a fixed point of the diffeomorphism $\phi^T$.
Further, since $L_{R_\lambda}\lambda = 0$, the contact diffeomorphism $\phi^T$ induces the isomorphism
$$
\Psi_z : = d\phi^T(p)|_{\xi_p}: \xi_p \to \xi_p
$$
which is the tangent map of the Poincar\'e return map $\phi^T$ restricted to $\xi_p$.
\begin{defn} We say a Reeb orbit with period $T$ is \emph{nondegenerate}
if $\Psi_z:\xi_p \to \xi_p$ with $p = z(0)$ has no eigenvalue 1.
\end{defn}
Denote by $\Cont(Q,\xi)$ the set of contact forms with respect to the contact structure $\xi$ and ${\mathcal L}(Q)=C^\infty(S^1,Q)$
the space of loops $z: S^1 = {\mathbb R} /{\mathbb Z} \to Q$. Let ${\mathcal L}^{1,2}(Q)$ be the $W^{1,2}$-completion of ${\mathcal L}(Q)$.
We would like to consider some Banach vector bundle ${\mathcal L}$ over the Banach manifold
$(0,\infty) \times {\mathcal L}^{1,2}(Q) \times \Cont(Q,\xi)$ whose fiber at $(T, z, \lambda)$ is given by $L^2(z^*TQ)$.
We consider the assignment
$$
\Upsilon: (T,z,\lambda) \mapsto \dot z - T \,R_\lambda(z)
$$
which is a section of ${\mathcal L}$.
Denote by
$$
DR_\lambda(z)
$$
the covariant derivative of $R_\lambda$ along the
curve $z$. Then we have the following expression of the full linearization.
\begin{lem}\label{lem:full-linearization}
\begin{eqnarray*}
d{(T,z, \lambda)}\Upsilon(a,Y, B) = \frac{D Y}{dt} - T D R_\lambda(z)(Y)-a R_\lambda- T \delta_{\lambda}R_\lambda(B),
\end{eqnarray*}
where $a\in {\mathbb R}$, $Y\in T_z{\mathcal L}^{1,2}(Q)=W^{1,2}(z^*TQ)$ and $B\in T_\lambda \Cont(Q, \xi)$ and
the last term $\delta_{\lambda}R_\lambda$ is some linear operator.
\end{lem}
By using this full linearization, one can study the generic existence of the contact one-forms which make all
Reeb orbits nondegenerate. We refer to Appendix of \cite{wendl} for its complete proof.
We assume in the rest of our discussion below that $\lambda$ is such a generic contact form.
Now we involve the set ${\mathcal J}(Q \times S^1,\lambda)$ given in Definition \ref{defn:lambda-admissible-J}.
We study the linearization of the map $\Upsilon^{univ}$ which is the map $\Upsilon$ augmented by
the argument $J \in {\mathcal J}(Q \times S^1,\lambda)$. More precisely, we define
$$
\Upsilon^{univ}(j, w, J) = \left({\overline \partial}_J^\pi w, w^*\lambda \circ j - f^*d\theta\right)
$$
${\overline \partial}$ at each $(j,w,J) \in {\overline \partial}^{-1}(0)$. In the discussion below, we will fix the complex
structure $j$ on $\Sigma$, and so suppress $j$ from the argument of $\Upsilon^{univ}$.
We denote the zero set $(\Upsilon^{univ})^{-1}(0)$ by
$$
{\mathcal M}(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-) = \left\{ (w,J)
|\, \Upsilon^{univ}(w, J) = 0 \right\}
$$
which we call the universal moduli space, where
$$
(w,J) \in {\mathcal W}^{k,p}_\delta(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-) \times {\mathcal J}^\ell(Q \times S^1,\lambda).
$$
Denote by
$$
\pi_2: {\mathcal W}^{k,p}_\delta(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-) \times {\mathcal J}^\ell(Q \times S^1,\lambda) \to
{\mathcal J}^\ell(Q \times S^1,\lambda)
$$
the projection. Then we have
\begin{equation}\label{eq:MMK}
{\mathcal M}_J(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-)
= \pi_2^{-1}(J) \cap {\mathcal M}(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-).
\end{equation}
One essential ingredient for the generic transversality under the perturbation of
$J \in {\mathcal J}(Q \times S^1,\lambda)$ is the usage of the unique continuation result,
which applies to arbitrary $J$-holomorphic curves on almost complex manifolds.
\begin{prop}[Unique continuation lemma]\label{prop:unique-conti}
Any non-constant $\lcs$ instanton does not
have an accumulation point in the zero set of $dw$.
\end{prop}
\begin{rem} In fact this unique continuation applies to general
contact instanton $w$ whose proof strongly relies on
the closedness of the one-form $w^*\lambda \circ j$.
(See \cite{oh:contacton} for its proof.)
\end{rem}
The following theorem summarizes the main transversality scheme
needed for the study of the moduli problem of the contact instanton map, whose proof
is not very different from that of pseudo-holomorphic curves, once the above
unique continuation result is established, and so is omitted.
\begin{thm}\label{thm:trans} Let $0 < \ell < k -\frac{2}{p}$.
Consider the moduli space ${\mathcal M}(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-)$. Then
\begin{enumerate}
\item ${\mathcal M}(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-)$ is
an infinite dimensional $C^\ell$ Banach manifold.
\item The projection $\Pi_\alpha =
\pi_2|_{{\mathcal M}(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-)}:
{\mathcal M}(\dot \Sigma,Q \times S^1;\vec \gamma^+, \vec \gamma^-) \to {\mathcal J}^\ell(Q \times S^1,\lambda)$ is a
Fredholm map and its index is the same as that of $D\Upsilon(w)$
for a (and so any) $w \in {\mathcal M}(Q,\lambda,J;\overline \gamma, \underline \gamma)$.
\end{enumerate}
\end{thm}
One should compare this with the corresponding statement for Floer's perturbed Cauchy-Riemann equations
on symplectic manifolds.
|
\section{Introduction}
\label{sec:intro}
Tidal disruption events (TDEs) are becoming a key phenomenon in searching
for dormant supermassive black holes (SMBHs) at the centers of the inactive galaxies.
TDEs occur when a star approaches close enough to the SMBH to be ripped apart
by its tidal force. The subsequent accretion of a fraction of the mass from the tidally disrupted star causes a characteristic
flare with a high luminosity for
a time scale of weeks to months to years, in exceptional cases \citep{1988Natur.333..523R,1989ApJ...346L..13E,1989IAUS..136..543P,2009MNRAS.392..332L}. For SMBH masses $\approxlt 10^7$~M$_\odot$ the luminosity can even exceed the Eddington luminosity (\citealt{2013ApJ...767...25G}).
Recent multi-wavelength observations have revealed a diverse set of properties for TDEs. They can roughly be divided into two categories: thermal TDEs without a strong relativistic jet and non-thermal TDEs with a relativistic jet that probably has a relatively low inclination angle with respect to our line of sight, i.e., Jetted TDEs. The inferred event rate of thermal TDEs is $10^{-5}-10^{-4}$ per year per galaxy (see \citealt{2020SSRv..216...35S} for a recent review), whereas that of the jetted TDEs is much lower as evidenced by the detection of only three jetted TDEs despite their much larger (beamed) luminosity \citep{2011Sci...333..199L,2011Natur.476..421B,2012ApJ...753...77C,2015MNRAS.452.4297B}. While some of the thermal TDEs shine brightly only in soft-X-ray wavebands (i.e., soft-X-ray TDEs) \citep[see][for a recent review]{2021SSRv..217...18S}, others are bright mainly in optical/UV wavebands (i.e., optical/UV TDEs; see \citealt[][]{2020SSRv..216..124V} for a recent review). In addition, there is a growing number of optical, radio, {\it and} X-ray bright TDEs (e.g., \citealt{2016MNRAS.455.2918H,2016Sci...351...62V,2017ApJ...851L..47G,2019MNRAS.488.4816W,2020MNRAS.499..482N,2020arXiv200505340S,2021MNRAS.tmp..840C}).
Interestingly, one of these, AT2019dsg, might also be responsible for (possible) neutrino emission \citep{2020arXiv200505340S,2021NatAs.tmp...40H}. It is proposed that the observed diversity of thermal TDEs can be explained, in part, by the viewing angle of the observer relative to the orientation of the disk angular momentum \citep{2018ApJ...859L..20D}.
In another thermal TDE, ASASSN-15oi, the X-ray emission rose 1 year after the optical/UV peak as observed by {\it Swift} and {\it XMM-Newon} \citep{2017ApJ...851L..47G}. It has been proposed that this late rise in X-ray emission in ASASSN-15oi was related to the accretion disk becoming less puffed-up with time due to a decrease in mass accretion rate and/or the settling of the accretion disk in the BH equatorial plane (\citealt{2020ApJ...897...80W}).
Besides, ASASSN-15lh is a highly luminous optical/UV transient regarded as a TDE candidate to explain the observational properties. The observed UV rebrightening at $\sim120\,{\rm days}$ after the first UV peak is interpreted by viscously-delayed, reprocessed, accretion onto the SMBH \citep{2016NatAs...1E...2L}.
Recently, using {\it Chandra} observations \citet[][J20 hereafter]{2020ApJ...889..166J} have detected X-ray emission at late times ($\approx 4.5-9$~yr) from a few optically-selected TDEs. The period (i.e., \dt) between the optical and X-ray detections is several years on average, although the X-ray coverage of the optical light curve is sparse so a shorter delay time is possible as well in many cases. In J20 it was mentioned that the \dt will depend on the TDE parameters such as $\beta$, and the mass and spin of the black hole.
Instead of the geometrical effect invoked by \citet{2020ApJ...897...80W} to explain ASASSN-15oi's behavior, which could indeed play a role as well in individual systems, in this paper, we aim to explain and quantify the \dt\,in TDEs in terms of a difference in the emission mechanisms brought about by the circularization and disk accretion processes.
\section{Viscous diffusion of the circularized disk}
\label{sec:2}
The tidal disruption radius expressed in units of the Schwarzschild radius is given by
\begin{equation}
\frac{r_{\rm t}}{r_{\rm S}}=\left(\frac{M_{\rm bh}}{m_{*}}\right)^{1/3}\frac{r_{*}}{r_{\rm S}}
\approx
24.5\,
M_{\rm bh,6}^{-2/3}\,m_{*,1}^{-1/3}\,r_{*,1}
,
\end{equation}
where $M_{\rm bh}$ is mass of the central SMBH, $m_*$ and $r_*$
are the stellar mass and radius, $r_{\rm S}=2GM_{\rm bh}/c^2$ is the
Schwarzschild radius of the SMBH, $c$ is the speed of light, and we adopt $M_{\rm bh,6}=M_{\rm bh}/10^6M_\odot$, $m_{*,1}=m_*/M_\odot$, and $r_{*,1}=r_*/R_\odot$ as fiducial values throughout the paper \footnote{As $r_{\rm t}$ is expressed in units of the Schwarzschild radius, which is in itself a function of SMBH mass, the dependence of $r_{\rm t}/r_{\rm S}$ on SMBH mass goes as M$_{\rm bh,6}$ to the power of $-2/3$.}, unless otherwise noted. We furthermore take $\beta=1$ as fiducial value, where $\beta$ is the penetration factor, which is defined as the ratio between the tidal disruption and the orbital pericenter radii of the disrupted star. After the tidal disruption of a star, the stellar debris falls back towards the SMBH and the stream will self-interact. In a so called self-interaction shock orbital energy of the stream is converted into thermal energy.
It is still debated if, and if so, how all the stellar debris efficiently circularizes by the stream-stream collision. Some hydrodynamical simulations show that the TDE disk retains a significantly elliptical shape because the orbital energy is not dissipated efficiently enough to reduce the eccentricity of the entire disk to zero in a reasonable time \citep{2014ApJ...783...23G,2015ApJ...804...85S,2016MNRAS.458.4250S}. \cite{2020MNRAS.492..686L} show that a significant fraction of the debris can become unbound causing an outflow from the self-interaction region. Nevertheless, the debris that remains bound eventually contributes to the accretion flow around the SMBH.
This part of the debris stream will finally be circularized by energy dissipation, leading to the formation of a small, initially ring-like, accretion disk around the black hole \citep{2013MNRAS.434..909H,2016MNRAS.455.2253B,2016MNRAS.461.3760H}. Note that, in an inefficient debris circularization case, the subsequent fallback material interacts with the outer elliptical debris so that their effect on the subsequent evolution of the initial ring is negligible. Angular momentum conservation allows us to estimate the circularization radius of the stellar debris, which is given by
\begin{eqnarray}
r_{\rm{c}}
=(1+e_*)r_{\rm p},
=\frac{1+e_*}{\beta}r_{\rm{t}},
\label{eq:rc}
\end{eqnarray}
where $e_*$ is the orbital eccentricity of the stellar orbit, $r_{\rm p}=r_{\rm t}/\beta$ is the pericenter distance radius. If debris circularization takes place only through dissipation at the self-interaction shock,
the circularization timescale for the non-magnetized, most tightly bound debris can be estimated
based on the ballistic approximation \citep{2017MNRAS.464.2816B} as
\begin{eqnarray}
t_{\rm circ}
&&
\approx8.3\,\eta^{-1}\,\beta^{-3}M_{\rm bh,6}^{-5/3}\,t_{\rm mtb}
\sim 0.93\,
\left(\frac{\eta}{1.0}\right)^{-1}
\beta^{-3}
M_{\rm bh,6}^{-7/6}\,m_{*,1}^{-1}\,r_{*,1}^{3/2}\,\,{\rm yr}\,,
\label{eq:tcirc}
\end{eqnarray}
where the orbital period of the stellar debris on the most tightly bound orbit:
\begin{equation}
t_{\rm mtb}=\frac{\pi}{\sqrt{2}}\frac{1}{\Omega_{*}}\left(\frac{M_{\rm bh}}{m_*}\right)^{1/2}
\approx
0.11\,
M_{\rm bh,6}^{1/2}\,m_{*,1}^{-1}\,r_{*,1}^{3/2}\,\,{\rm yr}
\label{eq:mtb}
\end{equation}
and $\Omega_{*}=\sqrt{Gm_{*}/r_{*}^{3}}$ is the dynamical angular frequency of the star, and we introduce $\eta\,(\le1)$ as the circularization efficiency which represents how efficiently the kinetic energy at the stream-stream collision is dissipated and the most efficient ($\eta=1$) case corresponds to that of \cite{2017MNRAS.464.2816B}. Note that $t_{\rm circ}$ is not the circularization timescale of all the stellar debris. Our interest here is in the circularization timescale and radius of the most tightly bound debris because the accretion of this debris contributes most to the delayed X-ray peak luminosity in terms of the emitted energy.
The mass fallback rate is given by
\begin{eqnarray}
\dot{M}=
\zeta\frac{m_{*}}{t_{\rm mtb}}\left(\frac{t}{t_{\rm mtb}}\right)^{-5/3}
\sim1.9\times10^{25}
\,
M_{\rm bh,6}^{-1/2}\,m_{*,1}^{2}\,r_{*,1}^{-3/2}
\left(\frac{\zeta}{1/3}\right)
\left(\frac{t}{t_{\rm mtb}}\right)^{-5/3}
\,\,{\rm g\,s^{-1}},
\label{eq:mdot}
\end{eqnarray}
where $\zeta=1/3$ is for the standard case \citep{1989ApJ...346L..13E,1989IAUS..136..543P}.
If a star on a slightly hyperbolic orbit is tidally disrupted by a SMBH, the resultant stellar debris is more loosely bound than the standard parabolic case, reducing the mass fallback rate significantly \citep{2018ApJ...855..129H}. These hyperbolic TDEs have $\zeta < 1/3$, and the power-law index of the temporal evolution is slightly larger than $-5/3$ \citep{2018ApJ...855..129H,2020ApJ...900....3P}.
In the discussion here, the detailed slope of the mass fallback rate is not important, therefore, we do not parametrize the temporal power-law index.
The process responsible for the high optical luminosity in TDEs is still a matter of debate. One of the promising models is
the shock-powered scenario where most of the observed optical emission is released around the self-interaction shock \citep{2015ApJ...804...85S,2015ApJ...806..164P,2020ApJ...904...73R}. By using equations (\ref{eq:mtb}) and (\ref{eq:mdot}), the peak optical luminosity is estimated to be at most
\begin{eqnarray}
L_{\rm shock}
&&
\sim\frac{GM_{\rm bh}\dot{M}(t_{\rm mtb})
}{a_{\rm mtb}}
\sim
7.1\times10^{43}\,
\left(\frac{\zeta}{1/3}\right)
M_{\rm bh,6}^{-1/6}\,m_{*,1}^{8/3}\,r_{*,1}^{-5/2}
\,\,{\rm erg/s},
\label{eq:lshock}
\end{eqnarray}
where $a_{\rm mtb}$ is the orbital semi-major axis of the most tightly bound debris. We can evaluate $a_{\rm mtb}$ by equating the debris orbital energy $|-GM_{\rm bh}/2a_{\rm mtb}|$ with the tidal potential $GM_{\rm bh}r_*/r_{\rm t}^2$ as
\begin{equation}
a_{\rm mtb}=\frac{1}{2}\frac{r_{\rm t}^2}{r_{*}}\sim3.5\times10^{14}\,M_{\rm bh,6}^{2/3}\,m_{*,1}^{-2/3}\,r_{*,1}\,\,{\rm cm},
\end{equation}
where we neglect the effect that the internal structure of the star will have on the spread of the orbital energies over the debris. Note that $L_{\rm shock}$ can be more than one order of magnitude lower if the heat produced by the shock is liberated radiatively inefficiently \citep{2016ApJ...830..125J}.
Since the energy liberated in the shock according to equation (\ref{eq:lshock}) is too low for the entire debris to be fully circularized, the remaining debris could form an eccentric disk \citep{2017MNRAS.467.1426S,2017MNRAS.472L..99L,2020MNRAS.499.5562Z,2021MNRAS.500.4110L}. However, even for an eccentric disk, the bolometric luminosity is comparable to $L_{\rm shock}$ \citep{2020MNRAS.499.5562Z}.
Substituting equation (\ref{eq:tcirc}) into equation (\ref{eq:mdot}), we obtain the mass fallback rate
after the most tightly bound debris is circularized:
\begin{eqnarray}
\frac{
\dot{M}_{\rm c}
}{\dot{M}_{\rm Edd}}
\sim0.85
\left(\frac{\eta}{0.1}\right)^{5/3}
\left(\frac{\zeta}{1/3}\right)
\beta^{5}
M_{\rm bh,6}^{23/18}\,m_{*,1}^{2}\,r_{*,1}^{-3/2}
\,\,{\rm g\,s^{-1}},
\label{eq:mdotc}
\end{eqnarray}
where $\dot{M}_{\rm Edd}=L_{\rm Edd}/c^2\simeq1.4\times10^{23}\,M_{\rm bh,6}\,{\rm g/s}$ is the Eddington accretion rate and
\begin{equation}
L_{\rm Edd}=\frac{4\pi{GM_{\rm bh}}m_{p}c}{\sigma_{\rm T}}\simeq1.3\times10^{44}\,M_{\rm bh,6}
\,\,{\rm erg/s}\,
\end{equation}
is the Eddington luminosity with the proton mass $m_{\rm p}$ and the Thomson scattering cross section $\sigma_{\rm T}$.
For the given black hole and stellar masses and the stellar radius, we obtain the condition that $\dot{M}_{\rm c}$ is smaller than $\dot{M}_{\rm Edd}$ to be sub-Eddington rate as
\begin{eqnarray}
\zeta\,\eta^{5/3}\,\beta^5\,m_{*,1}^{2}\,r_{*,1}^{-3/2}\,M_{\rm bh,6}^{23/18}\,
\lesssim8.5\times10^{-3}
\label{eq:prange}
\end{eqnarray}
Our model noted below is applicable for this parameter range.
The viscous timescale is estimated through the $\alpha$ viscosity prescription (\citealt{1973A&A....24..337S}) as
\begin{equation}
t_{\rm vis}(r)=\frac{r_{\rm }^2}{\nu_{\rm vis }}\approx\frac{1}{\alpha}\frac{1}{\Omega}
\left(\frac{H}{r}\right)^{-2}
\sim
14
\left(\frac{\alpha}{0.1}\right)^{-1}
\left(\frac{H/r}{0.01}\right)^{-2}
\left(\frac{r}{r_{\rm c}}\right)^{3/2}
\left(\frac{1+e_*}{2}\right)^{3/2}
\beta^{-3/2}
m_{*,1}^{-1/2}
r_{*,1}^{3/2}
\,\,\rm yr\,,
\label{eq:tvis}
\end{equation}
where $\nu_{\rm vis}=\alpha{c_{\rm s}}H$, $\alpha$ is the Shakura-Sunyaev viscosity parameter, $c_{\rm s}$ is the sound speed in the disk, $H$ is the disk scale height, and $\Omega=\sqrt{GM_{\rm bh}/r^3}$ is a Keplerian angular frequency of the disk. Adopting the standard disk model \citep{1973A&A....24..337S}, the square of the disk scale-height
at $r_{\rm c}$ is estimated to be
\begin{eqnarray}
\left(\frac{H}{r_{\rm c}}\right)^2
\sim
1.0\times10^{-4}\,
\left(\frac{\alpha}{0.1}\right)^{-1/5}
\left(\frac{\zeta}{1/3}\right)^{2/5}
\left(\frac{1+e_*}{2}\right)^{1/10}
\beta^{19/10}
M_{\rm bh,6}^{11/45}
m_{*,1}^{23/30}
r_{*,1}^{-1/2}.
\label{eq:hr2}
\end{eqnarray}
Substituting equation (\ref{eq:hr2}) into (\ref{eq:tvis}), we obtain the viscous diffusion timescale at $r_{\rm c}$ as
\begin{equation}
t_{\rm c}
=
\frac{4}{3}t_{\rm vis}(r_{\rm c})
\approx
19
\left(\frac{\alpha}{0.1}\right)^{-4/5}
\left(\frac{\zeta}{1/3}\right)^{-2/5}
\left(\frac{1+e_*}{2}\right)^{7/5}
\beta^{-17/5}
M_{\rm bh,6}^{-11/45}
m_{*,1}^{-19/15}
r_{*,1}^{2}
\,\,\rm yr\,
.
\label{eq:tc}
\end{equation}
Because $t_{\rm c}$ is much longer than the circularization timescale of the most tightly bound debris,
the subsequent disk evolves viscously.
\subsection{Evolution and structure of a time-dependent accretion disk}
Let us describe the subsequent disk evolution. We assume that the disk is one-dimensional (1D), axisymmetric.
Mass and angular momentum conservation laws of the viscous accretion disk for a point-mass gravitational potential
provide the equation for the surface density evolution as (e.g., see \citealt{2002apa..book.....F,2008bhad.book.....K} and references therein)
\begin{eqnarray}
\frac{\partial\Sigma}{\partial t}=-\frac{2}{r}\frac{\partial}{\partial r}
\left[
\left(\frac{r}{GM}\right)^{1/2}
\frac{\partial}{\partial r}
(r^2\mathcal{T}_{r\phi})
\right],
\label{eq:diskevo}
\end{eqnarray}
where $\mathcal{T}_{r\phi}=\nu_{\rm vis}\Sigma{r}{d\Omega/dr}=-(3/2)\nu_{\rm vis}\Sigma\Omega$
is the viscous stress tensor of the disk in Keplerian rotation.
Adopting for the viscous stress tensor with a power-law index $\delta$
\begin{eqnarray}
\mathcal{T}_{r\phi}=\mathcal{T}_{r\phi,c}
\left(\frac{\Sigma}{\Sigma_{\rm c}}\right)
\left(\frac{r}{r_{\rm c}}\right)^{\delta},
\label{eq:shearst}
\end{eqnarray}
we can make equation (\ref{eq:diskevo}) dimensionless \citep{1998bhad.book.....K,2008bhad.book.....K}
\begin{eqnarray}
\frac{\partial \sigma}{\partial\tau}=\frac{1}{\xi^3}\frac{\partial^2}{\partial\xi^2}(\xi^{2\delta+4}\sigma),
\label{eq:diskevo2}
\end{eqnarray}
where $\sigma=\Sigma/\Sigma_{\rm c}$ with
$\Sigma_{\rm c}$ being the surface density at the circularization radius $r_{\rm c}$, $\tau=t/t_{\rm c}$, and $\xi=(r/r_{\rm c})^{1/2}$.
From equations (\ref{eq:tvis}) and (\ref{eq:shearst}),
$t_{\rm vis}(r)\propto{r}^{1-2\delta}$ so that $\delta$ should be smaller than $1/2$ in order for the viscous
timescale to be longer at larger radius. Because $\nu$ is only a power-law function of radius from equation~(\ref{eq:shearst}), we can analytically
solve equation (\ref{eq:diskevo2}) by using the Green's function \citep{1974MNRAS.168..603L}.
The solution with the zero torque boundary is then given by
\begin{equation}
\sigma(\xi,\tau)
=
\mu\frac{\xi^{(2-9\mu)/2\mu}}{\tau}\exp\left[-\frac{\mu^2(\xi^{1/\mu}+1)}{\tau}\right]\mathcal{I}_{\mu}\left(\frac{2\mu^2\xi^{1/2\mu}}{\tau}\right),
\label{eq:sd}
\end{equation}
where $\mathcal{I}_\mu(z)$ is the modified Bessel function and $\mu=1/(1-2\delta)$.
We show the surface density evolution for the three different times in Figure~{\ref{fig:sdtemp}},
where $\mu=1/4$ (i.e., $\delta=-3/2$) is adopted.
The disk has initially a ring-like structure, which is shown in the black solid line, and subsequently
evolves viscously. The red and blue solid lines show the surface densities at $\tau=0.01$ and $\tau=0.1$, respectively. The figure shows that the circularized ring-like most-bound debris formed at $\tau=0$ accretes onto the SMBH
at $\tau=0.1$, leading to a delayed X-ray flare. The time it takes for the debris to be accreted by the SMBH can be evaluated using equation (\ref{eq:tc}):
\begin{equation}
t_{X}=\tau_{X}t_{\rm c}
\approx
1.9
\left(\frac{\tau_X}{0.1}\right)
\left(\frac{\alpha}{0.1}\right)^{-4/5}
\left(\frac{\zeta}{1/3}\right)^{-2/5}
\left(\frac{1+e_*}{2}\right)^{7/5}
\beta^{-17/5}
M_{\rm bh,6}^{-11/45}
m_{*,1}^{-19/15}
r_{*,1}^{2}
\,\,{\rm yr}\,,
\label{eq:tacc}
\end{equation}
where $\tau_{X}=t_X/t_{\rm c}$ and our solution indicates $\tau_X=0.1$ as a typical value of $\tau_X$.
The time delay between the optical and X-ray flares is then determined by the sum of $t_{\rm circ}$ and $t_{X}$ (equations \ref{eq:tcirc} and \ref{eq:tacc}) as
\begin{eqnarray}
\Delta t_{\rm O-X}
&=&t_{\rm circ} + t_{X}
\approx
8.3\,
\left(\frac{\eta}{0.1}\right)^{-1}
\beta^{-3}
M_{\rm bh,6}^{-7/6}\,m_{*,1}^{8/25}\,
\,\,{\rm yr}
\nonumber \\
&+&
1.6\,
\left(\frac{\tau_X}{0.1}\right)
\left(\frac{\alpha}{0.1}\right)^{-4/5}
\left(\frac{\zeta}{1/3}\right)^{-2/5}
\left(\frac{1+e_*}{2}\right)^{7/5}
\beta^{-17/5}
M_{\rm bh,6}^{-11/45}
m_{*,1}^{37/75}
\,\,{\rm yr}\,,
\label{eq:tox}
\end{eqnarray}
where we adopt the approximate formula of the stellar mass-radius relation:
\begin{eqnarray}
r_{*,1}=0.93\,m_{*,1}^{0.88},
\label{eq:mr}
\end{eqnarray}
which is valid over the range of $0.15\,M_\odot\le{m_*}\le3\,M_\odot$ \citep{2020ApJ...904...99R}, incorporating the dependence on $r_{*,1}$ into that of $m_{*,1}$. We find that \dt\,depends strongly on the penetration factor $\beta$, while it depends less strongly on mass of the disrupted star. While $t_{\rm circ}$ becomes rapidly shorter with increasing black hole mass, $t_{X}$ depends less strongly on the black hole mass. As a result, \dt is shorter the larger the black hole mass. By substituting equation~(\ref{eq:mr}) into equation (\ref{eq:prange}), the condition that $\dot{M}_{\rm c}<\dot{M}_{\rm Edd}$ is simplified to be
\begin{eqnarray}
\zeta\,\eta^{5/3}\,\beta^5\,m_{*,1}^{17/25}\,M_{\rm bh,6}^{23/18}\,
\lesssim7.6\times10^{-3}
\label{eq:prange1}
\end{eqnarray}
This inequality shows the parameter space where our model is applicable for given black hole and stellar masses. Figure~\ref{fig:prange} shows the dependence of $\dot{M}_{\rm c}/\dot{M}_{\rm Edd}$ on the penetration factor.
Panel (a) represents our fiducial model with $M_{\rm bh,6}=1$ and $m_{*,1}=1$, while panel (b) shows
the case for a lower stellar mass $m_{*,1}=0.15$. Panels (c) and (d) are for $M_{\rm bh,6}=0.1$, and also panels (e) and (f) are for $M_{\rm bh,6}=10$. The solid black, red, and blue lines denote the $(\eta,\zeta)=(0.1,1/3)$, $(\eta,\zeta)=(0.01,1/3)$, and $(\eta,\zeta)=(0.1,1/12)$ cases, respectively. While the sub-Eddington accretion is dominant in the region below the horizontal dashed line, the super-Eddington accretion is dominant in the region above the horizontal dashed line.
Figure~\ref{fig:dt} shows the dependence of \dt on $\beta$ for different stellar and black hole mass and for given other parameters: $\tau_X=0.1$, $\alpha=0.1$, and $e_*=1$. Note that similar to the effect of changing $M_{\rm bh}$ or $m_{*}$,
changing $\tau_X$ or $\alpha$ affects the height of each curve. The solid line represents \dt, whereas the dotted line represents $t_X$. Both \dt and $t_X$ decrease rapidly with increasing $\beta$ as seen in equations (\ref{eq:tacc}) and (\ref{eq:tox}).
Since \dt is defined as the sum of the circularization timescale and $t_X$, the difference between the solid and dotted lines gives the circularization timescale. The circularization timescale accounts for a large fraction of \dt in a large part of the parameter space.
As seen in equation (\ref{eq:tox}), the circularization timescale $t_{\rm circ}$ is proportional to $M_{\rm bh}^{-7/6}$ whereas $t_X$ is proportional to $M_{\rm bh}^{-11/45}$ so that
\dt is closer to $t_X$ with increasing black hole mass. In fact, as seen in panels (e) and (f), the difference is significantly smaller for $M_{\rm bh,6}=10$ case than for the other two cases of the $M_{\rm bh,6}=0.1$ and $M_{\rm bh,6}=1$. Also, $\eta$ is an important parameter for estimating \dt; a smaller $\eta$ results in a longer $t_{\rm circ}$ and by definition a longer \dt. Since $\eta$ does not affect $t_X$, the deviation between the solid and dotted lines becomes larger for a smaller $\eta$. In summary,
$\Delta{t}_{\rm O-X}$ is dominated by ${t}_X$ for $M_{\rm bh,6}\gg1$ and a larger $\eta$, while $\Delta{t}_{\rm O-X}$ is dominated by ${t}_{\rm circ}$ for $M_{\rm bh,6}\ll1$ and a smaller $\eta$. The possible range for $\beta$ such that the accretion rate is sub-Eddington is seen in the corresponding panels of Figure~\ref{fig:prange}. We conclude that our model can explain an observed time delay of a year to dozens of years between the optical and X-ray flares.
\subsection{Spectra of a time-dependent disk}
Since the disk is effectively optically thick, the energy liberated by viscous heating is emitted through
black body radiation. That is to say, $Q_{\rm rad}=Q_{\rm vis}$, where $Q_{\rm rad}=2\sigma{T^4}$ and $Q_{\rm vis}=-(3/2)\mathcal{T}_{r\phi}\Omega$.
We then obtain the blackbody temperature by substituting equation~(\ref{eq:shearst}) into $2\sigma{T^4}=-(3/2)\mathcal{T}_{r\phi}\Omega$,
\begin{eqnarray}
T(\xi,\tau)=T_{\rm c}
\left(\frac{\mathcal{T}_{r\phi}}{\mathcal{T}_{r\phi,{\rm c}}}\right)^{1/4}
\left(\frac{\Omega}{\Omega_{\rm c}}\right)^{1/4}
=
T_{\rm c}
\left(\frac{\Sigma}{\Sigma_{\rm c}}\right)^{1/4}
\left(\frac{r}{r_{\rm c}}\right)^{\delta/4-3/8}
=
T_{\rm c}
\sigma(\xi,\tau)^{1/4}\xi^{\delta/2-3/4}.
\label{eq:tempxi}
\end{eqnarray}
The lower panel of Figure~\ref{fig:sdtemp} depicts the corresponding temperature evolution of the disk.
In the spectral range where the electron scattering opacity $\kappa_{\rm es}=0.4\,{\rm cm^2\,g^{-1}}$ dominates the free-free absorption opacity $\kappa_{\rm ff}=1.5\times10^{25}\rho{T}^{-7/2}(1-e^{-h\nu/kT})/(h\nu/k_{\rm b}T)^3\,{\rm cm^2\,g^{-1}}$, the emergent specific intensity, $I_\nu$, is modified from $B_\nu$ to be $\kappa(\nu,T)B_\nu$ \citep{1972A&A....17..226F,1973A&A....24..337S}, where $h$ is the Planck constant, $k$ is the Boltzmann constant, $B_\nu$ is the Planck function, and $\kappa(\nu,T)$ is a distortion factor for the outgoing radiation from the disk surface:
\begin{eqnarray}
\kappa(\nu,T)=\frac{2}{1+\sqrt{(\kappa_{\rm ff}+\kappa_{\rm es})\kappa_{\rm ff}^{-1}}}
\label{eq:kappa}
\end{eqnarray}
\citep{1979rpa..book.....R,2008bhad.book.....K}.
Note that $\kappa(\nu,T)\approx1$ in the spectral range of $\kappa_{\rm es}\ll\kappa_{\rm ff}$ so that $I_\nu\approx{B}_\nu$. The flux density emerging from an accretion disk is expressed in the solid angle integral \citep{2002apa..book.....F,2008bhad.book.....K} as
\begin{eqnarray}
F_\nu
&=&
2\pi\frac{\cos{i}}{D^2}
\int_{R_{\rm in}}^{R_{\rm out}}\,I_{\nu}\,r\,dr
=
4\pi\frac{\cos{i}}{D^2}\frac{h}{c^2}\nu^3\int_{R_{\rm in}}^{R_{\rm out}}\frac{r\kappa(\nu,T)}{e^{h\nu/kT}-1}dr,
\label{eq:fnu}
\end{eqnarray}
where $i$ is the angle between the observer's line of sight and the normal to the disk plane,
$D$ is the distance to the Earth, and $R_{\rm in}$ and $R_{\rm out}$ are the radii of the disk inner and outer edge, respectively.
The spectral luminosity follows from equation (\ref{eq:fnu}) as
\begin{eqnarray}
L_\nu(\xi,\tau)=4\pi{D^2}\nu{F}_{\nu}=32\pi^2\cos{i}\frac{h\nu^4r_{\rm c}^2}{c^2}\int_{\xi_{\rm in}}^{\xi_{\rm out}}\frac{\xi^3\kappa(\nu,T)}{e^{h\nu/kT(\xi,\tau)}-1}d\xi,
\label{eq:lnu_xi}
\end{eqnarray}
where $\xi_{\rm in}=R_{\rm in}/r_{\rm c}$, $\xi_{\rm out}=R_{\rm out}/r_{\rm c}$, $\rho_{c}=\Sigma_{\rm c}/(2H_{\rm c})$ is the mass density at $r_{\rm c}$.
For the purpose of comparing equation (\ref{eq:lnu_xi}) with the blackbody spectral luminosity emitted from the standard disk,
setting $x\equiv{h\nu}/kT$ together with $T=T_{\rm in}(r/R_{\rm in})^{-p}$, the spectral luminosity is estimated to be
\begin{eqnarray}
L_\nu
&&
=
16\pi^2
\cos{i}
\frac{1}{p}
\frac{h\nu^4R_{\rm in}^2}{c^2}
\left(\frac{kT_{\rm in}}{h\nu}\right)^{2/p}
P(\nu;x_{\rm in},x_{\rm out})
\nonumber \\
&&
=4.0\times10^{44}\,
\left(\frac{3/4}{p}\right)
\left(\frac{k_{\rm b}T_{\rm in}}{h\nu_{\rm in}}\right)^{2/p}
\left(\frac{T}{T_{\rm in}}\right)^{2/p}
\left(\frac{\nu}{\nu_{\rm in}}\right)^{4-2/p}
\left[\frac{P(\nu;x_{\rm in},x_{\rm out})}{P(\nu;0,\infty)}\right]
\,{\rm erg/s}\,,
\label{eq:lnu}
\end{eqnarray}
where $p=3/4$ is the standard disk value, $x_{\rm in}=h\nu/kT_{\rm in}$, $x_{\rm out}=x_{\rm in}(R_{\rm out}/R_{\rm in})^p$, $R_{\rm in}=3r_{\rm S}\approx8.9\times10^{11}\,(M_{\rm bh}/10^6M_\odot)\,{\rm cm}$,
$T_{\rm in}=\epsilon_{\rm obs}/k_{\rm b}\approx1.2\times10^6\,(\epsilon_{\rm obs}/0.1\,{\rm keV})\,{\rm K}$,
and $\nu_{\rm in}=k_{\rm b}T_{\rm in}/h\approx2.4\times10^{16}\,(\epsilon_{\rm obs}/0.1\,{\rm keV})\,{\rm Hz}$ are
adopted, and $P(\nu;x_{\rm in},x_{\rm out})\equiv\int_{x_{\rm in}}^{x_{\rm out}}x^{2/p-1}(e^{x}-1)^{-1}dx$ and $P(\nu;0,\infty)\approx1.93$. We note that $R_{\rm in}$ changes as a function of the black hole spin (\citealt{1972ApJ...178..347B}).
Figure~\ref{fig:lumi} shows the spectral luminosity at respective time steps: $\tau=0.001$, $\tau=0.01$, and $\tau=0.1$ for two different inclination angles. The blue solid line shows the spectral luminosity of our time-dependent model at $\tau_X=0.1$, whereas the green dashed line shows the spectral luminosity of a standard, i.e., steady-state, disk model corresponding to our mode at $\tau_X=0.1$.
It can be seen from Figure~\ref{fig:lumi} that there is no large difference in the spectral energy distribution between the $\tau_X=0.1$ disk and the standard disk save for the slightly larger luminosity for the standard disk at the low energy side. The magenta solid line represents the spectral luminosity calculated based on the multi-color modified blackbody spectrum of our model at $\tau_X=0.1$. The multi-color modified blackbody disk luminosity is significantly lower than the multi-color blackbody disk luminosity at the high-energy side, whereas it is in good agreement with the multi-color blackbody disk luminosity at the low-energy side. This is because, as seen in equation~(\ref{eq:kappa}), $I_\nu$ is smaller than $B_{\nu}$ for $\kappa_{\rm ff}\ll\kappa_{\rm es}$ in the high temperature region of the disk, whereas $I_\nu\approx{B_\nu}$ for $\kappa_{\rm ff}\gg\kappa_{\rm es}$ in the low temperature region. Also, it is clear that the optical luminosity coming from the disk at early times is very low. This suggests the origin of the optical emission should be sought elsewhere, and the shock-powered optical luminosity caused by the debris self-interaction is a good contender model. In contrast, at late times, after a fraction of the viscous timescale has passed, the soft X-ray luminosity is a small fraction of the Eddington luminosity if the line of sight corresponds to the disk mid-plane, i.e., $i\approx90^\circ$ (edge-on view). This can explain the late-time X-ray luminosity observed in several optically discovered TDEs (J20). On the other hand, the X-ray luminosity gets close to the Eddington luminosity in the $i=0^\circ$ (pole-on) case.
This is also consistent with what \cite{2018ApJ...859L..20D} proposed before, i.e., the soft-X-ray luminosity becomes higher (lower) when the viewing angle, $i$, decreases (increases). According to the general relativistic radiation magnetohydrodynamic simulations of \cite{2018ApJ...859L..20D}, the lower the viewing angle is, the more dominant the effect of the hotter temperature side of the blackbody radiation on the spectral distribution becomes, and the whole distribution shifts to the higher energy side, resulting in a larger X-ray luminosity with a lower viewing angle. In our model, on the other hand, since the spectral distribution is simply proportional to $\cos\theta$ as seen in equations~(\ref{eq:lnu_xi}) and (\ref{eq:lnu}), the X-ray luminosity becomes larger when the viewing angle is lower. The properties of the small sample of sources studied in J20, both their non-detection as well as the relatively low X-ray luminosities are not inconsistent with this picture because the X-ray luminosity depends strongly on several other parameters, e.g., $\beta$, $m_{*}$, and $r_{*}$, and the values in the TDEs studied in J20 can depart from the fiducial values we adopted here.
\section{Summary and Discussion}
\label{sec:dis}
We have studied the black-body emission from a 1D time-dependent accretion disk formed after debris circularization
to explain the significant time difference between the optical and and subsequent X-ray detection in several optically selected TDEs. We have solved equation (\ref{eq:diskevo}) using the separation of variables method and the Green's function. \cite{1990ApJ...351...38C} solved the same diffusion equation as equation (\ref{eq:diskevo}) using a self-similar solution method and then found that the light curve deviates from $t^{-5/3}$ at late times. Both methods are good for calculating the secular, long-term evolution of the disk. In particular, our model is suitable for the so-called initial value problem, i.e., how the disk accretes diffusively from the initial ring-like structure to the SMBH. However, since our model makes the simplifying assumption that the viscous torque is a power-law function of radius and surface density as in equation (\ref{eq:shearst}), the general behavior needs to be checked using numerical calculations. Also, if the disk is thermally unstable, we need to solve the disk evolution and structure numerically with the energy equation (e.g., \citealt{1991PASJ...43..147H}). These cases and their influence on \dt~will be investigated in future work.
According to the shock powered scenario, the early-time optical emission is caused by energy dissipation from the shock formed due to the debris stream self-interaction at the orbital semi-major axis of the most tightly bound debris. The debris's orbital energy is subsequently dissipated such that the most tightly bound debris is evolving towards circularization. The circularized disk viscously evolves as seen in the {\it top} panel (a) of Figure 1. The disk initially has a ring-like structure around the circularization radius. In our model, material of the disk accretes onto the SMBH by viscous diffusion for one-tenth of the viscous timescale. As seen in equation~(\ref{eq:tox}), the time delay between the optical and X-ray flares is the sum of the circularization timescale and the accretion timescale so that the viscous accretion is one of the two essential factors to cause the delayed X-ray emission. This delay amounts to $~\sim2$ years for typical parameters after the peak of optical emission in the optical/UV TDEs if the mass fallback rate is sub-Eddington (our fiducial parameters are a $10^6$~M$_\odot$ black hole, a $1~{\rm M}_{\odot}$ star, $\beta=1$, $e_*=1$, $\zeta=1/3$, and $\alpha=0.1$). We find that the viscous timescale is most sensitive to the penetration factor, $\beta$, whereas the viscous timescale is relatively insensitive to the black hole mass. Note that although the second-most sensitive parameters are stellar mass and radius, the effect of the two parameters on $t_{\rm X}$ cancels each other out by the mass-radius relation for the main-sequence star, resulting in being insensitive for the stellar mass. On the other hand, the circularization timescale also strongly depends on $\beta$ and is sensitive to the circularization efficiency and the black hole mass, whereas it is insensitive to the stellar mass. The delay by the debris circularization amounts $\sim8$ years for the fiducial parameters, where we adopt $\eta=0.1$ as the fiducial circularization efficiency. The resultant time delay \dt significantly decreases with increasing penetration factor. This strong dependence of $\beta$ on \dt is seen in Figure~\ref{fig:dt} with the dependence of the other parameters. Note that these parameters should satisfy the condition for the sub-Eddington accretion $\zeta\,\eta^{5/3}\,\beta^5\,m_{*,1}^{17/25}\,M_{\rm bh,6}^{23/18}\,\lesssim7.6\times10^{-3}$ (see equation~\ref{eq:prange1} and Figure~\ref{fig:prange}). The fiducial \dt is longer than $\sim10\,{\rm years}$ for $\beta\lesssim1$, while it is shorter than $1\,{\rm year}$ for $\beta\gtrsim2.2$. This suggests that the observed long-term \dt ($4\sim10\,{\rm years}$) for several TDEs involves a star that is tidally disrupted at $\beta\gtrsim1$, while the observed short-term \dt ($\sim1\,{\rm year}$) for TDEs correspond to relatively high penetration factor disruptions.
Next, let us consider what happens to the optical-X-ray time delay if mass accretes onto the SMBH at a super-Eddington rate, $\dot{M}_{\rm c}>\dot{M}_{\rm Edd}$ (see equation \ref{eq:mdotc}), i.e., when $\zeta\,\eta^{5/3}\,\beta^5\,m_{*,1}^{17/25}\,M_{\rm bh,6}^{23/18}\,>7.6\times10^{-3}$.
The viscous timescale is $10^4$ times as short for the geometrically thick ($H/r\sim1$) compared to the geometrically thin disk case (see equation~\ref{eq:tvis}) so that $t_X<t_{\rm vis}\ll{t}_{\rm circ}$. Therefore, $\Delta{t}_{\rm O-X}=t_X+t_{\rm circ}\approx{t_{\rm circ}}$ because of $t_X\ll{t}_{\rm circ}$. However, we need to confirm whether there is effectively no continuous super-Eddington accretion onto the SMBH during the circularization through self-consistent radiation hydrodynamic simulations of the circularization process using the energy equation including radiative cooling, advective cooling, and viscous heating. Furthermore, we need to quantify the disk spectrum of the super-Eddington accretion flow based on the slim disk model \citep{1988ApJ...332..646A} for estimating the spectral luminosity of the delayed X-ray flare. We will tackle these problems in the future.
In addition, the viewing angle, which is defined as the angle between the normal to the disk plane and the line of sight, is an important parameter in setting the observed X-ray luminosity. The X-ray luminosity decreases significantly as a function of inclination angle. If the viewing angle goes to zero, the X-ray emission of our fiducial model can reach the luminosity between one-tenth of the Eddington luminosity and the Eddington luminosity. On the other hand, the X-ray luminosity decreases to be less than or approximately equal to one-hundredth of the Eddington luminosity if the viewing angle is close to $90^\circ$. Another important parameter determining the luminosity of the disk black-body radiation is the black hole spin. If the black hole has a maximum positive (prograde) spin, the disk's inner edge is two-thirds smaller than that in the non-rotating case, leading to the larger luminosity in the soft-X-ray waveband (\citealt{1972ApJ...178..347B}, see also figures 2 of both \citealt{2020ApJ...897...80W} and \citealt{2021arXiv210406203M}).
\begin{acknowledgments}
The authors thank the anonymous referee for fruitful comments and suggestions. The authors also thank Nicholas C. Stone for his helpful comments.\,\,The authors acknowledge the Yukawa Institute for Theoretical Physics at Kyoto University,
where this work was initiated thanks to the YITP-T-19-07 International
Molecule-type Workshop, "Tidal Disruption Events: General Relativistic Transients".\,\,K.H. has been supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2016R1A5A1013277 and 2020R1A2C1007219).
\end{acknowledgments}
\begin{figure}[!htbp]
\centering
\includegraphics[width=14cm]{fig1a.pdf}
\includegraphics[width=14cm]{fig1b.pdf}
\caption{
Evolution of the surface density profile ({\it top panel}) and the corresponding temperature evolution ({\it bottom panel}) as a function of the dimensionless disk radius expressed in units of the circularization radius ($\xi=\sqrt{r/r_{\rm c}}$) for a time-dependent accretion disk. The $\tau$ represents time normalized by $t_{\rm c}$ (the viscous time at $r_{\rm c}$, see equation 12).
In both panels, the different colors indicate the associated time $\tau$. The mass is initially distributed in a narrow ring around the circularization radius and it spreads and heats up (at the inner radii) due to conservation of angular momentum and viscous heating as time progresses.
}
\label{fig:sdtemp}
\end{figure}
\begin{figure}[!htbp]
\centering
\resizebox{8.5cm}{!}{\includegraphics{fig2a.pdf}}
\resizebox{8.5cm}{!}{\includegraphics{fig2b.pdf}}\\
\resizebox{8.5cm}{!}{\includegraphics{fig2c.pdf}}
\resizebox{8.5cm}{!}{\includegraphics{fig2d.pdf}}\\
\resizebox{8.5cm}{!}{\includegraphics{fig2e.pdf}}
\resizebox{8.5cm}{!}{\includegraphics{fig2f.pdf}}
\caption{
Parameter space of sub- and super-Eddington accretion for given black hole and stellar mass (see also equation~\ref{eq:prange1}). Each panel shows the dependence of $\dot{M}_{\rm c}/\dot{M}_{\rm Edd}$ on the penetration factor. Panel (a) represents the fiducial model with $M_{\rm bh,6}=1$ and $m_{*,1}=1$, while panel (b) shows the case for the disruption of a lower stellar mass $m_{*,1}=0.15$ star. Panels (c) and (d) are for $M_{\rm bh,6}=0.1$, and panels (e) and (f) are for $M_{\rm bh,6}=10$. The solid black, red, and blue lines denote the $(\eta,\zeta)=(0.1,1/3)$, $(\eta,\zeta)=(0.01,1/3)$, and $(\eta,\zeta)=(0.1,1/12)$ case, respectively.
}
\label{fig:prange}
\end{figure}
\begin{figure}[!htbp]
\centering
\resizebox{8.5cm}{!}{\includegraphics{fig3a.pdf}}
\resizebox{8.5cm}{!}{\includegraphics{fig3b.pdf}}\\
\resizebox{8.5cm}{!}{\includegraphics{fig3c.pdf}}
\resizebox{8.5cm}{!}{\includegraphics{fig3d.pdf}}\\
\resizebox{8.5cm}{!}{\includegraphics{fig3e.pdf}}
\resizebox{8.5cm}{!}{\includegraphics{fig3f.pdf}}
\caption{
Dependence of \dt on the penetration factor for given black hole and stellar mass (the other fiducial parameters and their values are $\tau_X=0.1$, $\alpha=0.1$, and $e_*=1$, see also equation \ref{eq:tox}). Panels (a,c,e) and (b,d,f) show the $m_{*,1}=1$ and $m_{*,1}=0.15$ cases, respectively. In each panel, the solid black, red, and blue lines denote the $(\eta,\zeta)=(0.1,1/3)$, $(\eta,\zeta)=(0.01,1/3)$, and $(\eta,\zeta)=(0.1,1/12)$ cases, respectively.
Each panel shows the dependence of \dt on the different black hole mass and the different stellar mass. Note that this mass dependence format of each panel is the same as that of Figure~\ref{fig:prange}.
}
\label{fig:dt}
\end{figure}
\begin{figure}[!htbp]
\centering
\includegraphics[width=11.5cm]{fig4a.pdf}
\includegraphics[width=11.5cm]{fig4b.pdf}
\caption{
Evolution of the normalized spectral luminosity of the time-dependent disk corresponding to the two panels in Figure 1. In both panels, the black, red, and blue solid lines represent the disk spectral luminosities at $\tau=0.001$, $\tau=0.01$, and $\tau=0.1$ respectively computed using equation (\ref{eq:lnu_xi}) with $\kappa(\nu,T)=1$, while the dashed green line shows the spectral luminosity computed using equation (\ref{eq:lnu}) with the radial temperature profile of the standard disk. The magenta solid line represents the spectral luminosity of the modified blackbody disk spectrum at $\tau=0.1$. Here, the outgoing emission deviates from a blackbody disk spectrum due to electron scattering dominating the opacity, i.e., $\kappa(\nu,T)\neq1$. While the upper panel shows the $i=0$ (pole-on) case, the lower panel shows the $i\approx90^\circ$ (edge-on) case. Note the different values on the y-axis for the two panels.
}
\label{fig:lumi}
\end{figure}
|
\section{Introduction}
\label{sec:introduction}
Despite its remarkable success the Standard Model (SM) of particle physics fails to explain neutrino oscillations, origin of matter-antimatter asymmetry of the Universe, and the nature of Dark Matter (DM). It has been suggested in refs.~\cite{Asaka:2005an,Asaka:2005pn} that all these shortcomings of the SM can be simultaneously addressed in its minimal extension with three singlet Majorana fermions, the $\nu$MSM.
The lightest of the three, $N_1$, is the DM particle with mass of the keV scale~\cite{Dodelson:1993je,Shi:1998km,Abazajian:2001nj,Asaka:2006nq,Laine:2008pg,Shaposhnikov:2020aen}. The other two, $N_2$ and $N_3$ are responsible for both the active neutrino masses via the see-saw mechanism~\cite{Minkowski:1977sc,Yanagida:1979as,GellMann:1980vs,Mohapatra:1979ia,Schechter:1980gr,Schechter:1981cv} and the generation of baryon asymmetry of the Universe (BAU) through coherent oscillations of heavy neutrinos~\cite{Akhmedov:1998qx,Asaka:2005pn}.
The latter ones are called heavy neutral leptons, HNLs in short. Notably, even after the freeze-out of sphalerons the $N_2$ and $N_3$ can keep producing lepton asymmetry~\cite{Shaposhnikov:2008pf,Canetti:2012kh}, which we refer to as late-time lepton asymmetry (LTA).
This asymmetry is crucial for the resonantly enhanced mechanism of sterile neutrino DM production~\cite{Shi:1998km}. If the concentration of DM is zero\footnote{\label{other_mechanisms}This is not necessarily the case. As has been found recently in ref.~\cite{Shaposhnikov:2020aen}, DM sterile neutrinos
can be created after inflation by universal four-fermion interaction in Einstein-Cartan gravity. Similar conclusions can be reached if the $\nu$MSM is supplemented by higher dimensional operators~\cite{Bezrukov:2011sz}.}
at $T\simeq100$~GeV, the resonant production seems to be the only option in the $\nu$MSM framework, since the astrophysical X-ray bounds on active-sterile neutrino mixing and mass bound from structure formation rule out (see, e.g.~\cite{Boyarsky:2018tvu}) the non-resonant production mechanism of \cite{Dodelson:1993je}.
The LTA has to be quite large, of order $10^{-5}$ in units $n/s$, where $n$ is a number density and $s$ is the entropy density. This asymmetry is generated after the freeze-out of the sphalerons so that its value doesn't contradict the observed BAU. To be relevant, it has to survive until temperatures around $\sim 200$~MeV, when the resonant production of DM takes place~\cite{Shi:1998km,Abazajian:2001nj,Asaka:2006nq,Laine:2008pg}.
Baryogenesis in the $\nu$MSM has attracted considerable attention from both theoretical (an incomplete list of related refs.~\cite{Shaposhnikov:2006nn,Shaposhnikov:2008pf,Canetti:2010aw,Asaka:2010kk,Anisimov:2010gy,Asaka:2011wq,Besak:2012qm,Canetti:2012vf,Drewes:2012ma,Canetti:2012kh,Shuve:2014zua,Bodeker:2014hqa,Abada:2015rta,Hernandez:2015wna,Ghiglieri:2016xye,Hambye:2016sby,Hambye:2017elz,Drewes:2016lqo,Asaka:2016zib,Drewes:2016gmt,Hernandez:2016kel,Drewes:2016jae,Asaka:2017rdj,Eijima:2017anv,Ghiglieri:2017gjz,Eijima:2017cxr,Antusch:2017pkq,Ghiglieri:2017csp,Eijima:2018qke,Ghiglieri:2018wbs,Ghiglieri:2019kbw,Bodeker:2019rvr,Ghiglieri:2020ulj,Klaric:2020lov,Domcke:2020ety}) and experimental (see, e.g. \cite{Liventsev:2013zz,Aaij:2014aba,Artamonov:2014urb,Aad:2015xaa,Khachatryan:2015gha,Antusch:2017hhu,CortinaGil:2017mqf,Izmaylov:2017lkv,Mermod:2017ceo,Drewes:2018gkc,Ballett:2019bgd,Sirunyan:2018mtv,SHiP:2018xqw,Boiarska:2019jcw,NA62:2020mcv,Tastet:2020tzh}) sides. One of the reasons for such an interest is the testability of the model in the current and planned experimental facilities, such as LHC~\cite{Sirunyan:2018mtv,Boiarska:2019jcw,Aad:2019kiz,Wulz:2019lsz}, NA62~\cite{NA62:2020mcv,Tastet:2020tzh,Drewes:2018gkc}, SHiP~\cite{Alekhin:2015byh,SHiP:2018xqw}, MATHUSLA~\cite{Curtin:2018mvb}, CODEX-b~\cite{Gligorov:2017nwh}, FASER~\cite{Feng:2017uoz,Kling:2018wct}, and ANUBIS~\cite{Hirsch:2020klk}.
On the contrary, the study of the LTA generation has been performed only in a few works, ref.~\cite{Canetti:2012kh,Canetti:2012vf,Ghiglieri:2019kbw,Ghiglieri:2020ulj}. In fact, {\em if one accepts that both BAU and resonantly produced DM are the consequence of the $\nu$MSM see-saw Lagrangian~\cite{Minkowski:1977sc,Yanagida:1979as,GellMann:1980vs,Mohapatra:1979ia,Schechter:1980gr,Schechter:1981cv}}, the requirement of the generation of LTA big enough to explain the sterile neutrino DM abundance is the most restrictive one~\cite{Canetti:2012kh,Canetti:2012vf,Ghiglieri:2020ulj}. Given the potential of the forthcoming experiments---especially SHiP---to study a large portion of the parameter space below B-meson mass, it is important to clarify if the HNLs responsible for both BAU and LTA production are within the experimental reach.
\begin{figure}[h]
\centering
\includegraphics[width=\textwidth]{fig/sketch.pdf}
\caption{Interaction rates of two HNLs as functions of temperature (HNL mass is $1$~GeV, see figure~\ref{fig:rates} for more details). In this and the other similar plots time goes from right to left. There are three characteristic temperatures at which the HNL rates cross the Hubble rate and large asymmetry can in principle be generated: $T_{in}$, $T_{out}$, and $T_{dec}$. In this work we consider asymmetry generation around $T_{in}$.}
\label{fig:sketch}
\end{figure}
Let us briefly summarize a possible scenario of the evolution of the Universe within the $\nu$MSM. Right after inflation the baryon and lepton numbers of the Universe as well as the number of HNLs may well be zero, and we will assume in the present paper that this is indeed the case~\cite{Bezrukov:2008ut} (see, however, ref.~\cite{Shaposhnikov:2020aen} and footnote~\ref{other_mechanisms}). The baryon asymmetry of the Universe is produced in a set of processes including coherent oscillations of HNLs, exchange of the lepton number between the HNLs and active leptons, and anomalous sphaleron transitions \cite{Akhmedov:1998qx,Asaka:2005pn}. The behaviour of HNLs after baryogenesis can be qualitatively understood from figure~\ref{fig:sketch} showing their equilibration rates. It is seen that HNLs enter in thermal equilibrium at $T_{in}$, which exceeds a few tens of GeV, and subsequently go out of equilibrium at $T_{out} \sim 1$~GeV.
Owing to Sakharov non-equilibrium conditions, the lepton asymmetries can be generated at three instances: at freeze-in (temperature $T_{in}$), at freeze-out $T_{out}$, and during the HNL decays, at $T_{dec}$. The latter two possibilities have been considered in \cite{Shaposhnikov:2008pf,Canetti:2012kh}. At the time these papers were written, the freeze-in LTA produced at $T_{in}$ was believed to be inessential. The arguments \cite{Shaposhnikov:2008pf,Canetti:2012kh} were based on the fact that at $T_{out}<T<T_{in}$ the HNLs are in thermal equilibrium and thus all asymmetry which could have been produced at $T_{in}$ will be erased.
In fact, the situation happened to be more complicated \cite{Eijima:2017anv, Ghiglieri:2017gjz}. In-spite of the fact that the HNL equilibration is much faster than the rate of the Universe expansion, some combination of lepton numbers and HNL asymmetries remains approximately conserved, and thus is protected from wash-out. As a result, one can expect that part of LTA produced above $T_{in}$ survives till the low temperatures.~\cite{Eijima:2017anv, Ghiglieri:2017gjz}. So the question arises whether this asymmetry is enough for the DM production.
The present study aims at providing a quantitative answer to this question.
The paper is organised as follows. We start section~\ref{sec:generation_of_asymmetry} from a brief description of the main ingredients entering the calculation of asymmetries in the $\nu$MSM. In section~\ref{sub:hnl_decays_and_injection_of_entropy} we quantify the effect of entropy injection caused by the HNL decays. In section~\ref{sub:most_efficient_asymmetry_generation} we analyse the regime in which one can expect large LTA in the freeze-in scenario. In section~\ref{sec:results} the previous considerations are put on the quantitative level by performing a scan of the parameter space. We also discuss possible uncertainties of the kinetic description of the system. In section~\ref{sec:chiral_asymmetriy_and_magnetic_fields} we address the question whether the presence of Abelian chiral anomaly and possible asymmetry transfer into helical magnetic fields may play a role in LTA generation. We argue that such effects may indeed be important and therefore should be systematically accounted for. In particular, the maximal value of the electron asymmetry reached during the evolution of the system could influence the final asymmetry. Therefore in section~\ref{sec:maximal_electron_asymmetry} we perform a scan of the parameter space looking for the maximal electron asymmetry.
In section~\ref{sec:possible_uncertainties_of_kinetic_equations} we discuss possible uncertainties of the state-of-the-art approach based on the kinetic equations which we adopt in this work. Finally, section~\ref{sec:discussion} contains our conclusions and outlook.
\section{Generation of asymmetry}
\label{sec:generation_of_asymmetry}
In this section we summarize the main ingredients required for the calculation of the BAU and LTA in the $\nu$MSM. All notations coincide with those of~\cite{Eijima:2018qke} to which we refer for further details.
The Lagrangian of the system is the well known see-saw
one~\cite{Minkowski:1977sc,Yanagida:1979as,GellMann:1980vs,Mohapatra:1979ia,Schechter:1980gr,Schechter:1981cv}.
We present it below in order to fix the notations.
In
the basis where charged lepton Yukawa couplings and the Majorana mass
term for the right-handed neutrinos are diagonal the Lagrangian can be written in the following form.
\begin{equation}
\mathcal{L} = \mathcal{L}_{SM} + i \bar{\nu}_{R_I} \gamma^\mu \partial_\mu
\nu_{R_I}
- F_{\alpha I} \bar{L}_\alpha \tilde{\Phi} \nu_{R_I} - \frac{M_{I J}}{2}
\bar{\nu}_{R_I}^c \nu_{R_J} + h.c.,
\label{Lagr}
\end{equation}
where $\mathcal{L}_{SM}$ is the SM Lagrangian, $\nu_{R_I}$ are right-handed neutrinos, $I, J = 1, 2, 3$, $F_{\alpha I}$ is the matrix of
Yukawa couplings, $L_\alpha$ are the left-handed lepton doublets, $\alpha = e, \mu, \tau$ and $\tilde{\Phi} = i\sigma_2 \Phi^*$,
$\Phi$ is the Higgs doublet.
Upon diagonalising the mass matrix following from~\eqref{Lagr} one finds three light mass eigenstates $\nu_i$ and three heavy mass eigenstates $N_I$. At the leading order of the see-saw mechansim $N_I = \nu_{R_I}$, whereas $\nu_{L \alpha}=U_{\alpha i} \nu_{i}+\Theta_{\alpha I} N_{I}^{c}$, $U_{\alpha i}$ is the PMNS matrix.
In the last equation we have introduced the mixing angle $\Theta_{\alpha I} = v_0 F_{\alpha I}/M_I$, where $v_0=174$~GeV is the Higgs vacuum expectation value. see, e.g. ref.~\cite{Asaka:2011pb}.
The lightest right-handed neutrino is the dark matter candidate. The values of its Yukawa coupling constants are significantly constrained by astrophysical observables. As a consequence, the contributions to the
active neutrino masses are negligibly small~\cite{Asaka:2005an}. Therefore only two heavier HNLs provide neutrino masses and participate in the generation of both BAU and LTA. In what follows we will limit our consideration to these two heavier HNLs, $N_2$ and $N_3$.
The only input from the lightest sterile neutrino is the value of the LTA required to boost the DM production. This value is not unique and depends upon the active-sterile mixings and the mass of $N_1$. The thorough study of DM production can be found in ref.~\cite{Ghiglieri:2015jua}.
Not all choices of Yukawas are compatible with the measured masses and mixings of active neutrinos. A convenient way of accounting for the oscillation data is given by the Casas-Ibarra parametrisation~\cite{Casas:2001sr}. In this parametrisation all Yukawas consistent with the observed oscillation data are determined by the following 6 parameters: the common mass $M$ of two HNLs; mass splitting $\Delta M$; two CP violating phases of the PMNS matrix $\delta$ and $\eta$\footnote{In the case of two HNLs, the PMNS matrix contains only one independent Majorana phase. Using PDG conventions one can identify the phase $\eta$ with $(\alpha_{21} - \alpha_{31})/2$ in the case of normal hierarchy and $\alpha_{21}/2$ in the case of inverted hierarchy.}; real and imaginary parts of a complex angle $\omega$. The real part of $\omega$ enters all expressions as $\exp(-i \,\rew)$. The imaginary part $\imw$ controls the size of the Yukawas, namely
$|F_{\alpha\, I}| \propto \exp(\imw)$ for large positive $\imw$ and $|F_{\alpha\, I}| \propto \exp(-\imw)$ for large negative $\imw$.
Description of the evolution of the system comprising two HNL species and the SM degrees of freedom is rather complicated. The reason is that the asymmetry production is a genuinely non-equilibrium phenomenon and it involves many processes, such as scatterings and decays of HNLs, their coherent oscillations, transfer of the asymmetry to leptons and their back reaction,
and redistribution of the asymmetry among the SM degrees of freedom.
These processes can be systematically accounted for in the integro-differential kinetic equations~\cite{Asaka:2005pn,Shaposhnikov:2008pf} which have to be solved numerically.
In this work we use the equations of ref.~\cite{Eijima:2018qke}.\footnote{These equations have been derived in the relativistic approximation. As a result, the Boltzmann suppression is not present in the terms proportional to $f_{\nu} (1-f_{\nu})$. We have confirmed numerically that this suppression does not change the results for the whole mass range considered here. The more general form of kinetic equations can be found in ref.~\cite{Klaric:2020lov}.}
These equations provided a unified description of low-scale leptogenesis models, including both resonant leptogenesis and baryogenesis via oscillations~\cite{Klaric:2020lov}.
They can be written in terms of the matrix of densities $\rho_N$ of two HNLs ($\rho_{\bar{N}}$ for HNLs of opposite helicity) and the densities of the combinations
$\Delta_\alpha = L_\alpha - B/3$ for $\alpha = e, \mu, \tau$ which are not affected by the sphaleron processes.
\begin{subequations}
\begin{align}
i \frac{d n_{\Delta_\alpha}}{dt}
&= - 2 i \frac{\mu_\alpha}{T} \int \frac{d^{3}k}{(2 \pi)^{3}} \Gamma_{\nu_\alpha} f_{\nu} (1-f_{\nu}) \,
+ i \int \frac{d^{3}k}{(2 \pi)^{3}} \left( \, \text{\text{Tr}}[\tilde{\Gamma}_{\nu_\alpha} \, \rho_{\bar{N}}]
- \, \text{\text{Tr}}[\tilde{\Gamma}_{\nu_\alpha}^\ast \, \rho_{N}] \right),\label{kin_eq_a0}
\\
i \, \frac{d\rho_{N}}{dt}
&= [H_N, \rho_N]
- \frac{i}{2} \, \{ \Gamma_{N} , \rho_{N} - \rho_N^{eq} \}
- \frac{i}{2} \, \sum_\alpha \tilde{\Gamma}_{N}^\alpha \, \left[ 2 \frac{\mu_\alpha}{T} f_{\nu} (1-f_{\nu}) \right],\label{kin_eq_b0}
\\
i \, \frac{d\rho_{\bar{N}}}{dt}
&= [H_N^\ast, \rho_{\bar{N}}]
- \frac{i}{2} \, \{ \Gamma_{N}^\ast , \rho_{\bar{N}} - \rho_N^{eq} \}
+ \frac{i}{2} \, \sum_\alpha (\tilde{\Gamma}_{N}^\alpha)^\ast \, \left[ 2 \frac{\mu_\alpha}{T} f_{\nu} (1-f_{\nu}) \right],
\label{kin_eq_c0}
\end{align}
\label{kin_eq}\end{subequations}
where $f_\nu = \left( e^{k/T}+1 \right)^{-1} $ is the Fermi-Dirac distribution function of a massless neutrino in equilibrium,
$\rho_N^{eq} = diag(1,1) \left( e^{E_N/T}+1 \right)^{-1}$ is the matrix of densities of HNLs in equilibrium and $E_{N}=\sqrt{k^{2} + M^{2}}\;$.
Chemical potentials to $\Delta_\alpha$ are related to the number densities as $\mu_\alpha = \omega_{\alpha \beta}(T) n_{\Delta_\beta}$,
where $\omega_{\alpha \beta}(T)$ is the (inverse) susceptibility matrix, see, e.g.~\cite{Ghiglieri:2016xye,Eijima:2017cxr}.
Notice that equations \eqref{kin_eq} agree with linearised equations from refs.~\cite{Ghiglieri:2017gjz,Ghiglieri:2019kbw,Bodeker:2019rvr}.
All the processes listed above are encoded in the rates entering the kinetic equations. Computation of these rates poses a theoretical challenge on its own~\cite{Anisimov:2010gy,Ghiglieri:2017gjz}. Here we use the results of the state-of-the-art computations of ref.~\cite{Ghiglieri:2018wbs}.
Solving integro-differential kinetic equations is very time consuming, so to allow for a scan of the parameter space we simplify them.
Namely, we assume that the matrix of densities of the HNLs is proportional to the equilibrium one. This ansatz allows reducing the infinite system of integro-differential equations to a set of 11 ordinary differential equations with averaged rates.
However, one needs to keep in mind that this ansatz is rather ad hoc and can be justified only by solving the full system.
This complicated and computer resource-demanding task has been performed in refs.~\cite{Asaka:2011wq, Ghiglieri:2017csp}.
Results of these works suggest that there is a reasonable agreement between the exact and averaged calculations. The asymmetries obtained from the averaged
equations are typically within a factor of two agreement with the accurate ones.
At the end of this section we introduce for convenience the so-called yields $Y_X$
\begin{equation}
Y_X\equiv \frac{n_X}{s}, \quad n_X = \int\frac{dk^3}{(2 \pi)^3} \rho_X,
\label{yield}
\end{equation}
where we use the entropy density $s$ as computed in refs.~\cite{Laine:2006cp,Laine:2015kra}.
These quantities are not affected by the expansion of the Universe without extra entropy injection.
\section{HNL decays and injection of entropy}
\label{sub:hnl_decays_and_injection_of_entropy}
The HNLs that have participated in the generation of BAU and LTA eventually decay into the SM particles. Slow decays of the HNLs eject additional entropy, thus diluting the otherwise conserved quantities, such as $Y_B$ or $n_{DM}/s$ \cite{Scherrer:1984fd,Asaka:2006ek}.
This effect can be accounted for directly in eqs.~\eqref{kin_eq}~\cite{Ghiglieri:2019kbw}.
However, since the freeze-in asymmetry generation takes place well before the decays of HNLs, one can facilitate the numerics by computing the effect of the entropy injection separately.
The HNL decays take place at low temperatures and the corresponding rates can be approximated \cite{Canetti:2012kh} by zero-temperature vacuum decay widths of the HNLs~\cite{Gorbunov:2007ak,Bondarenko:2018ptm}.\footnote{
Our results slightly differ from those in ref.~\cite{Ghiglieri:2019kbw}. The reason is that the we use the zero-temperature width of HNLs which accounts for all decay channels~\cite{Gorbunov:2007ak,Bondarenko:2018ptm}, whereas an effective number of flavours is used in~\cite{Ghiglieri:2019kbw}.}
The diagonal elements of the matrix $\Gamma_N$ are given by~\cite{Canetti:2012kh}
\begin{equation}
\left( \Gamma_N^{\rm \,dec} \right)_{II} = \left( F^\dagger F \right)_{II} \frac{M_I}{E_N} \sum_{X_\alpha} \frac{\Gamma(N_I \to X_\alpha)}{ |F_{\alpha I}|^2},
\label{low_T_rates}
\end{equation}
where the sum goes over all allowed final states $X_\alpha$ containing a lepton of flavour $\alpha$ and $\Gamma$ is the partial decay width in the rest frame of an HNL.
We add expression~\eqref{low_T_rates} to $\Gamma_N$ which is mostly determined by ``indirect'' contributions (i.e. those proportional to Higgs vev rather than to temperature, see e.g. ref.~\cite{Ghiglieri:2016xye}). Owing to the factor $M_I/E_N$ the decay rates~\eqref{low_T_rates} decrease at high temperatures.
As an example, the total rates for $M = 1$~GeV HNLs
are shown in the upper panel of figure~\ref{fig:rates}.
One can expect from figure \ref{fig:rates} that the HNLs with $|\imw| \ll 1$ will deviate from equilibrium at $T = \mathcal{O}(1)$~GeV. They will start to decay at temperatures around $\mathcal{O}(10)$~MeV when $\Gamma_I$, which at low temperatures are determined by the vacuum decays and do not explicitly depend on temperature, surpass the Hubble rate again. These decays cause extra entropy injection~\cite{Scherrer:1984fd,Asaka:2006ek} as shown in the lower panel of figure~\ref{fig:rates}.
\begin{figure}[htb!]
\centering
\includegraphics[width=0.9\textwidth]{fig/rates_and_Y.pdf}
\caption{\emph{Upper panel:} the ratio $\Gamma_I/H$ as a function of temperature. Green and orange curves correspond to $\left( \Gamma_N \right)_{22}$ and $\left( \Gamma_N \right)_{33}$. Horizontal line is placed at $\Gamma_I/H = 1$.
\emph{Central panel:} Actual number density of HNLs normalized to the entropy density (solid lines) and the equilibrium one (dashed line). HNLs deviate from equilibrium when the rates cross the Hubble rate.
\emph{Lower panel:} dilution factor $s\,a^3$ as a function of temperature. Out-of-equilibrium decays of HNLs increase the value of $s\, a^3$.
The parameters are fixed to the values $M=1$~GeV, $\Delta M = 10^{-11}$~GeV, $\imw = 2\times10^{-3}$, $\rew = 0.5 \pi$, $\delta = 1.5 \pi$, and $\eta = 0.5 \pi$.}
\label{fig:rates}
\end{figure}
In order to quantify this statement we follow the procedure of ref.~\cite{Ghiglieri:2019kbw} using the rates as in eq.~\eqref{low_T_rates}. We solve the corresponding kinetic equations from temperature $T_{in} = 5$~GeV till $T_{fin} = 0.1$~MeV numerically for different masses of the HNLs and compute the dilution factor $s a^3$, where $a$ is the scale factor.
As introduced in the section~\ref{sec:generation_of_asymmetry} $Y_X$ is a conserved quantity if there are no processes changing the number density of particle species $X$ and the entropy in the co-moving volume.
In fact the baryon to entropy ratio $Y_B$ freezes out at $T<T_{sph}\simeq130$~GeV, and the generation of lepton asymmetries $Y_{\Delta_\alpha}$ also stops at temperatures below $\sim10$~GeV.
It is the entropy injection diminishes both $Y_B$ and $Y_{\Delta_\alpha}$ subsequently.
Since this dilution happens after HNLs cease generating $Y_B$ and $Y_{\Delta_\alpha}$,
it is sufficient to compute $s\,a^3$ independently and then use the fact that
$Y_X(T_{fin}) = Y_X(T_{in}) (s\, a^3)_{in} / (s\, a^3)_{fin}$.
The dilution factor for various values of $\Im \omega$ is shown in figure~\ref{fig:dilution}, in which we normalized $(s\, a^3)_{in} = 1$.
It is large if the HNL decays are slow, that corresponds to small mixings and small masses. For a given mass the mixing takes its smallest value for $\imw = 0$.
\begin{figure}[h]
\centering
\includegraphics[width=0.6\textwidth]{fig/dilution_factor.pdf}
\caption{Dilution factor $s\,a^3$. All yields $Y_X =n_X/s$ are effectively divided by this factor. The upper line corresponds to $\Im \omega = 0$: the smallest Yukawas, the long lived HNLs, the maximal dilution.
The lower line corresponds to $\Im \omega = 2$, in this case Yukawas are larger and the HNLs decay faster.}
\label{fig:dilution}
\end{figure}
Note that the upper black curve in figure~\ref{fig:dilution} should be treated with caution. Indeed, a very light HNL may be long-lived, thus
causing problems with Big-Bang nucleosynthesis~\cite{Dolgov:2000jw,Ruchayskiy:2012si,Gelmini:2020ekg,Sabti:2020yrt,Boyarsky:2020dzc}.
\section{The most efficient asymmetry generation}
\label{sub:most_efficient_asymmetry_generation}
The dynamics described by system \eqref{kin_eq} depends on the parameters in a complicated way.
For example, as we have already mentioned, $ \exp \left( \imw \right) $ controls the size of the Yukawas and hence the size
of the damping rates $\Gamma_N$, $\Gamma_{\nu_\alpha}$, and the efficiency of the asymmetry transfer from HNL to neutrino sector and back. Therefore large $|\imw|$ causes efficient asymmetry generation and, at the same time, its efficient wash-out. In this section we qualitatively describe a regime in which large lepton asymmetry can be produced after the electroweak phase transition. The findings of this section are quantitatively confirmed in the next one.
The major obstacle to large asymmetries at low temperatures is the wash-out. However, the wash-out is not always efficient. Since there are many different rates, let us illustrate the statement considering the following parameter set.
\begin{equation}
\begin{aligned}
M & =2.0\text{~GeV}, \quad \Delta M = 0.983\times10^{-11}\text{~GeV},\quad \imw = -2.754\times 10^{-3}, \\
\rew &= 0.551 \, \pi, \quad \delta = 0.993 \, \pi, \quad \eta = 1.479 \, \pi.
\end{aligned}
\label{example_parameters}
\end{equation}
The HNL damping rates $\Gamma_N$ for the parameter set~\eqref{example_parameters}
are shown in the upper panel of figure~\ref{fig:example}, in which the HNL rates cross the Hubble rate around $50-100$~GeV.
The other rates exhibit very similar patterns.
Soon after $\Gamma_N/H$ becomes larger than $1$, HNL densities start to follow equilibrium line $Y^{eq}\simeq 0.0025$ (the second panel in figure~\ref{fig:example}).
Let us, however, consider the total asymmetry in the HNL sector
\begin{equation}
\Delta_{N}=\left[\int \frac{d^{3} k}{(2 \pi)^{3}} \operatorname{Tr}\left(\rho_{N}-\rho_{\bar{N}}\right)\right].
\label{HNL_asym}
\end{equation}
Evolution of $\Delta_N/s$ is shown in the third panel of figure~\ref{fig:example} (red dashed curve). One can see that the asymmetry is much smaller than $Y^{eq}\simeq 0.0025$ but it is non-vanishing. In fact, the value $(\Delta_N/s)/Y^{eq}\sim 10^{-3}$ is surprisingly large given that the HNL rates exceed the Hubble rate by several orders of magnitude.
\begin{figure}[h]
\centering
\includegraphics[width=0.6\textwidth]{fig/rates_highT.pdf}
\includegraphics[width=0.6\textwidth]{fig/rhoN_evol.pdf}
\includegraphics[width=0.6\textwidth]{fig/evol_plot.pdf}
\includegraphics[width=0.6\textwidth]{fig/Tosc.pdf}
\caption{An example of generation of large LTA.
\emph{The first panel} displays two eigenvalues of the HNL equilibration rate $\Gamma_N$ divided by the Hubble rate $H$ as functions of temperature $T$.
\emph{The second panel} shows the HNL yields as functions of $T$. The green dotted line indicates the equilibrium yield. \emph{The third panel} shows the evolution of the lepton asymmetries (solid lines) and HNL asymmetry (dashed line)~\eqref{HNL_asym}. \emph{The fourth panel} shows the number of HNL oscillations (see eq.~\eqref{Tosc}).
Having $T_{osc}/T\simeq1$ in the region where the eigenvalues of the rate $\Gamma_N$
cross the Hubble rate maximizes generated asymmetry. The model parameters are specified in eq.~\eqref{example_parameters}.}
\label{fig:example}
\end{figure}
In order to understand why the asymmetry $\Delta_N$ is partially preserved during the period of equilibrium, it is instructive to
rewrite the kinetic equations in the matrix form
\begin{equation}
\frac{d n(T)}{dT} = A(T) n(T) + n^{S}(T),
\label{matrix_form}
\end{equation}
where $n(T)$ is a column with $11$ real entries (3 lepton asymmetries $Y_{\Delta_\alpha}$, diagonal elements of hermitian matrices $Y_\pm$, and real and imaginary parts of the off-diagonal elements of
$Y_\pm$), $n^{S}(T)$ is a column of source terms associated with time derivative of $\rho_N^{eq}$. Above we introduced $Y_+ = ( Y_N+Y_{\bar{N}} )/2 - Y^{eq}$ and $Y_- = Y_N-Y_{\bar{N}}$, see~\cite{Eijima:2018qke} for details. For the HNL masses we are considering here, the source term is irrelevant\footnote{Precisely speaking, the deviation from equilibrium caused by the expansion of the Universe could drive the asymmetry generation, see, e.g.~\cite{Klaric:2020lov}. However, the asymmetries generated in this way are at most of order $\sim 10^{-7}$, i.e., several orders of magnitude smaller than the required ones.}
and the whole information is contained in the matrix $A(T)$.
The imaginary parts of the eigenvalues of $A(T)$ describe oscillations, whilst the real parts correspond to production and wash-out of asymmetries.
The real parts of the smallest and the largest eigenvalues of $A$ as functions of temperature are shown in figure~\ref{fig:eigen}.
\begin{figure}[h]
\centering
\includegraphics[width=0.6\textwidth]{fig/eigenvalues.pdf}
\caption{The real parts of the smallest (blue) and the largest (orange) eigenvalues of the matrix $A$ normalized to the Hubble rate as functions of temperature.}
\label{fig:eigen}
\end{figure}
As one can see, the smallest eigenvalue exceeds the Hubble rate only in a relatively short temperature interval.
This means that the linear combination of the variables corresponding to this eigenvalue is almost conserved.
The weight coefficients of this linear combinations vary with temperature.
We have performed a numerical scan with $M\leq 5$~GeV and found
two combinations
\begin{equation}
L_{\pm} \simeq \Delta_{N} \mp \sum_{\alpha} \Delta_{\alpha},
\label{conserved_combination}
\end{equation}
which are nearly conserved either at $T \gtrsim 150$~GeV ($L_-$) or $T\lesssim20$~GeV ($L_+$). In the intermediate region the linear combination corresponding to the smallest eigenvalue is more complicated and contains all $11$ variables $n(T)$ entering equation~\eqref{matrix_form}.
Combinations~\eqref{conserved_combination} correspond to the approximately conserved quantum numbers identified in ref.~\cite{Eijima:2017anv} (notation in~\eqref{conserved_combination} is chosen to match that of ref.~\cite{Eijima:2017anv}). Indeed, as it has been shown in refs.~\cite{Eijima:2017anv} and~\cite{Ghiglieri:2017gjz}, the time derivative of $L_-$ is proportional to fermion number violating (helicity-conserving) rates which are suppressed in the symmetric phase. In turn, the time derivative of $L_+$ is proportional to the fermion number conserving rate~\cite{Eijima:2017anv} which becomes small at low temperatures. One particular consequence of the approximate conservation of $L_+$
is that $\Delta_N \simeq - \Delta_\alpha$ at low temperatures. Numerical solution of the kinetic equations confirms this observation, as can be seen in the third panel
of figure~\ref{fig:example}.
We see that the presence of an almost conserved combination corresponding to the smallest eigenvalue of $A$ protects the asymmetry from being completely washed out.
As we have already mentioned, the value of $|\imw|$ controls the size of Yukawa couplings.
The values of Yukawas determine in turn
the eigenvalues of the matrix $A$. Therefore, if we are interested in the presence
of a small eigenvalue, $|\imw|$ should be close to zero.
Now once we have clarified how the asymmetry can survive, we need to understand how it can be generated. Thermally produced asymmetry is enhanced by the oscillations of the HNLs~\cite{Akhmedov:1998qx,Asaka:2005an}. This mechanism is the most efficient around the first few oscillations. The number of oscillations is given by $T_{osc}^3/T^3$, where
\begin{equation}
T_{osc} \simeq \left( M \delta M M_0 /3 \right)^{1/3}.
\label{Tosc}
\end{equation}
The physical mass difference of HNLs $\delta M$ is given by
\begin{equation}
\delta M = \frac{E_N}{2 M} \Delta \lambda,
\label{dM_def}
\end{equation}
with $\Delta \lambda = \lambda_2 - \lambda_1$, where $\lambda_{1,2}$ are the eigenvalues of the effective Hamiltonian $H_N$ entering eqs.~\eqref{kin_eq}.
In order to clarify the parametric dependence of the physical mass difference, we present the corresponding expression at
zero temperature (in the case of normal hierarchy of neutrino masses, NH for short).
\begin{equation}
\left( \delta M \right)^2 \simeq \Delta M^{2}+\Delta M\left(m_{3}-m_{2}\right) \cos (2 \Re \omega)+\frac{1}{4}\left(m_{3}-m_{2}\right)^{2}+\mathcal{O} \left( \left( \frac{\Delta M}{M} \right)^2 \right) ,
\label{dM_zeroT}
\end{equation}
where $m_{2,3}$ are the masses of active neutrinos and
${m_3-m_2 \simeq \sqrt{m_{atm}^2}\simeq 5 \times 10^{-11}~\text{GeV} }$\footnote{In the framework of the $\nu$MSM the mass of the lightest active neutrino is negligibly small~\cite{Asaka:2005an}.}.
The similar expression in the case of inverted hierarchy (IH) can be obtained by replacing ${m_{2} \rightarrow m_{1}, m_{3} \rightarrow m_{2}}$.
The terms containing active neutrino masses at zero temperature in \eqref{dM_zeroT} originate from the Yukawa interactions in the Lagrangian. If there are no cancellations between Majorana $\Delta M$ and Yukawa contributions to the physical mass difference, the physical mass splitting is larger than the atmospheric mass difference.
In this case the oscillation temperature is bounded from below by
\begin{equation}
T_{osc} \gtrsim 180~\text{GeV} \left( \frac{M}{1 \text{GeV}} \right)^{1/3}.
\label{bound_Tosc}
\end{equation}
This temperature exceeds $T_{sph}\simeq 130$~GeV. Therefore to generate large lepton asymmetry which would not contradict the measured value of BAU, one has to lower $T_{osc}$.
This can be achieved if $\rew \simeq \pi/2$. In this case the second term in \eqref{dM_zeroT} is negative and can offset two other terms.
The last requirement is that the first oscillation has to take place when the rates are large but HNLs are not in equilibrium yet, like in the lower panel of figure~\ref{fig:example}. This can be achieved for each value of $M$ by a specific choice of $\Delta M, \; \rew, \; \imw$ and two phases. In order to identify such choices we have performed a scan of the parameter space which is described in the next section.
\section{Late-time lepton asymmetries}
\label{sec:results}
In this section we present the main results obtained through the numerical solution of equations \eqref{kin_eq} integrated over momentum. First, we briefly discuss the resonant mechanism of sterile neutrino dark matter production and required late-time lepton asymmetries. Next, we describe the numerical procedure and present the main results and comment on them.
\subsection{Required LTA}
\label{sub:required_lta}
As we have already mentioned, thermal DM production~\cite{Dodelson:1993je} via mixing with active neutrinos cannot be responsible for $100\%$ of DM abundance~\cite{Asaka:2006nq} given the astrophysical X-ray bounds on the active-sterile mixing. Large lepton asymmetry, if present at temperatures ${T_{\rm prod}\sim 200}$~MeV, can boost the DM production~\cite{Shi:1998km}.
Computation of the asymmetry that is needed for producing the correct abundance of DM have been performed in refs.~\cite{Shi:1998km,Abazajian:2001nj,Asaka:2006rw,Asaka:2006nq,Laine:2008pg,Ghiglieri:2015jua}. The recent analysis of ref.~\cite{Bodeker:2020hbo} confirmed the findings of ref.~\cite{Ghiglieri:2015jua}.
Moreover, the results depend upon the flavour structures of the neutrino Yukawa couplings and different types of pre-existing lepton asymmetries.
Here we follow ref.~\cite{Ghiglieri:2015jua}, which uses $M_{DM}=7.1$~keV as a benchmark.
According to table 1 of ref.~\cite{Ghiglieri:2015jua}, the minimal initial asymmetry at $T= 4$~GeV yielding the correct dark matter abundance is $Y_{\nu_e}=Y_{\nu_\mu}=Y_{\nu_\tau} \simeq 11\times 10^{-6}$.
Note that all lepton asymmetries are equal at low temperatures owing to presence of the two types of the rates~\cite{Eijima:2017anv}.
This translates into
\begin{equation}
Y_L \equiv \sum_\alpha Y_{\Delta_\alpha} \simeq 66\times 10^{-6},
\label{required_total}
\end{equation}
where we have defined the total lepton asymmetry $Y_L$.\footnote{The total asymmetry as it defined here also contains the BAU contribution. However, since $Y_B\ll Y_L$ in all interesting cases, this contribution can be safely neglected.}
Theoretical errors, mainly coming from hadronic uncertainties are expected at the level $10-20 \%$~\cite{Ghiglieri:2015jua}.
Note that the value \eqref{required_total} is not taking into account the effect of the entropy dilution discussed in section~\ref{sub:hnl_decays_and_injection_of_entropy}. If the two HNLs are sufficiently light and feeblely coupled, their slow out-of-equilibrium decays which take place at $T\ll T_{\rm prod}$ inject additional entropy and, as a consequence, the otherwise conserved quantities, like $Y_B$ or $Y_{DM}$ become smaller. We will address this effect below.
\subsection{Numerical procedure and the main results}
\label{sub:numerical_procedure_and_the_main_results}
Now our aim is to clarify whether the asymmetry at level \eqref{required_total} can be indeed generated via the mechanism described in section~\ref{sec:generation_of_asymmetry}. To answer this question we have performed a scan of the parameter space. Equations~\eqref{kin_eq} were solved numerically using the Fortran code based on LSODE~\cite{LSODE}, see ref.~\cite{Eijima:2018qke} for details. The parameters considered in the scan are listed in table~\ref{table_parameters}.
First we have scanned over the broad range of the parameters and identified the most interesting region. In this region (dubbed ``large LTA'' in table \ref{table_parameters}) we performed more detailed scans.
\begin{table}[htb!]
\begin{center}
\begin{tabular}{| c | c | c | c | c | c | c |}
\hline
$M$, GeV & $\log_{10} (\Delta M/\mbox{GeV})$ & $\imw$ & $\rew$ & $\delta$ &
$\eta$ & range:\\ \hline
$[0.1 - 30]$ & $[-17,-9]$ & $[-2,2]$ & $[0, 2\pi]$ &$[0, 2\pi]$ & $[0, 2\pi]$ &broad range\\
\hline
$[0.1 - 30]$ & $[-12,-10]$ & $[-0.2,0.2]$ & $[0.4\pi, 0.6\pi]$ &$[0, 2\pi]$ & $[0, 2\pi]$ &large LTA\\
\hline
\end{tabular}
\end{center}
\caption{\label{table_parameters} Parameters of the theory:
common mass; Majorana mass difference; imaginary and real parts of $\omega$;
Dirac and Majorana phases.
In the second line we indicate the full ranges of these parameters which were considered in this work, whereas the third line corresponds to more restricted region where large LTA can be generated.}
\end{table}
It is interesting to note that even for $\delta = 0, \eta = 0$ large asymmetry can be generated.
Let us stress that sufficiently large LTA can only be generated in the case of normal hierarchy of neutrino masses.
Our numerical analysis confirmed qualitative considerations of section~\ref{sub:most_efficient_asymmetry_generation} for $M<5$~GeV. Namely, $|\imw| \ll 1$ to ensure the smallness of the rates; $\rew \simeq \pi/2$ to allow for cancellations between Majorana and Higgs contributions to the physical mass difference, see figure~\ref{fig:scatter_plot}.
\begin{figure}[h]
\centering
\includegraphics[width=0.6\textwidth]{fig/dM_scatter.png}
\includegraphics[width=0.6\textwidth]{fig/Imw_scatter.png}
\includegraphics[width=0.6\textwidth]{fig/Rew_scatter.png}
\caption{Dependence of the total lepton asymmetry on the parameters $\Delta M$ (upper panel), $\imw$ (middle panel), and $\rew$ (lower panel). Every point corresponds to a certain parameter set in the scan. Dependence on the Majorana and Dirac phases is rather flat and therefore we do not show it here.}
\label{fig:scatter_plot}
\end{figure}
LTA as a function of $\imw$ and Majorana mass difference $\Delta M$ is shown in figure~\ref{fig:dm_imw_orig}.
As one can see from the figure, large asymmetry $ Y_L \equiv \sum_\alpha Y_{\Delta_\alpha}$ can be generated if $\imw$ is sufficiently small.
In this region the mixing angles between active neutrinos and HNLs denoted by $\Theta_{\alpha I}$ take their minimal values near the so-called "see-saw bound" $\imw=0$.
For example, the mixing summed over the lepton flavours and HNL generations reads
\begin{equation}
|U|^2\equiv\sum_{\alpha, I} |\Theta_{\alpha I}|^2 = \frac{m_2+m_3}{M} \left[ \exp\left( 2\,\imw \right) +\exp\left( - 2\,\imw \right) \right].
\end{equation}
\begin{figure}[h]
\centering
\includegraphics[width=0.6\textwidth]{fig/dM_Imw_2GeV.pdf}
\includegraphics[width=0.6\textwidth]{fig/dM_Imw_30GeV.pdf}
\caption{LTA as a function of $\imw$ and Majorana mass difference $\Delta M$. Large value of LTA can be obtained for $\imw$ close to zero for
sufficiently light HNLs ($M = 2$~GeV , upper panel). For heavier HNLs ($M = 30$~GeV, lower panel) another mechanism is operative and hence $\imw$ deviates from zero and mass splitting is smaller, see the main text for more detailed explanation.}
\label{fig:dm_imw_orig}
\end{figure}
In figure~\ref{fig:LTA} we show the maximal value of LTA as a function of HNL mass. LTA can be indeed large for quite light HNLs, but such HNLs cannot generate enough asymmetry by the time of the sphaleron freeze-out and thus BAU is smaller than the observed value. Generated asymmetry can still be large even if we require that the observed amount of BAU is generated, as is shown by the green shape in the figure.
\begin{figure}[h]
\centering
\includegraphics[width=0.6\textwidth]{fig/LTA_total.pdf}
\includegraphics[width=0.6\textwidth]{fig/LTA_total_diluted.pdf}
\caption{Total lepton asymmetry as a function of M. \emph{Upper panel:} at temperature $T=10$~GeV. \emph{Lower panel:} after dilution. The grey shaded region indicates the total lepton asymmetry which is needed for $N_1$ to compose $100\%$ of DM. Thickness of the curves indicates the possible uncertainties. Normal hierarchy.
}
\label{fig:LTA}
\end{figure}
\begin{figure}[h]
\centering
\includegraphics[width=0.6\textwidth]{fig/LTA_total_IH.pdf}
\includegraphics[width=0.6\textwidth]{fig/LTA_total_IH_diluted.pdf}
\caption{The same plots as figure~\ref{fig:LTA} but for the inverted hierarchy.}
\label{fig:LTA_IH}
\end{figure}
The generated LTA boosts the DM production which takes place at $T\sim 100$~MeV.
Figure~\ref{fig:LTA} shows that the correct amount of DM can be produced for $M\simeq2$~GeV HNLs if all uncertainties are accounted for in an optimistic way.
However, the decays of the very same HNLs which happen at $T\sim1$~MeV reduce both DM and BAU. To quantify the magnitude of dilution we show the LTA divided by the dilution factor shown in figure~\ref{fig:dilution} as a function of mass.
The result is shown in the lower panel of figure~\ref{fig:LTA}. Note that dilution takes place after the conversion of lepton asymmetry to DM, so the lower panel of figure~\ref{fig:LTA} shows an effective LTA.
Such effective description is valid since the DM abundance depends approximately linearly on the LTA in the region of interest~\cite{Ghiglieri:2015jua}.
The DM abundance computed with this effective LTA can be directly compared with the present day value.
If all factor of $2$ uncertainties are pushed in the direction which maximizes generation of BAU and DM production, the $M\simeq2$~GeV HNLs can provide $\simeq 50 \%$ of the observed DM abundance.
As it is clear from figure~\ref{fig:LTA_IH}, asymmetries are much smaller in the IH case. This can be understood by considering the detailed structure of the rates $\Gamma_N$
entering the kinetic equations~\eqref{kin_eq}. We address this in appendix \ref{sec:late_time_asymmetries_and_inverted_hierarchy}.
Below we qualitatively explain the behaviour observed in figures~\ref{fig:LTA} and~\ref{fig:LTA_IH} in the two distinct mass regions.
In the region $M<5$~GeV the qualitative picture of section~\ref{sub:most_efficient_asymmetry_generation} is confirmed.
The rates increase with mass so above $M\simeq 2$~GeV the wash-out becomes efficient.
Another potentially interesting region revealed by the numerical scan is the one of relatively heavy HNLs with $M\gtrsim 10$~GeV.
Figures~\ref{fig:LTA} and \ref{fig:LTA_IH} exhibit that very large lepton asymmetry can be generated in this case.
However, the production of such asymmetry due to the freeze-in of HNLs takes place around temperatures of sphaleron freeze-out $T_{sph}\simeq 130$~GeV.
It means the BAU also turns out to be much larger than the observed value.
We demonstrate this in figure~\ref{fig:evol}.
\begin{figure}[h]
\centering
\includegraphics[width=0.6\textwidth]{fig/evolution_30GeV.pdf}
\caption{Total lepton asymmetry (red) and individual asymmetries (blue, orange, and green) as functions of temperature. The plot is logarithmic in both positive and negative directions of $Y$. The black dashed vertical line indicates the sphaleron freeze-out temperature $T_{sph}\simeq 130$~GeV where the baryon asymmetry freezes out. The total asymmetry and hence the baryon asymmetry are already large at $T_{sph}$. }
\label{fig:evol}
\end{figure}
Nevertheless it is still interesting how the large asymmetry can survive until low temperatures.
As one can see from figure~\ref{fig:dm_imw_orig}, relatively large values of $\imw$ and small mass splittings are preferred in the case of $M = 30$~GeV. This implies that the behaviour observed in figure~\ref{fig:evol} can be associated with an approximately conserved number which the pseudo-Dirac fermion formed by two HNLs involves~\cite{Blanchet:2009kk}.
The main findings of our numerical study are the following.
\begin{itemize}
\item Large ($\sim 10^{-5}$) LTA can be generated during freeze-in in the case of normal hierarchy (NH) of neutrino masses.\footnote{ The situation is different if the asymmetry is generated during freeze-out or decays of HNLs (see figure~\ref{fig:sketch}).
This mechanism allows for production of $100 \%$ DM in both NH and IH cases if $\imw \sim \mathcal{O}(1)$ and the physical mass splitting is very tiny~\cite{Canetti:2012kh,Ghiglieri:2020ulj}.
}
\item All parameter sets leading to large LTA are concentrated close to the see-saw line $\imw \simeq 0$. In terms of the mixing between active neutrinos and HNLs summed over flavours and generations it means
\begin{equation}
|U|^2\simeq 6\times 10^{-11} \frac{\text{GeV}}{M}.
\label{U2seesaw}
\end{equation}
\item If the theoretical uncertainty is accounted for in a generous way (that is, if the actual values of BAU and LTA are twice larger than those obtained with the momentum averaged equations), the total lepton asymmetry as large as $\simeq 6\times 10^{-5}$ and the observed value of BAU can be generated simultaneously.
\item Slow decays of the HNLs \emph{after} generation of DM inject additional entropy thus diluting both DM abundance and BAU.
\item We were able to find points where, after accounting for the entropy dilution, the $\nu$MSM can explain up to $\sim 50\%$ of $7~$keV DM. Note that the value of required LTA depends on the mass and mixing angle of the DM.
\item The results above are obtained using the kinetic equations~\eqref{kin_eq}
averaged over momentum with the rates as derived in refs.~\cite{Ghiglieri:2017gjz,Ghiglieri:2018wbs}. We consider possible sources of uncertainty in section~\ref{sec:possible_uncertainties_of_kinetic_equations}.
Apart from these uncertainties, there might be new physical effects which are not accounted for in eqs.~\eqref{kin_eq}. In particular, we consider the processes related to the Abelian part of the anomaly in the next section.
\end{itemize}
To sum up, if \emph{(i)} the dark matter abundance is vanishing at $T\sim 100$~GeV, \emph{(ii)} theoretical uncertainties do not exceed the values used in this section, and \emph{(iii)} effects not accounted for in our equations~\eqref{kin_eq} are not important, we can conclude that the lepton asymmetry generated in
\emph{freeze-in} is not enough to explain DM and BAU simultaneously.\footnote{Note that findings of ref.~\cite{Canetti:2012kh,Ghiglieri:2020ulj} confirm that both DM and BAU could be explained if asymmetry is generated during freeze-out and decays of HNLs. }
In the next section we examine validity of the assumption \emph{(iii)}.
\section{Chiral asymmetry and magnetic fields}
\label{sec:chiral_asymmetriy_and_magnetic_fields}
Up to date, all quantitative studies of the low-scale leptogenesis were based on kinetic equations (\ref{kin_eq}).
These equations seem to account for all relevant processes except those related to the Abelian part of the anomaly (second term in the equation below) in the leptonic $j^\mu_L$ and baryonic $j^\mu_B$ currents,
\begin{equation}
\label{anomaly}
\partial_\mu j^\mu_L=\partial_\mu j^\mu_B=\frac{n_f}{32\pi^2}\epsilon^{\mu\nu\rho\sigma}\left(\frac{1}{2}g^2 F^a_{\mu\nu} F^a_{\rho\sigma}+\frac{1}{2}g'^2 F_{\mu\nu} F_{\rho\sigma}\right)~.
\end{equation}
Here $n_f=3$ is the number of fermionic generations, $F^a_{\mu\nu}$ and $F_{\mu\nu}$ are the $SU(2)$ and $U(1)$ gauge field strengths respectively. The Abelian field contribution to the divergence of the currents does not lead to the irreversible change of the baryon and lepton numbers, since for $U(1)$ gauge fields the Chern-Simons (CS) charge for vacuum configurations is zero. Still, if the U(1) field is massless (as is the case for the hyper-charge field in the symmetric phase or electromagnetic field in the Higgs phase), the non-vacuum configurations with non-zero (hyper) magnetic field may carry CS number and therefore the transfer of baryon or lepton numbers into CS ``condensate'' of (hyper) magnetic fields may take place. And, indeed, if there were primordial helical hyper-magnetic fields, they could be converted into baryon asymmetry \cite{ Giovannini:1997eg,Kamada:2018tcs}. Or, the large fermionic asymmetries can induce instabilities in the gauge sector and lead to generation of magnetic fields \cite{Joyce:1997uy, Boyarsky:2011uy}.
We will assume that there are no primordial (hyper) magnetic fields. If true, the effects associated with the Abelian part of the anomaly equation can be neglected for analysis of the baryogenesis. Indeed, in the symmetric phase of the SM the rate of the $SU(2)$ anomalous processes is much higher than that related to the $U(1)$ group. Also, the generation of magnetic fields is a non-linear effect \cite{Giovannini:1997eg,Boyarsky:2011uy} which requires large fermionic asymmetries. However, they are very small at the sphaleron freeze-out (we know this empirically from the measured value of the baryon asymmetry) and the system stays in linear regime.
The generation of (large) lepton asymmetry can only occur in the Higgs phase of the SM, below the sphaleron decoupling. Here the massless gauge degree of freedom which can give rise to long-ranged field corresponds to the electromagnetic field $A_\mu$ which is a mixture of the $SU(2)$ and $U(1)$ hypercharge fields. We will denote the corresponding magnetic and electric field strengths by $\vec{B}$ and $\vec{E}$. The right-hand side of eq.~\eqref{anomaly} {\em does not contain} a product $\vec{B}\vec{E}\propto F_{EM}{\tilde F}_{EM}$ meaning that the baryon and lepton numbers cannot be converted into the CS condensate of the electromagnetic field. The combination $F_{EM}{\tilde F}_{EM}$ still appears as an anomaly in the chiral current of leptons,
\begin{equation}
\label{chiral}
\partial_\mu j^\mu_{5\alpha}= m_\alpha{\bar \Psi}_\alpha\Psi_\alpha + \frac{1}{32\pi^2}\epsilon^{\mu\nu\rho\sigma}\frac{1}{2}e^2 F^{EM}_{\mu\nu} F^{EM}_{\rho\sigma}~,
\end{equation}
where $m_\alpha$ is the mass of a lepton of generation $\alpha$ and $e$ is the electric charge. The reactions which change the lepton chiralities can occur due to perturbative spin flip (the first term in (\ref{chiral})) or due to the processes in which the CS number of electromagnetic field is changed (the second term in (\ref{chiral})). The rate of the first type of reactions at temperatures higher than the mass of the corresponding lepton is at least of the order of $\Gamma_{flip} \sim\frac{\alpha^2}{4\pi}\frac{m_l^2}{T}$.\footnote{It has been shown in the recent work~\cite{Boyarsky:2020ani} that this rate is in fact much larger.} These are just electromagnetic reactions: the Compton process $l\gamma\to l\gamma$ and annihilation $l^+l^-\to\gamma\gamma$ \footnote{Yet another contribution is the Higgs decays, $h\to l^+l^-$, which freezes out at temperature $\simeq 8$ GeV for electron flavour \cite{Boyarsky:2011uy} must be considered as well.}.
The rate of the second type of reactions is known to be non-zero in the presence of external magnetic fields. An evaluation based on magnetohydrodynamics (MHD) reads \cite{Joyce:1997uy,Giovannini:1997eg} $\Gamma_{anom}=\frac{12 \alpha^2}{\pi^2\sigma} \frac{B^2}{T^2}$, where $\sigma\propto T/\alpha$ is the conductivity of the plasma. This estimate accounts only for the fluctuations of the electromagnetic field on the scales larger than the mean free path of the particles in the plasma. The recent lattice simulations \cite{Figueroa:2017hun,Figueroa:2019jsi} incorporating the short scale fluctuations indicated that the actual rate has the same parametric dependence on the magnetic field and the fine-structure constant $\alpha$, but is larger by a factor of 10. It is not excluded that the non-perturbative processes can occur even in the absence of the magnetic fields (see the discussion in \cite{Figueroa:2017hun}) with the rate of the order of $\alpha^6 T$. These processes are of the similar nature as the weak SU(2) sphaleron processes\footnote{The importance of accounting for fluctuations of Abelian U(1) field in anomalous processes was also stressed in \cite{Long:2013tha}.}.
In the first type of processes the fermionic chirality is lost forever, while in the second it is transferred into Chern-Simons number of the $U(1)$ field (it can be called CS condensate). If the chirality flip rate is inferior to the one due to anomaly, the entire chiral charge is converted into the CS condensate. It is the electron flavour which is the most important as the perturbative chirality flip rate for it is much smaller than for the other flavours. The evolution of the chiral charge and of the magnetic field is quite peculiar, it has been studied in \cite{Joyce:1997uy,Boyarsky:2011uy}. Basically, the system enters in the steady state {\em non-linear} evolution in which the chiral charge and the CS condensate of electromagnetic fields change much slower than one would expect from the linear analysis and from the rates of different reactions: the anomaly pumps the chiral charge into the CS condensate, the CS condensate decreases due to plasma conductivity and releases back the chiral charge into the plasma. These two processes nearly compensate each other, leading to approximate conservation of the chiral charge.
The phenomena discussed above may result in modification of the evolution of leptonic asymmetries which we described up to now by equations \eqref{kin_eq} below the sphaleron freeze-out. The detailed study of this problem would require three-dimensional magneto-hydro-dynamical simulations including helical and non-helical magnetic fields, unified with analysis of the thermal fluctuations of electromagnetic fields at smaller scales. We leave this for a future work. Instead, we will discuss at the quantitative level what kind of physical effects one can expect, and how they can modify the computation of LTA.
The important point is that HNLs interact directly {\em only with the left-handed leptons}. Therefore, their CP-violating interactions produce not only the leptonic asymmetry, but also the asymmetry in chiral charges, and, in particular, in the chiral lepton densities. At temperatures where the production of the lepton asymmetries is the most efficient, $T\sim 20$ GeV, the created chiral charge may be large enough to lead to the generation of the helical magnetic field, and the anomalous rate $\Gamma_{anom}$ exceeds the perturbative chirality flip rate $\Gamma_{flip}$ for electron, but $\Gamma_{anom} \lesssim \Gamma_{flip}$ for muon and tau leptons. This means that the chiral asymmetry in muons and tau flavours is destroyed, but that sitting in the electron flavour is transferred to the CS condensate. If it is sufficiently large, the system enters into the non-linear regime as above with effectively conserved chiral asymmetry in the electronic flavour. The processes with HNLs will redistribute this asymmetry among the other flavours forming a long-living configuration carrying a net {\em lepton} number density and magnetic helicity.
In the most optimistic scenario the maximal asymmetry in the electronic flavour, attained during the time evolution which does not account for magnetic fields, will survive until the late times and amplify the sterile neutrino DM production.
Having these physics considerations in mind it is possible to write ``phenomenological'' equations accounting for CS condensate. To this end let us introduce as usual the chemical potentials $\mu_i$ for slowly varying leptonic numbers $L_i$, for electric charge $Q$ and baryon number $B$: $\mu_q$ and $\mu_B$, and, to account for CS condensate, the chemical potential for the number density $R_0$ of the right-handed electrons, $\mu_R$ (when the processes with chirality flip are in thermal equilibrium and anomaly is absent $\mu_R=0$). The standard procedure allows to express $\mu_i$ and $\mu_R$ via $L_i$ and $R_0$ (we put $Q=0$, and also $B=0$ since the baryon asymmetry is too small to lead to any effects). The result is
\begin{align}
\mu_1&=\frac{6}{271\,T^2}\left(143 L_1 + 10 L_2 + 10 L_3 +128 R_0\right),\\
\mu_2&=\frac{2}{271\,T^2}\left(30 L_1 + 311 L_2 + 40 L_3 - 30 R_0\right),\\
\mu_3&=\frac{2}{271\,T^2}\left(30 L_1 + 40 L_2 + 311 L_3 - 30 R_0\right),\\
\mu_R&=\frac{12}{271\,T^2}\left(64 L_1 - 5 L_2 - 5 L_3 + 207 R_0\right).
\label{muR}
\end{align}
The expressions for $\mu_i$ should be used in equations (\ref{kin_eq}) written in previous chapters of this work.\footnote{In this section we consider temperatures below $T_{sph}$ and do not distinguish lepton asymmetries $L_\alpha$ and $L_\alpha-B/3$ owing to the fact $B/s\sim 10^{-10}$ whereas the lepton asymmetries interesting from the DM production perspective are $5$ orders of magnitude larger.} To account phenomenologically for magnetic fields, we should add an equation for $R_0$. In the absence of the CS condensate and of anomalous reactions, the equation for $R_0$ has the form
\begin{equation}
\frac{\partial R_0}{\partial t} = -\Gamma_R \mu_R~,
\label{stand}
\end{equation}
where $\Gamma_R$ is the perturbative chirality flip rate. This equation will drive $\mu_R$ to zero, and the results for the previous sections are reproduced. Now, if the CS condensate and anomalous reactions are present, $\mu_R$ will be driven to some fraction $\kappa$ of the asymmetry in $L_1$, resulting in the change of eq. (\ref{stand}) to
\begin{equation}
\frac{\partial R_0}{\partial t} = -\Gamma_C\left(\mu_R-\kappa\mu_1\right)~,
\label{anom}
\end{equation}
where $\Gamma_C$ is the effective rate that accounts for non-linear dynamics of the condensate and the chiral charge. When the combination $\left(\mu_R-\kappa\mu_1\right)$ approaches zero, the system should enter in the steady state solution with non-zero value of $R_0$. This is achieved if $\Gamma_C$ also goes to zero when $\left(\mu_R-\kappa\mu_1\right)\to 0$. Assuming $\Gamma_C = \gamma_C \, \left(\mu_R-\kappa\mu_1\right)^2$ we arrive at an effective equation
\begin{equation}
\frac{\partial R_0}{\partial t} = -\gamma_C\left(\mu_R-\kappa\mu_1\right)^3~,
\label{eff}
\end{equation}
where $\gamma_C$ does not depend on the chemical potentials, whereas the sign ``minus'' and power ``3'' was chosen to ensure the qualitatively correct behaviour of the solution.
This equation is to be added to eqs.~\eqref{kin_eq}. This new system contains two new parameters, $\gamma_C$ and $\kappa$, the estimate of which goes beyond the scope of this paper. So, we simply considered the evolution of the system in different cases. A particular example with $\kappa = 0.1$ is shown in Fig. \ref{fig:magn_evol}.
\begin{figure}[h]
\centering
\includegraphics[width=0.6\textwidth]{fig/magnetic_evol.pdf}
\includegraphics[width=0.6\textwidth]{fig/magnetic_evol_zoomin.pdf}
\caption{Evolution of the lepton asymmetries in the presence of chiral condensate (solid curves). For comparison we show the evolution described by the equations \eqref{kin_eq} without \eqref{eff} (dashed curves). In the presence of chiral condensate the electron asymmetry freezes at much larger value. The lower panel shows the zoomed in region
$T < 50$~GeV.}
\label{fig:magn_evol}
\end{figure}
In this example the rate $\gamma_C$ is much larger than Hubble at high temperatures and then quickly drops at the temperature where electron asymmetry is maximal. The number density of right-handed electrons freezes at its maximum value. The resulting lepton asymmetry still ``feels'' the effects of HNLs which freeze a bit later. This leads to the partial redistribution of electron asymmetry in agreement with \eqref{muR}. Still, as one can see from figure~\ref{fig:magn_evol}, the resulting electron asymmetry is much larger than asymmetries in the other lepton flavours, whereas if the dynamics of chiral condensate is not accounted for, all three asymmetries are the same (cf. the dashed line in figure~\ref{fig:magn_evol}).
As we have already discussed, the most optimistic case corresponds to the pattern in which the asymmetry in electron flavour reaches its maximum at some temperature and then freezes around this value. By varying the coefficients $\gamma_C$ and $\kappa$ we were able to see that this type of behaviour can always be achieved. So, for the scan of the parameters in this most optimistic case we were solving the original equations (\ref{kin_eq}) and reading off the maximal asymmetry in the electron flavour attained during the time evolution. This procedure is discussed in greater detail in the next section.
\section{Maximal electron asymmetry}
\label{sec:maximal_electron_asymmetry}
In the previous section we have seen that the processes related to the Abelian part of the anomaly can significantly alternate dynamics of asymmetry production if large electron asymmetry is generated at some temperature.
It is premature to perform a parameter scan using eqs.~\eqref{kin_eq} \emph{plus}~\eqref{eff} since we don't know the exact values (and temperature dependence) of the coefficients $\gamma_C$ and $\kappa$. Still it is important to clarify the potential significance of the effects related to the anomaly.
To this end we have asked a different question: what is the maximal value of the electron asymmetry which can be reached in the system described by eqs.~\eqref{kin_eq}. This maximal asymmetry can be partially conserved as in the example of figure~\ref{fig:magn_evol}.
Let us stress that the generation of maximal asymmetry does not guarantee that the final asymmetry will be the largest.
In fact, there are two processes which are important: \emph{\emph{(i)}} generation of the chiral asymmetry and \emph{(ii)} its wash-out due to interactions with the HNLs. Therefore, the parameter leading to the largest value of the maximal electron asymmetry does not necessarily leads to the largest value of the final asymmetry, since redistribution between the other flavours can be more efficient as well.
Nevertheless, a study of the maximal possible electron asymmetry is a first step in this direction. The results of the scan of the parameter space are presented in figure~\ref{fig:maxE}. In this figure we show the maximal value of the asymmetry in the electron flavour as a function of the mass of the HNLs. As one can see, the maximal asymmetry can be of the correct magnitude for HNLs with $M>2$~GeV. Even though this fact doesn't guarantee that the $\nu$MSM can account for $100\%$ of DM without fine-tunings of ref.~\cite{Canetti:2012kh}, it indicates the importance of the non-perturbative effects which have not been accounted for so far.
\begin{figure}[h!]
\centering
\includegraphics[width=0.6\textwidth]{fig/LTA_maximal_e.pdf}
\includegraphics[width=0.6\textwidth]{fig/LTA_maximal_e_IH.pdf}
\caption{Maximal electron asymmetry as a function of M. \emph{Upper panel:} normal hierarchy. \emph{Lower panel:} inverted hierarchy. The grey shaded region indicates the electron asymmetry which is needed for $N_1$ to compose $100\%$ of DM. The span over $\Delta_e$ is due to different assumptions about DM mixings. Thickness of the orange and green curves indicates the possible uncertainty of the averaging procedure. }
\label{fig:maxE}
\end{figure}
\section{Possible uncertainties of kinetic equations}
\label{sec:possible_uncertainties_of_kinetic_equations}
We have already mentioned in section~\ref{sec:generation_of_asymmetry} that our analysis contains the inherent uncertainty related to integration of the kinetic equations over momentum. We have also stressed that the non-perturbative effects related to Abelian chiral anomaly are not accounted for in the kinetic equations. In this section we discuss the other possible sources of uncertainties.
First, let us comment on the role of the rates entering kinetic equations~\eqref{kin_eq}. In the broken phase these rates can be split into ``direct'' (proportional to $T$) and ``indirect'' (proportional to the Higgs vev $v_0$) parts~\cite{Ghiglieri:2016xye}. The ``indirect'' rates depend on the thermal neutrino interaction rates. Recently, one of these rates has been computed at next-to-leading order~\cite{Jackson:2019tnr}. It has been found that the NLO rate is $15\ldots 40 \%$ smaller than the leading order one.
Even though it has been shown in ref.~\cite{Jackson:2019tnr} that the resulting lepton asymmetry is affected only at $1\%$ level, it is still reasonable to question the sensitivity of LTA to variation of the other rates.
To partially clarify this issue we have computed LTA multiplying the rates $\Gamma_{\nu_\alpha}, \; \tilde{\Gamma}_{\nu_\alpha}, \; \Gamma_N,\; \tilde{\Gamma}_{N}^\alpha$ entering kinetic equations~\eqref{kin_eq}, by a constant factor.
Result of this procedure is shown in figure~\ref{fig:varying_rates}.
\begin{figure}[h]
\centering
\includegraphics[width=0.48\textwidth]{fig/varying_rates.pdf}
\includegraphics[width=0.48\textwidth]{fig/varying_rates_e.pdf}
\caption{Evolution of the total lepton asymmetry (left panel) and the electron asymmetry (right panel) computed using the rates multiplied by a constant factor $\Gamma \to \kappa \cdot \Gamma$, where $\Gamma$ denotes all rates $\Gamma_{\nu_\alpha}, \; \tilde{\Gamma}_{\nu_\alpha}, \; \Gamma_N,\; \tilde{\Gamma}_{N}^\alpha$. The solid green line corresponds to the original rates. The vertical grey line in the left plot indicates the sphaleron freeze-out temperature $T_{sph}\simeq 131.7$~GeV. The parameters are fixed to the values $M=1$~GeV, $\Delta M = 1.26\times10^{-11}$~GeV, $\imw = -0.14$, $\rew = 0.52 \pi$, $\delta = 1.30 \pi$, and $\eta = 1.02 \pi$.}
\label{fig:varying_rates}
\end{figure}
The resulting LTA is surprisingly stable against the factor of $2$ variations of the rates. Note however, that the value of the BAU is sensitive to this variations. Namely, if the rates are larger or smaller one will need to change the other parameters of the theory in order to obtain the correct amount of BAU, this in turn will change the resulting lepton asymmetry.
Further, figure~\ref{fig:varying_rates} shows that larger rate variations completely change the dynamics.
Also, as one can see from the right panel, the maximal value of the electron asymmetry is more sensitive to the rates. Therefore further refinement of the rates is an important task.
A more serious concern is related to the effective Hamiltonian.
Indeed, the derivation of equations \eqref{kin_eq} in refs.~\cite{Eijima:2017anv,Eijima:2018qke}
was based on the separation of time scales. Namely, all quantities proportional to Majorana mass difference of HNLs $\Delta M$ or to Yukawas $F_{\alpha I} v_0$.
were treated as small compared to combinations of energies of neutrinos and HNLs,
such as $E_N+E_\nu$ or $E_N-E_\nu$:
\begin{equation}
\Delta M, \; F_{\alpha I} v_0 \quad \ll \quad E_N+E_\nu,\; E_N-E_\nu.
\label{separation_of_scales}
\end{equation}
This allowed us to integrate out the fast processes and derive equations \eqref{kin_eq} in terms of slowly varying quantities.
In the mass region of interest, $M \lesssim 35~$GeV, assumption \eqref{separation_of_scales} is justified at temperatures above the sphaleron freeze-out, $T_{sph}\simeq 131.7$~GeV.
In this regime thermal corrections to active neutrino energy are proportional to $T$ and large~\cite{Weldon:1982bn}. However, \eqref{separation_of_scales} might not be valid at temperatures around a few tens of GeV. The reason is that the thermal correction to active neutrino at some point changes its sign so the energy levels of HNLs and active neutrinos do cross.
This effect has not been accounted for in our rates in the Higgs phase.
While the LTA calculations are rather robust to changes of the rates, the role of the effective Hamiltonian $H_N$ is far more drastic. The effective Hamiltonian can be decomposed into fermion number conserving and violating parts: $H_N = H_+ + H_-$ (following notations of refs.~\cite{Eijima:2017anv,Eijima:2018qke}). For an illustration we switched off the $H_+$ part (see the precise expressions in~\cite{Eijima:2017anv,Eijima:2018qke}) completely and solved the kinetic equations, see figure~\ref{fig:no_hplus}.\footnote{Let us note in passing that computing BAU for the parameter set used in figure~\ref{fig:no_hplus} requires one to use the approach of ref.~\cite{Eijima:2017cxr}, since the total lepton asymmetry changes the sign right before the sphaleron freeze-out. This approach allows for accurate tracking of BAU without enlarging the set of equations and making it stiffer. To this end one needs to solve a separate kinetic equation for sphalerons using the lepton asymmetries as an input.}
\begin{figure}[h]
\centering
\includegraphics[width=0.48\textwidth]{fig/no_hplus.pdf}
\includegraphics[width=0.48\textwidth]{fig/no_hplus_e.pdf}
\caption{Evolution of the total lepton asymmetry (left panel) and the electron asymmetry (right panel)
computed with (blue line) and without (orange line) $H_+$ part of the effective Hamiltonian.
The parameters are fixed to the values $M=1$~GeV, $\Delta M = 1\times10^{-12}$~GeV, $\imw = \log(3)$, $\rew = 13/16 \pi$, $\delta = 29/16 \pi$, and $\eta = 22/16 \pi$.}
\label{fig:no_hplus}
\end{figure}
It shows that production of the asymmetry is greatly enhanced if $H_+=0$. The reason is that $H_-\sim (E_N - E_\nu)$
crosses zero at some temperature around $20-30$~GeV, precisely where the rates peak. Around the zero of $H_-$ the physical mass difference is determined only by the Majorana part, and can be small enough to ensure the resonant amplification of the asymmetry production. Similar observations about the importance of the thermal mass corrections have been made in ref.~\cite{Ghiglieri:2018wbs}.
Figure~\ref{fig:no_hplus} illustrates the importance of the effective Hamiltonian. Both LTA and maximal electron asymmetry can vary by many orders of magnitude depending on the behaviour of $H_I$ around the point where $E_N=E_\nu$. Therefore a dedicated derivation of the kinetic equations accounting for the level crossing is very desirable. We leave this for future work.
\section{Discussion}
\label{sec:discussion}
In this work we have studied the freeze-in generation of the late time asymmetry in the $\nu$MSM. More specifically, we have systematically investigated production of asymmetry which takes place before decays of HNLs. Using the momentum averaged kinetic equations based on (\ref{kin_eq}) with the state-of-the-art rates taken from~\cite{Ghiglieri:2018wbs} we have found that large lepton asymmetry can be generated at temperatures above a few GeV. The mechanism differs from the one considered in refs.~\cite{Canetti:2012vf,Canetti:2012kh,Ghiglieri:2020ulj}. Considered mechanism is operative due to presence of both fermion number violating and conserving rates~\cite{Eijima:2017anv,Ghiglieri:2017gjz}. Even though the generated asymmetry could be quite large, the subsequent decays of the HNLs reduce the created DM abundance.
Using the benchmarks from ref.~\cite{Ghiglieri:2015jua} we found that the asymmetry generated during freeze-in can eventually be responsible for $\sim 50 \%$ of DM abundance.
It is important to note that large LTA can be generated only for small values of $\imw$. This means that the values of the total mixing $|U|^2$ is very close to the see-saw ones.
Interestingly, Higgs inflation in Einstein-Cartan formulation provides an independent mechanism of DM production~\cite{Shaposhnikov:2020aen}. In this mechanism the only constraint on the $\nu$MSM parameters comes from BAU, as
no LTA is required.
We identify further directions.
\begin{itemize}
\item A regime of the asymmetry generation during freeze-out and decays have been studied in refs.~\cite{Canetti:2012vf,Canetti:2012kh}. There were many significant improvements in understanding of the system since these works have been performed.
The recent study~\cite{Ghiglieri:2020ulj} has demonstrated that production of the correct amount of DM in the $\nu$MSM is possible also accounting all the improvements and effects, such as the entropy dilution. Still, an updated study of the parameter space is missing.
\item The results here were obtained using the kinetic equations averaged other momentum. It is generally believed that results obtained by averaged equation do not deviate significantly from those obtained by solving the full integro-differential system~\cite{Asaka:2011wq,Ghiglieri:2018wbs}. However, repeating the current analysis with the original equations, if technically possible, would be very desirable.
\item The other possible uncertainties related to the interaction rates and especially the effective Hamiltonian could be large. These points need to be further clarified.
\item Last, but not the least, as we have discussed in section~\ref{sec:chiral_asymmetriy_and_magnetic_fields} non-perturbative effects associated with Abelian anomaly may play an important role in the dynamics of the system. Therefore two important tasks arise: \emph{(i)} derivation of a kinetic equation~\eqref{eff} from the first principles and \emph{(ii)} determination of the parameters $\gamma_C$ and $\kappa$ entering this equations.
\end{itemize}
\acknowledgments
We appreciate fruitful discussions with Jacopo Ghiglieri, Juraj Klaric, and Mikko Laine and thank them for helpful comments on the draft of this paper.
This work was supported by the
ERC-AdG-2015 grant 694896 and by the Swiss National Science Foundation Excellence grant 200020B\underline{ }182864.
|
\section{Introduction}
Over the last years, supervised learning algorithms have become an indispensable tool in many different scientific fields. Supervised learning -- a subbranch of machine learning -- is the approach to make predictions and decisions based on given input-output pairs, so-called training data. These data sets can represent highly diverse types of information so that supervised learning techniques have been widely applied to real-world problems in, e.g., physics and chemistry~\cite{CARLEO2019, CARTWRIGHT2020}, medicine~\cite{DEO2015, GLASER2019}, and finance~\cite{OZBAYOGLU2020}. Further popular examples are image classification~\cite{KLUS2019, BASHA2020}, spam filtering~\cite{ALGHAMDI2018, DADA2019}, and the identification of governing equations of dynamical systems~\cite{BRUNTON2016, GELSS2019}. Learning algorithms can be subdivided into regression and classification methods. The former are used to estimate the relationship between input and output vectors, while the latter are used to identify the category to which a given input vector belongs. There exist a lot of different supervised learning methods such as (non-)linear regression, support-vector machines, decision trees, and neural networks. For a detailed overview of different algorithms and applications, we refer to~\cite{TUFFERY2011}.
The field is continuously evolving and the demand for machine learning has grown significantly in the last decade. In this work, we will focus on one of the most powerful mathematical tools in this area, namely kernel-based regression and classification techniques. In this context, a kernel is a function that enables us to avoid explicit representations of high-dimensional feature maps which are used as a basis for learning nonlinear target functions. The main advantage of kernel methods is that inner products are not evaluated explicitly, but only implicitly through the kernel. Linear methods that can be entirely written in terms of kernel evaluations can be turned into nonlinear methods by replacing the standard inner product by a kernel function. This is sometimes referred to as \emph{kernelization} and generally leads to increased performance and accuracy. Examples of such methods are kernel PCA~\cite{SCHOELKOPF1998}, kernel TICA~\cite{HARMELING2003}, kernel EDMD~\cite{WILLIAMS2015, KSM19}, and kernel SINDy/MANDy~\cite{KLUS2019}.
If the training data set contains highly similar entries or if one feature vector can be written as a linear combination of other feature vectors, the resulting transformed data matrices and Gram matrices will be ill-conditioned or even singular, which can cause numerical instabilities. This is typically alleviated by regularization or other techniques like reduced set methods~\cite{SCHOELKOPF2002} and Nyström approximations~\cite{DRINEAS2005}. In this paper, we will propose a set-reduction technique for kernel-based regression and classification methods that extracts important samples from the training data set -- and therefore relevant information encoded in the feature vectors -- in order to reduce the storage consumption as well as the computational costs. Additionally, the method can also be seen as a regularization technique.
The remainder of the paper is structured as follows: In Section~\ref{sec: Preliminaries}, we give a brief overview of regression and classification problems as well as the use of feature maps and kernel functions for supervised learning methods. In Section~\ref{sec: Data reduction}, the basic assumptions for the feature space approximation are outlined. The data reduction is then considered from an analytical as well as a heuristic point of view, where the latter results in a method called \emph{kernel-based feature space approximation} (kFSA). Numerical results for benchmark problems from different applications areas are presented in Section~\ref{sec: Results}. Section~\ref{sec: Conclusion} concludes with a brief summary and a future outlook.
\section{Preliminaries}\label{sec: Preliminaries}
We begin with a brief overview of regression and classification problems as well as their formulation in terms of feature spaces and kernels. The notation used throughout this paper is summarized in Table~\ref{tab: notation}. At some points though, we will slightly abuse the notation as we do not distinguish between a data matrix $X$ and the set of its columns, which is also simply denoted by $X$.
\begin{table}[h]
\renewcommand{\arraystretch}{1.3}
\caption{Notation for special matrices, functions, and spaces.}
\centering
\begin{tabular}{ll}
\hline
\textbf{Symbol} & \textbf{Description} \\
\hline
$\mathcal{S}$ & sample space (subset of $\mathbb{R}^d$) \\
$\mathcal{H}$ & feature space (subset of $\mathbb{R}^n$, $n \gg d$, or $\ell^2$) \\
$\Psi \colon \mathcal{S} \to \mathcal{H}$ & feature map \\
$X = \big[ x^{(1)}, \dots, x^{(m)}\big]$ & input matrix in $\mathbb{R}^{d \times m}$\\
$Y = \big[ y^{(1)}, \dots, y^{(m)}\big]$ & output matrix in $\mathbb{R}^{d^\prime \times m}$\\
$\Psi_X$ & transformed data matrix in $\mathbb{R}^{n \times m}$\\
$k \colon \mathcal{S} \times \mathcal{S} \to \mathbb{R}$ & kernel function\\
$\kappa$ & kernel parameter in $\mathbb{R}^+$ \\
$G_{X, X^\prime}$ & Gram matrix in $\mathbb{R}^{m \times m^\prime}$\\
$\Theta$ & coefficient matrix\\
$f \colon \mathcal{S} \to \mathbb{R}^{d^\prime}$ & target (regression or decision) function\\
$E \colon \mathcal{S} \times \mathbb{R}^{d \times m^\prime} \to \mathbb{R}^+_0$ & approximation error\\
$\varepsilon$ & threshold for feature space approximation in $\mathbb{R}^+_0$\\
$\gamma$ & regularization parameter in $\mathbb{R}^+$\\
\hline
\end{tabular}
\label{tab: notation}
\end{table}
\subsection{Regression and classification problems}
Regression and classification problems are subsumed under \emph{supervised learning}, i.e., the data-driven approach to construct a function that correctly maps input to output variables. Given a training set of samples in the form of vectors $x^{(j)} \in \mathbb{R}^d$ and corresponding output vectors $y^{(j)} \in \mathbb{R}^{d^\prime}$, with ${j = 1, \dots, m}$, the aim of regression is to model the relationship between both sets by a function ${f \colon \mathbb{R}^d \to \mathbb{R}^{d^\prime}}$ which enables us to predict the output $y$ for any given test vector $x$. Classification problems are here seen as a special case of regression analysis where the output variable is categorical. That is, $y$ determines the label of $x$, where the output vectors are typically given in the \emph{one-hot encoding} format~\cite{POTDAR2017}:
\begin{equation}
y_i =
\begin{cases}
1, & \text{if } x \text{ belongs to category } i, \\
0, & \text{otherwise},
\end{cases}
\end{equation}
where $d^\prime$ is the number of considered categories. The advantage of one-hot encoding is that the `distance' between any two categories is always the same, thus spurious effects when the (non-ordinal) labels of two dissimilar samples are close to each other are avoided.
In this work, we want to construct regression and decision functions, respectively, as linear combinations of preselected basis functions $\psi_i$, i.e.,
\begin{equation}\label{eq: basis representation}
f(x) = \sum_{i \in I } \lambda_i \psi_i(x),
\end{equation}
where $I$ is an appropriate index set. In many cases, however, the number of basis functions can be extremely large (or even countably infinite, i.e., $I \cong \mathbb{N}$) causing high numerical costs. Thus, we will exploit kernel functions in order to reduce the storage consumption and computational complexity. For more details on kernel functions and their application to supervised learning tasks, we refer to~\cite{SCHOELKOPF2002} and~\cite{BONACCORSO2017}.
\subsection{Feature maps and kernel functions}\label{sec: tdt and kernels}
If the learning algorithm can be entirely written in terms of kernel evaluations, explicit basis function evaluations are not needed in practice. This is called the \emph{kernel trick} and allows us to reduce the computational complexity significantly since we do not have to compute inner products in the potentially infinite-dimensional space. However, for the following derivations it is crucial to clarify the relationship between (implicitly) given basis functions and the corresponding kernel. Additionally, we will later consider examples where the explicit representation of the regression function in terms of basis functions is of interest. Consider a vector $x \in \mathbb{R}^d$ and a mapping $\Psi \colon \mathbb{R}^d \to \mathbb{R}^n$, typically with $n \gg d$, given by
\begin{equation*}
\Psi(x) := \left[ \psi_1(x), \dots, \psi_n(x) \right]^\top \in \mathbb{R}^{n},
\end{equation*}
where the real-valued functionals $\psi_1, \dots, \psi_n$ define the preselected basis functions.
\begin{Remark}\label{rem: finite-dimensional}
In what follows, we will focus on finite-dimensional feature maps to elucidate our approach. However, the concepts of kernels, Gram matrices, and pseudoinverses described below can be adapted to infinite-dimensional mappings $\Psi \colon \mathbb{R}^d \to \mathcal{H}$, e.g., $\mathcal{H} \subseteq \ell^2$, if $\Psi$ is a bounded operator with closed range, see~\cite{BENISRAEL2003}.
\end{Remark}
\noindent Given a data set ${X = [x^{(1)} , \dots, x^{(m)}] \in \mathbb{R}^{d \times m}}$, we define the \emph{transformed data matrix}
\begin{equation*}
\Psi_X := \left[ \Psi\left(x^{(1)}\right), \dots, \Psi\left(x^{(m)}\right) \right] \in \mathbb{R}^{n \times m}.
\end{equation*}
The transformation $\Psi$ can be interpreted as a \emph{feature map} and, thus, defines a so-called \emph{kernel}.
\begin{Definition}
A function $k \colon \mathcal{S} \times \mathcal{S} \to \mathbb{R}$ on a non-empty set $\mathcal{S}$ is called a kernel if there exist a real Hilbert space $\mathcal{H}$ and a feature map $\Psi \colon \mathcal{S} \to \mathcal{H}$ such that
\begin{equation}\label{eq: kernel}
k(x, x^\prime) = \langle \Psi(x) , \Psi(x^\prime) \rangle_{\mathcal{H}}
\end{equation}
for all $x, x^\prime \in \mathcal{S}$.
\end{Definition}
By definition, a kernel is a symmetric and positive semidefinite function. The space $\mathcal{H}$ is called the \emph{feature space} of $k$. In what follows, we will generally consider $\mathcal{S}$ as the space of training and test samples, i.e., $\mathcal{S} \subseteq \mathbb{R}^d$. In this regard, we will slightly abuse the notation at some points by simply denoting the column set of a given data matrix $X$ by the same symbol. Furthermore, we consider $\mathcal{H}$ as a subspace of $\mathbb{R}^n$, see Remark~\ref{rem: finite-dimensional}, and use the Euclidean inner product. The \emph{Gram matrix} corresponding to the kernel $k$ and a given data matrix $X$ is defined as
\begin{equation*}
G_{X,X} = \Psi_X^\top \Psi_X =
\begin{bmatrix}
k(x^{(1)}, x^{(1)}) & \cdots & k(x^{(1)}, x^{(m)})\\
\vdots & \ddots & \vdots\\
k(x^{(m)}, x^{(1)}) & \cdots & k(x^{(m)}, x^{(m)})
\end{bmatrix} \in \mathbb{R}^{m \times m}.
\end{equation*}
In the following sections, we will also consider Gram matrices corresponding to two different data sets $X, X^\prime$. These are then denoted by $G_{X, X^\prime} = \Psi_X^\top \Psi_{X^\prime}$.
\begin{Remark}
The feature space representation~\eqref{eq: kernel} is in general not unique. That is, inner products of different feature maps can result in the same kernel. On the other hand, Mercer's theorem~\cite{MERCER1909} states that we can find a (potentially infinite-dimensional) feature space representation for any given symmetric positive semidefinite kernel.
\end{Remark}
\subsection{Kernel-based regression and classification}\label{sec: kernel-based learning}
It was shown in \cite{KLUS2019} that SINDy -- originally developed for learning the governing equations of dynamical systems~\cite{BRUNTON2016} -- can be applied to classification problems using the transformed data matrices (or, more generally, tensors) and resulting kernels introduced above. This holds for supervised learning problems in general as we will illustrate in this section. Given a training set $X \in \mathbb{R}^{d \times m}$ and the corresponding output matrix $Y \in \mathbb{R}^{d^\prime \times m}$, we consider the minimization problem
\begin{equation}\label{eq: minimization problem 1}
\min_{\Theta \in \mathbb{R}^{d^\prime \times n}} \lVert Y - \Theta \Psi_X \rVert_F^2,
\end{equation}
where $\Psi_X \in \mathbb{R}^{n \times m}$ is the transformed data matrix given by the feature map $\Psi$, see Section~\ref{sec: tdt and kernels}. A solution $\Theta$ of \eqref{eq: minimization problem 1} then represents coefficients for expressing the output variables in terms of the preselected basis functions, i.e.,
\begin{equation*}
y^{(j)}_i \approx \sum_{\mu=1}^n \Theta_{i,\mu} \psi_{\mu}(x^{(j)}).
\end{equation*}
If the number of basis functions is significantly larger than the number of training data points, typically equality holds. This might result in overfitting, i.e., the learned functions provide exact results for the training data but might not generalize well to new data. The regression/decision function $f \colon \mathcal{S} \to \mathbb{R}^{d^\prime}$ is defined as
\begin{equation}\label{eq: target function}
f(x) = \Theta \Psi(x),
\end{equation}
where $x \in \mathcal{S} \subseteq \mathbb{R}^d$ is a sample from a given test set. For classification problems, the $i$th entry of the vector $f(x)$ is interpreted as the likelihood of $x$ belonging to category $i$. The above approach in combination with hard thresholding is known as \emph{sparse identification of nonlinear dynamical systems} (SINDy) in the context of system identification, i.e., when the data matrix $X$ contains snapshots of a dynamical system and $Y$ the corresponding derivatives.
Adding a regularization term of the form $\gamma \lVert \Theta \rVert_F^2$ to~\eqref{eq: minimization problem 1} yields the so-called ridge regression problem~\cite{MURPHY2012}. The solution would then be given by $\Theta = Y (\Psi_X^\top \Psi_X + \gamma \mathrm{Id})^{-1} \Psi_X^\top$. As $\gamma$ goes to zero, this converges to the solution of \eqref{eq: minimization problem 1} with minimal Frobenius norm, i.e.,
\begin{equation}\label{eq: coefficient matrix 1}
\Theta = Y \Psi_X^+,
\end{equation}
where $\Psi_X^+$ denotes the \emph{Moore--Penrose inverse} (or simply called \emph{pseudoinverse}) of $\Psi_X$, see~\cite{GOLUB2013}. The direct computation of $\Psi_X^+$ may be computationally expensive due to a large number of basis functions. Therefore, we use the kernel trick, i.e., the pseudoinverse is written as
\begin{equation*}
\Psi_X^+ = (\Psi_X ^\top \Psi_X)^+ \Psi_X^\top = G_{X,X}^+ \Psi_X^\top.
\end{equation*}
Now, the solution of \eqref{eq: minimization problem 1} can be expressed as
\begin{equation}\label{eq: coefficient matrix 2}
\Theta = Y G_{X,X}^+ \Psi_X^\top.
\end{equation}
The coefficient matrix $\Theta^\prime := Y G_{X,X}^+$ is then the minimum-norm solution of
\begin{equation}\label{eq: minimization problem 2}
\min_{\Theta \in \mathbb{R}^{d^\prime \times m}} \lVert Y - \Theta G_{X,X} \rVert_F^2.
\end{equation}
This tells us that, equivalently to \eqref{eq: minimization problem 1}, we can consider the minimization problem \eqref{eq: minimization problem 2} in order to construct the target function
\begin{equation*}
f(x) = \Theta \Psi(x) = \Theta^\prime \Psi_X^\top \Psi(x) = \Theta^\prime G_{X, x},
\end{equation*}
where $G_{X,x}$ denotes the Gram matrix corresponding to the sets $X$ and $\{x\}$.
In comparison to the coefficient matrix $\Theta$, the matrix $\Theta^\prime$ may have much smaller dimensions (assuming that $n \gg m$). Also, we only consider Gram matrices and kernel evaluations, there is no need to construct a transformed data matrix and we therefore may be able to mitigate storage problems. The above approach was introduced as kernel-based SINDy/MANDy in \cite{KLUS2019} and even works if the transformation $\Psi$ is not given explicitly, but implicitly defined in terms of a kernel function.
\section{Data reduction}\label{sec: Data reduction}
As described in the previous section, the kernel-based construction of the regression/decision function allows us to omit explicit computations in the feature space. Under this premise, we are therefore not interested in methods for finding approximate kernel expressions or basis-function reductions as done for example in~\cite{RAHIMI2008, LE2013, LITZINGER2018, SANTIN2019}. The crucial aspect, in our case, is the dimension of the involved Gram matrix, whose size is given by the number of considered samples. In this section, we introduce an approach to filter unnecessary samples in order to speed up the computations, in particular in the testing phase.
\subsection{Feature space approximation}\label{sec: data-reduced regression}
We assume that the transformed data matrix is (nearly) rank-deficient or, in other words, there exists a $n \times \tilde{m}$-submatrix of $\Psi_X$ such that the column spaces of both matrices are (numerically) equal. Suppose there exist a subset $\tilde{X} \subset X$ and a matrix $C \in \mathbb{R}^{\tilde{m} \times m}$ with $\tilde{m} := |\tilde{X}| < m$ such that
\begin{equation}\label{eq: linear comb psi}
\Psi_{\tilde{X}} C = \Psi_X,
\end{equation}
where the columns of $\Psi_{\tilde{X}} \in \mathbb{R}^{n \times \tilde{m}}$ are a linearly independent subset of the columns of $\Psi_X$. In practice, (almost) linear dependencies among the columns of the transformed data matrix $\Psi_X$ lead to ill-conditioned or singular Gram matrices. Thus, the proposed approach can also be seen as a regularization technique.
\begin{Lemma}
Given matrices $A \in \mathbb{R}^{k \times l}$ and $B \in \mathbb{R}^{l \times m}$ where $A$ has full column rank and $B$ full row rank, it holds that $(AB)^+ = B^+ A^+$.
\end{Lemma}
\noindent For a proof of the above lemma, we refer to~\cite{CAMPBELL2009}. By assuming that $C$ has linearly independent rows, the pseudoinverse of $\Psi_X$ is then given by
\begin{equation*}
\Psi_X^+ = C^+ \Psi_{\tilde{X}}^+.
\end{equation*}
Using the kernel trick, the solution \eqref{eq: coefficient matrix 1} can now be written as
\begin{equation*}
\Theta = Y C^+ \Psi_{\tilde{X}}^+ = Y C^+ G_{\tilde{X}, \tilde{X}}^+ \Psi_{\tilde{X}}^\top.
\end{equation*}
It holds that $\Theta = \tilde{\Theta} \Psi_{\tilde{X}}^\top$, where the matrix $\tilde{\Theta} := Y C^+ G_{\tilde{X}, \tilde{X}}^+$ is the minimum-norm solution of the least-squares problem
\begin{equation}\label{eq: minimization problem 3}
\min_{\Theta \in \mathbb{R}^{d^\prime \times \tilde{m}}} \lVert Y - \Theta G_{\tilde{X} , \tilde{X}} C \rVert_F = \min_{\Theta \in \mathbb{R}^{d^\prime \times \tilde{m}}} \lVert Y - \Theta G_{\tilde{X} , X}\rVert_F
\end{equation}
because $G_{\tilde{X}, \tilde{X}}$ has full rank (equal to the column rank of $\Psi_{\tilde{X}}$) and therefore it holds that
\begin{equation*}
(G_{\tilde{X}, \tilde{X}} C)^+ = C^+ G_{\tilde{X}, \tilde{X}}^+.
\end{equation*}
Since $\tilde{m} < m \ll n$, this means we can -- under the above assumptions -- solve a minimization problem with potentially much lower dimensions than \eqref{eq: coefficient matrix 2} and especially \eqref{eq: coefficient matrix 1}, but still can fully reconstruct the target function
\begin{equation}\label{eq: minimization problem 3 - f}
f(x) = \tilde{\Theta} G_{\tilde{X}, x} = \Theta \Psi(x)
\end{equation}
as defined in \eqref{eq: target function} (if the feature map is explicitly given). Note that even though the coefficient matrix $\tilde{\Theta}$ lives in a lower-dimensional space than $\Theta$, the minimization problem~\eqref{eq: minimization problem 3} still includes all training data for supervised learning. Especially in the test phase this can be advantageous. If $\tilde{m}$ is significantly smaller than $m$ and $n$, the evaluation of the regression/classification function is much cheaper since it only requires the multiplication of a $d^\prime \times \tilde{m}$ by a vector of $\tilde{m}$ kernel evaluations.
In general, of course, there does not have to exist such an optimal set $\tilde{X}$ satisfying~\eqref{eq: linear comb psi}. However, for practical applications we may find subsets $\tilde{X} \subset X$ which satisfy~\eqref{eq: linear comb psi} up to a certain extent, i.e., any feature vector $\Psi(x)$, $x \in X$, can be closely approximated as a linear combination of the columns of $\Psi_{\tilde{X}}$.
\subsection{Analytical formulation \& existing approaches}\label{sec: analytical formulation}
As described above, we seek a subset $\tilde{X}$ of the columns of the data matrix $X$ such that \eqref{eq: linear comb psi} is (approximately) satisfied. That is, for each vector in $x \in X \setminus \tilde{X}$ there should exist a vector $c \in \mathbb{R}^{\tilde{m}}$ such that $\Psi_{\tilde{X}} c$ is equal to (or very close to) $\Psi(x)$. In other words, we try to find a smallest possible $\tilde{X} \subset X$ such that all column vectors of $\Psi_X$ lie in the span of the column vectors of $\Psi_{\tilde{X}}$. For a single vector $\Psi(x)$ with $x \in X $, we define the approximation error by
\begin{equation}\label{eq: approximation error}
E(\tilde{X}, x) := \min_{c \in \mathbb{R}^{\tilde{m}}} \lVert \Psi(x) - \Psi_{\tilde{X}} c \rVert^2_2,
\end{equation}
where the minimum-norm solution can be written as $c = \Psi_{\tilde{X}}^+ \Psi(x)$, i.e., $E(\tilde{X}, x) = \Psi(x) - \Psi_{\tilde{X}} \Psi^+_{\tilde{X}} \Psi(x)$. If $\Psi(x) \in \textrm{span} \, \Psi_{\tilde{X}}$, especially if $x \in \tilde{X}$, the approximation error~\eqref{eq: approximation error} is equal to zero. Combining the error minimization with the constraint that $\tilde{m} = |\tilde{X}|$ should be small in comparison to $m = |X|$ (assuming that the number of given observations is large enough), we have to solve the following optimization problem:
\begin{equation}\label{eq: analytical formulation}
\begin{split}
\min_{\tilde{X} \subset X} \left( \sum_{x \in X } E(\tilde{X}, x) + \gamma \tilde{m} \right)
&= \min_{\tilde{X} \subset X} \left( \sum_{x \in X } \min_{c \in \mathbb{R}^{\tilde{m}}} \lVert \Psi(x) - \Psi_{\tilde{X}} c \rVert^2_2 + \gamma \tilde{m} \right)\\
&= \min_{\tilde{X} \subset X} \left( \min_{C \in \mathbb{R}^{\tilde{m} \times m}} \lVert \Psi_{X} - \Psi_{\tilde{X}} C \rVert^2_F + \gamma \tilde{m} \right),
\end{split}
\end{equation}
where $\gamma$ is a regularization parameter such that high values for $\gamma$ will enforce selecting fewer points.
Finding an optimal solution of~\eqref{eq: analytical formulation} is a complex combinatorial optimization problem and there exist different iterative and greedy approaches. A description of \emph{reduced set methods}, where samples are removed from the set $X$ using, e.g., kernel PCA or $\ell_1$ penalization, can be found in~\cite{SCHOELKOPF2002}. However, these approaches are based on a stepwise reduction of the whole set of feature vectors. That is, in each iteration step the sample $x \in \tilde{X}$ with minimum error $E(\tilde{X} \setminus x, x)$ is removed from $\tilde{X}$ (starting with $\tilde{X} = X$). In particular, if the set of feature vectors is too large to handle at once, this method cannot be applied. Depending on the number of samples and the dimension of the feature space, reduced set methods can be computationally expensive in general. Another efficient way to find important samples in the given data set is the \emph{Nyström method}~\cite{WANG2013}. It can be generally applied to symmetric positive semidefinite matrices $A$ in order to compute a decomposition of the form $A = B C^+ B^\top$, where $B$ is a matrix formed by a subset of the columns of $A$ and $C$ is an intersection matrix. In particular, the Nyström method can be used to approximate Gram matrices~\cite{DRINEAS2005, WILLIAMS2000}. That is, for a fixed number of samples $\tilde{m}$, the Nyström algorithm seeks to find a subset $\tilde{X} \subset X$ with $|\tilde{X}| = \tilde{m}$ such that the Gram matrix $G_{X,X} = \Psi_X^\top \Psi_X$ can be approximately written as
\begin{equation}\label{eq: Nystrom}
G_{X,X} \approx G_{X,\tilde{X}} C,
\end{equation}
with $C = G_{\tilde{X}, \tilde{X}} ^+ G_{\tilde{X}, X}$. On the one hand, however, we here have a restriction on $C$ so that there generally may exist better choices for $\tilde{X}$ and $C$ to minimize the error $\lVert G_{X,X} - G_{X, \tilde{X}} C \rVert_F$. On the other hand, the Nyström approximation does not provide a feature space approximation as described in Section~\ref{sec: data-reduced regression} since~\eqref{eq: Nystrom} does not imply $\Psi_X \approx \Psi_{\tilde{X}} C$. Note that only the other direction is true.
In what follows, we will therefore propose a heuristic approach to iteratively construct a subset $\tilde{X}$ such that any feature vector corresponding to a sample $x \in X$ can be approximated by a linear combination of the set $\{\Psi(x) \colon x \in \tilde{X}\}$ up to an arbitrarily small error $\varepsilon$. In Section~\ref{sec: CalCOFI}, results obtained by applying the (recursive) Nyström method as introduced in~\cite{MUSCO2017} and our approach will be compared.
\begin{Remark}
The Nyström method as well as, e.g., the \emph{iterative spectral method} (ISM)~\cite{WU2019} can also be used for the reduction of the feature space dimension. However, our aim is to reduce the number of samples/feature vectors $m$, not the dimension $n$.
\end{Remark}
\subsection{Heuristic approach}
In order to find a subset as described in Section~\ref{sec: analytical formulation}, we introduce a heuristic approach based on a \emph{bottom-up} principle -- in contrast to the reduced set methods described in~\cite{SCHOELKOPF2002}, which are based on a \emph{top-down} selection of the samples. Suppose we are given a subset $\tilde{X}$ of the columns of $X$ and the corresponding transformed data matrix $\Psi_{\tilde{X}}$. For the following approach -- which we call \emph{kernel-based feature space approximation} or in short \emph{kFSA} -- we expand the subset $\tilde{X}$ step by step by adding the vector $x$ that has the largest approximation error~\eqref{eq: approximation error}. The idea is to increase the dimension of the subspace spanned by the columns of $\Psi_{\tilde{X}}$ iteratively without including linearly dependent feature vectors (or even duplicates).
As the first data point, we choose the sample whose feature vector approximates all other columns of $\Psi_X$ in an optimal way, i.e., we consider the extreme case of the minimization problem~\eqref{eq: analytical formulation} where the regularization parameter $\gamma$ is sufficiently large so that only a single sample is selected. We then obtain
\begin{equation*}
x_0 = \argmin_{x \in X} \min_{c \in \mathbb{R}^{1 \times m}} \lVert \Psi_X - \Psi(x)c \rVert_F^2.
\end{equation*}
It holds that
\begin{equation*}
c = \Psi(x)^+ \Psi_X = \frac{1}{\lVert \Psi(x) \rVert_2 ^2} \Psi(x)^\top \Psi_X = \frac{1}{k(x,x)} G_{x, X}
\end{equation*}
and, therefore, $x_0$ is given by
\begin{equation}\label{eq: x_0}
\begin{split}
x_0 &= \argmin_{x \in X} \lVert \Psi_X - \frac{1}{k(x,x)} \Psi(x) G_{x,X} \rVert_F^2\\
&= \argmin_{x \in X} \textrm{tr} \left( \left( \Psi_X - \frac{1}{k(x,x)} \Psi(x) G_{x,X}\right)^\top \left( \Psi_X - \frac{1}{k(x,x)} \Psi(x) G_{x,X}\right) \right)\\
&= \argmin_{x \in X} \textrm{tr} \left( G_{X,X} - \frac{2}{k(x,x)} G_{X,x}G_{x,X} + \frac{1}{k(x,x)^2} G_{X,x} k(x,x) G_{x,X}\right)\\
&= \argmin_{x \in X} \textrm{tr} \left( G_{X,X} - \frac{1}{k(x,x)} G_{X,x}G_{x,X} \right)\\
&= \argmin_{x \in X} \sum_{x^\prime \in X} k(x^\prime, x^\prime) - \frac{k(x,x^\prime)^2}{k(x,x)}\\
&= \argmax_{x \in X} \sum_{x^\prime \in X} \frac{k(x,x^\prime)^2}{k(x,x)}.
\end{split}
\end{equation}
As long as $\Psi_{\tilde{X}} \in \mathbb{R}^{n \times \tilde{m}}$, $n \geq \tilde{m}$, has full column rank, it holds that $G_{\tilde{X}, \tilde{X}}^+ = G_{\tilde{X}, \tilde{X}}^{-1}$ since $G_{\tilde{X}, \tilde{X}}$ is then a non-singular matrix. Thus, we can rewrite the approximation error~\eqref{eq: approximation error} in terms of kernel functions and corresponding Gram matrices.
\begin{Lemma}\label{lemma: kernel-based approximation error}
Using the fact that $\Psi_{\tilde{X}}^+ = G_{\tilde{X}, \tilde{X}}^{-1} \Psi_{\tilde{X}}^\top$, the approximation error~\eqref{eq: approximation error} for any $x \in X$ can be written as
\begin{equation}\label{eq: kernel-based approximation error}
E(\tilde{X}, x) = k(x,x) - G_{x, \tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X}, x}.
\end{equation}
\end{Lemma}
\begin{proof} Using $c = \Psi_{\tilde{X}}^+ \Psi(x)$, we obtain
\begin{equation*}
\begin{split}
E(\tilde{X}, x) &= \lVert \Psi(x) - \Psi_{\tilde{X}} \Psi_{\tilde{X}}^+ \Psi(x) \rVert ^2_2 \\
& = \lVert \Psi(x) - \Psi_{\tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} \Psi_{\tilde{X}}^\top \Psi(x) \rVert ^2_2\\
&= \left(\Psi(x) - \Psi_{\tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} \Psi_{\tilde{X}}^\top \Psi(x) \right)^\top \left(\Psi(x) - \Psi_{\tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} \Psi_{\tilde{X}}^\top \Psi(x) \right) \\
&= \Psi(x)^\top \Psi(x) - 2 \Psi(x)^\top \Psi_{\tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} \Psi_{\tilde{X}}^\top \Psi(x) + \Psi(x)^\top \Psi_{\tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} \underbrace{\Psi_{\tilde{X}}^\top \Psi_{\tilde{X}}}_{=G_{\tilde{X}, \tilde{X}}} G_{\tilde{X}, \tilde{X}}^{-1} \Psi_{\tilde{X}}^\top \Psi(x) \\
&= k(x,x) - G_{x, \tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X}, x}. \qedhere
\end{split}
\end{equation*}
\end{proof}
\noindent Let us denote the vector containing all approximation errors for the samples in $X \setminus \tilde{X}$ by $\Delta$. Using the Hadamard product, this vector can be expressed in a compact way as the following lemma shows.
\begin{Lemma}\label{lemma: error vector - sle}
The vector $\Delta \in \mathbb{R}^{m - \tilde{m}}$ can be written as
\begin{equation}\label{eq: error vector}
\Delta = \emph{\textrm{diag}}\left(G_{X\setminus \tilde{X}, X\setminus \tilde{X}}\right)^\top - \mathds{1}^\top \cdot \left(G_{\tilde{X}, X \setminus \tilde{X} } \odot Z\right),
\end{equation}
where $\mathds{1} \in \mathbb{R}^{\tilde{m}}$ is a vector of ones and $Z$ is the unique solution of
\begin{equation}\label{eq: error vector - Z}
G_{\tilde{X}, \tilde{X}} Z = G_{\tilde{X}, X \setminus \tilde{X}}.
\end{equation}
\end{Lemma}
\begin{proof}
For any $x \in X$, the approximation error~\eqref{eq: kernel-based approximation error} can be expressed as
\begin{equation*}
\begin{split}
E(\tilde{X}, x) &= k(x,x) - \sum_{i=1}^{\tilde{m}} \left( G_{\tilde{X}, x} \right)_i \left( G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X},x} \right)_i \\
&= k(x,x) - \sum_{i=1}^{\tilde{m}} \left( G_{\tilde{X}, x} \odot \left( G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X},x} \right) \right) _i\\
&= k(x,x) - \mathds{1}^\top \cdot \left( G_{\tilde{X}, x} \odot \left( G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X},x} \right) \right).
\end{split}
\end{equation*}
For the error vector $\Delta$, it follows that
\begin{equation*}
\Delta = \emph{\textrm{diag}}\left(G_{X\setminus \tilde{X}, X\setminus \tilde{X}}\right)^\top - \mathds{1}^\top \cdot \Big(G_{\tilde{X}, X \setminus \tilde{X} } \odot \underbrace{G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X}, X \setminus \tilde{X}}}_{=: Z}\Big). \qedhere
\end{equation*}
\end{proof}
\noindent Note that we have to construct the complete Gram matrix $G_{X,X}$ corresponding to all samples only once. For the computation of the approximation errors in each step, we could then simply extract the necessary submatrices. However, using Lemma~\ref{lemma: error vector - sle} for the error computation would result in a high complexity since the dominant computational costs arise from solving the systems of linear equations given in~\eqref{eq: error vector - Z}. That is, supposing we have already found $\tilde{m}$ samples, we then have to solve a system with an $\tilde{m} \times \tilde{m}$-matrix and $m-\tilde{m}$ right-hand sides. Thus, the overall complexity can be estimated by $O \left( \sum_{\tilde{m}=1}^{M} \tilde{m}^3 (m-\tilde{m}) \right)$ if we repeat the procedure $M$ times until the desired accuracy is reached.
In order to reduce the computational effort, we can use an alternative way of calculating the approximation errors. Instead of computing the matrix $Z$ that is needed for the construction of $\Delta$ in~\eqref{eq: error vector} as the solution of the system of linear equations given in~\eqref{eq: error vector - Z}, it is possible to iteratively calculate $G^{-1}_{\tilde{X}, \tilde{X}}$ in order to compute $Z$ directly by matrix multiplication.
\begin{Lemma}\label{lemma: blockwise inversion}
Given matrices $A,B,C,D$ of appropriate size such that $A$ and $D-CA^{-1}B$ are non-singular square matrices, the blockwise inversion formula (also called \emph{Banachiewicz inversion formula}) states
\begin{equation*}
{\begin{bmatrix}A&B\\C&D\end{bmatrix}}^{-1}={\begin{bmatrix}A^{-1}+A^{-1}BS^{-1}CA^{-1}&-A^{-1}BS^{-1}\\-S^{-1}CA^{-1}&S^{-1}\end{bmatrix}},
\end{equation*}
where the matrix $S$ -- called the \emph{Schur complement} -- is given by $S = D-CA^{-1} B$.
\end{Lemma}
\noindent For a proof of the above statement, we refer to~\cite{TIAN2009}. Suppose we want to expand the (linearly independent) set $\tilde{X}$ by a sample $x_\text{new}$ and the inverse of $G_{\tilde{X}, \tilde{X}}$ is known -- which is of course the case for the initial sample. The Gram matrix corresponding to the set $\tilde{X} \cup \{x_\text{new}\}$ is then given by
\begin{equation}\label{eq: block matrix}
G_{\tilde{X} \cup \{x_\text{new}\}, \tilde{X} \cup \{x_\text{new}\}} = \begin{bmatrix}\Psi_{\tilde{X}}^\top \\ \Psi(x_\text{new})^\top \end{bmatrix} \begin{bmatrix}\Psi_{\tilde{X}} & \Psi(x_\text{new})\end{bmatrix} =
\begin{bmatrix} G_{\tilde{X}, \tilde{X}} & G_{\tilde{X}, x_\text{new}} \\ G_{x_\text{new}, \tilde{X}} & G_{x_\text{new},x_\text{new}} \end{bmatrix},
\end{equation}
where $G_{x_\text{new},x_\text{new}}$ is simply the kernel evaluation at $x_\text{new}$, i.e., $G_{x_\text{new},x_\text{new}} = k(x_\text{new},x_\text{new})$. If the feature vector $\Psi(x_\text{new})$ is not an element of the span of the columns of $\Psi_{\tilde{X}}$, then the matrix~\eqref{eq: block matrix} is non-singular and, furthermore, symmetric positive definite. Applying Lemma~\ref{lemma: blockwise inversion}, we can write
\begin{equation}\label{eq: block inverse}
G_{\tilde{X} \cup \{x_\text{new}\}, \tilde{X} \cup \{x_\text{new}\}}^{-1} =
\begin{bmatrix}
G_{\tilde{X}, \tilde{X}}^{-1} + \frac{T T^\top}{S} & -\frac{T}{S} \\
-\frac{T^\top}{S} & \frac{1}{S}
\end{bmatrix}
\end{equation}
with $T = G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X}, x_\text{new}}$ and $S = k(x_\text{new}, x_\text{new}) - G_{x_\text{new}, \tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X}, x_\text{new}} = E(\tilde{X},x_\text{new}) > 0 $. Using~\eqref{eq: block inverse} would already avoid having to solve a system of linear equations. In this case, the dominant computational effort, namely the multiplication of $G_{\tilde{X}, \tilde{X}}^{-1}$ and $G_{\tilde{X}, X \setminus \tilde{X}}$ in every iteration step, can be estimated by $O\left( \sum_{\tilde{m}=1}^{M} \tilde{m}^2 (m - \tilde{m})\right)$. However, we can exploit the block inverse~\eqref{eq: block inverse} to directly construct an iterative scheme for $Z$ and therefore reduce the complexity of our method even further. Each column of the matrix $Z= G^{-1}_{\tilde{X}, \tilde{X}} G_{\tilde{X}, X \setminus \tilde{X}} \in \mathbb{R}^{\tilde{m} \times (m - \tilde{m})}$ is from now on considered as the evaluation of a function $H$ of a set $\tilde{X}$ and a sample $x \in X \setminus \tilde{X}$, i.e., $H(\tilde{X}, x) = G^{-1}_{\tilde{X}, \tilde{X}} G_{\tilde{X},x}$.
\begin{theorem}
For any $x_\text{new}$ with $\Psi(x_\text{new}) \notin \emph{\textrm{span}}\,\Psi_{\tilde{X}}$ and $x \in X$, it holds that
\begin{equation*}
H(\tilde{X} \cup \{x_\text{new}\}, x) = \begin{bmatrix} H(\tilde{X}, x) - H(\tilde{X}, x_\text{new}) \lambda\\ \lambda \end{bmatrix}
\end{equation*}
with $\lambda = \frac{k( x_\text{new}, x) - G_{x_\text{new}, \tilde{X}} H(\tilde{X}, x)}{E(\tilde{X}, x_\text{new})}$.
\end{theorem}
\begin{proof}
By definition, we have
\begin{equation*}
H(\tilde{X} \cup \{x_\text{new}\}, x) = G_{\tilde{X} \cup \{x_\text{new}\}, \tilde{X} \cup \{x_\text{new}\}}^{-1} G_{\tilde{X} \cup \{x_\text{new}\}, x}.
\end{equation*}
Using~\eqref{eq: block inverse}, it follows that
\begin{equation*}
H(\tilde{X} \cup \{x_\text{new}\}, x) = \begin{bmatrix}
G_{\tilde{X}, \tilde{X}}^{-1} + \frac{T T^\top}{S} & -\frac{T}{S} \\
-\frac{T^\top}{S} & \frac{1}{S}
\end{bmatrix} \begin{bmatrix} G_{\tilde{X} , x} \\ k( x_\text{new}, x) \end{bmatrix},
\end{equation*}
with $T = G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X}, x_\text{new}} = H(\tilde{X}, x_\text{new})$ and $S = E(\tilde{X}, x_\text{new})$, see Lemma~\ref{lemma: kernel-based approximation error}. Therefore, we obtain
\begin{equation*}
\begin{split}
H(\tilde{X} \cup \{x_\text{new}\}, x) &= \begin{bmatrix} G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X} , x} + H(\tilde{X}, x_\text{new}) \left( \frac{G_{x_\text{new}, \tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X} , x} - k(x_\text{new}, x)}{E(\tilde{X}, x_\text{new})} \right) \\ \frac{k(x_\text{new}, x) - G_{x_\text{new}, \tilde{X}} G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X}, x}}{E(\tilde{X}, x_\text{new})} \end{bmatrix}\\
&= \begin{bmatrix} H(\tilde{X} , x) - H(\tilde{X} , x_\text{new}) \left( \frac{ k( x_\text{new}, x) -G_{x_\text{new}, \tilde{X}} H(\tilde{X} , x) }{E(\tilde{X}, x_\text{new})} \right) \\ \frac{ k(x_\text{new}, x) -G_{x_\text{new}, \tilde{X}} H(\tilde{X} , x) }{E(\tilde{X}, x_\text{new})} \end{bmatrix},
\end{split}
\end{equation*}
which yields the assertion. Note that $H(\tilde{X}, x) \in \mathbb{R}^{\tilde{m}}$ is \emph{not} a subvector of $H(\tilde{X} \cup x_\text{new}, x) \in \mathbb{R}^{\tilde{m}+1} $.
\end{proof}
\newcommand{\restrictedto}[2]{#1_{\mkern 1mu \vrule depth -1.5ex height 3ex \mkern 2mu \smash{\raisebox{1.5ex}{\scriptsize$#2$}}}}
\noindent Considering $Z = [H(\tilde{X}, x)]_{x \in X \setminus \tilde{X}} \in \mathbb{R}^{\tilde{m} \times (m - \tilde{m})} $ as given in \eqref{eq: error vector - Z}, we define
\begin{equation}\label{eq: Lambda}
\Lambda = [\lambda]_{x \in X \setminus \tilde{X}} = \frac{1}{E(\tilde{X}, x_\text{new})} \left( G_{x_\text{new}, X \setminus \tilde{X}} - G_{x_\text{new}, \tilde{X}} Z \right) \in \mathbb{R}^{m - \tilde{m}}.
\end{equation}
Then, the matrix
\begin{equation*}
Z_\text{new} = G_{\tilde{X} \cup \{x_\text{new}\}, \tilde{X} \cup \{x_\text{new}\}}^{-1} G_{\tilde{X} \cup \{x_\text{new}\}, X \setminus (\tilde{X} \cup \{x_\text{new}\})} \in \mathbb{R}^{\tilde{m}+1 \times (m - \tilde{m} -1 )}
\end{equation*}
required for the error computation~\eqref{eq: error vector} when considering the updated set $\tilde{X} \cup \{x_\text{new}\}$ instead of $\tilde{X}$ can be written as
\begin{equation}\label{eq: Z_new}
Z_\text{new} = \begin{bmatrix} Z - Z_{| \raisebox{-1.5pt}{$ \scriptstyle x_\text{new} $}} \Lambda^\top \\[0.2cm] \Lambda^\top \end{bmatrix}_{\big| \raisebox{-3pt}{$ \scriptstyle X \setminus (\tilde{X} \cup \{x_\text{new}\})$}},
\end{equation}
where $Z_{| \raisebox{-1.5pt}{$ \scriptstyle x_\text{new} $}} = H(\tilde{X}, x_\text{new})$ denotes the column of $Z$ corresponding to the sample $x_\text{new} \in X \setminus \tilde{X}$. Note that the matrix computed in~\eqref{eq: Z_new} is also restricted to the columns corresponding to the set ${X \setminus (\tilde{X} \cup \{x_\text{new}\})}$. We combine the iterative construction of the matrix $Z$ with the error-vector computation given in~\eqref{eq: error vector}. The above derivations are summarized in Algorithm~\ref{alg: sample reduction}.
\begin{Lemma}\label{lemma: kFSA complexity}
Neglecting the computational costs for the construction of $G_{X,X}$, the complexity of Algorithm~\ref{alg: sample reduction} can be estimated by $O( m^2 + m M^2 )$, where $m$ is the number of given training samples and $M$ the number of extracted samples.
\end{Lemma}
\begin{proof}
Determining the initial sample in line~\ref*{alg: sample reduction - initial} needs $O(m^2)$ operations. For every execution of line~\ref*{alg: sample reduction - errors}, the dominant computational costs arise from calculating the Hadamard product in~\eqref{eq: error vector}, i.e., ${O(\tilde{m} (m-\tilde{m}))}$. Since the error $E(\tilde{X}, x_\text{new})$ is already known in form of $\delta_\text{new}$, the complexity of line~\ref*{alg: sample reduction - update Z} is divided into the computations of $\Lambda$ and $Z_\text{new}$ as given in~\eqref{eq: Lambda} and \eqref{eq: Z_new}, respectively. Both can be estimated by $O(\tilde{m} (m-\tilde{m}))$ as well. Repeating lines~\ref*{alg: sample reduction - errors} to \ref*{alg: sample reduction - update Z} of the above algorithm $M$ times, i.e., until the desired accuracy is reached, and adding all computational costs yields \begin{equation*}
\begin{split}
O\left(m^2 + \sum_{\tilde{m}=1}^M \tilde{m} (m -\tilde{m})\right) &= O \left( m^2 + m \sum_{\tilde{m}=1}^M \tilde{m} - \sum_{\tilde{m}=1}^M \tilde{m}^2 \right) \\
&= O \left( m^2 + \frac{m M (M+1)}{2} - \frac{M (M+1) (2M+1)}{6} \right) \\
&= O \left( m^2 + M (M+1) \left( \frac{m}{2} - \frac{2M+1}{6} \right) \right),
\end{split}
\end{equation*}
which can be roughly summarized as $O(m^2+ m M^2)$. Note that this estimation does not include a potential speed up due to removing samples for which the approximation error is already low enough, see line~\ref*{alg: sample reduction - remove}.
\end{proof}
\begin{mdframed}[backgroundcolor=boxback,hidealllines=true]
\vspace*{-2ex}
\begin{algorithm}[H]
\caption{Kernel-based feature space approximation (kFSA).}
\label{alg: sample reduction}
\begin{spacing}{1.2}
\begin{tabular}{ll}
\textbf{Input:} & data matrix $X$, kernel function $k$, and threshold $\varepsilon>0$.\\
\textbf{Output:} & subset $\tilde{X} \subset X$ with $E(\tilde{X}, x)<\varepsilon$ for all $x \in X$.
\end{tabular}
\vspace{0.2cm}\hrule\vspace{0.2cm}
\begin{algorithmic}[1]
\State Set $\tilde{X} := \{x_0\}$, see \eqref{eq: x_0}, and $X_\text{left} := X \setminus \{x_0\}$.
\label{alg: sample reduction - initial}
\State Define $Z := G_{\tilde{X}, \tilde{X}}^{-1} G_{\tilde{X}, X_\text{left}} = (1/k(x_0, x_0)) G_{x_0, X_\text{left}}$.
\While{$X_\text{left}$ is not empty}
\State Use $Z$ to compute the vector $\Delta \in \mathbb{R}^{|X_\text{left}|}$ of approximation errors, see \eqref{eq: error vector}.\label{alg: sample reduction - errors}
\State Define $x_\text{new} \in X$ to be the sample corresponding to the maximum error $\delta_\text{new}$ in $\Delta$.
\State Remove all $x$ from $X_\text{left}$ with corresponding approximation errors smaller than $\varepsilon$.\label{alg: sample reduction - remove}
\If{$\delta_\text{new} \geq \varepsilon$}
\State Add sample vector $x_\text{new}$ to $\tilde{X}$ and remove it from $X_\text{left}$.
\label{alg: sample reduction - add sample}
\State Update $Z$ as described above in~\eqref{eq: Z_new}.\label{alg: sample reduction - update Z}
\EndIf
\EndWhile
\end{algorithmic}
\end{spacing}
\end{algorithm}
\vspace*{-2ex}%
\end{mdframed}
\vspace{0.5cm}
When Algorithm~\ref{alg: sample reduction} terminates, all given samples $x \in X$ which are not an element of $\tilde{X}$ can be approximated with an error $E(\tilde{X}, x)$ smaller than $\varepsilon$. In case the Gram matrix corresponding to the whole training set consumes too much memory, the algorithm may be applied iteratively to subsets of the training set in order to filter unnecessary samples. Moreover, suppose we have found a subset $\tilde{X} \subset X$ by applying Algorithm~\ref{alg: sample reduction}. If we subsequently want to extend the training data set, one of the main advantages of our method in comparison to, e.g., reduced set methods is that it is easy to decide whether or not a new sample is added to $\tilde{X}$. We do not have to apply the algorithm again to the extended set but can simply continue our bottom-up approach.
\section{Results}\label{sec: Results}
In this section, we will present three examples for the application of data-reduced regression and classification, namely the MNIST data set, the Fermi--Pasta--Ulam--Tsingou problem, and hydrographic data from the California Cooperative Oceanic Fisheries Investigations. The numerical experiments have been performed on a Linux machine with 128 GB RAM and a 3 GHz Intel Xeon processor with 8 cores. The algorithms have been implemented in Matlab R2018b and are available on GitHub: \url{https://github.com/PGelss/kFSA}.
\subsection{MNIST data set}
Let us consider the classification of the MNIST data set~\cite{LECUN1998} as a first example. The set contains grayscale images of handwritten digits and their corresponding labels from $0$ to $9$ (represented using one-hot encoding). Originally, the images have a resolution of $28 \times 28$ pixels and are divided into $60000$ training and $10000$ test samples.\!\footnote{\url{http://yann.lecun.com/exdb/mnist/}} We downsample the images to $14 \times 14$ pixels by averaging groups of four pixels, cf.~\cite{STOUDENMIRE2016}. Additionally, we normalize the samples such that the largest pixel value in each image is equal to $1$. This has shown to yield better classification rates in our experiments. In~\cite{KLUS2019}, we already used the kernel-based methods described in Section~\ref{sec: kernel-based learning} to classify the downsampled MNIST images. Due to the large amount of training data, this example set is an ideal candidate for applying our proposed set-reduction method.
Given a subset of mutually different pixels $i_1, \dots, i_r \in \{1, \dots , 14^2\}$, we again use feature maps $\mathbf{\Psi} \colon \mathbb{R}^r \to \mathbb{R}^{2 \times 2 \times \dots \times 2}$ of the form
\begin{equation}\label{eq: MNIST feature map}
\mathbf{\Psi}(x) = \Psi(x_{i_1}) \otimes \Psi(x_{i_2}) \otimes \dots \otimes \Psi(x_{i_r})= \begin{bmatrix}\cos(\kappa x_{i_1}) \\ \sin(\kappa x_{i_1})\end{bmatrix} \otimes \begin{bmatrix}\cos(\kappa x_{i_2}) \\ \sin(\kappa x_{i_2})\end{bmatrix} \otimes \dots \otimes \begin{bmatrix}\cos(\kappa x_{i_r}) \\ \sin(\kappa x_{i_r})\end{bmatrix},
\end{equation}
where $x_{i_1}, \dots, x_{i_r}$ are the corresponding pixel values and $\kappa>0$ is the kernel parameter. In contrast to, e.g., \cite{KLUS2019, STOUDENMIRE2016}, we do not consider all pixels of a given image at once. Instead, we partition the images into $9$ blocks, see Figure~\ref{fig: MNIST partition}, and then apply feature maps as given in~\eqref{eq: MNIST feature map} separately. The feature map~\eqref{eq: MNIST feature map} is defined in terms of tensor products. That is, the entries of $\mathbf{\Psi}(x)$ are given by products of $r$ cosine or sine functions evaluated at the given pixels, i.e.,
\begin{equation*}
\mathbf{\Psi}(x)_{b_1, \dots, b_r} = \left( \Psi(x_{i_1}) \right)_{b_1} \cdot \left( \Psi(x_{i_2}) \right)_{b_2} \cdot \ldots \cdot \left( \Psi(x_{i_r}) \right)_{b_r},
\end{equation*}
where
\begin{equation*}
\left( \Psi(x_{i_j}) \right)_{b_j} = \begin{cases} \cos(\kappa x_{i_j}), & \text{if }b_j = 1, \\ \sin(\kappa x_{i_j}), & \text{if }b_j =2.\end{cases}
\end{equation*}
The corresponding kernel is then given by
\begin{equation*}
\mathbf{\Psi}(x)^\top \mathbf{\Psi}(x^\prime) = \bigotimes_{j=1}^r \left( \begin{bmatrix}\cos(\kappa x_{i_j}) & \sin(\kappa x_{i_j})\end{bmatrix} \cdot \begin{bmatrix}\cos(\kappa x^\prime_{i_j}) \\ \sin(\kappa x^\prime_{i_j})\end{bmatrix} \right) = \prod_{j=1}^r \cos(\kappa (x_{i_j} - x^\prime_{i_j}) ).
\end{equation*}
\begin{figure}
\centering
\scalebox{0.8}{
\begin{tikzpicture}
\def1{4.2}
\node[inner sep = 0, outer sep = 0, anchor=south west, opacity=0.5] at (0,0) {\includegraphics[width=4.2cm, height=4.2cm]{pictures/mnist_3.png}};
\foreach 14.75 in {1,2,3,4,5,6,7,8,9,10,11,12,13} {\draw[opacity=0.25] (0.3*14.75, 0) --++ (0,1);}
\foreach 14.75 in {1,2,3,4,5,6,7,8,9,10,11,12,13} {\draw[opacity=0.25] (0, 0.3*14.75) --++ (1,0);}
\draw[line width=0.03cm] (0,0) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\def1{1.2}
\draw[line width=0.03cm] (0.3,0.3) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\draw[line width=0.03cm] (0.3,1.5) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\draw[line width=0.03cm] (0.3,2.7) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\draw[line width=0.03cm] (1.5,0.3) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\draw[line width=0.03cm] (1.5,1.5) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\draw[line width=0.03cm] (1.5,2.7) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\draw[line width=0.03cm] (2.7,0.3) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\draw[line width=0.03cm] (2.7,1.5) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\draw[line width=0.03cm] (2.7,2.7) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\draw[dashed] (2.7,1.5) -- (5,0.9);
\draw[dashed] (3.9,1.5) -- (6.2,0.9);
\draw[dashed] (2.7,2.7) -- (5,2.1);
\draw[dashed] (3.9,2.7) -- (6.2,2.1);
\draw[fill=white, line width=0.03cm] (5,0.9) --++ (0,1) --++ (1,0) --++ (0,-1) --++ (-1,0);
\node[anchor=center] at (5.6,1.5) {$k_{ij}$};
\node[] at (7.1,2.1) {\scalebox{2}{$\rightsquigarrow$}};
\def14.75{8}
\def0{4.1}
\def1{1.5}
\draw[pattern=north east lines, pattern color=black!50, draw=none, inner sep=0, outer sep=0] (14.75,0) rectangle (14.75+0.33*1,0-0.33*1);
\draw[] (14.75,0) --++ (1,0) --++ (0,-1) --++ (-1,0) --++ (0,1);
\draw[] (14.75+0.33*1,0) --++ (0,-1);
\draw[] (14.75+0.67*1,0) --++ (0,-1);
\draw[] (14.75,0-0.33*1) --++ (1,0);
\draw[] (14.75,0-0.67*1) --++ (1,0);
\node[] at (10, 3.35) {$+$};
\def14.75{10.5}
\def0{4.1}
\def1{1.5}
\draw[pattern=north east lines, pattern color=black!50, draw=none, inner sep=0, outer sep=0] (14.75+0.33*1,0) rectangle (14.75+0.67*1,0-0.33*1);
\draw[] (14.75,0) --++ (1,0) --++ (0,-1) --++ (-1,0) --++ (0,1);
\draw[] (14.75+0.33*1,0) --++ (0,-1);
\draw[] (14.75+0.67*1,0) --++ (0,-1);
\draw[] (14.75,0-0.33*1) --++ (1,0);
\draw[] (14.75,0-0.67*1) --++ (1,0);
\node[] at (12.5, 3.35) {$+$};
\node[] at (13.375, 3.35) {$\cdots$};
\node[] at (14.25, 3.35) {$+$};
\def14.75{14.75}
\def0{4.1}
\def1{1.5}
\draw[pattern=north east lines, pattern color=black!50, draw=none, inner sep=0, outer sep=0] (14.75+0.67*1,0-0.67*1) rectangle (14.75+1,0-1);
\draw[] (14.75,0) --++ (1,0) --++ (0,-1) --++ (-1,0) --++ (0,1);
\draw[] (14.75+0.33*1,0) --++ (0,-1);
\draw[] (14.75+0.67*1,0) --++ (0,-1);
\draw[] (14.75,0-0.33*1) --++ (1,0);
\draw[] (14.75,0-0.67*1) --++ (1,0);
\node[] at (8.05, 0.85) {$+$};
\def14.75{8.55}
\def0{1.6}
\def1{1.5}
\draw[pattern=north east lines, pattern color=black!50, draw=none, inner sep=0, outer sep=0] (14.75,0) rectangle (14.75+0.67*1,0-0.33*1);
\draw[] (14.75,0) --++ (1,0) --++ (0,-1) --++ (-1,0) --++ (0,1);
\draw[] (14.75+0.33*1,0) --++ (0,-1);
\draw[] (14.75+0.67*1,0) --++ (0,-1);
\draw[] (14.75,0-0.33*1) --++ (1,0);
\draw[] (14.75,0-0.67*1) --++ (1,0);
\node[] at (10.55, 0.85) {$+$};
\def14.75{11.05}
\def0{1.6}
\def1{1.5}
\draw[pattern=north east lines, pattern color=black!50, draw=none, inner sep=0, outer sep=0] (14.75,0) rectangle (14.75+0.33*1,0-0.33*1);
\draw[pattern=north east lines, pattern color=black!50, draw=none, inner sep=0, outer sep=0] (14.75+0.67*1,0) rectangle (14.75+1,0-0.33*1);
\draw[] (14.75,0) --++ (1,0) --++ (0,-1) --++ (-1,0) --++ (0,1);
\draw[] (14.75+0.33*1,0) --++ (0,-1);
\draw[] (14.75+0.67*1,0) --++ (0,-1);
\draw[] (14.75,0-0.33*1) --++ (1,0);
\draw[] (14.75,0-0.67*1) --++ (1,0);
\node[] at (13.05, 0.85) {$+$};
\node[] at (13.65, 0.85) {$\cdots$};
\node[] at (14.25, 0.85) {$+$};
\def14.75{14.75}
\def0{1.6}
\def1{1.5}
\draw[pattern=north east lines, pattern color=black!50, draw=none, inner sep=0, outer sep=0] (14.75,0) rectangle (14.75+1,0-1);
\draw[] (14.75,0) --++ (1,0) --++ (0,-1) --++ (-1,0) --++ (0,1);
\draw[] (14.75+0.33*1,0) --++ (0,-1);
\draw[] (14.75+0.67*1,0) --++ (0,-1);
\draw[] (14.75,0-0.33*1) --++ (1,0);
\draw[] (14.75,0-0.67*1) --++ (1,0);
\end{tikzpicture}}
\caption{Block decomposition of the MNIST data set: Each image is divided into $9$ disjoint $4 \times 4$ blocks where the pixels at the margin are neglected since their corresponding values are zero for almost all images in the data set. Then, a kernel function is defined for each subgroup of the pixels. The kernel combinations encoded in the Gram matrix $G$~\eqref{eq: MNIST Gram matrix} are depicted on the right-hand side.}
\label{fig: MNIST partition}
\end{figure}
\noindent Thus, we consider $9$ kernel functions $k_1, \dots, k_9$ corresponding to different subgroups of the pixels as shown in Figure~\ref{fig: MNIST partition}, compute the associated Gram matrices $G_1, \dots, G_9 \in \mathbb{R}^{m \times m}$ and define
\begin{equation}\label{eq: MNIST Gram matrix}
\begin{split}
G = \frac{1}{511} \left( (G_1 + \mathds{1}) \odot \ldots \odot(G_9 + \mathds{1}) - \mathds{1} \right)= \frac{1}{511} \sum_{p \in I} G_1 ^{\odot p_1} \odot G_2^{ \odot p_2} \odot \ldots \odot G_9^{\odot p_9},
\end{split}
\end{equation}
where $\mathds{1} \in \mathbb{R}^{m \times m}$ denotes the matrix of ones and
\begin{equation*}
I = \{p = (p_1, \dots, p_9) \in [0,1]^9 \colon \text{at least one } p_i \neq 0)\}
\end{equation*}
is a set of binary multi-indices. By the notation $\odot p_i$ in~\eqref{eq: MNIST Gram matrix} we mean the element-wise exponentiation of the matrices $G_i$, i.e., $G^{\odot 0}_i = \mathds{1}$ and $G^{\odot 1}_i = G_i$. The matrix $G$ is the sum over all possible $q$-combinations, $q \geq 1$, of Hadamard products of the matrices $G_1, \dots, G_9$ as depicted in the right part of Figure~\ref{fig: MNIST partition}. Each combination represents the application of the kernel corresponding to the feature map~\eqref{eq: MNIST feature map} on a subgroup of the different blocks. That is, we consider
\begin{equation*}
\sum_{q =1}^9 \begin{pmatrix} 9 \\ q \end{pmatrix} = 2^9 -1 = 511
\end{equation*}
different kernel functions since the product of kernels again forms a kernel, see~\cite{STEINWART2008}. The same holds for the sum of kernels. Let us denote the kernel function corresponding to the Gram matrix $G$ in~\eqref{eq: MNIST Gram matrix} by $k$.
In~\cite{STOUDENMIRE2016}, the proposed value for the kernel parameter is $\kappa = \pi / 2$. However, as discussed in~\cite{KLUS2019}, the optimal choice can vary. Thus, we consider different values for the kernel parameter $\kappa$ as well as for the threshold $\varepsilon$ in Algorithm~\ref{alg: sample reduction}. Since it is reasonable to assume that the feature vectors corresponding to different categories are linearly independent, we split the training set into the different classes and apply Algorithm~\ref{alg: sample reduction} to each category separately. The number of samples extracted by our method is shown in Figure~\ref{fig: MNIST results}~(a).
\begin{figure}[htbp]
\centering
\begin{subfigure}{0.45\textwidth}
\centering
\caption{}
\includegraphics[width=7cm]{pictures/MNIST_1.png}
\end{subfigure}%
\hspace*{0.75cm}
\begin{subfigure}{0.45\textwidth}
\centering
\caption{}
\includegraphics[width=7cm]{pictures/MNIST_2.png}
\end{subfigure}%
\caption{Application of kFSA to the MNIST data set: (a) Number of extracted samples per digit for $\kappa=0.5$ and different thresholds. (b) Classification rates obtained on the test set as functions of $\varepsilon$ for different values of $\kappa$, both between $0$ and $1$. The intervals in which the classification rates are constant for small values of $\kappa$ indicate that only one sample for each category is extracted.}
\label{fig: MNIST results}
\end{figure}
The numbers of extracted samples for different thresholds show that the digit $1$ is subject to the least variation since even for thresholds close to zero only a relatively small number of samples remains. For instance, if we consider $\kappa=1$ and set $\varepsilon = 0.05$, nearly all samples from the training data set are extracted by Algorithm~\ref{alg: sample reduction} except for the samples corresponding to digit $1$ where only $1820$ out of $6742$ images are included in the set $\tilde{X}$. In contrast to that, the feature vectors of the samples corresponding to the digit $2$ show the highest degree of linear independence, i.e., a comparatively large number of samples is needed in order to reach the desired approximation errors~\eqref{eq: approximation error} among all respective feature vectors. Since the considered kernel is normalized, i.e., $k(x,x) = 1$ for all $x \in X$, the approximation errors are smaller than $1$ for any initial sample $x_0$~\eqref{eq: x_0} in a given category. Thus, only one sample is extracted per category if we choose a threshold of $\varepsilon=1$, whereas all given samples in the training set are taken into account if we set $\varepsilon=0$. In the latter case, the minimization problems~\eqref{eq: minimization problem 2} are ill-conditioned and additional regularization is necessary. Therefore, we apply \emph{kernel ridge regression}~\cite{MURPHY2012}, i.e., we solve the minimization problem
\begin{equation*}
\min_{\Theta \in \mathbb{R}^{d^prime \times m}} \lVert Y - \Theta \left(G_{X,X} + \gamma \mathrm{Id} \right) \rVert_F^2
\end{equation*}
with $\gamma=10^{-10}$.
For the test phase, we solve the minimization problem~\eqref{eq: minimization problem 3} and construct the corresponding target function~\eqref{eq: minimization problem 3 - f}. Given a test vector $x$, the index of the largest entry of $f(x)$ (interpreted as a vector of likelihoods) then defines the predicted category. Figure~\ref{fig: MNIST results}~(b) shows the amount of correctly identified images in the test set for different kernel parameters and thresholds. As the kernel parameter approaches $1$, the classification rate tends to increase even for larger thresholds. On the one hand, we observe the effect that for a fixed threshold more and more samples are extracted with increasing kernel parameter. On the other hand, however, note that we achieve high classification rates using only a fraction of the training set instead the whole set. In fact, Table~\ref{tab: MNIST results} shows that in most cases the generalizability increases for some thresholds $\varepsilon>0$.
\begin{table}[h]
\renewcommand{\arraystretch}{1.3}
\caption{Application of kFSA to the MNIST data set: For each choice of $\kappa$, we show the threshold $\varepsilon>0$ and the numbers of samples per digit corresponding to the highest classification rates (CR) obtained by applying Algorithm~\ref{alg: sample reduction}. Except for the digit $1$ -- where we get a classification rate of $97.53\%$ when using all $60000$ samples -- the results are better than the respective rates for $\varepsilon=0$.}
\centering
\begin{tabular}{c|c|cccccccccc|c}
\hline
\multirow{2}{*}{$\kappa$} & \multirow{2}{*}{$\varepsilon$} & \multicolumn{10}{c|}{number of samples per digit} & \multirow{2}{*}{CR}\\
\cline{3-12}
& & $0$ & $1$ & $2$ & $3$ & $4$ & $5$ & $6$ & $7$ & $8$ & $9$ & \\
\hline
$0.1$ & $0.01$ & $74$ & $41$ & $91$ & $81$ & $76$ & $82$ & $74$ & $69$ & $88$ & $73$ & $96.36\%$\\
$0.2$ & $0.01$ & $510$ & $142$ & $751$ & $623$ & $473$ & $592$ & $443$ & $375$ & $669$ & $401$ & $98.39\%$\\
$0.3$ & $0.01$ & $1892$ & $340$ & $3027$ & $2426$ & $1773$ & $2237$ & $1608$ & $1317$ & $2430$ & $1319$ & $98.82\%$\\
$0.4$ & $0.02$ & $2763$ & $418$ & $4336$ & $3477$ & $2559$ & $3210$ & $2310$ & $1814$ & $3426$ & $1837$ & $98.95\%$\\
$0.5$ & $0.04$ & $3301$ & $449$ & $4972$ & $4062$ & $3024$ & $3760$ & $2708$ & $2117$ & $3980$ & $2178$ & $98.99\%$\\
$0.6$ & $0.07$ & $3747$ & $469$ & $5370$ & $4515$ & $3399$ & $4179$ & $3055$ & $2377$ & $4393$ & $2468$ & $99.01\%$\\
$0.7$ & $0.16$ & $3137$ & $368$ & $4901$ & $3974$ & $2872$ & $3650$ & $2566$ & $1964$ & $3920$ & $2038$ & $98.98\%$\\
$0.8$ & $0.19$ & $3923$ & $441$ & $5527$ & $4742$ & $3581$ & $4349$ & $3196$ & $2464$ & $4613$ & $2576$ & $98.99\%$\\
$0.9$ & $0.19$ & $4951$ & $582$ & $5884$ & $5614$ & $4582$ & $5058$ & $4140$ & $3265$ & $5372$ & $3470$ & $98.98\%$\\
$1.0$ & $0.27$ & $4927$ & $554$ & $5881$ & $5604$ & $4555$ & $5038$ & $4100$ & $3222$ & $5359$ & $3436$ & $98.98\%$\\
\hline
\end{tabular}
\label{tab: MNIST results}
\end{table}
For example, the highest classification rate of $99.01\%$ is obtained by only using approximately $57\%$ of the given training samples. Moreover, only $2035$ of the $60000$ samples are needed to achieve a classification rate larger than $98\%$ ($\kappa=0.6$, $\varepsilon=0.54$, CR$=98.03\%$). Thus, small numbers of samples, extracted by Algorithm~\ref{alg: sample reduction}, may be sufficient to obtain satisfying or even increased classification rates. The best result without applying kFSA, $98.93\%$, is obtained when setting $\kappa =0.7$.
\subsection{Fermi--Pasta--Ulam--Tsingou model}
As a second example for the application of kFSA, we consider the Fermi--Pasta--Ulam--Tsingou model, see \cite{FERMI1955}, which represents a vibrating string by a system of $d$ coupled oscillators fixed at the end points as shown in Figure~\ref{fig: fpu model}.
\begin{figure}[htbp]
\centering
\begin{tikzpicture}
\def1.5{1.5}
\def1{1}
\def0{0}
\draw[pattern=north west lines, pattern color=black!50, draw=none, inner sep=0, outer sep=0] (5-3*1.5, 0-0.5*1) rectangle (5-3*1.5-0.25,0+0.5*1);
\draw[pattern=north west lines, pattern color=black!50, draw=none, inner sep=0, outer sep=0] (5+3*1.5, 0-0.5*1) rectangle (5+3*1.5+0.25,0+0.5*1);
\draw[] (5-3*1.5,0+0.5*1) -- ++ (0,-1);
\draw[dashed] (5-2*1.5,0+0.5*1) -- ++ (0,-1);
\draw[dashed] (5-1*1.5,0+0.5*1) -- ++ (0,-1);
\draw[dashed] (5+1*1.5,0+0.5*1) -- ++ (0,-1);
\draw[dashed] (5+2*1.5,0+0.5*1) -- ++ (0,-1);
\draw[] (5+3*1.5,0+0.5*1) -- ++ (0,-1);
\FPeval{\xa}{5-3*1.5}
\FPeval{\xb}{5-2*1.5+0.2-0.5}
\draw[rounded corners=1pt, draw=black!60, line width=0.025cm] (\xa,0) -- ++ (0.166*\xb-0.166*\xa,0) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.166*\xb-0.166*\xa,0.2*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,0);
\FPeval{\xa}{5-2*1.5+0.2-0.3}
\FPeval{\xb}{5-1*1.5-0.4+0.6}
\draw[rounded corners=1pt, draw=black!60, line width=0.025cm] (\xa,0) -- ++ (0.166*\xb-0.166*\xa,0) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.166*\xb-0.166*\xa,0.2*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,0);
\FPeval{\xa}{5-1*1.5-0.4+0.8}
\FPeval{\xb}{5-1*1.5-0.2+0.1+1.2}
\draw[rounded corners=1pt, draw=black!60, line width=0.025cm] (\xa,0) -- ++ (0.166*\xb-0.166*\xa,0) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.166*\xb-0.166*\xa,0.2*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,0);
\draw[dotted] (5-1*1.5-0.2+0.1+1.2+0.1,0) -- (5+1*1.5-0.1-0.1-1.2-0.1,0);
\FPeval{\xa}{5+1*1.5-0.1-0.1-1.2}
\FPeval{\xb}{5+1*1.5-0.2-0.1}
\draw[rounded corners=1pt, draw=black!60, line width=0.025cm] (\xa,0) -- ++ (0.166*\xb-0.166*\xa,0) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.166*\xb-0.166*\xa,0.2*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,0);
\FPeval{\xa}{5+1*1.5-0.2+0.1}
\FPeval{\xb}{5+2*1.5+0.3-0.5}
\draw[rounded corners=1pt, draw=black!60, line width=0.025cm] (\xa,0) -- ++ (0.166*\xb-0.166*\xa,0) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.166*\xb-0.166*\xa,0.2*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,0);
\FPeval{\xa}{5+2*1.5+0.15-0.3}
\FPeval{\xb}{5+3*1.5}
\draw[rounded corners=1pt, draw=black!60, line width=0.025cm] (\xa,0) -- ++ (0.166*\xb-0.166*\xa,0) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.166*\xb-0.166*\xa,0.2*1) -- ++ (0.166*\xb-0.166*\xa,-0.2*1) -- ++ (0.0833*\xb-0.0833*\xa,0.1*1) -- ++ (0.166*\xb-0.166*\xa,0);
\draw[] (5-2*1.5,0-0.5*1-0.15) -- (5-2*1.5-0.2,0-0.5*1-0.15) node[below, midway] {$x_1$};
\draw[] (5-2*1.5,0-0.5*1-0.15+0.05) -- ++ (0,-0.1);
\draw[] (5-2*1.5-0.2,0-0.5*1-0.15+0.05) -- ++ (0,-0.1);
\draw[] (5-1*1.5,0-0.5*1-0.15) -- (5-1*1.5+0.3,0-0.5*1-0.15) node[below, midway] {$x_2$};
\draw[] (5-1*1.5,0-0.5*1-0.15+0.05) -- ++ (0,-0.1);
\draw[] (5-1*1.5+0.3,0-0.5*1-0.15+0.05) -- ++ (0,-0.1);
\draw[] (5+1*1.5,0-0.5*1-0.15) -- (5+1*1.5-0.2,0-0.5*1-0.15) node[below, midway] {$x_{d-1}$};
\draw[] (5+1*1.5,0-0.5*1-0.15+0.05) -- ++ (0,-0.1);
\draw[] (5+1*1.5-0.2,0-0.5*1-0.15+0.05) -- ++ (0,-0.1);
\draw[] (5+2*1.5,0-0.5*1-0.15) -- (5+2*1.5-0.1,0-0.5*1-0.15) node[below, midway] {$x_d$};
\draw[] (5+2*1.5,0-0.5*1-0.15+0.05) -- ++ (0,-0.1);
\draw[] (5+2*1.5-0.1,0-0.5*1-0.15+0.05) -- ++ (0,-0.1);
\node[shape=circle,inner sep=0.1cm, outer sep=0, draw, fill=black] at (5-2*1.5-0.2,0) {};
\node[shape=circle,inner sep=0.1cm, outer sep=0, draw, fill=black] at (5-1*1.5+0.3,0) {};
\node[shape=circle,inner sep=0.1cm, outer sep=0, draw, fill=black] at (5+1*1.5-0.2,0) {};
\node[shape=circle,inner sep=0.1cm, outer sep=0, draw, fill=black] at (5+2*1.5-0.1,0) {};
\end{tikzpicture}
\caption{Fermi--Pasta--Ulam--Tsingou model: Representation of a vibrating string by a set of masses coupled by springs.}
\label{fig: fpu model}
\end{figure}
The governing equations of this dynamical system are given by second-order differential equations of the form
\begin{equation}\label{eq: FPU}
\ddot{x}_i = (x_{i+1} - 2 x_i + x_{i-1}) + \beta \left((x_{i+1} - x_i)^3 - (x_i - x_{i-1})^3 \right),
\end{equation}
for $i=1, \dots, d$, where we assume cubic coupling terms between the variables $x_i$ representing the displacements from the stationary positions of the oscillators, see Figure~\ref{fig: fpu model}. We set $x_0 = x_{d+1}=0$ since the end points of the chain are supposed to be fixed. The parameter $\beta \in \mathbb{R}$ defines the coupling strength. In \cite{GELSS2019}, we applied MANDy -- the tensor-based version of SINDy~\cite{BRUNTON2016} -- to randomly generated training data in order to recover the governing equations \eqref{eq: FPU}. Here, we want to consider the same problem, but apply kernel-based regression as described in Section~\ref{sec: data-reduced regression} using a polynomial kernel. That is, we consider the kernel function
\begin{equation}\label{eq: FPU kernel}
k(x, x^\prime) = (\kappa + x^\top x^\prime)^q,
\end{equation}
with $\kappa=1$ and $q=3$. We construct the data matrices $X, Y \in \mathbb{R}^{d \times m}$ by varying the number of oscillators and generating random displacements in $[-0.1, 0.1]$ for each oscillator as well as the corresponding derivatives according to~\eqref{eq: FPU} with $\beta = 0.7$. Due to the random sampling, we expect the (implicitly given) feature space to be sampled sufficiently so that the feature vectors span the whole feature space. Thus, we try to use kFSA to determine the feature space dimension $n$. Figure~\ref{fig: FPU results} shows the number of indices that are extracted by Algorithm~\ref{alg: sample reduction} when applied to randomly generated training data with different dimensions $d$ and a threshold of $10^{-10}$.
\begin{figure}[htbp]
\centering
\begin{subfigure}{0.45\textwidth}
\centering
\caption{}
\includegraphics[height=5.25cm]{pictures/FPU_1.png}
\end{subfigure}%
\hspace*{0.052\textwidth}
\begin{subfigure}{0.45\textwidth}
\centering
\caption{}
\includegraphics[height=5.25cm]{pictures/FPU_2.png}
\end{subfigure}%
\caption{Application of kFSA to the Fermi--Pasta--Ulam--Tsingou problem: (a) Number of samples extracted by Algorithm~\ref{alg: sample reduction} when applied to $2000$ randomly generated $d$-dimensional displacement vectors. (b) Median of the relative errors of the approximate coefficient matrices over $d$ for the full set as well as the reduced set with $1000$ realizations for the former and $100$ realizations for latter case. The semi-transparent areas comprise the $5$th to the $95$th percentile of the respective results.}
\label{fig: FPU results}
\end{figure}
As we can see in Figure~\ref{fig: FPU results}~(a), our method extracts less than $2000$ samples for each dimension $d$ up to 20. Note that for different realizations of $X$, the set $\tilde{X}$ varies but the number of samples $|\tilde{X}|$ remains unchanged. The cubic dependency of the number of important samples on $d$ can be explained as follows: For the polynomial kernel, we can directly write down an explicit expression of a feature map. As shown in, e.g., \cite{ZAKI2014}, the kernel~\eqref{eq: FPU kernel} can be expressed as
\begin{equation}\label{eq: FPU feature map}
k(x, x^\prime) = \sum_{|p| = q} \left( \sqrt{a_{p}} \prod_{i=1}^d x_i^{p_i}\right) \left( \sqrt{a_{p}} \prod_{i=1}^d {x^\prime_i}^{p_i}\right) = \Psi(x)^\top \Psi(x^\prime),
\end{equation}
where $p = (p_0, p_1, \dots, p_d) \in \mathbb{N}_0^{d+1}$ is a multi-index and $|p| = p_0 + \dots + p_d$. The prefactors $a_{p}$ are given in terms of multinomial coefficients:
\begin{equation}\label{eq: FPU prefractors}
a_{p} = \begin{pmatrix} q \\ p \end{pmatrix} \alpha^{p_0} = \frac{q!}{p_0 ! p_1 ! \cdots p_d !} \alpha^{p_0}.
\end{equation}
Thus, the feature vector $\Psi(x)$ in \eqref{eq: FPU feature map} contains all monomials of order up to and including three in the variables $x_i$, scaled by the square roots of the prefactors defined in \eqref{eq: FPU prefractors}. The dimension of the feature space is then given by the number of all possible vectors $p$ with $| p | = q$, which is
\begin{equation*}
n = \begin{pmatrix} d+q \\ q \end{pmatrix}.
\end{equation*}
For $q=3$, this reduces to
\begin{equation*}
n = \frac{1}{6} (d+1)(d+2)(d+3),
\end{equation*}
which are the exact same numbers of samples extracted by our method for different dimensions $d$. That is, Algorithm~\ref{alg: sample reduction} detects the feature space dimension by choosing the correct amount of feature vectors to form a basis, given in form of column subsets $\tilde{X} \subset X$. As described in Section~\ref{sec: data-reduced regression}, we can use the transformed data matrix $\Psi_{\tilde{X}}$ to reconstruct the coefficient matrix~\eqref{eq: coefficient matrix 1} representing the solution of~\eqref{eq: minimization problem 1}, i.e., to recover the governing equations. For a given set $\tilde{X} \subseteq X$, the regression function is defined as
\begin{equation*}
f(x) = \Theta \Psi_{\tilde{X}}^\top \Psi(x) = \underbrace{\Theta \Psi_{\tilde{X}}^\top D}_{= \Theta^\prime} \underbrace{D^{-1} \Psi(x)}_{=\Psi^\prime(x)},
\end{equation*}
where $\Theta$ is the solution of \eqref{eq: minimization problem 3} and $D$ is a diagonal matrix containing the corresponding prefactors given in~\eqref{eq: FPU prefractors}. $\Psi^\prime(x)$ then only contains monomials with prefactor $1$ and the exact coefficient matrix defined by~\eqref{eq: FPU} becomes
\begin{equation*}
\Theta_\text{exact} =
\kbordermatrix{
~ & 1 & x_1 & x_1^2 & x_1^3 & x_2 & x_1 x_2 & x_1^2 x_2 & & x_{d-2} x_d^2 & x_{d-1} x_d^2 & x_d^3\\
~ & 0 & -2 & 0 & -1.4 & 1 & 0 & 2.1 & ~ & 0 & 0 & 0~\\
~ & 0 & 1 & 0 & 0.7 & -2 & 0 & -2.1 & \cdots & 0 & 0 & 0~\\
~ & 0 & 0 & 0 & 0 & 1 & 0 & 0 & ~ & 0 & 0 & 0~\\
~ & ~ & ~ & ~ & \vdots & ~ & ~ & ~ & \ddots & ~ & \vdots & ~~\\
~ & 0 & 0 & 0 & 0 & 0 & 0 & 0 & ~ & 0 & 0 & 0~\\
~ & 0 & 0 & 0 & 0 & 0 & 0 & 0 & \cdots & 0 & -2.1 & 0.7~\\
~ & 0 & 0 & 0 & 0 & 0 & 0 & 0 & ~ & 0 & 2.1 & -1.4~\\
}.
\end{equation*}
For the considered values of $d$ and randomly generated training sets, Figure~\ref{fig: FPU results}~(b) shows that the relative approximation error in the Frobenius norm between $\Theta^\prime$ and the exact coefficient matrix is more stable and approximately one order of magnitude lower for the reduced set than for the full set. Particularly, we observe more extreme outliers in the results for $\varepsilon=0$, where we do not apply any regularization technique, than for $\varepsilon=10^{-10}$. This indicates that the set generated by kFSA can be used to improve system identification performance since, in addition to reduced numerical costs, we also benefit from regularization effects.
\subsection{CalCOFI}\label{sec: CalCOFI}
The third example is an analysis of time series data taken from the \emph{CalCOFI} (California Cooperative Oceanic Fisheries Investigations) data base~\cite{CALCOFI2020}. CalCOFI is a partnership of several institutions founded in 1949 to investigate the sardine collapse off California and today provides one of the longest-running time series that exist. These data -- containing different seawater measurements such as depth, pressure, and temperature -- are the most reliable oceanographic time series available. For the demonstration of our method, we randomly extract a training and a test set from CalCOFI's final upcast CTD (Conductivity, Temperature, Depth) data.\!\footnote{\url{https://calcofi.org/data/ctd/455-ctd-data-files.html}} The training set contains $25000$ measurement vectors while the test set contains $5000$ samples. Various relationships in the data have been examined using supervised learning techniques, see for instance~\cite{ALIN2012, KIM2015, SAKAMOTO2017}. In this work, the aim is to find a regression function that predicts the dissolved oxygen in the seawater as a function of the depth, pressure, temperature, and salinity.
Without any knowledge of the relationship between the input and output variables, we choose Gaussian kernels for the kernel-based regression, i.e.,
\begin{equation*}
k(x, x^\prime) = \exp \left( -\kappa \lVert x-x^\prime \rVert_2^2 \right)
\end{equation*}
with $x, x^\prime \in \mathcal{S} \subset \mathbb{R}^4$ and kernel parameter $\kappa >0$. Since the input variables live on different scales, we normalize these measurements in order to avoid the effect of larger-scale variables dominating the others. That is, given a training data matrix ${X = [x^{(1)}, \dots, x^{(m)}] \in \mathbb{R}^{4 \times m}}$ we apply \emph{min-max normalization} in the form of
\begin{equation*}
\hat{X}_{i, j} = \hat{x}^{(j)}_i = \frac{x^{(j)}_i - l_i}{u_i - l_i} \in [0,1]
\end{equation*}
for $i=1, \dots, 4$ and $j = 1,\dots, m$, where
\begin{equation*}
l_i = \min_{j \in \{1, \dots, m\}} x^{(j)}_i = \min X_{i,:} \qquad \text{and} \qquad u_i = \max_{j \in \{1, \dots, m\}} x^{(j)}_i = \max X_{i,:}.
\end{equation*}
In the test phase, we then normalize any given vector by using the same constants before applying the regression function $f \colon \mathbb{R}^4 \to \mathbb{R}$ to predict the oxygen concentration.
\begin{figure}[h]
\centering
\begin{subfigure}{0.45\textwidth}
\centering
\caption{}
\includegraphics[height=5.25cm]{pictures/CalCOFI_1.png}
\end{subfigure}%
\hspace*{0.052\textwidth}
\begin{subfigure}{0.45\textwidth}
\centering
\caption{}
\includegraphics[height=5.25cm]{pictures/CalCOFI_2.png}
\end{subfigure}\\%
\begin{subfigure}{\textwidth}
\centering
\caption{}
\includegraphics[width=14.5cm]{pictures/CalCOFI_3.png}
\end{subfigure}%
\caption{Application of kFSA method to the CalCOFI data set: (a) Mean squared errors in the predicted dissolved oxygen values for different thresholds and kernel parameters. (b) Number of samples extracted by Algorithm~\ref{alg: sample reduction} for different thresholds and kernel parameters. (c) Histogram of the output data (including training and test set).}
\label{fig: CalCOFI results}
\end{figure}
The feature space corresponding to the Gaussian kernel is infinite-dimensional and a Gram matrix is always non-singular for mutually different samples. That is, given $X = [x^{(1)}, \dots, x^{(m)}]$ with ${x^{(i)} \neq x^{(j)}}$ for $i \neq j$, the matrix $G_{X,X}$ has rank $m$. In particular, all submatrices $G_{\tilde{X}, X}$ would therefore have rank $\tilde{m} = |\tilde{X}|$. However, our experiments show that the computed Gram matrices corresponding to subsets $\tilde{X} \subset X$ extracted by kFSA are still ill-conditioned. Thus, we use additional regularization in order to construct well-posed systems of linear equations. For the extraction of relevant samples, we will employ Algorithm~\ref{alg: sample reduction} with different thresholds $\varepsilon$ as well as, for comparison, the Nyström method described in Section~\ref{sec: analytical formulation}. Suppose we have found a subset $\tilde{X} \subset X$, we then solve the minimization problem~\eqref{eq: minimization problem 3} by constructing a regularized system of linear equations
\begin{equation*}
\tilde{\Theta} \left( G_{\tilde{X}, X} G_{X, \tilde{X}} + \gamma \mathrm{Id} \right) = Y G_{X, \tilde{X}},
\end{equation*}
where we used the normal equation of~\eqref{eq: minimization problem 3}. Here, the (row) vector $Y \in \mathbb{R}^m$ contains the oxygen levels corresponding to the samples given in the matrix $X$. The regression function is then defined as
\begin{equation*}
f(x) = \tilde{\Theta} G_{\tilde{X}, \hat{x}},
\end{equation*}
see~\eqref{eq: minimization problem 3 - f}, where $\hat{x}$ denotes the normalized version of $x$ as described above. The results in form of the mean squared errors in the output variables for $\gamma = 10^{-10}$ and different values for $\kappa$ as well as $\varepsilon$ are shown in Figure~\ref{fig: CalCOFI results}~(a).
The mean squared errors lie between $0.0125$ and $0.0314$ for any choice of the parameters $\kappa$ and $\varepsilon$. As we can see in Figure~\ref{fig: CalCOFI results}~(c), the calculated errors are negligibly small in comparison to the majority of the oxygen measurements in the CalCOFI data set. The results for $\varepsilon= 10^{-10}$ and $\varepsilon= 10^{-6}$ are quite similar, which indicates that even for smaller thresholds we will not get significantly lower errors. This assumption is also supported by the mean squared errors corresponding to the Nyström method proposed in~\cite{MUSCO2017}, which is provably accurate for any kernel. In order to compare both methods, we used the Nyström method\,\footnote{\url{https://github.com/cnmusco/recursive-nystrom}} to extract subsets of the same size as obtained by applying kFSA with $\varepsilon= 10^{-10}$ and $\varepsilon= 10^{-6}$, respectively, see Figure~\ref{fig: CalCOFI results}~(b). If we allow the same amount of samples as determined by Algorithm~\ref{alg: sample reduction} with $\varepsilon=10^{-10}$, the results of the Nyström method are comparable to the results of Algorithm~\ref{alg: sample reduction} for thresholds $\varepsilon=10^{-10}$ and $\varepsilon=10^{-6}$. If we only allow as many samples as determined by Algorithm~\ref{alg: sample reduction} with $\varepsilon=10^{-6}$, we see that the errors are slightly larger and erratic. For smaller numbers of samples, the results obtained by applying the Nyström method start to oscillate -- even worse than they already do for $\varepsilon=10^{-6}$. That is, for small thresholds Algorithm~\ref{alg: sample reduction} extracts subsets $\tilde{X}$ which are more suitable for a numerically stable regression than the subsets extracted by the Nyström method. As shown in Figure~\ref{fig: CalCOFI results}~(b), the number of extracted samples depends sublinearly on the kernel parameter $\kappa$. For the considered parameter combinations, that number is always smaller than $7000$, which corresponds to less than $30\%$ of the given training data.
Note that further improvements in terms of computational complexity of kFSA will be subject to future research. At this point, the runtime of kFSA is not competitive. For instance, the Nyström method we used for comparison requires only $O(m M^2)$ operations instead of $O(m^2 + m M^2)$, where $M$ is the number of extracted samples, see Lemma~\ref{lemma: kFSA complexity}.
\section{Conclusion \& outlook}\label{sec: Conclusion}
We have proposed a data-reduction approach for supervised learning tasks. The resulting method -- called \emph{kernel-based feature space approximation} or, in short, kFSA -- extracts relevant samples from a given data set whose corresponding feature vectors can be used as a (approximate) basis of the feature space spanned by the transformations of all samples up to an arbitrary accuracy. The aim is reduce the storage consumption and computational complexity as well as to achieve a regularization effect that improves the generalizability of the learned target functions. The introduced method is purely written in terms of kernel functions, which allows us to avoid explicit representations of high-dimensional feature maps and even to consider infinite-dimensional feature spaces.
The performance of kFSA was demonstrated using examples of classification and regression problems from different scientific areas such as image recognition, system identification, and time-series analysis. In our experiments, we observed that the computational effort may be reduced significantly while obtaining even better results than when considering all training data in the learning phase. Moreover, we showed that kFSA is able to detect the correct dimension of a feature space that is only implicitly given by a kernel. We also found cases where sample subsets extracted by kFSA can lead to numerically more stable results than subsets found by a state-of-the-art implementation of the Nyström method.
Future research will include the application of kFSA to a broader spectrum of problems in the field of data-driven analysis of dynamical systems, e.g., transfer operator approximation, model reduction, and system identification. Other open issues are algorithmic improvements for the bottom-up construction of relevant subsets, imposing additional or alternative constraints such as sparsity of the coefficient matrices, and the artificial generation of input-output pairs to further reduce the number of needed basis vectors in the feature space.
\section*{Acknowledgments}
This research has been funded by Deutsche Forschungsgemeinschaft (DFG) through grant CRC 1114 \emph{``Scaling Cascades in Complex Systems''} (project ID: 235221301, project B06).
{\small{}\bibliographystyle{unsrturl}
|
\section{Introduction}
\label{Sec:Intro}
Many machine learning applications such as image classification, social networks, chemistry, signal processing, web analysis, item recommendation, and bioinformatics analysis usually exhibit some {\it structured data}, which might include trees, groups, clusters, paths, sequences \cite{Narimatsu2015,narimatsu2017state,Narimatsu_ICASSP_2020}, and graphs \cite{Hashimoto_ICASSP_2020}. Recent advances in information-retrieval technologies enable collection of such structured data with {\it heterogeneous} features from {\it multi-view} data. For example, each web page includes two views of text and images. Image data include multiple features such as color histograms and frequency features of wavelet coefficients. The emergence of such multi-view data has raised a new question: how can such multiple sets of features for individual subjects be integrated into data analysis tasks? This question motivates a new paradigm, called {\it multi-view learning}, for data analysis with multi-view feature information. Multi-view learning fundamentally makes use of common or consensus information that is presumed to exist across multi-view data to improve data analysis task performance. One successful subcategory of multi-view learning is {\it multi-view clustering} (MVC), which classifies given subjects into subgroups based on similarities among subjects \cite{Chao_arXiv_2017}. Although various approaches have been proposed in this category, graph-based multi-view clustering (GMVC) has recently garnered increasing attention: it has demonstrated state-of-the-art performance for numerous applications \cite{Saha_PReMI_2013,Nie_IJCAI_2016,How_IEEEKDE_2017_s,Nie_IJCAI_2017,Tao_ACML_2017,Zhuge_IEEETKDE_2017,Nie_AAAI_2017,Nie_IEEETIP_2018,Zhan_IEEETC_2018}. Fundamentally, GMVC originates from single-view spectral clustering methods. It performs clustering tasks by exploiting consensus features across input {\it graph matrices} such as adjacency matrices. Among them, some works outperform other methods by seeking a consensus matrix called a {\it unified matrix} from the input graph matrices with adaptive weights such that the unified matrix directly represents the final clustering result \cite{Tao_ACML_2017,Nie_IJCAI_2016,Nie_IJCAI_2017,Nie_IEEETIP_2018, Wang_KBS_2019_s}.
Most existing methods achieve good performance by exploiting the {\it consensus part} across multiple views. However, each view might include an {\it inconsistent part} that does not appear in other views because of noise and outliers. Therefore, this inclusion might lead to severe degradation of downstream clustering performance. Nevertheless, they do not deal explicitly with such inconsistent parts of the input graph matrices. Consequently, they offer only unacceptable performance.
To alleviate this issue, this paper presents a proposal of graph-based multi-view clustering, which particularly incorporates a consistent part and an inconsistent part lying across multiple views. More concretely, we separate the input graph matrices collected from multi-view data into a consistent part and an inconsistent part by orthogonality constraints. This conceptualization shares similar ideas with some recent works \cite{Bojchevski_KDD_2017, Liang_ICDM_2019_s}. Derivation of the unified matrix is therefore more efficient and more robust than existing GMVC methods, leading to improvement of the clustering performance. We designate this proposed algorithm as CI-GMVC. Numerical evaluations conducted with comparison to state-of-the-art multi-view clustering methods reveal the effectiveness of the proposed CI-GMVC on several real-world datasets. The source code is available at \url{https://github.com/hiroyuki-kasai}.
\section{Preliminary explanation}
This subsection first presents a summary of the notation used in the remainder of this paper. Subsequently, we briefly introduce multi-view clustering and specifically address graph-based multi-view clustering, which are basic techniques of the proposed algorithm: CI-GMVC.
\subsection{Notation}
We represent scalars as lower-case letters $(a, b, \ldots)$, vectors as bold lower-case letters $(\vec{a}, \vec{b}, \ldots)$, and matrices as bold-face capitals $(\mat{A}, \mat{B}, \ldots)$. The $i$-th element of \vec{a} and the element at the $(i,j)$ position of \mat{A} are represented respectively as $a_i$ and $A_{ij}$. Also, the vector of the $i$-th row vector $A_{i:}$ and the vector of the $j$-th column vector $A_{:j}$ are denoted respectively as $\vec{a}_i$ and $\vec{a}^j$. $\vec{1}_d$ is used for the $d$-dimensional vector of ones, and $\mat{I}_d$ is the identity matrix of size $d \times d$. $\mathbb{R}_{+}^{n \times m}$ represents a nonnegative matrix of size ${n \times m}$. Additionally, $\mat{A}\geq 0$ and $\mat{A}> 0$ respectively represent $A_{ij}\geq0$ and $A_{ij}>0$ for all $(i,j)$. Furthermore, $\mat{A}\geq \mat{B}$ and $\mat{A}> \mat{B}$ represent $A_{ij}\geq B_{ij}$ and $A_{ij}> B_{ij}$ for all $(i,j)$. Operators ${\rm Tr}(\cdot)$ and $(\cdot)^T$ respectively stand for the matrix trace and transpose. Operator $\mathrm{max}(\mat{A},\mat{B})$ outputs $A_{ij}$ when $A_{ij}\geq B_{ij}$ at the $(i,j)$-th position, and $B_{ij}$ otherwise. Operator $\mathrm{vec}(\mat{A})$ performs the vectorization of \mat{A}. Operator $\mathrm{diag}(\vec{a})$ represents \mat{A} of which diagonal and off-diagonal elements are \vec{a} and zeros, respectively. Regarding multi-view data, $N$, $V$, and $C$ respectively represent the number of sample data, views, and classes. The dimensions of sample data of the $c\ (\in [C])$-th class in the $v\ (\in [V])$-th view are denoted as $d_v$.
\subsection{Multi-view clustering: MVC}
Multi-view learning fundamentally makes use of common or consensus information across multi-view data \cite{Xu_arXiv_2013,Sun_NCA_2013, Zhao_IF_2017,Li_IEEETranKD_2019}. {\it Multi-view discriminant learning}, a supervised learning technique, has been studied extensively \cite{Rosipal_SLSFS_2005,Hotelling_1936_Biometrika,Thompson_2005_CCA,Tenenbaum_NC_2000,Sharma_CVPR_2012,Cao_2016_IT_s,Xu_2019_IEEETranCyber,Kasai_ICASSP_2020}. It generally originates from single-view linear discriminant analysis such as Fisher linear discriminant analysis (LDA or FDA) \cite{Hastie_2009_StatLearnBook}. Regarding unsupervised learning techniques, however, {\it multi-view clustering} (MVC) clusters given subjects into several groups such that the points in the same group are similar and the points in different groups are dissimilar to one another by combining multi-view data \cite{Chao_arXiv_2017}. One naive approach of MVC is to perform a single-view clustering method against {\it concatenated} features collected from different views. However, this approach might fail when higher emphases are put to certain specific views than to others. Consequently, this category of research has attracted more attention, to include multi-view subspace clustering that learns common coefficient matrices \cite{Wang_IJCAI_2016, Yin_CIKM_2015}, multi-view nonnegative matrix factorization clustering that learns common indicator matrices \cite{Akata_CVWW_2011}, multi-view $k$-means \cite{Cai_IJCAI_2013}, multi-kernel based multi-view clustering \cite{Guo_ICPR_2014} and CCA based multi-view clustering \cite{Blaschko_CVPR_2008}.
\subsection{Graph-based multi-view clustering: GMVC}
\label{Sec:GMVC}
Different from the approaches described above, graph-based MVC (GMVC) learns common eigenvector matrices or shared matrices, and empirically demonstrates state-of-the-art results in various applications. General steps consist of (i) generating an input graph matrix, called SIG, (ii) generating the graph Laplacian matrix, (iii) computing the embedding matrix, and (iv) performing clustering into groups using an external clustering algorithm. These steps are shared with the normalized cut \cite{Shi_IEEEPAMI_2000} and the spectral clustering \cite{Mohar_GTCA_1991}. Furthermore, GMVC is related closely to multi-view spectral clustering \cite{Xia_IEEESMCB_2010, Kumar_NIPS_2011,Xia_AAAI_2014,Lu_IEEETIP_2016,Feng_SC_2017,Wang_IEEETNNLS_2018,Zong_AAAI_2018}. Recently, some works of GMVC address the unified matrix $\mat{U}(\in \mathbb{R}_+^{N \times N})$ with different effects of multiple graph matrices as \cite{Tao_ACML_2017,Nie_IJCAI_2016,Nie_IJCAI_2017,Nie_IEEETIP_2018, Wang_KBS_2019_s}. More noteworthy is that, whereas many MVC methods rely on an external clustering algorithm after learning, they seek a unified graph matrix such that it {\it internally} indicates cluster information.
More specifically, considering an adaptive weight $\vec{\alpha} = [\alpha_1, \ldots, \alpha_v, \ldots, \alpha_V]^T (\in \mathbb{R}^{V})$ on all $V$ SIG matrices $\{\mat{S}_1, \ldots, \mat{S}_v, \ldots, \mat{S}_V\} (\in \mathbb{R}^{N \times N}_+)$, the following minimization problem is formulated with respect to \mat{U}:
\begin{eqnarray}
\label{Eq:obj_fun_1}
\min_{ \mat{\scriptsize U}} && \sum_{v=1}^{V}\alpha_v\|\mat{U}-\mat{S}_v\|_F^2\notag\\
{\rm subject\ to}&& U_{ij} \geq 0, \vec{1}^T \vec{u}_i= 1,
\end{eqnarray}
where $\vec{\alpha}$ represents the weight vector $\vec{\alpha}$, calculated as $\alpha_v=1/(2\sqrt{\|\mat{U}-\mat{S}_v\|_F^2})$, as in \cite{Wang_KBS_2019_s,Nie_IJCAI_2017,Nie_IEEETIP_2018}.
Furthermore, the graph Laplacian matrix $\mat{L}_{\mat{\scriptsize U}} (\in \mathbb{R}^{N \times N})$ of \mat{U} is introduced such that \mat{U} directly produces the clustering result without relying on external clustering methods. For this purpose, acknowledging that \mat{U} can be partitioned into $C$ groups directly when ${\rm rank(\mat{L}_{\mat{\scriptsize U}})}$ is equal to $n-C$ \cite{Dhillon_SIGMOD_2001}, and using Fan's theorem \cite{Fan_PNAS_1949}, the following formulation is proposed:
\begin{eqnarray}
\label{obj_fun_2}
\min_{\mat{\scriptsize U},\mat{\scriptsize F},\vec{\scriptsize \alpha}}&& \sum_{v=1}^{V}\alpha_v
\|\mat{U}-\mat{S}_v \|_F^2 + 2\lambda \cdot {\rm Tr}(\mat{F}^T\mat{L}_{\mat{\scriptsize U}}\mat{F})\notag\\
{\rm subject\ to}&& U_{ij}\geq0, \vec{1}^{T}\vec{u}_i=1,\mat{F}^{T}\mat{F}=\mat{I}_C,
\end{eqnarray}
where $\lambda (>0)$ is a regularization parameter. $\mat{F} (\in \mathbb{R}^{N\times C})$ is an embedding matrix, which lies on the orthogonal matrix, i.e., the Stiefel manifold ${\rm St}(p,d)$; the Riemannian submanifold of orthonormal matrices $\mathcal{M}\!=\!\{\mat{X}\! \in\! \mathbb{R}^{d \times p}\!:\! \mat{X}\mat{X}^T\!=\!\mat{I}_p\}$.
\section{Proposed CI-GMVC: Consistency-aware and inconsistency-aware GMVC}
As explained in {Section \ref{Sec:GMVC}}, GMVC considers consensus features across input graph matrices, i.e., SIG matrices, across multiple views. The hypothesis in this scheme relies on the assumption that all SIG matrices $\{\mat{S}_1, \ldots, \mat{S}_v, \ldots, \mat{S}_V\}$ share common features across multi-views with appropriate weights. Subsequently, \mat{U} can be obtained efficiently from these matrices. However, as explained in {Section \ref{Sec:Intro}}, the SIG matrices $\mat{S}_v$ are not perfect: they might be corrupted because of noisy input data, severe outliers, and latent fundamental inconsistent structures \cite{Bojchevski_KDD_2017}. Consequently, any analysis of these matrices might result in unacceptable clustering results. Therefore, it is necessary to handle inconsistent parts among multi-view data to avoid lower quality of subsequent clustering.
To alleviate this issue, we separate $\mat{S}_v$ into a consistent part and an inconsistent part that exist as mixed inside $\mat{S}_v$, and calculate \mat{U} {\it only} from the consistent parts of $\mat{S}_v$. More concretely, we assume that $\mat{S}_v$ consists of a consistent part $\mat{A}_v (\in \mathbb{R}^{N \times N})$ and an {\it nonnegative} inconsistent part $\mat{E}_v (\in \mathbb{R}_+^{N \times N})$ as $\mat{S}_v=\mat{A}_v+\mat{E}_v$ which follows\cite{Bojchevski_KDD_2017,Liang_ICDM_2019_s}.
Assuming further that the elements of $\mat{E}_v$ are {\it not shared} in other $\mat{E}_w (v \neq w)$, in other words, expecting that they are {\it element-wise orthogonal}, we assign a penalty as
\begin{eqnarray*}
\sum_{v,w=1}^{V}\gamma\cdot {\rm vec}(\mat{E}_v)^T {\rm vec}(\mat{E}_w) = \sum_{v,w=1}^{V}\gamma\cdot{\rm Tr}(\mat{E}_v\cdot(\mat{E}_w)^{T}),
\end{eqnarray*}
where $\gamma (>0)$ is a weighting hyperparameter. Furthermore, a penalty of larger elements of $\mat{E}_v$ is regarded as stabilizing the optimization of the objective function as
\begin{equation*}
\sum_{v=1}^{V} \beta\| {\rm vec}(\mat{E}_v) \|^2_2 = \sum_{v=1}^{V}\beta\cdot{\rm Tr}(\mat{E}_v\cdot(\mat{E}_v)^{T}),
\end{equation*}
where $\beta (>0)$ is a weighting hyperparameter. Integrating the two penalties above yields the following penalty term.
\begin{equation*}
\sum_{v,w=1}^{V}b_{vw}\cdot {\rm Tr}(({\bf S}_v-\mat{A}_v)\cdot(\mat{S}_w-\mat{A}_w)^T).
\end{equation*}
Therein, $b_{vw}$ represents the $(v,w)$-elements of $\mat{ B} (\in \mathbb{R}^{V\times V})$, of which diagonal and off-diagonal elements respectively correspond to $\beta$ and $\gamma$.
Finally, we derive the objective formulation mathematically as presented below:
\begin{eqnarray}
\label{Eq:obj_fun}
\min_{\scriptsize \substack{\mat{U},\mat{F},\vec{\alpha}\\\mat{A}_1,\ldots,\mat{A}_V}}&&\sum_{v=1}^{V}\alpha_v\|\mat{U}-\mat{A}_v\|_F^2+2\lambda{\rm Tr}(\mat{F}^T\mat{L}_{\mat{\scriptsize U}}\mat{F})+\sum_{v,w=1}^{V}b_{vw}\cdot {\rm Tr}(({\bf S}_v-\mat{A}_v)\cdot(\mat{S}_w-\mat{A}_w)^{T})\\
{\rm subject\ to}&& U_{ij}\geq0, \vec{1}^{T}\vec{u}_i=1,\mat{F}^{T}\mat{F}=\mat{I}_C, {\bf S}_v\geq\mat{A}_v\geq0.\notag
\end{eqnarray}
As shown there, the differences one can note in relation to existing works are that the unified matrix \mat{U} is evaluated with $\mat{A}_v$, i.e., the consistent part of $\mat{S}_v$, and the inconsistent part $\mat{S}_v-\mat{A}_v$ are evaluated with $\mat{S}_w-\mat{A}_w (v\neq w)$ in terms of their mutual orthogonality.
\section{Optimization Algorithm}
The objective function in (\ref{Eq:obj_fun}) is not jointly convex on all variables. Therefore, the alternating minimization algorithm is exploited to obtain the solutions. Note that, as mentioned earlier, $\vec{\alpha}$ is calculated as $\alpha_v=1/(2\sqrt{\|\mat{U}-\mat{A}_v\|_F^2})$, as in \cite{Wang_KBS_2019_s,Nie_IJCAI_2017,Nie_IEEETIP_2018}.
\subsection{Update of \mat{F} and \mat{U}}
The updates of \mat{F} and \mat{U} are similar to those of \cite{Wang_KBS_2019_s}. However, for the self-contained explanation, we briefly describe their update rules. The optimization problem in (\ref{Eq:obj_fun}) with respect to the unified matrix \mat{U} yields the following:
\begin{eqnarray*}
\label{Eq:obj_fun_U}
\min_{\mat{\scriptsize U}}&&\sum_{v=1}^{V}\alpha_v\|\mat{U}-\mat{A}_v\|_F^2
+2\lambda\cdot{\rm Tr}(\mat{F}^T\mat{L}_{\mat{\scriptsize U}}\mat{F})\\
{\rm subject\ to}&& U_{ij}\geq0,\vec{1}^{T}\vec{u}_i=1\notag.
\end{eqnarray*}
This is equivalent to the following minimization problem in terms of $\vec{u}_i$ for $i \in [N]$ as
\begin{eqnarray}
\label{Eq:SolutionU}
\min_{\vec{u}_i}&&\sum_{v=1}^{V}
\| \vec{u}_i - (\vec{a}_v)_i + \frac{\lambda}{2V\alpha_v} \vec{p}_i \|_2^2\\
{\rm subject\ to}&& U_{ij}\geq0,\vec{1}^{T}\vec{u}_i=1,\notag
\end{eqnarray}
where $\vec{p}_i=[(p_i)_1, (p_i)_2,\ldots,(p_i)_j,\ldots, (p_i)_N]^T (\in \mathbb{R}^{N})$ and where
$(p_i)_j$ is equal to $\| \vec{f}^i - \vec{f}^j\|_2^2$; $ \vec{f}^i (\in \mathbb{R}^{1 \times C})$ is the $i$-th row vector of \mat{F}. This problem is solvable as in {Section 5.3} in \cite{Wang_KBS_2019_s}. Finally, the optimization problem in (\ref{Eq:obj_fun}) in terms of \mat{F} under fixed \mat{U}, \mat{A}, \vec{\alpha} is
\begin{equation}
\label{Eq:SolutionF}
\begin{split}
\min_{\mat{\scriptsize F}} \quad{\rm Tr}(\mat{F}^T\mat{L}_{\mat{\scriptsize U}}\mat{F}), \quad {\rm subject\ to}\quad \mat{F}^{T}\mat{F}=\mat{I}_C.
\end{split}
\end{equation}
The solution is obtainable to calculate the $C$ eigenvectors of $\mat{L}_{\mat{\scriptsize U}}$, of which eigenvalues are the $C$ smallest ones \cite{Mohar_GTCA_1991}.
\subsection{Update of \mat{A}}
Keeping \mat{F}, \mat{U}, $\vec{\alpha}$ as fixed, the minimization problem about $\mat{A}_v$ is defined as
\begin{eqnarray*}
\label{Eq:obj_fun_A}
\min_{\scriptsize \mat{A}_1,\ldots,\mat{A}_V}&&
\sum_{v=1}^{V}\alpha_v\|\mat{U}-\mat{A}_v\|_F^2+\sum_{v,w=1}^{V}b_{vw}\cdot {\rm Tr}(({\bf S}_v\!-\!\mat{A}_v)\!\cdot\!(\mat{S}_w-\mat{A}_w)^{T})\\
{\rm subject\ to}\ \ &&{\bf S}_v\geq\mat{A}_v\geq0.
\end{eqnarray*}
The first-order necessary optimality conditions of this problem are that its gradient with respect to $\mat{A}_v$ is expected to be zero, which means
\begin{eqnarray*}
2\alpha_v(\mat{U}-\mat{A}_v)+\sum_{w=1}^{V}b_{vw}(-\mat{S}_w+\mat{A}_w) &=& \vec{0},
\end{eqnarray*}
for $v=1,2,\ldots,V$. Consequently, we obtain the following.
\begin{eqnarray}
\label{Eq:DeriveA}
2\alpha_v\mat{A}_v+\sum_{w=1}^{V}b_{vw}\mat{A}_w&=&2\alpha_v\mat{U}+\sum_{w=1}^{V}b_{vw}\mat{S}_w.
\end{eqnarray}
Here, because the left-hand terms are represented as $b_{v1}\mat{A}_1 + \cdots + (b_{vv}+2\alpha_v)\mat{A}_v + \cdots\ b_{vV}\mat{A}_V$, its vectorization form is represented as
\begin{eqnarray*}
[b_{v1}\ b_{v2}\ \cdots\ (b_{vv}+2\alpha_v)\ \cdots\ b_{vV}]
\left(\begin{array}{c}{\rm vec}(\mat{A}_1)^T\\\vdots\\{\rm vec}(\mat{A}_V)^T\end{array}\right ).
\end{eqnarray*}
Adding all $V$ terms of $\mat{A}_v$ yields the following.
\begin{eqnarray*}
\left(
\begin{array}{ccccc}
\!b_{11}\!+\!2\alpha_1\! & \!\!\cdots\!\! & \!\!\cdots\!\! & \!\!\cdots\!\! & b_{1V}\\
\!\!\vdots\!\! & \!\!\ddots\!\! & \!\!\cdots\!\!& \!\!\cdots\!\! & \!\!\vdots\!\!\\
b_{v1} & \!\!\cdots\!\! & b_{vv}\!+\!2\alpha_v & \!\!\cdots\!\! & b_{vV}\\
\!\!\vdots\!\! & \!\!\cdots\!\! & \!\!\cdots\!\!& \!\!\ddots\!\! & \!\!\vdots\!\!\\
b_{V1} & \!\!\cdots\!\! & \!\!\cdots\!\! & \!\!\cdots\!\! & \!b_{VV}\!+\!2\alpha_V\!\! \!\\
\end{array}
\right )
\left(\begin{array}{c}\!\!{\rm vec}(\mat{A}_1)^T\!\!\\\vdots\\\!\!{\rm vec}(\mat{A}_V)^T\!\!\end{array}\right ).
\end{eqnarray*}
Denoting \textcolor{black}{$2 {\rm diag}(\vec{\alpha})+\mat{B}\ (\in \mathbb{R}^{V \times V})$} as $\mat{C}$, and the right-hand terms in (\ref{Eq:DeriveA}) as $\mat{H}_v\ (\in \mathbb{R}^{V \times V})$, we calculate $\mat{A}_v (v \in [V])$ as
\begin{eqnarray}
\label{Eq:Update_A}
\left(\begin{array}{c}{\rm vec}(\mat{A}_1)^T\\\vdots\\{\rm vec}(\mat{A}_V)^T\end{array}\right )&=&\mat{C}^+\cdot\left(\begin{array}{c}{\rm vec}(\mat{H}_1)^T\\\vdots\\{\rm vec}(\mat{H}_V)^T\end{array}\right ),
\end{eqnarray}
where $\mat{C}^+$ is the inverse or the pseudo-inverse matrix of \mat{C}.
Finally, considering the constraint of ${\bf S}_v\geq\mat{A}_v\geq0$, the final solution of $\mat{A}_v$ is obtainable by outputting $\mat{A}''_v$ as
\begin{eqnarray}
\label{Eq:Update_A_final}
\mat{A}'_v=\max(\mat{A}_v,\mat{0}),\quad \mat{A}''_v=\min(\mat{A}'_v,{\bf S}_v).
\end{eqnarray}
The overall algorithm of the proposed CI-GMVC is summarized in {\bf Algorithm \ref{alg:proposed_alg}}.
\begin{algorithm}
\caption{CI-GMVC optimization algorithm}
\label{alg:proposed_alg}
\begin{algorithmic}[1]
\REQUIRE{Unified matrix \mat{U}.}
\ENSURE{SIG matrix ${\bf S}_1,\ldots,{\bf S}_V$, cluster number $C$, $\lambda$, $\beta$, $\gamma$.}
\STATE{Initialize $\alpha_v=1/V$ and $\mat{A}_v=\mat{S}_v$ for $v \in [V]$.}
\STATE{Initialize \mat{U} from \vec{\alpha} weighted summation of $\mat{S}_1, \dots, \mat{S}_V$.}
\STATE{Initialize \mat{F} using (\ref{Eq:SolutionF}).}
\STATE{Update $\vec{\alpha}$ as $\alpha_v=1/(2\sqrt{\|\mat{U}-\mat{A}_v\|_F^2})$.}
\STATE{Update \mat{U} with \mat{F}, \mat{A}, \vec{\alpha} fixed using (\ref{Eq:SolutionU}).}
\STATE{Update \mat{F} with \mat{U}, \mat{A}, \vec{\alpha} fixed using (\ref{Eq:SolutionF}).}
\STATE{Update \mat{A} with \mat{F}, \mat{U}, \vec{\alpha} fixed using (\ref{Eq:Update_A}) and (\ref{Eq:Update_A_final}).}
\STATE{Repeat the steps presented above until \mat{U} converges or the predefined maximum number of iterations is reached.}
\end{algorithmic}
\end{algorithm}
\section{Numerical Evaluations}
This section presents empirical evaluation of the proposed CI-GMVC with some real-world datasets. We compare the proposed algorithm with state-of-the-art methods, which include
Multi-view Spectral Clustering ({MSC})\footnote{Source code available at \url{https://github.com/frash1989/ELM-MVClustering/tree/master/RMSC-ELM}.}\cite{Xia_AAAI_2014},
Co-regularized Spectral Clustering ({CoregSC})\footnote{Source code available at \url{http://legacydirs.umiacs.umd.edu/~abhishek/code_coregspectral.zip}.} \cite{Kumar_NIPS_2011},
Multiple Graph Learning ({MGL})\footnote{Source code available at \url{http://www.escience.cn/people/fpnie}.} \cite{Nie_IJCAI_2016},
Multi-view Clustering with Graph Learning ({MCGL})\footnote{Source code available at \url{https://github.com/kunzhan/MVGL}.} \cite{Nie_IEEETIP_2018}, and
and Graph-based System ({GBS})\footnote{Source code available at \url{https://github.com/cswanghao/gbs}.}\cite{Wang_KBS_2019_s}.
As for GBS and our proposed CI-GMVC methods, the SIG matrix is generated by following {Algorithm 1} in \cite{Wang_KBS_2019_s} with the number of neighbors $k=15$. The hyper-parameters for our proposed CI-GMVC are $\beta = 10^{-12}$ and $\gamma = 10^{-5}$, which are obtained from preliminary experiments.
Datasets summarized in {TABLE \ref{tbl:dataset}} are the following.
The {BBC (BBC)} dataset\footnote{\url{http://mlg.ucd.ie/datasets/segment.html}.} includes news articles from the BBC news website. The number of articles is $685$. Each has one of five topical labels.
The {Newsgroup (NG)} dataset\footnote{\url{http://lig-membres.imag.fr/grimal/data.html}.} is collected from the $20$ News-group datasets, which has $500$ newsgroup documents. This has five topical labels.
The {WebKB} dataset\footnote{\url{https://linqs.soe.ucsc.edu/data}.} has four classes; it includes $203$ web-pages. Each web-page consists of the anchor text of the hyperlink, its title, and the page content.
The {One-hundred plant species leaves (100 leaf)} dataset\footnote{\url{https://archive.ics.uci.edu/ml/datasets/One-hundred+plant+species+leaves+data+set}.} includes three views of which one has $1600$ samples. Each belongs to one of the one hundred plant species.
\begin{table}[htbp]
\caption{Features of datasets used for this experiment.}
\label{tbl:dataset}
\begin{center}
\begin{tabular}{c|r|c|r|r|r|r|r}
\hline
dataset &\multicolumn{1}{|c|}{$N$} & $V$ & \multicolumn{1}{|c}{$C$} & \multicolumn{4}{|c}{dimensions of each view}\\
\cline{5-8}
&\multicolumn{1}{|c}{}&\multicolumn{1}{|c}{}&\multicolumn{1}{|c}{}& \multicolumn{1}{|c}{$d_1$} & \multicolumn{1}{|c}{$d_2$} & \multicolumn{1}{|c}{$d_3$} & \multicolumn{1}{|c}{$d_4$} \\
\hline
\hline
BBC & 685 & 4 & 5 & 4659 & 4633 & 4665 & 4684 \\
NGs & 500 & 3 & 5 & 2000 & 2000 & 2000 &\multicolumn{1}{|c}{--}\\
WebKB & 203 & 3 & 4 & 1703 & 230 & 230 & \multicolumn{1}{|c}{--} \\
100leaves & 1600 & 3 & 100 & 64 & 64 & 64 & \multicolumn{1}{|c}{--} \\
\hline
\end{tabular}
\end{center}
\end{table}
\subsection{Convergence behavior}
The objective function in (\ref{Eq:obj_fun}) is not convex on all variables. Therefore, this subsection confirms the convergence behaviors of our proposed CI-GMVC compared with GBS, which outperforms others. For a fair comparison, we evaluate the objective function without regularizers (\ref{Eq:obj_fun}), i.e., $\sum_{v=1}^{V}\alpha_v\|\mat{U}-\mat{S}_v\|_F^2$ in (\ref{Eq:obj_fun_1}), and use the same stopping condition as that used for GBS. As {Fig. \ref{fig:ave_pred_results}} shows, the convergences of CI-GMVC on the WebKB and 100 leaf datasets are faster than those of GBS.
\begin{figure}[htbp]
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=1\linewidth]{figures/WebKB_cost_iter.eps}
{\small (a) WebKB dataset}
\end{minipage}
\begin{minipage}[b]{.49\linewidth}
\centering
\includegraphics[width=1\linewidth]{figures/100leaves_cost_iter.eps}
{\small (b) 100 leaf dataset}
\end{minipage}
\caption{Convergence behaviors of CI-GMVC compared to those of GBS.}
\label{fig:ave_pred_results}
\end{figure}
\subsection{Clustering performance}
This subsection presents comparisons of clustering performance. The results of ACC and NMI are shown respectively in {TABLE \ref{tbl:result_ACC}} and {TABLE \ref{tbl:result_NMI}}, where the average scores of the accuracy (ACC) and the normalized mutual information (NMI) are shown. The best performances are presented in bold. Results aside from those of GBS and CI-GMVC are from those in \cite{Wang_KBS_2019_s}. The results demonstrated that the proposed CI-GMVC is comparable to or outperforms other state-of-the-art methods.
\begin{table}[htbp]
\caption{Average clustering performance (ACC).}
\label{tbl:result_ACC}
\begin{center}
\begin{tabular}{l|c|c|c|c}
\hline
\multicolumn{1}{c|}{method} & \multicolumn{1}{c|}{\ \ BBC\ \ \ } & \multicolumn{1}{c|}{\ \ NGs\ \ \ \ } & \multicolumn{1}{c|}{WebKB} & \multicolumn{1}{c}{100leaves} \\
\hline\hline
CoregSC \cite{Kumar_NIPS_2011} & 47.01& 27.68& 59.70& 77.06\\
\hline
MSC \cite{Xia_AAAI_2014} & 62.32& 31.12& 47.34& 73.79\\
\hline
MGL \cite{Nie_IJCAI_2016} & 53.96& 82.18& 73.84& 69.04\\
\hline
MCGL \cite{Nie_IEEETIP_2018} &35.33 &24.60 & 54.19& 81.06\\
\hline
GBS \cite{Wang_KBS_2019_s} & 69.34& 98.20& 74.38& {\bf 82.44}\\
\hline
CI-GMVC (proposed) & {\bf 70.36}& {\bf 98.40}& {\bf 77.34}&{\bf 82.44} \\
\hline
\end{tabular}
\end{center}
\caption{Average clustering performance (NMI).}
\label{tbl:result_NMI}
\begin{center}
\begin{tabular}{l|c|c|c|c}
\hline
\multicolumn{1}{c|}{method} & \multicolumn{1}{c|}{\ \ BBC\ \ \ } & \multicolumn{1}{c|}{\ \ NGs\ \ \ \ } & \multicolumn{1}{c|}{WebKB} & \multicolumn{1}{c}{100leaves} \\
\hline\hline
CoregSC \cite{Kumar_NIPS_2011} & 28.63& \ 8.80& 31.39& 91.65\\
\hline
MSC \cite{Xia_AAAI_2014} &55.31 &\ 9.72 & 22.37& 90.14\\
\hline
MGL \cite{Nie_IJCAI_2016} & 36.97& 83.04& 43.62& 87.53\\
\hline
MCGL \cite{Nie_IEEETIP_2018} & \ 7.41& 10.72& 8.60& 91.30\\
\hline
GBS \cite{Wang_KBS_2019_s} & 56.27& 93.92& 37.83& 93.43\\
\hline
CI-GMVC (proposed) & {\bf 58.59}& {\bf 94.61}&{\bf 47.01} &{\bf 93.52} \\
\hline
\end{tabular}
\end{center}
\end{table}
\section{Conclusions}
The proposed graph-based multi-view clustering method CI-GMVC particularly incorporates the consistency and the inconsistency structure lying across multiple views.
Numerical evaluations using several real-world datasets demonstrated the effectiveness of the proposed CI-GMVC.
\bibliographystyle{unsrt}
|
\section*{Introduction}
This paper is a continuation of our studies of
homogeneous open convex cones containing no entire line
(homogeneous cones for short in what follows)
in \cite{NN2013, N2014, N2018, N2020}.
In the study of homogeneous cones,
the basic relative invariants are fundamental objects
from analytic and algebraic points of view
(see \cite{Ishi1999,FK1994,N2020}, for example),
and explicit formulas of them are given in the previous paper~\cite{N2014}.
The proof there depends on a result obtained from
Graczyk--Ishi~\cite{GI2014} and Ishi~\cite{Ishi2000},
which requires analytic arguments essentially for the proof.
It is however desirable to prove it without analytic arguments
because homogeneous cones provide many examples of non-reductive prehomogeneous vector spaces which can be defined over not only the real field but also general algebraic number fields
(see~\cite{Kimura} for prehomogeneous vector spaces).
In this paper,
we give an algebraic proof to a part of the results in~\cite{GI2014}
which is sufficient to obtain explicit formulas of the basic relative invariants.
Let us describe the contents of this paper in more detail.
Let $V$ be a finite dimensional real vector space
with suitable inner product $\innV{\cdot}{\cdot}_V$
and $\Omega\subset V$ an open convex cone containing no entire line.
In what follows,
we always assume that $\Omega$ is homogeneous, that is,
the group $GL(\Omega):=\set{g\in GL(V)}{g\Omega=\Omega}$ acts on $\Omega$ transitively.
Vinberg~\cite{Vinberg} tells us that
there exists a split solvable Lie subgroup $H$ of $GL(\Omega)$
acting on $\Omega$ simply transitively.
In this paper,
we fix such an $H$,
and the action of $H$ on $V$ will be denoted by $\rho$.
We decompose $V$ as
$V=\bigoplus_{1\le j\le k\le r}V_{kj}$,
which is the normal decomposition of $V$
with respect to a complete orthogonal system $c_1,\dots,c_r$ of primitive idempotents
(see \eqref{eq:normal_decomp}).
Let $E$ be another finite dimensional real vector space
with inner product $\innV{\cdot}{\cdot}_E$,
and let $Q$ be a quadratic map on $E$ into $V$.
We say that $Q$ is $\Omega$-positive
if $Q[\xi]\in\overline{\Omega}\setminus\{0\}$ $(\xi\in E)$ whenever $\xi\ne 0$,
and that $Q$ is homogeneous
if for any $g\in GL(\Omega)$ there exists $A_g\in GL(E)$ such that
$g\bigl(Q[\xi]\bigr)=Q[A_g\xi]$ for all $\xi \in E$.
We extend $Q$ to the bilinear map by polarization in \eqref{def:polarization}, and use the same symbol $Q$.
By using inner products of $V$ and $E$,
we introduce a linear map $\varphi\colon V\to \mathrm{Sym}(E)$ by
\[
\innV{\varphi(x)\xi}{\eta}_E=\innV{Q(\xi,\eta)}{x}_V\quad
(x\in V,\ \xi,\eta\in E).
\]
The following theorem is what we need for the proof of explicit formulas of the basic relative invariants.
\renewcommand{\theProposition}{\Alph{Proposition}}
\begin{Theorem}[{Graczyk--Ishi~\cite{GI2014}, Ishi~\cite{Ishi2000}}]
\label{theo:GI2014}
For any $\Omega$-positive homogeneous quadratic map $Q$ on $E$,
there exists a unique $\boldsymbol{\varepsilon}\in\{0,1\}^r$ such that
the image $Q[E]$ of $Q$ is described as a closure of an $H$-orbit through $c_{\boldsymbol{\varepsilon}}=\varepsilon_1c_1+\cdots+\varepsilon_rc_r$, that is, one has
\[
Q[E]=\overline{\rho(H)c_{\boldsymbol{\varepsilon}}}.
\]
The vector $\bs{\varepsilon}=(\varepsilon_1,\dots,\varepsilon_r)$
is determined from $\dim\varphi(c_i)E$ $(i=1,\dots,r)$ and $\dim V_{kj}$
$(1\le j<k\le r)$.
\end{Theorem}
\renewcommand{\theProposition}{\arabic{section}.\arabic{Proposition}}
We note that,
in that paper~\cite{GI2014},
this theorem is proved by using a theory of Laplace transforms,
and valid for more general quadratic maps called virtual quadratic maps.
On the other hand,
for the proof of explicit formulas of the basic relative invariants,
we need this theorem only for usual quadratic maps
so that we are able to give a proof to this theorem without analytic arguments.
We shall do so in Section~\ref{sect:proof} after preparing some terminologies and notations in Section~\ref{sect:preparation}.
\noindent
\textbf{Acknowledgments.}\rule{0pt}{2em}
The author is grateful to professor Takaaki Nomura
for the encouragement in writing this paper.
\section{Preliminaries}
\label{sect:preparation}
We begin this section with the definition of Vinberg algebras following Vinberg~\cite{Vinberg}.
Let $V$ be a finite dimensional real vector space with a bilinear product $\triangle$.
We do not assume the commutativity and the associativity of the product, and also the existence of unit element.
For each $x\in V$,
let $L_x$ denote the left multiplication operator $L_xy=\Clanprod{x}{y}$ $(y\in V)$.
The pair $(V,\triangle)$ is called a Vinberg algebra if the following three conditions are satisfied.
\begin{enumerate}
\item[(V1)]
for any $x,y\in V$, one has $[L_x,L_y]=L_{\Clanprod{x}{y}-\Clanprod{y}{x}}$ (left symmetry)
\item[(V2)]
there exists an $s\in V^*$ such that
$s(\Clanprod{x}{y})$ defines an inner product in $V$
(compactness)
\item[(V3)]
for any $x\in V$, eigenvalues of $L_x$ are all real
(normality)
\end{enumerate}
Linear forms $s$ with the property (V2) are said to be \textit{admissible}.
In~\cite{Vinberg}, it is shown that
homogeneous convex domains correspond in a one-to-one way,
up to isomorphisms,
to Vinberg algebras.
Moreover, homogeneous convex domains are cones if and only if
the corresponding algebras have a unit element.
We summarize properties of Vinberg algebras which we need later.
Let $V$ be a Vinberg algebra with unit element $e_V$.
We equip $V$ with an inner product $\innV{\cdot}{\cdot}_V$
defined by an admissible linear form $s_0\in V^*$,
that is,
\[
\innV{x}{y}_V:=s_0(\Clanprod{x}{y})\quad(x,y\in V).
\]
There exists a complete orthogonal system of primitive idempotents
$c_1,\dots,c_r$ with $c_1+\cdots+c_r=e_V$ such that
$V$ can be decomposed as
\begin{equation}
\label{eq:normal_decomp}
V=\bigoplus_{1\le j\le k\le r}V_{kj}
\end{equation}
where $V_{jj}=\mathbb R c_j$ $(j=1,\dots,r)$ and
\[
V_{kj}=
\set{x\in V}{L_{c_i}x=\tfrac{1}{2}(\delta_{ij}+\delta_{ik})x\text{ and }
\Clanprod{x}{c_i}=\delta_{ij}x\ (i=1,\dots,r)}
\]
for $1\le j<k\le r$.
According to this decomposition,
we have the following multiplication rules:
\begin{equation}
\label{table}
\begin{array}{c}
\Clanprod{V_{ji}}{V_{lk}}=\{0\}\ (\text{if }i\ne k,l),\quad
\Clanprod{V_{kj}}{V_{ji}}\subset V_{ki}\ (i\le j\le k),\\[0.3em]
\Clanprod{V_{ji}}{V_{ki}}\subset V_{jk}\text{ or }V_{kj}\
(\text{according to $j\le k$ or $k\le j$, where $i\le j,k$}).
\end{array}
\end{equation}
Weight spaces $V_{kj}$ $(1\le j\le k\le r)$ are mutually orthogonal with respect to the inner product $\innV{\cdot}{\cdot}_V$.
Note that we have $s_0(c_j)>0$ for each $j=1,\dots,r$ because $s_0(c_j)=s_0(\Clanprod{c_j}{c_j})=\innV{c_j}{c_j}>0$.
By (V1) and (V3),
the space $\mathfrak{h}:=\set{L_x}{x\in V}$
of left multiplication operators forms a split solvable Lie algebra,
which is linearly isomorphic to $V$.
Let $H:=\exp\mathfrak{h}$ be the connected and simply connected Lie group corresponding to $\mathfrak{h}$.
Then, by \cite{Vinberg},
the $H$-orbit $\Omega$ through $e_V$ is a proper open convex cone in $V$,
and $H$ acts on $\Omega$ linearly and simply transitively.
By introducing lexicographic order among the subspaces $V_{kj}$,
we see that every $L_x$ $(x\in V)$ is simultaneously expressed
by a lower triangular matrix by~\eqref{table}.
Using this,
we introduce a coordinate system on $H$
according to Ishi~\cite[Section 2]{Ishi2000} as follows.
For each $h\in H$,
there exist unique $t_j\in \mathbb R$ $(j=1,\dots,r)$ and $L_j\in \bigoplus_{k>j}V_{kj}$ $(j=1,\dots,r-1)$ such that
\begin{equation}
\label{def:coordinate H}
h=\exp(t_1L_{c_1})(\exp L_1)\exp(t_2L_{c_1})\cdots\exp(L_{r-1})\exp(t_rL_{c_r}).
\end{equation}
Let $\Omega^*$ be the dual cone of $\Omega$, that is,
\[
\Omega^*=\set{y\in V}{\innV{x}{y}_V>0\text{ for all }x\in\overline{\Omega}\setminus\{0\}}.
\]
Since $H$ acts on $\Omega^*$ simply transitively through
the contragradient representation $\rho^*$ of $\rho$,
we see that $\Omega^*$ is also a homogeneous cone in $V$.
We denote by $(V,\raisebox{1pt}{\rotatebox[origin=c]{180}{$\triangle$}})$ the Vinberg algebra corresponding to $\Omega^*$.
Then, the following relationship holds between the products $\triangle$ and $\raisebox{1pt}{\rotatebox[origin=c]{180}{$\triangle$}}$:
\[
\innV{\dClanprod{x}{y}}{z}_V=\innV{y}{\Clanprod{x}{z}}_V\quad
(x,y,z\in V).
\]
Moreover, \cite[Proposition 1.2]{N2014} tells us that
\begin{equation}
\label{eq:relation of tm and dtm}
\Clanprod{x}{y}-\Clanprod{y}{x}
=
\dClanprod{y}{x}-\dClanprod{x}{y}\quad
(x,y\in V).
\end{equation}
Let $\mathrm{Sym}(m,\mathbb R)$ be the space of symmetric matrices of size $m$.
For $x=(x_{ij})\in\mathrm{Sym}(m,\mathbb R)$, we set
\[
\ul{x}:=\begin{cases}
\frac{1}{2}x_{ii}&(i=j),\\
x_{ij}&(i>j),\\
0&(i<j),
\end{cases}
\quad
\ol{x}:={}^{t\!}(\ul{x}).
\]
Namely, $\ul{x}$ is a lower triangular matrix such that
$\ul{x}+{}^{t\!}(\ul{x})=x$.
The product of Vinberg algebra $(\mathrm{Sym}(m,\mathbb R),\triangle)$ is given as
\[
\Clanprod{x}{y}=\ul{x}y+y\ol{x}\quad(x,y\in\mathrm{Sym}(m,\mathbb R)),
\]
whereas that of $(\mathrm{Sym}(m,\mathbb R),\raisebox{1pt}{\rotatebox[origin=c]{180}{$\triangle$}})$ is
\[
\dClanprod{x}{y}=\ol{x}y+y\ul{x}\quad(x,y\in \mathrm{Sym}(m,\mathbb R)).
\]
Let $\varphi$ be a linear map from $V$ to $\mathrm{Sym}(m,\mathbb R)$.
The map $\varphi$ is called a representation of $(V,\raisebox{1pt}{\rotatebox[origin=c]{180}{$\triangle$}})$
if $\varphi$ is an algebra homomorphism
\[
\varphi(\dClanprod{x}{y})=\ol{\varphi}(x)\varphi(y)+\varphi(y)\ul{\varphi}(x)\quad(x,y\in V)
\]
with a condition $\varphi(e_V)=I_m$.
Here, we set $\ul{\varphi}(x)=\ul{\varphi(x)}$ and $\ol{\varphi}(x)=\ol{\varphi(x)}$.
Let $E$ be a finite dimensional vector space with an inner product $\innV{\cdot}{\cdot}_E$
and $Q$ an $\Omega$-positive homogeneous quadratic map on $E$.
We extend $Q$ (and use the same symbol) to a bilinear map $Q\colon E\times E\to V$ by polarization, that is,
\[
Q(\xi_1,\xi_2)=\frac{1}{2}\bigl(
Q[\xi_1+\xi_2]-Q[\xi_1]-Q[\xi_2]
\bigr)
\quad(\xi_1,\xi_2\in E).
\]
Let $\varphi$ be a linear map from $V$ to $\mathrm{Sym}(E)$ defined by
\begin{equation}
\label{def:polarization}
\innV{\varphi(x)\xi}{\eta}_E=\innV{x}{Q(\xi,\eta)}_V
\quad(x\in V,\ \xi,\eta\in E).
\end{equation}
Then, $\varphi$ is a representation of $\Omega^*$ in the sense of Rothaus~\cite{Rothaus}, and
by~\cite[Theorem 2]{Ishi2011},
we can assume that $\varphi$ is a representation of the Vinberg algebra $(V,\raisebox{1pt}{\rotatebox[origin=c]{180}{$\triangle$}})$
without loss of generality.
Using this,
we equip $W:=E\oplus V$ with a bilinear product $\triangle$ by
\begin{equation}
\label{eq:prod W}
\Clanprod{(\xi_1+x_1)}{(\xi_2+x_2)}:=\ul{\varphi}(x_1)\xi_2+(2\,Q(\xi_1,\xi_2)+\Clanprod{x_1}{x_2})
\end{equation}
for $\xi_1,\xi_2\in E$ and $x_1,x_2\in V$.
Here, $\triangle$ in the right hand side is the product of $(V,\triangle)$.
Then, $(W,\triangle)$ is a Vinberg algebra with no unit element
(cf.\ \cite[\S3]{NN2013}).
Notice that we have $\Clanprod{\xi_1}{\xi_2}=\Clanprod{\xi_2}{\xi_1}$ for any $\xi_1,\xi_2\in E$.
The inner product of $W$ is defined by using the admissible linear form $s_0$ of $V$ as
\begin{equation}
\label{eq:innW}
\begin{array}{r@{\ }c@{\ }l}
\innV{\xi_1+x_1}{\xi_2+x_2}_W
&:=&
s_0(2\,Q(\xi_1,\xi_2)+\Clanprod{x_1}{x_2})\\
&=&
\innV{x_1}{x_2}_V+2\innV{\xi_1}{\xi_2}_E.
\end{array}
\end{equation}
Note that $\norm{\xi}_W^2=2\norm{\xi}_E^2$.
\section{Algebraic proof}
\label{sect:proof}
In this section,
we give an algebraic proof to Theorem~\ref{theo:GI2014}.
Let $V$ be a Vinberg algebra corresponding to a homogeneous cone $\Omega$ of rank $r$,
and we keep all notations from the previous sections.
First, we decompose $V$ into three subspaces as follows:
\[
V=\mathbb R c_1\oplus V^{[1]}\oplus V',\quad
V^{[1]}:=\bigoplus_{k=2}^rV_{k1},\quad
V':=\bigoplus_{2\le j\le k\le r}V_{kj}.
\]
If we restrict the product $\triangle$ of $V$ to $V'$ (and use the same notation),
then $(V',\triangle)$ is also a Vinberg algebra so that
there exist a homogeneous cone $\Omega'$ corresponding to $V'$
and a split solvable Lie group $H'$ acting on $\Omega'$ simply transitively.
As in \cite[\S2]{N2018},
each element $h'$ in $H'$ can be written by removing the terms corresponding to $\mathbb R c_1$ and $V^{[1]}$ from~\eqref{def:coordinate H}, that is, there exist $h_j\in\mathbb R_{>0}$ $(j=2,\dots,r)$ and $v_{kj}\in V_{kj}$ $(2\le j<k\le r)$ such that
\[
h'=(\exp T_2)(\exp L_2)(\exp T_3)\cdots(\exp L_{r-1})(\exp T_r),
\]
where $T_j=(2\log h_j)L_{c_j}$ and $L_j=\sum_{k>j}L_{v_{kj}}$.
Moreover, if we set $Q'[\xi]:=\Clanprod{\xi}{\xi}$ for $\xi\in V^{[1]}$,
then $Q'$ is an $\Omega'$-positive homogeneous quadratic map on $V^{[1]}$.
Let $Q$ be an $\Omega$-positive homogeneous quadratic map on $E$,
and $\varphi$ the corresponding linear map
$\varphi\colon V\to\mathrm{Sym}(E)$.
Since $c_1,\dots,c_r$ satisfy $\Clanprod{c_j}{c_k}=\delta_{jk}$,
we see that $\varphi(c_1),\dots,\varphi(c_r)$ are orthogonal projection on $E$.
By setting
$E_i:=\varphi(c_i)E$ for $i=1,\dots,r$,
we decompose $E$ into
\[
E=E_1\oplus E',\quad
E'=\bigoplus_{k=2}^rE_k.
\]
For each $\nu\in E$, we set $\xi_\nu:=\varphi(c_1)\nu$,
the orthogonal projection of $\nu$ to $E_1$.
We note that
the Vinberg algebra $W=E\oplus V$ can be described in a formal matrix form as
\[
W=\pmat{0&E_1&E'\\ E_1&\mathbb R c_1&V^{[1]}\\ E'&V^{[1]}&V'}.
\]
For later use,
we summarize multiplication rules between the spaces $E_1$, $E'$ and $V^{[1]}$
as a lemma, which can be obtained easily from \eqref{table}.
\begin{Lemma}
\label{lemma:product}
With respect to $E_1$, $E'$ and $V^{[1]}$,
one has the following multiplication table.
\[
\raisebox{-12pt}{\rm left}\,
\begin{array}{r|rrr}
\multicolumn{4}{c}{\quad{\rm right}}\\
&E_1&E'&V^{[1]}\\ \hline
\rule{0pt}{13pt}
E_1&\mathbb R c_1&V^{[1]}&0\\
\rule{0pt}{11pt}
E'&V^{[1]}&V'&0\\
\rule{0pt}{11pt}
V^{[1]}&E'&0&V'
\end{array}
\]
Here,
left factor of the products are placed in row entries,
and right ones in column entries.
\end{Lemma}
Suppose $E_1\ne\{0\}$.
We take and fix a non-zero $\xi\in E_1$.
Using this $\xi$,
we introduce two linear maps $r_\xi\colon V^{[1]}\to E'$ and
$r^*_\xi\colon E'\to V^{[1]}$ by
\[
r_\xi(v)=\Clanprod{v}{\xi}\quad(v\in V^{[1]}),\quad
r^*_\xi(a)=\Clanprod{a}{\xi}\quad(a\in E').
\]
\begin{Lemma}
\label{lemma:orthogonal prod}
For any $a\in \mathrm{Image}\,r_\xi$ and $b\in \mathrm{Ker}\,r^*_\xi$, one has $\Clanprod{a}{b}=0$.
\end{Lemma}
\begin{proof}
Since $a\in \mathrm{Image}\,r_\xi$,
there exists $v\in V^{[1]}$ such that $a=r_\xi(v)=\Clanprod{v}{\xi}$.
The condition (V1) yields that
\[
\Clanprod{a}{b}
=
\Clanprod{(\Clanprod{v}{\xi})}{b}
=
\Clanprod{(\Clanprod{\xi}{v})}{b}
+
\Clanprod{v}{(\Clanprod{\xi}{b})}
-
\Clanprod{\xi}{(\Clanprod{v}{b})}.
\]
By Lemma~\ref{lemma:product},
we know that $\Clanprod{\xi}{v}=0$ and $\Clanprod{v}{b}=0$ so that
\[
\Clanprod{a}{b}
=
\Clanprod{v}{(\Clanprod{\xi}{b})}.
\]
Since $\xi,b\in E$, the equation~\eqref{eq:prod W} tells us that $\Clanprod{\xi}{b}=\Clanprod{b}{\xi}=r^*_\xi(b)$,
and hence
we conclude $\Clanprod{a}{b}=0$ by $b\in\mathrm{Ker}\,r^*_\xi$.
\end{proof}
\begin{Lemma}
\label{lemma:direct sum}
One has $E'=\mathrm{Image}\,r_\xi\oplus \mathrm{Ker}\,r^*_\xi$
$($direct sum$)$.
\end{Lemma}
\begin{proof}
At first, we consider the composition $r^*_\xi\circ r_\xi$.
The left symmetry (V1) of the product yields that,
for $v\in V^{[1]}$
\[
r^*_\xi\circ r_\xi(v)
=
\Clanprod{(\Clanprod{v}{\xi})}{\xi}
=
\Clanprod{(\Clanprod{\xi}{v})}{\xi}
+
\Clanprod{v}{(\Clanprod{\xi}{\xi})}
-
\Clanprod{\xi}{(\Clanprod{v}{\xi})}.
\]
Lemma~\ref{lemma:product} tells us that
$\Clanprod{v}{\xi}\in E'\subset E$ so that
\eqref{eq:prod W} yields that
\[
\Clanprod{\xi}{(\Clanprod{v}{\xi})}=\Clanprod{(\Clanprod{v}{\xi})}{\xi}.\]
Thus,
since $\Clanprod{\xi}{v}=0$ again by Lemma~\ref{lemma:product},
we have by the left symmetry
\[
\Clanprod{(\Clanprod{v}{\xi})}{\xi}
=
\Clanprod{v}{(\Clanprod{\xi}{\xi})}
-
\Clanprod{(\Clanprod{v}{\xi})}{\xi},
\]
whence $\Clanprod{(\Clanprod{v}{\xi})}{\xi}=
\frac{1}{2}\Clanprod{v}{(\Clanprod{\xi}{\xi})}$.
We note that
$\Clanprod{\xi}{\xi}=\frac{2\norm{\xi}_E^2}{s_0(c_1)}c_1$.
In fact,
Lemma~\ref{lemma:product} tells us that
there exists a suitable number $A$ such that $\Clanprod{\xi}{\xi}=Ac_1$, and then by \eqref{eq:innW}
\[
As_0(c_1)=s_0(Ac_1)=s_0\bigl(\Clanprod{\xi}{\xi}\bigr)=\norm{\xi}_W^2=2\norm{\xi}_E^2.
\]
Since $\Clanprod{v}{c_1}=v$ by definition of $V^{[1]}$,
we obtain
\[
r^*_\xi\circ r_\xi(v)
=
\Clanprod{(\Clanprod{v}{\xi})}{\xi}
=
\frac{1}{2}\,\Clanprod{v}{(\Clanprod{\xi}{\xi})}
=
\frac{\norm{\xi}_E^2}{s_0(c_1)}\,v,
\]
that is,
$r^*_\xi\circ r_\xi$ is a scalar map.
This means that
$r_\xi$ is injective while $r^*_\xi$ is surjective.
In particular, any $x\in E'$ can be written as
\[x=a+b\quad(a\in \mathrm{Image}\,r_\xi,\ b\in \mathrm{Ker}\,r^*_\xi).\]
In fact,
let $a=\frac{s_0(c_1)}{\norm{\xi}_E^2}r_\xi(r^*_\xi(x))\in\mathrm{Image}\,r_\xi$.
Then, since $r^*_\xi$ is linear and $r^*_\xi\circ r_\xi$ is a scalar map,
we have
\[
r^*_{\xi}(x-a)=r^*_\xi(x)-\frac{s_0(c_1)}{\norm{\xi}_E^2}r^*_\xi\circ r_\xi\circ r^*_\xi(x)
=
r^*_\xi(x)- r^*_\xi(x)=0,
\]
which implies $b:=x-a\in\mathrm{Ker}\,r^*_\xi$.
Next,
let us take $x\in\mathrm{Image}\,r_\xi\cap \mathrm{Ker}\,r^*_\xi$.
Then,
Lemma~\ref{lemma:orthogonal prod}
together with \eqref{eq:innW} tells us that
\[
\norm{x}_W^2=\innV{x}{x}_W=s_0(\Clanprod{x}{x})=0,
\]
whence $\mathrm{Image}\,r_\xi\cap \mathrm{Ker}\,r^*_\xi=\{0\}$.
Now there is nothing to prove.
\end{proof}
This lemma implies that
$\mathrm{Image}\,r_\xi$ can be regarded as a copy of $V^{[1]}$ in $E'$ so that
we rewrite $\mathrm{Image}\,r_\xi$ and $\mathrm{Ker}\,r^*_\xi$ as
\[
E_{V^{[1]}}=E_{V^{[1]}}(\xi):=\mathrm{Image}\,r_\xi,\quad
E_{V^{[1]}}^\perp=E_{V^{[1]}}^\perp(\xi):=\mathrm{Ker}\,r^*_\xi.
\]
For each $x\in V'$,
let $\widetilde{\varphi}(x)$ denote the restriction of $\varphi(x)$ to $E_{V^{[1]}}^\perp$.
Then, $(\widetilde{\varphi},E_{V^{[1]}}^\perp)$ is a representation of $(V',\raisebox{1pt}{\rotatebox[origin=c]{180}{$\triangle$}})$.
In fact,
Lemma~\ref{lemma:product} yields that
$\Clanprod{b}{x}=0$ and $\Clanprod{x}{\xi}=0$
for $b\in E_{V^{[1]}}^\perp$ and $x\in V'$ so that
we obtain by the left symmetry (V1)
\[
\begin{array}{r@{\ }c@{\ }l}
\Clanprod{(\Clanprod{x}{b})}{\xi}
&=&
\Clanprod{(\Clanprod{b}{x})}{\xi}
+
\Clanprod{x}{(\Clanprod{b}{\xi})}
-
\Clanprod{b}{(\Clanprod{x}{\xi})}\\
&=&
\Clanprod{x}{(r^*_\xi(b))}=0,
\end{array}
\]
whence $\widetilde{\varphi}(x)$ preserves $E_{V^{[1]}}^\perp$ for any $x\in V'$.
Let $\widetilde{Q}$ be the corresponding quadratic map.
Then, it is $\Omega'$-positive and homogeneous.
Let $\widetilde{Q}$ denote the restriction of $Q$ to $E_{V^{[1]}}^\perp$, that is,
\[
\widetilde{Q}[b]:=Q[b]\quad(b\in E_{V^{[1]}}^\perp).
\]
\begin{Lemma}
\label{lemma:tildeQ}
The quadratic map $\widetilde{Q}$ is $\Omega'$-positive and homogeneous.
\end{Lemma}
\begin{proof}
Since $\Clanprod{E'}{E'}\subset V'$,
we see that $\widetilde{Q}$ is $\Omega'$-positive and thus we shall prove homogeneity.
Since $W':=E_{V^{[1]}}^\perp\oplus V'$ is a subspace of $W$
and $W$ satisfies the product $\eqref{eq:prod W}$,
it is enough to show $\Clanprod{V'}{E_{V^{[1]}}^\perp}\subset E_{V^{[1]}}^\perp$.
By Lemma~\ref{lemma:product}, we have
$\Clanprod{b}{x}=0$ and $\Clanprod{x}{\xi}=0$
for $b\in E_{V^{[1]}}^\perp$ and $x\in V'$ so that
the left symmetry (V1) yields
\[
\begin{array}{r@{\ }c@{\ }l}
\Clanprod{(\Clanprod{x}{b})}{\xi}
&=&
\Clanprod{(\Clanprod{b}{x})}{\xi}
+
\Clanprod{x}{(\Clanprod{b}{\xi})}
-
\Clanprod{b}{(\Clanprod{x}{\xi})}\\
&=&
\Clanprod{x}{(r^*_\xi(b))}=0,
\end{array}
\]
which is what we want to prove.
\end{proof}
\begin{Proposition}
\label{prop:main}
For $\nu\in E$ with $\xi=\xi_\nu\ne 0$,
we decompose it according to the direct sum decomposition $E=E_1\oplus E_{V^{[1]}}\oplus E_{V^{[1]}}^\perp$ as
\begin{equation}
\label{eq:decom xi}
\nu=\xi+a+b\quad(\xi=\xi_\nu\in E_1,\ a\in E_{V^{[1]}},\ b\in E_{V^{[1]}}^\perp).
\end{equation}
let $t>0$ and $u\in V^{[1]}$ be
\[
e^t:=\frac{2\norm{\xi}_E^2}{s_0(c_1)},\quad
u:=2e^{-t/2}r^*_\xi(a)=2\sqrt{\frac{s_0(c_1)}{2\norm{\xi}^2_E}}\,r^*_\xi(a).
\]
Then, one has
\[
Q[\nu]=\rho(\exp L_{tc_1}\exp L_u)(c_1+\widetilde{Q}[b]).
\]
\end{Proposition}
\begin{proof}
Since $Q(\xi_1,\xi_2)$ is bilinear and symmetric, we have
\[
\begin{array}{r@{\ }c@{\ }l}
Q[\nu]
&=&
\displaystyle
\frac{2\norm{\xi}^2_E}{s_0(c_1)}c_1+2\Clanprod{\xi}{(a+b)}+Q[a+b]\\
&=&
e^tc_1+e^{t/2}\cdot 2e^{-t/2}r^*_\xi(a)+Q[a]+\widetilde{Q}[b].
\end{array}
\]
On the other hand,
we have for general $t'\in\mathbb R$, $v\in V^{[1]}$ and $w\in V'$
\[
\rho(\exp L_{t'c_1} \exp L_{v'})(c_1+w)=
e^{t'}c_1+e^{t'/2} v'+(\tfrac{1}{2}\Clanprod{v'}{v'}+w).
\]
These observations tell us that it is enough to show $\frac{1}{2}\Clanprod{u}{u}=Q[a]$.
Since $a\in E_{V^{[1]}}$,
there exists a unique $v\in V^{[1]}$ such that $a=\Clanprod{v}{\xi}$.
Recalling that $r^*_\xi\circ r_\xi$ is a scalar map
as in the proof of Lemma~\ref{lemma:direct sum},
we have
\[
\frac{e^{t/2}}{2}\,u
=
\Clanprod{a}{\xi}
=
\Clanprod{(\Clanprod{v}{\xi})}{\xi}
=
r^*_\xi\circ r_\xi(v)
=
\frac{\norm{\xi}_E^2}{s_0(c_1)}v
=
\frac{e^t}{2}v.
\]
This implies that $u=e^{t/2}v$ and hence by definition of $v$ we obtain
\begin{equation}
\label{eq:prop 2.4}
\Clanprod{u}{\xi}=e^{t/2}\Clanprod{v}{\xi}=e^{t/2}a.
\end{equation}
On the other hand, the left symmetry (V1) yields that
\[
\begin{array}{r@{\ }c@{\ }l}
\displaystyle
\Clanprod{u}{u}
&=&
\displaystyle
2e^{-t/2}
\Clanprod{u}{(\Clanprod{a}{\xi})}\\
&=&
\displaystyle
2e^{-t/2}\bigl(
\Clanprod{a}{\bigl(\Clanprod{u}{\xi}\bigr)}
+
\Clanprod{\bigl(\Clanprod{u}{a}\bigr)}{\xi}
-
\Clanprod{\bigl(\Clanprod{a}{u}\bigr)}{\xi}
\bigr),
\end{array}
\]
and since $\Clanprod{u}{a}=\Clanprod{a}{u}=0$ by Lemma~\ref{lemma:product},
we obtain by \eqref{eq:prop 2.4}
\[
\frac{1}{2}\Clanprod{u}{u}
=
e^{-t/2}\,
\Clanprod{a}{\bigl(\Clanprod{u}{\xi}\bigr)}
=
\Clanprod{a}{a}
=
Q[a],\]
which proves the proposition.
\end{proof}
We now start giving another proof to Theorem~\ref{theo:GI2014}.
It is proceeded by the induction on rank $r$.
If $r=1$, then there is nothing to prove.
Therefore, let $r\ge 2$ and assume that the theorem holds for $r-1$.
Assume that $E_1=\{0\}$.
Then, $Q$ is an $\Omega'$-positive homogeneous quadratic map
so that by the induction hypotheses there exists $\boldsymbol{\varepsilon}'={}^t(\varepsilon_2,\dots,\varepsilon_r)$ such that
$Q[E]=\overline{\rho(H')c_{\ue'}}$.
It can be embedded in $V$ by $Q[E]=\overline{\rho(H)c_{\boldsymbol{\varepsilon}}}$ with $\boldsymbol{\varepsilon}:={}^t(0,\boldsymbol{\varepsilon}')$,
and hence in this case the theorem holds.
In what follows,
let us consider the case $E_1\ne\{0\}$.
Take and fix an arbitrary $\nu\in E$.
If $\xi=\xi_\nu=0$,
then we take and fix a non-zero element $\eta\in E_1$.
For an integer $n\in \mathbb N$, we introduce a sequence $\{\nu_n\}$ in $E$ by
\[
\nu_n=\xi_n+a+b,\quad
\xi_n=\begin{cases}
\xi&(\xi\ne 0)\\
\frac{1}{n}\eta&(\xi=0)
\end{cases}
\]
where $a\in E_{V^{[1]}}(\xi_n)$ and $b\in E_{V^{[1]}}^\perp(\xi_n)$.
Note that
the spaces $E_{V^{[1]}}(\xi_n)$ and $b\in E_{V^{[1]}}^\perp(\xi_n)$ do not depend on the choice of $n$
and hence so are $a,b$,
but they depend on the choice of $\eta$.
Since $\xi_n\ne 0$,
we can apply Proposition~\ref{prop:main} to $\nu_n$ so that
\[
Q[\nu_n]
=
\rho(\exp L_{t_nc_1}\exp L_{u_n})(c_1+\widetilde{Q}[b])
\]
where
$e^{t_n}=\frac{2\norm{\xi}^2_E}{s_0(c_1)}$ and
$u_n=2e^{-t_n/2}r^*_{\xi_n}(a)$.
Since $\widetilde{Q}$ is an $\Omega'$-positive homogeneous quadratic map on $E_{V^{[1]}}^\perp$ by Lemma~\ref{lemma:tildeQ},
the hypotheses of the induction shows that
the image of $\widetilde{Q}$ can be described as a closure of an $H'$-orbit, that is,
there exists a unique $\boldsymbol{\varepsilon}'={}^{t}(\varepsilon_2,\dots,\varepsilon_r)\in\{0,1\}^{r-1}$ such that
\[\widetilde{Q}[b]\in\overline{\rho(H')c_{\ue'}}\qquad
(c_{\ue'}:=\varepsilon_2 c_2+\cdots+\varepsilon_rc_r)\]
for all $b\in E_{V^{[1]}}^\perp$.
Note that $\boldsymbol{\varepsilon}'$ is determined by $\dim\varphi(c_j)E_{V^{[1]}}^\perp=\dim \varphi(c_j)E-\dim V_{j1}$ $(j=2,\dots,r)$ and by $\dim V_{kj}$ $(2\le j<k\le r)$.
This means that we can choose a sequence $\{h'_n\}_{n=1,2,\dots}$ in $H'$ to be $\displaystyle\lim_{n\to+\infty}\rho(h'_n)c_{\ue'}=\widetilde{Q}[b]$ so that
we have
\[
c_1+\widetilde{Q}[b]
=
\lim_{n\to+\infty}
\bigl(
c_1+\rho(h'_n)c_{\ue'}
\bigr)
=
\lim_{n\to+\infty}
\rho(h'_n)
\bigl(
c_1+c_{\ue'}
\bigr).
\]
Here, we use a fact $\rho(h')c_1=c_1$ for $h'\in H'$ in the last equality.
Thus, if we put
\[
h_n:=(\exp L_{t_nc_1})(\exp L_{u_n})h'_n\in H\text{ and }
\boldsymbol{\varepsilon}={}^{t\!}(1,\varepsilon_2,\dots,\varepsilon_r)\in\{0,1\}^r,
\]
then we obtain by continuity of $Q$ and by an obvious fact $\displaystyle\lim_{n\to+\infty}\xi_n=\xi$
\[
\begin{array}{r@{\ }c@{\ }l}
Q[\nu]
&=&
\displaystyle
\lim_{n\to+\infty}Q[\nu_n]
=\lim_{n\to+\infty}\rho(\exp L_{t_nc_1}\exp L_{u_n})\rho(h'_n)(c_1+c_{\ue'})\\
&=&
\displaystyle
\lim_{n\to+\infty}\rho(h_n)c_{\boldsymbol{\varepsilon}},
\end{array}
\]
whence $Q[\nu]\in \overline{\rho(H)c_{\boldsymbol{\varepsilon}}}$ for any $\nu\in E$.
Notice that the value $\varepsilon_1$ is determined according to $\dim E_1=0$ or not.
At last,
we need to show that $\boldsymbol{\varepsilon}\in\{0,1\}^r$ above does not depend on the choice of $\nu$.
Let us take two elements $\eta_1,\eta_2\in E_1$, and set
\[
E_k(\eta_i):=\mathrm{Image}\left(
r_{\eta_i}|_{V_{k1}}
\right)\quad(i=1,2).
\]
Then,
as similar to the proof of Lemma~\ref{lemma:direct sum},
the space $E_k(\eta_i)$ for each $\eta_i$ is linearly isomorphic to $V_{k1}$
through $r_{\eta_i}|_{V_{k1}}$ so that
we have $\dim E_k(\eta_1)=\dim E_k(\eta_2)$.
Since we have shown in the above arguments that
$\varepsilon_1,\dots,\varepsilon_r$
are determined by $\dim\varphi(c_j)E_{V^{[1]}}^\perp=\dim \varphi(c_j)E-\dim V_{j1}$ $(j=2,\dots,r)$ and by $\dim V_{kj}$ $(2\le j<k\le r)$,
the vector $\boldsymbol{\varepsilon}$ does not depend on the choice of $\eta$ and hence we have finished the proof.
\qed
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.